By Topic

1993 18th Conference on Local Computer Networks

19-22 Sept. 1993

Filter Results

Displaying Results 1 - 25 of 61
  • 1993 18th Conference on Local Computer Networks

    Publication Year: 1993
    Request permission for commercial reuse | PDF file iconPDF (432 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1993, Page(s):523 - 524
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Experiments with client/server multimedia on token ring

    Publication Year: 1993, Page(s):2 - 6
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    The capabilities of a 16-Mb/s token ring to support multimedia applications, and simultaneously carry data and multimedia traffic are demonstrated. The token ring's priority mechanism makes it possible to effectively isolate multimedia and data traffic. Bandwidth management is then needed to allocate a guaranteed bandwidth to multimedia traffic. A simple form of bandwidth management limits the num... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new error control scheme for packetized voice over high-speed local area networks

    Publication Year: 1993, Page(s):91 - 100
    Cited by:  Papers (10)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (860 KB)

    A new, unified approach towards the delay and error constraints that influence the quality of a digitized voice over asynchronous local computer networks is proposed. This approach, called Slack automatic repeat request (ARQ) (S-ARQ), proposes an extension of the control time mechanism for jitter control in order to provide error recovery through retransmissions in the case of packet losses in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A video mail distribution system for networked personal computers

    Publication Year: 1993, Page(s):320 - 326
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    The Computer Networks Laboratory at the University of Virginia has used the Xpress Transfer Protocol (XTP) to construct the Xpress File System (XFS), a local area network peer-to-peer file sharing system for MS-DOS-based IBM personal computers. XFS is usable for a variety of purposes, most notably the real time delivery of multimedia data streams. Using specialized hardware and software it is show... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FDDI-2 packet services and latency adjustment buffers

    Publication Year: 1993, Page(s):176 - 185
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB)

    FDDI-2 is an extension of the fiber distributed data interface (FDDI) standards that integrates isochronous circuit switched services with the timed token protocol packet services of FDDI. An expression is derived to describe the effects of hybrid mode operation on the packet channel token rotation time, which is dependent on the maximum isochronous transmission rate. The management of packet data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessment and alternative design of FDDI-II MAC protocol

    Publication Year: 1993, Page(s):205 - 211
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    Fiber distributed data interface-II (FDDI-II) is a hybrid high speed local area network (HSLAN) providing circuit switched and packet switched services. Although the packet switched service remains connectionless, the circuit switched service is connection-oriented. The weaknesses of the media access control (MAC) protocol of FDDI-II is discussed. A new access scheme, called FDDI-II*, aimed at pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the effectiveness of priorities in token ring for multimedia traffic

    Publication Year: 1993, Page(s):25 - 31
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    The suitability of IEEE 802.5 token ring LANs for the transport of multimedia traffic is examined. The token ring priority mechanisms and end-station queuing policies are studied in order to understand their effect on the delay characteristics of multimedia traffic. The multimedia traffic is modeled as isochronous data streams. Simulation results are presented to illustrate the access and queuing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • “And CNM for all.”: Customer network management services for broadband data services

    Publication Year: 1993, Page(s):52 - 61
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    With the advent of public, broadband, data service offerings such as Frame Relay and Switched Multi-megabit Data Service (SMDS), the frontier for customer network management must expand. Customer Network Management (CNM) capabilities must keep pace with these new services. Simple Network Management Protocol (SNMP)-based CNM services are being defined for publicly-offered data. The CNM service arch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparison of fibre channel and 802 MAC services

    Publication Year: 1993, Page(s):238 - 246
    Cited by:  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    As the differences between channels and networks narrow, the services and capabilities of channels need to be examined relative to those of networks. A comparison is made between the Fibre Channel protocol and networking protocols. Specific features of the Fibre Channel protocol are compared with those of the Fiber Distributed Data Interface (FDDI) LAN protocol and 802.2-type media access controll... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation of an ATM-FDDI gateway

    Publication Year: 1993, Page(s):403 - 412
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    A detailed simulation model for the design of a high performance asynchronous transfer mode - fiber distributed data interface (ATM-FDDI) gateway based on a new connection-oriented internetwork abstraction called very high speed internetwork (VHSI) is presented. The hierarchical simulation model, constructed using a graphical simulation tool called BONES, serves the dual purpose of functional veri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic congestion control schemes in high-speed multimedia networks

    Publication Year: 1993, Page(s):81 - 90
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB)

    Dynamic congestion control strategies for supporting real-time multimedia applications in high-speed integrated asynchronous transfer mode (ATM) networks are considered. Several traffic types including voice, video and multimedia data are expected to co-exist in future broadband integrated services digital network (B-ISDN). They are classified according to their distinct needs based on bandwidth, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group communication protocol for large group

    Publication Year: 1993, Page(s):310 - 319
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    The authors discuss how to provide reliable group communication for a large number of entities interconnected by a high-speed one-channel network. A group of entities is partitioned into disjoint subgroups, named component clusters, interconnected by gateways, in order to reduce the processing time and data unit length. The communication protocol is executed in each component cluster, and the gate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance study of a high performance information/control frame multiplexer

