Showing papers in "Computer Networks in 1981"
••
TL;DR: The Draft Guidelines for the Security of Information Systems and Networks and the Recommendation of the Council on Regulatory Policy and Governance are presented.
378 citations
••
TL;DR: An overview of the Internet Protocol and the operation of the gateway computers in the ARPA internet system is presented.
106 citations
••
TL;DR: The bounding of maximum packet lifetime and related parameters is important for achieving transport protocol reliability and a mechanism is outlined for enforcing such a bound.
88 citations
••
PARC1
TL;DR: Violet as mentioned in this paper is an experimental decentralized information system that allows the creation of decentralized applications by hiding the application's decentralized environment, such as a calendar system and a relational database manager.
26 citations
••
TL;DR: This paper proposes priority schemes appropriate for introduction into different architectures of local multiaccess communication systems to achieve these desired results.
26 citations
••
TL;DR: The basic characteristics of the functional entities are outlined, as well as their relation to authority boundaries and computer system boundaries, and it is shown that the services of the system can be classified into three distinct categories, each of which can be treated individually.
14 citations
••
TL;DR: The notion of mutual encapsulation is explored; as an example, the coexistence of the Xerox internet environment with the Arpa internet environment is considered; each of these systems is composed of several individual networks with a variety of protocols and performance parameters; but with Mutual encapsulation each can make use of the capabilities of the other.
14 citations
••
TL;DR: It is shown that the Reference Model for the communication of Open Systems uses a variety of structuring elements, such as system, service, layer, and protocol without really defining them, but that the communication architecture has a very strong inner consistency.
13 citations
••
TL;DR: It is concluded that in the near future there are valid technical and non-technical reasons for adding data traffic to the office voice networks, and that the combined network should be based on a star topology.
10 citations
••
10 citations
••
IBM1
TL;DR: Views are provided on the applications environment of the eighties for computer/communications systems, and some of the technical challenges it represents, and the need for network management tools will become even more critical.
••
TL;DR: In this paper, the problem of controlling data exchange in computer networks with respect to real, in particular stochastic, interferences, and user's requirements, expressed by performance criteria, is discussed.
••
TL;DR: A set of taxonomies designed to overcome the lack of a language by which the needs of white collar users could be expressed in terms meaningful to both behavioral researchers and software and hardware developers are presented.
••
TL;DR: It is shown that it is very important to use the three-dimensional X−Y−Z space by adding the Z-axis in order to represent the human factor and it is described that software will play a very important role in the creation of an ‘M & C & C’ society.
••
TL;DR: This paper proposes a reference model for the architecture of integrated office systems, and the set of protocols that rule the interworking between the different entities (logical and physical), inspired from the Open System Architecture Reference Model developed in ISO.
••
TL;DR: Is the term Open Systems a catchword of futurologists or a keyword of new technology?
••
[...]
TL;DR: Today, the cost of a typical electronic message system (EMS) is uncomfortably high, but EMS should soon become cost-competitive with postal delivery, thanks to three main factors: the use of local computers for most interactive work, theuse of low-cost terminals, and falling computer hardware prices.
••
TL;DR: A first approach allowing to evaluate the performance of a computer network with virtual circuits by developing several models allowing to compute analytically the response time and the stability conditions of this type of computer networks.
••
••
TL;DR: This paper is an attempt to put at least parts of office automation on a rigorous academic footing.
••
TL;DR: The results obtained demonstrate that the application of the above methods improves solutions derived by means of conventional heuristic procedures and brings such solutions closer to optimum ones.
••
••
TL;DR: Questions discussed include access to data, transborder data flows, employment and environmental changes possible, political effects, implementation problems and Government regulatory policies, and whether the authors live too close together for comfort.
••
TL;DR: The 1980's can be expected to experience a profound transformation in information technology and information services, which confer a series of critical strategic options upon the public and the private sector in the United States.