Static Flow Control in Store-And-Forward Computer

Total Page:16

File Type:pdf, Size:1020Kb

Static Flow Control in Store-And-Forward Computer IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. COM-28, NO. 2, FEBRUARY 1980 27 1 preference for throughput over delay. This parameter can be stochastic fluctuationof the system load. Numerical results are presented considered as a further control tool to limit the throughput, and it is shown that the throughput-delay performance of a network can be thedelay, the average and/orthe maximum number of improved by proper selection of the design parmeters, such as the window tokens, and to limit the destination buffer utilization (Table size, the timeout period, etc. I?) ; The numerical examples indicate that the performance of INTRODUCTION a network when token limits are selected according to the A computer network may be thought of as a collection of suboptimalpolicy determined by our heuristic solution is resources to beused by a competing population of users. very close to the performance of an optimal policy (Fig. 3). Networkresources i~cludebuffers, transmission bandwidth, Thisfigure further indicates that the performance of a processortime, name space, table entries, logical channels, periodicdecision, is very close to the optimal as long as etc.; the user population includes any source of data which the decision period is chosen properly. This property is of requires transmission through the network. The collection of significant importance in practical application, as a periodic resourceshas a limited capacity which causes conflicts to decision reduces the overhead due to the signaling of control occuramong the users of thesystem. These conflicts may packets. resultin a degradation of systemperformance to the point that the system becomes clogged and the throughput goes to REFERENCES .~ zero [ 11.This behavior is typical of “contention”systems L. Kleinrock and p. Kermani,“Static flow control in store-and-forward in which the throughput will increase with the applied load computer networks,” IEEE Trans. Cornmun., this issue,pp. 271-279. P.Kermani, “Switching and flow control techniques in computer up to some optimum value, beyond which, due to unpredict- communicationnetworks,” Comput. Sci. Dep., Univ. Calif., Los ablebehavior by users and servers and additional user-user Angeles,UCLA-ENG-7802, Feb. 1978 ($so publishedas Ph.D. and user-server interactionand overhead, more load causes dissertation, Dec. 1977). areduction in throughput [2] .I Networkscannot afford to [31 A. Giessler, J. Haenle, A. Koenig, andE. Pade, “Packet networks with accept all thetraffic that isoffered without control; there deadlock-freebuffer allocation, an investigation by simulation,” Compur. Neworks, vol. 2, pp. 191-208, July 1978. mustbe rules which govern the acceptance of traffic from [41 L. Kleinrock, “Power and deterministicrules of thumb for probabilistic outsideand coordinate the flow inside the network. These problemsin computer communications,” in Proc. Inr. Cortf: on rules are commonly known as fZow.contro2 procedures. More Cotnmun., Boston, MA, June 1979, pp. 43.I. 143.I. 10. preciselyflow control is the set of mechanismswhereby a R. Howard, DynamicProgrumming and Markov Processes. Cambridge,MA: MIT, 1960. flow of data can be maintained within limits ‘compatible with B. L. Miller, “Dispatching from depot repair in a recoverableitem the amount of available resources [ 31 . ’ inventory system: On the optimality of a heuristic rule,” Munagemenr In order to keep the network traffic within desirable limits, Sci., vol. 21, pp. 316325, Nov. 1974. flow control procedures, among other things, must be equipped A. F. Veinott, Jr.,’ “The status of mathematicalinventory theory,” Munugernent Sci., vol. 2, pp. 745-777, July 1966. quippedwith throttling mechanisms. These mechanisms D. Blackwell, “Discrete dynamic programming,” Ann. Math. Sruris., include: credit (or tokens), which give permission for message VOI. 33, pp. 719-726, 1962. flow; a rate at which a given flow may proceed; a stop-andgo M. J. Sobel, “Optimal operation of queues,” in Marhemaricul Methods procedure which turns a flow on and off according to some in Queueing. Berlin: Springer-Verlag, 1974, pp. 231-261. criteria;the introduction of delay, so asto slowdown the flow,etc. [3]. A windowmechanism is an example of the credit scheme. Existing control methods in store-and-forward communica- tionnets can be classifiedas eitherlocal control or global control.Local control is appliedby a communication pro- Static Flow Control in Store-and-Forward ComputerNetworks cessor within the subnet OD the basis of its own as well as its immediateneighbors’ traffic data and resource utilization. Due tosome limitations [4], [ 51,local control is not,by LEONARD KLEINROCK, FELLOW, IEEE, AND PARVIZ KERMANI itself, sufficient to prevent congestion, and global control is necessary in order to further stop the input to the network Abstract-In this paper we develop an analytic model for end-to-end well before the network is loaded to saturation.’%his control communication protocols and studythe window mechanism for flow canbe accomplished by limiting the number of packets control in store-and-forward (inparticular message-switching) computer- simultaneouslycontained in the network. Examples of the based communication networks.We develop a static flow control model in existing methods ~f global flow control are: isarithmic flow which the parameters of the system are not dynamically adjusted to the control[4] studied for the NPL network;and end-toend flowcontrol ([6] andthe references therein] ) used inthe ARPANET,where, basically, the total number of credits Paper approved by the Editor for Computer Communication of the IEEE Communications Society for publication without oral presenta- between two users are limited. tion. Manuscript received June 13, 1978; revised June 27, 1979. This Most end-tolend flow control mechanisms use a variant of work was supported by the Advanced Research Projects Agency of the thecredit throttling technique and are usually described in Department of Defense under Contract MDA 903-77-CO272. terms of awindow mechanism [7], wherethe unacknowl- P. Kermani was with the Deqartment of Computer Science, Univer- edged messages (or packets) are limited to lie within a sliding sityof California, Los Angeles, CA 90024. Heis now with the IBM Thomas J. Watson Research Center, Yorktown Heights, NY 