A throughput and delay analysis of FDDI and FDDI-II is presented under mixed traffic. The case of voice/data transmission is considered, and the throughput and delay behavior of FDDI, under packetized voice transmission, and FDDI-II, under isochronous voice transmission, is examined. The performance of the two networks is then investigated under the transmission of voice, data, and video. Two transmission alternatives are considered. In the first, all three types of information are transmitted in packets over an FDDI network. In the second, the isochronous slots of FDDI-II carry the voice and video. The effect of various system parameters on the performance of both networks is examined, and their voice, video, and data performance are compared.<>
{"title":"Throughput and delay analysis of FDDI and FDDI-II under mixed traffic","authors":"D. Karvelas, A. Leon-Garcia","doi":"10.1109/LCN.1992.228164","DOIUrl":"https://doi.org/10.1109/LCN.1992.228164","url":null,"abstract":"A throughput and delay analysis of FDDI and FDDI-II is presented under mixed traffic. The case of voice/data transmission is considered, and the throughput and delay behavior of FDDI, under packetized voice transmission, and FDDI-II, under isochronous voice transmission, is examined. The performance of the two networks is then investigated under the transmission of voice, data, and video. Two transmission alternatives are considered. In the first, all three types of information are transmitted in packets over an FDDI network. In the second, the isochronous slots of FDDI-II carry the voice and video. The effect of various system parameters on the performance of both networks is examined, and their voice, video, and data performance are compared.<<ETX>>","PeriodicalId":249184,"journal":{"name":"[1992] Proceedings 17th Conference on Local Computer Networks","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124151377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A parallel router architecture for processing network-layer protocols at FDDI (fiber distributed data interface) speeds is proposed. At high speeds the computing power of existing routers becomes the performance bottleneck (for processing small frame sizes). Hence, a completely different approach is required in designing a router. The opportunities of parallel processing in a network protocol are investigated. Several levels of parallel processing are considered, and an architecture for the most practical and feasible approach is proposed. The concept of a snoopy header cache is introduced. Algorithms for reducing the mean processing delay by balancing the load among the processors are discussed. The performance of the router is evaluated by analytic methods and is compared with simulation results. The results from both the analytic model and the simulator reinforce the choice of a header cache in a multiprocessor environment.<>
{"title":"A parallel router architecture for high speed LAN internetworking","authors":"P. Marimuthu, Y. Viniotis, T. Sheu","doi":"10.1109/LCN.1992.228115","DOIUrl":"https://doi.org/10.1109/LCN.1992.228115","url":null,"abstract":"A parallel router architecture for processing network-layer protocols at FDDI (fiber distributed data interface) speeds is proposed. At high speeds the computing power of existing routers becomes the performance bottleneck (for processing small frame sizes). Hence, a completely different approach is required in designing a router. The opportunities of parallel processing in a network protocol are investigated. Several levels of parallel processing are considered, and an architecture for the most practical and feasible approach is proposed. The concept of a snoopy header cache is introduced. Algorithms for reducing the mean processing delay by balancing the load among the processors are discussed. The performance of the router is evaluated by analytic methods and is compared with simulation results. The results from both the analytic model and the simulator reinforce the choice of a header cache in a multiprocessor environment.<<ETX>>","PeriodicalId":249184,"journal":{"name":"[1992] Proceedings 17th Conference on Local Computer Networks","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115693429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An approach that attempts to optimize the network in an engineering environment with large numbers of personal computers, workstations, minicomputers, and windowing terminals using different network protocols and applications is described. The network was made modular and easily reconfigurable so that it could be optimized with minimum cost or user impact. The design and operation of the resulting network are examined.<>
{"title":"A large engineering network architecture","authors":"Brian Smith, B. Durham, Bob Hatfield","doi":"10.1109/LCN.1992.228110","DOIUrl":"https://doi.org/10.1109/LCN.1992.228110","url":null,"abstract":"An approach that attempts to optimize the network in an engineering environment with large numbers of personal computers, workstations, minicomputers, and windowing terminals using different network protocols and applications is described. The network was made modular and easily reconfigurable so that it could be optimized with minimum cost or user impact. The design and operation of the resulting network are examined.<<ETX>>","PeriodicalId":249184,"journal":{"name":"[1992] Proceedings 17th Conference on Local Computer Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131190866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An implementation of the XTP protocol is discussed relative to the embedded systems environment. An overview of the embedded system architecture and unique design constraints is followed by a description of the protocol development environment. The original development approach is presented with a critique based on experience thus far. Embedded system implementation and protocol development issues experienced in this type of environment and proposed solutions are presented to provide a framework for similar development efforts.<>
