By Topic

IEEE/ACM Transactions on Networking

Issue 3 • Jun 1995

Filter Results

Displaying Results 1 - 12 of 12
  • Bandwidth quantization and states reduction in the broadband ISDN

    Publication Year: 1995, Page(s):352 - 360
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (888 KB)

    If a network supports only certain rates, we say its bandwidth is quantized. In a quantized-bandwidth network, a customer may be forced to use the next higher rate if the requested rate is not supported. The result is a higher blocking probability and a lower throughput. The throughput loss due to quantization is called the quantization loss, and its related issues are the focus of this paper. We ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delay analysis of a cellular mobile priority queueing system

    Publication Year: 1995, Page(s):310 - 319
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (876 KB)

    A nonpreemptive priority queueing system incorporating a channel reservation policy and a hysteresis mechanism is considered for use in cellular mobile networks. The aim is to provide for priority for handover attempts over new call. Attempts in such a way as to avoid the forced termination of calls in progress without unduly affecting the performance seen by new call attempts. The system model is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selection of timed token protocol parameters to guarantee message deadlines

    Publication Year: 1995, Page(s):340 - 351
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1064 KB)

    Networks that use the timed token protocol (such as the 100 Mbit/s FDDI network) are well suited for real-time applications because they guarantee, to each node, an average bandwidth and a bounded access time to the communication network. This guarantee is necessary but not sufficient for the timely delivery of deadline-constrained messages; protocol parameters must be carefully selected to ensure... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance model for ATM switches with general packet length distributions

    Publication Year: 1995, Page(s):299 - 309
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1028 KB)

    The maximum throughput of an ATM switch is investigated in the presence of an offered load of multicell packets. For the case of input queueing coupled with a round-robin policy for transferring cells from inputs to outputs, the system is approximated by a product form queueing network. Under the assumption that packet lengths are described by random variables with discrete Coxian distributions, i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelength requirements of all-optical networks

    Publication Year: 1995, Page(s):269 - 280
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1328 KB)

    All-optical networks are networks for which all data paths remain optical from input to output. With rapid development of optical technology, such networks are a viable choice for the high speed wide area networks of the future. Wavelength division multiple access (WDMA) currently provides the most mature technology for all-optical networks. The authors discuss a class of WDMA networks that are ho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic descriptors for VBR video teleconferencing over ATM networks

    Publication Year: 1995, Page(s):329 - 339
    Cited by:  Papers (80)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1164 KB)

    This paper examines the problem of video transport over ATM networks using knowledge of both video system design and broadband networks. The following issues are addressed: video system delay caused by internal buffering, traffic descriptors (TD) for video, and call admission. We find that while different video sequences require different TD parameters, the following trends hold for all sequences ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new structural property of statistical data forks

    Publication Year: 1995, Page(s):289 - 298
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (940 KB)

    The paper presents a method of controlling the pattern of packet flow in the statistical data fork (SDF), such that the output channels are assigned to a channel group based only on their addresses and this assignment is maintained independently of the offered load to the SDF. The proposed method is realized by using a structural property of the SDF which is derived in the paper. It is shown that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimum-latency transport protocols with modulo-N incarnation numbers

    Publication Year: 1995, Page(s):255 - 268
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1356 KB)

    To provide reliable connection management, a transport protocol uses 3-way handshakes in which user incarnations are identified by bounded incarnation numbers from some modulo-N space, Cacheing schemes have been proposed to reduce the 3-way handshake to a 2-way handshake, providing the minimum latency desired for transaction-oriented applications. The authors define a class of cacheing protocols a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wide area traffic: the failure of Poisson modeling

    Publication Year: 1995, Page(s):226 - 244
    Cited by:  Papers (1851)  |  Patents (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2120 KB)

    Network arrivals are often modeled as Poisson processes for analytic simplicity, even though a number of traffic studies have shown that packet interarrivals are not exponentially distributed. We evaluate 24 wide area traces, investigating a number of wide area TCP arrival processes (session and connection arrivals, FTP data connection arrivals within FTP sessions, and TELNET packet arrivals) to d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new label-based source routing for multi-ring networks

    Publication Year: 1995, Page(s):320 - 328
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1000 KB)

    This paper presents a new source routing technique for ring and multi-ring networks, which uses short address labels. The main objectives for having this new method are that in case of one or more failures a frame will be guaranteed: (1) to be removed from the ring-termination property, and (2) to be copied at most once and only by its destinations-safety property. The scheme is based on dividing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A heuristic wavelength assignment algorithm for multihop WDM networks with wavelength routing and wavelength re-use

    Publication Year: 1995, Page(s):281 - 288
    Cited by:  Papers (105)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (852 KB)

    Presents a heuristic algorithm for effectively assigning a limited number of wavelengths among the access stations of a multihop network wherein the physical medium consists of optical fiber segments which interconnect wavelength-selective optical switches. Such a physical medium permits the limited number of wavelengths to be re-used among the various fiber links, thereby offering very high aggre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved algorithms for synchronizing computer network clocks

    Publication Year: 1995, Page(s):245 - 254
    Cited by:  Papers (119)  |  Patents (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1100 KB)

    The Network Time Protocol (NTP) is widely deployed in the Internet to synchronize computer clocks to each other and to international standards via telephone modem, radio and satellite. The protocols and algorithms have evolved over more than a decade to produce the present NTP Version 3 specification and implementations. Most of the estimated deployment of 100000 NTP servers and clients enjoy sync... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The IEEE/ACM Transactions on Networking’s high-level objective is to publish high-quality, original research results derived from theoretical or experimental exploration of the area of communication/computer networking.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
R. Srikant
Dept. of Electrical & Computer Engineering
Univ. of Illinois at Urbana-Champaign