Pub Date : 1996-05-05DOI: 10.1109/ICCT.1996.545124
Wu Lifa, X. Xiren
Firstly, the importance of reliability of the network control center (NCC) and difficulties in implementing the reliability are introduced. Lastly, a method to implement the reliability of NCC is presented. The crux of the method has four points: to transfer central control to distributed control by making use of backup; to realize the consistency of static data through atomic transaction and two-phase commitment (2PC); to ensure synchronisation between the main and backup processor/NCC by extracting dynamic calling data from users and control commands from the main processor/NCC; to design and realize a reliable protocol among all processors in the NCC.
{"title":"The reliability design of NCC in VSAT","authors":"Wu Lifa, X. Xiren","doi":"10.1109/ICCT.1996.545124","DOIUrl":"https://doi.org/10.1109/ICCT.1996.545124","url":null,"abstract":"Firstly, the importance of reliability of the network control center (NCC) and difficulties in implementing the reliability are introduced. Lastly, a method to implement the reliability of NCC is presented. The crux of the method has four points: to transfer central control to distributed control by making use of backup; to realize the consistency of static data through atomic transaction and two-phase commitment (2PC); to ensure synchronisation between the main and backup processor/NCC by extracting dynamic calling data from users and control commands from the main processor/NCC; to design and realize a reliable protocol among all processors in the NCC.","PeriodicalId":395678,"journal":{"name":"Proceedings of International Conference on Communication Technology. ICCT '96","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114182990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-05-05DOI: 10.1109/ICCT.1996.545159
Kun Suk Kim, P. Cho
We designed and implemented a peer-to-peer connection oriented mode protocol for multimedia data transfer in developing the Group Communications on Advanced Network (GiANT) application which supports a computer supported cooperative work (CSCW). We describe the Multimedia Communications Forum (MMCF) general reference architecture model and the functions of the transport domain. We also define service primitives, transfer protocols, and the user interface for the peer-to-peer connection oriented mode protocol. We test the protocol operations by transferring digital video data which is a core technical component of multimedia applications in real time. The protocol is operated correctly to establish and release the connection, and to transfer data.
{"title":"Multimedia data transfer for supporting middleware service","authors":"Kun Suk Kim, P. Cho","doi":"10.1109/ICCT.1996.545159","DOIUrl":"https://doi.org/10.1109/ICCT.1996.545159","url":null,"abstract":"We designed and implemented a peer-to-peer connection oriented mode protocol for multimedia data transfer in developing the Group Communications on Advanced Network (GiANT) application which supports a computer supported cooperative work (CSCW). We describe the Multimedia Communications Forum (MMCF) general reference architecture model and the functions of the transport domain. We also define service primitives, transfer protocols, and the user interface for the peer-to-peer connection oriented mode protocol. We test the protocol operations by transferring digital video data which is a core technical component of multimedia applications in real time. The protocol is operated correctly to establish and release the connection, and to transfer data.","PeriodicalId":395678,"journal":{"name":"Proceedings of International Conference on Communication Technology. ICCT '96","volume":"87 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120914860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-05-05DOI: 10.1109/ICCT.1996.545138
Wang Zhaocheng, Wang Jing, Yang Zhiging, Yao Yan
We consider the impact of multiple access interference (MAI) on noncoherent code tracking loops (in conventional CDMA matched filter detectors) and a novel interference canceller is proposed in order to eliminate the steady-state tracking error, reduce the RMS tracking jitter and realize fast and reliable synchronization. We introduce the idea of multiuser detection such as successive interference cancellation. Simulation results demonstrate the loop exhibits a higher performance than that of the conventional code tracking loop.
{"title":"Synchronization consideration in multiuser CDMA environment","authors":"Wang Zhaocheng, Wang Jing, Yang Zhiging, Yao Yan","doi":"10.1109/ICCT.1996.545138","DOIUrl":"https://doi.org/10.1109/ICCT.1996.545138","url":null,"abstract":"We consider the impact of multiple access interference (MAI) on noncoherent code tracking loops (in conventional CDMA matched filter detectors) and a novel interference canceller is proposed in order to eliminate the steady-state tracking error, reduce the RMS tracking jitter and realize fast and reliable synchronization. We introduce the idea of multiuser detection such as successive interference cancellation. Simulation results demonstrate the loop exhibits a higher performance than that of the conventional code tracking loop.","PeriodicalId":395678,"journal":{"name":"Proceedings of International Conference on Communication Technology. ICCT '96","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116672061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-05-05DOI: 10.1109/ICCT.1996.545005
S. Abeysekera
It is shown that the jitter produced by pulse stuffing synchronizers, used in digital transmission networks, can be decreased by using improved SNR /spl Sigma/-/spl Delta/ modulator circuits. For example, the technique of adaptive threshold modulation which is widely used in SONET/SDH synchronizers is shown to be such a circuit. The performance of these circuits can be further improved by the use of additional circuitry but maintaining their stability becomes a problem. This paper proposes stable alternative modulator architectures which are suitable for synchronizers. The performance of the proposed circuits is compared with the existing techniques.
