{"title":"迈向千兆FDDI","authors":"W. Dobosiewicz, P. Gburzynski","doi":"10.1109/LCN.1992.228132","DOIUrl":null,"url":null,"abstract":"A possible network architecture suitable for a next-generation follow-up to FDDI Is presented. The solution can be scaled-up to arbitrary transmission rates (limited only by the technological barriers) and arbitrarily long networks. The protocol allows every station to transmit when the ring is silent, even when the station is not in possession of the token. The resulting token-passing protocol yields a capacity-1 network irrespective of the value of TTRT. Additionally, stations endure a very small access delay under light load. The need to single out synchronous traffic is eliminated, guaranteeing each station the right to transmit at fixed intervals. This modification allows graceful station insertion and deletion; moreover, the recovery of a lost token can be done on the fly without disrupting the operation of the network.<<ETX>>","PeriodicalId":249184,"journal":{"name":"[1992] Proceedings 17th Conference on Local Computer Networks","volume":"46 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Towards a gigabit FDDI\",\"authors\":\"W. Dobosiewicz, P. Gburzynski\",\"doi\":\"10.1109/LCN.1992.228132\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A possible network architecture suitable for a next-generation follow-up to FDDI Is presented. The solution can be scaled-up to arbitrary transmission rates (limited only by the technological barriers) and arbitrarily long networks. The protocol allows every station to transmit when the ring is silent, even when the station is not in possession of the token. The resulting token-passing protocol yields a capacity-1 network irrespective of the value of TTRT. Additionally, stations endure a very small access delay under light load. The need to single out synchronous traffic is eliminated, guaranteeing each station the right to transmit at fixed intervals. This modification allows graceful station insertion and deletion; moreover, the recovery of a lost token can be done on the fly without disrupting the operation of the network.<<ETX>>\",\"PeriodicalId\":249184,\"journal\":{\"name\":\"[1992] Proceedings 17th Conference on Local Computer Networks\",\"volume\":\"46 1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1992-09-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"[1992] Proceedings 17th Conference on Local Computer Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LCN.1992.228132\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1992] Proceedings 17th Conference on Local Computer Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LCN.1992.228132","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A possible network architecture suitable for a next-generation follow-up to FDDI Is presented. The solution can be scaled-up to arbitrary transmission rates (limited only by the technological barriers) and arbitrarily long networks. The protocol allows every station to transmit when the ring is silent, even when the station is not in possession of the token. The resulting token-passing protocol yields a capacity-1 network irrespective of the value of TTRT. Additionally, stations endure a very small access delay under light load. The need to single out synchronous traffic is eliminated, guaranteeing each station the right to transmit at fixed intervals. This modification allows graceful station insertion and deletion; moreover, the recovery of a lost token can be done on the fly without disrupting the operation of the network.<>