By Topic

INFOCOM '89. Proceedings of the Eighth Annual Joint Conference of the IEEE Computer and Communications Societies. Technology: Emerging or Converging, IEEE

23-27 April 1989

Filter Results

Displaying Results 1 - 25 of 145
  • Telescience and high bandwidth networking

    Publication Year: 1989
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (31 KB)

    Summary form only given. The requirements for high bandwidth networking to support telescience and the science community are discussed. High-rate sensors (such as synthetic aperture radars and high-resolution infrared spectrometer) can generate data at 300 Mb/s. Interaction with remote laboratories requires transmission of video images. Low delay is required for remote control, implying high bandw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beyond multiplexing and full-motion video: any other uses for broadband?

    Publication Year: 1989
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (68 KB)

    Summary form only given. Broadband communications is said to offer a hidden benefit: it provides more time for computing. The system response time can be partitioned into two parts: the time for communications, and the time for processing. If the time for communications is less, then there is more time for processing. Within some limit end-users will not require greater speed and the extra time ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ISDN conformance test development at NIST

    Publication Year: 1989, Page(s):248 - 249 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (91 KB)

    Summary form only given. In the area of ISDN conformance test development NIST's objective is to produce abstract test scripts independent of any test system environment, and to place these test scripts in the public domain. NIST has promoted a cooperative effort amongst interested parties in the industry and a unified conformance effort has been established in the NIU Forum. NIST will maintain a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ISDN conformance test system development at COS

    Publication Year: 1989
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (51 KB)

    Summary form only given. Use of a single set of ISDN specifications, and conformance test systems for these specifications, is crucial for achieving universal interworking of ISDN networks. A standardized conformance testing methodology is currently being developed jointly by ISO and CCITT. The output of this activity is documented as CCITT X.290. The test methodology used in the design of the COS... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed scheduling of broadcasts in a radio network

    Publication Year: 1989, Page(s):497 - 504 vol.2
    Cited by:  Papers (63)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (533 KB)

    A distributed algorithm is presented for obtaining an efficient and conflict-free broadcasting schedule in a multi-hop packet radio network. The inherent broadcast nature of the radio channel enables a node's transmission to be received by all other nodes within range. Multiple transmissions can be scheduled simultaneously because of the multi-hop nature of the network. It is first shown that the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE INFOCOM'89 The Conference on Computer Communications. Proceedings of the Eighth Annual Joint Conference of the IEEE Computer and Communications Societies. Technology: Emerging or Converging? (IEEE Cat. No. 89CH2702-9)

    Publication Year: 1989
    Request permission for commercial reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • Performance analysis of message delay limited synchronous communication and queueing systems

    Publication Year: 1989, Page(s):51 - 58 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    Analysis and performance comparisons are presented for synchronous discrete-time queuing systems operating under a message waiting-time or delay-time constraint. Four different system admission and preemption policies are investigated. Under either a wait-time constraint or a delay-time limit, either newly arriving messages are always admitted (and then properly dismissed if their required residen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recursive computation of steady-state probabilities in priority queues

    Publication Year: 1989, Page(s):47 - 50 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    Recursive formulas are derived for computing the state probabilities in priority queuing systems (preemptive and nonpreemptive). The derivation is based only on the general structure of the generating function involved, and thus is similar and more general than previous methods. Also discussed are the applications of the method to other queuing systems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FTAM test design using an automated test tool

    Publication Year: 1989, Page(s):251 - 260 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    An experience is presented with an automated test design tool for functional analysis and test derivation of distributed systems formally specified using Estelle, a description technique based on an extended finite-state machine model. The tool accepts a formal specification of the system and generates control, data flow graphs, and unparameterised test sequences. The tool has been used, on an exp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Load sharing in heterogeneous queueing systems

    Publication Year: 1989, Page(s):731 - 739 vol.2
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    The problem of sharing jobs among a set of parallel queues is discussed. The system is heterogeneous in the sense that different servers may have different speeds. Socially optimal policies that minimize the mean response time of all jobs ar of interest. Using semi-Markov decision processes, it is shown that an optimal policy that uses the instantaneous queue length independent of system utilizati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recursive solution of a class of non-product form protocol models

    Publication Year: 1989, Page(s):38 - 46 vol.1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    Two classes of non-product-form protocol models where the equilibrium probabilities of state may be computed recursively are described. An algorithm is presented for the computer generation of these recursions. The use of the algorithm is described for manufacturing nets, a class of Petri type networks. These are useful for modeling a linear process where one must wait for components to arrive bef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capacity allocation for integrated voice/data transmission at a packet switched TDM

    Publication Year: 1989, Page(s):429 - 438 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    The integrated transmission of voice and data at a time-division multiplexer (TDM) is discussed and analyzed. The system operates in a frame format and the channel capacity is governed by the frame size. The allocation of channel capacity for the transmission of voice and data is performed by a controller. Digital speech interpolation and embedded coding techniques are used to enhance the transmis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Norton's theorem on queueing networks with finite capacities

    Publication Year: 1989, Page(s):914 - 923 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB)

