Proceedings IEEE Symposium on Computers and Communications

27-29 July 1995

Filter Results

Displaying Results 1 - 25 of 62
  • Proceedings IEEE Symposium on Computers and Communications

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (293 KB)
    Freely Available from IEEE
  • Transfer of data over ATM networks using available bit rate (ABR)

    Publication Year: 1995, Page(s):2 - 8
    Cited by:  Papers (2)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (781 KB)

    The paper contributes to currently debated key issues on the evolution of ATM networks and their standardisation. It takes the view that since the asynchronous transfer mode has features of both circuit and packet switching, one has to selectively draw benefits for different types of traffic, compromising, if necessary, the integration principle. The use of the available bit rate (ABR), promoted b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On improving voice quality under dynamic encoding algorithms in ATM networks

    Publication Year: 1995, Page(s):9 - 15
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (621 KB)

    We consider a voice multiplexer which supports ATM packet voice traffic. This system model also applies to the multiplexing operation carried out at the output queue of each output queueing ATM switch. The voice multiplexer implements an encoding algorithm under which the voice quantization levels are dynamically adjusted according to the congestion status of the multiplexer. Using an embedded voi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of a shared-medium ATM switch

    Publication Year: 1995, Page(s):16 - 22
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (630 KB)

    In this paper, we present an approximate analysis of a generic shared-medium ATM switch with input and output queueing. Input traffic is assumed to be bursty and is modelled by an interrupted Bernoulli process (IBP). Three different bus service policies are analyzed: time division multiplexing (TDM), cyclic, and random. The output links may have constant or geometric service time. The analysis is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bandwidth allocation for interconnecting LAN/MANs and ATM networks

    Publication Year: 1995, Page(s):23 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB)

    The use of ATM networks in interconnecting LANs and MANs results in a bandwidth allocation problem due to the connectionless nature of most LAN/MAN traffic. A well known scheme is to use bandwidth advertising in which available bandwidth is broadcast to allow for users contention. This paper presents an enhancement over the basic scheme that will improve the burst loss rate significantly at high n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical synchronization among participants in real-time multimedia conference

    Publication Year: 1995, Page(s):30 - 36
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (653 KB)

    In this paper, an algorithm to determine the set of packets generated continuously and periodically from different participants that are arriving at a node either for mixing at the master of a conference, or for simply playing back at a regular participant of a conference, is proposed. The essence of the algorithm is to estimate the average packet arrival time (or reference time) for each particip... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of network transmission delay and echo on Group 3 facsimile performance

    Publication Year: 1995, Page(s):37 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB)

    This paper provides information on a laboratory study conducted by COMSAT Laboratories to evaluate the effect of echo and delay on facsimile call retention rates. The term "call retention" is defined as the ability of a pair of facsimile terminals to maintain a circuit connection until all pages have been successfully transmitted after negotiation of the high speed signaling rate. The results of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues in scaling multimedia collaboration tools for remote instruction

    Publication Year: 1995, Page(s):42 - 48
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (846 KB)

    Today a plethora of multimedia, hyperlink software and hardware components are available, as well as teleconferencing systems supporting collaborative work. However, few systems are easy for people to use for real applications such as support of remote instruction. Most importantly, none of these tools scale to use by more than a few users simultaneously. We describe our vision for a system which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object oriented network operation, administration and management

    Publication Year: 1995, Page(s):50 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (802 KB)

    The rapid increase of communication networks complexity force to the need of a common information pool for network operation, administration and management. Siemens Austria developed a network management information system in cooperation and under supervision of ESA. The resulting system based on object oriented techniques provides a powerful tool for network control and coordination in every day ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the implementation of a prototype for performance management services

    Publication Year: 1995, Page(s):57 - 63
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (741 KB)

    This paper presents a prototype for management services which enables the performance monitoring and control of resources in a TCP/IP network. A time reference information model required to accomplish the different needs of performance management functions, is also described. This temporal model can be used not only to provide a diachronic view of the management information, but also to define a s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience in the design and implementation of an object-oriented network management system

    Publication Year: 1995, Page(s):64 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (621 KB)

    The design and implementation of network management systems is one of the first application areas in which the use of object-orientation was applied on a wide scale. A major reason is that resources that need to be managed in computer networks seem to map naturally into objects. However, network management systems which can deal with heterogeneous networks are very complex systems, and it is easy ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the distributed fault diagnosis of computer networks

    Publication Year: 1995, Page(s):71 - 77
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (787 KB)

    We propose a general technique for the fault diagnosis of communication networks that is inspired by the theory of system-level diagnosis. This technique relies on the paradigm of comparison testing. A set of tasks, possibly implicit, is executed by the nodes in a network. The resulting agreements and disagreements in their results are used to diagnose all the faulty nodes and links with a high pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Majority Manchester decoding for active redundant data transmission

