• Title/Summary/Keyword: Token Ring

Search Result 41, Processing Time 0.024 seconds

A Token-Ring-Based MAC Protocol in IEEE 802.11 WLANs (IEEE 802.11 무선 랜에서의 토큰링 기반의 매체 접속 제어 프로토콜)

  • Lee, Eun Guk;Rhee, Seung Hyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.1
    • /
    • pp.38-40
    • /
    • 2014
  • In this paper, proposed method achieves delay reduction and throughput improvement by utilizing token-ring method in infrastructure network. Access Point gives token passing effect by successively transmitting ACK frame including a node's Association ID. Not only can this method considerably reduce time for medium access, but also improve throughput. Furthermore, AP offers more frequent medium access opportunity to node having highest data queue among nodes associated by AP. these method can evenly offer medium access opportunity according to Queue's volumes.

Analysis of Several Digital Network Technologies for Hard Real-time Communications in Nuclear Plant

  • Song, Ki-Sang;No, Hee-Cheon;Kim, Dong-Hun;Koo, In-Soo
    • Nuclear Engineering and Technology
    • /
    • v.31 no.2
    • /
    • pp.226-235
    • /
    • 1999
  • Applying digital network technology for advanced nuclear plant requires deterministic communication for tight safety requirements, timely and reliable data delivery for operation-critical and mission-critical characteristics of nuclear plant. Communication protocols, such as IEEE 802/4 Token Bus, IEEE 802/5 Token Ring, FDDI, and ARCnet, which have deterministic communication capability are partially applied to several nuclear power plants. Although digital communication technologies have many advantages, it is necessary to consider the noise immunity from electromagnetic interference (EMI), electrical interference, impulse noise, and heat noise before selecting specific digital network technology for nuclear plant. In this paper, we consider the token frame loss and data frame loss rate due to the link error event, frame size, and link data rate in different protocols, and evaluate the possibility of failure to meet the hard real-time requirement in nuclear plant.

  • PDF

A Study on the Implementation of MAC Layer of Token-passing Bus Network Based on Mini-MAP (Mini-MAP을 채택한 토큰-패싱 버스 네트워크의 MAC계층 구현에 관한 연구)

  • 강문식;조병선;박민용;이상배
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.28B no.5
    • /
    • pp.404-410
    • /
    • 1991
  • In this paper,a network interface unit of token-passing bus network and its driving software are implemented based on Mini-MAP. This network interface unit performs the function of MAC layer which is responsible for transmission and reception of frames as well as the management of logical ring. The driving software performs the management of data buffer and the report of errors, if ocoured, to the higher layer. Motorola MC68824 of is used as a TBC(Token Bus Controller) and Intel80186 as a CPU for network interface unit. The operation of network interface unit is verified by self-test which checks the functioning of TBC and CPU. In addition each module of driving software is tested to check the functions regarding transmission and reception of frames.

  • PDF

LAN 대용으로서의 ISPBX-LAN 성능분석

  • 김지중
    • Information and Communications Magazine
    • /
    • v.10 no.12
    • /
    • pp.59-70
    • /
    • 1993
  • 본 논문은 독일 Hamburg대학에서 필자가 수행한 연구 프로젝트인 DFN(Deutsches Forschungsnetz)-Application over ISDN의 일부로서 분산된 Resource의 공유를 위해 ISPBX(ISDN능력을 가진 PABX)를 이용한 근거리 ISDN-PC-Network(ISPBX-LAN)과 이것을 효율적 활용을 위한 단기접속모드(Short Hold Mode)를 소개하고, ISPBX-LAN의 성능을 사용자의 입장에서 기존의 LAN(Ethernet, Token-Ring)과 비교분석하였다.

  • PDF

Simultaneous Burst and Burst Control Packet Transmission Protocol for Optical Burst Switching Ring Networks

  • Park, Joon-Pyo;Lee, Man-Seop
    • ETRI Journal
    • /
    • v.29 no.1
    • /
    • pp.116-119
    • /
    • 2007
  • In this letter, we design a collision resolution protocol for optical burst switching ring networks to avoid burst collision. We define the offset time condition for no burst transmission collision and manage the free time list of nodes for no burst reception collision. In order to improve the throughput, we use a fiber delay line, void-filling, and void-compression. This protocol does not require any additional procedures for bandwidth reservation such as centralized assignment of bandwidth, lightpath setup of WDM ring networks, or token capturing for the burst transmission. The simulation results show that the proposed protocol can achieve high throughput while saving 70% of wavelengths when compared to round robin with random selection, round robin with persistent, and round robin with non-persistent with only destination delay.

