leff@CSVAX.SEAS.SMU.EDU (Laurence Leff) (07/22/90)
This is the SIGCOMM bibliography of recent publications in computer networking which appears in the July 90 issue of Computer Communication Review. This bibliography is also available on-line in nnsc.nsf.net:CCR/jul90/jul90.refer Persons interested in submitting recent tech reports for inclusion in the bibliography should send the citation and abstract to me at craig@bbn.com Craig Partridge Editor, ACM SIGCOMM Computer Communication Review [PS: Don't forget to come to SIGCOMM '90 in Philadelphia, 24-27 September] %K Electronic\0Mail %A S. Kille %T Mapping between X.400(1988) / ISO 10021 and RFC 822; RFC-1148 %J Internet Request for Comments %N 1148 %D March 1990 %I Network Information Center, SRI International %C Menlo Park, CA %X \fBAbstract:\fP This RFC suggests an electronic mail protocol mapping for the Internet community and UK Academic Community, and requests discussion and suggestions for improvements. This memo does not specify an Internet standard. This edition includes material lost in editing. [\fIEd. Note\fP: Earlier version was RFC-1138] %K Queueing\0Theory %A O. J. Boxma %A H. Daduna %T Sojourn times in queueing networks %C Amsterdam %D 1989 %M f 16,00 %R CWI. Dept. of Operations Research, Statistics, and System Theory ; R 891 %K Queueing\0Theory %A P. R. de Waal %A N. M. van Dijk %T Interconnected networks of queues with randomized arrival and departure blocking %C Amsterdam %D 1989 %M f 12,00 %R CWI. Dept. of Operations Research, Statistics, and System Theory ; R 8934 %K Network\0Management %A Richard E. Caruso %T Network Management: A Tutorial Overview %P 20-25 %J IEEE Communications %V 28 %N 3 %D March 1990 %K Network\0Management %A Ashok K. Malik %T Network Management and Control Systems and Strategic Issues %P 26-29 %J IEEE Communications %V 28 %N 3 %D March 1990 %K Network\0Management %A Ivan Frisch %T Who Logged Out My Terminal %P 30 %J IEEE Communications %V 28 %N 3 %D March 1990 %K Network\0Management %A Bruce Bassett %A Frederick P. Heinrich %A Diana Kuhl %A Ali Shadman %T Customer Network Management: A Service Provider's Veiw %P 31-30 %J IEEE Communications %V 28 %N 3 %D March 1990 %K Network\0Management %A Makoto Yoshida %A Makoto Kobayashi %A Yaruo Yamaguchi %T Customer Control of Network Management from the Service Provider's Perspective %P 35-40 %J IEEE Communications %V 28 %N 3 %D March 1990 %K Network\0Management %A William E. Gilbert %T Managing Networks in a Multi-Vendor Environment %P 41-60 %J IEEE Communications %V 28 %N 3 %D March 1990 %K Network\0Management %A Ian Sugarbroad %T An OSI-Based Interoperability Architecture for Managing Hybrid Networks %P 61-69 %J IEEE Communications %V 28 %N 3 %D March 1990 %K Network\0Management %A Randal Campbell %A Bob Howard %A John Lamb %A John Stevenson %A Amy Tennant %T IBM's Network Management Approach %P 70-75 %J IEEE Communications %V 28 %N 3 %D March 1990 %K Network\0Management %A Dixon R. Doll %T The Future of Customer Control %P 76-80 %J IEEE Communications %V 28 %N 3 %D March 1990 %K Cost\0Allocation %T On Cost Allocation in Computer Networks %A D. Granot %A M. Hojati %J networks - an international journal %V 20 %N 2 %D March 1990 %P 209-230 %K Network\0Management %A Teresa Cochran %A Joseph M. Mellichamp %T AUTOREC: An Automated Error Recovery System for Network Management %P 14-18 %J IEEE Network %D March 1990 %V 4 %N 2 %K High-Speed\0Networks %A Gurudatta M. Parulkar %A Jonathan S. Turner %T Towards a Framework for High-Speed Communication in a Heterogeneous Networking Environment %P 19-27 %J IEEE Network %D March 1990 %V 4 %N 2 %K Miscellaneous %A William P. Lidinsky %T Data Communications Needs %P 28-33 %J IEEE Network %D March 1990 %V 4 %N 2 %K High-Speed\0Networks %A David J. Wright %A Michael To %T Telecommunications Applications of the 1990s and Their Transport Requirements %P 34-40 %J IEEE Network %D March 1990 %V 4 %N 2 %K High-Speed\0Networks %A John F. Patterson %A Carmen Egido %T Three Keys to the Broadband Future: A View of Applications %P 41-47 %J IEEE Network %D March 1990 %V 4 %N 2 %K Distributed\0Systems %A S. Chandrasekaran %A S. Venkatesan %T A Message-Optimal Algorithm for Distributed Termination Detection %P 245-252 %J Jour. Parallel and Distributed Computing %D March 1990 %V 8 %N 3 %K Distributed\0Systems %A Marc Shapiro %A Yvon Gourhant %A Sabine Habert %A Laurence Mosseri %A Michel Ruffin %A Celine Valot %T SOS: An Object-Oriented Operating System - Assessment and Perspectives %P 287-338 %D Fall 1989 %V 2 %N 4 %K Miscellaneous %A A. E. Kamal %A V.C. Hamacher %T Utilizing Bandwidth Sharing in the Slotted Ring %P 298-299 %J IEEE Trans. Computers %V 39 %N 3 %D March 1990 %K Miscellaneous %A H. Yoon %A K.Y. Lee %A M.T. Liu %T Performance Analysis of Multibuffered Packet-Switching Networks in Multiprocessor Systems %P 319-327 %J IEEE Trans. Computers %V 39 %N 3 %D March 1990 %K Distributed\0Systems %A M. Satyanarayanan %A E.H. Siegal %T Parallel Communication in a Large Distributed Environment %P 328-348 %J IEEE Trans. Computers %V 39 %N 3 %D March 1990 %K Security %A Jon A. Rochlis %A Mark W. Eichin %T With Microscope and Tweezers: The Worm from MIT's Perspective %J Communications of the ACM %D June 1989 %V 32 %N 6 %P 689-698 %O \fIReviews\fP: \fIComputing Reviews\fP, Vol. 31, No. 3, March 1990. %K Remote\0Procedure\0Calls %A Larry L. Peterson %A Nick C. Bucholz %A Richard D. Schlicting %T Preserving and Using Context Information in Interprocess Communication %P 217-246 %J ACM Trans. Computer Systems %D August 1989 %V 7 %N 3 %O \fIReviews\fP: \fIComputing Reviews\fP, Vol. 31, No. 3, March 1990. %K Directory\0Services %A David Cheriton %A Timothy P. Mann %T Decentralizing a Global Naming Service for Improved Performance %J ACM Trans. Computer Systems %V 7 %N 2 %D May 1989 %P 147-183 %O \fIReviews\fP: \fIComputing Reviews\fP, Vol. 31, No. 3, March 1990. %K Miscellaneous %A G. Malkin %A J. Reynolds %T F.Y.I on F.Y.I: Introduction to the F.Y.I. Notes %J Internet Request for Comments %N 1150 %D March 1990 %I Network Information Center, SRI International %C Menlo Park, CA %X \fBAbstract:\fP This memo is the first in a new sub-series of RFCs called FYIs (For Your Information). This memo provides information for the Internet community. It does not specify any standard. %K Routing %A C.G. Cassandras %A M. Vasmi Abidi %A D. Towsley %T Distributed Routing with On-Line Marginal Delay Estimation %J IEEE Trans. on Communications %V 38 %N 3 %D March 1990 %P 348-359 %K Routing %A D.W. Glazer %A C. Tropper %T A New Metric for Dynamic Routing Algorithms %J IEEE Trans. on Communications %V 38 %N 3 %D March 1990 %P 360-367 %K Flow\0Control %A S. Fdida %A H.G. Perros %A A. Wilk %T Semaphore Queues: Modeling Multilayered Window Flow Control Mechanisms %J IEEE Trans. on Communications %V 38 %N 3 %D March 1990 %P 309-317 %K Multimedia\0Communication %A H. Nakada %A K.-I. Sato %T Variable Rate Speech Encoding for Asynchronous Transfer Mode %J IEEE Trans. on Communications %V 38 %N 3 %D March 1990 %P 277-284 %K Miscellaneous %A J. Reynolds %A J. Postel %T Assigned Numbers; RFC 1060 %N 1060 %J Internet Request for Comments %D March 1990 %I Network Information Center, SRI International %C Menlo Park, CA %X \fBAbstract:\fP This memo is a status report on the parameters (i.e., numbers and keywords) used in protocols in the Internet community. %K Distributed\0Systems %A Michael D. Schroeder %A Michael Burrows %T Performance of Firefly RPC %P 1-17 %J ACM Trans. Computer Systems %D February 1990 %V 8 %N 1 %K Authentication %A Michael Burrows %A Martin Abadi %A Roger Needham %T A Logic of Authentication %P 18-36 %J ACM Trans. Computer Systems %D February 1990 %V 8 %N 1 %K Distributed\0Systems %A Brian N. Bershad %A Thomas E. Anderson %A Edward D. Lazowska %A Henry M. Levy %T Lightweight Remote Procedure Call %J ACM Trans. Computer Systems %P 37-55 %D February 1990 %V 8 %N 1 %K Miscellaneous %A D. Waitzman %T A Standard for the Transmission of IP Datagrams on Avian Carriers; RFC-1149 %J Internet Request for Comments %N 1149 %D 1 April 1990 %I Network Information Center, SRI International %C Menlo Park, CA %X \fBAbstract:\fP This memo describes an experimental method for the encapsulation of IP datagrams in avian carriers. This specification is primarily useful in Metropolitan Area Networks. This is an experimental, not recommended standard. %K Protocol\0Verification %A Nikolay A. Anisimov %T A Notion of Petri Net Entity for Communication Protocol Design %I Institute of Automation and Control Processes %C Vladivostok, USSR %D 1989 %X \fBAbstract:\fP The paper discusses a formal model that is intended to support a modular approach to the design and verification of concurrent systems. A new notion of entity is introduced which is defined as Petri net together with a set of labelings, with each labeling treated as an access point designed for communication with other entities or for the observation of the behaviour of an entity itself. Operations on entities, such as parallel composition, abstraction, encapsulation and autocomposition, are defined. A notion of equivalence of entities is introduced based on bisimulation. The equivalence is shown to be a congruence relation with respect to the operations introduced. Methods of representing entities by predicate/transition nets and with the aid of an algebra of regular Petri nets are