Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370)

11-13 Oct. 1999

Filter Results

Displaying Results 1 - 25 of 103
  • Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370)

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (444 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1999, Page(s):663 - 664
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • SLM, a framework for session layer mobility management

    Publication Year: 1999, Page(s):452 - 456
    Cited by:  Papers (16)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    This paper describes a novel framework for managing connections to mobile hosts in the Internet. The framework, SLM, integrates the notions of quality of service management and mobility management and forms a base for overall session management. We compare SLM with the currently most widely adopted mobility management framework, Mobile IP, and show how some of Mobile IP's deficiencies are overcome... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS of mobile videophones in HSCSD networks

    Publication Year: 1999, Page(s):447 - 451
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    This paper is a contribution to studying the feasibility of multimedia applications over GSM HSCSD networks. We report simulation results of a mobile videophone application at bit rates ranging from 14.4 to 57.6 kbit/s. We focus on QoS of video data in both mobile-to-land and mobile-to-mobile H.324 connections. The results obtained in terms of visual quality, received PSNR, delay, and frame rate a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple low-bandwidth broadcasting protocol for video-on-demand

    Publication Year: 1999, Page(s):118 - 123
    Cited by:  Papers (50)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    Broadcasting protocols can reduce the cost of video-on-demand services by using much less bandwidth to transmit videos that are simultaneously watched by many viewers. Unfortunately, the most efficient broadcasting protocols are also the most difficult to implement because they allocate a multitude of very low bandwidth streams to each video. We present a protocol that uses between three and seven... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal placement of wavelength converters in trees and trees of rings

    Publication Year: 1999, Page(s):392 - 397
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    In wavelength-routed optical networks, wavelength converters can potentially reduce the requirement on the number of wavelengths. The problem of placing a minimum number of wavelength converters in a WDM network so that any routing can be satisfied using no more wavelengths than if there were wavelength converters at every node was raised in Wilfong et al. (1998) and shown to be NP-complete in gen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable modular architecture for SDH/SONET technology

    Publication Year: 1999, Page(s):442 - 446
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    A scalable architecture for integrated SDH/SONET framers is presented. It exploits the fact that not only those framer functions that are obviously suited for parallel processing but all SDH/SONET overhead processing and most of the payload processing functions can be implemented as distributed algorithms. Thereby an M×STM-N framer also handles STM-M×N and STM-(M×N)c frames. Thes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical video-on-demand servers for TV-anytime services

    Publication Year: 1999, Page(s):110 - 117
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    This paper presents algorithms and principles for the implementation of a novel broadband multimedia service called “TV-anytime”. The basic idea of this service is to store broadcast media assets on media server systems and allow people to access this information at any time. Using a given user profile the recording of media assets can be personalized allowing the implementation of &ld... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verification of classical certificates via nested certificates and nested certificate paths

    Publication Year: 1999, Page(s):242 - 247
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    Nested certificates are used to certify their subject certificates. In this way, the subject certificates can be verified via their nested certificates without using signature verification methods based on public key cryptosystems. Such a verification method is called subject certificate verification. In this paper, a subject certificate verification method will be introduced. It will be shown tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and evaluation of router-supported and end-to-end multicast receiver-based scoping protocols

    Publication Year: 1999, Page(s):384 - 389
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB)

    IP multicasting allows a source to define a multicast group address and receivers can dynamically join and leave this group. Currently the propagation of multicast packets is controlled by two scoping methods: TTL scoping and administrative scoping. Both of these approaches require the source to control the scope of the multicast. Receiver-based scoping allows a receiver to place conditions on its... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and implementation of open video conferencing software platforms using distributed object services

    Publication Year: 1999, Page(s):438 - 441
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    This paper summarizes experiments with a videoconferencing service platform, based on the use of distributed object services. These experiments were performed and used in a Eurescom project, which aimed at validating the use of distributed object-oriented platforms and systems as a new basis for the provision of telecommunication services. In this new approach, telecommunication networks are model... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two location tracking strategies for PCS systems

    Publication Year: 1999, Page(s):318 - 323
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    This paper presents two location tracking strategies (LS-I and LS-II) for personal communications services (PCS) systems. In the proposed schemes, the movement history of a mobile terminal (MT) since the last location update is taken into account in making a location update decision. In particular, before reaching the update threshold the movement counter is increased only after the MT visits a ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On fundamental issues in IP over WDM multicast

    Publication Year: 1999, Page(s):84 - 90
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    As WDM technology matures, IP over WDM multicast will become a challenging new topic. Supporting multicast at the WDM layer provides additional advantages, but also raises many new issues that do not exist in IP multicast. For example, the limitation on the light splitting capability of switches is one major difficulty in WDM multicast, and in addition, the limitations on both the wavelength conve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Medium access in wireless ATM systems for industrial applications: requirements and solutions

