By Topic

Computers and Communications, 1998. ISCC '98. Proceedings. Third IEEE Symposium on

June 30 1998-July 2 1998

Filter Results

Displaying Results 1 - 25 of 132
  • Proceedings Third IEEE Symposium on Computers and Communications. ISCC'98. (Cat. No.98EX166)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (631 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1998, Page(s):717 - 720
    Request permission for commercial reuse | PDF file iconPDF (383 KB)
    Freely Available from IEEE
  • A channel sharing scheme to improve system capacity in wireless cellular networks

    Publication Year: 1998, Page(s):700 - 704
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    Enhancing system capacity is an important issue in wireless cellular networks. In this paper, we present a new channel sharing scheme to address this problem. Our basic idea is to allow channels to be shared between adjacent cells. We propose a fixed channel assignment scheme to maximize channel reuse efficiency while allowing channel sharing. An important feature of our sharing scheme is that cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Functional considerations for development of SDH technology-based broadband digital cross-connect system

    Publication Year: 1998, Page(s):510 - 514
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (880 KB)

    It is necessary to enhance the telecommunication environments to support high speed and flexible networking. To meet this purpose, the paper describes the functional considerations for the development of a digital cross-connect system, named the BDCS (broadband DCS), that is based on the SDH (synchronous digital hierarchy) technology. These are the switching functions, network survivability functi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recirculation in a fault-tolerant MIN

    Publication Year: 1998, Page(s):622 - 626
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    As the fault tolerance capability in multistage interconnection network based ATM switches is an important design consideration, many switches provide multiple paths between input and output ports. This may result in an increase of the bandwidth of the network. When the switch has no faults or few faults, the increase in bandwidth of the network can be utilized to improve the throughput of the net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A TNET database server for production flow control

    Publication Year: 1998, Page(s):669 - 674
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (40 KB)

    A PC TNET (multi-drop polling network) database server is presented. The PC serves as the data acquisition controller of a polled multi-drop network that retrieves information from input terminals. The PC server simultaneously receives data from any combination of terminals on the network. It then updates a local SQL database while allowing access from users connected to the server via an Ethernet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On congestion problems in digital cross-connect (DCS) transport networks

    Publication Year: 1998, Page(s):503 - 509
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (956 KB)

    In today's environment where traffic demands within a network are increasing rapidly, planning and designing a network are assuming great importance. Rapidly rising traffic within the network is leading to network congestion, requiring solutions to cope with the increasing demand. We address the question of network planning and design, focusing in particular on alleviation of congestion at digital... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An enhanced distributed call admission control for wireless systems

    Publication Year: 1998, Page(s):695 - 699
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    Call admission control (CAC) is one of the key elements to provide quality of service (QoS) guarantee in wireless mobile networks. A good CAC scheme should efficiently support handoffs and maintain a high utilization of the scarce radio resource while it should also be simple for implementation. Since the traditional guard channel policy is not optimal for a hard constrained handoff dropping proba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What Standards are Needed for Multimedia Communications?

    Publication Year: 1998, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced service creation in distributed heterogeneous environments

    Publication Year: 1998, Page(s):221 - 225
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    Important factors that will determine the success of service providers in the competitive communications market of the future are the efficiency with which the services will be developed, the “quality” of the service deployment, and the quality levels at which the services will be provided. A service creation environment (SCE) should provide the service developer with solutions to thes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the performance of reconfigurable WDM lightwave networks with deflection routing via node reassignment

    Publication Year: 1998, Page(s):385 - 389
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    We consider the problem of improving the throughput and the packet delay of reconfigurable WDM optical networks under deflection routing. Previous results showed that the performance of WDM networks under store-and-forward routing can be improved by properly assigning the network nodes to network locations. Here we apply this reassignment method to networks with deflection routing and formulate th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A market based approach for efficient resource management in an intranet

    Publication Year: 1998, Page(s):662 - 668
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    In this paper a pricing technique for resource management in an intranet environment is given. The price of the services are dynamically determined by the servers of the network, taking into account the general policy of the manager of the network. Both decentralized and centralized control is used to increase the efficiency of the network. An architecture imposing small implementation cost is pre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signalling channel handling in wireless ATM networks

    Publication Year: 1998, Page(s):423 - 428
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    The introduction of ATM in wireless CPN environments (WATM) necessitates the design of mobility related protocols, since the existing versions of B-ISDN signalling (ITU-T Q.2931, ATMF UNI 3.1) do not provide the means for terminal mobility. Such protocols can be deployed either as extensions to the standard signalling capabilities or as individual solutions that have little or no impact on existin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated model for intranet security using prevention and detection techniques

    Publication Year: 1998, Page(s):498 - 502
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (772 KB)

