By Topic

Networks, 1993. International Conference on Information Engineering '93. 'Communications and Networks for the Year 2000', Proceedings of IEEE Singapore International Conference on

6-11 Sept. 1993

Go

Filter Results

Displaying Results 1 - 25 of 77
  • Design and implementation of an OSI conformance test system considering extensions for interconnectability testing

    Publication Year: 1993, Page(s):665 - 669 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (463 KB)

    There is a wide perception of the need for conformance and interoperability testing to ensure the interoperability of open systems. In the circumstances, the authors have been making efforts to establish a system for interconnectability testing, which is a type of interoperability testing. In this paper, they discuss an interconnectability testing architecture that they have developed, and also a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Test generation for the distributed test architecture

    Publication Year: 1993, Page(s):670 - 674 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (455 KB)

    ISO (International Standardization Organization) developed the ISO distributed test architecture for testing layered protocols. Furthermore, a general distributed test architecture where the IUT (implementation under test) contains several distributed ports is used for testing distributed systems, based on the Open Distributing Processing (ODP) Basic Reference Model (BRM). In this architecture, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicasting on certain self-similar networks

    Publication Year: 1993, Page(s):685 - 689 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (486 KB)

    Both the linear recursive networks and the hypercubic networks are known to be self-similar in their interconnection topologies. Here it is shown that multicasting can be efficiently performed on these networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author's index

    Publication Year: 1993
    Request permission for commercial reuse | PDF file iconPDF (243 KB)
    Freely Available from IEEE
  • On bounding Rician-type error probabilities and some applications

    Publication Year: 1993, Page(s):882 - 886 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    The problem of efficiently evaluating the probability that the magnitude squared of one complex Gaussian random variable is less than the magnitude squared of another, possibly correlated, complex Gaussian random variable is addressed. This is known as an error probability of the Rician-type. In this paper, a bounding approach is taken. Tight upper and lower bounds are obtained, which together pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A communication switch based on parallel processing

    Publication Year: 1993, Page(s):757 - 760 vol.2
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    Telecommunication switches have been implemented based mainly on centralized and distributed control. Centralized control is relatively easy to implement but suffers from limitations on real-time capability. Distributed control involves much higher software complexity and intensive messaging. This paper proposes the parallel processing approach to simplify these problems. A system is under develop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed staff directory system for a campus

    Publication Year: 1993, Page(s):740 - 743 vol.2
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    One of the common information services required in a campus environment is online directory services such as phone directory. This paper discusses the implementation of such a directory service. Besides being an online phone directory, this system also provides additional staff information such as staff photographs and their academic interests. This Staff Directory is built to supplement other app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two receivers for maximum likelihood sequence detection of minimum shift keying over the Gaussian channel with unknown carrier phase

    Publication Year: 1993, Page(s):877 - 881 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    The first receiver is the suboptimum maximum likelihood soft decoder in which explicit recovery of the unknown carrier phase is not necessary and it leads to constant receiver complexity independent of data sequence length. The second receiver is the two-stage receiver which is of an estimator-detector structure. The first stage being the carrier phase estimator extracts the carrier phase informat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fairness and congestion control in LAN/WAN protocol relays

    Publication Year: 1993, Page(s):625 - 629 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    This paper addresses the problem of congestion control and fairness in relay systems for Connection Mode LAN/WAN interworking. To ensure congestion collapse avoidance and fairness against QoS (Quality of Service) parameters, a channel service algorithm and a flow control algorithm are proposed and evaluated by simulations. Results show that, in a situation of overload and for different traffic pat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proceedings of IEEE Singapore International Conference on Networks/International Conference on Information Engineering '93

    Publication Year: 1993
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recursive least squares algorithm for circuit-switched telephone network

    Publication Year: 1993, Page(s):754 - 756 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    For the design of good routing algorithms one has to keep track of the changing parameters without over-reacting. Generally the offered traffic has a series of large jumps in parameters at different times of the day. This paper examines some of the current recursive estimators for the design of an adaptive routing algorithm. Over the last decade, many papers on recursive estimation have been writt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirement analysis for next generation electronic mail systems

    Publication Year: 1993, Page(s):735 - 739 vol.2
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    This paper examines the design requirements for constructing a next generation multimedia electronic mail system in contrast to existing ASCII-text mail systems. The design and implementation of such an electronic mail system are a difficult task as they require extensive use of various techniques for accommodating retrieval, indexing, query processing, user interface and storage of multimedia dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of two interconnected DQDB MANs

    Publication Year: 1993, Page(s):549 - 553 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    The primary service which will be provided by broadband networks in the metropolitan or regional area will be directed to LAN interconnection for business and research users. Work has been aimed at the analysis of different access methods (MAC protocols) suitable for high speed and higher round trip delay networks such as metropolitan area networks (MAN). Since they will represent the first techni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCM ARQ scheme over a nonstationary channel

