首页 > 最新文献

IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?最新文献

英文 中文
Control and accounting of user access to a PDN from private X.25 data networks 对用户从专用X.25数据网络访问PDN的控制和记帐
C. Andres, Uwe Hillmer, P. Holleczek, R. Kummer, R. Müller
Methods have been developed in a DFN (Deutsches Forschungs-Netz) project for checking access rights of calls into the DATEX-P public network and recording costs which can be assigned to users. This is done using a gateway computer. The methods which can be used for interactive services using X.3, X.28 and X.29, and for level-7 services, are discussed. Experience with a prototype gateway computer is described.<>
在DFN (Deutsches Forschungs-Netz)项目中已经开发了检查进入DATEX-P公共网络呼叫的访问权和可分配给用户的记录费用的方法。这是使用网关计算机完成的。讨论了可用于使用X.3、X.28和X.29的交互式服务以及7级服务的方法。介绍了使用网关计算机样机的经验。
{"title":"Control and accounting of user access to a PDN from private X.25 data networks","authors":"C. Andres, Uwe Hillmer, P. Holleczek, R. Kummer, R. Müller","doi":"10.1109/INFCOM.1988.12932","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.12932","url":null,"abstract":"Methods have been developed in a DFN (Deutsches Forschungs-Netz) project for checking access rights of calls into the DATEX-P public network and recording costs which can be assigned to users. This is done using a gateway computer. The methods which can be used for interactive services using X.3, X.28 and X.29, and for level-7 services, are discussed. Experience with a prototype gateway computer is described.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124085795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Doubly connected multi-dimensional regular topologies for MANs and LANs 用于城域网和局域网的双连通多维规则拓扑
T. Chung, S. Rai, D. Agrawal
The authors present a group of multidimensional regular topologies with two incoming and two outgoing link per node. The use of a mixed-radix numbering system in defining the network topology leads to many choices for the jump distance, which provides better performance when the total number of nodes is large. They introduce a performance parameter named spanning radius (SPR) which determines the addition traversal required to use all different choices when the number of choices exceeds two. The impact of the number of choices and its SPR on the network performance is also studied. The results show that a multidimensional network performs better in terms of diameter and reliability when the penalty of the extra link traversal is offset by the saving due to the additional jump distance choices used.<>
作者提出了一组多维规则拓扑,每个节点有两个传入链路和两个传出链路。在定义网络拓扑时使用混合基数编号系统导致跳转距离有多种选择,这在节点总数较大时提供了更好的性能。它们引入了一个名为跨越半径(SPR)的性能参数,该参数决定了当选择的数量超过两个时,使用所有不同选择所需的加法遍历。研究了选择数及其SPR对网络性能的影响。结果表明,当额外的链路遍历损失被额外的跳距选择所带来的节省所抵消时,多维网络在直径和可靠性方面表现更好。>
{"title":"Doubly connected multi-dimensional regular topologies for MANs and LANs","authors":"T. Chung, S. Rai, D. Agrawal","doi":"10.1109/INFCOM.1988.12965","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.12965","url":null,"abstract":"The authors present a group of multidimensional regular topologies with two incoming and two outgoing link per node. The use of a mixed-radix numbering system in defining the network topology leads to many choices for the jump distance, which provides better performance when the total number of nodes is large. They introduce a performance parameter named spanning radius (SPR) which determines the addition traversal required to use all different choices when the number of choices exceeds two. The impact of the number of choices and its SPR on the network performance is also studied. The results show that a multidimensional network performs better in terms of diameter and reliability when the penalty of the extra link traversal is offset by the saving due to the additional jump distance choices used.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"2 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131314186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A performance model for concurrent message transfer on Playthrough rings 在通关环上并发消息传输的性能模型
C. B. Silio, H. Ghafir
