By Topic

Local Computer Networks, 1992. Proceedings., 17th Conference on

Date 13-16 Sept. 1992

Filter Results

Displaying Results 1 - 25 of 80
  • Proceedings. 17th Conference on Local Computer Networks (Cat. No.92TH0473-9)

    Publication Year: 1992
    Request permission for commercial reuse | PDF file iconPDF (6 KB)
    Freely Available from IEEE
  • An effective bit rate/table lookup based admission control algorithm for the ATM B-ISDN

    Publication Year: 1992, Page(s):20 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    A simple, highly flexible admission control algorithm for ATM-based B-ISDN, known as the effective-bit-rate/table-lookup (EBR/TL) method, is proposed. An EBR method works by allocating bandwidth using a percentage, a(0<a⩽100%), and multiplying this percentage by the traffic source's peak rate to yield the amount of bandwidth to allocate to a new connection. EBR percentages... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LRU-based replication strategies in a LAN remote caching architecture

    Publication Year: 1992, Page(s):244 - 253
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    For LAN environments, a simple modification of the LRU replacement algorithm is proposed. By limiting the number of object replicas, the algorithm can substantially improve LRU performance over a wide range of parameters. The relatively simple LAN topology implies that much less state information need be available for good replacement decisions, compared to general network topologies View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The concept of fairness and a GFC protocol

    Publication Year: 1992, Page(s):30 - 35
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    Multiple access to a single user-network interface (UNI) is a cost-effective solution for the provision of B-ISDN services in customer premises. In a multiple access configuration, a fairly shared access must ensure that each terminal will get a guaranteed bandwidth to provide an acceptable quality of service (QoS) and that the allocation of the remaining bandwidth will result in the same improvem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cryptographic protocol to obtain secure communications in extended Ethernet environment

    Publication Year: 1992, Page(s):254 - 261
    Cited by:  Papers (2)  |  Patents (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    An implementation of a security protocol in an extended LAN environment is described. The protocol has a hierarchical architecture. At the first level, the session key is disposed of, in the second level there are the master keys, and at the highest level there are the public and private key of the manager and the CryptoNet's keys. The relations between them, the right time to do the keys' renewal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • B-ISDN customer network management framework

    Publication Year: 1992, Page(s):36 - 41
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    Two alternative customer network management (CNM) access configurations for the user's network management station to access a public carrier's CNM system using the simple network management protocol (SNMP) are described. In addition, a management information base containing UNI management information is developed along with CNM service capabilities that enable permanent virtual connection (PVC) se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of the optimality of a multi-level bandwidth-negotiation algorithm for FDDI interconnection across B-ISDN

    Publication Year: 1992, Page(s):387 - 396
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    The optimality of a dynamic adaptive bandwidth allocation mechanism on the inter-FDDI virtual circuits is analyzed. The proposed algorithm is based on the monitoring of InterWorking Unit buffer status and the request of quanta of bandwidth as the buffer content exceeds given thresholds. By using the analytical model proposed, the analysis of N-level bandwidth quantization algorithm perfor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The new high-speed digital signature

    Publication Year: 1992, Page(s):262 - 271
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB)

    The digital signature is an ideal mechanism for authenticating with computer-generated messages. Recently, as enhanced network services have developed, the importance of a high-speed digital signature has become apparent. Previously, the best secure scheme of knowing digital signature systems has been RSA. However, this scheme has a problem in that the processing speed for generating signature mes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Throughput and delay analysis of FDDI and FDDI-II under mixed traffic

    Publication Year: 1992, Page(s):142 - 151
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (924 KB)

    A throughput and delay analysis of FDDI and FDDI-II is presented under mixed traffic. The case of voice/data transmission is considered, and the throughput and delay behavior of FDDI, under packetized voice transmission, and FDDI-II, under isochronous voice transmission, is examined. The performance of the two networks is then investigated under the transmission of voice, data, and video. Two tran... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance and traffic characterization of a class of graphics-intensive X-applications

    Publication Year: 1992, Page(s):198 - 205
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    The traffic generated by a class of graphics-intensive X Window System applications is characterized, and the effects the hardware processing platform has on the characteristics of the generated traffic are studied. The effect of running graphics-intensive applications on network performance is examined, and the network capabilities and limitations are determined. The experimental results show tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of ATM/DQDB interworking

    Publication Year: 1992, Page(s):42 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    The cell loss ratio and cell delay variation of a distributed-queue dual-bus (DQDB) network receiving traffic from a number of asynchronous transfer mode (ATM) connections are considered. Every connection carries either connection oriented or connectionless traffic. In the analysis of the access to the bus, it is shown that consecutive service times of the local access queue are correlated. Two mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probabilistic model for quality of service modelling in packet-switched data networks

    Publication Year: 1992, Page(s):698 - 708
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB)

    A probabilistic model for quality of service available to users for communication via packet-switched public data networks is presented. The concepts of network reliability, availability and congestion are discussed. It is shown that network congestion appears as a loss of availability with regard to data communication services provided to network users, and therefore the quality of service depend... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of multiple-ring networks for real-time communications

