{"title":"Efficient fault-tolerant routing algorithms for forward loop backward hop networks","authors":"P. Sheu, Wen-Tsuen Chen, J. Chiou","doi":"10.1109/LCN.1991.208093","DOIUrl":"https://doi.org/10.1109/LCN.1991.208093","url":null,"abstract":"Forward loop backward hop (FLBH) networks, characterized by a forward loop connecting all the adjacent nodes and a backward loop connecting nodes separated by a distance of h hops, have a higher connectivity and therefore a higher potential for fault-tolerance than single-loop networks. How to devise efficient fault-tolerant routing algorithms is an important issue on designing FLBH networks. This paper proposes two new fault-tolerant routing algorithms. One is for optimal FLBH networks with h/sup 2/=N, where N is the number of nodes. The other is for arbitrary FLBH networks (i.e., 1<or=h<or=N-1). Both algorithms are theoretically shown to be able to guarantee that any packet is sure to reach its destination even when a faulty node exists. At the same time, they are simple and merely require local knowledge. A simple and effective rule, called the balancing rule, is used to determine the next node to which the incoming packet should be forwarded. The balancing rule enables the algorithms to find the shortest path between the source and the destination in most cases despite the presence of network faults. The results of computer simulations demonstrate that the average length of paths discovered by the authors' algorithms is shorter than that found by other algorithms and is near optimal solution. As a result, these algorithms are suitable for implementation on practical local computer networks, especially on large ones.<<ETX>>","PeriodicalId":163373,"journal":{"name":"[1991] Proceedings 16th Conference on Local Computer Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129684169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of FDDI-what about packet loss?","authors":"P. Martini, R. Wittenberg","doi":"10.1109/LCN.1991.208043","DOIUrl":"https://doi.org/10.1109/LCN.1991.208043","url":null,"abstract":"Recently, a discussion came up dealing with the frame copied indicator in the frame status sequence of FDDI. This indicator shows whether or not the destination has copied the frame and this way allows the sender to react in a proper way. However, in interconnected networks the destination node may represent a large number of destinations with different addresses making it difficult to check within a very short time whether a certain packet is to be copied and the indicator is to be set. The paper discusses the effect of using or not using the frame copied indicator. Additionally, it proposes a class of new congestion control strategies for FDDI.<<ETX>>","PeriodicalId":163373,"journal":{"name":"[1991] Proceedings 16th Conference on Local Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129599925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Foudriat, K. Maly, C. M. Overstreet, S. Khanna, Liping Zhang, W. Sun
{"title":"Combining two media access protocols to support integrated traffic on high data rate networks","authors":"E. Foudriat, K. Maly, C. M. Overstreet, S. Khanna, Liping Zhang, W. Sun","doi":"10.1109/LCN.1991.208097","DOIUrl":"https://doi.org/10.1109/LCN.1991.208097","url":null,"abstract":"The paper describes the operation and performance of an integrated traffic network using separate media access protocols to support different traffic types on a single unidirectional ring or bus. One protocol, based upon local carrier sensing (CSMA/RN) provides access for asynchronous traffic; the other, a 'train like' protocol called the circulating reservations packets (CRPs), provides access for synchronous voice and video traffic. Other media access protocols like slotted ring or QPSX are equally applicable for use as the asynchronous protocol.<<ETX>>","PeriodicalId":163373,"journal":{"name":"[1991] Proceedings 16th Conference on Local Computer Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120945982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Jitter accumulation in token ring UTP networks","authors":"Kathleen Otis","doi":"10.1109/LCN.1991.208047","DOIUrl":"https://doi.org/10.1109/LCN.1991.208047","url":null,"abstract":"The paper discusses jitter accumulation in token ring unshielded twisted pair (UTP) networks. Topics of discussion include correlated jitter, near end crosstalk (NEXT), and the feasibility of supporting 100 m lobes of standard UTP (DIW) using two different types of active concentrators.<<ETX>>","PeriodicalId":163373,"journal":{"name":"[1991] Proceedings 16th Conference on Local Computer Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125698463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FDDI network architectures, performance and futures","authors":"G. C. Stone, W. Franta","doi":"10.1109/LCN.1991.208085","DOIUrl":"https://doi.org/10.1109/LCN.1991.208085","url":null,"abstract":"Standards compliant FDDI interfaces have been available for between one and two years. As measured by the installed base, the authors believe that the technology is being accepted and deployed, with the number of nodes per network growing rapidly. In this paper, based on their experiences as a vendor of FDDI equipment, they first briefly recount certain features of FDDI. Next, they examine the reality of FDDI based upon their experiences with over 100 installations, including the fiber types used, ring sizes (diameters and number of nodes), use of concentrators, bridging and routing uses, costs, and interoperability in multi-vendor situations. Next, they examine measured performance gathered from several installations with supercomputer, mainframe, workstation, and bridge/router nodes, and examine the factors affecting performance. They examine FDDI futures, including FDDI-II and follow-on FDDI options.