Pub Date : 1983-06-01DOI: 10.1016/0376-5075(83)90058-2
{"title":"ICCC '82 — Pathways to the information society","authors":"","doi":"10.1016/0376-5075(83)90058-2","DOIUrl":"https://doi.org/10.1016/0376-5075(83)90058-2","url":null,"abstract":"","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 3","pages":"Pages 173-203"},"PeriodicalIF":0.0,"publicationDate":"1983-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90058-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137284574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1983-04-01DOI: 10.1016/0376-5075(83)90060-0
Alfredo R. Piquer
A process offering a service in a distributed system receives request messages from client processes. For proper system behavior, it is often necessary for requests to be serviced in the same order that they are sent. Ensuring this order requires an elaborate scheme, unless certain restrictions are imposed on the distributed system.
We present some restrictions that ensure that requests are received at a server in the same order that they are sent. With these restrictions, each server can safely service requests in the order of arrival. The restrictions either apply to the message routing, or to the client/server communication. The restrictions on message routing are often satisfied by systems based on local networks, and the restrictions on client/server communication are satisfied by some existing message passing schemes.
{"title":"On ordering requests to servers in a distributed system","authors":"Alfredo R. Piquer","doi":"10.1016/0376-5075(83)90060-0","DOIUrl":"https://doi.org/10.1016/0376-5075(83)90060-0","url":null,"abstract":"<div><p>A process offering a service in a distributed system receives request messages from client processes. For proper system behavior, it is often necessary for requests to be serviced in the same order that they are sent. Ensuring this order requires an elaborate scheme, unless certain restrictions are imposed on the distributed system.</p><p>We present some restrictions that ensure that requests are received at a server in the same order that they are sent. With these restrictions, each server can safely service requests in the order of arrival. The restrictions either apply to the message routing, or to the client/server communication. The restrictions on message routing are often satisfied by systems based on local networks, and the restrictions on client/server communication are satisfied by some existing message passing schemes.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 2","pages":"Pages 69-81"},"PeriodicalIF":0.0,"publicationDate":"1983-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90060-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91723739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1983-04-01DOI: 10.1016/0376-5075(83)90063-6
A. Labadi, I. Sebestyén
This paper describes the “TPA/70-X.25 gateway-network” of the International Institute for Applied Systems Analysis (IIASA) in Austria, and of the Institute for Computerization and Automation of the Hungarian Academy of Sciences (SZTAKI) in Hungary, and its promoting role in the on-line exchange of scientific information among national and international institutes and organizations. It presents a short overview of the major categories of transborder data flows relevant to IIASA's work, and how the gateway-network handles them. Finally, some operational and technical aspects of this East-West network of gateways are discussed.
{"title":"The IIASA TPA/70-X.25 gateway-network promotes international flow of scientific information","authors":"A. Labadi, I. Sebestyén","doi":"10.1016/0376-5075(83)90063-6","DOIUrl":"https://doi.org/10.1016/0376-5075(83)90063-6","url":null,"abstract":"<div><p>This paper describes the “TPA/70-X.25 gateway-network” of the International Institute for Applied Systems Analysis (IIASA) in Austria, and of the Institute for Computerization and Automation of the Hungarian Academy of Sciences (SZTAKI) in Hungary, and its promoting role in the on-line exchange of scientific information among national and international institutes and organizations. It presents a short overview of the major categories of transborder data flows relevant to IIASA's work, and how the gateway-network handles them. Finally, some operational and technical aspects of this East-West network of gateways are discussed.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 2","pages":"Pages 113-121"},"PeriodicalIF":0.0,"publicationDate":"1983-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90063-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91723741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1983-04-01DOI: 10.1016/0376-5075(83)90062-4
J.I. Fernandez, J.A. Gibbons
The CSIRO Division of Computing Research has developed an Australia-wide packet switching network, CSIRONET. An interface between CSIRONET and Digital Equipment Corporation's ANF-10 network products has been developed. This interface has been used to connect CSIRONET to the ANF-10 based networks of two Australian Universities. The connections support internetwork terminal and file traffic.
