1993 18th Conference on Local Computer Networks

19-22 Sept. 1993

Filter Results

Displaying Results 1 - 25 of 61
  • 1993 18th Conference on Local Computer Networks

    Publication Year: 1993
    Request permission for reuse | PDF file iconPDF (432 KB)
    Freely Available from IEEE
  • Experiments with client/server multimedia on token ring

    Publication Year: 1993, Page(s):2 - 6
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (434 KB)

    The capabilities of a 16-Mb/s token ring to support multimedia applications, and simultaneously carry data and multimedia traffic are demonstrated. The token ring's priority mechanism makes it possible to effectively isolate multimedia and data traffic. Bandwidth management is then needed to allocate a guaranteed bandwidth to multimedia traffic. A simple form of bandwidth management limits the num... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time data delivery for multimedia networks

    Publication Year: 1993, Page(s):7 - 16
    Cited by:  Papers (3)  |  Patents (11)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (821 KB)

    A coherent computer-based multimedia presentation requires the use of real-time scheduling theory applied to system resources including storage devices, the bus, and network. In this paper we present a scheduling technique which is essentially static in nature during periods of network quiescence, but becomes dynamic in response to detection of network load changes of users interaction. This mecha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of voice and video services in isochronous LANs and systems

    Publication Year: 1993, Page(s):17 - 24
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    The performance of voice and video services is evaluated for isochronous LANs or systems that have time division multiplexing (TDM) channels with fixed bandwidth for real-time traffic. The isochronous bandwidth resources are shared by voice and video traffic which have different bandwidth requirements. The blocking probabilities for voice and video arrivals are obtained analytically for the case w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the effectiveness of priorities in token ring for multimedia traffic

    Publication Year: 1993, Page(s):25 - 31
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (672 KB)

    The suitability of IEEE 802.5 token ring LANs for the transport of multimedia traffic is examined. The token ring priority mechanisms and end-station queuing policies are studied in order to understand their effect on the delay characteristics of multimedia traffic. The multimedia traffic is modeled as isochronous data streams. Simulation results are presented to illustrate the access and queuing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using the common LAN to introduce ATM connectivity

    Publication Year: 1993, Page(s):34 - 43
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (957 KB)

    A method for using LAN technologies to transport asynchronous transfer mode (ATM) cells is outlined. B-ISDN service requirements are broken into three groups, i.e., high speed media, multimedia interfaces, and service control software. Compression techniques for bandwidth intensive services are discussed. It is argued that these services may be provided using sub-Mb/s ATM links. The ATM concept is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and analysis of a hierarchical and modular local ATM switch

    Publication Year: 1993, Page(s):44 - 51
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (724 KB)

    A hierarchical and modular local asynchronous transfer mode (ATM) switch is proposed. In order to improve queuing performance, the output queuing technique is adopted and several outputs are allowed to partially share the same output buffer space. The performance of the proposed switch is evaluated under uniform and nonuniform traffic patterns. Comparisons with the knockout switch, the recursive s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "And CNM for all.": Customer network management services for broadband data services

    Publication Year: 1993, Page(s):52 - 61
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (794 KB)

    With the advent of public, broadband, data service offerings such as Frame Relay and Switched Multi-megabit Data Service (SMDS), the frontier for customer network management must expand. Customer Network Management (CNM) capabilities must keep pace with these new services. Simple Network Management Protocol (SNMP)-based CNM services are being defined for publicly-offered data. The CNM service arch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A technical trial of the SMDS customer network management (CNM) by 3M and US West

    Publication Year: 1993, Page(s):62 - 68
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    Switched Multi-megabit Data Service (SMDS) is a high-speed, connectionless, wide area, public cell relay service. It is intended to interconnect Local Area Networks (LANs) utilizing the public data network. Specific management functions include network monitoring and data collection. SMDS Customer Network Management (CNM) offers a network monitoring solution and statistical capabilities which will... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience with the VuNet: A network architecture for a distributed multimedia system

    Publication Year: 1993, Page(s):70 - 76
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (730 KB)

    The VuNet is a gigabit-per-second desk/local-area asynchronous transfer mode (ATM) network built in the context of the ViewStation distributed multimedia project. The ViewStation system takes a software-intensive approach to multimedia where real-time data are processed at the application level and not in specialized hardware. The VuNet hardware is specifically designed to support this software mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distance learning and ATM: A trial at the University of Minnesota

    Publication Year: 1993, Page(s):77 - 80
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (358 KB)

    A distance learning environment is created which links three remote locations via asynchronous transfer mode (ATM). Continuous bit rate audio and video, variable bit rate image data, and low bit rate background control information are handled simultaneously by high speed ATM links and a set of interconnected ATM central office switches. Digital image servers and display devices are interconnected ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic congestion control schemes in high-speed multimedia networks

    Publication Year: 1993, Page(s):81 - 90
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (870 KB)

    Dynamic congestion control strategies for supporting real-time multimedia applications in high-speed integrated asynchronous transfer mode (ATM) networks are considered. Several traffic types including voice, video and multimedia data are expected to co-exist in future broadband integrated services digital network (B-ISDN). They are classified according to their distinct needs based on bandwidth, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new error control scheme for packetized voice over high-speed local area networks

    Publication Year: 1993, Page(s):91 - 100
    Cited by:  Papers (10)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (953 KB)

    A new, unified approach towards the delay and error constraints that influence the quality of a digitized voice over asynchronous local computer networks is proposed. This approach, called Slack automatic repeat request (ARQ) (S-ARQ), proposes an extension of the control time mechanism for jitter control in order to provide error recovery through retransmissions in the case of packet losses in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MAN/WAN integration-The ATM-to-DQDB case

