Default Cover Image

[1992] Proceedings 17th Conference on Local Computer Networks

Sept. 13 1992 to Sept. 16 1992

Minneapolis, MN, USA

Table of Contents

Real-time communication in DQDB-a comparison of difference strategiesFull-text access may be available. Sign in or learn about subscription options.pp. 446,447,448,449,450,451,452,453
A network level fractional channel to support guaranteed real-time communicationFull-text access may be available. Sign in or learn about subscription options.pp. 436,437,438,439,440,441,442,443,444,445
Performance of multiple-ring networks for real-time communicationsFull-text access may be available. Sign in or learn about subscription options.pp. 426,427,428,429,430,431,432,433,434,435
Real-time communication in local area ring networksFull-text access may be available. Sign in or learn about subscription options.pp. 416,417,418,419,420,421,422,423,424,425
Neural brouter for network interconnections: MS-net interconnects DQDB-netsFull-text access may be available. Sign in or learn about subscription options.pp. 404,405,406,407,408,409,410,411,412,413
Hierarchical message dissemination in very large WANsFull-text access may be available. Sign in or learn about subscription options.pp. 397,398,399,400,401,402,403
Analysis of the optimality of a multi-level bandwidth-negotiation algorithm for FDDI interconnection across B-ISDNFull-text access may be available. Sign in or learn about subscription options.pp. 387,388,389,390,391,392,393,394,395,396
A large engineering network architectureFull-text access may be available. Sign in or learn about subscription options.pp. 380,381,382,383,384,385,386
Broadcasting and personalized communication in a torus and grid networkFull-text access may be available. Sign in or learn about subscription options.pp. 371,372,373,374,375,376,377,378
A link state routing algorithm for the configuration of interconnected HIPPI switchesFull-text access may be available. Sign in or learn about subscription options.pp. 361,362,363,364,365,366,367,368,369,370
Building a practical HIPPI LANFull-text access may be available. Sign in or learn about subscription options.pp. 355,356,357,358,359,360
HIPPI (high performance parallel interface)Full-text access may be available. Sign in or learn about subscription options.pp. 346,347,348,349,350,351,352,353,354
A parallel router architecture for high speed LAN internetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 335,336,337,338,339,340,341,342,343,344
Sensitivity of the objective functions for joint flow control and optimal routing in computer networksFull-text access may be available. Sign in or learn about subscription options.pp. 326,327,328,329,330,331,332,333,334
Effects of excessive frame loss on scanning tree reconfigurationFull-text access may be available. Sign in or learn about subscription options.pp. 319,320,321,322,323,324,325
Hub routing versus distributed routingFull-text access may be available. Sign in or learn about subscription options.pp. 312,313,314,315,316,317,318
Practical SMDS demonstrationsFull-text access may be available. Sign in or learn about subscription options.pp. 300,301,302,303,304,305,306,307,308,309
A demonstration of SMDS customer network management featuresFull-text access may be available. Sign in or learn about subscription options.pp. 292,293,294,295,296,297,298,299
LAN interconnection experiments over a cross country switched multi-megabit data service networkFull-text access may be available. Sign in or learn about subscription options.pp. 284,285,286,287,288,289,290,291
3M/US West SMDS trialFull-text access may be available. Sign in or learn about subscription options.pp. 274,275,276,277,278,279,280,281,282,283
The new high-speed digital signatureFull-text access may be available. Sign in or learn about subscription options.pp. 262,263,264,265,266,267,268,269,270,271
A cryptographic protocol to obtain secure communications in extended Ethernet environmentFull-text access may be available. Sign in or learn about subscription options.pp. 254,255,256,257,258,259,260,261
LRU-based replication strategies in a LAN remote caching architectureFull-text access may be available. Sign in or learn about subscription options.pp. 244,245,246,247,248,249,250,251,252,253
An integrated system of modelling, analysis and simulation for real-time networksFull-text access may be available. Sign in or learn about subscription options.pp. 231,232,233,234,235,236,237,238,239,240
Design, implementation and measurement of a collision avoidance multiple broadcast tree networkFull-text access may be available. Sign in or learn about subscription options.pp. 218,219,220,221,222,223,224,225,226,227,228,229,230
