E-Book, Englisch, 512 Seiten, Web PDF
Pujolle / Puigjaner Data Communication Systems and Their Performance
1. Auflage 2014
ISBN: 978-1-4832-9841-2
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark
Proceedings of the IFIP TC6 Fourth International Conference on Data Communication Systems and Their Performance, Barcelona, Spain, 20-22 June, 1990
E-Book, Englisch, 512 Seiten, Web PDF
ISBN: 978-1-4832-9841-2
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark
Autoren/Hrsg.
Weitere Infos & Material
1;Front Cover;1
2;Data Communication Systems and Their Performance;4
3;Copyright Page;5
4;Table of Contents;8
5;PREFACE;6
6;CHAIRMAN;12
7;PROGRAM COMMITTEE;12
8;ORGANIZING COMMITTEE;12
9;LIST OF REFEREES;14
10;PART 1: INVITED PAPERS;16
10.1;Chapter 1. Performance Issues of the DQDB Protocol;18
10.1.1;Abstract;18
10.1.2;Keywords;18
10.1.3;1.- Introduction;19
10.1.4;2.- The Distributed Queue Dual Bus Network;20
10.1.5;3.- Performance study;24
10.1.6;4. Performance analysis and discussion;34
10.1.7;5.- Conclusions and futural work;35
10.1.8;REFERENCES;36
10.2;CHAPTER 2. APPLICATIONS OF SAMPLE PATH ANALYSIS TO COMMUNICATION NETWORK CONTROL;38
10.2.1;1. INTRODUCTION;38
10.2.2;2. SAMPLE PATH COMPARISON TECHNIQUES;40
10.2.3;3. APPLICATIONS TO ROUTING;43
10.2.4;4. APPLICATIONS TO REAL-TIME DATA COMMUNICATIONS;46
10.2.5;5. SUMMARY;49
10.2.6;REFERENCES;50
11;PART 2: POLLING SYSTEMS;52
11.1;CHAPTER 3. MEAN DELAY APPROXIMATIONS FOR POLLING SYSTEMS WITH BATCH POISSON INPUT;54
11.1.1;1. Introduction;54
11.1.2;2. System Model Description and Definitions;56
11.1.3;3. Average Message Delay Analysis;57
11.1.4;4. Numerical Results;63
11.1.5;5. Conclusions;64
11.1.6;Acknowledgments;65
11.1.7;References;65
11.2;Chapter 4. Asymptotic Optimality of the Go-Back-n Protocol In High Speed Data Newworks With Small Buffers;70
11.2.1;1. INTRODUCTION;70
11.2.2;2. BACKGROUND FACTS;74
11.2.3;3. MAIN RESULTS;76
11.2.4;4. NUMERICAL INVESTIGATIONS;80
11.2.5;5. DISCUSSION;81
11.2.6;ACKNOWLEDGEMENT;82
11.2.7;REFERENCES;82
11.3;Chapter 5. Performance Analysis of the FDDI Media Access Control Protocol;84
11.3.1;Abstract;84
11.3.2;Keywords;84
11.3.3;1 Introduction;84
11.3.4;2 Modelling;85
11.3.5;3 Analysis;86
11.3.6;4 Results;93
11.3.7;5 Conclusion;95
11.3.8;Acknowledgements;95
11.3.9;References;95
12;PART 3: ISDN SWITCH;98
12.1;CHAPTER 6. ANALYSIS OF A CHANNEL ACCESS CONTROL METHOD IN INTEGRATED NETWORKS;100
12.1.1;ABSTRACT;100
12.1.2;1 - INTRODUCTION;101
12.1.3;2 - THE ACCESS CONTROL STRATEGIES;101
12.1.4;3 - MODEL AND ANALYSIS OF THE ACCESS CONTROL STRATEGIES;103
12.1.5;4 - NUMERICAL RESULTS AND ANALYSIS;106
12.1.6;5 - CONCLUSION;106
12.1.7;APPENDIX;109
12.1.8;REFERENCES;111
12.2;Chapter 7. Bit-by-Bit Self-Routing Interconnected Network;112
12.2.1;Background;112
12.3;Chapter 8. Analysis of a Class of Buffer Storage Systems with Markov-Correlated Input and Bulk Service;124
12.3.1;ABSTRACT;124
12.3.2;Key Words;124
12.3.3;1.0 Introduction and Problem Statement;124
12.3.4;2.0 Model Description and Notation;126
12.3.5;3.0 Solution Method;129
12.3.6;4.0 Modeling Examples and Numerical Results;131
12.3.7;5.0 Conclusion;136
