首页 > 最新文献

IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings最新文献

英文 中文
The effect of multiplexing, switching and other factors on the performance of broadband networks 多路复用、交换等因素对宽带网络性能的影响
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253381
Verna J. Friesen, J. Wong
A network model is developed for studying the effect of multiplexing and switching on broadband network performance. Emphasis is placed on the queuing behavior in the network and the impact of multiplexing and switching on the burstiness of the various traffic streams. The three parameters commonly used to characterize traffic (peak bit rate, mean bit rate, and mean burst length) are also considered, and the dependence of the queuing behavior on these parameters is investigated. The performance of three congestion control schemes based on the leaky bucket algorithm is evaluated. The results provide insight into how call acceptance, bandwidth allocation, and bandwidth enforcement should be implemented in a broadband integrated services digital network (BISDN).<>
为了研究多路复用和交换对宽带网络性能的影响,建立了网络模型。重点研究了网络中的排队行为以及多路复用和交换对各种业务流突发性的影响。本文还考虑了用于描述流量的三个参数(峰值比特率、平均比特率和平均突发长度),并研究了排队行为对这些参数的依赖关系。对三种基于漏桶算法的拥塞控制方案的性能进行了评价。研究结果为如何在宽带综合业务数字网络(BISDN)中实现呼叫接收、带宽分配和带宽强制提供了见解。
{"title":"The effect of multiplexing, switching and other factors on the performance of broadband networks","authors":"Verna J. Friesen, J. Wong","doi":"10.1109/INFCOM.1993.253381","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253381","url":null,"abstract":"A network model is developed for studying the effect of multiplexing and switching on broadband network performance. Emphasis is placed on the queuing behavior in the network and the impact of multiplexing and switching on the burstiness of the various traffic streams. The three parameters commonly used to characterize traffic (peak bit rate, mean bit rate, and mean burst length) are also considered, and the dependence of the queuing behavior on these parameters is investigated. The performance of three congestion control schemes based on the leaky bucket algorithm is evaluated. The results provide insight into how call acceptance, bandwidth allocation, and bandwidth enforcement should be implemented in a broadband integrated services digital network (BISDN).<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126659958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Minimum-cost synchronizable test sequence generation via the duplexU digraph 通过双向图生成成本最小的可同步测试序列
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253241
Wen-Huei Chen, C. Tang, H. Ural
A test sequence generation method is proposed for testing the conformance of a protocol implementation to its specification in a remote testing system, taking both external synchronization and input/output operation costs into consideration. The method consists of a set of transformation rules that constructs a duplexU digraph from a given finite state machine (FSM) representation of a protocol specification and a heuristic algorithm that finds a rural postman tour in the duplexU digraph to generate a synchronizable test sequence utilizing multiple UIO sequences. If the protocol satisfies a specific property, the heuristic algorithm yields a minimum-cost test sequence. The X.25 DTE and ISO Class 0 Transport protocols are proved to possess this specific property. otherwise, the heuristic algorithm yields a test sequence whose cost is within a bound from the cost of the minimum-cost test sequence. The bound for the test sequence generated from the Q.931 Network-side protocol is shown to be the cost sum of an input/output operation and an external synchronization operation.<>
提出了一种在远程测试系统中测试协议实现是否符合规范的测试序列生成方法,同时考虑了外部同步和输入/输出操作成本。该方法由一组转换规则组成,该转换规则根据协议规范的给定有限状态机(FSM)表示构造双向图,以及一种启发式算法,该算法在双向图中查找农村邮递员之旅,以利用多个UIO序列生成可同步的测试序列。如果协议满足特定属性,则启发式算法产生最小代价测试序列。X.25 DTE和ISO Class 0传输协议已被证明具有此特定属性。否则,启发式算法产生的测试序列的代价在最小代价测试序列代价的一个范围内。由Q.931网络端协议生成的测试序列的边界显示为输入/输出操作和外部同步操作的成本总和。
