Proceedings Second IEEE Symposium on Computer and Communications

1-3 July 1997

Filter Results

Displaying Results 1 - 25 of 131
  • Proceedings Second IEEE Symposium on Computer and Communications

    Publication Year: 1997
    Request permission for commercial reuse | |PDF file iconPDF (585 KB)
    Freely Available from IEEE
  • Wireless networking

    Publication Year: 1997
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (30 KB)

    Summary form only given, as follows. From cellular networks to personal communications and from satellite systems to military and commercial multihop networks, the technology of mobile wireless networking is creating yet another revolution in the Information Age. In this article the distinguishing features of wireless networks are reviewed and the main challenges and roadblocks in their design are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM and the Internet: a perfect match?

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (52 KB)

    Summary form only given. The transformation of the Internet from what was once considered to be an academic adventure to a large-scale commercial data network is now complete. The original Internet structure which consisted of a hierarchy of regional networks interconnected by the NSF-funded backbone has now been fully replaced by a more complex interconnection of commercial ISP networks providing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid communication networks for video and broadband data services

    Publication Year: 1997
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (43 KB)

    Summary form only given, as follows. Recent advances in wireless communications have created tremendous opportunities for the design and deployment of broadband information infrastructures, rapidly and inexpensively. These new infrastructures can be deployed even in parts of the world where currently there exist very poor information or telephone networks. The relevant technologies include direct ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical networking and the MONET project

    Publication Year: 1997
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (30 KB)

    Summary form only given, as follows. In December 1994, a group of major US telecommunications industry players (AT & T, Bell Atlantic, Bellcore, BellSouth, Lucent Technologies, Pacific Telesis and Southwestern Bell) formed the Multiwavelength Optical Networking (MONET) Consortium, with partial support from the US Defense Advanced Research Projects Agency (DARPA), to investigate and advance the vis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DNHR application in the FTS-2000 network

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (72 KB)

    Summary form only given. When AT&T bid on the US federal government's new private network called FTS-2000, it was clear that competition between service providers bidding on this contract would be intense. To win this contract, it was realized that this network would have to be robust, reliable, provide a wide array of services, and be very efficient. It was therefore decided to adopt a dynamic no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WIN application in the global international network

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (55 KB)

    Summary form only given. In a competitive multiple carrier global telecommunications environment, the efforts to develop advanced cooperative traffic routing and network control techniques and the formation of a coalition of carriers to realize these techniques are the major steps to cost effective provisioning of international telecommunications services. Without additional investment in network ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DCR application in the MCI network

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (27 KB)

    Summary form only given. Dynamically controlled routing (DCR) is a centralized, adaptive network traffic management system which significantly enhances network performance and survivability. In a DCR network, switches communicate with a network processor which computes routing recommendations for overflow traffic based on near real time network status and traffic volume information. A DCR network,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • STR application in the NTT network

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (47 KB)

    Summary form only given, as follows. NTT has proposed a hybrid controlled dynamic routing scheme, state- and time-dependent routing (STR). The purpose of STR is to achieve high performance despite unpredictable real-time traffic fluctuations with minimum changes to switching software and operations systems. STR uses an appropriate combination of the two kinds of control, centralized and distribute... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EDA application in the Telefonica network

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (44 KB)

    Summary form only given, as follows. There exist different mechanisms implemented by telecom operators in order to achieve and maintain grade of service requirements in a network, in any kind of situation, but especially in the case of traffic overloads or failures. Among these mechanisms, dynamic routing strategies and network management systems are usually considered. The benefits each mechanism... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RTNR application in the AT&T network

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (62 KB)

    Summary form only given, substantially as follows. The introduction of real-time network routing (RTNR) into the AT&T switched network was completed in July 1991, and completely replaced dynamic nonhierarchical routing (DNHR). RTNR provides the platform for the dynamic class-of-service routing features for emerging new services, and also a provides an ingress/egress routing arrangement to ensure r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Telecommunications development in Egypt

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (25 KB)

    Summary form only given, as follows. Telecommunication operators in Egypt are faced with the challenge of simultaneously achieving a large development in basic telecommunication infrastructure and providing the whole spectrum of value added services required for fostering investment. The talk addresses the technological alternatives pertinent to such a situation as well as the required changes in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 1997, Page(s):705 - 708
    Request permission for commercial reuse | |PDF file iconPDF (208 KB)
    Freely Available from IEEE
  • Structured approach for planning signalling system No.7 networks

    Publication Year: 1997, Page(s):109 - 113
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (432 KB)

    Signalling system No.7 (SS7) has been applied to conventional public switched telephone networks (PSTN), integrated services digital networks (ISDN), broadband-ISDN, advanced intelligent network (AIN), and mobile telephone systems. Though planning methodologies for the above service networks are well established methodologies for SS7 network planning are not widely publicized. We develop a structu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards testability-directed Estelle specification of an OSI-IN interface for universal personal communications and multimedia communications

