Pub Date : 1988-03-27DOI: 10.1109/INFCOM.1988.12902
M. Barbeau, B. Sarikaya
A computer-aided design tool is presented for designing test for protocols. CAD-PT accepts a formal specification in Estelle of the protocol and generates control and dataflow graphs on a graphic workstation. The tool is explained component-by-component, using a simplified ISO Class 2 transport protocol as an example.<>
提出了一种用于协议测试设计的计算机辅助设计工具。CAD-PT接受Estelle协议的正式规范,并在图形工作站上生成控制和数据流图形。以简化的ISO Class 2传输协议为例,逐一对该工具进行解释
{"title":"A computer-aided design tool for protocol testing","authors":"M. Barbeau, B. Sarikaya","doi":"10.1109/INFCOM.1988.12902","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.12902","url":null,"abstract":"A computer-aided design tool is presented for designing test for protocols. CAD-PT accepts a formal specification in Estelle of the protocol and generates control and dataflow graphs on a graphic workstation. The tool is explained component-by-component, using a simplified ISO Class 2 transport protocol as an example.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130856049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-03-27DOI: 10.1109/INFCOM.1988.12926
K. Le, C. Raghavendra
Double-loop networks have a higher connectivity and therefore a higher potential for fault tolerance than single-loop networks. The authors present distributed routing schemes that fully utilize that fault-tolerance potential, and that are applicable in particular to a specific class of double-loop networks, characterized by a forward loop connecting all the adjacent nodes, and a backward loop connecting nodes separated by a distance that depends on N, the number of nodes. A nice feature of these schemes is that for a given node, only local knowledge on the status of the neighboring nodes and links is required. Yet the schemes detect faulty nodes and links and adapt to the situation, so that a packet will eventually reach its destination, if there exists a path. A simulation has shown that the average overhead resulting from the schemes, in terms of number of hops, does not exceed 17%, for values of N around 16.<>
{"title":"Fault-tolerant routing in a class of double loop networks","authors":"K. Le, C. Raghavendra","doi":"10.1109/INFCOM.1988.12926","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.12926","url":null,"abstract":"Double-loop networks have a higher connectivity and therefore a higher potential for fault tolerance than single-loop networks. The authors present distributed routing schemes that fully utilize that fault-tolerance potential, and that are applicable in particular to a specific class of double-loop networks, characterized by a forward loop connecting all the adjacent nodes, and a backward loop connecting nodes separated by a distance that depends on N, the number of nodes. A nice feature of these schemes is that for a given node, only local knowledge on the status of the neighboring nodes and links is required. Yet the schemes detect faulty nodes and links and adapt to the situation, so that a packet will eventually reach its destination, if there exists a path. A simulation has shown that the average overhead resulting from the schemes, in terms of number of hops, does not exceed 17%, for values of N around 16.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131224524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-03-27DOI: 10.1109/INFCOM.1988.12955
R. Hardy, I. Radziejewski, E. Lo
The authors present a method for performance improvement of token ring networks that is based on the use of stations with two latency states. A station is able to enter a lower latency state whenever its message queue is empty. They present a detailed evaluation and comparison of network performance, based on both analytical and simulation results. The performance of a dual latency token ring is analyzed for the case of limited-to-one service, symmetric traffic, and is compared to the performance of a conventional token ring operating with limited-to-one, gated, or exhaustive service. The authors use discrete-event simulation to model the behavior and performance of a duel latency ring with asymmetric traffic, and compare with the above three service disciplines. Results show a significant reduction in mean waiting time for the dual latency ring, with performance approaching or exceeding that of gated and exhaustive service, for certain ranges of network utilization.<>
{"title":"Performance evaluation of a token ring network with dual latency stations","authors":"R. Hardy, I. Radziejewski, E. Lo","doi":"10.1109/INFCOM.1988.12955","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.12955","url":null,"abstract":"The authors present a method for performance improvement of token ring networks that is based on the use of stations with two latency states. A station is able to enter a lower latency state whenever its message queue is empty. They present a detailed evaluation and comparison of network performance, based on both analytical and simulation results. The performance of a dual latency token ring is analyzed for the case of limited-to-one service, symmetric traffic, and is compared to the performance of a conventional token ring operating with limited-to-one, gated, or exhaustive service. The authors use discrete-event simulation to model the behavior and performance of a duel latency ring with asymmetric traffic, and compare with the above three service disciplines. Results show a significant reduction in mean waiting time for the dual latency ring, with performance approaching or exceeding that of gated and exhaustive service, for certain ranges of network utilization.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129345516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-03-27DOI: 10.1109/INFCOM.1988.12980
