• 제목/요약/키워드: token ring network

Search Result 23, Processing Time 0.027 seconds

LAN 대용으로서의 ISPBX-LAN 성능분석

  • 김지중
    • Information and Communications Magazine
    • /
    • v.10 no.12
    • /
    • pp.59-70
    • /
    • 1993
  • 본 논문은 독일 Hamburg대학에서 필자가 수행한 연구 프로젝트인 DFN(Deutsches Forschungsnetz)-Application over ISDN의 일부로서 분산된 Resource의 공유를 위해 ISPBX(ISDN능력을 가진 PABX)를 이용한 근거리 ISDN-PC-Network(ISPBX-LAN)과 이것을 효율적 활용을 위한 단기접속모드(Short Hold Mode)를 소개하고, ISPBX-LAN의 성능을 사용자의 입장에서 기존의 LAN(Ethernet, Token-Ring)과 비교분석하였다.

  • PDF

Simultaneous Burst and Burst Control Packet Transmission Protocol for Optical Burst Switching Ring Networks

  • Park, Joon-Pyo;Lee, Man-Seop
    • ETRI Journal
    • /
    • v.29 no.1
    • /
    • pp.116-119
    • /
    • 2007
  • In this letter, we design a collision resolution protocol for optical burst switching ring networks to avoid burst collision. We define the offset time condition for no burst transmission collision and manage the free time list of nodes for no burst reception collision. In order to improve the throughput, we use a fiber delay line, void-filling, and void-compression. This protocol does not require any additional procedures for bandwidth reservation such as centralized assignment of bandwidth, lightpath setup of WDM ring networks, or token capturing for the burst transmission. The simulation results show that the proposed protocol can achieve high throughput while saving 70% of wavelengths when compared to round robin with random selection, round robin with persistent, and round robin with non-persistent with only destination delay.

  • PDF

Approximate Analysis of MAC Protocol with Multiple Self-tokens in a Slotted Ring

  • Sakuta, Makoto;Sasase, Iwao
    • Journal of Communications and Networks
    • /
    • v.5 no.3
    • /
    • pp.249-257
    • /
    • 2003
  • Ring networks are very commonly exploited among local area and metropolitan area networks (LAN/MAN), whereas cells or small fixed-size packets are widely used in synchronized ring networks. In this paper, we present an analytical method for evaluating the delay-throughput performance of a MAC protocol with multiple self-tokens in a slotted ring network under uniform traffic. In our analysis, we introduce the stationary probability, which indicates the number of packets in a node. Also, it is assumed that each node has a sufficiently large amount of self-tokens, and a slotted ring has the symmetry. The analytical results with respect to delay-throughput performance have similar values to computer simulated ones. Furthermore, in order to achieve fair access under non-uniform traffic, we propose an adaptive MAC protocol, where the number of self-tokens in a node dynamically varies, based on the number of packets transmitted within a specified period. In the proposed protocol, when the number of packets transmitted by a node within a specified period is larger than a specified threshold, the node decreases the number of self-tokens in a per-node distributed method. That results in creating free slots in the ring, thus all nodes can obtain an equal opportunity to transmit into the ring. Performance results obtained by computer simulation show that our proposed protocol can maintain throughput fairness under non-uniform traffic.

A Study on the Development of Star Type LAN (Star형 근거리 통신망 개발에 관한 연구)

  • 유황빈;이대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.13 no.2
    • /
    • pp.160-170
    • /
    • 1988
  • This paper describes the outboard NIU(Network Interface Unit) using microprocessor and the hardware and software of concentrator for constructing star typed LAN(Local Area Network) based on token ring method. The NIU adapter can adapter up to four parallel and serial typed terminals. Because it has PAD function on input output data, any type of terminals can be adapted. Since the concentrator has logical switching circuit which enables data to bypass the faulted NIU adapter, this network prevents communication break. When user transmits and receives data, the concentrator constructs star typed LAN which connct both transmitting and receiving sides. A s result, this network eliminated ring latency time in other NIU exculding transmitting and receiving NIU. So the throughput of this LAN is increased. Because this LAN system consists of several modultes according to it's function, the expansion of function or the modification of method is easy.

  • PDF

Design for an Efficient Architecture for a Reflective Memory System and its Implementation

  • Baek, Il-Joo;Shin, Soo-Young;Choi, Jae-Young;Park, Tae-Rim;Kwon, Wook-Hyun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1767-1770
    • /
    • 2003
  • This paper proposes an efficient network architecture for reflective memory system (RMS). Using this architecture, the time for broadcasting a shared-data to all nodes can be significantly shortened. The device named topology conversion switch (TCS) is implemented to realize the network architecture. The implemented TCS is applied to the ethernet based real time control network (ERCnet) to evaluate the performance.

