Filters








75 Hits in 4.3 sec

An architectural approach for integrated network and systems management

Raouf Boutaba, Simon Znaty
1995 Computer communication review  
As an example, we apply our architectural concepts to structure the management of a high speed multi-network (ATM, DQDB, FDDI).  ...  In this paper we introduce an architecture for the integrated management of all resources in a networked system, i.e. application, system and network resources.  ...  Reliability: In a single fault-free FDDI network two logical rings (i.e., two independent data paths) may exist.  ... 
doi:10.1145/216701.216703 fatcat:xfovkxcgq5ca7moo5226mckdk4

Reliability analysis of the double counter-rotating ring with concentrator attachments

D. Logothetis, K.S. Trivedi
1994 IEEE/ACM Transactions on Networking  
In this paper, we assess the impact of provisions such as node bypass, secondary ring and concentrator trees on network reliability.  ...  The inherently weak reliability behavior of the ring architecture has led network designers to consider various design choices to improve network reliability.  ...  The double counter-rotating ring, however, has been considered for IEEE 802.5 token ring [2] , subsequently for the fiber distributed data interface (FDDI) token ring [11, 12] and recently for the synchronous  ... 
doi:10.1109/90.336320 fatcat:imratpasnjbbtf5y6a7djfaqbe

The distributed program reliability analysis on ring-type topologies

Min-Sheng Lin, Ming-Sang Chang, Deng-Jyi Chen, Kuo-Lung Ku
2001 Computers & Operations Research  
This article is concerned with the analysis of distributed program reliability on a ring-distributed computing system.  ...  In this paper, we propose a polynomial-time algorithm for computing the DPR of ring topology and show that solving the DPR problem on a ring of trees topology is NP-hard. 2001 Elsevier Science Ltd.  ...  It has been considered for IEEE 802.5 token ring, for the "ber-distributed data interface (FDDI) token ring, for the synchronous optical network (SONET), and for asynchronous transfer mode (ATM) networks  ... 
doi:10.1016/s0305-0548(99)00151-3 fatcat:rvmkcwoj55gr7asu6yrdqyywaq

Reliability modeling and analysis of communication networks

Waqar Ahmad, Osman Hasan, Usman Pervez, Junaid Qadir
2017 Journal of Network and Computer Applications  
In this regard, we provide background on the modeling techniques (such as reliability block diagrams, fault trees, Markov chains, etc.) and analysis techniques (such as mathematical analytical methods,  ...  In this paper, we study various modeling and analysis techniques that can aid in the study of reliability of communication networks.  ...  For instance, the reliability of the Fiber Distributed-Data Interface (FDDI) token ring topology of a local area network (LAN) has been analyzed by using FT modeling [138] .  ... 
doi:10.1016/j.jnca.2016.11.008 fatcat:3ly4sqppj5hergujxlbqmv3e3q

Formal Dependability Modeling and Analysis: A Survey [article]

Waqar Ahmed, Osman Hasan, Sofiene Tahar
2016 arXiv   pre-print
In this paper, we present a comprehensive review of existing formal dependability analysis techniques along with their pros and cons for handling a particular dependability model.  ...  Thus, the usage of formal methods for dependability analysis is widely advocated for safety-critical domains, such as transportation, aerospace and health.  ...  Moreover, some network protocols, like the courier [38] and Fibre Distributed Data Interface (FDDI) token ring protocol [39] , have also been analyzed using the Petri Net approach.  ... 
arXiv:1606.06877v1 fatcat:kbirvfq6g5eyzf5jfauewlg6bu

Self-Stabilization by Counter Flushing

George Varghese
2000 SIAM journal on computing (Print)  
We also apply it to create new self-stabilizing protocols for propagation of information with feedback and resets.  ...  We describe a simple technique for self-stabilization called counter ushing which is applicable to a number of distributed algorithms.  ...  The UDL model is appropriate for routing (and other) protocols that use an underlying reliable link protocol.  ... 
doi:10.1137/s009753979732760x fatcat:7rpacz4ozbehdfp66w4c3btfo4

Self-stabilization by counter flushing

George Varghese
1994 Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing - PODC '94  
We also apply it to create new self-stabilizing protocols for propagation of information with feedback and resets.  ...  We describe a simple technique for self-stabilization called counter ushing which is applicable to a number of distributed algorithms.  ...  The UDL model is appropriate for routing (and other) protocols that use an underlying reliable link protocol.  ... 
doi:10.1145/197917.198102 dblp:conf/podc/Varghese94 fatcat:654tfmp3zvd4pe26asgfb6zjbi

