首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This paper presents a new protocol for token ring local computer networks and its performance for single and dual ring networks using simulation modelling. The proposed protocol is a modification of the IEEE 802·5 token ring standard. In this protocol, a station can start transmission if it receives a free token or a data packet passing its interface logic. Idle stations are skipped whenever there is at least one station that has a ready packet to transmit. This is achieved by using two of the reserved bits in the frame status (FS) field. The bits used are called transmission reservation bits (TR-bits). The TR-bits are reset by the sending station and set by the first station that has data to transmit during the round trip of the associated packet along the ring. It is found that the proposed modified token ring (MTR) protocol provides better throughput and delay performance for both the single and dual ring networks. The reduction in mean delay of the MTR as compared to the standard token ring (STR) reaches about 45 per cent under heavy traffic conditions. Moreover, it is found that the performance of the MTR decreases as the packet size increases but remains higher than the corresponding performance of the STR for both the single and dual ring networks. The MTR provides a maximum throughput improvement of about 6 per cent over the STR for both dual and single ring cases. Finally, the proposed protocol (MTR) is easy to implement, with no extra hardware and has low cost/performance characteristics.  相似文献   

2.
CSMA/CD with Deterministic Contention Resolution   总被引:1,自引:0,他引:1  
This paper presents a novel media access protocol CSMA/CD with deterministic contention resolution (DCR) for a local area network. It usually operates as CSMA/CD, but once a collision occurs it resolves the collision using a kind of implicit token passing. An analysis was conducted on DCR performance characteristics based on simulation studies and in comparison to conventional CSMA/CD and implicit token passing. It was found that they were very satisfactory in terms of throughput, message delay, and delay standard deviation, these performance characteristics make DCR attractive as a media access protocol for combined voice and data traffic. It has also been shown that this protocol assures robustness against various kinds of transmission errors and station failures. A prototype of a local area network using this protocol has been developed. It consists of a pair of optical fiber buses to which each station is attached via a pair of directional couplers.  相似文献   

3.
This paper reports on the implementation of a local area network (LAN) operating under a new CSMA-CD protocol with dynamic priorities (CSMA-CD-DP). User terminals, host computers, and other servers are connected to a common broad-band channel through N network access stations in a clustered manner. This concept reduces the number of network access stations and enhances the utilization of hardware and software resources greatly. A new protocol has been developed which organizes the decentralized operation of the distributed network access stations and which allows for a number of specific features. In the idle state the channel is operated in the contention mode. After the beginning of a transmission, the channel is operated in a reservation mode. Channel arbitration after a completed transmission is resolved by staggered delays; at any time, each station owns a distinct transmission delay which is changed after every successful transmission by broadcasted acknowledgments. This protocol strictly limits the possibility of collisions and approaches the effectiveness of token and polling protocols with increasing load. Through specific allocations of transmission delays, static priorities or dynamic overload control can be realized easily. The performance of the CSMA-CD-DP protocol has been modeled and analyzed analytically as well as by simulation. Results for normal load and overload reveal high throughput and low transfer times which are basic for a wide range of applications in LAN's.  相似文献   

4.
A new token-passing mechanism, priority token passing, which features real-time access and fast detection and recovery of transmission errors, is discussed in detail in comparison with standard token-passing protocols, and its large-scale integration (LSI)-oriented design concept is described. Priority token passing includes only a small performance overhead, due to its switching functions, which can change network topology from ring to broadcast medium. A token-holding node passes the token to another node after determining the successor through priority comparison. Errors occurring during token passing can, thus, be detected and corrected simply and promptly. Priority token passing has a simple hardware implementation, requiring only small additions to the frame control circuitry, and has a small implementation overhead. The priority token-passing protocol and two other important network communication functions, dual ring network reconfiguration and high-level data link control (HDLC) normal response mode-based message transmission, are designed as a single finite-state machine, and implemented into a compact LSI chip. This integrated instrument network (IINET) chip provides complete network communication services and requires only three additional external electronic components for operation  相似文献   