{"title":"Minimum-cost synchronizable test sequence generation via the duplexU digraph","authors":"Wen-Huei Chen, C. Tang, H. Ural","doi":"10.1109/INFCOM.1993.253241","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253241","url":null,"abstract":"A test sequence generation method is proposed for testing the conformance of a protocol implementation to its specification in a remote testing system, taking both external synchronization and input/output operation costs into consideration. The method consists of a set of transformation rules that constructs a duplexU digraph from a given finite state machine (FSM) representation of a protocol specification and a heuristic algorithm that finds a rural postman tour in the duplexU digraph to generate a synchronizable test sequence utilizing multiple UIO sequences. If the protocol satisfies a specific property, the heuristic algorithm yields a minimum-cost test sequence. The X.25 DTE and ISO Class 0 Transport protocols are proved to possess this specific property. otherwise, the heuristic algorithm yields a test sequence whose cost is within a bound from the cost of the minimum-cost test sequence. The bound for the test sequence generated from the Q.931 Network-side protocol is shown to be the cost sum of an input/output operation and an external synchronization operation.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117227181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Queueing delays in rate controlled ATM networks 速率控制ATM网络中的排队延迟
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253319
A. Banerjea, S. Keshav
The problem of finding the worst-case end-to-end delay and buffer occupancy bounds in asynchronous transfer mode (ATM) networks with rate-controlled, non-work-conserving servers is addressed. A theoretical framework is constructed to analyze such servers in isolation and in tandem. The analysis is based on a simple fluid model, but care is taken so that the computed delay and buffer occupancy values are upper bounds on actual values. A single algorithm is presented to perform these calculations in linear time. Simulation results are given in order to compare the computed worst-case delays with the actual delays obtained on some simple network topologies. The algorithm is found to predict node delays well for bursty input traffic, but poorly for smooth input traffic. Buffer requirements are predicted well in both cases.<>
在异步传输模式(ATM)网络中找到最坏情况下的端到端延迟和缓冲区占用界限的问题,该网络具有速率控制,不节省工作的服务器。构建了一个理论框架来分析这些服务器在隔离和串联。分析是基于一个简单的流体模型,但注意使计算的延迟和缓冲区占用值是实际值的上界。提出了一种在线性时间内完成这些计算的单一算法。为了将计算得到的最坏时延与在一些简单网络拓扑上得到的实际时延进行比较,给出了仿真结果。该算法对突发输入流量的节点延迟预测较好,但对平滑输入流量的节点延迟预测较差。在这两种情况下,缓冲需求都预测得很好。
{"title":"Queueing delays in rate controlled ATM networks","authors":"A. Banerjea, S. Keshav","doi":"10.1109/INFCOM.1993.253319","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253319","url":null,"abstract":"The problem of finding the worst-case end-to-end delay and buffer occupancy bounds in asynchronous transfer mode (ATM) networks with rate-controlled, non-work-conserving servers is addressed. A theoretical framework is constructed to analyze such servers in isolation and in tandem. The analysis is based on a simple fluid model, but care is taken so that the computed delay and buffer occupancy values are upper bounds on actual values. A single algorithm is presented to perform these calculations in linear time. Simulation results are given in order to compare the computed worst-case delays with the actual delays obtained on some simple network topologies. The algorithm is found to predict node delays well for bursty input traffic, but poorly for smooth input traffic. Buffer requirements are predicted well in both cases.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131101970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Fundamental limits of input rate control in high speed network 高速网络中输入速率控制的基本限制
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253305
San-qi Li, S. Chong
The fundamental limits of input rate control by specific analysis in the frequency domain are explored. Both deterministic and stochastic analyses are developed. The simple deterministic analysis helps provide knowledge about the performance tradeoff for input rate control in a high-speed network.<>
通过频域的具体分析,探讨了输入速率控制的基本限制。确定性分析和随机分析都得到了发展。简单的确定性分析有助于提供有关高速网络中输入速率控制的性能权衡的知识。
{"title":"Fundamental limits of input rate control in high speed network","authors":"San-qi Li, S. Chong","doi":"10.1109/INFCOM.1993.253305","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253305","url":null,"abstract":"The fundamental limits of input rate control by specific analysis in the frequency domain are explored. Both deterministic and stochastic analyses are developed. The simple deterministic analysis helps provide knowledge about the performance tradeoff for input rate control in a high-speed network.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132481282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
On the design of conference key distribution systems for the broadcasting networks 广播网络会议密钥分发系统的设计
