Proceedings of 22nd Annual Conference on Local Computer Networks

2-5 Nov. 1997

Filter Results

Displaying Results 1 - 25 of 62
  • Proceedings of 22nd Annual Conference on Local Computer Networks

    Publication Year: 1997
    Request permission for commercial reuse | PDF file iconPDF (317 KB)
    Freely Available from IEEE
  • A dynamic routing procedure for connections with quality of service requirements

    Publication Year: 1997, Page(s):460 - 468
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB)

    Emerging high-speed networks will support a number of real-time services required by distributed multimedia applications, such as video-on-demand. To support these services, appropriate routing procedures should be used; upon receipt of a request to open a new connection with certain quality of service (QoS) requirements, an appropriate routing procedure calculates an "optimal" route (with respect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 1997, Page(s):562 - 563
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • The effectiveness of cell-level FEC for packet delivery in ATM networks

    Publication Year: 1997, Page(s):264 - 273
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB)

    The authors examine the issue of how packet delivery can be made more reliable over ATM networks. While forward error correction (FEC) techniques have been proposed in the past by many researchers to address the data loss issues in ATM networks, the focus of the paper is on analyzing the cost-performance aspects of cell-level FEC for packet traffic. Specifically, they examine the tradeoff between ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security services and public key infrastructure for ATM networks

    Publication Year: 1997, Page(s):253 - 262
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (912 KB)

    The paper addresses the design of security services for ATM networks. First various options for the placement of security services within the ATM protocol stack are outlined. Then a security layer between the AAL and ATM layer is considered. The proposed security layer provides confidentiality, integrity and data origin authentication in the user plane. The paper then presents an authentication sc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical experiences with a transport layer extension for end-to-end bandwidth regulation

    Publication Year: 1997, Page(s):337 - 346
    Cited by:  Papers (3)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (928 KB)

    The paper presents an extension of the transport layer to control the bandwidth used by data flows in heterogeneous networks in case of network congestion. The regulation mechanism is operating on an end to end basis. It does not depend on a negotiation of quality of service (QoS) parameters prior to the data transmission. Instead it uses a relative QoS concept based on a classification of data fl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security and efficiency in authentication protocols resistant to password guessing attacks

    Publication Year: 1997, Page(s):245 - 252
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB)

    Cryptographic protocols for authentication and key exchange are necessary for secure communications. Most protocols have assumed that a strong secret for authentication should be shared between communicating participants in the light of a threat of dictionary attacks. But a user-chosen weak secret, i.e. password, is typically used for authentication. Since most users want to use an easily memoriza... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An enhanced communication protocol for flexible interconnection

    Publication Year: 1997, Page(s):327 - 336
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    We developed an enhanced communication protocol that connects nodes in a logical ring configuration via a high speed network, circulates service request messages on the network, and controls the fulfillment of these requests and their capture to optimum nodes. This protocol is based on horizontal and vertical migration, from the cooperative processing conventionally enabled by communication betwee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MC2 platform for mobile and wireless computing

    Publication Year: 1997, Page(s):239 - 244
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    Portable computers can be connected to a network by wireless communication while the user is moving. Users can enjoy this capability and use services on a computer network in any place and at any time. This new style of computer usage is called “mobile computing”. In a mobile computing environment there are some problems which are caused by using wireless interfaces, such as disconnect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rate control of real-time MPEG-2 over ATM DBR service with bandwidth re-negotiation

    Publication Year: 1997, Page(s):388 - 397
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB)

    The rate control method of MPEG-2 over the ATM DBR service class is proposed. It is intended to guarantee the quality of service required by video applications. The disadvantages of MPEG-2 Test Model 5 are resolved by introducing the bandwidth re-negotiation with the network. And user-oriented high quality video transfer can be guaranteed with the method View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selective discarding with FEC for ATM-based internetworks

    Publication Year: 1997, Page(s):284 - 293
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (876 KB)

    If the reliability provided by the network is lower than that requested by the application, the error and flow control systems in the end nodes must make up for the difference. While most applications use retransmission based schemes to recover lost data, ARQ based closed loop techniques may not be suitable for many new applications. Time sensitive information requiring no loss of data would const... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preserving cell sequence of handoff connections in wireless ATM networks

    Publication Year: 1997, Page(s):112 - 122
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    Preserving ATM cell sequencing is an important issue in the future wireless ATM network. Out-of-sequence ATM cells will cause entire data frame to be discarded and causes either data retransmission or quality of service degradation. Currently there is no connection handoff scheme providing a schematic method to preserve ATM cell sequencing. In this paper, we investigate the issue of preserving ATM... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient fault-tolerant reliable broadcast in an extended LAN

    Publication Year: 1997, Page(s):149 - 158
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB)

    Several efficient reliable broadcast protocols have been developed and implemented on broadcast LANs. To enhance the amount of bandwidth available per node on a shared media LAN, such as 10 Mb/s Ethernet, there is a rapidly growing usage of LAN switches to interconnect several independent LAN segments to form an Extended LAN (E-LAN). The existing reliable broadcast protocols may be inefficient in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The optimal virtual path design of ATM networks

