Publication | Closed Access
Some properties of timed token medium access protocols
29
Citations
12
References
1990
Year
EngineeringInformation SecurityCommunicationTimed-token Protocol ParametersReal-time CommunicationNetwork PerformanceSecure ProtocolLightweight ProtocolNetwork FlowsTimed-token ProtocolsNetworksNetworked Computer SystemsTotal ThroughputComputer ScienceQueueing SystemsCryptographyNetwork Communication ProtocolNetwork Traffic ControlReal-time Systems
Timed-token protocols are used to handle, on the same local area network, both real-time and non-real-time traffic. The authors analyze this type of protocol, giving worst-case values for the throughput of non-real-time traffic and the average token rotation time. Results are obtained for synchronous traffic generated according to a generic periodic pattern under heavy conditions for non-real-time traffic and express not only theoretical lower bounds but values deriving from the analysis of some real networks. A model which addresses the asynchronous overrun problem is presented. The influence of introducing multiple priority classes for non-real-time traffic on the total throughput of this type of message is shown. It is also shown that the differences between the values obtained under worst-case assumptions are close to those obtained under best-case assumptions; the method may therefore be used to provide important guidelines in properly tuning timed-token protocol parameters for each specific network installation.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">></ETX>
| Year | Citations | |
|---|---|---|
Page 1
Page 1