5.
A token ring local area network, the parallelring, is introduced. The ability to concurrently support multiple communication paths on a single loop in an efficient and fair manner differentiates the parallelring from earlier ring architectures. This is accomplished by using a message destination removal scheme and, hence, allowing more than one station to transmit a variable-length frame at a time. Simulation studies show that the parallelring exhibits better performance in terms of throughput-delay characteristics than the other token rings. In addition, a priority scheme is used in the parallelring to provide messages of different time constraints with different media access priorities so that it can support media access fairness and real-time services. In the parallelring, error detection and recovery are completely decentralized  相似文献   

6.
The IEEE standard 802.4 token bus protocol requires each network station to implement a synchronous (highest priority) message class, and permits a station to implement three lower priority classes: urgent asynchronous, normal asynchronous, and time available. Each of the lower three priorities (called access classes) is assigned a target token rotation time that limits the amount of time that a station can use to service lower priority traffic. A formulation of the problem is presented in which messages are transmitted from an access class as long as network throughput remains below a user-specified threshold. Formulas are derived that transform this priority scheme, based on network throughput limits, into the proper target rotation time settings that the token bus protocol actually requires. The analytical model is compared with a computer simulation of the token bus protocol and shows close agreement  相似文献   

7.
In this paper, a proposed new wireless protocol so-called wireless controller area network is introduced. WCAN is an adaptation of its wired cousin, controller area network protocol. The proposed WCAN uses token frame scheme in providing channel access to nodes in the system. This token frame method follows the example used in wireless token ring protocol which is a wireless network protocol that reduces the number of retransmissions as a result of collisions. This scheme based on CAN protocol allows nodes to share a common broadcast channel by taking turns in transmitting upon receiving the token frame that circulates around the network for a specified amount of time. The token frame allows nodes to access the network one at a time, giving ‘fair’ chance to all nodes instead of competing against one another. This method provides high throughput in a bounded latency environment. The proposed WCAN protocol has been developed and simulated by means of QualNet simulator. The performances of this proposed protocol are evaluated from the perspective of throughput, end-to-end delay and packet delivery ratio, and are compared against the IEEE 802.11 protocol. Simulation results show that the proposed WCAN outperforms IEEE 802.11 based protocol by 62.5 % in terms of throughput with increasing network size. Also, it shows an improvement of 6 % compared to IEEE 802.11 standard at a higher data interval rate.  相似文献   

8.
An analysis is presented of the throughput performance of some recently proposed token-passing local area network (LAN) protocols under a heavy load assumption. The IEEE 802.4 token bus standard which uses a cycle-dependent timing mechanism to control station access to the channel, is studied. It is shown that the cycle-dependent timing mechanism limits the token circulation times properly. Moreover, priority among different access classes is being implemented. Analytic results for computations of throughputs and cycle lengths are derived. These results provide insights into the cycle-dependent timing mechanism and also guidelines for design. Using the results derived, examples concerning the throughput behavior under different heavy load configurations, the sensitivity to parameters, system optimization with delay and bandwidth constraints, and comparison with the other integrated access schemes are studied  相似文献   

9.
The fiber distributed data interface (FDDI) is an ANSI draft proposed standard for a 100 Mbit/s fiber-optic token ring. The FDDI timed token access protocol provides dynamic adjustment of the load offered to the ring, with the goal of maintaining a specified token rotation time and of providing a guaranteed upper bound on time between successive arrivals of the token at a station. FDDI also provides automatic recovery when errors occur. The bound on time between successive token arrivals is guaranteed only if the token rotates quickly enough to satisfy timer requirements in each station when all ring resources are functioning properly. Otherwise, recovery would be initiated unnecessarily. The purpose of this paper is to prove that FDDI timing requirements are satisfied, i.e., the token rotates quickly enough to prevent initiation of recovery unless there is failure of a physical resource or unless the network management entity within a station initiates the recovery process.  相似文献   

