By Topic

Computer Communications and Networks, 1998. Proceedings. 7th International Conference on

Date 15-15 Oct. 1998

Filter Results

Displaying Results 1 - 25 of 122
  • Author index

    Publication Year: 1998, Page(s):926 - 929
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE
  • Proceedings 7th International Conference on Computer Communications and Networks (Cat. No.98EX226)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (540 KB)
    Freely Available from IEEE
  • Some results on estimation and modeling of switch transit traffic in a backbone network

    Publication Year: 1998, Page(s):905 - 909
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (419 KB)

    Estimating the transit traffic via a node in a communications backbone network such as ATM is an important aspect of the capacity planning in a network. In this paper, we propose a graph theoretic approach to estimate the transit traffic and present results of simulation of switch traffic in a network. Modeling is done using graph theoretic methods and traffic on a trunk is estimated using an upda... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance modeling of high probability call-completion features

    Publication Year: 1998, Page(s):81 - 90
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (687 KB)

    The Government Emergency Telecommunications Service (GETS) provides authorized National Security/Emergency Preparedness (NS/EP) users enhanced public switched network (PSN) service in which GETS calls receive higher likelihood of completion then plain old telephone service (POTS) calls during events of severe network stress. The PSN enhancements have been engineered through a comprehensive process... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design issues of an efficient distributed database scheduler for telecom

    Publication Year: 1998, Page(s):897 - 904
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB)

    We optimize the speed of real-time databases by optimizing the scheduler. The performance of a database is directly linked to the environment it operates in, and we use environment characteristics as guidelines for the optimization. A typical telecom environment is investigated, and characteristics that are relevant to performance are derived. A theoretical study of database scheduler performance ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient admission control method of real-time multicast connections in wide area networks

    Publication Year: 1998, Page(s):865 - 872
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (794 KB)

    There are two major difficulties in real-time multicast connection setup. One is the design of an efficient distributed routing algorithm which optimizes the network cost of routing trees under the real-time constraints. The other is the integration of routing with admission control into one single phase of operations. This paper presents a real-time multicast connection setup mechanism, which int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhance network security with dynamic packet filter

    Publication Year: 1998, Page(s):268 - 275
    Cited by:  Papers (6)  |  Patents (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB)

    This paper presents the study, design and implementation of a firewall, in particular a major component of a firewall: the dynamic packet filter. A packet filter may be static or dynamic. A dynamic packet filter checks, on the fly, the outgoing IP packets from a computer and then allows incoming packets to get through the packet filter if the packets are from the same computer as the outgoing pack... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and implementation of a network management platform for TMN

    Publication Year: 1998, Page(s):516 - 523
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (722 KB)

    Network management systems which administer actual network resources are developed based on a software system called network management platforms. Network management platforms provide major functions defined in TMN and interfaces to develop network management systems. Our research designs and implements a network management platform suitable to the TMN environment of today and tomorrow. This platf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance comparison of CRAM, SEAM and SPAM multipoint VC schemes for ATM networks

    Publication Year: 1998, Page(s):60 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (818 KB)

    Multicast service is an important part of any modern routing architecture. Motivations for many-to-many multicast include general unpredictability of membership in many real applications; simplicity of the rendezvous for the application programmer; and low cost to end systems and switches in terms of state to maintain for the delivery tree. Shared trees have an even greater advantage over source b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complete sharing versus partitioning: quality of service management for wireless multimedia networks

    Publication Year: 1998, Page(s):584 - 593
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (926 KB)

    This paper is concerned with performance and quality of service (QoS) guarantees for wireless networks that support multiple types of traffic. QoS is maintained by a distributed adaptive event-based admission control scheme. We compare the case where cell capacity is completely shared by the calls to the case where the cell capacity is partitioned for different types of traffic. Complete capacity ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical approach to performance analysis of self-healing SONET networks

    Publication Year: 1998, Page(s):362 - 369
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    The performance evaluation of large self-healing SONET mesh networks is of great interest to the telecom industry. In this paper, we first modify a model that has been proposed originally for the reliability analysis of SONET networks, for the performance evaluation of such networks. Then, we propose a hierarchical approach that will not only reduce the complexity of the analysis, but also improve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of two swap heuristics with a genetic algorithm for the design of an ATM network

    Publication Year: 1998, Page(s):833 - 837
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (541 KB)

    The challenge of a network topology design is to provide a configuration with minimum cost given specified constraints. Network topology design is NP-hard and known. Algorithms to solve these problems run in time that increases exponentially with the number of choices. The economic importance of determining the placement of switches in an ATM network justifies heuristic methods to find a good conf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous garbage collection: resolving memory leaks in long running network applications

    Publication Year: 1998, Page(s):886 - 896
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB)

    Garbage collection is especially useful for long running server applications in network environments since sustained memory leaks continuously degrade performance and eventually result in application failure. We demonstrate the benefits of a garbage collection technique that effectively mitigates performance degeneration due to memory leaks in applications when source code or object code are not a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicast routing infrastructure in ATM networks

    Publication Year: 1998, Page(s):857 - 864
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (639 KB)

