scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Network in 1987"


Journal ArticleDOI
G. Hutchison1, C. L. Desmond1
TL;DR: Electronic Data Interchange (EDI), a process to automate the exchange of information traditionally transmitted via trade documents, is examined and the advantages and obstacles in overcoming are outlined.
Abstract: Electronic Data Interchange (EDI), a process to automate the exchange of information traditionally transmitted via trade documents, is examined. Trade documents include such administrative forms as: purchase orders, invoices, price lists, and bills of lading, among others. Currently, this type of information is transmitted by mail, courier, telephone or telex. The advantages of automating this information exchange are discussed. The major problem in accomplishing this automation is the total lack of consistency in end user document types, structure and format. This is compounded by the variety of data storage techniques and equipment, and the availability of suitable communication networks. Progress in overcoming these obstacles is outlined, with examples, for a publicly available electronic data interchange service.

85 citations


Journal ArticleDOI
TL;DR: The architecture of a decentralized monitoring system and the specifics of an implementation are presented, and the complementary use of bridges to support LAN maintenance is introduced.
Abstract: A summary of the local area network (LAN) environment and its characteristics is provided. The architecture of a decentralized monitoring system and the specifics of an implementation are presented. These monitors are intelligent in that they do not require specification of what the monitor should examine; the monitor simply receives every packet and learns the required information to provide a meaningful presentation of the LAN statistics. The monitor's design guarantees that every LAN packet will be processed regardless of the LAN traffic rate. The author's experience with this system in monitoring Ethernets and 10-Mb/s 802.3 LANs is reviewed, and the complementary use of bridges to support LAN maintenance is introduced. The benefits of this approach are summarized. The techniques used by this monitoring system are applicable to all IEEE Standard 802 LANs.

73 citations


Book ChapterDOI
TL;DR: The author discusses several goal of security in the OSI architecture as well as where an how the security services that satisfy them could be implemented.
Abstract: The Open Systems Interconnection (OSI) computer network architecture has given computer network security designers a foundation on which desired security services can be defined and built. The author discusses several goal of security in the OSI architecture as well as where an how the security services that satisfy them could be implemented. He examines protocols for transport layer security services and describes an NBS laboratory implementation.

39 citations


Journal ArticleDOI
TL;DR: The author examines two broadly supported ring designs, IEEE 802.5 and the Fiber Distributed Data Interface (FDDI), X3T9.5 currently emerging as local area network standards, and explores the basis of this interest in ring topologies.
Abstract: The author examines two broadly supported ring designs, IEEE 802.5 and the Fiber Distributed Data Interface (FDDI), X3T9.5 currently emerging as local area network (LAN) standards, and explores the basis of this interest in ring topologies. The advantages that ring designs offer are presented, and on this basis a proliferation of rings is envisioned for the next decade.

38 citations


Journal ArticleDOI
TL;DR: A tutorial is given on two public key cryptographic systems that provide an alternative to classical cryptographic key management techniques: the RSA system and the SEEK system.
Abstract: A tutorial is given on two public key cryptographic systems that provide an alternative to classical cryptographic key management techniques: the RSA system and the SEEK system. The certification of public numbers is discussed.

34 citations


Journal ArticleDOI
TL;DR: The IBM token-ring network, which is based on a ring topology with token-access control, is described, including the data frame format and addressing structures, mechanisms for ensuring token integrity and fair token access to all attached nodes, and some token- ring performance attributes.
Abstract: The IBM token-ring network, which is based on a ring topology with token-access control, is described. In particular, a star-wired ring topology and the functions of several of the key physical components that compromise a token-ring network are examined. The token-access control protocol for regulating data flow on the ring is explained, including the data frame format and addressing structures, mechanisms for ensuring token integrity and fair token access to all attached nodes, and some token-ring performance attributes. The relationship between the token-ring architecture and systems network architecture (SNA) is also discussed. Some of the fault detection and isolation capabilities that are available with the token-ring LAN are also presented.

