{"title":"A verification support for communication software design(003) 5323271","authors":"K. Yamano, Y. Tokita, K. Takahashi","doi":"10.1109/GLOCOM.1995.500288","DOIUrl":"https://doi.org/10.1109/GLOCOM.1995.500288","url":null,"abstract":"In communication software design, it is important to describe the specification without any errors or ambiguity. For this purpose, several formal description techniques have been proposed to ensure rigorous specifications. In addition, it is necessary to facilitate the generation of highly reliable specification. We propose an integrated support environment, named ITECS (integrated environment for high reliability communication software design), which has been developed to support the design of highly reliable communication software efficiently. ITECS has the following characteristics: it is based on the formal description technique LOTOS, to describe the specification rigorously; it has specification functions to support editing of message sequence charts and graphical LOTOS specifications; it has verification functions based on the mathematical basis of LOTOS. This paper mainly discusses ITECS's verification of consistency between two LOTOS specifications in the refinement process of specification design.","PeriodicalId":152724,"journal":{"name":"Proceedings of GLOBECOM '95","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129182321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of shared-memory switches under multicast bursty traffic","authors":"F. Chiussi, Ye Xia, Vijay P. Kumar","doi":"10.1109/GLOCOM.1995.502599","DOIUrl":"https://doi.org/10.1109/GLOCOM.1995.502599","url":null,"abstract":"Asynchronous transfer mode (ATM) is rapidly emerging as the switching technology of choice for broadband networks. We study shared-memory switches under multicast bursty traffic, and characterize the relation between their performance and the multicast distribution which defines the mix of multicast traffic arriving at the switches. We consider two schemes that have been used in practical realization of these switches to replicate multicast cells: (i) replication-at-receiving (RAR), where multiple copies of a multicast cell are stored in the buffer and served independently, and (ii) replication-at-sending (RAS), where a single instance of a multicast cell is stored in the buffer, and the cell is replicated as it is transmitted to the output ports. For both schemes, using simulation, we find upper bounds for the buffer requirements to achieve a desired packet loss rate. We show that these upper bounds, which are significantly larger than the buffer requirements under unicast traffic, are actually approached under any realistic multicast distribution, and even for small volumes of multicast traffic. We also study shared-memory switches with output demultiplexers, and characterize and compare the different multicasting schemes that are used in these ATM switches.","PeriodicalId":152724,"journal":{"name":"Proceedings of GLOBECOM '95","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123009336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The essential role of traffic performance analysis in intelligent networks","authors":"V. Ramaswami","doi":"10.1109/GLOCOM.1995.502603","DOIUrl":"https://doi.org/10.1109/GLOCOM.1995.502603","url":null,"abstract":"In the light of some real life examples, we highlight some new threats to network integrity in today's complex, multi-service, multi-supplier network marked by increasing reliance on automatic and distributed congestion controls. These examples illustrate some commonly occurring problems and underscore the important role of traffic performance analysis in assuring service and network integrity.","PeriodicalId":152724,"journal":{"name":"Proceedings of GLOBECOM '95","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123014209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A loss-free connection control protocol for the Thunder and Lightning network","authors":"Emmanouel Varvarigos, V. Sharma","doi":"10.1109/GLOCOM.1995.501968","DOIUrl":"https://doi.org/10.1109/GLOCOM.1995.501968","url":null,"abstract":"The ready-to-go virtual circuit protocol (or RGVC) is a novel connection control protocol for gigabit networks that is designed to ensure lossless transmission for delay-sensitive traffic and for traffic whose rate changes with time. The RGVC protocol is one of the two connection control protocols that will be used in the 40 Gbit/s fiber-optic ATM-based Thunder and Lightning network, currently being developed at UCSB. We introduce the RGVC protocol, discuss its main features, and indicate its lossless character. The RGVC protocol can be viewed as a reservation protocol where the reservation and the data transmission phases overlap. The source need not wait for an end-to-end round-trip delay for reservations to be made before transmitting the data. Instead the data packets follow the setup packet after a short offset-interval, which is much smaller than the round-trip delay. As a result, the protocol does considerably better than wait-for reservation protocols in terms of minimizing pre-transmission delay, and is useful for connection establishment for traffic with strict delay requirements. If the setup packet is unsuccessful in reserving the required capacity, or if the rate of the session changes without there being sufficient capacity to accommodate the change, the packets are buffered at intermediate nodes and back-pressure is exercised to the upstream nodes to control the source transmission rate. The back-pressure mechanism uses the concept of freezing of capacity to ensure that the protocol is lossless.","PeriodicalId":152724,"journal":{"name":"Proceedings of GLOBECOM '95","volume":"36 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120913016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective interference: a novel approach for interference modelling and traffic analysis in CDMA cellular networks","authors":"J. Evans, D. Everitt","doi":"10.1109/GLOCOM.1995.502718","DOIUrl":"https://doi.org/10.1109/GLOCOM.1995.502718","url":null,"abstract":"This paper presents an analysis of the reverse link capacity of cellular mobile communication networks operating with direct sequence code division multiple access. The emphasis is on dealing with the variability in user locations and on allowing different numbers of users in each cell. Firstly we calculate the distribution function of the interference at a cell site from a single mobile whose position is a random vector in another cell of the network. Using ideas closely related to the effective bandwidth concept from the analysis of call admission control in ATM networks, a method of handling the sum of the interference from arbitrary numbers of users in each cell is presented. This leads to a set of linear constraints that bounds the capacity region of the network and to the assignment of an effective interference to users. Importantly, the method is readily incorporated into a traffic model which allows the stochastic nature of the call arrival process to be analysed