scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Communications Surveys and Tutorials in 2008"


Journal ArticleDOI
TL;DR: This survey paper looks at emerging research into the application of Machine Learning techniques to IP traffic classification - an inter-disciplinary blend of IP networking and data mining techniques.
Abstract: The research community has begun looking for IP traffic classification techniques that do not rely on `well known? TCP or UDP port numbers, or interpreting the contents of packet payloads. New work is emerging on the use of statistical traffic characteristics to assist in the identification and classification process. This survey paper looks at emerging research into the application of Machine Learning (ML) techniques to IP traffic classification - an inter-disciplinary blend of IP networking and data mining techniques. We provide context and motivation for the application of ML techniques to IP traffic classification, and review 18 significant works that cover the dominant period from 2004 to early 2007. These works are categorized and reviewed according to their choice of ML strategies and primary contributions to the literature. We also discuss a number of key requirements for the employment of ML-based traffic classifiers in operational IP networks, and qualitatively critique the extent to which the reviewed works meet these requirements. Open issues and challenges in the field are also discussed.

1,519 citations


Journal ArticleDOI
TL;DR: A comprehensive survey of the state-of-the-art for vehicle ad hoc networks, namely, safety and user applications, and suggestions for a general architecture that can form the basis for a practical VANET.
Abstract: This article presents a comprehensive survey of the state-of-the-art for vehicle ad hoc networks. We start by reviewing the possible applications that can be used in VANETs, namely, safety and user applications, and by identifying their requirements. Then, we classify the solutions proposed in the literature according to their location in the open system interconnection reference model and their relationship to safety or user applications. We analyze their advantages and shortcomings and provide our suggestions for a better approach. We also describe the different methods used to simulate and evaluate the proposed solutions. Finally, we conclude with suggestions for a general architecture that can form the basis for a practical VANET.

668 citations



Journal ArticleDOI
TL;DR: This article presents several major classes of applications and the types of services they require from an underlying network and analyzes existing networking protocols in a bottom-up fashion, from the physical to the transport layers, as well as security aspects related to IVC systems.
Abstract: Inter-vehicle communication (IVC) systems (i.e., systems not relying on roadside infrastructure) have the potential to radically improve the safety, efficiency, and comfort of everyday road travel. Their main advantage is that they bypass the need for expensive infrastructure; their major drawback is the comparatively complex networking protocols and the need for significant penetration before their applications can become effective. In this article we present several major classes of applications and the types of services they require from an underlying network. We then proceed to analyze existing networking protocols in a bottom-up fashion, from the physical to the transport layers, as well as security aspects related to IVC systems. We conclude the article by presenting several projects related to IVC as well as a review of common performance evaluation techniques for IVC systems.

507 citations


Journal ArticleDOI
TL;DR: A comprehensive survey of WSNSecurity issues that were investigated by researchers in recent years and that shed light on future directions for WSN security are presented.
Abstract: The significant advances of hardware manufacturing technology and the development of efficient software algorithms make technically and economically feasible a network composed of numerous, small, low-cost sensors using wireless communications, that is, a wireless sensor network. WSNs have attracted intensive interest from both academia and industry due to their wide application in civil and military scenarios. In hostile scenarios, it is very important to protect WSNs from malicious attacks. Due to various resource limitations and the salient features of a wireless sensor network, the security design for such networks is significantly challenging. In this article, we present a comprehensive survey of WSN security issues that were investigated by researchers in recent years and that shed light on future directions for WSN security.

432 citations


Journal ArticleDOI
TL;DR: This survey focuses on the video encoding at the video sensors and the real-time transport of the encoded video to a base station, and considers the mechanisms operating at the application, transport, network, and MAC layers.
Abstract: A wireless sensor network with multimedia capabilities typically consists of data sensor nodes, which sense, for instance, sound or motion, and video sensor nodes, which capture video of events of interest. In this survey, we focus on the video encoding at the video sensors and the real-time transport of the encoded video to a base station. Real-time video streams have stringent requirements for end-to-end delay and loss during network transport. In this survey, we categorize the requirements of multimedia traffic at each layer of the network protocol stack and further classify the mechanisms that have been proposed for multimedia streaming in wireless sensor networks at each layer of the stack. Specifically, we consider the mechanisms operating at the application, transport, network, and MAC layers. We also review existing cross-layer approaches and propose a few possible cross-layer solutions to optimize the performance of a given wireless sensor network for multimedia streaming applications.

