By Topic

Local Computer Networks, 1997. Proceedings., 22nd Annual Conference on

Date 2-5 Nov. 1997

Filter Results

Displaying Results 1 - 25 of 62
  • Proceedings of 22nd Annual Conference on Local Computer Networks

    Publication Year: 1997
    Request permission for commercial reuse | PDF file iconPDF (317 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1997, Page(s):562 - 563
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Early selective packet discard for alternating resource access of TCP over ATM-UBR

    Publication Year: 1997, Page(s):306 - 316
    Cited by:  Papers (2)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (892 KB)

    We investigate packet discarding schemes for TCP over ATM with UBR service. In doing so, we tested the effective throughput of two existing schemes, Partial Packet Discard (PPD) and Early Packet Discard (EPD), as compared to the Random Cell Discard (RCD) scheme which discards any incoming cells after buffer overflow. We observed that PPD alleviates the effect of packet fragmentation so that it get... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient fault-tolerant reliable broadcast in an extended LAN

    Publication Year: 1997, Page(s):149 - 158
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB)

    Several efficient reliable broadcast protocols have been developed and implemented on broadcast LANs. To enhance the amount of bandwidth available per node on a shared media LAN, such as 10 Mb/s Ethernet, there is a rapidly growing usage of LAN switches to interconnect several independent LAN segments to form an Extended LAN (E-LAN). The existing reliable broadcast protocols may be inefficient in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Video distribution to the home using advance reservation

    Publication Year: 1997, Page(s):170 - 178
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    Through the Internet and service providers such as cable companies it will be possible to receive a wide range of services such as Internet access, video distribution and television in the home. However, a bottleneck in these systems is the bandwidth available to the home and over the cable tv network. In this paper, the use of advance reservation for non-interactive services is proposed to allevi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preserving cell sequence of handoff connections in wireless ATM networks

    Publication Year: 1997, Page(s):112 - 122
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    Preserving ATM cell sequencing is an important issue in the future wireless ATM network. Out-of-sequence ATM cells will cause entire data frame to be discarded and causes either data retransmission or quality of service degradation. Currently there is no connection handoff scheme providing a schematic method to preserve ATM cell sequencing. In this paper, we investigate the issue of preserving ATM... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple access for third-generation personal communication systems

    Publication Year: 1997, Page(s):123 - 132
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (940 KB)

    The role of the multiple access protocol in future personal communication systems is to provide efficient and timely access to multirate broadband applications involving integrated voice, video and data services. In addition, the protocol is required to operate with the difficult constraints posed by moving users, dynamic traffic load variations and highly sensitive wireless links. Recognizing thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DBP-M: a technique for meeting end-to-end (m, k)-firm guarantee requirement in point-to-point networks

    Publication Year: 1997, Page(s):294 - 303
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (876 KB)

    A real time message stream is said to have an (m, k) firm guarantee requirement if at least m out of any k consecutive messages from the stream must meet their deadlines to ensure adequate quality of service. M. Hamdaoui and P. Ramanathan (1995) recently proposed a scheduling policy called Distance based Priority Assignment (DBP) to better service multiple real time streams, each with its own (m, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of a bridge between CORBA and DCE

    Publication Year: 1997, Page(s):64 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    This paper considers a bridge which can be used for the communication between the Common Object Request Broker Architecture (CORBA) and the Distributed Computing Environment (DCE). A bridge can overcome the heterogeneity of different distributed middleware platforms. The key point in creating bridges is the design and implementation of the mapping function and interface definition language (IDL) t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The effectiveness of cell-level FEC for packet delivery in ATM networks

    Publication Year: 1997, Page(s):264 - 273
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB)

    The authors examine the issue of how packet delivery can be made more reliable over ATM networks. While forward error correction (FEC) techniques have been proposed in the past by many researchers to address the data loss issues in ATM networks, the focus of the paper is on analyzing the cost-performance aspects of cell-level FEC for packet traffic. Specifically, they examine the tradeoff between ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Next hop resolution using classical IP over ATM

    Publication Year: 1997, Page(s):106 - 110
    Cited by:  Papers (1)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    In principle, more than one routers are intervened between different IP subnets. IETF RFC1577 “Classical IP and ARP over ATM”, which is specified to provide IP services on ATM network, also requires that the router be used between different LISs (Logical IP subnet). However, the intervention of the router is not always an effective solution on ATM network. If there is a direct virtual ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient estimation of cell loss and cell delay of nonblocking ATM switches

    Publication Year: 1997, Page(s):142 - 148
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB)

    The performance evaluation of ATM switches is of paramount importance in the design and analysis of ATM networks. In this paper, we focus on the evaluation of the cell loss rate (CLR) and cell delay probability (CDP) in nonblocking ATM switches using computer simulations. In particular, we investigate the potential of using importance sampling techniques as an “superfast” alternative t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive and selective cell drop policy with dynamic data partitioning for best effort video over ATM

    Publication Year: 1997, Page(s):519 - 528
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (928 KB)

