By Topic

Proceedings of LCN - 21st Annual Conference on Local Computer Networks

13-16 Oct. 1996

Filter Results

Displaying Results 1 - 25 of 62
  • 21st IEEE Conference on Local Computer Networks

    Publication Year: 1996, Page(s):iii - x
    Request permission for commercial reuse | PDF file iconPDF (521 KB)
    Freely Available from IEEE
  • Proceedings of LCN - 21st Annual Conference on Local Computer Networks

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • Characterization and control of highly correlated traffic in high speed networks

    Publication Year: 1996, Page(s):19 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB)

    By assuming network traffic to be independent from each other, the analysis of network performance can be simplified. However, the real traffic sources may have some correlation which makes their behavior tend to converge or diverge. This phenomenon has a tremendous influence on congestion control. In this paper, we explain the possible reasons for correlated behavior, namely, top-down and client-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The effects of data locality on FDDI-based schemes at gigabit speeds

    Publication Year: 1996, Page(s):12 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    This paper explores the effects of locality on the performance of a FDDI-based multinetworking environment and compares this to a scaled FDDI approach. Both of these schemes have been presented to the Standards Committee for consideration in migrating the FDDI protocols to gigabit speeds. One is a simple linear scaling (10×) of the FDDI protocol to reach the gigabit speed, and the second, pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security in high speed networks

    Publication Year: 1996, Page(s):2 - 11
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (976 KB)

    There is a growing interest in the development of broadband services and networks for commercial use in both local area and wide area networks. In particular, connectionless switched multimegabit data service (SMDS) and connection-oriented frame relay based broadband services an being offered by a number of major operators in the US and Europe. This paper considers the issues that need to be addre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing video conferencing for the mobile user

    Publication Year: 1996, Page(s):526 - 534
    Cited by:  Papers (4)  |  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1120 KB)

    This paper describes how video conferences can be provided across fixed and mobile networks. Using video conference systems employed today on fixed networks as a starting point, solutions are proposed how to extend these services to cover the requirements imposed by wireless networks. A layered architecture of an appropriate video mobility gateway is described which allows the transmission of vide... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An error-control scheme for a multicast protocol based on round-trip time calculations

    Publication Year: 1996, Page(s):212 - 221
    Cited by:  Papers (1)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1000 KB)

    In contrast to traditional one-to-one applications, distributed multimedia applications are based on communication scenarios that involve huge but often limited groups of participants. In general, tele-teaching and virtual reality scenarios require multicasting capabilities that have to deal with reliable data, e.g., simulation data, in addition to isochronous data, e.g., audio or video, that allo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobility modeling in cellular communication networks

    Publication Year: 1996, Page(s):518 - 525
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    We develop a simple and general analytical model for cellular communication networks performance evaluation. The model assumes a finite population of mobiles moving in a finite set of cells. Such a model allows one to evaluate the effects, on system performance, of the following factors: fixed channel allocation (FCA) criteria, load of the users, mobility and distribution of users among cells. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable multicasting in the Xpress transport protocol

    Publication Year: 1996, Page(s):202 - 211
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (968 KB)

    The Xpress transport protocol (XTP) is designed to meet the needs of distributed, real-time, and multimedia systems. This paper describes the genesis of recent improvements to XTP that provide mechanisms for reliable management of multicast groups, and gives details of the mechanisms used View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of a robust WDM network with token based reservations and a limited number of lasers at a station

    Publication Year: 1996, Page(s):508 - 516
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    The performance of a symmetric robust WDM network that uses token-passing on the signaling channel and has a limited number of lasers per station is modeled and analyzed for circuit-switched connections. Robust WDM networks use a reservation interval during which all stations cease their WDM transmissions so that the station holding the token may establish a connection with its intended destinatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating performance of high-speed and long distance communications on HIPPI-ATM networks

    Publication Year: 1996, Page(s):424 - 432
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    This paper describes the flow-control performance in a HIPPI-ATM conversion system defined by ANSI. The influence of the transmission distance and new-credit sending interval are respectively evaluated by simulation for conversion between an 800-Mbit/s HIPPI interface and a 622-Mbit/s ATM interface. In order to assume an optimum new-credit sending interval, we also derive analytical expressions fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance study of multicast routing algorithms for ATM networks

    Publication Year: 1996, Page(s):191 - 201
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (996 KB)

    This paper addresses the problem of multicast routing in ATM networks. Formal experimental methods are used to evaluate the relative performance of three simple multicast routing algorithms on simple mesh-based networks, using call-level simulation. The performance study focuses on the scalability of multicast routing algorithms with respect to network size, the level of multicast traffic on the n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interval-based real-time transmission control

    Publication Year: 1996, Page(s):161 - 170
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB)

    Existing cell switched and packet switched transmission systems have difficulties to support real-time data transfer because the queueing characteristics and load variations in the network nodes are a handicap for it. With our interval-based output buffer transmission control method the data stream behavior is regulated in each network node and a data stream dependent time parameter adjustment is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and implementation of a multicast real-time multimedia protocol