407 citations


Journal ArticleDOI
TL;DR: This paper reviews several routing protocols proposed for possible deployment of mobile ad hoc networks in military, government and commercial applications with a particular focus on security aspects, and analyses of the secure versions of the proposed protocols are discussed.
Abstract: Several routing protocols have been proposed in recent years for possible deployment of mobile ad hoc networks (MANETs) in military, government and commercial applications. In this paper, we review these protocols with a particular focus on security aspects. The protocols differ in terms of routing methodologies and the information used to make routing decisions. Four representative routing protocols are chosen for analysis and evaluation including: Ad Hoc on demand Distance Vector routing (AODV), Dynamic Source Routing (DSR), Optimized Link State Routing (OLSR) and Temporally Ordered Routing Algorithm (TORA). Secure ad hoc networks have to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability. The analyses of the secure versions of the proposed protocols are discussed with respect to the above security requirements.

329 citations


Journal ArticleDOI
TL;DR: This survey reviews Internet traffic engineering from the perspective of routing optimization, and points out some challenges in TE operation and important issues that are worthy of investigation in future research activities.
Abstract: Traffic engineering is an important mechanism for Internet network providers seeking to optimize network performance and traffic delivery. Routing optimization plays a key role in traffic engineering, finding efficient routes so as to achieve the desired network performance. In this survey we review Internet traffic engineering from the perspective of routing optimization. A taxonomy of routing algorithms in the literature is provided, dating from the advent of the TE concept in the late 1990s. We classify the algorithms into multiple dimensions: unicast/multicast, intra-/inter- domain, IP-/MPLS-based and offline/online TE schemes. In addition, we investigate some important traffic engineering issues, including robustness, TE interactions, and interoperability with overlay selfish routing. In addition to a review of existing solutions, we also point out some challenges in TE operation and important issues that are worthy of investigation in future research activities.

265 citations


Journal ArticleDOI
TL;DR: This work compile and classify the research work conducted for Ethernet passive optical networks, and examines PON architectures and dynamic bandwidth allocation algorithms, and further examines the topics of QoS support, as well as fair bandwidth allocation.
Abstract: We compile and classify the research work conducted for Ethernet passive optical networks. We examine PON architectures and dynamic bandwidth allocation algorithms. Our classifications provide meaningful and insightful presentations of the prior work on EPONs. The main branches of our classification of DBA are: grant sizing, grant scheduling, and optical network unit queue scheduling. We further examine the topics of QoS support, as well as fair bandwidth allocation. The presentation allows those interested in advancing EPON research to quickly understand what already was investigated and what requires further investigation. We summarize results where possible and explicitly point to future avenues of research.

216 citations


Journal ArticleDOI
TL;DR: This article surveys research in service advertising, discovery, and selection for mobile ad hoc networks and related issues and pays particular attention to cross-layer service discovery - a special class of efficient service discovery approaches for MANETs.
Abstract: This article surveys research in service advertising, discovery, and selection for mobile ad hoc networks and related issues. We include a categorization of service discovery architectures for MANETs and their modes of operation, presenting their merits and drawbacks. We pay particular attention to cross-layer service discovery - a special class of efficient service discovery approaches for MANETs. We also present security issues and discuss service description options, service selection mechanisms, and service-state maintenance techniques. We conclude with a summary, an outlook, and directions for future research in this area.