32 citations


Journal ArticleDOI
TL;DR: The nervous computer system administrator has to face the possibility of an intruder mounting an attack on one of the unprotected hosts by tapping an access line and observing a password being entered.
Abstract: I know in my heart-of-hearts that computer security is important, but I have to admit that there are times when living with my company's security policies can be quite an annoyance. For example, my computer periodically insists that I change my password every few months. If I don't, it tells me “Password expired, choose a new one:” and forces me to select a password that is sufficiently different from my old one to keep it happy. It's annoying, but I've learned to accept it. That simple sort of computer security is something we're all used to, but now we have to face the additional threat of attacks on our networks. In fact, for some people, mistrust of networks is sufficient justification to refuse to connect their host computers to a network. Of course, there are plenty of brute force solutions for the faint of heart. One can put DES encryption boxes on every terminal and on every port of every host. That is a very expensive solution, especially if only 10 percent of your 2000 hosts need that level of protection. The nervous computer system administrator also has to face the possibility of an intruder mounting an attack on one of the unprotected hosts by tapping an access line and observing a password being entered.

28 citations


Journal ArticleDOI
TL;DR: It is shown that cryptographic checksums that are intended to detect fraudulent messages must be on the order of 128 bits in length, and the ANSI X9.9-1986 message authentication standard is criticized on that basis.
Abstract: Digital signature techniques such as the Rivest-Shamir-Adleman (RSA) scheme can be used to establish both the authenticity of a document and the identity of its originator. However, because of the computationally-intensive nature of the RSA algorithm, most digital signature schemes make use of a checksum technique to summarize or represent the document, and then digitally sign the checksum. Message authentication codes (MACs), based on the Data Encryption Standard (DES), are often used for this purpose. It is shown that cryptographic checksums that are intended to detect fraudulent messages must be on the order of 128 bits in length, and the ANSI X9.9-1986 message authentication standard is criticized on that basis. In addition, architectural arguments are advanced to illustrate the advantages of a checksum algorithm that is not based on the use of cryptography and does not require the use of a secret key. Manipulation detection codes (MDC) are defined as a class of checksum algorithms that can detect both accidental and malicious modifications of an electronic message or document, without requiring the use of a cryptographic key.

25 citations


Journal ArticleDOI
TL;DR: The function and design of software developed at the US National Bureau of Standards to serve as a transport experiment control system (TECS) are discussed and the use of TECS to provide a performance evaluation of Intel's iNA-960 within the testbed discussed is demonstrated.
Abstract: The function and design of software developed at the US National Bureau of Standards (NBS) to serve as a transport experiment control system (TECS) are discussed. The implementation of the TECS within a local area network testbed is described, and some limitations of TECS are discussed. The use of TECS to provide a performance evaluation of Intel's iNA-960 within the testbed discussed is demonstrated.

21 citations


Journal ArticleDOI
TL;DR: The discussion covers the protocol architectural issues of the trusted network with particular emphasis on the relationship among network protocols, protocol reference model, and network security.
Abstract: Issues arising from the application of the Trusted Computer System Evaluation Criteria (TCSEC) to networks are discussed, particularly those requiring further research. The focus is on how to integrate many of the concepts in the Open Systems Interconnection (OSI) security addendum into the framework of the TCSEC. The discussion covers the protocol architectural issues of the trusted network with particular emphasis on the relationship among network protocols, protocol reference model, and network security. It is argued that application of the TCSEC to computer networks requires incorporation of a network protocol reference model as implemented in a protocol suite.

16 citations


Journal ArticleDOI
TL;DR: A performance measurement technique that is applicable to CSMA/CD-based local area networks, such as the Ethernet, is described and an experimental implementation of the monitoring technique is described.
Abstract: A performance measurement technique that is applicable to CSMA/CD-based local area networks, such as the Ethernet, is described. The protocol and its performance characteristics as they affect monitoring are reviewed. Existing monitoring techniques are examined. A master/slave monitor measurement technique and the functions and measurements that the monitor supports are presented. An experimental implementation of the monitoring technique is described.

