”'er 1193““ 3:1.~1?1‘ K 111...: .EKKKKK...K1‘K KKKIKKI KKK-KKK KK KK KKKKK K K ".3" " K'iKfifiy. ‘c )5.‘K' Nu‘ .K KKKKKK -'K .:KKKKKKKK K.» 2 .1“? ”KKKRKK K'efiKKK KKwK'KKK'KK KKK Km :"KKKK 11.3.4?" KK'K K K . . K KJ “its? a KOKK .1..qu 3‘... :53 M; K ..... 1 ’3 ,. 111KKKKK K K 1...... K. KKK ,1 «“1" I. . ’. .f_;35§g_ . ~_ ‘c v o—«pg ‘ ... :1 n";‘-Q- ' 3114:: .- r -o! "qfi‘rx‘. . K n l .C u v ,r ~ I. '- . c " @335 - . .- l . u . ‘ n ' _ ‘ v ,. ¥ - ‘ -.w ._.- -- -VJ» —;-.— - " - n-4,”; "11:0. -.:-‘... _.'—a A 7 . - "3:42:21 ":': . «Fania-«Am. ...,. --,._. < . .H . . .. , r .. . K I“ "I K L1... . .12. K .13.“. KKK-”K. 'H o- no 'KI .1 ’KKKKKK ,KK1 KKK ,1‘4 K a. .1’.K1K1KK’1.K .. .K... .,. ...11 .11.... .11. ..;; I.'.1I...1.;=';.1"'1 "1' "1K 111:1? KKKKiTKK K ‘ .guI 1.... K' '1 ‘1” ‘3‘? 2'". .. #1.: .1, :iK- 1; , 1 .K" i .‘ ‘ 1 K K :K‘ 'K KKKKK KI KK KIKKKK' K? 31.1'K2KK'1'K73KKKKK' KKK' 1'22... ‘ I, .{KK K‘.I 1.! =1 K1 K‘ KIK' ”1 W U .1'v3.K.Kfi.KK ...3.. ‘ 3,3. I”: K. 111 ' , . ., 4 1' (KKKKK .1KK 1K1. lK KKKK'KK KKK“ 1.. .t‘ H. .KK KKKK thKKi KK.'KI.. 21K. IKKKK'KKKK‘KKKKK’KK ._- ...'.: KKII K-K‘K' K KKK ‘ ~.TK 1 ” ' 11 .K K nK'K KI K KK 'K1.K K“ KKK K KKK K'K'WK KI 1 1 KKKKKK K 11K, WK 1 11.....1.1.:t;11 .1“ 111.1“.K1' 1.4K1111. . 11 1 ‘ ‘1: ‘ 111. - 111'1 11 1 .1: .1. =11 , ; =.K.K.-;.‘.I.‘;.K ..'1.1KKI..111 1'" .. Mr 1'14"“. 1'.‘ K "M? . .1" K. K ‘;.K‘:K‘.K .'1. K KK‘K K 1 13111111;.1KKI1IK“I.1‘1‘1 ""11. W .11... ‘ 1" K" .1 K 1 111.1“1111 K"~K=IKIKIK"‘ KKK {“H.’ .I’I. m ,.. I'KI.' “'14 K 1-.1..-..':K'..§..KKK'K K I.K I: [1.1“ K.'K'E K. iK‘KK-‘1KKKK21KK‘KKKK'K'KKK 1111111: 1‘11. 1 . I 1111111 K 111““ ‘11 KC K111 1K K11.=,=1,....1...... 11‘.=':"11 .7 {K1KI“.....|K.K.K~K‘..'3K.‘.}I.K... |lI.K : II' KI]. Km... I "111' 1|IKKKK ,‘K Kr... .111... .KIK.KI-2.;. 1 ,,I.1111‘11I1111‘I .111 1‘" :éi-T . . KK 1.1M... «KKK. KJKKKKKIKKKKKKIK.KKK1KK1K1K1.K.KK1= 1.....11 1.11 ....KKIK1«.I.I= 1. K KIKKKKKKKKK KKK KIK'KKKKK KKKKKKKKKKKKKK 1K .. .1 11K... .{finK 1'. II KIKKKKKK F K KKKKKKKK KKKKKKKKKKKKKIK TH E S . -'.‘ 'i' ,1 rift,» .‘ CH... This is to certify that the dissertation entitled THE ANALYSIS OF TWO VIRTUAL-TOKEN PROTOCOLS FOR LOCAL AREA COMPUTER NETWORKS presented by Liang Li has been accepted towards fulfillment of the requirements for Ph.D degree in Computer Science Major professor Date Jan. 26, 1982 0-12771 MS U is an Affirmative Action/Equal Opportunity Institution MSU LIBRARIES 1—:__. RETURNING MATERIALS: Place in hock drop to remove this checkout from your record. FINES will be charged if book is returned after the date stamped below. M; W THE ANALYSIS OF TWO VIRTUAL—TOKEN PROTOCOLS FOR LOCAL AREA COMPUTER NETWORKS BY Liang Li A DISSERTATION Submitted to Michigan State University in partial fulfilment of the requirements for the degree of DOCTOR OF PHILOSOPHY Department of Computer Science 1982 C) Copyright by LIANG LI 1982 ABSTRACT THE ANALYSIS OF TWO VIRTUAL‘TOKEN PROTOCOLS FOR LOCAL AREA COMPUTER NETWORKS BY Liang Li Local area computer networking is fast becoming an area of intense research for its wide range of applications. To date, many different types of local networks have been proposed or developed. These network designs can roughly be categorized according to their design purposes, network topologies, transmission media, switching techniques, and communication control strategies. Among these designs, the decentralized multi-access schemes with a global databus topology provides one of the most popular approaches. It was recognized, however, that a serious trade-off exists between efficiency and control overhead for the many multi-access protocols. Additionally, most of these protocols are very sensitive to the network propagation delay and/or the size of the user population. In this thesis, we look into two new network protocols which employ a virtual-token concept to reduce the efficiency/overhead trade-off, and to support a large number of users under a wide range of bus propagation delays. The shortest-delay access method (SDAM) minimizes the network control's changeover time between two consecutive transmissions. The group broadcast gecognizing access method (GBRAM), on the other hand, utilizes the clusters of user machines on the network to construct a two-level scheduling function which reduces the control overhead. Analysis shows that both these protocols are efficient, stable, reliable, and easy to implement. They drastically improve the delay performance of the conventional token passing schemes; and their non-exhaustive transmission option guarantees an upper bound to the node's response time, which is particularly desirable for voice-data transmissions and real-time applications. The performances (i.e., throughput-delay relationship, channel capacity, and offered load to throughput relationship) of SDAM and GBRAM are compared with the performances of some of the most popular protocols and the M/D/l perfect scheduling in this thesis. ‘To My wife, Susie iii ACKNOWLEDGMENTS I would like to take this opportunity to express my thanks to Herman Hughes, who introduced me to the field of local computer networks, and supported me throughout the years; to Lewis Greenberg, who provided many inspirations and insights to this work; to Anil Jain, who brought me into the Ph.D program at Michigan State University in the first place; to Lionel Ni, who provided many valuable discussions and suggestions; and to R. V. Erickson, who helped a great deal in the statistical aspects of this work. iv a}. TABLE OF CONTENTS LIST OF FIGURES ......................................... ix 1 INTRODUCTION .......................................... l 1.1 The Evolution of Local Networks ........... . ....... l 1.2 Distinctions Between Long-hual and Local Networks . 2 1.3 Problem Statement ...... . .......................... 3 1.4 Organization of the Thesis ..... ....... ........... . 5 2 AN OVERVIEW OF LOCAL AREA COMPUTER NETWORKS ........... 7 2.1 Components of A Local Area Computer Network ..... .. 7 2.2 LACN Taxonomy ..... . .............................. 10 2.2.1 Clark's Taxonomy ............. .............. 11 2.2.2 Shock's Taxonomy ................ ....... .... 11 2.2.3 Thurber and Freeman's Taxonomy ..... ........ 12 2.2.4 Luczak's Taxonomy on Global Bus Computer Communication Techniques ................... 13 2.2.5 Cotton's Distinguishing Features for Local Network TeChnOIOgies OOOOOOOIOOOOOOOOOOOOOOO 15 2.2.6 Tobagi's Taxonomy for Multi-access Protocols in Packet Communication Systems .. 16 2.2.7 Summary of LACN Taxonomy ................... 17 2.3 Multi-access Protocols on Bus Networks ........... 18 2.3.1 Advantages of Bus Topology ................. 18 2.3.2 Performance Criteria for Multi-access Protocols ....... . ......... . ........... ..... 23 2.3.3 Review of the Multi-access Protocols ....... 25 2.4 Two Proposed Protocols for Local Computer Networks 32 2.4.1 The Background ............................. 32 2.4.2 The Approaches ............................. 32 DEFINITION OF THE SDAM PROTOCOL ..... ................. 34 3.1 Basic Concept of SDAM ......................... ... 34 3.2 Network Configuration ............................ 38 3.3 SDAM on a Single Bus Topology ............. . ...... 40 3.4 SDAM on a Branching Bus Topology ................. 45 3.5 Illustration of the SDAM Protocol ................ 47 3.6 Message Acknowledgment in SDAM ........ ........... 52 3.7 Addition and Deletion of Nodes on the Network .... 53 ANALYSIS OF THE SDAM PROTOCOL ...... ........ .......... 56 4.1 Coffman's Model . ............ ..................... 57 4.2 Eisenberg's Model ......... ..... .................. 60 4.3 Konheim and Meister's Model ... ...... ............. 64 4.4 Analysis of OE-SDAM .............................. 66 4.5 Analysis of C-SDAM ............................... 69 PERFORMANCE OF THE SDAM PROTOCOL ........... ...... .... 71 5.1 The Throughput-Delay Performance of SDAM .. ....... 72 5.2 The Effects of the Protocol Overheads ............ 75 5.2.1 The Turnaround Time and the Network Capacity 76 5.2.2 The Token Initialization Packet (TIP) Time . 76 5.2.3 The Carrier-Sensing Time and the User Population 0................OOOOOOOOOOOOOOOO 78 5.3 Exhaustive and Non—exhaustive Transmissions ...... 79 5.4 Packet Size and the Packet Transmission Delay .... 82 vi (I) \() II 5.4.1 Different Packet Sizes and Their Normalized Delays ..................................... 82 5.4.2 Fixed-Size Packets versus Mixed-Size Packets .................................... 86 5.5 Ease of Implementation of the SDAM Protocol ...... 87 5.6 Network Reliability and Error Recovery ........... 90 DEFINITION OF THE GBRAM PROTOCOL ..................... 93 6.1 Background and Environment ....................... 93 6.2 Basic Concept of GBRAM ... ......... . .............. 97 6.3 Network Configuration ...................... ...... 98 6.4 Algorithms of GBRAM .............................. 99 6.5 Extensions of GBRAM ................. . ........... 101 6.6 Addition and Deletion of Nodes on the Network‘... 103 ANALYSIS OF THE GBRAM PROTOCOL ...... . ...... ......... 106 7.1 General Case Analysis .......... ...... ........... 106 7.2 Worst Case Analysis ........ ......... ............ 109 7.3 Selection of the Optimal Number of Groups ....... 110 PERFORMANCE OF THE GBRAM PROTOCOL ................... 114 8.1 The Throughput-Delay Performance of GBRAM ....... 115 8.2 Ease of Implementation and Network Reliability of GBRAM0.0.0.0....0.00.000...OOOOOOOOOOOOOOOOOOIOO117 COMPARISON OF PERFORMANCE ... ........................ 120 9.1 Comparison of SDAM and the A1 Scheme ........... . 121 9.2 Comparison of SDAM and the BID System .. ......... 124 9.3 Comparison of Throughput-Delay Performances ..... 127 9.4 Network Throughput and the Offered Traffic Load . 131 SUMMARY, CONCLUSION, AND FUTURE RESEARCH DIRECTIONS . 133 10.1 Summary and Conclusion .................. ....... 133 vii 10.2 Some Topics for Future Research ................ 135 BIBLIOGRAPHY . . . ........ . ................... . ........... 138 viii Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure 2-1. The layers of network control 2-2. LIST OF FIGURES Summary of LACN taxonomy ...... . .......... ... 2-3. Local network topologies ......... .... ....... 3-1. 3-2. Delay vs. user pop. for token-passing schemes Example of the SSTF algorithm . .............. 3-3. A single-bus local computer network ......... 3-4. State diagram of the SDAM protocol ...... 3-5. The flowchart of SDAM for a user node 3-6. The flowchart for the end-nodes of C-SDAM ... 3-7. The flowchart for the end-node of OE-SDAM 3-8. Bus topologies for a set of local nodes ..... 3-9. Decomposition of a multi-branch bUs ......... 3-10. 4-1. Head movement of SCAN Token-passing of C-SDAM on a branching bus . Token-passing of OE-SDAM on a branching bus Packet traveling on a single bus ....... .... Timing diagram of Figure 3-12 . ........... .. Packet traveling on a branching bus ........ 4-2. Queuing delay of SCAN and CSCAN ..... ........ 4-3. The walking server of C-SDAM ......... 4-4. A polling system ... ix 19 21 35 36 39 41 43 44 44 59 63 65 Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure Figure 4-5. Token passing of OE-SDAM on a branching bus 5-1. Delay performance of C-SDAM and OE-SDAM .... 5-2. Packet delay of C-SDAM vs. node locations 5-3. Effect of the turnaround time .............. 5-4. The TIP time versus network delay .......... 5-5. Effect of carrier sensing time ............. 5-6. Delay of exhaustive/non-exhaustive trans. 5-7. Distribution of queuing delays ............. 5-8. Tabulated distributions of Figure 5-7 ...... 5-9a. Delay distribution of mixed-size packets 5-9b. Delay performance of mixed-size packets ... 6-1. Channel scheduling for the BRAM protocol ... 6-2. Virtual token passing in GBRAM ........ ..... 6-3. Channel scheduling for the GBRAM protocol .. 6-4. Token passing of the extreme-fair GBRAM .... 6-5. Token passing of the extreme-prioritized GBRAMOOOOOOOOCCOIOOOOOO ......... G.......... 7-1. Optimal grouping for different channel loadings O0.0.000.........OOOOOOOOOOOOI.0... 7-2. Queuing delays versus network groupings .... 8-1. Throughput-delay performance of GBRAM ...... 8-2. Delay performance of prioritized GBRAM ..... 9-1. Port interface logic of the A1 scheme ...... 9-2. Implicit token of the BID system ........... 9-3. Comparison of SDAM, A1, and BID ......... ... 9-4. Comparison of delay performance at 3:0.01 .. 9-5. Comparison of delay performance at a=0.l ... 68 73 75 77 78 80 83 84 85 88 94 99 101 102 103 112 113 116 118 122 124 126 128 129 Figure 9-6. Comparison of delay performance at 3:1.0 ... 130 Figure 9-7. Offered load G versus throughput S ......... 132 xi CHAPTER 1 INTRODUCTION 1.1 The Evolution of Local Networks The invention of computer networking has been regarded by many as one of the major milestones in the history of computer evolution, much the same way as the invention of telephone to human civilization [Mar81]. Prior to the 70's, most of the computer systems that existed were stand-alone systems, each providing limited computing resources and services to its immediate surrounding. With the advancements of software and hardware technologies in the 70's, the idea of computer networking has become more and more widespread in industry, business, government, education, and the like. Today, the majority of the computer installations participate in some form of computer -F‘V" L‘C'v‘“ 3...: Had r 5 v de.‘ 9‘ n b nr ..0 aL‘CC ‘ u.‘; in», 1.2 networking, may it be a local connection to a front-end machine or data concentrator, or a link to a nation-wide large-scale network such as ARPAnet [McQ77] or TYMNET [Tym71], etc. In recent Years, due to the growing demands for a reliable, high-speed, inexpensive communication between various machines in a close vicinity (e.g., within a building or cluster of buildings), local area computer networking has emerged from the general computer networking and has become an area of intense interest in its own right. with the new technologies (e.g. LSI and VLSI .technologies) and potential applications (e.g. distributed parallel processing, back-end file/storage sharing, and office automation, etc.), it is only reasonable to expect a proliferation of local area computer networks in the decades to come . 1.2 Distinctions Between Long-haul and Local Networks While no clear boundary exists between a local area computer network (LACN or LCN) and an otherwise geographically distributed ("long-haul") network, a LACN can generally be characterized by the following properties [Thu79a,Cot80,Cla78,Chl79b]: 1. generally local; i.e., the network spans on the order of a few miles or less; 2. generally owned and operated by a single organization; 3. usually has a high bandwidth (e.g., l Mbits/second and up) over an inexpensive transmission medium; 4. the devices (nodes) which are connected to the network could be either active (intelligent) or passive (non-intelligent). Many of the technologies developed in long-haul networks have been applied to the local networks, e.g., the store-and-forward packet-switching concept, and the IMP (interface message processor) [Hea70] of the ARPAnet, etc.. However, the characteristics listed above render the local network a unique operating environment in which short propagation delays and high data rates at low costs are typical, thus giving rise to the simplification of network control structure and many new communication protocols [Cla78]. 