By Topic

Global Telecommunications Conference, 1988, and Exhibition. 'Communications for the Information Age.' Conference Record, GLOBECOM '88., IEEE

Date Nov. 28 1988-Dec. 1 1988

Filter Results

Displaying Results 1 - 25 of 331
  • GLOBECOM '88. IEEE Global Telecommunications Conference and Exhibition - Communications for the Information Age. Conference Record (IEEE Cat. No.88CH2535-3)

    Publication Year: 1988
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • Virtual-circuit load control in fast packet-switched broadband networks

    Publication Year: 1988, Page(s):214 - 220 vol.1
    Cited by:  Papers (27)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB)

    The authors consider the bandwidth management issues in a congestion control framework proposed for fast packet-switched broadband networks. Specifically, they study a simple threshold-based strategy where the threshold parameters are determined so as to minimize a weighted sum of call blocking probabilities while providing a required GOS (grade of service) in terms of blocking performance to each... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • First application of the generic network-element memory-administration interface for digital crossconnect systems

    Publication Year: 1988, Page(s):347 - 352 vol.1
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    The authors present the key aspects of the first application of the generic network element memory administration (NEMA) interface for digital crossconnect systems (DCs). They focus on those portions of the memories embedded in an NE that can be accessed and controlled through the operations interface (i.e. the NE database). DSO crossconnects, conference establishment, and conference crossconnects... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A compatible fixed-frame ISDN gateway for broadband metropolitan area networks

    Publication Year: 1988, Page(s):1260 - 1265 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (459 KB)

    A novel method (referred to as I-SWIFT) is presented for integrating the flow of synchronous voice streams into existing broadband cable systems using CATV (community antenna television) technology. The interface between the integrated voice subnetwork and the cable system is realized by a metropolitan area gateway (MAG) which is implemented at the broadband cable head-end. An intelligent scheduli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to user requirements-oriented flow control

    Publication Year: 1988, Page(s):1663 - 1667 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    A flow control algorithm for virtual circuits is proposed which takes into account the fact that in a packet switched network, different users can have different requirements for throughput and average delay. The algorithm is based on a new definition of power based on multiple objective optimization theory. Problems of approximation and convergence are discussed, and a numerical example is given.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two design techniques for adaptive transceivers for digital subscriber lines (DSL)

    Publication Year: 1988, Page(s):1150 - 1154 vol.2
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    Two techniques for using adaptive transceivers for digital subscriber lines (DSL) are studied. Both methods utilize preprocessors before modulation and transmission of signals. The performance of these transceivers is compared with that of a conventional transceiver, with no preprocessor, on some loops within the CSA (carrier serving area) design rules. It is found that when self near-end crosstal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of master-slave synchronized clocks

    Publication Year: 1988, Page(s):1145 - 1149 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    The problem of time and frequency transfer between remotely located master and slave clocks in the presence of internal as well as external disturbance is investigated. A model for estimation of transmission path delay and carrier phase is proposed. In this model, path delay estimation and compensation are achieved by tracking a pseudonoise code, phase modulated onto the carrier, using a noncohere... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The performance of Fourier transform division multiplexing schemes on peak limited channels

    Publication Year: 1988, Page(s):1141 - 1144 vol.2
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    Inherent in the method of Fourier transform division multiplexing (FTDM) is the possibility that the FTDM encoder will yield spurious power bursts, which can affect the linearity of the channel. A common way for dealing with such bursts is to clip the signal at some predetermined peak power level. The authors obtain explicit formulas for the probability distributions of such bursts and for the err... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open network architecture from an operational perspective

    Publication Year: 1988, Page(s):1044 - 1048 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    The authors address the operations, administration and maintenance (OA&M) aspects of open network architecture (ONA). First, the OA&M requests made by enhanced services providers (ESPs) in the ONA process are reviewed with regard to both for specific capabilities desired and general trends in the capabilities requested. Second, requested OA&M capabilities are discussed in terms of BOC ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithm for random access communication over noisy channels

    Publication Year: 1988, Page(s):1136 - 1140 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    The authors consider synchronous random access systems with noisy transmission channels. They model the channel noise as two types of erroneous feedbacks observed by the users. Specifically, for some probabilities a slot containing a single transmission and a slot without any transmission in it can be perceived by the users as collision slots. For such systems, they analyze the stability of a rand... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operations technology impacts of potential new network capabilities

    Publication Year: 1988, Page(s):1039 - 1043 vol.2
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    The author describes many of the potential new network capabilities (including both customer network management (CNM) and non-CNM capabilities) for voice-messaging services. The modifications required for operations functions within network elements, operations systems, and operations interfaces as a result of these capabilities are identified. Included in the discussion are the operations interfa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimates of maximum throughput for simulated local loops

    Publication Year: 1988, Page(s):1130 - 1135 vol.2
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    Given the impulse response of a linear time invariant system, input signals with bounded amplitude are proposed which tend to maximize the (L) distance between any pair of output signals over a given time interval. This signal set is used to compute achievable rates for a random sampling of 100 different impulse responses corresponding to simulated local loops. For ampli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of a novel selection diversity technique in an experimental TDMA system for digital portable radio communications

