By Topic

Selected Areas in Communications, IEEE Journal on

Issue 2 • Date Feb 1991

Filter Results

Displaying Results 1 - 20 of 20
  • CCITT work in teletraffic engineering

    Publication Year: 1991 , Page(s): 131 - 134
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (372 KB)  

    The advantages and drawbacks of standardization in TTE (teletraffic engineering) are examined. It is pointed out that the TTE recommendations of CCITT are intended to be international standards. Unlike signaling systems, interfaces, or protocols, the necessity for standardization in this area is not self-evident. However, standardization of grade of service (GOS) definitions, values, and relevant ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the performance of a circuit switched link with priorities

    Publication Year: 1991 , Page(s): 212 - 219
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (532 KB)  

    The author studies links carrying calls of distinct classes subject to different degrees of access restriction, e.g. by means of some trunk reservation device. Calls are accepted at random with the probability depending on the class of the call and the load on the link at the arrival instant. Assuming negative exponentially distributed holding times, the author develops a model that allows the com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Oscillations and chaos in a flow model of a switching system

    Publication Year: 1991 , Page(s): 171 - 178
    Cited by:  Papers (13)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (644 KB)  

    Field data from digital switching systems in an access tandem environment indicate unexpectedly large queuing delays at moderate occupancies. It is shown that these delays are caused by an effect called traffic synchronization, which is the batching of a system's workload caused by interactions between the system and incident traffic. The authors develop a flow model to study this effect and show ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DCP, a distributed-control polling MAC protocol: specifications and comparison with DQDB

    Publication Year: 1991 , Page(s): 241 - 247
    Cited by:  Papers (7)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (628 KB)  

    The authors describe and analyze a novel MAC (media access control) protocol called distributed-control polling (DCP), which has been designed to bring together the most interesting features of distributed-control MAC protocols (e.g. distributed queue dual bus or DQDB) and centralized token-passing MAC protocols (e.g. FASNET, FDDI or fiber distributed data interface, and Express-ent). From the ful... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CITT E.700 recommendation series-a framework for traffic engineering of ISDN

    Publication Year: 1991 , Page(s): 135 - 141
    Cited by:  Papers (2)  |  Patents (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (704 KB)  

    Traffic engineering of ISDN (integrated services digital network) has become a key area of CCITT recommendations since 1985. The authors report on the first recommendations formalized in a dedicated series on ISDN traffic engineering, the CCITT E.700 series of recommendations. The authors also report on the ongoing work towards an extension of the series to cover integration of mobile services int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An M/G/1 vacation model of an FDDI station

    Publication Year: 1991 , Page(s): 257 - 264
    Cited by:  Papers (21)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (660 KB)  

    The author defines and analyzes an M/G/1 vacation model that can be used to describe a single station in the fiber distributed data interface (FDDI). The M/G/1 model uses a service discipline called the exhaustive limited with limit variation discipline. According to this discipline, the server provides service until either the system is emptied or a randomly chosen limit of l frames has ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multichannel circuit switching-performance evaluation of switching networks

    Publication Year: 1991 , Page(s): 226 - 232
    Cited by:  Papers (1)  |  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (548 KB)  

    An approximate analytical method is presented for the estimation of the loss probability for single and multichannel calls in TST (time-space-time) switching networks. Two extended methods are described. The assumptions for the basic method are that: all occupation patterns of the two internal highways between a certain start and destination highway for a given number of occupied channels have the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of a rate-control throttle where tokens and jobs queue

    Publication Year: 1991 , Page(s): 165 - 170
    Cited by:  Papers (28)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (564 KB)  

    A rate-control throttle is used for overload control in distributed switching systems and computer and communication networks. Typical implementations of the throttle have a token bank where an arriving job is blocked and rejected if the bank is empty of tokens. The author examines an expanded implementation where an arriving job queues in a finite buffer when the token bank is empty. It is shown ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Limited waiting: an adaptive overload-control strategy for circuit switched networks

    Publication Year: 1991 , Page(s): 157 - 164
    Cited by:  Papers (2)  |  Patents (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (684 KB)  

    The authors present an adaptive control strategy for circuit-switched networks in which calls are permitted to wait for a limited time to be carried on a low-cost preferred route. The strategy uses network resources more efficiently than other conventional approaches, exhibiting lower blocking of calls under overload conditions. The proposed strategy is also adaptive in that, when there is little ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of slot reuse in dual bus multiple access networks

    Publication Year: 1991 , Page(s): 248 - 256
    Cited by:  Papers (36)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (772 KB)  

    In dual unidirectional bus networks, packets usually occupy fixed-length slots form the sending station to the end of the network. An erasure node is a specialized station which recognizes packets which have passed their destination stations and releases the slots for subsequent use. The authors derive the optimal locations for erasure nodes and show analytically, for uniform traffic, that only se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet switch engineering procedures when customer characteristics are uncertain