{"title":"Interconnection of a private packet-switching network and a computer vendor's network","authors":"J.I. Fernandez, J.A. Gibbons","doi":"10.1016/0376-5075(83)90062-4","DOIUrl":"10.1016/0376-5075(83)90062-4","url":null,"abstract":"<div><p>The CSIRO Division of Computing Research has developed an Australia-wide packet switching network, CSIRONET. An interface between CSIRONET and Digital Equipment Corporation's ANF-10 network products has been developed. This interface has been used to connect CSIRONET to the ANF-10 based networks of two Australian Universities. The connections support internetwork terminal and file traffic.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 2","pages":"Pages 99-111"},"PeriodicalIF":0.0,"publicationDate":"1983-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90062-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78873729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1983-04-01DOI: 10.1016/0376-5075(83)90061-2
Yaron I. Gold, W.R. Franta
We describe and analyze an efficient collision-free channel-access protocol for cable or radio networks with an arbitrary spatial (one-, two- or three-dimensional) fixed node configuration.
The protocol is robust and provides distributed access-control under a myriad of possible priority disciplines, including Fixed, Fair Round-Robin and Prioritized Round-Robin disciplines. The protocol optimally employs available information on network topology, to provide performance characteristics (throughput and delay) that are at least as good as and in most cases much better than those of other published protocols that employ less information. The performance advantage is especially significant for networks with a large number of nodes.
{"title":"An efficient collision-free protocol for prioritized access-control of cable or radio channels","authors":"Yaron I. Gold, W.R. Franta","doi":"10.1016/0376-5075(83)90061-2","DOIUrl":"10.1016/0376-5075(83)90061-2","url":null,"abstract":"<div><p>We describe and analyze an efficient collision-free channel-access protocol for cable or radio networks with an arbitrary spatial (one-, two- or three-dimensional) fixed node configuration.</p><p>The protocol is robust and provides distributed access-control under a myriad of possible priority disciplines, including Fixed, Fair Round-Robin and Prioritized Round-Robin disciplines. The protocol optimally employs available information on network topology, to provide performance characteristics (throughput and delay) that are at least as good as and in most cases much better than those of other published protocols that employ less information. The performance advantage is especially significant for networks with a large number of nodes.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 2","pages":"Pages 83-98"},"PeriodicalIF":0.0,"publicationDate":"1983-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90061-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88434297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1983-02-01DOI: 10.1016/0376-5075(83)90002-8
Michael A Malcolm, Lawrence D Rogers, John E Spracklen
We present a contention transmission algorithm for local networks which is related to the p-persistent family of algorithms previously analyzed by Kleinrock and Tobagi. Our algorithm incorporates an automatic acknowledgement signal which is sent by the receiving station immediately after each packet is correctly received. The algorithm is suitable for radio environments in which transmitting stations can “capture” nearby receivers. Assuming that stations are not placed too close each other, we prove that an acknowledgement signal is received by a transmitting station only if the packet has been received correctly by the intended receiver. In a cable network where transmitters do not capture receivers, the acknowledgement signal is guaranteed (in the same sense) regardless of the distances between stations. This result depends on very weak assumptions about the type of data encoding used on the channel. We discuss the more interesting aspects of implementing this scheme, and we outline how higher-level protocols can make use of the acknowledgement signal and its properties.
{"title":"An acknowledging contention algorithm suitable for local radio networks","authors":"Michael A Malcolm, Lawrence D Rogers, John E Spracklen","doi":"10.1016/0376-5075(83)90002-8","DOIUrl":"10.1016/0376-5075(83)90002-8","url":null,"abstract":"<div><p>We present a contention transmission algorithm for local networks which is related to the p-persistent family of algorithms previously analyzed by Kleinrock and Tobagi. Our algorithm incorporates an automatic acknowledgement signal which is sent by the receiving station immediately after each packet is correctly received. The algorithm is suitable for radio environments in which transmitting stations can “capture” nearby receivers. Assuming that stations are not placed too close each other, we prove that an acknowledgement signal is received by a transmitting station only if the packet has been received correctly by the intended receiver. In a cable network where transmitters do not capture receivers, the acknowledgement signal is guaranteed (in the same sense) regardless of the distances between stations. This result depends on very weak assumptions about the type of data encoding used on the channel. We discuss the more interesting aspects of implementing this scheme, and we outline how higher-level protocols can make use of the acknowledgement signal and its properties.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 1","pages":"Pages 1-8"},"PeriodicalIF":0.0,"publicationDate":"1983-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90002-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83913717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1983-02-01DOI: 10.1016/0376-5075(83)90011-9
{"title":"Concerted action research in teleinformatics A short description","authors":"","doi":"10.1016/0376-5075(83)90011-9","DOIUrl":"https://doi.org/10.1016/0376-5075(83)90011-9","url":null,"abstract":"","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 1","pages":"Pages 61-64"},"PeriodicalIF":0.0,"publicationDate":"1983-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90011-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137222414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}