{"title":"Effect of ISDN traffic on the link blocking probabilities","authors":"T. Saadawi, A. Jafari","doi":"10.1109/CNS.1988.4974","DOIUrl":"https://doi.org/10.1109/CNS.1988.4974","url":null,"abstract":"The authors present a mathematical model using a two-dimensional queuing model that obtains the link blocking probability in an ISDN (integrated-services digital network) environment for two types of traffic. The model can be applied to link reservation schemes, private virtual network (PVN), alternate routing, and priority traffic. This model is extended to networks, with several different types of traffic.<<ETX>>","PeriodicalId":112149,"journal":{"name":"[1988] Proceedings. Computer Networking Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129985930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Updating software and configuration data in a distributed communications network","authors":"C. Symborski","doi":"10.1109/CNS.1988.5011","DOIUrl":"https://doi.org/10.1109/CNS.1988.5011","url":null,"abstract":"The author presents a method for the organization and controlled distribution of software and configuration data throughout a communications network. Central to the discussion are two concepts: download, which can be thought of as a mechanism by which network software and data are obtained and installed in a network component, and data reconciliation, which can be thought of as the process by which the consistency of all downloaded information within a network component is assured. A network component can use data reconciliation to determine what data is needed for operation and when that data has changed, thus requiring update. The download process can then be used to obtain the needed data. The methodology is illustrated by its implementation in an advanced, commercially available packet switching network.<<ETX>>","PeriodicalId":112149,"journal":{"name":"[1988] Proceedings. Computer Networking Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131263019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Configuring UNIX STREAMS communication buffers based on an Erlang traffic model","authors":"T. P. Lee, R. E. Barkley","doi":"10.1109/CNS.1988.5001","DOIUrl":"https://doi.org/10.1109/CNS.1988.5001","url":null,"abstract":"The authors describe a STREAMS communication buffer allocation algorithm based on the blocking probability, given the total amount of communication buffer memory. Memory requests are modeled as Erlang B traffic characterized by the mean interarrival time and mean buffer holding time for each size. The objective function to be minimized is the total number of blocked requests for the given traffic subject to the memory constraint.<<ETX>>","PeriodicalId":112149,"journal":{"name":"[1988] Proceedings. Computer Networking Symposium","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121834272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey of protocol verification techniques based on finite state machine models","authors":"M. Yuang","doi":"10.1109/CNS.1988.4993","DOIUrl":"https://doi.org/10.1109/CNS.1988.4993","url":null,"abstract":"A survey is presented of techniques for verifying correctness properties of communications protocol design based on finite-state-machine (FSM) models. The conventional reachability analysis is first described, giving advantages and limitations. One major limitation is the so-called state-space explosion problem. To approach this and other problems, a survey of different approaches is presented. The author classifies the various techniques into categories. These include closed covers, localized protocol verification, divide-and-conquer, modified reachability analysis, and partial state exploration. Each technique is described in detail, including an analysis of its strengths and weaknesses. Based on this analysis, one technique is proposed as the basis for further work on a protocol verifier and analyzer workstation which is being designed as a protocol development tool.<<ETX>>","PeriodicalId":112149,"journal":{"name":"[1988] Proceedings. Computer Networking Symposium","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124323380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Cherkassky, H. Lari-Najaffi, N. Lawrie, D. Masson, D. Pritty
{"title":"The performance of a real time LAN architecture for sensor fusion applications","authors":"V. Cherkassky, H. Lari-Najaffi, N. Lawrie, D. Masson, D. Pritty","doi":"10.1109/CNS.1988.4988","DOIUrl":"https://doi.org/10.1109/CNS.1988.4988","url":null,"abstract":"A description is given of the key characteristics of a local area network (LAN) architecture, Instanet, which retains these merits but provides the added features of rapid real-time response to allow direct coupling of sensor-based modules to the network. Instanet uses a distributed interrupt facility to provide high levels of service to time-critical traffic without imposing restrictions on flow control and/or packet length for nontime-critical traffic. The Instanet architecture and its implementation is based on the IEEE 802.5 token ring standard. A detailed analytic model of Instanet's performance is presented. It is a generalization of the well-known walking server model (for token-passing networks) which takes into account provisions for priority handling. The analysis is backed up by simulation results which show performance of the network at various levels of real-time and nonreal-time traffic.<<ETX>>","PeriodicalId":112149,"journal":{"name":"[1988] Proceedings. Computer Networking Symposium","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126691056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}