{"title":"A simulation model for analyzing the performance behavior of token-ring local area networks","authors":"W. Dudzik","doi":"10.1145/41824.41827","DOIUrl":null,"url":null,"abstract":"This paper describes the design and capabilities of a simulation program that models the behavior of a token-ring access local area network (LAN). Such networks consist of a variety of devices connected to a high speed transmission medium having a geographic extent limited to a few kilometers. Topologically, the transmission medium and devices constitute a closed loop or ring. Devices transmit messages on the ring only after obtaining control of a permission token that regulates access to the transmission medium. Attention is focused on the token-ring access protocol since the available evidence (see [1] and [2] for example) suggests that this protocol results in small delays at light workloads and controlled delay at heavy workloads. Based on this favorable assessment of performance, the token-ring access protocol is expected to be widely used in the future.","PeriodicalId":186490,"journal":{"name":"Annual Simulation Symposium","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1987-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Annual Simulation Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/41824.41827","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This paper describes the design and capabilities of a simulation program that models the behavior of a token-ring access local area network (LAN). Such networks consist of a variety of devices connected to a high speed transmission medium having a geographic extent limited to a few kilometers. Topologically, the transmission medium and devices constitute a closed loop or ring. Devices transmit messages on the ring only after obtaining control of a permission token that regulates access to the transmission medium. Attention is focused on the token-ring access protocol since the available evidence (see [1] and [2] for example) suggests that this protocol results in small delays at light workloads and controlled delay at heavy workloads. Based on this favorable assessment of performance, the token-ring access protocol is expected to be widely used in the future.