    Publication Year: 1993, Page(s):102 - 109
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (739 KB)

    The interworking modes for the interconnection of metropolitan area networks (MANs) and asynchronous transfer mode (ATM)-based broadband-integrated services digital network (ISDN) are studied. The modes considered are "cell-to-slot interworking" and "frame interworking." The cell-to-slot mode modifies ATM cells to distributed queue dual bus (DQDB) slots and vice versa. The frame mode reassembles c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reactive DQDB

    Publication Year: 1993, Page(s):110 - 119
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (833 KB)

    The authors discuss medium access control in public metropolitan area networks (MANs). A generalization of the distributed queue dual bus (DQDB) protocol which leads to improved medium access control is described for large overload networks where it is known that DQDB can be potentially unfair to competing users (queued arbitrated access). The generalized DQDB protocol, called reactive DQDB, is te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How the Bernoulli slot occupancy approximation in the node DQDB analytical model influences the throughput-delay performance

    Publication Year: 1993, Page(s):120 - 129
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (778 KB)

    The effect of the Bernoulli slot occupancy approximation, which is assumed in most distributed queue dual bus (DQDB) analytical models, on the throughput-delay characteristics of DQDB networks is studied. Studies cover a variety of traffic statistics and network configurations. The results reveal that the influences of the Bernoulli slot occupancy approximation are message length, internode distan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overload throughput performance of different erasure node protocols for DQDB networks

    Publication Year: 1993, Page(s):130 - 138
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (714 KB)

    Erasure nodes are special devices that have been conceived to improve the system throughput of distributed queue dual bus (DQDB) networks. The authors discuss the overload performance of a network with erasure nodes and the standard bandwidth balancing (BWB) mechanism enabled, when alternative implementation schemes of the erasure node protocol are considered. A numerical method is presented to ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability analysis for FDDI dual homing networks

    Publication Year: 1993, Page(s):140 - 146
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    Closed-form reliability functions for the dual homing configuration for the fiber distributed data interface (FDDI) are derived by the combinatorial method. The new reliability functions are then compared to that of the dual ring configuration via numerical examples, which show that in most cases the dual homing network is more reliable than the dual ring network. The model analysis also shows tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimentation on the concentrator tree with loopback

    Publication Year: 1993, Page(s):147 - 156
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (950 KB)

    The fiber distributed data interface (FDDI) concentrator tree topology with loopback is proposed for use in networks which need to continue operation after multiple faults. Initial experiments to use the concentrator tree with loop-back result in configurational dependencies which are not initially understood. A few caveats are found which can be handled through careful cabling. Both a theoretical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved non-real-time communication in FDDI networks with real-time traffic

    Publication Year: 1993, Page(s):157 - 166
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (920 KB)

    The fiber distributed data interface (FDDI) is suitable for real-time communication. A scheme for reducing the response time of non-real-time messages while still providing the same quality of service to real-time messages is proposed. In the proposed approach, non-real-time messages are transmitted ahead of real-time messages unless it is absolutely necessary to transmit real-time messages first ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New contention control mechanisms for FDDI

    Publication Year: 1993, Page(s):167 - 174
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    Contention control strategies for high speed backbone networks are studied. Packet loss is a serious problem in a backbone scenario due to the speed mismatch of the different networks. The authors' new mechanism tries to reduce the packet loss ratio for fiber distributed data interface (FDDI) operating as a backbone. When one buffer is overloaded and packets would be lost, the new schemes try to s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FDDI-2 packet services and latency adjustment buffers

    Publication Year: 1993, Page(s):176 - 185
    Cited by:  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (852 KB)

    FDDI-2 is an extension of the fiber distributed data interface (FDDI) standards that integrates isochronous circuit switched services with the timed token protocol packet services of FDDI. An expression is derived to describe the effects of hybrid mode operation on the packet channel token rotation time, which is dependent on the maximum isochronous transmission rate. The management of packet data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guaranteeing synchronous messages with arbitrary deadline constraints in an FDDI network

    Publication Year: 1993, Page(s):186 - 195
    Cited by:  Papers (26)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1033 KB)

    Issues related to guaranteeing synchronous messages with arbitrary deadline constraints in a fiber distributed data interface (FDDI) network are addressed. It is shown that several network parameters must be set carefully if message deadlines are to be satisfied. Message deadlines can only be met if sufficient synchronous bandwidth is allocated to each mode. Thus, proper synchronous bandwidth allo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bandwidth allocation in FDDI-II for isochronous, synchronous and asynchronous traffic

    Publication Year: 1993, Page(s):196 - 204
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (622 KB)

    Fiber distributed data interface-II (FDDI-II) is a high speed LAN for integrated services applications, supporting isochronous, synchronous, and asynchronous traffic. The performance of FDDI-II in handling multiple classes of traffic is examined. The network can be tuned to meet the requirements of isochronous, synchronous, and asychronous traffic using the wideband channels (WBCs), synchronous al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessment and alternative design of FDDI-II MAC protocol

    Publication Year: 1993, Page(s):205 - 211
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (535 KB)

    Fiber distributed data interface-II (FDDI-II) is a hybrid high speed local area network (HSLAN) providing circuit switched and packet switched services. Although the packet switched service remains connectionless, the circuit switched service is connection-oriented. The weaknesses of the media access control (MAC) protocol of FDDI-II is discussed. A new access scheme, called FDDI-II*, aimed at pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.