1.3 Problem Statement To date, many different types of local computer networks have been developed or proposed [Thu79a,Luc78,Tob80,Tro80]. These networks can roughly be categorized according to their (1) design purposes, (2) network topologies, (3) transmission media, (4) switching techniques, and (5) communication control strategies or network access schemes (protocols). In the next chapter, we shall explore these classifications in some detail. In this thesis, we are primarily interested in local networks with the most popular global databus topology and a network access scheme that is multi-accessing/broadcasting in nature; i.e., when any node has a message (packet) to send, it broadcasts the message onto the global databus so that everybody can receive an identical copy of the message. It is the responsibility of the destination node to recognize the message that is intended for it. While many multi-access schemes have been developed or proposed, it was recognized that each of these schemes has its advantages and limitations. A trade-off exists between efficiency and control overhead under different traffic loads [Tob80]: "If a scheme performs nearly as well as perfect scheduling at low input rates, then it is plagued by a limited achievable channel capacity. Conversely, if a scheme is efficient when the system utilization is high, the overhead accompanying the access control mechanism becomes prohibitively large at low utilization." In view of the above difficulty, this report looks into two new network protocols: the ahortest-gelay access method (SDAM) protocol, and the group arcadcast gecognizing access method (GBRAM) protocol. Both of these protocols reduce the efficiency-overhead trade-off mentioned above; namely, they provide very efficient data transmissions when the system utilization is high, and yet at low utilization the overheads of the access control mechanisms remain relatively low. This is true even in situations where the number of nodes in the network is large and the propagation delay is long (i.e., the most unfavorable condition). Furthermore, by its very definition, the SDAM protocol defines a lower bound for queueing delays among protocols of its class -- the token-passing protocols. Both analytic and simulation models are employed to investigate the performance (e.g., the throughput-delay relationship, the throughput versus traffic load trade-off, the maximum achievable network capacity, etc.) of the SDAM and the GBRAM protocols. 1.4 Organization of the Thesis In the next chapter, we will give an overview of the local area computer networks, including the components of a local network and the classifications of the many LACNs. In Chapter 3, we define the algorithm for the SDAM, and describe the network configuration on which 'SDAM will be applied. Two variants of the SDAM, the closed SDAM (C-SDAM) and the open-ended SDAM (OE-SDAM), are possible depending on the manner in which the network control (the virtual token) is passed on the network. These two variants will be analyzed via queuing models in Chapter 4. Chapter 5 evaluates the relative merits of C-SDAM and OE-SDAM, as well as other performance issues in the algorithm, such as the network overheads and the effect of mixed-size packets. Simulation methods will be used to validate the analytic results, and to obtain experimental data for situations where analytic approach is difficult, if not impossible. The GBRAM protocol is defined in Chapter 6 and analyzed in Chapter 7. Simulation models will also be used to study the performance of various GBRAM variants in Chapter 8. In Chapter 9, we compare the algorithm of SDAM with two other similar conflict-free protocols for their relative merits. We also compare the performance of SDAM and GBRAM to that of the perfect scheduling and some other popular protocols such as the aarrier aense multiple access with gollision detection (CSMA/CD) [Met76], and the aroadcast aecognizing access method (BRAM) [Chl79a] protocol. Finally, in Chapter 10, we present a summary and conclusion of this work, with some comments on the possible applications of these protocols. We will also point out a few directions for further research beyond the scope of this study. CHAPTER 2 AN OVERVIEW OF LOCAL AREA COMPUTER NETWORKS 2.1 Components of A Local Area Computer Network According to Clark et. al., a local area computer network (LACN) shares with the long haul networks three basic hardware elements and one basic software element [Cla78]. They are: (l) a transmission medium, e.g., coaxial cable, fiber optics, twisted pair, etc., (2) a mechanism for control of transmission over the medium, (3) an interface to the network for each of the connected nodes. and (4) a set of software protocols which control the transmission of information from one node to another via the hardware elements of the network. This set of software protocols functions at various levels (or control layers) of the network architecture. Typically, the higher level protocols reside in the host machines, and are designed to be machine and network independent. The lower level protocols, on the other hand, are strongly influenced by the network topology, transmission medium, and the control mechanism, and may be partly implemented into the network's interface units. The International Standard Organization (ISO) has defined a seven-layered network control structure for the long haul networks [Mar81]. These layers from bottom to top are: 1. physical control (basically hardware) 2. link control 3. network control 4. transport end-to-end control 5. session control 6. presentation control 7. application (process) control. An illustration of the layered structure of network control is given in Figure 2-1. It is very likely that this layered architecture will also be adopted into a local network standard [IEE81], so as to make the interconnection of networks (local or long haul) possible. However, the currently existing LACNs may not conform strictly to this Honpcoo xnozpoc mo mnmhma one .HIN mammHm 2282 Au2HmoeH2mv 222222 58 5582255 222232 58 2382 22822 22822 .8528 28825 A v .8528 28825 52 8528 28825 .8528 228 n v .8528 225 2245 .8528 228 8528 2822.22 A v 8528 28252 2.885 .8528 285.22 8528 98.8.95 A v .8528 922-8122 20858225 $88.52 28823 28822225 Homezoo ZOHmmmm ll W QomBzoo onmmmm domezoo ZOHedfizmmmmm A .v Homhzoo ZOHB 3-.. 20-—>4--> l5--> 10 . number of tracks scanned: 15 + 17 + 16+ 11 + 5 = 64 tracks. The shortest-seek-time-first (SSTF) algorithm head movement: 18-+20-->l5-->10-~>4-->3. number of tracks scanned: 2 + 5 + 5 + 6 + 1 = 19 tracks. Figure 3-2. Example of the SSTF algorithm 37 However, the tracks on the inner and outer boundaries of the disk are less likely to be near the disk head (as opposed to the center tracks), therefore will sometimes suffer excessive delays. A straightforward way to remedy this situation is to have an one-directional SSTF, called SCAN [Cof73], where the disk head scans for the nearest track 12 one direction only, until the head either reaches the boundary of the disk or finds no more requests to process ahead in its scanning direction; then it turns around and scans the other direction. Here, then, we can apply this SCAN algorithm to the network's token-passing; i.e., the token is passed from one end of the bus to the other end, and en route triggers the busy nodes to transmit their packets. When the token reaches the end of the cable, the token-passing direction is reversed, and the token is passed back to the other end. To achieve distributed control and still avoid conflict, SDAM uses a "token direction" code on each packet to indicate the direction of the current scan. The "virtual token", as perceived by a user node, is actually the absence of any more packets within a time interval following a passing packet on the bus, thus allowing the node to start its packet transmission. 38 3.2 Network Configuration Before we describe the rules of such a shortest-delay access method (SDAM), let us define a general local network configuration for which the algorithm will apply. 1. The network topology is a bus topology with a finite number of branches. For simplicity, we will first assume a network with a single bus, then later generalize this topology into a branching bus topology. The transmission medium is a coaxial cable with baseband signalling at, say, 10 Mbits per second. There is a set of N nodes (computers, terminals, fast printers, etc.) connected to the bus (the common channel). These nodes are numbered sequentially from left to right or vice versa. Each node is connected to the bus via a communication inteface unit, CIU (sometimes referred to as the bus interface unit, BIU, or network interface unit, NIU), which functions as a decoupler and buffer (see Figure 3-3). Henceforth we may consider the network as being composed of homogeneous nodes. Each node (or CIU) has the carrier-sensing capability (i.e., the ability to sense the bus busy/idle status). The carrier sensing action 39 Terminals Gateway to other networks a Mainframe a . . . Back—end Storage ‘ J I Elm [Em] CIU cm 7 _ . (I CIU ll J] \ Mini-computer Figure 3-3. A single-bus local computer network 8. consumes a very small (but nonzero) amount of time, a. Each node (or CIU) can identify the source and the destination addresses of the passing packets on the bus, as well as a "token direction" code on each of the packets. Each node is able to transmit and receive, but not simultaneously. A turnaround time 5 is needed for the node to change from the receiving state to the transmitting state or vice versa, or to "digest” a long data packet the node just received. This is sometimes referred to as the inter-packet or inter-frame time. There may be either one or two end-nodes attached to the cable. These nodes gain access to the common bus much the same way as the normal nodes do -- only they generate a control packet (or token 4O initialization packet, TIP) that contains a reversed token direction to the current token passing direction. ‘It is also possible to add this feature to the user nodes located at the ends of the bus, so that they serve as both user- and end-nodes. With these settings, we can then define the algorithm of the SDAM protocol in the following section. 3.3 SDAM on a Single Bus Topology There are two variants of the SDAM protocol. The first variant uses both end-nodes to pass the token initialization packet (TIP) back and forth on the bus, and is called the closed SDAM, or C-SDAM. The second variant uses only one end-node to generate the TIPs regularly, and is referred to as the open-ended SDAM, or OE-SDAM. Under both SDAM variants, each user node can be represented as having four states: IDLE, WAIT, READY, and TRANSMIT, as depicted in Figure 3-4. 1) IDLE. Originally, all nodes are in the IDLE state. When a packet is generated at a node, say node hi, the node becomes "busy", and enters the WAIT state. 2) W513. Node n1 waits for any packet to go by on the bus. When an end-of—packet signal from node n3 is sensed on the channel, and if the token direction on that packet is the same as the packet's traveling 41 Packet arrival Q -.—I ‘I a as” a E It“ $4 (1) 0 0mg :1 :3 8 a Eav a a e a .233 m (D (I) OOII a Jae. «:9 '83:: '6 Bus is still idle after c ¢ (1) delay [t+(|n.-n.|-1)d] '5 1 J +> i = turnaround time for each node a = carrier-sensing time of each node ni= the node wishing to transmit nj= the node that transmitted the last packet. Figure 3-4. State diagram of the SDAM protocol direction, then node ni enters the READY state. READY. Node n1 waits in the READY state for a turnaround time E plus the cumulated carrier-sensing delays [(lni -nj|)g] along the token-passing route, and is now ready to send a message. But before the transmission actually takes place, node n1 keeps monitoring the channel status. If the channel becomes busy during ni's READY state, the node goes back to the WAIT state. Otherwise it enters the TRANSMIT state. TRANSMIT. In this state, node ni keeps on transmitting until either its buffer is emptied (for sane t packet node I O1 1') ("L rf m 0 m 42 exhaustive transmission) or some transmission limit is reached (for non-exhaustive transmission), and then it returns to either the IDLE or the WAIT State . Note that all packets transmitted by node n1 carry the same token direction as that of the most recently passing-by packet. A schematic diagram of the SDAM protocol for a user node can also be found in Figure 3-5. For the end-nodes of the C-SDAM protocol, the state diagram is the same as that of a user node, except that the end-node always have at least one packet (the token initialization packet, TIP) to send when the token arrives; and this packet always carries an opposite token direction so as to send the token backwards. A schematic diagram of the C-SDAM for the end-node is presented in Figure 3-6. For the end-node of OE-SDAM, a counter of [2a + t + (N+l)d] is used, where a is the end-to-end propagation delay of the bus. After generating the first TIP, the end-node activates the counter and monitors the channel constantly. Whenever a packet from a node is detected, the countdown is interrupted until the packet has passed, and a packet turnaround time E is added back to the counter. When this counter expires, the end-node generates a new TIP and starts another round of token passing. A schematic diagram of the OE-SDAM protocol for this end-node can be found in Figure 3.7. 43 V Wait for Packets to Arrive Wait for Bus to Become Busy AL, V l A Wait for End—of—packet of the On- going Packet Token dir. Ready to Transmit after Delay Et+ ... d] Transmit Packet(s) I Figure 3-5. The flowchart of SDAM for a user node l Transmit a Control Packet ( Wait for Bus to Become Busy Wait for End-of- Packet Ready to Transmit after Delay [t+(N-n3)d] Figure 3-6. 'Phe flowchart 44 for the end-nodes of C-SDAM V Tran a C0 Pack smit ntrol et l to (N+l Set Counter [2a+t+ )dl Count Down Wait for End« fi Figure 3-7. of—packet; Add §_back to Counter i J The flowchart for the end-node of OE-SDAM 45 3.4 SDAM on a Branching Bus Topology Although it is alway possible to use a single bus to connect any set of nodes scattered in a local area, a branching bus network is more desirable for its shorter propagation delay as well as its flexibility in regards to future expansion and reconfiguration (see Figure 3-8). SDAM can easily be expanded to support this topology. Since any complex branching topology can be decomposed into simple three-branch structures as shown in Figure 3-9, it is sufficient to show that the algorithm of SDAM works on such a three-branch network. The reader can easily see that the same principle applies to networks with any finite number of branches. For the C-SDAM protocol, because there are three end-nodes El, E2, and E3 on the three branches, we need to change the token direction code from 'left' or 'right' to: 'El-->E2', 'EZ-->E3', or 'E3-->El'. Each user node will be on precisely two of such paths (refer to Figure 3-10), and the node's access scheme remains unchanged except for the new token directions. After receiving the network token, an end-node will now generate a TIP carrying a token direction that points toward the next end-node in sequence (for example, end-node E2 will generate a new token direction 'E2-->EB', and E3 will generate 'EB-->El', and so on). 