Proceedings of Sixth International Conference on Computer Communications and Networks

22-25 Sept. 1997

Filter Results

Displaying Results 1 - 25 of 84
  • Proceedings of Sixth International Conference on Computer Communications and Networks

    Publication Year: 1997
    Request permission for commercial reuse | |PDF file iconPDF (485 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1997, Page(s):549 - 551
    Request permission for commercial reuse | |PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • TWDM multihop lightwave networks based on rotator digraphs

    Publication Year: 1997, Page(s):154 - 157
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (400 KB)

    The time and wavelength division multiplexed (TWDM) access protocol is one of the most promising ways to exploit the enormous bandwidth in a single-mode optical fiber. We focus on constructing scalable TWDM networks based on rotator digraphs. To make the network be more economically and technically feasible and to improve the network performance, each station is equipped with multiple fixed transm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient distributed control protocols for WDM all-optical networks

    Publication Year: 1997, Page(s):150 - 153
    Cited by:  Papers (20)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (432 KB)

    Path multiplexing (PM) and link multiplexing (LM) are two approaches for establishing connections (or lightpaths) in optical networks. This paper describes distributed control protocols for establishing lightpaths in WDM networks using LM and PM. We propose and evaluate the performance of two classes of protocols, namely source initiated reservation (SIR) and destination initiated reservation (DIR... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pipelined transmission scheduling in all-optical TDM/WDM rings

    Publication Year: 1997, Page(s):144 - 149
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (672 KB)

    Two properties of optical transmissions, namely, unidirectional propagation and predictable propagation delay, make it possible to pipeline packet transmissions in all-optical networks. In this paper, we study the problem of scheduling all-to-all personalized communication (AAPC) in unidirectional TDM/WDM rings with pipelined transmissions, which can achieve a much higher bandwidth utilization tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time dependent priority scheduling for guaranteed QoS systems

    Publication Year: 1997, Page(s):236 - 241
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (620 KB)

    With the advances in server technology, and the advent of fast gigabit networks, it has become possible to support multimedia applications. To support the requirements for the transmission of isochronous data, the network must provide service guarantees to connections, including minimum bandwidth, packet delay, delay jitter, and loss. Three factors determine the utilization of the network when pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource allocation control protocols for multicast data transport

    Publication Year: 1997, Page(s):182 - 188
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (700 KB)

    The paper describes a model of protocol mechanisms for integrating resource reservations and multicast path setups. The protocol model is based on shared tree-structured channels in the network to which sources and destinations can connect to exchange data. The paper employs flow aggregation as a construct for realization of resource reservation protocols, as suggested by RSVP. Here, multiple flow... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP selective acknowledgments and UBR drop policies to improve ATM-UBR performance over terrestrial and satellite networks

    Publication Year: 1997, Page(s):17 - 25
    Cited by:  Papers (9)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1136 KB)

    We study the performance of selective acknowledgements (SACK) with TCP over the ATM-UBR service category. We examine various unspecified bit rate (UBR) drop policies, TCP mechanisms and network configurations to recommend optimal parameters for TCP over UBR. We discuss various TCP congestion control mechanisms compare their performance for LANs and WANs. We describe the effect of satellite delays ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Teletraffic/transmission performance of multi-hop networks using hybrid-store-and-forward

    Publication Year: 1997, Page(s):138 - 143
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (664 KB)

    The teletraffic/transmission performance of regular two-connected multi-hop cell-switching optical networks in uniform traffic under hybrid store-and-forward is presented. The Manhattan street (MS) network and Shufflenet (SN) are compared in terms of average queueing delay, queue size, transit delay, throughput, and bit error rate (BER) for intensity modulation/direct-detection (IM/DD) both analyt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tight upper bounds for cell loss probabilities in ATM multiplexers and required bandwidth estimation

    Publication Year: 1997, Page(s):228 - 234
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (652 KB)

    Estimating the cell loss probability in an ATM multiplexer is a key issue in network management and traffic control such as call admission control and bandwidth allocation. In this paper, we derive a new approximation to estimate the total and individual cell loss probabilities in an ATM multiplexer fed by a superposition of heterogeneous on-off sources with exponentially distributed on and off pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling support for multicasting sessions in broadband communication networks

    Publication Year: 1997, Page(s):176 - 181
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (544 KB)

    Multimedia applications require support from the underlying broadband network at the end-to-end communication level. Multicasting is an important paradigm of end-to-end communication. The root node of a multicasting session is responsible for controlling the session including monitoring, maintenance, and the implementation of the multicasting protocol. The job that controls the multicasting sessio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A burst-level priority scheme for bursty traffic in ATM networks

    Publication Year: 1997, Page(s):11 - 16
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (712 KB)

    Statistical gain is achieved in asynchronous transfer mode (ATM) networks by making bursty connections share resources stochastically. When connections with different QOS requirements share the same resources, the highest QOS requirements would typically be the limiting factor in determining the admissible load at a link. This may lead to connections with low QOS requirements getting better servic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile extensions to RSVP

    Publication Year: 1997, Page(s):132 - 136
    Cited by:  Papers (17)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (576 KB)

