By Topic

[1992] Proceedings 17th Conference on Local Computer Networks

13-16 Sept. 1992

Filter Results

Displaying Results 1 - 25 of 80
  • Performance analysis of ATM/DQDB interworking

    Publication Year: 1992, Page(s):42 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    The cell loss ratio and cell delay variation of a distributed-queue dual-bus (DQDB) network receiving traffic from a number of asynchronous transfer mode (ATM) connections are considered. Every connection carries either connection oriented or connectionless traffic. In the analysis of the access to the bus, it is shown that consecutive service times of the local access queue are correlated. Two mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proceedings. 17th Conference on Local Computer Networks (Cat. No.92TH0473-9)

    Publication Year: 1992
    Request permission for commercial reuse | PDF file iconPDF (6 KB)
    Freely Available from IEEE
  • Some lessons learned from the practical experience using MANs

    Publication Year: 1992, Page(s):14 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    An attempt is made to define a metropolitan area network (MAN) from a practical point of view, and the advantages and disadvantages of a public MAN and a private MAN are compared. Some discussion on the MAN's goals, strategies, technologies, and markets is offered related to MANs and the probable evolution to broadband integrated services digital network (B-ISDN), while broadband communication is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of excessive frame loss on scanning tree reconfiguration

    Publication Year: 1992, Page(s):319 - 325
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    The effects of excessive frame loss (presumably due to media speed mismatches and/or heavy congestion) on the frequency of spanning tree reconfiguration are examined. Assuming that the losses of successive bridge protocol data units (BPDUs) are independent, general formulas for the mean time and transient probability of a single node initiating spanning tree reconfiguration (due to loss of success... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Infrared wireless system for high speed RS-232/RS-423/RS-422 communications

    Publication Year: 1992, Page(s):505 - 510
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    The design and implementation of a RS-232/RS-423/RS-422 (115200-Bd) modem which uses a wireless infrared link are discussed. This kind of system presents some advantages over the conventional cable systems or radio systems. When IREDs are used, the radiation is negligible for the users and harmless. These systems can be used to link two buildings (point-to-point) or to avoid cables inhouse environ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An effective bit rate/table lookup based admission control algorithm for the ATM B-ISDN

    Publication Year: 1992, Page(s):20 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    A simple, highly flexible admission control algorithm for ATM-based B-ISDN, known as the effective-bit-rate/table-lookup (EBR/TL) method, is proposed. An EBR method works by allocating bandwidth using a percentage, a(0<a⩽100%), and multiplying this percentage by the traffic source's peak rate to yield the amount of bandwidth to allocate to a new connection. EBR percentages... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sensitivity of the objective functions for joint flow control and optimal routing in computer networks

    Publication Year: 1992, Page(s):326 - 334
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    The implementation of a combined flow control and optimal routing algorithm in packet switched networks is discussed. An analysis is made of the influence of various objective functions on maximum link utilization, average packet delay and fairness. How the parameters in the proposed objective function affect network performance measures like the flow in the entire network, amount of rejected traf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digitized voice distribution using XTP and FDDI

    Publication Year: 1992, Page(s):456 - 465
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB)

    The feasibility of distributing digitized voice over FDDI using the Xpress Transfer Protocol (XTP) is examined. The requirements of such a system, the role of a communications protocol, and the overall experimental design are studied. A basic configuration is developed to measure the system throughput, latency, and jitter, and from these data the number of voice channels that a given configuration... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A computer graphics package for indoor radio channel simulation using a 2D ray tracing algorithm

    Publication Year: 1992, Page(s):511 - 518
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    A graphical user interface program that uses a ray tracing algorithm to predict the radio propagation in the indoor radio channel from the layout of the floor plan is presented. The program allows the user to interactively specify the location of the walls in the floor plan, the type of material in the construction, and the location of the radio transmitter and receiver. The ray tracing algorithm ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated system of modelling, analysis and simulation for real-time networks

    Publication Year: 1992, Page(s):231 - 240
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    A prototype workstation, called communication protocol analyzer and simulator system (CPASS), aimed at the modeling, verification, analysis, and simulation for real-time networks by means of a formal and automated approach is presented. The system is based on an extended finite state machine model, called SDLN (a variant of SDL). It is composed of six components: network topology editor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The concept of fairness and a GFC protocol

    Publication Year: 1992, Page(s):30 - 35
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    Multiple access to a single user-network interface (UNI) is a cost-effective solution for the provision of B-ISDN services in customer premises. In a multiple access configuration, a fairly shared access must ensure that each terminal will get a guaranteed bandwidth to provide an acceptable quality of service (QoS) and that the allocation of the remaining bandwidth will result in the same improvem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A parallel router architecture for high speed LAN internetworking

    Publication Year: 1992, Page(s):335 - 344
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    A parallel router architecture for processing network-layer protocols at FDDI (fiber distributed data interface) speeds is proposed. At high speeds the computing power of existing routers becomes the performance bottleneck (for processing small frame sizes). Hence, a completely different approach is required in designing a router. The opportunities of parallel processing in a network protocol are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience with an XTP implementation for embedded systems