46 a. A single-branch bus b. A multi-branch bus Figure 3—8. Bus topologies for a set of local nodes BRANCH 1 Figure 3-9. Decomposition of a multi-branch bus 47 For the OE-SDAM protocol, two token directions are possible: one is going 'left to right' on branches 1 and 2, and the other is going 'up right' on branch 3 (refer to Figure 3-11). Let us assume that the K nodes on branches 1 and 2 are sequentially numbered from 1 to K, and the remaining (N-K) nodes on branch 3 are sequentially numbered from K+l to N. Then the K nodes on branches 1 and 2 are treated as if they are on a single bus network. For each node n1 on the third branch, however, a counter of [(ni-l)d + t + 2a2], where a2 is the propagation delay of branch 2, is used to determine when the token will arrive at node n1. As soon as the node “i detects the end of a TIP, it activates this counter, and monitors the channel status. Whenever a packet from branch 1 or 2 is heard; the countdown process is temporarily interrupted, and a turnaround time S is added back to the counter. If instead, a packet from a node on branch 3 is sensed, then n1 switches back to the single-bus access scheme as described earlier. 3.5 Illustration of the SDAM Protocol To illustrate how the packet transmissions from different nodes are coordinated, we let Figure 3-12 depict a section of the bus, and Figure 3-13 shows its corresponding timing diagram. We assume that the network has been up and running for a while. Now, suppose node i received the token 48 -->: token passing sequence BRANCH l J BRANCH 2 El ‘— 4— <—— <——— 1 ‘— <—-— 4— «~— 35 ”ITO—T" ‘3 E2 The token is passed from E1 of Branch 1 to E2 of Branch 2. Then E2 changes the token direction toward E3 instead of to E1. Finally, E3 passes the token back to El and completes a token-passing cycle. Figure 3-10. Token-passing of C-SDAM on a branching bus -————.-: token passing sequence BRANCH 3 -.——-.-: token passing between .' two branches BRANCH 1 ,’ , BRANCH 2 ................ ‘-----¢.----------“fi The end-node El passes the token toward.the end of Branch 2. The first busy node on Branch 3 waits for a time-out period, then starts the token passing on Branch 3. After another time—out period, the end-node El recovers the token, and completes a token-passing cycle. Figure 3-11. Token-passing of OE-SDAM on a branching bus 49 at time x0, and had just finished its packet transmission at time x1, with the token direction pointing toward the right (refer to Figure 3-12). After some delays later, the end-of-packet signals reach nodes i-l and i separately. Node i-l, noticing that the packet's traveling direction (to the left) is different from the token direction (to the right), will then refrain from any transmission attempts. On the other hand, node i+1 will be able to go through the READY state to the TRANSMIT state and sends its packets onto the channel. Nodes i+2, i+3, ..., although later sensing the same information as node i+1 did, will stop at the READY state when they detect the carrier generated by node i+1, and will be routed back to the WAIT state. When node i+1 finally completes its transmissions, the above procedure is repeated, except this time we assume that nodei+2 is idle (refer to Figure 3-13). Then node i+3 is able to go through the READY state and starts its transmission after detecting the absence of a carrier from node i+2. Continuing this process, the token will eventually reach the right end of the bus. With C-SDAM, the right end-node simply generates a TIP with a reversed token direction and sends the token backward (i.e., to the left). With OE—SDAM, the left end-node (the only end-node on the bus) will wait for the countdown to expire, then generate another TIP to start another round of token passing. .... .1‘ CO H ..v 0 me.» A. 3 EU XOE i' ¢————————-Token direction 50 Token direction / \ ® l—J Packet fir.- Packet 0 E2 -- 9 0 A A T ‘7‘ Packet direction Packet direction Node 1 generates a packet with the token direction pointing toward the right. The packet direction is pointing toward either end of the bus from node 1. Figure 3-12. Packet traveling on a single bus Nodes 1‘2 7‘ II / / / / / ._ J 1 1 Packet f /" / /’ l H r I A / / I\ I \t / / i+1 ,. W 1‘ , u \d \tl (node i+2 is idle) 1+2 \fl\m K I l \ 1\ \d / 1+3 2 1 Bid it < . . , \w\ \\ \ ° I \\ \\ \ - . I \\ 1 1 Time _ x x o Nodes i-l, i-2,..., will not attempt to transmit because the packet direction (as seen by them) and the token direction are different. Nodes i+1, i+2,..., on the other hand, use carrier-sensing to avoid collisions. Figure 3-13. Timing diagram of Figure 3-L2 51 For the branching bus topology, again we will make use of the decomposed three-branch network as shown in Figure 3-14. Let's suppose that node i has just finished a packet transmission at time x0, with the token direction pointing toward branch 2 from branch 1 (i.e., 'El-->E2', refer to Figure 3-14). After some propagation delays later, the end-of-packet signals reach each of the following nodes: i-l, i+1, and K+l. Node i-l and K+l, noticing that the packet's traveling directions (toward E1 and E3, respectively) is different from the token direction (toward 82), will not attempt to transmit. On the other hand, node i+1 will be able to go through the READY state to the TRANSMIT state and sends its packets onto the channel. Nodes i+2, i+3, ..., K will also defer their transmission attempts for the same reason as stated earlier in the single-bus example. 3 Continuing the token passing, the virtual token will eventually reach the end of branch 2. For the C-SDAM protocol, the end node E2 simply generates a TIP with a new token direction 'E2-->E3', and sends the token toward E3 of branch 3. The OE-SDAM protocol requires that the first busy node n1 (KO. Next, it is assumed that the time required to serve any request is a constant T, and that the direction of the scan is reversed only when the head reaches the boundary at 0 or 1 (hence conforms to the C-SDAM requirement). If we let y(x) denote the mean time taken by the head to move a distance x from position 0 (and process requests along the way), as depicted in Figure 4-1, then we have y(xn3x) = y(x)+an+ATAx[y(x)+y(l)-y(1-x)] (4.1) which we can then solve as [Cof73]: y(x) = ----------- ax 05x51 (4.2) 58 7(1) ~ §(1-x) C a.) O ‘ 1 I I is its l ll db Figure 4—1. Head movement of SCAN Making use of the fact that the requests arrive uniformly within [0,1], we can calculate the mean waiting time for a request arriving at x as: 2 a 1 (1-2x) w(x) = If *i:i§7-- (4.3) Equation (4.3) indicates an uneven waiting time distribution across the tracks (see Figure 4-2), with the worst case occurring at the boundaries 0 and l of the interval: w(l) = w(0) = -—:--—— (4.4) If we modify the rule of SCAN such that the requests are served only in one fixed direction only, then we have a model equivalent to OE-SDAM. Following a complete "service" scan, the head is returned to the starting position 0 at rate a before it starts another service scan. This scheme is referred to as the CSCAN algorithm, and the mean waiting 59 time is derived as [Cof73]: w(x) = ------- , ijfl, (4.5) which is independent of the track address x (see Figure 4-2). This mean waiting time corresponds to the worst-case waiting time of SCAN in (4.4). Note that the above results are based on a continuous approximation (i.e., the interval [0,1]) of the discrete track addresses. Clearly, this approximation worsens if the number of tracks (in the case of SDAM, the number of nodes) is not too large. 21-T)‘ l = o 1 /'2 l' K Figure 4-2. Queuing delay of SCAN and CSCAN 60 It is also understood that the head's movement time is much larger than the request processing time (i.e., a>T) in a disk access scheme. For if this is not the case, then comparing Equation (4.5) with the welléknown M/D/l queuing system with perfect scheduling and without server walking time [Kle76]: (optimal) mean waiting time = ------- , (4.6) we find that for a<(AT2)/2, SCAN out-performs the optimal scheduling, which is a contradiction! In summary, Coffman's analysis is based on the assumptions that the number of tracks is large and that a>T, both of which may not be satisfied in a local network environment. A later study shows, however, that the uneven distribution of the waiting times across the tracks (refer to Figure 4-2) remains to be a valid observation. 4.2 Eisenberg's Model As an alternative approach, since a user node under the SDAM algorithm is allowed to transmit its packets only when the network token arrives, we can visualize this token as being a single server, attending the multiple packet-queues forming at the network nodes. Moreover, since propagation delay exists on the bus, we must take into consideration the changeover time during which the server (the network token) 61 walks from one queue to another. Such a queuing system has been analyzed by Eisenberg in one of his papers [Eis72], and is summarized below. In Eisenberg's work, the queuing syStem consists of N queues attended by a single server. The queues have independent Poisson arrivals and general service-time distributions. The server attends the queues in a repeating sequence (cycle) of I stages; each stage of the service cycle is spent working on a single queue until that queue is empty. This type of service discipline is sometimes referred to as the "alternating priority”. The service sequence is defined by an ordered set of I integers (n1,n2, ..., nI), where n1 is the queue that is served during stage i. As an example, a possible sequence of service may be: (stage) i: 1 2 3 4 5 6 7 8 (queue) n1: 1 2 3 4 4 3 2 1 where there are N=4 queues that are served in a cycle of I=8 stages (note that this is exactly the service sequence of C-SDAM in a 4-node network). When a queue is finally emptied, or when the server arrives at a queue that is already empty, the server immediately leaves and switches to the next queue in sequence. A switch from one queue to another always requires a changeover time whose distribution has finite 62 mean but is otherwise arbitrary. The mean waiting time "i for jobs in queue n1 and serviced at stage i can then be expressed as [Eis72]: wi .-. [E(v12)/2vi]+[xniE(Sni)/2(1-/°ni)] (4.7) where: v1 is the mean intervisit time, defined as the time at the begining of stage i since queue n1 was last visited; ENVIZ) is the second moment of the i intervisit time; Ani is the arrival rate at queue n1; Pni is the traffic loading at queue n1 (=Ani times average service time at n1); and E(S,11 ) is the second moment of the hi service time. If we let the number of states I be 2*N, and let the queue n1 serviced at stage i be (see Figure 4-3): i for l 1-AT (4.17) 70 for some constant K. Then the estimated queuing delay of node i can be expressed as: 2 aK 1+l-2x Di: 2 LAT ‘ (4.18) where x=(i+l)/(N+2). An example of this approximation can be found in Figure 5-2. It should be noted, however, that this is just a very crude approximation. For more accurate values of such delays, simulation methods must be used. CHAPTER 5 PERFORMANCE OF THE SDAM PROTOCOL Having defined and analyzed both variants of the SDAM protocol, in this chapter we shall further investigate the performance of the protocol under various operating conditions. The emphasis is on the attainment of the objectives listed in section 2.5.2 of Chapter 2. There will also be comments regarding to some of the performance criteria as described in section 2.4.2, where appropriate. For simplicity and without loss of generality, we will still assume a single bus network for our performance analysis in this chapter. Two GPSS simulation models have be developed to simulate the C-SDAM and the OE-SDAM protocols. Besides varifying the analytic results produced from the previous chapters, these simulation models will enable us to study cases where analytic approach is difficult (e.g., the non-exhaustive transmission discipline, or an unbalanced traffic load, etc.). 71 72 5.1 The Throughput-Delay Performance of SDAM The following set of parameters represents a typical local network configuration, and is used for comparing the delay performances of C-SDAM and OE-SDAM. N = 50 nodes; Packet size = 1000 bits (fixed); packet time = 1; a = 0.01, 0.1, 0.5, 1.0 for propagation delay; a = 0.03 (30 bits) for TIP; E = 0.02 (20 bit-time) for turnaround time; a = 0.002 (2 bit-time) for carrier-sensing time. When a is small (a=0.01), the difference in the token, passing time between these two protocols is small. Therefore, their performances are very close to each other, and to the M/D/l perfect scheduling (see Figure 5-1). As a increases to 0.1 (i.e., 10 us for a bus with 10 Mbits/sec bandwidth), the performance of C-SDAM begins to (slightly) exceed that of OE-SDAM , while both schemes still perform well. When a=0.5, the average delay of OE-SDAM is 12% larger than that of C-SDAM. This difference expands to 22% as a increases to 1.0 (i.e., loops). However, even under such a long propagation delay, both SDAM variants still turn out an acceptable performance. This is due to the fact that the changeover time of the network control remains to be a very small fraction of the bus propagation delay, therefore the impact of this increased propagation delay is much less 50 40 30 20 10 O\\) CDO Normalized Delay a?1.0 a?0.5 aF0.1 a80.01 73 ----- Analytic OE-SDAM 0 Simulated OE-SDAM + Simulated C-SDAM M/D/l perfect scheduling IN N N=goO II‘ t= .2 c = 0.03 Lil d=0.002 Ill 1 It / I /+ , II ’I ’/ / If , //l / III / // / / /I //I/ + /' // / ,5 /’ / + / / o /- / // / / +/ ’r‘/O 45 ‘AG/ ’0 +/ / 4’ // 2’ 0 /’/’ +/ / + ol/ ’0 / /’t / 4" A// ,’/«’ ,e’ , I ‘,.t0 0.1 0.3 0.5 0.7 0.9 V Throughput S Figure 5-1. Delay performance of C-SDAM and OE-SDAM 74 severe as compared to other token-passing schemes. The delay performance of the C-SDAM can be viewed as the "delay lower-bound" of the token-passing schemes in the following sense. The network control's Changeover time is minimized to just the propagation delay between two adjacent PEEK nodes, plus one node's turnaround time (a necessity) and the "token handling” time of the idle nodes in between these two busy nodes. This token handling time is again being minimized to barely the time needed to carrier-sense the bus in order to ensure collison-free transmissions. All these overheads (propagation delay, turnaround time, and the carrier-sensing time) represent the minimum requirements for a token passing scheme. Therefore, by definition, no other token passing schemes can out-perform C-SDAM. The C-SDAM protocol, however, has one performance drawback. That is, it tends to discriminate against the nodes located near either end of the bus (see Figure 5-2). This is because these nodes experience two uneven token intervist times. Consequently, the majority of the packets will arrive during the longer intervisit time (hence suffer longer delays) while only a small portion of the packets arrive during the shorter intervisit time, thus resulting in a longer averaged delay. The same phenomena has been observed by Coffman et. al. in their analysis of the disk access schemes (see section 4.1, Chapter 4). Therefore, C-SDAM may not be suited for implementation unless such a 75 discrimination can be justified for some practical reasons. For the remainder of this study, we shall concentrate on the performance of the OE-SDAM protocol for its virtue of fairness. 