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253406
C. Laih, Sung-Ming Yen
A design methodology for conference-key distribution systems (CKDSs) that is based on the threshold scheme for broadcasting networks is proposed. It is shown that if a conference chairman can share a secret key with each of the other conference participants, then any threshold scheme can be used to construct a CKDS. Since there already exist many identification (ID)-based key distribution systems for two users sharing a common secret key, ID-based CKDSs can easily be constructed for broadcasting networks.<>
提出了一种基于广播网络阈值方案的会议密钥分发系统(ckds)设计方法。结果表明,如果会议主席可以与其他与会者共享密钥,则可以使用任何阈值方案来构建CKDS。由于已经存在许多基于身份(ID)的密钥分发系统,用于共享公共密钥的两个用户,因此可以很容易地为广播网络构建基于ID的ckds。
{"title":"On the design of conference key distribution systems for the broadcasting networks","authors":"C. Laih, Sung-Ming Yen","doi":"10.1109/INFCOM.1993.253406","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253406","url":null,"abstract":"A design methodology for conference-key distribution systems (CKDSs) that is based on the threshold scheme for broadcasting networks is proposed. It is shown that if a conference chairman can share a secret key with each of the other conference participants, then any threshold scheme can be used to construct a CKDS. Since there already exist many identification (ID)-based key distribution systems for two users sharing a common secret key, ID-based CKDSs can easily be constructed for broadcasting networks.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130277768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance analysis of parallel ATM connections for gigabit speed applications 千兆速度应用中并行ATM连接的性能分析
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253380
N. Taft, P. Varaiya
A system which uses multiple asynchronous transfer mode (ATM) virtual circuits operating in parallel in order to control two WAN hosts at gigabit speeds is studied. Packets in parallel channels can bypass each other, so reordering of packets before delivery to the host is required. Performance parameters of this system, including ATM channel delay, packet loss, and resequencing delay, are analyzed, using a model for an ATM channel that multiplexes ATM virtual circuits carrying bursty and nonbursty traffic. It is found that the mean and variance of packet delay through an ATM switch grow linearly with burst size, and that the delay distribution can be closely approximated by a normal distribution. It is shown that packet loss is log-linear in the ratio of buffer size to burst size, and for maximum bursts larger than 50 cells, a buffer size of twice the maximum burst size is sufficient to achieve packet loss probabilities less than 10/sup -9/. Resequencing delay is shown to be insensitive to burst size, but the variance is large and grows linearly with burst size.<>
研究了一种利用并行运行的多个异步传输模式(ATM)虚拟电路以千兆速度控制两台广域网主机的系统。并行通道中的数据包可以相互绕过,因此需要在发送到主机之前对数据包进行重新排序。利用ATM虚拟电路复用突发和非突发业务的ATM信道模型,分析了该系统的性能参数,包括ATM信道延迟、丢包和重排序延迟。研究发现,通过ATM交换机的数据包延迟的均值和方差随突发大小线性增长,并且延迟的分布可以近似为正态分布。结果表明,丢包率在缓冲区大小与突发大小之比中呈对数线性关系,对于大于50个单元的最大突发,缓冲区大小为最大突发大小的两倍足以使丢包率小于10/sup -9/。重排序延迟对突发大小不敏感,但方差很大,并随突发大小线性增长。
{"title":"Performance analysis of parallel ATM connections for gigabit speed applications","authors":"N. Taft, P. Varaiya","doi":"10.1109/INFCOM.1993.253380","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253380","url":null,"abstract":"A system which uses multiple asynchronous transfer mode (ATM) virtual circuits operating in parallel in order to control two WAN hosts at gigabit speeds is studied. Packets in parallel channels can bypass each other, so reordering of packets before delivery to the host is required. Performance parameters of this system, including ATM channel delay, packet loss, and resequencing delay, are analyzed, using a model for an ATM channel that multiplexes ATM virtual circuits carrying bursty and nonbursty traffic. It is found that the mean and variance of packet delay through an ATM switch grow linearly with burst size, and that the delay distribution can be closely approximated by a normal distribution. It is shown that packet loss is log-linear in the ratio of buffer size to burst size, and for maximum bursts larger than 50 cells, a buffer size of twice the maximum burst size is sufficient to achieve packet loss probabilities less than 10/sup -9/. Resequencing delay is shown to be insensitive to burst size, but the variance is large and grows linearly with burst size.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"316 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128641628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
