By Topic

Proceedings [1988] 13th Conference on Local Computer Networks

10-12 Oct. 1988

Filter Results

Displaying Results 1 - 25 of 62
  • Proceedings of the 13th Conference on Local Computer Networks (IEEE Cat. No.88CH2613-8)

    Publication Year: 1988
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Concurrent transmission and short loop latency protocol

    Publication Year: 1988, Page(s):238 - 246
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    A novel destination partial removal protocol, DRUID (destination removal without intermediate node delay) ring, is proposed for ring-type networks. In the DRUID ring, a node may initiate message transmission if its output link is free. Every node will relay the message immediately if it is idle when the message arrives. At the same time, the node also receives and buffers all incoming messages. Up... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet switched voice conferencing across interconnected networks

    Publication Year: 1988, Page(s):114 - 124
    Cited by:  Papers (3)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    The authors extend the logical ring control mechanism of C. Zielger et al. to the case of a multiparty conference across interconnected networks. In addition, the alternate implementation is expanded to allow for multiple-network connectivity. A comparative network between the alternate implementation methods with respect to station workload, gateway workload, network workload, and maximum number ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hierarchical interconnection of local computer networks

    Publication Year: 1988, Page(s):15 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    The optimization of the distributed computing environment at the Research Information Processing System center of the Tsukuba Research Center is described. A hierarchical interconnection of local computer networks was accomplished by integrating bridges and gateways. The optimization of the distributed computing environment was pursued in the large internetwork by combining centralization and dece... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Management architecture of a local integrated optical network

    Publication Year: 1988, Page(s):322 - 329
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB)

    The management architecture of an optical local area network is presented based on the Open Systems Interconnection (OSI) model. The layer-management architecture for the four lower layers of the OSI model is presented and the special interfaces of the systems-management application process to the node environment are given. Also, the fault and configuration management is presented. A functional b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation study of the token bus local area network

    Publication Year: 1988, Page(s):268 - 274
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    Theoretical models for the explicit token-bus local area network using both static and dynamic logical rings have been verified using simulation models based on the ANSI/IEEE 802.4 international standard. The effects of single- or multiple-packet transmission, slot time, and increasing ring maintenance overheads on the waiting times are investigated. The results are then compared to determine thre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of a XENIX distributed file system

    Publication Year: 1988, Page(s):230 - 235
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    The results of a series of experiments designed to measure the performance of Intel's distributed file system for an Ethernet local area network are summarized. The file system allows processes to access files stored on any node of the network, provided the process has the appropriate access permission. From informal observations, the authors theorized that system performance declined significantl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SHIPNET: a real-time local area network for ships

    Publication Year: 1988, Page(s):424 - 432
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    The authors have developed a real-time messaging system for token ring networks. The system is currently operational in a shipboard environment. The system conforms to the IEEE 802.2 LLC and 802.5 token-ring standards and is consistent with the Navy's emerging SAFENET specification. The authors provide a library of `C' routines which establish and manage sockets, transmit and receive messages, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Station interconnection on dual rings and other multichannel networks

    Publication Year: 1988, Page(s):108 - 113
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    The author describes an algorithm for interconnecting stations on multichannel networks. The algorithm is completely distributed and requires no global information. An immediate application is in a two-channel network, a dual ring with single-media-access-control stations. There are also important applications in networks consisting of two or more local area networks, such as those with hot backup... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use of bridges in local area networks

    Publication Year: 1988, Page(s):11 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    It has been suggested that bridges, usually viewed as a method of connecting local area networks (LANs), have untapped potential for improving LAN performance and management. To understand the full potential of this device, the author explores the uses of bridges in various configurations, breaking up a network into subsets. LAN performance gains that are possible by using bridges to segment an Et... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LAN management system for the McDonnell Aircraft Company's manufacturing operations

    Publication Year: 1988, Page(s):312 - 321
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    The authors present the design and implementation of a network management system (NMS) capable of monitoring an Ethernet/IEEE 802.3-based, multivendor, multiprotocol network. This NMS currently provides notification of cable plant, network component, and node failures. However, as the system was designed it became apparent that network and computer statistics, network design, and parts inventory c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of Ethernet based on an event driven simulation algorithm

    Publication Year: 1988, Page(s):253 - 267
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB)

    The Ethernet is a baseband local area network (LAN) which uses digital signalling and the carrier-sense multiple access/collision detection (CSMA/CD) protocol to control the network access. The authors describe an effort to develop a purely event-driven simulation model for obtaining performance of the CSMA/CD protocol. A review of analytic models of CSMA/CD is presented. The simulation algorithm ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling and gatewaying unslotted Aloha networks

    Publication Year: 1988, Page(s):28 - 35
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    The authors present a continuous-time Markov chain model for a single-hop network using the unslotted Aloha scheme. Two interconnected networks using the unslotted Aloha scheme have also been modeled, assuming that the gateway has a finite buffer. The mathematical model derived from the unslotted Aloha system is a special case of the model developed by R.R. Roy and T.N. Saadawi (1984). Throughput,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategic directions in corporate data networks

