6 research outputs found

    CSMA/RN: A universal protocol for gigabit networks

    Get PDF
    Networks must provide intelligent access for nodes to share the communications resources. In the range of 100 Mbps to 1 Gbps, the demand access class of protocols were studied extensively. Many use some form of slot or reservation system and many the concept of attempt and defer to determine the presence or absence of incoming information. The random access class of protocols like shared channel systems (Ethernet), also use the concept of attempt and defer in the form of carrier sensing to alleviate the damaging effects of collisions. In CSMA/CD, the sensing of interference is on a global basis. All systems discussed above have one aspect in common, they examine activity on the network either locally or globally and react in an attempt and whatever mechanism. Of the attempt + mechanisms discussed, one is obviously missing; that is attempt and truncate. Attempt and truncate was studied in a ring configuration called the Carrier Sensed Multiple Access Ring Network (CSMA/RN). The system features of CSMA/RN are described including a discussion of the node operations for inserting and removing messages and for handling integrated traffic. The performance and operational features based on analytical and simulation studies which indicate that CSMA/RN is a useful and adaptable protocol over a wide range of network conditions are discussed. Finally, the research and development activities necessary to demonstrate and realize the potential of CSMA/RN as a universal, gigabit network protocol is outlined

    Distributed simulation of network protocols

    Get PDF
    Simulations of high speed network protocols are very CPU intensive operations requiring very long run times. Very high speed network protocols (Gigabit/sec rates) require longer simulation runs in order to reach a steady state, while at the same time requiring additional CPU processing for each unit of time because of the data rates for the traffic being simulated. As protocol development proceeds and simulations provide insights into any problems associated with the protocol, the simulation model often must be changed to generate additional or finer statistical performance information. Iterating on this process is very time consuming due to the required run times for the simulation models. The results of the efforts to distribute a high speed ring network protocol, Carrier Sensed Multiple Access/Ring Network (CSMA/RN), are presented

    Distributed simulation, no special tools required

    Get PDF
    A tool kit of C language functions that can be linked with SIMSCRIPT programs to provide the data communication primitives necessary for distributed simulation is presented. A test case is discussed and some timing data are presented. Additionally some metrics, developed to determine the applicability of the server model decomposition for particular simulations, are discussed

    A carrier sensed multiple access protocol for high data base rate ring networks

    Get PDF
    The results of the study of a simple but effective media access protocol for high data rate networks are presented. The protocol is based on the fact that at high data rates networks can contain multiple messages simultaneously over their span, and that in a ring, nodes used to detect the presence of a message arriving from the immediate upstream neighbor. When an incoming signal is detected, the node must either abort or truncate a message it is presently sending. Thus, the protocol with local carrier sensing and multiple access is designated CSMA/RN. The performance of CSMA/RN with TTattempt and truncate is studied using analytic and simulation models. Three performance factors, wait or access time, service time and response or end-to-end travel time are presented. The service time is basically a function of the network rate, it changes by a factor of 1 between no load and full load. Wait time, which is zero for no load, remains small for load factors up to 70 percent of full load. Response time, which adds travel time while on the network to wait and service time, is mainly a function of network length, especially for longer distance networks. Simulation results are shown for CSMA/RN where messages are removed at the destination. A wide range of local and metropolitan area network parameters including variations in message size, network length, and node count are studied. Finally, a scaling factor based upon the ratio of message to network length demonstrates that the results, and hence, the CSMA/RN protocol, are applicable to wide area networks

    The Value Proposition of the Global Health Security Index

    Get PDF
    Infectious disease outbreaks pose major threats to human health and security. Countries with robust capacities for preventing, detecting and responding to outbreaks can avert many of the social, political, economic and health system costs of such crises. The Global Health Security Index (GHS Index)—the first comprehensive assessment and benchmarking of health security and related capabilities across 195 countries—recently found that no country is sufficiently prepared for epidemics or pandemics. The GHS Index can help health security stakeholders identify areas of weakness, as well as opportunities to collaborate across sectors, collectively strengthen health systems and achieve shared public health goals. Some scholars have recently offered constructive critiques of the GHS Index’s approach to scoring and ranking countries; its weighting of select indicators; its emphasis on transparency; its focus on biosecurity and biosafety capacities; and divergence between select country scores and corresponding COVID-19-associated caseloads, morbidity, and mortality. Here, we (1) describe the practical value of the GHS Index; (2) present potential use cases to help policymakers and practitioners maximise the utility of the tool; (3) discuss the importance of scoring and ranking; (4) describe the robust methodology underpinning country scores and ranks; (5) highlight the GHS Index’s emphasis on transparency and (6) articulate caveats for users wishing to use GHS Index data in health security research, policymaking and practice
    corecore