By Topic

IEEE Network

Issue 5 • Date Sept.-Oct. 1996

Filter Results

Displaying Results 1 - 10 of 10
  • Distance learning: Technology and applications

    Publication Year: 1996
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • Computer communications and networks, second edition

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • DataComm/2000-CD

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • Understanding SONET/SDH: standards and applications

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (636 KB)
    Freely Available from IEEE
  • Computer networks: architecture, protocols, and software

    Publication Year: 1996
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (509 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP/IP illustrated, volume 3: TCP for transactions, HTTP, NNTP and the UNIX Domain protocols

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (509 KB)
    Freely Available from IEEE
  • Voice over ATM: an evaluation of network architecture alternatives

    Publication Year: 1996, Page(s):22 - 27
    Cited by:  Papers (7)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1976 KB)

    This article describes eight application scenarios in which there is a business case for voice over ATM. It then evaluates alternative network architectures for implementing the required network functionality. The article incorporates much of the ongoing work of the ATM Forum and the ITU, but does not restrict itself to standards and implementation agreements. In addition, it evaluates nonstandard... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource management with virtual paths in ATM networks

    Publication Year: 1996, Page(s):10 - 20
    Cited by:  Papers (27)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1708 KB)

    A virtual path connection (VPC) is a labelled path which can be used to transport a bundle of virtual channel connections (VCCs) and to manage the resources used by these connections. The virtual network is organized as a collection of VPCs which form a VPC, or logical, overlay network. If the VPCs are permanent or semi-permanent and have reserved capacity, establishing new VCCs requires simple co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring and control of ATM networks using special cells

    Publication Year: 1996, Page(s):28 - 38
    Cited by:  Papers (18)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2696 KB)

    This article describes a framework for monitoring and controlling ATM networks based on the use of management cells. By management cells we refer to a broad class of special cells that circulate around the network to perform a variety of useful functions for monitoring and optimizing the operation of the network. The proposed framework includes current ATM-layer OAM (operations and maintenance) me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • End-station performance under leaky bucket traffic shaping

    Publication Year: 1996, Page(s):40 - 47
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2928 KB)

    The shaping of traffic at its source is a prominent congestion control solution in ATM networks. The “leaky bucket” with a “cell spacer” is a very popular traffic-shaping approach. By sizing the leaky bucket and spacer parameters, an end station shapes its traffic to conform to a “good behaviour” contract with the network. The leaky bucket delays the transmissio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

As currently defined, IEEE Network covers the following areas: 1. network protocols and architectures, 2. Protocol design and validation, 3. Communication software and its development and test, 4. Network control and signalling, 5. network management, 6. Practical network implementations including local area networks, (LANs), metropolitan area networks (MANs), and wide  area networks, (WANs), 7. Switching and processing in integrated (voice/data) networks and network components, 8. Micro-to-host communication.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief

Nei Kato
Tohoku University, Japan
kato@it.is.tohoku.ac.jp