By Topic

INFOCOM '95. Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Bringing Information to People. Proceedings. IEEE

2-6 April 1995

Go

Filter Results

Displaying Results 1 - 25 of 50
  • Proceedings of INFOCOM'95

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (603 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (214 KB)
    Freely Available from IEEE
  • Adaptive holding policies for IP over ATM networks

    Publication Year: 1995, Page(s):80 - 87 vol.1
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB)

    Next generation wide area networks will be connection-oriented, with data-link layer connectivity being provided by asynchronous transfer mode (ATM). For the huge existing investment in current IP networks such as the Internet to remain useful, one must devise mechanisms to carry IP traffic over ATM networks. A fundamental issue is to devise holding policies for virtual circuits carrying datagrams... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An optimal establishment of virtual path connections for ATM networks

    Publication Year: 1995, Page(s):72 - 79 vol.1
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB)

    A number of optimization models for the establishment of virtual path connections (VPCs) with reserved capacity have been proposed in the literature. All of them, however, failed to reflect the trade-off between increased capacity costs and reduced control costs explicitly in their formulations. the present authors develop a mathematical formulation for an optimal strategy for the reservation of c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient computation of end-to-end performance measures for multi-link ATM networks with multi-media traffic

    Publication Year: 1995, Page(s):170 - 178 vol.1
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB)

    In this paper, we provide: (a) An efficient method for simplifying MMPP source models, which can be used to solve multi-media queueing problems with complicated aggregate input traffic. The effectiveness of the method is verified through numerical examples. (b) An approximation algorithm for analyzing multi-link queueing networks with MMPP traffic sources and arbitrary configurations. In this algo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complexity of gradient projection method for optimal routing in data networks

    Publication Year: 1995, Page(s):269 - 277 vol.1
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB)

    Derives a time complexity bound for the gradient projection method for optimal routing in data networks. This result shows that the gradient projection algorithm of the Goldstein-Levitin-Poljak type formulated by Bertsekas (1982) converges to within ε in relative accuracy in O(ε2hminNmaxL ) iterations, where NmaxL is the n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and analysis of a credit-based controller for congestion control in B-ISDN/ATM networks

    Publication Year: 1995, Page(s):40 - 48 vol.1
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB)

    A credit-based controller (CBC), which has a provision for cell tagging, is proposed for usage parameter control (UPC). Similar in concept to the leaky bucket, the CBC has a credit counter and a data buffer. Credits are accumulated at a rate initiated from the network (equivalent to the sustainable cell rate), and depleted at a rate pertaining to the network traffic load. A source has the prerogat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computable exponential bounds for intree networks with routing

    Publication Year: 1995, Page(s):197 - 204 vol.1
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    In this paper, we refine the calculus proposed previously by Chang et al. (1994). The new calculus, including network operations for multiplexing, input-output relation, and routing, allows us to compute tighter exponential bounds for the tail distributions of queue lengths in intree networks with routing. In particular, if external arrival processes and routing processes are either Markov arrival... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Topological design of local area networks using genetic algorithms

    Publication Year: 1995, Page(s):64 - 71 vol.1
    Cited by:  Papers (9)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    Continually growing number of users have to exchange increasing amounts of information. Local area networks (LANs) are commonly used as the communication infrastructure that meets the demands of the users in the local environment. These networks typically consist of several LAN segments connected together via bridges. The authors describe an algorithm for designing LANs with the objective of minim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast simulation of a voice-data multiplexer

    Publication Year: 1995, Page(s):361 - 368 vol.1
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    This paper considers the problem of estimating, via simulation, extremely low packet loss rates in a voice-data multiplexer. The multiplexer gives priority to voice packets, unless the data queue length exceeds a threshold. To efficiently simulate such low loss rates requires the proper use of importance sampling. In this paper we describe an importance sampling technique that is guaranteed to pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic shaping of a tagged stream in an ATM network: approximate end-to-end analysis

    Publication Year: 1995, Page(s):162 - 169 vol.1
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    Traffic streams-originally shaped to comply with desired traffic descriptors-may suffer substantial distortion within an ATM network due to statistical multiplexing. As a consequence, traffic re-shaping within the network may be necessary. In this work the modification of a tagged traffic stream due to a series of multiplexing operations is studied. The standard FCFS service policy, as well as a p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error control for messaging applications in a wireless environment

    Publication Year: 1995, Page(s):261 - 268 vol.1
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    The paper investigates error control mechanisms for mobile messaging applications, such as e-mail, fax, and credit card verification. Although existing protocols provide efficient error control over conventional networks, wireless networks present significant new challenges. The radio link introduces noise and multipath interference causing long periods of increased error rate, while host motion r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The converging flows problem: an analytical study

    Publication Year: 1995, Page(s):32 - 39 vol.1
    Cited by:  Papers (6)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    When multiple systems are interconnected through a high-speed backbone network and communicate without resource reservation, under certain conditions a severe overload can appear at the destination system. This problem, called the converging flows problem, can be alleviated by use of a feedback control mechanism that coordinates the emission of the sources. The authors present a dynamic resource m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient scheduling of nonuniform packet traffic in a WDM/TDM local lightwave network with arbitrary transceiver tuning latencies