The authors present analytical models to approximate average message queueing time, service time, and token round trip time on ring topology local area networks that use a Playthrough protocol. Playthrough's data-link-layer protocol uses a continually circulating control token, source removed update control messages, and destination-removed data messages to achieve concurrent transfer of multiple messages of arbitrary length. The models of data-message service time and token round trip time are used in a queueing system model for average message waiting time in this class of multiserver circuit-switched ring. The collection of analytical models is shown to adequately approximate simulated queueing times for messages transmitted using a shortest-outbound-distance-first queueing discipline. This analysis differs from earlier approximations in that it includes the effects of both bridge traffic and downstream blocking traffic on the waiting times experienced by messages arriving at an arbitrary node.<>
作者提出了分析模型,以近似平均消息排队时间,服务时间和令牌往返时间在环形拓扑局域网使用透玩协议。Playthrough的数据链路层协议使用连续循环的控制令牌、源删除的更新控制消息和目的地删除的数据消息来实现任意长度的多条消息的并发传输。在这类多服务器电路交换环的平均消息等待时间的排队系统模型中,采用了数据消息服务时间和令牌往返时间模型。分析模型的集合显示可以充分近似模拟使用出站距离最短优先排队原则传输的消息的排队时间。这种分析不同于先前的近似,因为它包括桥接流量和下游阻塞流量对到达任意节点的消息所经历的等待时间的影响。
{"title":"A performance model for concurrent message transfer on Playthrough rings","authors":"C. B. Silio, H. Ghafir","doi":"10.1109/INFCOM.1988.12910","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.12910","url":null,"abstract":"The authors present analytical models to approximate average message queueing time, service time, and token round trip time on ring topology local area networks that use a Playthrough protocol. Playthrough's data-link-layer protocol uses a continually circulating control token, source removed update control messages, and destination-removed data messages to achieve concurrent transfer of multiple messages of arbitrary length. The models of data-message service time and token round trip time are used in a queueing system model for average message waiting time in this class of multiserver circuit-switched ring. The collection of analytical models is shown to adequately approximate simulated queueing times for messages transmitted using a shortest-outbound-distance-first queueing discipline. This analysis differs from earlier approximations in that it includes the effects of both bridge traffic and downstream blocking traffic on the waiting times experienced by messages arriving at an arbitrary node.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130673318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Unified network management architecture (UNMA) 统一网管架构(UNMA)
J. Brinsfield
Summary form only given. The unified network management architecture is a three-tiered approach with a standard machine-to-machine protocol and user-to-machine interface. The five components of the architecture are described. The network management protocol (NMP) is based on CCITT/ISO standards, providing an open architecture. The basis of NMP is the CCITT/ISO OSI seven-layer stack. The protocol stack is generally well defined within the standards bodies. Layers 4 (transport), 5 (session), and 6 (presentation) are final specifications. Within Layer 7 (application), there are numerous sublayers used. ACSE (association control service elements), and FTAM (file transfer access and management) are also final specifications. ROS (remote operations services) and CCR (commitment, concurrency and recovery) are official drafts. CMISE (common management information service elements) is a draft proposal.<>
只提供摘要形式。统一的网络管理体系结构是一种三层方法,具有标准的机器对机器协议和用户对机器接口。描述了该体系结构的五个组成部分。网络管理协议(NMP)基于CCITT/ISO标准,提供了一个开放的体系结构。NMP的基础是CCITT/ISO OSI七层栈。协议栈通常在标准主体内定义得很好。第4层(传输)、第5层(会话)和第6层(表示)是最终规范。在第7层(应用程序)中,使用了许多子层。ACSE(关联控制服务元素)和FTAM(文件传输访问和管理)也是最终规范。ROS(远程操作服务)和CCR(承诺、并发性和恢复)是官方草案。CMISE(公共管理信息服务要素)是一项提案草案。
{"title":"Unified network management architecture (UNMA)","authors":"J. Brinsfield","doi":"10.1109/INFCOM.1988.12945","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.12945","url":null,"abstract":"Summary form only given. The unified network management architecture is a three-tiered approach with a standard machine-to-machine protocol and user-to-machine interface. The five components of the architecture are described. The network management protocol (NMP) is based on CCITT/ISO standards, providing an open architecture. The basis of NMP is the CCITT/ISO OSI seven-layer stack. The protocol stack is generally well defined within the standards bodies. Layers 4 (transport), 5 (session), and 6 (presentation) are final specifications. Within Layer 7 (application), there are numerous sublayers used. ACSE (association control service elements), and FTAM (file transfer access and management) are also final specifications. ROS (remote operations services) and CCR (commitment, concurrency and recovery) are official drafts. CMISE (common management information service elements) is a draft proposal.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134409044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A model for multilevel security in computer networks 计算机网络中的多级安全模型