5.2 The Effects of the Protocol Overheads In this study, three operating overheads of the SDAM protocols are considered: the turnaround time, the TIP time, and the carrier-sensing time. The effects‘ of these overheads on network's performance are analyzed in this section. Delay —?—5_: OE-SDAM N = 50 d = 0-002 II a=0.l s=0.7 \ Jr: 1,..: C-SDAM t = 0.02 ._ / 2.5_'l‘ I l c—0.03 + T\ \Lzl: Approximation by +/*'* II 34+ Konheimd'c Coffman's rillI fi4IN+ fonmflas + *II' 2.0-I||' Q ° " 9-"'HI I. . ' ‘o.. .o . Z . . . .' :3“. _. Average ”WINE. - " ‘ -"‘|’1’i-T‘I Delay I'|'|:I|:IIIIT\.\+*+ 7;?" WWW lo "' .... + + 5 I 'I' ll IIIIIIII Leg yIs/‘IIII " M I" III I' I I II' I' ”III h!) ""I' "' 'IIIllIlIl llIIIIII || II I“ III II HI I II'IIIII lll' I'—"'|"'|”'I': II'Il 1.0 I I II 'I 'IrI..IIII I "I Left End Middle Right End Node Location Figure 5-2. Packet delay of C-SDAM vs. node locations 5.2. tran: being The Squat resu] bit-t value perfo devas the netwo maxim traff nonze bII “Etwo 5.2.2 76 5.2.1 The Turnaround Time and the Network Capacity Since a turnaround time t is associated with each transmission of the packet, we can envision the packet as being enlarged by a ratio of t (i.e., new packet time=l+t). The throughput-delay curve can then be approximated by Equation (5.5), with S substituted by S'=S(l+t). The results are plotted in Figure 5-3 for t=0.0 to 0.1 (0 to 100 bit-times). This figure shows that, for light loads,. the values of g do not significantly affect the network's performance. However, for high loads, larger g values have devastating effects on the average packet delay as well as the network's maximum achievable throughput (i.e., the network capacity). For an ideal case where t-->0, the maximum throughput of SDAM approaches 100% as the network's traffic load increases beyond 100%. But generally, for a nonzero t, the maximum network throughput is bounded above by” (l-t). So, if the turnaround time is t=0.l, then the network can only achieve an maximum of 90% throughput. 5.2.2 The Token Initialization Packet (TIP) Time In SDAM protocol, a TIP is required to initialize each cycle of token-passing. This packet can be a special bit-pattern that all nodes recognize as being generated by a particular end-node; or it can be a shortened data packet 77 Delay II 50‘ N=50 t=0.10 “0‘a=o.1 t=0.08 30 4 C = 0003 t = 0006 JV d = 0.002 t = 0.00 t = 0.02 20 t = 0.00 10 - 5 . 1 n L 1 l I 1 1 n n I: 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 Thumghmfl>$ Figure 5-3. Effect of the turnaround time that contains nothing but a source address and a token direction code. In any case, this packet will occupy a fraction of the channel time, and therefore must be considered as a network overhead. Analysis shows, however, that when the number of nodes on the network is large (e.g., n>20), the size of the TIP has little effect on the network's performance. The effect of varying TIP sizes under an extremely light load (S-->0) is plotted in Figure 5-4. In higher loads, this effect becomes negligible. TIP time 1.0 J l x 1 l J 1 L n 0.01 0.02 0.03 0.00 0.05 0.06 0.07 0.08 0.09 0.1 Figure 5-4. The TIP time versus network delay 5.2.3 The Carrier-Sensing Time and the User Population In an ideal case (as most people assume for their protocols), the time Q is negligible for each CIU to detect the absence (or presence) of a carrier and starts its own transmission. Under such an assumption, SDAM's performance is independent of the number of nodes on the network [Li 81a]. However, this is an unrealistic assumption. Since all nodes on the network take turn to sense and access the channel, each node must allow its predecessors enough time to complete their actions before it can safely start 79 its own. So, the time spent in carrier-sensing by each node will cumulate as the token is passed from node to node. Figure 5-5 shows the degradation of network performance under various values of g and N. It is clear that in a heavily populated network (e.g., N>100), even. a subtle change in the carrier-sensing time will have a profound effect on the network's performance. However, if we increase the packet size by some factor, then Q will be relatively decreased by the same factor. Therefore the network's performance can be made much less sensitive to the user population in this manner. 5.3 Exhaustive and Non-exhaustive Transmissions In analyzing the exhaustive/non-exhaustive transmission disciplines, it is important to specify the type of workload imposed on the network. Here, we are mainly concerned about workloads with uniform Poisson arrivals; no attempt is made to study the situation where unbalanced loads are presented. The exhaustive transmission discipline allows a node, upon receiving the network token, to transmit all the packets in its buffer, including the ones that arrived during the transmission process. The non-exhaustive discipline, on the other hand, puts a limit to the number of packets that a node may transmit at one time. In practice this limit may vary from node to node; but here, our focus 80 Delay 0 t = 0.02 c = 0.03 “0 T a = 0.01 30 T d=0.0l 20 — —0.005 =0Jn. 10-— d=0.002 d=0.01 /d=0.001 zd=0.0005 Ir / ” d=0.005 _ / _. _/_d=0.0 [1 / x/ _ / d-0.002 /’ x’ / , d=0.001 — — —— — —— —— -——— -—- ;—-/—-—/-—/—- d=000 s=0.2 ,. , ’/ , / ’,://,/, ... /d=0.0005 l I l 1 1 1 1 1 1 1 1 1 1 1 N 50 100 500 1000 Figure 5-5. Effect of carrier-sensing time 81 is directed to the case where only one packet is allowed to be transmitted per channel access. Generally speaking, the exhaustive discipline provides a better average delay and a higher throughput for the network. In extreme cases, a busy node with a large file to transfer may monopolize the entire channel for a long period of time, causing network's throughput to temporarily reach 1, while making other nodes suffer long waiting times. The non-exhaustive scheme, on the other hand, guarantees fairness among the users, and eliminates the above monopoly at the cost of increased token-passing time (hence the increased average delay). However, in light loads (S<0.5) where the average number of waiting packets at each node is much less than 1, these two schemes are practically the same. Also, if the bus delay is small (§<0.l), then the performance of the non-exhaustive discipline remains close to that of the exhaustive one (refer to Figure 5-6). When the bus delay is large, the difference in performance becomes significant (at a=l.0, S=0.8, the non-exhaustive scheme is 20% worse; at S=0.9, it is 66% worse). In terms of the queuing delay distribution, the non-exhaustive discipline has a larger variance than its exhaustive counterpart. This is again due to the fact that the efficiency in consecutive transmissions is compromised by the requirement of fairness. Therefore, the distribution curve is "flatter" and the delay values are spread wider. 82 Figure 5-7 shows the queuing delay distribution of both exhaustive and non-exhaustive trasnmission disciplines at 3:0.1 and a=l.0. Figure 5-8 summarizes the mean, standard deviation, median, and the 95 percentile of each of these distributions. 5.4 Packet Size and the Packet Transmission Delay 5.4.1 Different Packet Sizes and Their Normalized Delays Because of the operating overheads involved in transmitting a packet (e.g., turnaround time, bus propagation delay, etc.). it is intuitively true that the channel bandwidth will be better utilized) with larger packets than with smaller packets. One indicator of such a transmission efficiency, known as the "normalized delay", is the ratio of the time a node takes to complete a packet transmission (i.e., the packet's wait time + actual transmission time) to the packet's actual transmission time. This is one main reason why we have set the packet transmission time to be the unit of time in this study. If we reduce the size of the packet, then it has the same effect as increasing the bus propagation delay (and the other overheads, too) by the same factor. In this sense, 83 Delay 50 j N=50 c = 0.03 t = 0.02 40 - d=0.002 Analytic exhaustive transmission 30 _ 0 Simulated exhaustive transmission x -x--- Simulated non—exhaustive transmission 20 O\\7CD\OO l ._ 1 1 1 1 1 1 1 1 v 0.1 0.3 0.5 0.7 0.9 Throughput S Figure 5-6. Delays of exhaustive/non-exhaustive trans. zamméo I8 £38 $336 to 8333....qu .mIqflsmE 3m mm NM . . OH 0 m N. 0 (III pi p b .n" ll" “flip '— — II . Ema asum hdeQ dll— _ _ . A -. w w OH I\V\scr II! II\ if‘ \Ip.)\l /\1<\c ~\.I\f\!<\/I)\ pi i I . u s. I m.oum , - I m I om . I , Done. I s I on m>a9m¢¢£XmIcoz I o u... Io: wipgmsxméoz u I II m>vadmnxm wooé u p ofipgdnxm ”I . ” H.0Im No.0 II. 9. H.O H .m l on N z 01H N d H O...” m R GOfivgdhvaQ R 85 0-0 000000 mo 000000000000 000000000 .0-0,m~:000 000 0000 0000000 u*** 0000 ”III *** 0.00 0.00 0.0 III 0.H0 0.00 0.0 0.0 III 000 W“ 0.00 0.0 0.0 0.0 III 0.0 0.0 0.0 0.0 III 000002 m 000.00 000.0 000.0 000.0 III 000.00 000.0 000.0 000.0 III .0.0 m. 000.00 000.00 000.0 000.0 III 000.00 000.0 000.0 000.0 III 000: m“ 000.0 000.0 000.0 000.0 000.0 000.0 000.0 000.0 000.0 000.0 0 *** 0.00 0.00 0.0 0.0 0.00 0.00 0.0 0.0 0.0 000 0.00 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0200: m n 000.00 000.0 000.0 000.0 000.0 000.00 000.0 000.0 000.0 000.0 .0.0 m“ A 000.00 000.0 000.0 000.0 000.0 000.00 000.0 000.0 000.0 000.0 000: a 000.0 000.0 000.0 000.0 000.0 000.0 000.0 000.0 000.0 000.0 0 0.0 u .0 0.0009 cogmwmmonm 06 u .0 0.0005 coapmwmmonm 86 the effect of different packet sizes on network's delay performance can be estimated by Figure 5-1 in section 5.1. Although the TIP time, the turnaround time and the carrier sensing time will not be the same in this case, their effects can also be estimated from Figures 5-3, 5-4, and 5-5. These figures clearly 'show the advantage of the larger-sized packets. However, it must be pointed out that, if one is concerned with the absolute transmission delay (i.e., the "Uh-normalized" delay), such as in the case of a real-time application, then the smaller packets will still provide a better average respond time. 5.4.2 Fixed-Size Packets versus Mixed-Size Packets So far our analysis has been concentrated on a network with fixed-size packets (indeed, it is entirely possible to design such a local network). However, in practice, two common types of packets can be readily identified: a short type which contains control messages or terminal traffics, etc., and a long type packets that contain large chunks of data or file transfer. Shoch [Sho79] and Kleinrock & Naylor [Kle74]' both observed the so-called "BO/20 distribution", where 80% of the total traffic is carried in the 20% of the packet which are long [Sho79]. 87 To investigate the effect of such mixed-sized packets, we let 80% of our packet be 250 bits long, and the rest 20% of the packets be 4000 bits long, so that the average packet size remains to be 1000 bits. Figure S-9b shows that the delay performance for the mixed-sized packets is significantly worse than that of the fixed-size case. If we look at the delay distribution of these two cases in Figure S-9a, we can clearly see the reason for this performance degradation. In the fixed-size case, there is a high concentration of delays within one packet's time, meaning a large portion of the packets need only to wait at most one packet's time before it gains channel access. The distribution then tappers off slowly beyond this point. For the mixed-size case, there is also a high density of delays within the 1/4 packet time (due to the deference to the 80% of (the short packets); but the majority of the remaining packet delays are evenly spread within 4 packet-time range (caused by deferring to the 20% of the large packets). As a result, the mixed-size case has a significantly larger mean and 95 percentile point as indicated in Figure 5.9a. 5.5 Ease of Implementation of the SDAM protocol It is not the intention of this study to discuss the implementation details of the SDAM protocol. Rather, we are interested in examining the general requirements of the SDAM 88 3000000 000009000 .00 00003000000 .3000 .000 9900.0 0.0 na . . . hdHOQ I) W Ir llll 3300.000 000mnvoxfi= mo 0000000003000 0.0.009 .men madman 0.0 0.0 n .0 m .0 0.0 mub - p . p 0 b . h . H psmcwsoflfi. \ xx .. 0 I 0 1 +0 I 0 \ 3900.000 03.00083: N 00 \ 03.0: z-l J a I a l a 1 "' La L 1 l v r i I I n ---__‘r 41\0, 000. .0/\_0 v______,/ IDLE PERIOD OR SCHEDULING PERIOD TRANSMISSION TRANSMISSION PERIOD FOR IEBHI)FORIKWE NWHCWTHiINDEXrl WITH INDEX nj 1 Figure 6-1. Channel scheduling for the BRAM protocol 95 to hold the channel for more than one consecutive transmission, hence it is used to define the fair BRAM protocol. For the prioritized BRAM, the following H function is used: H'(ni,nj) = [(ni-nj+N) mod NJ-a (6.2) which gives access priority to the node that just transmitted. Analysis of BRAM shows that for small values of N-a product, BRAM provides fair allocation of the channel and overall better throughput-delay and throughput-traffic load performances as compared to other published protocols [Chl79a]. However, as the N a product increases, the length of the scheduling period increases as well, resulting in degradation of performance. I In view of this shortcoming, the parametric BRAM partitions the N nodes into M groups, letting the nodes within each group share a common "group" slot. The scheduling functions in (6.1) and (6.2) become r[(gi-gj'tM) mod MJ-a gi#gj G(gi,gj) --I (6.3) M'3 91:95] and G'(gi,gj) = [(gi-gj+M) mod Ml-a (6.4) 96 respectively, where 91 and gj are now group indices instead of node indices. With (6.3) or (6.4) collisions can occur between two or more nodes sharing the same group slot, and some type of retransmission scheme must be employed. As one may already have observed, smaller M values tend to reduce the probability of collision, while larger values of M tend to increase the length of scheduling periods but reduce the probability of intra-group collision. An optimal value of M, say M*, is therefore needed to balance these tendencies with respect to a given traffic load G, so as to yield the best throughput, S, or the lowest delay, D. It has also been shown that for this M*, the optimal partition of the N nodes, in the sense of reducing the probability of intra-group collisions to a minimum, is the one which 'divides the N nodes into groups of equal aggregated arrival rate, which is difficult to achieve in practice. The complications of the parametric BRAM lead one to wonder if there is an easier way to partition the nodes into groups and yet maintain conflict-free transmissions. A surprisingly straight-forward answer is that such groupings may have already existed in many local networks in the form of node physical locations. For example, we may have a global data bus that runs through several buildings, or from one floor to another. Then the terminal-nodes or device-nodes in a single room may be viewed as a "natural group" (cluster) of nodes on the bus. Typically, the int: tota span fur: each to will defi vari 6.2 00 loca leng Howe gfou the with $005 atte 97 infra-group transmission delay is much smaller than the total bus delay. This is especially true if the data bus spans several buildings. It would seem possible, then, to further sub-divide the group slot into mini-slots so that each node in the group can be allocated a unique mini-slot to attempt its transmission. In the following section we will show how this can actually be implemented, giving the definitions of the group-BRAM (GBRAM) protocol and its variants. 