In-call renegotiation of traffic parameters 呼叫中重新协商流量参数
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253308
S. Crosby
An approximate model of an asynchronous transfer mode (ATM) multiplexer is constructed and used to compare the performances of static and dynamic resource allocation schemes. Static allocation parameterizes a source at connection setup only, whereas dynamic allocation requires a source to inform the multiplexer whenever its bandwidth requirements change. A simple dynamic renegotiation protocol is analyzed, and bounds on the performance of an optimal dynamic protocol are derived. Markovian source models parameterized from working applications are used to contrast the behavior of the three control schemes.<>
建立了异步传输模式(ATM)多路复用器的近似模型,并用于比较静态和动态资源分配方案的性能。静态分配仅在连接建立时参数化源,而动态分配要求源在带宽需求发生变化时通知多路复用器。分析了一种简单的动态重协商协议,推导了最优动态协议的性能界限。从工作应用中参数化的马尔可夫源模型用于对比三种控制方案的行为。
{"title":"In-call renegotiation of traffic parameters","authors":"S. Crosby","doi":"10.1109/INFCOM.1993.253308","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253308","url":null,"abstract":"An approximate model of an asynchronous transfer mode (ATM) multiplexer is constructed and used to compare the performances of static and dynamic resource allocation schemes. Static allocation parameterizes a source at connection setup only, whereas dynamic allocation requires a source to inform the multiplexer whenever its bandwidth requirements change. A simple dynamic renegotiation protocol is analyzed, and bounds on the performance of an optimal dynamic protocol are derived. Markovian source models parameterized from working applications are used to contrast the behavior of the three control schemes.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132242658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Performance modeling of window based flow control in a multihop packet radio LAN 多跳分组无线局域网中基于窗口的流量控制性能建模
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253384
S. Biswas
A hybrid model is used to evaluate the end-to-end performance of a multihop packet radio LAN, operating under a window based flow control mechanism. The model consists of radio data-link layer, transport layer, and application layer queuing representations. The radio data-link layer is modeled by using a simulator, written for a specific CSMA-type channel access algorithm. A multichain closed queuing network for the virtual circuit based end-to-end model is solved using an approximate mean value analysis (MVA) algorithm with modified convergence schemes. Network performance measures such as end-to-end delivery delay and throughput are computed from the analysis of the hybrid model. How the network bottleneck drifts around the network with varying application service times of the terminal radio stations is studied.<>
在基于窗口的流量控制机制下,采用混合模型对多跳分组无线局域网的端到端性能进行了评估。该模型由无线电数据链路层、传输层和应用层排队表示组成。无线电数据链路层是通过使用模拟器来建模的,该模拟器是为特定的csma类型的信道访问算法编写的。采用改进收敛格式的近似均值分析(MVA)算法求解了基于端到端虚拟电路模型的多链封闭排队网络。通过对混合模型的分析,计算出端到端传输延迟和吞吐量等网络性能指标。研究了随着终端无线电台应用服务时间的变化,网络瓶颈如何在网络中漂移。
{"title":"Performance modeling of window based flow control in a multihop packet radio LAN","authors":"S. Biswas","doi":"10.1109/INFCOM.1993.253384","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253384","url":null,"abstract":"A hybrid model is used to evaluate the end-to-end performance of a multihop packet radio LAN, operating under a window based flow control mechanism. The model consists of radio data-link layer, transport layer, and application layer queuing representations. The radio data-link layer is modeled by using a simulator, written for a specific CSMA-type channel access algorithm. A multichain closed queuing network for the virtual circuit based end-to-end model is solved using an approximate mean value analysis (MVA) algorithm with modified convergence schemes. Network performance measures such as end-to-end delivery delay and throughput are computed from the analysis of the hybrid model. How the network bottleneck drifts around the network with varying application service times of the terminal radio stations is studied.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"274 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122952175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An analysis of multi-receiver, non-adaptive, slotted Aloha with capture for wireless communications in factories 工厂无线通信中多接收机、非自适应、开槽Aloha捕获分析
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253334
