Scheduled System Maintenance
On Tuesday, May 22, IEEE Xplore will undergo scheduled maintenance. Single article sales and account management will be unavailable
from 6:00am–5:00pm ET. There may be intermittent impact on performance from noon–6:00pm ET.
We apologize for the inconvenience.

Computer Communications and Networks, 1995. Proceedings., Fourth International Conference on

20-23 Sept. 1995

Filter Results

Displaying Results 1 - 25 of 93
  • Proceedings Fourth International Conference on Computer Communications and Networks (ICCCN'95)

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (427 KB)
    Freely Available from IEEE
  • Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video

    Publication Year: 1995, Page(s):2 - 10
    Cited by:  Papers (32)  |  Patents (95)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (858 KB)

    The following topics were dealt with: performance modelling; protocols; traffic management; Internet; network security; ATM networks; multicasting; distributed multimedia applications; reliability; network management; mobile communication; interoperability; switching; flow control; LAN and PC performance; FDDI; quality of service; feature testing of communication protocols; video communication; ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A group communication protocol architecture for distributed network management systems

    Publication Year: 1995, Page(s):28 - 31
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (405 KB)

    A group communication protocol has been proposed and implemented for the distributed network management system (MOVI: managed object view interface). To reduce protocol overhead, distributed and hierarchical approaches have been introduced: the group management function has been split into three functional entities. The first one is the local group manager (LCM) which manages one or more member(s)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • Performance evaluation of communication networks for distributed computing

    Publication Year: 1995, Page(s):456 - 459
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    We present performance results for several high-speed networks in distributed computing environments. These networks are: HiPPI, ATM, Fibre Channel, IBM Allnode switch, FDDI, and Ethernet. These networks are parts of two testbeds: DaVinci-a cluster of 16 SGI R8000 workstations at NASA Ames-and LACE-a cluster of 96 IBM RS6000 workstations at NASA Lewis. Also, an IBM SP2 machine is considered for co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance study of buffering within switches in local area networks

    Publication Year: 1995, Page(s):451 - 455
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    Today's demanding applications, such as multimedia, require higher network transfer rates. Traditional local area networks (LANs) will not be able to provide the throughput required by these applications. The use of switches in LANs is an effective technique to increase the throughput of the network. These switches have finite buffers at their input and output ports. The size of these buffers affe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM cell scheduling with queue length-based priority scheme

    Publication Year: 1995, Page(s):671 - 680
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    The asynchronous transfer mode (ATM) is the choice of transport mode for B-ISDN. In this paper, we propose a window-based ATM cell scheduling scheme using a neural network to achieve higher throughput for nonblocking ATM switches. In a nonblocking switch with input queues, significant loss of throughput can occur due to head-of-line blocking when FIFO queueing is employed. To resolve this problem,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case study in local area migration to ATM

    Publication Year: 1995, Page(s):442 - 450
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB)

    Technology for local ATM is currently being offered in a number of devices, such as routers, switches, and switching hubs. These devices provide the capability for an ATM switched internetwork. In general, a switched internetwork consists of an ATM backbone and a number of hubs. The hubs, by providing ATM adaptation functionality, serve as access points to the ATM backbone for servers and clients.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Libra: an object-oriented ATM network simulator

    Publication Year: 1995, Page(s):667 - 670
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    Libra is an object-oriented simulator developed for simulation and fast prototyping of ATM networks. It is designed and implemented to address the diverse issues encountered in the simulation of any large-scale ATM network, namely, modeling of source traffic, network control, switch architecture design, and effective interaction of all these elements in an integrated fashion. The simulator is buil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transmitting time-critical data over heterogeneous subnetworks using standardized protocols

    Publication Year: 1995, Page(s):82 - 87
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB)

    This paper describes a mechanism to transmit time-critical data with ISO/OSI protocols CLTP/CLNP over low or medium speed subnetworks guaranteeing a fixed transmission bandwidth at the access point. Parallel transmission of non-time-critical (normal) data using the protocols TP4/CLNP is scheduled in such a way that the remaining transmission capacity is used but the transmission of time-critical d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The multi-level leaky bucket mechanism

    Publication Year: 1995, Page(s):380 - 387
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    In this paper we present a new state estimation method based on the leaky bucket (LB) mechanism. It is called the multi-level leaky bucket (MLLB) and can be used to determine the current state of a multirate source, e.g, a Markov modulated process. The MLLB provides information about the instantaneous bit rate of a source allowing more effective flow control. We compare the performance of our mech... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Loss process analysis of the knockout switch using stochastic activity networks

    Publication Year: 1995, Page(s):344 - 349
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    The proposed use of asynchronous transfer mode (ATM) in B-ISDN necessitates fast packet switches (FPS) capable of providing adequate quality of service (QoS). The knockout switch is an FPS with low delay and cell loss at the switch level. However, the performance perceived by a specific input is not simple to determine, since the often computed cell loss probability (CLP) is a time averaged value ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of PCS mobility management database system

    Publication Year: 1995, Page(s):434 - 441
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (788 KB)

