Pub Date : 1995-06-27DOI: 10.1109/SCAC.1995.523652
Tao Zhu, Changming Liu, H. Mouftah
ATM networks support multimedia traffic where diverse services have to be provided and various QoS requirements have to be met. Routing plays an important role in guaranteeing the QoS. However conventional routing will cause a significant overhead when the network size gets very large or rerouting occurs frequently due to the varying link state. The objective of our dynamic routing scheme is to perform more efficient routing over a more effective and simpler topology which is abstracted from the original full topology based on the dynamic link state. Only those links with high probability to satisfy the QoS of the call are included in the effective topology. It is an efficient way to prevent rerouting from occurring too often because the blocking probability over this effective topology is significantly low. A hierarchical routing model is also proposed to further reduce the amount of information that has to be stored and exchanged for routing. We present the simulation results of our dynamic routing scheme along with the hierarchical routing model and its implementation over QUARTS, a simulation testbed for ATM networks.
{"title":"Dynamic routing for multimedia traffic over ATM networks","authors":"Tao Zhu, Changming Liu, H. Mouftah","doi":"10.1109/SCAC.1995.523652","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523652","url":null,"abstract":"ATM networks support multimedia traffic where diverse services have to be provided and various QoS requirements have to be met. Routing plays an important role in guaranteeing the QoS. However conventional routing will cause a significant overhead when the network size gets very large or rerouting occurs frequently due to the varying link state. The objective of our dynamic routing scheme is to perform more efficient routing over a more effective and simpler topology which is abstracted from the original full topology based on the dynamic link state. Only those links with high probability to satisfy the QoS of the call are included in the effective topology. It is an efficient way to prevent rerouting from occurring too often because the blocking probability over this effective topology is significantly low. A hierarchical routing model is also proposed to further reduce the amount of information that has to be stored and exchanged for routing. We present the simulation results of our dynamic routing scheme along with the hierarchical routing model and its implementation over QUARTS, a simulation testbed for ATM networks.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"33 1","pages":"91-97"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78768673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-06-27DOI: 10.1109/SCAC.1995.523666
G. Chavez
This paper covers the main aspects of the current technological status of the Mexican market in the computer networking arena, based on several studies conducted by local and international firms; these criteria were weighed and their technological importance ranked, so that they could to be properly analysed to obtain a global prospective of this information for funding decisions about technological trends and windows of opportunity for Mexico. This is important for long-range planning in education, R&D, network infrastructure development and the provision of value-added services in this sector.
{"title":"Computer networking industry technologies: trends and challenges in the Mexican market","authors":"G. Chavez","doi":"10.1109/SCAC.1995.523666","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523666","url":null,"abstract":"This paper covers the main aspects of the current technological status of the Mexican market in the computer networking arena, based on several studies conducted by local and international firms; these criteria were weighed and their technological importance ranked, so that they could to be properly analysed to obtain a global prospective of this information for funding decisions about technological trends and windows of opportunity for Mexico. This is important for long-range planning in education, R&D, network infrastructure development and the provision of value-added services in this sector.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"24 1","pages":"196-199"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79273410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-06-27DOI: 10.1109/SCAC.1995.523648
E. Chan, C. Bloor
The design and implementation of network management systems is one of the first application areas in which the use of object-orientation was applied on a wide scale. A major reason is that resources that need to be managed in computer networks seem to map naturally into objects. However, network management systems which can deal with heterogeneous networks are very complex systems, and it is easy to end up with a large number of poorly designed objects instead of an integrated and effective system. This paper evaluates the weaknesses of some of the common object-oriented analysis techniques, and provide the outline of a methodology which will avoid some of these pitfalls in the design and implementation of an X.25 network management system based on an object-oriented database management system (OODBMS).
{"title":"Experience in the design and implementation of an object-oriented network management system","authors":"E. Chan, C. Bloor","doi":"10.1109/SCAC.1995.523648","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523648","url":null,"abstract":"The design and implementation of network management systems is one of the first application areas in which the use of object-orientation was applied on a wide scale. A major reason is that resources that need to be managed in computer networks seem to map naturally into objects. However, network management systems which can deal with heterogeneous networks are very complex systems, and it is easy to end up with a large number of poorly designed objects instead of an integrated and effective system. This paper evaluates the weaknesses of some of the common object-oriented analysis techniques, and provide the outline of a methodology which will avoid some of these pitfalls in the design and implementation of an X.25 network management system based on an object-oriented database management system (OODBMS).","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"4 1","pages":"64-70"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89819900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-06-27DOI: 10.1109/SCAC.1995.523668
D. Pritty, J. Malone, N. Lawrie, D. Smeed, Elaine Harmon
This paper describes the operation of a proposed method of access to bidirectional local area network buses-called timed packet release or TPR. The method is based on a system of time delays in the nodes, reckoned from a timing reference signal and provides collision free deterministic access for queued packets. A comparative evaluation of the performance of TPR with other methods of bidirectional bus access such as token passing and the reservation protocols is provided. Results, obtained using discrete event simulation models, are presented for the various access protocols. Performance is measured in terms of the average delay-throughput characteristics of the networks. The implementation aspects of TPR are reviewed briefly.
