By Topic

1993 18th Conference on Local Computer Networks

19-22 Sept. 1993

Filter Results

Displaying Results 1 - 25 of 61
  • 1993 18th Conference on Local Computer Networks

    Publication Year: 1993
    Request permission for commercial reuse | PDF file iconPDF (432 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1993, Page(s):523 - 524
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Analysis of a link layer protocol for high speed data bus

    Publication Year: 1993, Page(s):432 - 439
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    A parallel data bus based on the slotted ring idea with destination release policy is proposed and analyzed. Analytical results are compared to simulations and actual measurements carried out in a test network with a 200-Mb/s data rate. Transfer delays are calculated by mathematical analysis and computer simulation for networks with five and eight nodes with Poisson distributed load. Two different... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reactive DQDB

    Publication Year: 1993, Page(s):110 - 119
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB)

    The authors discuss medium access control in public metropolitan area networks (MANs). A generalization of the distributed queue dual bus (DQDB) protocol which leads to improved medium access control is described for large overload networks where it is known that DQDB can be potentially unfair to competing users (queued arbitrated access). The generalized DQDB protocol, called reactive DQDB, is te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-level hierarchical distributed fail-safe architecture for metropolitan area networks

    Publication Year: 1993, Page(s):222 - 229
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    Existing topologies, such as the MSN, HR4-NET, and a three-level hierarchical structure, for metropolitan area network (MAN) implementation are studied. A topology is proposed, based on the HR4-NET and a hierarchical model, that is highly scalable to extend over large areas. Routing algorithms proposed make the architecture fail safe. The new architecture effectively decrease... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error control in the Xpress transfer protocol

    Publication Year: 1993, Page(s):423 - 431
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB)

    The error-control mechanisms used in the Xpress transfer protocol (XTP) are presented. Policies for the use of these mechanisms are proposed and simulated. A potential failure mode on contention-oriented media under high utilization is identified, and two proposals are made to prevent its occurrence. It is found that even for bit error rates as high as 10-5, the loss in performance is o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A load balancing multicast tree approach for group-based multimedia applications

    Publication Year: 1993, Page(s):327 - 336
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    The authors formulate and propose an algorithm for the LBMT (load-balancing multicast tree) problem whose main objective is to accomplish traffic load balance while minimizing the number of multicast trees for a group. In order to fulfill these objectives, the multiple multicast tree concept, whose only disadvantage is the high tree maintenance cost, is introduced. Since the tree maintenance cost ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A self-organizing wireless LAN system

    Publication Year: 1993, Page(s):467 - 473
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    A self-organizing method of a decentralized LAN is proposed, its characteristics are evaluated by computer simulation based on a simple network model. It is found that this decentralized network self-organizing method can be adopted to established wireless LAN systems by adding a few functions. This method is extremely simple and the functions which each station must have are very few View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and analysis of a hierarchical and modular local ATM switch

    Publication Year: 1993, Page(s):44 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    A hierarchical and modular local asynchronous transfer mode (ATM) switch is proposed. In order to improve queuing performance, the output queuing technique is adopted and several outputs are allowed to partially share the same output buffer space. The performance of the proposed switch is evaluated under uniform and nonuniform traffic patterns. Comparisons with the knockout switch, the recursive s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of high-speed networks for multimedia applications

    Publication Year: 1993, Page(s):513 - 522
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB)

    The real-time performance of several existing local area network medium-access protocols under high-speed data transfer rates is studied. the goal is to determine the limitations in the ability of the protocols to guarantee on-time delivery of messages for different types of multimedia applications View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overload throughput performance of different erasure node protocols for DQDB networks

    Publication Year: 1993, Page(s):130 - 138
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    Erasure nodes are special devices that have been conceived to improve the system throughput of distributed queue dual bus (DQDB) networks. The authors discuss the overload performance of a network with erasure nodes and the standard bandwidth balancing (BWB) mechanism enabled, when alternative implementation schemes of the erasure node protocol are considered. A numerical method is presented to ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of an off-host communications architecture

    Publication Year: 1993, Page(s):414 - 422
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    The Computer Networks Laboratory at the University of Virginia has implemented the SAFENET lightweight protocol suite on the Navy's Desktop Tactical Computer (DTC-2). One of the research questions was whether to embed XTP in the DTC-2's UNIX kernel or run XTP on an attached processor on the DTC-2's VMEbus. Both strategies were implemented and the attached processor approach proved to have somewhat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A video mail distribution system for networked personal computers

    Publication Year: 1993, Page(s):320 - 326
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    The Computer Networks Laboratory at the University of Virginia has used the Xpress Transfer Protocol (XTP) to construct the Xpress File System (XFS), a local area network peer-to-peer file sharing system for MS-DOS-based IBM personal computers. XFS is usable for a variety of purposes, most notably the real time delivery of multimedia data streams. Using specialized hardware and software it is show... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of voice and video services in isochronous LANs and systems

