Proceedings of Sixth International Conference on Computer Communications and Networks最新文献

筛选
英文 中文
TWDM multihop lightwave networks based on rotator digraphs 基于旋转有向图的TWDM多跳光波网络
P. Wan
{"title":"TWDM multihop lightwave networks based on rotator digraphs","authors":"P. Wan","doi":"10.1109/ICCCN.1997.623306","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623306","url":null,"abstract":"The time and wavelength division multiplexed (TWDM) access protocol is one of the most promising ways to exploit the enormous bandwidth in a single-mode optical fiber. We focus on constructing scalable TWDM networks based on rotator digraphs. To make the network be more economically and technically feasible and to improve the network performance, each station is equipped with multiple fixed transmitters and multiple fixed receivers. For such a network architecture, we present the optimal wavelength assignment and transmission schedule. We also study the cost performance relation and provide a scheme to support a large network site with multiple passive star couplers.","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130553522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient admission control for EDF scheduler with statistical QoS guarantee 具有统计QoS保证的EDF调度程序的有效准入控制
Yinggang Xie, Tao Yang
{"title":"Efficient admission control for EDF scheduler with statistical QoS guarantee","authors":"Yinggang Xie, Tao Yang","doi":"10.1109/ICCCN.1997.623319","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623319","url":null,"abstract":"We study the admission control problem at an earliest deadline first (EDF) link scheduler where multiple quality of service (QoS) requirements are supported statistically. It is shown that, if the aggregate QoS requirement of the aggregate traffic is guaranteed, the individual QoS requirements can also be guaranteed using an optimal discarding policy when the traffic flows are equally demanding. Therefore the problem is reduced to one with single traffic stream and a single QoS requirement. We adopt the stationary Gaussian approximation method and present a simple formula, referred to as the weighted Gaussian method, to estimate the minimum bandwidth requirement. Efficient admission control algorithms can be readily constructed based on the weighted Gaussian method. Numerical results are presented to show its advantages and limitations.","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132137492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reliability of Internet hosts: a case study from the end user's perspective Internet主机的可靠性:从最终用户角度的案例研究
Mahesh Kalyanakrishnan, R. Iyer, J. U. Patel
{"title":"Reliability of Internet hosts: a case study from the end user's perspective","authors":"Mahesh Kalyanakrishnan, R. Iyer, J. U. Patel","doi":"10.1109/ICCCN.1997.623345","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623345","url":null,"abstract":"This paper presents the results of a 40-day reliability study on a set of 97 popular Web sites done from an end user's perspective. Data for the study was acquired by periodically attempting to fetch an HTML file from each Web site and recording the outcome of such attempts. Analysis of the acquired data revealed: (i) 94% of the HTML file fetch requests succeed on average; (ii) most failures last less than 15 minutes; (iii) the underlying network plays a dominant role in determining host accessibility: (a) network related-outages account for a major part of the failures, (b) some network-related outages rendered more than 70% of the hosts inaccessible, and (c) host-related failures tend to be shorter than failures that might involve the network; (vi) the network connectivity is high on the average with 93% of the sites being accessible at any given time; and (vii) the mean availability of the hosts is high (0.993).","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133421838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Fault tolerance of PCS mobility databases PCS移动数据库容错
S. Chen, Ming-Feng Chang, Yi-Bing Lin
{"title":"Fault tolerance of PCS mobility databases","authors":"S. Chen, Ming-Feng Chang, Yi-Bing Lin","doi":"10.1109/ICCCN.1997.623365","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623365","url":null,"abstract":"A personal communications services (PCS) network system constantly tracks the locations of the mobile stations (MS) so that incoming calls can be delivered to the target mobile stations. The overall architecture of the PCS mobility management in GSM is presented. In general, a two-level database is used to store the mobile station location information. The mobile station location update procedure and the call delivery procedure are described in detail. In case of location database failure, incoming calls may be lost. The database failure restoration procedure to reduce the number of lost calls in GSM are also described. Moreover, an efficient home location register (HLR) failure recovery procedure which utilizes the MS movement information to speedup the recovery procedure is also presented.","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133591565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New error recovery structures for reliable multicasting 新的可靠组播错误恢复结构
Lifan Gu, J. Garcia-Luna-Aceves
{"title":"New error recovery structures for reliable multicasting","authors":"Lifan Gu, J. Garcia-Luna-Aceves","doi":"10.1109/ICCCN.1997.623312","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623312","url":null,"abstract":"To reduce or eliminate the implosion of acknowledgments at the source of a very large multicast group, current reliable multicast protocols either organize the receivers of a group into a tree or ring, or implement negative acknowledgment (NAK) avoidance algorithms based on random timers. All of these approaches have their limitations and advantages. We present a ring-based reliable multicast protocol, called the evenly-loaded ring protocol (ELRP) which removes processing bursts from nodes in the ring. ELRP achieves throughputs as good as those obtained with tree-based protocols and better than those of receiver-initiated protocols with NAK avoidance. We propose a deterministic NAK avoidance (DNKA) algorithm based on ELRP that performs better than the random NAK avoidance scheme (RNKA). Because tree structures are better suited than rings for wide areas involving paths with long delays, we propose the hybrid reliable multicast protocol (HRMP) which organizes receivers into a backbone acknowledgement tree that connects local areas. Any tree-based protocol with positive acknowledgement can be run in the backbone acknowledgement tree, and ELRP is run in the local areas. The maximum achievable throughput in HRMP is analyzed, which shows that it is completely scalable. The delay of DNKA and RNKA schemes are also analyzed which shows that compared with RNKA, DNKA reduces the retransmission delay significantly.","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115021499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Pipelined transmission scheduling in all-optical TDM/WDM rings 全光TDM/WDM环中的流水线传输调度