  • PDF

A Study on the Intergrated Voice/Data transmission Algorithm characteristics on Local Area Network (유선 LAN상의 음성/데이타 혼합전송 알고리즘 특성에 관한 연구)

  • 김동일
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.1 no.2
    • /
    • pp.137-143
    • /
    • 1997
  • From now on, the network is being developed into PSTN(public switched telephone network) and PDN(public data network), that is depend on the form of data. The former one pursues sending voice, and the latter one pursues sending data. But it causes big loss of the economy and efficiency. So, ISDN, processing voice and data at same time, gives a big profit to user. To enlarge the ISDN at the narrow area, it is necessary that study to send the mixture form of voice and data in LAN environment. So, this paper proposes the algorithm about the mixture form of voice and data in ethernet and token-ring. that is widely used in these days.

  • PDF

COMNAS : Performance Analysis Tool for Communication Networks (COMNAS : 통신망에 대한 성능분석 도구)

  • 김명희
    • Journal of the Korea Society for Simulation
    • /
    • v.3 no.1
    • /
    • pp.115-124
    • /
    • 1994
  • In this paper, we have developed a performance analysis tool for communication networks called COMNAS. COMNAS analyses the performance of wide area networks such as Korea Educational Network and Korea Research Environment Open Network which include local area networks such as Ethernet and Token Ring. COMNAS consists of model constructor, simulation implementor, output analyzer and user interface. Attributes of communication networks for modeling either have default values or are entered by user as object units, and implementation of simulation is automatically proceeded by user interface. Ouput results obtained by COMNAS are the status of node, link and entire network such as mean message transmission delay, throughput, utilization, and so on, and they can be selectively obtained upon the request of the user.

  • PDF

Research on data analysis method of KTX TORNAD network system (고속열차(KTX)의 TORNAD 네트워크시스템 데이터 분석방법 연구)

  • Kim, Hyeong-In;Jung, Sung-Youn;Kim, Hyun-Shik;Jung, Do-Won;Kim, Han-Dou
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1032-1038
    • /
    • 2008
  • KTX train system is composed of TORNAD* network for transmitting information of train's internal equipments and OBCS which proceed information within train. OBCS of one trainset consisted of 28 equipments takes intelligent and dynamic composition according to equipment handling, train command and control flow. Each OBCS which is installed within trainset handle and supervise mutually action information about equipments, transmit it to driver to transmit information about train operation and preventive management. This mutual supervision and information transmission use KTX TORNAD* network system. TORNAD* network system is the one which is uniquely developped by GEC ALSTHOM, the KTX trainset manafacturing provider and this field is excluded from technical know-how transfer item. Through the research on analysis method of KTX TORNAD* system data structure which is operating on Seoul-Pusan Line, I hope that this thesis can contribute to train network system's standardization after applying it to improvement of train network system maintenance, enhancing quality of train service and applying it to future Korean rolling stock network system development.

  • PDF

Performance Improvement of IPCS : A Middleware for Warship Combat Systems (함정전투시스템 미들웨어 IPCS의 성능 개선)

  • Ryu, Won-Jae;Shin, Soo-Young;Heo, Seong-Gil;Choi, Yoon-Seok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.5
    • /
    • pp.659-665
    • /
    • 2013
  • IPCS(Inter Process Communication Service) is a real-time communication middleware designed for warship combat battle systems based on publisher-subscriber communication model. Because IPCS was originally designed to operated under 100 Mbps network environment, increasing network speed into Gigabit environment does not linearly increase the throughput of IPCS. To solve this problem, we anaylized IPCS structure and optimized IPCS into Gigabit-Ethernet environment. We found parameters to improve IPCS based on UDP and Token-ring structure. By improving, IPCS has reliability and higher throughput than TCP although IPCS is based on UDP.

A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks (군집 드론망을 통한 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.897-908
    • /
    • 2018
  • In this paper, we propose a security framework for a cluster drones network using the MAVLink (Micro Air Vehicle Link) application protocol based on FANET (Flying Ad-hoc Network), which is composed of ad-hoc networks with multiple drones for IoT services such as remote sensing or disaster monitoring. Here, the drones belonging to the cluster construct a FANET network acting as WTRP (Wireless Token Ring Protocol) MAC protocol. Under this network environment, we propose an efficient algorithm applying the Lightweight Encryption Algorithm (LEA) to the CTR (Counter) operation mode of WPA2 (WiFi Protected Access 2) to encrypt the transmitted data through the MAVLink application. And we study how to apply LEA based on CBC (Cipher Block Chaining) operation mode used in WPA2 for message security tag generation. In addition, a modified Diffie-Hellman key exchange method is approached to generate a new key used for encryption and security tag generation. The proposed method and similar methods are compared and analyzed in terms of efficiency.