    Publication Year: 1993, Page(s):17 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    The performance of voice and video services is evaluated for isochronous LANs or systems that have time division multiplexing (TDM) channels with fixed bandwidth for real-time traffic. The isochronous bandwidth resources are shared by voice and video traffic which have different bandwidth requirements. The blocking probabilities for voice and video arrivals are obtained analytically for the case w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Equalizer for an IR-wireless LAN using RBF neural networks

    Publication Year: 1993, Page(s):461 - 466
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    The application of a RBF (radial basis function) neural network to an adaptive equalizer at the receiver of a wireless IR-LAN is considered. Fixing the decision threshold and classifying the received binary signals are the main functions of the RBF. The general problem of equalization binary signals, passed through a dispersive channel and corrupted with noise, is briefly described. The characteri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enterprise LAN standards and guidelines, a case study

    Publication Year: 1993, Page(s):214 - 221
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB)

    Local area network (LAN) standards and guidelines developed by members of a company-wide IBM LAN Council are described. These guidelines and standards were developed for the internal IBM community from February, 1990, to the present. The resulting documentation has been distributed to many IBM customers. Based on the work of the LAN Council, a company-wide process for maintaining naming and addres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparison of fibre channel and 802 MAC services

    Publication Year: 1993, Page(s):238 - 246
    Cited by:  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    As the differences between channels and networks narrow, the services and capabilities of channels need to be examined relative to those of networks. A comparison is made between the Fibre Channel protocol and networking protocols. Specific features of the Fibre Channel protocol are compared with those of the Fiber Distributed Data Interface (FDDI) LAN protocol and 802.2-type media access controll... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel approach to output process characterization for token ring networks supporting priorities

    Publication Year: 1993, Page(s):484 - 492
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    A LAN environment in which two token rings are interconnected via remote bridges is considered. Traffic streams of two priority classes are supported. An approach is presented to characterize the output process of one token ring with a bridge node, using a three-phase Markov modulated Poisson process. Numerical results indicate that this approximate process can be much more accurate than the Poiss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using the common LAN to introduce ATM connectivity

    Publication Year: 1993, Page(s):34 - 43
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (872 KB)

    A method for using LAN technologies to transport asynchronous transfer mode (ATM) cells is outlined. B-ISDN service requirements are broken into three groups, i.e., high speed media, multimedia interfaces, and service control software. Compression techniques for bandwidth intensive services are discussed. It is argued that these services may be provided using sub-Mb/s ATM links. The ATM concept is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical link bandwidth optimization of the Fiber Channel Networks

    Publication Year: 1993, Page(s):256 - 261
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    Optical link bandwidth optimization techniques to optimize the cost-performance of a link are presented. As the data rate increases, fiber attenuation is no longer the limiting factor of the operating distance; instead, the bandwidth becomes the limiting factor. Therefore, it is essential to optimize the bandwidth utilization of a fiber to achieve better cost-performance over copper communications... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Token-cycle time characteristics of FDDI networks with multiple classes of traffic

    Publication Year: 1993, Page(s):503 - 512
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    The performance of the timer-based priority scheme of the fiber distributed data interface (FDDI) network is investigated. The token-cycle time distribution illustrating the mechanics of the priority scheme is presented. Analytical expressions are given to evaluate the first and the second moments of the token-cycle time for FDDI networks with multiple classes of traffic. An iterative procedure th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation of an ATM-FDDI gateway

    Publication Year: 1993, Page(s):403 - 412
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    A detailed simulation model for the design of a high performance asynchronous transfer mode - fiber distributed data interface (ATM-FDDI) gateway based on a new connection-oriented internetwork abstraction called very high speed internetwork (VHSI) is presented. The hierarchical simulation model, constructed using a graphical simulation tool called BONES, serves the dual purpose of functional veri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guaranteeing synchronous messages with arbitrary deadline constraints in an FDDI network

    Publication Year: 1993, Page(s):186 - 195
    Cited by:  Papers (22)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (932 KB)

    Issues related to guaranteeing synchronous messages with arbitrary deadline constraints in a fiber distributed data interface (FDDI) network are addressed. It is shown that several network parameters must be set carefully if message deadlines are to be satisfied. Message deadlines can only be met if sufficient synchronous bandwidth is allocated to each mode. Thus, proper synchronous bandwidth allo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group communication protocol for large group

    Publication Year: 1993, Page(s):310 - 319
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    The authors discuss how to provide reliable group communication for a large number of entities interconnected by a high-speed one-channel network. A group of entities is partitioned into disjoint subgroups, named component clusters, interconnected by gateways, in order to reduce the processing time and data unit length. The communication protocol is executed in each component cluster, and the gate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How the Bernoulli slot occupancy approximation in the node DQDB analytical model influences the throughput-delay performance

    Publication Year: 1993, Page(s):120 - 129
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB)

    The effect of the Bernoulli slot occupancy approximation, which is assumed in most distributed queue dual bus (DQDB) analytical models, on the throughput-delay characteristics of DQDB networks is studied. Studies cover a variety of traffic statistics and network configurations. The results reveal that the influences of the Bernoulli slot occupancy approximation are message length, internode distan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.