    A method is developed which allows the application of Norton's theorem on queuing networks with finite capacities. A node is arbitrarily selected and the subnetwork containing all remaining nodes is replaced by a composite node with infinite capacity; thus the entire network is reduced to a two-node network having the node of interest and the composite node. Although blocking causes interdependenc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Random access systems with a time varying channel

    Publication Year: 1989, Page(s):1121 - 1126 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    A random multiple-access system which uses a collision resolution algorithm for accessing a common time-varying channel is considered. The channel is assumed to be in one of two states. In each state the channel is characterized by a general discrete memoryless channel, and the transitions between the two states are assumed to be Markovian. A set of sufficient conditions for the ergodicity (stabil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Three keys to be broadband future: a view of applications

    Publication Year: 1989, Page(s):611 - 616 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    Three keys are suggested for unlocking the broadband future based on an analysis of human and societal communication needs. A framework is adopted that distinguished three categories of communication needs: access to people, access to information, and access to information processing. Within this framework, it is argued that applications that emphasize shared visual material, that accommodate adve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flow and congestion control in the message handling environment

    Publication Year: 1989, Page(s):721 - 730 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB)

    A framework is presented for the design of application level store-and-forward message transfer systems. Flow control and congestion control issues in the message handling environment are discussed. A new model for message transport, the message stream, is proposed as a basis of the flow and congestion control functionality. Important design aspects, including message fragmentation and management ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A compatible ISDN gateway for broadband metropolitan area networks

    Publication Year: 1989, Page(s):810 - 817 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    A novel gateway design (referred to as T-SWIFT) is presented for integrating the flow of voice streams into existing broadband cable systems. The interface between the integrated voice subnetwork and the cable system is realized by a metropolitan area gateway (MAG) which is implemented at the broadband cable head-end. In T-SWIFT, an intelligent scheduling algorithm in the MAG dynamically allocates... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interconnection of CSMA/CD LANs via an N-port bridge

    Publication Year: 1989, Page(s):28 - 37 vol.1
    Cited by:  Papers (5)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB)

    The interconnection of CSMA/CD LANs using an N-port bridge is considered. The stability and throughput-delay performance of the interconnected system is analyzed approximately by decomposing it into N consistent but otherwise independent LAN subsystems. The performance of a LAN subsystem with bridge priority is evaluated, and the results are used for the performance evaluation of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM: ready for the marketplace?

    Publication Year: 1989, Page(s):495 - 496 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    It is argued despite its designation as the long-term target transport mode, parameter specifications for ATM (asynchronous transfer mode) have been driven by near-term considerations: in Europe, by the question of compatibility with the existing public network, although voice communications would clearly be a minor service in the presence of most video services: and in North America, by the appar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of the Outbound Call Management system

    Publication Year: 1989, Page(s):373 - 381 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    The Outbound Call Management (OCM) system automatically dials phone numbers from a long predetermined list for human agents. A technique is provided to determine the number of calls to launch for the Outbound Call Management system to achieve a good agent efficiency performance measure, giving the queuing tolerance level. Subsequently, an approximate method is introduced that calculates the effici... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Configuration synthesis for a heterogeneous backbone cluster and a PC-interface network

    Publication Year: 1989, Page(s):400 - 407 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    The design is discussed of the Locus family of networks rendering PC interface (PCI) service. Given are the expected user workload, the hardware costs, and the performance constraints. The workload consists of three classes of users: interactive, highly-interactive, and communication-intensive. The number of PCs is given and is equal to the number of users. It is shown that the problem can be redu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated voice and data transmission in packet radio network

    Publication Year: 1989, Page(s):420 - 428 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    A multiaccess scheme, that is a variation of movable slot time-division multiplexing and p-persistent carrier-sense multiple-access is proposed for voice only or integrated voice and data transmission in a packet radio network. Simulations are performed to examine the performance characteristics of the proposed scheme under various system parameter values. Three different sets of paramete... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Polling systems with correlated arrivals

    Publication Year: 1989, Page(s):907 - 913 vol.3
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    An analysis is made of polling systems with correlated arrivals, namely, systems in which the arrival processes of customers to the queues are not assumed to be independent. The authors consider cyclic polling systems with N queues, general service time distribution in each queue, and general switch-over times. For both the exhaustive and the gated service disciplines they derive the nece... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-log2N self-routing networks and their applications in high speed electronic and photonic switching systems

    Publication Year: 1989, Page(s):877 - 886 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB)

    A novel class of switching networks has been proposed to remove the time and space bottlenecks in conventional RAM-controlled switching architectures. The proposed networks possess many desirable characteristics for high-speed electronic and photonic switching systems, such as tolerance of faults, O(log2N) stages between each inlet-outlet pair, self-routing capability, easy pat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient multiple-access method for the binary adder channel

    Publication Year: 1989, Page(s):1115 - 1120 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    The multiple-access problem is addressed from the combined standpoint of both coding and scheduling to arrive at a stable, highly efficient access scheme for the binary adder channel. The authors define a system model that includes the channel and the coding mechanism and explain the M-choose-T communication mode which is fundamental to their method. They then address the system'... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.