2,641 research outputs found
Recommended from our members
Survey of unified approaches to integrated-service networks
The increasing demand for communication services, coupled with recent technological advances in communication media and switching techniques, has resulted in a proliferation of new and expanded services. Currently, networks are needed which can transmit voice, data, and video services in an application-independent fashion. Unified approaches employ a single switching technique across the entire network bandwidth, thus, allowing services to be switched in an application-independent manner. This paper presents a taxonomy of integrated-service networks including a look at N-ISDN, while focusing on unified approaches to integrated-service networks.The two most promising unified approaches are burst and fast packet switching. Burst switching is a circuit switching-based approach which allocates channel bandwidth to a connection only during the transmission of "bursts" of information. Fast packet switching is a packet switching-based approach which can be characterized by very high transmission rates on network links and simple, hardwired protocols which match the rapid channel speed of the network. Both approaches are being proposed as possible implementations for integrated-service networks. We survey these two approaches, and also examine the key performance issues found in fast packet switching. We then present the results of a simulation study of a fast packet switching network
Reviews
Technology‐based Learning Environments: Psychological and Educational Foundations edited by S. Vosniadou, E. De Corte and H. Mandl, volume 137 in NATO ASI Series F (Computer and Systems Sciences), Berlin, Springer‐Verlag, ISBN: 0–387–58253–3, 1994
Applications of satellite technology to broadband ISDN networks
Two satellite architectures for delivering broadband integrated services digital network (B-ISDN) service are evaluated. The first is assumed integral to an existing terrestrial network, and provides complementary services such as interconnects to remote nodes as well as high-rate multicast and broadcast service. The interconnects are at a 155 Mbs rate and are shown as being met with a nonregenerative multibeam satellite having 10-1.5 degree spots. The second satellite architecture focuses on providing private B-ISDN networks as well as acting as a gateway to the public network. This is conceived as being provided by a regenerative multibeam satellite with on-board ATM (asynchronous transfer mode) processing payload. With up to 800 Mbs offered, higher satellite EIRP is required. This is accomplished with 12-0.4 degree hopping beams, covering a total of 110 dwell positions. It is estimated the space segment capital cost for architecture one would be about 250M. The net user cost is given for a variety of scenarios, but the cost for 155 Mbs services is shown to be about $15-22/minute for 25 percent system utilization
Recommended from our members
Survey of traffic control schemes and error control schemes for ATM networks
Among the techniques proposed for B-ISDN transfer mode, ATM concept is considered to be the most promising transfer technique because of its flexibility and efficiency. This paper surveys and reviews a number of topics related to ATM networks. Those topics cover congestion control, provision of multiple classes of traffic, and error control. Due to the nature of ATM networks, those issues are far more challenging than in conventional networks. Sorne of the more promising solutions to those issues are surveyed, and the corresponding results on performance are summarized. Future research problems in ATM protocol aspect are also presented
USAge of Groupware in Software Engineering Education at the Cscw Laboratory of University Duisburg-essen: Possibilities and Limitations
This paper analyzes the application level in CSCW laboratory there are Electronic meeting rooms, Video Conferencing, Desktop Conference (Passenger), and BSCW system which conducting in The University Duisburg – Essen Germany. This analysis included short analysis and discussion about possibilities and limitation of each experiment followed by outlook how this lab can be further developed.Multi-user to Multipoint Videoconferences is introduced to cover all of devices join to the conferences. A computer network, PSTN (Public Switched Telephone Network), ISDN Phone, Wireless Infrastructures (accessed by laptop, smart phone, PDA) and videoconferences systems is proposed to be integrate
An Analysis of Remote Communication Processes Involved in Video- Mediated and Text-Based Computer-Mediated Communication During Collaborative Problem Solving
The purpose of this study was to explore the impact of current available communication mediums on the process of collaborative problem solving tasks in today\u27s modern society. Seven male-only dyads were asked to complete two tasks, both with a finite and definable solution, by communicating through one of three possible ways: face-to- face (FTF), a synchronous text-based computer system (CMC), and a video-mediated system (VMC). The effectiveness of the medium was evaluated based on time to solution, number of turns and words in relation to a visual search task and a spatial task. Results showed a significant difference in time to solution between dyads communicating through CMC and VMC and FTF mode for the visual search task. For the spatial task, significant time differences were found between all modes of communication, with the computer-mediated group taking the longest time to complete the task. No difference was found between FTF mode and VMC mode in regards to number of words and turns for the visual task, and for the special task no significant difference was found between FTF mode and CMC mode
Video Conference in UTP Learning Activities
As we are in the 21st Century, several events have dramatically changed the environment
of higher education In the Malaysia, and elsewhere in the world. Video conferencing has
getting more attention among educators due to its effectiveness that can be used in
distance education settings. Video Conferencing is a real time communication and is
designed to support two-way video and audio communication between multiple locations.
This rich communications technology offers new possibilities for schools, colleges, and
libraries including formal instruction (courses, lessons, and tutoring), connection with
guest speakers and experts, multi-school project collaboration, professional activities
such as meetings and interviews, and community events. The main objective of this final
year project is to focus on developing a prototype of video confetencing which embed
video and audio as well as slides in a ,single screen. The project also aims to provide a
mobile application which allows users to download videos from mobile. In order to carry
out the whole project successfully, a. thorough literature review has to be done. The
literature review will help a lot in understanding the entire project and the current issues
regarding the video conferencing concept and implementation. This project will use
Dimbim, an open source software as the main platform that offers rich choice oflive and
on demand video conferencing functionality. Moreover, the software can be easily
integrated with Moodie, current e-learning system in UTP. As an additional feature, this
project also will introduce a mobile application where user can download the video from
database archive via mobile. This is another flexibility that this project will put forward.
Based on the literature review and the prototype of video conferencing, the efficiency of
distance learning therefore can be observed. the outcome of this project may be used by
Universiti Teknologi PETRONAS (UTP) as the advance learning process in campus
Graph-based Features for Automatic Online Abuse Detection
While online communities have become increasingly important over the years,
the moderation of user-generated content is still performed mostly manually.
Automating this task is an important step in reducing the financial cost
associated with moderation, but the majority of automated approaches strictly
based on message content are highly vulnerable to intentional obfuscation. In
this paper, we discuss methods for extracting conversational networks based on
raw multi-participant chat logs, and we study the contribution of graph
features to a classification system that aims to determine if a given message
is abusive. The conversational graph-based system yields unexpectedly high
performance , with results comparable to those previously obtained with a
content-based approach
- …