Filters








5,299 Hits in 7.0 sec

Performance Analysis and Comparison of Multi Hop Token Ring and Token Bus LAN Technologies

Suman Lata, Chaitali Bhowmik
2016 International Journal of Computer Applications  
Token bus is implemented using the token ring protocol over a virtual ring on a coaxial cable.  ...  Token ring and token bus networks are two of the most commonly used type of local-area network (LAN). Token ring is designed in such a way that it can provide high throughput under heavy loads.  ...  COMPARISON AND PERFORMANCE ANALYSIS To evaluate the performance of the token ring and token bus protocol, we consider performance measures such as the network throughput, mean delay, queuing time, transmission  ... 
doi:10.5120/ijca2016911102 fatcat:utxnnduvrvgmhjyx7xdnlkquoq

A New Token-Based Channel Access Protocol for Wavelength Division Multiplexed Multiprocessor Interconnects

Joon-Ho Ha, Timothy Mark Pinkston
2000 Journal of Parallel and Distributed Computing  
This paper presents a token-based channel access protocol for wavelength division multiplexed optically interconnected multiprocessors.  ...  The proposed token-based time division multiple access protocol minimizes latency by allowing dynamic allocation of slots to use channels efficiently.  ...  Token passing delay can affect T t overhead in two different ways depending on whether the token is passed or grabbed.  ... 
doi:10.1006/jpdc.1999.1599 fatcat:lofnf7nlmrbtnernbfbf6exsry

A comparison of DQDB and FDDI for the interconnection of LANs

R Ahmad, F Halsall
1994 Distributed Systems Engineering  
A series of simulation results are presented that compare the performance of both subnetwork types for various types of LAN traffic, backbone subnetwork sizes (physical coverage and number of LANs) and  ...  of a connection management mechanism for an ATMbased connectionless service Geert Heijenk and Boudewijn R Haverkort -This content was downloaded from IP address 207.241.231.81 on 28/07/2018 at 08:45 Abstract  ...  The time interval between two successive receptions of the token by a station is called the Slotwithdirectionof flow U-- Bus A token rotation time (TRT).  ... 
doi:10.1088/0967-1846/1/3/001 fatcat:w4z3jrxflzfwrboytwrdcf3zae

Decentralized token-CSMA/CD protocol for integrated voice/data LANs

Meng-Tsong Shieh, Jang-Ping Sheu, Wen-Tsuen Chen
1991 Computer Communications  
The integration of voice and token bus, hybrid token-CSMA/CD, performance analysis data on a token ring has been studied for many years, both in the centralized system 9 and the decentralized system10,11  ...  Many random mission follows the token-passing protocol with a access protocols for integrated services have been contention-resolution mechanism. It enforces a bounded proposed 3-6.  ...  Therefore, the length of a frame is 2000 slots. token bus protocol.  ... 
doi:10.1016/0140-3664(91)90015-s fatcat:siliozhjyvderecfmuhst66ixa

Interface-based design

James A. Rowson, Alberto Sangiovanni-Vincentelli
1997 Proceedings of the 34th annual conference on Design automation conference - DAC '97  
In particular, a simulator was developed that is based on the communication paradigm typical of our methodology.  ...  Since verification is clearly a major stumbling block for large system design, we focussed on the verification aspects of our methodology.  ...  A token represents a complete communication between two or more design entities. Some examples of tokens include bus writes, bus reads, bursts, and variable length encoded data.  ... 
doi:10.1145/266021.266060 dblp:conf/dac/RowsonS97 fatcat:ijbqnpi5yjec7clpgpd2m5z3ei

Improving the Timed Token Protocol [chapter]

Yacine Bouzida, Rachid Beghdad
2001 Lecture Notes in Computer Science  
We present a critical study of "the timed token" real-time communication protocol. This protocol presents a drawback towards asynchronous messages.  ...  The proposed here, called improved timed token, uses the main key ideas of the two previous ones and permits the transmission of synchronous messages in some critical situations where they cannot be transmitted  ...  Conclusion We presented a critical study of the timed token protocol.  ... 
doi:10.1007/3-540-47728-4_51 fatcat:thnmi3z2xbaqfksi56hu6y3sjm

Design, implementation, and evaluation of a software-based real-time Ethernet protocol

Chitra Venkatramani, Tzi-cker Chiueh
1995 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication - SIGCOMM '95  
RETHER features a hybrid mode of operation to reduce the performance impact on non-real-time network trac, a race-condition-free distributed admission control mechanism, and an ecient token-passing scheme  ...  We present the design, implementation and evaluation of a software-based timed-token protocol called RETHER that provides real-time performance guarantees to multimedia applications without requiring any  ...  Table 2 : 2 Breakdown of the Token Passing Overhead Table 3 : 3 Time in sec to copy data over the CPU bus vs. over the I/O bus.  ... 
doi:10.1145/217382.217404 dblp:conf/sigcomm/VenkatramaniC95 fatcat:phhiy263i5hnrndbauvh4lkf4e