    Publication Year: 1995, Page(s):129 - 137 vol.1
    Cited by:  Papers (24)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    A passive-star-based, broadcast-and-select, local lightwave network which can support a limited number of WDM channels (on the order of ten), but serve a much larger number of nodes (a few tens or hundreds), is considered. Each node is equipped with one tunable transmitter and one fixed receiver, and each WDM channel is operated in a TDM fashion for carrying packet traffic. Bandwidth is allocated ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the performance behavior of ATM end-stations

    Publication Year: 1995, Page(s):188 - 196 vol.1
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    Shaping of traffic at its source is a prominent congestion control solution in ATM networks. The “leaky bucket” with a “cell spacer” is a very popular traffic shaping approach. By sizing the leaky bucket and spacer parameters, an end-station shapes its traffic to conform to a “good behavior” contract with the network. The leaky bucket delays the transmission of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sensing the state of voice sources to improve multiplexer performance

    Publication Year: 1995, Page(s):56 - 63 vol.1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1596 KB)

    The control of source-coded traffic at a multiplexer has been a topic of extensive research. Traditional approaches typically use feedback information on the buffer level in designing the control policy. While important, buffer levels capture only part of the information about the overall system state. By setting up this problem as a Markov decision process, the authors show that using information... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual path bandwidth allocation in multi-user networks

    Publication Year: 1995, Page(s):312 - 320 vol.1
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (880 KB)

    Considers a multi-user network that is shared by noncooperative users. Each user sets up virtual paths that optimize its own, selfish, performance measure. This measure accounts for both the guaranteed call level quality of service, as well as for the cost incurred for reserving the resource. The interaction between the user strategies is formalized as a game. The authors show that this game has a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generalized non-preemptive priority queue

    Publication Year: 1995, Page(s):354 - 360 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    In this paper, we analyze a generalized non-preemptive queue with two priority classes. When the server serves the low priority queue, up to l customers are served before the server returns to the high priority queue. We study the embedded Markov chain at departure epochs and obtain the transforms of the queue-length and sojourn-time distributions. From these transforms, it is easy to find the mom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spanning tree method for link state aggregation in large communication networks

    Publication Year: 1995, Page(s):297 - 302 vol.1
    Cited by:  Papers (43)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    We consider a communication network in which dynamic routing is used for establishing connections that support information transfer between end-users. Link state information is exchanged and maintained up-to-date among network nodes for path computation and network resource allocation. When the population of users is large, the amount of link state information can be overwhelming. A common solutio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATMTraP: an asynchronous transfer mode traffic and performance measurement tool

    Publication Year: 1995, Page(s):220 - 229 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB)

    The analysis and development of ATM network traffic control algorithms is often performed using theoretical traffic models. Algorithms for traffic shaping, policing, flow control, and switch architectures have been proposed based on these models. While the models help to obtain preliminary solutions, the success and validity of the proposed algorithm will be a function of how close the assumed mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed global queue transmission strategy for a WDM optical fiber network

    Publication Year: 1995, Page(s):154 - 161 vol.1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    A new distributed global queueing strategy and medium access protocol that users employ to schedule their transmissions to avoid receiver collisions is introduced for an optical fiber network. The network uses wavelength division multiplexing (WDM) for the data channels. The medium access control utilizes TDMA on the control channel to allow users to implement a global reservation scheme to send d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The distribution of delays of dispersed messages in an M/M/1 queue

    Publication Year: 1995, Page(s):338 - 344 vol.1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    We analyze the distribution of the delay of messages in an infinite capacity M/M/1 queue. A message is composed of n packets, and the arrival of the packets to the queue is Poisson. Our calculations are based on recursive schemes. We obtain explicit expressions for the Laplace-Stieltjes transform (LST) of the delays, which enables to obtain exact expressions for the moments of the delay in a compl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic behavior of feedback congestion control schemes

    Publication Year: 1995, Page(s):253 - 260 vol.1
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    The paper examines the asymptotic behavior of solutions of a simple network model using feedback control under the presence of delays. It shows numerically the existence of complex asymptotic behavior dependent on both parameter values and initial conditions. The presence of multiple asymptotic periodic orbits of different characteristics at the same parameter values indicates that the interaction... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal buffer sharing

    Publication Year: 1995, Page(s):24 - 31 vol.1
    Cited by:  Papers (19)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    Addresses the problem of designing optimal buffer management policies in shared memory switches when packets already accepted in the switch can be dropped (pushed-out). The goal is to maximize the overall throughput, or equivalently to minimize the overall loss probability in the system. For a system with two output ports, the authors prove that the optimal policy is of pushout with threshold type... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile radio slotted ALOHA with capture and diversity

    Publication Year: 1995, Page(s):121 - 128 vol.1
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    The slotted ALOHA protocol in a mobile radio environment, in the presence of Ricean fading, twofold antenna diversity and multiple reception capability, is considered. The capture probabilities and the average throughput are computed, and the issue of stability is addressed. It is shown that diversity can improve the system performance, although only to a certain extent. Some extensions are also c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.