首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 914 毫秒
1.
This paper presents an approximate analysis of delay performance in the timer-controlled priority scheme of single-service token passing systems, where each priority queue is allowed to transmit one message at a time. This is the practical case of real-time networks such as those used in aircraft and spacecraft control, process control and factory communications. The token passing systems consist of N stations, each of which has (K+1) priority queues. The highest priority queues can transmit a message whenever the token arrives. A lower priority queue can transmit a message if the token rotation time (which was reset and restarted at the previous token arrival instant) is not expired when the token arrives. An analytical model is developed based on the independent and identically distributed random variables of conditional effective service times (time interval between two consecutive instants at which a priority queue has an opportunity to transmit a message) of each priority queue. The condition is assigned on the basis of the contribution of message transmission time to the effective service time. The approximate mean waiting time for each priority queue is determined using the well-known results from Kuehn (1979), who first introduced the conditional cycle time. The approximate analytical model is validated by comparison with the simulation results  相似文献   

2.
传统的短波令牌协议( HFTP)调度方式单一,在没有数据传送时,信道资源会被各节点间的令牌传递所占用,且令牌在通信质量较差时易丢失。基于此,提出一种多信道的分簇式短波令牌协议( CHFTP),通过以通信质量评估为标准的分簇算法和基于预约的动态令牌调度,减小了令牌丢失的概率和令牌传递、处理的开销,并给出了仿真分析。仿真结果表明,该协议的端到端平均时延和网络吞吐量明显优于短波令牌协议, CHFTP 的平均时延最多可减少75%,网络吞吐量最多可增加66.7%,适合在短波通信网络中使用。  相似文献   

3.
Robust wavelength division multiplexing (WDM) is a technique to implement WDM local area networks (LAN's) in the presence of laser wavelength drifts. A medium access control (MAC) protocol is used in conjunction with a wavelength-tracking receiver to tolerate the variations of transmission wavelengths. Among the proposed medium access schemes, the aperiodic reservation (AR) scheme with token-passing based control channel gives the best performance. An AR protocol with a lenient token passing policy (AR/LTP) is thus presented. An analytical model is developed to design Robust-WDM AR/LTP LAN's and predict their performance characteristics. The model can be used to evaluate the variation of waiting time and throughput for load and network parameters such as the arrival rate, number of nodes, number of channels and timing parameters. It also addresses the issues related to traffic loss, channel-blocking, token rotation time, network span, and the effect of device parameters  相似文献   

4.
An analysis is presented of the throughput performance of some recently proposed token-passing local area network (LAN) protocols under a heavy load assumption. The IEEE 802.4 token bus standard which uses a cycle-dependent timing mechanism to control station access to the channel, is studied. It is shown that the cycle-dependent timing mechanism limits the token circulation times properly. Moreover, priority among different access classes is being implemented. Analytic results for computations of throughputs and cycle lengths are derived. These results provide insights into the cycle-dependent timing mechanism and also guidelines for design. Using the results derived, examples concerning the throughput behavior under different heavy load configurations, the sensitivity to parameters, system optimization with delay and bandwidth constraints, and comparison with the other integrated access schemes are studied  相似文献   

5.
The timer-controlled token-passing mechanism widely used in industrial communication networks is analyzed. Several real network parameters, such as finite buffers and finite token-holding time (THT), which generally determine the overall performance of a network, are considered. The approximate matrix equation between the queue length distribution and the token rotation time is derived. Based on this matrix equation, the equations for the mean waiting time and the blocking probability are also derived. These equations can be easily solved using personal computers, due to its simple matrix structure and small computation time. Using these equations, the performance of field bus or other timer-controlled token-passing networks can be more accurately evaluated, since finite size buffers and finite THT are considered. The approximation error is shown to be small by computer simulation  相似文献   

6.
Exact Results for Nonsymmetric Token Ring Systems   总被引:1,自引:0,他引:1  
This paper derives exact results for a token ring system with exhaustive or gated service. There areNnodes on the ring and control is passed sequentially from one to the next. Messages with random lengths arrive at each node and are placed on the ring when the control arrives at that node. Exhaustive service means that the queue at a node is empty before the token is released and gated means that only those messages in the queue at the arrival of the token are served at that cycle. Generating function recursions for the terminal service time (the total sojourn time of a token at a node) and, from this, joint cycle and intervisit times are derived. Using known results relating the marginal generating functions of the waiting time and the cycle and intervisit time, it is shown that theNmean waiting times at the nodes require the solution ofN(N - 1)and N2equations for the exhaustive and gated cases, respectively. The arrival processes are assumed to be Poisson with different rates and the service processes are general and different at each node. In addition the token overhead is allowed to have an arbitrary but independent distribution at each node. Explicit, simply programmed equations are given. It is shown, arguing from the form of the equations, that there is a conservation law in effect in this system. If the nodal mean waiting times are weighted by the relative intensity, defined here as the intensity weighted mean, then the sum takes on a particularly simple form and is independent of the placement of the nodes on the ring. When the service means at each node are equal, this quantity is just the system mean waiting time.  相似文献   