discussed. Finally, the application of the above model to some problems of communication protocols theory is illustrated. [Copies available from the author at Institute of Automation and Control Processes; Far East division of the USSR Academy of Sciences; 5, Radio st.; Vladivostok, 690032; USSR] %K High-Speed\0Networks %A William J. Dallas %T A digital prescription for X-ray overload %J IEEE Spectrum %D April 1990 %V 27 %N 4 %X \fBNote:\fP A description of how hospitals might use high speed computer networks to manage x-ray images. %K Network\0Management %A R. Stine %T FYI on a Network Management Tool Catalog: Tools for Monitoring and Debugging TCP/IP Internets and Interconnected Devices %J Internet Request for Comments; RFC-1147 %N 1147 %D April 1990 %I Network Information Center, SRI International %C Menlo Park, CA %X \fBAbstract:\fP The goal of this FYI memo is to provide practical information to site administrators and network managers. This catalog contains descriptions of several tools available to assist network managers in debugging and maintaining TCP/IP internets and interconnected communications resources. Entries in the catalog tell what a tool does, how it works, and how it can be obtained. .sp 0.25 This memo provides information for the Internet community. It does not specify any standard. It is not a statement of IAB policy or recommendations. Comments, critiques, and new or updated tool descriptions are welcome, and should be sent to Robert Stine, at stine@sparta.com, or to the NOCTools working group, at noctools@merit.edu. %K Transport\0Protocols %A C. Partridge %A R. Hinden %T Version 2 of the Reliable Data Protocol; RFC 1151 %N 1147 %D April 1990 %I Network Information Center, SRI International %C Menlo Park, CA %X \fBAbstract:\fP This RFC suggests several updates to the specification of the Reliable Data Protocol (RDP) in RFC-908 based on experience with the protocol. This revised version of the protocol is experimental %K LANs %A Benjamin Lewis Barnett, III %T Evaluation and Implementation of Protocols in the Local Area Network Testbed Environment %R TR-89-35 %D November 1989 %I Dept. of Computer Sciences, Univ. Texas at Austin %P 261 %X \fBAbstract:\fP This thesis presents the results of the Local Area Network Testbed experience. The design of the testbed, the results of several experiments and the results of a formal protocol analysis are included. Three data link layer protocols for Carrier Sense Multiple Access with Collision Detection (CSMA/CD) bus networks were implemented in the testbed. The performance of these three protocols under several different artificial workloads is compared. The three protocols were the commercially available Ethernet, the Enet II protocol proposed by Molloy, and the Virtual Time CSMA/CD (VTCSMA/CD) protocol proposed by Molle. The three protocols represent three fundamentally different approaches to handling collisions among users of a broadcast channel. Ethernet randomizes retransmission attempts for the conflicting packets in an attempt to minimize the likelihood of successive collisions. Enet II uses a probabilistic algorithm to schedule the retransmissions of conflicting packets to resolve the collision. VTCSMA/CD uses a technique which reduces the initial likelihood of collisions. Enet II is shown to have significantly better variance of delay than Ethernet. VTCSMA/CD has the best variance of delay of the three protocols due to the success of its collision avoidance method. .sp 0.25 The implementation of Enet II demonstrates that techniques usually reserved for slotted networks can be beneficially employed on their unslotted counterparts. To investigate the adaptation of slotted protocols to unslotted use, a well known slotted Collision Resolution Protocol (CRP), the Gallager First-Come, First-Served (FCFS) protocol, is adapted to unslotted operation and proven to have bounded delay. A second adaptation of the protocol which responds to collisions differently is shown to deadlock. Deadlock detection and recovery methods are presented. A new CRP based on the deadlock recovery method and using information about the location of colliding stations is proposed. %K LANs %A M.G. Gouda %A N.F. Maxemchuk %A U. Mukherji %A K. Sabnani %T Delivery and Discrimination: The Seine Protocol %P 17 %R TR-88-41 %D December 1989 %X \fBAbstract:\fP We present a family of protocols for data transmission from multiple identical senders to a single receiver. At each instant, every sender sends one bit, and the sent bits are or-ed together into one bit before being received by the receiver. If a sender has a data message to send, it sends the message bits one by one; otherwise it sends zero bits. Clearly, if the sending of two messages by two senders overlap in time, then the resulting ``collision'' can cause the receiver to receive a corrupted message, i.e., one that was not sent by either sender. The function of the protocol is to allow the receiver to detect and deliver those and only those messages that are not corrupted by collision. (In other words, the receiver acts as a discriminating seine that catches and delivers only uncorrupted messages; hence the title.) The seine protocol has been implemented in a class of fiber-optic local area networks. %K Distributed\0Systems %A Chuck Koelbel %A Gene Spafford %A George Leach %T Workshop on Experiences with Building Distributed and Multiprocessor Systems %P 2-6 %J Operating Systems Review %V 24 %N 2 %D April 1990 %X \fBNote:\fP Also published in the April issue of \fIComputer Communication Review\fP. %K Authentication %A Dan M. Nessett %T A Critique of the Burrows, Abadi and Needham Logic %P 35-38 %J Operating Systems Review %V 24 %N 2 %D April 1990 %K Authentication %A Michael Burrows %A Martin Abadi %A Roger Needham %T A Rejoinder to Nessett %P 39-40 %J Operating Systems Review %V 24 %N 2 %D April 1990 %K Distributed\0Systems %A Roger Oliver %T Protection in a Distributed Document Processing System %P 56-65 %J Operating Systems Review %V 24 %N 2 %D April 1990 %K Distributed\0Systems %A Joseph W. Seigh %T A Distributed Solution to the Reader-Writer Problem %J Operating Systems Review %V 24 %N 2 %D April 1990 %K High-Speed\0Networks %A Craig Partridge %T Workshop Report: Internet Research Steering Group Workshop on Very-High-Speed Networks; RFC 1152 %N 1152 %D April 1990 %I Network Information Center, SRI International %C Menlo Park, CA %X \fBAbstract:\fP This memo is a report on a workshop sponsored by the Internet Research Steering Group. [\fINote:\fP To appear in October issue of \fICCR\fP]. %K Gateways %A E.W. Biersack %T A systematic approach for constructing gateways %P 79-96 %J Computer Networks and ISDN Systems %V 18 %N 2 %D 28 February 1990 %K Protocol\0Performance %A A. Bondavalli %A M. Conti %A E. Gregori %A L. Lenzini %A L. Strigni %T MAC protocols for high-speed MANs: Performance comparisons for a family of Fasnet-based protocols %P 97-114 %J Computer Networks and ISDN Systems %V 18 %N 2 %D 28 February 1990 %K Multihoming %A A. Orda %A R. Rom %T Multihoming in computer networks: A topology-design approach %P 133-142 %J Computer Networks and ISDN Systems %V 18 %N 2 %D 28 February 1990 %K Miscellaneous %A A.A.A. Adas %T Evaluation methodology for wide area networks %P 115-132 %J Computer Networks and ISDN Systems %V 18 %N 2 %D 28 February 1990 %K Distributed\0Systems %A Douglas Comer %A James Griffioen %T A New Design for Distributed Systems: The Remote Memory Model %J Proc. 1990 Summer USENIX Conf. %C Anaheim %D June 11-15, 1990 %X \fBAbstract:\fP This paper describes a new model for constructing distributed systems called the Remote Memory Model. The remote memory model consists of several client machines, one or more dedicated machines called remote memory servers, and a communication channel interconnecting them. In the remote memory model, client machines share the memory resources located on the remote memory server. Client machines that exhaust their local memory move portions of their address space to the remote memory server and retrieve pieces as needed. Because the remote memory server uses a machine-independent protocol to communicate with client machines, the remote memory server can support multiple heterogeneous client machines simultaneously. .sp 0.25 This paper describes the remote memory model and discusses the advantages and issues of systems that use this model. It examines the design of a highly efficient, reliable, machine-independent protocol used by the remote memory server to communicate with the client machines. It also outlines the algorithms and data structures employed by the remote memory server to efficiently locate the data stored on the server. Finally, it presents measurements of a prototype implementation that clearly demonstrate the viability and competitive performance of the remote memory model. %K Security %A Bill Cheswick %T The Design of A Secure Internet Gateway %J Proc. 1990 Summer USENIX Conf. %C Anaheim %D June 11-15, 1990 %X \fBAbstract:\fP The Internet supports a vast and growing community of computers users around the world. Unfortunately, this network can provide anonymous access to this community by the unscrupulous, careless, or dangerous. On any given Internet there is a certain percentage of poorly-maintained systems. AT&T has a large internal Internet that we wish to protect from outside attacks, while providing useful