216 citations


Journal ArticleDOI
TL;DR: This article presents the major cross-layer design solutions that handle interoperability with the Internet, increase throughput for mobile devices, and optimize their operation for multimedia applications, and considers the associated architectural complexity and communication overhead they introduce.
Abstract: Third-generation (3G) and beyond 3G mobile communication systems must provide interoperability with the Internet, increase throughput for mobile devices, and optimize their operation for multimedia applications. The limited ability of traditional layered architectures to exploit the unique nature of wireless communication has fostered the introduction of cross-layer design solutions that allow optimized operation for mobile devices in the modern heterogeneous wireless environment. In this article we present the major cross-layer design solutions that handle such problems, and discuss cross-layer implementations with a focus on functional entities that support cross-layer processes and the respective signaling. In addition, we consider the associated architectural complexity and communication overhead they introduce. Furthermore, we point out the major open technical challenges in the cross-layer design research area. Finally, we conclude our article with a summary of cross-layer approaches developed thus far and provide directions for future work.

Journal ArticleDOI
TL;DR: This tutorial is devoted to the notion of max-min fairness (MMF), associated optimization problems, and their applications to multi-commodity flow networks, and its applications to communication networks.
Abstract: This tutorial is devoted to the notion of max-min fairness (MMF), associated optimization problems, and their applications to multi-commodity flow networks.We first introduce a theoretical background for a generic MMF optimization problem and discuss its relation to lexicographic optimization. We next present resolution algorithms for convex MMF optimization, and analyze their properties. In the second half of the tutorial we discuss its applications to communication networks, in particular to routing and load-balancing. We state several properties with respect to each of the studied problems and analyze the behavior of the algorithms.

Journal ArticleDOI
TL;DR: The main objective of this survey is to familiarize the reader with research on network topology over the past decade, and study techniques for inference, modeling, and generation of the Internet topology at both the router and administrative levels.
Abstract: Accurate measurement, inference and modeling techniques are fundamental to Internet topology research. Spatial analysis of the Internet is needed to develop network planning, optimal routing algorithms, and failure detection measures. A first step toward achieving such goals is the availability of network topologies at different levels of granularity, facilitating realistic simulations of new Internet systems. The main objective of this survey is to familiarize the reader with research on network topology over the past decade. We study techniques for inference, modeling, and generation of the Internet topology at both the router and administrative levels. We also compare the mathematical models assigned to various topologies and the generation tools based on them. We conclude with a look at emerging areas of research and potential future research directions.

Journal ArticleDOI
TL;DR: The current methods used to slow down or stop the spread of worms are explored and the remaining challenges of worm detection and future research directions are pointed out.
Abstract: Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without any human interaction and launch the most destructive attacks against computer networks. At the same time, being fully automated makes their behavior repetitious and predictable. This article presents a survey and comparison of Internet worm detection and containment schemes. We first identify worm characteristics through their behavior, and then classify worm detection algorithms based on the parameters used in the algorithms. Furthermore, we analyze and compare different detection algorithms with reference to the worm characteristics by identifying the type of worms that can and cannot be detected by these schemes. After detecting the existence of worms, the next step is to contain them. This article explores the current methods used to slow down or stop the spread of worms. The locations to implement detection and containment, as well as the scope of each of these systems/methods, are also explored in depth. Finally, this article points out the remaining challenges of worm detection and future research directions.

Journal ArticleDOI
TL;DR: This article provides a comprehensive survey of the important work done on developing taxonomies of attacks and vulnerabilities in computer systems from 1974 until 2006 and summarizes the important properties of various taxonomy to provide a framework for organizing information about known attacks and vulnerability into a taxonomy that would benefit the security assessment process.
Abstract: Security assessment of a system is a difficult problem. Most of the current efforts in security assessment involve searching for known vulnerabilities. Finding unknown vulnerabilities still largely remains a subjective process. The process can be improved by understanding the characteristics and nature of known vulnerabilities. The knowledge thus gained can be organized into a suitable taxonomy, which can then be used as a framework for systematically examining new systems for similar but as yet unknown vulnerabilities. There have been many attempts at producing such taxonomies. This article provides a comprehensive survey of the important work done on developing taxonomies of attacks and vulnerabilities in computer systems. This survey covers work done in security related taxonomies from 1974 until 2006. Apart from providing a state-of-the-art survey of taxonomies, we also analyze their effectiveness for use in a security assessment process. Finally, we summarize the important properties of various taxonomies to provide a framework for organizing information about known attacks and vulnerabilities into a taxonomy that would benefit the security assessment process.

