Networks, 1995. Theme: Electrotechnology 2000: Communications and Networks. [in conjunction with the] International Conference on Information Engineering., Proceedings of IEEE Singapore International

3-7 July 1995

Filter Results

Displaying Results 1 - 25 of 139
  • Proceedings of IEEE Singapore International Conference on Networks and International Conference on Information Engineering '95

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (901 KB)
    Freely Available from IEEE
  • Modeling of the multicast transport protocols using Petri nets

    Publication Year: 1995, Page(s):106 - 110
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (482 KB)

    After a brief introduction to the theory of Petri nets, the MTP (multicast transport protocols) for the distributed network management system is presented. The authors designed the group communication protocol which has low protocol-message overhead and efficiency. The atomic and reliable group communication protocol designed in the paper guarantees that each message sent to a group is delivered t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reduction rules of Petri nets for verification of the communication protocol

    Publication Year: 1995, Page(s):294 - 298
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    Since functional reduction is based on relation instance maps from a set of output places of transition to the corresponding set of input places in an adjacent transition, the concept of composition is formalized as a new transition, and is compounded from two joinable transitions with the merging of the places of two transitions after eliminating common places. This method has one handicap as a s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multicast protocol for network management system

    Publication Year: 1995, Page(s):364 - 368
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (535 KB)

    A new group communication protocol has been proposed and implemented for a distributed network management system. To reduce the protocol overhead, distributed and hierarchical approaches have been introduced: the group management function has been split into three functional entities. The first one is the local group manager (LGM) which manages one or more member(s) in one host. The second one is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A managed object view interface mechanism for distributed network management systems

    Publication Year: 1995, Page(s):374 - 378
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (503 KB)

    This paper presents an architecture of a managed object view interface (MOVI) for distributed network management system managing communication networks for distributed systems, specially for overlapping domain management. The hierarchical domain approach has been adopted for efficient management. We have introduced the MOVI to provide a means to construct a management platform for distributed netw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • List of reviewers

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Author's index

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Automated end-to-end management in ATM networks

    Publication Year: 1995, Page(s):167 - 171
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    ATM network management and ATM traffic control are usually separated: traffic controls are performed automatically by the set of real time algorithms while management tasks are inherently slow and may often involve a human manager. However, network management and traffic control operations interact with each other (e.g., the two basic traffic control functions, CAC and UPC, are necessary to guaran... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The key management mechanism in the handover, performances related to an advanced mobile network

    Publication Year: 1995, Page(s):411 - 415
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    Mobile communication systems with increasing complexity have been developed, introducing the specification of mobile terminal networks and personal telephony services within a world environment (for instance, the Universal Mobile Telecommunication System (UMTS) according to the ETSI or the Future Public Land Mobile Telecommunication System (FPLMTS) according to the ITU-T). The article describes th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analytic model for end-to-end packet based higher layer protocols over cell-based networks

    Publication Year: 1995, Page(s):162 - 166
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    An analytic model for an end-to-end acknowledgement and retransmission-based transport protocol with window flow control over a cell-based switch has been developed; acknowledgements are based on packets of multiple cells. Using this model the effect of packet size, window size, and buffer size on the effective throughput or goodput of on overloaded system, where N such end-to-end sources are mult... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An experimental environment for parallel discrete-event simulation of communication networks

    Publication Year: 1995, Page(s):190 - 194
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    Achieving speedup in discrete-event simulations of communication networks can be done through the use of a network of heterogeneous workstations. The authors describe the realization of an environment for performing these simulations through the use of a graphical user interface tool. With this environment, they evaluated the parallel discrete-event simulation program by simulating Omega networks View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative study of some discrete instantaneous frequency estimators

    Publication Year: 1995, Page(s):608 - 612
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    The instantaneous frequency (IF) of a signal is often used as an aid to time-frequency analysis of non-stationary signals. In this paper the comparative study of the optimal discrete IF (DIF) estimator, the Kay-Tretter DIF estimator, the central finite difference (CFD) DIF estimator and the smoothed CFD DIF estimator are presented in the case of a signal distorted by Gaussian white noise. The adva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of mobility on the traffic analysis in cellular mobile networks

    Publication Year: 1995, Page(s):407 - 410
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    Probability distribution of the channel holding time in cellular mobile communication is found using cell residence time distribution under general mobility conditions. It is shown that cell residence time distribution can be specified by the generalized gamma distribution. Based on the result it is shown that the negative exponential distribution is a good approximation for the channel holding ti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The MFCSMA/CD network

