By Topic

Local Computer Networks, 1990. Proceedings., 15th Conference on

Date Sept. 30 1990-Oct. 3 1990

Filter Results

Displaying Results 1 - 25 of 59
  • Signal Shaping for Bit-Interleaved Coded Modulation on the AWGN Channel

    Publication Year: 1990, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB)

    The following topics were dealt with: LANs; integrated services networks; gigabit networks; network performance; internetworking; asynchronous transfer mode (AMT); high performance protocols; FDDI; military/government networks; distributed/real-time networks; and metropolitan area networks View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical XNS internetworking at BLS

    Publication Year: 1990, Page(s):132 - 136
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    Both the positive and negative sides of a 3Com-based Xerox network system (XNS) are illustrated using US Bureau of Labor Statistics (BLS) experience with this type of implementation. A historical perspective of the BLS LAN, the rationale behind using XNS and 3Plus, the topology of the BLS internetwork, and its main design philosophy are discussed. A review of the LAN services that the BLS internet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience with the Xpress transfer protocol

    Publication Year: 1990, Page(s):123 - 131
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (880 KB)

    The Xpress transfer protocol (XTP), a transport and network layer protocol suitable for use as a SAFENET transfer service in the US Navy's emerging survivable adaptable fiber optic embedded network (SAFENET) specification, is described. The background protocol, the implementation environment, the communications architecture, the user interface, some working XTP demonstration programs, and some mea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High performance internetworking protocol

    Publication Year: 1990, Page(s):172 - 179
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    The use of parallelism for protocol processing in a parallel architecture of an internetworking unit is presented. This architecture consists of pipelines and arrays of processors and supports multiple memory concepts (local and global memory). A high-performance parallel implementation of the internetworking protocol in a gateway is discussed, and selected performance results are presented. The r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FDDI follow-on status

    Publication Year: 1990, Page(s):45 - 48
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    Work has been initiated within the American National Standards Committee X3T9.5 committee that developed the standards for the fiber distributed data interface (FDDI) on a new generation local area network. This network is targeted for operation at rates greater than 1 Gb/s. This follow-on work to FDDI is at an early stage. The current requirements for an FDDI follow-on network are presented, the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frame content independent stripping for token rings

    Publication Year: 1990, Page(s):405 - 415
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1172 KB)

    A frame content independent stripping (FCIS) algorithm for token rings is described that can be used by source-routing bridges due to its simplicity and the fact that the resulting size of the fragments remaining on the ring is very small. The FCIS algorithm counts the number of outstanding frames that a station has transmitted but not yet stripped from the ring and in addition places a global del... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LAN traffic analysis and workload characterization

    Publication Year: 1990, Page(s):112 - 122
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    The results of a LAN traffic analysis are studied in order to characterize the workload in a typical Ethernet environment and to examine the mathematical modeling assumptions that are made regarding packet arrivals, packet size distributions, and user access patterns. These results show that the packet size distribution is application dependent and may not always follow a bimodal pattern. The over... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internetworking dissimilar LANs with FDDI

    Publication Year: 1990, Page(s):163 - 171
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    An overview is presented of some of the issues the potential implementor of a large internetwork based on the fiber distributed data interface (FDDI) backbones faces. The qualities of FDDI as a backbone are illustrated. A review of bridges and routers as they relate to the requirements from the internetwork is presented. Available bridging methods are presented and evaluated. A number of issues pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation and evaluation of 4 Mbps twisted-pair transmission system for an IVDLAN

    Publication Year: 1990, Page(s):39 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    Implementation and evaluation of a 4-Mb/s twisted-pair transmission system which is proposed as an IEEE local area network standard (802.9) are presented. This standard will provide a multimedia, departmental integrated voice and data LAN (IVDLAN). It is shown that a PR4 line code is optimum for transmission through ordinary laid telephone grade twisted pair. A low-cost transceiver adopting recent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic channel assignment in a hybrid indoor data network with radio and wire

    Publication Year: 1990, Page(s):366 - 370
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    A network system having two layers is proposed. This system uses radio as a transmission medium to the lower layer and a conventional LAN to the upper one. The users of a wireless network enjoy complete freedom from frequent reconfiguration of existing terminal arrangements. However, office buildings present a harsh environment for radio transmission because of numerous reflections from walls, fur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An FDDI bridge for the high-speed multimedia backbone LAN

    Publication Year: 1990, Page(s):399 - 404
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    An architecture for a high-performance bridge that interconnects the fiber distributed data interface (FDDI) ring and the asynchronous transfer mode (ATM) technology based high-speed multimedia backbone LAN (MBLAN) is proposed. This bridge architecture enables the FDDI bridge to learn the source terminal address efficiently by selecting the error-free cell in which the source terminal address is c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • End-to-end echo response time analysis on large mainframe UNIX systems

    Publication Year: 1990, Page(s):102 - 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    The delay characteristics of the Datakit virtual circuit switch (VCS) are investigated, and its contribution to the overall end-to-end character echo response time delay on large mainframe UNIX (LMU) systems is evaluated. The end-to-end delay consists of the Datakit network, the device attached control unit (DACU), and host component delays. The echo response time is the amount of time it takes fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routes determination in multiple-ring networks

    Publication Year: 1990, Page(s):152 - 162
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (924 KB)