Journal ArticleDOI
TL;DR: A description is given of a network simulation system that is used to monitor process-to-process efficiency in a special purpose network developed for real-time applications.
Abstract: A description is given of a network simulation system that is used to monitor process-to-process efficiency in a special purpose network developed for real-time applications. The tool, which is called VISA (Visually Integrated System Analyzer), uses information about application-specific interactions to predict how well a network-based implementation of that application will perform. VISA is part of a larger collection of system-level engineering tools that are being developed under the CASE (Computer-Aided System Engineering) environment. The VISA approach partitions a graph-based application system into a set of interconnected network clusters, each cluster able to support up to 200 processing nodes, and can be used to determine if a particular network partitioning can support the requirements of the application graph. The nature of the applications that the VISA system supports is briefly discussed, as well as the system itself, along with a short example of its use, and how it is logically structured. The structure of the CASE environment is discussed, and it is shown how the VISA system is integrated into it.

Journal ArticleDOI
A. J. Huffman1
TL;DR: The author presents some criteria that can be used to evaluate and select an electronic mail system to best suit the communications needs of a particular office.
Abstract: The author presents some criteria that can be used to evaluate and select an electronic mail system to best suit the communications needs of a particular office. Network design guidelines for implementing this e-mail system at minimal cost are given to illustrate the concepts and issues discussed. The AT&T Private Message Exchange is examined in detail.

Journal ArticleDOI
TL;DR: A description is given of a distributed monitoring system that comprises one or more high-speed hardware monitoring engines, which perform the network traffic sampling and do initial data reduction, and a set of software functions, which performs further data reduction and traffic analysis.
Abstract: A description is given of a distributed monitoring system that comprises one or more high-speed hardware monitoring engines, which perform the network traffic sampling and do initial data reduction, and a set of software functions, which perform further data reduction and traffic analysis. The hardware monitoring engine monitors the wire itself, facilitating the detection of all traffic, not just traffic to or from known entities, The monitor communicates with a remote system, or host, running an integrated set of software functions and providing a user interface to these functions. Monitoring the wire itself allows the monitoring complexity to be off-loaded from all of the network entities being monitored to the hardware monitoring engines, thereby decreasing the cost of data collection software having to be built into all of the entities being monitored. This is especially advantageous in multivendor, multiprotocol environments, where it is not usually possible to require that each entity in the network implements the necessary data collection function.

Journal ArticleDOI
TL;DR: The author discusses token-ring protocols, the star-wired configuration, ring access via tokens, multiplexing of ring connections, and the significant recovery mechanisms allowed by the ring.
Abstract: Token-ring LANs defined by the IEEE 802.5 and American National Standards Institute X3T9.5 Committees are considered. The author addresses several myths surrounding token-ring networks and offers supporting technical evidence to the contrary. He discusses token-ring protocols, the star-wired configuration, ring access via tokens, multiplexing of ring connections, and the significant recovery mechanisms allowed by the ring.

Journal ArticleDOI
TL;DR: The increasing dependance on computers in the office environment, including the use of the personal computer as an intelligent workstation, has revolutionized the workplace and increased the demand for computer communication technology.
Abstract: The increasing dependance on computers in the office environment, including the use of the personal computer as an intelligent workstation, has revolutionized the workplace and increased the demand for computer communication technology. Low-cost, high-speed interconnection of personal computers, host systems, and special-purpose peripheral devices is a must. Unprecedented levels of standardization and openness are expected in the design of local computer communication systems because of the mixed-vendor nature of the data processing environment.

Journal ArticleDOI
TL;DR: The author outlines the structures and responsibilities of the various national and international standards-making organizations and the contents of communications standards generally and of the IEEE 802 standards relating to token rings in particular.
Abstract: The author outlines the structures and responsibilities of the various national and international standards-making organizations. He describes the contents of communications standards generally and of the IEEE 802 standards relating to token rings in particular.

