Proceedings of International Conference on Network Protocols

7-10 Nov. 1995

Filter Results

Displaying Results 1 - 25 of 43
  • Proceedings of International Conference on Network Protocols

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (482 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • A reliable ordered delivery protocol for interconnected local area networks

    Publication Year: 1995, Page(s):365 - 374
    Cited by:  Papers (5)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1080 KB)

    We present-the Totem multiple-ring protocol, a novel reliable ordered multicast protocol for multiple interconnected local-area networks. The protocol exhibits excellent performance and maintains a consistent network-wide total order of messages despite network partitioning and remerging, or processor failure and recovery with stable storage intact. The Totem protocol is designed for fault-toleran... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonpreemptive scheduling algorithms for multimedia communication in local area networks

    Publication Year: 1995, Page(s):356 - 364
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB)

    We consider a LAN-based multimedia information system like a Video On Demand (VOD) system that supports the retrieval of continuous media like motion video and sound. In the system, the server transmits the streams of continuous media on a shared communication channel while the continuity of multiple streams should be preserved. Several scheduling algorithms have been studied to guarantee the temp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Buffer insertion/self-token (BIST) protocol for multimedia LANs

    Publication Year: 1995, Page(s):350 - 355
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    This paper describes a new multimedia LAN protocol, referred to as the buffer insertion/self-token (BIST) protocol, combining buffer insertion and the multiple-self-token ring protocols. The basic buffer insertion ring has the maximum spatial reuse on a ring by allowing stations to transmit packets concurrently. However, it is well known that the buffer insertion method suffers from the possibilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A routing protocol for finding two node-disjoint paths in computer networks

    Publication Year: 1995, Page(s):340 - 347
    Cited by:  Papers (18)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    In this paper, we present a routing protocol for finding two node-disjoint paths between each pair of nodes in a computer network. In the proposed protocol, each node in the network has the same procedure, which is driven by local information with respect to the network topology such as an adjacent node on a spanning tree in the network. Thus, the execution of the protocol can continue after chang... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The interaction between the V protocol and the Q.293I protocol for the interactive video network

    Publication Year: 1995, Page(s):180 - 190
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB)

    There are many examples of interactive visual and multimedia applications including Movies on Demand, video conferencing, etc., which are emerging in trials and eventually in full service networks. Technology and standards are being developed for these services and networks. DSM-CC (Digital Storage Media Command and Control), a sub-group of MPEG, is one such standard. AT&T has been active in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A society of cooperative agents on the information network: towards intelligent information gathering

    Publication Year: 1995, Page(s):218 - 225
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1376 KB)

    Proposes a completely agent-based approach for information gathering on information networks with a large number of distributed heterogeneous sources, such as Internet. Locating and accessing information in such a large distributed system which changes dynamically is challenging. An agent-based solution is the most suitable in such situations. We first review the drawbacks of existing non-agent an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A neural network approach to multicast routing in real-time communication networks

    Publication Year: 1995, Page(s):332 - 339
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    Real-time communication networks are designed mainly to support multimedia applications, especially the interactive ones, which require a guarantee of Quality of Service (QoS). Moreover, multicasting is needed as there are usually more than two peers who communicate together using multimedia applications. As for the routing, the network has to find an optimum (least cost) multicast route, that has... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation method of high speed protocol as transport library

    Publication Year: 1995, Page(s):172 - 179
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB)

    Along with the rapid progress of optical technologies, the transmission speed of LANs and public networks has been increased significantly. As a result, it has become possible for computers distributed geographically to communicate with each other with high throughput. However, the current protocols such as TCP/IP have some problems, especially the performance through long distance and wide bandwi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Networking abstractions and protocols under variable length messages

    Publication Year: 1995, Page(s):286 - 293
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB)

    The size of data shipped over networks of distributed databases has increased substantially with the introduction of multimedia and high performance systems. Therefore, there is a need to understand the behavior and the trade-offs of available data communication abstractions in such settings. In this paper, we consider parameters associated with the abstractions, the impact of their implementation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for flexible networking

    Publication Year: 1995, Page(s):209 - 216
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    Many of today's applications, especially applications using a computer network, are rigid, both as far as user requirements and computational assets are concerned. The first problem limits ordinary users to the functions offered by the system as is, while the second one leads applications to degrade disgracefully, if the availability of assets changes while the application is running. In this pape... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic bandwidth allocation scheme for multimedia data over ATM networks

    Publication Year: 1995, Page(s):32 - 39
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    In this paper, a new dynamic bandwidth allocation scheme called Minimum Overflow Traffic Algorithm (MOTA) is proposed to assign the bandwidth for each traffic class in the hierarchical admission control structure in ATM network. The traffic types can be video, image, voice and so on. An Overflow traffic function Q is used to adjust the bandwidth assignment each time when a new connection is requir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A timing-based schema for stabilizing information exchange

