Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256)

13-16 Oct. 1998

Filter Results

Displaying Results 1 - 25 of 38
  • Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (231 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 1998, Page(s): 349
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • Evaluating the overheads of source-directed quality-of-service routing

    Publication Year: 1998, Page(s):42 - 51
    Cited by:  Papers (20)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    Quality-of-service (QoS) routing satisfies application performance requirements and optimizes network resource usage but effective path-selection schemes require the distribution of link-state information, which can impose a significant burden on the bandwidth and processing resources in the network. We investigate the fundamental trade-off between network overheads and the quality of routing deci... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Receiver-based multicast scoping: a new cost-conscious join/leave paradigm

    Publication Year: 1998, Page(s):254 - 261
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB)

    In Internet multicast, the set of receivers can be dynamic with receivers joining and leaving a group asynchronously and without the knowledge of the source(s). The Internet today uses source-based scoping by which the source determines how far its multicast transmissions will propagate. This mechanism, however, does not allow a receiver to bound the number of hops added to a multicast routing tre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A class of end-to-end congestion control algorithms for the Internet

    Publication Year: 1998, Page(s):137 - 150
    Cited by:  Papers (56)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB)

    We formulate end-to-end congestion control as a global optimization problem. Based on this formulation, a class of minimum cost flow control (MCFC) algorithms for adjusting session rates or window sizes is proposed. Significantly, we show that these algorithms can be implemented at the transport layer of an IP network and can provide certain fairness properties and user priority options without re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive packet marking for providing differentiated services in the Internet

    Publication Year: 1998, Page(s):108 - 117
    Cited by:  Papers (19)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB)

    This paper examines the use of adaptable priority marking for providing soft bandwidth guarantees to individual connections or connection groups over the Internet. In contrast to other proposals for service differentiation which focus on providing firm performance guarantees, the proposed scheme does not require resource reservation for individual connections and can be supported with minimal chan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reasoning about active network protocols

    Publication Year: 1998, Page(s):31 - 40
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    Active networks allow users to “program” the network infrastructure, by injecting information that describes or controls a distributed algorithm to be executed for the user by the network infrastructure. The nature of the services that can be implemented with such a facility is determined by the programming interface to the active network, i.e. the set of abstractions it exposes to use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying MSTDM to packet voice and data in cellular radio systems

    Publication Year: 1998, Page(s):309 - 318
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    Movable slot TDM (MSTDM) is a variant of the Ethernet protocol that provides quality of service guarantees for voice. The protocol has been applied to LANs and CATV networks. However cellular networks are different. (1) Each cell has a base station: when mobile units communicate through the base station, frequency reuse increases and collisions are detected. (2) The objective is to connect mobile ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicasting at the host interface level in wormhole networks

    Publication Year: 1998, Page(s):246 - 253
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    We address the problem of providing transparent, reliable, and efficient network-level multicasting in wormhole LANs. We describe some alternatives for achieving deadlock-free multicasting using fast buffer reservation techniques at the host interface level. Tradeoffs involving complexity and performance of various solutions are discussed, and are illustrated using simulation results. Our results ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A state management protocol for IntServ, DiffServ and label switching

    Publication Year: 1998, Page(s):272 - 281
    Cited by:  Papers (3)  |  Patents (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    Providing quality of service (QoS) in an efficient and scalable manner in the Internet is a topic of active research. The technologies that have drawn the most attention are integrated services (IntServ), differential services (DiffServ) and label switching (MPLS). While these technologies are orthogonal in many respects and can coexist, they are all similar with respect to the fact that some or a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flow theory: an enhancement

    Publication Year: 1998, Page(s):129 - 136
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    Flow theory is a rich, effective theory introduced in order to study real-time network protocols. It is based on discrete mathematics in which a flow of data is represented by an infinite sequence of numbers and is characterized by its upper bounds. Unfortunately up to now flow theory has used a traffic characterization that in some cases can be too loose, thus causing an inefficient network utili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving wireless LAN performance via adaptive local error control

    Publication Year: 1998, Page(s):327 - 338
    Cited by:  Papers (35)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    Wireless links can exhibit high error rates due to attenuation, fading, or interfering active radiation sources. To make matters worse, error rates can be highly variable due to changes in the wireless environment. Researchers and developers have explored a wide range of solutions to optimize communication in this difficult error environment, including traditional end-to-end solutions, link-layer ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed protocol for multi-class QoS provision in noncooperative many-switch systems

    Publication Year: 1998, Page(s):98 - 107
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    This paper presents an architecture for multi-class quality of service (QoS) provision in wide area networks. Users or applications are assumed to be selfish and end-to-end QoS is determined by the service levels received by an application traffic flow at each router or switch along a path. In previous work, we have given a comprehensive analysis of the noncooperative multi-class QoS provision gam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A definition of general weighted fairness and its support in explicit rate switch algorithms

