Scheduled Maintenance on May 24th, 2018:
IEEE Xplore will undergo system maintenance from 1:30 PM - 3:00 PM ET. During this time there may be intermittent impact on performance. We apologize for any inconvenience.

Networks, 1999. (ICON '99) Proceedings. IEEE International Conference on

28 Sept.-1 Oct. 1999

Filter Results

Displaying Results 1 - 25 of 53
  • Provision of data (IP) services in third generation mobile networks

    Publication Year: 1999, Page(s):165 - 171
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    Third-generation mobile networks will enable services which are regularly available through fixed networks (WWW, Internet) to be offered into the mobile domain. The impact IP data services may have on the base station is, at this time, unclear. Coupled with this is a particularly poor performance characteristic achieved with TCP over (lossy) wireless links. Starting with results from IMT-2000 prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An intelligent buffer management approach for GFR services in IP/ATM internetworks

    Publication Year: 1999, Page(s):156 - 162
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB)

    In ATM networks, the guaranteed frame rate (GFR) service has been designed to accommodate non-real-time applications, such as TCP/IP-based traffic. The GFR service not only guarantees a minimum throughput at the frame level, but also supports a fair share of available resources. In this article, we propose a buffering strategy called intelligent fair buffer allocation (IFBA) that provides MCR (min... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic buffer allocation scheme for nrt-traffics in ATM switches

    Publication Year: 1999, Page(s):151 - 155
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    In this paper we propose a dynamic buffer allocation scheme for nrt-traffic in ATM switches that accommodates various service classes using a common buffer. This scheme dynamically controls thresholds of the buffer not to drop cells for loss-specified services and fairly allocates the buffer space among best-effort services. When the buffer occupancy exceeds a certain threshold level, it begins th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience with ATM switch performance testing

    Publication Year: 1999, Page(s):143 - 150
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    For users to be able to compare performance of different switches, it is important to have a common set of metrics. Examples of several such metrics and their measurements are presented in this paper. These measurements and metrics have impacted standardization efforts in this area. The key distinguishing feature of our effort is its emphasis on frame-level metrics (rather than cell-level metrics ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low-delay heuristic algorithms for wavelength assignments in WDM networks

    Publication Year: 1999, Page(s):3 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    In order to decrease the overall wavelength number required in a wavelength division multiplexed (WDM) network, new heuristic algorithms for wavelength assignment are proposed in this paper. We also define a new parameter called one-wavelength-decrease cost, which may be used to evaluate the efficiency of these algorithms. Comparative simulation studies have been carried out to investigate the eff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classification and comparison of schemes for providing scalable IP services over ATM networks

    Publication Year: 1999, Page(s):195 - 202
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    There are several approaches for the provision of scalable backbone IP over cell-based networks including multi-protocol label switching (MPLS) and multi-protocol over ATM (MPOA). This paper provides a classification that highlights the major differences between the various approaches. We classify approaches according to cut-through flow classification, path determination and forwarding granularit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia conferencing: designed with H32X capabilities

    Publication Year: 1999, Page(s):367 - 371
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    Multimedia conferencing technology is becoming increasingly important, as it enables people who are located in different cities (or countries) to share as well as interact with their data, comments, images, and video pictures. This paper introduces the multimedia conferencing standards, such as ITU-T T.120, T.130, H.320, H.323, and H.324, which comprise the core technologies for multimedia confere... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network calculus and service curve scheduling in heterogeneous networks

    Publication Year: 1999, Page(s):250 - 254
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    We describe a generalised framework for analysing the delay and backlog bounds in lossless packet networks using the techniques of network calculus. We outline network calculus in terms of matrix operators acting on functions, and couple these operations with the concept of service-curve scheduling. We describe how this combined framework is used to determine delay bounds imposed on packets as the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A programmable multicast service in ATM

    Publication Year: 1999, Page(s):135 - 142
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    This paper presents a design and implementation of a ATM multicast service based on programmable and active network concepts. It aims to address the design and implementation issues of creating new network services, multicast in this case, through a set of Corba-based network interfaces, and with a Java-based user code injection mechanism for supporting customization of network services. We demons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal base station placement and fixed channel assignment applied to wireless local area network projects

    Publication Year: 1999, Page(s):186 - 192
    Cited by:  Papers (16)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    The project of a wireless local area network (WLAN) has two major issues: determining the best placement of the base stations (BS) and assigning the frequency channels for the stations. The correct BS placement minimizes the number of stations necessary to cover the desired attendance area, reducing installation costs. The channel assignment determines the frequency band to be used by each BS, min... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic multicast trees

    Publication Year: 1999, Page(s):29 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    We present a family of protocols to build a multicast tree in a network of processes. No processing or storage overhead is required for processes not included in the tree. The overhead of processes in the tree consists solely of the periodic exchange of a pair of messages with their parent in the tree. To choose the processes that constitute the tree, we take advantage of the existing multicast ro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security management against cloned cellular telephones

    Publication Year: 1999, Page(s):356 - 363
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    The present work describes a security management system against the frauds related with the cloning of cellular telephones. The system intends to make this fraud a nonlucrative business, and then, to finish it. The system uses three main techniques: (1) the ISO 8807 technique (FDT LOTOS) is used to specify and validate the system through Eucalyptus software employment; (2) a pattern recognition te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation and experimentation of IP rate control