services between the two. .sp 0.25 This paper describes our Internet gateway. It is an application-level gateway that passes mail and many of the common Internet services between our internal machines and the Internet. This is accomplished without IP connectivity using a pair of machines: a trusted internal machine and an untrusted external gateway. These are connected by a private link. The internal machine provides a few carefully-guarded services to the external gateway. This configuration helps protect the internal internet even if the external machine is fully compromised. %K Distributed\0File\0Systems %A Bruce E. Keith %T Perspectives on NFS File Service Performance Characterization %J Proc. 1990 Summer USENIX Conf. %C Anaheim %D June 11-15, 1990 %K Distributed\0Systems %A David F. Bacon %A Andy Lowry %T A Portable Run-Time System for the Hermes Distributed Programming Language %J Proc. 1990 Summer USENIX Conf. %C Anaheim %D June 11-15, 1990 %K Distributed\0File\0Systems %A Alex Siegal %A Kenneth Birman %A Keith Marzullo %T Deceit: A Flexible Distributed File System %J Proc. 1990 Summer USENIX Conf. %C Anaheim %D June 11-15, 1990 %X \fBAbstract:\fP Deceit, a distributed file system being developed at Cornell, provides flexible file semantics to control efficiency, scalability, and the desired reliability. The user is able to set parameters on a file to achieve different levels of availability, performance, and file location transparency. File replication, file migration, and a sophisticated update control protocol is supported. Deceit also supports a file version control mechanism. Deceit can behave like a plain Sun Network File System server and can be used by any NFS client without modifying any client software. Deceit servers are interchangeable and collectively provide the illusion of a single, highly available, and large server machine to its clients. Non-volatile replicas of each file are stored on a subset of the file servers. Servers may be grouped into independent subsets, or cells, for security and efficiency. The Deceit prototype uses the ISIS Distributed Programming Environment for all communication and process group management - an approach that reduces system complexity and increases system robustness. Common faults such as lost messages, crashes, and partitions are tolerated. %K Distributed\0File\0Systems %A Richard G. Guy %A John S. Heidemann %A Wai Mak %A Thomas W. Page, Jr. %A Gerald J. Popek %A Dieter Rothmeier %T Implementation of the Ficus Replicated File System %J Proc. 1990 Summer USENIX Conf. %C Anaheim %D June 11-15, 1990 %X \fBAbstract:\fP As we approach nation-wide integration of computer systems, it is clear that file replication will play a key role, both to improve data availability in the face of failures, and to improve performance by locating data near where it will be used. We expect that future file systems will have an extensible, modular structure in which features such as replication can be ``slipped in'' as a transparent layer in a stackable layered architecture. We introduce the Ficus replicated file system for NFS and show how it is layered on top of existing file systems. .sp 0.25 The Ficus file system differs from previous file replication services in that it permits update during network partition if any copy of a file is accessible. File and directory updates are automatically propagated to accessible replicas. Conflicting updates to directories are detected and automatically repaired; conflicting updates to ordinary files are detected and reported to the owner. The frequency of communications outages rendering inaccessible some replicas in a large scale network and the relative rarity of conflicting updates make this optimistic scheme attractive. .sp 0.25 Stackable layers facilitate the addition of new features to an existing file system without reimplementing existing functions. This is done in a manner analogous to object-oriented programming with inheritance. By structuring the file system as a stack of modules, each with the same interface, modules which augment existing services can be added transparently. This paper describes the implementation of the Ficus file system using the layered architecture. %K Operating\0Systems %A John K. Ousterhout %T Why Aren't Operating Systems Getting Faster As Fast as Hardware? %J Proc. 1990 Summer USENIX Conf. %C Anaheim %D June 11-15, 1990 %X \fBAbstract:\fP This paper evaluates several hardware platforms and operating systems using a set of benchmarks that stress kernel entry/exit, file systems, and other things related to operating systems. The overall conclusion is that operating system performance is not improving at the same rate as the base speed of the underlying hardware. The most obvious ways to remedy this situation are to improve memory bandwidth and reduce operating systems' tendency to wait for disk operations to complete. %K Electronic\0Mail %A F. Wancho %T Digest Message Format; RFC-1153 %J Internet Request for Comments %N 1153 %D April 1990 %I Network Information Center, SRI International %C Menlo Park, CA %X \fBAbstract:\fP This memo describes the de facto standard Digest Message Format. This is an elective experimental protocol. %K Electronic\0Mail %A D. Robinson %A R. Ullman %T Encoding header Field for Internet Messages; RFC-1154 %J Internet Request for Comments %N 1154 %D April 1990 %I Network Information Center, SRI International %C Menlo Park, CA %X \fBAbstract:\fP This RFC proposes an elective experimental Encoding header field to permit the mailing of multi-part, multi-structured messages. .sp 0.25 The use of Encoding updates RFC 1049 (Content-Type), and is a suggested update to RFCs 1113, 1114, and 1115 (Privacy Enhancement). %K Distributed\0Systems %A V.K. Garg %A J. Ghosh %T Symmetry in spite of hierarchy %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0Systems %A Mohan Ahuja %A Ajay D. Kshemkalyani %A Timothy Carlson %T A basic unit of computation in distributed systems %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %X \fBAbstract:\fP A ground state in a distributed system is a global state in which there are no messages in transit. In this paper, we define basic units of computation in distributed systems, whet her communicating synchronously or asynchronously, as comprising of indivisible logical units of computation that take the system from one ground state to another. We analyze their properties. This definition helps in understanding the nature of the communication pattern in a computation and how the communication pattern is related to the concurrency in the system. The basic unit of computation is potentially useful in checkpointing, distributed debugging and asserting about attainment of stable properties. %K Distributed\0Systems %A R. Bubenik %A W. Zwaenepol %T Semantics of optimistic computation %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %X \fBAbstract:\fP We address the issue of deriving a semantically equivalent optimistic computation from a pessimistic computation by application-independent transformations. Computations are modeled by program dependence graphs (pdgs). The semantics of a computation is defined by a mapping from an initial state to a final state, and is realized by a graph rewriting system. Semantics-preserving transformations are applied to the pdgs of the pessimistic computation to produce an optimistic version. The transformations result from guessing data values and control flow decisions in the computation. .sp 0.25 We use our transformations to derive an optimistic version of fault tolerance based on message logging and checkpointing. The transformations yield an optimistic version similar to optimistic fault tolerance algorithms reported in the literature, although additional application-dependent transformations are necessary to produce a realistic optimistic implementation. %K Distributed\0Memory %A S. Zhou %A M. Stumm %A T. McInerney %T Extending distributed shared memory to heterogeneous environments %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0Memory %A V.O. Tam %A M. Hsu %T Fast recovery in distributed shared virtual memory systems %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %X \fBAbstract:\fP Distributed shared virtual memory (DSVM) is an abstraction which integrates the local memory of different machines in a local area network environment into a single logical entity. In this paper, we study the problem of system failure and recovery of DSVM. Most DSVM systems use the notion of tokens to indicate a site's access rights on the data pages it caches, and a locating scheme to get to the most up-to-date version of a data page. Our problem is to recover this token directory after a site has failed. Our solution is to treat the token directory at each site as a fragment of a global token database and the page migration activities as token transactions that update this distributed database. By the use of the unilateral commit protocol (UCP) for token transactions, fast recovery of the token state at minimal run time overhead of token transactions execution can be achieved. %K Distributed\0Memory %A S.E. Lucco %A D.P. Anderson %T Tarmac: A Language system substrate based on mobile memory %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0Systems %A David P. Anderson %A Shin-Yuan Tzou %A Robert Wahbe %A Ramesh Govindan %A Martin Andrews %T Support for