Computer Communications and Networks, 1995. Proceedings., Fourth International Conference on

20-23 Sept. 1995

Filter Results

Displaying Results 1 - 25 of 93
  • Proceedings Fourth International Conference on Computer Communications and Networks (ICCCN'95)

    Publication Year: 1995
    Request permission for commercial reuse | |PDF file iconPDF (427 KB)
    Freely Available from IEEE
  • Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video

    Publication Year: 1995, Page(s):2 - 10
    Cited by:  Papers (32)  |  Patents (91)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (858 KB)

    The following topics were dealt with: performance modelling; protocols; traffic management; Internet; network security; ATM networks; multicasting; distributed multimedia applications; reliability; network management; mobile communication; interoperability; switching; flow control; LAN and PC performance; FDDI; quality of service; feature testing of communication protocols; video communication; ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A group communication protocol architecture for distributed network management systems

    Publication Year: 1995, Page(s):28 - 31
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (405 KB)

    A group communication protocol has been proposed and implemented for the distributed network management system (MOVI: managed object view interface). To reduce protocol overhead, distributed and hierarchical approaches have been introduced: the group management function has been split into three functional entities. The first one is the local group manager (LCM) which manages one or more member(s)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 1995
    Request permission for commercial reuse | |PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • Adaptive CACs using Bayesian performance estimation

    Publication Year: 1995, Page(s):11 - 17
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (680 KB)

    A typical example of telecommunication system performance estimation during operation is connection admission control (CAC) of asynchronous transfer mode (ATM) networks. This paper investigates adaptive CACs using Bayesian performance estimation. The performance is estimated through Bayesian regression analysis, in which the monitored performance and an a priori estimate are given by conventional ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delay performance evaluation of high speed protocols for multimedia communications

    Publication Year: 1995, Page(s):352 - 355
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (280 KB)

    Multimedia applications integrate a variety of media namely, audio, video, images, graphics, text, and data, each of which has different quality of service (QoS) requirements. To study the support of multimedia traffic on high speed protocols, we examine two significant metrics: delay fairness and worst-case delay performance. Four members of reservation-based high speed protocols are studied DQDB... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transient analysis of cell loss control mechanisms in ATM networks

    Publication Year: 1995, Page(s):240 - 249
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (660 KB)

    A new technique is developed to analyze the cell loss behavior of individual connections in finite intervals for ATM networks. The technique is applied to partial buffer sharing (PBS) in deriving formulae for calculating cell loss rate and queue length distributions for each cell class in a single connection in finite intervals. To maximize network utilization, a new and more flexible cell loss co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Core selection methods for multicast routing

    Publication Year: 1995, Page(s):638 - 642
    Cited by:  Papers (31)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (516 KB)

    Multicast routing is an important topic of both theoretical and practical interest. Several proposed multicast routing algorithms involve the designation of one or more network nodes as the “center” of the routing tree for each multicast group. The choice of this designated router (which we refer to as the “core”) influences the shape of the multicast routing tree, and thus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A large capacity photonic ATM switch for wavelength division multiplexing networks

    Publication Year: 1995, Page(s):414 - 419
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (532 KB)

    Optical switching networks to transport vast amounts of information are important for B-ISDN services. Wavelength division multiplexing (WDM) is emerging as the dominant technology for future optical networks. A large capacity photonic ATM switch architecture using WDM technology is proposed in this paper. The proposed switch is suitable for WDM optical ATM networks, that is, the input and an outp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Loss process analysis of the knockout switch using stochastic activity networks

    Publication Year: 1995, Page(s):344 - 349
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (508 KB)

    The proposed use of asynchronous transfer mode (ATM) in B-ISDN necessitates fast packet switches (FPS) capable of providing adequate quality of service (QoS). The knockout switch is an FPS with low delay and cell loss at the switch level. However, the performance perceived by a specific input is not simple to determine, since the often computed cell loss probability (CLP) is a time averaged value ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A quantitative performance comparison study of optical ring networks with different header speeds

    Publication Year: 1995, Page(s):232 - 239
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (592 KB)

    For the full utilization of the high transmission bandwidth of optical fiber, several optically transparent switching nodes are proposed for use in photonic LANs, MANs or B-ISDN access networks. The node design is simple and adaptable to various networks including rings, buses, and WDM networks. In this paper, we analyze the performance of the optical ring networks which utilize the photonic packe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable virtual circuit routing scheme for ATM networks

    Publication Year: 1995, Page(s):630 - 637
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (732 KB)

    We present a scalable VC routing protocol based on the viewserver hierarchy. Each viewserver maintains a partial view of the network. By querying these viewservers, a source obtains a merged view that contains a path to the destination. The source then sends a setup request packet over this path to reserve resources. We use simulation to compare our protocol to a simple approach that maintains a f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a large ATM switch with trunk grouping

    Publication Year: 1995, Page(s):406 - 413
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (800 KB)

    We describe a large self routing ATM switch with moderate circuit complexity which delivers packets in sequence with a small constant delay. The switch takes advantage of trunk grouping to increase throughput and has same topology as that of a banyan network. By using modules that look at k inputs (k>16) at a time and recursively dividing the packets into two groups, the proposed switch achieve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the demand-priority protocol

