Pujolle / Puigjaner | Data Communication Systems and Their Performance | E-Book | sack.de
E-Book

E-Book, Englisch, 512 Seiten, Web PDF

Pujolle / Puigjaner Data Communication Systems and Their Performance

Proceedings of the IFIP TC6 Fourth International Conference on Data Communication Systems and Their Performance, Barcelona, Spain, 20-22 June, 1990
1. Auflage 2014
ISBN: 978-1-4832-9841-2
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark

Proceedings of the IFIP TC6 Fourth International Conference on Data Communication Systems and Their Performance, Barcelona, Spain, 20-22 June, 1990

E-Book, Englisch, 512 Seiten, Web PDF

ISBN: 978-1-4832-9841-2
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark



The research papers in this volume describe recent, original developments in techniques, tools and applications in the area of communication system performance. Involved in the project are researchers from the world's leading universities, research institutes and companies.
Pujolle / Puigjaner Data Communication Systems and Their Performance jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Front Cover;1
2;Data Communication Systems and Their Performance;4
3;Copyright Page;5
4;Table of Contents;8
5;PREFACE;6
6;CHAIRMAN;12
7;PROGRAM COMMITTEE;12
8;ORGANIZING COMMITTEE;12
9;LIST OF REFEREES;14
10;PART 1: INVITED PAPERS;16
10.1;Chapter 1. Performance Issues of the DQDB Protocol;18
10.1.1;Abstract;18
10.1.2;Keywords;18
10.1.3;1.- Introduction;19
10.1.4;2.- The Distributed Queue Dual Bus Network;20
10.1.5;3.- Performance study;24
10.1.6;4. Performance analysis and discussion;34
10.1.7;5.- Conclusions and futural work;35
10.1.8;REFERENCES;36
10.2;CHAPTER 2. APPLICATIONS OF SAMPLE PATH ANALYSIS TO COMMUNICATION NETWORK CONTROL;38
10.2.1;1. INTRODUCTION;38
10.2.2;2. SAMPLE PATH COMPARISON TECHNIQUES;40
10.2.3;3. APPLICATIONS TO ROUTING;43
10.2.4;4. APPLICATIONS TO REAL-TIME DATA COMMUNICATIONS;46
10.2.5;5. SUMMARY;49
10.2.6;REFERENCES;50
11;PART 2: POLLING SYSTEMS;52
11.1;CHAPTER 3. MEAN DELAY APPROXIMATIONS FOR POLLING SYSTEMS WITH BATCH POISSON INPUT;54
11.1.1;1. Introduction;54
11.1.2;2. System Model Description and Definitions;56
11.1.3;3. Average Message Delay Analysis;57
11.1.4;4. Numerical Results;63
11.1.5;5. Conclusions;64
11.1.6;Acknowledgments;65
11.1.7;References;65
11.2;Chapter 4. Asymptotic Optimality of the Go-Back-n Protocol In High Speed Data Newworks With Small Buffers;70
11.2.1;1. INTRODUCTION;70
11.2.2;2. BACKGROUND FACTS;74
11.2.3;3. MAIN RESULTS;76
11.2.4;4. NUMERICAL INVESTIGATIONS;80
11.2.5;5. DISCUSSION;81
11.2.6;ACKNOWLEDGEMENT;82
11.2.7;REFERENCES;82
11.3;Chapter 5. Performance Analysis of the FDDI Media Access Control Protocol;84
11.3.1;Abstract;84
11.3.2;Keywords;84
11.3.3;1 Introduction;84
11.3.4;2 Modelling;85
11.3.5;3 Analysis;86
11.3.6;4 Results;93
11.3.7;5 Conclusion;95
11.3.8;Acknowledgements;95
11.3.9;References;95
12;PART 3: ISDN SWITCH;98
12.1;CHAPTER 6. ANALYSIS OF A CHANNEL ACCESS CONTROL METHOD IN INTEGRATED NETWORKS;100
12.1.1;ABSTRACT;100
12.1.2;1 - INTRODUCTION;101
12.1.3;2 - THE ACCESS CONTROL STRATEGIES;101
12.1.4;3 - MODEL AND ANALYSIS OF THE ACCESS CONTROL STRATEGIES;103
12.1.5;4 - NUMERICAL RESULTS AND ANALYSIS;106
12.1.6;5 - CONCLUSION;106
12.1.7;APPENDIX;109
12.1.8;REFERENCES;111
