for Journals by Title or ISSN
for Articles by Keywords

Publisher: IEEE   (Total: 191 journals)

 A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

              [Sort by number of followers]   [Restore default list]

Showing 1 - 191 of 191 Journals sorted alphabetically
Aerospace and Electronic Systems, IEEE Transactions on     Hybrid Journal   (Followers: 216, SJR: 1.151, h-index: 103)
Affective Computing, IEEE Transactions on     Hybrid Journal   (Followers: 22, SJR: 1.872, h-index: 26)
Autonomous Mental Development, IEEE Transactions on     Hybrid Journal   (Followers: 8, SJR: 0.664, h-index: 19)
Bell Labs Technical J.     Hybrid Journal   (Followers: 23, SJR: 0.596, h-index: 30)
Biomedical Engineering, IEEE Reviews in     Full-text available via subscription   (Followers: 17, SJR: 1.851, h-index: 21)
Biomedical Engineering, IEEE Transactions on     Hybrid Journal   (Followers: 32, SJR: 1.201, h-index: 138)
Broadcasting, IEEE Transactions on     Hybrid Journal   (Followers: 10, SJR: 1.114, h-index: 62)
Canadian J. of Electrical and Computer Engineering     Full-text available via subscription   (Followers: 14, SJR: 0.208, h-index: 17)
China Communications     Full-text available via subscription   (Followers: 7, SJR: 0.231, h-index: 9)
Communications and Networks, J. of     Hybrid Journal   (Followers: 10, SJR: 0.608, h-index: 27)
Components, Packaging and Manufacturing Technology, IEEE Transactions on     Hybrid Journal   (Followers: 26, SJR: 0.62, h-index: 23)
Computational Intelligence and AI in Games, IEEE Transactions on     Hybrid Journal   (Followers: 24, SJR: 1.325, h-index: 24)
Computer     Full-text available via subscription   (Followers: 84, SJR: 0.599, h-index: 126)
Computing in Science & Engineering     Full-text available via subscription   (Followers: 30, SJR: 0.688, h-index: 47)
Control Systems     Hybrid Journal   (Followers: 190, SJR: 0.942, h-index: 83)
Embedded Systems Letters, IEEE     Hybrid Journal   (Followers: 40, SJR: 0.578, h-index: 12)
Emerging and Selected Topics in Circuits and Systems     Hybrid Journal   (Followers: 8, SJR: 0.911, h-index: 19)
Geoscience and Remote Sensing, IEEE Transactions on     Hybrid Journal   (Followers: 145, SJR: 1.975, h-index: 168)
Haptics, IEEE Transactions on     Hybrid Journal   (Followers: 3, SJR: 0.88, h-index: 25)
IEEE Access     Open Access   (Followers: 60, SJR: 0.947, h-index: 12)
IEEE Aerospace and Electronic Systems Magazine     Full-text available via subscription   (Followers: 140, SJR: 0.463, h-index: 43)
IEEE Annals of the History of Computing     Full-text available via subscription   (Followers: 20, SJR: 0.193, h-index: 16)
IEEE Antennas and Propagation Magazine     Hybrid Journal   (Followers: 76, SJR: 1.016, h-index: 62)
IEEE Antennas and Wireless Propagation Letters     Hybrid Journal   (Followers: 64, SJR: 1.901, h-index: 69)
IEEE Circuits and Systems Magazine     Full-text available via subscription   (Followers: 47, SJR: 0.937, h-index: 37)
IEEE Communications Letters     Hybrid Journal   (Followers: 54, SJR: 0.934, h-index: 107)
IEEE Communications Magazine     Full-text available via subscription   (Followers: 79, SJR: 3.133, h-index: 170)
IEEE Communications Surveys & Tutorials     Hybrid Journal   (Followers: 29, SJR: 4.187, h-index: 78)
IEEE Computational Intelligence Magazine     Full-text available via subscription   (Followers: 20, SJR: 0.898, h-index: 33)
IEEE Computer Architecture Letters     Hybrid Journal   (Followers: 33, SJR: 0.348, h-index: 20)
IEEE Computer Graphics and Applications     Full-text available via subscription   (Followers: 44, SJR: 0.377, h-index: 71)
IEEE Consumer Electronics Magazine     Full-text available via subscription   (Followers: 37, SJR: 0.328, h-index: 4)
IEEE Design & Test     Full-text available via subscription   (Followers: 17, SJR: 0.358, h-index: 61)
IEEE Distributed Systems Online     Full-text available via subscription   (Followers: 14)
IEEE Electrical Insulation Magazine     Full-text available via subscription   (Followers: 27, SJR: 0.626, h-index: 48)
IEEE Electromagnetic Compatibility Magazine     Full-text available via subscription   (Followers: 12, SJR: 0.241, h-index: 4)
IEEE Electron Device Letters     Full-text available via subscription   (Followers: 5, SJR: 1.791, h-index: 117)
IEEE Engineering in Medicine and Biology Magazine     Full-text available via subscription   (Followers: 6)
IEEE Engineering Management Review     Full-text available via subscription   (Followers: 38, SJR: 0.109, h-index: 12)
IEEE Geoscience and Remote Sensing Letters     Hybrid Journal   (Followers: 135, SJR: 1.203, h-index: 60)
IEEE Industrial Electronics Magazine     Full-text available via subscription   (Followers: 58, SJR: 2.451, h-index: 36)
IEEE Industry Applications Magazine     Full-text available via subscription   (Followers: 23, SJR: 0.307, h-index: 41)
IEEE Instrumentation & Measurement Magazine     Full-text available via subscription   (Followers: 60, SJR: 0.295, h-index: 29)
IEEE Intelligent Systems     Full-text available via subscription   (Followers: 58, SJR: 1.122, h-index: 90)
IEEE Internet Computing     Full-text available via subscription   (Followers: 29, SJR: 0.833, h-index: 88)
IEEE J. of Biomedical and Health Informatics     Hybrid Journal   (Followers: 16, SJR: 0.943, h-index: 76)
IEEE J. of Emerging and Selected Topics in Power Electronics     Hybrid Journal   (Followers: 32, SJR: 2.737, h-index: 15)
IEEE J. of Oceanic Engineering     Hybrid Journal   (Followers: 12, SJR: 0.969, h-index: 71)
IEEE J. of Quantum Electronics     Hybrid Journal   (Followers: 21, SJR: 1.128, h-index: 108)
IEEE J. of Selected Topics in Quantum Electronics     Hybrid Journal   (Followers: 8, SJR: 1.632, h-index: 130)
IEEE J. of Selected Topics in Signal Processing     Hybrid Journal   (Followers: 31, SJR: 1.759, h-index: 62)
IEEE J. of Solid-State Circuits     Full-text available via subscription   (Followers: 22, SJR: 3.278, h-index: 165)
IEEE J. of the Electron Devices Society     Open Access   (Followers: 9, SJR: 1.026, h-index: 7)
IEEE J. of Translational Engineering in Health and Medicine     Open Access   (Followers: 3, SJR: 0.262, h-index: 3)
IEEE J. on Exploratory Solid-State Computational Devices and Circuits     Hybrid Journal   (Followers: 1)
IEEE J. on Selected Areas in Communications     Hybrid Journal   (Followers: 21, SJR: 2.915, h-index: 186)
IEEE Latin America Transactions     Full-text available via subscription   (Followers: 3, SJR: 0.249, h-index: 10)
IEEE Life Sciences Letters     Hybrid Journal  
IEEE Micro     Full-text available via subscription   (Followers: 6, SJR: 0.686, h-index: 76)
IEEE Microwave and Wireless Components Letters     Hybrid Journal   (Followers: 21, SJR: 0.942, h-index: 98)
IEEE Microwave Magazine     Full-text available via subscription   (Followers: 36, SJR: 0.528, h-index: 49)
IEEE Multimedia     Full-text available via subscription   (Followers: 13, SJR: 0.948, h-index: 53)
IEEE Nanotechnology Express     Hybrid Journal   (Followers: 18)
IEEE Network     Full-text available via subscription   (Followers: 43, SJR: 1.654, h-index: 90)
IEEE Pervasive Computing     Full-text available via subscription   (Followers: 15, SJR: 0.602, h-index: 77)
IEEE Photonics Technology Letters     Hybrid Journal   (Followers: 10, SJR: 1.433, h-index: 128)
IEEE Potentials     Full-text available via subscription   (Followers: 27, SJR: 0.138, h-index: 20)
IEEE Power and Energy     Full-text available via subscription   (Followers: 25, SJR: 1.681, h-index: 50)
IEEE Power and Energy Technology Systems J.     Open Access   (Followers: 2)
IEEE Power Electronics Magazine     Full-text available via subscription   (Followers: 50, SJR: 0.532, h-index: 3)
IEEE Revista Iberoamericana de Tecnologias del Aprendizaje     Hybrid Journal   (SJR: 0.281, h-index: 5)
IEEE Robotics & Automation Magazine     Full-text available via subscription   (Followers: 39, SJR: 1.792, h-index: 63)
IEEE Robotics and Automation Letters     Hybrid Journal   (Followers: 2)
IEEE Security & Privacy Magazine     Full-text available via subscription   (Followers: 27, SJR: 0.734, h-index: 53)
IEEE Sensors J.     Hybrid Journal   (Followers: 82, SJR: 0.759, h-index: 69)
IEEE Signal Processing Letters     Hybrid Journal   (Followers: 40, SJR: 1.072, h-index: 95)
IEEE Signal Processing Magazine     Full-text available via subscription   (Followers: 66, SJR: 3.413, h-index: 125)
