{"title":"分析一个支持具有单包缓冲的多优先级站的FDDI网络","authors":"I. Rubin, J.C.-H. Wu","doi":"10.1109/MILCOM.1992.244170","DOIUrl":null,"url":null,"abstract":"The authors present exact analysis of a nonsymmetric multipriority token ring network with single packet buffers under a timed-token protocol, similar to that used for medium access control of the Fiber Distributed Data Interface (FDDI) network. An efficient iterative procedure is used to compute the limiting state distributions of the embedded Markov chains representing the system state process. The authors obtain the distributions of the token rotation time, the normalized throughput, and the mean packet waiting time. By using conditional residual delay analysis, moments of the packet delay are computed. The application of the analytic approach is illustrated through numerical examples representing FDDI network systems under various traffic conditions.<<ETX>>","PeriodicalId":394587,"journal":{"name":"MILCOM 92 Conference Record","volume":"97 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Analysis of an FDDI network supporting multiple-priority stations with single-packet buffers\",\"authors\":\"I. Rubin, J.C.-H. Wu\",\"doi\":\"10.1109/MILCOM.1992.244170\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The authors present exact analysis of a nonsymmetric multipriority token ring network with single packet buffers under a timed-token protocol, similar to that used for medium access control of the Fiber Distributed Data Interface (FDDI) network. An efficient iterative procedure is used to compute the limiting state distributions of the embedded Markov chains representing the system state process. The authors obtain the distributions of the token rotation time, the normalized throughput, and the mean packet waiting time. By using conditional residual delay analysis, moments of the packet delay are computed. The application of the analytic approach is illustrated through numerical examples representing FDDI network systems under various traffic conditions.<<ETX>>\",\"PeriodicalId\":394587,\"journal\":{\"name\":\"MILCOM 92 Conference Record\",\"volume\":\"97 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1992-10-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MILCOM 92 Conference Record\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MILCOM.1992.244170\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 92 Conference Record","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.1992.244170","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of an FDDI network supporting multiple-priority stations with single-packet buffers
The authors present exact analysis of a nonsymmetric multipriority token ring network with single packet buffers under a timed-token protocol, similar to that used for medium access control of the Fiber Distributed Data Interface (FDDI) network. An efficient iterative procedure is used to compute the limiting state distributions of the embedded Markov chains representing the system state process. The authors obtain the distributions of the token rotation time, the normalized throughput, and the mean packet waiting time. By using conditional residual delay analysis, moments of the packet delay are computed. The application of the analytic approach is illustrated through numerical examples representing FDDI network systems under various traffic conditions.<>