Data Communication Systems and Their Performance -

Data Communication Systems and Their Performance (eBook)

Proceedings of the IFIP TC6 Fourth International Conference on Data Communication Systems and Their Performance, Barcelona, Spain, 20-22 June, 1990

R. Puigjaner, G. Pujolle (Herausgeber)

eBook Download: PDF
2014 | 1. Auflage
512 Seiten
Elsevier Science (Verlag)
978-1-4832-9841-2 (ISBN)
Systemvoraussetzungen
54,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
The research papers in this volume describe recent, original developments in techniques, tools and applications in the area of communication system performance. Involved in the project are researchers from the world's leading universities, research institutes and companies.

The research papers in this volume describe recent, original developments in techniques, tools and applications in the area of communication system performance. Involved in the project are researchers from the world's leading universities, research institutes and companies.

Front Cover 1
Data Communication Systems and Their Performance 4
Copyright Page 5
Table of Contents 8
PREFACE 6
CHAIRMAN 12
PROGRAM COMMITTEE 12
ORGANIZING COMMITTEE 12
LIST OF REFEREES 14
PART 1: INVITED PAPERS 16
Chapter 1. Performance Issues of the DQDB Protocol 18
Abstract 18
Keywords 18
1.- Introduction 19
2.- The Distributed Queue Dual Bus Network 20
3.- Performance study 24
4. Performance analysis and discussion 34
5.- Conclusions and futural work 35
REFERENCES 36
CHAPTER 2. APPLICATIONS OF SAMPLE PATH ANALYSIS TO COMMUNICATION NETWORK CONTROL 38
1. INTRODUCTION 38
2. SAMPLE PATH COMPARISON TECHNIQUES 40
3. APPLICATIONS TO ROUTING 43
4. APPLICATIONS TO REAL-TIME DATA COMMUNICATIONS 46
5. SUMMARY 49
REFERENCES 50
PART 2: POLLING SYSTEMS 52
CHAPTER 3. MEAN DELAY APPROXIMATIONS FOR POLLING SYSTEMS WITH BATCH POISSON INPUT 54
1. Introduction 54
2. System Model Description and Definitions 56
3. Average Message Delay Analysis 57
4. Numerical Results 63
5. Conclusions 64
Acknowledgments 65
References 65
Chapter 4. Asymptotic Optimality of the Go-Back-n Protocol In High Speed Data Newworks With Small Buffers 70
1. INTRODUCTION 70
2. BACKGROUND FACTS 74
3. MAIN RESULTS 76
4. NUMERICAL INVESTIGATIONS 80
5. DISCUSSION 81
ACKNOWLEDGEMENT 82
REFERENCES 82
Chapter 5. Performance Analysis of the FDDI Media Access Control Protocol 84
Abstract 84
Keywords 84
1 Introduction 84
2 Modelling 85
3 Analysis 86
4 Results 93
5 Conclusion 95
Acknowledgements 95
References 95
PART 3: ISDN SWITCH 98
CHAPTER 6. ANALYSIS OF A CHANNEL ACCESS CONTROL METHOD IN INTEGRATED NETWORKS 100
ABSTRACT 100
1 - INTRODUCTION 101
2 - THE ACCESS CONTROL STRATEGIES 101
3 - MODEL AND ANALYSIS OF THE ACCESS CONTROL STRATEGIES 103
4 - NUMERICAL RESULTS AND ANALYSIS 106
5 - CONCLUSION 106
APPENDIX 109
REFERENCES 111
Chapter 7. Bit-by-Bit Self-Routing Interconnected Network 112
Background 112
Chapter 8. Analysis of a Class of Buffer Storage Systems with Markov-Correlated Input and Bulk Service 124
ABSTRACT 124
Key Words 124
1.0 Introduction and Problem Statement 124
2.0 Model Description and Notation 126
3.0 Solution Method 129
4.0 Modeling Examples and Numerical Results 131
5.0 Conclusion 136
Bibliography 136
Appendix A 138
PART 4: MODELING OF SWITCHING TECHNIQUES 142
CHAPTER 9. HEAD OF THE LINE ARBITRATION OF PACKET SWITCHES WITH INPUT AND OUTPUT QUEUEING 144
I. INTRODUCTION 144
II. SYSTEM ANALYSIS 146
III. SATURATION ANALYSIS 151
IV. NUMERICAL RESULTS 153
V. CONCLUSIONS 154
APPENDIX: WAITING TIME ANALYSIS 155
ACKNOWLEDGMENT 156
REFERENCES 157
CHAPTER 10. Performance of a Generic Non-Blocking Packet Switch 158
Abstract 158
Key Words 158
I. Introduction 158
II. System Description and Modeling Approach 159
III. Model Analysis 162
IV. Numerical Results 165
V. Conclusion 170
Bibliography 171
Chapter 11. An Improved Time Slot Assignment Algorithm for TDM Hierarchical Switching Systems 172
1 Introduction 172
2 Network-flow Based TSA Algorithms 174