W. Lu, M. Sundareshan
A model which precisely describes the mechanism that enforces the security policy and requirements for a multilevel secure network is described. This mechanism attempts to ensure secure flow of information between entities assigned to different security classes in different computer systems connected to the network. The mechanism also controls the access to the network devices by the subjects (users and processes executed on behalf of the users) with different security clearances. The model integrates the notions of access control and information flow control to provide a trusted network base that imposes appropriate restrictions on the flow of information among the various devices. Utilizing simple set-theoretic concepts, a procedure is given to verify the security of a network that implements the present model.<>
描述了一个模型,该模型精确地描述了多级安全网络的安全策略和需求的实施机制。该机制试图确保在连接到网络的不同计算机系统中分配到不同安全级别的实体之间的信息流的安全性。该机制还控制具有不同安全权限的主体(代表用户执行的用户和进程)对网络设备的访问。该模型集成了访问控制和信息流控制的概念,以提供一个可信的网络基础,对各种设备之间的信息流施加适当的限制。利用简单的集合论概念,给出了一个验证实现该模型的网络安全性的过程
{"title":"A model for multilevel security in computer networks","authors":"W. Lu, M. Sundareshan","doi":"10.1109/INFCOM.1988.13028","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.13028","url":null,"abstract":"A model which precisely describes the mechanism that enforces the security policy and requirements for a multilevel secure network is described. This mechanism attempts to ensure secure flow of information between entities assigned to different security classes in different computer systems connected to the network. The mechanism also controls the access to the network devices by the subjects (users and processes executed on behalf of the users) with different security clearances. The model integrates the notions of access control and information flow control to provide a trusted network base that imposes appropriate restrictions on the flow of information among the various devices. Utilizing simple set-theoretic concepts, a procedure is given to verify the security of a network that implements the present model.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129792152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Multicast and broadcast services in a knockout packet switch 分组交换机中的多播和广播业务
K. Eng, M. Hluchyj, Y. Yeh
The knockout switch is a packet-switch architecture recently proposed for high-performance packet networks. In addition to providing point-to-point connections among user pairs, a packet network must often support multicast and broadcast capabilities. Multicast connections differ from point-to-point connections in that each packet is addressed to a number of destinations. Two specific approaches using the knockout switch to provide a practical and efficient means for multicast services under both light and heavy traffic conditions are proposed. The first involves packet duplication and is more suitable for light traffic loads. The second uses a fast address comparison technique and is capable of handling larger loads. In both cases, the knockout principle is utilized to yield the best delay-throughput performance, guarantee the first-in first-out packet sequence, and provide for a simple, modular implementation.<>
淘汰制交换机是最近为高性能分组网络提出的一种分组交换体系结构。除了在用户对之间提供点对点连接之外,分组网络通常还必须支持多播和广播功能。多播连接与点对点连接的不同之处在于,每个数据包都被寻址到多个目的地。提出了两种利用淘汰制的具体方法,为轻流量和大流量条件下的组播业务提供了实用和高效的手段。第一种方法涉及包复制,更适合于轻流量负载。第二种使用快速地址比较技术,能够处理更大的负载。在这两种情况下,淘汰制原理都被用来产生最佳的延迟吞吐量性能,保证先进先出的数据包顺序,并提供一个简单的模块化实现。
{"title":"Multicast and broadcast services in a knockout packet switch","authors":"K. Eng, M. Hluchyj, Y. Yeh","doi":"10.1109/INFCOM.1988.12895","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.12895","url":null,"abstract":"The knockout switch is a packet-switch architecture recently proposed for high-performance packet networks. In addition to providing point-to-point connections among user pairs, a packet network must often support multicast and broadcast capabilities. Multicast connections differ from point-to-point connections in that each packet is addressed to a number of destinations. Two specific approaches using the knockout switch to provide a practical and efficient means for multicast services under both light and heavy traffic conditions are proposed. The first involves packet duplication and is more suitable for light traffic loads. The second uses a fast address comparison technique and is capable of handling larger loads. In both cases, the knockout principle is utilized to yield the best delay-throughput performance, guarantee the first-in first-out packet sequence, and provide for a simple, modular implementation.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133204556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
