Pub Date : 1996-05-07DOI: 10.1109/ETACOM.1996.502500
J. Hahn
This paper addresses preliminary system engineering for a disposable, remote, chemical-sensing network. This network could interconnect a satellite hub, LEO (low Earth orbiting) satellites, remote sensors, and a fiber optic interface that interlinks remote chemical sensors, situated underground in aquifers or directly beneath hazardous chemical/waste disposal sites, with remote transmitter/receivers on the Earth's surface. Some essential technical considerations as to orbital analysis, telemetry, satellite transponder access, modulation techniques, antenna selection, criteria for remote power, hardware tradeoffs, and the execution of a feasibility study of the proposed network via primarily a link budget analysis are then evaluated. This network is suited either to detect hazardous chemicals in the atmosphere or underground.
{"title":"Monitoring of hazardous chemical deposition at either underground sites or in the atmosphere with the aid of a remote, chemical-sensing network that is satellite-based","authors":"J. Hahn","doi":"10.1109/ETACOM.1996.502500","DOIUrl":"https://doi.org/10.1109/ETACOM.1996.502500","url":null,"abstract":"This paper addresses preliminary system engineering for a disposable, remote, chemical-sensing network. This network could interconnect a satellite hub, LEO (low Earth orbiting) satellites, remote sensors, and a fiber optic interface that interlinks remote chemical sensors, situated underground in aquifers or directly beneath hazardous chemical/waste disposal sites, with remote transmitter/receivers on the Earth's surface. Some essential technical considerations as to orbital analysis, telemetry, satellite transponder access, modulation techniques, antenna selection, criteria for remote power, hardware tradeoffs, and the execution of a feasibility study of the proposed network via primarily a link budget analysis are then evaluated. This network is suited either to detect hazardous chemicals in the atmosphere or underground.","PeriodicalId":130942,"journal":{"name":"Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115270428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-05-07DOI: 10.1109/ETACOM.1996.502496
V. Krishnaswamy, S.R. Thuel
Multimedia, multipoint applications require the processing and coordination of audio, video and data, to unsure that each participant or user receives the proper media traffic mix in the expected format at the expected time. Such a requirement is met by multimedia bridging, which encompasses many functions, including, event ordering, multimedia synchronization, network-user interfacing, media processing and distribution. In practice, bridging functions are either implicitly embedded in the software of distributed multipoint applications or they are centrally located on a hardware component embedded in the network, called a "bridge", usually designed to support a single multipoint application, such as teleconferencing. This paper presents a structured view of the multimedia bridging problem. Our premise is that a bridge should be viewed as a logical entity which provides a set off functions that are transparently accessible to many multipoint applications. Whether bridging functions are physically resident at an end-point or in a network, and whether they are implemented in software or in hardware is a matter of performance, efficiency and cost trade-offs which remain to be evaluated. We believe that this is a first step towards developing more flexible bridging infrastructures.
{"title":"Multimedia bridging: a structured view","authors":"V. Krishnaswamy, S.R. Thuel","doi":"10.1109/ETACOM.1996.502496","DOIUrl":"https://doi.org/10.1109/ETACOM.1996.502496","url":null,"abstract":"Multimedia, multipoint applications require the processing and coordination of audio, video and data, to unsure that each participant or user receives the proper media traffic mix in the expected format at the expected time. Such a requirement is met by multimedia bridging, which encompasses many functions, including, event ordering, multimedia synchronization, network-user interfacing, media processing and distribution. In practice, bridging functions are either implicitly embedded in the software of distributed multipoint applications or they are centrally located on a hardware component embedded in the network, called a \"bridge\", usually designed to support a single multipoint application, such as teleconferencing. This paper presents a structured view of the multimedia bridging problem. Our premise is that a bridge should be viewed as a logical entity which provides a set off functions that are transparently accessible to many multipoint applications. Whether bridging functions are physically resident at an end-point or in a network, and whether they are implemented in software or in hardware is a matter of performance, efficiency and cost trade-offs which remain to be evaluated. We believe that this is a first step towards developing more flexible bridging infrastructures.","PeriodicalId":130942,"journal":{"name":"Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications","volume":"316 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115669855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-05-07DOI: 10.1109/ETACOM.1996.502506
P. Sapaty, P. M. Borst
A novel technology called WAVE for distributed processing and control in large open systems is presented. The technology, combining mobile agent ideology with parallel processing of distributed semantic networks, may be efficiently used on a variety of system organisation levels, ranging from intelligent communication protocols to arbitrary parallel and distributed applications.