Continuous Media in the DASH system %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %X \fBAbstract:\fP Future distributed systems will support \fIcontinuous media\fP such as digital audio and video, allowing user programs to convert, process, store, and communicate continuous-media data. The DASH project is building an experimental kernel for such a system. We have defined the \fIDASH resource model\fP as a basis for reserving and scheduling resources (disk, CPU, network, etc.) involved in end-to-end handling of continuous media data. The model uses primitives that express workload characteristics and performance requirements, and defines an algorithm for negotiated reservation of distributed resources. This algorithm is embodied in the Session Reservation Protocol (SRP), defined in the DoD Internet protocol family. %K Distributed\0Real-Time\0Systems %A C.W. Mercer %A Y. Ishikawa %A H. Tokuda %T Distributed Hartstone: a distributed real-time benchmark suite %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %X \fBAbstract:\fP In our definition of the Distributed Hartstone (DHS) benchmark, we extend the Hartstone real-time benchmark [Weiderman89] to the distributed environment where communication and end-to-end scheduling become important. Traditional performance metrics for real-time systems do not tell the whole story, so we need a benchmark to gauge the performance for different areas of the operating system. Furthermore, we give a detailed description of the motivation and formulation of the benchmark to enable practitioners to implement the benchmark on a wide variety of systems. The benchmark is defined to be easily implemented on any system with basic real-time capability such as prioritized, preemptive scheduling and a real-time clock. Also, the tests are open-ended to allow comparisons on a wide variety of hardware. .sp 0.25 The benchmark has been implemented on the ARTS Kernel [Tokuda89a], a distributed real-time testbed we have developed in the ART Project at Carnegie Mellon University. We give the benchmark results from the ARTS Kernel for different types of processor and communication scheduling algorithms. These results verify the usefulness of the benchmark suite in distinguishing between performance characteristics of these algorithm. %K Protocol\0Analysis %A G. Singh %A A.J. Bernstein %T On the relative execution times of distributed protocols %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Protocol\0Analysis %A T. Bolognesi %T A graphical composition theorem for networks of Lotos processes %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0Real-Time\0Systems %A Sang H. Son %A Chun-Hyon Chang %T Performance evaluation of real-time locking protocols using a distributed software prototyping environment %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %X \fBAbstract:\fP Real-time systems must maintain data consistency while minimizing the number of tasks that miss the deadline. To satisfy both the consistency and real-time constraints, there is the need to integrate synchronization protocols with real-time priority scheduling protocols. In this paper, we address the problem of priority scheduling in real-time database systems. We first present a prototyping environment for investigating distributed software. Specific priority-based real-time locking protocols are then discussed, together with a performance study which illustrates the use of the prototyping environment for evaluation of synchronization protocols for real-time database systems. %K Distributed\0Systems %A J. Fowler %A W. Zwaenepoel %T Causal distributed breakpoints %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %X \fBAbstract:\fP A causal distributed breakpoint is initiated by a sequential breakpoint in one process of a distributed computation, and restores each process in the computation to its earliest state that reflects all events that ``happened before'' the breakpoint. A causal distributed breakpoint is the natural extension for distributed programs of the conventional notion of a breakpoint in a sequential program. We present an algorithm for finding the causal distributed breakpoint given a sequential breakpoint in one of the processes. Approximately consistent checkpoint sets are used for efficiently restoring each process to its state in a causal distributed breakpoint. .sp 0.25 Causal distributed breakpoints assume deterministic processes that communicate solely by messages. The dependencies that arise from communication between processes are logged. Dependency logging and approximately consistent checkpoint sets have been implemented on a network of SUN workstations running the V-System. Overhead on the message passing primitives varies between between 1 and 14 percent for dependency logging. Execution time overhead for a 200 * 200 Gaussian elimination is less than 4 percent, and generates a dependency log of 288 kilobytes. %K Distributed\0Systems %A Paul C. Attie %A Ira R. Forman %A Eliezer Levy %T On fairness as an abstraction for the design of distributed systems %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %X \fBAbstract:\fP A fairness property called U-fairness is studied in the context of the design of distributed systems with multiparty interactions. This is done with an overlapping model of concurrency. A distributed algorithm implementing this fairness notion is presented. U-fairness is shown to be more appropriate to the design of distributed systems because it provides an abstraction for stable property detection while other known fairness notions do not. %K Distributed\0Systems %A O.C. Kowalski %A H. Hartig %T Protection in the Birlix operating system %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0Systems %A S.C. Shyu %A V.O.K. Li %A C.P. Wang %T An abortion-free distributed-deadlock detection/resolution algorithm %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0Systems %A S. Lujun %A F. Changpeng %A S. Zhongxiu %T Towards a combinative distributed operating system in Cluster 86 %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Security %A Shyh-Wei Luan %A Virgil D. Gligor %T On replay detection in distributed systems %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %X \fBAbstract:\fP Various approaches to the problem of replay detection in distributed systems are briefly reviewed. A new approach is proposed based on combining a variable--size time--window mechanism with a challenge mechanism. This approach has the properties that: (1) it does not depend on clock synchronization, (2) it allows the setting of a minimum server's memory-buffer size in a way that ensures acceptance of all legitimate client requests, (3) it is robust without requiring stable (non-volatile) memory for the server buffer needed to save past client requests, (4) whenever the server has a steady heavy load, it can be optimized to impose minimal memory-size demands without undue network bandwidth overhead. %K Fault-Tolerance %A S.K. Shrivastava %A S.M. Wheater %T Implementing fault-tolerant distributed applications using objects and multi-colored actions %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0File\0Systems %A D.J. Makaroff %A D.L. Eager %T Disk cache performance in distributed systems %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0File\0Systems %A K. Korner %T Intelligent caching for remote file service %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0Systems %A R. Kamel %A S.L. Lo %T The implementation of remote rendez-vous %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0Systems %A E. Walker %A P. Neves %A R. Floyd %T Asynchronous remote operation execution in distributed systems %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %X \fBAbstract:\fP Remote procedure call (RPC) has become a widely accepted interprocess communication mechanism in distributed systems. The popularity of RPC stems from its simple call syntax and semantics, and its support for compile-time type checking and automatic interface generation. However, the synchronous nature of RPC makes it difficult to take advantage of the parallelism inherent in a distributed environment. We have implemented an asynchronous remote operation execution facility that retains the benefits of the RPC abstraction, but allows execution to proceed locally in parallel with remote execution and provides extensive support for managing replies. This paper describes the design and implementation of our facility, and shows how it can be easily used to support many common interprocess communication styles, including RPC, multicast, broadcast, returning incremental results, and the multiplexing of multiple remote computations. %K Distributed\0Systems %A A. Thomassian %A E. Rahm %T A new distributed optimistic concurrency control method and a comparison of its performance with two-phase locking %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0Systems %A W.S. Lloyd %A P. Kearns %T Bounding sequence numbers in distributed systems: A general approach %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0Systems %A D. Kumar %T An implementation on N-way synchronization using tokens %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0Databases %A M.S. Chen %A P.S. Yu %T Using combination of join and semijoin operations for distributed query processing %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0Systems %A Shun Yan Cheung %A