Voice transmission over mixed packet- and circuit-switched networks 混合分组和电路交换网络上的语音传输
R. Singh, S. Singhal
A discussion is presented of the effects of this additional delay on speech transmission over a mixed packet and circuit connection. The authors find that the additional delay introduced by a packet network remains within acceptable bounds for normal conversation, and thus does not degrade the service quality. However, the additional delay can cause severe problems because of the presence of echoes if proper suppression measures are not incorporated. They argue that echoes can be reduced to acceptable limits by using echo cancellation devices at the gateways between the packet network and the circuit-switched network, with no changes required in the circuit-switched part of the network.<>
讨论了这种额外延迟对混合分组和电路连接上的语音传输的影响。作者发现,由分组网络引入的额外延迟仍然在正常会话的可接受范围内,因此不会降低服务质量。但是,如果不采取适当的抑制措施,由于回波的存在,额外的延迟可能会导致严重的问题。他们认为,通过在分组网络和电路交换网络之间的网关上使用回声消除设备,回声可以减少到可接受的限度,而不需要对网络的电路交换部分进行更改。
{"title":"Voice transmission over mixed packet- and circuit-switched networks","authors":"R. Singh, S. Singhal","doi":"10.1109/INFCOM.1988.12906","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.12906","url":null,"abstract":"A discussion is presented of the effects of this additional delay on speech transmission over a mixed packet and circuit connection. The authors find that the additional delay introduced by a packet network remains within acceptable bounds for normal conversation, and thus does not degrade the service quality. However, the additional delay can cause severe problems because of the presence of echoes if proper suppression measures are not incorporated. They argue that echoes can be reduced to acceptable limits by using echo cancellation devices at the gateways between the packet network and the circuit-switched network, with no changes required in the circuit-switched part of the network.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133769277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Throughput analysis of a window-based flow control subject to bandwidth management 基于带宽管理的窗口流量控制的吞吐量分析
D. Luan, D. Lucantoni
The authors analyze the performance of an end-to-end window-based flow control subject to bandwidth management. In particular, they model a high-level data-link-control-type layer-two protocol, e.g. LAPD, based on positive acknowledgements for correctly received frames. They explicitly model the effect of frame losses on the performance, which takes on a greater significance when some type of bandwidth management is used by the network. When a frame is lost, there are two major recovery mechanisms: REJECT and time-out. Both of them are explicitly incorporated into the analysis. The main performance measure considered is the goodput, i.e. the throughput of frames excluding retransmissions, that the customer can achieve. When the network is at a given level of congestion, it is shown that a customer can choose an appropriate window size to optimize the goodput subject to bandwidth management.<>
作者分析了端到端基于窗口的流量控制在带宽管理下的性能。特别地,他们建立了一个高级数据链路控制类型的第二层协议模型,例如基于正确接收帧的积极确认的LAPD。它们显式地模拟了帧丢失对性能的影响,这在网络使用某种类型的带宽管理时具有更大的意义。当一个帧丢失时,有两种主要的恢复机制:REJECT和timeout。它们都被明确地合并到分析中。考虑的主要性能指标是用户可以实现的goodput,即不包括重传的帧吞吐量。当网络处于给定的拥塞水平时,表明客户可以在带宽管理的前提下选择适当的窗口大小来优化货物