    Publication Year: 1993, Page(s):493 - 502
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB)

    The performance of a control (CNTR) and information (INF) frame multiplexer which intermixes control and information traffic by accommodating the relatively short CNTR frames between two consecutive INF frames is investigated. It is shown that the delay performance of one class can be improved at the price of degrading the performance of the other. The delay performance of a transaction between tw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of voice and video services in isochronous LANs and systems

    Publication Year: 1993, Page(s):17 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    The performance of voice and video services is evaluated for isochronous LANs or systems that have time division multiplexing (TDM) channels with fixed bandwidth for real-time traffic. The isochronous bandwidth resources are shared by voice and video traffic which have different bandwidth requirements. The blocking probabilities for voice and video arrivals are obtained analytically for the case w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and analysis of a hierarchical and modular local ATM switch

    Publication Year: 1993, Page(s):44 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    A hierarchical and modular local asynchronous transfer mode (ATM) switch is proposed. In order to improve queuing performance, the output queuing technique is adopted and several outputs are allowed to partially share the same output buffer space. The performance of the proposed switch is evaluated under uniform and nonuniform traffic patterns. Comparisons with the knockout switch, the recursive s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of a security system in a local area network environment

    Publication Year: 1993, Page(s):230 - 236
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    The development and the implementation of a security system in a local area network environment are presented. This system is based on an extended Ethernet network, but the methodology used is transferable to different kinds of LCNs and even metropolitan area networks (MANs), with some easy modifications. The adopted solution fulfills all the requirements that must fulfill any security protocol si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of wireless LANs in the indoor environment

    Publication Year: 1993, Page(s):452 - 460
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    The results of a performance evaluation of a wireless LAN (WLLAN) in an indoor environment are presented. The LAN operates in the ISM bands using spread spectrum technology. Hardware specific parameters such as bit error rate vs. signal to noise ratio (BER vs. SNR), maximum transmission rate, and platform software overhead are measured experimentally for a single node. These empirical data, in com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of traffic management schemes for ATM networks

    Publication Year: 1993, Page(s):397 - 402
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    The cell multiplexing characteristics of an asynchronous transfer mode (ATM) network should be evaluated on the so-called worst-case traffic as characterized by the usage parameter control algorithm. A bandwidth allocation method suitable for any periodic cell traffic is proposed. Numerical assessment shows that the proposed method can achieve relatively high link utilization. Using the proposed m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interfacing a high performance disk array file server to a gigabit LAN

    Publication Year: 1993, Page(s):344 - 353
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (860 KB)

    The design and implementation of the network architecture (hardware, software, and protocols) of the RAID-II system are described. RAID-II is a high-speed file server connected to an UltraNetwork. To support high bandwidth network transfers with the RAID-II server, the networking software is divided among the various processors in the system. With the distributed software, the CPU still limits the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distance learning and ATM: A trial at the University of Minnesota

    Publication Year: 1993, Page(s):77 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    A distance learning environment is created which links three remote locations via asynchronous transfer mode (ATM). Continuous bit rate audio and video, variable bit rate image data, and low bit rate background control information are handled simultaneously by high speed ATM links and a set of interconnected ATM central office switches. Digital image servers and display devices are interconnected ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of fairness on the Metaring gigabit/s network

    Publication Year: 1993, Page(s):300 - 307
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    The Metaring High speed local area network (HSLAN) is based on a full-duplex slotted ring using spatial reuse, which allows throughputs several times higher than the medium capacity. The Metaring access protocol includes a simple and reliable global fairness mechanism which prevents a station from any starvation. By means of simulations, the fairness of the Metaring gigabit/s network is analyzed. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient embedding of a hypercube in an irregular WDM network

    Publication Year: 1993, Page(s):274 - 283
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (988 KB)

    A heuristic algorithm is presented for efficiently embedding a virtual hypercube into an irregular wavelength division multiplexing (WDM) network so that the message propagation delay is minimized. Embedding a hypercube allows the communications of the many hypercube-base algorithms to map directly to the virtual network. The authors' algorithm optimizes the embedding by effective assignment of vi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel approach to output process characterization for token ring networks supporting priorities

    Publication Year: 1993, Page(s):484 - 492
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    A LAN environment in which two token rings are interconnected via remote bridges is considered. Traffic streams of two priority classes are supported. An approach is presented to characterize the output process of one token ring with a bridge node, using a three-phase Markov modulated Poisson process. Numerical results indicate that this approximate process can be much more accurate than the Poiss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithms on dynamic priority scheduling for heterogeneous traffic in ATM

    Publication Year: 1993, Page(s):380 - 387
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    Double minimum laxity threshold (MLT), double queue length threshold (QLT), and hysteresis QLT algorithms are proposed as dynamic priority scheduling techniques for advanced processing of multiple class traffic. The performance of the proposed algorithm is analyzed by computer simulation. According to the simulation results, it can be shown that the proposed algorithms enhance the processing perfo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.