By Topic

IEEE Transactions on Communications

Issue 4 • Date April 1980

Filter Results

Displaying Results 1 - 25 of 26
  • [Front cover and table of contents]

    Publication Year: 1980, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • Preface to the Special Issue

    Publication Year: 1980, Page(s):409 - 412
    Request permission for commercial reuse | PDF file iconPDF (506 KB)
    Freely Available from IEEE
  • OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection

    Publication Year: 1980, Page(s):425 - 432
    Cited by:  Papers (407)  |  Patents (67)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    Considering the urgency of the need for standards which would allow constitution of heterogeneous computer networks, ISO created a new subcommittee for "Open Systems Interconnection" (ISO/ TC97/SC 16) in 1977. The first priority of subcommittee 16 was to develop an architecture for open systems interconnection which could serve as a framework for the definition of standard protocols. As a result o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • X.25 transaction-oriented features - datagram and fast select

    Publication Year: 1980, Page(s):496 - 500
    Cited by:  Papers (6)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    The latest proposed revisions to CCITT Recommendation X.25 for packet-switched service in public data networks now include two new capabilities suitable for transport of a small amount of data. The first provides datagram service for the transport of independent "message type" packets. The other new feature is the fast select facility which provides for the inclusion of 128 octets of user data in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Back cover]

    Publication Year: 1980, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (385 KB)
    Freely Available from IEEE
  • DCNA Higher Level Protocols

    Publication Year: 1980, Page(s):575 - 584
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB)

    This paper explains a philosophy for modeling the higher level communication functions into a network architecture for heterogeneous computer networks called Data Communication Network Architecture (DCNA), the logical structure of the architecture, and several protocols based on it. To specify higher level protocols among computers of different types, DCNA defines a logical model of a computer net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Physical Level Protocols

    Publication Year: 1980, Page(s):433 - 444
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1144 KB)

    The physical level is the most basic protocol level in the hierarchy of data communication protocols. This level covers the physical interface between devices and the rules by which bits are passed from one to another. These devices may be, for example, a data terminal equipment (DTE) and a data circuit-terminating equipment (DCE, e.g., a modem). This paper describes the physical level and the nat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bit-Oriented Data Link Control Procedures

    Publication Year: 1980, Page(s):455 - 467
    Cited by:  Papers (23)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1584 KB)

    The rapid growth of data communications in recent years, coupled with a movement from batch-oriented to transaction-oriented (interactive) type of operation, generated the need for a new, more efficient, more reliable, more flexible form of data link control procedure. A bit-oriented approach to data link control that has become the generally accepted standard around the world is discussed in this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • X.25 Interface and End-to-End Virtual Circuit Service Characteristics

    Publication Year: 1980, Page(s):500 - 510
    Cited by:  Papers (15)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1104 KB)

    Public packet switching networks around the world use CCITT Recommendation X.25, which is the standard device-independent interface between packet networks and user devices operating in the packet-mode. Since its development in 1976 and with four years of network operational experience, the X.25 interface specification has reached a high level of maturity. A revised version of X.25 has been approv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flow Control: A Comparative Survey

    Publication Year: 1980, Page(s):553 - 574
    Cited by:  Papers (222)  |  Patents (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2568 KB)

    Packet switching offers attractive advantages over the more eonventional circuit-switched scheme, namely, flexibility in setting up user connections and more efficient use of resources after the connection is established. However, if user demands are allowed to exceed the system capacity, unpleasant congestion effects occur which rapidly neutralize the delay and efficiency advantages. Congestion c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol Representation with Finite-State Models

    Publication Year: 1980, Page(s):632 - 643
    Cited by:  Papers (43)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1208 KB)

    A three-layer model of a computer network is used to introduce the concept of interface and of end-to-end protocols. Using a simple interface protocol as example, finite state automaton and Petri nets are introduced. The idea of an interface machine is rejected and the problems related to the transmission medium are approached. End-to end protocols request a global model which includes two local m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing Techniques Used in Computer Communication Networks

    Publication Year: 1980, Page(s):539 - 552
    Cited by:  Papers (131)  |  Patents (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1656 KB)

    An overview is provided in this paper of the routing procedures used in a number of operating networks, as well as in two commercial network architectures. The networks include TYMNET, ARPANET, and TRANSPAC. The network architectures discussed are the IBM SNA and the DEC DNA. The routing algorithms all tend to fall in the shortest path class. In the introductory sections, routing procedures in gen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Terminal Protocols

    Publication Year: 1980, Page(s):585 - 593
    Cited by:  Papers (5)  |  Patents (88)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1040 KB)

    Terminal protocols provide basic services for the users of computer networks. This paper presents a survey of the architecture and mechanisms used in current terminal protocols. The paper disusses both parametric terminal protocols such as the CCITT X.3, X.28, and X.29 and virtual terminal protocols, such as the ARPANET TELNET protocol. Many of the problems encountered in terminal protocols recur ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Methods in Communication Protocol Design

    Publication Year: 1980, Page(s):624 - 631
    Cited by:  Papers (103)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1000 KB)