Journal ArticleDOI
TL;DR: In this paper, the authors present a survey of the current state of the art in grid resource discovery, resource taxonomy with focus on the computational grid paradigm, P2P taxonomy, and a detailed survey of existing work that can support rf-dimensional grid resource queries.
Abstract: An efficient resource discovery mechanism is one of the fundamental requirements for grid computing systems, as it aids in resource management and scheduling of applications. Resource discovery activity involves searching for the appropriate resource types that match the user's application requirements. Various kinds of solutions to grid resource discovery have been suggested, including centralized and hierarchical information server approaches. However, both of these approaches have serious limitations in regard to scalability, fault tolerance, and network congestion. To overcome these limitations, indexing resource information using a decentralized (e.g., peer-to-peer (P2P)) network model has been actively proposed in the past few years. This article investigates various decentralized resource discovery techniques primarily driven by the P2P network model. To summarize, this article presents a: summary of the current state of the art in grid resource discovery, resource taxonomy with focus on the computational grid paradigm, P2P taxonomy with a focus on extending the current structured systems (e.g., distributed hash tables) for indexing d-dimensional grid resource queries,1 a detailed survey of existing work that can support rf-dimensional grid resource queries, and classification of the surveyed approaches based on the proposed P2P taxonomy. We believe that this taxonomy and its mapping to relevant systems would be useful for academic and industry-based researchers who are engaged in the design of scalable grid and P2P systems.

Journal ArticleDOI
TL;DR: The contention resolution and avoidance schemes proposed for bufferless OPS networks are surveyed and the Quality of Service (QoS) issue in a QoS-capable bufferlessOPS network is reviewed.
Abstract: Optical Packet Switching (OPS) is the promising switching technique to utilize the huge bandwidth offered by all-optical networks using the DWDM (Dense Wavelength Division Multiplexing) technology. However, optical packet contention is the major problem in an OPS network. Resolution and avoidance are two schemes to deal with the contention problem. A resolution scheme resolves collisions, while an avoidance scheme tries to reduce the number of potential collision events. Many OPS architectures rely on optical buffers to resolve contention. Unfortunately, optical buffering technology is still immature as it relies on bulky optical fiber delay lines. Furthermore, it requires a complex control. Therefore, a bufferless OPS network could still be the most straightforward implementation in the near future. In this article, we survey the contention resolution and avoidance schemes proposed for bufferless OPS networks. We also review the resolution and avoidance schemes that can handle the Quality of Service (QoS) issue in a QoS-capable bufferless OPS network.

Journal ArticleDOI
TL;DR: A three-dimensional design framework is proposed that can accommodate well all of the existing hybrid routing protocols and helps find the unexplored design space, motivating the design of new Hybrid routing protocols.
Abstract: Routing protocols for mobile ad hoc networks can be classified into two categories: topological routing and geographic routing. Hybrid routing protocols that take advantage of both schemes have attracted a lot of attention recently. This article provides a systematic survey of these hybrid routing protocols. We first analyze the three types of routing information used in the hybrid routing protocols, namely, topological information, geographic information, and hierarchy information. Then, based on a review of the representative hybrid routing protocols, we summarize the three design options for hybrid routing protocols, namely, radius of the routing zone (1, k, or D), geographic information (position or position plus partition), and routing structure (flat or hierarchical). Finally, we propose a three-dimensional design framework that can accommodate well all of the existing hybrid routing protocols. The framework also helps find the unexplored design space, motivating the design of new hybrid routing protocols.

Journal ArticleDOI
TL;DR: This review article provides a comprehensive survey on reported studies for TCP enhancements over OBS networks in order to mitigate the numerous side effects due to the buffer- less characteristic of burst transmission.
Abstract: Since its advent in 1981, TCP has been subject to a tremendous amount of research effort and enhancements for achieving better performance over various network environments and application scenarios. Due to the transmission characteristics of optical burst switched networks, such as random burst dropping, retro-blocking (i.e., bursts proceeding or delayed from their actual reservation time slot), burstification delay, and burst signaling delay, TCP could be significantly affected if no corresponding countermeasure and enhancement are developed. In this review article we provide a comprehensive survey on reported studies for TCP enhancements over OBS networks in order to mitigate the numerous side effects due to the buffer- less characteristic of burst transmission. Furthermore, we closely analyze TCP behavior over OBS networks with various burst transmission characteristics while highlighting the open challenges that have not yet been extensively tackled or solved.

