1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305)

12-12 Feb. 1999

Filter Results

Displaying Results 1 - 25 of 67
  • 1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305)

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (284 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 1999, Page(s):vi - ix
    Request permission for commercial reuse | PDF file iconPDF (259 KB)
    Freely Available from IEEE
  • Accelerating ATM: on-line compression of ATM streams

    Publication Year: 1999, Page(s):233 - 239
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (685 KB)

    Since ATM switches intended to be simple and inexpensive, a significant part of the network cost is in the cost of the links. A way of increasing the traffic we can send over these expensive links is to transmit compressed ATM cells. This idea, although it seems very simple, is a new one for ATM and in this paper we show that it can significantly increase the bandwidth of a typical ATM network. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contrasting branch characteristics and branch predictor performance of C++ and C programs

    Publication Year: 1999, Page(s):275 - 283
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (919 KB)

    In today's superscalar and superpipelined computers, branch instructions are the main culprits that limit the processor from issuing instructions at a peak rate. Although C++, which is an object-oriented programming language, provides great flexibility to help solve complex programming problems, the cost is a penalty in performance when compared to C. This paper compares the intrinsic branch behav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 1999, Page(s): 499
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • A new synchronization algorithm for hitless protection switching in ATM networks

    Publication Year: 1999, Page(s):370 - 376
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    Redundant transmission on disjoint paths is a common precaution against the effects of failures in communication networks. To allow hitless switching from one path to the other, synchronization algorithms are required. Most of the current algorithms are based on supplementary synchronization information (e.g. synchronization cells). A novel algorithm for the synchronization and selection of redund... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error control techniques for wireless ATM networks

    Publication Year: 1999, Page(s):104 - 110
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    Wireless ATM (Asynchronous Transfer Mode) is an emerging technology where cells are transmitted over wireless channels and part(s) of the connection lies in the wireless network. This introduction of ATM in wireless environment creates many interesting challenges including how to deal with wireless links with possible high and variable error rates. The problem arises as ATM was designed for very l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A high-capacity, scalable video-on-demand system architecture, based on a 3-stage Clos network

    Publication Year: 1999, Page(s):363 - 369
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB)

    We present a high performance, scalable architecture for a video on demand (VoD) system, using a three stage Clos switch. Three stage Clos switching networks have been used in the past in multiprocessor interconnection networks as well as for ATM switching fabrics due to their attractive low latency and fault tolerance properties. The proposed VoD system mainly consists of such a three stage Clos ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of a person-based mobility management scheme for PCN

    Publication Year: 1999, Page(s):97 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    The concept of person-based number is attractive due to several pressing demands in implementation of current wireless communication systems. Some of these are: sudden proliferation in number of area codes; the need for freedom from number changes due to changes in service provider, location, or area code; and demand for improved and integrated communication service for users. Some important facto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A channel resource management framework for cellular networks

    Publication Year: 1999, Page(s):476 - 479
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    Cellular networks provide efficient bandwidth management by allowing frequency reuse. In cellular networks, the radio connection between mobile nodes and base stations, termed `channel', can be viewed as a logic link. The focus of this research is on the management of such logical channels. A lot of research has been conducted in the area of channel resource management. Most of them combine interf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards the design of a snoopy coprocessor for dynamic software-fault detection

    Publication Year: 1999, Page(s):310 - 317
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    Dynamic Monitoring with Integrity Constraints (DynaMICs) is a software-fault monitoring approach in which the constraints are maintained separately from the program. Since the constraints are not entwined in the code, the approach facilitates the maintenance of the application and constraint code. Through code analysis during compilation, the points at which constraint checking should occur are de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Equivalent permutation capabilities between time division optical omega network and non-optical extra stage omega network

    Publication Year: 1999, Page(s):356 - 362
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    Since optical networks must support crosstalk-free (CF) connections, regular N×N multistage interconnection networks (MINs) cannot be directly used to provide connections between N inputs and N outputs. A solution is to use a 2N×2N Cube-Type MIN to provide the N×N connections. C. Qiao (1993) proposed a time domain approach that divides the N optical inputs into several groups suc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing mobility in a wireless ATM network

    Publication Year: 1999, Page(s):90 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    The growing fields of wireless networks and asynchronous transfer mode (ATM) are merging to form wireless ATM networks. This paper addresses dynamic bandwidth allocation, connection admission procedures, routing, and location management strategies in wireless ATM. More precisely, we investigate the issue of extending the Private Network to Network Interface, PNNI, protocol to support mobility. PNN... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive distributed channel allocation strategy for mobile cellular networks

    Publication Year: 1999, Page(s):36 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB)

