A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Performance Analysis and Comparison of Multi Hop Token Ring and Token Bus LAN Technologies
2016
International Journal of Computer Applications
Token bus is implemented using the token ring protocol over a virtual ring on a coaxial cable. ...
Token ring and token bus networks are two of the most commonly used type of local-area network (LAN). Token ring is designed in such a way that it can provide high throughput under heavy loads. ...
COMPARISON AND PERFORMANCE ANALYSIS To evaluate the performance of the token ring and token bus protocol, we consider performance measures such as the network throughput, mean delay, queuing time, transmission ...
doi:10.5120/ijca2016911102
fatcat:utxnnduvrvgmhjyx7xdnlkquoq
A New Token-Based Channel Access Protocol for Wavelength Division Multiplexed Multiprocessor Interconnects
2000
Journal of Parallel and Distributed Computing
This paper presents a token-based channel access protocol for wavelength division multiplexed optically interconnected multiprocessors. ...
The proposed token-based time division multiple access protocol minimizes latency by allowing dynamic allocation of slots to use channels efficiently. ...
Token passing delay can affect T t overhead in two different ways depending on whether the token is passed or grabbed. ...
doi:10.1006/jpdc.1999.1599
fatcat:lofnf7nlmrbtnernbfbf6exsry
A comparison of DQDB and FDDI for the interconnection of LANs
1994
Distributed Systems Engineering
A series of simulation results are presented that compare the performance of both subnetwork types for various types of LAN traffic, backbone subnetwork sizes (physical coverage and number of LANs) and ...
of a connection management mechanism for an ATMbased connectionless service Geert Heijenk and Boudewijn R Haverkort -This content was downloaded from IP address 207.241.231.81 on 28/07/2018 at 08:45 Abstract ...
The time interval between two successive receptions of the token by a station is called the Slotwithdirectionof flow
U--
Bus A token rotation time (TRT). ...
doi:10.1088/0967-1846/1/3/001
fatcat:w4z3jrxflzfwrboytwrdcf3zae
Decentralized token-CSMA/CD protocol for integrated voice/data LANs
1991
Computer Communications
The integration of voice and token bus, hybrid token-CSMA/CD, performance analysis data on a token ring has been studied for many years, both in the centralized system 9 and the decentralized system10,11 ...
Many random mission follows the token-passing protocol with a access protocols for integrated services have been contention-resolution mechanism. It enforces a bounded proposed 3-6. ...
Therefore, the length of a frame is 2000 slots. token bus protocol. ...
doi:10.1016/0140-3664(91)90015-s
fatcat:siliozhjyvderecfmuhst66ixa
Interface-based design
1997
Proceedings of the 34th annual conference on Design automation conference - DAC '97
In particular, a simulator was developed that is based on the communication paradigm typical of our methodology. ...
Since verification is clearly a major stumbling block for large system design, we focussed on the verification aspects of our methodology. ...
A token represents a complete communication between two or more design entities. Some examples of tokens include bus writes, bus reads, bursts, and variable length encoded data. ...
doi:10.1145/266021.266060
dblp:conf/dac/RowsonS97
fatcat:ijbqnpi5yjec7clpgpd2m5z3ei
Improving the Timed Token Protocol
[chapter]
2001
Lecture Notes in Computer Science
We present a critical study of "the timed token" real-time communication protocol. This protocol presents a drawback towards asynchronous messages. ...
The proposed here, called improved timed token, uses the main key ideas of the two previous ones and permits the transmission of synchronous messages in some critical situations where they cannot be transmitted ...
Conclusion We presented a critical study of the timed token protocol. ...
doi:10.1007/3-540-47728-4_51
fatcat:thnmi3z2xbaqfksi56hu6y3sjm
Design, implementation, and evaluation of a software-based real-time Ethernet protocol
1995
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication - SIGCOMM '95
RETHER features a hybrid mode of operation to reduce the performance impact on non-real-time network trac, a race-condition-free distributed admission control mechanism, and an ecient token-passing scheme ...
We present the design, implementation and evaluation of a software-based timed-token protocol called RETHER that provides real-time performance guarantees to multimedia applications without requiring any ...
Table 2 : 2 Breakdown of the Token Passing Overhead
Table 3 : 3 Time in sec to copy data over the CPU bus vs. over the I/O bus. ...
doi:10.1145/217382.217404
dblp:conf/sigcomm/VenkatramaniC95
fatcat:phhiy263i5hnrndbauvh4lkf4e
Statistical real-time channels on multiaccess bus networks
1997
IEEE Transactions on Parallel and Distributed Systems
In this paper, we present a scheme which can provide real-time communication services with both absolute and statistical performance guarantees on multiaccess bus networks for given input traffic characteristics ...