and the Erlang capacity of the network to be calculated.","PeriodicalId":152724,"journal":{"name":"Proceedings of GLOBECOM '95","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116223278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient topologies for ATM interconnection networks","authors":"R. Beraldi, P. Giacomazzi, R. Melen","doi":"10.1109/GLOCOM.1995.502802","DOIUrl":"https://doi.org/10.1109/GLOCOM.1995.502802","url":null,"abstract":"The paper extends the Shuffleout switching architecture by defining a general class of ATM switching fabrics dubbed II-out, which includes fabrics employing any interconnection pattern between stages (the Shuffleout is an element of the II-out class). Then a search on the II-out space is carried out aimed at finding the best performing architecture. The performance index used to evaluate the various solutions for the interconnection pattern is the one directly relevant for its application, that is the cell loss probability of the resulting switching fabric. The results of this work show that many patterns exist which perform better than the shuffle.","PeriodicalId":152724,"journal":{"name":"Proceedings of GLOBECOM '95","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121679302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coaxial cable distribution plant performance simulation for interactive multimedia TV","authors":"W.Y. Chen, K. Kerpez","doi":"10.1109/GLOCOM.1995.500346","DOIUrl":"https://doi.org/10.1109/GLOCOM.1995.500346","url":null,"abstract":"Coaxial cable distribution plant can be upgraded to hybrid fiber/coax networks to provide interactive multimedia TV. This paper explores the capabilities of such an upgraded coaxial cable distribution plant. A new method for calculating the exact channel response of a tree-and-branch coaxial cable distribution system is presented that uses detailed coaxial cable, passive components, active components, and distribution plant topology models. With this channel response, simulations are run that calculate the transmission performance in the upstream and downstream directions in the presence of flat background noise and ingress noise. It is shown that the channel response of the coax distribution plant limits the upstream bit-rate. The cable and component models developed in this paper could be used to make improved coaxial cable distribution plant and transmission system design and planning tools.","PeriodicalId":152724,"journal":{"name":"Proceedings of GLOBECOM '95","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121362062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvement in the quality of speech received at suppressed carrier SSB","authors":"J. Suzuki, Y. Hara, T. Shimamura","doi":"10.1109/GLOCOM.1995.500298","DOIUrl":"https://doi.org/10.1109/GLOCOM.1995.500298","url":null,"abstract":"A receiver should tune to the carrier frequency accurately at suppressed carrier SSB (SCSSB). Manual tuning, however, is very difficult due to the lack of the carrier signal. If fine tuning fails at reception, the quality of received speech is degraded owing to the shift of speech spectrum. This article proposes a method to improve the quality of speech degraded at SCSSB. Received speech is transformed into cepstrum. The remarkable peak on the quefrency indicates the fundamental period of speech. If tuning is carried out correctly, the shape of the peak is symmetrical. Mistuning gives an asymmetrical peak. Furthermore, the shape is different to the direction of mistuning. Employing this feature, the mistuning frequency is estimated. Finally the spectrum of the received speech is shifted and the naturalness is improved by employing the overlap and add method.","PeriodicalId":152724,"journal":{"name":"Proceedings of GLOBECOM '95","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125644776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of two TCP implementations in mobile computing environments","authors":"M. Chuah, On-Ching Vue, A. DeSimone","doi":"10.1109/GLOCOM.1995.500377","DOIUrl":"https://doi.org/10.1109/GLOCOM.1995.500377","url":null,"abstract":"The error recovery algorithm in TCP has been designed for congestion control in wired networks. However, the packet losses in wireless networks are mostly caused by outages due to connection interruptions such as fading, channel preemptions, and handoffs. We investigate the performance of two TCP implementations in mobile computing environments. We consider simplified versions of two TCP implementations (referred to as Protocol I & II). Protocol I is a variation of the TCP Tahoe which uses a fine-grained timer. Protocol II is a simplified version of the TCP Vegas. We first describe an interesting observed phenomena with these two timer-based protocols when the wireless channel is periodically taken away from the end/end connections. Next, we show the robustness of Protocol II and quantify its improvement over Protocol I in terms of achievable goodputs. We also discuss better goodputs can be achieved by setting the RTO differently to account for a higher variability in delays caused by the wireless channel. Finally, we describe how a bigger TCP segment size helps to improve goodputs when these TCP segments are transported over the wireless channel.","PeriodicalId":152724,"journal":{"name":"Proceedings of GLOBECOM '95","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132370190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capture effect in residential Ethernet LAN","authors":"S. Deng","doi":"10.1109/GLOCOM.1995.502696","DOIUrl":"https://doi.org/10.1109/GLOCOM.1995.502696","url":null,"abstract":"A residential local area network (LAN) will be needed to connect all the home intelligent appliances, including set-top boxes and personal computers (PCs), to the information superhighway as well as to inter-connect them inside the home. Ethernet is the most promising candidate due to its low cost and vast installed base. It, however, is also known as having a capture effect which refers to the phenomena that the losing node in a collision is more likely to loose again, thereby causing long delay variations and disruption of a constant bit-rate (CBR) video stream for an extended period of time. This paper examines the impact of the Ethernet capture effect on video services in a residential environment. Actual PC data traffic was used in a simulation to investigate the impact of jitter caused by the capture effect on video traffic. The results indicate that capture effect rarely occurs in an actual residential, or small business Ethernet LAN, and is likely to occur only when PC performance has improved in the future. The frequencies and duration of the captures are also characterized. The resultant video packet jitter can be removed by a simple playout buffer. The findings suggest that Ethernet can meet the performance requirement of residential network at a very low cost.","PeriodicalId":152724,"journal":{"name":"Proceedings of GLOBECOM '95","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133562369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}