    There are two approaches to design a distributed channel allocation algorithm: Search and Update. The update approach has shorter acquisition delay and lower call blocking rate, but higher message complexity. On the other hand, the search approach has lower message complexity, but longer acquisition delay and higher call blocking rate. In this paper, we propose a novel distributed acquisition algo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Centralized packet filtering protocols: a new class of high performance protocols for single-hop lightwave WDM networks

    Publication Year: 1999, Page(s):419 - 425
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    A new protocol for WDM star networks is introduced. According to the proposed Centralized Packet Filtering (CPF) protocol, more than one stations share each wavelength and transmit their packets in a random access fashion. An array of electrooptic tunable filters, which is placed at the network hub, allows at most one packet per wavelength to pass to the star coupler; at each time slot. In this wa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operating firewalls outside the LAN perimeter

    Publication Year: 1999, Page(s):493 - 498
    Cited by:  Papers (2)  |  Patents (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    Firewalls are well known for their task of securing the enterprise intranet from untrusted users attempting to gain access. The concept of firewalls got its start when routers began to be used to balance network load. The effort to balance network traffic load at the transport level was extended to the server operating system where application proxy service and application level filtering is provi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent framework for survivable network systems

    Publication Year: 1999, Page(s):469 - 475
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    Large network systems elevate the levels of efficiency and effectiveness of organisations by improving systems integration. This improved integration of computer networks and information systems is accompanied by increased risks of intrusion and compromise. Survivability of networks and information systems in face of these risks becomes an important aspect in the effective functioning of an organi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing the PCI bus to support real-time streams

    Publication Year: 1999, Page(s):303 - 309
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    In this paper we present an access scheduling scheme for real-time streams (RTS) over the peripheral component interconnect (PCI) bus. We derive a bus model based on the rate monotonic scheduling (RMS) algorithm that guarantees the timing quality of service (QoS) for real-time streams over the PCI bus. The proposed model is valid for constant-bit-rate (CBR) as well as for variable-bit-rate (VBR) s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A split input sunshine switch architecture

    Publication Year: 1999, Page(s):349 - 355
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    We present the split input sunshine switch, a new ATM switch architecture based on the sunshine switch, which utilizes two distinct input fabrics, primary and secondary, within a sunshine switch architecture. The primary input fabric is sized at the desired size, N×N, and the secondary switch is sized at N/z × N/z, where z is a non-zero power of two. The introduction of the secondary i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Validation of Turandot, a fast processor model for microarchitecture exploration

    Publication Year: 1999, Page(s):451 - 457
    Cited by:  Papers (16)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    We describe the results in validating the performance projections from a parameterized trace-driven simulation model of a speculative out-of-order superscalar processor which has been developed with the objective of acting as a microarchitecture exploration tool. Because of its objective, the model-called Turandot-has been designed to deliver much higher simulation speed than what is achieved from... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of intelligent mobile ATM networks

    Publication Year: 1999, Page(s):83 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    An intelligent network (IN) is characterized by the distribution of network intelligence and capabilities wherever required within the telecommunications network. IN is also an architectural concept that can be applied to a variety of telecommunication networks including the public switched networks, mobile networks, and the integrated services digital networks (ISDNs). In this paper, we analyze a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving the consensus problem in a mobile environment

    Publication Year: 1999, Page(s):29 - 35
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB)

    Atomic broadcast or non-blocking atomic commitment are classic agreement problems encountered when designing fault-tolerant distributed systems. Specific protocols that solve such agreement problems can be designed based on a common building block, namely the consensus service. Unfortunately, the consensus problem has no deterministic solution in an asynchronous distributed system that is subject ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method of service quality estimation with a network measurement tool

    Publication Year: 1999, Page(s):201 - 209
    Cited by:  Papers (3)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    Recently, many kinds of real-time applications have become available over IP networks. It is important to measure network performance for such applications before making use of real applications. The authors developed a general purpose traffic measurement tool for IP networks. This system can generate any kind of traffic flexibly and calculate network performance such as throughput, delay and loss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An optical layer protocol for lightpath management in WDM networks

    Publication Year: 1999, Page(s):412 - 418
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    This paper deals with an optical layer protocol designed for next generation lightwave networks, known as all-optical networks (AONs), where path between end-to-end nodes remains entirely optical. These paths are called lightpaths. Unlike OSI-RM, in the AON architecture, a new layer, called optical layer, has been introduced to manage the lightpath-related-functions. The optical layer lies in betw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed dynamic channel allocation in mobile networks: combining search and update

    Publication Year: 1999, Page(s):120 - 126
    Cited by:  Papers (2)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    Distributed dynamic channel allocation techniques are becoming important with the tremendous growth in mobile cellular communication and demand for wireless multimedia applications. These techniques can be categorized as search based or update based. Search based techniques have low messaging complexity and are suited for high system load and low request rates. On the other hand update based schem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.