IEEE Software     Full-text available via subscription   (Followers: 138, SJR: 0.652, h-index: 84)
IEEE Spectrum     Full-text available via subscription   (Followers: 174, SJR: 0.199, h-index: 52)
IEEE Systems J.     Hybrid Journal   (Followers: 19, SJR: 1.143, h-index: 27)
IEEE Systems, Man, and Cybernetics Magazine     Hybrid Journal  
IEEE Technology and Society Magazine     Full-text available via subscription   (Followers: 7, SJR: 0.265, h-index: 22)
IEEE Transactions on Advanced Packaging     Full-text available via subscription   (Followers: 7)
IEEE Transactions on Antennas and Propagation     Full-text available via subscription   (Followers: 55, SJR: 2.13, h-index: 143)
IEEE Transactions on Applied Superconductivity     Hybrid Journal   (Followers: 5, SJR: 0.381, h-index: 62)
IEEE Transactions on Audio, Speech, and Language Processing     Hybrid Journal   (Followers: 17, SJR: 1.963, h-index: 108)
IEEE Transactions on Automatic Control     Hybrid Journal   (Followers: 51, SJR: 4.238, h-index: 211)
IEEE Transactions on Automation Science and Engineering     Full-text available via subscription   (Followers: 12, SJR: 1.832, h-index: 48)
IEEE Transactions on Big Data     Hybrid Journal   (Followers: 8)
IEEE Transactions on Biomedical Circuits and Systems     Hybrid Journal   (Followers: 9, SJR: 1.104, h-index: 42)
IEEE Transactions on Circuits and Systems for Video Technology     Hybrid Journal   (Followers: 17, SJR: 1.606, h-index: 140)
IEEE Transactions on Circuits and Systems I: Regular Papers     Hybrid Journal   (Followers: 30, SJR: 1.394, h-index: 86)
IEEE Transactions on Circuits and Systems II: Express Briefs     Hybrid Journal   (Followers: 20, SJR: 0.747, h-index: 65)
IEEE Transactions on Cloud Computing     Hybrid Journal   (Followers: 21, SJR: 1.186, h-index: 9)
IEEE Transactions on Cognitive and Developmental Systems     Hybrid Journal   (Followers: 1)
IEEE Transactions on Cognitive Communications and Networking     Hybrid Journal   (Followers: 3)
IEEE Transactions on Communications     Hybrid Journal   (Followers: 49, SJR: 1.659, h-index: 167)
IEEE Transactions on Components and Packaging Technologies     Full-text available via subscription   (Followers: 15)
IEEE Transactions on Computational Imaging     Hybrid Journal   (Followers: 3)
IEEE Transactions on Computational Social Systems     Full-text available via subscription   (Followers: 1, SJR: 0.277, h-index: 2)
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems     Hybrid Journal   (Followers: 12, SJR: 0.71, h-index: 95)
IEEE Transactions on Computers     Hybrid Journal   (Followers: 64, SJR: 0.924, h-index: 92)
IEEE Transactions on Consumer Electronics     Hybrid Journal   (Followers: 34, SJR: 0.732, h-index: 76)
IEEE Transactions on Control of Network Systems     Hybrid Journal   (Followers: 11, SJR: 1.651, h-index: 6)
IEEE Transactions on Control Systems Technology     Hybrid Journal   (Followers: 51, SJR: 2.986, h-index: 105)
IEEE Transactions on Cybernetics     Hybrid Journal   (Followers: 11, SJR: 2.886, h-index: 27)
IEEE Transactions on Dependable and Secure Computing     Hybrid Journal   (Followers: 13, SJR: 1.155, h-index: 44)
IEEE Transactions on Device and Materials Reliability     Hybrid Journal   (Followers: 24, SJR: 0.826, h-index: 53)
IEEE Transactions on Dielectrics and Electrical Insulation     Hybrid Journal   (Followers: 13, SJR: 0.584, h-index: 84)
IEEE Transactions on Education     Hybrid Journal   (Followers: 9, SJR: 1.389, h-index: 53)
IEEE Transactions on Electromagnetic Compatibility     Hybrid Journal   (Followers: 28, SJR: 1.329, h-index: 68)
IEEE Transactions on Electron Devices     Hybrid Journal   (Followers: 15, SJR: 1.436, h-index: 142)
IEEE Transactions on Electronics Packaging Manufacturing     Full-text available via subscription   (Followers: 19)
IEEE Transactions on Emerging Topics in Computing     Open Access   (Followers: 1, SJR: 0.396, h-index: 6)
IEEE Transactions on Energy Conversion     Hybrid Journal   (Followers: 13, SJR: 1.911, h-index: 125)
IEEE Transactions on Engineering Management     Hybrid Journal   (Followers: 28, SJR: 1.091, h-index: 69)
IEEE Transactions on Evolutionary Computation     Hybrid Journal   (Followers: 10, SJR: 4.308, h-index: 131)
IEEE Transactions on Fuzzy Systems     Hybrid Journal   (Followers: 20, SJR: 5.8, h-index: 144)
IEEE Transactions on Human-Machine Systems     Hybrid Journal   (Followers: 11, SJR: 2.377, h-index: 81)
IEEE Transactions on Image Processing     Hybrid Journal   (Followers: 64, SJR: 2.727, h-index: 198)
IEEE Transactions on Industrial Informatics     Hybrid Journal   (Followers: 10, SJR: 2.973, h-index: 59)
IEEE Transactions on Information Forensics and Security     Hybrid Journal   (Followers: 20, SJR: 1.86, h-index: 63)
IEEE Transactions on Information Theory     Hybrid Journal   (Followers: 27, SJR: 1.433, h-index: 217)
IEEE Transactions on Instrumentation and Measurement     Hybrid Journal   (Followers: 58, SJR: 1.022, h-index: 79)
IEEE Transactions on Intelligent Transportation Systems     Hybrid Journal   (Followers: 7, SJR: 1.3, h-index: 82)
IEEE Transactions on Intelligent Vehicles     Hybrid Journal  
IEEE Transactions on Knowledge and Data Engineering     Hybrid Journal   (Followers: 33, SJR: 2.087, h-index: 119)
IEEE Transactions on Magnetics     Hybrid Journal   (Followers: 14, SJR: 0.602, h-index: 99)
IEEE Transactions on Medical Imaging     Hybrid Journal   (Followers: 22, SJR: 1.941, h-index: 165)
IEEE Transactions on Microwave Theory and Techniques     Hybrid Journal   (Followers: 28, SJR: 1.346, h-index: 148)
IEEE Transactions on Mobile Computing     Hybrid Journal   (Followers: 39, SJR: 1.826, h-index: 98)
IEEE Transactions on Molecular, Biological and Multi-Scale Communications     Hybrid Journal   (Followers: 1)
IEEE Transactions on Multi-Scale Computing Systems     Hybrid Journal  
IEEE Transactions on Multimedia     Hybrid Journal   (Followers: 13, SJR: 1.603, h-index: 88)
IEEE Transactions on Nanobioscience     Hybrid Journal   (Followers: 10, SJR: 0.572, h-index: 46)
IEEE Transactions On Nanotechnology     Hybrid Journal   (Followers: 36, SJR: 0.708, h-index: 61)
IEEE Transactions on Network and Service Management     Hybrid Journal   (Followers: 21, SJR: 1.021, h-index: 19)
IEEE Transactions on Neural Networks     Full-text available via subscription   (Followers: 25)
IEEE Transactions on Neural Systems and Rehabilitation Engineering     Hybrid Journal   (Followers: 7, SJR: 1.385, h-index: 97)
IEEE Transactions on Nuclear Science     Hybrid Journal   (Followers: 10, SJR: 0.732, h-index: 95)
IEEE Transactions on Parallel and Distributed Systems     Hybrid Journal   (Followers: 24, SJR: 1.59, h-index: 94)
IEEE Transactions on Pattern Analysis and Machine Intelligence     Hybrid Journal   (Followers: 64, SJR: 7.653, h-index: 264)
IEEE Transactions on Plasma Science     Hybrid Journal   (Followers: 10, SJR: 0.537, h-index: 83)
IEEE Transactions on Power Delivery     Hybrid Journal   (Followers: 18, SJR: 2.341, h-index: 126)
IEEE Transactions on Power Electronics     Hybrid Journal   (Followers: 56, SJR: 3.005, h-index: 160)
IEEE Transactions on Power Systems     Hybrid Journal   (Followers: 27, SJR: 4.126, h-index: 174)
IEEE Transactions on Professional Communication     Hybrid Journal   (Followers: 8, SJR: 0.632, h-index: 33)
IEEE Transactions on Reliability     Hybrid Journal   (Followers: 37, SJR: 1.93, h-index: 68)
IEEE Transactions on Robotics     Hybrid Journal   (Followers: 37, SJR: 2.884, h-index: 98)
IEEE Transactions on Semiconductor Manufacturing     Hybrid Journal   (Followers: 6, SJR: 0.64, h-index: 53)
IEEE Transactions on Signal and Information Processing over Networks     Full-text available via subscription   (Followers: 7)
IEEE Transactions on Signal Processing     Hybrid Journal   (Followers: 70, SJR: 2.004, h-index: 187)
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews     Full-text available via subscription   (Followers: 14)
IEEE Transactions on Systems, Man, and Cybernetics: Systems     Full-text available via subscription   (Followers: 13, SJR: 1.84, h-index: 10)
IEEE Transactions on Transportation Electrification     Hybrid Journal   (Followers: 1)
IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control     Hybrid Journal   (Followers: 8, SJR: 0.91, h-index: 98)
IEEE Transactions on Vehicular Technology     Hybrid Journal   (Followers: 4, SJR: 1.203, h-index: 116)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems     Hybrid Journal   (Followers: 22, SJR: 0.698, h-index: 78)