    While early protocol design efforts had to rely largely on seat-of-the-pants methods, a variety of more rigorous techniques have been developed recently. This paper surveys the formal methods being applied to the problems of protocol specification, verification, and implementation. In the specification area, both the service that a protocol layer provides to its users and the internal operations o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Path Control: The Transport Network of SNA

    Publication Year: 1980, Page(s):527 - 538
    Cited by:  Papers (12)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1320 KB)

    A primary virtue of a communications system is transparency of the transport network to the person using the system. The layered structure of SNA provides for the separation of the transport network, called path control, from higher level functions involving the end users of the network. This paper describes the structure of the path control layer of SNA, focusing on connectivity, routing, and flo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Introduction to Network Architectures and Protocols

    Publication Year: 1980, Page(s):413 - 424
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1200 KB)

    This tutorial paper is intended for the reader who is unfamiliar with computer networks, to prepare him for reading the more detailed technical literature on the subject. The approach here is to start with an ordered list of the functions that any network must provide in tieing two end users together, and then to indicate how this leads naturally to layered peer protocols out of which the architec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Executable Description and Validation of SNA

    Publication Year: 1980, Page(s):661 - 677
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1816 KB)

    The definition of IBM's Systems Network Architecture (SNA) has evolved into a specification of a node in the form of a metaimplementation using formal, state-oriented descriptive techniques. This evolution is traced here, and the different formal techniques are described. The culmination of this process has been the development of a PL/I-based programming language, Format and Protocol Language (FA... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pup: An Internetwork Architecture

    Publication Year: 1980, Page(s):612 - 624
    Cited by:  Papers (33)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1560 KB)

    Pup is the name of an internet packet format (PARC Universal Packet), a hierarchy of protocols, and a style of internetwork communication. The fundamental abstraction is an end-to-end media-in dependent internetwork datagram. Higher levels of functionality are achieved by end-to-end protocols that are strictly a matter of agreement among the communicating end processes. This report explores import... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Analyzing and Synthesizing Protocols

    Publication Year: 1980, Page(s):651 - 661
    Cited by:  Papers (123)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1240 KB)

    The production of error-free protocols or complex process interactions is essential to reliable communications. This paper presents techniques for both the detection of errors in protocols and for prevention of errors in their design. The methods have been used successfully to detect and correct errors in existing protocols. A technique based on a reachability analysis is described which detects e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internetwork Protocol Approaches

    Publication Year: 1980, Page(s):604 - 611
    Cited by:  Papers (35)  |  Patents (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    The motivation for interconnecting networks is to provide one or more consistent services to the set of users of the interconnected networks. To provide these services either new end-to-end service protocols must be defined or the service protocols of the individual networks must be made to interwork. In either case the issues of addressing, routing, buffering, flow control, error control, and sec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Character-Oriented Data Link Control Protocols

    Publication Year: 1980, Page(s):445 - 454
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1088 KB)

    Character or byte-oriented data link control protocols have had a profound influence on the rapid and successful development of data communications networks. Although subject to certain limitations which led to the development of the now emerging bit-oriented protocols, character-oriented protocols have served our industry very well. Because of widespread implementation, they can be expected to co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A General Transition Model for Protocols and Communication Services

    Publication Year: 1980, Page(s):643 - 650
    Cited by:  Papers (39)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB)

    Different approaches have been used for the formal specification and verification of communication protocols. This paper explains the approach of nsing a general transition model which combines aspects of finite state transition diagrams and programming languages. Different ways of structuring a protocol into separate modules or functions are also discussed. The main part of the paper describes a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DNA: The Digital Network Architecture

    Publication Year: 1980, Page(s):510 - 526
    Cited by:  Papers (9)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1832 KB)

    Recognizing the need to share resources and distribute computing among systems, computer manufacturers have been designing network components and communication subsystems as part of their hardware/software system offerings. A manufacturer's general purpose network structure must support a wide range of applications, topologies, and hardware configurations. The Digital Network Architecture (DNA), t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SNA Function Management

    Publication Year: 1980, Page(s):594 - 603
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1024 KB)

    The path control network of Systems Network Architecture (SNA) supports communication between pairs of network addressable units called logical units, usually referred to as LU's. When communicating, information flows between LU's over a logical connection called a session. SNA defines three categories of messages which flow on LU-to-LU sessions-- session control, data flow control, and function m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiaccess Protocols in Packet Communication Systems

    Publication Year: 1980, Page(s):468 - 488
    Cited by:  Papers (175)  |  Patents (56)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2328 KB)

    The need for multiaccess protocols arises whenever a resource is shared by many independent contending users. Two major factors contribute to such a situation: the need to share expensive resources in order to achieve their efficient utilization, or the need to provide a high degree of connectivity for communication among independent subscribers (or both). In data transmission systems, the communi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Communications focuses on all telecommunications including telephone, telegraphy, facsimile, and point-to-point television by electromagnetic propagation.

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Naofal Al-Dhahir
University of Texas at Dallas