Journal ArticleDOI
TL;DR: It is shown how the redundancy of application servers can be invested to ensure efficient failover of Internet services when the legitimate processing server goes down.
Abstract: Fault-tolerant frameworks provide highly available services by means of fault detection and fault recovery mechanisms. These frameworks need to meet different constraints related to the fault model strength, performance, and resource consumption. One of the factors that led to this work is the observation that current fault-tolerant frameworks are not always adapted to existing Internet services. In fact, most of the proposed frameworks are not transport-level- or session-level-aware, although the concerned services range from regular services like HTTP and FTP to more recent Internet services such as multimodal conferencing and voice over IP. In this work we give a comprehensive overview of fault tolerance concepts, approaches, and issues. We show how the redundancy of application servers can be invested to ensure efficient failover of Internet services when the legitimate processing server goes down.

Journal ArticleDOI
TL;DR: Why the TCP/IP architecture is not tailored to mobile networks is explored, briefly describing its limitations and possible solutions, and a taxonomy to classify the architectures for convergent networking is presented.
Abstract: Nowadays most portable electronic devices have some sort of network capability. However, due to different power, cost and processing limitations, the choice of networking technology changes for each device. Currently, networks are converging to all-IP solutions, due to their wide applicability and low cost. However, the IP architecture is built on several design decisions that complicate the support of ubiquitous networking. In order to allow the equipment to intercommunicate even though their protocols may be different, a new set of protocols and services have been developed. This article describes the challenges and existing solutions in the area of convergent networking protocols and architectures. First, we will explore why the TCP/IP architecture is not tailored to mobile networks, briefly describing its limitations and possible solutions. Next, we will present a taxonomy to classify the architectures for convergent networking. Finally, we show a brief survey of the existing convergent architectures as well as the research challenges on the subject.

Journal ArticleDOI
TL;DR: The added functionality of routing in meshed PANs, optimizations due to multi-interface/multichannel communication, improved dynamic channel selection, transmitted power control procedures, and security aspects are given in this article.
Abstract: Wireless mesh networks have proven to be of great potential in providing new and innovative applications in many areas in the last few years. WMNs can address some limitations and optimize the performance of existing standardized networks in terms of cost, reliability, simplified network configuration, extended coverage and so on. This article is a tutorial on the technical aspects of meshed personal area networks. The proposed solutions for meshing high data rate PANs (802.15.3) are discussed along with related issues where applicable. The article starts by giving an overview of the high data rate PAN standard (802.15.3) and its inherent limitations to operate in a mesh configuration. It discusses the main drivers behind meshing PANs and describes the architecture, operation in a mesh configuration, and the hidden node/exposed node issue, which is pronounced in mesh networks. The added functionality of routing in meshed PANs, optimizations due to multi-interface/multichannel communication, improved dynamic channel selection, transmitted power control procedures, and security aspects are also given in this article. The article concludes by summarizing the proposed approaches for meshing PANs.

Journal Article
TL;DR: A continuously adjustable levelling column for chairs comprises a guide tube having a lower end and an upper end and a gas spring, which is axially fixed within the telescopic tube.
Abstract: A continuously adjustable levelling column for chairs comprises a guide tube having a lower end and an upper end. A telescopic tube is guided within the guide tube and has a tapered upper end portion extending beyond the upper end of the guide tube. A gas spring is accommodated within the telescopic tube. This gas spring is axially fixed within the telescopic tube. The upper end of a container of the gas spring abuts through a distance piece a support face at the upper end of the tapered portion of the telescopic tube. A piston rod passing through the lower end of the gas spring is axially fixed with respect to the lower end of the guide tube. A locking control pin extends through the upper end of the gas spring and is engageable through a transmission pin by a control handle.