IEEE Transactions on Visualization and Computer Graphics     Hybrid Journal   (Followers: 24, SJR: 0.917, h-index: 92)
IEEE Transactions on Wireless Communications     Hybrid Journal   (Followers: 17, SJR: 2.34, h-index: 146)
IEEE Vehicular Technology Magazine     Full-text available via subscription   (Followers: 7, SJR: 0.897, h-index: 30)
IEEE Wireless Communications     Full-text available via subscription   (Followers: 42, SJR: 2.803, h-index: 112)
IEEE/ACM Transactions on Computational Biology and Bioinformatics     Hybrid Journal   (Followers: 17, SJR: 0.706, h-index: 43)
IEEE/ACM Transactions on Networking     Hybrid Journal   (Followers: 22, SJR: 1.795, h-index: 140)
IEEE/ASME Transactions on Mechatronics     Hybrid Journal   (Followers: 20, SJR: 2.305, h-index: 87)
Industrial Electronics, IEEE Transactions on     Hybrid Journal   (Followers: 40, SJR: 3.285, h-index: 169)
Industry Applications, IEEE Transactions on     Hybrid Journal   (Followers: 10, SJR: 1.388, h-index: 138)
Intelligent Transportation Systems Magazine, IEEE     Full-text available via subscription   (Followers: 8)
IT Professional     Full-text available via subscription   (Followers: 18, SJR: 0.501, h-index: 31)
J. of Display Technology     Hybrid Journal   (Followers: 4, SJR: 0.956, h-index: 44)
J. of Lightwave Technology     Hybrid Journal   (Followers: 11, SJR: 2.006, h-index: 158)
J. of Microelectromechanical Systems     Hybrid Journal   (Followers: 31, SJR: 0.847, h-index: 114)
Learning Technologies, IEEE Transactions on     Hybrid Journal   (Followers: 14, SJR: 0.733, h-index: 28)
Magnetics Letters, IEEE     Hybrid Journal   (Followers: 7, SJR: 0.488, h-index: 11)
Nanotechnology Magazine, IEEE     Full-text available via subscription   (Followers: 31, SJR: 0.187, h-index: 9)
Neural Networks and Learning Systems, IEEE Transactions on     Hybrid Journal   (Followers: 36, SJR: 3.181, h-index: 149)
Optical Communications and Networking, IEEE/OSA J. of     Full-text available via subscription   (Followers: 14, SJR: 1.306, h-index: 35)
Photonics J., IEEE     Open Access   (Followers: 13, SJR: 1.233, h-index: 34)
Photovoltaics, IEEE J. of     Hybrid Journal   (Followers: 14, SJR: 1.968, h-index: 27)
Proceedings of the IEEE     Hybrid Journal   (Followers: 73, SJR: 1.586, h-index: 205)
Pulse     Full-text available via subscription   (Followers: 5, SJR: 0.311, h-index: 66)
Selected Topics in Applied Earth Observations and Remote Sensing, IEEE J. of     Hybrid Journal   (Followers: 50, SJR: 1.196, h-index: 37)
Services Computing, IEEE Transactions on     Hybrid Journal   (Followers: 5, SJR: 1.726, h-index: 36)
Smart Grid, IEEE Transactions on     Hybrid Journal   (Followers: 13, SJR: 4.784, h-index: 66)
Software Engineering, IEEE Transactions on     Hybrid Journal   (Followers: 67, SJR: 1.543, h-index: 128)
Solid-State Circuits Magazine, IEEE     Hybrid Journal   (Followers: 12, SJR: 0.19, h-index: 7)
Sustainable Energy, IEEE Transactions on     Hybrid Journal   (Followers: 16, SJR: 3.646, h-index: 45)
Terahertz Science and Technology, IEEE Transactions on     Hybrid Journal   (Followers: 2, SJR: 1.079, h-index: 26)
Tsinghua Science & Technology     Hybrid Journal   (Followers: 1, SJR: 0.42, h-index: 24)
Wireless Communications Letters IEEE     Full-text available via subscription   (Followers: 22, SJR: 1.08, h-index: 21)
Women in Engineering Magazine, IEEE     Full-text available via subscription   (Followers: 12, SJR: 0.1, h-index: 1)

              [Sort by number of followers]   [Restore default list]

Journal Cover IEEE Communications Magazine
  [SJR: 3.133]   [H-I: 170]   [79 followers]  Follow
   Full-text available via subscription Subscription journal
   ISSN (Print) 0163-6804
   Published by IEEE Homepage  [191 journals]
  • Cover 2
    • Abstract: Advertisement, IEEE.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Cover 3
    • Abstract: Describes the 2018 ICC Conference. May include topics to be covered or calls for papers.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Cover 4
    • Abstract: Advertisement, IEEE.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Spectrum Enterprise
    • Pages: 3 - 3
      Abstract: Advertisement.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • The President's Page
    • Authors: Harvey Freeman;Stan Moyer;
      Pages: 4 - 5
      Abstract: Presents the President's message for this issue of the publication.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Interconnections for computer communications and packet networks
           (rojas-cessa, r.) [book review]
    • Authors: Grzegorz Danilewicz;
      Pages: 6 - 6
      Abstract: An interconnection network is a major, yet often underestimated, part of telecommunication and computer network nodes. The scope of applications of this type of network is very wide. They can be used in small systems to connect processors or, on the other hand, in very large data centers to connect servers and other equipment mounted in a number of racks. This book is organized into 12 essential chapters. Each part of the book presents problems of interconnecting in slightly different environments. The first part is devoted to interconnection networks for multiprocessors and consists of two chapters. The second part is the largest portion of the book, and it is dedicated to interconnection networks for packet switching in data networks. This part consists of chapters 3-11. The last part contains a single chapter related to data-center networks (DCNs). The organization of the book is very convenient. It is easy to read each part separately. Moving around the book is easy with a table of contents at the beginning of the book and separate tables of contents starting each chapter. In addition, every chapter ends with sample exercises. Thanks to that, the work can be used as a textbook accompanying lectures or a book for self-improvement.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Global Communications Newsletter
    • Authors: Stefano Bregni;Carlos Lozano;Lianfeng Shen;Miroslav Skoric;
      Pages: 7 - 10
      Abstract: Presents key events and topics in the global communications industry.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Conference Calendar
    • Pages: 11 - 11
      Abstract: Presents the ComSoc calendar of upcoming events and meetings.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Traffic Measurements for Cyber Security
    • Authors: Wojciech Mazurczyk;Maciej Korczynski;Koji Nakao;Engin Kirda;Cristian Hesselman;Katsunari Yoshioka;
      Pages: 12 - 13
      Abstract: The articles in this special section focus on telecommunication traffic measurements for protecting network security. Computers and open communication networks have become increasingly interwoven with our daily lives and have profoundly changed our societies. While this has significantly increased people’s well being, our growing dependence on an increasingly pervasive, complex, and ever evolving network infrastructure also poses a wide range of cyber security risks with potentially large socio-economic impacts. For example, the increasing number of ill-secured networked devices in combination with growing network capacities enables miscreants to launch disruptive distributed denial of service (DDoS) attacks. Within this context, network traffic measurements and monitoring have become a crucial line of research. It enables us to enhance our understanding of cyber security threats and use this knowledge to develop new ways to detect and mitigate them. Example applications of network measurement research include the analysis of how malicious software proliferates and operates, and how it exploits users’ behavior, assessments of the effectiveness of cyber security countermeasures, of the “badness” of Internet service providers, and estimations of the revenues of cyber criminals.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Demystifying DDoS as a Service
    • Authors: Ali Zand;Gaspar Modelo-Howard;Alok Tongaonkar;Sung-Ju Lee;Christopher Kruegel;Giovanni Vigna;
      Pages: 14 - 21