{"title":"WAVE: mobile intelligence in open networks","authors":"P. Sapaty, P. M. Borst","doi":"10.1109/ETACOM.1996.502506","DOIUrl":"https://doi.org/10.1109/ETACOM.1996.502506","url":null,"abstract":"A novel technology called WAVE for distributed processing and control in large open systems is presented. The technology, combining mobile agent ideology with parallel processing of distributed semantic networks, may be efficiently used on a variety of system organisation levels, ranging from intelligent communication protocols to arbitrary parallel and distributed applications.","PeriodicalId":130942,"journal":{"name":"Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications","volume":"522 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123074616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-05-07DOI: 10.1109/ETACOM.1996.502503
Anselm Lingnau
The authors assume agents to be computer programs that help a user to perform a task or set of tasks. They consider primitives for agent communication, interaction styles and blackboard systems.
{"title":"Making mobile agents communicate: a flexible approach","authors":"Anselm Lingnau","doi":"10.1109/ETACOM.1996.502503","DOIUrl":"https://doi.org/10.1109/ETACOM.1996.502503","url":null,"abstract":"The authors assume agents to be computer programs that help a user to perform a task or set of tasks. They consider primitives for agent communication, interaction styles and blackboard systems.","PeriodicalId":130942,"journal":{"name":"Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128683970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-05-07DOI: 10.1109/ETACOM.1996.502493
L. Olsen
Computer telephony integration (CTI) holds the promise of changing the way in which we use our phones and computers. The Internet has always been ready for voice, in fact it is already ready for video. It is only now with the introduction of high speed broadband technologies like ATM, 100 Mbps LANs, and FDDI can one introduce this multimedia on the Internet. The author describes the state at which the telephone industry is currently in, including a description of two popular telephony standards; TAPI and TSAPI, why the Internet phone is a prelude of what is to come and finally a high level description of the virtual phone system which has the potential to replace most business phone systems.
{"title":"Death of a phone system: an Internet viewpoint on computer telephony integration","authors":"L. Olsen","doi":"10.1109/ETACOM.1996.502493","DOIUrl":"https://doi.org/10.1109/ETACOM.1996.502493","url":null,"abstract":"Computer telephony integration (CTI) holds the promise of changing the way in which we use our phones and computers. The Internet has always been ready for voice, in fact it is already ready for video. It is only now with the introduction of high speed broadband technologies like ATM, 100 Mbps LANs, and FDDI can one introduce this multimedia on the Internet. The author describes the state at which the telephone industry is currently in, including a description of two popular telephony standards; TAPI and TSAPI, why the Internet phone is a prelude of what is to come and finally a high level description of the virtual phone system which has the potential to replace most business phone systems.","PeriodicalId":130942,"journal":{"name":"Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications","volume":"411 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124390682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-05-07DOI: 10.1109/ETACOM.1996.502504
D. Chess
Agent systems face all the security challenges involved with any system that sends messages. Delegating tasks to mobile programs, or to supposedly intelligent ones, raises another set of concerns. Agent-based systems also increase the connectedness and the complexity of the computing universe. As connectedness and complexity increase, new failure modes arise, some of which have security implications. These emergent security concerns are more speculative than the more traditional ones inherited from previous computing systems; the author mentions a few of the possibilities. The topics discussed include: controlling program execution, protecting agents, accidental agents, trusting data, and revealing data.
