INFOCOM '98. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE

March 29 1998-April 2 1998

Go

Filter Results

Displaying Results 1 - 25 of 65
  • IEEE INFOCOM '98 The Conference on Computer Communications [front matter]

    Publication Year: 1998, Page(s):i - xxviii
    Request permission for commercial reuse | PDF file iconPDF (775 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1998, Page(s):0_6 - 0_8
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • The network effects of prefetching

    Publication Year: 1998, Page(s):1232 - 1239 vol.3
    Cited by:  Papers (43)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (932 KB)

    Prefetching has been shown to be an effective technique for reducing user perceived latency in distributed systems. In this paper we show that even when prefetching adds no extra traffic to the network, it can have serious negative performance effects. Straightforward approaches to prefetching increase the burstiness of individual sources, leading to increased average queue sizes in network switch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Techniques for developing and measuring high performance Web servers over high speed networks

    Publication Year: 1998, Page(s):1222 - 1231 vol.3
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1368 KB)

    High-performance Web servers are essential to meet the growing demands of the Internet and large-scale intranets. Satisfying these demands requires a thorough understanding of key factors affecting Web server performance. This paper presents empirical analysis illustrating how dynamic and static adaptivity can enhance Web server performance. Two research contributions support this conclusion. Firs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the impact of long-range-dependent traffic in dimensioning ATM network buffer

    Publication Year: 1998, Page(s):1317 - 1324 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    Recent measurements of packet networks have shown that packet traffic exhibits long-range-dependent property. Studies have also discovered that this property is not adequately captured by the conventional Markov traffic models and often yields queueing behavior such as heavy-tailed or subexponential queue length distribution. These findings have led to the implication that long-range-dependent tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An error control scheme for large-scale multicast applications

    Publication Year: 1998, Page(s):1188 - 1196 vol.3
    Cited by:  Papers (58)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (976 KB)

    Retransmission based error control for large scale multicast applications is difficult because of implosion and exposure. Existing schemes (SRM, RMTP, TMTP LBRRM) have good solutions to implosion, but only approximate solutions to exposure. We present a scheme that achieves finer grain fault recovery by exploiting new forwarding services that allow us to create a dynamic hierarchy of receivers. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable delivery of Web pages using cyclic best-effort multicast

    Publication Year: 1998, Page(s):1214 - 1221 vol.3
    Cited by:  Papers (21)  |  Patents (40)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    The World Wide Web (WWW) has gained tremendously in popularity. In this work we explore the use of UDP, best-effort multicast as a delivery option. Reliability is achieved through repetitive, cyclic transmission of a requested page. This solution is expected to be most efficient when used for highly requested pages. We view this cyclic multicast technique as a delivery option that can be integrate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact analysis of packet-level scheduling on an ATM shared-memory switch

    Publication Year: 1998, Page(s):947 - 954 vol.3
    Cited by:  Papers (2)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB)

    This paper evaluates the additional buffer requirements of an ATM shared-memory switch using packet-level (store-and-forward) rather than cell-level (cut-through) service scheduling. Packet-level scheduling is important to tag and IP switching for multipoint-to-one services; it allows different connections to be merged into a single virtual connection to reduce routing complexity. Cisco Systems wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On wireless spectrum estimation and generalized graph coloring

    Publication Year: 1998, Page(s):1273 - 1283 vol.3
    Cited by:  Papers (11)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1184 KB)

    We address the problem of estimating the spectrum required in a wireless network for a given demand and interference pattern. This problem can be abstracted as a generalization of the graph coloring problem, which typically presents additional degree of hardness compared to the standard coloring problem. It is worthwhile to note that the question of estimating the spectrum requirement differs mark... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient multicast routing algorithm for delay-sensitive applications with dynamic membership

    Publication Year: 1998, Page(s):1433 - 1440 vol.3
    Cited by:  Papers (10)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB)

    We propose an algorithm for finding a multicast tree in packet-switched networks. The objective is to minimize total cost incurred at the multicast path. The routing model is based on the minimum cost Steiner tree problem. The Steiner problem is extended to incorporate two additional requirements. First, the delay experienced along the path from the source to each destination is bounded. Second, t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sizing exit buffers in ATM networks under CBR traffic

    Publication Year: 1998, Page(s):1309 - 1316 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    This paper deals with the sizing of end buffers in ATM networks for sessions subject to constant bit rate (CBR) traffic. Our objective is to predict the cell loss rate at the end buffer as a function of the system parameters. We introduce the D+G/D/1 queue as a generic model to represent exit buffers in telecommunications networks under constant rate traffic and use it to model the end buffer. Thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimum-delay self-clocked fair queueing algorithm for packet-switched networks

    Publication Year: 1998, Page(s):1112 - 1121 vol.3
    Cited by:  Papers (11)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1136 KB)

    The minimum-delay self-clocked fair queueing (MD-SCFQ) algorithm that we present in this paper is the first algorithm that achieves the same delay bounds as the packet by packet version of generalized processor sharing (P-GPS), has fairness properties similar to P-GPS, and uses a system-potential function of 0(1) complexity. To prove that MD-SCFQ achieves the same delay bounds of P-GPS, we have sh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An end-to-end reliable multicast protocol using polling for scaleability

    Publication Year: 1998, Page(s):1180 - 1187 vol.3
    Cited by:  Papers (7)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (948 KB)

    Reliable sender-based one-to-many protocols do not scale well due mainly to implosion caused by the excessive rate of feedback packets arriving from receivers. We show that this problem can be circumvented by making the sender poll the receivers at carefully planned timing instants, so that the arrival rate of feedback packets is not large enough to cause implosion. We describe a generic end-to-en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MSOCKS: an architecture for transport layer mobility

