By Topic

SBT/IEEE International Symposium on Telecommunications

3-6 Sept. 1990

Filter Results

Displaying Results 1 - 25 of 117
  • SBT/IEEE International Telecommunications Symposium. ITS '90 Symposium Record (Cat. No.90CH2901-7)

    Publication Year: 1990
    Request permission for commercial reuse | PDF file iconPDF (588 KB)
    Freely Available from IEEE
  • Leaky bucket analysis for ATM networks

    Publication Year: 1990, Page(s):498 - 502
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    The authors investigate input rate control in ATM (asynchronous transfer mode) networks. More specifically, they focus on the policing mechanisms, whose function is to assure that the sources abide by their initial specification. They study one such mechanism, the leaky bucket, and use the uniform arrival and service model, as well as simulation to study its effectiveness in bursty traffic. They s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extension of LANs interconnection service in metropolitan area

    Publication Year: 1990, Page(s):617 - 621
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    The authors propose a modular network architecture based on MAN (metropolitan area network) technology for the interconnection of bridged LANs (local area networks) situated over a metropolitan area. The proposal is based on the definition of interconnection entities operating like MAC bridges and on a routing strategy which offers interesting efficiency and fault tolerance features which would su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient demultiplexing algorithm for non-contiguous carriers

    Publication Year: 1990, Page(s):373 - 376
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB)

    A channel separation algorithm for the FDMA/TDM (frequency division multiple access/time division multiplexing) scheme is presented. A demultiplexing algorithm that would allow demultiplexing of only the carriers of interest from the wideband spectrum of the FDMA signal in a random and efficient manner is proposed. The computational requirements indicate that the proposed technique of approximatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance comparison of four MAC protocols for integrated MANs

    Publication Year: 1990, Page(s):104 - 112
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    The performance of four different MAC (medi access control) sublayer protocols proposed for applications in extended local area networks and/or metropolitan area network (MANs) integrating different types of traffic are compared. The four protocols are Expressnet, Fasnet, QPSX (or distributed queue dual bus-DQDB), and FDDI-II (fiber distributed data interface II). Performance results in terms of a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A neural network controller for a high-speed packet switch

    Publication Year: 1990, Page(s):493 - 497
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    A neural network implementation of an input access scheme in a high-speed packet switch for broadband ISDN (integrated services digital network) is presented. In this switch, each input maintains a separate queue for each of the outputs, thus n2 input queues in a (n×n) switch. Using synchronous operation, at most one packet per input and output will be t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operations support systems in Italy: experiences and perspectives of integration

    Publication Year: 1990, Page(s):572 - 576
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    The progressive integration of telecommunication networks and services requires a parallel integration of administration operation maintenance and provisioning (AOM&P) activities. Integrated AOM&P support has to be defined with a top-down approach, while the implementation of the integration plan should follow a bottom-up approach. The telecommunication management network (TMN) architectur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of the quantization effects of LMS complex algorithm in digital adaptive filters

    Publication Year: 1990, Page(s):307 - 311
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    A novel theoretical formulation is developed for the errors due to the digital implementation of the LMS algorithm in adaptive filters. An analytic expression is determined for the mean-square error at the output of the adaptive filter. This expression is valid both for transient conditions and for the steady state. The convergence conditions of the algorithm are studied and a very simple and usef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On improving and optimizing the performance of existing packet-switching networks

    Publication Year: 1990, Page(s):612 - 616
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    The author discusses a novel method for improving and optimizing the performance of existing packet-switching networks (PSN). Decreasing the inefficient information transmission in the PSN is shown to be an efficient method of improving and optimizing the performance of PSNs. The basic theory for the optimization of PSN performance is presented, and the implementation of performance optimization i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal convergence factor for Gauss-Newton algorithms and its application to an adaptive parallel realization

    Publication Year: 1990, Page(s):420 - 424
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    An efficient approach for the calculation of the optimal convergence factor for Gauss-Newton algorithms is proposed. The method leads to variable step size (convergence factor) algorithms that yield fast convergence, with an acceptable added cost in computational complexity. The results are applied to a recently proposed frequency-domain parallel realization for an adaptive IIR (infinite impulse r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of LAN/WAN relay systems in the European context

    Publication Year: 1990, Page(s):366 - 372
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    The problem of local-area-network/wide-area-network (LAN/WAN) interworking, where the WAN part is supported by an X.25 packet switched data network, is addressed. In this situation, a solution consists of extending the support of the connection-oriented characteristics to the LAN part of the communication. This can be achieved by implementing the X.25 level-3 protocol on the LAN stations. Intercon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance comparison of service strategies in high speed optical token rings

    Publication Year: 1990, Page(s):99 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    High-speed local area networks (HSLANs) operate at channel capacities of at least 100 Mbit/s. Taking advantage of the progress in optical transmission technique, the first HSLAN based on a token passing ring, namely FDDI (fiber distributed data interface) has now become commercially available. However, several other strategies to determine the token holding duration at a station may be applied, e.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM based B-ISDN access signalling