Mustaque Ahamad %A Mostafa H. Ammar %T Multi-dimensional voting: A general method for implementing synchronization in distributed systems %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE We introduce a new concept, \fImulti-dimensional voting\fP, in which the vote and quorum assignments are k-dimensional vectors of non-negative integers and each dimension is independent of the others. Multi-dimensional voting is more powerful than traditional weighted voting because it is equivalent to the general method for achieving synchronization in distributed systems which is based on coteries (set of groups of nodes) but its implementation is easier than coteries. We describe an efficient algorithm for finding a multi-dimensional vote assignment for any given coterie and show examples of its use. We also show how multi-dimensional voting can be used to easily implement novel algorithms for synchronizing access to replicated data or to ensure mutual exclusion. These algorithm cannot be implemented by traditional weighted voting. %K Distributed\0Databases %A C.L. Huang %A V.O.K. Li %T Regeneration-based multiversion dynamic voting scheme for replicated database systems %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0Databases %A A. Kumar %T Performance analysis of a hierarchical quorum consensus algorithm for replicated objects %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Congestion\0Control %A D. Comer %A R. Yavatkar %T A rate-based congestion avoidance and control scheme for packet switched networks %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %X \fBAbstract:\fP The problem of congestion control in packet switched networks continues to attract widespread attention in the networking community. Under overloading conditions, a network drops packets, informs the traffic sources of congestion, and relies on the external sources to reduce the load on the network. The policy of reacting to the congestion after it occurs results in considerable degradation in the throughput during network recovery. We argue that it is important to exercise congestion control inside the network and discard the excess traffic before it enters the network instead of waiting for the congestion to build at some intermediate point in the network. We have devised a congestion avoidance and control scheme that monitors the incoming traffic to each destination and provides rate based feedback information to the sources of bursty traffic so that sources of traffic can adjust their packet rates to match the network capacity. The paper discusses the scheme in detail and describes the results of an experimental evaluation. %K Routing %A D.D. Kandlur %A K.G. Shin %T Traffic routing for multi-computer networks with virtual cut-through capability %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Congestion\0Control %A P. Gopinath %A R. Gupta %T Opportunistic evaluation of communication link loads %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0File\0Systems %A X. Jia %A H. Nakano %A K. Shimuzu %A M. Maekawa %T Highly concurrent directory management in distributed systems %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0File\0Systems %A C. Brian Pinkerton %A Edward D. Lazowska %A David Notkin %A John Zahorjan %T A heterogeneous distributed file system %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %X \fBAbstract:\fP The increase in diversity of computing hardware and software has made heterogeneity a fact of life in today's distributed systems. The overall heterogeneous nature of such systems is of benefit to users when working individually, since they are free to choose the environment best suited to their work. On the other hand, this same flexibility makes sharing more difficult. .sp 0.25 The work presented here addresses the system service most critical to sharing: the file system. A distributed file system in a heterogeneous environment must provide remote access between machines with different hardware, operating systems, native file systems, and application programs. To be most useful, it must provide convenient access to remote files, which implies that no special preprocessing of files should be required to make them available system-wide. Furthermore, to be successful in an evolving heterogeneous environment, the file system must be easy to build, maintain, and extend, as well as easy to use. .sp 0.25 Our goals for this project were to elucidate the demands on a heterogeneous distributed file system, and to design and implement a prototype to meet these demands. Our prototype, the HCS File System (HFS), provides a network-wide file system supporting a simple record-oriented file model. Through this standard file model, the HFS provides global access to files stored locally in many different file types, from byte stream to ISAM. .sp 0.25 The HFS is implemented as a set of HFS servers, one running on each participating host. Each HFS server extends its host's local file system by fielding remote requests for files stored locally, translating those requests into the appropriate local file system calls, and returning any information so obtained. .sp 0.25 Our prototype HFS implementation has been used on a network composed of VAX systems running Ultrix, Sun systems running 4.2BSD UNIX, and Xerox Dandelions running XDE. %K Distributed\0File\0Systems %A A. Sandoz %T Achieving high availability in a replicated file system by dynamically ordering transactions %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Multicast %A E. Cooper %T Programming language support for multicast communication in distributed system %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %X \fBAbstract\fP: Multicast or group communication is an important part of modern distributed systems, but programming language support for such communication is uncommon. Remote procedure call uses a familiar programming language abstraction to support unicast request-response communication; what should the corresponding abstraction be for multicast communication? .sp 0.5 The essential and desirable properties of a language construct for multicast communication are presented first. Essential properties include type safety, expressive power, and efficiency. Desirable properties include use of familiar control and data structures, appropriate semantic level, and first-class treatment of multicast operations in progress. .sp 0.5 The main contribution of the paper is the introduction of a spectrum of abstractions for multicast communication, in increasing order of both desirability and semantic level: functional mapping, iterators, and streams. Examples of distributed algorithms from the literature are used to illustrate the expressive power of each mechanism. Streams in particular provide first-class status for multicast communication in progress, and can be implemented efficiently in typical multicast communication architectures. [\fINote:\fP Also available as tech report CMU-CS-90-121, School of Computer Science, Carnegie-Mellon]. %K Distributed\0Memory %A R.G. Minnich %A D.J. Farber %T Reducing host load, network load and latency in distributed shared memory %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %X \fBAbstract:\fP Mether is a Distributed Shared Memory (DSM) that runs on Sun workstations under the SunOS 4.0 operating system. User programs access the Mether address space in a way indistinguishable from other memory. When we began to use Mether and measure its performance a number of issues made themselves felt: .sp 0.25 - Programs could saturate the network with packets while trying to synchronize operations .sp 0.25 - Because the communications are accomplished via a user level server, an Mether client program spinning on a lock could block the user level server, resulting in a backup of queued packets .sp 0.25 - The combined effects of deep queues of packets waiting for service and communications servers blocked by Mether clients greatly increased the latency of the shared memory .sp 0.25 - Too many packets had to flow for simple synchronization operations, resulting in increased network load .sp 0.25 - Programs that were trying to synchronize spent most of their time spinning on unchanged data, increasing host load .sp 0.25 We had seen the same increased latency problem on a different distributed shared memory called MemNet. Although MemNet is hardware-based and uses a token ring it is still possible to flood the network and increase the latency by several orders of magnitude. .sp 0.25 In this paper we discuss changes we made to Mether and protocols we developed to use Mether that minimize host load, network load, and latency. An interesting (and unexpected) result was the discovery that the same ``best'' protocol for Mether is identical to the ``best'' protocol for MemNet. .sp 0.25 The changes to Mether involve exposing an inconsistent store to the application and making access to the consistent and inconsistent versions very convenient; providing both demand-driven and data-driven semantics for updating pages; and allowing the user to specify that only a small subset of a page need be transferred. All of these operations are encoded in a few address bits in the Mether virtual address. .sp 0.25 The ``best'' protocol which we have developed involves using pages as one-way links. Only one processor has the consistent (or ``master'') copy. All other processors have an inconsistent