{"title":"Experience with an XTP implementation for embedded systems","authors":"R. Mitchell, Emilie T. Saulnier","doi":"10.1109/LCN.1992.228140","DOIUrl":"https://doi.org/10.1109/LCN.1992.228140","url":null,"abstract":"An implementation of the XTP protocol is discussed relative to the embedded systems environment. An overview of the embedded system architecture and unique design constraints is followed by a description of the protocol development environment. The original development approach is presented with a critique based on experience thus far. Embedded system implementation and protocol development issues experienced in this type of environment and proposed solutions are presented to provide a framework for similar development efforts.<<ETX>>","PeriodicalId":249184,"journal":{"name":"[1992] Proceedings 17th Conference on Local Computer Networks","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121728751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A hierarchical structure for the MAC layer of high-speed LANs with a ring topology is suggested. The lower part of this layer consists of high-speed dedicated hardware, called the interface, that sits on the data-path and is responsible for those operations that should be performed in the link transmission speed: getting access-control, removing frames, and accepting frames. The upper part, called the MAC manager can be an all-purpose microprocessor. It is responsible for all the other operations associated with the MAC layer. When short labels are used as addresses, the interface algorithm can be based on two small switching tables, whose contents are determined by the MAC manager.<>
{"title":"Addressing modes and management protocols in a gigabit LAN with switching tables","authors":"R. Cohen","doi":"10.1109/LCN.1992.228131","DOIUrl":"https://doi.org/10.1109/LCN.1992.228131","url":null,"abstract":"A hierarchical structure for the MAC layer of high-speed LANs with a ring topology is suggested. The lower part of this layer consists of high-speed dedicated hardware, called the interface, that sits on the data-path and is responsible for those operations that should be performed in the link transmission speed: getting access-control, removing frames, and accepting frames. The upper part, called the MAC manager can be an all-purpose microprocessor. It is responsible for all the other operations associated with the MAC layer. When short labels are used as addresses, the interface algorithm can be based on two small switching tables, whose contents are determined by the MAC manager.<<ETX>>","PeriodicalId":249184,"journal":{"name":"[1992] Proceedings 17th Conference on Local Computer Networks","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115570774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The reliability of three fiber distributed data interface (FDDI) network topologies is examined. The three interconnection topologies considered are a tree, a double ring, and a ring of trees. The reliability measure is terminal-pair reliability in which the probability P(h(s,t)) that two arbitrarily positioned terminal stations (s and t) can communicate with each other is calculated. For the three FDDI network topologies considered, closed-form expressions are obtained for worst-case reliability as a function of the stations' positions. The expressions are used to optimize the number of ports in and the topological interconnections of the wiring concentrators in order to achieve highest reliability for a given number of stations.<>
{"title":"A reliability analysis of failsoft FDDI networks","authors":"Jiansheng Yin, C. B. Silio","doi":"10.1109/LCN.1992.228162","DOIUrl":"https://doi.org/10.1109/LCN.1992.228162","url":null,"abstract":"The reliability of three fiber distributed data interface (FDDI) network topologies is examined. The three interconnection topologies considered are a tree, a double ring, and a ring of trees. The reliability measure is terminal-pair reliability in which the probability P(h(s,t)) that two arbitrarily positioned terminal stations (s and t) can communicate with each other is calculated. For the three FDDI network topologies considered, closed-form expressions are obtained for worst-case reliability as a function of the stations' positions. The expressions are used to optimize the number of ports in and the topological interconnections of the wiring concentrators in order to achieve highest reliability for a given number of stations.<<ETX>>","PeriodicalId":249184,"journal":{"name":"[1992] Proceedings 17th Conference on Local Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130127043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Two alternative customer network management (CNM) access configurations for the user's network management station to access a public carrier's CNM system using the simple network management protocol (SNMP) are described. In addition, a management information base containing UNI management information is developed along with CNM service capabilities that enable permanent virtual connection (PVC) service users to manage their access to and use of the B-ISDN transport network and services. The CNM service capabilities support proactive management tools that alert PVC service users to developing problems in their communications network of which the B-ISDN network and services are parts and enable users to take corrective action to avoid a network collapse.<>
