INFOCOM '96. Fifteenth Annual Joint Conference of the IEEE Computer Societies. Networking the Next Generation. Proceedings IEEE

24-28 March 1996

Go

Filter Results

Displaying Results 1 - 25 of 66
  • A reliable, adaptive network protocol for video transport

    Publication Year: 1996, Page(s):1080 - 1090 vol.3
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1237 KB)

    We present an adaptive network layer protocol for VBR video transport. It: (1) minimizes the buffer requirement in the network while guaranteeing that packets of VBR encoded video flows will not be lost, and (2) minimizes the end-to-end delay and jitter of frames. To achieve the former objective, we utilize a receiver-oriented adaptive credit-based flow control algorithm, and derive the necessary ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A conflict-free traffic assignment algorithm using forward planning

    Publication Year: 1996, Page(s):1277 - 1284 vol.3
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (846 KB)

    In multichannel telecommunication networks, switching systems and processor-memory interconnects the need for conflict-free traffic assignment arises whenever packets (or requests) are to be directed from input buffers (processors) to specific outlets (modules). We present an algorithm, based on forward planning, which can be used in the above-mentioned applications for scheduling conflict-free tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE INFOCOM '96

    Publication Year: 1996
    Request permission for commercial reuse | |PDF file iconPDF (772 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1996
    Request permission for commercial reuse | |PDF file iconPDF (290 KB)
    Freely Available from IEEE
  • The drop from front strategy in TCP and in TCP over ATM

    Publication Year: 1996, Page(s):1242 - 1250 vol.3
    Cited by:  Papers (39)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (820 KB)

    This paper proposes the use of a “drop from front” scheme for improving TCP performance in high bandwidth-delay product networks. In particular, for “TCP over ATM” we compare the performance when drop from front is used at the output port of ATM switches with the performance under tail drop, its variations, and with variations of random early detection (RED). In drop from f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group priority scheduling

    Publication Year: 1996, Page(s):1346 - 1356 vol.3
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1020 KB)

    For many applications, the end-to-end delay of an application-specific data unit is a more important performance measure than the end-to-end delays of individual packets within a network. From this observation, we propose the idea of group scheduling. Specifically, consecutive packet arrivals in a flow are partitioned into groups, and the same deadline (called group priority) is assigned to every ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal deterministic timeouts for reliable scalable multicast

    Publication Year: 1996, Page(s):1425 - 1432 vol.3
    Cited by:  Papers (12)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (776 KB)

    Reliable multicast suffers from the problem of feedback implosion. To achieve scalability, the number of receivers sending feedback in case of loss must remain small. However, losses experienced by different receivers are strongly correlated, since they share resources in the multicast tree. We present DTRM (deterministic timeouts for reliable multicast), a distributed algorithm to compute optimal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of a MAC protocol for WDM networks with on-line scheduling

    Publication Year: 1996, Page(s):1234 - 1241 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (784 KB)

    This paper investigates the performance of media access protocols based on on-line scheduling for an optically connected star-coupled system with wavelength division multiple access channels. Hybrid access protocols combining reservation and pre-allocation of receiver channels have been previously proposed. Transmission consisted of a reservation phase followed by a data phase. Each node was allow... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bounds on finite horizon QoS metrics with application to call admission

    Publication Year: 1996, Page(s):1338 - 1345 vol.3
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (540 KB)

    There exists a substantial body of work on the problem of providing guaranteed quality of service (QoS) to different service classes in B-ISDNs. We consider a discrete time, single server system in which packets arrive from a finite population of sources. Under the assumption that arrivals from each source are modulated by a Markov process, we examine the following metrics (i) the fraction of an i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A lightweight media access protocol for a WDM-based distributed shared memory system

    Publication Year: 1996, Page(s):946 - 953 vol.3
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (828 KB)

    This paper presents a media access protocol designed for LIGHTING, a WDM testbed currently under construction which has been designed for high-performance supercomputer interconnection. The architecture is based on a dynamically reconfigurable hierarchical WDM network that is being constructed to interconnect a large number of supercomputers and create a distributed shared memory (DSM) environment... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conditional overflow probability and profile curve for ATM congestion detection

    Publication Year: 1996, Page(s):970 - 977 vol.3
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (572 KB)

    Many systems in ATM environments require the queue to be monitored for impending congestion before it happens. We characterize impending congestion by measuring how long the queue length has exceeded a certain threshold. Based on the idea of the profile curve, we introduce a new performance measure called the conditional overflow probability which gives a quantitative measure on the congestion sta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM network design and optimization: a multirate loss network framework

    Publication Year: 1996, Page(s):994 - 1003 vol.3
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (768 KB)

    ATM network design and optimization at the call-level may be formulated in the framework of multirate, circuit-switched, loss networks with effective bandwidth encapsulating cell-level behavior. Each service supported on the ATM network is characterized by a rate or bandwidth requirement. Future networks will be characterized by links with very large capacities in circuits and by many rates. Vario... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RMTP: a reliable multicast transport protocol

    Publication Year: 1996, Page(s):1414 - 1424 vol.3
    Cited by:  Papers (154)  |  Patents (48)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (980 KB)

    This paper describes the design and implementation of a multi-cast transport protocol called RMTP. RMTP provides sequenced, lossless delivery of bulk data from one sender to a group of receivers. RMTP achieves reliability by using a packet-based selective repeat retransmission scheme, in which each acknowledgment (ACK) packet carries a sequence number and a bitmap. ACK handling is based on a multi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A network architecture for mobile computing

    Publication Year: 1996, Page(s):1388 - 1396 vol.3
    Cited by:  Papers (12)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (880 KB)

