{"title":"TWDM multihop lightwave networks based on rotator digraphs","authors":"P. Wan","doi":"10.1109/ICCCN.1997.623306","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623306","url":null,"abstract":"The time and wavelength division multiplexed (TWDM) access protocol is one of the most promising ways to exploit the enormous bandwidth in a single-mode optical fiber. We focus on constructing scalable TWDM networks based on rotator digraphs. To make the network be more economically and technically feasible and to improve the network performance, each station is equipped with multiple fixed transmitters and multiple fixed receivers. For such a network architecture, we present the optimal wavelength assignment and transmission schedule. We also study the cost performance relation and provide a scheme to support a large network site with multiple passive star couplers.","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130553522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient admission control for EDF scheduler with statistical QoS guarantee","authors":"Yinggang Xie, Tao Yang","doi":"10.1109/ICCCN.1997.623319","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623319","url":null,"abstract":"We study the admission control problem at an earliest deadline first (EDF) link scheduler where multiple quality of service (QoS) requirements are supported statistically. It is shown that, if the aggregate QoS requirement of the aggregate traffic is guaranteed, the individual QoS requirements can also be guaranteed using an optimal discarding policy when the traffic flows are equally demanding. Therefore the problem is reduced to one with single traffic stream and a single QoS requirement. We adopt the stationary Gaussian approximation method and present a simple formula, referred to as the weighted Gaussian method, to estimate the minimum bandwidth requirement. Efficient admission control algorithms can be readily constructed based on the weighted Gaussian method. Numerical results are presented to show its advantages and limitations.","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132137492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliability of Internet hosts: a case study from the end user's perspective","authors":"Mahesh Kalyanakrishnan, R. Iyer, J. U. Patel","doi":"10.1109/ICCCN.1997.623345","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623345","url":null,"abstract":"This paper presents the results of a 40-day reliability study on a set of 97 popular Web sites done from an end user's perspective. Data for the study was acquired by periodically attempting to fetch an HTML file from each Web site and recording the outcome of such attempts. Analysis of the acquired data revealed: (i) 94% of the HTML file fetch requests succeed on average; (ii) most failures last less than 15 minutes; (iii) the underlying network plays a dominant role in determining host accessibility: (a) network related-outages account for a major part of the failures, (b) some network-related outages rendered more than 70% of the hosts inaccessible, and (c) host-related failures tend to be shorter than failures that might involve the network; (vi) the network connectivity is high on the average with 93% of the sites being accessible at any given time; and (vii) the mean availability of the hosts is high (0.993).","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133421838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault tolerance of PCS mobility databases","authors":"S. Chen, Ming-Feng Chang, Yi-Bing Lin","doi":"10.1109/ICCCN.1997.623365","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623365","url":null,"abstract":"A personal communications services (PCS) network system constantly tracks the locations of the mobile stations (MS) so that incoming calls can be delivered to the target mobile stations. The overall architecture of the PCS mobility management in GSM is presented. In general, a two-level database is used to store the mobile station location information. The mobile station location update procedure and the call delivery procedure are described in detail. In case of location database failure, incoming calls may be lost. The database failure restoration procedure to reduce the number of lost calls in GSM are also described. Moreover, an efficient home location register (HLR) failure recovery procedure which utilizes the MS movement information to speedup the recovery procedure is also presented.","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133591565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New error recovery structures for reliable multicasting","authors":"Lifan Gu, J. Garcia-Luna-Aceves","doi":"10.1109/ICCCN.1997.623312","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623312","url":null,"abstract":"To reduce or eliminate the implosion of acknowledgments at the source of a very large multicast group, current reliable multicast protocols either organize the receivers of a group into a tree or ring, or implement negative acknowledgment (NAK) avoidance algorithms based on random timers. All of these approaches have their limitations and advantages. We present a ring-based reliable multicast protocol, called the evenly-loaded ring protocol (ELRP) which removes processing bursts from nodes in the ring. ELRP achieves throughputs as good as those obtained with tree-based protocols and better than those of receiver-initiated protocols with NAK avoidance. We propose a deterministic NAK avoidance (DNKA) algorithm based on ELRP that performs better than the random NAK avoidance scheme (RNKA). Because tree structures are better suited than rings for wide areas involving paths with long delays, we propose the hybrid reliable multicast protocol (HRMP) which organizes receivers into a backbone acknowledgement tree that connects local areas. Any tree-based protocol with positive acknowledgement can be run in the backbone acknowledgement tree, and ELRP is run in the local areas. The maximum achievable throughput in HRMP is analyzed, which shows that it is completely scalable. The delay of DNKA and RNKA schemes are also analyzed which shows that compared