12.2;Chapter 7. Bit-by-Bit Self-Routing Interconnected Network;112
12.2.1;Background;112
12.3;Chapter 8. Analysis of a Class of Buffer Storage Systems with Markov-Correlated Input and Bulk Service;124
12.3.1;ABSTRACT;124
12.3.2;Key Words;124
12.3.3;1.0 Introduction and Problem Statement;124
12.3.4;2.0 Model Description and Notation;126
12.3.5;3.0 Solution Method;129
12.3.6;4.0 Modeling Examples and Numerical Results;131
12.3.7;5.0 Conclusion;136
12.3.8;Bibliography;136
12.3.9;Appendix A;138
13;PART 4: MODELING OF SWITCHING TECHNIQUES;142
13.1;CHAPTER 9. HEAD OF THE LINE ARBITRATION OF PACKET SWITCHES WITH INPUT AND OUTPUT QUEUEING;144
13.1.1;I. INTRODUCTION;144
13.1.2;II. SYSTEM ANALYSIS;146
13.1.3;III. SATURATION ANALYSIS;151
13.1.4;IV. NUMERICAL RESULTS;153
13.1.5;V. CONCLUSIONS;154
13.1.6;APPENDIX: WAITING TIME ANALYSIS;155
13.1.7;ACKNOWLEDGMENT;156
13.1.8;REFERENCES;157
13.2;CHAPTER 10. Performance of a Generic Non-Blocking Packet Switch;158
13.2.1;Abstract;158
13.2.2;Key Words;158
13.2.3;I. Introduction;158
13.2.4;II. System Description and Modeling Approach;159
13.2.5;III. Model Analysis;162
13.2.6;IV. Numerical Results;165
13.2.7;V. Conclusion;170
13.2.8;Bibliography;171
13.3;Chapter 11. An Improved Time Slot Assignment Algorithm for TDM Hierarchical Switching Systems;172
13.3.1;1 Introduction;172
13.3.2;2 Network-flow Based TSA Algorithms;174
13.3.3;3 Improved TSA Algorithm;177
13.3.4;4 Concluding Remarks;184
13.3.5;References;185
14;PART 5: ATM SWITCHING;186
14.1;CHAPTER 12. TRAFFIC BURSTINESS INFLUENCE ON ATM SWITCHING BEHAVIOR;188
14.1.1;1. INTRODUCTION;188
14.1.2;2. BURSTINESS OF AN ATM CELL STREAM;190
14.1.3;3. TRAFFIC SOURCE MODEL;191
14.1.4;4. SIMULATION ENVIRONMENT;193
14.1.5;5. RESULTS;195
14.1.6;6. SUMMARY;199
14.1.7;REFERENCES;199
14.2;Chapter 13. Statistical Multiplexing in ATM Networks;202
14.2.1;Abstract;202
14.2.2;1 Introduction;202
14.2.3;2 Traffic Models;203
14.2.4;3 Bandwidth Assignment Problem;204
14.2.5;4 Bursty Traffic Analysis;204
14.2.6;5 Variable-Bit-Rate Traffic Analysis;209
14.2.7;6 Comparison of Bursty and Variable Bit Rate Traffic;210
14.2.8;7 Application: Admission Control;210
14.2.9;8 Conclusions;213
14.2.10;Appendix: Invariance of R with same K/L ratio;214
14.2.11;References;215
14.3;CHAPTER 14. A LIMITED SHARED OUTPUT BUFFER SWITCH FOR ATM;218
14.3.1;1. INTRODUCTION;218
14.3.2;2. THE SWITCH ARCHITECTURE;220
14.3.3;3. BROADCASTING AND PRIORITY CONTROL;223
14.3.4;4. BUFFER SIZE ESTIMATION;225
14.3.5;5. CONCLUSION;229
14.3.6;ACKNOWLEDGEMENTS;229
14.3.7;REFERENCES;229
15;PART 6: PERFORMANCE STUDIES;232
15.1;CHAPTER 15. DEVELOPMENT AND PERFORMANCE EVALUATION OF POINT TO MULTIPOINT COMMUNICATION CONTROL SCHEME VIA SATELLITE;234
15.1.1;1. Introduction;234
15.1.2;2. A Point to Multipoint Communication Control Scheme;235
15.1.3;3. Performance Evaluation Method of Cyclic Turn Response Control Scheme;238
15.1.4;4. Experimental Results and Evaluation;240
15.1.5;5. Analytical Evaluation of Response Control Schemes;243
15.1.6;6. Conclusion;247
15.1.7;Acknowledgement;247
15.1.8;References;247
15.2;Chapter 16. A Combined Performance Analysis of Error Control and Multiple Access for a Mobile Radio Channel;248
15.2.1;Abstract;248
15.2.2;1 Introduction;248
15.2.3;2 The transmission channel;249
15.2.4;3 The Demand Assignment Multiple Access Protocol;250