{"title":"Throughput analysis of a window-based flow control subject to bandwidth management","authors":"D. Luan, D. Lucantoni","doi":"10.1109/INFCOM.1988.12943","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.12943","url":null,"abstract":"The authors analyze the performance of an end-to-end window-based flow control subject to bandwidth management. In particular, they model a high-level data-link-control-type layer-two protocol, e.g. LAPD, based on positive acknowledgements for correctly received frames. They explicitly model the effect of frame losses on the performance, which takes on a greater significance when some type of bandwidth management is used by the network. When a frame is lost, there are two major recovery mechanisms: REJECT and time-out. Both of them are explicitly incorporated into the analysis. The main performance measure considered is the goodput, i.e. the throughput of frames excluding retransmissions, that the customer can achieve. When the network is at a given level of congestion, it is shown that a customer can choose an appropriate window size to optimize the goodput subject to bandwidth management.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127141728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Directories for networks with casually connected users 用户随意连接的网络目录
I. Gopal, A. Segall
In computer networks with decentralized control, it is necessary to provide a directory service which enables users to discover dynamically the location of other users. The authors examine the protocols for maintaining consistent directory information for casually connected users that can connect and disconnect from the network at will. They propose protocols for both hierarchical and nonhierarchical directory systems. The protocols do not rely on sequence numbers and consequently do not require 'safe store' at the user.<>
在分散控制的计算机网络中,有必要提供目录服务,使用户能够动态地发现其他用户的位置。作者研究了为随意连接的用户维护一致的目录信息的协议,这些用户可以随意连接和断开网络。他们提出了分层目录系统和非分层目录系统的协议。该协议不依赖于序列号,因此不需要在用户处“安全存储”
{"title":"Directories for networks with casually connected users","authors":"I. Gopal, A. Segall","doi":"10.1109/INFCOM.1988.13023","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.13023","url":null,"abstract":"In computer networks with decentralized control, it is necessary to provide a directory service which enables users to discover dynamically the location of other users. The authors examine the protocols for maintaining consistent directory information for casually connected users that can connect and disconnect from the network at will. They propose protocols for both hierarchical and nonhierarchical directory systems. The protocols do not rely on sequence numbers and consequently do not require 'safe store' at the user.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114600409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The linear conflict resolution algorithm for unidirectional broadcast bus networks 单向广播总线网络的线性冲突解决算法
J. Waramahaputi, S. Thanawastien
A protocol called linear conflict resolution (LCR) for unidirectional broadcast bus networks is introduced. This protocol is shown to be suitable for both LAN (local area network) and MAN (metropolitan area network) environments. LCR combines the benefits of the quick access of the Aloha protocol and the deterministic access of TDMA (time-division multiple access). Not only could the maximum throughput of LCR be increased to near 100% but also the network is stable in that the delay is finite for all the operating conditions. The channel capacity of the LCR protocol is less sensitive to the bus characteristics than most of the existing protocols. Numerical results indicate that LCR exhibits good performance over a wide range of network sizes.<>
介绍了一种单向广播总线网络的线性冲突解决(LCR)协议。该协议被证明适用于局域网和城域网环境。LCR结合了Aloha协议的快速访问和TDMA(时分多址)的确定性访问的优点。不仅使LCR的最大吞吐量提高到接近100%,而且网络在所有运行条件下的延迟都是有限的,因此网络是稳定的。与大多数现有协议相比,LCR协议的信道容量对总线特性的敏感性较低。数值结果表明,LCR在很宽的网络规模范围内表现出良好的性能
{"title":"The linear conflict resolution algorithm for unidirectional broadcast bus networks","authors":"J. Waramahaputi, S. Thanawastien","doi":"10.1109/INFCOM.1988.12925","DOIUrl":"https://doi.org/10.1109/INFCOM.1988.12925","url":null,"abstract":"A protocol called linear conflict resolution (LCR) for unidirectional broadcast bus networks is introduced. This protocol is shown to be suitable for both LAN (local area network) and MAN (metropolitan area network) environments. LCR combines the benefits of the quick access of the Aloha protocol and the deterministic access of TDMA (time-division multiple access). Not only could the maximum throughput of LCR be increased to near 100% but also the network is stable in that the delay is finite for all the operating conditions. The channel capacity of the LCR protocol is less sensitive to the bus characteristics than most of the existing protocols. Numerical results indicate that LCR exhibits good performance over a wide range of network sizes.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129484399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1