Journal Article
TL;DR: The author discusses cryptographic privacy systems, in which the goal is to keep the content of the message secret, and describes public key encryption and offers some comments on its use.
Abstract: The author discusses cryptographic privacy systems, in which the goal is to keep the content of the message secret. He describes public key encryption and offers some comments on its use. Factors affecting commercial use are examined. The author then describes the Data Encryption Standard (DES) and the impact of NASA's Commercial Commsec Endorsement Program algorithms on the DES. He concludes with a proposal for future encryption strategy.

Journal ArticleDOI
TL;DR: The experiences of a large law firm that, in 1985, made a major decision to automate key functions are described, finding the tendency of many organizations to be very conscientious about the development of plans and strategies but cavalier about the social and organizational implications resulting from the implementation of the very same plans.
Abstract: The experiences of a large law firm that, in 1985, made a major decision to automate key functions are described. Care was taken to ensure a good understanding of the cause and effect of any changes made. The major issue being examined is the tendency of many organizations to be very conscientious about the development of plans and strategies but cavalier about the social and organizational implications resulting from the implementation of the very same plans.

Journal Article
TL;DR: In the last decade or so, electronic information media have emerged from the research world and begun their inexorable spread to the business and residential sectors.
Abstract: INFORMATION. More than data, less than knowledge, information surrounds us in manifold forms. It arrives in cascades of text, sound and imagery by way of books, newspapers, magazines, journals, reports, memoranda, television, telephone and radio. In the last decade or so, electronic information media have emerged from the research world and begun their inexorable spread to the business and residential sectors. Electronic messaging, conferencing and bulletin board systems are available in public and private forms. The cost of personal computer and workstation technology is falling within reach of all sectors of the economy. Networking, in almost zoological variety, is available in local, wide-area, public and private, shared and dedicated forms. Protocols and standards abound, forming a kind of primordial soup (to borrow a phrase from Julia Child) out of which one hopes will evolve a lingua digitalis vulgaris, or common digital language.

Journal ArticleDOI
J. V. Solman1
TL;DR: Enhancements to an electronic mail system, such as bilingual operation, enhanced reach to nonusers, and interconnection with other systems, as well as new applications,such as EDI support and extensive customer support capabilities, are described.
Abstract: The influence on electronic mail system development from its environment are discussed. Enhancements to an electronic mail system, such as bilingual operation, enhanced reach to nonusers, and interconnection with other systems, as well as new applications, such as EDI support and extensive customer support capabilities, are described. A public, network-based electronic mail system with more than 60000 users, is used to illustrate the influences described.

Journal ArticleDOI
TL;DR: In spite of what my dear friend and colleague Prof. Finnegan reports, in his article “Transportation for Scientists,” the reality on this Planet makes alternative (c) to be the most reasonable approach as discussed by the authors.
Abstract: In spite of what my dear friend and colleague Prof. Finnegan reports, in his article “Transportation for Scientists,” the reality on this Planet makes alternative (c) to be the most reasonable approach.

Journal ArticleDOI
TL;DR: The author explores the motivations behind voice and data integration, the possible consumer use of this integration and the relative advantages and disadvantages of various levels of integration.
Abstract: The author explores the motivations behind voice and data integration, the possible consumer use of this integration and the relative advantages and disadvantages of various levels of integration. The natural combination of office automation functionality with voice/data integration is explored. The relationship between this integration and the integrated services digital network (ISDN) is discussed. The direction of the technology of voice/data integration is predicted.