Statistical real-time channels on multiaccess bus networks

Chih-Che Chou, K.G. Shin
1997 IEEE Transactions on Parallel and Distributed Systems  
In this paper, we present a scheme which can provide real-time communication services with both absolute and statistical performance guarantees on multiaccess bus networks for given input traffic characteristics  ...  It also allows for independent addition and deletion of real-time connections while preserving existing guarantees.  ...  Office of Naval Research under Grant N00014-94-1-0229.  ... 
doi:10.1109/71.605764 fatcat:pvnwseuptfduzge4fff3mb67ju

Comparison between Wishbone and APB Protocol

Sumiksha Shetty
2020 International Journal for Research in Applied Science and Engineering Technology  
This paper presents a survey on APB bus architecture and Wishbone bus architecture and a comparison between them.  ...  It starts with the introduction and features of the APB bus architecture followed by the introduction to Wishbone bus Architecture and its features and concludes with a comparison between them.  ...  CONCLUSION In this paper, the survey is done on APB bus architecture, a family of AMBA from ARM and WISHBONE bus architecture by SILICORE Corporation and is compared considering various factors such as  ... 
doi:10.22214/ijraset.2020.7047 fatcat:4y2gq5o2ynaztfqii3lqlfu6ji

A Dependable Communication Network for e-Textiles [chapter]

Nenggan Zheng, Zhaohui Wu, Lei Chen, Yanmiao Zhou, Qijia Wang
2006 Lecture Notes in Computer Science  
In this paper, we introduce token buses to connect the nodes, instead of the single rings in the original e-textile token grid. The topology of the new network is described.  ...  And we also discuss the media access control protocols and the reliable operations.  ...  The specific MAC protocol controls the tokens that are passed from a node to its active subsequent one on the buses.  ... 
doi:10.1007/11758549_125 fatcat:tyvdipdsv5efdm34i74w2cqabe

Performance evaluation of control networks: Ethernet, ControlNet, and DeviceNet

2001 IEEE Control Systems  
In this article, we compare three of them: Ethernet bus (CSMA/CD), Token passing bus (e.g., ControlNet) and Controller Area Network (CAN) bus (e.g., DeviceNet).  ...  Control networks are typically based on one of two medium access protocols, CAN (used by Smart Distributed System (SDS), DeviceNet 9], and CAN Kingdom) and the Token Ring or Bus (used by Process Field  ...  Acknowledgments The authors wish to acknowledge the contributions of John Korsakas and the support of the National Science Foundation Engineering Research Center for Recon gurable Machining Systems at  ... 
doi:10.1109/37.898793 fatcat:jh5byww6kbappdjwivzzqwkxsm

RCBus: Row-Column Bus Topology for Optical Network-on-Chip

Weiwei Fu, Tianzhou Chen
2012 Elektronika ir Elektrotechnika  
a two-dimensional torus network.  ...  We use multiple write single-read schemes and virtual channel based token protocol to implement light-speed arbitration and flow control.  ...  A token is an encoded bit sequence that is modulated and propagated in the same way as data. Two kinds of optical arbitration protocols are proposed in [4] : token channel and token slot.  ... 
doi:10.5755/j01.eee.18.8.2633 fatcat:f4pr3ylytfazpcf6ufxsmxvonu

A Secure and Lightweight Approach for Routing Optimization in Mobile IPv6

Sehwa Song, Hyoung-Kee Choi, Jung-Yoon Kim
2009 EURASIP Journal on Wireless Communications and Networking  
A security weakness in mobility support has a direct consequence on the security of users because it obscures the distinction between devices and users.  ...  The results of in-depth performance evaluation show that our protocol achieves strong security and at the same time requires minimal computational overhead.  ...  A comparison of the computational cost between the five protocols is included.  ... 
doi:10.1155/2009/957690 fatcat:ruqwqq7xfjfzxicgdlhp63ydky

Token Bus based MAC protocol for Wireless Sensor Networks

P. Udayakumar, Ranjana Vyas, O. P. Vyas
2012 International Journal of Computer Applications  
In this paper, we propose TBB-MAC, an enhancement for medium access control (MAC) protocol based on the token bus in wireless sensor networks (WSNs).  ...  In this type of networks, sensors are spatially correlated and they often sense and collect the information and send it to the sink.  ...  The main advantage of this algorithm is that only one node is active within the radius in time. Token Bus Algorithm  A station has a token holding timer to limit the time it can hold the token.  ... 
doi:10.5120/6137-8373 fatcat:lemnfznjnjbh7jx2wh36olswta

An introduction to traffic handling characteristics of bus local area network distributed access methods

B. Stuck
1984 IEEE Communications Magazine  
Qualitative Comparisons Our first type of comparison is qualitative. The offered load is fixed at any point less than the bus transmission capacity.  ...  Figure 9 shows that the excess mean delay due to the access method is at most one half of a time slot, for token passing, and drops for token passing as the load increases.  ... 
doi:10.1109/mcom.1984.1092023 fatcat:ti7unpx735d3jac27jdfylahiu
« Previous Showing results 1 — 15 out of 5,299 results