    We report on an ongoing project to design and build the network and transport layers for mobile networking. The network architecture used is unique in that it separates the mobile network(s) from fixed networks and provides connectivity between the two via special gateways. These gateways provide QOS guarantees to mobile users for all their open connections. We provide summaries of all the protoco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Weighted fair blocking mechanisms for discrete-time multiplexing

    Publication Year: 1996, Page(s):1045 - 1053 vol.3
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (772 KB)

    A major challenge in integrated services packet networks is the design of packet multiplexing systems to support different QoS requirements. We focus on the problem of satisfying different loss requirements. In time-slotted multiplexing systems, one may have batch arrivals (i.e., simultaneous arrivals in a time slot), and it is necessary to reject some of the packets in a batch when there is an in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and analysis of a WDMA protocol for passive star-coupled lightwave networks

    Publication Year: 1996, Page(s):1225 - 1233 vol.3
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (828 KB)

    Based on the POPSMAC protocol proposed in Chung-Sheng Li et al. (1993), we propose an improved medium access protocol for wavelength division multiple access (WDMA) photonic networks. Using the same set of photonic devices as in POPSMAC, the proposed protocol alleviates the drawbacks of the POPSMAC protocol, e.g., invalid data transmissions following receiver collisions and possible acknowledgemen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The role of the manager in a noncooperative network

    Publication Year: 1996, Page(s):1285 - 1293 vol.3
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (792 KB)

    Traditional computer networks were typically designed with system-wide optimization in mind. In noncooperative networks users make control decisions that optimize their individual performance objectives. Nash equilibria characterize the operating points of such networks. Nash equilibria exhibit, in general, suboptimal network performance. Focusing on routing, a methodology is devised for overcomin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sojourn-time analysis on nodal congestion in broadband networks and its impact on QoS specifications

    Publication Year: 1996, Page(s):1327 - 1337 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1148 KB)

    In this paper, we study the sojourn-time statistics and the temporal behavior of nodal congestion in integrated broadband networks. The node is modeled as a finite quasi-birth-death (QBD) process with level-dependent transitions. By formulating the problem as one which is amenable to the generalized folding algorithm (GFA), we are, for the first time, able to analyze realistic systems with large b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • “call-level” and “burst-level” priorities for an effective management of multimedia services in UMTS

    Publication Year: 1996, Page(s):1363 - 1370 vol.3
    Cited by:  Papers (7)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (812 KB)

    It is not an easy task in the UMTS environment to effectively design the transport and the management of traffic belonging to multimedia teleservices, due to the difficult communication requirements of such applications. It is proposed to contemporary use at the “transport” layer of the system several bearers, one for each traffic component of the multimedia service. Furthermore, a two... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed queue packet scheduling algorithms for WDM-based networks

    Publication Year: 1996, Page(s):938 - 945 vol.3
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (636 KB)

    Two protocols for scheduling variable-length packet transmissions in an optical passive star network using wavelength division multiplexing (WDM) are specified and analyzed. These protocols require: a separate channel for transmission of control packets, a fixed transmitter and receiver and a tunable transmitter and receiver. The distinction between these protocols and other WDM protocols is that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed adaptive protocol providing real-time services on WDM-based LANs

    Publication Year: 1996, Page(s):962 - 969 vol.3
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (556 KB)

    We consider the problem of supporting multiple classes of real-time and non-real-time traffic on a WDM-based local-area network. We present a demand-adaptive algorithm which schedules transmission according to the quality-of-service requirements of the various traffic classes. The algorithm requires one control channel, on which a single token circulates. This token is used both as a means of comm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Skew performance evaluation in an ATM multimedia multiplexer

    Publication Year: 1996, Page(s):986 - 993 vol.3
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (636 KB)

    The skew affecting a multimedia traffic stream when N multimedia streams are mixed in an ATM multiplexer is evaluated. To this purpose a multimedia source is modeled by an arrival process defined as the superposition of heterogeneous correlated arrival processes, each of which models one monomedia source by means of an Markov modulated Bernoulli process (MMBP) process whose transition probabilitie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signaling network architecture and transaction protocols to support realtime connection rerouting in ATM/B-ISDNs

    Publication Year: 1996, Page(s):1012 - 1019 vol.3
    Cited by:  Papers (1)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (892 KB)

    In future B-ISDN and PCN environments, an increasing number of network control services, such as dynamic multiparty conferences, mobile call handoff, etc., will require realtime connection rerouting services not currently supported by the B-ISDN signaling network architecture based on the SS7 CCS network and its transaction protocols (TCAP). To support these services, we propose a novel signaling ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handling mobility in a wireless ATM network

    Publication Year: 1996, Page(s):1405 - 1413 vol.3
    Cited by:  Papers (34)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (748 KB)

    The world of wireless telecommunications is rapidly changing. The capabilities of wireless networks are improving at a steady pace. This paper presents a protocol implementation for providing mobility in an asynchronous transfer mode (ATM) network. The vision of the authors is of one “ATM-based wireless telecommunications network” that is capable of supporting a variety of today's appl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of crossover switch discovery algorithms for wireless ATM LANs

    Publication Year: 1996, Page(s):1380 - 1387 vol.3
    Cited by:  Papers (20)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (760 KB)

    In a connection-oriented wireless LAN, the mobility of mobile hosts results in the establishment and disconnection of new and old virtual circuits. The resulting increase in signalling traffic along with the need to support multimedia stream handovers demand a fast, continuous and bandwidth-efficient handover protocol. We adopt a handover scheme based on partial re-establishments, where a new part... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.