    Publication Year: 1999, Page(s):18 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    The paper highlights problems of medium access that arise when using WATM in an industrial environment. In particular, short frames and a very efficient and fast random access protocol for the signaling channel are necessary due to the stringent constraints of industrial applications. The proposed access and backoff scheme for the random access ensures the provision of very time constrained servic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A low-cost/high-performance server for video on demand

    Publication Year: 1999, Page(s):180 - 185
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    In this paper a prototype of a distributed video-on-demand server is presented. The technical aspects regarding the realization of this kind of service provider are dealt with, paying particular attention to exploiting the architecture the system is based on. The proposed system easily allows, in any broadband local network environment, the realization of a low-cost/high-performance distributed vi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal scheduling of secondary content for aggregation in video-on-demand systems

    Publication Year: 1999, Page(s):104 - 109
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    We present and evaluate an optimal scheduling algorithm for inserting secondary content for improving resource utilization in VoD systems. The algorithm runs in polynomial time, and is optimal with respect to the total bandwidth usage over the merging interval. We present constraints on content insertion which make the overall QoS of the delivered stream acceptable, and show how our algorithm can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing algorithms for all-optical networks with power considerations: the unicast case

    Publication Year: 1999, Page(s):237 - 241
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    In this paper, we investigate the problem of routing connections in ail-optical networks while allowing for degradation of routed signals by different optical components. To overcome the complexity of the problem, we divide it into two parts. First, we solve the pure RWA problem using fixed routes for every connection. Second, power assignment is accomplished by either using the smallest-gain firs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A clustering structure for reliable multicasting

    Publication Year: 1999, Page(s):378 - 383
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    In reliable multicast, the multicast packets must be acknowledged. We propose a clustering structure which can be used by most of the existing reliable multicast protocols for collecting acknowledgements and for making local retransmissions. Given a network N and a multicast routing tree (or a set of trees) T, we consider a subgraph G of N induced by the members of a multicast group. We then form ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic QoS allocation for multimedia ad hoc wireless networks

    Publication Year: 1999, Page(s):480 - 485
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    In this paper, we propose an approach to support QoS and multimedia applications in ad hoc wireless networks. An ad hoc network is a collection of mobile stations forming a temporary network without the aid of any centralized coordinator and is different from cellular networks which require fixed base stations interconnected by a wired backbone. It is useful for some special situations, such as ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalability and QoS guarantee in IP networks

    Publication Year: 1999, Page(s):427 - 433
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    This paper presents our insights to the issue of achieving scalability and providing QoS guarantee in IP networks. The key idea is to use marking at the edge and aggregation in the core of a network. We propose a traffic classification scheme to facilitate marking and aggregation, a queueing architecture to implement marking in the access routers and aggregation in the core routers, and a scheduli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tuning of audio, video and data applications over ATM

    Publication Year: 1999, Page(s):223 - 226
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    This paper is focused on performance optimization and parameter tuning of native ATM applications, i.e., audio and video file transfer as well as data transmission on top of ATM CBR service in the Winsock2 environment. Practical experiments are aimed at studying QoS parameters of different application classes dependent on ATM CBR peak rate and application traffic characteristics. The focus is to s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal two-tier cellular network design

    Publication Year: 1999, Page(s):312 - 317
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    One way of improving the performance of cellular networks is to build a second layer of macrocells on top of the microcell level. The system performance can further be increased by using guard channels and allowing calls to overflow to the upper layer when needed. In this study, we used simulated annealing (SA) to determine the design parameters of two-tier cellular networks for which the cost is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Isolation of wireless ad hoc medium access mechanisms under TCP

    Publication Year: 1999, Page(s):77 - 82
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB)

    Mobile computing will be much used in the future, as is evident by such initiatives as Bluetooth, Iceberg and HomeRF. However, for mobile computing to be successful, an obvious layer, the MAC layer, must be efficient in channel access and reservation. Therefore, in-depth understanding is needed of the wireless MAC layer if wireless computing is to takeoff. Many random access wireless MAC protocols... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Link-state routing in networks with unidirectional links

    Publication Year: 1999, Page(s):358 - 363
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB)

    It is shown that a unidirectional link of a network can be used for routing only if it has an inclusive cycle, which provides a path to carry routing updates from the downstream node to the upstream node joint by the unidirectional link. A new routing algorithm for networks with unidirectional links is then presented, which incrementally disseminates link-state information and selectively utilizes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bandwidth-efficient multicast routing protocol for ad-hoc networks

    Publication Year: 1999, Page(s):10 - 17
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB)

    In this paper, we propose and investigate a bandwidth-efficient multicast routing protocol for ad-hoc networks. The proposed protocol achieves low communication overhead, namely, it requires a small number of control packet transmissions for route setup and maintenance. The proposed protocol also achieves high multicast efficiency, namely, it can deliver multicast packets to receivers with a small... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.