Totem: a fault-tolerant multicast group communication system

L. E. Moser, P. M. Melliar-Smith, D. A. Agarwal, R. K. Budhia, C. A. Lingley-Papadopoulos
1996 Communications of the ACM  
, faults System-wide total ordering of messages, even for systems in which the network can partition and remerge, and for systems in which process groups can intersect Scalability to larger systems based  ...  Totem provides this delivery service in the presence of various types of communication and processor faults, including message loss, network partitioning, and processor crash, omission and timing faults  ...  We also wish to thank David Powell for inviting us to write this paper, as well as the other authors of the papers in this special issue for their comments.  ... 
doi:10.1145/227210.227226 fatcat:usv5gp45pzd6figz5ad74p5ayu

A New Hybrid Network Sniffer Model Based on Pcap Language and Sockets (Pcapsocks)

Azidine GUEZZAZ, Ahmed ASIMI, Yassine SADQI, Younes ASIMI, Zakariae TBATOU
2016 International Journal of Advanced Computer Science and Applications  
Network analysis can be used to improve networks performances and their security, but it can also be used for malicious tasks.  ...  Nowadays, the protection and the security of data transited within computer networks represent a real challenge for developers of computer applications and network administrators.  ...  We propose this software for the data collection part of our new intrusion prevention system approach based on neural network.  ... 
doi:10.14569/ijacsa.2016.070228 fatcat:kxds2s6gpfg4pewuboovmqgii4

Local area networks—Evolving from shared to switched access

K. J. Christensen, L. C. Haas, F. E. Noel, N. C. Strole
1995 IBM Systems Journal  
For example, an intelligent concentrator for token ring will prevent a 4-Mbps station from inserting into and disrupt- ing a 16-Mbps token-ring LAN segment.  ...  Figure 6 shows an example of a heterogeneous LAN hub with modules for two token-ring concentrators, an Ethernet repeater, and a bridge.  ... 
doi:10.1147/sj.343.0347 fatcat:sxtguqncarb5vhg7htckhqtqby

Enhancing security of cookie-based sessions in mobile networks using sparse caching

Amerah Alabrah, Jeffrey Cashion, Mostafa Bassiouni
2013 International Journal of Information Security  
* Xingbo Gao and Mostafa Bassiouni "Modeling and Performance Evaluation of Optical Burst Switched Ring Networks with Efficient Adaptive Routing" Proceedings of the 27 th IEEE International Performance  ...  Title: "Analysis and simulation of performance models of token driven local area networks". * Hiren Desai : graduated in August 1985.  ...  "Modeling and evaluating the virtual network of distributed interactive simulation with token ring topology" Proceedings of the International Simulation Technology Conference (SIMTEC), Nov. 1993, pp. 182  ... 
doi:10.1007/s10207-013-0223-8 fatcat:2mz7xytvyrhmlechdrukarjauy

High-speed local area networks and their performance: a survey

Bandula W. Abeysundara, Ahmed E. Kamal
1991 ACM Computing Surveys  
At high data transmission rates, the packet transmission time of a local area network (LAN) could become comparable toorless than themedium propagation delay.  ...  Thepaper serves asatutorial forreaders less familiar with local computer communication networks. It also serves as a survey of the state-cf-the-art LANs.  ...  Increased reliability and fault toler- ance occurs as a result of the re- dundant network architecture.  ... 
doi:10.1145/103724.103726 fatcat:64pqinvmtbbqrmdbxnwak5efci

Specification and verification of various distributed leader election algorithms for unidirectional ring networks

Hubert Garavel, Laurent Mounier
1997 Science of Computer Programming  
This paper deals with the formal specification and verification of distributed leader election algorithms for a set of machines connected by a unidirectional ring network.  ...  The design of LOTOS was motivated by the need for a language with a high abstraction level and a strong mathematical basis, which could be used for the description and analysis of complex systems.  ...  election algorithms, and would like to thank Guy Leduc (University of Liege, Belgium) and the anonymous referees for their insightful comments about this article.  ... 
doi:10.1016/s0167-6423(96)00034-2 fatcat:ga4pghyvj5hlnftws4obvajj4y

Analyzing and measuring the latency of the Totem multicast protocols

E. Thomopoulos, L.E. Moser, P.M. Melliar-Smith
1999 Computer Networks  
and shorter tails of the latency distribution than an equivalent single ring.  ...  This research determines, by analysis and measurement, the probability density functions pdfs for the latency from origination to message delivery in the presence of message loss and token loss for the  ...  Their experimental system consisted of two w orkstations connected by an FDDI network.  ... 
doi:10.1016/s0169-7552(98)00230-x fatcat:sjulbaebyzegjld3a5nd23aaga

Wireless Sensor Networks [chapter]

Frank L. Lewis
2005 Smart Environments  
FDDI-see below) the nodes transmit special frames to report and identify fault conditions. This can allow network reconfiguration for fault recovery.  ...  IEEE standardized the token ring with the IEEE 802.5 specification. The Fiber Distributed Data Interface (FDDI) specifies a 100Mbit/s token-passing, dual-ring LAN that uses fiber optic cable.  ... 
doi:10.1002/047168659x.ch2 fatcat:ydvqzewsdze35eulxqvdu6fipm
« Previous Showing results 1 — 15 out of 75 results