By Topic

ATM, 1998. ICATM-98., 1998 1st IEEE International Conference on

Date 22-24 June 1998

Filter Results

Displaying Results 1 - 25 of 72
  • 1998 1st IEEE International Conference on ATM. ICATM'98

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (346 KB)
    Freely Available from IEEE
  • Dynamic multicast on loss networks

    Publication Year: 1998, Page(s):145 - 154
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1048 KB)

    Dynamic multicast allows members to join or leave the multicast session during its active period. In this paper, we propose a dynamic multicast routing scheme which integrates the consideration of maximum-free-circuit routing on loss networks and changes of membership. Two reference reward estimation schemes, the uniform reference reward scheme and weighted reference reward scheme for the maximum-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A measurement based connection admission control for ATM networks

    Publication Year: 1998, Page(s):140 - 144
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    A new adaptive measurement-based connection admission control (CAC) for ATM networks is proposed. Several CAC methods are considered, and the efficiency/complexity trade-off is studied. In all methods, when a new call arrives, the CAC makes a decision to accept or reject the call according to a novel procedure for free bandwidth evaluation. This procedure is based on online measurements and on an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and simulation of a recently proposed flow control algorithm for ATM networks: Phantom

    Publication Year: 1998, Page(s):133 - 139
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    The ATM Forum has adopted rate based schemes as standard for flow control. Although Phantom is also based on rate, no information about any implementation of it has been found. The results of a simulation study of Phantom are presented in this paper; it exhibits a low peak buffer occupancy dependency on the number of sessions, even under progressively increasing traffic loads, a high link utilizat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flow control and bandwidth management in next generation Internets

    Publication Year: 1998, Page(s):123 - 132
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1004 KB)

    The Internet has traditionally relied on end-to-end congestion control performed at the transport layer, where sources reduce their offered traffic only after congestion sets in. By then, network resources have been wasted and effective throughput compromised. In next generation Internets, the delay-bandwidth product is large and bandwidth is a precious resource. Hence, in this paper we present a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An experimental study for transmitting MPEG-2 streams over ATM networks

    Publication Year: 1998, Page(s):114 - 122
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (972 KB)

    This paper presents a comparative study of the different techniques aimed at transmitting MPEG-2 streams over ATM networks, with emphasis on the presentation of practical results achieved on an experimental platform available at LSI, a laboratory of the University of Sao Paulo, Brazil. This study determines some tuning parameters for optimizing the implementation of distributed multimedia applicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple leaky buckets with buffer sharing for MPEG video in ATM networks

    Publication Year: 1998, Page(s):107 - 113
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    This paper presents a new flow control scheme based on multiple leaky buckets (MLB) for MPEG video in ATM networks. A basic assumption was made that not all MPEG traffic sources simultaneously generate data at their maximum rate. Unlike the conventional leaky bucket (LB), the leaky rate and buffer capacity of all LBs are shared in the same virtual path. In our mechanism, the leaky rate and buffer ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network interworking for narrowband services over an ATM network

    Publication Year: 1998, Page(s):200 - 206
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    In the evolution towards the broadband integrated services digital network (B-ISDN), the existing services and applications, which are used in N-ISDN, should be provided through the interworking function. Network interworking between N-ISDN and B-ISDN is one of the most important technical issues to provide existing N-ISDN services for N-ISDN users. As a trunking method to fulfil the interworking ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource location in mobile ATM networks

    Publication Year: 1998, Page(s):423 - 430
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (840 KB)

    This paper discusses the location management of mobile resources in ATM networks, with a focus on mobile switches and mobile networks. Two location management schemes are presented. The first one uses location registers to maintain a mapping between permanent addresses of mobile devices and assigned visitor addresses. The effect of mobility is isolated from standard routing, and a two-step routing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing in a hierarchical structure

    Publication Year: 1998, Page(s):378 - 384
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    This paper considers routing in a given hierarchical structure. The work is inspired by the ATM Forum's PNNI specification. It is argued that any routing problem that has a solution in a single (flat) network is also tractable and feasible in a hierarchy View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of cell discarding mechanisms for hierarchical VBR MPEG-2 video traffic over ATM networks

    Publication Year: 1998, Page(s):97 - 106
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (876 KB)

    Different performance studies have been made in the literature with cell discarding mechanism using analytical traffic models. The performance of these discarding schemes is strongly affected by the traffic model used. Hence, it is very important to study the performance of cell discarding mechanisms using real traffic statistics. In this paper simulation experiments are conducted to study the per... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and applications of ATM LAN/WAN adapters

    Publication Year: 1998, Page(s):191 - 198
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    ATM networks are today operational, both as backbones for existing LAN technologies and as commercial wide-area multiservice networks. Still, in the early deployment of multi-site ATM networks, a number of difficulties have arisen out of the differences between the service definitions in local ATM networks and long distance carrier networks. In particular, the adaptation of LAN emulation protocols... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power-saving mode of operation in the WATM MAC protocol

