By Topic

Computer Communications and Networks, 1995. Proceedings., Fourth International Conference on

Date 20-23 Sept. 1995

Filter Results

Displaying Results 1 - 25 of 93
  • Proceedings Fourth International Conference on Computer Communications and Networks (ICCCN'95)

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (427 KB)
    Freely Available from IEEE
  • Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video

    Publication Year: 1995, Page(s):2 - 10
    Cited by:  Papers (27)  |  Patents (87)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (858 KB)

    The following topics were dealt with: performance modelling; protocols; traffic management; Internet; network security; ATM networks; multicasting; distributed multimedia applications; reliability; network management; mobile communication; interoperability; switching; flow control; LAN and PC performance; FDDI; quality of service; feature testing of communication protocols; video communication; ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • Video quality control under cell-discarding algorithms in an ATM network supporting layer-encoded video streams

    Publication Year: 1995, Page(s):538 - 545
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    We consider a multiplexer station which supports ATM video traffic streams. The system model also applies to the multiplexing operation carried out at the output queue of each output-queueing ATM switch. We assume that video signals are encoded by a two-level layered encoding algorithm under which each ATM cell is properly marked as a high-priority (HP) or low-priority (LP) cell according to the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Limiting the access bandwidth of a video source: model and performance analysis

    Publication Year: 1995, Page(s):546 - 553
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    We investigate the effect of limiting the access bandwidth of a video source. In some applications, the access bandwidth is less than the peak rate of the source and so dropping of packets occurs. A model is needed for this truncated source. The model suggested in the paper is based on the discrete-state continuous time Markov model proposed by Maglaris et al. (1988). We derive the mean and the au... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable virtual circuit routing scheme for ATM networks

    Publication Year: 1995, Page(s):630 - 637
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB)

    We present a scalable VC routing protocol based on the viewserver hierarchy. Each viewserver maintains a partial view of the network. By querying these viewservers, a source obtains a merged view that contains a path to the destination. The source then sends a setup request packet over this path to reserve resources. We use simulation to compare our protocol to a simple approach that maintains a f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A delay model for priority classes of FDDI based on M/G/1 with vacations

    Publication Year: 1995, Page(s):568 - 575
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    The classical M/G/1 system with vacations has been used to estimate the mean waiting time of individual priority classes of homogeneous FDDI networks. To faithfully model the FDDI network using M/G/1 system, the vacation interval of the server (token) as seen by individual priority classes must be evaluated. The expressions for the mean waiting time of individual priority classes are functions of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the demand-priority protocol

    Publication Year: 1995, Page(s):369 - 376
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    The demand-priority protocol currently in the process of standardization by IEEE 802.12 aims at supporting interactive multimedia applications by providing a low latency service for high-priority traffic. This goal may be achieved in case of large frames and/or small distances. Otherwise, improvements are required. This paper starts with a brief description of the basic characteristics of the netw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Core selection methods for multicast routing

    Publication Year: 1995, Page(s):638 - 642
    Cited by:  Papers (27)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    Multicast routing is an important topic of both theoretical and practical interest. Several proposed multicast routing algorithms involve the designation of one or more network nodes as the “center” of the routing tree for each multicast group. The choice of this designated router (which we refer to as the “core”) influences the shape of the multicast routing tree, and thus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A burst-oriented traffic control framework for ATM networks

    Publication Year: 1995, Page(s):132 - 139
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (872 KB)

    ATM networks are intended to accommodate all traffic types, including highly bursty traffic. In this paper, we present a traffic control framework for handling bursty traffic on a burst-by-burst basis. The protocol and associated mechanisms are designed to handle bursts of related cells as units. Hence, cells in a burst are forwarded or dropped as a unit. The framework includes mechanisms to allow... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of multi-queue buffered multistage interconnection networks under uniform and nonuniform traffic patterns

    Publication Year: 1995, Page(s):576 - 583
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1072 KB)

    This paper presents a unified model for analyzing multistage interconnection networks with multi-queue buffered strategies. Buffering strategies include SAFC (statically allocated fully connected), SAMQ (statically allocated multi-queue), DAMQ (dynamically allocated multi-queue), and DAFC (dynamically allocated fully connected) schemes. We develop a unified model to evaluate the performance of all... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CMIP to SNMP translation technique based on rule description

    Publication Year: 1995, Page(s):266 - 271
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    The simple network management protocol (SNMP) and the common management information protocol (CMIP) are popular for network management. The integration of these protocols is important because networks are continually expanding and becoming more and more complex. The management information carried by various management protocols is as different as the management protocol. As a consequence of all th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Petri nets analysis of transaction and submitter management protocols in mobile distributed computing environment

    Publication Year: 1995, Page(s):292 - 299
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB)

    This paper proposes and discusses a simulation model of a message and transaction queuing protocol which supports submission of transactions from mobile workstations in a distributed multidatabase environment. The model is based on coloured Petri nets formalism. A hierarchical coloured Petri nets model describing the two key components of the protocol, namely message queuing facility and transacti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Buying and selling computational power over the network