{"title":"Security considerations in agent-based systems","authors":"D. Chess","doi":"10.1109/ETACOM.1996.502504","DOIUrl":"https://doi.org/10.1109/ETACOM.1996.502504","url":null,"abstract":"Agent systems face all the security challenges involved with any system that sends messages. Delegating tasks to mobile programs, or to supposedly intelligent ones, raises another set of concerns. Agent-based systems also increase the connectedness and the complexity of the computing universe. As connectedness and complexity increase, new failure modes arise, some of which have security implications. These emergent security concerns are more speculative than the more traditional ones inherited from previous computing systems; the author mentions a few of the possibilities. The topics discussed include: controlling program execution, protecting agents, accidental agents, trusting data, and revealing data.","PeriodicalId":130942,"journal":{"name":"Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132150491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-05-07DOI: 10.1109/ETACOM.1996.502507
S. Vuong, I. Ivanov
We examine and contrast two interesting systems which are at the two ends of the scale in their ability to support program mobility: JAVA and WAVE. JAVA offers a useful combination of some of the most attractive features in conventional programming languages and environments. It supports distributed computing and TCP/IP protocols (e.g. HTTP), and allows transparent access to objects across the net via URLs. New interactive code modules can be dynamically loaded and linked on demand from a variety of distributed sources, thus supporting to some extent the implementation of mobile intelligent agents. WAVE, on the other hand, offers a completely new programming paradigm, which directly supports dynamic creation and processing of arbitrary knowledge networks. In WAVE, programs ("waves") can be injected from arbitrary points in the distributed system, roam in the network in a virus-like mode, while replicating into parallel instances, and coordinating with each other, without any centralized control. Different waves can cooperate in a distributed space, thereby forming dynamic societies which may collectively perform complex knowledge processing.
{"title":"Mobile intelligent agent systems: WAVE vs. JAVA","authors":"S. Vuong, I. Ivanov","doi":"10.1109/ETACOM.1996.502507","DOIUrl":"https://doi.org/10.1109/ETACOM.1996.502507","url":null,"abstract":"We examine and contrast two interesting systems which are at the two ends of the scale in their ability to support program mobility: JAVA and WAVE. JAVA offers a useful combination of some of the most attractive features in conventional programming languages and environments. It supports distributed computing and TCP/IP protocols (e.g. HTTP), and allows transparent access to objects across the net via URLs. New interactive code modules can be dynamically loaded and linked on demand from a variety of distributed sources, thus supporting to some extent the implementation of mobile intelligent agents. WAVE, on the other hand, offers a completely new programming paradigm, which directly supports dynamic creation and processing of arbitrary knowledge networks. In WAVE, programs (\"waves\") can be injected from arbitrary points in the distributed system, roam in the network in a virus-like mode, while replicating into parallel instances, and coordinating with each other, without any centralized control. Different waves can cooperate in a distributed space, thereby forming dynamic societies which may collectively perform complex knowledge processing.","PeriodicalId":130942,"journal":{"name":"Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127819199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-05-07DOI: 10.1109/ETACOM.1996.502465
A.J. Chaudhry
The paper propose a standards based IP over ATM architectural model for ATM network(s). This model could coexist with the currently implemented proprietary architecture(s), but could also replace them without any major loss in functionality. This architecture allows a convenient migration path to the standards currently under development, like NHRP (Next Hop Resolution Protocol) and IRA (Integrated Routing and Addressing) that provide a far better functionality than any proprietary solution. The Classical IP model uses the standards presented in RFC 1577, UNI 3.x, and IISP (P-NNI phase 0) to implement logical IP subnet (LISs) across the ATM LAN(s) and do IP and ATM level routing between the LISs, facilitating standards based communication over ATM networks. Several options exist in the division/unification of ATM networks(s) into LIS(s). The paper discusses the advantages and disadvantages associated with each available option, along with the associated implementation/management complexities and provides appropriate recommendations based on architecture salability, network reliability, and flexibility for future experimentation.