<<ETX>>","PeriodicalId":163373,"journal":{"name":"[1991] Proceedings 16th Conference on Local Computer Networks","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127513364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A transputer based OSI-gateway for LAN-interconnection across ISDN","authors":"T. Braun, M. Zitterbart","doi":"10.1109/LCN.1991.208060","DOIUrl":"https://doi.org/10.1109/LCN.1991.208060","url":null,"abstract":"Interconnections of remote local area networks (LANs) across public networks are of growing interest. The paper presents an OSI gateway to interconnect LANs across ISDN. The OSI connectionless network protocol (CLNP) supports interconnection of different subnetworks. The most important component of the gateway is an adaption layer to integrate ISDN into the gateway structure. The main task of this adaption layer is mapping the service provided by the connection oriented ISDN subnetwork to the service expected by CLNP and vice versa. It is designed to fulfil requirements on fairness, low costs, and acceptable performance. The gateway components are implemented on a multiprocessor platform built with transputers.<<ETX>>","PeriodicalId":163373,"journal":{"name":"[1991] Proceedings 16th Conference on Local Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131166184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defense data network management system","authors":"Bruce C. Kim","doi":"10.1109/LCN.1991.208089","DOIUrl":"https://doi.org/10.1109/LCN.1991.208089","url":null,"abstract":"The management system provides network management of defense related computer networks for the armed services within the Continental United States (CONUS). The architecture is discussed from the standpoint of the flow of diagnostic information and the role of equipment and personnel. The hierarchy of the network management is discussed to give the overall picture of the network management system.<<ETX>>","PeriodicalId":163373,"journal":{"name":"[1991] Proceedings 16th Conference on Local Computer Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134296628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Station reconfiguration on FDDI trunk rings","authors":"W. S. Hiles, D. Marlow","doi":"10.1109/LCN.1991.208045","DOIUrl":"https://doi.org/10.1109/LCN.1991.208045","url":null,"abstract":"The US Navy is selecting a et of local area networking standards, under the name SAFENET, for use on tactical platforms. The set of standards incorporate the FDDI local area network (LAN) at the physical and data link layers. The SAFENET group has taken an FDDI feature (the hold policy option) and used it as the basis of a data path hop (or switch) capability. The paper provides a discussion of FDDI trunk ring reconfiguration both in a normal mode of operation and when the hold policy is in effect. Operational issues of concern to tactical network survivability are discussed. A discussion of the issues that result from the use of optical switches, the use of the hold policy, the use of dual media access controllers, the resolution of addresses and the association of one data path to one of two media access controllers is provided.<<ETX>>","PeriodicalId":163373,"journal":{"name":"[1991] Proceedings 16th Conference on Local Computer Networks","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129228935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"XTP/KRM implementation on a transputer network","authors":"C. Diot, V. Roca","doi":"10.1109/LCN.1991.208080","DOIUrl":"https://doi.org/10.1109/LCN.1991.208080","url":null,"abstract":"XTP is a real time transfer protocol designed to be implemented in a dedicated hardware environment. To obtain a transputer based parallel implementation, the authors modified a standard implementation (based on UNIX BSD system) on three aspects: the structure of the implementation, interfaces with host, and system primitive references. This new implementation was modelled. Performance was analyzed. This paper tries, in two sections to distinguish what in the performance is linked to the protocol specification and what is the consequence of the implementation. For this purpose, the KRM is compared to a high performance implementation of OSI TP4 the authors had previously modelled. XTP high performance conditions of implementation (including software techniques and multi-processor host architectures) are discussed.<<ETX>>","PeriodicalId":163373,"journal":{"name":"[1991] Proceedings 16th Conference on Local Computer Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116844704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance modelling of LAN bridges and routers","authors":"A. Hajare","doi":"10.1109/LCN.1991.208108","DOIUrl":"https://doi.org/10.1109/LCN.1991.208108","url":null,"abstract":"Bridges and routers are used to interconnect local area networks (LANs). The performance of these devices is important since they can become bottlenecks in large multi-segment networks. Performance metrics and a test methodology for bridges and routers have not been standardized. Performance data reported by vendors is not applicable to the actual scenarios encountered in an operational network. However, vendor provided data can be used to develop models of bridges and routers which, along with other models, yield performance data for a network. Several tools are available for modelling bridges and routers, and Network II 5 was used for the present study. The results of the performance modelling and analysis of some bridges and routers are presented.<<ETX>>","PeriodicalId":163373,"journal":{"name":"[1991] Proceedings 16th Conference on Local Computer Networks","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114286377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}