12.3.8;Bibliography;136
12.3.9;Appendix A;138
13;PART 4: MODELING OF SWITCHING TECHNIQUES;142
13.1;CHAPTER 9. HEAD OF THE LINE ARBITRATION OF PACKET SWITCHES WITH INPUT AND OUTPUT QUEUEING;144
13.1.1;I. INTRODUCTION;144
13.1.2;II. SYSTEM ANALYSIS;146
13.1.3;III. SATURATION ANALYSIS;151
13.1.4;IV. NUMERICAL RESULTS;153
13.1.5;V. CONCLUSIONS;154
13.1.6;APPENDIX: WAITING TIME ANALYSIS;155
13.1.7;ACKNOWLEDGMENT;156
13.1.8;REFERENCES;157
13.2;CHAPTER 10. Performance of a Generic Non-Blocking Packet Switch;158
13.2.1;Abstract;158
13.2.2;Key Words;158
13.2.3;I. Introduction;158
13.2.4;II. System Description and Modeling Approach;159
13.2.5;III. Model Analysis;162
13.2.6;IV. Numerical Results;165
13.2.7;V. Conclusion;170
13.2.8;Bibliography;171
13.3;Chapter 11. An Improved Time Slot Assignment Algorithm for TDM Hierarchical Switching Systems;172
13.3.1;1 Introduction;172
13.3.2;2 Network-flow Based TSA Algorithms;174
13.3.3;3 Improved TSA Algorithm;177
13.3.4;4 Concluding Remarks;184
13.3.5;References;185
14;PART 5: ATM SWITCHING;186
14.1;CHAPTER 12. TRAFFIC BURSTINESS INFLUENCE ON ATM SWITCHING BEHAVIOR;188
14.1.1;1. INTRODUCTION;188
14.1.2;2. BURSTINESS OF AN ATM CELL STREAM;190
14.1.3;3. TRAFFIC SOURCE MODEL;191
14.1.4;4. SIMULATION ENVIRONMENT;193
14.1.5;5. RESULTS;195
14.1.6;6. SUMMARY;199
14.1.7;REFERENCES;199
14.2;Chapter 13. Statistical Multiplexing in ATM Networks;202
14.2.1;Abstract;202
14.2.2;1 Introduction;202
14.2.3;2 Traffic Models;203
14.2.4;3 Bandwidth Assignment Problem;204
14.2.5;4 Bursty Traffic Analysis;204
14.2.6;5 Variable-Bit-Rate Traffic Analysis;209
14.2.7;6 Comparison of Bursty and Variable Bit Rate Traffic;210
14.2.8;7 Application: Admission Control;210
14.2.9;8 Conclusions;213
14.2.10;Appendix: Invariance of R with same K/L ratio;214
14.2.11;References;215
14.3;CHAPTER 14. A LIMITED SHARED OUTPUT BUFFER SWITCH FOR ATM;218
14.3.1;1. INTRODUCTION;218
14.3.2;2. THE SWITCH ARCHITECTURE;220
14.3.3;3. BROADCASTING AND PRIORITY CONTROL;223
14.3.4;4. BUFFER SIZE ESTIMATION;225
14.3.5;5. CONCLUSION;229
14.3.6;ACKNOWLEDGEMENTS;229
14.3.7;REFERENCES;229
15;PART 6: PERFORMANCE STUDIES;232
15.1;CHAPTER 15. DEVELOPMENT AND PERFORMANCE EVALUATION OF POINT TO MULTIPOINT COMMUNICATION CONTROL SCHEME VIA SATELLITE;234
15.1.1;1. Introduction;234
15.1.2;2. A Point to Multipoint Communication Control Scheme;235
15.1.3;3. Performance Evaluation Method of Cyclic Turn Response Control Scheme;238
15.1.4;4. Experimental Results and Evaluation;240
15.1.5;5. Analytical Evaluation of Response Control Schemes;243
15.1.6;6. Conclusion;247
15.1.7;Acknowledgement;247
15.1.8;References;247
15.2;Chapter 16. A Combined Performance Analysis of Error Control and Multiple Access for a Mobile Radio Channel;248
15.2.1;Abstract;248
15.2.2;1 Introduction;248
15.2.3;2 The transmission channel;249
15.2.4;3 The Demand Assignment Multiple Access Protocol;250
15.2.5;4 Data link control;251
15.2.6;5 Conditional block error probabilities;254
15.2.7;6 Analysis of Demand Assignment Multiple Access;254
15.2.8;7 Conclusions;260
15.2.9;References;261
15.3;Chapter 17. Waiting Time and Queue Length Distributions for Go-Back-N and Selective-Repeat ARQ Protocols;262
