[1990] Proceedings. 15th Conference on Local Computer Networks

30 Sept.-3 Oct. 1990

Filter Results

Displaying Results 1 - 25 of 59
  • What the future holds for the local computing network: the next 15 years from a management perspective

    Publication Year: 1990, Page(s):2 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (301 KB)

    It is argued that over the next 15 years, there should be a quantum increase in the amount of computing power delivered to the user. This paper will be derived from the network to which these devices are connected. While all of this will be of interest to the technologist, there is no focus being given to the application of the power of the local computer network (LCN) to the needs of the users. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fiber distributed data interface: an overview

    Publication Year: 1990, Page(s):6 - 11
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (506 KB)

    The fiber distributed data interface (FDDI), a 100 megabit per second (Mb/s) local area network (LAN) that uses optical fiber as the medium, and the development of the FDDI standards are briefly reviewed. The FDDI protocol is based on a token ring access method. the FDDI is being developed as an American National Standard in Accredited Standards Committee X3T9. FDDI is also being developed as an I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LCNs and standards: an uneasy future

    Publication Year: 1990, Page(s):14 - 16
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    It is argued that the development, use, and success of local computing networks (LCNs) has relied in large part on the legitimacy bestowed on them by standards and the standardization process. However, as LCNs become more and more complex, and begin to be seen as part of a larger computing scheme, there are certain requirements that will be levied upon them by the standards creation world. These r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for dynamic bandwidth allocation in the FDDI II MAN

    Publication Year: 1990, Page(s):18 - 22
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (394 KB)

    FDDI II, a proposed standard for metropolitan area networks (MANs) that defines a hybrid protocol providing a mode of operation whereby both FDDI token ring operation and isochronous data transfer are integrated onto the same medium, is considered. A modification is presented of the method of dynamic bandwidth allocation for the FDDI II protocol, and its advantages in terms of bandwidth and simpli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service integration in FDDI

    Publication Year: 1990, Page(s):23 - 32
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (845 KB)

    Performance issues of the FDDI-II protocol, an upward-compatible enhancement of the basic fiber distributed data interface (FDDI), are discussed. The main characteristics of the FDDI protocol are examined. The performance of FDDI-II is studied for scenarios including asynchronous traffic, synchronous traffic and isochronous traffic. The results make clear that basic FDDI meets the requirements imp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated corporate backbone providing packet and fixed-bandwidth services

    Publication Year: 1990, Page(s):33 - 38
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (466 KB)

    A 100-Mb/s fiber-optic ring is discussed. It uses low-level time-division multiple access (TDMA) that permits division of the bandwidth into bands of 25 or 50 Mb/s capacity. These operate independently and may carry either Ethernet/802.3 frames or transparent T1 traffic. The system is examined in the context of integrated services networks, since it provides both packet-based and fixed-bandwidth s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation and evaluation of 4 Mbps twisted-pair transmission system for an IVDLAN

    Publication Year: 1990, Page(s):39 - 44
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (506 KB)

    Implementation and evaluation of a 4-Mb/s twisted-pair transmission system which is proposed as an IEEE local area network standard (802.9) are presented. This standard will provide a multimedia, departmental integrated voice and data LAN (IVDLAN). It is shown that a PR4 line code is optimum for transmission through ordinary laid telephone grade twisted pair. A low-cost transceiver adopting recent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FDDI follow-on status

    Publication Year: 1990, Page(s):45 - 48
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (333 KB)

    Work has been initiated within the American National Standards Committee X3T9.5 committee that developed the standards for the fiber distributed data interface (FDDI) on a new generation local area network. This network is targeted for operation at rates greater than 1 Gb/s. This follow-on work to FDDI is at an early stage. The current requirements for an FDDI follow-on network are presented, the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Configuration control for bus networks

    Publication Year: 1990, Page(s):49 - 59
    Cited by:  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1235 KB)

    A distributed configuration control method applicable to networks based on slotted bus transmission systems is presented. The method creates an operational network out of the individual bus links, removes failed sections from the network by reconfiguration, and supports node insertion and removal. It is designed to work in both dual and folded bus systems. The configuration control is based on sim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Register insertion/self-token protocol for high speed ring LANs

    Publication Year: 1990, Page(s):60 - 64
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    A new ring access control scheme adopting a multiple-token protocol is investigated. In this protocol, each station distributed on a ring has a private token, called self-token, and a fixed-length register to carry out the register insertion protocol. The protocol shows good properties for shorter packets, becoming more superior to the token-ring and the FDDI-I protocols as the packet length decre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical switching and routing architectures for fiber-optic computer communication networks

    Publication Year: 1990, Page(s):65 - 74
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (687 KB)

    An optical interface message processor (OPTIMP) is proposed that exploits the high bandwidth, parallelism, multidimensional capability, and high storage density offered by optics. The most time consuming operations such as switching and routing in communication networks are performed in the optical domain in the proposed system. The design does not suffer from the optical/electrical conversion bot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of FDDI network and interconnected heterogeneous networks

    Publication Year: 1990, Page(s):75 - 83
    Cited by:  Papers (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (724 KB)

    Interconnected heterogeneous networks are presented and their performance analyzed. The interconnected networks consist of token ring, fiber distributed data interface (FDDI), and carrier sense multiple access with collision detection (CSMA/CD) networks, each of which connects a large population of users. In the interconnected networks, the local users on the token ring send intra- or internetwork... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LAN with collision avoidance: switch implementation and simulation study