    RSVP (resource reservation protocol) is a receiver oriented resource reservation setup protocol targeted for integrated services packet networks (ISPNs). RSVP has a number of desirable attributes which make it a leading candidate for Internet standardization. These attributes include flexibility, robustness, and scalability. However, RSVP does not adequately address the issue of resource reservati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance model for ATM switches with multiple input queues

    Publication Year: 1997, Page(s):222 - 227
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (436 KB)

    An analytical model for the performance analysis of a novel input access scheme for an ATM switch is developed and presented in this paper. The interconnection network of the ATM switch is internally nonblocking and each input port maintains a separate queue for each output port so as to reduce the head-of-line (HOL) blocking of conventional input queuing switches. Each input is allowed to send on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new framework for secure network management

    Publication Year: 1997, Page(s):510 - 515
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (604 KB)

    We introduce a new protocol, SNMS (secure network management system) with four primary goals. First, it uses encryption to establish a secure channel between a network manager and a network agent. Second, it allows network management tasks to be performed from any station on the network. Third, it enables a manager to remotely add manageable objects to an agent. Finally, it makes a prototype along... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible multicast protocol

    Publication Year: 1997, Page(s):170 - 173
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (464 KB)

    This paper presents FMP, a flexible multicast protocol based on the SRM algorithm in order to guarantee a reliable multipoint communication support. FMP is intended to strengthen the SRM repair/request policies, as well as to optimise the recovery treatments in case of failure occurence. Moreover, FMP is designed to meet the variety of needs of multicast applications by providing a mean to select ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed and persistent mobile agents for heterogeneous personal communications systems

    Publication Year: 1997, Page(s):256 - 261
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (544 KB)

    Problems of environment heterogeneity and interoperability between different mobile computing platforms are among the most urgent to address by the research community. This paper proposes an environment, which supports migration of mobile code developed using heterogeneous languages. Current developments in the area of mobile code and distributed mobile computing systems are discussed and placed w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing the latency of the Totem multicast protocols

    Publication Year: 1997, Page(s):42 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1328 KB)

    Multicast group communication protocols provide a foundation on which distributed systems can be built. The performance of these protocols is, however, not easy to characterize or to analyze. This research determines probability density functions for the latency to message delivery for the Totem multicast protocols, which provide reliable totally ordered delivery of multicast messages across singl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-frame isochronous service for ATM networks: stop-and go revisited

    Publication Year: 1997, Page(s):4 - 10
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (800 KB)

    The ATM switching scheme we propose is similar to the multi-frame stop-and-go, except that we use EDF (earliest-deadline-first) scheduling, instead of rate-monotonic, static-priority scheduling. Unlike the multi-frame stop-and-go, our scheme can fully utilize the link bandwidth, and does not require that the input or output frames of the same size be synchronized. EDF scheduling is, in general, mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of a QoS capable switch-router

    Publication Year: 1997, Page(s):276 - 284
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (996 KB)

    An important challenge for the future growth of the Internet is to design routers that can forward the exponentially increasing volume of traffic, and at the same time provide the service differentiation needed by new applications. In this paper, we describe the architecture, implementation, and initial experiences with a system designed to meet this challenge. This system, which we call a QoS cap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel mobile agent search algorithm

    Publication Year: 1997, Page(s):128 - 131
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (368 KB)

    Intelligent agents have been shown to be a good approach to addressing the issues of limited capacity and unreliable wireless links in mobile computing. However, before the approach can be commercially viable, a set of management capabilities that support the controls of intelligent agents in a mobile environment need to be in place. Since controls can only be applied after the target agent is loc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New algorithms and techniques for well-synchronized audio and video streams communications

    Publication Year: 1997, Page(s):214 - 219
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (868 KB)

    Due to the rapid progress of computer and network technologies, the environment for multimedia communications is being prepared day by day. This environment, however is not developed enough to realize well-synchronized high performance multimedia communications, because there are still problems that must be solved. To solve these problems, we propose new algorithms and techniques that have already... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DRS: a fault tolerant network routing system for mission critical distributed applications

    Publication Year: 1997, Page(s):106 - 113
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1296 KB)

    We present a novel proactive routing algorithm (dynamic routing system, DRS) that consistently searches for failures via frequent ICMP (Internet control message protocol) echo requests. Our algorithm differs from its predecessors in that it is proactive instead of reactive by looking for failures before they affect message transmissions. When a failure is detected, an alternative route is identifi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM switches with bifurcated input queueing

    Publication Year: 1997, Page(s):504 - 507
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (388 KB)

    Bifurcated queueing has been shown to be a very practical means to exceed the classical upper bound of 0.568 for throughput of input-queued ATM switches. We report the results from a simulation study of the associated improvements in the average cell delay. Our results indicate sharp reductions in the average cell delays, and our simulations include cases of both uncorrelated and correlated traffi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NetRAP-a network resource allocation protocol for IP over Ethernet

    Publication Year: 1997, Page(s):434 - 441
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (772 KB)

    For more than a decade, IP over the Ethernet has been the dominating local area network technology because it is cost-efficient, simple and reliable. Unfortunately, it does not support the transport of continuous data as generated by multimedia applications. The large number of IP installations makes it necessary to find ways to provide support for multimedia applications in existing network envir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.