Showing papers in "Computer Networks in 1989"
•
TL;DR: In this article, it is shown that a simple additive increase and multiplicative decrease algorithm satisfies the sufficient conditions for con- vergence to an efficient and fair state regardless of the starting state of the network.
1,757 citations
•
TL;DR: SDL has been used in a variety of fields, including data communication protocol specification as mentioned in this paper, and it has been recommended by CCITT in 1987, as it has the ability to describe the functional behaviour of telecommunication systems.
300 citations
•
TL;DR: This paper surveys recent developments in conformance testing and includes four important aspects of protocol testing: test architectures, test sequence selection techniques, conformance test suites for various protocols, and protocol test theory.
48 citations
•
TL;DR: That's it, a book to wait for in this month; even you have wanted for long time for releasing this book security mechanisms for computer networks; you may not be able to get in some stress, but now, the authors are coming to give you excellent solution.
33 citations
•
TL;DR: In this article, the authors present a framework for the realization of the ferry clip in protocol testing, which has been developed through experience gained in the design and implementation of prototype ferry clip test systems.
24 citations
•
TL;DR: Some tree LANs that use collision avoidance switches are described, which have the potential of combining the benefits of random access with concurrency of transmission and excellent network utilization in random access LANs.
13 citations
•
TL;DR: It is demonstrated that not only multimedia mail, but all sorts of multimedia communications will develop, with requirements that the current narrow band ISDN will not be in a position to fulfill.
9 citations
•
6 citations
•
TL;DR: In this paper, a distributed algorithm that permits a new user to select his own name and, through communication with a name-server node, to ensure that his name is unique throughout the network is presented.
5 citations
•
TL;DR: The X.75' protocol as mentioned in this paper is based on the 1984 version of CCITT Recommendation X, but supports specific parameter values and capabilities that were considered to be optional in the Recommendation.
3 citations
•
TL;DR: In this article, a distributed algorithm for the dynamic computation of minimum-hop paths in a computer network is presented, where each node maintains the successor (next hop) and shortest distance in number of hops of the paths to each network destination.
•
TL;DR: In this article, a functional architecture for interconnecting the four component systems of an ISDN system, namely the systems of users, information providers, gateway service providers and information servers, is proposed.
•
TL;DR: In this paper, a new network design algorithm called NABLE (Network constructing algorithm based on link significance evaluation) is proposed for constructing future telecommunications networks, which first synthetically creates a backbone network by utilizing a newly proposed concept named "link significance evaluation" and then adds other links to the backbone network.
•
TL;DR: Analytical results on the throughput and mean packet transfer delay of a slotted, non-persistent Segnet are obtained and are shown to agree well with the simulation results.
•
TL;DR: The ISO Development Environment (ISODE) is an openly available implementation of the upper layers of OSI and a number of applications which make use of this.
•
TL;DR: In this paper, the authors present the latest progress of CCITT work on the International Numbering Plan for Public Data Networks and related activities and the rationale for modifications and future requirements are addressed.
•
TL;DR: The philosophy of NTT's network evolution including the essential INS concept is presented, and the major two directions toward INS; network digitalization and network operations system enhancement are presented.
•
TL;DR: A hybrid switching system which provides integrated packet and circuit switching is considered, and the effect of circuit loading on the effective capacity utilized by the isochronous traffic which in turn determines the packet capacity.
•
TL;DR: This paper analyzes the maximum stable throughput of two Q -ary blocked access tree algorithms with mini-slots: one (TA/M-BF) assumes that something/nothing binary feedback information is available in a mini-slot, and the other (TA-M-TF) assumes ternary feedback information in amini-slot.
•
TL;DR: The ultimate goal of the IIF for research and development is to provide Open Systems compatibility with the European systems for the authors' users.
•
TL;DR: A buffer allocation algorithm that allocates buffers as a function of the estimated queue length for (user-defined) categories of traffic, thereby ensuring fair behaviour on its part for use in a transport level protocol.
•
TL;DR: This paper describes an experimental project to investigate and prove the feasibility of low-cost software-based encryption suitable for local area networks.
•
IBM1
TL;DR: In this paper, the authors discuss the kinds of threats to security that such programs represent, and suggest some reasonable actions that computer and network users and owners can take to help minimize the risks.
•
TL;DR: The design and implementation of a virtual terminal protocol, that is, the Basic Class VTP defined by International Standard Organization (ISO), is described and the mapping between terminal type specific I/O and the VT abstract operations is compared.
•
TL;DR: A route-definition procedure is considered in which all consequences of a route selection are computed before the next selection is allowed, and an interactive, incremental route definition program is briefly described.