Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

Proceedings of LCN - 21st Annual Conference on Local Computer Networks

13-16 Oct. 1996

Filter Results

Displaying Results 1 - 25 of 62
  • 21st IEEE Conference on Local Computer Networks

    Publication Year: 1996, Page(s):iii - x
    Request permission for commercial reuse | PDF file iconPDF (521 KB)
    Freely Available from IEEE
  • Proceedings of LCN - 21st Annual Conference on Local Computer Networks

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • Security in high speed networks

    Publication Year: 1996, Page(s):2 - 11
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (976 KB)

    There is a growing interest in the development of broadband services and networks for commercial use in both local area and wide area networks. In particular, connectionless switched multimegabit data service (SMDS) and connection-oriented frame relay based broadband services an being offered by a number of major operators in the US and Europe. This paper considers the issues that need to be addre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A gracious cell discard scheme in ATM multiplexer

    Publication Year: 1996, Page(s):474 - 483
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB)

    An analytical model for the gracious cell discard (GCD) control of a finite capacity queue in ATM output multiplexer is proposed. We put a gracious cell throttle (GCT) in front of a queue (main queue: MQ). The GCT is composed of a temporary queue (TQ) and a nonlinear filter (NLF). In every time slot, a burst of cells composed of HP (high priority) and LP (low priority) arrives. Cells are classifie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An experimental ATM-based video-on-demand system on a Macintosh platform

    Publication Year: 1996, Page(s):59 - 68
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1084 KB)

    Video-on-demand (VOD) systems can support multiple concurrent video accesses with guaranteed user-controlled quality of service (QoS). The growth of VOD systems is driven by the increasing need for distributed multimedia applications such as company training, distance learning, telemedicine, and home entertainment. We propose and demonstrate an ATM-based (asynchronous transfer mode) VOD system (in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing a virtual access control configuration protocol for implementation over ISDN and shared-media networks

    Publication Year: 1996, Page(s):116 - 125
    Cited by:  Papers (1)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (852 KB)

    The encroachment of digital technology into our lifestyle and corporate environment has given rise to the need for individuals to safeguard personal information, and for organizations to protect trade-secret information either stored in computers or transmitted over LANs and WANs. A secure network and communication environment requires the services of encryption mechanisms, user password authentic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fuzzy policing mechanism for still picture in ATM networks

    Publication Year: 1996, Page(s):40 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    The asynchronous transfer mode (ATM) technique has been accepted as a basis for the future B-ISDN networks. In ATM networks, all information is packetized and transferred in small packets of fixed length, called cells. The packetized information transfer, without flow control between the user and the network and the use of statistical multiplexing, results in the need of a policing mechanism to co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of a robust WDM network with token based reservations and a limited number of lasers at a station

    Publication Year: 1996, Page(s):508 - 516
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    The performance of a symmetric robust WDM network that uses token-passing on the signaling channel and has a limited number of lasers per station is modeled and analyzed for circuit-switched connections. Robust WDM networks use a reservation interval during which all stations cease their WDM transmissions so that the station holding the token may establish a connection with its intended destinatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software distribution by reliable multicast

    Publication Year: 1996, Page(s):222 - 231
    Cited by:  Papers (1)  |  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (984 KB)

    Network layer protocols such as the Internet protocol (IP) offer an unreliable, best-effort multicast datagram service in internetworks. In order to use this point-to-multipoint communication service for the software update of peripheral file servers, it has to be enhanced to guarantee a reliable delivery of files. While many other multicast applications have less stringent reliability requirement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Universal packet time slot-a new paradigm of designing an ATM switch

    Publication Year: 1996, Page(s):468 - 473
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    The objective of this paper is to provide a different angle of a view to relieve the stringent requirements of an electronic device in designing very high speed packet switching. This facet of the view is based on two facts; the fact that, there is a significant difference between the transmission speed offered by the lightwave technology and the processing speed of an electronic switching device,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of the binary logarithmic arbitration method (BLAM)

    Publication Year: 1996, Page(s):396 - 403
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    The binary logarithmic arbitration method (BLAM) is currently under review by the IEEE 802.3 standards committee for possible standardization. BLAM is a new arbitration algorithm for Ethernet that is backwards compatible with the existing binary exponential backoff (BEB) algorithm. Simulation models of BEB and BLAM are developed. Using these models, four experiments evaluating BEB and BLAM under o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and implementation of a multicast real-time multimedia protocol

    Publication Year: 1996, Page(s):136 - 142
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB)

    Many multimedia applications require guaranteed quality of service (QoS) in communication networks. Typically, the QoS includes bandwidth, delay, and delay jitter. This paper presents a real-time protocol to support multimedia communications in which the connections are established with efficient resource reservation and proper admission control. During data transmission, the rate, jitter control,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The multimedia gateway: an evolution towards switched video services

