By Topic

Proceedings 7th International Conference on Computer Communications and Networks (Cat. No.98EX226)

15-15 Oct. 1998

Filter Results

Displaying Results 1 - 25 of 122
  • Author index

    Publication Year: 1998, Page(s):926 - 929
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE
  • Proceedings 7th International Conference on Computer Communications and Networks (Cat. No.98EX226)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (540 KB)
    Freely Available from IEEE
  • Flow control in the high-speed Thunder and Lightning ATM network

    Publication Year: 1998, Page(s):243 - 250
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (851 KB)

    Advances in fiber-optic and VLSI technology are leading to the development of multi-gigabit wide-area networks based on asynchronous transfer mode (ATM). The Thunder and Lightning network project at the University of California, Santa Barbara, is building a high-speed ATM switch in which each link operates at 40 gigabits per second. The instant start protocol, developed for the Thunder and Lightni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic congestion avoidance scheme for ATM networks

    Publication Year: 1998, Page(s):238 - 242
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (467 KB)

    In this paper, D-CAPC (dynamic-congestion avoidance using proportional control) scheme is proposed as an extension of the standardized CAPC. In the proposed mechanism, some parameters, which are fixed in CAPC, are tuned dynamically according to the switch load. This task is filled by intelligent agents which are embedded in the switching nodes. Simulation results show that D-CAPC exhibits better p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic control in high-speed ATM networks

    Publication Year: 1998, Page(s):183 - 190
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (770 KB)

    This paper presents a framework of traffic control in high-speed ATM networks on both connection level and cell level. On the connection level, we consider traffic classification, bandwidth allocation, call admission control, and billing method. On the cell level we examine a queueing architecture, flow control, and scheduling. We also capture the interdependencies among various traffic control as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing seamless handoff in wireless ATM networks

    Publication Year: 1998, Page(s):737 - 741
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    One of challenges of the WATM is providing the negotiated QoS during handoff. It should be considered that the virtual connection cannot always meet guaranteed QoS in wireless environment during/after the handoff execution due to mobility management, limited radio resources and fluctuating network conditions. Micro cell size, which produces more handoff makes it more difficult. An adaptive QoS man... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive hybrid technique for video multicast

    Publication Year: 1998, Page(s):227 - 234
    Cited by:  Papers (9)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    Periodic broadcast and scheduled multicast have been shown to be very effective in reducing the demand on server bandwidth. While periodic broadcast is ideally suited for very popular videos, scheduled multicast is better for less demanded objects. Work has also been done to show that a hybrid of these techniques offers the best performance. Existing hybrid techniques, however, assume that the wor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Phase assignment algorithm based on traffic measurement for periodic VBR sources in ATM networks

    Publication Year: 1998, Page(s):178 - 182
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (531 KB)

    This paper proposes a novel phase assignment algorithm “silent wave algorithm (SWA)” for periodic VBR traffic in ATM networks. Our algorithm decides when a new periodic VBR connection should begin to transmit based on its notification parameters and traffic measurement of going connections. Simulation results showed that it is difficult to accommodate pseudo periodic VBR traffic effect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On routing algorithms with end-to-end delay guarantees

    Publication Year: 1998, Page(s):162 - 167
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (562 KB)

    We consider the transmission of a message of size r from a source to a destination over a computer network with n nodes and m links. There are three sources of delays: (a) propagation delays along the links, (b) delays due to bandwidth availability on the links, and (c) queuing delays at the intermediate nodes. First, we consider that the delays on various links and nodes are given as functions of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A group communication model for distributed real-time causal delivery

    Publication Year: 1998, Page(s):918 - 925
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (665 KB)

    With the increase use of the progress of distributed multimedia applications, the ability of networks to handle temporal relationships among media units is becoming more and more important. Yet delay jitter, and the absence of global clock may disrupt these temporal relationships. This paper proposes a hierarchical architecture of k-local groups, where k represents the number of local groups compo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symmetric cellular network embeddings on a torus

    Publication Year: 1998, Page(s):732 - 736
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (603 KB)

    Infinite planar cellular networks are embedded on a torus to obtain a symmetric regular finite network sample region for performance analysis. We show that a “hexagonal wrap” toroidal embedding preserves translational and rotational symmetry on all three axes of a hexagonal lattice and is preferable to a “Cartesian wrap” embedding. Hexagonal tilings and embeddings are obtai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A low bandwidth broadcasting protocol for video on demand

    Publication Year: 1998, Page(s):690 - 697
    Cited by:  Papers (46)  |  Patents (37)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (630 KB)

    Broadcasting protocols can improve the efficiency of video on demand services by reducing the bandwidth required to transmit videos that are simultaneously watched by many viewers. We present a polyharmonic broadcasting protocol that requires less bandwidth than the best extant protocols to achieve the same low maximum waiting time. We also show how to modify the protocol to accommodate very long ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-level buffering and feedback scheme for distributed multimedia presentation systems

    Publication Year: 1998, Page(s):219 - 226
    Cited by:  Papers (3)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (782 KB)

    Distributed multimedia presentation systems require flexibility and good quality of service for multimedia data presentations. To ensure flexible and satisfiable presentations of multimedia data, collaborations between servers, network, and clients must be carefully designed to retrieve the data from the disk and transfer the data to the client. In this paper we investigate a multi-level buffering... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A rate-controller for the ATM network

