982 research outputs found

    Simulation analysis of FDDI network using NETWORK II.5 software package

    Get PDF
    In recent years, one of the most exciting advances in media has been the use of fiber optics in LANs. The bandwidth provided by Fiber Optic Technology has drastically increased the number of new applications that can be supported by communication networks. In order to support a variety of services, in 1986, the American National Standard Institute (ANSI) Accredited Standards Committee (ASC) X3, and the ASC X3T9.5 Task Group developed a new standard; the Fiber Distributed Data Interface (FDDI) [1]. This is a high speed (100 Mbps) optical communication network based on a token passing mode of operation. The Medium Access Control (MAC) Protocol selected for this network attempts to provide priority services, as well as bounded delay transmission for real time applications [2]. This thesis presents results for the Voice-Data performance of the Medium Access Control (MAC) protocol, selected for the FDDI network, using the NETWORK 11.5 [6] software package. This protocol can provide priority services to different types of traffic, as well as guarantee bounded delays for real-time applications. The effect of various system parameters on performance is investigated

    Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    Get PDF
    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver

    Performance of buffer insertion LANs

    Get PDF
    This thesis presents an evaluation of the performance of some ring local area network protocols, specifically the buffer insertion ring and the token ring. Both dual and single versions of each are considered, and performance statistics are obtained by measurements on real networks, by mathematical analysis, and by computer simulation. New packet routing protocols for dual contrarotating buffer insertion and token ring networks are described and their performance is examined. It is found that, due to the bandwith reuse properties of the routing methods, maximum throughputs of 800% and 200% are achievable, for the dual buffer insertion ring and the dual token ring respectively

    Datacenter Traffic Control: Understanding Techniques and Trade-offs

    Get PDF
    Datacenters provide cost-effective and flexible access to scalable compute and storage resources necessary for today's cloud computing needs. A typical datacenter is made up of thousands of servers connected with a large network and usually managed by one operator. To provide quality access to the variety of applications and services hosted on datacenters and maximize performance, it deems necessary to use datacenter networks effectively and efficiently. Datacenter traffic is often a mix of several classes with different priorities and requirements. This includes user-generated interactive traffic, traffic with deadlines, and long-running traffic. To this end, custom transport protocols and traffic management techniques have been developed to improve datacenter network performance. In this tutorial paper, we review the general architecture of datacenter networks, various topologies proposed for them, their traffic properties, general traffic control challenges in datacenters and general traffic control objectives. The purpose of this paper is to bring out the important characteristics of traffic control in datacenters and not to survey all existing solutions (as it is virtually impossible due to massive body of existing research). We hope to provide readers with a wide range of options and factors while considering a variety of traffic control mechanisms. We discuss various characteristics of datacenter traffic control including management schemes, transmission control, traffic shaping, prioritization, load balancing, multipathing, and traffic scheduling. Next, we point to several open challenges as well as new and interesting networking paradigms. At the end of this paper, we briefly review inter-datacenter networks that connect geographically dispersed datacenters which have been receiving increasing attention recently and pose interesting and novel research problems.Comment: Accepted for Publication in IEEE Communications Surveys and Tutorial
    • …
    corecore