Computer Communications and Networks, 1995. Proceedings., Fourth International Conference on

20-23 Sept. 1995

Filter Results

Displaying Results 1 - 25 of 93
  • Proceedings Fourth International Conference on Computer Communications and Networks (ICCCN'95)

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (427 KB)
    Freely Available from IEEE
  • Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video

    Publication Year: 1995, Page(s):2 - 10
    Cited by:  Papers (30)  |  Patents (91)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (858 KB)

    The following topics were dealt with: performance modelling; protocols; traffic management; Internet; network security; ATM networks; multicasting; distributed multimedia applications; reliability; network management; mobile communication; interoperability; switching; flow control; LAN and PC performance; FDDI; quality of service; feature testing of communication protocols; video communication; ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A group communication protocol architecture for distributed network management systems

    Publication Year: 1995, Page(s):28 - 31
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (405 KB)

    A group communication protocol has been proposed and implemented for the distributed network management system (MOVI: managed object view interface). To reduce protocol overhead, distributed and hierarchical approaches have been introduced: the group management function has been split into three functional entities. The first one is the local group manager (LCM) which manages one or more member(s)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • Reachability problems for cyclic protocols

    Publication Year: 1995, Page(s):32 - 39
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    We study three reachability problems for cyclic protocols: (1) global state reachability; (2) abstract state reachability; and (3) execution cycle reachability. By combining fair progress and maximal progress during state exploration, we prove that these three problems an all decidable for Q, the class of cyclic protocols with finite fair reachable state spaces. In the course of the investigation,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Burst-level admission control protocols with multirate traffic and arbitrary network topology

    Publication Year: 1995, Page(s):396 - 403
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    In this paper, we investigate the performance of two burst-level admission control protocol for ATM networks that are based on simple random access techniques: fell-and-wait and tell-and-go. We develop an analytical model based on reduced load approximation to obtain throughput, end-to-end transfer delay and blocking probability characteristics far an arbitrary network topology with multirate traf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using destination set grouping to improve the performance of window-controlled multipoint connections

    Publication Year: 1995, Page(s):388 - 395
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    In conventional multicast communication, the source carries a single conversation with all destination nodes. If a node on the path to any destination becomes congested the throughput to all destinations is reduced, thus treating same destination nodes unfairly. We consider a window-controlled multipoint connection and study the use of destination set grouping, where the destination set can be spl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-oriented modelling of communication protocols for re-use

    Publication Year: 1995, Page(s):18 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (820 KB)

    The main motivation for the present work stems from the wide gap which exists between the research efforts devoted to developing formal descriptions for communication protocols and the effective development methodologies used in industrial implementations. We apply object-oriented (OO) modelling principles to networking protocols, exploring the potential for producing re-useable software modules b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive CACs using Bayesian performance estimation

    Publication Year: 1995, Page(s):11 - 17
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB)

    A typical example of telecommunication system performance estimation during operation is connection admission control (CAC) of asynchronous transfer mode (ATM) networks. This paper investigates adaptive CACs using Bayesian performance estimation. The performance is estimated through Bayesian regression analysis, in which the monitored performance and an a priori estimate are given by conventional ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal approach to model SNMP network management systems

    Publication Year: 1995, Page(s):284 - 287
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    The simple network management protocol (SNMP) is currently the dominant network management standard for the TCP/IP networking environment. Fundamental to SNMP is the management information base (MIB). The heart of SNMP is the protocol. In this paper, we propose an approach to formalize our understanding of SNMP. We prove that MIB with lexicographic order is a well-founded set. We also provide form... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The deflecting multicast switch

    Publication Year: 1995, Page(s):332 - 338
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    We introduce a novel multicast switching paradigm, the deflecting multicast switch (DMS), which accomplishes the replication and routing functions of a multicast switch simultaneously. The architecture is shown to have low connection complexity and can be implemented in a modular fashion. A self-routing and self-replication algorithm with minimal control overhead is described which allows for dist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Buffer size trade-offs in input/output buffered ATM switches under various conditions

    Publication Year: 1995, Page(s):258 - 263
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    In this paper the non-linear and complex relationship between packet loss probability and average packet delay for an input/output buffered ATM switch is studied thoroughly using our previously published analysis model. The main contribution is insight into the behavior of the switch and better understanding of the buffer size trade-offs under various traffic conditions speed-up factors, and buffe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Libra: an object-oriented ATM network simulator

    Publication Year: 1995, Page(s):667 - 670
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    Libra is an object-oriented simulator developed for simulation and fast prototyping of ATM networks. It is designed and implemented to address the diverse issues encountered in the simulation of any large-scale ATM network, namely, modeling of source traffic, network control, switch architecture design, and effective interaction of all these elements in an integrated fashion. The simulator is buil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time computation of empirical autocorrelation, and detection of non-stationary traffic conditions in high-speed networks

    Publication Year: 1995, Page(s):212 - 219
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB)

