IEEE Journal on Selected Areas in Communications

Issue 3 • April 1989

Filter Results

Displaying Results 1 - 12 of 12
  • Protocol verification using database technology

    Publication Year: 1989, Page(s):324 - 334
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1154 KB)

    A novel application of databases in communications networks, namely, protocol verification on a parallel database machine, is described. An approach to protocol verification that uses database algorithms executing on a commercially available, parallel architecture called a hypercube multicomputer is introduced. The goal is to achieve the high degree of computational parallelism necessary to explor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pessimistic quasipartitioning protocols for distributed database systems

    Publication Year: 1989, Page(s):341 - 353
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1351 KB)

    A communication link failure can result in a network partitioning that fragments a distributed database system into isolated parts. If a severed high-speed link (e.g. satellite link) between the partitions can be replaced by a much slower backup link (e.g. a dial-up telephone line), the partitioning becomes a quasipartitioning. Two protocols for transaction processing in quasipartitioned databases... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic and integrated concurrency control for distributed databases

    Publication Year: 1989, Page(s):364 - 374
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1116 KB)

    An integrated approach to concurrency control adaptively allows classical pessimistic (two-phase locking) or optimistic (using certification) approaches. The principles for a distributed integrated method controlling both locking and optimistic transactions are defined. The implementation of these principles leads to a method for constructing the serialization order of transactions, using their co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient communication structure for distributed commit protocols

    Publication Year: 1989, Page(s):375 - 389
    Cited by:  Papers (7)  |  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1525 KB)

    To maintain consistency in a distributed database environment, the transactions must be executed atomically. The standard algorithm for ensuring an atomic execution is called the distributed commit protocol. The two-phase commit protocol and its variations, the well-known protocols used for this purpose, are characterized by successive rounds of message exchange, among all the sites of the databas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed query processing a multiple database system

    Publication Year: 1989, Page(s):390 - 398
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1015 KB)

    Mermaid is a testbed system which provides integrated access to multiple databases. Two query optimization algorithms have been developed for Mermaid. The semijoin algorithm tends to reduce the data transmission cost, while the replicate algorithm reduces the processing cost. An algorithm that integrates the features of these two algorithms to optimize the processing cost as well as the transmissi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of transitive closure in distributed database systems

    Publication Year: 1989, Page(s):399 - 407
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1068 KB)

    A special schema is constructed to represent the data of a binary relation so that the transitive closure can be evaluated efficiently in distributed database systems. The method is economical in communication cost and at the same time preserves the fast access paths for efficient parallel processing of transitive closure at local sites. Updating of data is also discussed.<> View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-performance expert system-DBMS interface for network management and control

    Publication Year: 1989, Page(s):408 - 417
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1014 KB)

    The field of network management in modern telecommunications networks is discussed along with the need for database and expert systems techniques in this field. It is pointed out that one of the requirements is the capability of inferencing with a very large volume of factual information. A framework is presented for optimization in coupling an expert system and a database management system (DBMS)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Control architecture for next-generation communication networks based on distributed databases

    Publication Year: 1989, Page(s):418 - 423
    Cited by:  Papers (9)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (620 KB)

    Intelligent routing control is defined as the process in which the network interrogates the databases containing the relationships between logical numbers, such as personal or information identifiers, and physical addresses in the transport network to find the terminal having the information required to process a user request. The routing control system presented uses distributed databases, each o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A note on the performance of ENET II

    Publication Year: 1989, Page(s):424 - 427
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (335 KB)

    The performance of the ENET II protocol is discussed and compared to the performance of the commercial Ethernet. Linear network topologies with various number of stations uniformly distributed along the bus are considered. The comparison is based on extensive simulation studies and a recently published performance analysis of ENET II by Y.-C. Liu and G.L. Wise (1987). The experimental results agre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analysis of the effect of multiversions on the performance of timestamp algorithms

    Publication Year: 1989, Page(s):354 - 363
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (748 KB)

    The performance of a multiversion conservative timestamp algorithm is evaluated by analyzing the response time of operations in a distributed database system. The random communication delay in the transmission channels of a long-haul network supporting the distributed database system causes transmitted operations to be received out of order. According to rules that are dependent on the number of v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments on `A note on the performance of ENET II' by P. Gburzynski and P. Rudnicki

    Publication Year: 1989, Page(s):427 - 430
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (364 KB)

    The original authors (see ibid., vol.7, no.3, p.424 (1989)) describe some results from a simulation study of ENET II and Ethernet. ENET II is a method, proposed by the commenter (Comput. Networks ISDN Syst., vol.9, no.3, p.209-14, Mar. 1985), to implement several variants of well-known collisions-resolution protocols in an asynchronous environment in a manner upwardly compatible with Ethernet. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of information dissemination by flooding

    Publication Year: 1989, Page(s):335 - 340
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (616 KB)

    Performance properties are established for the dissemination by flooding of a database that is initially distributed among the nodes of a communications network. An example of this general process is the dissemination of network status information as a component of the adaptive routing mechanism in a network like Arpanet. Bounds are given on the progress of the dissemination process at a sequence ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Journal on Selected Areas in Communications focuses on all telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Muriel Médard
MIT