      Abstract: In recent years, we have observed a resurgence of DDoS attacks. These attacks often exploit vulnerable servers (e.g., DNS and NTP) to produce large amounts of traffic with little effort. However, we have also observed the appearance of application-level DDoS attacks, which leverage corner cases in the logic of an application in order to severely reduce the availability of the provided service. In both cases, these attacks are used to extort a ransom, to hurt a target organization, or to gain some tactical advantage. As it has happened for many of the components in the underground economy, DDoS has been commoditized, and DDoS as a service (DaaS) providers allow paying customers to buy and direct attacks against specific targets. In this article, we present a measurement study of 17 different DaaS providers, in which we analyzed the different techniques used to launch DDoS attacks, as well as the infrastructure leveraged in order to carry out the attacks. Results show a growing market of short-lived providers, where DDoS attacks are available at low cost (tens of dollars) and capable of easily disrupting connections of over 1.4 Gb/s. In our study, particular attention was given to characterize application-level (HTTP) DDoS attacks, which are more difficult to study given the low volume of traffic they generate and the need to study the logic of the application providing the target service.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Cybercrime at a Scale: A Practical Study of Deployments of HTTP-Based
           Botnet Command and Control Panels
    • Authors: Aditya K Sood;Sherali Zeadally;Rohit Bansal;
      Pages: 22 - 28
      Abstract: Cybercriminals deploy botnets for conducting nefarious operations on the Internet. Botnets are managed on a large scale and harness the power of compromised machines, which are controlled through centralized portals known as C&C panels. C&C panels are considered as attackers' primary operating environment through which bots are controlled and updated at regular intervals of time. C&C panels also store information stolen from the compromised machines as a part of the data exfiltration activity. In this empirical study, we analyzed many over 9000 C&C web URLs to better understand the deployment and the operational characteristics of HTTP-based botnets.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Traffic-Aware Patching for Cyber Security in Mobile IoT
    • Authors: Shin-Ming Cheng;Pin-Yu Chen;Ching-Chao Lin;Hsu-Chun Hsiao;
      Pages: 29 - 35
      Abstract: The various types of communication technologies and mobility features in IoT on one hand enable fruitful and attractive applications, but on the other hand facilitate malware propagation, thereby raising new challenges in handling IoT-empowered malware for cyber security. Compared to the malware propagation control scheme in traditional wireless networks, where nodes can be directly repaired and secured, in IoT, compromised end devices are difficult to patch. Alternatively, blocking malware via patching intermediate nodes turns out to be a more feasible and practical solution. Specifically, patching intermediate nodes can effectively prevent the proliferation of malware propagation by securing infrastructure links and limiting malware propagation to local device-to-device dissemination. This article proposes a novel traffic-aware patching scheme to select important intermediate nodes to patch, which applies to the IoT system with limited patching resources and response time constraint. Experiments on real-world trace datasets in IoT networks are conducted to demonstrate the advantage of the proposed traffic-aware patching scheme in alleviating malware propagation.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Characterizing the HTTPS Trust Landscape: A Passive View from the Edge
    • Authors: Gustaf Ouvrier;Michel Laterman;Martin Arlitt;Niklas Carlsson;
      Pages: 36 - 42
      Abstract: Our society increasingly relies on web-based services like online banking, shopping, and socializing. Many of these services heavily depend on secure end-to-end transactions to transfer personal, financial, and other sensitive information. At the core of ensuring secure transactions are the HTTPS protocol and the "trust" relationships between many involved parties, including users, browsers, servers, domain owners, and the third-party CAs that issue certificates binding ownership of public keys with servers and domains. This article presents an overview of the current trust landscape and provides statistics to illustrate and quantify some of the risks facing typical users. Using measurement results obtained through passive monitoring of the HTTPS traffic between a campus network and the Internet, we provide concrete examples and characterize the certificate usage and trust relationships in this complex landscape. By comparing our observations against known vulnerabilities and problems, we highlight and discuss the actual security that typical Internet users (e.g., the people on campus) experience. Our measurements cover both mobile and stationary users, consider the involved trust relationships, and provide insights into how the HTTPS protocol is used and the weaknesses observed in practice. While the security properties vary significantly between sessions, out of the 232 million HTTPS sessions we observed, more than 25 percent had weak security properties.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Scalable Traffic Sampling Using Centrality Measure on Software-Defined
    • Authors: Seunghyun Yoon;Taejin Ha;Sunghwan Kim;Hyuk Lim;
      Pages: 43 - 49
      Abstract: With regard to cyber security, pervasive traffic visibility is one of the most essential functionalities for complex network systems. A traditional network system has limited access to core and edge switches on the network; on the other hand, SDN technology can provide flexible and programmable network management operations. In this article, we consider the practical problem concerning how to achieve scalable traffic measurement using SDN functionalities. Less intrusive traffic monitoring can be achieved by using a packet sampling technique that probabilistically captures data packets at switches, and the sampled traffic is steered toward a traffic analyzer such as an IDS on SDN. We propose the use of a centrality measure in graph theory for deciding the traffic sampling points among the switches. In addition, we discuss how to decide the traffic sampling rates at the selected switches. The results of the simulation and SDN testbed experiments indicate that the proposed sampling point and rate decision methods enhance the intrusion detection performance of an IDS in terms of malicious traffic flows in large-scale networks.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Quiet Dogs Can Bite: Which Booters Should We Go After, and What Are Our
           Mitigation Options'
    • Authors: Jose Jair Santanna;Ricardo de O. Schmidt;Daphne Tuncer;Anna Sperotto;Lisandro Z. Granville;Aiko Pras;
      Pages: 50 - 56
      Abstract: Large network security companies often report websites, called Booters, that offer DDoS attacks as a paid service as the primary reason for the increase in occurrence and power of attacks. Although hundreds of active Booters exist today, only a handful of those that promoted massive attacks faced mitigation and prosecution actions. In this tutorial article we focus our attention on Booters that are "under the radar" of security initiatives, by advertising high attack power and being very popular on the Internet. We discuss and provide grounds for critical thinking on what should be further done toward Booter mitigation.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Comsoc Membership
    • Pages: 57 - 57
      Abstract: Advertisement, IEEE.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Measuring the Energy Consumption of Cyber Security
    • Authors: Luca Caviglione;Mauro Gaggero;Enrico Cambiaso;Maurizio Aiello;
      Pages: 58 - 63
      Abstract: The Internet is a core tool for developing commercial and social relationships. As a consequence, cyber security must be properly assessed, for instance, to face new and sophisticated threats. To deliver large-scale services, proper countermeasures characterized by a non-negligible energetic impact have to be pursued. From this perspective, this article proposes to investigate the energy required by the most popular cryptographic algorithms. The collected measures are used to model relationships between power drains and size of the key or offered load via a black box approach. Results can also be used to prevent classical traffic analysis campaigns.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • On Understanding the Existence of a Deep Torrent
