The Experts below are selected from a list of 258 Experts worldwide ranked by ideXlab platform
S. Stidham - One of the best experts on this subject based on the ideXlab platform.
-
A queueing model for optimal segmentation of a Token-Ring local area network
Proceedings of 35th IEEE Conference on Decision and Control, 1996Co-Authors: S. StidhamAbstract:As nodes are added to a Token-Ring LAN and compete for the Token, the system may experience intolerable congestion or even become unstable. Following Husselbaugh (1995), we use a simple M/GI/1 queueing model to analyse whether a LAN with symmetric traffic should be segmented into subnetworks connected by a bridge. Our model accurately represents traffic as a function of the number of nodes in each segment and explicitly considers the trade off between reduced congestion and the cost of a bridge. We compare our model to the multi-class polling models in the literature on Token-Ring LANS.
Jesper Nilausen - One of the best experts on this subject based on the ideXlab platform.
-
Token Ring network management: Performance management
International Journal of Network Management, 1995Co-Authors: Jesper NilausenAbstract:In this sixth (and final) article in the series on Token Ring Network Management we will discuss Performance Management, which is relevant for many parts of the distributed Token Ring environment
-
Token Ring network management: Change management
International Journal of Network Management, 1995Co-Authors: Jesper NilausenAbstract:This article, which is the fifth in the series on Token Ring Network Management, will discuss selected aspects of Change Management that are relevant in today's Token Ring networking environment.
-
Token Ring network management: Configuration management
International Journal of Network Management, 1994Co-Authors: Jesper NilausenAbstract:In this fourth article in the series on Token Ring Network Management we will discuss selected areas of relevance to today's Token Ring networking environment.
-
Token Ring Network Management
International Journal of Network Management, 1993Co-Authors: Jesper NilausenAbstract:This article on Token Ring network management describes general aspects of this important area and gives a brief introduction to the various disciplines, which will be covered in more detail in following articles.
-
Isolating Problems in a Token‐Ring Network
International Journal of Network Management, 1992Co-Authors: Jesper NilausenAbstract:The basis for a very efficient network management implementation is found in the way the Token-Ring protocol works. Management reporting procedures are integrated into the Token-Ring data flow by being part of the idle running traffic in every Ring.
T. Toher - One of the best experts on this subject based on the ideXlab platform.
-
LCN - Experiments with client/server multimedia on Token Ring
1993 18th Conference on Local Computer Networks, 1993Co-Authors: K. Amer, K. Christensen, T. ToherAbstract:The capabilities of a 16-Mb/s Token Ring to support multimedia applications, and simultaneously carry data and multimedia traffic are demonstrated. The Token Ring's priority mechanism makes it possible to effectively isolate multimedia and data traffic. Bandwidth management is then needed to allocate a guaranteed bandwidth to multimedia traffic. A simple form of bandwidth management limits the number of active multimedia sessions on a Token Ring segment. With bandwidth management implemented in a multimedia server, client/server multimedia applications on a single Token Ring segment can become a reality.
-
experiments with client server multimedia on Token Ring
Local Computer Networks, 1993Co-Authors: K. Amer, K. Christensen, T. ToherAbstract:The capabilities of a 16-Mb/s Token Ring to support multimedia applications, and simultaneously carry data and multimedia traffic are demonstrated. The Token Ring's priority mechanism makes it possible to effectively isolate multimedia and data traffic. Bandwidth management is then needed to allocate a guaranteed bandwidth to multimedia traffic. A simple form of bandwidth management limits the number of active multimedia sessions on a Token Ring segment. With bandwidth management implemented in a multimedia server, client/server multimedia applications on a single Token Ring segment can become a reality.
-
Experiments with client/server multimedia on Token Ring
1993 18th Conference on Local Computer Networks, 1993Co-Authors: K. Amer, K. Christensen, T. ToherAbstract:The capabilities of a 16-Mb/s Token Ring to support multimedia applications, and simultaneously carry data and multimedia traffic are demonstrated. The Token Ring's priority mechanism makes it possible to effectively isolate multimedia and data traffic. Bandwidth management is then needed to allocate a guaranteed bandwidth to multimedia traffic. A simple form of bandwidth management limits the number of active multimedia sessions on a Token Ring segment. With bandwidth management implemented in a multimedia server, client/server multimedia applications on a single Token Ring segment can become a reality.
W Zhao - One of the best experts on this subject based on the ideXlab platform.
-
a comparative study of three Token Ring protocols for real time communications
International Conference on Distributed Computing Systems, 1991Co-Authors: W ZhaoAbstract:When developing distributed scheduling algorithms such as communication protocols, issues in achieving optimal policy and minimizing overhead must be addressed. This problem is examined in the context of a specific distributed system-the Token Ring communication network. Three Token Ring protocols are considered which are representative of many existing ones in the sense that they incorporate message time constraints at different levels and implement the earliest deadline first transmission (scheduling) policy at different degrees with different overheads. Through a worst-case analysis, the performance of these three Token Ring protocols is compared. It is concluded that to evaluate a distributed scheduling algorithm such as a communication protocol, it is necessary to not only consider the scheduling policy employed but also to take into account the overhead incurred due to the implementation of the scheduling policy. >
-
ICDCS - A comparative study of three Token Ring protocols for real-time communications
[1991] Proceedings. 11th International Conference on Distributed Computing Systems, 1991Co-Authors: W ZhaoAbstract:When developing distributed scheduling algorithms such as communication protocols, issues in achieving optimal policy and minimizing overhead must be addressed. This problem is examined in the context of a specific distributed system-the Token Ring communication network. Three Token Ring protocols are considered which are representative of many existing ones in the sense that they incorporate message time constraints at different levels and implement the earliest deadline first transmission (scheduling) policy at different degrees with different overheads. Through a worst-case analysis, the performance of these three Token Ring protocols is compared. It is concluded that to evaluate a distributed scheduling algorithm such as a communication protocol, it is necessary to not only consider the scheduling policy employed but also to take into account the overhead incurred due to the implementation of the scheduling policy. >
M. Velauthapillai - One of the best experts on this subject based on the ideXlab platform.
-
ICNP - Dynamics of Token Ring protocols
Proceedings of ICNP - 1994 International Conference on Network Protocols, 1994Co-Authors: J.g. Waclawsky, M. VelauthapillaiAbstract:We present a new approach for analyzing Token Ring LANs. The Token Ring model presented supports the behavior obtained from actual Ring measurements. Using this model, employing deterministic bounds analysis techniques, we prove several theorems which lead to some interesting conclusions that support observed Ring performance. The results obtained give insight into practical behavior of a Token Ring environments. >
-
Dynamics of Token Ring protocols
Proceedings of ICNP - 1994 International Conference on Network Protocols, 1994Co-Authors: J.g. Waclawsky, M. VelauthapillaiAbstract:We present a new approach for analyzing Token Ring LANs. The Token Ring model presented supports the behavior obtained from actual Ring measurements. Using this model, employing deterministic bounds analysis techniques, we prove several theorems which lead to some interesting conclusions that support observed Ring performance. The results obtained give insight into practical behavior of a Token Ring environments.