    Stochastic traffic processes are open nonstationary (dynamic, transient), yet naive assumptions about stationarity lead to unrealistic forecasts. Format tests for stationarity are impractical in real time, and some heuristic tests are imprecise. Lagged autocorrelations are used in time series analysis for empirical stationarity tests, model identification and forecasting, but traditional methods a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable virtual circuit routing scheme for ATM networks

    Publication Year: 1995, Page(s):630 - 637
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB)

    We present a scalable VC routing protocol based on the viewserver hierarchy. Each viewserver maintains a partial view of the network. By querying these viewservers, a source obtains a merged view that contains a path to the destination. The source then sends a setup request packet over this path to reserve resources. We use simulation to compare our protocol to a simple approach that maintains a f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delay performance evaluation of high speed protocols for multimedia communications

    Publication Year: 1995, Page(s):352 - 355
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    Multimedia applications integrate a variety of media namely, audio, video, images, graphics, text, and data, each of which has different quality of service (QoS) requirements. To study the support of multimedia traffic on high speed protocols, we examine two significant metrics: delay fairness and worst-case delay performance. Four members of reservation-based high speed protocols are studied DQDB... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network management and system-level diagnosis

    Publication Year: 1995, Page(s):280 - 283
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    Fault management, which consists of fault detection, diagnosis, and recovery is one of the key goals of network management. We consider an application of system-level diagnosis concepts to the problem of fault diagnosis in networks. Since the primary function of the nodes in a communication network is to route messages, the diagnosis is done with respect to the ability of the nodes to accomplish r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM networks allow multimedia in process control systems

    Publication Year: 1995, Page(s):324 - 331
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    Today, communication networks are growing in terms of size and speed, delivering hundreds of megabits to tens of gigabits per second. This large amount of bandwidth leads to the definition of new kinds of distributed applications introducing multimedia. Nevertheless, current computer architectures are not well suited to process these delay guaranteed and cumbersome flows. This paper particularly f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of self-similarity on the go-back-N ARQ protocols

    Publication Year: 1995, Page(s):250 - 257
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    Packet traffic exhibits fractal or self-similar properties which are fundamentally different from features found in circuit switched voice traffic and captured by commonly used theoretical traffic models. These fractal properties are associated with the burstiness of packet traffic. In this paper we examine the impact of self-similarity on the link-layer error control mechanism, in particular, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call admission control issues in a wireless ATM network

    Publication Year: 1995, Page(s):663 - 666
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    This paper presents call admission control issues for an ATM-based wireless network with mobile hosts. Such wireless ATM networks are motivated by both an increasing demand for mobile capability for future broadband networks and broadband multimedia services for mobile systems. An ATM compatible wireless network capable of supporting a mix of broadband ISDN services is discussed. We present a conc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of communication networks for distributed computing

    Publication Year: 1995, Page(s):456 - 459
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    We present performance results for several high-speed networks in distributed computing environments. These networks are: HiPPI, ATM, Fibre Channel, IBM Allnode switch, FDDI, and Ethernet. These networks are parts of two testbeds: DaVinci-a cluster of 16 SGI R8000 workstations at NASA Ames-and LACE-a cluster of 96 IBM RS6000 workstations at NASA Lewis. Also, an IBM SP2 machine is considered for co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The multi-level leaky bucket mechanism

    Publication Year: 1995, Page(s):380 - 387
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    In this paper we present a new state estimation method based on the leaky bucket (LB) mechanism. It is called the multi-level leaky bucket (MLLB) and can be used to determine the current state of a multirate source, e.g, a Markov modulated process. The MLLB provides information about the instantaneous bit rate of a source allowing more effective flow control. We compare the performance of our mech... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data sharing and recovery in gigabit-networked databases

    Publication Year: 1995, Page(s):204 - 211
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (812 KB)

    Major advances in optical fiber transmission and switching technology have enabled the development of very high speed networks with data rates of the order of gigabits per second. It is anticipated that in the future, wide area gigabit networks will interconnect database servers around the globe creating extremely powerful distributed information systems. In this paper, we examine the implications... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simulation study of schemes for block loss reduction in ATM networks using FEC and buffer management

    Publication Year: 1995, Page(s):124 - 131
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (828 KB)

    Traditional approaches to guaranteeing quality-of-service (QoS) in ATM networks have focused on performance metrics such as cell loss probability, end-to-end cell delay and delay jitter. However, the block loss rate is a more meaningful metric for applications such as medical imaging and real-time video, and for high-level protocols such as IP which will use ATM as the transport mechanism. A block... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Limiting the access bandwidth of a video source: model and performance analysis

    Publication Year: 1995, Page(s):546 - 553
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    We investigate the effect of limiting the access bandwidth of a video source. In some applications, the access bandwidth is less than the peak rate of the source and so dropping of packets occurs. A model is needed for this truncated source. The model suggested in the paper is based on the discrete-state continuous time Markov model proposed by Maglaris et al. (1988). We derive the mean and the au... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.