1994 IEEE GLOBECOM. Communications: The Global Bridge

Nov. 28 1994-Dec. 2 1994

Go

Filter Results

Displaying Results 1 - 25 of 126
  • 1994 IEEE GLOBECOM Communications: The Global Bridge

    Publication Year: 1994
    Request permission for commercial reuse | PDF file iconPDF (2575 KB)
    Freely Available from IEEE
  • Linearization of power amplifiers modelling and simulations

    Publication Year: 1994, Page(s):1456 - 1461 vol.3
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB)

    Due to their good spectral efficiency, linear modulation methods are well suited to digital mobile radio systems. However their envelope fluctuations result, after nonlinear amplification, in out-of-band emissions thus adjacent channel interferences. A solution is to linearize the power amplifier. We present an analog linearization loop based an an improved cartesian feedback method. Its performan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call admission control and resource utilization in ATM networks: a new improvement strategy

    Publication Year: 1994, Page(s):1795 - 1800 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (678 KB)

    Congestion and admission control are two of the most widely investigated problems which must be faced in ATM. The FBR (fast buffer reservation), i.e. a virtual circuit acceptance algorithm proposed by Turner (1992), based on the excess probability criterion (EPC), seems to be a complete approach for bandwidth management. It will constitute the starting point of the new admission and congestion con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conference Author Index

    Publication Year: 1994
    Request permission for commercial reuse | PDF file iconPDF (286 KB)
    Freely Available from IEEE
  • Dynamic and static packet routing on symmetric communication networks

    Publication Year: 1994, Page(s):1571 - 1575 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    For dynamic routing on any vertex and edge symmetric topology we relate network contention to the packet generation rate, and the degree and average distance of the underlying topology. As a direct consequence we show that the star graph becomes saturated as the packet generating rate approaches one. Also, for graphs of approximately the same order, the average delay of a packet routed on an alter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Congestion control in integrated voice-data frame relay networks and the case for embedded coding

    Publication Year: 1994, Page(s):1565 - 1570 vol.3
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    Frame relay (FR) networks will be increasingly used for multiple classes of traffic, particularly for compressed voice and data. The quality of service requirements for these two classes are very different: voice is delay sensitive, data is loss sensitive. The use of low-speed access lines to FR networks requires the use of priority service for voice and this entails a requirement for separate con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spread frequency shift keying-a low cost approach to spread spectrum

    Publication Year: 1994, Page(s):1722 - 1726 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    A binary modulation and demodulation technique is presented which is particularly suited for channels with non white interferers and/or for channels with different attenuations at the two signalling frequencies. Because spread frequency shift keying is mainly based on classical FSK modem technology it can be easily implemented and it is well suited for low cost applications. The improvement in per... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and analysis of a buffer management scheme for multimedia traffic with loss and delay priorities

    Publication Year: 1994, Page(s):1560 - 1564 vol.3
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    Future broadband networks (e.g., BISDN/ATM) will provide transport for a wide range of applications that vary in their quality-of-service (QoS) requirements. Such requirements are measured by the cell loss rate and the end-to-end delay (or delay variation). This paper presents an analysis of a buffer management scheme known as nested threshold cell discarding with multiple buffers. NTCD/MB impleme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High performance microstrip networks for multibeam and reconfigurable operation in mobile-radio systems

    Publication Year: 1994, Page(s):1717 - 1721 vol.3
    Cited by:  Papers (5)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    This paper presents the development of high performance multiport hybrid networks based on the Butler matrix concept in thick film microstrip technology to provide the multibeam and reconfigurable operation of antennas of DCS 1800 (ground mobile) base stations. This work was performed to meet the increasing demand for mobile communications that calls for the use of advanced components to improve t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Node synchronization for punctured convolutional codes of rate (N-1)/N

    Publication Year: 1994, Page(s):1279 - 1283 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    The article discusses syndrome based node synchronization for high rate convolutional codes. The authors compare two approaches for syndrome based synchronization for punctured high rate codes. Performance results as well as implementation complexity estimates are presented. It is shown that the fact that the syndrome polynomials are not uniquely determined by the code polynomials can be used to o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A bandwidth management scheme for handling asynchronous and isochronous traffic in a LAN/MAN environment

    Publication Year: 1994, Page(s):1555 - 1559 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    A metropolitan area network (MAN) based upon the dual queue distributed bus (DQDB) standard [IEEE 802.6] provides a medium access scheme, which offers two service classes. The queue arbitrated (QA) medium access part may be used for packet service, whereas the prearbitrated (PA) medium access part is used to serve semipermanent connections having constant bit rates (n×64 kbit/s). This paper ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On improved importance sampling simulations for CDMA communication systems with memory

    Publication Year: 1994, Page(s):1462 - 1466 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    The performance of the improved importance sampling simulation method is analyzed with respect to system memory and applied to the simulation of a multi-user mobile CDMA communication system over multipath fading channels. To combat the well-known inefficiency of Monte-Carlo simulations of complex multi-user CDMA systems, importance sampling methods have already been applied and shown to be very e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements for mobility support in ATM