7.
In high-speed communication networks, the ratio between the end-to-end propagation delay to packet transmission time is large, causing increased scheduling overhead in demand assignment protocols and increased collision probabilities in random access schemes. These lead to rapid degradation of the channel utilization in both channel access control approaches. In this paper, we present a "random token" oriented protocol where channel access is scheduled by random, implicit token passing leading to lower channel access control penalty. By optimally balancing the collision and scheduling penalties, the protocol allows the network to reach better performance than that obtained from random access schemes in networks with and without collision detection, without imposing additional system operational assumptions. Specifically, the random token protocol does not require knowledge of the number of stations, their identities, or synchronization in periods of silence. Therefore, the protocol is also suitable for high-speed networks with frequent reconfiguration and for mobile radio networks.  相似文献   

8.
The IEEE standard 802.5 token ring protocol defines eight packet priorities. The intent is that high-priority packets should be delivered prior to low-priority packets. A series of simulations shows that this expected behavior occurs when there are very few network stations, very short data packets (but still long relative to ring latency), very short token hold times, and very high network loads. In the general case, priorities did not markedly influence packet delivery time. Use of the priority system generally resulted in more overhead and longer average packet delays than when all packets were carried as a single priority. The features of the protocol operation that are the cause of this increased delay and lack of priority discrimination are described mathematically  相似文献   

9.
A LAN or MAN (local or metropolitan area network) using token passing to allow stations to access the transmission medium is studied. Ibe and Cheng (1989) recently presented an approximate derivation of message delays for an asymmetric single-service token passing with only one type of message. In the present work, this analysis is extended to an operation with nonpreemptive priority queuing. The number of message priority levels and the walktime vary from one station to another. Moreover, the assumed Poisson message arrival process and the message transmission time vary, not only from one station to another, but also from one class to another. The performance, as measured by the mean delay for any message class at any station, is derived. The simulation results show excellent agreement with the analytical results, even under heavy loading. The results confirm earlier findings that the performance at a station is influenced by its position relative to heavily loaded stations  相似文献   

10.
A bandwidth allocation scheme for a linear token passing multiplex data bus is proposed based on balancing message transmission time with traffic load to each node. It is proved to provide a network worst case achievable utilization of 50%. Under this allocation scheme, closed-form expressions for the initialized value of token holding timers and token rotation timers in each node are obtained.  相似文献   

11.
This paper introduces the multiaccess mesh (or multimesh) network. Stations are arranged in a two-dimensional (2-D) mesh in which each row and column functions as a conventional linear local-area network (LAN) or metropolitan-area network (MAN) subnetwork. Full connectivity is achieved by enabling stations to merge their row and column subnetworks, under the coordination of a merge control protocol. A two-dimensional token-passing protocol is considered, and a more complex protocol motivated by max-min fairness is also presented. Like conventional LANs and MANs, the multimesh requires no transit routing or store-and-forward buffering. The multimesh is a generalization of the token grid network. Using analysis and simulation, we study the capacity of multimeshes constructed of token rings and slotted rings, under uniform and nonuniform loads. A multimesh can support much higher throughput than conventional linear LAN and MAN networks with the same transmission hardware. Moreover, the multimesh capacity grows with the number of stations, We also present a healing mechanism that ensures full network connectivity regardless of the number of failed stations  相似文献   

12.
A fiber-optic component consisting of N receivers, each with one fiber input port, and one transmitter with n fiber output ports, with a circuit in between, form a multitailed node. This is the basic building block for a self-routing `filled-ring network' with many stations, which can be disconnected without affecting the ring integrity. The token-passing medium-access protocol is found to have a several times better performance, in terms of the average delay-traffic intensity characteristic, in a filled-ring network than in a conventional ring network with the same number of stations. In a realistic example with 64 stations the improvement is by a factor of two to three. Using the multitailed nodes and self-routing, the network can easily be expanded to more complex configurations without introducing a routing overhead to keep the network under control  相似文献   

13.
Flood-search on-demand routing has received considerable interest for its application to mobile ad hoc networks. To alleviate the effects of flooding the network with control packets to discover a route, the concept of an expanding ring search (ERS) has been proposed elsewhere for reducing the packet transmission overhead of the route discovery process. Essentially, ERS consists of incrementally increasing the allowable hop radius of the flood search until a route to the target node is returned. However, ERS incurs additional latency to successfully complete the route discovery procedure. This paper presents a query scope agent (QSA) that assists in the selection of an appropriate ERS. The QSA accepts as input, from the user or network application, a maximum allowable value for route discovery delay. The QSA then estimates network parameter values to determine an ERS approach that satisfies the delay requirement while reducing expected packet transmission overhead. Simulation results show that it successfully achieves this objective. Further, the QSA incurs little communication and computation overhead, and operates in a distributed and asynchronous fashion.  相似文献   

