By Topic

Networks, 1993. International Conference on Information Engineering '93. 'Communications and Networks for the Year 2000', Proceedings of IEEE Singapore International Conference on

6-11 Sept. 1993

Go

Filter Results

Displaying Results 1 - 25 of 77
  • Design and implementation of an OSI conformance test system considering extensions for interconnectability testing

    Publication Year: 1993, Page(s):665 - 669 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (463 KB)

    There is a wide perception of the need for conformance and interoperability testing to ensure the interoperability of open systems. In the circumstances, the authors have been making efforts to establish a system for interconnectability testing, which is a type of interoperability testing. In this paper, they discuss an interconnectability testing architecture that they have developed, and also a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicasting on certain self-similar networks

    Publication Year: 1993, Page(s):685 - 689 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (486 KB)

    Both the linear recursive networks and the hypercubic networks are known to be self-similar in their interconnection topologies. Here it is shown that multicasting can be efficiently performed on these networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author's index

    Publication Year: 1993
    Request permission for commercial reuse | PDF file iconPDF (243 KB)
    Freely Available from IEEE
  • An application architecture for network management

    Publication Year: 1993, Page(s):523 - 527 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    The AT&T Unified Network Management Architecture (UNMA) initially focused on a hierarchical approach to integrated management through the use of OSI/TMN management protocols for communication of management information between the various systems in the hierarchy. With an increased emphasis on distributed systems and platforms in the industry. UNMA has enhanced its approach, by specifying an Ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generic multicast-key determination protocol

    Publication Year: 1993, Page(s):518 - 522 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    This paper examines a generic deadlock-free protocol for the automated maintenance of a commonly-shared multicast-key within a group in communication with each other. The protocol's use under conditions of both centralized and distributed controls is described. Distributed schemes are inherently more robust and more readily available compared with the centralized scheme of establishing the common ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two round ZKIP of knowledge for SAT and its applications

    Publication Year: 1993, Page(s):512 - 517 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    This paper proposes the optimal 4-move ZKIP (Zero-Knowledge Interactive Proof systems) of knowledge for SAT and its application. Using the trapdoor bit commitment scheme and the WI(Witness Indistingushable) and the WH(Witness Hiding), it is shown that as compared with 6-move ZKIP for SAT, the proposed ZKIP is 4-move ZKIP for SAT and under claw-free pairs of functions the proposed ZKIP is also 4-mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network security model

    Publication Year: 1993, Page(s):507 - 511 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    In view of the importance of researchers sharing the same concept of network security, this paper proposes a model in which network security issues can be treated integrally. The importance of network security has been recognized for some time, but providing networks (especially public networks) with security functions has proved difficult. The role of the network itself in computer network securi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proceedings of IEEE Singapore International Conference on Networks/International Conference on Information Engineering '93

    Publication Year: 1993
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Congestion avoidance in interconnected metropolitan area networks

    Publication Year: 1993, Page(s):543 - 548 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    This paper presents a congestion avoidance algorithm for interconnected metropolitan area networks in the context of the FASTPAC network in Australia. A concept called congestion hazard is proposed. Congestion prediction is based on periodically computing a Congestion Hazard Event Matrix in each router. The interaction between congestion control and routing algorithm has been taken into account in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparison of trellis coded SSMA systems over fading channels using pragmatic and Ungerboeck encoder structures

    Publication Year: 1993, Page(s):708 - 712 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    This paper compares the performance of a trellis coded spread spectrum multiple access system using two forms of encoder structures. Performance in additive white Gaussian noise and Rician fading channels is investigated. Degradation in the system performance due to interuser interference is modelled using the method of moments, since normal bounding techniques cannot be used. Results are given fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ODP-based approach to overcoming heterogeneity in wide area networks

    Publication Year: 1993, Page(s):680 - 684 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    Computer networks are growing in number and capacity, and internetworking allows users to access services globally. An inherent problem of such large networks is managing the heterogeneity of applications, hardware and supporting software. Open Distributed Processing (ODP) introduces type description and type management functions as a mechanism for overcoming this heterogeneity. This paper conside... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlled bandwidth DQDB: achieving fairness and maximum throughput in the DQDB network

    Publication Year: 1993, Page(s):538 - 542 vol.2
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    This paper proposes an extension of the Distributed Queue Dual Bus (DQDB) protocol called Controlled Bandwidth (CB) DQDB which satisfies various fairness criteria and achieve 100% channel utilization. The protocol can serve both light and heavy load instances. Under heavy load, the protocol allocates bandwidth to each node, according to the ratio of each nodal arrival rate to the total arrival rat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative study of the switching performance of connection-mode network layer relays

    Publication Year: 1993, Page(s):842 - 846 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    This paper presents a simulation-based comparative study of two different approaches for connection-mode network layer relays-the service relay approach and the protocol relay approach-for LAN/WAN interconnection, that are currently the subject of standardization activities. In order to evaluate the relative performance characteristics of the two different relay types, a number of simulation studi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Universal data compression algorithms by using normal tree models