    Publication Year: 1994, Page(s):1691 - 1695 vol.3
    Cited by:  Papers (11)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    This paper deals with the integration of future mobile systems in a B-ISDN environment, namely, the transport functions required for the support of terminal mobility. Handover (involving an air interface), rerouting (routing optimisation in the fixed network), macro-diversity and mobile trunk connections are defined and the involved transport functions are mapped to the ATM layer of the B-ISDN pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization of a class of power control laws for the forward-link in a cellular CDMA system

    Publication Year: 1994, Page(s):1712 - 1716 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    Power control, a key feature of CDMA systems, is examined and discussed, with focus on the base-to-mobile link. Within a class of simple functions, the optimization of the power control law is considered, and some results are given, based on a completely analytical development View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multilevel CPM with 4-D trellis coding and linear receivers

    Publication Year: 1994, Page(s):1274 - 1278 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    Presents two multilevel constant-envelope continuous-phase modulation (CPM) schemes with 4-D trellis coding. The receiver is composed of a simple quadrature demodulator, followed by a symbol-rate sampler, and a Viterbi decoder matched to the code trellis. The first modulation is a quaternary CPM scheme whose phase transitions over a symbol interval are those of π/4-shift QPSK. With respect to r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bandwidth allocation for multiple qualities of service using generalized processor sharing

    Publication Year: 1994, Page(s):1550 - 1554 vol.3
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    We consider the asymptotic behavior of the queue length distribution in segregated buffers sharing a deterministic server via a class of weighted processor sharing policies. Such policies have been proposed as a means to guarantee individual quality of service constraints to heterogeneous streams in integrated services digital networks. These results exhibit the manner in which spare capacity is s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An optimal deployment strategy for ISDN switches in metropolitan networks: modeling and algorithm

    Publication Year: 1994, Page(s):1852 - 1856 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    In the initial stage of ISDN, ISDN switches (hosts) are installed in the main areas and the other areas are covered by remote systems. As the number of subscribers of a remote system increases this remote system will be replaced with a host, considering costs of hosts and remote systems. We formulate the problem of finding an optimal deployment strategy of ISDN facilities, mainly switch and remote... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A set theory approach to the channel assignment problem

    Publication Year: 1994, Page(s):1647 - 1651 vol.3
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    A set-theory framework on the channel assignment problem is presented in this paper. This framework provides a uniform interpretation for the two classes of channel assignment approaches: (1) the centralized assignment based on a predetermined “channel separation matrix”, being employed in cellular frequency planning, and (2) the distributed assignment based on actual interference meas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some implications of “best choice of cell site” in radio cellular systems

    Publication Year: 1994, Page(s):1686 - 1690 vol.3
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    In radio cellular systems, interference mitigation is of prime importance since interference is the factor that by far determines the “capacity” of such systems. Letting each mobile be connected to the most favorable cell site, i.e. the one to which the path loss is the smallest, contributes considerably to the attenuation of interference in the system. This however has some implicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bitrate management in ATM systems using recurrent neural networks

    Publication Year: 1994, Page(s):1774 - 1779 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    Future wide as well as local area integrated broadband communication networks will be based on the asynchronous transfer mode (ATM). ATM allows the exploitation of a statistical multiplexing gain for connections with variable bitrates. On the other hand, an efficient and robust traffic control is necessary to guarantee quality of service objectives. The paper proposes a fast and flexible method to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A network control architecture for advanced personal communications

    Publication Year: 1994, Page(s):1707 - 1711 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    The next generation network requires extremely high performance and a large-scale database to manage personal mobility and terminal mobility. The paper proposes network control with broadcast signaling in a distributed control environment. First, the problems of a centralized control environment are described. To solve the problems, the paper then proposes a new network control architecture for a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Connection admission control in ATM networks

    Publication Year: 1994, Page(s):1790 - 1794 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    A connection admission control scheme based on the Gaussian traffic model is proposed. According to the scheme every call declares only its peak rate. Its statistics are then measured during its holding time. The connection admission criteria is based on traffic measurements and loss probability calculations based on the the Gaussian traffic model. Simulation tests show that the scheme is somewhat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interference cancelling related to chip acquisition in CDMA receivers

    Publication Year: 1994, Page(s):1617 - 1621 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    Interference cancellation at the CDMA receiver requires the knowledge about relative time delays in the received signal from the different users. This knowledge can be obtained during the synchronization process. This paper quantitatively investigates the relationship between the interference cancellation and chip acquisition by using ordering statistics of acquisition times. The paper presents an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cell conformance testing in ATM networks

    Publication Year: 1994, Page(s):1385 - 1393 vol.3
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB)

    In this paper, we investigate how the concept of cell conformance testing, developed within the ITU-T for a single class of traffic could apply for connections with two types of traffic (namely with both CLP=0 and CLP=1 cells). For this purpose, we consider the Traffic Contract currently specified in ITU-T Recommendation 1.371 (i.e., declaration of the peak cell rates of the CLP=0 and the aggregat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM and Aloha-common performance models

    Publication Year: 1994, Page(s):1544 - 1549 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    The classical Aloha model is a starting point for studying the throughput of an ATM link. We extend the Aloha model to c-channel Aloha, where up to c simultaneous packet transmissions are allowed. In the context of ATM we consider on-off sources transmitting bursts of data packed in cells. The Aloha analysis is shown to comply to ATM too, if cell bursts are conceptually identified with packets. By... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.