6.2 Basic Concept of GBRAM The GBRAM is basically a two-level BRAM. The N nodes on the network are divided into M groups by their physical locations. Each group is assigned a unique time slot of length a, just as each node is assigned a slot in BRAM. However, to resolve the contention within each group, the group slot is further divided into sub-slots of length a1, the intra-group delay, which is just a fraction of 3. Within each group we can then assign each node a unique subslot (or mini-slot) in which transmission can be attempted. 98 6.3 Network Configuration Beofe we describe the algorithms of the GBRAM protocol, we reiterate the basic assumptions or requirements about the network configurations where GBRAM will be applied. 1) 2) 3) 4) 5) There are N nodes connected to a common communication medium (e.g., coaxial cable or radio channel) with baseband signalling. These nodes are partitioned into M groups such that each group occupies only a fraction of the total bus length. Each node is assigned a unique index pair (gi,n1) as its identification, where 9 denotes the group index and n1 the node index within the group. Each node is connected to the bus through a communication interface unit (CIU) which functions as the buffer and decoupler. Each node can sense the bus status (i.e., carrier-sense) in a negligible time (or alternatively, we may include this time as part of the time slot or mini-slot). Each node is able to transmit and receive, but not simultaneously; and the "turnaround time" from receiving state to transmitting state (or vice versa) is t. W token" all nc token sequeI simil. is 51 secor the I grou ther in 8105 99 6.4 Algorithms of GBRAM We can envision the GBRAM protocol as having a "virtual token" circulating from one node to another, such that if all nodes in one group have been visited by the token, the token is passed from that group to the next group in sequence (see Figure 6-2). The channel periods of GBRAM are similar to those of BRAM, except that the scheduling period is slightly more complicated (see Figure 6-3). Note that a 23 time is needed for each group, where the first i is the actual group slot used to accommodate the subslots, and the second 3 is the worst-case time for the token to travel to the next group. Furthermore, we assume that the nodes in group 91 do not have any information on how many more nodes there are behind node nj (the node which transmitted last) in (group gj. Therefore they assume the safest action: they always allow group gj another full 23 time units to complete To group 1+2 From group i-2 Figpre 6-2. Virtual token passing in GBRAM its takes for for Pro rul 100 its group scheduling. The scheduling function therefore takes the form F[(gi,ni),(gj,nj)] = , 2a[(gi-gj+M)mod M]+ai(ni-l) gi#9j a1(ni-nj) gi=gj and ni>nj (6.5) L 2aM+ai(n1-1) ‘ 91:9,]. and niinj for the fair GBRAM, and F'[(gi,ni),(gj,nj )] = 0 2a[(gi-gj+M)mod M]+ai(ni-l) gi#gj I ai(ni-nj) 91=9j and niznj (6.6) L 2aM+a1(ni-l) gi=gj and n10. In general, as 5 increases from 0 to 1, the token passing time between two groups increases from a to 23. Thus, the token passing time R between two consecutive nodes (regardless of grouping) can be approximated as 108 (l+S)a/aO mini-slots with probility M/N R = (7.2) ak/aO mini-slots with probability (mk-l)/N, k=l,2,...,M. Later simulation studies indicate that this is a good approximation. From (7.2) we have r = E(R) M (1+S)(a/ao)M/N + k§l(ak/ao)(mk-l)/N M I%[(l+S)Ma/aO 4:12:31 (mk-l)ak/ao] (7.3) and 2 1 2 M 2 5 = Var(R) = F {M[(l+S)a/ao "r1 +k§1(“k-l)[ak/ao "1 } (7.4) The analysis of fair GBRAM and the two extreme GBRAM protocols are considerably more difficult. For the case where both N and a are small (say N510 and g<0.l), the M/D/l queuing equation or the prioritized GBRAM may be used to approximate these GBRAM variants (see [Chl79a] for example). For large N and a values, simulation results must be used. 7.2 grc nod dix eac bei wh an f: m min: 109 7.2 Worst Case Analysis In order to compare the performances of GBRAM and the simple BRAM, let us consider the Case where no physical groups exist among the nodes on the network; namely, all nodes are evenly spaced on the bus. So assuming we can divide the total length of the bus into M sectors, so that each sector captures a number of nodes, with the number being approximately N/M (i.e., [‘5 l or l‘%;l+1 nodes per M group). Hence we have ao=a/M, and (7.1) becomes: 2 . a8 1 S a S Nr 3”” = m*§:§*m<1'fi)(1*r.§ ”-5) where l 2 . . r = -fi[(l+S)M +(N-M)] mini-slots, (7.6) and 52= %{M[(l+S)M-r]2+(N-M)[l-r]2} (7.7) from (7.3) and (7.4), respectively. Since the intra-group delay in this case is ao=a/M, the number of nodes that can be placed in a group cannot exceed a O O O I O ;—+1=M+l in order to ensure collision-free transmiss1ons. 0 Therefore the total maximum number of nodes on the network is M(M+l). The optimal M, say M*, can then be chosen as the smallest M such that M(M+l):N. ma p0 ma: the of the nec Reg per min 110 7.3 Selection of the Optimal Number of Groups In the previous analysis, it was assumed that the time slot assigned to each group is of a fixed size a, the maximum bus propagation delay. Therefore, the selection policy for the optimal number of groups, M*, was to put as many nodes in a group as possible (i.e., M+1 nodes) in order to fully utilize the group slot, and at the same time reduce the number of groups. In practice, however, the selection of M depends heavily on the network configuration, i.e., how the nodes are spread on the bus. Furthermore, it is not necessary that the size of a group slot be restricted to g. Regarding to the latter observation, the following analysis pertains to the choice of the optimal M* value which minimizes the transmission delay on the channel. i Again, assume that the N nodes are evenly spaced on the bus, and are therefore evenly partitioned into M groups. The intra-group delay ao=a/M is then the mini-slot, and ao(N/M -l) is the group slot required to hold the (N/M) nodes of a group. as we have discussed in section 6.2, the intra-group token passing time varies between 3 and [a+ao(N/M -l)] according to the traffic load. Therefore, r becomes -l a. Ii- _ r - N {M[a0 +s(M 1)] + (N M)1} I le [M2+S(N-M) + (N-M)] mini-slots, (7.8) 111 and our goal is to find the M that minimizes - l S a S Nr = = __.+-_.__.+ -.. +.__ D E(D) 2 —2—M(1 N)(l 1-s (7.9) We note from the previous analysis that the first term in (7.9) contributes little to the delay function and can be ignored. The term S/2(l-S) is a constant relative to M. Therefore it is sufficient to minimize: S Nr (1 = 1- fi)(l+'f:§) a» 1.. %)(1+ ”2+figlxN‘M) ) (7.10) t]. with respect to M. After some routine manipulations, the optimal M, M*, is calculated as: M* = /(N+l)(S+l) (7.11) Equation (7.11) indicates that M* varies as the system load changes, that it differs from the optimal M selected from our earlier analysis (see Figure 7-1), and that the delay surface around the M* value is rather flat, as is shown in Figure 7-2. So, a minor deviation from M* will not greatly affect network's performance. In fact, over-estimation of M* may be a safe strategy. When the nodes are not evenly spaced on the network, the above analysis does not apply. Nevertheless it can be served as a guideline or a starting point for the selection of the optimal M. u: 34 112 Mi- 1 1 11111:! 1 4 ngrnnnl EN 10 50 100 500 1000 Figure 7-1. Optimal grouping for different channel loadings XQHOQ 113 mwcHASOHw gnozpoc mswno> madame madnoso .mum mammwm 8 z \2 an o S om be? mofi‘ on \. z \ o . \ o . \ on 3 o on _ n.0um pa _ om o>Hdo z Hmeapmo _ _ S _ _ _ _ m _ _ . ’ - _ _ , _ , _ _ _ . CHAPTER 8 PERFORMANCE OF THE GBRAM PROTOCOL Basically, SDAM and GBRAM share many common characteristics, such as the virtual-token concept, the use of carrier-sensing capability for conflict-free transmissions, and the decentralized controls, etc.. As a result, many of the performance issues bear strong resemblances, such as the effect of turnaround time and the effect of different or variable packet sizes, etc.. Hence they will not be repeated in this chapter. In the following, we shall concentrate on the throughput-delay performance of GBRAM under various bus propagation delays. For convenience, we assume that the carrier-sensing time of each node is included as a part of the time-slot (or mini-slot) in which the node senses the channel and attempts to transmit its packet. 114 8.1 The the ex‘ an. ex ch in at p: SC I‘ 115 8.1 The Throughput-Delay Performance of GBRAM To verify the analysis in the previous chapter and to evaluate the performances of the GBRAM variants, simulation models using GPSS language have been developed and simulation runs were conducted with the following parameters: N = 50 nodes (evenly spaced), M = 7 groups, and g = 0.01, 0.1, 0.5, and 1.0. The simulation results are plotted in Figure 8-1 along with the analytic results obtained from equation (7.5). The extreme-prioritized GBRAM performs the best, while the fair and the extrem-fair GBRAM perform the worst. This is to be expected, since the former uses the least amount of changeover time while the latter do the opposite. However, in small to medium values of 3 (550.1), their performances are close to each other. It suggests that, while the prioritized scheme gives better performance than do the fair schemes, the fair GBRAM guarantees fairness to all nodes while offering competitive performance, and therefore deserves some special consideration. As a value increases, the trade-off between fairness and delay performance becomes more apparent, and measures for tuning the network configuration must be considered. 116 Delay 0 A / ' N: O .l‘ 1 5 / / / / I( + +/ I H +/° é / I‘ 30 .. // / / H I . ° 1. / 1 20 w +/ g/o / /° 8/' / K + /‘J ./ / a=1.0/° ’2 /o ’3 + 10 1 t/fi / / / 9 _ er ._o ,5 8 ll/ ///t//e( é 7+ /3/ /[1 6 *-/° / ‘ a=0.5 1g '+ 5 -/3/ g 4 ‘ ——:M/D/1with perfect scheduling 3 - —-_:Analytic prioritized GBRAM [1 :Simulated prioritized GBRAM 2 0 :Simulated fair GBRAM :Simulated extreme prioritized GBRAM 4' :Simulated extreme fair GBRAM 1 I 1 1 1 I = 0.1 0.3 0.5 0,7 0.9 Throughput S Figure 8-1. Throughput-delay performance of GBRAM CUI’V For E(D: 8.2 bus bus nod 9:0 6:13 hav 117 For varying N and a values, GBRAM form a family of curves with a common asymptote at S=l.0 (see Figure 8-2). For small values of g (g=0.01) GBRAM can easily support 1,000 nodes with low delays (for ’example, at S-->0, E(D)=l.314 as compared to 1.0 of M/D/l perfect scheduling, and 6.005 of BRAM and MSAP). As 3 increases, the performance of the network degrades, but GBRAM still shows a significant improvement over BRAM (for N=200 and S-->0, at g=0.l, E(D)=2.388 for GBRAM and 11.05 for BRAM; at §=l.0, E(D)=l4.884 for GBRAM, and 101.50 for BRAM). 8.2 Ease of Implementation and Network Reliability of GBRAM Whereas the SDAM protocol is restricted to a branching bus topology, the GBRAM protocol can be implemented in both bus networks and radio-channel networks. Furthermore, the nodes in a group need not be sequenced in a fixed order (e.g., from left to right as in the SDAM protocol); and the groups of nodes can be placed on the network in any arbitrary order. This allows the network configuration to have much more flexibility and the nodes more mobility. The scheduling algorithm described in the preceeding chapter is simple enough to be implemented in a simple interface unit: only carrier-sensing and some basic arithmatic operations are required to carry out the algorithm. There is no need to have any end-nodes to a=l.0 r1 N= 200 0 ll 16 N= 50 N= 10 N=100 N= 200\ N: 50\ N= 10”’ a=0.0l r-‘N-n Figure 8-2. 118 // // / ,, /’ " /’ // M/D/l ” 1’ perfect scheduling / / .r 1 L 1 1 1 1 1 J 44,; 0.1 0.3 0.5 0.7 0.9 Throughput S Delay performance of prioritized GBRAM 119 generate the token, although a set of monitor nodes is required for the network's initial setup and token recovery. This set of monitor nodes are assigned different priorities. If for some reason the token is lost in the network, then the node with the highest priority will generate a new token after a time-out period. Should this node fail, then the monitor node with the second highest priority will attempt to recover the token after another time-out, and so on. Hence the network reliability can be easily maintained. (‘1' CHAPTER 9 COMPARISON OF PERFORMANCES In this chapter, we shall compare our SDAM algorithm with two other similar schemes: the Al scheme proposed by Eswaran et. al. [Esw79,Ham80], and the BID system proposed by Ulug et. a1. [Ulu81]. These two schemes also attempt to minimize the network control's changeover time in a decentralized environment and still provide collision-free transmissions. Both their similarities and dissimilarities, as well as their performance characteristics, will be presented. The performance of SDAM and GBRAM will also be compared with other popular protocols. Specifically, we will select two protocols: CSMA/CD [Tob79] and BRAM [Chl79a] (and MSAP[Kle77a]) for this comparison study for the following reasons: 1) both protocols have decentralized controls and easy 120 pc 8! de 121 implementations; 2) both protocols are well-known and well-analyzed in the literature; and both give very good performance under various conditions; 3) both protocols have been used for comparing the performance of other protocols in their respective categories (i.e., random access techniques and token-passing techniques). Therefore they can be used as the yardsticks for comparing SDAM and GBRAM with other protocols not discussed here. The M/D/l optimal scheduling, which defines the best possible performance for a single-server system with Poisson arrivals and constant service times, will also be used to determine the absolute performance of the SDAM and the GBRAM protocols. 