10.
As a research project for NASA's Langley Research Center, we developed a variation on MIL-STD-1553B (the military standard for avionics buses) whose goal was increased fault tolerance. The resulting protocol, called implicit token passing (ITP), replaces an explicit token with brief "soundoff" messages from all nodes participating on the LAN. Since every node participates on every "token cycle," bus silence is an error indication and initiates recovery action. By encoding state information in the headers of the transmitted words, nodes are continuously aware of the global state of the network. This local knowledge of the global network state allows the system to continue operation in spite of nodal failures. A station which fails but then recovers can quickly assess the global network state and then safely rejoin the active nodes. ITP features high throughput and bounded message delay, and achieves high reliability through tolerance of failed nodes and automatic resynchronization when failed nodes are revived. The protocol is ideally suited for a bus topology and fiber optic media.  相似文献   

11.
A LAN or MAN (local or metropolitan area network) using token passing to allow stations to access the transmission medium is studied. Ibe and Cheng (1989) recently presented an approximate derivation of message delays for an asymmetric single-service token passing with only one type of message. In the present work, this analysis is extended to an operation with nonpreemptive priority queuing. The number of message priority levels and the walktime vary from one station to another. Moreover, the assumed Poisson message arrival process and the message transmission time vary, not only from one station to another, but also from one class to another. The performance, as measured by the mean delay for any message class at any station, is derived. The simulation results show excellent agreement with the analytical results, even under heavy loading. The results confirm earlier findings that the performance at a station is influenced by its position relative to heavily loaded stations  相似文献   

12.
Token ring networks are the second most commonly used type of local-area network (LAN). The second version of the formal token ring multiple access mechanism, ISO 8802/5, was released in late 1995 and this rationalised many of the new developments, e.g. the 16 Mbit/s solutions. The latest innovations are the full duplex dedicated token ring and the development of a 100 Mbit/s high-speed token ring solution. To many people's surprise there is an extensive legacy of token ring installations and the latest innovations, such as token ring switching, are an attempt to maintain and support this significant market presence. Token ring is designed to provide high throughput under heavy loads (something which is normally impossible for Ethernet to sustain) but in most cases it is used in typical office environments where there is infrequent occurrence of heavy loads  相似文献   

13.
We evaluate the performance of an N × N ATM discrete time multicast switch model with input queueing operating under two input access disciplines. First we present the analysis for the case of a purely random access discipline and subsequently we concentrate on a cyclic priority access based on a circulating token ring. In both cases, we focus on two HOL (head-of-line) packet service disciplines. Under the first (one-shot transmission discipline), all the copies generated by each HOL packet seek simultaneous transmission during the same time slot. Under the second service discipline (call-splitting), all HOL copies that can be transmitted in the same time slot are released while blocked copies compete for transmission in subsequent slots. In our analysis the performance measures introduced are the average packet delay in the input buffers as well as the maximum throughput of the switch. A significant part of the analysis is based on matrix geometric techniques. Finally, numerical results are presented and compared with computer simulations.  相似文献   

14.
A comparison of the performance of two input access mechanisms for multicast switching is presented. The first of these-a cyclic priority input access method-is a derivative of the ring token reservation method which eliminates the unfairness of the ordinary ring token reservation. It has the advantage of being relatively simple and easy to implement. A second approach employs a neural network to resolve output port conflict. While more difficult to implement, it has a delay-throughput performance advantage over the cyclic priority approach. The primary performance measurements are the switch throughput and the packet delay. A key assumption is that all copies of the same packet must be switched in the same slot  相似文献   

