By Topic

INFOCOM '92. Eleventh Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE

Date 0-0 May 1992

Filter Results

Displaying Results 1 - 25 of 177
  • IEEE INFOCOM '92: Conference on Computer Communications. Eleventh Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.92CH3133-6)

    Publication Year: 1992
    Request permission for commercial reuse | PDF file iconPDF (672 KB)
    Freely Available from IEEE
  • Minimum-expected-delay alternate routing

    Publication Year: 1992, Page(s):617 - 625 vol.2
    Cited by:  Papers (12)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (727 KB)

    The authors consider the problem of finding a routing strategy that minimizes the expected delay from every source to a single destination in a network in which each link fails and recovers according to a Markov chain. It is assumed that each node knows the current state of its own outgoing links and the state-transition probabilities for every link of the network. It is shown that the general pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network transparency: the plaNET approach

    Publication Year: 1992, Page(s):590 - 601 vol.2
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1052 KB)

    Asynchronous transfer mode (ATM) is being suggested as the basis for future high speed, universal networks. A key requirement for future ATM networks will be transparency, i.e. for the network to alter or manipulate the user information as little as possible. A transparent transport mechanism, plaNET, based on extensions of the current ATM standard and IBM's earlier PARIS technology, is proposed. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of an adaptive token bus protocol

    Publication Year: 1992, Page(s):952 - 957 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    The authors study the performance of an adaptive token-passing bus protocol where only active stations participate in the token passing, and therefore make up the logical ring. A station is active over an interval of time if during that interval data are generated at the station to be sent over the network. The size of the logical ring thus varies randomly according to the traffic intensity of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time threshold dimensioning and overload control in FDDI networks

    Publication Year: 1992, Page(s):363 - 371 vol.1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    The author addresses the problem of selecting timer thresholds for the asynchronous priorities in a Fiber Distributed Data Interface (FDDI) system. Based on an approximate analysis for the throughput under overload, two methods are derived. The first one is designed to meet requirements for the ratios between throughputs of stations with different priorities, whereas the second method includes abs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Alternative bandwidth allocation algorithms for packet video in ATM networks

    Publication Year: 1992, Page(s):1061 - 1068 vol.3
    Cited by:  Papers (6)  |  Patents (63)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    A two-node asynchronous transfer mode (ATM) network is considered. Several video sources are assumed multiplexed at the source node. Five alternative algorithms for bandwidth allocation to video sources are considered using: static-slot assignment, buffer-population-based dynamic slot assignment, first-come-first-serve slot assignment and rate-based dynamic slot assignment. The average cell delay ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Diffusion model of the push-out buffer management policy

    Publication Year: 1992, Page(s):252 - 261 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    A method for modeling a spatial priority mechanism called the push-out buffer management policy is proposed. It is a known mechanism which takes into account two kinds of cells: vital and ordinary ones. It also ensures a high degree of flexibility for asynchronous transfer mode (ATM) services. The use of the diffusion approximation allows modeling general interarrival and service time distribution... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using statistical bandwidth in token ring networks

    Publication Year: 1992, Page(s):944 - 951 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    A new network access protocol, called restricted destination access protocol, for transmitting data packets in token ring networks, is proposed and analyzed. This protocol is based on the existing token passing access protocol and makes use of the extra statistical bandwidth that exists in token ring networks. A transmission capacity of greater than unity can be supported. Simulation results using... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the multiple shared memory module approach to ATM switching

    Publication Year: 1992, Page(s):116 - 123 vol.1
    Cited by:  Papers (14)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    The authors propose a new approach to building large asynchronous transfer mode (ATM) switches based on shared memory modules. Shared memory modules are proposed to be placed in parallel, with every input and output port having access to every one of the switch models. This approach permits global sharing of the total buffer space. Some basic issues in such an arrangement are studied, such as the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bandwidth allocation for broadband multichannel systems

    Publication Year: 1992, Page(s):1051 - 1060 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (772 KB)

    The authors examine an optimal bandwidth allocation scheme for multichannel switching systems to switch trunk groups. This multichannel switching system features a simple architecture, high throughput, high channel utilization, and other properties such as preserving packet sequence, being robust to unbalanced input traffic loads, providing fair access to network transmission resources, and fast p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal cost/performance design of ATM switches

    Publication Year: 1992, Page(s):446 - 458 vol.1
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1076 KB)

    The authors propose a methodology for performing an evaluation and optimization of the cost of an asynchronous transfer mode (ATM) switching architecture under performance constraints given in terms of virtual connection blocking probability. An analysis of blocking networks is developed and combined with known results concerning nonblocking networks that provide a theoretical model which relates ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of in-call buffer/window allocation schemes for short intermittent file transfers over broadband packet networks

    Publication Year: 1992, Page(s):2463 - 2471 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB)

    The author discusses two in-call buffer/window negotiation schemes for short intermittent file transfers, focusing on the specific needs of such traffic streams. A closed network of queues models is developed to show the behavior of the proposed schemes. These models, while simple, capture essential details of the control schemes. Under fairly general assumptions, the resulting network of queues i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Token ring reliability models

    Publication Year: 1992, Page(s):934 - 943 vol.2
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (844 KB)

    A study of the reliability of token rings designed according to the IEEE 802.5 standard is described. The reliability model is based on information in the standards, plus implementation details, and is more realistic than previous models. Although the analysis is approximate, it includes all factors thought to be important in determining reliability, since an approximate analysis which included al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TES-based traffic modeling for performance evaluation of integrated networks