    Publication Year: 1997, Page(s):104 - 108
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (408 KB)

    We present a protocol interface, called CSTA, that links the telecommunications and data processing environments to support a variety of applications. We specify it in Estelle, one of ISO's standard description techniques for communications protocols and distributed systems. CSTA allows flexible creation of new telecommunications services and applications. It allows computer users and applications... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of intelligent signaling servers for broadband multimedia networks

    Publication Year: 1997, Page(s):96 - 103
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (692 KB)

    Advanced architectures integrating intelligent network (IN) signaling are proposed for the support of multimedia services. We present the main elements of an IN-based signaling configuration and introduce a set of models for representing their protocols and internal processes. An IN-based methodology is established to derive the workload for each network element, protocol and functional entity. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated signalling functionality for multimedia services

    Publication Year: 1997, Page(s):91 - 95
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (416 KB)

    This paper describes the design and implementation of a PC terminal supporting ATM signalling and its incorporation in an ATM test-bed for the provision of multimedia services. It presents the method that was adopted to test the signalling stack for compliance to the respective specifications. The role of signalling functionality in service provision is also assessed, both from the functional and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated modelling and simulation of signalling protocols at B-ISDN UNI on an SDL'92-based platform for performance evaluation

    Publication Year: 1997, Page(s):86 - 90
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (456 KB)

    CASE (computer aided software engineering) tools based on the Specification and Description Language (SDL) are nowadays serving increasingly as the engineering platforms for rapid application development (RAD). This paper presents some general concepts for achieving the modelling and simulation of B-ISDN signalling protocols on such an SDL'92 engineering platform (SDL'92 toolset). The designed sim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent control techniques for efficient regulation of ABR queue length in ATM switches

    Publication Year: 1997, Page(s):80 - 84
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (436 KB)

    Designing effective congestion control strategies for broadband networks is known to be difficult because of the variety of dynamic parameters involved such as link speeds, burstiness of the traffic, the distances between traffic sources and switching nodes. The uncertainties involved cause quantitative modeling of broadband networks almost impossible. Qualitative modeling techniques using the pri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A deterministic quantised rate based flow control scheme for ABR type traffic in ATM networks

    Publication Year: 1997, Page(s):73 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (680 KB)

    This paper deals with a new scheme for congestion control for available bit rate (ABR) traffic in an ATM network. The proposal has been based on a new paradigm of congestion control where the service delivered to one user should not depend on the behaviour of other users and each user should be allocated resources and allowed to use them effectively and thus avoid congestion situations within the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leaky bucket mechanism with learning algorithm for ATM traffic policing

    Publication Year: 1997, Page(s):68 - 72
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (464 KB)

    The traffic policing in ATM networks is one of the most critical preventive congestion control mechanisms. It intends to ensure that each source conforms to its traffic parameters negotiated during the call admission control phase. We enhance the known leaky bucket mechanism with a learning algorithm in order to police the distribution of the traffic, observing the values that the counter of the l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An extended priority data partition scheme for MPEG video connections over ATM

    Publication Year: 1997, Page(s):62 - 67
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (444 KB)

    Transmission of compressed video over ATM networks requires efficient data priority partition techniques. In association with intelligent cell discard schemes, these techniques aim to minimize the loss probability of critical information in the situation of congestion. We propose a new video-oriented priority data partition mechanism named the extended priority assignation scheme (ExPAS). This mec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The delay-constrained minimum spanning tree problem

    Publication Year: 1997, Page(s):699 - 703
    Cited by:  Papers (20)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (492 KB)

    We formulate the problem of constructing broadcast trees for real-time traffic with delay constraints in networks with asymmetric link loads as a delay-constrained minimum spanning tree (DCMST) problem in directed networks. Then, we prove that this problem is NP-complete, and we propose an efficient heuristic to solve the problem based on Prim's algorithm for the unconstrained minimum spanning tre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The role of the time parameter in a network security management model

    Publication Year: 1997, Page(s):528 - 532
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (464 KB)

    We propose an information model and a number of services for managing the security of TCP/IP networks. More precisely, we identify a number of managed objects included in SNMP management information base (MIBs) that are important for security management and we propose a temporal network management model for the historical representation of the security management information. This model incorporat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive technique for ATM call admission and routing control using traffic prediction by neural networks

    Publication Year: 1997, Page(s):54 - 61
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (596 KB)

    This paper discusses a technique for call admission and routing control, based on a global quality function, which is dependent on the allocated bandwidth, the free network capacity and the call rejection rate, and incorporates quality of service functions, predicted by neural networks. The superior capability of this technique to support admission and routing decisions, according to the character... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.