    Publication Year: 1996, Page(s):54 - 58
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    We present the multimedia gateway solution which represents an evolutionary approach for providing a natural migration to digital switched video services. We also present some initial analysis reflecting performance issues for a multimedia gateway View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Back-pressure buffering scheme to improve the cell loss property on the output buffered ATM switch

    Publication Year: 1996, Page(s):242 - 248
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    We have studied back-pressure buffering mechanisms to improve the cell loss property in output buffered ATM switches. In order to minimize the cell loss in an output buffer, the back-pressure buffering mechanism pressures the transmission of input cells to the switch fabric according to the load status of the output buffer. We have studied and proposed two back-pressure buffering mechanisms; one i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and performance evaluation of network interconnection architectures

    Publication Year: 1996, Page(s):414 - 423
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB)

    The performance of two protocol architectures, which are often used in gateways connecting LANs (local area network) or HSNs (high speed network), is studied. The vertical views of both protocol stacks are given and two queueing network models with feedback for both protocol stacks are developed, where each queue represents a protocol layer. The arrival, service and output processes of each queue ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural-network-based call admission control in ATM networks with heterogeneous arrivals

    Publication Year: 1996, Page(s):259 - 266
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    Call admission control (CAC) has been accepted as a potential solution for supporting diverse, heterogeneous traffic sources demanding different quality of services in asynchronous transfer mode (ATM) networks. Besides, CAC is required to consume a minimum of time and space to make call acceptance decisions. We present an efficient neural-network-based CAC (NNCAC) mechanism for ATM networks with h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A proposal of flow control mechanism for multicast ABR and its performance

    Publication Year: 1996, Page(s):182 - 190
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB)

    One of the functions that should be provided in ATM LANs is multicast communication. For multicast communication on ATM LANs, the architecture of the switch fabric and protocols for signaling have been studied. However, when data communication using a multicast connection such as a LAN emulation service which expects the high throughput is provided, ABR (available bit rate) service on a multicast ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A class-chest for deriving transport protocols

    Publication Year: 1996, Page(s):106 - 115
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (820 KB)

    The development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they an intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the foc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A systematic approach to design the network-based learning environment for home and office

    Publication Year: 1996, Page(s):335 - 344
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1056 KB)

    An effective network-based learning environment provides synchronous and asynchronous education to learners who are physically, remote from or opt to telecommute to the base location of instruction. The environment provides content creation, user registration, course material storage, multiple delivery means, and end-user viewing tools. An intriguing aspect of the environment is how to model a lec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient buffering techniques for deflection routing in high speed networks

    Publication Year: 1996, Page(s):28 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    Deflection routing is a simple, decentralized, and adaptive routing methodology for communication networks. We focus on deflection routing in the Benes network. Since deflection routing forces packets to take multiple paths to the destination, packets may arrive out of sequence. This requires the use of a reassembly window at the destination. We estimate the effect of a finite reassembly window on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new multihop lightwave network based on the generalized De-Bruijn graph

    Publication Year: 1996, Page(s):498 - 507
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (968 KB)

    Lightwave networks can be built by embedding virtual topologies over physical topologies. The optical passive star enables such embeddings easily. The Shuffle-net and the De-Bruijn graph are two popular virtual topologies proposed in the past for lightwave networks. Both however suffer from a lack of flexibility in scaling network sizes. We present a generalization of the De-Bruijn network which o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interval-based real-time transmission control

    Publication Year: 1996, Page(s):161 - 170
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB)

    Existing cell switched and packet switched transmission systems have difficulties to support real-time data transfer because the queueing characteristics and load variations in the network nodes are a handicap for it. With our interval-based output buffer transmission control method the data stream behavior is regulated in each network node and a data stream dependent time parameter adjustment is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An error-control scheme for a multicast protocol based on round-trip time calculations

    Publication Year: 1996, Page(s):212 - 221
    Cited by:  Papers (1)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1000 KB)

    In contrast to traditional one-to-one applications, distributed multimedia applications are based on communication scenarios that involve huge but often limited groups of participants. In general, tele-teaching and virtual reality scenarios require multicasting capabilities that have to deal with reliable data, e.g., simulation data, in addition to isochronous data, e.g., audio or video, that allo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of ATM switches with multistage packet switching interconnection networks

    Publication Year: 1996, Page(s):94 - 101
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    A mathematical method for analysis of ATM switches based on multistage packet switching interconnection networks with finite buffering capacity at the output of switching elements is presented. The proposed mathematical method is general in that it analyzed ATM switches under uniform and nonuniform traffic with blocking. The existing methods for analysis of ATM switches with buffered interconnecti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and regulation of host traffic in ATM networks

    Publication Year: 1996, Page(s):458 - 467
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (880 KB)

    For any connection admission control (CAC) algorithm to work correctly and efficiently, accurate information of the traffic flow out of the host systems is required. We develop several approximation approaches for modeling the traffic flows of hard real-time connections. We show that without accurate traffic characterization, the CAC algorithm may do either of the following: (1) admit connections ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.