By Topic

Proceedings Second IEEE Symposium on Computer and Communications

1-3 July 1997

Filter Results

Displaying Results 1 - 25 of 131
  • Proceedings Second IEEE Symposium on Computer and Communications

    Publication Year: 1997
    Request permission for commercial reuse | PDF file iconPDF (585 KB)
    Freely Available from IEEE
  • Wireless networking

    Publication Year: 1997
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (30 KB)

    Summary form only given, as follows. From cellular networks to personal communications and from satellite systems to military and commercial multihop networks, the technology of mobile wireless networking is creating yet another revolution in the Information Age. In this article the distinguishing features of wireless networks are reviewed and the main challenges and roadblocks in their design are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM and the Internet: a perfect match?

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    Summary form only given. The transformation of the Internet from what was once considered to be an academic adventure to a large-scale commercial data network is now complete. The original Internet structure which consisted of a hierarchy of regional networks interconnected by the NSF-funded backbone has now been fully replaced by a more complex interconnection of commercial ISP networks providing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid communication networks for video and broadband data services

    Publication Year: 1997
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (43 KB)

    Summary form only given, as follows. Recent advances in wireless communications have created tremendous opportunities for the design and deployment of broadband information infrastructures, rapidly and inexpensively. These new infrastructures can be deployed even in parts of the world where currently there exist very poor information or telephone networks. The relevant technologies include direct ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical networking and the MONET project

    Publication Year: 1997
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (30 KB)

    Summary form only given, as follows. In December 1994, a group of major US telecommunications industry players (AT & T, Bell Atlantic, Bellcore, BellSouth, Lucent Technologies, Pacific Telesis and Southwestern Bell) formed the Multiwavelength Optical Networking (MONET) Consortium, with partial support from the US Defense Advanced Research Projects Agency (DARPA), to investigate and advance the vis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DNHR application in the FTS-2000 network

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    Summary form only given. When AT&T bid on the US federal government's new private network called FTS-2000, it was clear that competition between service providers bidding on this contract would be intense. To win this contract, it was realized that this network would have to be robust, reliable, provide a wide array of services, and be very efficient. It was therefore decided to adopt a dynamic no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WIN application in the global international network

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (55 KB)

    Summary form only given. In a competitive multiple carrier global telecommunications environment, the efforts to develop advanced cooperative traffic routing and network control techniques and the formation of a coalition of carriers to realize these techniques are the major steps to cost effective provisioning of international telecommunications services. Without additional investment in network ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DCR application in the MCI network

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (27 KB)

    Summary form only given. Dynamically controlled routing (DCR) is a centralized, adaptive network traffic management system which significantly enhances network performance and survivability. In a DCR network, switches communicate with a network processor which computes routing recommendations for overflow traffic based on near real time network status and traffic volume information. A DCR network,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • STR application in the NTT network

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (47 KB)

    Summary form only given, as follows. NTT has proposed a hybrid controlled dynamic routing scheme, state- and time-dependent routing (STR). The purpose of STR is to achieve high performance despite unpredictable real-time traffic fluctuations with minimum changes to switching software and operations systems. STR uses an appropriate combination of the two kinds of control, centralized and distribute... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EDA application in the Telefonica network

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    Summary form only given, as follows. There exist different mechanisms implemented by telecom operators in order to achieve and maintain grade of service requirements in a network, in any kind of situation, but especially in the case of traffic overloads or failures. Among these mechanisms, dynamic routing strategies and network management systems are usually considered. The benefits each mechanism... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RTNR application in the AT&T network

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (62 KB)

    Summary form only given, substantially as follows. The introduction of real-time network routing (RTNR) into the AT&T switched network was completed in July 1991, and completely replaced dynamic nonhierarchical routing (DNHR). RTNR provides the platform for the dynamic class-of-service routing features for emerging new services, and also a provides an ingress/egress routing arrangement to ensure r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Telecommunications development in Egypt

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (25 KB)

    Summary form only given, as follows. Telecommunication operators in Egypt are faced with the challenge of simultaneously achieving a large development in basic telecommunication infrastructure and providing the whole spectrum of value added services required for fostering investment. The talk addresses the technological alternatives pertinent to such a situation as well as the required changes in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 1997, Page(s):705 - 708
    Request permission for commercial reuse | PDF file iconPDF (208 KB)
    Freely Available from IEEE
  • Adaptive technique for ATM call admission and routing control using traffic prediction by neural networks

    Publication Year: 1997, Page(s):54 - 61
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    This paper discusses a technique for call admission and routing control, based on a global quality function, which is dependent on the allocated bandwidth, the free network capacity and the call rejection rate, and incorporates quality of service functions, predicted by neural networks. The superior capability of this technique to support admission and routing decisions, according to the character... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The optimal test traffic for analysis of CDV characteristics on ATM network