    Publication Year: 1992, Page(s):426 - 435
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    The results of a simulation study in which the real-time performances of a high-speed token ring network and a multiple-ring network were compared are described. The medium access protocols and the interconnection topologies of the multiple-ring network evaluated are discussed. The characteristic of the workload used in this simulation experiment is described. The simulation results are given View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical message dissemination in very large WANs

    Publication Year: 1992, Page(s):397 - 403
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    A hierarchical broadcasting technique in very large arbitrary networks which achieves near optimal cost and time measures is proposed. The network is partitioned into hierarchical clusters which are interconnected with each other through gate nodes. The approach is based on using a fully distributed minimum spanning tree algorithm within the gate-node network while achieving time optimal broadcast... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3M/US West SMDS trial

    Publication Year: 1992, Page(s):274 - 283
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    SMDS, a switched multimegabit data service that addresses metropolitan area network (MAN) and wide-area network (WAN) solutions, is discussed. A trial network and the results of its testing are described View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HIPPI [high performance parallel interface]

    Publication Year: 1992, Page(s):346 - 354
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    The HIPPI data channel and how it is used from a standard data channel, a standard internetworking, and a standard protocol viewpoint are described. Performance is also briefly discussed, as are some existing implementations of switches and other HIPPI realizations View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A bandwidth-efficient encoding scheme for high-speed data transmission on Category 3 cable

    Publication Year: 1992, Page(s):152 - 156
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    Higher-speed data transmission over the embedded network of cables, specifically, Category 3 unshielded twisted-pair developed primarily for voice communications, is addressed. To provide robust transmission systems at high data rates for distances of 100 m, bandwidth-efficient encoding schemes utilizing adaptive noise cancellation techniques are required. One such scheme, carrierless AM/PM (CAP),... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical SMDS demonstrations

    Publication Year: 1992, Page(s):300 - 309
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (872 KB)

    The switched multi-megabit data service (SMDS) is a high-performance, public, packet-switched data service. Offered as public network equivalent of a MAC-level service, the datagram transport offered by SMDS is easily integrated into networking protocol architectures using local area network (LAN) or metropolitan area network (MAN) technologies such as Ethernet and fiber distributed data interface... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a gigabit FDDI

    Publication Year: 1992, Page(s):660 - 668
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    A possible network architecture suitable for a next-generation follow-up to FDDI Is presented. The solution can be scaled-up to arbitrary transmission rates (limited only by the technological barriers) and arbitrarily long networks. The protocol allows every station to transmit when the ring is silent, even when the station is not in possession of the token. The resulting token-passing protocol yi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of a local computer network with workstations and X terminals

    Publication Year: 1992, Page(s):206 - 215
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    The performance of a network based computing system that consists of a number of clients and a server, interconnected by a local area network, is studied. Each client represents a diskless or swapful workstation, or an X terminal, and generates application workload using either a conventional UNIX file system or the Network File System (NFS). To characterize the application workload and the effect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A queueing model for a data station within the IEEE 802.6 MAN

    Publication Year: 1992, Page(s):52 - 61
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (812 KB)

    An exact queuing model for a station that operates within the IEEE 802.6 subnetwork of a metropolitan area network (MAN) is developed. The model reflects the station's perception of the subnetwork and it has been developed by mapping the media access control (MAC) protocol to a queuing service discipline. The model is a discrete-time single-server queue with two classes of customers served accordi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Infrared wireless system for high speed RS-232/RS-423/RS-422 communications

    Publication Year: 1992, Page(s):505 - 510
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    The design and implementation of a RS-232/RS-423/RS-422 (115200-Bd) modem which uses a wireless infrared link are discussed. This kind of system presents some advantages over the conventional cable systems or radio systems. When IREDs are used, the radiation is negligible for the users and harmless. These systems can be used to link two buildings (point-to-point) or to avoid cables inhouse environ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bell Atlantic and SMDS applications

    Publication Year: 1992, Page(s):8 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    Several real customer applications where the switched multimegabit data service (SMDS) proved to be the best solution to address to customer's requirements are examined. The following examples are discussed: the Temple University MAN trial, disaster recovery, print plant and document imaging, a health information system database, medical imaging, and real estate listings View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design, implementation and measurement of a collision avoidance multiple broadcast tree network

    Publication Year: 1992, Page(s):218 - 230
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (896 KB)

    The design and implementation of a local area network architecture based on collision avoidance, called the collision avoidance multiple broadcast (CAMB) tree network, are described. The implementation follows the protocol layering architecture of the IEEE 802 local area networks and includes CAMB tree switches, station/network interface boards, and support of transport protocols. The performance ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A network level fractional channel to support guaranteed real-time communication

    Publication Year: 1992, Page(s):436 - 445
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB)

    A network-level abstraction called φ-channel that supports the requirements of real-time applications is proposed. A φ-channel represents a simplex, end-to-end communication channel between a source and a destination. The channel is characterized by a set of specific performance parameters associated with its traffic, namely packet maximum end-to-end delay and the maximum number of packets... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.