    Publication Year: 1992, Page(s):75 - 84 vol.1
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    The authors consider modeling methodologies of variable-bit-rate video sources for performance evaluation of integrated networks. They consider an example in which compressed video is transmitted over a local area network carrying both video and data. A new modeling methodology called transform-expand-sample (TES) which is a method for generating autocorrelated variates, is used. TES is a nonparam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed routing with labeled distances

    Publication Year: 1992, Page(s):633 - 643 vol.2
    Cited by:  Papers (8)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (984 KB)

    The author presents, verifies, and analyzes a new routing algorithm called the labeled distance-vector routing algorithm (LDR), that is loop-free at every instant, eliminates the counting-to-infinity problem of the distributed Bellman-Ford (DBF) algorithm, operates with arbitrary link and node delays, and provides shortest paths a finite time after the occurrence of an arbitrary sequence of topolo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A time-wavelength assignment algorithm for a WDM star network

    Publication Year: 1992, Page(s):2144 - 2150 vol.3
    Cited by:  Papers (45)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    The first time-wavelength assignment algorithm for wavelength division multiplexing (WDM) star-based local and metropolitan area networks is presented. The algorithm incorporates the unique aspects of WDM communication such as a number of tunable transmitters and receivers at each concentrator, the tuning time, and a limited number of wavelengths. The transmission duration is composed of two eleme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The helical switch: a multipath ATM switch which preserves cell sequence

    Publication Year: 1992, Page(s):2489 - 2498 vol.3
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    A novel cell switching architecture for asynchronous transfer mode (ATM)-based networks is presented. The proposed helical switch is a multistage interconnection network which implements the self-routing technique with efficient buffer sharing. Although the switch may route cells along multiple paths, the connection-oriented mode required by the ATM-based network is supported. Cell sequence integr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the performance of input-queued ATM packet switches

    Publication Year: 1992, Page(s):110 - 115 vol.1
    Cited by:  Papers (54)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    The authors propose a single way to dramatically improve the performance of input-queued ATM packet switches beyond the 82% saturation point obtained in previous work. The method is an extension of the independent output-port schedulers technique and is based on the notion of recycled time slots, i.e. reusing time slots normally wasted due to scheduling conflicts. In contrast to previous results, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A versatile access scheduling scheme for real-time local area networks

    Publication Year: 1992, Page(s):804 - 810 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    The author deals with the implementation of access scheduling facilities in shared-medium local area networks. A global-information-based distributed scheduling mechanism is presented. This versatile mechanism permits the implementation of virtually all scheduling policies. Applications are considered to IEEE 802.3, which in its original version was probabilistic and incapable of priority handling... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient broadcast using selective flooding

    Publication Year: 1992, Page(s):2060 - 2067 vol.3
    Cited by:  Papers (1)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    Broadcast protocols are closely linked with point-to-point shortest routing in computer networks, and for broadcasting certain identified information, such as topological changes across the network. Multi-address messages entail high overheads. Reliable and efficient broadcasts are required to properly utilize the network bandwidth and ensure that users update the identified important information.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call preemption in communication networks

    Publication Year: 1992, Page(s):1043 - 1050 vol.3
    Cited by:  Papers (48)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    The authors address the problem of preempting ongoing calls in a communication network in order to accommodate new calls. They investigate some problems that relate to making the best decision on which (if any) call to preempt. It is shown that versions of the problem are computationally intractable, and simple and efficient heuristics to approximate the optimal strategy are provided. The authors ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Large-scale and high-speed interconnection of multiple FDDIs using ATM-based backbone LAN

    Publication Year: 1992, Page(s):2290 - 2298 vol.3
    Cited by:  Papers (5)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    The authors discuss problems related to the bridging method between the asynchronous transfer mode (ATM)-based high-speed multimedia backbone local area network (MBLAN) and a fiber distributed data interface (FDDI), especially the filtering database (FDB) construction method for filtering of frames. The problems are achieving high performance, correspondence to a large-scale system, and prevention... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast bandwidth reservation scheme with multi-link and multi-path routing in ATM networks

    Publication Year: 1992, Page(s):2233 - 2240 vol.3
    Cited by:  Papers (41)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    The authors propose a burst level bandwidth reservation scheme which is appropriate for an asynchronous transfer mode (ATM) network that supports the transfer of high-speed burst traffic. The proposed scheme utilizes multiple links and multiple paths in a network to transfer individual bursts, thereby increasing network efficiency. As the link and path selection is implemented on a burst-by-burst ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A transmission scheduling algorithm for mixed traffic: high and low priority

    Publication Year: 1992, Page(s):2251 - 2259 vol.3
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    The authors are concerned with the effective accommodation of mixed traffic (high and low priority) by the cellular ISDN system. They consider two mutually independent traffic streams sharing a single common channel for transmission. The two streams have different arrival and required transmission time characteristics, as well as different delay constraints. The authors present and analyze an algo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and evaluation of an adaptive flow control scheme

    Publication Year: 1992, Page(s):2391 - 2397 vol.3
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    The authors model a virtual circuit in a computer network as a sequence of servers in tandem. They explicitly take into account cross traffic at the servers from other virtual circuits. The analysis of the model leads them to propose a novel flow control scheme, which they term send-time control. A measure to evaluate the performance of flow control schemes, called the packet performance index, is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.