Proceedings of International Conference on Network Protocols

7-10 Nov. 1995

Filter Results

Displaying Results 1 - 25 of 43
  • Proceedings of International Conference on Network Protocols

    Publication Year: 1995
    Request permission for commercial reuse | |PDF file iconPDF (482 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1995
    Request permission for commercial reuse | |PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • A framework for flexible networking

    Publication Year: 1995, Page(s):209 - 216
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (600 KB)

    Many of today's applications, especially applications using a computer network, are rigid, both as far as user requirements and computational assets are concerned. The first problem limits ordinary users to the functions offered by the system as is, while the second one leads applications to degrade disgracefully, if the availability of assets changes while the application is running. In this pape... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile real-time communications in FDDI networks

    Publication Year: 1995, Page(s):201 - 208
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (804 KB)

    We propose an architecture of FDDI-based mobile networks and address issues that arise in providing real-time communication services on such networks. A wide range of problems concerning synchronous bandwidth management and quality of service guarantee are identified. To solve these problems, we present a dynamic bandwidth management scheme, a source handoff protocol and two approaches to handling... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A synchronization and compensation protocol for multimedia communication systems

    Publication Year: 1995, Page(s):252 - 259
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (720 KB)

    Media synchronization and freedom from starvation at destination devices are the two most important problems in a multimedia communication system. In order to solve these problems at the same time, this paper presents a protocol combining the scheduling scheme and the buffering scheme with underflow threshold (SBUF). In this protocol, by controlling the buffer sizes and modifying transmission sche... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Buffer insertion/self-token (BIST) protocol for multimedia LANs

    Publication Year: 1995, Page(s):350 - 355
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (476 KB)

    This paper describes a new multimedia LAN protocol, referred to as the buffer insertion/self-token (BIST) protocol, combining buffer insertion and the multiple-self-token ring protocols. The basic buffer insertion ring has the maximum spatial reuse on a ring by allowing stations to transmit packets concurrently. However, it is well known that the buffer insertion method suffers from the possibilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A call model for multimedia multiuser communication platform

    Publication Year: 1995, Page(s):305 - 312
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (928 KB)

    Multimedia multiuser applications such as computer supported cooperative working, desktop multimedia conferencing, and distance education require more complex and structured communication services from the underlying communication platform than conventional applications. The call model of the communication platform defines how the underlying basic data transport objects can be structured to suppor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generalized fair reachability analysis for cyclic protocols with nondeterministic and internal transitions

    Publication Year: 1995, Page(s):6 - 13
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (712 KB)

    In this paper, we extend the generalized fair reachability notion to cyclic protocols with nondeterministic and internal transitions. By properly incorporating internal transitions into the formulation of fair progress vectors, we prove that with only a few modifications, all the results established for cyclic protocols without nondeterministic and internal transitions still hold even if nondeterm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Similarity for reuse of specifications in communication software development

    Publication Year: 1995, Page(s):22 - 29
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (644 KB)

    The reuse of existing software is one of the most effective ways for software development. We have focused on the specification process with FDTs (Formal Description Techniques), and have proposed a new concept of similarity based on LTSs (Labelled Transition Systems) as a criterion to reuse specifications. However, it's definition has some problems, such that (a) it can't be applied to an LTS wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol synthesis from timed and structured specifications

    Publication Year: 1995, Page(s):74 - 81
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (704 KB)

    In this paper, we propose a method to synthesize protocol specifications automatically from service specifications written in a time-extended LOTOS called LOTOS/T+. In LOTOS/T+, structured descriptions, such as parallelism and interruption are allowed to describe service specifications, and time-constraints among non-adjacent actions can be described using Presburger formulas. Here we assume that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A wireless link protocol: design by refinement

    Publication Year: 1995, Page(s):192 - 200
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (596 KB)

    We develop an asymmetric protocol for wireless communication in a step-by-step manner. We start with a very simple protocol and prove its correctness. Then we relax the assumptions of the simple protocol one by one, verifying the correctness of the protocol at each step as we relax the assumptions. This process is continued in a systematic manner until no assumptions are left. The novelty of the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia synchronization for live presentation using the N-buffer approach

    Publication Year: 1995, Page(s):244 - 251
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (708 KB)

    The demand of bringing multimedia information systems into distributed environments makes multimedia synchronization more difficult. In order to eliminate the side effects which result from delay jitters, we propose a bounded buffer allocation scheme, in which the audio stream adopts the blocking synchronization scheme and the video stream adopts the non-blocking synchronization scheme, for live a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of an ATM switch with multiple paths

    Publication Year: 1995, Page(s):100 - 107
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (680 KB)

    An ATM switch based on multistage interconnection networks with multiple paths can support higher bandwidth than that of buffered networks with single path by passing multiple packets to the same destination simultaneously. These multiple packets are buffered in the output buffer of the destination. The performance of output buffer in the switch with multiple paths is closely dependent on the outp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol synthesis using basic Lotos and global variables