    Publication Year: 1988, Page(s):810 - 814 vol.2
    Cited by:  Papers (16)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    The authors present the measured average bit error and block error ratio performance of a coherent burst time-division multiple-access radio link in a simulated flat Rayleigh fading environment using a unique technique for implementing two-branch selection diversity. The link consists of a 500-kb/s quadrature amplitude modulation burst transmitter and a coherent receiver with a fast carrier recove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open network architecture: an `OAM' perspective-an RBOC's view

    Publication Year: 1988, Page(s):1033 - 1038 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    The impact of the open network architecture (ONA) on OAM (operations, administration, and management) is discussed from the perspective of a regional Bell Operation Company. The aggregate impact of requests on ordering and provisioning, billing, and maintenance and repair are considered. The impact of requests for specific network functionalities on OAM systems is also discussed. It is concluded t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Bellcore Reliability Prediction Procedure (RPP); 1988 edition

    Publication Year: 1988, Page(s):70 - 76 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    The authors describe the 1988 edition of the Bellcore Reliability Prediction Procedure for electronic equipment (RPP), with particular emphasis on additions and improvements incorporated in the last four year. They also describe a software system developed by Bellcore to mechanize generation of RPP predictions. The RPP and its automated version, the ARPP, include formulas for both steady-state and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Nyquist-rate adaptation algorithm for fractionally spaced equalizers

    Publication Year: 1988, Page(s):1124 - 1129 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    Describes a time-domain Nyquist-rate algorithm that broadens the utility of fractional equalizers by permitting least-mean-square or true zero-forcing adaptation, more rapid convergence relative to synchronous coefficient updating, user specification of the end-to-end Nyquist channel, and elimination of the coefficient drift phenomenon. The investigation includes an analytical description of the a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of integrated voice/data multiplexing systems with local and remote data sources

    Publication Year: 1988, Page(s):1479 - 1483 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    Defines a discrete state continuous time Markov model for a range of integrated voice/data multiplexer (IVDM) systems. The system model is stated, and a method for exact analysis is given. Numerical results corresponding to a T1 rate are presented for three systems. Results are obtained for data sources that are local (high-speed access) or remote (DS0 voice channel rate access) to the multiplexer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated voice/data protocol for local area bus networks

    Publication Year: 1988, Page(s):1813 - 1817 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    A distributed protocol for integrated voice/data traffic on a local area bus network is discussed. The protocol uses announcement and reservation techniques. A two-dimensional Markov model is used to estimate the performance of both traffic types. The performance of voice traffic is much like a centrally controlled time-division multiplexing (TDM) system, due to the short propagation delay propert... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Motion video coding in CCITT SG XV-the coded picture format

    Publication Year: 1988, Page(s):992 - 996 vol.2
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    Some of the work of the CCITT SG XV specialists group on coding on the standardization of low-bit-rate video codecs is described. Emphasis is placed on the issue of the coded picture format. It is shown how the decision was made to adopt a common format for coding and transmission that is independent of the local national television standard. The format meets the basic principle of sharing the bur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Burst coherent detection with robust frequency and timing estimation for portable radio communications

    Publication Year: 1988, Page(s):804 - 809 vol.2
    Cited by:  Papers (17)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    The authors describe two approaches that make burst coherent demodulation robust against frequency offset between transmitter and receiver: using a second-order PLL (phase lock loop) to track frequency error, and performing transforms between phase and rectangular vector components to eliminate errors caused by wraparound discontinuities. It is found that with a small increase in circuit complexit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structuring of active quality assurance system through utilization of field information

    Publication Year: 1988, Page(s):459 - 462 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    The development of a quality assurance system that takes maximum advantage of field quality data is described. This development included the structuring of the MIND (Maintenance Information Network Database) system, the establishment of a data analysis procedure, and the standardization of feedback and application processes. As a result, an active quality assurance system has been successfully ins... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Still picture compression algorithms evaluated for international standardisation

    Publication Year: 1988, Page(s):1028 - 1032 vol.2
    Cited by:  Papers (9)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    Recent activity of an ISO/CCITT working group to produce an excellent coding technique for worldwide still-image telecommunication applications is described. The three techniques considered for final selection are discussed: the adaptive discrete cosine transform (ADCT), adaptive binary arithmetic coding (ABAC), and block-separated component progressive coding (BSPC). Particular emphasis is placed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DCO networking solutions to the provision of advanced features in rural and suburban telephone networks

    Publication Year: 1988, Page(s):1200 - 1204 vol.3
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    The authors describe the evolution of the Stromberg-Carlson DCO (digital central office) networking capabilities to support ISDN (integrated services digital network) and IN/2 (Intelligent Network/2) services. The various components of the DCO family can be formed into a network cluster which allows one switch to act as a control point or host. This host acts as a transfer point for SS7 (Signaling... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Calculating laser diode reliability

    Publication Year: 1988, Page(s):63 - 69 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    Provides guidelines for calculating laser diode reliability from accelerated life test data. Specific procedures that are used at his company are explained. Example calculations are provided for both wearout and random failure modes. Issues associated with calculating laser module reliability are identified View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network node interface for new synchronous digital networks-concepts and standardization

    Publication Year: 1988, Page(s):118 - 124 vol.1
    Cited by:  Papers (13)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    The author introduces basic concepts, technologies and a standard for the network node interface (NNI) for synchronous digital networks. Basic requirements for such networks and the NNI are considered. The concepts of a nine-row-based frame structure and a virtual container, which are fundamental to NNI, are introduced. Detailed NNI structures are described. Practical applications of NNI in synchr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.