    Publication Year: 1993, Page(s):654 - 658 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    This paper analyzes the throughput performance of a TCM ARQ scheme which employs sequence combining and Viterbi decoding. Analytical results are provided for the following two instances: (1) decoding with perfect channel state information (CSI) and, (2) decoding without CSI. It is shown, by means of analysis as well as computer simulations, that the TCM ARQ scheme is capable of providing high thro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithm for generating n Huffman codes with a worst case of (n log2 n+n log2 log2 n) comparisons

    Publication Year: 1993, Page(s):872 - 876 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    The method is based on a Heapsort algorithm for sorting a sequence of n data elements with a worst case of (n log2 n+n log2 log2 n) comparisons. The idea of heap restoring in the Heapsort algorithm is incorporated into the Huffman tree building process. The performance of the proposed algorithm in execution time is eval... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ODP-based approach to overcoming heterogeneity in wide area networks

    Publication Year: 1993, Page(s):680 - 684 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    Computer networks are growing in number and capacity, and internetworking allows users to access services globally. An inherent problem of such large networks is managing the heterogeneity of applications, hardware and supporting software. Open Distributed Processing (ODP) introduces type description and type management functions as a mechanism for overcoming this heterogeneity. This paper conside... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dimensioning and performance evaluation of an efficient leaky bucket congestion control algorithm

    Publication Year: 1993, Page(s):622 - 624 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    This paper is concerned with dimensioning and performance evaluation of a policing function in ATM networks. Traffic control aims to provide good performance and fairness among customers by ensuring that sources are not exceeding session negotiated parameters. The authors first present a modified version of the Leaky Bucket algorithm. Under the assumption of a Poisson stream, parameters of the pol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Switched network architecture evolution for global services

    Publication Year: 1993, Page(s):749 - 753 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    The AT&T switched network consists of many network elements including switching systems (4ESSTM and 5ESSR switches), network service databases, signal transfer points, centralized resource-specific systems for tones and customized announcements, switch adjuncts for service customization, and an array of service management systems. Signaling System No. 7 and ISDN protocols... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rate controlled window protocol in networks with large bandwidth delay product

    Publication Year: 1993, Page(s):695 - 699 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    This paper investigates the interaction of rate control and window control in such networks. If acknowledgements are generated for each packet received, rate control is not as important. However, when acknowledgements are only generated periodically, rate control complements window control in reducing the network buffering resources View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pulse time modulation techniques for low cost analog signal transmission systems

    Publication Year: 1993, Page(s):635 - 638 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    Pulse time modulation techniques (PTM) have been proven to be attractive techniques for achieving low cost analog optical transmission systems. To facilitate future design of such transmission systems, a review of these modulation techniques is made. Spectrum expressions of PPM, PWM, PFM, and SWFM are derived and given. The results are used to predict the requirement for minimum carrier frequency ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Noise reduction and spectrum analysis in Doppler blood flow signal processing

    Publication Year: 1993, Page(s):558 - 562 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    In this paper a real-time Doppler module is introduced. In order to reduce the noise and artifacts in the Doppler path, several efforts including emission waveform modification, orthogonal signal generator, range gating of signals, wall filters, section shielding and proper power supply and ground system are implemented. Spectrum estimation methods based on Fast Fourier Transformation (FFT) are ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation under noisy environment

    Publication Year: 1993, Page(s):705 - 707 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    Performance evaluation of computer systems has been done in many papers but not many have used a network communication model. This paper aims to address the throughput performance and message delay pattern under noisy environment with adaptive packet length. Three common protocols, stop and wait, ARQ and selective reject are chosen. The theoretical deduction taking into account the possibility of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet reservation multiple access over erroneous channels

    Publication Year: 1993, Page(s):727 - 731 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    A reservation-ALOHA protocol in microcellular structure, packet reservation multiple access (PRMA) suits well the characteristics of future microcellular telecommunication systems. However, in erroneous channels, the performance of PRMA degrades because terminals can lose their reservations before talkspurts end. This can lead to increased delay and packet dropping in the middle of the talkspurts,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A semi-adaptive arithmetic coding scheme for Chinese textual data

    Publication Year: 1993, Page(s):813 - 817 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    This paper presents a compression scheme for Chinese text files. Due to the skewness of the distribution of Chinese ideograms the arithmetic coding method is adopted. To reduce the overhead incurred by the frequency table in the compressed output due to the large number of Chinese ideograms, differential coding and arithmetic coding are used to produce a two-level storage structure for the frequen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Congestion avoidance in interconnected metropolitan area networks

    Publication Year: 1993, Page(s):543 - 548 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    This paper presents a congestion avoidance algorithm for interconnected metropolitan area networks in the context of the FASTPAC network in Australia. A concept called congestion hazard is proposed. Congestion prediction is based on periodically computing a Congestion Hazard Event Matrix in each router. The interaction between congestion control and routing algorithm has been taken into account in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.