By Topic

IEEE/ACM Transactions on Networking

Issue 6 • Date Dec. 2000

Filter Results

Displaying Results 1 - 12 of 12
  • Author index

    Publication Year: 2000, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Subject index

    Publication Year: 2000, Page(s):3 - 9
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit

    Publication Year: 2000, Page(s):785 - 799
    Cited by:  Papers (789)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    In wireless LANs (WLANs), the medium access control (MAC) protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel. In this paper we focus on the efficiency of the IEEE 802.11 standard for WLANs. Specifically, we analytically derive the average size of the contention window that maximizes the throughput, hereafter theoretica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the cost of virtual private networks

    Publication Year: 2000, Page(s):775 - 784
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    A virtual private network (VPN) is a private data network that uses a nonprivate data network to carry traffic between remote sites. An “Intranet VPN” establishes network layer connectivity between remote Intranet sites by creating an IP overlay network over the nonprivate network, using various tunneling mechanisms. There are two approaches for establishing such tunnels: a “CPE-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A gamma-based framework for modeling variable-rate MPEG video sources: the GOP GBAR model

    Publication Year: 2000, Page(s):710 - 719
    Cited by:  Papers (45)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB)

    A flexible model called the group-of-pictures gamma-beta auto-regression (GOP GBAR) model based on gamma-distributed variables is proposed for variable-rate MPEG video sources. This model is an extension of Heyman's (see IEEE/ACM Trans. Networking, vol.5, p.554-60, 1997) GBAR model for video teleconferencing. The GOP GBAR model explicitly accounts for MPEG GOP cyclicity and has convenient analytic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A path decomposition approach for computing blocking probabilities in wavelength-routing networks

    Publication Year: 2000, Page(s):747 - 762
    Cited by:  Papers (65)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    We study a class of circuit-switched wavelength-routing networks with fixed or alternate routing and with random wavelength allocation. We present an iterative path decomposition algorithm to evaluate accurately and efficiently the blocking performance of such networks with and without wavelength converters. Our iterative algorithm analyzes the original network by decomposing it into single-path s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal smoothing for guaranteed service

    Publication Year: 2000, Page(s):689 - 696
    Cited by:  Papers (12)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    We consider the transmission of variable bit rate (VBR) video over a network offering a guaranteed service such as ATM VBR or the guaranteed service of the IETF. The guaranteed service requires that the flow accepted by the network has to be conforming with a traffic envelope σ; in return, it receives a service guarantee expressed by a network service curve β. Functions α and &bet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of deadlock models for a multiservice medium access protocol employing a slotted Aloha signalling channel

    Publication Year: 2000, Page(s):800 - 811
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    Medium access protocols for HFC and wireless ATM networks often use a collision based capacity request signalling channel which may rely on the slotted Aloha multiaccess principle. This paper studies the performance of a p-persistence slotted Aloha contention resolution algorithm (CRA), subject to extreme interstation correlation, by means of a discrete-time Markov chain analysis. We examine in de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Source-adaptive multilayered multicast algorithms for real-time video distribution

    Publication Year: 2000, Page(s):720 - 733
    Cited by:  Papers (45)  |  Patents (43)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    Layered transmission of data is often recommended as a solution to the problem of varying bandwidth constraints in multicast video applications. Multilayered encoding, however, is not sufficient to provide high video quality and high network utilization, since bandwidth constraints frequently change over time. Adaptive techniques capable of adjusting the rates of video layers are required to maxim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance modeling of multihop network subject to uniform and nonuniform geometric traffic

    Publication Year: 2000, Page(s):763 - 774
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    Performance modeling under nonuniform traffic is a useful tool to validate simulation accuracy and lend insights to realistic implementation of multihop networks. We present memoryless and independence assumptions based performance models capable of tracking nonuniform traffic for an arbitrary multihop network with the deflection and store-and-forward routing strategies. We also include a descript... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A predictive self-tuning fuzzy-logic feedback rate controller

    Publication Year: 2000, Page(s):697 - 709
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    This paper addresses the design and analysis of an end-to-end rate-based feedback flow control algorithm motivated by the available bit rate (ABR) service in wide-area asynchronous transfer mode (ATM) networks. Recognizing that the explicit feedback rate at time t will not affect the ABR buffer until time t+D for some D⩾0, our approach is to first predict the ABR buffer status at time t+D, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New dynamic algorithms for shortest path tree computation

    Publication Year: 2000, Page(s):734 - 746
    Cited by:  Papers (80)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    The open shortest path first (OSPF) and IS-IS routing protocols widely used in today's Internet compute a shortest path tree (SPT) from each router to other routers in a routing area. Many existing commercial routers recompute an SPT from scratch following changes in the link states of the network. Such recomputation of an entire SPT is inefficient and may consume a considerable amount of CPU time... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The IEEE/ACM Transactions on Networking’s high-level objective is to publish high-quality, original research results derived from theoretical or experimental exploration of the area of communication/computer networking.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
R. Srikant
Dept. of Electrical & Computer Engineering
Univ. of Illinois at Urbana-Champaign