3 Improved TSA Algorithm 177
4 Concluding Remarks 184
References 185
PART 5: ATM SWITCHING 186
CHAPTER 12. TRAFFIC BURSTINESS INFLUENCE ON ATM SWITCHING BEHAVIOR 188
1. INTRODUCTION 188
2. BURSTINESS OF AN ATM CELL STREAM 190
3. TRAFFIC SOURCE MODEL 191
4. SIMULATION ENVIRONMENT 193
5. RESULTS 195
6. SUMMARY 199
REFERENCES 199
Chapter 13. Statistical Multiplexing in ATM Networks 202
Abstract 202
1 Introduction 202
2 Traffic Models 203
3 Bandwidth Assignment Problem 204
4 Bursty Traffic Analysis 204
5 Variable-Bit-Rate Traffic Analysis 209
6 Comparison of Bursty and Variable Bit Rate Traffic 210
7 Application: Admission Control 210
8 Conclusions 213
Appendix: Invariance of R with same K/L ratio 214
References 215
CHAPTER 14. A LIMITED SHARED OUTPUT BUFFER SWITCH FOR ATM 218
1. INTRODUCTION 218
2. THE SWITCH ARCHITECTURE 220
3. BROADCASTING AND PRIORITY CONTROL 223
4. BUFFER SIZE ESTIMATION 225
5. CONCLUSION 229
ACKNOWLEDGEMENTS 229
REFERENCES 229
PART 6: PERFORMANCE STUDIES 232
CHAPTER 15. DEVELOPMENT AND PERFORMANCE EVALUATION OF POINT TO MULTIPOINT COMMUNICATION CONTROL SCHEME VIA SATELLITE 234
1. Introduction 234
2. A Point to Multipoint Communication Control Scheme 235
3. Performance Evaluation Method of Cyclic Turn Response Control Scheme 238
4. Experimental Results and Evaluation 240
5. Analytical Evaluation of Response Control Schemes 243
6. Conclusion 247
Acknowledgement 247
References 247
Chapter 16. A Combined Performance Analysis of Error Control and Multiple Access for a Mobile Radio Channel 248
Abstract 248
1 Introduction 248
2 The transmission channel 249
3 The Demand Assignment Multiple Access Protocol 250
4 Data link control 251
5 Conditional block error probabilities 254
6 Analysis of Demand Assignment Multiple Access 254
7 Conclusions 260
References 261
Chapter 17. Waiting Time and Queue Length Distributions for Go-Back-N and Selective-Repeat ARQ Protocols 262
Abstract 262
1 Introduction 262
2 Model and Performance Measures 264
3 Derivation of S*(z) in GBN ARQ Protocol 265
4 Derivation of S*(z) in SR8 ARQ Protocol 266
5 Numerical Examples 268
6 Conclusion 269
Appendix. Discrete M[x]/G/1 Queue 269
References 273
CHAPTER 18. WORST-CASE PERFORMANCE OF PRIORITIZED ACCESS TO RESOURCES IN DATA COMMUNICATION NETWORKS 276
1. INTRODUCTION 276
2. MODEL OF THE QUEUE 279
3. WORST-CASE CHARACTERISTICS: SAFETY AND FAIRNESS 279
4. TRADEOFFS BETWEEN SAFETY AND FAIRNESS 284
5. NUMERICAL RESULTS AND CONCLUSIONS 285
LITERATURE 287
PART 7: ACCESS METHODS 290
CHAPTER 19. STATISTICAL MULTIPLEXING UNDER NON-I.I.D. PACKET ARRIVAL PROCESSES AND DIFFERENT PRIORITY POLICIES 292
1. INTRODUCTION 292
2. THE FIFO STATISTICAL MULTIPLEXER 294
3. STATISTICAL MULTIPLEXING WITH PRIORITIES 296
4. NUMERICAL RESULTS 300
5. CONCLUSIONS 303
REFERENCES 304
Chapter 20. Stochastic Analysis of a Slotted FIFO Communication Channel: Constant and Uniform Message Lengths 306
Abstract 306
1. Introduction 306
2. The General Model 308
3. Constant Message Sizes 311
4. Uniformly Distributed Message Sizes 313
5. Final Remarks 317
Acknowledgments 318
References 318
Chapter 21. Analysis of a Multiqueue Model for an ISDN Access Interface 320
Abstract 320
1. Introduction 320
2. Procedures for the D-channel Access Control in ISDN 321
3. Model Description 322
4. Approximation Analysis 323
5. Numerical Examples 330
6. Conclusion 331
Acknowledgments 331
References 332
Appendix 332
PART 8: NETWORK MANAGEMENT 334
Chapter 22. Optimization Method for Reconfiguration of High Speed Digital Networks under Transit Trunk Failure Conditions 336
1. INTRODUCTION 336
2. FORMULATION AS AN OPTIMIZATION PROBLEM FOR NETWORK RECONFIGURATION 338
3. PROPOSAL OF AN EFFICIENT APPROXIMATE ALGORITHM 342
4. NUMERICAL EXPERIMENTS FOR EVALUATION 346
5. APPLICATION TO AN ACTUAL NETWORK 347
6. CONCLUSION 348
ACKNOWLEDGEMENTS 349
REFERENCES 349
Chapter 23. NETMON-II a monitoring tool for distributed and multiprocessor systems 350
Abstract 350
