{"title":"令牌总线协议中的优先级方案分析","authors":"S. Hong, A. Ray","doi":"10.23919/ACC.1989.4790245","DOIUrl":null,"url":null,"abstract":"Token bus protocols are widely accepted Medium Access Control (MAC) protocols in Computer Integrated manufacturing (CIM) networks which are designed to accommodate heterogeneous traffic of real-time and non-real-time data. The priority scheme in token bus protocols offers multiple levels of privilege of medium access to different types of traffic. Performance evaluation of the priority scheme is essential for design of factory communication networks. An analytical model of the priority scheme has been developed for performance evaluation of the protocol, and this model has been verified by simulation experiments.","PeriodicalId":383719,"journal":{"name":"1989 American Control Conference","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analysis of the Priority Scheme in Token Bus Protocols\",\"authors\":\"S. Hong, A. Ray\",\"doi\":\"10.23919/ACC.1989.4790245\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Token bus protocols are widely accepted Medium Access Control (MAC) protocols in Computer Integrated manufacturing (CIM) networks which are designed to accommodate heterogeneous traffic of real-time and non-real-time data. The priority scheme in token bus protocols offers multiple levels of privilege of medium access to different types of traffic. Performance evaluation of the priority scheme is essential for design of factory communication networks. An analytical model of the priority scheme has been developed for performance evaluation of the protocol, and this model has been verified by simulation experiments.\",\"PeriodicalId\":383719,\"journal\":{\"name\":\"1989 American Control Conference\",\"volume\":\"63 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1989-06-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"1989 American Control Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/ACC.1989.4790245\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"1989 American Control Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ACC.1989.4790245","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of the Priority Scheme in Token Bus Protocols
Token bus protocols are widely accepted Medium Access Control (MAC) protocols in Computer Integrated manufacturing (CIM) networks which are designed to accommodate heterogeneous traffic of real-time and non-real-time data. The priority scheme in token bus protocols offers multiple levels of privilege of medium access to different types of traffic. Performance evaluation of the priority scheme is essential for design of factory communication networks. An analytical model of the priority scheme has been developed for performance evaluation of the protocol, and this model has been verified by simulation experiments.