Proceedings of Sixth International Conference on Computer Communications and Networks

22-25 Sept. 1997

Filter Results

Displaying Results 1 - 25 of 84
  • Proceedings of Sixth International Conference on Computer Communications and Networks

    Publication Year: 1997
    Request permission for commercial reuse | PDF file iconPDF (485 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1997, Page(s):549 - 551
    Request permission for commercial reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • Performance testing of communication protocols for three-tier computing: results for ICA and X window protocols

    Publication Year: 1997, Page(s):450 - 455
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB)

    We present the results of performance tests to compare two protocols for three-tier computing using the Windows NT operating system. Three-tier computing features a data server for stored databases (Tier 1), an application server that runs applications (Tier 2), and a simple client program that runs on desktop machines that presents the user interface (Tier 3). Three protocols are available to com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical characterization of wide-area IP traffic

    Publication Year: 1997, Page(s):442 - 447
    Cited by:  Papers (15)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    A background traffic model is fundamental to packet-level network simulation since the background traffic impacts packet drop rates, queueing delays, end-to-end delay variation, and also determines available network bandwidth. In this paper, we present a statistical characterization of wide-area IP traffic based on 90-minute traces taken from a week-long trace of packets exchanged between a large ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NetRAP-a network resource allocation protocol for IP over Ethernet

    Publication Year: 1997, Page(s):434 - 441
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (772 KB)

    For more than a decade, IP over the Ethernet has been the dominating local area network technology because it is cost-efficient, simple and reliable. Unfortunately, it does not support the transport of continuous data as generated by multimedia applications. The large number of IP installations makes it necessary to find ways to provide support for multimedia applications in existing network envir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM network interface architectures for low latency

    Publication Year: 1997, Page(s):494 - 499
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    There are many important factors to consider when designing a network interface for an ATM network, and different applications have different demands. This paper addresses the problem of making an ATM interface with the focus on very low message latency, e.g., for shared memory multiprocessors on top of a network of workstations, and yet making it general enough to be a cost effective solution. Di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A solution for the priority queue problem of deadline-ordered service disciplines

    Publication Year: 1997, Page(s):320 - 325
    Cited by:  Papers (1)  |  Patents (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    To provide service guarantees in packet-switching networks, several deadline-ordered service disciplines have been proposed, including delay-EDD (earliest due deadline), jitter-EDD, leave-in-time, RFS, and virtual-clock. In a deadline-ordered service discipline, packets are assigned transmission deadlines and are transmitted according to the deadline-ordered scheduling policy: transmit packets in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gis2web and its inter-application communications issues

    Publication Year: 1997, Page(s):427 - 430
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    Gis2web is a system intended to bridge the gap between GIS software and datasets and the WWW. The system operates by periodically accessing distributed datasets of GIS information and creating a common repository of WWW accessible information on a gis2web server. In this way gis2web users are provided seamless access to different datasets which may be of quite different forms. This paper discusses... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A low cost searching device for an ATM adapter

    Publication Year: 1997, Page(s):488 - 493
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    A key function of an ATM adapter is its ability to sort the incoming traffic from the VPi/VCi field of the cell headers. This has to be done at media speed and requires a hardware assist to keep up with the high speed lines over which ATM cells are transported. Although the device of choice to perform a search is a content addressable memory (CAM) such devices are seldom used, especially in the co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance model for ATM switches with multiple input queues

    Publication Year: 1997, Page(s):222 - 227
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    An analytical model for the performance analysis of a novel input access scheme for an ATM switch is developed and presented in this paper. The interconnection network of the ATM switch is internally nonblocking and each input port maintains a separate queue for each output port so as to reduce the head-of-line (HOL) blocking of conventional input queuing switches. Each input is allowed to send on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An API for scalable reliable multicast

    Publication Year: 1997, Page(s):60 - 64
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    There are many scenarios in which the same data must be delivered over a packet switched network to a large set of receivers. The Internet enables efficient multipoint transmissions through IP multicast by allowing data transmission to all receivers with a single send. Most approaches to scalable reliable multicast utilize receiver-oriented retransmissions. Defining an API for receiver-oriented re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QOS based performance of selective repeat transport user in hybrid ATM/TDMA networks

    Publication Year: 1997, Page(s):313 - 318
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    The selective repeat (SR) transport user end-to-end throughput and delay characteristics are analyzed in a hybrid asynchronous transfer mode/time division multiple access (ATM/TDMA) network. The SR transport user is assumed with an underlying cell-level global congestion control in the ATM multiplexer node. The analysis is based on the interaction of packet level control with the queue management ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Archiving agents for the World Wide Web

    Publication Year: 1997, Page(s):424 - 426
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    The information available on the World Wide Web changes with incredible speed. New information is added and old information is altered. This means that a document which is important to a user accessing the Web may change, move or even disappear altogether. Described here is an autonomous agent, written in Java, which locally archives documents that are deemed important by the user. These locally a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile extensions to RSVP