M. L. Luhanga
A fluid approximation to an integrated packet voice and data multiplexer where the transmission of voice packets has preemptive priority over data packets is derived. Performance measures such as the average delay for both voice and data packets are given and a comparison of the average delay for data packets as a function of the data packet arrival rate is made between the analytical results and simulation results. A voice-rate flow control procedure is incorporated in the model and its effect on average voice and data packet delays is computed.<>
{"title":"A fluid approximation model of an integrated packet voice and data multiplexer","authors":"M. L. Luhanga","doi":"10.1109/INFCOM.1988.12980","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.12980","url":null,"abstract":"A fluid approximation to an integrated packet voice and data multiplexer where the transmission of voice packets has preemptive priority over data packets is derived. Performance measures such as the average delay for both voice and data packets are given and a comparison of the average delay for data packets as a function of the data packet arrival rate is made between the analytical results and simulation results. A voice-rate flow control procedure is incorporated in the model and its effect on average voice and data packet delays is computed.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125904232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-03-27DOI: 10.1109/INFCOM.1988.12938
M. Gerla
A novel fiber-optic architecture, Tree-Net, is presented which does not require intermediate processing components. Tree-Net is based on a tree topology, passive station taps, and implicit token protocol. The properties and performance of Tree-Net are evaluated, and possible extensions of the basic scheme are discussed.<>
{"title":"Tree-Net, a multi-level fiber optics MAN","authors":"M. Gerla","doi":"10.1109/INFCOM.1988.12938","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.12938","url":null,"abstract":"A novel fiber-optic architecture, Tree-Net, is presented which does not require intermediate processing components. Tree-Net is based on a tree topology, passive station taps, and implicit token protocol. The properties and performance of Tree-Net are evaluated, and possible extensions of the basic scheme are discussed.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"63 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126625673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-03-27DOI: 10.1109/INFCOM.1988.12941
Jung-Bong Suk, C. Cassandras
An analysis is provided of queuing models in virtual route networks for which a pacing window flow control mechanism is used. An input queue is introduced to describe the waiting system where messages prevented from entering the network are stored in first-come, first-served manner. Both finite and infinite capacity are considered. The model leads to a Markovian queuing system, which is fully solved by matrix-geometric methods. The analytical results show that the optimal window size which maximizes the power criterion including the admission delay is nearly twice the number of hops (nodes of the network) for the model with infinite input-queue capacity. This rule of thumb also applies to the finite-capacity model with certain restrictions. Simulations are presented to verify the analytical results.<>
{"title":"Analysis and optimization of pacing window flow control with admission delay","authors":"Jung-Bong Suk, C. Cassandras","doi":"10.1109/INFCOM.1988.12941","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.12941","url":null,"abstract":"An analysis is provided of queuing models in virtual route networks for which a pacing window flow control mechanism is used. An input queue is introduced to describe the waiting system where messages prevented from entering the network are stored in first-come, first-served manner. Both finite and infinite capacity are considered. The model leads to a Markovian queuing system, which is fully solved by matrix-geometric methods. The analytical results show that the optimal window size which maximizes the power criterion including the admission delay is nearly twice the number of hops (nodes of the network) for the model with infinite input-queue capacity. This rule of thumb also applies to the finite-capacity model with certain restrictions. Simulations are presented to verify the analytical results.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122820574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-03-27DOI: 10.1109/INFCOM.1988.12923
D. Feldmeier
High-speed packet-switched communications to the home can be provided using an existing community antenna television (CATV) system. The author focuses on an efficient access scheme for a network that operates on a CATV system. The scheme takes advantage of packet address locality to minimize the expected network access overhead. Its efficiency is compared with that of other access schemes that might be used on a CATV-based network.<>
{"title":"An efficient access scheme for a CATV-based high-speed packet-switching metropolitan area network","authors":"D. Feldmeier","doi":"10.1109/INFCOM.1988.12923","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.12923","url":null,"abstract":"High-speed packet-switched communications to the home can be provided using an existing community antenna television (CATV) system. The author focuses on an efficient access scheme for a network that operates on a CATV system. The scheme takes advantage of packet address locality to minimize the expected network access overhead. Its efficiency is compared with that of other access schemes that might be used on a CATV-based network.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121365823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-03-27DOI: 10.1109/INFCOM.1988.12913