    We propose and evaluate a new MPEG based video delivery framework for use with ATM best effort services (e.g. available bit rate and unspecified bit rate). The presented framework relies on three components: a video oriented cell discarding scheme, which adaptively and selectively adjusts drop level to switch buffer occupancy and video cell payload types; a dynamic frame level priority data partit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving communication network topologies using tabu search

    Publication Year: 1997, Page(s):44 - 53
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    This paper proposes a tabu search approach for improving communication network topologies. The problem consists of finding, for a given set of nodes and traffic requirements, a network topology that minimizes the communication cost taking into account some performance and reliability constraints. For this purpose, some moves or focal transformations called perturbations are applied to a starting t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selective discarding with FEC for ATM-based internetworks

    Publication Year: 1997, Page(s):284 - 293
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (876 KB)

    If the reliability provided by the network is lower than that requested by the application, the error and flow control systems in the end nodes must make up for the difference. While most applications use retransmission based schemes to recover lost data, ARQ based closed loop techniques may not be suitable for many new applications. Time sensitive information requiring no loss of data would const... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security services and public key infrastructure for ATM networks

    Publication Year: 1997, Page(s):253 - 262
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (912 KB)

    The paper addresses the design of security services for ATM networks. First various options for the placement of security services within the ATM protocol stack are outlined. Then a security layer between the AAL and ATM layer is considered. The proposed security layer provides confidentiality, integrity and data origin authentication in the user plane. The paper then presents an authentication sc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MC2 platform for mobile and wireless computing

    Publication Year: 1997, Page(s):239 - 244
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    Portable computers can be connected to a network by wireless communication while the user is moving. Users can enjoy this capability and use services on a computer network in any place and at any time. This new style of computer usage is called “mobile computing”. In a mobile computing environment there are some problems which are caused by using wireless interfaces, such as disconnect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive streaming of MPEG video over IP networks

    Publication Year: 1997, Page(s):398 - 409
    Cited by:  Papers (15)  |  Patents (83)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1156 KB)

    The authors present the design of an adaptive service for streaming MPEG video over a best-effort IP network environment. The adaptive video streaming service exploits the inherent adaptiveness of video applications to perform controlled and graceful adjustments to the perceptual quality of the displayed MPEG video stream in response to fluctuations in the QoS delivered by the three primary compon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical experiences with a transport layer extension for end-to-end bandwidth regulation

    Publication Year: 1997, Page(s):337 - 346
    Cited by:  Papers (3)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (928 KB)

    The paper presents an extension of the transport layer to control the bandwidth used by data flows in heterogeneous networks in case of network congestion. The regulation mechanism is operating on an end to end basis. It does not depend on a negotiation of quality of service (QoS) parameters prior to the data transmission. Instead it uses a relative QoS concept based on a classification of data fl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy optimization model for routing in B-ISDN

    Publication Year: 1997, Page(s):89 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB)

    Broadband integrated services digital networks (B-ISDN) support a wide range of applications with diverse traffic characteristics. Routing algorithms are required to guarantee the quality of service (QoS) requested by these traffic classes. In this paper, the routing problem is formulated as a fuzzy multiobjective optimization model. The fuzzy approach allows for the inclusion and evaluation of se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new explicit rate-based congestion control scheme for ABR services

    Publication Year: 1997, Page(s):195 - 201
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    The ATM Forum has adopted the rate-based scheme as the standard for ABR services. Effective ABR services are essential for ATM LAN emulation. The authors propose a new algorithm or scheme that has equivalent or better performance than existing schemes, but requires only O(1) computation. This O(1) computation is independent of both the number and rates of the connections. The scheme, called the &l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast optimal slot reuse scheme for CRMA high speed networks

    Publication Year: 1997, Page(s):220 - 229
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    Cyclic-reservation multiple-access (CRMA) is an access scheme for high-speed local and metropolitan area networks based on folded-bus or dual-bus configurations. CRMA provides high throughput and fairness independent of the network speed or distance. In CRMA, the headend generates reserve commands periodically. Each station may reserve a number of empty slots in each reserve command if necessary. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dial-in virtual private networks using layer 3 tunneling

    Publication Year: 1997, Page(s):555 - 561
    Cited by:  Patents (60)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    Corporate networks are making increasing use of the Internet to connect geographically diverse site networks rather than developing their own “leased line” WAN networks. Similarly, they are outsourcing their dial-in capability by replacing their banks of modems with a single connection to a service provider with geographically diverse Points Of Presence (POPs). In this way, users in a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable multicast under error conditions

    Publication Year: 1997, Page(s):379 - 386
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    Reliable multicast protocols provide means to deliver data from one sender to many receivers with assurance. Reliable multicast is better suited than unicast for bandwidth restricted, high error rate, hostile communications environments found in the military's tactical arena. General purpose protocols ensure adaptability to the military's variety of communications suites. Acceptable multicast prot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent-based architecture for advance reservations

    Publication Year: 1997, Page(s):451 - 459
    Cited by:  Papers (16)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (888 KB)

    The authors propose an architecture where clients can make advance reservations through agents. For each routing domain in the network there will be an agent responsible for admission control on behalf of the routers in the domain. Requests involving several routing domains are forwarded for admission control with agents along the path for the requested service. Agents maintain hard reservation st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.