{"title":"Performance assessment of a deterministic access protocol for high performance bus topology LANs","authors":"D. Pritty, J. Malone, N. Lawrie, D. Smeed, Elaine Harmon","doi":"10.1109/SCAC.1995.523668","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523668","url":null,"abstract":"This paper describes the operation of a proposed method of access to bidirectional local area network buses-called timed packet release or TPR. The method is based on a system of time delays in the nodes, reckoned from a timing reference signal and provides collision free deterministic access for queued packets. A comparative evaluation of the performance of TPR with other methods of bidirectional bus access such as token passing and the reservation protocols is provided. Results, obtained using discrete event simulation models, are presented for the various access protocols. Performance is measured in terms of the average delay-throughput characteristics of the networks. The implementation aspects of TPR are reviewed briefly.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"3 1","pages":"206-212"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85093305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-06-27DOI: 10.1109/SCAC.1995.523692
L. Toutain, H. Afifi, J. Narzul
The paper describes the Prism distributed multimedia platform. The paper is divided in three parts. The first part resumes the main components of the platform. The authors show the different planes that interact with both multimedia applications and network resources. The second part describes a different approach being developed for the platform to ease the distribution of multimedia objects. It is based on fragmented objects. The third part enumerates two different applications that have been developed for and on that platform. The first is a specific multimedia protocol and the second is a whiteboard used for tele-teaching.
{"title":"The Prism distributed multimedia platform","authors":"L. Toutain, H. Afifi, J. Narzul","doi":"10.1109/SCAC.1995.523692","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523692","url":null,"abstract":"The paper describes the Prism distributed multimedia platform. The paper is divided in three parts. The first part resumes the main components of the platform. The authors show the different planes that interact with both multimedia applications and network resources. The second part describes a different approach being developed for the platform to ease the distribution of multimedia objects. It is based on fragmented objects. The third part enumerates two different applications that have been developed for and on that platform. The first is a specific multimedia protocol and the second is a whiteboard used for tele-teaching.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"24 1","pages":"384-390"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91183618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-06-27DOI: 10.1109/SCAC.1995.523655
Harold T. Daugherty, W. J. Klein
In the past decade the United States telecommunications industry has been under much scrutiny as a result of a number of major network outages. These outages, which affected millions of customers, ranged from power and fire related problems to a software error affecting the common channel signaling network. The industry reacted promptly and positively. This paper discusses the actions of the FCC's Network Reliability Council (NRC), including the technical papers produced by this group and its newly re-chartered objectives, as well as the Alliance for Telecommunications Industry Solutions (ATIS) Network Reliability Steering Committee (NRSC) to address this challenge. The NRSC's findings are discussed in detail, including the results of its quarterly and annual reports, which identify trends, areas of concern, and recommended steps to prevent or mitigate outages in the future.
{"title":"U.S. Network Reliability Issues and Major Outage Performance","authors":"Harold T. Daugherty, W. J. Klein","doi":"10.1109/SCAC.1995.523655","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523655","url":null,"abstract":"In the past decade the United States telecommunications industry has been under much scrutiny as a result of a number of major network outages. These outages, which affected millions of customers, ranged from power and fire related problems to a software error affecting the common channel signaling network. The industry reacted promptly and positively. This paper discusses the actions of the FCC's Network Reliability Council (NRC), including the technical papers produced by this group and its newly re-chartered objectives, as well as the Alliance for Telecommunications Industry Solutions (ATIS) Network Reliability Steering Committee (NRSC) to address this challenge. The NRSC's findings are discussed in detail, including the results of its quarterly and annual reports, which identify trends, areas of concern, and recommended steps to prevent or mitigate outages in the future.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"309 1","pages":"114-119"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77946382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-06-27DOI: 10.1109/SCAC.1995.523676
J. Cobb, P. Agrawal
We present a new acknowledgment strategy to improve the performance of TCP sessions that originate or terminate in noisy wireless networks for mobile computers. This acknowledgment strategy allows the TCP source to distinguish between losses due to congestion and losses due to corruption. With this distinction, the source can reduce its sending rate when congestion occurs, and quickly retransmit when corruption occurs. Without this distinction, TCP throughput is shown to suffer significantly over a path with a large bandwidth-delay product. The strategy is also appropriate for dealing with losses due to hand-offs of a mobile computer from one wireless cell to another.