    Publication Year: 1995, Page(s):616 - 619
    Cited by:  Patents (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    Powerful processors and high-bandwidth communications which are available provide a very large amount of cycles at supercomputer speeds. This can serve emerging data-intensive applications which require extremely high data rates. Workstations equipped with such processors are often utilized for a fraction of the time and sit idle otherwise. It may become possible to sell and buy computational powe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call admission control issues in a wireless ATM network

    Publication Year: 1995, Page(s):663 - 666
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    This paper presents call admission control issues for an ATM-based wireless network with mobile hosts. Such wireless ATM networks are motivated by both an increasing demand for mobile capability for future broadband networks and broadband multimedia services for mobile systems. An ATM compatible wireless network capable of supporting a mix of broadband ISDN services is discussed. We present a conc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The deflecting multicast switch

    Publication Year: 1995, Page(s):332 - 338
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    We introduce a novel multicast switching paradigm, the deflecting multicast switch (DMS), which accomplishes the replication and routing functions of a multicast switch simultaneously. The architecture is shown to have low connection complexity and can be implemented in a modular fashion. A self-routing and self-replication algorithm with minimal control overhead is described which allows for dist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS based routeing for ATM networks

    Publication Year: 1995, Page(s):643 - 646
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    The deployment of optical fibers with the emergence of the ATM technology which relies on a virtual call (VC) model is the necessary infrastructure to support modern applications such as multimedia. We propose to extend the classical method for packet switching, namely the distance vector and the link state method to cover these new user requirements. We present an ATM routeing architecture using ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A queueing model for wormhole routing with timeout

    Publication Year: 1995, Page(s):584 - 593
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    In this paper, we propose an analytical model for wormhole routing with the use of a timeout reset mechanism. This model is based on an M/G/1 queueing system with impatient customers and feedback. Some approximations are proposed and verified by simulation. By comparing our analytical results to simulation, we show that the proposed model successfully captures the performance characteristics of wo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On multicasting in a communication network

    Publication Year: 1995, Page(s):647 - 654
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    An important problem in communication networks is to be able to efficiently multicast information to a group of network sites. Multicasting reduces the transmission overhead of the network and the time it takes for all the nodes in the subset to receive the information. Recent advances in network speed, switching technology, and the asynchronous transfer mode (ATM) networks have introduced new app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bidirectional shufflenet: a multihop topology for backpressure flow control

    Publication Year: 1995, Page(s):74 - 81
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB)

    The traditional shufflenet multihop virtual topology for optical networks does not provide easy support for backpressure flow control on a hop-by-hop basis. In the context of an optical backbone network interconnecting high speed electronic LANs that use wormhole routing, as in the Supercomputer SuperNet (SSN) project, hop-by-hop flow control is required in the optical network to eliminate losses ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel assignment to distinct identities in arbitrary networks

    Publication Year: 1995, Page(s):475 - 478
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    The first sequential distributed algorithm (SDA) presented to assign distinct identities to nodes in distributed systems uses the depth-first search, and requires O(n2) in communication and time complexities, where n is the number of nodes in distributed system. We present a parallel distributed algorithm (PDA) to improve the time complexity in synchronous distributed systems. This algo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling for quality of service guarantees via service curves

    Publication Year: 1995, Page(s):512 - 520
    Cited by:  Papers (43)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    We propose a new scheduling policy, called SCED (service curve-based earliest deadline first), which provides guarantees to virtual circuits in packet-switched networks. This scheduling policy is developed for a general framework for service provisioning based on service curves proposed by Cruz (1992). Instead of explicitly guaranteeing a specific quality of service measure, such as maximum delay,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network management and system-level diagnosis

    Publication Year: 1995, Page(s):280 - 283
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    Fault management, which consists of fault detection, diagnosis, and recovery is one of the key goals of network management. We consider an application of system-level diagnosis concepts to the problem of fault diagnosis in networks. Since the primary function of the nodes in a communication network is to route messages, the diagnosis is done with respect to the ability of the nodes to accomplish r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dual-hop LANs using station wavelength routing

    Publication Year: 1995, Page(s):622 - 629
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    In future WDM local area networks, the number of available wavelengths may initially be fairly modest. As a result, spatial reuse is required in order to obtain designs which will support a reasonable number of stations. A dual-hop architecture is considered. The network is partitioned into two stages. In the first, the wavelength agility of the user stations is used to route packets from a given ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to encourage cheating with virtual path policing in ATM networks

    Publication Year: 1995, Page(s):225 - 228
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    This paper evaluates the concept of virtual path (VP) policing as an alternative to virtual channel (VC) policing in an asynchronous transfer mode (ATM) Ethernet network. The usage parameter control (UPC) function includes a peak rate and a sustainable rate policer. Both policers are implemented based on the leaky bucket algorithm defined by the ATM Forum. We implement VC and VP policers in parall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.