copy. As the consistent copy changes the process with the consistent copy can cause the newest version to be broadcast to all the processes reading the inconsistent copy. As a result only two packets need to flow, on average, per synchronization operation. %K Distributed\0Systems %A J.E. Lumpp, Jr. %A T.L. Casavant %A H.J. Siegel %A D.C. Marinescu %T Specification and identification of events for debugging and performance monitoring of distributed multiprocessor programs %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0Memory %A J.P. Sterbenz %A G.M. Parulkar %T AXON: Network virtual storage for high performance distributed applications %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K LANs %A K. Goto %A T. Suda %T Performance analysis of a broadcast star local area network with collision avoidance %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0Systems %A I. Chalmtac %A A. Ganz %T A study of communication resource allocation in a distributed system %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Routing %A Z. Liu %T Optimal routing in the De Bruijn networks %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0File\0Systems %A K.R. Pattipati %A J.L. Wolf %T A file assignment problem model for extended local area network environments %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0Systems %A C. Kim %A H. Kameda %T Optimal static load balancing of multi-class jobs in a distributed computer system %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Distributed\0Systems %A J. Kramer %A J. Magee %A A. Finkelstein %T A constructive approach to the design of distributed systems %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K Multimedia\0Communication %A E. Moeller %A A. Schller %A G. Shurmann %T Distributed processing of multimedia information %J Proc. 10th Intl. Conf. Distributed Computing Systems (ICDCS-10) %D May 28-June 1, 1990 %C Paris, France %I IEEE %K OSI %J Computer Standards & Interfaces %T A COS Study of OSI Interoperability %A J. Gadre %A C. Rohrer %A C. Summers %A S. Symington %P 217-238 %V 9 %N 3 %K High-Speed\0Networks %A I. Chlamtac %A W.R. Franta %T Rationale, Directions, and Issues Surrounding High Speed Networks %P 94-120 %J Proc. IEEE %D January 1990 %V 78 %K High-Speed\0Networks %A G. Hill %T Wavelength Domain Optical Network Techniques %P 121-132 %J Proc. IEEE %D January 1990 %V 78 %K ISDN %A F.A. Tobagi %T Fast Packet Switch Architectures for Broadband Integrated Services Digital Networks %P 133-167 %J Proc. IEEE %D January 1990 %V 78 %K High-Speed\0Networks %A I. Rubin %A J.E. Baker %T Media Access Control for High-Speed Local Area and Metropolitan Area Communications Networks %P 168-203 %J Proc. IEEE %D January 1990 %V 78 %K High-Speed\0Networks %A N.F. Maxemchuk %A M. El\0Zarki %T Routing and Flow Control in High-Speed Wide-Area Networks %P 204-221 %J Proc. IEEE %D January 1990 %V 78 %K Distributed\0Systems %A D. Notkin %T Proxies: A Software Structure for Accommodating Heterogeneity %J Software Practice & Experience %I John Wiley %V 20 %N 4 %D April 1990 %P 357-364 %K Directory\0Services %A M. Bowman %A L.L. Peterson %A A. Yeatts %T Univers: An Attribute-based Name Server %J Software Practice & Experience %I John Wiley %P 403-424 %V 20 %N 4 %D April 1990 %K Security %A M. Satyanarayanan %T Integrating Security in a Large Distributed System %P 247-280 %J ACM Trans. Computer Systems %D August 1989 %V 7 %N 3 %O \fIReviews\fP: \fIComputing Reviews\fP, May 1990. %K Protocol\0Performance %A Van Jacobson %T 4BSD Header Prediction %J Computer Communication Review %I ACM SIGCOMM %D April 1990 %V 20 %N 2 %P 13-15 %K Protocol\0Performance %A Lawrence H. Landweber %A Mitchell Tasman %T An ISO Tp4-TP0 Gateway %J Computer Communication Review %I ACM SIGCOMM %D April 1990 %V 20 %N 2 %P 16-21 %K Protocol\0Performance %A Martin L. Schoffstall %A Wengyik Yeong %T A Critique of Z39.50 Based On Implementation Experience %J Computer Communication Review %I ACM SIGCOMM %D April 1990 %V 20 %N 2 %P 22-29 %K Security %A Colin I'Anson %A Chris Mitchell %T Security Defects in CCITT Recommendation X.509 - The Directory Authentication Framework %J Computer Communication Review %I ACM SIGCOMM %D April 1990 %V 20 %N 2 %P 30-34 %K Flow\0Control %A Jean-Chrysostome Bolot %A A. Udaya Shankar %T Dynamical Behavior of Rate-Based Flow Control Mechanisms %J Computer Communication Review %I ACM SIGCOMM %D April 1990 %V 20 %N 2 %P 35-49 %K Distributed\0Systems %A James P.G. Sterbenz %A Gurudatta M. Parulkar %T AXON: Virtual Network Storage Design %J Computer Communication Review %I ACM SIGCOMM %D April 1990 %V 20 %N 2 %P 50-65 %K Security %A Robert W. Shirey %T Defense Data Network Security Architecture %J Computer Communication Review %I ACM SIGCOMM %D April 1990 %V 20 %N 2 %P 66-71 %K Electronic\0Mail %A Guy Genilloud %T X.400 MHS: First Steps Toward an EDI Communication Standard %J Computer Communication Review %I ACM SIGCOMM %D April 1990 %V 20 %N 2 %P 72-86 %K Network\0Management %A David Piscitello %A Patrick Sher %T Network Management Capabilities for Switched Multi-megabit Data Service %J Computer Communication Review %I ACM SIGCOMM %D April 1990 %V 20 %N 2 %P 87-97 %K Multimedia\0Communication %A C.-H. Chow %A M. Adachi %T Achieving Multimedia Communications on a Heterogeneous Network %P 348-359 %J IEEE Jour. Selected Areas in Communications %D April 1990 %V 8 %N 3 %K Multimedia\0Communication %A S. Nakano %A N. Nagai %A R. Sawada %A O. Miyagishi %T Network Control Method and Human-Machine Interface Design for ISDN Multimedia Terminal %P 360-367 %J IEEE Jour. Selected Areas in Communications %D April 1990 %V 8 %N 3 %K High-Speed\0Networks %A D. Ferrari %A D.C. Verma %T A Scheme for Real-Time Channel Establishment in Wide-Area Networks %P 368-379 %J IEEE Jour. Selected Areas in Communications %D April 1990 %V 8 %N 3 %K Multimedia\0Communication %A W.H. Leung %A T.J. Baumgartner %A Y.H. Hwang %A M.J. Morgan %A S.-C. Tu %T A Software Architecture for Workstations Supporting Multimedia Conferencing in Packet Switching Networks %P 380-391 %J IEEE Jour. Selected Areas in Communications %D April 1990 %V 8 %N 3 %K Multimedia\0Communication %A G.M. Woodruff %A R. Kostpaiboon %T Multimedia Traffic Management Principles for Guaranteed ATM Network Performance %P 437-446 %J IEEE Jour. Selected Areas in Communications %D April 1990 %V 8 %N 3 %K High-Speed\0Networks %A M. Murata %A Y. Oie %A T. Suda %A H. Miyahara %T Analysis of a Discrete-Time Single-Server Queue with Bursty Inputs for Traffic Control in ATM Networks %P 447-458 %J IEEE Jour. Selected Areas in Communications %D April 1990 %V 8 %N 3 %K High-Speed\0Networks %A H.S. Kim %A A. Leon-Garcia %T A Self-Routing Multistage Switching Network for Broadband ISDN %P 459-466 %J IEEE Jour. Selected Areas in Communications %D April 1990 %V 8 %N 3 %K High-Speed\0Networks %A A.A. Lazar %A G. Pacifici %A J.S. White %T Real-Time Traffic Measurements on MAGNET-II %P 467-483 %J IEEE Jour. Selected Areas in Communications %D April 1990 %V 8 %N 3 %K Distributed\0File\0Systems %A Mahadev Satyanarayanan %T Scalable, Secure, and Highly Available Distributed File Access %P 9-22 %J Computer %I IEEE %D May 1990 %V 23 %N 5 %K Distributed\0Systems %A Larry Peterson %A Norman Hutchinson %A Sean O'Malley %A Herman Rao %T The x-kernel: A Platform for Accessing Internet Resources %P 23-34 %J Computer %I IEEE %D May 1990 %V 23 %N 5 %K Distributed\0Systems %A Sape J. Mullender %A Guido van Rossum %A Andrew S. Tanenbaum %A Robbert van Renesse %A Hans van Staveren %T Amoeba: A Distributed Operating System for the 1990s %P 44-53 %J Computer %I IEEE %D May 1990 %V 23 %N 5 %K Distributed\0Systems %A Michael Stumm %A Songnian Zhou %T Algorithms Implementing Distributed Shared Memory %P 54-64 %J Computer %I IEEE %D May 1990 %V 23 %N 5 %K Network\0Management %A M. Rose %A K. McCloghrie %T Structure and Identification of Management Information for TCP/IP-based Internets; RFC-1155 %N 1155 %J Internet Request for Comments %D May 1990 %I Network Information Center, SRI International %C Menlo Park, CA %X \fBAbstract:\fP This RFC is a re-release of RFC 1065, with a changed "Status of this Memo", plus a few minor typographical corrections. The technical content of the document is unchanged from RFC 1065. .sp 0.25 This memo specifies a Standard Protocol for the Internet community. Its status is "Recommended". TCP/IP implementations in the Internet which are network manageable are expected to adopt and implement this specification. %K Network\0Management %A K. McCloghrie %A M. Rose %T Management Information Base for Network Management of TCP/IP-based internets; RFC-1156 %J Internet Request for Comments %N 1156 %D May 1990 %I Network Information Center, SRI International %C Menlo Park, CA %X \fBAbstract:\fP This RFC is a re-release of RFC 1066, with a changed "Status of this Memo", "IAB Policy Statement", and "Introduction" sections plus a few minor typographical corrections. The technical content of the document is unchanged from RFC 1066. .sp 0.25 This memo specifies a Standard Protocol for the Internet community. TCP/IP implementations in the Internet which are network manageable are expected to adopt and implement this specification. %K Network\0Management %A J. Case %A M. Fedor %A M. Schoffstall %A J. Davin %T A Simple Network Management Protocol (SNMP); RFC-1157 %J Internet Request for Comments %N 1157 %D May 1990 %I Network Information Center, SRI International %C Menlo Park, CA %X \fBAbstract:\fP This RFC is a re-release of RFC 1098, with a changed "Status of this Memo" section plus a few minor typographical corrections. This memo defines a simple protocol by which management information for a network element may be inspected or altered by logically remote users. %K Miscellaneous %A J. Postel %T IAB Official Protocol Standards; RFC-1140 %J Internet Request for Comments %N 1140 %D May 1990 %I Network Information Center, SRI International %C Menlo Park, CA %X \fBAbstract:\fP This RFC describes the state of standardization of protocols used in the Internet as determined by the Internet Activities Board (IAB). .sp 0.25 This memo is issued quarterly, please be sure the copy you are reading is dated within the last three months. Current copies may be obtained from the Network Information Center or from the Internet Assigned Numbers Authority. Do not use this edition after 31-Aug-90. %K Distributed\0Systems %A M.L. Scott %T An overview of Lynx %R TR 308 %I Univ. of Rochester Computer Science Dept. %D Aug. 1989 %Z 27 pages, $1.25 %X \fBAbstract:\fP A programming language can provide much better support for interprocess communication than a library package can. Most message-passing languages limit this support to communication between the pieces of a single program, but this need not be the case. Lynx facilitates convenient, typesafe message-passing not only within applications, but also between applications, and among distributed collections of servers. Specifically, it addresses issues of compiler statelessness, late binding, and protection that allow run-time interaction between processes that were developed independently and that do not trust each other. Implementation experience with Lynx has yielded important insights into the relationship between distributed operating systems and language run-time support packages, and into the inherent costs of high-level message-passing semantics. %K Network\0Management %A Bruce L. Hitson %R CSL-TR-90-414 %T Knowledge-based Monitoring and Control of Distributed Systems %D February 1990 %I Computer Systems Lab, Stanford University %X \fBAbstract:\fP Monitoring and control (M&C) refers to the process of collecting information about a system, interpreting it, and finally using it to affect system behavior. We show that a knowledge-based approach is both necessary and appropriate for M&C of complex message-based distributed systems, and that a blackboard architecture can be successfully applied to M&C problems in the same way that it has been previously applied in other signal processing domains. To achieve good performance, we have augmented the traditional purely declarative rule system approach with cached temporal linkage information and fast procedural analysis routines. Scheduling or search control must be tuned for individual M&C applications. We have developed multi-level weighted search control to overcome some of the scheduling problems that are encountered in domains such as M&C where shallow heuristic knowledge predominates. Our ideas have been developed and refined in the context of two implementations of monitoring and control "expert systems": an automated TCP/IP network protocol analyst, and a system for both performing Time Warp distributed simulations and analyzing the results. Their common aspects form the basis for KNOBS---a knowledge-based M&C shell and environment that is suitable and practical for studying a wide range of distributed systems. [To order, call +1 415-723-1430]. %K Distributed\0File\0Systems %A Cary C. Gray %A David R. Cheriton %T Leases: An Efficient Fault-Tolerant Mechanism for Distributed File Cache Consistency %D January 1990 %R CSL-TR-90-409 %I Computer Systems Lab, Stanford University %X \fBAbstract:\fP Caching introduces the overhead and complexity of ensuring consistency, reducing some of its performance benefits. In a distributed system, caching must deal with the additional complications of communication and host failures. Leases are proposed as a time-based mechanism that provides efficient consistent access to cached data in distributed systems. Non-Byzantine failures affect performance, not correctness, with their effect minimized by short leases. An analytic model and an evaluation for file access in the V system show that leases of short duration provide good performance. The impact of leases on performance grows more significant in systems of larger scale and higher processor performance. [To order, call +1 415-723-1430] %K Distributed\0Systems %A G. Bruns %A C. Richter %P 16 %D October 1989 %R STP-251-89 %I MCC Software Technology Program %T Rada - An Ada-Based Language for Distributed Systems Design %X \fBAbstract:\fP Rada is a language for the design of distributed systems. It is based on Ada, but replaces the concurrency mechanisms of Ada with those of the language Raddle. Specifically, Rada replaces the task and rendezvous of Ada with the team, role, N-party interaction, and non-deterministic choice of Raddle. The form of this report mirrors the form of the Ada reference manual, and presumes some familiarity with Ada. The syntax for each new Rada concurrency construct is given, followed by a informal description of the semantics of the construct. The Appendix contains a Rada version of a Raddle cellular telephone system design. [For copies, email to babcock@mcc.com] %K Protocol\0Testing\0and\0Verification %A Alfred. V. Aho %A Barry S. Bosik %A Stephen J. Griesmer %T Protocol testing and verification within AT&T %P 4-6 %J AT&T Technical Journal %V 69 %N 1 %D January/February 1990 %K Protocol\0Testing\0and\0Verification %A Herbert V. Bertine %A Wolfgang B. Elsner %A Promde K. Verma %A Kamlesh T. Tewani %T Overview of Protocol Testing Programs, Methodologies, and Standards %P 7-16 %J AT&T Technical Journal %V 69 %N 1 %D January/February 1990 %K Protocol\0Testing\0and\0Verification %A M. Umit Uyar %A Aleta Lapone %A Krishan K. Sabnani %T Algorithmic Verification of ISDN Network Layer Protocol %P 17-31 %J AT&T Technical Journal %V 69 %N 1 %D January/February 1990 %K Protocol\0Testing\0and\0Verification %A Gerard L. Holzmann %T Algorithms for Automated Protocol Verification %P 32-44 %J AT&T Technical Journal %V 69 %N 1 %D January/February 1990 %K Protocol\0Testing\0and\0Verification %A Zri Har'El %A Robert Kurshan %T Software for Analytical Development of Communications Protocols %P 45-59 %J AT&T Technical Journal %V 69 %N 1 %D January/February 1990 %K Protocol\0Conformance\0Testing %A Mostafa Hasehm Sherif %A M. Umit Uyar %T Protocol Modeling for Conformance Testing: Case Study for the ISDN LAPD Protocol %P 60-83 %J AT&T Technical Journal %V 69 %N 1 %D January/February 1990 %K Protocol\0Conformance\0Testing %A Mathew Bush %A Kris Rasmussen %A Fai Wong %T Conformance Testing Methodologies for OSI Protocols %P 84-100 %J AT&T Technical Journal %V 69 %N 1 %D January/February 1990 %K Protocol\0Conformance\0Testing %A Anton T. Dahbura %A Krishan K. Sabnani %A M. Umit Uyar %T Algorithm Generation of Protocol Conformance Tests %P 101-118 %J AT&T Technical Journal %V 69 %N 1 %D January/February 1990 %K Protocol\0Testing\0and\0Verification %A Darrell Hubbard %T Deterministic Execution Testing of FSM-Based Protocols %J AT&T Technical Journal %V 69 %N 1 %D January/February 1990 %K Security %A Raju Ramaswamy %T A Key management Algorithm for Secure Communication in Open Systems Interconnection Architecture %J Computers & Security - international Journal %V 9 %N 1 %D February 1990 %P 77-84 %X \fBAbstract:\fP A key management algorithm is presented in this paper. It is applied to secure transmission of user data between two peer layers of an open systems interconnection reference model architecture located at any source and destination end_user host systems. In particular, the algorithm (i) generates and distributes a session key between two peer layers during the connection establishment phase,(ii) encrypts and decrypts the user data, present in the protocol data unit, using the same session key during the data transfer phase and (iii) after transmitting the user data, it destroys the session key during the connection release phase. For the purpose of simulation, the algorithm is shown applied between the transport service user and the provider, present at the source and the destination host systems, for secure transfer of transport service user data to the corresponding remote peer layer using the class 4 transport protocol of the OSI_RM architecture. %K Network\0Design %A Raju Ramaswamy %T Design of terrestrial/satellite computer communication networks using Slotted ALOHA and SS/TDMA satellite systems %J Space Communications - International Journal %V 7 %D 1990 %P 139-154 %X \fBAbstract:\fP With the rate of growth of packet-switched computer communication networks, the future networks are expected to comprise hundreds or thousands of packet switching nodes. In view of the network design and computational time requirements, ultimately the topological design complexity of such large-scale computer communication networks would grow exponentially with the size of the network. Therefore, efficient procedures for the design and operation of large- scale computer communication networks are required. In this paper, a multi-level hierarchial approach is presented for the topological design of a large-scale