    • Authors: Rafael A. Rodriguez-Gomez;Gabriel Macia-Fernandez;Alberto Casares-Andres;
      Pages: 64 - 69
      Abstract: Nowadays, a great part of Internet content is not reachable from search engines. Studying the nature of these contents from a cyber security perspective is of high interest, as they could be part of many malware distribution processes, child pornography or copyrighted material exchange, botnet command and control messages, and so on. Although the research community has put a lot of effort into this challenge, most of the existing works are focused on contents that are hidden in websites. However, there are other relevant services that are used to keep and transmit hidden resources, such as P2P protocols. In the present work, we suggest the concept of Deep Torrent to refer to those torrents available in BitTorrent that cannot be found by means of public websites or search engines. We present an implementation of a complete system to crawl the Deep Torrent and evaluate its existence and size. We describe a basic experiment crawling the Deep Torrent for 39 days, in which an initial estimation of its size is 67 percent of the total number of resources shared in the BitTorrent network.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Toward Stream-Based IP Flow Analysis
    • Authors: Tomas Jirsik;Milan Cermak;Daniel Tovarnak;Pavel Celeda;
      Pages: 70 - 76
      Abstract: Analyzing IP flows is an essential part of traffic measurement for cyber security. Based on information from IP flows, it is possible to discover the majority of concurrent cyber threats in highspeed, large-scale networks. Some major prevailing challenges for IP flow analysis include, but are not limited to, analysis over a large volume of IP flows, scalability issues, and detecting cyber threats in real time. In this article, we discuss the transformation of present IP flow analysis into a stream-based approach to face current challenges in IP flow analysis. We examine the possible positive and negative impacts of the transformation and present examples of real-world applications, along with our recommendations. Our ongoing results show that stream-based IP flow analysis successfully meets the above-mentioned challenges and is suitable for achieving real-time network security analysis and situational awareness.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
    • Pages: 77 - 7
      Abstract: Advertisement, IEEE.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Software-Defined Vehicular Networks: Architecture, Algorithms, and
           Applications: Part 1
    • Authors: Guangjie Han;Mohsen Guizani;Yuanguo Bi;Tom H. Luan;Kaoru Ota;Haibo Zhou;Wael Guibene;Ammar Rayes;
      Pages: 78 - 79
      Abstract: The papers in this special section focus on software defined vehicular networks.With the ever more rapid development of wireless communications and the explosive usage of mobile electronics, vehicular networks have become an attainable technology to meet the imminent demands for improving traffic safety and efficiency. In addition, there is an increasing demand from traveling users to access the Internet through IP-enabled smart devices, which enables infotainment applications to have rapidly taken on an important role in the past few years. Even though several future architectures have been proposed and investigated, it has been very challenging to coordinate vehicular networks to efficiently facilitate applications with diverse quality of service (QoS) demands. Recently, software-defined networking (SDN) has been emerging as a promising paradigm to control the network in a systematic way. The flexibility and programmability of SDN, which are lacking in today’s distributed wireless substrate, not only make it attractive to satisfy the QoS requirements of vehicular multimedia services, but also simplify the resource management in vehicular networks. Consequently, there is a need to conduct research to further investigate the standardization efforts and address challenging issues in the SDN enabled vehicular networks.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • An Architecture for Hierarchical Software-Defined Vehicular Networks
    • Authors: Sergio Correia;Azzedine Boukerche;Rodolfo I. Meneguette;
      Pages: 80 - 86
      Abstract: With the recent advances in the telecommunications and auto industries, we have witnessed growing interest in ITS, of which VANETs are an essential component. SDN can bring advantages to ITS through its ability to provide flexibility and programmability to networks through a logically centralized controller entity that has a comprehensive view of the network. However, as the SDN paradigm initially had fixed networks in mind, adapting it to work on VANETs requires some changes to address particular characteristics of this kind of scenario, such as the high mobility of its nodes. There has been initial work on bringing SDN concepts to vehicular networks to expand its abilities to provide applications and services through the increased flexibility, but most of these studies do not directly tackle the issue of loss of connectivity with said controller entity. In this article, we propose a hierarchical SDN-based vehicular architecture that aims to have improved performance in the situation of loss of connection with the central SDN controller. Simulation results show that our proposal outperforms traditional routing protocols in the scenario where there is no coordination from the central SDN controller.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • 5G Software Defined Vehicular Networks
    • Authors: Xiaohu Ge;Zipeng Li;Shikuan Li;
      Pages: 87 - 93
      Abstract: With the emergence of 5G mobile communication systems and software defined networks, not only could the performance of vehicular networks be improved, but also new applications of vehicular networks are required by future vehicles (e.g., pilotless vehicles). To meet requirements of intelligent transportation systems, a new vehicular network architecture integrated with 5G mobile communication technologies and software defined networking is proposed in this article. Moreover, fog cells have been proposed to flexibly cover vehicles and avoid frequent handover between vehicles and roadside units. Based on the proposed 5G software defined vehicular networks, the transmission delay and throughput are analyzed and compared. Simulation results indicate that there is a minimum transmission delay of 5G software defined vehicular networks considering different vehicle densities. Moreover, the throughput of fog cells in 5G software defined vehicular networks is better than the throughput of traditional transportation management systems.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • A Scalable and Quick-Response Software Defined Vehicular Network Assisted
           by Mobile Edge Computing
    • Authors: Jianqi Liu;Jiafu Wan;Bi Zeng;Qinruo Wang;Houbing Song;Meikang Qiu;
      Pages: 94 - 100
      Abstract: Connected vehicles provide advanced transformations and attractive business opportunities in the automotive industry. Presently, IEEE 802.11p and evolving 5G are the mainstream radio access technologies in the vehicular industry, but neither of them can meet all requirements of vehicle communication. In order to provide low-latency and high-reliability communication, an SDN-enabled network architecture assisted by MEC, which integrates different types of access technologies, is proposed. MEC technology with its on-premises feature can decrease data transmission time and enhance quality of user experience in latency-sensitive applications. Therefore, MEC plays as important a role in the proposed architecture as SDN technology. The proposed architecture was validated by a practical use case, and the obtained results have shown that it meets application- specific requirements and maintains good scalability and responsiveness.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Software Defined Space-Air-Ground Integrated Vehicular Networks:
           Challenges and Solutions
    • Authors: Ning Zhang;Shan Zhang;Peng Yang;Omar Alhussein;Weihua Zhuang;Xuemin Sherman Shen;
      Pages: 101 - 109
