Default Cover Image

[1989] Proceedings. 14th Conference on Local Computer Networks

Oct. 10 1989 to Oct. 12 1989

Mineapolis, MN, USA

Table of Contents

Fiber distributed data interface-an overviewFull-text access may be available. Sign in or learn about subscription options.pp. 5,6,7,8
Standards and the local computing network: future directionsFull-text access may be available. Sign in or learn about subscription options.pp. 9,10,11
FDDI ring managementFull-text access may be available. Sign in or learn about subscription options.pp. 18,19,20,21,22,23
The role of concentrators in FDDI ringsFull-text access may be available. Sign in or learn about subscription options.pp. 24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40
FDDI MAC services design considerationsFull-text access may be available. Sign in or learn about subscription options.pp. 41,42,43,44,45,46,47,48
FDDI-II operation and architecturesFull-text access may be available. Sign in or learn about subscription options.pp. 49,50,51,52,53,54,55,56,57,58,59,60,61
Management of sampled real-time network measurementsFull-text access may be available. Sign in or learn about subscription options.pp. 62,63,64,65,66,67,68
A testbed for token ring networksFull-text access may be available. Sign in or learn about subscription options.pp. 69,70,71,72,73,74,75,76
Using multicast communication for dynamic load balancing in local area networksFull-text access may be available. Sign in or learn about subscription options.pp. 77,78,79,80,81,82,83,84
Performance analysis of a LAN based remote terminal protocolFull-text access may be available. Sign in or learn about subscription options.pp. 85,86,87,88,89,90,91,92,93,94,95,96,97
LAN cabling design for the new BLS buildingFull-text access may be available. Sign in or learn about subscription options.pp. 98,99,100,101
Manageability-a prime consideration in internetwork designFull-text access may be available. Sign in or learn about subscription options.pp. 102,103,104,105
A graphical representation for network managementFull-text access may be available. Sign in or learn about subscription options.pp. 106,107,108,109,110,111,112,113,114,115,116,117,118,119,120,121,122,123,124
A behavior model for the management of application services in manufacturingFull-text access may be available. Sign in or learn about subscription options.pp. 125,126,127,128,129
An RS-232-C local area networkFull-text access may be available. Sign in or learn about subscription options.pp. 130,131,132
Standards for robust second generation LAN managementFull-text access may be available. Sign in or learn about subscription options.pp. 133,134,135,136,137,138,139,140,141,142
Network management on Hughes Aircraft's engineering design networkFull-text access may be available. Sign in or learn about subscription options.pp. 143,144,145,146,147,148,149
LAN management technologyFull-text access may be available. Sign in or learn about subscription options.pp. 150,151,152,153,154,155
Internet network management using the simple network management protocolFull-text access may be available. Sign in or learn about subscription options.pp. 156,157,158,159
Fairness issues of the DQDB protocolFull-text access may be available. Sign in or learn about subscription options.pp. 160,161,162,163,164,165,166,167,168,169,170
Analysis on access fairness and a technique to extend distance for 802.6Full-text access may be available. Sign in or learn about subscription options.pp. 171,172,173,174,175,176
IEEE project 802.6 updateFull-text access may be available. Sign in or learn about subscription options.pp. 177,178,179
A fair distributed queue dual bus access methodFull-text access may be available. Sign in or learn about subscription options.pp. 180,181,182,183,184,185,186,187,188
Broadband ISDN protocols and interface structuresFull-text access may be available. Sign in or learn about subscription options.pp. 189,190,191,192,193,194,195
Local area networks based on fiber optic technologyFull-text access may be available. Sign in or learn about subscription options.pp. 196,197,198,199,200,201
Efficient information dissemination in computer networksFull-text access may be available. Sign in or learn about subscription options.pp. 202,203,204,205,206,207,208,209,210,211
A protocol for program migrationFull-text access may be available. Sign in or learn about subscription options.pp. 219,220,221,222,223,224
OSI application layer standards analysis for a distributed application implementationFull-text access may be available. Sign in or learn about subscription options.pp. 225,226,227,228,229,230,231,232,233