Xijun Zhang, C. Qiao
{"title":"Pipelined transmission scheduling in all-optical TDM/WDM rings","authors":"Xijun Zhang, C. Qiao","doi":"10.1109/ICCCN.1997.623304","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623304","url":null,"abstract":"Two properties of optical transmissions, namely, unidirectional propagation and predictable propagation delay, make it possible to pipeline packet transmissions in all-optical networks. In this paper, we study the problem of scheduling all-to-all personalized communication (AAPC) in unidirectional TDM/WDM rings with pipelined transmissions, which can achieve a much higher bandwidth utilization than non-pipelined transmissions. For a given number of wavelengths, K, and number of transmitter-receiver pairs per node, T, the theoretical lower bound (TLB) on the schedule lengths is derived and scheduling methods which can achieve near optimal results are proposed for three different cases, namely, T=K, 2/spl les/T","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114709653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
ATM network interface architectures for low latency 用于低延迟的ATM网络接口架构
Patrik Sundström, Per Andersson
{"title":"ATM network interface architectures for low latency","authors":"Patrik Sundström, Per Andersson","doi":"10.1109/ICCCN.1997.623357","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623357","url":null,"abstract":"There are many important factors to consider when designing a network interface for an ATM network, and different applications have different demands. This paper addresses the problem of making an ATM interface with the focus on very low message latency, e.g., for shared memory multiprocessors on top of a network of workstations, and yet making it general enough to be a cost effective solution. Different approaches to the interface are evaluated and an architecture where critical functions are distributed and performed in dedicated hardware, integrated with, or very close to, the processors, are proposed.","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122113266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An API for scalable reliable multicast 可扩展的可靠多播API
J. Gemmell, J. Liebeherr, D. Bassett
{"title":"An API for scalable reliable multicast","authors":"J. Gemmell, J. Liebeherr, D. Bassett","doi":"10.1109/ICCCN.1997.623291","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623291","url":null,"abstract":"There are many scenarios in which the same data must be delivered over a packet switched network to a large set of receivers. The Internet enables efficient multipoint transmissions through IP multicast by allowing data transmission to all receivers with a single send. Most approaches to scalable reliable multicast utilize receiver-oriented retransmissions. Defining an API for receiver-oriented reliable multicast is difficult because it is not clear how to manage the sender's cache and to schedule repairs. We outline an approach to defining an API based on logical cache persistence that addresses these problems. We also we explore the issues involved in defining an API for reliable multicast protocol on the Internet that can scale to millions of receivers.","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123806830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Explicit rate ABR schemes using traffic load as congestion indicator 以流量负荷为拥塞指标的显式速率ABR方案
F. Chiussi, A. Arulambalam, Ye Xia, Xiaoqiang Chen
{"title":"Explicit rate ABR schemes using traffic load as congestion indicator","authors":"F. Chiussi, A. Arulambalam, Ye Xia, Xiaoqiang Chen","doi":"10.1109/ICCCN.1997.623294","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623294","url":null,"abstract":"A central issue in congestion control for available bit rate (ABR) services is the computation of the fair share for every connection at each switching node in the network. An important class of algorithms for the switch behavior computes the fair share according to the exact definition of max-min fairness, and uses it as the explicit rate conveyed to the sources. These algorithms may encounter difficulties due to the complex task of keeping track of active connections. In addition, since these schemes treat all connections equally, they lead to under-utilization of the link capacity when on-off sources are present in the network. To obviate these shortcomings, it has been proposed to use the traffic load to correct the computed fair share when setting the explicit rate. In this paper, first we show that using the traffic load as suggested in literature inherently perturbs rate allocation, and makes the schemes sensitive to the round-trip delay of the connections, leading to unfairness. Then, we introduce a scheme called the enhanced fast max-min rate allocation (E-FMMRA) algorithm, which solves the problem by keeping track of the maximum explicit rate over all backward RM cells. The same technique used in E-FMMRA can also be applied to the popular explicit rate indication for congestion avoidance (ERICA) scheme to solve similar problems associated with the use of the traffic load.","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124980604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A distributed algorithm of delay bounded multicast routing for multimedia applications 多媒体应用中时延有界多播路由的分布式算法
X. Jia
{"title":"A distributed algorithm of delay bounded multicast routing for multimedia applications","authors":"X. Jia","doi":"10.1109/ICCCN.1997.623314","DOIUrl":"https://doi.org/10.1109/ICCCN.1997.623314","url":null,"abstract":"The aim of multicast routing is to find a tree which is rooted from the source node and contains all the multicast destinations. A delay bounded routing tree, is a tree where the accumulated delay from the source node to any destination along the tree shall not exceed a pre-specified bound. This paper presents a distributed heuristic algorithm which generates routing trees with sub-optimal network cost under the delay bound constraint. The proposed algorithm is fully distributed, efficient in terms of the number of messages required, and flexible in multicast membership changes. A large amount of simulations have been done to show that the network cost of the routing trees generated by our algorithm is better than the major existing algorithms.","PeriodicalId":305733,"journal":{"name":"Proceedings of Sixth International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130142503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 167
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信