{"title":"Congestion or corruption? A strategy for efficient wireless TCP sessions","authors":"J. Cobb, P. Agrawal","doi":"10.1109/SCAC.1995.523676","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523676","url":null,"abstract":"We present a new acknowledgment strategy to improve the performance of TCP sessions that originate or terminate in noisy wireless networks for mobile computers. This acknowledgment strategy allows the TCP source to distinguish between losses due to congestion and losses due to corruption. With this distinction, the source can reduce its sending rate when congestion occurs, and quickly retransmit when corruption occurs. Without this distinction, TCP throughput is shown to suffer significantly over a path with a large bandwidth-delay product. The strategy is also appropriate for dealing with losses due to hand-offs of a mobile computer from one wireless cell to another.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"37 1","pages":"262-268"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91336909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-06-27DOI: 10.1109/SCAC.1995.523667
A. Chaaban
A systems approach is used to model the "telecommunications system". The system elements, actors and processes are briefly described, together with the interrelations of the elements and their theoretical optimum status. Practical restrictions and limitations exist as factors that take the system away from the optimum, and some recommendations to get some equilibrium point, are presented.
{"title":"Introducing the \"optimum telecommunications system\"","authors":"A. Chaaban","doi":"10.1109/SCAC.1995.523667","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523667","url":null,"abstract":"A systems approach is used to model the \"telecommunications system\". The system elements, actors and processes are briefly described, together with the interrelations of the elements and their theoretical optimum status. Practical restrictions and limitations exist as factors that take the system away from the optimum, and some recommendations to get some equilibrium point, are presented.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"1 1","pages":"200-204"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75768326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-06-27DOI: 10.1109/SCAC.1995.523662
J. M. Tahir, S. Dlay, R. Gorgui-Naguib, O. Hinton
A concurrent error detection (CED) scheme has been proposed by Jou and Abraham (1988)for a radix-2 FFT network. The method uses a coding scheme to ensure that all the modelled faults are detectable. The same method has been applied to the prime factor algorithm (PFA) FFT network. The results show that the CED scheme is applicable to multi-factor PFA networks and it is efficient, only, for large N. Since the PFA is a minimum multiplication algorithm, it is logical to adopt a minimum multiplication CED scheme. For this purpose, a suitable CED scheme has been developed such that the data coding is no longer needed which results in less hardware and time overheads. The new scheme provides a stage-by-stage error detection without causing time delay and additional roundoff noise. The hardware overhead is substantially reduced with improved error detection performance since the scheme needs to consider the roundoff error of only one stage instead of the entire FFT network.
{"title":"Algorithm-based fault detection in prime factor FFT networks","authors":"J. M. Tahir, S. Dlay, R. Gorgui-Naguib, O. Hinton","doi":"10.1109/SCAC.1995.523662","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523662","url":null,"abstract":"A concurrent error detection (CED) scheme has been proposed by Jou and Abraham (1988)for a radix-2 FFT network. The method uses a coding scheme to ensure that all the modelled faults are detectable. The same method has been applied to the prime factor algorithm (PFA) FFT network. The results show that the CED scheme is applicable to multi-factor PFA networks and it is efficient, only, for large N. Since the PFA is a minimum multiplication algorithm, it is logical to adopt a minimum multiplication CED scheme. For this purpose, a suitable CED scheme has been developed such that the data coding is no longer needed which results in less hardware and time overheads. The new scheme provides a stage-by-stage error detection without causing time delay and additional roundoff noise. The hardware overhead is substantially reduced with improved error detection performance since the scheme needs to consider the roundoff error of only one stage instead of the entire FFT network.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"13 1","pages":"164-170"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78804640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-06-27DOI: 10.1109/SCAC.1995.523664
A. A. Borges, L. Gomes
The Brazilian telecommunication sector is experiencing a process of institutional and technological changes. The new Congress is discussing new rules for a market economy with flexibility, including the disruption of the TELEBRAS monopoly, where a conglomerate of 29 state companies are responsible for telecommunications in the country. Besides the necessary constitutional changes, the government has to guarantee access to telecommunication services by the low income population, the deployment of well defined networks and services standards and to prepare TELEBRAS for this new and more competitive environment. This paper describes how this process is being conducted, presents the technological perspectives of the services and networks evolution, including milestones of the present network and for the 1996, 2000 and 2010 transition scenarios and concludes with some issues on the deregulation trends, a matter that is attracting the Brazilian society attention and is part of the government program.
{"title":"Brazil: the envisaged telecommunication scenario in the near future","authors":"A. A. Borges, L. Gomes","doi":"10.1109/SCAC.1995.523664","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523664","url":null,"abstract":"The Brazilian telecommunication sector is experiencing a process of institutional and technological changes. The new Congress is discussing new rules for a market economy with flexibility, including the disruption of the TELEBRAS monopoly, where a conglomerate of 29 state companies are responsible for telecommunications in the country. Besides the necessary constitutional changes, the government has to guarantee access to telecommunication services by the low income population, the deployment of well defined networks and services standards and to prepare TELEBRAS for this new and more competitive environment. This paper describes how this process is being conducted, presents the technological perspectives of the services and networks evolution, including milestones of the present network and for the 1996, 2000 and 2010 transition scenarios and concludes with some issues on the deregulation trends, a matter that is attracting the Brazilian society attention and is part of the government program.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"158 1","pages":"180-188"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72923868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}