15.2.5;4 Data link control;251
15.2.6;5 Conditional block error probabilities;254
15.2.7;6 Analysis of Demand Assignment Multiple Access;254
15.2.8;7 Conclusions;260
15.2.9;References;261
15.3;Chapter 17. Waiting Time and Queue Length Distributions for Go-Back-N and Selective-Repeat ARQ Protocols;262
15.3.1;Abstract;262
15.3.2;1 Introduction;262
15.3.3;2 Model and Performance Measures;264
15.3.4;3 Derivation of S*(z) in GBN ARQ Protocol;265
15.3.5;4 Derivation of S*(z) in SR8 ARQ Protocol;266
15.3.6;5 Numerical Examples;268
15.3.7;6 Conclusion;269
15.3.8;Appendix. Discrete M[x]/G/1 Queue;269
15.3.9;References;273
15.4;CHAPTER 18. WORST-CASE PERFORMANCE OF PRIORITIZED ACCESS TO RESOURCES IN DATA COMMUNICATION NETWORKS;276
15.4.1;1. INTRODUCTION;276
15.4.2;2. MODEL OF THE QUEUE;279
15.4.3;3. WORST-CASE CHARACTERISTICS: SAFETY AND FAIRNESS;279
15.4.4;4. TRADEOFFS BETWEEN SAFETY AND FAIRNESS;284
15.4.5;5. NUMERICAL RESULTS AND CONCLUSIONS;285
15.4.6;LITERATURE;287
16;PART 7: ACCESS METHODS;290
16.1;CHAPTER 19. STATISTICAL MULTIPLEXING UNDER NON-I.I.D. PACKET ARRIVAL PROCESSES AND DIFFERENT PRIORITY POLICIES;292
16.1.1;1. INTRODUCTION;292
16.1.2;2. THE FIFO STATISTICAL MULTIPLEXER;294
16.1.3;3. STATISTICAL MULTIPLEXING WITH PRIORITIES;296
16.1.4;4. NUMERICAL RESULTS;300
16.1.5;5. CONCLUSIONS;303
16.1.6;REFERENCES;304
16.2;Chapter 20. Stochastic Analysis of a Slotted FIFO Communication Channel: Constant and Uniform Message Lengths;306
16.2.1;Abstract;306
16.2.2;1. Introduction;306
16.2.3;2. The General Model;308
16.2.4;3. Constant Message Sizes;311
16.2.5;4. Uniformly Distributed Message Sizes;313
16.2.6;5. Final Remarks;317
16.2.7;Acknowledgments;318
16.2.8;References;318
16.3;Chapter 21. Analysis of a Multiqueue Model for an ISDN Access Interface;320
16.3.1;Abstract;320
16.3.2;1. Introduction;320
16.3.3;2. Procedures for the D-channel Access Control in ISDN;321
16.3.4;3. Model Description;322
16.3.5;4. Approximation Analysis;323
16.3.6;5. Numerical Examples;330
16.3.7;6. Conclusion;331
16.3.8;Acknowledgments;331
16.3.9;References;332
16.3.10;Appendix;332
17;PART 8: NETWORK MANAGEMENT;334
17.1;Chapter 22. Optimization Method for Reconfiguration of High Speed Digital Networks under Transit Trunk Failure Conditions;336
17.1.1;1. INTRODUCTION;336
17.1.2;2. FORMULATION AS AN OPTIMIZATION PROBLEM FOR NETWORK RECONFIGURATION;338
17.1.3;3. PROPOSAL OF AN EFFICIENT APPROXIMATE ALGORITHM;342
17.1.4;4. NUMERICAL EXPERIMENTS FOR EVALUATION;346
17.1.5;5. APPLICATION TO AN ACTUAL NETWORK;347
17.1.6;6. CONCLUSION;348
17.1.7;ACKNOWLEDGEMENTS;349
17.1.8;REFERENCES;349
17.2;Chapter 23. NETMON-II a monitoring tool for distributed and multiprocessor systems;350
17.2.1;Abstract;350
17.2.2;1. Introduction;350
17.2.3;2. Design Issues;352
17.2.4;3. NETMON-II Architecture
;352
17.2.5;4. Monitoring Unit;354
17.2.6;5. Central Control Facility;356
17.2.7;6. Evaluation Software;358
17.2.8;7. Applications;361
17.2.9;8. Conclusions;363
17.2.10;References;364
18;PART 9: WORKLOAD;366
18.1;Chapter 24. Consecutive Loss in Real-Time Packet Traffic;368
18.1.1;ABSTRACT;368
18.1.2;Keywords;368
18.1.3;1. Introduction;369
18.1.4;2. Modeling and Notation;370
18.1.5;3. Session Performance Measures;371
18.1.6;4. Computation of the Session Performance Measures;373
18.1.7;5. Example: Clipping Loss in an M/M/1/8 Queue;375