    Publication Year: 1997, Page(s):48 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    Several studies have been done to provide results for the estimation of the cell delay variation (CDV) accumulation characteristics on ATM systems and network. Because most of these studies were done by simulation and analytical modeling, we have to recognize how to apply them to the real field. We introduce a test procedure according to the assumption that CDV accumulation level on ATM network de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced wired “follow me” telephony service

    Publication Year: 1997, Page(s):641 - 645
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    This paper presents the architecture, network configuration, protocol, and design of an advanced wired “follow me” telephony service (AWFMTS). The AWFMTS provides personalized mobile telephony services using only the wired network. It allows the users to have their calls follow them wherever they are as long as there is a telephone where they are. This is provided without having to use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyclic service systems with server time-outs

    Publication Year: 1997, Page(s):43 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    The time-limited cyclic service model can be used to evaluate the performance of bandwidth allocation scheme in ATM/B-ISDN networks. This model does not lend itself to an exact solution. We propose an approach to analyzing it, in which the time limitation is an exponential distribution. Firstly, we derive a functional equation that characterizes the amount of work when the server visits a queue. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient interleaving method in wireless ATM networks

    Publication Year: 1997, Page(s):636 - 640
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    This paper proposes a method of reducing the cell loss probability by interleaving the header and data bits in wireless ATM networks where bit errors are likely to occur in bursts. Analytic modeling of the proposed method and a subsequent calculation shows a substantial improvement in cell loss probability due to burst errors, which has been also verified by computer simulation. This paper also pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An effective AAL1 architecture for N×64 structured services suitable to adapt DECT traffic to B-ISDN network

    Publication Year: 1997, Page(s):461 - 465
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    Data traffic originating at mobile infrastructures, such as utilised by DECT mobiles, is, in principle, constant bit rate traffic (CBR). On the other hand, the flexibility of the B-ISDN network to transport data at constant, variable (variable bit rate) or available (available bit rate) bit rates makes it ideal to be utilised as the communication medium among distributed mobile terminals residing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling the buffer allocation strategies and flow control schemes in ATM networks

    Publication Year: 1997, Page(s):38 - 42
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    We present a unified model to analyze three different buffered allocation strategies, first-in-first-out (FIFO), statically allocated fully connected (SAFC), and statically allocated multi-queue (SAMQ), and two flow control schemes, local flow control and global flow control, under bursty traffic patterns. We also conduct comparisons between the local and global flow control schemes and among thes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image compression using multi-layer neural networks

    Publication Year: 1997, Page(s):179 - 183
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    A new neural network data compression method is presented. This work extends the use of 2-layer neural networks to multi-layer networks. Results show the performance superiority of multi-layer neural networks compared to that of the 2-layer one especially at high compression ratios. To overcome the long training time required for multi-layered networks, a recently developed training algorithm has ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-stage detection of coded CDMA systems and a novel interleaving scheme

    Publication Year: 1997, Page(s):551 - 555
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    Code division multiple access (CDMA) systems have become a serious contender in the technology market for wireless communications systems. Conventional or single-user detection so far has been preferred in CDMA receivers despite many shortcomings due to its simplicity. Multiuser detectors on the other hand can offer dramatically higher capacity at the expense of some increase in complexity. We con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dimensioning of communication links for base-station and MSC interconnection in CDMA mobile communication systems

    Publication Year: 1997, Page(s):631 - 635
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    In CDMA mobile communication systems, voice is encoded and packaged in variable length packets that are transported between the mobile station and the switching center. While the packetization provides great flexibility in resource allocation, it poses a QOS challenge on voice. We discuss link dimensioning for a typical CDMA system. We consider a communication link connecting a CDMA base-station a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transport protocols over wireless links

    Publication Year: 1997, Page(s):456 - 460
    Cited by:  Papers (4)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    Future networking environments are expected to be hybrid, i.e., consisting of both wireless and fixed subnetworks. Due to the presence of the wireless link, the performance of end-to-end protocols (e.g., TCP) suffers degradation. One approach to overcome this performance penalty is to subdivide the end-to-end transport layer connection into two separate ones. This approach leads to performance imp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiplexing of MPEG video sources over an ATM LAN

    Publication Year: 1997, Page(s):34 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    We study the characterization of MPEG sources and their multiplexing onto a 25 Mbps port of an ATM LAN. The bit rate characteristics of a wide variety of MPEG sequences have been measured. Although long range dependence has been observed in sample autocorrelations, we have focused on the exponentially decaying short range dependence and constructed a 4-state Markov-modulated fluid source model bas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.