[1991] Proceedings 16th Conference on Local Computer Networks

14-17 Oct. 1991

Filter Results

Displaying Results 1 - 25 of 69
  • Conquering complexity: data networking trends as technology meets market reality

    Publication Year: 1991, Page(s):4 - 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (801 KB)

    Small data networks are usually easy to maintain. However, the cost of support for growing networks can start to increase exponentially. If allowed to continue, additional network expansion comes up against a limit known as the complexity barrier. It then becomes too costly to add new network capabilities. The article discusses how today's data networks can more adequately deal with complexity usi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of FDDI-what about packet loss?

    Publication Year: 1991, Page(s):18 - 23
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB)

    Recently, a discussion came up dealing with the frame copied indicator in the frame status sequence of FDDI. This indicator shows whether or not the destination has copied the frame and this way allows the sender to react in a proper way. However, in interconnected networks the destination node may represent a large number of destinations with different addresses making it difficult to check withi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FDDI network availability analysis

    Publication Year: 1991, Page(s):24 - 33
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (642 KB)

    Various FDDI network configurations are characterized and their availabilities evaluated. From these results it is concluded that an FDDI network backbone should be interconnected using dual attachment concentrators. This is essential for guaranteeing high availability. Furthermore, dual-homing configurations are required to maintain high availability of the path between end-stations and the backb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Station reconfiguration on FDDI trunk rings

    Publication Year: 1991, Page(s):34 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    The US Navy is selecting a et of local area networking standards, under the name SAFENET, for use on tactical platforms. The set of standards incorporate the FDDI local area network (LAN) at the physical and data link layers. The SAFENET group has taken an FDDI feature (the hold policy option) and used it as the basis of a data path hop (or switch) capability. The paper provides a discussion of FD... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability analysis of the FDDI token ring

    Publication Year: 1991, Page(s):41 - 51
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (581 KB)

    The paper develops reliability models and derives closed-form results for network reliability and network mean time to failure, including both node and link failures, for a very popular high speed LAN, the FDDI (fiber distributed data interface). It then extends the results to composite measures of performance and reliability.<<ETX>> View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jitter accumulation in token ring UTP networks

    Publication Year: 1991, Page(s):52 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (893 KB)

    The paper discusses jitter accumulation in token ring unshielded twisted pair (UTP) networks. Topics of discussion include correlated jitter, near end crosstalk (NEXT), and the feasibility of supporting 100 m lobes of standard UTP (DIW) using two different types of active concentrators.<<ETX>> View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 16 Mb/s token ring on unshielded twisted pair cabling

    Publication Year: 1991, Page(s):67 - 72
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB)

    Local area networks operating on structured cabling systems using unshielded twisted pair (UTP) cable are finding increased utilization. These systems provide low cost installation and easy administration. The paper addresses the technical issues concerning the implementation of a robust and practical 16 Mb/s token ring LAN using unshielded twisted pair cabling for lobe connections. Three technica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Temperature-related changes in dielectric constant and dissipation factor of insulations increase attenuation in data cables used in building plenums

    Publication Year: 1991, Page(s):74 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    Local area network performance can deteriorate when high temperatures cause cable attenuation to increase. This problem can be prevented by careful selection of insulating materials. Dissipation factor and dielectric constant for FEP, PVC, and ECTFE were measured at frequencies from 1 kHz to 300 MHz at 20 degrees C and 60 degrees C. Increases in values for these properties can be related to increa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of DQDB and FDDI MAC access protocols

    Publication Year: 1991, Page(s):84 - 95
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    A comparison of the MAC access protocols of the IEEE 802.6 DQDB MAN and FDDI standards is presented. The results are derived from simulation studies, and verified by analytical approximations. The comparison is based on average packet access delays of nodes on DQDB and FDDI networks. By setting the available bandwidth of the two networks to be equal, the authors draw broad conclusions regarding th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance comparison of DQDB and FDDI for integrated networks

    Publication Year: 1991, Page(s):96 - 105
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (633 KB)

    The performance of two high speed network protocols, IEEE 802.6 distributed queue dual bus MAN and fiber distributed data interface are compared based on their ability to support integrated traffic. The comparison includes the asynchronous priority characteristics of the two protocols as well as the performance characteristics of their isochronous service classes. In the integrated network conside... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simulation study on a high-speed slotted-ring access mechanism with dynamically adaptive slot sizes

    Publication Year: 1991, Page(s):106 - 113
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (579 KB)

    Two access mechanisms complementary in performance are the token ring and the slotted ring. While the token ring outperforms the slotted ring for long messages, the latter performs significantly better for short messages. The paper shows that the factor that causes this difference is the number of tokens on the ring. It proposes a new network design in which the number of tokens has been made adap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Topological design of optically switched WDM networks

    Publication Year: 1991, Page(s):114 - 127
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1022 KB)

    The authors' research addresses some of the underlying design principles for a new class of metropolitan area networks (MANs) based on current lightwave technology, optically switched wavelength-division multiplexed (WDM) networks. A unique feature of WDM networks is their ability to create many different virtual topologies on top of the given physical topology. The authors describe problems assoc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical distribution channel: an almost-all optical LAN based on the field-coding technique

    Publication Year: 1991, Page(s):128 - 136
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (609 KB)