9.1 Comparison of SDAM and the Al Scheme In the Al scheme, the network control is distributed. But it requires a separate logic control wire to propagate an one-way logic signal from one end of the bus to the other. The set of N nodes (or ports) are numbered sequentially from left to right. Associated with each port J is a flip-flop S(J), called the "send" flip-flop. This flip-flop is connected to the control wire to its right, as 122 shown in Figure 9-1. The signal P(J) tapped at the control wire to the left, on the other hand, is the inclusive OR of the send flip-flops of all ports to the left of port J. If we denote by T the end-to-end bus propagation delay (plus a small fixed quantity), gig; the busy/idle status of the bus as seen by port J, and 31g) the propagation delay along the control wire from port J to the right-most port, then the access control algorithm of A1 can be stated as follows: 1. Set S(J) to 1 when there is a packet to be sent. 2. Wait for a time interval R(J)+T. 3. Wait until B(J)=0 and P(J)=0; then begin transmission of the packets, simultaneously resetting S(J) to 0. BUS f Control wire > Control + / wire I PORT J E(J) P(J) S(J) Figure 9-1. Port interface logic of the A1 scheme 123 The analysis in [Ham80] shows that the Al scheme does indeed provide conflict-free channel accesses among the users, and is highly efficient when there are consecutive transmissions from different nodes. In extremely light loads, the control overhead for transmitting a packet at any port J is just R(J)+T, which is a significant improvement over those conventional decentralized demand-assignment schemes. However, a node on the right part of the bus may be blocked indefinitely from transmission if the nodes to its left alternately have packets to send [Ham80]. Compared with the SDAM protocol, the' Al scheme is similar to the OE-SDAM, where the token is passed single-directionally from one end of the bus to the other. But unlike the Al scheme, SDAM does not require a separate control wire, hence the propagation delay R(J) on the control wire can be eliminated. More importantly, OE-SDAM provides fair channel-access to each of the nodes; no user will be blocked from transmission indefinitely. The performance analysis of the Al scheme in [Ham80] did not take into account protocol overheads such as node's turnaround time and carrier-sensing time. No explicit throughput-delay relationships were available for a general local network, although a three-node network was used as a case study for the unfairness of the queuing delays mentioned earlier. A summary of the comparison between SDAM and the Al scheme is listed in Figure 9-3. La CO 58 ma BI 124 9.2 Comparison of SDAM and the BID System The BID system is developed by Ulug et. al. at the GE Labs [Ulu81]. In this scheme, the nodes are connected to a common bus via bus interface units (BIUs), and are numbered sequentially from one end of the bus to the other. An "implicit" token is passed back and forth (called right-sweep or left-sweep) between the end nodes of the bus. This implicit token is actually the absence of packets within a certain time interval following a passed-by packet (see Figure 9-2). These setups, along with BID's algorithm, are very similar to the C-SDAM protocol. However, several major differences exist between SDAM and the BID system: (1) BID uses data collision to maintain several levels of Implicit token Token carrier with a token Right Sweep PACKET C) C) BIU \ _ .. BIU (NT NS 1) #N _ #N T Token wait time S (BIU wishing to transmit) (Source BIU) Figure 9-2. Implicit token of the BID system pri 8182 Sir '1 ..J. Si: al at t1 t1 VI 125 priority among the packets; a higher-level packet can force a collision with an on-going lower-level packet, thus "rob away" the latter's channel access. (2) BID works only on a single bus (although this bus may be shaped in star-like or ring-like); and (3) BID does not 'make provisions for a single-directional token passing as does the OB-SDAM, which allows complete fairness among users on the bus. The performance analysis of BID in [UluBl] also make use of Konheim and Meister's polling formula (see equation (4.9) in Chapter 4). But they fail to observe that the polling sequence are different, and that the queuing delays are uneven for different users on the bus. Furthermore, they do not distinguish between the decoding time (or turnaround time, which does not cumulate during token passing) and the carrier-sensing/signal rising time, which will cumulate from node to node along the token-passing route. Consequently, a small fraction of time is wasted at each of the nodes. This could have a significant effect on network's performance if the user population is large (as have been pointed out in section 6.3, Chapter 6). A summary of the comparison between SDAM and the BID system can also be found in Figure 9-3. 126 SDAM A1 BID Control Strategy Topology Data Collision Special Requirements Token or Control Passing direction Overheads Considered Performance (Efficiency) High loads Low loads Fairness of Access decentralized, virtual token branching or single bus no one or two end- nodes; carrier- sense; interface units either bi-directional or uni-directional bus propagation delay; token initialization packet (TIP) time; node's turnaround time; carrier— sensing time very high high fair to all nodes in OE-SDAM; unfair to middle nodes in C-SDAM decentralized, control wire single bus no control wire; "send" flip—flop; port interface logic generally uni-directional bus and control- wire propagation delay; others are ignored very high high unfair to right side nodes ; possibility of indefinite blocking decentralized, implicit token single bus collision between different priority packets two token- generators; carrier-sense; interface units bi-directional bus propagation delay and node's decoding time only very high high unfair to middle nodes Figure 9:}. Comparison of SDAM, A1, and BID 127 9.3 Comparison of Throughput-Delay Performances The throughput delay curve of various protocols with 50 users are compared in Figure 9-4. It shows that, for a small propagation delay (§=0.0l), all of CSMA/CD, GBRAM, and SDAM perform very closely to the M/D/l perfect scheduling, with CSMA/CD remains to have the lowest delay in light to medium loads. However, in high loads both SDAM's and GBRAM's performances exceed that of CSMA/CD due to their collision-free properties. As a increase (g=0.l), the performance of CSMA/CD degrades significantly [Tob79], while SDAM remains close to M/D/l, and GBRAM slightly behind SDAM (refer to Figure 9-5). Under such circumstances, even BRAM performs better than CSMA/CD in medium to high loads. When the propagation delay is extremely large (g=l.0), SDAM can still provide an acceptable delay performance. But the performance for CSMA/CD deteriorates to that of the slotted ALOHA [Met76] (see Figure 9-6). Under any circumstances, both SDAM and GBRAM out-perform BRAM by far. From Figures 9-4, 9-5, and 9-6, we see that the SDAM protocol is much less sensitive to the propagation delay than is the GBRAM protocol. However, one must bear in mind that the GBRAM protocol allows more flexibility in network connections (e.g., radio channel and mobile users). Consequently, the maximum propagation delay for a set of network nodes may be shorter for GBRAM than for SDAM, whose 128 Delay 1 50 d N = 50 a = 0.01 40 - 30 - CSMA/CD with ___.. optimal linear retransmission 20 . 10 ~ 9 . 8 l 7 . 6. 5 . 4 q 3 . GBRAM SDAM 2 . , M/D/l with perfect scheduling 1 1 1 1 1 ¢_ 0.1 0.3 0.5 0.7 0.9 Throughput S Figure 9-4. Comparison of delay performance at §=0.01 129 Delay 50 40 30 20 10 9 8 7 6 5 h 3 2 _ M/D/l with perfect scheduling l I 1 r ‘*= I l j I F l T 0.1 003 005 007 0'9 Throughput S Figure 9-5. Comparison of delay performance at §=0.l 130 Delay 2 - / M/D/l with / perfect scheduling / /' l l l l I I l I 1 y r —> 0.1 0.3 0.5 0.7 0.9 Throughput S Figure 9-6. Comparison of delay performance at 2:1.0 131 transmission paths are limited to cable bus connections. 9.4 Network Throughput and the Offered Traffic Load The offered traffic load g of the network is defined as the total avarage number of packets available for transmission in the network. For the contention schemes, this load 9 is the packet arrival rate plus the rate at which packets re-enter the transmission queues because of data collisions. For the token passing schemes, since there is no data collision, we can see this g as the average number of packets in the system waiting for token to arrive and to be sent through the channel. In either case, we have $56. In a sense, the relationship between S and g indicates how efficiently the access scheme is removing packets from the queues and transmitting them through the netwopk. The closer is G to S, the higher is the efficiency. This offered load g versus throughtput S is plotted in Figure 9-7. It shows that both SDAM and GBRAM are highly efficient throughout the entire spectrum of Q, and remain stable (i.e., throughput does not degrade due to their collision-free properties) for high values of g. 1.0 0.8 0.6 OJ; 0.2 0.0 O. 132 \ I \ \ 1* I I I r? G 01 0.1 1 10 100 1000 Figure 9-7. Offered load G versus throughput S 1| CHAPTER 10 SUMMARY, CONCLUSION, AND FUTURE RESEARCH DIRECTIONS 10.1 Summary and Conclusion In recent years, we have witnessed a tremendous growth in the field of local area computer networking. With the advancement of new technologies (e.g., VLSI), the decrease in hardware costs, and the potential applications'of local networks, it is only reasonable to expect a proliferation of local networks within the next decade. In this paper we outlined some classifications of the many networks and protocols that have been proposed or developed. The focus was then directed to the most popular multi-access/broadcast techniques implemented on bus networks. More specifically, we have been interested in bus networks with decentralized controls for their network 133 pe: se ne ve de lo 10 SE pr ac 8C m 134 performance and reliability. It was noted, however, that a serious trade-off exists between high-load efficiency and network control overhead: the random-access techniques are very efficient in light traffic, but not in high loads; the demand-assignment schemes, on the other hand, are very efficient for a small number of users under high traffic loads, but they introduce large control overheads in light loads. Additionally, both these types of protocols are sensitive to the network's propagation delay. Two new multi-access virtual-token protocols were then proposed to solve the above problems: the shortest-delay access method (SDAM) and the group broadcast recognizing access method (GBRAM). The former minimizes the changeover time between two consecutive transmissionS' from different nodes; and the latter groups users into clusters, and utilizes a two-level scheduling function Ato reduce the control overhead. Both these protocols are decentralized and conflict-free. . The analysis in this thesis shows that SDAM and GBRAM perform closely to the M/D/l perfect scheduling in a normal operating environment (e.g., a few hundred nodes within one mile's vicinity). The effects of several protocol overheads such as the node's turnaround time and carrier-sensing time are also assessed. The results indicate that SDAM and GBRAM are relatively insensitive to the number of users and the bus propagation delay. The non-exhaustive transmission 135 option of these protocols also guarantees a response time upper-bound for each node. Finally, due to the simplicity of their algorithms, SDAM and GBRAM are robust and easy to implement. In summary, the SDAM and the GBRAM protocols do more than just combining the advantages of the token-passing schemes and the random-access techniques. Their high-efficiency, low-overhead, and conflict-free properties make them particularly suited for real-time applications and mixed voice/data traffics, either in a bursty mode or in a regular pattern of data flow. The tolerance for large user-population and large propagation delay (especially of the SDAM protocol) should also facilitate the expansion of the current local network scope into a wider range, no longer limited to just a few kilometers in distance. The GBRAM protocol can also be implemented into a radio network, which allows the users a higher mobility. 10.2 Some Topics for Future Research So far we have examined two newly proposed virtual-token passing protocols on bus networks. The analysis presented in this paper have helped us understand the characteristics and potentials of these protocols. However, there are many more performance and implementation issues that are worth looking into. For example: 136 --we have been assuming Poisson arrivals of the packets for the simplicity of our analysis. In practice the arrival pattern need not be Poisson; and different traffic patterns (e.g., voice packets) could significantly affect network's performance. How well do SDAM and GBRAM handle different traffic patterns other than Poisson arrivals? --we have seen a limited analysis of network performance under mixed-size packets. What is the effect of the variable-size packets to network's performance in general? --pertaining to the above two issues, how do we collect and characterize the workloads imposed on a local network? --both SDAM and GBRAM do not make provisions for handling multi-priority messages. The BID system described in Chapter 9 uses forced collisions to maintain several levels of priority. But we feel this collison policy could lead to an unnecessary waste of bandwidth and a degradation of overall delay performance. Is it possible to device a ”smart" scheduling algorithm or a dynamic non-exhaustive transmission bound so as to effect a more efficient priority scheme? --the user nodes under both protocols are numbered according to their physical locations. Is there a 137 good algorithm for associating a set of logical addresses to the node number, so that this node number is transparant to the user and to the inter-network messages, and that these logical addresses can be used in multi-cast references? --both SDAM and GBRAM employ baseband signalling on a single common channel. Is it possible to implement these protocols onto a broadband network for a more efficient utilization and sharing of the bandwidth? How about on a fiber-optics network? --we have assumed the existence of a set of network (or bus) interface units, which function as network decouplers and buffers for the user nodes. What kind of buffer management is required, and how large a buffer is needed for these interface units? --what are the other elements that are needed for the actual implementation of either SDAM or GBRAM into an operational network? The above list is just a few of the many topics which remain to be investigated. The answers to these questions will help us determine the feasibility of the protocols we just proposed, and ultimately become the building blocks for a future prototype network. B I BLI OGRAPHY [Abr70] [Abr73] [Abr77] [Acr76] [Agr77] [Agr78] [Ais75] [Alm79] [Alt78] [And72] BI BLI OGRAPHY N. Abramson, "The Aloha System -- Another Alternative for Computer Communications," Fall Joint Computer Conference, NCC 1970, pp. 695-702. N. Abramson, "The Aloha System," in N. Abramson and F.F. Kuo, eds., Computer Communication Networks, Prentice-Hall, 1973. N. Abramson, "The Throughput of Packet Broadcasting Channels," IEEE Trans. Comm., Vol. COM-25, No. 1, Jan. 1977, pp. 117-128. J. Acree and A. Lynch, "Ring Architecture Supports Distributed Processing," Data Communications, March/April 1976, pp. 51-55. A. Agrawala et. al., "Analysis of an Ethernet-like Protocol," Proceedings of the Computer Networking Symposium, NBS, Dec. 1977. A. Agrawala and R. Larsen, "Efficient Communccation for Local Computer Networks -- Coordinated Access Broadcast," U. of Maryland, Dept. of Computer Science, Technical Report TR-639, Feb. 1978. H. Aiso et. al., "A Minicomputer Complex -- KOCOS ('Keio-Oki' Complex System)," Proc. of-the 4th Data Communications Symposium, 1975. G.T. Alms and E.D. Lazowska, "The Behavior of Ethernet-like Computer Communications Networks," TR No. 79-05-01, Dept. of Comp.Sci., U. of Washington, Apr. 1979. J. Altaber, "Real-time Network for the Control of a Very Large Machine," Local Networking, NBS Special Publication 500-31, April 1978, pp. 5-6. R.R. Anderson, J.F. Hayes, and D.N. Sherman, "Simulated Performance of a Ring-Switched Data Network," Trans. Comm., Vol. COM-20, No. 3, June 72, pp. 576-591. 