Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

[1992] Proceedings 17th Conference on Local Computer Networks

13-16 Sept. 1992

Filter Results

Displaying Results 1 - 25 of 80
  • Performance analysis of ATM/DQDB interworking

    Publication Year: 1992, Page(s):42 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    The cell loss ratio and cell delay variation of a distributed-queue dual-bus (DQDB) network receiving traffic from a number of asynchronous transfer mode (ATM) connections are considered. Every connection carries either connection oriented or connectionless traffic. In the analysis of the access to the bus, it is shown that consecutive service times of the local access queue are correlated. Two mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proceedings. 17th Conference on Local Computer Networks (Cat. No.92TH0473-9)

    Publication Year: 1992
    Request permission for commercial reuse | PDF file iconPDF (6 KB)
    Freely Available from IEEE
  • An integrated video/voice/data protocol using distributed priority change

    Publication Year: 1992, Page(s):532 - 540
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB)

    As a media access control (MAC) protocol for integrated services on a high-speed LAN, the distributed priority change (DPC) protocol is proposed. DPC supports synchronous voice/video service and asynchronous data service. To support synchronous service, it is necessary to guarantee periodic access to the network with a small delay variation. This requirement is met by alternating between the synch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for isochronous traffic in a WDM star network

    Publication Year: 1992, Page(s):541 - 547
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    A new access protocol that handles isochronous traffic in a much better way than previous protocols for wavelength division multiplexing (WDM) star networks is presented. This protocol allows the stations to reserve part of the bandwidth for their isochronous traffic while the rest is used for asynchronous traffic. In addition, this technique requires only one transmitter and one receiver per stat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural brouter for network interconnections: MS-net interconnects DQDB-nets

    Publication Year: 1992, Page(s):404 - 413
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    The performance of interconnected distributed-queue dual-bus (DQDB) networks is studied while the Manhattan street network (MSN) is being used as the backbone architecture with neural brouters as its nodes. It is interesting to note that, since the MSN topology is logically equivalent to a multichannel ring network, it may be easily adapted to operate as a token ring-of course, with multiple token... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advances in hard real-time communication with local area networks

    Publication Year: 1992, Page(s):548 - 557
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (988 KB)

    Recent developments in real-time communications in local-area networks are reviewed. Issues relating to the transmission of both synchronous and asynchronous messages are examined. Priority-driven protocols, global reservation protocols, and protocols with bounded access times are discussed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time communication in local area ring networks

    Publication Year: 1992, Page(s):416 - 425
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    The feasibility of using buffered transmission, which has the advantages of eliminating the token passing overhead and relieving the network interface from the complex token handling operations, is considered. The concept of a real-time channel (RTC) and the RTC establishment procedures are reviewed. Its performance is then compared with the FDDI timed token protocol. Simulation results show that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience with an XTP implementation for embedded systems

    Publication Year: 1992, Page(s):586 - 592
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    An implementation of the XTP protocol is discussed relative to the embedded systems environment. An overview of the embedded system architecture and unique design constraints is followed by a description of the protocol development environment. The original development approach is presented with a critique based on experience thus far. Embedded system implementation and protocol development issues... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A general architecture for services management in a DQDB MAN

    Publication Year: 1992, Page(s):62 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    The CCITT has defined the reference architecture for general network management, called telecommunication network management (TNM), as a logical definition and partition of functionalities. The TNM is assumed as a guideline, and a proposal for metropolitan area network (MAN) management in a public and private environment is examined. Such a hierarchical architecture is presented in a multiservices... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia over FDDI

    Publication Year: 1992, Page(s):110 - 124
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (924 KB)

    Issues in multimedia networking over the fiber distributed data interface (FDDI) and simulation results demonstrating the feasibility of multimedia over FDDI are discussed. Previous work in this field has concentrated on the asynchronous channel in FDDI. Other examinations of the FDDI synchronous channel have applied bursty traffic to the synchronous channel. Multimedia traffic is typically stream... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple protocol network integration: a case study in internetworking with IP/IPX

    Publication Year: 1992, Page(s):560 - 567
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    The coexistence of Internet protocol (IP) and internetwork packet exchange (IPX) traffic on the same workstation is investigated. A case study of selected commercial and public domain software is presented along with many considerations in selecting a solution model for integration. While these solutions work well in a single subnet environment, integrating several departmental LANs through router... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of multiple-ring networks for real-time communications

    Publication Year: 1992, Page(s):426 - 435
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    The results of a simulation study in which the real-time performances of a high-speed token ring network and a multiple-ring network were compared are described. The medium access protocols and the interconnection topologies of the multiple-ring network evaluated are discussed. The characteristic of the workload used in this simulation experiment is described. The simulation results are given View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of excessive frame loss on scanning tree reconfiguration

    Publication Year: 1992, Page(s):319 - 325
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    The effects of excessive frame loss (presumably due to media speed mismatches and/or heavy congestion) on the frequency of spanning tree reconfiguration are examined. Assuming that the losses of successive bridge protocol data units (BPDUs) are independent, general formulas for the mean time and transient probability of a single node initiating spanning tree reconfiguration (due to loss of success... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated system of modelling, analysis and simulation for real-time networks