      Abstract: This article proposes a software defined spaceair- ground integrated network architecture for supporting diverse vehicular services in a seamless, efficient, and cost-effective manner. First, the motivations and challenges for integration of space-air-ground networks are reviewed. Second, a software defined network architecture with a layered structure is presented. To protect the legacy services in the satellite, aerial, and terrestrial segments, resources in each segment are sliced through network slicing to achieve service isolation. Then available resources are put into a common and dynamic space-air-ground resource pool, which is managed by hierarchical controllers to accommodate vehicular services. Finally, a case study is carried out, followed by discussion on some open research topics.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Toward Secure Software Defined Vehicular Networks: Taxonomy, Requirements,
           and Open Issues
    • Authors: Adnan Akhunzada;Muhammad Khurram Khan;
      Pages: 110 - 118
      Abstract: The emerging software defined vehicular networking (SDVN) paradigm promises to dramatically simplify network management and enable innovation through network programmability. Despite noticeable advances of SDNs in wired networks, it is also becoming an indispensable component that potentially provides flexible and well managed next-generation wireless networks, gaining massive attention from both industry and academia. In spite of all the hype surrounding emerging SDVNs, exploiting its full potential is demanding, and security is still the key concern and an equally arresting challenge. On the contrary, the complete transformation of the network into an SDN structure is still questionable, and the security and dependability of SDNs have largely been neglected topics. Moreover, the logical centralization of network intelligence and the tremendously evolving landscape of digital threats and cyber attacks that predominantly target emerging SDVNs will have even more devastating effects than they are in simple networks. Besides, the deployment of the SDVNs' novel entities and several architectural components drive new security threats and vulnerabilities. Since the SDVNs architectural layers and their corresponding APIs are heavily dependent on each other, this article aims to present a systematic top-down approach to tackle the potential security vulnerabilities, attacks, and challenges pertaining to each layer. The article contributes by presenting the security implications of the emerging SDVNs to devise comprehensive thematic core layered taxonomies together with external communication APIs. Moreover, we also describe the potential requirements and key enablers toward secure SDVNs. Finally, a plethora of open security research issues are presented that may be deemed appropriate for young researchers and professionals around the globe to tackle in anticipation of secure SDVNs.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • IEEE Collabratec
    • Pages: 119 - 119
      Abstract: Advertisement, IEEE.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • SDN Enabled 5G-VANET: Adaptive Vehicle Clustering and Beamformed
           Transmission for Aggregated Traffic
    • Authors: Xiaoyu Duan;Yanan Liu;Xianbin Wang;
      Pages: 120 - 127
      Abstract: With the anticipated arrival of autonomous vehicles, supporting vehicle generated data traffic due to the dramatically increased use of in-vehicle mobile Internet access will become extremely challenging in 5G-based vehicular networks. This is mainly due to the high mobility of vehicles on the road and the high complexity of 5G HetNets. In order to support the increasing traffic and improve Het- Net management, an SDN enabled 5G VANET is proposed in this article, where neighboring vehicles are clustered adaptively according to real-time road conditions using SDN's global information gathering and network control capabilities. With proposed dual cluster head design and dynamic beamforming coverage, both trunk link communication quality and network robustness of vehicle clusters are significantly enhanced. Furthermore, an adaptive transmission scheme with selective modulation and power control is proposed to improve the capacity of the trunk link between the cluster head and base station. With cooperative communication between the mobile gateway candidates, the latency of traffic aggregation and distribution is also reduced. Computer simulation results show that the proposed design substantially improved 5G users' bit error rate and trunk link throughput rate.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Overcoming the Key Challenges to Establishing Vehicular Communication: Is
           SDN the Answer'
    • Authors: Ibrar Yaqoob;Iftikhar Ahmad;Ejaz Ahmed;Abdullah Gani;Muhammad Imran;Nadra Guizani;
      Pages: 128 - 134
      Abstract: Considerable development in software-based configurable hardware has paved the way for a new networking paradigm called software-defined vehicular networks (SDVNs). The distinctive features of SDN, such as its flexibility and programmability, can help fulfill the performance and management requirements for VANETs. Although several studies exist on VANET and SDN, a tutorial on SDVNs is still lacking. In this article, we initially investigate recent premier research advances in the SDVN paradigm. Then we categorize and classify SDVN concepts and establish a taxonomy based on important characteristics, such as services, access technologies, network architectural components, opportunities, operational modes, and system components. Furthermore, we identify and outline the key requirements for SDVNs. Finally, we enumerate and outline future research challenges.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Software Defined Architecture for VANET: A Testbed Implementation with
           Wireless Access Management
    • Authors: Gokhan Secinti;Berk Canberk;Trung Q. Duong;Lei Shu;
      Pages: 135 - 141
      Abstract: Toward ITS, academia and industry aim to utilize all possible radio access technologies in order to support reliable services and applications in VANETs. Thus, the inclusion of already deployed Wi-Fi networks in VANET topology is a crucial step for the next generation vehicular networks. However, the VANET topology also requires preservation of the features already offered by DSRC and the core cellular network. As a result, the coexistence of multiple different access technologies results in high complexity in terms of the control and management of the network infrastructure. To this end, software defined networking provides a promising opportunity to simplify the management and control of clumsy network infrastructures by decoupling the data and control planes in order to provide elasticity for current networks. In this article, we propose an architectural model that exploits this opportunity in order to enhance VANET with Wi-Fi access capability. Moreover, we offer a novel software defined VANET architecture that consists of soft OpenFlow switches with Wi-Fi capabilities as both roadside units and vehicles. In particular, we first investigate existing test tools and environments for software defined wireless networks and also supply a novel testbed architecture in order to provide a feasible test environment for evaluating the proposed architecture. Additionally, we propose a Wireless Access Management (WAM) protocol that provides wireless host management and basic flow admission with respect to the available bandwidth to validate the capability of the offered architecture. The observation results of the deployed testbed prove the conformity of the offered 802.11 architecture to the VANET.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Network and Service Management
    • Authors: George Pavlou;Jurgen Schonwalder;
      Pages: 142 - 142
      Abstract: The papers in this special section focus on key issues in network and service management. this section provides articles on the latest developments, highlighting recent research achievements and providing insight into both theoretical and practical issues related to the evolution of the network and service management discipline from different perspectives. The Series also provides a forum for the publication of both academic and industrial research, addressing the state of the art, theory, and practice in network and service management. The key annual event of the network and service management community, the International Symposium on Integrated Network Management (IM 2017).