15.3.1;Abstract;262
15.3.2;1 Introduction;262
15.3.3;2 Model and Performance Measures;264
15.3.4;3 Derivation of S*(z) in GBN ARQ Protocol;265
15.3.5;4 Derivation of S*(z) in SR8 ARQ Protocol;266
15.3.6;5 Numerical Examples;268
15.3.7;6 Conclusion;269
15.3.8;Appendix. Discrete M[x]/G/1 Queue;269
15.3.9;References;273
15.4;CHAPTER 18. WORST-CASE PERFORMANCE OF PRIORITIZED ACCESS TO RESOURCES IN DATA COMMUNICATION NETWORKS;276
15.4.1;1. INTRODUCTION;276
15.4.2;2. MODEL OF THE QUEUE;279
15.4.3;3. WORST-CASE CHARACTERISTICS: SAFETY AND FAIRNESS;279
15.4.4;4. TRADEOFFS BETWEEN SAFETY AND FAIRNESS;284
15.4.5;5. NUMERICAL RESULTS AND CONCLUSIONS;285
15.4.6;LITERATURE;287
16;PART 7: ACCESS METHODS;290
16.1;CHAPTER 19. STATISTICAL MULTIPLEXING UNDER NON-I.I.D. PACKET ARRIVAL PROCESSES AND DIFFERENT PRIORITY POLICIES;292
16.1.1;1. INTRODUCTION;292
16.1.2;2. THE FIFO STATISTICAL MULTIPLEXER;294
16.1.3;3. STATISTICAL MULTIPLEXING WITH PRIORITIES;296
16.1.4;4. NUMERICAL RESULTS;300
16.1.5;5. CONCLUSIONS;303
16.1.6;REFERENCES;304
16.2;Chapter 20. Stochastic Analysis of a Slotted FIFO Communication Channel: Constant and Uniform Message Lengths;306
16.2.1;Abstract;306
16.2.2;1. Introduction;306
16.2.3;2. The General Model;308
16.2.4;3. Constant Message Sizes;311
16.2.5;4. Uniformly Distributed Message Sizes;313
16.2.6;5. Final Remarks;317
16.2.7;Acknowledgments;318
16.2.8;References;318
16.3;Chapter 21. Analysis of a Multiqueue Model for an ISDN Access Interface;320
16.3.1;Abstract;320
16.3.2;1. Introduction;320
16.3.3;2. Procedures for the D-channel Access Control in ISDN;321
16.3.4;3. Model Description;322
16.3.5;4. Approximation Analysis;323
16.3.6;5. Numerical Examples;330
16.3.7;6. Conclusion;331
16.3.8;Acknowledgments;331
16.3.9;References;332
16.3.10;Appendix;332
17;PART 8: NETWORK MANAGEMENT;334
17.1;Chapter 22. Optimization Method for Reconfiguration of High Speed Digital Networks under Transit Trunk Failure Conditions;336
17.1.1;1. INTRODUCTION;336
17.1.2;2. FORMULATION AS AN OPTIMIZATION PROBLEM FOR NETWORK RECONFIGURATION;338
17.1.3;3. PROPOSAL OF AN EFFICIENT APPROXIMATE ALGORITHM;342
17.1.4;4. NUMERICAL EXPERIMENTS FOR EVALUATION;346
17.1.5;5. APPLICATION TO AN ACTUAL NETWORK;347
17.1.6;6. CONCLUSION;348
17.1.7;ACKNOWLEDGEMENTS;349
17.1.8;REFERENCES;349
17.2;Chapter 23. NETMON-II a monitoring tool for distributed and multiprocessor systems;350
17.2.1;Abstract;350
17.2.2;1. Introduction;350
17.2.3;2. Design Issues;352
17.2.4;3. NETMON-II Architecture
;352
17.2.5;4. Monitoring Unit;354
17.2.6;5. Central Control Facility;356
17.2.7;6. Evaluation Software;358
17.2.8;7. Applications;361
17.2.9;8. Conclusions;363
17.2.10;References;364
18;PART 9: WORKLOAD;366
18.1;Chapter 24. Consecutive Loss in Real-Time Packet Traffic;368
18.1.1;ABSTRACT;368
18.1.2;Keywords;368
18.1.3;1. Introduction;369
18.1.4;2. Modeling and Notation;370
18.1.5;3. Session Performance Measures;371
18.1.6;4. Computation of the Session Performance Measures;373
18.1.7;5. Example: Clipping Loss in an M/M/1/8 Queue;375
18.1.8;6. Conclusion;377
18.1.9;Acknowledgements;377