computer communication network using terrestrial and Slotted ALOHA and Satellite Switched SS/TDMA satellite with terrestrial or mixed-media systems. In this paper, for a given set of packet switching nodal locations, the nodes are initially decomposed into an M-level Hierarchial Clustering (MHC) structure Then, an M-level Hierarchial Topological (MHT) structure is formed over the above MHC structure. Finally, an M-level Hierarchical Routing (MHR) scheme is presented for routing the messages between any source-destination node-pair. Also, an expression for the average time delay of a message in an M-level hierarchically clustered and topologically structured terrestrial and satellite computer communication network is given. %K Security %A Raju Ramaswamy %T A Security Architecture and Mechanism for Data Confidentiality in TCP/IP Protocols %J Proc.1990 IEEE Symposium on Research in Security and Privacy %D May 1990 %C Oakland, Calif. %P 249-259 %X \fBAbstract:\fP A method to provide data confidentiality service for secure data communication between two end users through TCP/IP protocols is presented in this paper. The system call functions of the Socket Compatibility Interface and Transport Level Interface libraries are used for Connection Establishment, Data Transfer, and Connection Release between two TCP/IP end users. In this paper, a new security architecture consisting of Interactive Application Program, Client/Server, and Security Service modules as well as the corresponding security mechanism to provide data confidentiality service are presented. %K Network\0Design %A Raju Ramaswamy %T Satellite Ground Stations Location Problem In Terrestrial/ Satellite Computer Communication Networks Design %D 1990 %R TR-NT-1990-2 %I Computer Science Telecommunication program, Univ. Missouri-Kansas City 5100 Rockhill Rd, Kansas City, MO 64110 %X \fBAbstract:\fP In a terrestrial Computer communication network, When the input traffic requirement is gradually increased, a set of saturated cut-set links virtually disconnects the network into two disjoint regions of nodes. To increase the network throughput further, a high-capacity Slotted-ALOHA satellite channel is added across the saturated cut-set links. Since the cost of locating a satellite ground station is more or less the same, irrespective of its location, an SGSLOC algorithm is presented to properly locate the satellite ground stations in order to achieve an increase in Network throughput, improved network reliability, and decrease in average packet delay for the same location cost For a model computer network, the simulation results are given to demonstrate the improvement in network performance. %K Time\0Synchronization %A M.G. Gouda %A T. Herman %T Stabilizing Unison %D January 1990 %R TR-90-01 %I Comp. Science Dept, Univ. Texas at Austin %P 7 %X \fBAbstract:\fP We present an elegant implementation of ``clocks'' in distributed synchronous systems. The implementation is stabilizing in the following sense. Starting from any state, the clocks are guaranteed to reach ``unison'' where they show the same time, and the shown time is incremented in each step. %K Network\0Management %J Internet Request for Comments %A M. Rose %T Management Information Base for Network Management of TCP/IP-based internets: MIB-II %N 1158 %D May 1990 %I Network Information Center, SRI International %C Menlo Park, CA %X \fBAbstract:\fP This memo defines the second version of the Management Information Base (MIB-II) for use with network management protocols in TCP/IP- based internets. In particular, together with its companion memos which describe the structure of management information (RFC 1155) along with the network management protocol (RFC 1157) for TCP/IP- based internets, these documents provide a simple, workable architecture and system for managing TCP/IP-based internets and in particular the Internet community. .sp 0.25 This document on MIB-II incorporates all of the technical content of RFC 1156 on MIB-I and extends it, without loss of compatibility. However, MIB-I as described in RFC 1156 is full Standard Protocol of the Internet, while the MIB-II described here is Proposed Standard Protocol of the Internet. .sp 0.25 This memo defines a mandatory extension to the base MIB (RFC 1156) and is a Proposed Standard for the Internet community. The extensions described here are currently Elective, but when they become a standard, they will have the same status as RFC 1156, that is, Recommended. The Internet Activities Board recommends that all IP and TCP implementations be network manageable. This implies implementation of the Internet MIB (RFC 1156 and the extensions in RFC 1158) and at least one of the two recommended management protocols SNMP (RFC 1157) or CMOT (RFC 1095). %K Miscellaneous %A V. Cerf %T The Internet Activities Board; RFC-1160 %J Internet Request for Comments %N 1160 %D May 1990 %I Network Information Center, SRI International %C Menlo Park, CA %X \fBAbstract:\fP This RFC provides a history and description of the Internet Activities Board (IAB) and its subsidiary organizations. This memo is for informational use and does not constitute a standard. This is a revision of RFC 1120. %K Multicast %A B. Awerbuch %A O. Goldreich %A D. Peleg %A R. Vainish %T A Trade-Off between Information and Communication in Broadcast Protocols %P 238-256 %J Jour. Assoc. for Computing Machinery %D April 1990 %V 37 %N 2 %K Distributed\0Systems %A M. Herlihy %T Concurrency and Availability as Dual Properties of Replicated Atomic Data %P 257-275 %J Jour. Assoc. for Computing Machinery %D April 1990 %V 37 %N 2 %A L. Zahn %A T. Dineen %A P. Leach %A E. Martin %A N. Mishkin %A J. Pato %A G. Wyant %T Network Computing Architecture %D 1990 %I Prentice Hall %P 224 %A M. Kong %A T. Dineen %A P. Leach %A E. Martin %A N. Mishkin %A J. Pato %A G. Wyant %T Network Computing System Reference Manual %D 1990 %I Prentice Hall %P 416 %A Terry Knowles %A John Larmouth %A Keith Knightson %T Standards for Open Systems Interconnection %I BSP Professional Books %D 1987 %O \fIReviews\fP: \fIConneXions\fP, Vol. 4, No. 3, March 1990. %A J. Fitzgerald %T Business data communications (2nd ed.) %I John Wiley and Sons %C New York %D 1988 %P 683 %O \fIReviews:\fP \fIComputing Reviews\fP, Vol. 31, No. 3, March 1990. %A C.T. Medow %A A.S. Tedesco %T Telecommunications for Management %D 1985 %I McGraw-Hill %P 379 %O \fIReviews:\fP \fIComputing Reviews\fP, Vol. 31, No. 3, March 1990. %A J. Misra %A Byron Belitsos %T Business Telecommunications: concepts, technologies and cases in telematics %I Richard D. Irwin, Inc. %I Homewood, Illinois %P 532 %O \fIReviews:\fP \fIComputing Reviews\fP, Vol. 31, No. 3, March 1990. %A George W. Reynolds %A Donald Riecks %T Introduction to business telecommunications %D 1988 %I Merrill Publishing %C Columbus %P 269 %O \fIReviews:\fP \fIComputing Reviews\fP, Vol. 31, No. 3, March 1990. %A Stanford H. Rowe %T Business telecommunications %I Macmillan %C New York %D 1988 %O \fIReviews:\fP \fIComputing Reviews\fP, Vol. 31, No. 3, March 1990. %A Kenneth Sherman %T Data communications: a users guide (2nd ed.) %D 1985 %I Reston Publishing Co. %C Reston, Virginia %P 446 %O \fIReviews:\fP \fIComputing Reviews\fP, Vol. 31, No. 3, March 1990. %A Gerald A. Silver %A Myrna Silver %T Data communications for business %I Boyd & Fraser %C San Francisco %P 411 %D 1987 %O \fIReviews:\fP \fIComputing Reviews\fP, Vol. 31, No. 3, March 1990. %A William Stallings %T Data and computer communications (2nd ed.) %D 1988 %I Macmillan %C New York %P 456 %O \fIReviews:\fP \fIComputing Reviews\fP, Vol. 31, No. 3, March 1990. %A David A. Stamper %T Business data communications (2nd ed.) %I Benjamin/Cummings %C Menlo Park, California %D 1989 %P 556 %O \fIReviews:\fP \fIComputing Reviews\fP, Vol. 31, No. 3, March 1990. %A William Stallings %T ISDN: an introduction %P 418 %I Macmillan %C New York %D 1989 %O \fIReviews:\fP \fIComputing Reviews\fP, Vol. 31, No. 3, March 1990. %A Gerd E. Keiser %T Local Area Networks %I McGraw-Hill %C New York %D 1989 %P 420 %O \fIReviews:\fP \fIComputing Reviews\fP, Vol. 31, No. 3, March 1990. %A J.R. Freer %T Computer Communications and networks %I Plenum Publishing Corp. %C New York %D 1989 %P 432 %O \fIReviews:\fP \fIComputing Reviews\fP, Vol. 31, No. 4, April 1990. %A Franz-Joachim Kauffels %T Practical LANs analysed %I Halsted Press %C New York %D 1989 %P 334 %O \fIReviews:\fP \fIComputing Reviews\fP, Vol. 31, No. 4, April 1990. %A W. Richard Stevens %T UNIX Network Programming %I Prentice Hall %D 1990 %O \fIReviews:\fP \fIConneXions\fP, Vol. 4, No. 4, April 1990. [Note: the same review appears in this issue of \fICCR\fP] %A William Stallings %A Paul Mockapetris %A Sue McLeod %A Tony Michel %A Craig Partridge %A Keith McCloghrie %T Handbook of Computer-Communications Standards Volume 3: The TCP/IP Protocol Suite, Second Edition %I Howard W. Sams & Co %D 1989 %O \fIReviews:\fP \fIConneXions\fP, Vol. 4, No. 4, April 1990. %A A.S. Tanenbaum %A Et. Al. %T The Amoeba Distributed Operating System %D 1990 %X \fBNote:\fP A collection of key reports on Amoeba, available as a free book, by anonymous FTP from midgard.ucsc.edu. %A Nathan J. Muller %A Robert P. Davidson %T LANs to WANs: Network Management in the 1990s %I Artech House %D August 1990 %C Norwood, Massachusetts %X \fBNote:\fP Can be ordered in advance of publication date. ISBN #0-89006-410-5.