Probabilistic model for quality of service modelling in packet-switched data networksFull-text access may be available. Sign in or learn about subscription options.pp. 698,699,700,701,702,703,704,705,706,707,708
WDM passive star networks: receiver collisions avoidance algorithms using multifeedback learning automataFull-text access may be available. Sign in or learn about subscription options.pp. 688,689,690,691,692,693,694,695,696,697
A parallel processing paradigm for wavelength division multiplexed networksFull-text access may be available. Sign in or learn about subscription options.pp. 679,680,681,682,683,684,685,686,687
Addressing modes and management protocols in a gigabit LAN with switching tablesFull-text access may be available. Sign in or learn about subscription options.pp. 669,670,671,672,673,674,675,676,677,678
Towards a gigabit FDDIFull-text access may be available. Sign in or learn about subscription options.pp. 660,661,662,663,664,665,666,667,668
An analysis and simulation of multiple ring token networksFull-text access may be available. Sign in or learn about subscription options.pp. 649,650,651,652,653,654,655,656,657
A partial-destination-release strategy for the multi-token ring protocolFull-text access may be available. Sign in or learn about subscription options.pp. 639,640,641,642,643,644,645,646,647,648
Parallel channel token ring local area networksFull-text access may be available. Sign in or learn about subscription options.pp. 634,635,636,637,638
Modeling and analysis of high speed parallel token ring networksFull-text access may be available. Sign in or learn about subscription options.pp. 624,625,626,627,628,629,630,631,632,633
RIB: a register insertion bus fiber optical local area networkFull-text access may be available. Sign in or learn about subscription options.pp. 612,613,614,615,616,617,618,619,620,621
A car control system exploiting FieldBus DLL protocol featuresFull-text access may be available. Sign in or learn about subscription options.pp. 603,604,605,606,607,608,609,610,611
A class of MAC protocols for sharing ATM local access PONsFull-text access may be available. Sign in or learn about subscription options.pp. 594,595,596,597,598,599,600,601,602
Experience with an XTP implementation for embedded systemsFull-text access may be available. Sign in or learn about subscription options.pp. 586,587,588,589,590,591,592
Analysis of TCP/IP for high performance parallel implementationsFull-text access may be available. Sign in or learn about subscription options.pp. 576,577,578,579,580,581,582,583,584,585
On performance measurements of TCP/IP and its device driverFull-text access may be available. Sign in or learn about subscription options.pp. 568,569,570,571,572,573,574,575
Multiple protocol network integration: a case study in internetworking with IP/IPXFull-text access may be available. Sign in or learn about subscription options.pp. 560,561,562,563,564,565,566,567
Advances in hard real-time communication with local area networksFull-text access may be available. Sign in or learn about subscription options.pp. 548,549,550,551,552,553,554,555,556,557
A method for isochronous traffic in a WDM star networkFull-text access may be available. Sign in or learn about subscription options.pp. 541,542,543,544,545,546,547
An integrated video/voice/data protocol using distributed priority changeFull-text access may be available. Sign in or learn about subscription options.pp. 532,533,534,535,536,537,538,539,540
Issues in video transmission over broadband ATM networksFull-text access may be available. Sign in or learn about subscription options.pp. 526,527,528,529,530,531
Design of a protocol controller for wireless information networksFull-text access may be available. Sign in or learn about subscription options.pp. 519,520,521,522,523,524
A computer graphics package for indoor radio channel simulation using a 2D ray tracing algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 511,512,513,514,515,516,517,518
Infrared wireless system for high speed RS-232/RS-423/RS-422 communicationsFull-text access may be available. Sign in or learn about subscription options.pp. 505,506,507,508,509,510
IEEE-488.2 communications by infrared wireless linkFull-text access may be available. Sign in or learn about subscription options.pp. 500,501,502,503,504
Measured performance of a wireless LANFull-text access may be available. Sign in or learn about subscription options.pp. 494,495,496,497,498,499
Design and evaluation of real-time communication for FieldBus based manufacturing systemsFull-text access may be available. Sign in or learn about subscription options.pp. 483,484,485,486,487,488,489,490,491,492