    Publication Year: 1988, Page(s):335 - 339
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    The authors provide a macrolevel overview of the ongoing migration pattern in an imbedded corporate communication network. This pattern is at the physical communication media level, the logical topological level and the integrated network management level. The authors attempt to develop a correlation among these three migration processes, and suggest that the use of this correlation will justify t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of a local network: a feasibility study

    Publication Year: 1988, Page(s):439 - 443
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    The feasibility of a local area network (LAN) design and implementation for a warehouse/test facility was investigated. The TMS-380-chipset-based token-ring LAN was selected for this facility. Several aspects in the design of this network are examined including network layout, cost, productivity, efficiency, and interoperability. A cost estimate of the various components of the LAN is presented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A deterministic communication protocol for distributed real-time systems

    Publication Year: 1988, Page(s):44 - 52
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    The authors describe an efficient communication protocol for transmitting time-constrained messages in a time-division multiple-access local area network. The proposed protocol differs from traditional protocols in this category in that it uses the bandwidth of the medium more effectively by explicitly passing the mastership between stations. In the present protocol, the drawback inherent to fixed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Redundant media mechanisms for dependable communication in token-bus LANs

    Publication Year: 1988, Page(s):453 - 462
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB)

    The author presents a study of a redundant media implementation for an ISO 8802/4 token-bus local area network (LAN), consistent with the standard recommendations. The redundant media IEEE-802.4G-compatible interface is intended to provide high availability of network access in the presence of medium omission and stopping faults. A set of management rules and fault treatment operations is defined,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The utilization of priorities on token ring networks

    Publication Year: 1988, Page(s):472 - 478
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    The authors theorize that, in a normal environment where the network is not overloaded, no packet priority levels should be implemented, and that the use of multiple priorities will generally degrade overall performance. They suggest that for priority operation to be meaningful, priority service must be given at the point of the service bottleneck, which generally is not network access, but rather... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SPIMS: a tool for protocol implementation performance measurements

    Publication Year: 1988, Page(s):222 - 229
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    The authors present SPIMS, a tool which provides an environment where it is easy to develop, specify, and execute communication measurements that can be used for `benchmarking'. The tool measures user-oriented performance parameters, such as throughput and response time, without relying on special hardware or operating system support. The measurements are specified in a protocol-independent specif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithms for file replication in a distributed system

    Publication Year: 1988, Page(s):206 - 214
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    The authors describe an implementation and performance evaluation of file replication in a locally distributed system. Different mechanisms are used to update the copies of the replicated file. The algorithms use both sequential and concurrent update methods. When updating the files sequentially, the algorithm is executed on the host on which the file has been written. Concurrent update is execute... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A job scheduling system implementation and its performance evaluation

    Publication Year: 1988, Page(s):184 - 192
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    The authors discuss a scheduling system implemented on a network of 12 AT&T 3B2 microcomputers, running a transport distributed operating system, the Loadable Illinois Networked Kernal (LINK). It is noted that the design overhead for a scheduling system built as part of an existing distributing computer system is very small compared to the design of the operating system itself. Moreover, an im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specifying the physical layer in a LAN standard: a comparison of CSMA/CD and token ring

    Publication Year: 1988, Page(s):146 - 150
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    The author examines the differences between the physical layers of the IEEE 802.3 CDMA/CD (carrier-sense multiple access with collision detection) and IEEE 802.5 token-ring LAN (local area network) standards. He reviews the specific requirements n 802.3 for coaxial 10Base5 transmission and relates the physical requirements to performance requirements for the system. He also describes the differenc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A prioritized reservation protocol for fiber optic ring local area computer networks

    Publication Year: 1988, Page(s):410 - 420
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    The authors describe the design and analysis of a fiber-optic ring local computer network using a priority-oriented reservation method as the medium access control (MAC) protocol. Using the proposed approach, any station of any priority can be placed anywhere on the ring without degrading performance considerably. A performance model is presented as well as a comparison with well-known MAC protoco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A network operating system for interconnected LANs with heterogeneous data-link layers

    Publication Year: 1988, Page(s):99 - 105
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    Microcomputer workstations interconnected by local area networks (LANs) are used extensively for educational computing at the University of Waterloo, Canada. The authors present the user's view of both the Waterloo JANET LAN and the Project ARIES Network to understand the motivation behind the underlying LAN structure. This is followed by a description of the method of interconnection of the LANs,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bridges and routers on Hughes Aircraft's engineering design network

    Publication Year: 1988, Page(s):4 - 10
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    The author describes some of the experiences in the design, implementation, and management of the Ethernet-based engineering design network (EDEN). He also looks at some of the advantages and disadvantages of both bridges and routers as used in EDEN. Some conclusions are drawn from the experiences on how to combine the two in a configuration that will fully utilize their respective strengths and m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.