    Publication Year: 1998, Page(s):1037 - 1045 vol.3
    Cited by:  Papers (92)  |  Patents (151)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (992 KB)

    Mobile nodes of the future will be equiped with multiple network interfaces to take advantage of overlay networks, yet no current mobility systems provide full support for the simultaneous use of multiple interfaces. The need for such support arises when multiple connectivity options are available with different cost, coverage, latency and bandwidth characteristics, and applications want their dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IP lookups using multiway and multicolumn search

    Publication Year: 1998, Page(s):1248 - 1256 vol.3
    Cited by:  Papers (94)  |  Patents (48)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (916 KB)

    IP address lookup is becoming critical because of increasing routing table size, speed, and traffic in the Internet. Our paper shows how binary search can be adapted for best matching prefix using two entries per prefix and by doing precomputation. Next we show how to improve the performance of any best matching prefix scheme using an initial array indexed by the first X bits of the address. We th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing overhead in flow-switched networks: an empirical study of Web traffic

    Publication Year: 1998, Page(s):1205 - 1213 vol.3
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1008 KB)

    To efficiently transfer large amounts of diverse traffic over high-speed links, modern integrated networks require more efficient packet-switching techniques that can capitalize on advances in switch hardware. Several promising approaches attempt to improve performance by creating dedicated “shortcut” connections for long-lived traffic flows, at the expense of the network overhead for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal multicast feedback

    Publication Year: 1998, Page(s):964 - 971 vol.3
    Cited by:  Papers (35)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    We investigate the scalability of feedback in multicast communication and propose a new method of probabilistic feedback based on exponentially distributed timers. By analysis and simulation for up to 106 receivers we show that feedback implosion is avoided while feedback latency is low. The mechanism is robust against the loss of feedback messages and robust against homogeneous and het... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal bandwidth/delay tradeoff for feasible-region-based scalable multimedia scheduling

    Publication Year: 1998, Page(s):1131 - 1138 vol.3
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB)

    The feasible-region is a simple and optimal framework for scheduling the transmission of data with deadlines. We establish the fundamental relationship between the bandwidth requirement and the initial delay in feasible-region-based transmission scheduling. The relationship represents the optimal bandwidth/delay tradeoff. In the process, we identify the essential bandwidth, the exact bandwidth low... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A delay and loss versatile scheduling discipline in ATM switches

    Publication Year: 1998, Page(s):939 - 946 vol.3
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB)

    We propose a versatile scheduling discipline, called precedence with partial push-out (PPP), in asynchronous transfer mode (ATM) switches supporting two delay and two loss priorities. By employing a threshold L, PPP provides delay guarantee by allowing a newly-arriving high-delay-priority cell to precede a maximum of L low-delay-priority cells. Through the use of another threshold R, the disciplin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Demand-based radio network planning of cellular mobile communication systems

    Publication Year: 1998, Page(s):1054 - 1061 vol.3
    Cited by:  Papers (69)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (964 KB)

    This paper presents a demand-based engineering method for designing radio networks of cellular mobile communication systems. The proposed procedure is based on a forward-engineering method, the integrated approach to cellular network planning and is facilitated by the application of a new discrete population model for the traffic description, the demand node concept. The use of the concept enables... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A CSMA/CD compatible MAC for real-time transmissions based on varying collision intervals

    Publication Year: 1998, Page(s):1265 - 1272 vol.3
    Cited by:  Papers (1)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    This paper suggests a CSMA/CD compatible MAC protocol for real-time transmissions in a home or small office local area network. It has the key advantage of allowing devices implementing the existing Ethernet protocol such as PCs, printers and ISDN routers to operate with devices implementing the new MAC. The new MAC enables real-time traffic such as digital video and audio to be transmitted with l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal packing of group multicastings

    Publication Year: 1998, Page(s):980 - 987 vol.3
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    This paper presents algorithms, heuristics and lower bounds addressing optimization issues in many-to-many multicasting. Two main problems are addressed: (1) a precise combinatorial comparison of optimal multicast trees with optimal multicast rings, (2) an optimized sharing of network resources (i.e., nodes and links) among multiple multicast groups that coexist. The former is central to the choic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive multicast of multi-layered video: rate-based and credit-based approaches

    Publication Year: 1998, Page(s):1073 - 1083 vol.3
    Cited by:  Papers (13)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1360 KB)

    Network architectures that can efficiently transport high quality, multicast video are rapidly becoming a basic requirement of emerging multimedia applications. The main problem complicating multicast video transport is variation in network bandwidth constraints. An attractive solution to this problem is to use an adaptive, multi-layered video encoding mechanism. We consider two such mechanisms fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VTDM-a dynamic multicast routing algorithm

    Publication Year: 1998, Page(s):1426 - 1432 vol.3
    Cited by:  Papers (13)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    In this paper, the dynamic multicast routing problem is studied. The multicast routing problem has been shown to be NP-complete. Many heuristics have been proposed to find the multicast trees for multicast connections. In computer networks, application services may allow nodes to join or leave the multicast connection dynamically. The multicast routing problem in which nodes are allowed to join or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of ERICA and QFC for transporting bursty TCP sources with bursty interfering traffic

    Publication Year: 1998, Page(s):1341 - 1349 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB)

    In ATM networks, the available bit rate (ABR) service enables data sources to efficiently utilize network resources without adversely affecting the performance of non-ABR, guaranteed traffic such as video. Most research to date on ABR performance has not used realistic assumptions. Unrealistic assumptions such as persistent data sources, an absence of non-ABR traffic, and inaccurate TCP models may... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.