{"title":"Design and analysis of network down line road protocols","authors":"J. Bannister, U. Warrier","doi":"10.1109/INFCOM.1988.12914","DOIUrl":null,"url":null,"abstract":"The authors present the framework for a downline load service to which users subscribe to be properly loaded with their required code images. They review the user's requirements and present the outline of a service definition and protocol that satisfies the requirements. The analysis of downline-load protocol performance is given from the point of view of the time required to downline load a large number of devices. The authors also examine the impact of the total traffic generated by downline loading. Two downline-loading algorithms are studied and their performance characteristics compared.<<ETX>>","PeriodicalId":436217,"journal":{"name":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1988-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFCOM.1988.12914","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The authors present the framework for a downline load service to which users subscribe to be properly loaded with their required code images. They review the user's requirements and present the outline of a service definition and protocol that satisfies the requirements. The analysis of downline-load protocol performance is given from the point of view of the time required to downline load a large number of devices. The authors also examine the impact of the total traffic generated by downline loading. Two downline-loading algorithms are studied and their performance characteristics compared.<>