  • PDF

Approximate Analysis of MAC Protocol with Multiple Self-tokens in a Slotted Ring

  • Sakuta, Makoto;Sasase, Iwao
    • Journal of Communications and Networks
    • /
    • v.5 no.3
    • /
    • pp.249-257
    • /
    • 2003
  • Ring networks are very commonly exploited among local area and metropolitan area networks (LAN/MAN), whereas cells or small fixed-size packets are widely used in synchronized ring networks. In this paper, we present an analytical method for evaluating the delay-throughput performance of a MAC protocol with multiple self-tokens in a slotted ring network under uniform traffic. In our analysis, we introduce the stationary probability, which indicates the number of packets in a node. Also, it is assumed that each node has a sufficiently large amount of self-tokens, and a slotted ring has the symmetry. The analytical results with respect to delay-throughput performance have similar values to computer simulated ones. Furthermore, in order to achieve fair access under non-uniform traffic, we propose an adaptive MAC protocol, where the number of self-tokens in a node dynamically varies, based on the number of packets transmitted within a specified period. In the proposed protocol, when the number of packets transmitted by a node within a specified period is larger than a specified threshold, the node decreases the number of self-tokens in a per-node distributed method. That results in creating free slots in the ring, thus all nodes can obtain an equal opportunity to transmit into the ring. Performance results obtained by computer simulation show that our proposed protocol can maintain throughput fairness under non-uniform traffic.

A Scheme of Improving Propagation Attack Protection and Generating Convergence Security Token using Moire (무아레를 이용한 융합 보안토큰생성과 전파공격 보호 기법)

  • Lee, Su-Yeon;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.2
    • /
    • pp.7-11
    • /
    • 2019
  • Due to diversification and popularization of devices that use rapid transmission, there are many security issues related to radio waves. As the disturbance and interference of the radio wave can cause a direct inconvenience to a life, it is a very important issue. In this paper, as a means to prevent radio disturbance and interference, the projected image of the reference grid and the deformed grid is obtained by measuring the projected $moir{\acute{e}}$ using the white light source, projecting grid and the light source, and a $moir{\acute{e}}$ pattern is generated with an image processing algorithm by applying a phase diagram algorithm, and generated $moir{\acute{e}}$ pattern phase diagram creates a three-dimensional shape. By making an encrypted token using this measured face shape, the transmission of the information through token ring is determined in order to transmit the horizontal transmission having the dynamic security characteristics which includes authentication strength and caller information, etc. And by confirming the uniqueness of the token and by sending and receiving the horizontal transmission using java serialization and deserialization function, a problem solving method is suggested.

The development of the KTX realtime control network$(Tornad^*)$ physical layer based on FPGA (FPGA기반의 KTX용 실시간 제어네트워크$(Tonard^*)$ 물리계층 개발)

  • Hwang, Seung-Kon;Park, Jae-Hyun
    • Proceedings of the KSR Conference
    • /
    • 2007.05a
    • /
    • pp.1735-1740
    • /
    • 2007
  • Communication network in KTX (Korea Train eXpress), the express train system, has to transmit status variables periodically within tens of seconds and real-time control informations which has short reply like status transition or alarm. KTX uses $Tornad^*$ (TOken Ring Network Alsthom Device) network for this purpose. This network can send and receive messages which enable express train applications embedded in intelligence boards to communicate by itself. Layer 1, 2 of $Tornad^*$ is implemented with differential manchester encoding and IEEE 802.4 standard(token bus standard) respectively. To implement layer 1 and 2, we implemented twisted pair modem using FPGA for layer 1 and used MC68824 from Motorola for layer 2. MC68824 bus arbitration and memory controller is implemented using CPLD.

  • PDF

Implementation of Network Interface Unit for Token Passing Bus Network (토큰 패싱 버스 네트워크에서의 망 접속기 구현에 관한 연구)

  • Choo, Young-Yeol;Chung, Bum-Jin;Kim, Deok-Woo;Lim, Yong-Je
    • Proceedings of the KIEE Conference
    • /
    • 1988.07a
    • /
    • pp.926-929
    • /
    • 1988
  • In this paper, the implementation of NIU (Network Interface Unit) for Token Passing Bus network is studied. The network is based on the IEEE 802.4 standard, which is the basis of MAP. IBM-PC is chosen as host station. The structure of the network and NIU is investigated and the implementation is illustrated. The logical ring constructed following the standard. Transmission and reception of data are tested. The experimental results are referred.

  • PDF

Study on Task Scheduling for Parallel Processing of Nested Loops (다중 루프문의 병렬처리를 위한 타스크 스케줄링에 관한 연구)

  • 허정연;손윤구
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.29B no.1
    • /
    • pp.11-17
    • /
    • 1992
  • This paper is to propose an analytical queuing model for parallel processing of sequential program with nested loops. The analytical results are compared with the results from the implemented multiprocessor system composed of four intel 8088 microprocessor, eight 2KB shared common memories, and a hardware token ring. At results, this study shows that the processed results are almost similar in proposed analytical model and real system. Proposed analytical model can be applied to evaluate parallel processing of sequential program with nested loops.

  • PDF