    Publication Year: 1992, Page(s):231 - 240
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    A prototype workstation, called communication protocol analyzer and simulator system (CPASS), aimed at the modeling, verification, analysis, and simulation for real-time networks by means of a formal and automated approach is presented. The system is based on an extended finite state machine model, called SDLN (a variant of SDL). It is composed of six components: network topology editor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A class of MAC protocols for sharing ATM local access PONs

    Publication Year: 1992, Page(s):594 - 602
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    The cost of a dedicated fiber access to the B-ISDN is too high for small business and residential customers, necessitating some form of resource sharing. Combining ATM over a passive optical network (APON) with a suitable medium access control (MAC) protocol can provide significant cost savings and a reasonable bandwidth. In this way, this customer section can also enjoy introduction of broadband ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HIPPI [high performance parallel interface]

    Publication Year: 1992, Page(s):346 - 354
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    The HIPPI data channel and how it is used from a standard data channel, a standard internetworking, and a standard protocol viewpoint are described. Performance is also briefly discussed, as are some existing implementations of switches and other HIPPI realizations View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analysis and simulation of multiple ring token networks

    Publication Year: 1992, Page(s):649 - 657
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    An analysis and simulation results for multiple token ring networks are presented. The analysis of multiple-ring networks by Q. Yang et al. (1986) is generalized. Closed-form solutions are presented for the token interarrival time and the probability that a station will transmit when a free token arrives, for any packet length or arrival rate, while load is <1. These solutions are compared with... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance and traffic characterization of a class of graphics-intensive X-applications

    Publication Year: 1992, Page(s):198 - 205
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    The traffic generated by a class of graphics-intensive X Window System applications is characterized, and the effects the hardware processing platform has on the characteristics of the generated traffic are studied. The effect of running graphics-intensive applications on network performance is examined, and the network capabilities and limitations are determined. The experimental results show tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A modified QA (queued arbitrated) protocol for improving performances in DQDB MAN

    Publication Year: 1992, Page(s):70 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    The queued-arbitrated (QA) protocol of the distributed queue dual bus (DQDB) has several drawbacks, such as unfairness of access opportunities and inefficiency of priority scheme in the multipriority environment. A modified version of the basic distributed queuing algorithm is presented to solve these problems. Simulation results indicate that the proposed strategy provides fairer access opportuni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some lessons learned from the practical experience using MANs

    Publication Year: 1992, Page(s):14 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    An attempt is made to define a metropolitan area network (MAN) from a practical point of view, and the advantages and disadvantages of a public MAN and a private MAN are compared. Some discussion on the MAN's goals, strategies, technologies, and markets is offered related to MANs and the probable evolution to broadband integrated services digital network (B-ISDN), while broadband communication is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The new high-speed digital signature

    Publication Year: 1992, Page(s):262 - 271
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB)

    The digital signature is an ideal mechanism for authenticating with computer-generated messages. Recently, as enhanced network services have developed, the importance of a high-speed digital signature has become apparent. Previously, the best secure scheme of knowing digital signature systems has been RSA. However, this scheme has a problem in that the processing speed for generating signature mes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dual MAC usage in FDDI

    Publication Year: 1992, Page(s):125 - 132
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    Two possible applications of dual ring use in the fiber distributed data interface (FDDI) are described. First, a straightforward mechanism of load sharing on the MAC layer based on the assumption of a homogeneous dual MAC network is discussed. Second, the TCP/IP sublayer DMARP (dual MAC ARP) is introduced. This sublayer supports dual MAC operations in inhomogeneous FDDI networks. A way towards th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On performance measurements of TCP/IP and its device driver

    Publication Year: 1992, Page(s):568 - 575
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    A performance measurement of the processing overhead of TCP/IP on personal computers interconnected by Ethernet is given. In this measurement of the processing overhead comes from TCP and the Ethernet device driver. For TCP, a large portion of the overhead comes from the checksum computation. Almost all overhead of the lower layer comes from moving data from the main memory to the Ethernet card. H... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A network level fractional channel to support guaranteed real-time communication

    Publication Year: 1992, Page(s):436 - 445
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB)

    A network-level abstraction called φ-channel that supports the requirements of real-time applications is proposed. A φ-channel represents a simplex, end-to-end communication channel between a source and a destination. The channel is characterized by a set of specific performance parameters associated with its traffic, namely packet maximum end-to-end delay and the maximum number of packets... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical SMDS demonstrations

    Publication Year: 1992, Page(s):300 - 309
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (872 KB)

    The switched multi-megabit data service (SMDS) is a high-performance, public, packet-switched data service. Offered as public network equivalent of a MAC-level service, the datagram transport offered by SMDS is easily integrated into networking protocol architectures using local area network (LAN) or metropolitan area network (MAN) technologies such as Ethernet and fiber distributed data interface... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.