    Publication Year: 1992, Page(s):586 - 592
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    An implementation of the XTP protocol is discussed relative to the embedded systems environment. An overview of the embedded system architecture and unique design constraints is followed by a description of the protocol development environment. The original development approach is presented with a critique based on experience thus far. Embedded system implementation and protocol development issues... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CIMNET: a prototype network for time critical applications in the factory

    Publication Year: 1992, Page(s):466 - 472
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    A network based on a reduced protocol profile is well suited for industrial applications that require cheap and fast communications. A pilot project whose aim is to demonstrate the practical feasibility of such an environment is presented. The implementation approach is described, pointing out the advantages coming from the solution adopted, which is based on the availability of multiple processes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a protocol controller for wireless information networks

    Publication Year: 1992, Page(s):519 - 524
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    A protocol controller has been designed and is being fabricated to handle the data link communication functions between the Mobile Switching Center (MSC) and the Base Station System (BSS) in the Groupe Special Mobile (GSM) wireless information networks. The protocol implemented by the protocol controller is a subset of the signaling link functions (level 2) of the Message Transfer Part (MTP) in th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LRU-based replication strategies in a LAN remote caching architecture

    Publication Year: 1992, Page(s):244 - 253
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    For LAN environments, a simple modification of the LRU replacement algorithm is proposed. By limiting the number of object replicas, the algorithm can substantially improve LRU performance over a wide range of parameters. The relatively simple LAN topology implies that much less state information need be available for good replacement decisions, compared to general network topologies View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High level traffic analysis of a LAN segment

    Publication Year: 1992, Page(s):188 - 197
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB)

    A data collection and analysis study of packet traffic over a local area network is reported. The objectives of this study are to develop analysis tools to isolate the effect of each protocol, and eventually each application. The measurements of the LAN are made using a raw Ethernet packet capture program (tcpdump) running on a Sun workstation. The analysis was accomplished using a PERL script and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • B-ISDN customer network management framework

    Publication Year: 1992, Page(s):36 - 41
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    Two alternative customer network management (CNM) access configurations for the user's network management station to access a public carrier's CNM system using the simple network management protocol (SNMP) are described. In addition, a management information base containing UNI management information is developed along with CNM service capabilities that enable permanent virtual connection (PVC) se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia over FDDI

    Publication Year: 1992, Page(s):110 - 124
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (924 KB)

    Issues in multimedia networking over the fiber distributed data interface (FDDI) and simulation results demonstrating the feasibility of multimedia over FDDI are discussed. Previous work in this field has concentrated on the asynchronous channel in FDDI. Other examinations of the FDDI synchronous channel have applied bursty traffic to the synchronous channel. Multimedia traffic is typically stream... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A general architecture for services management in a DQDB MAN

    Publication Year: 1992, Page(s):62 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    The CCITT has defined the reference architecture for general network management, called telecommunication network management (TNM), as a logical definition and partition of functionalities. The TNM is assumed as a guideline, and a proposal for metropolitan area network (MAN) management in a public and private environment is examined. Such a hierarchical architecture is presented in a multiservices... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HIPPI [high performance parallel interface]

    Publication Year: 1992, Page(s):346 - 354
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    The HIPPI data channel and how it is used from a standard data channel, a standard internetworking, and a standard protocol viewpoint are described. Performance is also briefly discussed, as are some existing implementations of switches and other HIPPI realizations View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A class of MAC protocols for sharing ATM local access PONs

    Publication Year: 1992, Page(s):594 - 602
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    The cost of a dedicated fiber access to the B-ISDN is too high for small business and residential customers, necessitating some form of resource sharing. Combining ATM over a passive optical network (APON) with a suitable medium access control (MAC) protocol can provide significant cost savings and a reasonable bandwidth. In this way, this customer section can also enjoy introduction of broadband ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Throughput analysis of timed token protocols in double ring networks

    Publication Year: 1992, Page(s):473 - 482
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (928 KB)

    A study of the throughput and time characteristics of double-ring networks is presented, assuming that the two channels are used for balancing the traffic (when both are working) and for synchronous traffic generated according to a generic but periodic pattern. In addition, reconfiguration using portions of both rings to circumvent faulty elements in a double ring network is shown to be equivalent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A parallel processing paradigm for wavelength division multiplexed networks

    Publication Year: 1992, Page(s):679 - 687
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB)

    The implementation of a widely distributed multicomputer system for performing medium- and high-grain parallel computations is described. An n-cube hypercube is embedded in a ring with 2n nodes using the Gray code scheme. Wavelength division multiplexing (WDM) fiber optic networks are used to crate the n direct connections between nodes not adjacent to each other View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues in video transmission over broadband ATM networks

    Publication Year: 1992, Page(s):526 - 531
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    Broadband ATM networks at multi-megabit data rates will provide the necessary bandwidth for high-quality interactive video applications. Performance requirements for high-quality video services are introduced. Results of statistical simulations of broadband networks transmitting video signals are shown to demonstrate that VBR coding provides gains in multiplexed channel utilization and in access l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.