    Publication Year: 1997, Page(s):159 - 167
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    This paper studies the optimal configuration of virtual paths in ATM networks. A linear model that minimizes the maximum flow density of links is proposed for the optimal virtual path configuration. The advantage of the modeling is that traffic loads are distributed evenly over entire network. An algorithm based on the multi-commodity approach is proposed to solve the problem. Examples are given t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dial-in virtual private networks using layer 3 tunneling

    Publication Year: 1997, Page(s):555 - 561
    Cited by:  Patents (61)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    Corporate networks are making increasing use of the Internet to connect geographically diverse site networks rather than developing their own “leased line” WAN networks. Similarly, they are outsourcing their dial-in capability by replacing their banks of modems with a single connection to a service provider with geographically diverse Points Of Presence (POPs). In this way, users in a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interconnecting fieldbuses through ATM

    Publication Year: 1997, Page(s):538 - 544
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    Networks for factory automation, often named fieldbuses, have been developed to fulfill real time requirements. However, they can only cover geographical areas such as factory halls or buildings. The paper describes a model for internetworking fieldbuses via ATM networks. A remote bridge is used to span longer distances between fieldbus components in a separated fieldbus. Furthermore, a multiport ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and evaluation of a control plane architecture for the ATM access network

    Publication Year: 1997, Page(s):494 - 503
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    The dynamic operation of ATM access networks (ANs) calls for the incorporation of advanced signalling functionality also in the access part of the ATM core network. Instead of implementing the entire control plane in the AN, we take advantage of the separation between call, bearer and channel control and we proceed with a simple, standard compliant bearer channel control architecture for the ATM A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive location management algorithm for mobile computing

    Publication Year: 1997, Page(s):133 - 140
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    In mobile computing mobile hosts or mobile units move randomly from one place to another within a well-defined geographical area. This requires some mechanism for identifying the exact location of a mobile host. Such mechanisms are usually referred to as location management and is one of the essential components for supporting mobility. In the past a number of efficient location management schemes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing the effects of large propagation delays on high speed IEEE 802.3 CSMA/CD networks using collision truncation

    Publication Year: 1997, Page(s):317 - 326
    Cited by:  Papers (2)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB)

    A half duplex repeater is the cheapest method for connecting multiple hosts to an IEEE 802.3 Ethernet LAN. However, if we increase the data rate from 10 Mb/s Ethernet to 100 Mb/s Fast Ethernet, shared access via CSMA/CD becomes less efficient because of the resulting increase in size of the collision fragments. For example, in a typical star wired single repeater network with a diameter of 200 met... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive and selective cell drop policy with dynamic data partitioning for best effort video over ATM

    Publication Year: 1997, Page(s):519 - 528
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (928 KB)

    We propose and evaluate a new MPEG based video delivery framework for use with ATM best effort services (e.g. available bit rate and unspecified bit rate). The presented framework relies on three components: a video oriented cell discarding scheme, which adaptively and selectively adjusts drop level to switch buffer occupancy and video cell payload types; a dynamic frame level priority data partit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance monitoring of a wireless campus area network

    Publication Year: 1997, Page(s):232 - 238
    Cited by:  Papers (4)  |  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB)

    In the relatively new field of wireless local area networks there exist three methods for performance evaluation: (1) mathematical analysis; (2) computer simulation; and (3) performance monitoring of a testbed. The data obtained from mathematical analysis and computer simulation are purely speculative, there is simply no way these methods can address all of the complexities associated with network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable multicast under error conditions

    Publication Year: 1997, Page(s):379 - 386
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    Reliable multicast protocols provide means to deliver data from one sender to many receivers with assurance. Reliable multicast is better suited than unicast for bandwidth restricted, high error rate, hostile communications environments found in the military's tactical arena. General purpose protocols ensure adaptability to the military's variety of communications suites. Acceptable multicast prot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy optimization model for routing in B-ISDN

    Publication Year: 1997, Page(s):89 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB)

    Broadband integrated services digital networks (B-ISDN) support a wide range of applications with diverse traffic characteristics. Routing algorithms are required to guarantee the quality of service (QoS) requested by these traffic classes. In this paper, the routing problem is formulated as a fuzzy multiobjective optimization model. The fuzzy approach allows for the inclusion and evaluation of se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LAN-ATM internetworking over a priority-based slotted-ring network

    Publication Year: 1997, Page(s):54 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (840 KB)

    Bandwidth-intensive and delay-sensitive applications demand ATM technology to be brought into every desktop. However, it is very costly in terms of both hardware and software to replace a traditional LAN such as Ethernet and token ring by an ATM network. Therefore, internetworking LANs with an ATM backbone network is considered a cost-effective and most promising solution for bringing ATM into the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A native ATM protocol architecture design and performance evaluation

    Publication Year: 1997, Page(s):204 - 210
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    ATM networks offer the Quality of Service (QoS) guarantees required for future multimedia applications. Native mode ATM access offers full access to ATM's Quality of Service capabilities in homogeneous ATM networks and provides support for a wide range of information streams with different properties and requirements. The author presents a native ATM service architecture offering a common service ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.