Journal Article
TL;DR: The Bangladesh Fertility Research Programme (BFRP) views the dissemination of information on contraceptive technology and reproductive health as one of its main objectives and has instituted the Information Dissemination Cell (IEC).
Abstract: The Bangladesh Fertility Research Programme (BFRP) views the dissemination of information on contraceptive technology and reproductive health as one of its main objectives. Users and potential users of contraception often hear rumors and bad publicity concerning contraceptive methods before receiving any useful information. Furthermore researchers clinicians and program planners often lack communication channels. To address some these problems the BFRP has instituted the Information Dissemination Cell (IEC). The communication plan has identified target groups which could benefit from better information. The group of program planners policy makers organization chiefs and service receive information on advances in contraceptive technology and on recent reports and studies through a quarterly newsletter. BFRP also conducts seminars and lectures to instruct this group. For investigators researchers and post-graduate students the program hopes to provide a reference library and documentation center on contraceptive technology. BFRP also targets service providers by dispensing reports books and other publications to local government and non-government organizations. At the grassroots level BFRP plans to develop a newsletter in Bengali for family planning workers. For users and prospective users BFRP provides contraceptive-related information through newspaper and popular magazines. And for those who oppose or are sensitive to contraception BFRP tries to correct misinformation and adverse publicity through the use of press releases.

Journal Article
TL;DR: Pro-Pater offers family planning services exclusively to men and performed 16062 vasectomies and trained 127 Brazilian and foreign physicians in vasectomy since its founding in 1980.
Abstract: Pro-Pater offers family planning services exclusively to men. Since its founding in 1980 through June 1987 Pro-Pater performed 16062 vasectomies and trained 127 Brazilian and foreign physicians in vasectomy. Total vasectomies represent procedures performed on almost 80% of the prospective candidates who presented themselves to the clinic. Most family planning programs are biased toward women and have little or no experience with male contraception. In 1980 program administrators international donors physicians and specialists in family planning expected the proposed exclusively male program to fail in Brazil due to the countrys cultural underdevelopment and widespread machismo. Pro-Pater was nonetheless founded in Sao Paulo with funds from the Association for Voluntary Surgical Contraception (AVSC) and staff set out to personally advertise its existence among their friends. A pamphlet was also published explaining vasectomy for distribution to nurses laboratory technicians taxi drivers publicists and pharmaceutical company salesmen. This initial approach garnered the groups first clients who subsequently became strong promoters of vasectomy. A series of talks was held with social workers and other personnel professionals of large companies in Sao Paulo in the attempt to expand Pro-Paters client base. The social workers welcomed the message about vasectomy and soon helped in its promotion. Pro-Pater televised a report on vasectomy in 1983 and ran an advertising campaign in magazines in 1985.

Journal ArticleDOI
TL;DR: The new family of Open Systems Interconnection standards is in an advanced state of maturity with the majority of key aspects either fully approved or near final approval.
Abstract: As described in the last issue, the new family of Open Systems Interconnection (OSI) standards is in an advanced state of maturity with the majority of key aspects either fully approved or near final approval. The family of OSI standards is made up of several components. The Basic Reference Model of OSI, as provided by the International Organization for Standardization in International Standard 7498, specifies the architecture, functions, and dynamic mechanisms of the environment for distributed information systems. In association with each of the seven layers of the OSI Basic Reference Model, there is a service definition that describes the semantics of the layer's functions. In addition, there is one or more protocol specifications that detail the layer's operations and support communications among systems in the OSI environment.

Journal Article
TL;DR: A promising research area is the development of an IUD releasing both an estrogen and a progestin, which may retain the favorable qualities of the progESTin-only device without the concomitant increased incidence of spotting.
Abstract: A promising research area is the development of an IUD releasing both an estrogen and a progestin. Such devices may retain the favorable qualities of the progestin-only device without the concomitant increased incidence of spotting. Because of the different rates at which each hormone diffuses through polymer membranes 2-compartment systems would be needed. Such systems are difficult and costly to produce however. A simpler solution would be to use fibrous delivery systems wrapped around a given IUD platform. Both monolythic and sheathed fibers made of various plastic materials and loaded with progesterone or estradiol could be produced easily with the rate of steroid delivery controlled by the length of the fibers. A related approach would be to use estrogen and progesterone-releasing fibers lying loose in the uterine cavity. Such devices would automatically solve the problems of bleeding and pain by eliminating the bulky IUD frame. To prevent frameless IUDs from being expelled they would have to be affixed to the uterus permanently.