Newsletter Downloads
Using one-way functions for authentication
Techniques are suggested to construct authentication protocols on a basis of one-way functions rather than encryption algorithms. This approach is thought of interest for several reasons. It appears that this approach could achieve, at least, equally ...
A connectionless congestion control algorithm
This paper describes a congestion control algorithm that operates within a connectionless network environment. The algorithm controls a source's transmission rate, with that rate determined by feedback from the point of congestion. The algorithm is well ...
Improving the efficiency of the OSI checksum calculation
It is known that using larger byte--sizes to access memory usually results in faster computations of checksum algorithms. This paper proposes two different ways to use larger byte--sizes to improve the performance of the OSI checksum. First, an ...
Defining faster transfer syntaxes for the OSI presentation protocol
In an heterogeneous environment, applications must agree the structure and a binary representation of the exchanged data. This can a priori be done by adopting by the two standards proposed by ISO: the Abstract Syntax Notation 1 (ASN-1) and the ASN-1 ...
A delay-based approach for congestion avoidance in interconnected heterogeneous computer networks
In heterogeneous networks, achieving congestion avoidance is difficult because the congestion feedback from one subnetwork may have no meaning to sources on other subnetworks. We propose using changes in round-trip delay as an implicit feedback. Using a ...
A loop-detect packet based self stabilizing bridge protocol for extended-LANs
It has become the trend for network managers to require redundant bridges as back-up for bridge/link failures. The inherent problem with such a scheme is that it causes certain packets to loop continuously around the topology causing severe degradation ...