18.1.8;6. Conclusion;377
18.1.9;Acknowledgements;377
18.1.10;A. Appendix: The Workload Transition Kernel of the M/M/1/8 Queue;377
18.1.11;References;379
18.2;Chapter 25. Real Time Network Load Estimation in Packet Switched Networks;382
18.2.1;ABSTRACT;382
18.2.2;Key Words;382
18.2.3;1. Introduction;382
18.2.4;2. A Queueing Model with Time-Varying Parameters;383
18.2.5;3. Estimation Technique;385
18.2.6;4. Conclusion and Further Remarks;393
18.2.7;Acknowledgements;395
18.2.8;Bibliography;395
18.3;CHAPTER 26. ON THE SUPERPOSITION OF ARRIVAL PROCESSES FOR VOICE AND DATA;396
18.3.1;1. INTRODUCTION;396
18.3.2;2. THE SUPERPOSITION OF N C2 ARRIVAL PROCESSES;399
18.3.3;3. APPROXIMATING A SUPERPOSITION PROCESS BY A POISSON PROCESS;403
18.3.4;4. CONCLUSIONS;408
18.3.5;REFERENCES;409
19;PART 10: PROTOCOLS;410
19.1;CHAPTER 27. APPROXIMATE METHOD FOR PERFORMANCE EVALUATION OF MESSAGE EXCHANGE IN FIELD BUS FIP;412
19.1.1;Abstract;412
19.1.2;I. INTRODUCTION;412
19.1.3;II. MODELLING AND ANALYSIS;413
19.1.4;III. SIMULATION;418
19.1.5;IV. CONCLUSION;424
19.1.6;REFERENCES;425
19.2;Chapter 28. A New Scheme to Maintain Routes in Entry-to-Exit Routing Strategy;426
19.2.1;ABSTRACT;426
19.2.2;Key words;426
19.2.3;1 Introduction;426
19.2.4;2 Entry-to-Exit versus Hop-by-Hop and Their Problems;427
19.2.5;3 A New Scheme for Route Maintenance in Entry-to-exit Routing;429
19.2.6;4 Example;432
19.2.7;5 Evaluation;436
19.2.8;6 Conclusions and Suggestions for Future Research;436
19.2.9;References;437
19.3;Chapter 29. A Cryptographic Mechanism for Non-Iterative Algorithm Enforcing;440
19.3.1;0. Introduction;441
19.3.2;1. Program Certification;441
19.3.3;2. Program Execution with Controlled Instruction Flow;443
19.3.4;3. Run-Time Integrity;448
19.3.5;4. Applications and Conclusion;450
19.3.6;Acknowledgment;452
19.3.7;References;452
20;PART 11: TOOLS AND MEASUREMENTS;454
20.1;Chapter 30. Packet Switched Network Simulator Based on Modula—2;456
20.1.1;1 Introduction;456
20.1.2;2 Objectives;457
20.1.3;3 The Simulation Model;457
20.1.4;4 Simulation Parameters and Results;461
20.1.5;5 The Tool Structure;466
20.1.6;6 Application Examples;469
20.1.7;7 Current and Future Work;472
20.1.8;8 Conclusions;473
20.1.9;References;473
20.2;Chapter 31. Performance of Public Packet Switched Networks: Experience and Theory;474
20.2.1;Abstract;474
20.2.2;1.Introduction;475
20.2.3;2. Experiences with performance measurement of public packet switched networks;475
20.2.4;3. Standards concerning performance of data networks;483
20.2.5;4. Applicability of the standards to real measurements;486
20.2.6;5. Conclusion;487
20.2.7;References;487
20.3;CHAPTER 32. DISTRIBUTED MEASUREMENT SYSTEM FOR PROTOCOLS AND APPLICATIONS IN ISO 8802/3 LANS;490
20.3.1;1. INTRODUCTION;490
20.3.2;2. DISTRIBUTED MEASUREMENT SYSTEM;493
20.3.3;3. RESULTS AND FURTHER WORK;497
20.3.4;REFERENCES;498
20.4;CHAPTER 33. MACOM - A TOOL FOR THE MARKOVIAN ANALYSIS OF COMMUNICATION SYSTEMS;500
20.4.1;1. INTRODUCTION;500
20.4.2;2. THE STRUCTURE OF MACOM;501
20.4.3;3. THE MODEL WORLD;503
20.4.4;4. MODEL EVALUATION AND EXPERIMENT SPECIFICATION;506
20.4.5;5. THE TECHNIQUES OF MACOM;506
20.4.6;6. EXAMPLES;509
20.4.7;ACKNOWLEDGEMENTS;511
20.4.8;REFERENCES;512
21;AUTHORS INDEX;514



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.