    Publication Year: 1993, Page(s):801 - 807 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    Universal data compression algorithms are the algorithms by which source data can be coded without a priori knowledge of statistics of a source. This paper describes two techniques for constructing and updating normal trees-adding and discarding. Two universal data compression algorithms and their tree source models are proposed and their implementations are suggested. These algorithms are evaluat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ACE-QPSK: a new method of coding QPSK for the nonlinear transmitter

    Publication Year: 1993, Page(s):862 - 866 vol.2
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    Band-limited QPSK signals are prone to a high degree of spectral regrowth when nonlinearity is present in the transmitter amplifier. In a multi-carrier application with close adjacent channels (such as an FDMA satellite system), the spectral regrowth of adjacent channels can result in severe interference with the desired carrier. This may lead to substantial BER performance degradation or make nec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Type I hybrid ARQ system with adaptive code rates

    Publication Year: 1993, Page(s):649 - 653 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    Type I hybrid ARQ systems use an error-control code of fixed rate for error-correction in each transmitted packet. In such systems, the code rate must be carefully chosen to match the channel bit error rate (BER) in order to maximize system throughput. Whenever there is a mismatch between code rate and channel BER, the throughput suffers. This paper proposes a type I hybrid ARQ system which automa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation under noisy environment

    Publication Year: 1993, Page(s):705 - 707 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    Performance evaluation of computer systems has been done in many papers but not many have used a network communication model. This paper aims to address the throughput performance and message delay pattern under noisy environment with adaptive packet length. Three common protocols, stop and wait, ARQ and selective reject are chosen. The theoretical deduction taking into account the possibility of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling communication protocols using deductive systems

    Publication Year: 1993, Page(s):675 - 679 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    Modelling a protocol is difficult because it involves describing a two-dimensional relationship between the flow of control of many processes and the synchronized flow of data between those processes. This paper presents the use of a new technique, Deductive Systems, for the modeling of communication protocols. The strengths of using such approach for protocol modeling are the ease with which mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed staff directory system for a campus

    Publication Year: 1993, Page(s):740 - 743 vol.2
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    One of the common information services required in a campus environment is online directory services such as phone directory. This paper discusses the implementation of such a directory service. Besides being an online phone directory, this system also provides additional staff information such as staff photographs and their academic interests. This Staff Directory is built to supplement other app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A resource pricing model for data networks

    Publication Year: 1993, Page(s):533 - 537 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    This paper presents a simple economic model for resource pricing in data networks. Though the model presented is simple, it is able to highlight various issues involved. The model is relevant for both networks that receive government subsidy, and also for those that have to generate all their revenue. The critical factor in calculating the tariff is correct estimation of subscriber demand. If proj... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Segmented approach for lossless compression of medical images

    Publication Year: 1993, Page(s):554 - 557 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    This paper describes the studies on methods of lossless compression for medical ultrasonic scanned image (echocardiography) sequences. The aim is to find one, or a combination of methods, that achieves the highest overall compression performance. The approach is to segment the image into regions with different spatial characteristics, and encode them independently. In so doing the authors are able... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reduced state computation of distance spectrum for certain optimal convolutional codes

    Publication Year: 1993, Page(s):786 - 790 vol.2
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    For the class of rate 1/2 N-state linear convolutional codes with complementary structure, which includes all of the presently known optimal codes, the authors show that no more than 3N/4 states are required to compute dfree and the distance spectrum. Similar state reductions can also be achieved (although to a smaller extent) for rate 1/n codes, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A semi-adaptive arithmetic coding scheme for Chinese textual data

    Publication Year: 1993, Page(s):813 - 817 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    This paper presents a compression scheme for Chinese text files. Due to the skewness of the distribution of Chinese ideograms the arithmetic coding method is adopted. To reduce the overhead incurred by the frequency table in the compressed output due to the large number of Chinese ideograms, differential coding and arithmetic coding are used to produce a two-level storage structure for the frequen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Switched network architecture evolution for global services

    Publication Year: 1993, Page(s):749 - 753 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    The AT&T switched network consists of many network elements including switching systems (4ESSTM and 5ESSR switches), network service databases, signal transfer points, centralized resource-specific systems for tones and customized announcements, switch adjuncts for service customization, and an array of service management systems. Signaling System No. 7 and ISDN protocols... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation and performance evaluation of NetBIOS and IPX in peer to peer communications

    Publication Year: 1993, Page(s):827 - 831 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    This paper describes the implementation of the NetBIOS and the Novell's IPX protocols for the server independent, peer-to-peer communications with the objective for real-time control applications. The results of evaluation for both protocols based on the Ethernet data link using the connectionless-oriented communications is later presented. It is shown quantitatively how much more speed efficiency... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.