M. S. Corson, A. Ephremides
An architecture for incorporating mobile data users into an existing MAP/TOP (Manufacturing Automation Protocol/Technical and Office Protocol) system is presented. The scheme attaches a small number of radio base stations to the TOP network through which the mobiles may access the system by executing a capture-based, multi-receiver extension of the traditional nonadaptive slotted Aloha protocol. A two-component capture model motivated by the factory channel is developed, and the multireceiver system's throughput performance is analyzed under two transmission models: base location independent and spatially correlated. It is seen that there is significant throughput degradation when base coverage areas overlap, indicating that this overlap should be minimized during system design.<>
提出了一种将移动数据用户集成到现有的MAP/TOP(制造自动化协议/技术和办公协议)系统中的体系结构。该方案将少量无线基站附加到TOP网络上,通过该网络,移动设备可以通过执行传统非自适应槽Aloha协议的基于捕获的多接收器扩展来访问系统。建立了由工厂信道驱动的双分量捕获模型,分析了基地位置无关和空间相关两种传输模型下多接收机系统的吞吐量性能。可以看出,当基本覆盖区域重叠时,存在显著的吞吐量下降,这表明在系统设计期间应尽量减少这种重叠。
{"title":"An analysis of multi-receiver, non-adaptive, slotted Aloha with capture for wireless communications in factories","authors":"M. S. Corson, A. Ephremides","doi":"10.1109/INFCOM.1993.253334","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253334","url":null,"abstract":"An architecture for incorporating mobile data users into an existing MAP/TOP (Manufacturing Automation Protocol/Technical and Office Protocol) system is presented. The scheme attaches a small number of radio base stations to the TOP network through which the mobiles may access the system by executing a capture-based, multi-receiver extension of the traditional nonadaptive slotted Aloha protocol. A two-component capture model motivated by the factory channel is developed, and the multireceiver system's throughput performance is analyzed under two transmission models: base location independent and spatially correlated. It is seen that there is significant throughput degradation when base coverage areas overlap, indicating that this overlap should be minimized during system design.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Design of a reliable multicast protocol 可靠组播协议的设计
Pub Date : 1993-03-28 DOI: 10.1109/INFCOM.1993.253247
Rosario Aiello, E. Pagani, G. P. Rossi
A multicast protocol that is independent of the subnetwork and can operate on the top of a basic datagram network is described. The protocol provides reliable communication among the members of a group nd guarantees that each message sent to a group G is delivered to all active, i.e. both correct and faulty, processes in G or to none of them, and that all the members of G consistently decide on the same progressive order to process messages. The focus is mainly on the design of the protocol. The protocol architecture to which it belongs is described, and some simulation results are given. An outline of the protocol algorithm, which uses a centralized approach based on the rotating coordinator paradigm, allows processes to asynchronously decide on a given value, and recovers processes from failures through history buffers, is also given.<>
描述了一种独立于子网并能在基本数据报网络上运行的多播协议。该协议在组成员之间提供可靠的通信,并保证发送到组G的每条消息都传递给G中的所有活动进程,即正确进程和错误进程,或者不传递给它们,并且G中的所有成员一致地决定以相同的渐进顺序处理消息。重点是协议的设计。描述了它所属的协议体系结构,并给出了一些仿真结果。协议算法的大纲,它使用基于旋转协调器范式的集中方法,允许进程异步决定给定的值,并通过历史缓冲区从失败中恢复进程,也给出了。
{"title":"Design of a reliable multicast protocol","authors":"Rosario Aiello, E. Pagani, G. P. Rossi","doi":"10.1109/INFCOM.1993.253247","DOIUrl":"https://doi.org/10.1109/INFCOM.1993.253247","url":null,"abstract":"A multicast protocol that is independent of the subnetwork and can operate on the top of a basic datagram network is described. The protocol provides reliable communication among the members of a group nd guarantees that each message sent to a group G is delivered to all active, i.e. both correct and faulty, processes in G or to none of them, and that all the members of G consistently decide on the same progressive order to process messages. The focus is mainly on the design of the protocol. The protocol architecture to which it belongs is described, and some simulation results are given. An outline of the protocol algorithm, which uses a centralized approach based on the rotating coordinator paradigm, allows processes to asynchronously decide on a given value, and recovers processes from failures through history buffers, is also given.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129033036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1