By Topic

Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370)

11-13 Oct. 1999

Filter Results

Displaying Results 1 - 25 of 103
  • Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370)

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (444 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1999, Page(s):663 - 664
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • The design and implementation of open video conferencing software platforms using distributed object services

    Publication Year: 1999, Page(s):438 - 441
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    This paper summarizes experiments with a videoconferencing service platform, based on the use of distributed object services. These experiments were performed and used in a Eurescom project, which aimed at validating the use of distributed object-oriented platforms and systems as a new basis for the provision of telecommunication services. In this new approach, telecommunication networks are model... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable architecture for providing deterministic guarantees

    Publication Year: 1999, Page(s):91 - 96
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    The Internet community has proposed the integrated services architecture (Intserv) and the signaling protocol RSVP to provide deterministic guarantees (bandwidth, delay and jitter) to individual flows. However, experience with practical systems has revealed the severe scalability problems of the Intserv model due to the amount of routing and reservation state that is required to he maintained in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalability and QoS guarantee in IP networks

    Publication Year: 1999, Page(s):427 - 433
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    This paper presents our insights to the issue of achieving scalability and providing QoS guarantee in IP networks. The key idea is to use marking at the edge and aggregation in the core of a network. We propose a traffic classification scheme to facilitate marking and aggregation, a queueing architecture to implement marking in the access routers and aggregation in the core routers, and a scheduli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On fundamental issues in IP over WDM multicast

    Publication Year: 1999, Page(s):84 - 90
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    As WDM technology matures, IP over WDM multicast will become a challenging new topic. Supporting multicast at the WDM layer provides additional advantages, but also raises many new issues that do not exist in IP multicast. For example, the limitation on the light splitting capability of switches is one major difficulty in WDM multicast, and in addition, the limitations on both the wavelength conve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A queue management algorithm for intra-flow service differentiation in the “best effort” Internet

    Publication Year: 1999, Page(s):419 - 426
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    End-to-end QoS can be improved by exploiting knowledge about the flow structure to influence the flow within the network. This leads to a graceful degradation under congestion (“intra-flow” QoS). Typically this is accomplished by filtering higher-layer information within the network, which is both expensive in terms of resources, as well as undesirable with regard to network security. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Isolation of wireless ad hoc medium access mechanisms under TCP

    Publication Year: 1999, Page(s):77 - 82
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB)

    Mobile computing will be much used in the future, as is evident by such initiatives as Bluetooth, Iceberg and HomeRF. However, for mobile computing to be successful, an obvious layer, the MAC layer, must be efficient in channel access and reservation. Therefore, in-depth understanding is needed of the wireless MAC layer if wireless computing is to takeoff. Many random access wireless MAC protocols... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fiber requirement in multifiber WDM networks with alternate-path routing

    Publication Year: 1999, Page(s):338 - 343
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    An important problem in multifiber WDM networks is to decide how many fibers per link are required to guarantee high network performance. The fiber requirement may depend on many factors, e.g., the network topology, traffic patterns, the number of wavelengths per fiber, and the routing algorithm employed in the network. We study the fiber requirement under dynamic traffic in different topologies w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable priority queue manager architecture for output-buffered ATM switches

    Publication Year: 1999, Page(s):154 - 160
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    We describe a scalable priority queue manager that implements deadline-ordered service disciplines in an output-buffered ATM switch, which can be used as a switching node in high-speed packet switched networks to provide quality of service (QoS) guarantees. The priority queue manager can handle a range of priority levels from 0 to (216 -1), a buffer size of 64 k ATM cells, and 16 input ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Explicit routing algorithms for Internet traffic engineering

    Publication Year: 1999, Page(s):582 - 588
    Cited by:  Papers (27)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB)

    This paper considers explicit routing algorithms for Internet traffic engineering. Explicit routing is seen to be a much more capable solution for improving network utilization than the current destination-based routing and the multi-protocol label switching (MPLS) standard has made explicit routes implementable. ISP can now have fine granularity control over the traffic distribution across their ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving congestion control performance through loss differentiation

    Publication Year: 1999, Page(s):412 - 418
    Cited by:  Papers (13)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    Linear increase/multiplicative decrease (LIMD) has typically been the congestion control paradigm of choice in the Internet. However, a major drawback of LIMD is that it reacts identically (and aggressively) to all packet losses, irrespective of the cause of loss. In this paper, we try to augment the basic LIMD congestion control with additional mechanisms to predict the cause of packet losses and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent medium access for mobile ad hoc networks with busy tones and power control

    Publication Year: 1999, Page(s):71 - 76
    Cited by:  Papers (2)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    In a mobile ad-hoc networks (MANETs), one essential issue is how to increase channel utilization while avoiding the hidden-terminal and the exposed-terminal problems. Several MAC protocols, such as RTS (request to send)/CTS (clear to send) based and busy tone-based schemes, have been proposed to alleviate these problems. In this paper, we explore the possibility of combining the concept of power c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast and efficient flooding based QoS routing algorithm