G. Juanole, A. Ónodi
The authors are concerned with the design of multilayer architectures in distributed systems and computer networks. First, they give the basic knowledge that any designer must have for designing, in a consistent way, a set of layers. This knowledge concerns the objects of a layer, their attributes and their relationships. Second, they consider an example of network interconnection, at the network layer, on the basis of the internal organization of the network layer defined by ISO and apply this basic knowledge for specifying the architecture for internetworking.<>
{"title":"Towards a knowledge base for specifying multilayer architectures-application to internetworking","authors":"G. Juanole, A. Ónodi","doi":"10.1109/INFCOM.1988.12913","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.12913","url":null,"abstract":"The authors are concerned with the design of multilayer architectures in distributed systems and computer networks. First, they give the basic knowledge that any designer must have for designing, in a consistent way, a set of layers. This knowledge concerns the objects of a layer, their attributes and their relationships. Second, they consider an example of network interconnection, at the network layer, on the basis of the internal organization of the network layer defined by ISO and apply this basic knowledge for specifying the architecture for internetworking.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121432676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-03-27DOI: 10.1109/INFCOM.1988.12950
A. Pattavina
The authors examine the optimal choice of the slot size in terms of bandwidth usage in slotted broadband communication networks based on self-routing switching fabrics and statistical multiplexing schemes. This is a difficult problem, because of the uncertainty of the kinds and of mix of services to be supported by the network. To make this problem less critical, a packet multiplexing scheme is proposed, allowing several packets to be multiplexed in the same slot on a digital link. This scheme aims at avoiding bandwidth inefficiency when the information unit is smaller than the user capacity of a slot. This can take place for transactional data traffic and for packet voice traffic when the voice packet size underutilizes the slot capacity. The performance of a concentrator implementing this feature loaded by a data traffic is evaluated, providing upper bounds on the throughput and evaluating packet delay and buffer occupancy for different input levels.<>
{"title":"A packet multiplexing scheme for slotted broadband networks","authors":"A. Pattavina","doi":"10.1109/INFCOM.1988.12950","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.12950","url":null,"abstract":"The authors examine the optimal choice of the slot size in terms of bandwidth usage in slotted broadband communication networks based on self-routing switching fabrics and statistical multiplexing schemes. This is a difficult problem, because of the uncertainty of the kinds and of mix of services to be supported by the network. To make this problem less critical, a packet multiplexing scheme is proposed, allowing several packets to be multiplexed in the same slot on a digital link. This scheme aims at avoiding bandwidth inefficiency when the information unit is smaller than the user capacity of a slot. This can take place for transactional data traffic and for packet voice traffic when the voice packet size underutilizes the slot capacity. The performance of a concentrator implementing this feature loaded by a data traffic is evaluated, providing upper bounds on the throughput and evaluating packet delay and buffer occupancy for different input levels.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128601089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-03-27DOI: 10.1109/INFCOM.1988.12909
Wai Chen, San-qi Li, M. Schwartz
Random access scheduling schemes for broadcast-bus-type local area networks are considered. It is found that a good access scheduling scheme not only has information about the number of packets to be scheduled, but which, more importantly controls the average of this number, which can be achieved by properly choosing the scheduling interval. Furthermore, this scheduling interval is updated in such a way that adjacent intervals overlap, which by correlation gives a better estimate for the number of packets to be scheduled. The scheduling schemes developed using such concepts provide significant performance improvement over schemes using other scheduling approaches previously reported in the literature.<>
{"title":"Access scheduling schemes using global information on local area networks","authors":"Wai Chen, San-qi Li, M. Schwartz","doi":"10.1109/INFCOM.1988.12909","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.12909","url":null,"abstract":"Random access scheduling schemes for broadcast-bus-type local area networks are considered. It is found that a good access scheduling scheme not only has information about the number of packets to be scheduled, but which, more importantly controls the average of this number, which can be achieved by properly choosing the scheduling interval. Furthermore, this scheduling interval is updated in such a way that adjacent intervals overlap, which by correlation gives a better estimate for the number of packets to be scheduled. The scheduling schemes developed using such concepts provide significant performance improvement over schemes using other scheduling approaches previously reported in the literature.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116346314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}