    Publication Year: 1995, Page(s):78 - 82
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (487 KB)

    Reliable real time data transmission ought to be able to tolerate both transient faults and line failures. The former are readily dealt with by employing appropriate error control coding, whereas the latter require multiple transmission lines. The conventional approach is to use one active and several standby channels. However, utilizing all available channels through multiple feeding and implemen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the multiplexing effects of the ATM traffic

    Publication Year: 1995, Page(s):84 - 90
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (450 KB)

    Traffic measurements taken from real data are highly desirable for validating traffic models, designing congestion control and flow control algorithms, implementing communication protocols, and developing switch architectures. This paper investigates the traffic characteristics of several applications in an ATM network with the goal of studying bursty traffic behavior and realizing the multiplexin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic routing for multimedia traffic over ATM networks

    Publication Year: 1995, Page(s):91 - 97
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    ATM networks support multimedia traffic where diverse services have to be provided and various QoS requirements have to be met. Routing plays an important role in guaranteeing the QoS. However conventional routing will cause a significant overhead when the network size gets very large or rerouting occurs frequently due to the varying link state. The objective of our dynamic routing scheme is to pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM switching based on deflection routing

    Publication Year: 1995, Page(s):98 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (835 KB)

    ATM switch architectures based on deflection routing are examined and compared with regards to their internal operations. Their common feature is the availability of multiple I/O paths through a multistage unbuffered interconnection network where conflicts for the same internal link are dealt with, stage by stage, by deflecting the packets onto the wrong path. The main engineering parameter of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ordered Delivery over One-way Virtual Circuits

    Publication Year: 1995, Page(s):105 - 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • U.S. Network Reliability Issues and Major Outage Performance

    Publication Year: 1995, Page(s):114 - 119
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network outage impact measures for telecommunications

    Publication Year: 1995, Page(s):120 - 126
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (665 KB)

    Standard measures do not adequately reflect the importance of the very large and significant outages that can now occur in the modern telecommunications networks. The impact measure developed originally at Bellcore that is the basis for the new T1A1 measure of network performance is described. We assumed a useful impact measure must: (a) appropriately order a set of outages by the severity of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Span-disjoint paths for physical diversity in networks

    Publication Year: 1995, Page(s):127 - 133
    Cited by:  Papers (12)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (635 KB)

    Diversity has been widely recognized as a critical factor for robustness in networks. In order to resist isolations due to link and node failures, we need to route along paths which are both span-disjoint (physically disjoint) and node-disjoint. In this way we can design the network for fault tolerance or graceful degradation. We demonstrate the procedure to obtain span-disjoint paths. This proced... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing outage time of telecommunication services

    Publication Year: 1995, Page(s):134 - 140
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (717 KB)

    Customers of telecommunication services are strongly interested in the service outage time. In order to respond to these requirements, the following measures are now being investigated. The first is to keep the frequency of outages of which the duration time exceeds a certain length under a certain level, and the second is to inform the customers of the residual outages time when a service outage ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic restoration of telecommunication networks

    Publication Year: 1995, Page(s):141 - 147
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (522 KB)

    The paper provides a set of guidelines to design and evaluate automatic restoration for telecommunication networks. The operation of a telecommunications network is defined to be in one of three modes: normal, abnormal and restorative. The paper emphasizes the coordinated performance of a network management system (NMS) and an automatic restoration system (RS). The NMS detects the abnormal mode, a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of a hybrid encryption scheme for Ethernet

    Publication Year: 1995, Page(s):150 - 156
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (449 KB)

    A software-based implementation of a hybrid encryption scheme for Ethernet LAN is given. It uses a DES-type symmetric key for information exchange between communicating users. In addition, a Diffie-Hellman method is adopted for key distribution which incorporates an RSA-type public key scheme for securing the exchange of the symmetric key components. To facilitate distribution of public keys and t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security associations: building blocks for secure communications

    Publication Year: 1995, Page(s):157 - 163
    Cited by:  Papers (1)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (849 KB)

    History tells us that Julius Cesar shifted each letter in his messages to his generals by three places in the alphabet. The generals knew to shift back by three letters to read the message. Securing information for transfer between entities requires an agreement on how the information will be protected. Modern science and technology has brought more advanced methods of protecting information, but ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithm-based fault detection in prime factor FFT networks

    Publication Year: 1995, Page(s):164 - 170
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    A concurrent error detection (CED) scheme has been proposed by Jou and Abraham (1988)for a radix-2 FFT network. The method uses a coding scheme to ensure that all the modelled faults are detectable. The same method has been applied to the prime factor algorithm (PFA) FFT network. The results show that the CED scheme is applicable to multi-factor PFA networks and it is efficient, only, for large N.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.