138 [And75a] [And75b] [And78] [Ara79a] [Ara79b] [Ash75] [Ba176] [Bas72] [Ber75] [Ber80] [Bib79] [Bil78] [Bin75a] 139 D.R. Anderson, "The EPIC-DPS: A Distributed Network Experiment," EASCON '75 Record, Sept. 1975, pp. lZlA-lZlG. G.A. Anderson and 8.D. Jensen, "Computer Interconnection Structures: Taxonomy, Characteristics, and Examples," ACM Computing Surveys, Vol. 7, No. 4, Dec. 1975. 8.W. Anderson and 8.8. Newhall, "A Microprocessor-Based Controller For A Loop Switching System," ICC'78, Vol. 2, pp. 24.4.1-6. 8. Aramis et. al., "ADCS : ARAMIS Distributed Computer System," 1979 Computer Networking Symp., pp. 139-151. 8. Aramis, J.F. Cabanel, R. Dssouli, R.D. Sazbon, "ORION: A New Distributed Loop Computer Network," 1979 Computer Networking Symp., pp. 164-168. R.L. Ashenhurst and R.H. Vonderohe, "A Hierarchical Network," DATAMATION, Feb. 1975, pp. 40-44. J.8. Ball et. al., "RIG, Rochester's Intelligent Gateway: System Overview," 1888 Transactions on Software Engineering, Vol. 58-2, No. 4, Dec. 1976, pp. 321-328. H.R. Baskin et. al., "PRIME - - A Modular Architecture for Terminal-Oriented Systems," AFIPS Conference Proceedings, Vol. 40, 1972 Spring Joint Computer Conference, May 1972, pp. 431-437. R.G. Berglund, "Understanding SDLC," Modern Data, Feb.-Sept. 1975. H.V. Bertine, "Physical Level Protocols," 1888 Trans. Comm., Vol. COM-28, No. 4, April 1980, pp. 433-444. K.J. Biba and J.W. Yeh, "FordNet: A Front-8nd Approach to Local Computer Networks,” Proc. LACN Symp., May 1979, pp. 199-214. R.W. Bilec, D.A. Lutzky, and J.J. Peterka, "Simulating a Local Computer Network," 3rd Conference on Local Computer Networking, U. of Minn., Oct. 1978. R. Binder, ‘"A Dynamic Packet-Switching System for Satellite Broadcast Channels," ICC'75, Vol. 3, [B [c [< [Bin75b] [Bli77] [Bor78] [Cai78] [Cap79] [Car77] [Car78] [Chr73] [Chl79a] [Chl79b] [Chl80] 140 pp. 41-1 - 5. R. Binder, N. Abramson, F. Kuo, A. Okinaka and D. Wax, "ALOHA Packet Broadcasting - A retrospect," AFIPS Conference Proceedings, Vol. 44, 1975 National Computer Conference, pp. 203-215. B.B. Bliss, W.A. Counterman, and 8.A. Mackey, "Proposal for a Ring Network 'IDANET'”, Proc. Conf. on A Second Look at Computer Networking, U. of Minn., Oct. 1977. F. Borgonovo and L. Fratta, "SRUC: A Technique for Pakcet Transmission on Multiple Access Channels,” Proc. Int'l Conf. Computer Communications, Kyoto, Japan, 1978. G.D. Cain and R.C.S. Monling, "MININBT: A Local Network for Real-time Instrumentation and Control," Proc. 3rd Conf. on Local Computer Networking, U. of Minn., Oct. 1978. J.I. Capetanakis, "Tree Algorithms for Packet Broadcast Channels," 1888 Trans. Inform. Theory, Vol. IT-25, Sept. 1979, pp. 505-515. R.J. Carpenter and R. Rosenthal, "A Local Network for the National Bureau of Standards," In Local Area Networking, Report of a Workshop held at the National Bureau of Standards, 'Aug. 1977, NBS Special Publication 500-31. R.F. Carpenter, J. Sokol, Jr. and R. Rosenthal, "A Microprocessor-based Local Netwroh Node," COMPCON 78 Fall, Sept. 1978, pp. 104-109. R.D. Christman, "Development of the LASL Computer Network," COMPCON 73 Digest, Feb. 1973, pp. 239-242. I. Chlamtac, W.R. Franta, and K.D. Levin, "BRAM: The Broadcast Recognizing Access Method," 1888 Trans. on Communication, Vol. COM-27, No. 8, Aug. 1979. PP. 1183-1190. I. Chlamtac, W.R. Franta, P.C. Patton, and W. Wells, "Performance Issues in Local Computer Networks," Technical Report 79-16, Computer Science Department, U. of Minnesota, Minneapolis. 1. Chlamtac, "Issues in Design and Measurement of Local Area Networks," Proc. CMG-XI International [Chr77] [Cla78] [Cof72] [Cof73] [Con76] [COt77] [Cot80] [Cov77] [Cro73] [Cro75] [Cyp78] [DeM76] 141 Conference on Computer Performance Evaluation, Dec. 1980, pp. 32-34. G. Christensen, "Data Truck Contention in the HYPERchannel Network," Proc. A Second Look at Computer Networking, U. of Minn., Oct. 1977,. D.D. Clark, K.T. Pogran, and D.P. Reed, "An Introduction to Local Area Networks," Proceedings of the 1888, Vol. 66, No. 11, Nov. 1978, pp. 1497-1517. 8.6. Coffman, Jr., L.A. Klimko, and B. Ryan, "Analysis of Scanning Policies for Reducing Disk Seek Times," SIAM J. Comput., Vol. 1, No. 3, Sept. 1972. 8.6. Coffman, Jr. and P.J. Denning, ”Operating Systems Theory," Prentice-Hall, Englewood Cliffs, N.J., 1973, Chapter 5. H. Connell, "A Multi-Minicomputer Network for Optical Moving Target Indication," COMPCON, fall 1976. I.W. Cotton and H.C. Folts, "International Standards for Data Communications: A Status Report," Proceedings of the Fifth Data Communications Symposium, Sept. 1977. I.W. Cotton, "Technologies for Loacl Area Computer Networks," Computer Networks 4, North-Holland Publishing Company, 1980, pp. 197-208. G.J. Coviello, O.L. Lake and G.R. Redinbo, "SYSTEM DESIGN IMPLICATIONS OF PACKETIZED VOICE," ICC 1977, Vol. 3, pp. 38.3-49 to 53. W. Crowther et. al., "A System for Broadcast Communication: Reservation Aloha," Proc. of the 6th Hawaii International Conference on System Science, Jan. 1973. W.R. Crowther et. al., "Issues in Packet Switching Network Design," AFIPS NCC 75, Vol. 44, pp. 161-175. R.J. Cypser, Communications Architecture for Distributed Systems, Addison-Wesley, 1978. V.A. DeMarines and L.W. Hill, "The Cable Bus in Data Communications," DATAMATION, Vol. 22, No. 8, [Den67] [DECBO] [Don74] [Don78a] [Don78b] [Eag79] [8is71] [Eis72] [Esw79] [Far69] [Far72a] [Far72b] 142 Aug. 1975. pp. 89-92. P.J. Denning, "Effects of Scheduling on File Memory Operations," AFIPS 1967 Spring Joint Computer Conference, pp. 9-21. DEC, Intel, and Xerox Corp., "The Ethernet: A Local Area Network, Data Link Layer and Physical Layer Specifications," Version 1.0, Sept. 1980. R.A. Donnan and J.R. Kersey, "Synchronous Data Link Control: A Perspective," IBM Sys. J., 13:2, 1974. J.8. Donnelley and J.W. Yeh, ”Interaction Between Protocol Levels in a Prioritized CSMA Broadcast Network," 3rd Conf. on Local Networking, U. of Minn., Oct. 1978. J.8. Donnelley and J.W. Yeh, "Simulation Studies of Round Robin Contention in a Prioritized CSMA Broadcast Network,“ 3rd Conf. on Local Networking, U. of Minn., Oct. 1978. B.M. Eaglestone, "A Campus Network Based on ICL 2900 Series Protocol," Software--Practice and Experience, Vol. 9, 1979, pp. 959-967. M. Eisenberg, ”Two Queues with Changeover Times," Oper. Research 19, 1971, pp. 386-401. M. Eisenberg, "Queues with Periodic Service and Changeover Time," Oper. Research 20, 1972, pp. 440-451. K.P. Eswaran, V.G. Hamacher, and 6.5. Shedler, "Asynchronous Collision-free Distributed Control for Local Bus Networks," IBM Research Report RJ2482, San Jose, Calif., 1979. W.D. Farmer and 8.8. Newhall, "An Experimental Distributed Switching System to Handle Bursty Computer Traffic,” Proceedings ACM Symposium on Problems in the Optimization of Data Communications Systems (Pine Mountain, 63.), Oct. 1969, pp. 31-34. D.J. Farber, "Netowrks: An Introduction," DATAMATION, April 1972, pp. 36-39. D.J. Farber and H.C. Larson, "The System Architecture of the Distributed Computing Systems - The Communications System," Proceedings of the Symposium on Computer-Communications and [Far73] [Far75] [Fer75] [Fer77a] [Fer77b] [F1e73] [Fle75] [F0179] [F0180] [For75] [For77a] [For77b] 143 Teletraffic, New York: Polytechnic Press, 1972, pp. 21-27. D.J. Farber et. al., "The Distributed Computing Systems," COMPCON 73, Feb. 1973, pp. 31-34. D.J. Farber, "A Ring Network," DATAMATION, Feb. 1975, pp. 44-46. M.J. Ferguson, "On the Control, Stability, and Waiting Time in a Slotted ALOHA Randon-Access System," 1888 Trans. Comm., Vol. COM-23, No. 11, Nov. 1975. M.J. Ferguson, "A Bound and Approximation of Delay Distribution for Fixed-Length Packets in an Unslotted ALOHA Channel and a Comparison with Time Division Multiplexing (TDM),” IEEE Trans. Comm., Vol. COM-25, No. 1, Jan. 1977, pp. 136-139. M.J. Ferguson, "An Approximate Analysis of Delay for Fixed and VAriable Length Packets in an Unslotted ALOHA Channel," 1888 Trans. Comm., Vol. COM-25, No. 7, July 1977, pp. 644-654. J.G. Fletcher, "The Octopus Computer Network," DATAMATION, April 1973, pp. 58-63. J.G. Fletcher, "Principles of Design in the OCTOPUS Computer Network," Proceedings ACM '75, Oct. 1975, pp. 325-328. H.C. Folts, "Status Report on New Standards for DTE/DCE Interface Protocols," COMPUTER, Sept. 1979, pp. 12-19. H.C. Folts, "X.25 Transaction-Oriented Features -- Datagram and Fast Select," 1888 Trans. Comm., Vol. COM-28, No. 4, April 1980, pp. 496-500. J.W. Forgie, "Speech Transmission in Packet-Switched Stored-and-forward Networks," AFIPS Conference Proceedings, 1975 NCC, 44, Anaheim, May 1975, pp. 137-142. J.W. Forgie and A.G. Nemeth, "An Efficient Packetized Voice/Data Network Using Statistical Flow Control," ICC 77, Vol. 3, pp. 38.2-44 to 48. P.J. Fortune, W.P. Lidinsky, and B.R. Zelle, ”Design and Implementation of a Local Computer Network," ICC 77, Vol. 3, pp.46.3-221 to 226. [Fra75a] [Fra78] [Fra79a] [Fra79b] [Fra80] [Fre78] [Fre79] [Fre80] [Fri77] [Ger78a] [Ger78b] [Gfe78] 144 S.C. Fralick and J.C. Garrett, "Technological Considerations for Packet Radio Networks," AFIPS-NCC75, pp. 233—243. 1m 1 [Fra75b] A.G. Fraser, "A Virtual Channel Network," DATAMATION, Feb. 1975, pp. 51-56. R. Frank and D. Tolmie, "The LASL Network Switch," Proc. 3rd Conf. on Local Computer Networks, U. of Minn., Oct. 1978. A.G. Fraser, "DATAKIT -- A Modular Network for Synchronous and Asynchronous Traffic," ICC '79 Conference Record, Vol. 2, June 1979, pp. 20.1.1-2o.1.3. A. Franck et. al., "Some Architectural and System Implications of Local Computer Networks, " COMPCON 79 Spring, Feb. 1979, pp. 272-276D. W.R. Franta and M.B. Bilodeau, "Analysis of a Prioritized CSMA Protocol Based on Staggered Delays," Acta Informatica 13, 1980, pp. 299-324. H.A. Freeman, "Performance Evaluation Trends," COMPCON 78 Fall, Sept. 1978, pp. 396-398. H.A. Freeman and R.J. Thurber, "Issues in Local Computer Networks," 1888 1979 International Communications, pp. 20.3.1-20.3.5 H.A. Freeman, "Tutorial Notes: Introduction to Local Computer Networks," 5th Conference on Local Computer Networks, Minneapolis, Oct. 6-7, 1980. I.T. Frisch, "Experiments on Random Access Packet Data Transmission on Coaxial Cable Video Transmission Systems," IEEE Trans. Comm., Vol. COM-25, No. 10, Oct. 1977, pp.1199-1203. M. Gerla and D. Mueller, "PACUIT: The Integrated Packet and Circuit Alternative to Packet Switching," IEEE 1978 COMPCON Spring, pp. 153-156. L.H. Gerhardstein et. al., "The Pacific Northwest Laboratory Minicomputer Network," Proc. Third Berkeley Workshop on Distributed Data Management and Computer Networks, Aug. 1978, pp. 144-158. F.R. Gfeller, H.R. Muller, and P. Vettiger, ”Infrared Communication for In-house Applications,” Proc. COMPCON Fa11'78, IEEE Computer Society, [Git77] [Gor80] [Gra72] [Gra75] [Gre77] [Gru74] [Haf74] [Ham80] [Han79] [Hay71] [Hay78] [Hea70] 145 Sept. 1978. I. Gitman et. al., "Issues in Integrated Network Design," ICC'77, Vol. 3, pp. 38.1-36 to 43. R.L. Gordon, W.W. Farr, and P. Levine, "Ringnet: A Packet Switched Local NetwOrk with Decentralized Control," Computer Networks 3 (1980), North-Holland, pp. 373-379. J.P. Gray, "Line Control Procedures," Proc. of the 1888, Vol. 60, No. 11, Nov. 1972. J.P. Gray and C.R. Blair, "IBN'S Systems Network Architecture," DATAMATION, April 1975, pp.51-56. M. Green, "A DoD Local Network: A Structured Implementation," Proc. A Second Look at Local Computer Networking, U. of Minn., Oct. 1977. D.S. Grubb and I.W. Cotton, "Criteria for the Performance Evaluation of Data Communications Services for Computer Networks," National Bureau of Standards, Technical Note 882, Dec. 1974. E.R. Hafner, z. Nenadal, and M. Tschanz, "A Digital Loop Communication System," 1888 Trans. Comm., June 1974, pp. 871-881. V.C. Hamacher and 6.5. Shedler, "Performance of a Collision-free Local Bus Network Having Asynchronous Distributed Control," Computer Architecture 1980, Vol. 8, No. 3, pp. 80-87. L.W. Hansen and M.S. Schwartz, "An Assigned-Slot Listen-Before-Transmission Protocol for a Multiaccess Data Channel," 1888 Trans. Comm., Vol. COM-27, No. 6, June 1979, pp. 846-856. J.F. Hayes and D.N. Sherman, "Traffic and Delay in a Circular Data Network," Second Symposium on Problems in the Optimization of Data Commnnications Systems, Oct. 1971, pp. 102-107. J.F. Hayes, "An Adaptive Technique for Local Distribution," IEEE Trans. on Communication, Vol. COM-26, Aug. 1978. F.E. Heart et. al., "The interface message processor for the ARPA computer network," AFIPS Spring Joint Computer Conf., 1970, pp. 551-567. [Hin77] [H0p78] [Hsi80] [Hue77] [18881] [IFI78] [Inn75] [Jac69] [Jac77] [Jen75] [Jen78] [Kah75] [Kah78] 146 O.R. Hinton et. al., "Distributed Industrial Control Using a Network of Microcomputers," COMPCON 77 Fall, Sept. 1977, pp. 316-319. A. Hopper, "Data Ring at Computer Laboratory, University of Cambridge," Local Area Networking, NBS Special Publication 500-31, April 1978, pp. 11-17. P. Hsi and T. Lissack, "Local networks' consensus: High speed," Data Communications, Dec. 1980, pp. 56-66. W. Huen et. al., "A Network Computer for Distributed Processing," COMPCON 77 Fall, Sept. 1977, pp. 326-330. "Token Structure -- An Architecture," Token Working Group, 1888 Project 802, DLMAC Subcommittee, draft revision 10, July 10, 1981. "A LOCAL COMPUTER NETWORK BIBLIOGRAPHY,” IFIP WG 6.4 Repository, The IFIP working group (WG 6.4) on local computer netwrks, 1978. D.R. Innes and J.L. Althy, "An Intra University Network," Fourth Data Communications Symposium, Oct. 1975, pp. 1-8 to 1-13. P.E. Jackson and C.D. Stubbs, "A study of multiaccess computer communications," AFIPS Spring Joint Computer Conf., 1969, pp. 491-504. 1. Jacob et. al., "CPODA -- A Demand Assignment Protocol for SATNET," Proc. of the 5th Data Communications Symposium, Sept. 1977. 8.D. Jensen, "A Distributed Function Computer for Real-Time Control," Proc. of the 2nd Annual Symposium on Computer Architecture, Jan. 1975. 