    Publication Year: 1991 , Page(s): 142 - 150
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (708 KB)  

    A method for packet-switch provisioning which accounts for the effects of uncertainty in estimating customer characteristics is demonstrated. The method models the traffic parameters of the customers as random variables. It is used to calculate the maximum number of customers that can be accommodated while controlling the probability that their traffic control is beyond the nominal capacity of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of command operation procedures (COPs) for reliable data transfer in the European Space Data Network

    Publication Year: 1991 , Page(s): 233 - 240
    Cited by:  Papers (1)  |  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (684 KB)  

    Command operation procedures (COPs) are protocols operating in the transfer layer of the telecommand and telemetry architectures designed by the International Consultative Committee for Space Data Systems. The authors present an evaluation of virtual frame transmission times, throughput efficiency, buffer occupancy, and waiting times for the COP-2. COP-2 represents an ARQ-type (automatic repeat re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of a LAN/WAN bridging architecture

    Publication Year: 1991 , Page(s): 265 - 270
    Cited by:  Papers (5)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (548 KB)  

    The performance of local area networks (LANs) bridged through a virtual-circuit-based wide area network (WAN) is analyzed. The focus is on understanding end-to-end performance issues from an applications point of view. Results that can be used to traffic engineer the network to meet end-user service objectives on interactive response time and bulk data transfer throughput are derived. It is demons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of the timed token protocol of FDDI and FDDI-II

    Publication Year: 1991 , Page(s): 271 - 278
    Cited by:  Papers (26)  |  Patents (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (644 KB)  

    The performance behavior of an FDDI (fiber distributed data interface) system with synchronous traffic as well as an extended FDDI (FDDI-II) system with isochronous and asynchronous traffic is evaluated. Multiple asynchronous priorities are considered, one priority level at each station. an iterative algorithm to calculate the first two moments of the cycle (i.e. token rotation) time is presented,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The M/G/1 queue with permanent customers

    Publication Year: 1991 , Page(s): 179 - 184
    Cited by:  Papers (5)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (484 KB)  

    The authors examine an M/G/1 FCFS (first come, first served) queue with two types of customers: ordinary customers, who arrive according to a Poisson process, and permanent customers, who immediately return to the end of the queue after having received a service. The influence of the permanent customers on queue length and sojourn times of the Poisson customers is studied using results from queuin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analytic multiservice performance model for a digital link with a wide class of bandwidth reservation strategies

    Publication Year: 1991 , Page(s): 220 - 225
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (464 KB)  

    The author presents a study of a digital link that carries two traffic streams, each with its own bandwidth and service time requirements. The streams are modeled as two-state Markov-modulated Poisson processes. Thus, in addition to Poisson streams, one can study peaked streams or streams requiring a more complex specification. The author defines a flexible class of controls called extended bandwi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting network management with real-time traffic models

    Publication Year: 1991 , Page(s): 151 - 156
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (464 KB)  

    Real-time routing and flow control in circuit-switched networks is investigated. An algorithm which updates routing tables and flow-control parameters according to changing load conditions is derived. The network is described by means of stochastic difference equations. A control structure imposed by hardware requirements and realistic network status information patterns is considered. It is shown... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing the variability of arrival processes with indexes of dispersion

    Publication Year: 1991 , Page(s): 203 - 211
    Cited by:  Papers (55)  |  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (840 KB)  

    The author proposes to characterize the burstiness of packet-arrival processes with indexes of dispersion for intervals and counts. These indexes, which are functions of the variance of intervals and counts, are relatively straightforward and can estimate and convey much more information than simpler indexes (such as the coefficient of variation) that are often used to describe burstiness quantita... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyclic-service systems with probabilistically-limited service

    Publication Year: 1991 , Page(s): 185 - 193
    Cited by:  Papers (10)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (724 KB)  

    An asymmetric cyclic-service system with a probabilistically limited (PL) service policy is analyzed. In such a service policy, the maximum number of customers served at a queue during a server visit is determined by a probability which is independent of system states. Exhaustive, limited-k, and Bernoulli services are special cases of the PL policy. Customer service times and changeover t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of a discrete multipriority queueing system involving a central shared processor serving many local queues

    Publication Year: 1991 , Page(s): 194 - 202
    Cited by:  Papers (14)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (788 KB)  

    The authors consider a multipriority queuing system which involves several distributed local queues and a central server which performs round-robin processor sharing (RRPS). This queuing model, referred to as multiqueue processor sharing (MPS), is an extension of Kleinrock's classical processor sharing model with generalization to multiple priorities and the addition of a buffer at each traffic so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Journal on Selected Areas in Communications focuses on all telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Muriel Médard
MIT