    Publication Year: 1998, Page(s):170 - 177
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (685 KB)

    We propose a new operating mechanism for the rate-controller in the ATM network. This mechanism can fulfill the same function as the “traditional” leaky bucket scheme, but it allows a simple queuing analysis. An analysis is developed to study the statistical performance of the proposed rate-controller, including the cell delay distribution, the cell loss ratio, and the characterization... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Team awareness with mobile agents in mobile environments

    Publication Year: 1998, Page(s):45 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (527 KB)

    There are several aspects involved in supporting human cooperative work by computers. One of them concerns team awareness to avoid unnecessary effort or even chaos. Notification services provide suited information about other team members and team relevant events. Traditionally, such services are realized by a central or distributed approach but exhibit shortcomings with respect to filtering polic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal routing scheme for maximizing bottleneck residual bandwidth under multiple constraints-application to elastic traffic routing

    Publication Year: 1998, Page(s):140 - 147
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (754 KB)

    In a network in which logical channels are used and switched for communication services, adaptive bandwidth allocation is possible, and new transfer capabilities handling elastic types of traffic such as ABR traffic have been developed in ATM for the B-ISDN. It should be, however, emphasized that appropriate network operation must be developed in order to support the new services in the most effec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design considerations for giga-speed laser data link control protocols

    Publication Year: 1998, Page(s):910 - 917
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    This paper discusses design considerations for a giga-speed data link control (DLC) protocol designed for low altitude multiple satellite (LAMS) networks. Two important and intimately interrelated design issues are reliability and performance. Both of these are influenced by the inconsistency gap (Ig) associated with the protocol. Closely associated measures are the bounded maximum send... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distinguishing congestion losses from wireless transmission losses: a negative result

    Publication Year: 1998, Page(s):722 - 731
    Cited by:  Papers (25)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (934 KB)

    The TCP is a popular transport protocol used in the present-day Internet. When packet losses occur the TCP assumes that the packet losses are due to congestion, and responds by reducing its congestion window. When a TCP connection traverses a wireless link, a significant fraction of packet losses may occur due to transmission errors. The TCP responds to such losses also by reducing the congestion ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HAMAC: an adaptive channel access protocol for multimedia wireless networks

    Publication Year: 1998, Page(s):404 - 411
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (734 KB)

    This paper proposes a new medium access control (MAC) protocol for future wireless multimedia personal communication systems, denoted the hybrid and adaptive multiple access control (HAMAC) protocol. The HAMAC protocol integrates fixed assignment TDMA protocols, reservation-based protocols, and contention-based protocols into a single wireless network so as to simultaneously and efficiently suppor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering algorithms for multi-level address hierarchies

    Publication Year: 1998, Page(s):329 - 336
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (773 KB)

    Hierarchical addresses are fundamental to the scalability of Internet routing. The explosive of the Internet has strained the initial two-level hierarchy and led to the development of more flexible divisions between levels (CIDR) and larger addresses (IPv6). Equally, important are algorithms and protocols to systematically assign addresses with appropriate hierarchical structure to allow route agg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the fly test generation for real time protocols

    Publication Year: 1998, Page(s):378 - 385
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (661 KB)

    Many critical, real-time systems or multimedia systems have time constraints in their specifications. But testing such systems isn't obvious, because the notion of time is not directly under control. A well known problem concerns explosion and complexity related to the computation of behavior graph for real time specifications. This paper introduces a novel approach aimed at avoiding explosion pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal video placement for hierarchical video-on-demand systems

    Publication Year: 1998, Page(s):454 - 461
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB)

    In the past three years, we have been implementing a VOD system over ATM networks based on a hierarchical three-level network architecture. One of the most important design problems is how to organize video programs stored at different level of servers. We propose an optimal video placement strategy which gives the optimal number of video copies should be stored at each level of server such that t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative study of scalable batching policies in disk-array-based deterministic video-on-demand servers

    Publication Year: 1998, Page(s):682 - 689
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (845 KB)

    Presented is a comparative study of various batching policies in deterministic video-on-demand (DVoD) servers under realistic conditions including customers' behavior storage organization, and time variations in request arrival rates. DVoD servers provide video playback without any interaction support and customers' QoS is simply expressed in terms of average waiting time to receive service and de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The impact of active queue management on multimedia congestion control

    Publication Year: 1998, Page(s):214 - 218
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (463 KB)

    Multimedia applications that transmit long continuous streams of data across the Internet will continue to stress networking technologies for the years to come. To help improve the performance of congestion avoidance protocols like TCP and to punish non-adaptive UDP-based applications, the IETF is considering the widespread deployment of random early detection (RED) queue management. We examine th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative performance evaluation of routing protocols for mobile, ad hoc networks

    Publication Year: 1998, Page(s):153 - 161
    Cited by:  Papers (72)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (895 KB)

    We evaluate several routing protocols for mobile, wireless, ad hoc networks via packet level simulations. The protocol suite includes routing protocols specifically designed for ad hoc routing, as well as more traditional protocols, such as link state and distance vector used for dynamic networks. Performance is evaluated with respect to fraction of packets delivered, end-to-end delay and routing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.