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • IEEE Standards Education
    • Pages: 143 - 143
      Abstract: Advertisement, IEEE.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • REF: Enabling Rapid Experimentation of Contextual Network Traffic
           Management Using Software Defined Networking
    • Authors: Lyndon Fawcett;Mu Mu;Bruno Hareng;Nicholas Race;
      Pages: 144 - 150
      Abstract: Online video streaming is becoming a key consumer of future networks, generating high-throughput and highly dynamic traffic from large numbers of heterogeneous user devices. This places significant pressure on the underlying networks and can lead to deterioration in performance, efficiency, and fairness. To address this issue, future networks must incorporate contextual network designs that recognize application and user-level requirements. However, designs of new network traffic management components such as resource provisioning models are often tested within simulation environments, which lack subtleties in how network equipment behaves in practice. This article contributes the design and operational guidelines for an SDN rapid experimentation framework (REF), which enables rapid evaluation of contextual networking designs using real network infrastructures. Two use case studies of a QoE-aware resource allocation model and a network-aware dynamic ACL demonstrate the effectiveness of REF in facilitating the design and validation of SDN-assisted networking.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • IEEE Access
    • Pages: 151 - 151
      Abstract: Advertisement, IEEE.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • On the Resiliency of Virtual Network Functions
    • Authors: Bo Han;Vijay Gopalakrishnan;Gnanavelkandan Kathirvel;Aman Shaikh;
      Pages: 152 - 157
      Abstract: Network functions virtualization is an emerging technology that can significantly improve the flexibility of network service provisioning and offer potential cost savings. However, it is critical that service providers offer high reliability and availability of the network and services when moving from proprietary hardware appliances to virtualized network functions on commodity servers. In a network consisting of physical appliances, providers can deploy redundant hardware and extra capacity to handle failures, although this is quite expensive in practice. Virtualization of network functions lead to more challenges for resiliency, but also bring new opportunities to address these challenges in a more cost-effective manner. In this article, we explain the resiliency requirements for virtual network functions in order to provide carrier grade services, summarize the existing solutions in the literature, highlight several research challenges, and present a concrete case study to demonstrate how to decompose a type of virtual router and thus enhance its resiliency.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Wi-Fi Self-Organizing Networks: Challenges and Use Cases
    • Authors: Haris Gacanin;Amir Ligata;
      Pages: 158 - 164
      Abstract: Wireless customers expect to have a guaranteed quality of experience at all times, at any location, and through different devices. Wi-Fi has become an access network of preference for service/ network providers and customers as well for public and private access. This sets a challenging requirement for next-generation Wi-Fi technology to provide seamless and uniform network quality of service). Consequently, the necessity for self-optimization of network and radio frequency segments becomes critical. This article surveys challenges and use cases of Wi-Fi self-optimizing networks (Wi-SONs) that have not been presented to date. We address technology and design challenges that shape Wi-SON as a very complex problem.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Coordination of SON Functions in Multi-Vendor Femtocell Networks
    • Authors: Anna Zakrzewska;Lester Ho;Haris Gacanin;Holger Claussen;
      Pages: 165 - 171
      Abstract: With the increase of network complexity, there is a high need for network management automation. This is achieved through SON principles that enable self-configuration, self-optimization, and self-healing. However, even though SON functions are meant to be autonomous, a high level of coordination among them is required. To this end, efficient conflict detection and resolution techniques are needed, especially in multi-vendor deployments. This article presents a design together with a sample implementation of a coordination scheme between three key SON functions in femtocell networks: cell ID assignment, coverage adjustment, and idle mode control. This ensures stability and continuity of the network operation even in a situation when the functions have contradicting objectives. The solution is based on the Broadband Forum TR-069 protocol and is applicable to multi-vendor networks. Simulation evaluation has shown that SON coordination reduces mean cell ID conflicts by over 30 percent and, resulting from that, call drop probability by over 40 percent.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Ad Hoc and Sensor Networks
    • Authors: Edoardo Biagioni;Silvia Giordano;Ciprian Dobre;
      Pages: 172 - 172
      Abstract: The articles in this special section focus on ad hoc wireless sensor networks. Mobile applications and Internet of Things (IoT) platforms that utilize cloud computing technologies have become increasingly popular in recent years. The cloud provides data storage and processing capabilities that make it possible to run computation-intensive applications on devices with limited processing power. The cloud helps such devices do the “heavy lifting” when necessary. This design is challenged today by Internet delays and networking overheads. However, the cloud has a significant energy footprint and suffers from the drawbacks of extreme centralization. Thus, we witness a return to a more traditional grid-like future, where resources from all over the world are fused together into the grid and commonly used for a greater goal. Instead of externalizing all the business to the cloud, the cloud is brought closer to the business through set-top box equipment and cloudlet constructs, and we witness the rise of paradigms where processing of sensed data is done on machines running closer-than-cloud, whenever possible in the same network as the sensing machines themselves.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • EXEGESIS: Extreme Edge Resource Harvesting for a Virtualized Fog
    • Authors: Evangelos K. Markakis;Kimon Karras;Nikolaos Zotos;Anargyros Sideris;Theoharris Moysiadis;Angelo Corsaro;George Alexiou;Charalabos Skianis;George Mastorakis;Constandinos X. Mavromoustakis;Evangelos Pallis;
      Pages: 173 - 179
      Abstract: Currently there is an active debate about how the existing cloud paradigm can cope with the volume, variety, and velocity of the data generated by end devices (e.g., Internet of Things sensors). It is expected that there will be over 50 billion of these devices by 2020, which will create more than two Exabytes worth of data each day. Additionally, the vast number of edge devices create a huge ocean of digital resources close to the data source, which, however, remain so far unexploited to their full extent. EXEGESIS proposes to harness these unutilized resources via a three-layer architecture that encompasses the mist, fog, and cloud. The mist network is located at the very bottom, where interconnected objects (Internet of Things devices, small servers, etc.) create neighborhoods of objects. This arrangement is enhanced by a virtual fog layer, which allows for dynamic, ad hoc interconnections among the various neighborhoods. At the top layer resides the cloud with its abundant resources that can also be included in one or more virtual fog neighborhoods. Thus, this article complements and leverages existing cloud architectures, enabling them to interact with this new edge-centric ecosystem of devices/resources, and benefit from the fact that critical data are available where they can add the most value.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Coordinate-Assisted Routing Approach to Bypass Routing Holes in Wireless
           Sensor Networks
    • Authors: Haojun Huang;Hao Yin;Geyong Min;Xu Zhang;Weixing Zhu;Yulei Wu;
      Pages: 180 - 185
