By Topic

IEEE Journal on Selected Areas in Communications

Issue 2 • Feb. 1989

Filter Results

Displaying Results 1 - 17 of 17
  • A low-cost and portable local area network for interconnecting PC's using electric power lines

    Publication Year: 1989, Page(s):192 - 201
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB)

    The development and implication of medium-access-control (MAC) and logical-link-control (LLC) protocols for a low-cost power-line local area network (LAN) is described. A hub polling scheme is developed for use in the MAC sublayer. For the LLC sublayer, a modified version of the IEEE 802.2 standard has been adopted. Some measurements and a performance evaluation of throughput and delay are present... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reservation CSMA/CD: a multiple access protocol for LAN's

    Publication Year: 1989, Page(s):202 - 210
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (746 KB)

    A multiple-access protocol for local area networks is described. It is basically a hybrid of carrier-sense multiple access with collision detection (CSMA/CD) and the broadcast recognizing access method (BRAM). CSMA/CD, which is contention-based, works well under light traffic, but message collisions degrade system performance when the channel becomes heavily loaded. BRAM, which is collision-free, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet voice communications over PC-based local area networks

    Publication Year: 1989, Page(s):211 - 218
    Cited by:  Papers (12)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    Experimental implementations of packet voice communication systems over two types of PC-based local area networks are described. The first is a Proteon proNET token-passing ring network, and the second is an Ethernet network. System configuration, operation, and performance are described for both networks. Models of network performance for estimating the maximum allowable number of active voice st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Radio ISA Net: a single-hop centralized packet radio network for PC-to-mainframe interconnection

    Publication Year: 1989, Page(s):219 - 225
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB)

    A solution for the connection of personal computers or workstations to a central station (represented by a mainframe or a server attached to a local area network) by means of a shared radio channel is presented. Issues regarding the multiple-access protocol are discussed, and an access scheme that is based on the independent stations algorithm (ISA) is presented. The necessary modifications of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet radio in the Amateur Satellite Service

    Publication Year: 1989, Page(s):226 - 234
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (887 KB)

    A review of the satellite-based packet radio activities taking place in the Amateur Radio Service is presented. Five projects are discussed. The Digital Communications Experiment (DCE) on UoSAT-OSCAR-11 is a store-and-forward system that is accessed by a limited number of stations around the world designated as DCE gateways. These gateway stations retrieve and store messages forwarded to them via ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture for a mobile OSI mail access system

    Publication Year: 1989, Page(s):249 - 256
    Cited by:  Patents (56)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (853 KB)

    An architecture and implementation which support an interface to the X.400 mail environment using the full open-systems communications protocols for a portable computer are described. The implementation is designed to be used over a cellular radio telephone network. The portable computer is used to implement the user agent interface of the CCITT X.413 (1988) message store. A full set of security f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Graphical correspondence in electronic-mail networks using personal computers

    Publication Year: 1989, Page(s):257 - 267
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (952 KB)

    A telegraphic technique for electronic-mail correspondence between industry-standard PC facilities equipped with a writing tablet is described. Algorithms for encoding graphical information into the fixed-word format used in the common message-handling architectures are discussed. It is proposed to adopt differential chain encoding which allows an efficient representation of graphics as strings of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Networking AT-class computers for image distribution

    Publication Year: 1989, Page(s):268 - 275
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (867 KB)

    Using the prototype electronic document storage and retrieval (EDSR) system as a testbed, the Ethernet-based image transmission protocol is demonstrated to be a fast, reliable, and efficient mechanism for transmitting document image files among AT-class computers. The principal bottleneck in the server's performance, i.e. the rate at which data are read from the optical disk via the SCSI host adap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personal computer image communications using facsimile

    Publication Year: 1989, Page(s):276 - 282
    Cited by:  Papers (1)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    A prototype terminal is described whereby image application services are obtained by combining the personal computer (PC) and facsimile, in which image input/output and the communication functions are integrated in a single unit. An architecture is suggested which combines the functions of the PC and facsimile, such as display, scanning, printing, storage, and communications. The basic concept of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A PC-based multimedia document manager

    Publication Year: 1989, Page(s):283 - 289
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (710 KB)

    The design, development and demonstration of a prototype system for managing multimedia information is described. This system, referred to as the multimedia document manager (MDM), is based on the IBM PC and uses an open architecture that can utilize information-processing hardware and software from multiple vendors. A prototype of the multimedia document manager has been implemented using the Dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identity-based information security management system for personal computer networks

    Publication Year: 1989, Page(s):290 - 294
    Cited by:  Papers (19)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB)

    A network information security management system which authenticates and/or encrypts messages is proposed. Both authentication and key distribution are executed in a simple scheme. Once the system is set up, the transactions are done independently by the users involved, yet the amount of information that users must keep is small. The experimental implementation of the system on a personal computer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Benevolent Bandit Laboratory: a testbed for distributed algorithms

    Publication Year: 1989, Page(s):303 - 311
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB)

    The design, implementation, and use of a distributed processing environment on a network of IBM PCs running DOS is described. Temporarily unused PCs can be accessed by other users on the network to perform distributed computations. An owner of a PC need not be aware that the machine is being used during idle times; the machine is immediately returned when the owner begins to work again. Some degre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a PC interface card for office communications using the ISDN basic access

    Publication Year: 1989, Page(s):295 - 302
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    The integrated services digital network (ISDN) is able to provide the increasingly sophisticated connectivity required by end-users in modern office systems. A related problem is to bring the ISDN functionality into the end-user's working area. The personal computer is viewed as an effective tool to exploit all ISDN possibilities, because of its favorable price/performance ratio and its high degre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Networking of secure systems

    Publication Year: 1989, Page(s):312 - 318
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    The design and implementation aspects of network security facilities for interconnecting Unix-based secure systems such as Secure Xenix, and CMW, using the TCP/IP protocols for communication, are described. Session-based and non-session-based security facilities are proposed for achieving secure connectivity between secure systems. A description of network security requirements and the arts is inc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personal computer communications on intrabuilding power line LAN's using CSMA with priority acknowledgements

    Publication Year: 1989, Page(s):180 - 191
    Cited by:  Papers (19)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (936 KB)

    Intrabuilding power lines provide a readily available and easily accessed network for personal computer (PC) communications within buildings. The use and performance of carrier-sense multiple access with priority acknowledgements (CSMA/PA) on such networks is described. The communication characteristics of intrabuilding power-line channels are summarized and found to suffer from highly variable an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personal computer communications via VSAT networks

    Publication Year: 1989, Page(s):235 - 245
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (960 KB)

    The very small aperture terminal (VSAT) satellite network, a transport medium that is becoming important for long-distance personal computer (PC) communications, is described and analyzed. The mature and readily available VSAT technology offers many benefits and advantages over conventional terrestrial networks, including lower operating costs, ease of installation and maintenance, support for mul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data compression technique for PC communications

    Publication Year: 1989, Page(s):246 - 248
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB)

    An adaptive technique is described for compressing data that are flowing through a communications channel, being transferred to and from a personal computer using a modem to connect to a remote computer or database service. The objective is to reduce the transmitted data to close to five bits for each character of input data in typical ASCII text files with an algorithm that is simple enough that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Journal on Selected Areas in Communications focuses on all telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Muriel Médard
MIT