It also allows for independent addition and deletion of real-time connections while preserving existing guarantees. ...
Office of Naval Research under Grant N00014-94-1-0229. ...
doi:10.1109/71.605764
fatcat:pvnwseuptfduzge4fff3mb67ju
Comparison between Wishbone and APB Protocol
2020
International Journal for Research in Applied Science and Engineering Technology
This paper presents a survey on APB bus architecture and Wishbone bus architecture and a comparison between them. ...
It starts with the introduction and features of the APB bus architecture followed by the introduction to Wishbone bus Architecture and its features and concludes with a comparison between them. ...
CONCLUSION In this paper, the survey is done on APB bus architecture, a family of AMBA from ARM and WISHBONE bus architecture by SILICORE Corporation and is compared considering various factors such as ...
doi:10.22214/ijraset.2020.7047
fatcat:4y2gq5o2ynaztfqii3lqlfu6ji
A Dependable Communication Network for e-Textiles
[chapter]
2006
Lecture Notes in Computer Science
In this paper, we introduce token buses to connect the nodes, instead of the single rings in the original e-textile token grid. The topology of the new network is described. ...
And we also discuss the media access control protocols and the reliable operations. ...
The specific MAC protocol controls the tokens that are passed from a node to its active subsequent one on the buses. ...
doi:10.1007/11758549_125
fatcat:tyvdipdsv5efdm34i74w2cqabe
Performance evaluation of control networks: Ethernet, ControlNet, and DeviceNet
2001
IEEE Control Systems
In this article, we compare three of them: Ethernet bus (CSMA/CD), Token passing bus (e.g., ControlNet) and Controller Area Network (CAN) bus (e.g., DeviceNet). ...
Control networks are typically based on one of two medium access protocols, CAN (used by Smart Distributed System (SDS), DeviceNet 9], and CAN Kingdom) and the Token Ring or Bus (used by Process Field ...
Acknowledgments The authors wish to acknowledge the contributions of John Korsakas and the support of the National Science Foundation Engineering Research Center for Recon gurable Machining Systems at ...
doi:10.1109/37.898793
fatcat:jh5byww6kbappdjwivzzqwkxsm
RCBus: Row-Column Bus Topology for Optical Network-on-Chip
2012
Elektronika ir Elektrotechnika
a two-dimensional torus network. ...
We use multiple write single-read schemes and virtual channel based token protocol to implement light-speed arbitration and flow control. ...
A token is an encoded bit sequence that is modulated and propagated in the same way as data. Two kinds of optical arbitration protocols are proposed in [4] : token channel and token slot. ...
doi:10.5755/j01.eee.18.8.2633
fatcat:f4pr3ylytfazpcf6ufxsmxvonu
A Secure and Lightweight Approach for Routing Optimization in Mobile IPv6
2009
EURASIP Journal on Wireless Communications and Networking
A security weakness in mobility support has a direct consequence on the security of users because it obscures the distinction between devices and users. ...
The results of in-depth performance evaluation show that our protocol achieves strong security and at the same time requires minimal computational overhead. ...
A comparison of the computational cost between the five protocols is included. ...
doi:10.1155/2009/957690
fatcat:ruqwqq7xfjfzxicgdlhp63ydky
Token Bus based MAC protocol for Wireless Sensor Networks
2012
International Journal of Computer Applications
In this paper, we propose TBB-MAC, an enhancement for medium access control (MAC) protocol based on the token bus in wireless sensor networks (WSNs). ...
In this type of networks, sensors are spatially correlated and they often sense and collect the information and send it to the sink. ...
The main advantage of this algorithm is that only one node is active within the radius in time.
Token Bus Algorithm A station has a token holding timer to limit the time it can hold the token. ...
doi:10.5120/6137-8373
fatcat:lemnfznjnjbh7jx2wh36olswta
An introduction to traffic handling characteristics of bus local area network distributed access methods
1984
IEEE Communications Magazine
Qualitative Comparisons Our first type of comparison is qualitative. The offered load is fixed at any point less than the bus transmission capacity. ...
Figure 9 shows that the excess mean delay due to the access method is at most one half of a time slot, for token passing, and drops for token passing as the load increases. ...
doi:10.1109/mcom.1984.1092023
fatcat:ti7unpx735d3jac27jdfylahiu
« Previous
Showing results 1 — 15 out of 5,299 results