      Abstract: Geographic routing is becoming an attractive routing solution for WSNs since it offers a radical departure from traditional topology-dependent routing paradigms through use of geographic location in data delivery. However, it often suffers from the routing hole, referring to an area free of nodes in the direction closer to destination, in various real-world environments such as buildings and obstacles, leading to route failure. Currently, most geographic routing protocols tend to exploit face routing to recover the route. The basic idea behind it is to planarize the whole network by eliminating the crossing links before applying routing algorithms, thus achieving suboptimal network performance. In this article, we first survey representative face-based geographic routing approaches, including their design prerequisites and philosophy. Furthermore, we outline the emerging issues to be addressed in the future and illustrate the forming factors behind them in detail. Based on these observations, we then propose a CAGR to address the routing hole problem by employing relative coordinate systems, avoiding planarizing networks and preserving route optimality properties. Simulation results show that the proposed approach is superior to existing protocols in terms of packet delivery ratio, control overhead, and delivery delay in WSNs over a variety of communication sessions passing through the routing holes.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Crowd Associated Network: Exploiting over a Smart Garbage Management
    • Authors: Saiful Azad;Arafatur Rahman;A. Taufiq Asyhari;Al-Sakib Khan Pathan;
      Pages: 186 - 192
      Abstract: Most existing non-real-time applications utilize infrastructure-based or semi-infrastructure-based network architectures. Such a network architecture demands a considerably high installment and maintenance cost. To alleviate the cost, in this article, we propose an efficient infrastructure-less network architecture named CrAN. In CrAN, a set of crowds play significant roles by completing the communication gaps among various associates in the network; hence the name. We show the usability of this proposed architecture to support non-real-time data transmission over an SGMS, where optimum solutions need to be discovered to minimize the management cost. Due to the complexity of the optimization problem, we approximate these optimum solutions using a GA. In the implementation of the GA, we apply new fitness functions to discover a feasible trade-off between distance and waste volume. We then compare the performance of the proposed fitness functions with that of an existing fitness function. The results favorably suggest the necessity of employing the proposed fitness functions to obtain near-optimum solutions.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • A Hitchhiker's Guide to Computation Offloading: Opinions from
    • Authors: Morteza Golkarifard;Ji Yang;Ali Movaghar;Pan Hui;
      Pages: 193 - 199
      Abstract: Due to the increasing usage and capabilities of smart devices, mobile application developers build a large number of resource intensive applications, such as WAR applications. Even with the rapid development in hardware technology, the computing capability and battery capacity on wearable devices and smartphones still cannot meet the application demands with heavy computations and high battery drain. Pervasive computing addresses this problem by migrating applications to the resource providers external to mobile devices. The profitability of this method heavily depends on how to implement it and when to use it. Although there are many computation offloading systems proposed in the literature, there is no practical manual that addresses all the implementation complexities on the way to building a general offloading system. In this article, we review developments in the field of pervasive computing on computation offloading. We use this literature review together with our own experience and provide designers with some detailed guidelines to gain a deep insight into the implementation challenges of a computation offloading system. The guidelines empower the reader to choose between the variety of solutions in the literature for developing any offloading system with the consideration of their own system architecture and available facilities. Finally, we evaluate our general offloading system on Android devices with two real-time applications.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • How Far Are We from WebRTC-1.0' An Update on Standards and a Look at
           What's Next
    • Authors: Salvatore Loreto;Simon Pietro Romano;
      Pages: 200 - 207
      Abstract: Real-time communication between browsers has represented an unprecedented standardization effort involving both the IETF and the W3C. These activities have involved both the real-time protocol suite and the application-level JavaScript APIs to be offered to developers in order to allow them to easily implement interoperable real-time multimedia applications in the web. This article sheds light on the current status of standardization, with special focus on the upcoming final release of the so-called WebRTC-1.0 standard ecosystem. It takes stock of the situation with respect to hot topics such as codecs, session description and stream multiplexing. It also briefly discusses how standard bodies are dealing with seamless integration of the initially competing effort known as "Object Real Time Communications."
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Service-Centric Networking for Distributed Heterogeneous Clouds
    • Authors: Pieter Simoens;David Griffin;Elisa Maini;T. Khoa Phan;Miguel Rio;Luc Vermoesen;Frederik Vandeputte;Folker Schamel;Dariusz Burstzynowski;
      Pages: 208 - 215
      Abstract: Optimal placement and selection of service instances in a distributed heterogeneous cloud is a complex trade-off between application requirements and resource capabilities that requires detailed information on the service, infrastructure constraints, and the underlying IP network. In this article we first posit that from an analysis of a snapshot of today's centralized and regional data center infrastructure, there is a sufficient number of candidate sites for deploying many services while meeting latency and bandwidth constraints. We then provide quantitative arguments why both network and hardware performance needs to be taken into account when selecting candidate sites to deploy a given service. Finally, we propose a novel architectural solution for service-centric networking. The resulting system exploits the availability of fine-grained execution nodes across the Internet and uses knowledge of available computational and network resources for deploying, replicating and selecting instances to optimize quality of experience for a wide range of services.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • Shedding Light on the Internet: Stakeholders and Network Neutrality
    • Authors: Angelos Antonopoulos;Elli Kartsakli;Chiara Perillo;Christos Verikoukis;
      Pages: 216 - 223
      Abstract: The latest impressive technological advancements in the telecommunications domain have entailed the involvement of new network operators and over-the-top (OTT) providers that offer their services over the existing networks. This entry of new stakeholders has changed the Internet dynamics and triggered a long-standing conversation on whether different types of data in the network should be prioritized, also known as the network neutrality debate. On the one hand, OTT providers benefit from the current neutral Internet policy of not discriminating against any application or content in order to transfer their data for free, whereas network providers would like to seize the business opportunity and create revenues by supporting the prioritized delivery of data. In this article, we want to shed light on the emerging Internet ecosystem and the conflicting interests of its stakeholders. To that end, we first identify the different Internet players and describe their interrelationships. Furthermore, in an effort to offer a new perspective on the network neutrality debate, we propose two novel econometric models that employ recent financial data to capture the relationship between the OTT revenues and the financial gains and investments of the telecommunication operators. Our empirical results provide tangible answers to fundamental questions that had not been answered before, showcasing that OTT and telecommunication providers have aligned interests and their collaboration could be beneficial to both parties.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
  • IEEE Membership
    • Pages: 224 - 224
      Abstract: Advertisement, IEEE.
      PubDate: 2017
      Issue No: Vol. 55, No. 7 (2017)
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
Home (Search)
Subjects A-Z
Publishers A-Z
Your IP address:
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2016