    Publication Year: 1995, Page(s):121 - 125
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    The paper presents a new network model, MFCSMA/CD to provide multichannel communication and fault-tolerant capability on IEEE 802.3 (CSMA/CD). This model inserts a sublayer between the LLC (logical link control) sublayer and MAC (medium access control) sublayer, in order to provide the multichannel communication and fault-tolerant functions. That insertion sublayer is called MFC (multi-channel fau... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frame relay vs. asynchronous transfer mode

    Publication Year: 1995, Page(s):157 - 161
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    High-speed network services will be phased into our daily life gradually in the coming years. With fiber optic data rates over gigabits per second to a persons home, the distinction among the LANs, MANs and WANs will eventually disappear. The reason is not because of a particular protocol but rather the ultrahigh raw speed provided by the fiber technologies. This paper will address the design of f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A communication software design using ITECS environment

    Publication Year: 1995, Page(s):185 - 189
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    In the design process of communication software, its specification needs to be rigorously defined without leaving any ambiguity. For this purpose, several FDTs (formal description techniques) have been proposed for the description of a rigorous specification. We developed a support environment for highly reliable computer aided software design based on FDTs. The paper proposes an integrated suppor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling of image distortion processes associated in video-phone systems and descriptors for image quality

    Publication Year: 1995, Page(s):473 - 477
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    A variety of video-phone systems have begun to appear in the consumer market. The quality of the images generated by these systems is severely affected by the bandwidth restriction of the twisted cable pair. Typically, some of these systems operate with a transmission bit rate less than 19.2 kbps. In comparing different systems with respect to image quality, one finds it useful to assess the quali... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing fault-tolerant services in an open client/service paradigm

    Publication Year: 1995, Page(s):576 - 580
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    The design and understanding of fault-tolerant open distributed systems is a very difficult task. We have to deal with not only all the complex problems of open distributed systems when all the components are well, but also the more complex problems when some of the components fail. This paper proposes a fault-tolerant computing model on open distributed systems. The performance of the model is si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamically tracking a user's progression along novice-expert continuum

    Publication Year: 1995, Page(s):605 - 607
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    Representing the dynamics of dialogue behavior is one of the most critical capabilities of an intelligent interface. When an intelligent interface monitors a user's strategies for solving a complex problem or accomplishing a goal, a discernible pattern of user interaction behavior emerges. This paper introduces and discusses a methodology to identify a user's task-specific expertise dynamically fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new generalized mechanism of secure internetworked information service creation for future personal communications networks. III

    Publication Year: 1995, Page(s):60 - 71
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    The future global personal communications networks (PCN) will not only mean the digital wireless networks, but also include ATM-based B-ISDN as the backbone in order to provide versatile internetworked personal communications services (PCS). There is an obvious need to construct a generalized mechanism of secure internetworked information service creation for future PCN with better performance in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A maximum entropy approach to the analysis of loss systems

    Publication Year: 1995, Page(s):436 - 441
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    The maximum entropy principle allows us to obtain an estimate of the state probability distribution when our knowledge about the system is only the expected value of some functions of the system state. In this paper we explore the maximum entropy approach to evaluate the state probability distribution of loss systems where the call arrival processes are unknown or not specified. We present some nu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jammer suppression in spread spectrum

    Publication Year: 1995, Page(s):220 - 224
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    This paper addresses the performance evaluation of the suppression of a real single tone jammer using singular valve decomposition (SVD). A system model employing the proposed SVD-based technique to reject the single-tone jammer in a direct sequence binary phase shift keying (DS/BPSK) spread spectrum system is presented. The performance of this system is based on the BER results obtained through s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile radio channel characterization

    Publication Year: 1995, Page(s):403 - 406
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    A mobile radio channel is usually characterized by superposition of three independent components with small-, medium-, and large-scale propagation effects. The contribution of each of these variables are considered. Emphasis is made on the effect of shadow fading which is important for the handover decision in the cellular networks View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the suitability of the OSI standard to the diagnosis of communication networks

    Publication Year: 1995, Page(s):116 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    The theory of system-level diagnosis offers an attractive foundation on which to base the fault management of networks. The authors evaluate whether the facilities provided within the OSI network management standard are adequate for the purposes of system-level diagnosis. It is established that for a management system based on a central observer, the OSI framework is indeed sufficient to implement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the interference of surrounding cells in a DS-CDMA system

    Publication Year: 1995, Page(s):152 - 156
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    It is well known that the capacity of a cellular CDMA system is limited by the interuser interference. This effect is often computed using a Gaussian approximation or a lognormal approximation. In this paper, we study the effect of surrounding layers of cells on the reverse link by adding one layer at a time. This approach shows us the relationship among the bit error rate, the path loss exponent ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.