    Publication Year: 1995, Page(s):324 - 331
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB)

    The paradigm of information exchange provides a basis for nodes in a network to stay up-to-date with the recent information in the network. In this paradigm, nodes cooperate with each other to share their current information. We present a simple and uniform schema for building information exchange protocols that are stabilizing, in the following strong sense. Starting from arbitrary state, the pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A robust transport protocol for run-time fault detection

    Publication Year: 1995, Page(s):164 - 171
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB)

    Run-time fault detection in communication protocols is essential to detect faults that cannot be detected during the testing phase. We propose a signature-based method to detect run-time faults. A polynomial using the state and event information as coefficients is used to transform a sequence of states and events into a number (signature). The static signature corresponding to the correct executio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internetworking between OSI and TCP/IP network managements with security features

    Publication Year: 1995, Page(s):278 - 285
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    To integrate both the OSI network and the TCP/IP internet the application gateway with powerful and flexible paradigms has been used, but micro-managements of the gateway produces high communication costs and long delays in responding to critical situations. The mechanism that maps the access control policy is needed between two domains using different security policies. These problems are caused ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile real-time communications in FDDI networks

    Publication Year: 1995, Page(s):201 - 208
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB)

    We propose an architecture of FDDI-based mobile networks and address issues that arise in providing real-time communication services on such networks. A wide range of problems concerning synchronous bandwidth management and quality of service guarantee are identified. To solve these problems, we present a dynamic bandwidth management scheme, a source handoff protocol and two approaches to handling... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Similarity for reuse of specifications in communication software development

    Publication Year: 1995, Page(s):22 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    The reuse of existing software is one of the most effective ways for software development. We have focused on the specification process with FDTs (Formal Description Techniques), and have proposed a new concept of similarity based on LTSs (Labelled Transition Systems) as a criterion to reuse specifications. However, it's definition has some problems, such that (a) it can't be applied to an LTS wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generalized fair reachability analysis for cyclic protocols with nondeterministic and internal transitions

    Publication Year: 1995, Page(s):6 - 13
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    In this paper, we extend the generalized fair reachability notion to cyclic protocols with nondeterministic and internal transitions. By properly incorporating internal transitions into the formulation of fair progress vectors, we prove that with only a few modifications, all the results established for cyclic protocols without nondeterministic and internal transitions still hold even if nondeterm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol architectures for delivering application specific quality of service

    Publication Year: 1995, Page(s):313 - 320
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (744 KB)

    With the advent of high speed networks, the future communication environment is expected to comprise a variety of networks with widely varying characteristics. The next generation multimedia applications require transfer of a wide variety of data such as voice, video, graphics, and text which have widely varying access patterns such as interactive, bulk transfer, and real-time guarantees. Traditio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using traffic regulation to meet end-to-end deadlines in ATM LANs

    Publication Year: 1995, Page(s):152 - 159
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    This paper considers the support of hard real-time connections in ATM networks. In an ATM network, a set of hard real-time connections can be admitted only if the worst case end-to-end delays of cells belonging to individual connections are less than their deadlines. Although there are several approaches to manage the network resources in order to meet the delay requirements of connections, we foc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP/IP and the European ATM pilot

    Publication Year: 1995, Page(s):270 - 277
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB)

    Very few measurements have been done on wide area ATM networks. In this paper, we first look at how a compliant traffic can be generated with standard ATM equipment. We show that in our environment, even with a 23.42 Mbps VP out of 34 Mbps links, it is necessary to use some spacing in the ATM adapters to generate a compliant traffic. Our measurements show that with a large window TCP is able to ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol synthesis from timed and structured specifications

    Publication Year: 1995, Page(s):74 - 81
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    In this paper, we propose a method to synthesize protocol specifications automatically from service specifications written in a time-extended LOTOS called LOTOS/T+. In LOTOS/T+, structured descriptions, such as parallelism and interruption are allowed to describe service specifications, and time-constraints among non-adjacent actions can be described using Presburger formulas. Here we assume that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol synthesis using basic Lotos and global variables

    Publication Year: 1995, Page(s):126 - 133
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB)

    In Kant et al. (1992), a method of protocol synthesis, using basic LOTOS (BL) as a specification language, is proposed. In the present paper, we generalize this method. We propose an extended basic LOTOS (EBL) to specify the service and the protocol. With EBL, events are associated with enabling conditions and transformation functions that depend on global variables. Next, we propose a method to s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A wireless link protocol: design by refinement

    Publication Year: 1995, Page(s):192 - 200
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    We develop an asymmetric protocol for wireless communication in a step-by-step manner. We start with a very simple protocol and prove its correctness. Then we relax the assumptions of the simple protocol one by one, verifying the correctness of the protocol at each step as we relax the assumptions. This process is continued in a systematic manner until no assumptions are left. The novelty of the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.