    A queueing model is developed for the database system which supports mobility management in personal communication systems (PCS). The end-to-end service delay is defined as the performance metric. The accuracy of the analytical model is validated by simulation. It is found that the analytical results show a close agreement to those from simulation over a significant range of system parameters. Thr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Buffer size trade-offs in input/output buffered ATM switches under various conditions

    Publication Year: 1995, Page(s):258 - 263
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    In this paper the non-linear and complex relationship between packet loss probability and average packet delay for an input/output buffered ATM switch is studied thoroughly using our previously published analysis model. The main contribution is insight into the behavior of the switch and better understanding of the buffer size trade-offs under various traffic conditions speed-up factors, and buffe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of interoperability between EFCI and ER switch mechanisms for ABR traffic in an ATM network

    Publication Year: 1995, Page(s):310 - 315
    Cited by:  Papers (7)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    The rate-based flow control mechanism in asynchronous transfer mode (ATM) networks controls the transmission rate of available bit rate (ABR) traffic sources, based on feedback information contained in the resource management (RM) cells coming from the destination and/or the network switching nodes. While the source and destination end systems behavior are fully described in the ATM Forum Traffic ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call admission control issues in a wireless ATM network

    Publication Year: 1995, Page(s):663 - 666
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    This paper presents call admission control issues for an ATM-based wireless network with mobile hosts. Such wireless ATM networks are motivated by both an increasing demand for mobile capability for future broadband networks and broadband multimedia services for mobile systems. An ATM compatible wireless network capable of supporting a mix of broadband ISDN services is discussed. We present a conc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reachability problems for cyclic protocols

    Publication Year: 1995, Page(s):32 - 39
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    We study three reachability problems for cyclic protocols: (1) global state reachability; (2) abstract state reachability; and (3) execution cycle reachability. By combining fair progress and maximal progress during state exploration, we prove that these three problems an all decidable for Q, the class of cyclic protocols with finite fair reachable state spaces. In the course of the investigation,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive CACs using Bayesian performance estimation

    Publication Year: 1995, Page(s):11 - 17
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB)

    A typical example of telecommunication system performance estimation during operation is connection admission control (CAC) of asynchronous transfer mode (ATM) networks. This paper investigates adaptive CACs using Bayesian performance estimation. The performance is estimated through Bayesian regression analysis, in which the monitored performance and an a priori estimate are given by conventional ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bidirectional shufflenet: a multihop topology for backpressure flow control

    Publication Year: 1995, Page(s):74 - 81
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB)

    The traditional shufflenet multihop virtual topology for optical networks does not provide easy support for backpressure flow control on a hop-by-hop basis. In the context of an optical backbone network interconnecting high speed electronic LANs that use wormhole routing, as in the Supercomputer SuperNet (SSN) project, hop-by-hop flow control is required in the optical network to eliminate losses ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the demand-priority protocol

    Publication Year: 1995, Page(s):369 - 376
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    The demand-priority protocol currently in the process of standardization by IEEE 802.12 aims at supporting interactive multimedia applications by providing a low latency service for high-priority traffic. This goal may be achieved in case of large frames and/or small distances. Otherwise, improvements are required. This paper starts with a brief description of the basic characteristics of the netw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sharing buffer in an input-output buffered ATM switch without scaling up memory bandwidth requirement

    Publication Year: 1995, Page(s):339 - 343
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    In order to provide reliable communication services, the cell loss probability of an ATM network is required to be less than some acceptable value, say 10-5 or smaller. In light of the infrequent cell losses, and overloading of individual output ports is likely to occur at different time instances, an external buffer can be “time-multiplexed” to serve the overloaded output p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sharing memory in multistage ATM switches

    Publication Year: 1995, Page(s):424 - 429
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB)

    We study a multistage ATM switch in which shared-memory switching elements are arranged in a banyan topology. By “shared memory”, we mean that each switching element uses output queueing and shares its local cell buffer memory among all its output ports. We apply a buffer management technique called delayed pushout that was originally designed for multistage ATM switches with hierarchi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of self-similarity on the go-back-N ARQ protocols

    Publication Year: 1995, Page(s):250 - 257
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    Packet traffic exhibits fractal or self-similar properties which are fundamentally different from features found in circuit switched voice traffic and captured by commonly used theoretical traffic models. These fractal properties are associated with the burstiness of packet traffic. In this paper we examine the impact of self-similarity on the link-layer error control mechanism, in particular, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality of service (QoS) in distributed hypermedia-systems

    Publication Year: 1995, Page(s):529 - 534
    Cited by:  Papers (3)  |  Patents (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    This paper reports on the transfer of the traditional QoS notion into the environment of distributed hypermedia-systems. We show that the concept of QoS that has been developed in the technical environment is unprofitable for the user of a hypermedia application. A new view should emphasise the use of the QoS terminology based on the requirements of the user, who wants to express quality with rega... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A “persistent connection” model for mobile and distributed systems

    Publication Year: 1995, Page(s):300 - 307
    Cited by:  Papers (2)  |  Patents (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (876 KB)

    This paper describes a mechanism, called “persistent connection” to preserve stream connections after the communicating peer exits and till it restarts. Such connections have many applications: to survive failures that crash one party, network partitions that cut off the two parties, and temporary disconnection in a mobile computing environment. They can also facilitate suspension of p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.