14.
Packet voice communications over PC-based local area networks   总被引:2,自引:0,他引:2  
Experimental implementations of packet voice communication systems over two types of PC-based local area networks are described. The first is a Proteon proNET token-passing ring network, and the second is an Ethernet network. System configuration, operation, and performance are described for both networks. Models of network performance for estimating the maximum allowable number of active voice stations without incurring intolerable packet loss are presented for each system. The models are defined for systems with and without silence detection. PC-related implementation issues are also discussed  相似文献   

15.
Currently, there is a trend towards the implementation of industrial communication systems using wireless networks. However, keeping up with the timing constraints of real-time traffic in wireless environments is a hard task. The main reason is that real-time devices must share the same communication medium with timing unconstrained devices. The VTP-CSMA architecture has been proposed to deal with this problem. It considers an unified wireless system in one frequency band, where the communication bandwidth is shared by real-time and non-real-time communicating devices. The proposed architecture is based on a virtual token passing (VTP) procedure that circulates a virtual token among real-time devices. This virtual token is complemented by an underlying traffic separation mechanism that prioritizes the real-time traffic over the non-real-time traffic. This is one of the most innovative aspects of the proposed architecture, as most part of real-time communication approaches are not able to handle timing unconstrained traffic sharing the same communication medium. A ring management procedure for the VTP-CSMA architecture is also proposed, allowing real-time stations to adequately join/leave the virtual ring.  相似文献   

16.
Nodes in a mobile ad hoc network are battery constrained devices and energy efficiency becomes an important consideration. In a multi-hop mobile ad hoc network the most common method to achieve energy efficiency is the transmission power control scheme in which a node transmits the data packets to its nearest neighbor which is at minimum required power level. However this scheme minimizes only the transmission power within the node’s neighborhood and energy efficiency at the link level is possible. With this scheme it is not possible to minimize the overall energy consumption of the network and the communication overhead of the network is not minimized. An analysis has been performed and our results have proved that instead of using low transmission power, the routing strategy needs to be controlled and only certain nodes are to be allowed to receive and process this routing request based on the received signal strength, then the overall energy consumption of the network can be minimized and the communication overhead is also minimized. The modified routing strategy is applied to the basic ad hoc on-demand distance vector (AODV) routing protocol and a maximum transmission range based ad hoc on-demand distance vector routing protocol named AODV range routing (AODV_RR) is proposed and studied under different network sizes. Measurable difference in performance is realized and the proposed AODV_RR perform better than normal AODV with respect to all the selected metrics.  相似文献   

17.
Recently, Packet scheduling plays a vital role in Wireless Sensor Networks (WSNs). The major key challenges include delay, packet dropping, energy consumption and lifetime due to constraints in energy and computing resources. All the research works on packet scheduling scheme in WSN uses only First Come First Served (FCFS) and Dynamic Multilevel Priority (DMP) schemes. FCFS works based on packet arrival time, it leads to starvation and high processing overhead for real-time packets. DMP works in multilevel with dynamic priority reduces the transmission overhead and bandwidth; it consumes more resources for real-time task leads to deadlock. To solve these problems, this work presents Multilevel Dynamic Feedback Scheduling (MDFS) algorithm. The sensor node classifies the emergency and normal data into three different ready queues named as high, medium and low priority, respectively. The queues are connected with a feedback mechanism; each packet from the sensor node has its own time quantum value based on the deadline. The updated time quantum value is compared with the boundary value of the queues, depends on the updated value the data packets are moved between queues with help of feedback mechanism. The simulation result proves that the projected MDFS outperforms in WSN environment.  相似文献   

18.
With the IEEE 802.4 token bus standard rapidly gaining acceptance because of its useful features and inclusion in the GM MAP (General Motors manufacturing automation protocol) specification, semiconductor companies are implementing this standard. A carrier-band implementation can provide a low-cost token bus node with up to 10 Mbs data rates. A carrier-band node that includes a token bus controller (TBC), carrier-band modem (CBM), host processor, and memory can be quickly and inexpensively designed using VLSI computer-aided design (CAD) techniques. One such implementation is presented. The token bus controller (TBC) implements the medium-access control (MAC) function in accordance with the IEEE 802.4 standard. The carrier-band modem (CBM) chip implements the 802.4 carrier-band physical layer. An IEEE recommended standard serial interface is used to pass information between the carrier-band modem and the token bus controller  相似文献   

19.
该文将优先级控制机制引入到综合业务双令牌双环LAN中,对具有3个优先级的双令牌双环LAN建立了排队模型并进行了数学解析和模拟试验,得到了有关性能评价的重要参量,对解析结果进行了数值计算及结果分析,从而为在综合业务环境下建造双令牌双环LAN提供了理论依据。  相似文献   

20.
基于GPRS的远程无线透传终端系统的设计与实现   总被引:16,自引:2,他引:14  
介绍了利用单片机控制GPRS调制解调器模块实现GSM网络GPRS业务数据接入的智能终端系统,详细介绍了系统的功能实现、终端与控制中心的通信流程、以及系统的软件实现。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号