Task allocation schemes for response-time improvement in an educational LANFull-text access may be available. Sign in or learn about subscription options.pp. 234,235,236,237,238,239,240,241
Reliable client-server communication in distributed programsFull-text access may be available. Sign in or learn about subscription options.pp. 242,243,244,245,246,247,248,249,250,251
A simple table-free distributed routing algorithm for 802.6Full-text access may be available. Sign in or learn about subscription options.pp. 252,253,254,255,256,257,258,259
On the graceful degradation of routing given insufficient resourcesFull-text access may be available. Sign in or learn about subscription options.pp. 260,261,262,263,264,265,266,267,268,269
Integrated routing (and bridging)Full-text access may be available. Sign in or learn about subscription options.pp. 270,271,272,273,274,275,276,277
Building multi-way gateways for local area networksFull-text access may be available. Sign in or learn about subscription options.pp. 278,279,280,281,282,283,284
Multiple crossbar network-a switched high speed local networkFull-text access may be available. Sign in or learn about subscription options.pp. 285,286,287,288,289,290,291,292
Gigabit LAN signaling techniquesFull-text access may be available. Sign in or learn about subscription options.pp. 293,294,295,296,297,298
The multiple crossbar network interfaceFull-text access may be available. Sign in or learn about subscription options.pp. 299,300,301,302,303,304,305,306
Performance measurements of a communication protocol implemented for distributed real-time systemsFull-text access may be available. Sign in or learn about subscription options.pp. 307,308,309,310,311,312,313,314
Dynamic transport-level connection management in a distributed systemFull-text access may be available. Sign in or learn about subscription options.pp. 315,316,317,318,319,320,321,322
Measured Ethernet performance for multiple large file transfersFull-text access may be available. Sign in or learn about subscription options.pp. 323,324,325,326,327
Performance analysis of FDDIFull-text access may be available. Sign in or learn about subscription options.pp. 328,329,330,331,332
Communications for the NASA space stationFull-text access may be available. Sign in or learn about subscription options.pp. 333,334,335,336,337,338,339
SAFENET-a LAN for Navy mission critical systemsFull-text access may be available. Sign in or learn about subscription options.pp. 340,341,342,343,344,345,346
The FDDI link error rate monitorFull-text access may be available. Sign in or learn about subscription options.pp. 347,348,349,350,351,352,353,354,355,356,357
A network architecture for advanced aircraftFull-text access may be available. Sign in or learn about subscription options.pp. 358,359,360,361,362,363,364
An argument for judicious use of error detection mechanisms in LANsFull-text access may be available. Sign in or learn about subscription options.pp. 365,366,367,368,369,370,371,372,373,374,375
A general performance modeling technique for degradable computer communication networks with blockingFull-text access may be available. Sign in or learn about subscription options.pp. 376,377,378,379,380,381,382
An availability model for distributed computing environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 383,384,385,386,387,388,389,390,391,392
The coming of a savior?-network management with OSI and POSIXFull-text access may be available. Sign in or learn about subscription options.pp. 393,394,395,396,397,398
The Delta-t transport protocol: features and experienceFull-text access may be available. Sign in or learn about subscription options.pp. 399,400,401,402,403,404,405,406,407
The Xpress transfer protocolFull-text access may be available. Sign in or learn about subscription options.pp. 408,409,410,411,412,413,414
An overview of the VMTP transport protocolFull-text access may be available. Sign in or learn about subscription options.pp. 415,416,417,418,419,420
An orientation for production quality networksFull-text access may be available. Sign in or learn about subscription options.pp. 421,422,423,424,425
Performance of PLAYTHROUGH rings with mixed types of trafficFull-text access may be available. Sign in or learn about subscription options.pp. 426,427,428,429,430,431,432,433,434
Functional availability of computer communications networksFull-text access may be available. Sign in or learn about subscription options.pp. 435,436,437,438,439,440,441,442
Local network interconnection schemes and their availability analysisFull-text access may be available. Sign in or learn about subscription options.pp. 443,444,445,446,447,448,449,450,451,452,453,454,455
Showing 58 out of 58