    Publication Year: 1998, Page(s):22 - 30
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    We give a general definition of weighted fairness and discuss how a pricing policy can be mapped to general weighted (GW) fairness. The GW fairness can be achieved by calculating the excess fairshare (weighted fairshare of the left over bandwidth) for each VC. We show how a switch algorithm can be modified to support the GW fairness by using the excess fairshare term. We use ERICA+ as an example s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Congestion control performance of a reliable multicast protocol

    Publication Year: 1998, Page(s):168 - 176
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    This paper evaluates the congestion control performance of Pseudofed, a congestion-controlled, reliable multicast transport protocol for bulk data transfer. Pseudofed's congestion control mechanism is based on the concept of representatives, a small, dynamic set of multicast group members. By reducing the congestion control problem to a bounded set of receivers, representatives allow the point-to-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signaling for Internet telephony

    Publication Year: 1998, Page(s):298 - 307
    Cited by:  Papers (18)  |  Patents (80)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB)

    Internet telephony must offer the standard telephony services. However the transition to Internet-based telephony services also provides an opportunity to create new services more rapidly and with lower complexity than in the existing public switched telephone network (PSTN). The Session Initiation Protocol (SIP) is a signaling protocol that creates, modifies and terminates associations between In... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OTERS (on-tree efficient recovery using subcasting): a reliable multicast protocol

    Publication Year: 1998, Page(s):237 - 245
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    This paper presents a reliable multicast protocol (OTERS) that organizes receivers into a fusion tree that matches the multicast delivery tree of the source and uses this tree to fuse NAKs and subcast retransmissions. The protocol requires two extensions to the current Internet network layer, namely multicast route backtracing and subcasting. We argue that these extension are simple, natural and l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On reducing the processing cost of on-demand QoS path computation

    Publication Year: 1998, Page(s):80 - 89
    Cited by:  Papers (12)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    Quality of service (QoS) routing algorithms have become the focus of research due to their potential for increasing the utilization of an integrated services packet network (ISPN) serving requests with QoS requirements. While heuristics for determining paths for such requests have been formulated for a variety of QoS models, little attention has been given to the overall processing complexity of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Composition of service specifications

    Publication Year: 1998, Page(s):210 - 218
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    The service specification ss(P) of a protocol P defines the services provided by the protocol and its protocol specification ps(P) specifies the rules of message exchange to ensure the service. Protocol composition has been advocated as an attractive way to design complex protocols. Several techniques have been studied for composition of protocol specifications. In these techniques, to combine com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linear complexity algorithms for bandwidth reservations and delay guarantees in input-queued switches with no speedup

    Publication Year: 1998, Page(s):2 - 11
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB)

    We present several fast, practical linear-complexity scheduling algorithms that enable provision of various quality-of-service (QoS) guarantees in an input-queued switch with no speedup. Specifically, our algorithms provide per-virtual-circuit transmission rate and cell delay guarantees using a credit-based bandwidth reservation scheme. The novelties of our algorithms derive from judicious choices... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable link-state Internet routing

    Publication Year: 1998, Page(s):52 - 61
    Cited by:  Papers (20)  |  Patents (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    We present and verify the adaptive link-state protocol (ALP), a new link-state routing protocol that does not require the state of each link to be flooded to the entire internetwork, or to entire areas if hierarchical routing is used. A router in ALP disseminates link-state updates incrementally to its neighbors for only those links along paths used to reach destinations. Link-state updates are va... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-demand multicast in mobile wireless networks

    Publication Year: 1998, Page(s):262 - 270
    Cited by:  Papers (34)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    We propose an “on-demand” multicast routing protocol for a wireless, mobile, multihop network. The proposed scheme has two key features: (a) it is based on the forwarding group concept (i.e., a subset of nodes is in charge of forwarding the multicast packets via scoped flooding) rather than on the conventional multicast tree scheme (b) it dynamically refreshes the forward group members... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A lossless, minimal latency protocol for gigabit ATM networks

    Publication Year: 1998, Page(s):151 - 158
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    Advances in fiber-optic and VLSI technology have led to the emergence of very high-speed networks based on asynchronous transfer mode (ATM). The time required to transmit the data into the network at the source is small compared to the delay to propagate the data from source to destination. Cell loss is also a major concern in ATM networks because waiting for the retransmission of lost cells delay... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed network flow control based on dynamic competitive markets

    Publication Year: 1998, Page(s):119 - 128
    Cited by:  Papers (7)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    Network applications require a certain level of network performance for their proper operation. These individual guarantees can be provided if sufficient amounts of network resources are available; however, contention for the limited network resources may occur. For this reason, networks use flow control to manage network resources fairly and efficiently. This paper presents a distributed microeco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of voice/data integration for two MAC protocols in DS-CDMA wireless networks

    Publication Year: 1998, Page(s):319 - 326
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    Code division multiple access (CDMA) has become an attractive technique for media access control in personal communication networks (PCN). Two MAC protocols, namely preamble signaling access (PSA) and minislot signaling access (MSA) are defined and evaluated for voice/data integration at the base station. It assumes that there are two types of mobile hosts, voice mobiles and data mobiles. The base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.