{"title":"Alternative architectures for pulse stuffing synchronizers","authors":"S. Abeysekera","doi":"10.1109/ICCT.1996.545005","DOIUrl":"https://doi.org/10.1109/ICCT.1996.545005","url":null,"abstract":"It is shown that the jitter produced by pulse stuffing synchronizers, used in digital transmission networks, can be decreased by using improved SNR /spl Sigma/-/spl Delta/ modulator circuits. For example, the technique of adaptive threshold modulation which is widely used in SONET/SDH synchronizers is shown to be such a circuit. The performance of these circuits can be further improved by the use of additional circuitry but maintaining their stability becomes a problem. This paper proposes stable alternative modulator architectures which are suitable for synchronizers. The performance of the proposed circuits is compared with the existing techniques.","PeriodicalId":395678,"journal":{"name":"Proceedings of International Conference on Communication Technology. ICCT '96","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123754010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-05-05DOI: 10.1109/ICCT.1996.545157
A. IIac, Dongchen Lu
A user interface in a multimedia conference system is designed and implemented. The system allows a group of users to conduct a meeting in real time. Participants can jointly view and edit relevant multimedia information, including text, graphics, and still images distributed throughout the network. Participants can also communicate simultaneously by voice to discuss the information they are sharing. This multimedia conference system can be used in a wide variety of cooperative work environment, such as distributed software development, joint authoring, and group decision-support.
{"title":"Design and implementation of the user interface in a multimedia conference system","authors":"A. IIac, Dongchen Lu","doi":"10.1109/ICCT.1996.545157","DOIUrl":"https://doi.org/10.1109/ICCT.1996.545157","url":null,"abstract":"A user interface in a multimedia conference system is designed and implemented. The system allows a group of users to conduct a meeting in real time. Participants can jointly view and edit relevant multimedia information, including text, graphics, and still images distributed throughout the network. Participants can also communicate simultaneously by voice to discuss the information they are sharing. This multimedia conference system can be used in a wide variety of cooperative work environment, such as distributed software development, joint authoring, and group decision-support.","PeriodicalId":395678,"journal":{"name":"Proceedings of International Conference on Communication Technology. ICCT '96","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125606213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-05-05DOI: 10.1109/ICCT.1996.545242
Wu Xingyao, Yang Lieliang, Lee Chengshu
In this paper, we present a method for combinatory equicorrelation signaling based on the Chinese remainder theorem to improve the performance of an M-ary system at low SNR. Using this we represent a large integer by a sequence of primes which are called modulii. We obtain an expression for the probability of error when the channel noise is AWGN. Compared with the M-ary equicorrelation signaling schemes, our system has low complexity and excellent performance.
{"title":"Combinatory equicorrelation signaling transmission based on the remainder theorem: system and performance","authors":"Wu Xingyao, Yang Lieliang, Lee Chengshu","doi":"10.1109/ICCT.1996.545242","DOIUrl":"https://doi.org/10.1109/ICCT.1996.545242","url":null,"abstract":"In this paper, we present a method for combinatory equicorrelation signaling based on the Chinese remainder theorem to improve the performance of an M-ary system at low SNR. Using this we represent a large integer by a sequence of primes which are called modulii. We obtain an expression for the probability of error when the channel noise is AWGN. Compared with the M-ary equicorrelation signaling schemes, our system has low complexity and excellent performance.","PeriodicalId":395678,"journal":{"name":"Proceedings of International Conference on Communication Technology. ICCT '96","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125649518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-05-05DOI: 10.1109/ICCT.1996.545170
Qi Yulu, S. Kodituwakku
A new public key cryptosystem is proposed, together with signature capabilities. This system based on the invertibility of finite automata. The security of the system rests on the difficulty of finding inverse automatas and of factoring matrix polynomial over Galois field GF(2).
