By Topic

IEEE/ACM Transactions on Networking

Issue 5 • Oct 1993

Filter Results

Displaying Results 1 - 10 of 10
  • A new approach to service provisioning in ATM networks

    Publication Year: 1993, Page(s):547 - 553
    Cited by:  Papers (84)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    The authors formulate and solve a problem of allocating resources among competing services differentiated by user traffic characteristics and maximum end-to-end delay. The solution leads to an alternative approach to service provisioning in an ATM network, in which the network offers directly for rent its bandwidth and buffers and users purchase freely resources to meet their desired quality. User... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Topologies for wavelength-routing all-optical networks

    Publication Year: 1993, Page(s):534 - 546
    Cited by:  Papers (27)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1284 KB)

    Three regular meshed topologies are compared in light of their possible use for the implementation of large all-optical wavelength-routing communication networks (or interconnection systems). These systems provide all source-destination pairs with end-to-end transparent channels that are identified through a wavelength and a physical path. The considered topologies are the K-dimensional bidirectio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal cost/performance design of ATM switches

    Publication Year: 1993, Page(s):566 - 575
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (932 KB)

    This paper proposes a methodology for performing an evaluation and optimization of the cost of an ATM switching architecture under performance constraints given in terms of virtual connection blocking probability. An analysis of blocking networks is developed, and combined with known results concerning nonblocking networks, provides a theoretical model which relates traffic characteristics, networ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On testing hierarchies for protocols

    Publication Year: 1993, Page(s):590 - 599
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1044 KB)

    The authors consider a protocol specification represented as a fully specified Mealy automata, and the problem of testing an implementation for conformance to such a specification. No single sequence-based test can be completely reliable, if one allows for the possibility of an implementation with an unknown number of extra states. They define a hierarchy of test sequences, parameterized by the le... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Queue response to input correlation functions: discrete spectral analysis

    Publication Year: 1993, Page(s):522 - 533
    Cited by:  Papers (85)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1016 KB)

    The authors explore a new concept of spectral characterization of wide-band input process in high speed networks. It helps them to localize wide-band sources in a subspace, especially in the low-frequency band, which has a dominant impact on queueing performance. They choose simple periodic-chains for the input rate process construction. Analogous to input functions in signal processing, they use ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packing coded video signals into ATM cells

    Publication Year: 1993, Page(s):505 - 509
    Cited by:  Papers (30)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    The output from an H.261 or MPEG video coder consists of macroblocks of differing lengths. Two methods of packing the macroblocks into ATM cells are considered, depending on whether or not part of an uncompleted macroblock may be carried over to the next cell. It is shown that while due to cell loss for a single source loosely packed cells result in a smaller number of lost macroblocks, in a multi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing network protocols at user level

    Publication Year: 1993, Page(s):554 - 565
    Cited by:  Papers (35)  |  Patents (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1284 KB)

    Traditionally, network software has been structured in a monolithic fashion with all protocol stacks executing either within the kernel or in a single trusted user-level server. This organization is motivated by performance and security concerns. However, considerations of code maintenance, ease of debugging, customization, and the simultaneous existence of multiple protocols argue for separating ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Queueing study of a 3-priority policy with distinct service strategies

    Publication Year: 1993, Page(s):576 - 589
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1048 KB)

    A discrete-time, single server, 3-queue system is presented and analyzed. A distinct service strategy, namely the consistent-gated (c-G), 1-limited (L) and head-of-line (HoL), is applied to each of the queues (c-G/L/HoL policy). It is shown that this queueing system provides for an accurate analytical model for a DQDB station, as well as a means for an approximate evaluation of the correlation ass... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing network throughput by integrating protocol layers

    Publication Year: 1993, Page(s):600 - 610
    Cited by:  Papers (45)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1180 KB)

    Integrating protocol data manipulations is a strategy for increasing the throughput of network protocols. The idea is to combine a series of protocol layers into a pipeline so as to access message data more efficiently. This paper introduces a widely-applicable technique for integrating protocols. This technique not only improves performance, but also preserves the modularity of protocol layers by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Competitive routing in multiuser communication networks

    Publication Year: 1993, Page(s):510 - 521
    Cited by:  Papers (234)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1056 KB)

    The authors consider a communication network shared by several selfish users. Each user seeks to optimize its own performance by controlling the routing of its given flow demand, giving rise to a noncooperative game. They investigate the Nash equilibrium of such systems. For a two-node multiple links system, uniqueness of the Nash equilibrium is proven under reasonable convexity conditions. It is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The IEEE/ACM Transactions on Networking’s high-level objective is to publish high-quality, original research results derived from theoretical or experimental exploration of the area of communication/computer networking.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
R. Srikant
Dept. of Electrical & Computer Engineering
Univ. of Illinois at Urbana-Champaign