    Communication via computer networks has been growing rapidly. Technology has gained momentum. Industry, international organizations, and businesses, have started relying on networks to provide reliable, supportive, fast, and easy methods to maintain transactions between their branches. Issues such as bandwidth, scalability, and efficiency became pertinent parameters that had to be configured at al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing accuracy of probe packet-based congestion detection in high speed networks

    Publication Year: 1998, Page(s):257 - 266
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (914 KB)

    A general technique to detect and control congestion status for high speed packet networks is formulated and analyzed. The technique is based on the notion of detection interval, which represents the time to complete a basic congestion detecting interaction between a packet source and destination. The congestion detection consists of having the source send special probe packets during a specified ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • All-optical multi-layer switching architectures: (I) M×N-gon prism switches

    Publication Year: 1998, Page(s):502 - 511
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (844 KB)

    All-optical multi-layer switching architectures are analysed by means of the average distance, the maximum distance and the diameter of their intersection graphs (IGs) and by the grid size of a 3-D network of directional couplers (DCs). The basic multi-layer switch, called the M×N-gon prism switch (M-1 prisms are embedded), is improved by increasing the connectivity between the prisms toward... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Team awareness with mobile agents in mobile environments

    Publication Year: 1998, Page(s):45 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (527 KB)

    There are several aspects involved in supporting human cooperative work by computers. One of them concerns team awareness to avoid unnecessary effort or even chaos. Notification services provide suited information about other team members and team relevant events. Traditionally, such services are realized by a central or distributed approach but exhibit shortcomings with respect to filtering polic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A QoS engineering architecture for the next-generation-Internet

    Publication Year: 1998, Page(s):599 - 608
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1035 KB)

    The goal of this paper is to define a QoS engineering framework for the evolving next-generation-Internet (NGI) platform. Note that specific algorithms for QoS provisioning in the Internet are at an early stage of development; hence much further analysis is needed before concrete solutions can be adopted. Our approach is therefore based on an effective adaptation of some basic notions from the tel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RTMC: an error control protocol for IP-based audio-visual multicast applications

    Publication Year: 1998, Page(s):566 - 573
    Cited by:  Papers (1)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (774 KB)

    Transport of audio visual data is becoming an important application of the IP-based best-effort service on the Internet. We present an error control protocol for provision of a real-time reliable multicast transport service. The protocol RTMC (real-time multicast) uses forward error correction (FEC) for protecting first transmissions (i.e. proactive error control) and retransmissions. Results of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic congestion avoidance scheme for ATM networks

    Publication Year: 1998, Page(s):238 - 242
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (467 KB)

    In this paper, D-CAPC (dynamic-congestion avoidance using proportional control) scheme is proposed as an extension of the standardized CAPC. In the proposed mechanism, some parameters, which are fixed in CAPC, are tuned dynamically according to the switch load. This task is filled by intelligent agents which are embedded in the switching nodes. Simulation results show that D-CAPC exhibits better p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing seamless handoff in wireless ATM networks

    Publication Year: 1998, Page(s):737 - 741
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    One of challenges of the WATM is providing the negotiated QoS during handoff. It should be considered that the virtual connection cannot always meet guaranteed QoS in wireless environment during/after the handoff execution due to mobility management, limited radio resources and fluctuating network conditions. Micro cell size, which produces more handoff makes it more difficult. An adaptive QoS man... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new model for multilayer real-time video transmission for ATM networks

    Publication Year: 1998, Page(s):442 - 447
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (642 KB)

    Our research focuses on the transmission of multilayer, real-time video traffic over ATM (asynchronous transfer mode) networks. This issue covers several aspects of multimedia networking and ATM such as traffic definitions and descriptions, traffic management, buffer management, ATM adaptation layers and video application layers. We propose a new ATM traffic management and buffer management model ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incorporation of flow and QoS control in multicast routing architectures

    Publication Year: 1998, Page(s):312 - 320
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (882 KB)

    Many multicast routing protocols consider only the unicast shortest paths between every pair of source and destination in a group (often based on the number of hops) to setup a multicast tree, such as DVMRP and CBT. Furthermore, they do not offer the ability to consider the resource savings possible in the presence of multiple data flows sharing common paths in a tree, such as CBT and PIM. These a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed algorithms for the constrained quickest routing problem in multimedia communications

    Publication Year: 1998, Page(s):352 - 359
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (786 KB)

    The shortest path problem is possibly the most important problem for data routing in multimedia communication. Chen and Chin (1989) have proposed a new variant of shortest path problem, termed the quickest path problem. The quickest path problem is to find quickest paths in a computer network to transmit a given amount of data with minimal transmission time. The selection of quickest paths depends... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Timing properties of the FDDI-M medium access protocol for a class of synchronous bandwidth allocation schemes

    Publication Year: 1998, Page(s):825 - 832
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (731 KB)

    FDDI networks have been widely deployed to support real-time traffic such as voice and video communications. However its medium access control (MAC) protocol can transmit synchronous messages up to at most one half of the total bandwidth of the FDDI network. Shin and Zheng has proposed a modification to the FDDI MAC protocol, called FDDI-M, which can double a ring's ability in supporting synchrono... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.