1. Introduction 350
2. Design Issues 352
3. NETMON-II Architecture 
352 
4. Monitoring Unit 354
5. Central Control Facility 356
6. Evaluation Software 358
7. Applications 361
8. Conclusions 363
References 364
PART 9: WORKLOAD 366
Chapter 24. Consecutive Loss in Real-Time Packet Traffic 368
ABSTRACT 368
Keywords 368
1. Introduction 369
2. Modeling and Notation 370
3. Session Performance Measures 371
4. Computation of the Session Performance Measures 373
5. Example: Clipping Loss in an M/M/1/8 Queue 375
6. Conclusion 377
Acknowledgements 377
A. Appendix: The Workload Transition Kernel of the M/M/1/8 Queue 377
References 379
Chapter 25. Real Time Network Load Estimation in Packet Switched Networks 382
ABSTRACT 382
Key Words 382
1. Introduction 382
2. A Queueing Model with Time-Varying Parameters 383
3. Estimation Technique 385
4. Conclusion and Further Remarks 393
Acknowledgements 395
Bibliography 395
CHAPTER 26. ON THE SUPERPOSITION OF ARRIVAL PROCESSES FOR VOICE AND DATA 396
1. INTRODUCTION 396
2. THE SUPERPOSITION OF N C2 ARRIVAL PROCESSES 399
3. APPROXIMATING A SUPERPOSITION PROCESS BY A POISSON PROCESS 403
4. CONCLUSIONS 408
REFERENCES 409
PART 10: PROTOCOLS 410
CHAPTER 27. APPROXIMATE METHOD FOR PERFORMANCE EVALUATION OF MESSAGE EXCHANGE IN FIELD BUS FIP 412
Abstract 412
I. INTRODUCTION 412
II. MODELLING AND ANALYSIS 413
III. SIMULATION 418
IV. CONCLUSION 424
REFERENCES 425
Chapter 28. A New Scheme to Maintain Routes in Entry-to-Exit Routing Strategy 426
ABSTRACT 426
Key words 426
1 Introduction 426
2 Entry-to-Exit versus Hop-by-Hop and Their Problems 427
3 A New Scheme for Route Maintenance in Entry-to-exit Routing 429
4 Example 432
5 Evaluation 436
6 Conclusions and Suggestions for Future Research 436
References 437
Chapter 29. A Cryptographic Mechanism for Non-Iterative Algorithm Enforcing 440
0. Introduction 441
1. Program Certification 441
2. Program Execution with Controlled Instruction Flow 443
3. Run-Time Integrity 448
4. Applications and Conclusion 450
Acknowledgment 452
References 452
PART 11: TOOLS AND MEASUREMENTS 454
Chapter 30. Packet Switched Network Simulator Based on Modula—2 456
1 Introduction 456
2 Objectives 457
3 The Simulation Model 457
4 Simulation Parameters and Results 461
5 The Tool Structure 466
6 Application Examples 469
7 Current and Future Work 472
8 Conclusions 473
References 473
Chapter 31. Performance of Public Packet Switched Networks: Experience and Theory 474
Abstract 474
1.Introduction 475
2. Experiences with performance measurement of public packet switched networks 475
3. Standards concerning performance of data networks 483
4. Applicability of the standards to real measurements 486
5. Conclusion 487
References 487
CHAPTER 32. DISTRIBUTED MEASUREMENT SYSTEM FOR PROTOCOLS AND APPLICATIONS IN ISO 8802/3 LANS 490
1. INTRODUCTION 490
2. DISTRIBUTED MEASUREMENT SYSTEM 493
3. RESULTS AND FURTHER WORK 497
REFERENCES 498
CHAPTER 33. MACOM - A TOOL FOR THE MARKOVIAN ANALYSIS OF COMMUNICATION SYSTEMS 500
1. INTRODUCTION 500
2. THE STRUCTURE OF MACOM 501
3. THE MODEL WORLD 503
4. MODEL EVALUATION AND EXPERIMENT SPECIFICATION 506
5. THE TECHNIQUES OF MACOM 506
6. EXAMPLES 509
ACKNOWLEDGEMENTS 511
REFERENCES 512
AUTHORS INDEX 514

Erscheint lt. Verlag 23.5.2014
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Netzwerke
Technik Elektrotechnik / Energietechnik
Technik Maschinenbau
Technik Nachrichtentechnik
ISBN-10 1-4832-9841-8 / 1483298418
ISBN-13 978-1-4832-9841-2 / 9781483298412
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 48,2 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Martin Linten; Axel Schemberg; Kai Surendorf

eBook Download (2023)
Rheinwerk Computing (Verlag)
29,90
Das umfassende Handbuch

von Michael Kofler; Charly Kühnast; Christoph Scherbeck

eBook Download (2024)
Rheinwerk Computing (Verlag)
33,68
Grundlagen der IPv4- und IPv6-Kommunikation

von Anatol Badach; Erwin Hoffmann

eBook Download (2022)
Carl Hanser Verlag GmbH & Co. KG
69,99