    Publication Year: 1997, Page(s):132 - 136
    Cited by:  Papers (17)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    RSVP (resource reservation protocol) is a receiver oriented resource reservation setup protocol targeted for integrated services packet networks (ISPNs). RSVP has a number of desirable attributes which make it a leading candidate for Internet standardization. These attributes include flexibility, robustness, and scalability. However, RSVP does not adequately address the issue of resource reservati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Timing properties of the timed token MAC protocol

    Publication Year: 1997, Page(s):481 - 486
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB)

    We investigate the inherent timing properties of the timed token medium access control (MAC) protocol that are necessary for guaranteeing synchronous message deadlines in a timed token ring network such as the Fibre Distributed Data Interface (FDDI) network. As a result, the best-so-far result of the upper bound on the time possibly elapsed between any number of successive token arrivals at a part... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New algorithms and techniques for well-synchronized audio and video streams communications

    Publication Year: 1997, Page(s):214 - 219
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB)

    Due to the rapid progress of computer and network technologies, the environment for multimedia communications is being prepared day by day. This environment, however is not developed enough to realize well-synchronized high performance multimedia communications, because there are still problems that must be solved. To solve these problems, we propose new algorithms and techniques that have already... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The performance of multicast banyan networks

    Publication Year: 1997, Page(s):51 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1136 KB)

    Multicast is the ability to transmit information from a single source node to multiple selected destination nodes in a network. Current trends in networking applications indicate that there will be an increasing demand in future networks for multicast communication. Banyan networks have been proposed for use in ATM high-speed communications networks and have been used for the interconnection of pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic bandwidth allocation for real-time VBR video traffic in ATM networks

    Publication Year: 1997, Page(s):306 - 312
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    We study the problem of dynamic bandwidth allocation for an ATM multiplexer loaded with real-rime VBR video traffic. The proposed mechanism adjusts the allocated bandwidth at regular intervals based on measured QoS. Instead of actual measurement of small cell loss ratios, we combine a virtual output buffer method with a regression method to shorten the time interval required for estimating the req... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability of Internet hosts: a case study from the end user's perspective

    Publication Year: 1997, Page(s):418 - 423
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    This paper presents the results of a 40-day reliability study on a set of 97 popular Web sites done from an end user's perspective. Data for the study was acquired by periodically attempting to fetch an HTML file from each Web site and recording the outcome of such attempts. Analysis of the acquired data revealed: (i) 94% of the HTML file fetch requests succeed on average; (ii) most failures last ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel mobile agent search algorithm

    Publication Year: 1997, Page(s):128 - 131
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    Intelligent agents have been shown to be a good approach to addressing the issues of limited capacity and unreliable wireless links in mobile computing. However, before the approach can be commercially viable, a set of management capabilities that support the controls of intelligent agents in a mobile environment need to be in place. Since controls can only be applied after the target agent is loc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP selective acknowledgments and UBR drop policies to improve ATM-UBR performance over terrestrial and satellite networks

    Publication Year: 1997, Page(s):17 - 25
    Cited by:  Papers (9)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1136 KB)

    We study the performance of selective acknowledgements (SACK) with TCP over the ATM-UBR service category. We examine various unspecified bit rate (UBR) drop policies, TCP mechanisms and network configurations to recommend optimal parameters for TCP over UBR. We discuss various TCP congestion control mechanisms compare their performance for LANs and WANs. We describe the effect of satellite delays ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of a QoS capable switch-router

    Publication Year: 1997, Page(s):276 - 284
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (996 KB)

    An important challenge for the future growth of the Internet is to design routers that can forward the exponentially increasing volume of traffic, and at the same time provide the service differentiation needed by new applications. In this paper, we describe the architecture, implementation, and initial experiences with a system designed to meet this challenge. This system, which we call a QoS cap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol filtering: a microscopic approach to Windows NT and Novell NetWare network modeling

    Publication Year: 1997, Page(s):462 - 466
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    The application of protocol filtering in network modeling was discussed. This technique can be used to conduct performance analysis by simulating system “what-if” scenarios. The Windows NT and Novell Netware subnets of the School of Engineering at Widener University were considered as the problem domain. Analysis was conducted on 1.2 GB of data gathered daily over a period of two month... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM switches with bifurcated input queueing

    Publication Year: 1997, Page(s):504 - 507
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    Bifurcated queueing has been shown to be a very practical means to exceed the classical upper bound of 0.568 for throughput of input-queued ATM switches. We report the results from a simulation study of the associated improvements in the average cell delay. Our results indicate sharp reductions in the average cell delays, and our simulations include cases of both uncorrelated and correlated traffi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-performance scalable computing for real-time applications

    Publication Year: 1997, Page(s):332 - 335
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB)

    Sanders is integrating emerging interconnect technologies with other high-performance computing technologies to meet the demanding requirements of future, real-time, embedded military applications. Myrinet, a switched network, is used to connect heterogeneous computer nodes in a low-latency, high-throughput system area network (SAN). Myrinet includes a standardized intelligent node-to-network inte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.