scispace - formally typeset
J

Jeffrey T. Gullicksen

Researcher at Nortel

Publications -  20
Citations -  1306

Jeffrey T. Gullicksen is an academic researcher from Nortel. The author has contributed to research in topics: Communications system & Crossover switch. The author has an hindex of 12, co-authored 20 publications receiving 1299 citations. Previous affiliations of Jeffrey T. Gullicksen include Ciena.

Papers
More filters
Proceedings ArticleDOI

Chaotic communications in the presence of noise

TL;DR: By modulating data on the chaotic signal used to synchronize two nonlinear systems, this work has created a Low Probability of Intercept (LPI) communications system and derived the equations which govern the system.
Patent

Apparatus and method for optimizing congestion control information in a multi-protocol network

TL;DR: In this article, the benefits of Transport Control Protocol (TCP) over Available Bit Rate (ABR) Service of an Asynchronous Transfer Mode (ATM) network is extended to the entire TCP connection by intercepting and modifying TCP congestion control information in accordance with resource information associated with the TCP connection.
Patent

Methods and apparatus for accelerating osi layer 3 routers

TL;DR: In this paper, the authors describe a router accelerator with a forwarding table for associatively storing a destination address and a next hop address, and a request logic for requesting from the router a second-level next-hop address in response to the first-level last hop address.
Patent

Method and apparatus for interworking ATM adaptation layer formats

TL;DR: A plurality of voice-over-ATM modules operate in parallel and each processes at least one type of AAL as discussed by the authors, and the result is an interworking between ATM streams and different types of equipment.
Patent

Virtual line switched ring (vlsr) connection state distribution scheme

TL;DR: In this article, the authors propose a real-time dynamic updating of connection and topology information in real time, where each node is able to utilize this information to execute such operations as squelching connections on a protect line and timeslot interchange.