18.1.10;A. Appendix: The Workload Transition Kernel of the M/M/1/8 Queue;377
18.1.11;References;379
18.2;Chapter 25. Real Time Network Load Estimation in Packet Switched Networks;382
18.2.1;ABSTRACT;382
18.2.2;Key Words;382
18.2.3;1. Introduction;382
18.2.4;2. A Queueing Model with Time-Varying Parameters;383
18.2.5;3. Estimation Technique;385
18.2.6;4. Conclusion and Further Remarks;393
18.2.7;Acknowledgements;395
18.2.8;Bibliography;395
18.3;CHAPTER 26. ON THE SUPERPOSITION OF ARRIVAL PROCESSES FOR VOICE AND DATA;396
18.3.1;1. INTRODUCTION;396
18.3.2;2. THE SUPERPOSITION OF N C2 ARRIVAL PROCESSES;399
18.3.3;3. APPROXIMATING A SUPERPOSITION PROCESS BY A POISSON PROCESS;403
18.3.4;4. CONCLUSIONS;408
18.3.5;REFERENCES;409
19;PART 10: PROTOCOLS;410
19.1;CHAPTER 27. APPROXIMATE METHOD FOR PERFORMANCE EVALUATION OF MESSAGE EXCHANGE IN FIELD BUS FIP;412
19.1.1;Abstract;412
19.1.2;I. INTRODUCTION;412
19.1.3;II. MODELLING AND ANALYSIS;413
19.1.4;III. SIMULATION;418
19.1.5;IV. CONCLUSION;424
19.1.6;REFERENCES;425
19.2;Chapter 28. A New Scheme to Maintain Routes in Entry-to-Exit Routing Strategy;426
19.2.1;ABSTRACT;426
19.2.2;Key words;426
19.2.3;1 Introduction;426
19.2.4;2 Entry-to-Exit versus Hop-by-Hop and Their Problems;427
19.2.5;3 A New Scheme for Route Maintenance in Entry-to-exit Routing;429
19.2.6;4 Example;432
19.2.7;5 Evaluation;436
19.2.8;6 Conclusions and Suggestions for Future Research;436
19.2.9;References;437
19.3;Chapter 29. A Cryptographic Mechanism for Non-Iterative Algorithm Enforcing;440
19.3.1;0. Introduction;441
19.3.2;1. Program Certification;441
19.3.3;2. Program Execution with Controlled Instruction Flow;443
19.3.4;3. Run-Time Integrity;448
19.3.5;4. Applications and Conclusion;450
19.3.6;Acknowledgment;452
19.3.7;References;452
20;PART 11: TOOLS AND MEASUREMENTS;454
20.1;Chapter 30. Packet Switched Network Simulator Based on Modula—2;456
20.1.1;1 Introduction;456
20.1.2;2 Objectives;457
20.1.3;3 The Simulation Model;457
20.1.4;4 Simulation Parameters and Results;461
20.1.5;5 The Tool Structure;466
20.1.6;6 Application Examples;469
20.1.7;7 Current and Future Work;472
20.1.8;8 Conclusions;473
20.1.9;References;473
20.2;Chapter 31. Performance of Public Packet Switched Networks: Experience and Theory;474
20.2.1;Abstract;474
20.2.2;1.Introduction;475
20.2.3;2. Experiences with performance measurement of public packet switched networks;475
20.2.4;3. Standards concerning performance of data networks;483
20.2.5;4. Applicability of the standards to real measurements;486
20.2.6;5. Conclusion;487
20.2.7;References;487
20.3;CHAPTER 32. DISTRIBUTED MEASUREMENT SYSTEM FOR PROTOCOLS AND APPLICATIONS IN ISO 8802/3 LANS;490
20.3.1;1. INTRODUCTION;490
20.3.2;2. DISTRIBUTED MEASUREMENT SYSTEM;493
20.3.3;3. RESULTS AND FURTHER WORK;497
20.3.4;REFERENCES;498
20.4;CHAPTER 33. MACOM - A TOOL FOR THE MARKOVIAN ANALYSIS OF COMMUNICATION SYSTEMS;500
20.4.1;1. INTRODUCTION;500
20.4.2;2. THE STRUCTURE OF MACOM;501
20.4.3;3. THE MODEL WORLD;503
20.4.4;4. MODEL EVALUATION AND EXPERIMENT SPECIFICATION;506
20.4.5;5. THE TECHNIQUES OF MACOM;506
20.4.6;6. EXAMPLES;509
20.4.7;ACKNOWLEDGEMENTS;511
20.4.8;REFERENCES;512
21;AUTHORS INDEX;514