    Publication Year: 1995, Page(s):369 - 376
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (640 KB)

    The demand-priority protocol currently in the process of standardization by IEEE 802.12 aims at supporting interactive multimedia applications by providing a low latency service for high-priority traffic. This goal may be achieved in case of large frames and/or small distances. Otherwise, improvements are required. This paper starts with a brief description of the basic characteristics of the netw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sharing buffer in an input-output buffered ATM switch without scaling up memory bandwidth requirement

    Publication Year: 1995, Page(s):339 - 343
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (448 KB)

    In order to provide reliable communication services, the cell loss probability of an ATM network is required to be less than some acceptable value, say 10-5 or smaller. In light of the infrequent cell losses, and overloading of individual output ports is likely to occur at different time instances, an external buffer can be “time-multiplexed” to serve the overloaded output p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to encourage cheating with virtual path policing in ATM networks

    Publication Year: 1995, Page(s):225 - 228
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (364 KB)

    This paper evaluates the concept of virtual path (VP) policing as an alternative to virtual channel (VC) policing in an asynchronous transfer mode (ATM) Ethernet network. The usage parameter control (UPC) function includes a peak rate and a sustainable rate policer. Both policers are implemented based on the leaky bucket algorithm defined by the ATM Forum. We implement VC and VP policers in parall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dual-hop LANs using station wavelength routing

    Publication Year: 1995, Page(s):622 - 629
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (688 KB)

    In future WDM local area networks, the number of available wavelengths may initially be fairly modest. As a result, spatial reuse is required in order to obtain designs which will support a reasonable number of stations. A dual-hop architecture is considered. The network is partitioned into two stages. In the first, the wavelength agility of the user stations is used to route packets from a given ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Burst-level admission control protocols with multirate traffic and arbitrary network topology

    Publication Year: 1995, Page(s):396 - 403
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (648 KB)

    In this paper, we investigate the performance of two burst-level admission control protocol for ATM networks that are based on simple random access techniques: fell-and-wait and tell-and-go. We develop an analytical model based on reduced load approximation to obtain throughput, end-to-end transfer delay and blocking probability characteristics far an arbitrary network topology with multirate traf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A queueing model for wormhole routing with timeout

    Publication Year: 1995, Page(s):584 - 593
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (712 KB)

    In this paper, we propose an analytical model for wormhole routing with the use of a timeout reset mechanism. This model is based on an M/G/1 queueing system with impatient customers and feedback. Some approximations are proposed and verified by simulation. By comparing our analytical results to simulation, we show that the proposed model successfully captures the performance characteristics of wo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol discovery in multiprotocol networks

    Publication Year: 1995, Page(s):361 - 368
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (796 KB)

    Multiprotocol systems can be an important tool for achieving interoperability. As the number of protocols available on such systems grows, there is an increasing need for support mechanisms that enable users to effectively access these protocols. Of particular importance is the need to determine which of several protocols to use for a given communication task. In this work, we propose architecture... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Buffer size trade-offs in input/output buffered ATM switches under various conditions

    Publication Year: 1995, Page(s):258 - 263
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (464 KB)

    In this paper the non-linear and complex relationship between packet loss probability and average packet delay for an input/output buffered ATM switch is studied thoroughly using our previously published analysis model. The main contribution is insight into the behavior of the switch and better understanding of the buffer size trade-offs under various traffic conditions speed-up factors, and buffe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On multicasting in a communication network

    Publication Year: 1995, Page(s):647 - 654
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (688 KB)

    An important problem in communication networks is to be able to efficiently multicast information to a group of network sites. Multicasting reduces the transmission overhead of the network and the time it takes for all the nodes in the subset to receive the information. Recent advances in network speed, switching technology, and the asynchronous transfer mode (ATM) networks have introduced new app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sharing memory in multistage ATM switches

    Publication Year: 1995, Page(s):424 - 429
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (652 KB)

    We study a multistage ATM switch in which shared-memory switching elements are arranged in a banyan topology. By “shared memory”, we mean that each switching element uses output queueing and shares its local cell buffer memory among all its output ports. We apply a buffer management technique called delayed pushout that was originally designed for multistage ATM switches with hierarchi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multilayer-architecture for SNMP-based, distributed and hierarchical management of local area networks

    Publication Year: 1995, Page(s):272 - 279
    Cited by:  Papers (4)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (688 KB)

    In `traditional' SNMP-management, the management task is divided into two layers: agents and managers. The agents provide management data that is read out and processed by the manager. In this paper this architecture is expanded by an intermediate layer. Preprocessors an introduced which behave like a manager in the view of an agent and behave like an agent in the view of a manager. They read out ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The deflecting multicast switch

    Publication Year: 1995, Page(s):332 - 338
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (492 KB)

    We introduce a novel multicast switching paradigm, the deflecting multicast switch (DMS), which accomplishes the replication and routing functions of a multicast switch simultaneously. The architecture is shown to have low connection complexity and can be implemented in a modular fashion. A self-routing and self-replication algorithm with minimal control overhead is described which allows for dist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.