针对ATM网络,提出了一种基于标准的IP over ATM体系结构模型。该模型可以与当前实现的专有架构共存,但也可以在功能上没有任何重大损失的情况下取代它们。这种架构允许方便地迁移到目前正在开发的标准,如NHRP(下一跳解析协议)和IRA(集成路由和寻址),它们提供了比任何专有解决方案更好的功能。经典IP模型使用RFC 1577, UNI 3中提出的标准。x和IISP (P-NNI阶段0)实现跨ATM局域网的逻辑IP子网(LISs),并在LISs之间进行IP和ATM级别的路由,促进ATM网络上基于标准的通信。将ATM网络划分/统一为多个LIS存在几种选择。本文讨论了与每个可用选项相关的优点和缺点,以及相关的实现/管理复杂性,并根据架构可销售性、网络可靠性和未来实验的灵活性提供了适当的建议。
{"title":"Classical IP: IP over ATM architecture for ATM networks","authors":"A.J. Chaudhry","doi":"10.1109/ETACOM.1996.502465","DOIUrl":"https://doi.org/10.1109/ETACOM.1996.502465","url":null,"abstract":"The paper propose a standards based IP over ATM architectural model for ATM network(s). This model could coexist with the currently implemented proprietary architecture(s), but could also replace them without any major loss in functionality. This architecture allows a convenient migration path to the standards currently under development, like NHRP (Next Hop Resolution Protocol) and IRA (Integrated Routing and Addressing) that provide a far better functionality than any proprietary solution. The Classical IP model uses the standards presented in RFC 1577, UNI 3.x, and IISP (P-NNI phase 0) to implement logical IP subnet (LISs) across the ATM LAN(s) and do IP and ATM level routing between the LISs, facilitating standards based communication over ATM networks. Several options exist in the division/unification of ATM networks(s) into LIS(s). The paper discusses the advantages and disadvantages associated with each available option, along with the associated implementation/management complexities and provides appropriate recommendations based on architecture salability, network reliability, and flexibility for future experimentation.","PeriodicalId":130942,"journal":{"name":"Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131695077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-05-07DOI: 10.1109/ETACOM.1996.502499
G. Hooper, A. Sicher
This paper introduces current and planned mobile data and messaging capabilities of the TDMA Digital AMPS cellular and personal communications standard. In addition to providing more than a threefold capacity increase over the venerable analog AMPS standard by digital transcoding and time division multiplexing, D-AMPS provides a flexible and competitive technological platform capable of significant evolution. The introduction of a digital control channel (DCCH) to D-AMPS via the IS-136 standard increases battery life, adds support for hierarchical cell structures, improves private/public system discrimination, and strengthens support of new revenue generating wireless data and messaging services.
{"title":"Advanced TDMA digital AMPS mobile data and messaging capabilities","authors":"G. Hooper, A. Sicher","doi":"10.1109/ETACOM.1996.502499","DOIUrl":"https://doi.org/10.1109/ETACOM.1996.502499","url":null,"abstract":"This paper introduces current and planned mobile data and messaging capabilities of the TDMA Digital AMPS cellular and personal communications standard. In addition to providing more than a threefold capacity increase over the venerable analog AMPS standard by digital transcoding and time division multiplexing, D-AMPS provides a flexible and competitive technological platform capable of significant evolution. The introduction of a digital control channel (DCCH) to D-AMPS via the IS-136 standard increases battery life, adds support for hierarchical cell structures, improves private/public system discrimination, and strengthens support of new revenue generating wireless data and messaging services.","PeriodicalId":130942,"journal":{"name":"Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127383985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-05-07DOI: 10.1109/ETACOM.1996.502473
N. Anisimov, A. Kovalenko, P.A. Postupalski, S. Vuong
We propose a compositional Petri net model, called CoPN, for multimedia synchronization specifications. The salient features of this model, including macroplaces and PN entities, are presented and the application of the CoPN model to multimedia synchronization specification is discussed via some simple examples. This compositional approach enables the compact and readable specification of complex, large-scale specifications while preserving the fine granularity as well as supporting user interactions.
{"title":"A compositional approach to the specification of multimedia objects using Petri nets","authors":"N. Anisimov, A. Kovalenko, P.A. Postupalski, S. Vuong","doi":"10.1109/ETACOM.1996.502473","DOIUrl":"https://doi.org/10.1109/ETACOM.1996.502473","url":null,"abstract":"We propose a compositional Petri net model, called CoPN, for multimedia synchronization specifications. The salient features of this model, including macroplaces and PN entities, are presented and the application of the CoPN model to multimedia synchronization specification is discussed via some simple examples. This compositional approach enables the compact and readable specification of complex, large-scale specifications while preserving the fine granularity as well as supporting user interactions.","PeriodicalId":130942,"journal":{"name":"Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129161123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}