    This paper presents a new model for securing an intranet, connected to the Internet, based on a hybrid technique. The model integrates two security modules; the prevention module and the detection module. The proposed model provides a dynamic binding between the two modules. A comparison between the proposed model and the classical security techniques proved the effectiveness of the new model View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stability and throughput improvement for multichannel CSMA and CSMA/CD protocols with optimal bandwidth allocation

    Publication Year: 1998, Page(s):642 - 646
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    This paper examines appropriate protocols for high speed multiple access communication systems where the bandwidth is divided into two separate asymmetric channels. Both channels operate using slotted nonpersistent CSMA or CSMA/CD techniques. Free stations access the first channel while all retransmissions occur in the second channel. We define the stability regions and the rules for optimal bandw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of network dynamics on end-to-end protocols: case studies in reliable multicast

    Publication Year: 1998, Page(s):147 - 153
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    End-to-end protocols measure network characteristics and react based on their estimates of network performance. Network dynamics can alter the topology significantly, and thereby affect protocol operation. Topology changes may result in routing pathologies (such as route loops, packet interleaving), changes to the end-to-end path characteristics, network partition etc., that then impact the perfor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling the access of shared variables for the two communication nodes parallel structures

    Publication Year: 1998, Page(s):216 - 220
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (40 KB)

    Scheduling algorithms should be provided to order parallel processes competing to access shared variables such that the execution time of their fork-join (parallel) structure is minimum. Previous research work focused on developing scheduling algorithms for single communication node parallel structures. In this paper we introduce a heuristic scheduling algorithm called maximum remaining time (MRT)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the performance bounds of optical LANs based on WDM

    Publication Year: 1998, Page(s):380 - 384
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    We introduce an analytical model to obtain the performance bounds for a single hop optical network based on WDM. We model the network under saturation traffic loading while ignoring the specific channel access scheme as a multi-class closed queueing network (BCMP network), for which a product-form solution for the steady-state probabilities exists. Therefore the exact solutions can be derived. In ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive buffer threshold updating for an ATM switch

    Publication Year: 1998, Page(s):400 - 405
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB)

    Efficient and fair use of buffer space in ATM switches is essential to gain high throughput and low cell-loss performance from the network. A shared buffer architecture associated with threshold based virtual partition among output ports is proposed. Thresholds are updated based on traffic characteristics on each outgoing link, so as to adapt to traffic loads. System behavior under varying traffic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A videoconference system for network operations and maintenance

    Publication Year: 1998, Page(s):657 - 661
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    This paper presents the results of experiments performed to compare the effects of H.320-based videoconferencing traffic on LANs and WANs with those produced by other non-video traffic on the same networks. The work was part of a project that investigated the use of videoconferencing in a system for network operations and maintenance staff. The computer and network department in the European Space... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient route generation algorithm for distributed multi-layered network

    Publication Year: 1998, Page(s):418 - 422
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    Minimizing the cost of routing calculations is crucial for scaling up networks. This paper outlines a method for computing the shortest path in a hierarchical network by applying Dijkstra's (1959) algorithm to various subsets in an entire graph. In the proposed method, the routing calculations increase linearly with the number of layers, while they increase as a square of the number of layers in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DHCP for IPv6

    Publication Year: 1998, Page(s):493 - 497
    Cited by:  Papers (2)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    The Dynamic Host Configuration Protocol (DHCPv6) provides a framework for passing configuration information via extensions, to IPv6 nodes. It offers the capability of automatic allocation of reusable network addresses and additional configuration flexibility. This protocol should be considered a stateful counterpart to the IPv6 Stateless Address Autoconfiguration protocol specification, and can be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive channel allocation for cellular communication systems

    Publication Year: 1998, Page(s):690 - 694
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    Frequency reuse is a key property of cellular mobile communication systems. The frequency spectrum can be more effectively exploited if the allocation of the available channels to cells takes into account the traffic distribution. Dynamic channel allocation (DCA) algorithms adapt continuously to the traffic changes. In this paper both static and dynamic algorithms are proposed and studied. The opt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithms for locating resources in a communication network

    Publication Year: 1998, Page(s):637 - 641
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB)

    Both data communication and telecommunication networks consist of nodes, links and network resources. Many studies deal with the design of optimal network topologies. In current methodologies, every node presents the same constraints and behavior, while in reality, the network resources vary. The research problem at stake is how to add central network resources (i.e., servers, gateways, network ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analytical and simulation analysis of the explicit-rate ABR flow control algorithms: transient behavior

    Publication Year: 1998, Page(s):271 - 275
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    An analytical formulation of the transient behavior of the available bit rate (ABR) explicit-rate traffic flow control for the single-node case is presented. Precisely, the transient effects due to available capacity increasing (a ramp-up) of the previously proposed distributed explicit-rate allocation (DERA) scheme, and generally valid available capacity decreasing (a ramp-down) transient case ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.