    The issue of routing in multiple-ring networks is considered. A new bridge protocol for route determination in a multiple-ring network is introduced. Its main advantage is its communication efficiency: the number of frames used is the number of rings plus the number of bridges in the network, as opposed to the exponential function needed by the existing protocol. Some extensions of the protocol ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental analysis of cache memories for interconnect controllers

    Publication Year: 1990, Page(s):188 - 194
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    The effects of cache memories on the performance of interconnect controllers (ICs) are analyzed using trace-driven simulation. Simulation results show that the controllers which interconnect hosts to LANs have a higher hit ratio than those that interconnect network devices to LANs. The impact of cache sizes, set associativity, and line sizes on cache performance is also investigated. A significant... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What the future holds for the local computing network: the next 15 years from a management perspective

    Publication Year: 1990, Page(s):2 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    It is argued that over the next 15 years, there should be a quantum increase in the amount of computing power delivered to the user. This paper will be derived from the network to which these devices are connected. While all of this will be of interest to the technologist, there is no focus being given to the application of the power of the local computer network (LCN) to the needs of the users. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable transfer of data in a local area network with multicast distribution

    Publication Year: 1990, Page(s):310 - 319
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB)

    Certain distributed computing systems require a single device to transmit identical data sets to two or more devices in a local area network (LAN). This kind of data transmission can be achieved by using either a connection oriented protocol such as transmission control protocol/internet protocol (TCP/IP) or a connectionless protocol. Some of the performance aspects of these two kinds of protocols... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated corporate backbone providing packet and fixed-bandwidth services

    Publication Year: 1990, Page(s):33 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    A 100-Mb/s fiber-optic ring is discussed. It uses low-level time-division multiple access (TDMA) that permits division of the bandwidth into bands of 25 or 50 Mb/s capacity. These operate independently and may carry either Ethernet/802.3 frames or transparent T1 traffic. The system is examined in the context of integrated services networks, since it provides both packet-based and fixed-bandwidth s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hidden transmission: a method to improve the performance of a token ring network

    Publication Year: 1990, Page(s):359 - 365
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    The statistically available bandwidth in token ring networks is analyzed and a protocol called Hidden Transmission is proposed which will enable a token ring network to give better performance under all load conditions. The analysis shows that for every data packet transmitted, up to 0.7 extra packets can be transmitted in one rotation of the data packet. This unused bandwidth can be used to carry... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FDDI over unshielded twisted pairs

    Publication Year: 1990, Page(s):395 - 398
    Cited by:  Papers (2)  |  Patents (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    Experiments aimed at transmitting 62.5 Mb/s nonreturn-to-zero data stream over 24 AWG PVC unshielded twisted pair are described. Data transmission is performed over a 100-m cable with two active interfering pairs with data retiming using recovered clock. The transmission system is based on modified duobinary modulation. A solution is presented to one of the problems which must be solved in order t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transient performance of a CSMA system under temporary overload conditions

    Publication Year: 1990, Page(s):93 - 101
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    Effects of impulsive arrivals of packets on the performance of carrier-sense multiple-access (CSMA) protocols are studied. A deterministic dynamic system is proposed to approximate the imbedded Markovian chain model of the CSMA system. Based on this approximation, the probability of overloading of the CSMA system due to impulsive input can be estimated, and the trajectory of the system states can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FOCON/34-fiber optical network for voice and data

    Publication Year: 1990, Page(s):285 - 291
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    A family of fiber-optic local area networks (LANs) intended to meet future requirements for naval and land-based applications was developed. High-speed transmission, flexibility, the ability to transmit data, voice and narrowband video and an excellent survivability were the main aims envisaged. The first product of this family was FOCON/8 (fiber optical communication network-8 Mb/s) which has bee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance enhancement of double linked backbone rings in interconnected token ring network

    Publication Year: 1990, Page(s):143 - 151
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    Experimental results show that the performance of the IEEE 802.2 and 802.5 protocols for a single token ring is severely degraded in an interconnected token ring network. Congestion at bridges in a network is the primary cause of the degradation of the performance. An approach is investigated in which a secondary transmission link is added to the backbone ring of a network to form a double-linked ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IR wireless system for ARCNet local area network

    Publication Year: 1990, Page(s):183 - 187
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    Results obtained with a commercial ARCNet LAN that uses an unguided infrared link as a medium of transmission are presented. The effects of shot noise produced by ambient light on the system receiver are characterized. A lab prototype of this LAN gave satisfactory results. In the sphere of optics, filtering of the ambient light from the working environment is studied. The spectrum characteristics ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Register insertion/self-token protocol for high speed ring LANs

    Publication Year: 1990, Page(s):60 - 64
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    A new ring access control scheme adopting a multiple-token protocol is investigated. In this protocol, each station distributed on a ring has a private token, called self-token, and a fixed-length register to carry out the register insertion protocol. The protocol shows good properties for shorter packets, becoming more superior to the token-ring and the FDDI-I protocols as the packet length decre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM adaptation layer protocols and IEEE LAN interconnection

    Publication Year: 1990, Page(s):200 - 206
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    The asynchronous transfer mode (ATM) adaptation layer provides functions for mapping source traffic into ATM cells as required in recent standardization work for packet switched integrated broadband networks. Functions, services, and protocols suitable for signaling and other packet mode traffic are studied. The resulting protocol stacks are critically examined for two important and differing appl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.