    Publication Year: 1990, Page(s):84 - 92
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (715 KB)

    Presents a design of a collision avoidance switch for the collision avoidance multiple broadcast (CAMB) tree using transistor-transistor logic (TTL) devices. A simulation study exploring the performance of the broadcast star network in both synchronous and asynchronous operations is also presented. Simulation results show that the slotted broadcast star achieves better performance than the unslott... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transient performance of a CSMA system under temporary overload conditions

    Publication Year: 1990, Page(s):93 - 101
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (397 KB)

    Effects of impulsive arrivals of packets on the performance of carrier-sense multiple-access (CSMA) protocols are studied. A deterministic dynamic system is proposed to approximate the imbedded Markovian chain model of the CSMA system. Based on this approximation, the probability of overloading of the CSMA system due to impulsive input can be estimated, and the trajectory of the system states can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • End-to-end echo response time analysis on large mainframe UNIX systems

    Publication Year: 1990, Page(s):102 - 111
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (582 KB)

    The delay characteristics of the Datakit virtual circuit switch (VCS) are investigated, and its contribution to the overall end-to-end character echo response time delay on large mainframe UNIX (LMU) systems is evaluated. The end-to-end delay consists of the Datakit network, the device attached control unit (DACU), and host component delays. The echo response time is the amount of time it takes fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LAN traffic analysis and workload characterization

    Publication Year: 1990, Page(s):112 - 122
    Cited by:  Papers (21)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (678 KB)

    The results of a LAN traffic analysis are studied in order to characterize the workload in a typical Ethernet environment and to examine the mathematical modeling assumptions that are made regarding packet arrivals, packet size distributions, and user access patterns. These results show that the packet size distribution is application dependent and may not always follow a bimodal pattern. The over... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience with the Xpress transfer protocol

    Publication Year: 1990, Page(s):123 - 131
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (976 KB)

    The Xpress transfer protocol (XTP), a transport and network layer protocol suitable for use as a SAFENET transfer service in the US Navy's emerging survivable adaptable fiber optic embedded network (SAFENET) specification, is described. The background protocol, the implementation environment, the communications architecture, the user interface, some working XTP demonstration programs, and some mea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical XNS internetworking at BLS

    Publication Year: 1990, Page(s):132 - 136
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (482 KB)

    Both the positive and negative sides of a 3Com-based Xerox network system (XNS) are illustrated using US Bureau of Labor Statistics (BLS) experience with this type of implementation. A historical perspective of the BLS LAN, the rationale behind using XNS and 3Plus, the topology of the BLS internetwork, and its main design philosophy are discussed. A review of the LAN services that the BLS internet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences in local networking at USF

    Publication Year: 1990, Page(s):137 - 142
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (522 KB)

    Some of the experiences in networking at the University of South Florida (USF) College of Engineering are described. The LAN selection process and the wiring requirements are outlined. Two networks, the transcendental operating system (TOPS) and the 3Com Ethernet, are reviewed for implementation in this college environment.<<ETX>> View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance enhancement of double linked backbone rings in interconnected token ring network

    Publication Year: 1990, Page(s):143 - 151
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (715 KB)

    Experimental results show that the performance of the IEEE 802.2 and 802.5 protocols for a single token ring is severely degraded in an interconnected token ring network. Congestion at bridges in a network is the primary cause of the degradation of the performance. An approach is investigated in which a secondary transmission link is added to the backbone ring of a network to form a double-linked ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routes determination in multiple-ring networks

    Publication Year: 1990, Page(s):152 - 162
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1076 KB)

    The issue of routing in multiple-ring networks is considered. A new bridge protocol for route determination in a multiple-ring network is introduced. Its main advantage is its communication efficiency: the number of frames used is the number of rings plus the number of bridges in the network, as opposed to the exponential function needed by the existing protocol. Some extensions of the protocol ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internetworking dissimilar LANs with FDDI

    Publication Year: 1990, Page(s):163 - 171
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (711 KB)

    An overview is presented of some of the issues the potential implementor of a large internetwork based on the fiber distributed data interface (FDDI) backbones faces. The qualities of FDDI as a backbone are illustrated. A review of bridges and routers as they relate to the requirements from the internetwork is presented. Available bridging methods are presented and evaluated. A number of issues pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High performance internetworking protocol

    Publication Year: 1990, Page(s):172 - 179
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (840 KB)

    The use of parallelism for protocol processing in a parallel architecture of an internetworking unit is presented. This architecture consists of pipelines and arrays of processors and supports multiple memory concepts (local and global memory). A high-performance parallel implementation of the internetworking protocol in a gateway is discussed, and selected performance results are presented. The r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of a secure gateway on Hughes Aircraft's engineering design network

    Publication Year: 1990, Page(s):180 - 182
    Cited by:  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    The implementation of a secure gateway on the Ethernet-based engineering design network (EDEN) at Hughes Aircraft Company is described. The philosophy and approach of the implementation are outlined along with some of the limitations of the design in terms of overall security. The implementation meets most of the primary objectives of the initial design. The design is simple and elegant and also i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IR wireless system for ARCNet local area network

    Publication Year: 1990, Page(s):183 - 187
    Cited by:  Papers (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (509 KB)

    Results obtained with a commercial ARCNet LAN that uses an unguided infrared link as a medium of transmission are presented. The effects of shot noise produced by ambient light on the system receiver are characterized. A lab prototype of this LAN gave satisfactory results. In the sphere of optics, filtering of the ambient light from the working environment is studied. The spectrum characteristics ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.