Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 19, Issue 5Oct. 1989
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:0146-4833
Bibliometrics

Newsletter Downloads

Skip Table Of Content Section
article
Free
Using one-way functions for authentication

Techniques are suggested to construct authentication protocols on a basis of one-way functions rather than encryption algorithms. This approach is thought of interest for several reasons. It appears that this approach could achieve, at least, equally ...

article
Free
A connectionless congestion control algorithm

This paper describes a congestion control algorithm that operates within a connectionless network environment. The algorithm controls a source's transmission rate, with that rate determined by feedback from the point of congestion. The algorithm is well ...

article
Free
Improving the efficiency of the OSI checksum calculation

It is known that using larger byte--sizes to access memory usually results in faster computations of checksum algorithms. This paper proposes two different ways to use larger byte--sizes to improve the performance of the OSI checksum. First, an ...

article
Free
Defining faster transfer syntaxes for the OSI presentation protocol

In an heterogeneous environment, applications must agree the structure and a binary representation of the exchanged data. This can a priori be done by adopting by the two standards proposed by ISO: the Abstract Syntax Notation 1 (ASN-1) and the ASN-1 ...

article
Free
A delay-based approach for congestion avoidance in interconnected heterogeneous computer networks

In heterogeneous networks, achieving congestion avoidance is difficult because the congestion feedback from one subnetwork may have no meaning to sources on other subnetworks. We propose using changes in round-trip delay as an implicit feedback. Using a ...

article
Free
A loop-detect packet based self stabilizing bridge protocol for extended-LANs

It has become the trend for network managers to require redundant bridges as back-up for bridge/link failures. The inherent problem with such a scheme is that it causes certain packets to loop continuously around the topology causing severe degradation ...

article
Free
Status of OSI standards

Subjects

Comments