15.
This paper introduces the multiaccess mesh (or multimesh) network. Stations are arranged in a two-dimensional (2-D) mesh in which each row and column functions as a conventional linear local-area network (LAN) or metropolitan-area network (MAN) subnetwork. Full connectivity is achieved by enabling stations to merge their row and column subnetworks, under the coordination of a merge control protocol. A two-dimensional token-passing protocol is considered, and a more complex protocol motivated by max-min fairness is also presented. Like conventional LANs and MANs, the multimesh requires no transit routing or store-and-forward buffering. The multimesh is a generalization of the token grid network. Using analysis and simulation, we study the capacity of multimeshes constructed of token rings and slotted rings, under uniform and nonuniform loads. A multimesh can support much higher throughput than conventional linear LAN and MAN networks with the same transmission hardware. Moreover, the multimesh capacity grows with the number of stations, We also present a healing mechanism that ensures full network connectivity regardless of the number of failed stations  相似文献   

16.
It is well known that some time-token medium access protocols for local area networks (LANs) like the IEEE 802.4 token bus and the FDDI token ring can guarantee the medium access delay for time-constrained packets. However, a problem which has been largely overlooked is how these protocols can be made to provide a maximum throughput for nontime-constrained packets while guaranteeing the delay bound of time-constrained packets. The authors first show how the parameters of the IEEE 802.4 token bus and the FDDI token ring can be set to solve the above problem. Then, they design a new timer mechanism for the timed-token protocols which provides the highest guaranteed throughput of nontime-constrained packets among a set of medium access protocols called the token passing protocol, to which most of the existing non-contention LAN protocols belong. They present numerical examples to compare different protocols, all of which have shown the superiority of the proposed protocol to the others  相似文献   

17.
孙献璞  张艳玲  宋彬 《电子学报》2006,34(1):118-122
本文设计了一种采用动态令牌算法的MANET多址接入协议,解决了隐藏终端和入侵终端问题.利用这种算法,不再需要为令牌的传递预先建立虚拟的令牌逻辑环路,而是根据当前的网络拓扑结构自动地形成令牌的传递路由,使得令牌的传递能够适应网络拓扑结构动态的动态变化.同时,通过周期性地产生令牌并严格地限制每个令牌的生存时间,简化了令牌的维护过程,并为时延敏感的业务提供良好的QoS保障.另外,该协议采用一种互同步技术,具有成本低廉、运行可靠的特点,可完全独立于其它系统(如GPS等),且已应用于实际的MANET网络.  相似文献   

18.
An access rule for token ring local-area networks called the helical-window token-ring protocol is introduced. It features the use of a window that limits the allowable messages a token-holding station can send. With the window, the operation of the protocol approaches that of a central single-server queuing system in the sense that messages are delivered in near first-come-first-served order on a network-wide basis. The introduction of the window also makes analysis of the networks tractable. Exact analytical formulas for the capacity and for the mean, variance, and moment-generating function of the message waiting time are derived. Numerical simulation is used to verify the results. Comparisons with continuous polling systems show that the imposition of the windowed access rule can lead to significant reductions in the delay variance (at the cost of increasing the mean system time) when the traffic is heavy and/or the message transmission time is large with respect to the walk time of the ring  相似文献   

19.
The inherent functional property of the unidirectional token movement in a token ring network, is modified in this paper and an algorithm is presented that enables the continuity of operation, in case of a single link component failure, thereby improving the system reliability of a basic conventional token ring network. This phase contributes to the continuity in operation until the maintenance restores the normal ring configuration.  相似文献   

20.
Fiber Distributed Data Interface (FDDI), a set of standards developed by the American National Standards Institute (ANSI) X3T9.5 Task Group, is reviewed. The timed token access method, used to share the medium among stations in this 100-Mbit/s local area network (LAN), differs from the traditional token access method in that the time for the token to walk around the ring is accurately measured by each station and used to determine the usability of the token. FDDI-II, which provides support for isochronous service in addition to the asynchronous and synchronous service provided by FDDI, the media-dependent physical layer (PMD) standard called low-cost fiber PMD (LCF-PMD), and the implementation of FDDI on the synchronous optical network (SONET) are discussed  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号