8.D. Jensen, "The Honeywell Experimental Distributed Processor - An Overview," Computer, Vol. 11, No. 1, January 1978, pp. 28-38. R.8. Kahn, "The Organization of Computer Resources into a Packet Radio Network," AFIPS Conf. Proc., Vol. 44, May 1975, pp. 177-185. Reprinted in IEEE Trans. on Communications, Vol. COM-25:1, Jan. 1977, pp. 169-178. R.8. Kahn et. al., "Advances in Packet Radio [Kai79] [Kim75] [Kle74] [Kle75a] [Kle75b] [K1e75c] [Kle76a] [K1e76b] [K1e77a] [Kle77b] [Kon74] 147 Technology," Proc. 1888, Vol. 66, Nov. 1978. R.Y. Kain, W.R. Franta, and G.D. Jelatis, "CHIMPNET: a Network Testbed," Computer Networks 3, North-Holland, pp. 447-457. S.R. Kimbleton and G.M. Schneider, "Computer Communication Networks: Approaches, Objectives, and Performance Considerations," ACM Computing Surveys, Vol. 7, No. 3, Sept. 1975, pp. 90-134. L. Kleinrock and W.E. Naylor, "On measured behavior of the ARPA network," AFIPS NCC 74, Vol. 43, pp. 767-780. L. Kleinrock and 8.5. Lam, "Packet Switching in a Multiaccess Broadcast Channel: Performance Evaluation," 1888 Trans. Comm., Vol. COM-23, No. 4, April 1975, pp. 410-423. L. Kleinrock and F. Tobagi, "Random access techniques for data transmission over packet-switched radio channels," AFIPS NCC 75, pp. 187-201. L. Kleinrock and F. Tobagi, "Packet Switching in Radio Channels: Part I -- Carrier° Sense Multiple-Access Modes and Their Throughput-Delay Characteristics," IEEE Trans. on Communications, Vol. COM-23, No. 12, Dec. 1975. L. Kleinrock, Queuing Systems, Vol. 1: Theory, and Vol. 11: Computer Applications, Wiley-Interscience, NY, 1976. . L. Kleinrock, "On Communications and Networks," 1888 Trans. on Computers, Vol. C-25, No. 12, Dec. 1976. L. Kleinrock and M. Scholl, "Packet Switching in Radio Channels: New Conflic-free Multiple Access Schemes for A Small Number of Data Users," Proc. ICC., June 1977, pp. 22.1—105 to 22.1-111. L. Kleinrock and Y. Yemini, "An Optimal Adaptive Scheme for Multiple Access Broadcast Communication," ICC Conf. Proc., Chicago, 11., June 1977. A.G. Konheim and B. Meister, "Waiting Lines and Times in A System with Polling," JACM, Vol. 21, no. 3, July 1974, pp. 470-490. [Kon76] [Kuh79] [Kun78] [Lam75] [Lam77] [Lam78] [Lam80] [Lee78] [Len77] [Li 81] [Li 82] [Lid76] 148 A.G. Konheim, "Chaining a Loop System," 1888 Trans. Comm., Vol. COM-24, No. 2, Feb. 1976, pp.203-210. R.C. Kuhns and M.C. Shoquist, "A Serial Data Bus System for Local Processing Networks," COMPCON 79 Spring Digest of Papers, Feb. 1979, pp. 266-271. R.C. Kunzelman, "OVERVIEW or THE ARPA PACKET RADIO EXPERIMENTAL NETWORK," IEEE 1978 COMPCON Spring, pp. 157-150. S.S. Lam and L. Kleinrock, "Packet Switching in a Multiaccess Broadcast Channel: Dynamic Control Procedures," 1888 Trans. Comm., Vol. COM-23, No. 9, Sept. 1975, pp.891-904. S. Lam, "Delay Analysis of Time-Division Multiple Access (TDMA) Channel," 1888 Trans. on Comm., Vol. COM-25, Dec. 1977. S.S. Lam, "A New Measure for Characterizing Data Traffic," 1888 Trans. Comm., Vol. COM-26, No. 1, Jan. 1978, pp. 137-140. S.S. Lam, "A Carrier Sense Multiple Access Protocol for Local Networks," Computer Networks 4 (1980), North-Holland, pp. 21-32. C.C. Lee and A.V. Pohm, "Interface Processor for High Speed Recirculating Data Netwrok," COMPCON 78 Fall, Sept. 1978, pp. 194-200. L. Lenzini and G. Sommi, "RPCNET, A NETWORK AMONG EDUCATION AND RESEARCH ORGANIZATIONS IN ITALY: CHARACTERISTICS AND STATUS," EUROCON'77, Vol. 2, pp. 3.1.3-1 to 12. ' L. Li and H.D. Hughes, "Definition and Analysis of a New Protocol," Proc. 6th Conference on Local Computer Networks, Oct. 1981, pp. 21-29. L. Li, H.D. Hughes, and L.H. Greenberg, "Performance Analysis of a Shortest-delay Protocol," Proc. 6th Berkeley Workshop on Distributed Data Management and Computer Networks, Pacific Grove, Calif., Feb. 16-19, 1982. W.P. Lidinsky, "The Argonne Intra-Laboratory Network," Proc. Berkeley Workshop on Distributed Data Management and Computer Networks, May 1976, pp. 263-275. [Lin78] [Liu78] [Liu81a] [Liu81b] [Lov79] [Luc78] [Man76] [Man77] [Mar78] [Mar81] [McQ72] [McQ78] 149 K. Lin, "Design of a Packet-Switched Micro-Subnetwork," COMPCON 78 Fall, Sept. 1978, pp. 184-193. M.T. Liu, "Distributed Loop Computer Networks," Advances in Computers, ‘Vol. 17, (M. Rubinoff and M.C. Yovits, eds.) Academic Press, New York, pp. 163-221, 1978. T.T. Liu, L. Li, and W.R. Franta, "The Analysis of a Conflict-free Protocol Based on Node Clusters," Proc. 6th Conference on Local Computer Networks, Oct. 1981, Minneapolis. T.T. Liu, L. Li, and W.R. Franta, "A Decentralized Conflict-free Protocol, GBRAM, for Large-scale Local Networks," Proc. Computer Networking Symp., Dec. 1981, pp. 39-54. R.A. Loveland, "PUTTING DECNET INTO PERSPECTIVE," DATAMATION, March 1979, pp. 109-114. E.C. Luczak, "Global Bus Computer Communications Techniques," Proceedings, Computer Networking Symposium, National Bureau of Standards, Dec. 1978, pp. 58-71. W.P. Mann et. al., "A Network-Oriented Multiprocessor Front-8nd Handling Many Hosts and Hundreds of Terminals," AFIPS Conference Proceedings, Vol. 45, 1976 NCC, pp. 533-540. E.G. Manning and R.W. Peebles, "A Homogeneous Network for Data Sharing - Communications," Computer Networks, Vol. 1, No. 4, May 1977, pp. 211-224. J.W. Mark, "Global Scheduling Approach to Conflict-free Multiaccess via a Data Bus," 1888 Trans. on Comm., Vol. COM-26, Sept. 1978. J. Martin, Computer Networks and Distributed Processing: Software, Techniques, and Architecture, Prentice-Hall, 1981. J.M. McQuillan and D.C. Walden, "The ARPA Network Design Decisions," Computer Networks, 1:5, Aug. 1972, pp. 243-289. J.M. McQuillan, Understanding the New Local Network Technologies, BBN Report 3927, Sept. 1978. [McQ79a] [McQ79b] [Meh79] [Mei77a] [Mei77b] [Met76] [Mil76] [Mil78] [Moc77] [Mow79] [NBS78] [Nel78] 150 J.C. McQuillan, "Local Network Architectures," Computer Design, May 1979, pp. 18-26. J.M. McQuillan, "Local Network Technology and the Lessons of History," Proc. LACN Symposium, May 1979. pp. 191-197. S.R. Mehra and J.C. Majithia, "A MODIFIED ETHERNET FOR MULTIPROCESSOR INTERCOMMUNICATIONS," 1979 Computer Networking Symposium, pp. 132-138. N. Meisner and D. Willard, "Dual-Mode Slotted TDMA Digital Bus," Proc. of the 5th Data Communications Conference, Sept. 1977. N.B. Meisner, D.G. Willard and G.T. Hopkins, "Time Division Digital Bus Techniques Implemented on Coaxial Cable," Proceedings of Computer Networking Symposium, NBS Dec. 1977, pp. 112-117. R.M. Metcalfe and D.R. Boggs, "ETHERNET: Distributed Packet Switching for Local Computer Networks," CACM, Vol. 19, No. 7, July 1976, pp. 395-404. D.L. Mills, "An Overview of the Distributed Computer Networks," AFIPS Conference Proceedings, Vol. 45, 1976 National Computer Conference, pp. 523-531. W. Miller, "INTERCONNECTING LOCAL NETWORKS," 3rd Conf. on Local Computer Networking, U. of Minn., Oct. 1978. P.V. Mockapetris, M.R. Lyle and D.J. Farber, "On the Design of Local Network Inerfaces," IFIP Congress, Aug. 1977, pp. 427-430. O.A. Mowafi and W.J. Kelly, ”INTEGRATED VOICE/DATA PACKET SWITCHING TECHNIQUES FOR FUTURE MILITARY NETWORKS," 1979 Computer Networking Symposium, pp. 216-223. "Local Area Networking," Report of a Workshop Held at the National Bureau of Standards, August 22-23, 1977. Ira W. Cotton, editor, U.S. Dept. of Commerce, National Bureau of Standards, April 1978. D.L. Nelson and R.L. Gordon, "Computer Cells - A Network Architecture for Data Flow Computing," COMPCON 78 FALL, Sept. 1978, pp. 296-301. [Par79] [Pau78] [Pie72] [Pog78] [Pop79] [Raw78] [Rea75] [Rea76] [Ric78] [Rob731 [Rob75] [Rod77] 151 R. PardO and M.T. Liu, "MULTI-DESTINATION PROTOCOLS FOR DISTRIBUTED SYSTEMS," 1979 Computer Networking Symposium, pp. 176-185. W.R. Paulsen, M. Maranhao, and D.8. Thomas, "The Analysis of the Performance of Multi-Processor Architectures for SENET," 1978 Computer Networking Symposium, pp. 88-94. J.R. Pierce, "How Far Can Data Loops Go?", 1888 Trans. on Communications, Vol. COM-20, No. 3, June 1972, pp. 527-530. K.T. Pogran, and D.P. Reed, "The MIT Laboratory for Computer Science Network," Local Area Networking, NBS Special Publication 500-31, April 1978, pp. 20-22. R. Popsescu-Zeletin, D. Baum and B. Butscher, "A LOCAL COMPUTER NETWORK IN A RESEARCH ENVIRONMENT: THE HMINET," 1979 Computer Networking Symposium, pp. 158-163. 8.6. Rawson and R.M. Metcalfe, "Fibernet: Multimode Optical Fibers for Local Computer Networks," IEEE Trans. on Communications, July 1978, pp. 983-990. C.C. Reames and M.T. Liu, "A Loop Network for Simultaneous Transmission of Variable-Length Messages," Second Annual Symposium on Computer Architecture, Jan. 1975, pp. 7-12. C.C. Reames and M.T. Liu, "Design and Simulation of the Distributed Loop Computer Network .(DLCN)," Third Annual Symposium on Computer Architecture, Jan. 1976, pp. 124-129. G. Ricart and A. Agrawala, "Dynamic Management of Packet Radio Slots," presented at 3rd Berkeley Workshop on Distributed Data Management and Computer Networks, Aug. 1978. L. Roberts, "Dynamic Allocation of Satellite Capacity Through Packet Reservation," AFIPS Conference Proceedings, Vol. 42, June 1973. L.G. Roberts, "ALOHA Packet System With and Without Slots and Capture," Comput. Comm. Review, Vol. 5, pp. 28-42, April 1975. J. Rodgers, "Computer Networking with a Data Bus," Proc. of the 16th Annual Technical Symposium on [R0573] [Rub77] [Rub79] [Ryb801 [Sak77] [Sca74] [Sch73] [Sch77] [Sha78] [She78] [Sch78] [Sho79] 152 Systems and Software, NBS, June 1977. S. Rosen and J.M. Steel, "A Local Computer Network," COMPCON 73 Digest, Feb. 1973, pp. 129-132. I. Rubbin, "A Group Random-Access Procedure for Multi-Access Communication Channels," NTC'77 Conf. Record, Los Angeles, Dec. 1977, pp. 12:5-1 to 7. I. Rubin, "Message Delays in FDMA and TDMA Communication Channels," IEEE Trans. on Comm., Vol. COM-27, No. 5, May 1979, pp. 769-777. A. Rybczynski, "X.25 Interface and End-to-End Virtual Circuit Service Characteristics," IEEE Trans. Comm., V01. COM-28, No. 4, April 1980, pp. 500-510. T. Sakai et. al., "Inhouse Computer Network KUIPNET," Information Processing 77, B. Gilchrist, Editor, North-Holland Publishing Co., 1977, pp. 161-166. R.A. Scantlebury and P.T. Wilinson, "THE NATIONAL PHYSICAL LABORATORY DATA COMMUNCIATION NETWORK," ICCC'74, No. 2, pp. 223-228. J.W. Schwartz and M. Muntner, "Multiple-Access Communications for Computer Networks," in N. Abramson and F. Kuo, eds., Computer Communication Networks, Prentice-Hall, 1973. J.W. Schwartz, "Computer-Communication Networks, Prentice-Hall, 1977. R.R. Shatzer, "Distributed Systems/1000," Hewlett-Packard Journal, March 1978, pp. 15-20. R.H. Sherman et. al., "Current Summary of Ford Activities in Local Networking," Local Area Networking, NBS Special Publication 500-13, April 1978, pp. 22-23. M. Scholl and L. Kleinrock, "On a Mixed Mode Multiple Access Schemes for Packet-Switched Radio Channels," IEEE Trans. Comm., Vol. COM-27, No. 6, June 1979, pp. 906-911. J.F. Shoch, "Design and Performance of Local Computer Networks," Ph.D Dissertation, Dept. of [ShoBOa] [Shoaob] [Spa79] [Spe77] [Spr7l] [Spr781 [Swa77] [Szu78] [Tho75] [Tho79] [Thu72] [Thu79a] [Thu79b1 153 Computer Science, Stanford University, 1979. J.F. Shoch and J.A. Hupp, "Performance of an Ethernet Local Network -- A Preliminary Report," COMPCON Spring 1980, pp. 318-322. J.F. Shoch and A.J. Hupp, "Measured Performance of an Ethernet Local Network," CACM, Vol. 23, No. 2, Dec. 1980, pp. 711-721. 0. Spaniol, "Modelling of Local Computer Networks," Computer Networks 3 (1979), North-Holland, pp. 315-326. Sperry Univac, "AN/USQ-76 Converter - Switching System, Signal Data," Sperry Univac Product Description Bulletin, June 1977. J.D. Spragins, "Analysis of Loop Transmission Systems," Second Symposium on Problems in the Optimization of Data Communications Systems, Oct. 1971, pp. 175-182. J.F. Springer, "The Distributed Data Network, Its Architecture and Operation," COMPCON 78 Fall, Sept. 1978, pp. 221-228. R.J. Swan et. al., "Cm* -- A modular, multi-microprocessor," AFIPS Conference Proceedings, Vol. 46, 1977 NCC,.pp. 637-644. E. Szurkowski, "A High Bandwidth Local Computer Network," COMPCON 78 Fall Sept. 1978, pp. 98-103. J.E. Thorton et. al., "A new Approach to Network Storage Management," Computer Design, Vol. 14, No. 11, Nov. 1975, pp. 81-85. J.E. Thornton, "OVERVIEW OF HYPERchannel," COMPCON'79 Spring, Feb. 1979, pp. 262-265. K. Thurber et. al., "A Systematic Approach to the Design of Digital Bussing Structures," Proc. of the AFIPS FJCC, 1972. K.J. Thurber and H.A. Freeman, "Local Computer Network Architectures," COMPCON 79 Spring, Feb. 1979, pp. 258-261. K.J. Thurber and H.A. Freeman, "A Bibliography of Local Computer Network Architectures," Computer Architecture News, Vol. 7, No. 5, Feb. 1979, [Thu79c] [Tob74] [Tob75] [Tob76] [Tob77]' [Tob781 [Tob79] [Tob80] [Tok77] [Tro80] 154 pp. 22-27 and Computer Communication Review, Vol. 9, No. 2, April 1979, pp. 1-6. K.J. Thruber -and H.A. Freeman, "Architecture Considerations for Local Computer Networks," Proc. lst Int'l Conf. on Distributed Computing Systems, Oct. 1979, pp. 131-142. F.A. Tobagi, "Random Access Techniques for Data Transmission over Packet Switched Radio Networks," Ph.D Dissertation, Computer Science Dept., U. of California, Los Angeles, Rep. UCLA-ENG 7499, Dec. 1974. F. Tobagi and L. Kleinrock, "Packet Switching in Radio Channels: Part II -- The Hidden Terminal Problem in Carrier Sense Multiple-Access and the Busy-Tone Solution," IEEE Trans. on Communications, Vol. COM-23, No. 12, Dec. 1975. F. Tobagi and L. Kleinrock, "Packet Switching in Radio Channels: Part III -- Polling and (Dynamic) Split-Channel Reservation Multiple Access," 1888 Trans. on Communications, Vol. COM-24, No. 12, Dec. 1976. - F.A. Tobagi and L. Kleinrock, "Packet Switching in Radio Chanels: Part IV -- Stability Considerations and Dynamic Control in Carrier Sense Multiple Access," 1888 Trans. Comm., ~Vol. COM-25, No. 10, Oct. 1977, pp.1103-1ll9. F.A. Tobagi and L. Kleinrock, "The Effect of Acknowledgment Traffic on the Capacity of Packet-Switched Radio Channels," IEEE Trans. Comm., Vol. COM-26, No. 6, June 1978, pp. 815-826. F.A. Tobagi and V.B. Hunt, "Performance Analysis of Carrier Sense Multiple Access with Collision Detection," Proc. LACN Symposium, May 1979, pp. 217-244. F.A. Tobagi, "Multiaccess Protocols in Packet Communication Systems," IEEE Trans. on Communications, Vol. COM-28, No. 4, April 1980, pp. 468-488. M. Tokoro and K. Tamaru, "Acknowledging Ethernet," COMPCON 77 Fall, Sept. 1977, pp. 320-325. C. Tropper, "Models of Local Computer Networks," Mitre Corp. Report ESD-TR-BO-lll. [Twe79] [Tym7l] [U1u81] [Wan78] [Wec76] [Wec79] [Wes72] [w1d76] [w1173] [wil74] [w1175] [Wit78] [Wol78] 155 J.W. Tweedy, "COMPARATIVE ANALYSIS OF DISTRIBUTED SYSTEM DESIGN," 1979 Computer Networking Symposium, pp. 117-131. L. Tymes, "TYMNET -- A Terminal-Oriented Communication Network," AFIPS Spring Joint Computer Conf., 38, 1971, pp. 211-216. M.8. Ulug, G.M. White and W.J. Adams, "Bidirectional Token Flow System," Proc. 7th Data Communication Symposium, Mexico City, Mexico, Oct. 1981, pp. 149-155. J.F. Wanner, "WIDEBAND COMMUNICATION SYSTEM IMPROVES RESPONSE TIME," Computer Design, Dec. 1978, pp. 85-92. s. Wecker, "DECNET: A BUILDING BLOCK APPROACH TO NETWORK DESIGN," NTC'76, pp. 7.5-1 - 4. S. Wecker, "Computer Network Architecture," COMPUTER, Sept. 1979, pp. 58-72. L.P. West, "Loop Transmission Control Structures," 1888 Trans. on Communications, Vol. COM-20, No. 2, June 1972, pp. 531-539. L. Widdoes, "The Minerva Multi-Microprocessor," Proc. of the 3rd Annual Symposium on Computer Architecture, 1976. ‘ D. Willard, "MITRIX: A Sophisticated Digital Cable Communications System," Proc. of the National Telecommunications Conference, Nov. 1973. . D.G. Willard, "A Time Division Multiple Access System for Digital Communication," Computer Design, June 1974. M.V. Wilkes, "Communication Using a Digital Ring," Proceedings of the Pacific Area Computer Communication Network System Symposium, Aug. 1975, pp. 47-56. L.D. Wittie, "MICRONET: A Reconfigurable Microcomputer Network for Distributed Systems Research," Simulation, Nov. 1978, pp. 145-153. Vol. 9, No. 2, April 1979, pp. 1-6. J.J. Wolf and M.T. Liu, "A Distributed Double-Loop Computer Network (DDLCN)," Proceedings of the Seventh Texas Conference on Computing Systems, [Woo79] [Wul75] [Yaj77] [Zim80] 156 Oct. 1978, pp. 6-19 to 6-34. L.D. Wood et. al., "A Cable-Bus Protocol Architecture," Proceedings DATACOM '79, Nov. 1979. W. Wulf and R. Levin, "A Local Network," DATAMATION, Feb. 1975, pp. 47-50. S. Yajima, et. al., "Labolink: An Optically Linked Laboratory Computer Network," Computer, Nov. 1977, pp. 52-59. H. Zimmermann, "OSI Reference Model -- The 150 Model of Architecture for Open Systems Interconnection," IEEE Trans. Comm., Vol. COM-28, No. 4, April 1980, pp.425-432. 22.7.3 _. ...-39...... etc..-n ... .. .......:..:.A u ». ti. :0... I(IIIIyIIIIIIIIIOII“II3IIII I I 8