    Publication Year: 1999, Page(s):298 - 303
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    Multi-criteria QoS routing has been regarded by researchers as a vital mechanism to support multimedia communications. Unfortunately, finding an optimal path meeting the multi-criteria is indeed a very difficult problem to solve. This paper proposes a new QoS routing algorithm which can meet multi-criteria routing constraints, is simple to implement, and is robust. In brief, our approach is a boun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tree-based link-state routing in the presence of routing information corruption

    Publication Year: 1999, Page(s):364 - 370
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    Traditionally, link-state routing (LSR) uses two costly techniques to achieve its robustness and responsiveness: message forwarding on every communication link in the broadcast of network status updates, and the periodic broadcast of local status by every router. In this paper, we present a novel LSR protocol, called tree-based LSR (T-LSR), which reduces the operational overhead of LSR as follows.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online VBR video traffic smoothing

    Publication Year: 1999, Page(s):502 - 507
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    The efficient transmission of constant quality compressed video streams is complicated by the burstiness (both short term and long term) that video compression standards such as MPEG introduce. Most of the techniques in the literature are concentrated on stored video traffic smoothing or real-time video traffic smoothing. However there is a growing number of live video applications, such as videoc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic routing and assignment of wavelength algorithms in multi-fiber wavelength division multiplexing networks

    Publication Year: 1999, Page(s):332 - 337
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    Two algorithms are proposed for the dynamic routing and assignment of wavelength problem in multi-fiber wavelength division multiplexing all-optical networks. By virtue of the layered graph, the routing and assignment of wavelength subproblems can be considered simultaneously. Simulation shows that layered-graph-based RAW algorithms perform better than the existing ones. Making use of the special ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A 40 Gb/s packet switching architecture with fine-grained priorities

    Publication Year: 1999, Page(s):148 - 153
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    We discuss a novel architecture for very high speed packet switching with priority-based conflict resolution. An input-queued switch with N2 queues is used to prevent head-of-line blocking. Unlike previous designs which use multiple FIFO queues to provide several priority levels, we use hardware priority queues with 16-bit priority encoding. To reduce the hardware complexity, we introdu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data flow control in ATM networks: an evaluation of ER and BCA

    Publication Year: 1999, Page(s):574 - 580
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    Data traffic in modern telecommunications systems is loss-sensitive, delay-insensitive, and highly bursty. Most data applications cannot predict their own traffic parameters, but require low cell loss rates. These features make traffic management for data traffic complex. In ATM networks, where multiple types of applications co-exist, it becomes even more difficult. Many models have been proposed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelength assignment to minimize requirement on tunable range of optical transceivers in WDM networks

    Publication Year: 1999, Page(s):404 - 409
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    In this paper we consider WDM networks with a tunable transmitter and a fixed-wavelength receiver at each station (similar results hold when the transmitter is fixed and the receiver is tunable). Traditionally, each station is required to be able to access all wavelength channels used in the network. Such requirement limits the number of wavelengths that can be exploited in a WDM network up to the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-demand multipath routing for mobile ad hoc networks

    Publication Year: 1999, Page(s):64 - 70
    Cited by:  Papers (148)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    Mobile ad hoc networks are characterized by multi-hop wireless links, absence of any cellular infrastructure, and frequent host mobility. Design of efficient routing protocols in such networks is a challenging issue. A class of routing protocols called on-demand protocols has recently attracted attention because of their low routing overhead. The on-demand protocols depend on query floods to disco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Competitive admission control and routing of multi-class traffic with statistical QoS guarantees

    Publication Year: 1999, Page(s):290 - 297
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    We propose competitive policies for admission control and routing in general topology networks, with bandwidth and buffer resources. The goal of these solutions is to maximize the network revenue, when the traffic demand is not known ahead of time, and over-allocation of network resources is allowed with some probability. On top of appropriate resource reservation setup protocols, these solutions ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical video-on-demand servers for TV-anytime services

    Publication Year: 1999, Page(s):110 - 117
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    This paper presents algorithms and principles for the implementation of a novel broadband multimedia service called “TV-anytime”. The basic idea of this service is to store broadcast media assets on media server systems and allow people to access this information at any time. Using a given user profile the recording of media assets can be personalized allowing the implementation of &ld... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Link-state routing in networks with unidirectional links

    Publication Year: 1999, Page(s):358 - 363
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB)

    It is shown that a unidirectional link of a network can be used for routing only if it has an inclusive cycle, which provides a path to carry routing updates from the downstream node to the upstream node joint by the unidirectional link. A new routing algorithm for networks with unidirectional links is then presented, which incrementally disseminates link-state information and selectively utilizes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of a PCS network with state-dependent calls arrival processes and impatient calls

    Publication Year: 1999, Page(s):494 - 499
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    This paper studies the behavior for performance evaluation of a personal communication services (PCS) network, in which the handoff call arrival processes and the new call arrival processes may depend on the number of calls in the target cells, and the caller may become impatient. We propose an analytical model and obtain the expressions of some interesting conventional and some new performance me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.