Throughput analysis of timed token protocols in double ring networksFull-text access may be available. Sign in or learn about subscription options.pp. 473,474,475,476,477,478,479,480,481,482
CIMNET: a prototype network for time critical applications in the factoryFull-text access may be available. Sign in or learn about subscription options.pp. 466,467,468,469,470,471,472
Digitized voice distribution using XTP and FDDIFull-text access may be available. Sign in or learn about subscription options.pp. 456,457,458,459,460,461,462,463,464,465
Analysis of a local computer network with workstations and X terminalsFull-text access may be available. Sign in or learn about subscription options.pp. 206,207,208,209,210,211,212,213,214,215
Performance and traffic characterization of a class of graphics-intensive X-applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 198,199,200,201,202,203,204,205
High level traffic analysis of a LAN segmentFull-text access may be available. Sign in or learn about subscription options.pp. 188,189,190,191,192,193,194,195,196,197
Approaches for survivability in FDDI networksFull-text access may be available. Sign in or learn about subscription options.pp. 178,179,180,181,182,183,184,185
Alternate path FDDI topologyFull-text access may be available. Sign in or learn about subscription options.pp. 168,169,170,171,172,173,174,175,176,177
A reliability analysis of failsoft FDDI networksFull-text access may be available. Sign in or learn about subscription options.pp. 158,159,160,161,162,163,164,165,166,167
A bandwidth-efficient encoding scheme for high-speed data transmission on Category 3 cableFull-text access may be available. Sign in or learn about subscription options.pp. 152,153,154,155,156
Throughput and delay analysis of FDDI and FDDI-II under mixed trafficFull-text access may be available. Sign in or learn about subscription options.pp. 142,143,144,145,146,147,148,149,150,151
A multichannel extension of the fiber distributed data interface (FDDI) using tunable-channel accessFull-text access may be available. Sign in or learn about subscription options.pp. 139,140,141
Graceful insertion and removal approaches for FDDI-IIFull-text access may be available. Sign in or learn about subscription options.pp. 134,135,136,137,138
Dual MAC usage in FDDIFull-text access may be available. Sign in or learn about subscription options.pp. 125,126,127,128,129,130,131,132
Multimedia over FDDIFull-text access may be available. Sign in or learn about subscription options.pp. 110,111,112,113,114,115,116,117,118,119,120,121,122,123,124
Isochronous versus synchronous traffic in FDDIFull-text access may be available. Sign in or learn about subscription options.pp. 100,101,102,103,104,105,106,107,108,109
3M's FDDI infrastructure design and deploymentFull-text access may be available. Sign in or learn about subscription options.pp. 90,91,92,93,94,95,96,97,98,99
The adaptive threshold algorithm: a bandwidth allocation mechanism with fast response time for DQDBFull-text access may be available. Sign in or learn about subscription options.pp. 80,81,82,83,84,85,86,87,88
A modified QA (queued arbitrated) protocol for improving performances in DQDB MANFull-text access may be available. Sign in or learn about subscription options.pp. 70,71,72,73,74,75,76,77,78,79
A general architecture for services management in a DQDB MANFull-text access may be available. Sign in or learn about subscription options.pp. 62,63,64,65,66,67,68,69
A queueing model for a data station within the IEEE 802.6 MANFull-text access may be available. Sign in or learn about subscription options.pp. 52,53,54,55,56,57,58,59,60,61
Performance analysis of ATM/DQDB interworkingFull-text access may be available. Sign in or learn about subscription options.pp. 42,43,44,45,46,47,48,49
B-ISDN customer network management frameworkFull-text access may be available. Sign in or learn about subscription options.pp. 36,37,38,39,40,41
The concept of fairness and a GFC protocolFull-text access may be available. Sign in or learn about subscription options.pp. 30,31,32,33,34,35
An effective bit rate/table lookup based admission control algorithm for the ATM B-ISDNFull-text access may be available. Sign in or learn about subscription options.pp. 20,21,22,23,24,25,26,27,28,29
Some lessons learned from the practical experience using MANsFull-text access may be available. Sign in or learn about subscription options.pp. 14,15,16,17
Bell Atlantic and SMDS applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 8,9,10,11,12,13
DQDB, SMDS, B-ISDN and MANFull-text access may be available. Sign in or learn about subscription options.pp. 2,3,4,5,6,7
Showing 80 out of 80