    Publication Year: 1996, Page(s):136 - 142
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB)

    Many multimedia applications require guaranteed quality of service (QoS) in communication networks. Typically, the QoS includes bandwidth, delay, and delay jitter. This paper presents a real-time protocol to support multimedia communications in which the connections are established with efficient resource reservation and proper admission control. During data transmission, the rate, jitter control,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new multihop lightwave network based on the generalized De-Bruijn graph

    Publication Year: 1996, Page(s):498 - 507
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (968 KB)

    Lightwave networks can be built by embedding virtual topologies over physical topologies. The optical passive star enables such embeddings easily. The Shuffle-net and the De-Bruijn graph are two popular virtual topologies proposed in the past for lightwave networks. Both however suffer from a lack of flexibility in scaling network sizes. We present a generalization of the De-Bruijn network which o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A class-chest for deriving transport protocols

    Publication Year: 1996, Page(s):106 - 115
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (820 KB)

    The development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they an intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the foc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Destination buffering for low-bandwidth audio transmissions using redundancy-based error control

    Publication Year: 1996, Page(s):345 - 354
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (872 KB)

    Digital audio is becoming increasingly prevalent with the advent of software for Internet telephony and real-time audio playback for World Wide Web browsers. Since audio quality depends on timely delivery of the packet stream, protocol mechanisms must address the control of delays and packet losses in an integrated fashion. Two critical mechanisms for high-quality audio delivery are the receiver b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative study of numerical and heuristic approaches to calculation of sustainable cell rate

    Publication Year: 1996, Page(s):289 - 294
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    This paper highlights the comparative advantages of a novel numerical method for the calculation of the sustainable cell rate (SCR) parameter in ATM networks. The proposed algorithm is suited to the performance analysis of a leaky bucket (LB) fed with a wide range of discrete traffic sources, including Markov modulated Bernoulli processes (MMBP) and general on-off source models. The alternative ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and regulation of host traffic in ATM networks

    Publication Year: 1996, Page(s):458 - 467
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (880 KB)

    For any connection admission control (CAC) algorithm to work correctly and efficiently, accurate information of the traffic flow out of the host systems is required. We develop several approximation approaches for modeling the traffic flows of hard real-time connections. We show that without accurate traffic characterization, the CAC algorithm may do either of the following: (1) admit connections ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and performance evaluation of network interconnection architectures

    Publication Year: 1996, Page(s):414 - 423
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB)

    The performance of two protocol architectures, which are often used in gateways connecting LANs (local area network) or HSNs (high speed network), is studied. The vertical views of both protocol stacks are given and two queueing network models with feedback for both protocol stacks are developed, where each queue represents a protocol layer. The arrival, service and output processes of each queue ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fuzzy policing mechanism for still picture in ATM networks

    Publication Year: 1996, Page(s):40 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    The asynchronous transfer mode (ATM) technique has been accepted as a basis for the future B-ISDN networks. In ATM networks, all information is packetized and transferred in small packets of fixed length, called cells. The packetized information transfer, without flow control between the user and the network and the use of statistical multiplexing, results in the need of a policing mechanism to co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A proposal of flow control mechanism for multicast ABR and its performance

    Publication Year: 1996, Page(s):182 - 190
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB)

    One of the functions that should be provided in ATM LANs is multicast communication. For multicast communication on ATM LANs, the architecture of the switch fabric and protocols for signaling have been studied. However, when data communication using a multicast connection such as a LAN emulation service which expects the high throughput is provided, ABR (available bit rate) service on a multicast ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance studies of transmitting real-time MPEG-I video in ATM networks

    Publication Year: 1996, Page(s):153 - 160
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    This paper presents a performance study of ATM networks in the support of real-time MPEG-I video transmission. Multiple classes of MPEG-I are used in the study and what makes this simulation study different from the others is the video data used. These data are captured from real video programmes and we categorized these video clips according to their workload characteristics. The performance of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Timer based burst mode protocol for high speed networks

    Publication Year: 1996, Page(s):126 - 133
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB)

    We propose a variant of the IEEE 802.12 demand priority protocol, the timer based burst mode (TB) protocol in which an end system is allowed to transmit a burst of frames per request. The selection of the request is on the basis of the time it arrives at the hub port. A grant from the hub has a burst size associated with it. An end system is allowed to transmit as long as its burst quota is not qu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A gracious cell discard scheme in ATM multiplexer

    Publication Year: 1996, Page(s):474 - 483
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB)

    An analytical model for the gracious cell discard (GCD) control of a finite capacity queue in ATM output multiplexer is proposed. We put a gracious cell throttle (GCT) in front of a queue (main queue: MQ). The GCT is composed of a temporary queue (TQ) and a nonlinear filter (NLF). In every time slot, a burst of cells composed of HP (high priority) and LP (low priority) arrives. Cells are classifie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.