    Publication Year: 1990, Page(s):488 - 492
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    A proposal for a preliminary signaling system, which handles ATM (asynchronous transfer mode) point-to-point connections between two users or between a user and a specialized node is discussed. A specialized node supports services which require centralized resources within the network, such as connectionless or multimedia services. An example of this preliminary signaling protocol, which has been ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PC workstation for Ethernet monitoring and management

    Publication Year: 1990, Page(s):568 - 570
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    The authors present a monitoring and management workstation for IEEE 802.3 networks (Ethernet) based on a PC-AT. The monitor performs traffic analysis, detects active machines in the network, maintains a network database with information regarding network topology and machines, filters specific packets or protocols, and can also work as a traffic generator. The system has a user friendly interface... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High definition TV: its history and perspective

    Publication Year: 1990, Page(s):541 - 545
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    The author presents a historical review of the introduction of the modern advanced television systems (ATV) such as HDTV and EDTV (high-definition and enhanced-definition TV). Particular attention is given to the system of the Japanese Broadcasting Company (NHK), international polemics on HDTV, and future prospects in this area (with emphasis on the Brazilian situation) View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multidimensional signaling for intersymbol interference channels

    Publication Year: 1990, Page(s):302 - 306
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    The authors consider the use of multidimensional signaling and block demodulation for digital transmission over intersymbol interference (ISI) channels. As an example, the theory is developed for the unit-memory 1+αz-1 channel. The authors first explain why multidimensional signals should be used over ISI channels by showing how the minimum Euclidean distance and the cuto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • M-algorithm decoding of convolutional code combined with CPM

    Publication Year: 1990, Page(s):514 - 518
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    The performance of convolutional codes combined with continuous phase modulation schemes (CC/CPM) with M-algorithm decoding is evaluated by computer simulation. New CC/CPM schemes with a feedback convolutional encoder having, in some cases, better distances than previous CC/CPM which uses a feedforward encoder, are presented. Comparison of CC/CPM and CPM, constrained to the same complexity and ban... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fairness in network optimal flow control

    Publication Year: 1990, Page(s):590 - 596
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    The authors consider the problem of optimal flow control in a multiclass telecommunications environment where each user (or class) desires to optimize its performance while being `fair' to the other users (classes). The Nash arbitration scheme from game theory is shown to be a suitable candidate for a fair, optimal operation point in the sense that it satisfies certain axioms of fairness and is Pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimum transmission ranges in a frequency hopping multi-hop packet radio network

    Publication Year: 1990, Page(s):608 - 611
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    The authors determines optimum transmission ranges for a multi-hop packet radio network using frequency hopping spread spectrum with frequency shift keying. The results can be used in the study of routing schemes for such networks. Under the assumption of uniform traffic and a random network topology, the optimum transmission range is such that the number of terminals closer to the receiver than t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimum alternative routing strategy for mobile radio systems

    Publication Year: 1990, Page(s):414 - 419
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    The hexagonal shape of the cells in a mobile radio system is considered as an ideal model. In practice the borders between cells are not clearly defined, but are fuzzy. If a mobile is near a cell boundary, it may well have adequate communication with more than one base station. This property has already been used by the authors to define five alternative routing techniques, whose performances were... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A packet compression/decompression approach for very high speed optical networks

    Publication Year: 1990, Page(s):38 - 48
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB)

    A technique to produce time-compressed optical packets for transmission over an ultra-high-speed optical network is proposed and analytically studied. The technique employs two recirculating optical loops per network node, one to optically compress a fully formatted electronic packet for transmission onto the network and one to electronically expand such a packet upon reception. Depending upon the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cost minimization model for satellites offering customer premise services

    Publication Year: 1990, Page(s):399 - 403
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    An optimization model is presented for the satellite planning problem for the customer premises services case, assuming cost minimization to be the planning objective. It captures the complex relationships between the parameters of interest and the tradeoffs involved in designing the system. The model is nonlinear in nature, and geometric programming techniques were found suitable for solving the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of filtering effects on optical BPSK systems using external cavity semiconductor lasers

    Publication Year: 1990, Page(s):21 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB)

    The performance of an optical BPSK (binary phase shift keying) heterodyne system using external-cavity semiconductor lasers and a squaring loop carrier recovery circuit is evaluated theoretically via an analytical method. The method is based on the Gram-Charlier series and takes into account the effect of filtering on the baseband signal disturbed by non-Lorentzian phase noise from external-cavity... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security in value added networks-security requirements for EDI

    Publication Year: 1990, Page(s):361 - 365
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    The author describes the security requirements for the electronic data interchange (EDI) service. The existing security services and mechanisms of X.400 are evaluated in view of the EDI security requirement. Specific security services which appear to be a necessary part of the EDI model are briefly described. The work presented is based on the security concepts in the ISO/IEC JTC1/SWG-EDI document... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal multiplexing of packetized traffic with different requirements

    Publication Year: 1990, Page(s):92 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    The authors consider the problem of finding a transmission channel management policy, such that the average delay of some special packetized traffic is bounded while the weighted sum of average delays of the remaining traffic is minimized. An efficient algorithm is given to find an optimal policy based on the randomization of a subset of all fixed priority order taken with the right probability. E... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.