{"title":"Finite automation cryptosystem","authors":"Qi Yulu, S. Kodituwakku","doi":"10.1109/ICCT.1996.545170","DOIUrl":"https://doi.org/10.1109/ICCT.1996.545170","url":null,"abstract":"A new public key cryptosystem is proposed, together with signature capabilities. This system based on the invertibility of finite automata. The security of the system rests on the difficulty of finding inverse automatas and of factoring matrix polynomial over Galois field GF(2).","PeriodicalId":395678,"journal":{"name":"Proceedings of International Conference on Communication Technology. ICCT '96","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123869555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-05-05DOI: 10.1109/ICCT.1996.544964
Sun Hairong, Li Lemin
The sojourn time of the constant-bit-rate (CBR) services in the ATM DQDB MAN is studied. The ATM DQDB MAN transfers any kind of services in an unified manner with CBR services obtaining the higher priority level and the variable-bit-rate (VBR) services obtaining the lower priority level. The results display that the delay performance of the CBR services is satisfactory in the ATM DQDB MAN if the network is not seriously overloaded.
{"title":"Sojourn time analysis for constant-bit-rate services in the ATM DQDB MAN","authors":"Sun Hairong, Li Lemin","doi":"10.1109/ICCT.1996.544964","DOIUrl":"https://doi.org/10.1109/ICCT.1996.544964","url":null,"abstract":"The sojourn time of the constant-bit-rate (CBR) services in the ATM DQDB MAN is studied. The ATM DQDB MAN transfers any kind of services in an unified manner with CBR services obtaining the higher priority level and the variable-bit-rate (VBR) services obtaining the lower priority level. The results display that the delay performance of the CBR services is satisfactory in the ATM DQDB MAN if the network is not seriously overloaded.","PeriodicalId":395678,"journal":{"name":"Proceedings of International Conference on Communication Technology. ICCT '96","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127745618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-05-05DOI: 10.1109/ICCT.1996.545192
M. Clever, M. Rauh
GSM is a story of success with still unbroken growth. In some countries penetration rates of about 20% are already reality and there is still no end in sight. On the other hand, there are dramatic changes going on in the telecommunication industry and only those who are prepared for these upcoming new risks and chances are going to succeed in a highly competitive environment. The operators face a lot of different challenges, like the necessity for differentiation against competitors, provision of service variety and quality. They permanently have to deal with price and cost competition. In order to succeed in that market the operators demand new products from the suppliers leading to new strategies. The authors discuss the development of GSM from the market point of view.
{"title":"Digital radio technologies: pacemaker towards global personal and mobile communication","authors":"M. Clever, M. Rauh","doi":"10.1109/ICCT.1996.545192","DOIUrl":"https://doi.org/10.1109/ICCT.1996.545192","url":null,"abstract":"GSM is a story of success with still unbroken growth. In some countries penetration rates of about 20% are already reality and there is still no end in sight. On the other hand, there are dramatic changes going on in the telecommunication industry and only those who are prepared for these upcoming new risks and chances are going to succeed in a highly competitive environment. The operators face a lot of different challenges, like the necessity for differentiation against competitors, provision of service variety and quality. They permanently have to deal with price and cost competition. In order to succeed in that market the operators demand new products from the suppliers leading to new strategies. The authors discuss the development of GSM from the market point of view.","PeriodicalId":395678,"journal":{"name":"Proceedings of International Conference on Communication Technology. ICCT '96","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133277967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-05-05DOI: 10.1109/ICCT.1996.545018
R. Chiang, E.T. Pel
This paper presents a new network routing architecture for transit providers to allocate international switched transit service (ISTS) calls to a destination country based on the routing preference of the originating carriers. The new routing architecture is named carrier specific routing for international switched transit service (ISTS-CSR). An originating carrier would be able to specify its routing preference and traffic distribution pattern of its transit traffic to any given receiving country. Upon receipt of an international transit call, an originating switch of the transit provider would access a programmable database and retrieve the routing instruction specified by the originating carrier for the terminating country. In this manner, a terminating carrier can be selected to receive the transit call based on the routing preference previously specified by the originating carrier.
{"title":"Carrier specific routing for international switched transit service","authors":"R. Chiang, E.T. Pel","doi":"10.1109/ICCT.1996.545018","DOIUrl":"https://doi.org/10.1109/ICCT.1996.545018","url":null,"abstract":"This paper presents a new network routing architecture for transit providers to allocate international switched transit service (ISTS) calls to a destination country based on the routing preference of the originating carriers. The new routing architecture is named carrier specific routing for international switched transit service (ISTS-CSR). An originating carrier would be able to specify its routing preference and traffic distribution pattern of its transit traffic to any given receiving country. Upon receipt of an international transit call, an originating switch of the transit provider would access a programmable database and retrieve the routing instruction specified by the originating carrier for the terminating country. In this manner, a terminating carrier can be selected to receive the transit call based on the routing preference previously specified by the originating carrier.","PeriodicalId":395678,"journal":{"name":"Proceedings of International Conference on Communication Technology. ICCT '96","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114145220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}