IEE Proceedings - Communications

Issue 1 • Feb 1998

Filter Results

Displaying Results 1 - 8 of 8
  • Analysis of a leaky bucket control scheme in the signalling system no.7 network

    Publication Year: 1998, Page(s):25 - 32
    Cited by:  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (620 KB)

    Bursts of correlated messages can be sent through the SS7 network if access is available to user signalling bearer capabilities as specified in the CCITT Q.931 standard. These user-to-user correlated messages would cause an increase in the delay of background telephone traffic consisting of ISDN user part (ISUP) and transaction capability application part (TCAP) which has been primarily transferre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blocking analysis of time-division multiplexed multicast switch with intermediate channel grouping

    Publication Year: 1998, Page(s):19 - 24
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (484 KB)

    The blocking performance of circuit switched traffic in a multicast switch with intermediate channel grouping is investigated. The particular switch concerned here is a three-stage time-space-time (TST) interconnection network and performs time-division circuit switching. The input and output stages are time slot interchangers (TSI). The central stage is a time-multiplexed switch with two ports pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of optimal routing and flow control in ATM networks

    Publication Year: 1998, Page(s):1 - 7
    Cited by:  Patents (12)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (652 KB)

    An integrated approach to routing and flow control in ATM networks is proposed. Traditionally, routing and flow control are carried out relatively independently of each other, however, in the reported approach they are integrated and are strongly coupled in the sense that routing is done according to information obtained by the optimal flow control protocol. The flow control protocol NOBEL is exte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Throughput analysis of input-buffered ATM switch

    Publication Year: 1998, Page(s):15 - 18
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (416 KB)

    The limiting throughput of an ATM (asynchronous transfer mode) switch with input queueing under the FCFS (first-come-first-served) scheme is 0.59. Three policies are proposed in the literature to improve the throughput of the switch: policy A (input expansion policy), policy B (window selection policy) and policy C (cell discarding policy). The author considers, for policy C, correlated traffic wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delay spread profiles and receiver performance in a dense multipath environment

    Publication Year: 1998, Page(s):47 - 52
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (592 KB)

    Delay spread in communication systems is due to the abundance of multipath reflections. The classical model of wide-sense stationary uncorrelated scatterers (WSSUS) is adopted for the derivation of the received power profile. It is found that there is a gain G(D) in the total received power relative to the direct ray received power in a free-space environment, that increases with transmitter-recei... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bandwidth allocation of virtual paths using neural-network-based genetic algorithms

    Publication Year: 1998, Page(s):33 - 39
    Cited by:  Papers (4)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (728 KB)

    The concept of virtual paths has become the key technology in ATM networks. A control scheme based on genetic algorithms and neural networks is proposed and applied to the bandwidth allocation of virtual paths in ATM networks. The proposed control scheme is capable of selecting adaptively optimal step sizes of virtual paths according to the traffic characteristics and network environment. As the o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cell-access control for multiple cell-loss classes in shared ATM output buffer

    Publication Year: 1998, Page(s):8 - 14
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (712 KB)

    A cell-access control scheme is described for guaranteeing multiple classes of cell-loss quality-of-service (QoS) requirements in an output buffer of an ATM switch shared by multiple connections. A class acceptance controller is proposed which regulates the acceptance of cells of QoS classes based on the state of the queue. Decision functions for the class-acceptance controller are considered with... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selection of multi-h modulation sets using a stochastic search algorithm

    Publication Year: 1998, Page(s):41 - 46
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (484 KB)

    Multi-h CPFSK modulation is simple to implement, spectrally efficient, and has inherent error correction properties. Multi-h requires large parameter sets to obtain high coding gain. Large numbers of combinations may need to be investigated. A fast efficient and thorough search needs to be performed. A search method based on a genetic algorithm known as `population based incremental learning' (PBI... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.