{"title":"B-ISDN customer network management framework","authors":"Masuma Ahmed","doi":"10.1109/LCN.1992.228176","DOIUrl":"https://doi.org/10.1109/LCN.1992.228176","url":null,"abstract":"Two alternative customer network management (CNM) access configurations for the user's network management station to access a public carrier's CNM system using the simple network management protocol (SNMP) are described. In addition, a management information base containing UNI management information is developed along with CNM service capabilities that enable permanent virtual connection (PVC) service users to manage their access to and use of the B-ISDN transport network and services. The CNM service capabilities support proactive management tools that alert PVC service users to developing problems in their communications network of which the B-ISDN network and services are parts and enable users to take corrective action to avoid a network collapse.<<ETX>>","PeriodicalId":249184,"journal":{"name":"[1992] Proceedings 17th Conference on Local Computer Networks","volume":"35 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128699865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A prototype workstation, called communication protocol analyzer and simulator system (CPASS), aimed at the modeling, verification, analysis, and simulation for real-time networks by means of a formal and automated approach is presented. The system is based on an extended finite state machine model, called SDL/sup N/ (a variant of SDL). It is composed of six components: network topology editor, SDL/sup N/GR editor, protocol verifier and analyzer, SDL/sup N/-to-C compiler, simulator, and statistical generator and comparator. The functionality of each component of CPASS is described. An example of a token ring network is used to illustrate the complete processes of modeling, analysis, and simulation.<>
{"title":"An integrated system of modelling, analysis and simulation for real-time networks","authors":"M. Yuang, S. J. Hsu, Kenny Lee, C. Huang","doi":"10.1109/LCN.1992.228126","DOIUrl":"https://doi.org/10.1109/LCN.1992.228126","url":null,"abstract":"A prototype workstation, called communication protocol analyzer and simulator system (CPASS), aimed at the modeling, verification, analysis, and simulation for real-time networks by means of a formal and automated approach is presented. The system is based on an extended finite state machine model, called SDL/sup N/ (a variant of SDL). It is composed of six components: network topology editor, SDL/sup N/GR editor, protocol verifier and analyzer, SDL/sup N/-to-C compiler, simulator, and statistical generator and comparator. The functionality of each component of CPASS is described. An example of a token ring network is used to illustrate the complete processes of modeling, analysis, and simulation.<<ETX>>","PeriodicalId":249184,"journal":{"name":"[1992] Proceedings 17th Conference on Local Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129148397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An attempt is made to define a metropolitan area network (MAN) from a practical point of view, and the advantages and disadvantages of a public MAN and a private MAN are compared. Some discussion on the MAN's goals, strategies, technologies, and markets is offered related to MANs and the probable evolution to broadband integrated services digital network (B-ISDN), while broadband communication is on its way to becoming reality. A possible evolution from existing narrowband ISDN exchanges to a universal, ATM-based B-ISDN is outlined.<>
{"title":"Some lessons learned from the practical experience using MANs","authors":"T. Bajenesco","doi":"10.1109/LCN.1992.228179","DOIUrl":"https://doi.org/10.1109/LCN.1992.228179","url":null,"abstract":"An attempt is made to define a metropolitan area network (MAN) from a practical point of view, and the advantages and disadvantages of a public MAN and a private MAN are compared. Some discussion on the MAN's goals, strategies, technologies, and markets is offered related to MANs and the probable evolution to broadband integrated services digital network (B-ISDN), while broadband communication is on its way to becoming reality. A possible evolution from existing narrowband ISDN exchanges to a universal, ATM-based B-ISDN is outlined.<<ETX>>","PeriodicalId":249184,"journal":{"name":"[1992] Proceedings 17th Conference on Local Computer Networks","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127581454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The cell loss ratio and cell delay variation of a distributed-queue dual-bus (DQDB) network receiving traffic from a number of asynchronous transfer mode (ATM) connections are considered. Every connection carries either connection oriented or connectionless traffic. In the analysis of the access to the bus, it is shown that consecutive service times of the local access queue are correlated. Two models, one of which includes the correlation, are presented. The correlation effect is illustrated and the models are evaluated by means of a number of simulation cases.<>
{"title":"Performance analysis of ATM/DQDB interworking","authors":"H. Christiansen, K. Kvols","doi":"10.1109/LCN.1992.228175","DOIUrl":"https://doi.org/10.1109/LCN.1992.228175","url":null,"abstract":"The cell loss ratio and cell delay variation of a distributed-queue dual-bus (DQDB) network receiving traffic from a number of asynchronous transfer mode (ATM) connections are considered. Every connection carries either connection oriented or connectionless traffic. In the analysis of the access to the bus, it is shown that consecutive service times of the local access queue are correlated. Two models, one of which includes the correlation, are presented. The correlation effect is illustrated and the models are evaluated by means of a number of simulation cases.<<ETX>>","PeriodicalId":249184,"journal":{"name":"[1992] Proceedings 17th Conference on Local Computer Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130279326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}