    Providing a single user with a very high (gigabit per second) bandwidth is a challenge that the research community is trying to address these days. The paper describes a design of an 'almost-all' optical local-area network that is capable of providing Gbps directly to the user. The network design is based on the 802.6 topology, the 'field coding' technique (in which the header and the data fields ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance study of the MetaRing with Gb/s links

    Publication Year: 1991, Page(s):137 - 147
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (565 KB)

    MetaRing is a Gigabit/second local area network architecture based on a dual(bi-directional) optical fiber ring with spatial reuse mechanism. The paper uses simulation to study the performance of MetaRing in the buffer insertion mode with variable length packets. It shows through various delay-throughput curves the major performance aspects of the MetaRing architecture. The results indicate that t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TESLA as a tool of developing bridge protocols

    Publication Year: 1991, Page(s):148 - 157
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (531 KB)

    In a distributed computing environment, a testbed is built to investigate topology learning behaviors of bridges for LAN interconnection. It is flexible to configure on any networked computing facility and thus serves as an environment for rapid prototyping of bridge systems. Unlike a pure simulator, the testbed employs distributed computing in itself so that the parallelism embedded in protocols ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A transputer based OSI-gateway for LAN-interconnection across ISDN

    Publication Year: 1991, Page(s):158 - 165
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (772 KB)

    Interconnections of remote local area networks (LANs) across public networks are of growing interest. The paper presents an OSI gateway to interconnect LANs across ISDN. The OSI connectionless network protocol (CLNP) supports interconnection of different subnetworks. The most important component of the gateway is an adaption layer to integrate ISDN into the gateway structure. The main task of this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fault-tolerant bridging scheme for dynamic load balancing

    Publication Year: 1991, Page(s):166 - 174
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB)

    Presents a fault-tolerant bridging scheme for interconnecting multiple LANs. Fault tolerance is built by linking a LAN to two bridge ports located on two different processing elements, respectively. Two load-partitioning schemes are developed to prevent multiple copies of an arriving frame. A static partitioning scheme requires little hardware or software augmentation. However, the load may not be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Brouter: the transparent bridge with shortest path in interconnected LANs

    Publication Year: 1991, Page(s):175 - 183
    Cited by:  Papers (1)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (662 KB)

    Transparency is a popular feature in a distributed system where users can access any local or remote resources just as if they were local. The paper proposes a protocol which combines the features of transparency and shortest path. The result is a bridge which supports self learning and distributed routing computation. Since this bridge has all routing facilities as a router, it is called brouter ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributing the Stuttgart Tetrahedron

    Publication Year: 1991, Page(s):185 - 194
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (683 KB)

    The paper describes the 'Stuttgart Tetrahedron' and how it is distributed under the 'ideal' campus situation. The need for knowledge sharing and cooperation between researchers in strategic fields is shown to be the main driving force for distributing such tetrahedrons over Germany and necessarily over Europe. The Stuttgart VBN projects and the MAN field trial are described within this context. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A traffic control strategy for a DQDB-type MAN

    Publication Year: 1991, Page(s):195 - 203
    Cited by:  Papers (1)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (501 KB)

    The joint problem of admission control of isochronous traffic and bandwidth sharing between isochronous and asynchronous traffic is addressed, in a MAN environment of the DQDB type. Local access controllers at the users' sites independently decide on the acceptance of each new isochronous call be applying a randomized decision rule. A central controller periodically reassigns bandwidth partitions ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multiple-priority scheme for distributed queue dual bus networks

    Publication Year: 1991, Page(s):204 - 213
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (675 KB)

    Studies have shown that earlier versions of the distributed queue dual bus (DQDB) exhibited asymmetric segment access delay under heavy loads. A bandwidth balancing (BWB) mechanism was subsequently adopted to improve the access delay characteristics of DQDB. This mechanism, however, does not effectively support multiple levels of priority that DQDB may need in order to provide new services to the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Priority-based dynamic access policies to WAN from LAN/MAN

    Publication Year: 1991, Page(s):214 - 222
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (651 KB)

    The authors consider the integration problem of LAN/MAN traffic to WAN by ATM/SONET multiplexing. They propose separate buffers for voice and data to efficiently control the throughput of each traffic type. Transmission bandwidth is dynamically and adaptively shared between voice and data to guarantee grade of service (GOS) requirements for each traffic type. The authors propose two algorithms for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internetworking data services

    Publication Year: 1991, Page(s):223 - 229
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (735 KB)

    This paper describes considerations for potential future public data communication services interconnecting users on private local area networks belonging to different administrative domains. The relevant management issues are addressed in an architecture consisting of distributed software modules organized in a hierarchical structure supporting network administration functions. The authors descri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A two-level threshold-based traffic control scheme for ATM networks

    Publication Year: 1991, Page(s):230 - 236
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    Emerging multimedia communication networks differ from transitional data networks in that they use very high speed transmission facilities and they carry various types of traffic with different performance requirements. So, effective communication protocols that encounter for several traffic and performance characteristics need to be developed in order to meet the required QOS (quality of service)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM traffic characterization

    Publication Year: 1991, Page(s):237 - 246
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (742 KB)

    This paper treats characterization of ATM traffic. As the connection acceptance control, the policing and last but not least the terminal equipment are concerned with traffic characterization, this issue is of special importance. This paper first develops theoretical traffic characterizers to be used in theory and simulation, and then proposes a single parameter-the equivalent offered traffic-to b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.