    Publication Year: 1995, Page(s):126 - 133
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (816 KB)

    In Kant et al. (1992), a method of protocol synthesis, using basic LOTOS (BL) as a specification language, is proposed. In the present paper, we generalize this method. We propose an extended basic LOTOS (EBL) to specify the service and the protocol. With EBL, events are associated with enabling conditions and transformation functions that depend on global variables. Next, we propose a method to s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A routing protocol for finding two node-disjoint paths in computer networks

    Publication Year: 1995, Page(s):340 - 347
    Cited by:  Papers (19)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (644 KB)

    In this paper, we present a routing protocol for finding two node-disjoint paths between each pair of nodes in a computer network. In the proposed protocol, each node in the network has the same procedure, which is driven by local information with respect to the network topology such as an adjacent node on a spanning tree in the network. Thus, the execution of the protocol can continue after chang... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A protocol synthesis algorithm: a relational approach

    Publication Year: 1995, Page(s):58 - 65
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (648 KB)

    The protocol engineering plays an important role in computer networks. Designing a protocol is a challenging activity because of the complexity of the rules defining the interaction between the communicating entities. At this point, formal approaches have been proposed: Analysis and Synthesis. The synthesis approach has the advantage of avoiding errors a priori and ensuring some desirable properti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service and connection management architecture for distributed multimedia applications

    Publication Year: 1995, Page(s):296 - 304
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (944 KB)

    This paper addresses a novel networking architecture model on DPE for various multimedia services suitable to high speed networks and for the flexible and rapid introduction of services. In this model, applications are assembled from software “building blocks” which cope with information service and network providers. Each building block provides a layered view, enabling the effective ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation method of high speed protocol as transport library

    Publication Year: 1995, Page(s):172 - 179
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (760 KB)

    Along with the rapid progress of optical technologies, the transmission speed of LANs and public networks has been increased significantly. As a result, it has become possible for computers distributed geographically to communicate with each other with high throughput. However, the current protocols such as TCP/IP have some problems, especially the performance through long distance and wide bandwi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A society of cooperative agents on the information network: towards intelligent information gathering

    Publication Year: 1995, Page(s):218 - 225
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1376 KB)

    Proposes a completely agent-based approach for information gathering on information networks with a large number of distributed heterogeneous sources, such as Internet. Locating and accessing information in such a large distributed system which changes dynamically is challenging. An agent-based solution is the most suitable in such situations. We first review the drawbacks of existing non-agent an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Petri net models for describing multimedia synchronization requirements

    Publication Year: 1995, Page(s):260 - 267
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (728 KB)

    Synchronization constitutes an important research field in multimedia communication. The synchronization problem has been addressed in the literature in two distinct levels: specification and design. On the specification level, several formal models have been proposed, which are mostly variations of the Petri net model. Although some models are deemed to be better than others in some aspects, ther... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonpreemptive scheduling algorithms for multimedia communication in local area networks

    Publication Year: 1995, Page(s):356 - 364
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (836 KB)

    We consider a LAN-based multimedia information system like a Video On Demand (VOD) system that supports the retrieval of continuous media like motion video and sound. In the system, the server transmits the streams of continuous media on a shared communication channel while the continuity of multiple streams should be preserved. Several scheduling algorithms have been studied to guarantee the temp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol architectures for delivering application specific quality of service

    Publication Year: 1995, Page(s):313 - 320
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (744 KB)

    With the advent of high speed networks, the future communication environment is expected to comprise a variety of networks with widely varying characteristics. The next generation multimedia applications require transfer of a wide variety of data such as voice, video, graphics, and text which have widely varying access patterns such as interactive, bulk transfer, and real-time guarantees. Traditio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verification and diagnosis of testing equivalence and reduction relation

    Publication Year: 1995, Page(s):14 - 21
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (564 KB)

    In protocol engineering, a common approach for system design and implementation is to verify if an implementation specification (or any lower level specification) satisfies its service specification. If an implementation specification does not satisfy its service specification, it is necessary to find out the faults and correct them. In this paper, we present an efficient algorithm for verifying w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic bandwidth allocation scheme for multimedia data over ATM networks

    Publication Year: 1995, Page(s):32 - 39
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (472 KB)

    In this paper, a new dynamic bandwidth allocation scheme called Minimum Overflow Traffic Algorithm (MOTA) is proposed to assign the bandwidth for each traffic class in the hierarchical admission control structure in ATM network. The traffic types can be video, image, voice and so on. An Overflow traffic function Q is used to adjust the bandwidth assignment each time when a new connection is requir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of a multicast-buffer ATM switch

    Publication Year: 1995, Page(s):84 - 91
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (672 KB)

    We propose a multicast-buffer ATM switch, where a dedicated buffer is allocated to store all multicast cells in an ATM switch. We describe the design of the dedicated multicast buffer in an output-buffer ATM switch and in a shared-buffer ATM switch. No additional copy circuit or complicated control circuit is needed to implement the multicast-buffer ATM switch. Our performance evaluation shows tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.