On the Behavior of Control Token Protocols with Asynchronous and Synchronous Traffic (Contributo in atti di convegno)

Type
Label
  • On the Behavior of Control Token Protocols with Asynchronous and Synchronous Traffic (Contributo in atti di convegno) (literal)
Anno
  • 1989-01-01T00:00:00+01:00 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
  • 10.1109/INFCOM.1989.101474 (literal)
Alternative label
  • A. Valenzano; P. Montuschi; L. Ciminiera (1989)
    On the Behavior of Control Token Protocols with Asynchronous and Synchronous Traffic
    in 8th IEEE Joint Conf. of the Computer and Communications Societies (INFOCOM 1989), Ottawa, 23-27 Aprile 1989
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • A. Valenzano; P. Montuschi; L. Ciminiera (literal)
Pagina inizio
  • 348 (literal)
Pagina fine
  • 355 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
  • http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=101474 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
  • 8 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • P. Montuschi, L. Ciminiera: Dip. di Automatica e Informatica, Politecnico di Torino, Torino, Italy A. Valenzano: Centro di Studi per l'Elaborazione Nuimerale dei Segnali, CENS-CNR, Torino, Italy (literal)
Titolo
  • On the Behavior of Control Token Protocols with Asynchronous and Synchronous Traffic (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
  • 0-8186-1920-1 (literal)
Abstract
  • Timed token protocols are both used to handle, on the same local area network, both real-time and non-real-time traffic. The authors analyze this type of protocols, giving worst-case values for the throughput of non-real-time traffic and the average token rotation time. The results were obtained for synchronous traffic generated according to a generic periodic pattern, under heavy traffic conditions. Finally, it is shown that the difference between the values obtained under worst-case assumptions are close to those obtained under best-case assumptions. Therefore, the method presented here may be used to provide important guidelines so as to properly tune timed token protocol parameters for each specific network installation (literal)
Editore
Prodotto di
Autore CNR
Insieme di parole chiave

Incoming links:


Prodotto
Autore CNR di
Editore di
Insieme di parole chiave di
data.CNR.it