    Publication Year: 1998, Page(s):25 - 30
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    The limited energy stored in the battery-operated mobile equipment leads to the development of protocols that preserve it as much as possible. Existing MAC protocols for wireless communications, such as GSM, IEEE 802.11, and HIPERLAN, allow the mobile terminals to operate in different power-saving modes. We briefly present the case for the existing radio LAN, describe the WATM MAC protocol, and in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance implications of QoS mapping in heterogeneous networks involving ATM

    Publication Year: 1998, Page(s):529 - 535
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    In this paper we discuss issues relating to the mapping of QoS parameters in an IP/ATM environment. We conduct preliminary experiments with constant TP packet rate, which after segmentation in AAL5, generates a jittered CBR cell stream. We use this stream to investigate the effect of parameter translation on the QoS received by the application. Results indicate that translation does have a signifi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cells in frames: ATM over legacy networks

    Publication Year: 1998, Page(s):418 - 422
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    Cells in frames is a technology developed at Cornell University in conjunction with members of the CIF Alliance which provides a mechanism for running complete ATM protocol stacks, along with service quality guarantees, on legacy, frame-based networking hardware such as Ethernet or token ring. The CIF protocol also provides for the use of variable-length ATM packets, potentially reducing the cell ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proxy PNNI augmented routing (proxy PAR)

    Publication Year: 1998, Page(s):371 - 377
    Cited by:  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    ATM networks often carry other popular communication protocols such as TCP/IP. LAN emulation techniques, with LANE and MPOA being the most prominent ones, make it possible to support existing applications, but do not take advantage of many ATM capabilities. Furthermore, such server-based solutions often suffer from a single point of failure problems. PNNI augmented routing (PAR), based on private ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication protocols for wireless ATM networks

    Publication Year: 1998, Page(s):87 - 96
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    With the growing acceptance of ATM as the standard for broadband networking and the increasing importance of wireless devices, it has become appropriate to extend ATM application to wireless platforms. Adding a wireless network to existing wired networks creates a new set of problems. Security functions have to be reconsidered since wired network security does not account for the open medium, mobi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of frame discard strategies in ATM networks

    Publication Year: 1998, Page(s):473 - 476
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    The flow of papers proposing new schemes to cope with congestion in networks continues unabated. In particular, as the deployment of ATM networks advances, effective congestion control is required to ensure that these networks can effectively provide the wide range of services that they promise. This paper will attempt to evaluate whether recently proposed algorithms are likely to be useful in pra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Communication application programming interfaces with quality of service support

    Publication Year: 1998, Page(s):311 - 318
    Cited by:  Papers (2)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    The provision of a communication infrastructure which is able to support applications for life long learning is a major challenge. Distance learning and teletraining applications will be heavily based on multimedia information. The communication infrastructure has to provide end-to-end quality of service (QoS) support via application programming interfaces (APIs) to the applications. Therefore we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LMDS systems: a possible solution for wireless ATM access networks

    Publication Year: 1998, Page(s):41 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (952 KB)

    The paper presents a study of LMDS systems in a multi-service traffic scenario. LMDS systems provide broadband wireless access from several multimedia user interfaces to a central node. A number of slotted radio channels are available to accommodate requests of transmission to and from user interfaces. The paper proposes resource allocation strategies for multi-service traffic scenarios, and signa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture for flexible high level communication services

    Publication Year: 1998, Page(s):184 - 190
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    The broadband integrated service digital network (B-ISDN) will have to offer real-time communication services; that is, it will have to transport information with performance guarantees. In this paper, we propose a communication system for real-time applications using a 155 Mbits/sec ATM (asynchronous transfer mode) switch. This system is based on an intelligent communication board for PCs (person... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues on connection allocation for supporting distributed real-time systems on ATM networks

    Publication Year: 1998, Page(s):168 - 177
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (900 KB)

    With the increase in use of distributed real-time systems (DRTS), the ability of networks to handle time-constrained traffic is becoming more and more important. This paper examines one of the most promising networks for future DRTS, namely ATM. On one hand, there exist applications with various types of time constraints associated with messages generated by control activities, database access act... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM for wireless networks

    Publication Year: 1998, Page(s):16 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (968 KB)

    Growing emphasis on broadband multimedia traffic has underlined the importance of asynchronous transfer mode (ATM) networks which are capable of accommodating demanding applications such as audio/video playback, image browsing, real-time voice/video transmission and interactive data exchange in a unified manner. However, the extension of ATM from wireline to wireless creates a new set of challengi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simulator for and results of comparing ABR flow controls for ATM

    Publication Year: 1998, Page(s):334 - 342
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1100 KB)

    The paper describes the design of a simulator capable of investigating a number of ATM flow-control algorithms. The event driven simulator contains a minimum number of component types-queues, connections and routes. The first two are the only participants generating events. The major data elements are packets which logically can contain any number of cells but the simulator provides for packet tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation study of AAL type 2

    Publication Year: 1998, Page(s):522 - 528
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    Cellular network applications are growing drastically and this requires a fast and efficient transport method between the base station and the mobile switching center. One possible solution is to use ATM links. The low data rate and small-sized packets in the typical cellular applications imply that a significant amount of link bandwidth would be wasted if this small sized packet is carried by one... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.