scispace - formally typeset
Search or ask a question

Showing papers in "Computer Networks in 1989"


Journal Article
TL;DR: In this article, it is shown that a simple additive increase and multiplicative decrease algorithm satisfies the sufficient conditions for con- vergence to an efficient and fair state regardless of the starting state of the network.

1,757 citations


Journal Article
TL;DR: SDL has been used in a variety of fields, including data communication protocol specification as mentioned in this paper, and it has been recommended by CCITT in 1987, as it has the ability to describe the functional behaviour of telecommunication systems.

300 citations


Journal Article
TL;DR: This paper surveys recent developments in conformance testing and includes four important aspects of protocol testing: test architectures, test sequence selection techniques, conformance test suites for various protocols, and protocol test theory.

48 citations


Journal Article
TL;DR: That's it, a book to wait for in this month; even you have wanted for long time for releasing this book security mechanisms for computer networks; you may not be able to get in some stress, but now, the authors are coming to give you excellent solution.

33 citations


Journal Article
TL;DR: In this article, the authors present a framework for the realization of the ferry clip in protocol testing, which has been developed through experience gained in the design and implementation of prototype ferry clip test systems.

24 citations


Journal Article
TL;DR: Some tree LANs that use collision avoidance switches are described, which have the potential of combining the benefits of random access with concurrency of transmission and excellent network utilization in random access LANs.

13 citations


Journal Article
TL;DR: It is demonstrated that not only multimedia mail, but all sorts of multimedia communications will develop, with requirements that the current narrow band ISDN will not be in a position to fulfill.

9 citations



Journal Article
TL;DR: In this paper, a distributed algorithm that permits a new user to select his own name and, through communication with a name-server node, to ensure that his name is unique throughout the network is presented.

5 citations


Journal Article
TL;DR: The X.75' protocol as mentioned in this paper is based on the 1984 version of CCITT Recommendation X, but supports specific parameter values and capabilities that were considered to be optional in the Recommendation.

3 citations


Journal Article
TL;DR: In this article, a distributed algorithm for the dynamic computation of minimum-hop paths in a computer network is presented, where each node maintains the successor (next hop) and shortest distance in number of hops of the paths to each network destination.

Journal Article
TL;DR: In this article, a functional architecture for interconnecting the four component systems of an ISDN system, namely the systems of users, information providers, gateway service providers and information servers, is proposed.

Journal Article
TL;DR: In this paper, a new network design algorithm called NABLE (Network constructing algorithm based on link significance evaluation) is proposed for constructing future telecommunications networks, which first synthetically creates a backbone network by utilizing a newly proposed concept named "link significance evaluation" and then adds other links to the backbone network.

Journal Article
TL;DR: Analytical results on the throughput and mean packet transfer delay of a slotted, non-persistent Segnet are obtained and are shown to agree well with the simulation results.


Journal Article
TL;DR: The ISO Development Environment (ISODE) is an openly available implementation of the upper layers of OSI and a number of applications which make use of this.

Journal Article
TL;DR: In this paper, the authors present the latest progress of CCITT work on the International Numbering Plan for Public Data Networks and related activities and the rationale for modifications and future requirements are addressed.

Journal Article
TL;DR: The philosophy of NTT's network evolution including the essential INS concept is presented, and the major two directions toward INS; network digitalization and network operations system enhancement are presented.

Journal Article
TL;DR: A hybrid switching system which provides integrated packet and circuit switching is considered, and the effect of circuit loading on the effective capacity utilized by the isochronous traffic which in turn determines the packet capacity.


Journal Article
TL;DR: This paper analyzes the maximum stable throughput of two Q -ary blocked access tree algorithms with mini-slots: one (TA/M-BF) assumes that something/nothing binary feedback information is available in a mini-slot, and the other (TA-M-TF) assumes ternary feedback information in amini-slot.

Journal Article
TL;DR: The ultimate goal of the IIF for research and development is to provide Open Systems compatibility with the European systems for the authors' users.

Journal Article
TL;DR: A buffer allocation algorithm that allocates buffers as a function of the estimated queue length for (user-defined) categories of traffic, thereby ensuring fair behaviour on its part for use in a transport level protocol.

Journal Article
TL;DR: This paper describes an experimental project to investigate and prove the feasibility of low-cost software-based encryption suitable for local area networks.

Journal Article
David M. Chess1
TL;DR: In this paper, the authors discuss the kinds of threats to security that such programs represent, and suggest some reasonable actions that computer and network users and owners can take to help minimize the risks.

Journal Article
TL;DR: The design and implementation of a virtual terminal protocol, that is, the Basic Class VTP defined by International Standard Organization (ISO), is described and the mapping between terminal type specific I/O and the VT abstract operations is compared.

Journal Article
TL;DR: A route-definition procedure is considered in which all consequences of a route selection are computed before the next selection is allowed, and an interactive, incremental route definition program is briefly described.