    Publication Year: 1999, Page(s):242 - 249
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    This paper reports implementation and experimentation of a new IP rate control protocol proposed to alleviate congestion in the gateway of a LAN connected to external networks. Congestion is avoided by using explicit rate notification to LAN hosts via new ICMP control messages. In addition to avoiding congestion, the protocol also allows for greater fairness and priority in network traffic, while ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data spread: a novel authentication and security technique

    Publication Year: 1999, Page(s):335 - 339
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    This paper describes an authentication and security protocol called data spread for use on the Internet. The protocol applies address space diversity to outgoing messages, and when combined with reasonable (but not necessarily strong) encryption techniques, offers fast, secure and authentic-able information exchange between communicating entities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Random early marking: an optimisation approach to Internet congestion control

    Publication Year: 1999, Page(s):67 - 74
    Cited by:  Papers (9)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    In this paper we present an optimisation approach to congestion flow control. The initial context of this approach was as a rate-based flow control in ATM networks. We describe techniques that enable us to implement this flow control in an explicit congestion notification-capable TCP/IP network. These techniques require only minimal changes to existing TCP host behaviour and RED active queue manag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling alarm correlation for a mobile agent based system and network management - a wrapper concept

    Publication Year: 1999, Page(s):125 - 132
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    Solutions for system and network management given today are afflicted with two main shortcomings, namely the centralised approach they are based on and the inadequate addressing of heterogeneous environments. While the latter is the main concern of, for example, Web-based management activities, the aspect of centralisation is not being covered to full extend. With regard to the explosive growth of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive admission control and scheduling for wireless packet communication

    Publication Year: 1999, Page(s):178 - 185
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    This paper describes a new admission control and scheduling scheme that enables adaptive control of resource usage. The new scheme has been designed for wireless networks that put high demands on resource reservation due to their inherent lack of sufficient bandwidth, high error probability and frequent resource overload due to the users' mobility. The scheme deploys bandwidth adaptation on the ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multicast synchronization protocol for real time distributed systems

    Publication Year: 1999, Page(s):21 - 28
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    High-speed networks can support real-time multimedia applications. However, the nature of the asynchronous transmission, and the absence of a physical global clock can disrupt the temporal relationships among media units. Δ-causal ordering is a communication abstraction designed to maintain these temporal relationships within some tolerable bound. The Δ value represents the limited lif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical real-time approaches for scheduling VBR video in a client-server computing environment

    Publication Year: 1999, Page(s):383 - 390
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    Scheduling of multiple variable-bit-rate (VBR) video packet streams at the server is one of the most crucial issues in the design of a enterprise video-on-demand (VoD) system. Scheduling is important to guarantee the requested QoS levels while maximizing the utilization of the resources. But the scheduling problem is difficult due to the inherent varying resource requirements of the video streams.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Broadcast anti-jamming systems

    Publication Year: 1999, Page(s):349 - 355
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB)

    In a traditional anti-jamming system a transmitter who wants to send a signal to a single sender spreads the signal power over a wide frequency spectrum with the aim of stopping a jammer from blocking the transmission. In this paper we consider the case that there are multiple receivers and the sender wants to broadcast a message to all receivers such that colluding groups of receivers cannot jam ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-adaptive TDMA protocols: a learning-automata-based approach

    Publication Year: 1999, Page(s):85 - 90
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    Due to its fixed assignment nature, the well-known TDMA protocol suffers from poor performance when the offered traffic is bursty. In this paper a learning-automata-based time division multiple access protocol, which is capable of operating efficiently under bursty traffic conditions, is introduced. According to the proposed protocol, the station which grants permission to transmit at each time sl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fair queueing algorithm for multiple-streams delay-bounded services

    Publication Year: 1999, Page(s):234 - 241
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (912 KB)

    In this paper, we propose a resource reservation and scheduling algorithm which guarantees the end-to-end delay constraints for the processing of single-source multiple-stream delivery. User applications initiate the requests by specifying the tolerable delay and priorities reflecting the preference for each stream. In order to provide efficient flow scheduling subject to the fairness and delay co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A selective packet discard scheme for supporting Internet QoS in congested ATM switches

    Publication Year: 1999, Page(s):219 - 224
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    Previous papers have described and evaluated the performance of packet discard techniques for maintaining packet integrity during overload in ATM switches but without taking into account different classes of service. In this paper a packet discard scheme is proposed with the goal to provide incoming flows of cells with output link bandwidth depending on the class of service they belong to. Also go... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User plane architecture of 3rd generation mobile telecommunication network

    Publication Year: 1999, Page(s):270 - 278
    Cited by:  Patents (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    This paper presents modifications that are proposed to the 3rd-generation packet data network in 3GPP (3rd Generation Partnership Project). The scope of the paper is the user plane of the packet data network. The UMTS (Universal Mobile Telecommunications System) network architecture is based on the GPRS (General Packet Radio Service). In this paper, the proposed UMTS packet data network is present... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RSVP for LEO satellites

    Publication Year: 1999, Page(s):295 - 302
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    The Internet Engineering Task Force (IETF) is working on extending the traditional TCP/IP model for supporting multimedia and real-time applications on the Internet. Thus, new protocols have been developed such as the resource reservation protocol (RSVP). At the same time, there has been a growing interest in using low Earth orbit (LEO) satellites. In the near future, when the Internet with multim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.