with RNKA, DNKA reduces the retransmission delay significantly.","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115021499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pipelined transmission scheduling in all-optical TDM/WDM rings","authors":"Xijun Zhang, C. Qiao","doi":"10.1109/ICCCN.1997.623304","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623304","url":null,"abstract":"Two properties of optical transmissions, namely, unidirectional propagation and predictable propagation delay, make it possible to pipeline packet transmissions in all-optical networks. In this paper, we study the problem of scheduling all-to-all personalized communication (AAPC) in unidirectional TDM/WDM rings with pipelined transmissions, which can achieve a much higher bandwidth utilization than non-pipelined transmissions. For a given number of wavelengths, K, and number of transmitter-receiver pairs per node, T, the theoretical lower bound (TLB) on the schedule lengths is derived and scheduling methods which can achieve near optimal results are proposed for three different cases, namely, T=K, 2/spl les/T","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114709653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ATM network interface architectures for low latency","authors":"Patrik Sundström, Per Andersson","doi":"10.1109/ICCCN.1997.623357","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623357","url":null,"abstract":"There are many important factors to consider when designing a network interface for an ATM network, and different applications have different demands. This paper addresses the problem of making an ATM interface with the focus on very low message latency, e.g., for shared memory multiprocessors on top of a network of workstations, and yet making it general enough to be a cost effective solution. Different approaches to the interface are evaluated and an architecture where critical functions are distributed and performed in dedicated hardware, integrated with, or very close to, the processors, are proposed.","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122113266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An API for scalable reliable multicast","authors":"J. Gemmell, J. Liebeherr, D. Bassett","doi":"10.1109/ICCCN.1997.623291","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623291","url":null,"abstract":"There are many scenarios in which the same data must be delivered over a packet switched network to a large set of receivers. The Internet enables efficient multipoint transmissions through IP multicast by allowing data transmission to all receivers with a single send. Most approaches to scalable reliable multicast utilize receiver-oriented retransmissions. Defining an API for receiver-oriented reliable multicast is difficult because it is not clear how to manage the sender's cache and to schedule repairs. We outline an approach to defining an API based on logical cache persistence that addresses these problems. We also we explore the issues involved in defining an API for reliable multicast protocol on the Internet that can scale to millions of receivers.","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123806830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Chiussi, A. Arulambalam, Ye Xia, Xiaoqiang Chen
{"title":"Explicit rate ABR schemes using traffic load as congestion indicator","authors":"F. Chiussi, A. Arulambalam, Ye Xia, Xiaoqiang Chen","doi":"10.1109/ICCCN.1997.623294","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623294","url":null,"abstract":"A central issue in congestion control for available bit rate (ABR) services is the computation of the fair share for every connection at each switching node in the network. An important class of algorithms for the switch behavior computes the fair share according to the exact definition of max-min fairness, and uses it as the explicit rate conveyed to the sources. These algorithms may encounter difficulties due to the complex task of keeping track of active connections. In addition, since these schemes treat all connections equally, they lead to under-utilization of the link capacity when on-off sources are present in the network. To obviate these shortcomings, it has been proposed to use the traffic load to correct the computed fair share when setting the explicit rate. In this paper, first we show that using the traffic load as suggested in literature inherently perturbs rate allocation, and makes the schemes sensitive to the round-trip delay of the connections, leading to unfairness. Then, we introduce a scheme called the enhanced fast max-min rate allocation (E-FMMRA) algorithm, which solves the problem by keeping track of the maximum explicit rate over all backward RM cells. The same technique used in E-FMMRA can also be applied to the popular explicit rate indication for congestion avoidance (ERICA) scheme to solve similar problems associated with the use of the traffic load.","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124980604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A distributed algorithm of delay bounded multicast routing for multimedia applications","authors":"X. Jia","doi":"10.1109/ICCCN.1997.623314","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623314","url":null,"abstract":"The aim of multicast routing is to find a tree which is rooted from the source node and contains all the multicast destinations. A delay bounded routing tree, is a tree where the accumulated delay from the source node to any destination along the tree shall not exceed a pre-specified bound. This paper presents a distributed heuristic algorithm which generates routing trees with sub-optimal network cost under the delay bound constraint. The proposed algorithm is fully distributed, efficient in terms of the number of messages required, and flexible in multicast membership changes. A large amount of simulations have been done to show that the network cost of the routing trees generated by our algorithm is better than the major existing algorithms.","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130142503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}