10598. window. L. Kleinrock is with the Department of Computer Science, Univer- End-to-endflow control is accomplished through inter- sity of California, Los Angeles, CA 90024. process communication protocols and any attempt to quanti- 0090-6778/80/0200-0271$00.75 @ 1980 IEEE tatiVelY studythe former should start with the development A ? ofan analytic model for the latter. Due to thecomplex DESTINATION CONTROLLER multivariate environment of these distributed dynamic control procedures,to date little work has been done in evaluating NETWORK the performance of flow' control procedures in terms of their 1 efficiencyand freedom from deadlock and degradation. In I I I I NETWORK NETWORK view of this, the recent work in the field has been extremely BOUNDARY BOUNDARY welcome [ 81 -[ 151. The purpose of this paper is to develop an analytic model Fig. 1. Structure of a network. forend-to-end communication protocols and to study the tokenmechanism forflow control store-and-forwardin computer based communication networks (we will be mainly concernedwith message- and packet-switching systems). We first develop a static flow control model in which the param- eters of the system are not dynamically adjusted to the sto- chastic fluctuations of the system load. We then present nu- merical results to show the effect of different parameters on the overall performance of the system. We use the static 'flow controlresults in a subsequent paper to develop a dynamic flow control system. Theanalysis carried out in thispaper is basedon many simplifyingassumptions. We considerthe calculations as an initial step towards a better understanding of more complex and more elaborate systems. It is believed that such a study is necessary even if it is based on idealized assumptions. RECEIVER (SUB) & 11. THE MODEL AND THE ASSUMPTIONS In this section we develop an analytic model for a network inwhich messages are flow cpntrolled with a token mecha- nism. We begin by describing the structure of the network and itscomponents. We thenelaborate on the assumptions in- volved in our analysis, and finally we present the analysis. A. Structure of' The Network regardingthe implications encountered in theexact analysis With a credit mechanism using tokens, the total number of the interested reader is referred to [ 131 ). messagesin the network between a source-destination pair A detailed specification of the structure of the subnetwork is restricted to a maximum value. We model the network as is not the object of our study; we view the subnetwork as a in Fig. 1, in whichthe traffic controller (TC) is responsible source of randomdelay which we choose torepresent by a for keeping the number of unacknowledgedmessages below properdistribution function (which will bediscussed in w, the limit on the number of tokens (we occasionally refer Section 11-B below). to w as the token limit). Fig.2(b) shows the structure of the -destination node. The structure of the TC is further elaborated in Fig. 2(a). Be'cause ofour requirement that the TC must receive an We maythink of a circulating pool of w "tokens,"each of ACK forthe last (re)transmitted message, tGe. destination which permits exactly one message to be accepted to the net- node may receive multiple copies
Recommended publications
  • Lecture 8: Overview of Computer Networking Roadmap
    Lecture 8: Overview of Computer Networking Slides adapted from those of Computer Networking: A Top Down Approach, 5th edition. Jim Kurose, Keith Ross, Addison-Wesley, April 2009. Roadmap ! what’s the Internet? ! network edge: hosts, access net ! network core: packet/circuit switching, Internet structure ! performance: loss, delay, throughput ! media distribution: UDP, TCP/IP 1 What’s the Internet: “nuts and bolts” view PC ! millions of connected Mobile network computing devices: server Global ISP hosts = end systems wireless laptop " running network apps cellular handheld Home network ! communication links Regional ISP " fiber, copper, radio, satellite access " points transmission rate = bandwidth Institutional network wired links ! routers: forward packets (chunks of router data) What’s the Internet: “nuts and bolts” view ! protocols control sending, receiving Mobile network of msgs Global ISP " e.g., TCP, IP, HTTP, Skype, Ethernet ! Internet: “network of networks” Home network " loosely hierarchical Regional ISP " public Internet versus private intranet Institutional network ! Internet standards " RFC: Request for comments " IETF: Internet Engineering Task Force 2 A closer look at network structure: ! network edge: applications and hosts ! access networks, physical media: wired, wireless communication links ! network core: " interconnected routers " network of networks The network edge: ! end systems (hosts): " run application programs " e.g. Web, email " at “edge of network” peer-peer ! client/server model " client host requests, receives
    [Show full text]
  • QUESTION 20-1/2 Examination of Access Technologies for Broadband Communications
    International Telecommunication Union QUESTION 20-1/2 Examination of access technologies for broadband communications ITU-D STUDY GROUP 2 3rd STUDY PERIOD (2002-2006) Report on broadband access technologies eport on broadband access technologies QUESTION 20-1/2 R International Telecommunication Union ITU-D THE STUDY GROUPS OF ITU-D The ITU-D Study Groups were set up in accordance with Resolutions 2 of the World Tele- communication Development Conference (WTDC) held in Buenos Aires, Argentina, in 1994. For the period 2002-2006, Study Group 1 is entrusted with the study of seven Questions in the field of telecommunication development strategies and policies. Study Group 2 is entrusted with the study of eleven Questions in the field of development and management of telecommunication services and networks. For this period, in order to respond as quickly as possible to the concerns of developing countries, instead of being approved during the WTDC, the output of each Question is published as and when it is ready. For further information: Please contact Ms Alessandra PILERI Telecommunication Development Bureau (BDT) ITU Place des Nations CH-1211 GENEVA 20 Switzerland Telephone: +41 22 730 6698 Fax: +41 22 730 5484 E-mail: [email protected] Free download: www.itu.int/ITU-D/study_groups/index.html Electronic Bookshop of ITU: www.itu.int/publications © ITU 2006 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. International Telecommunication Union QUESTION 20-1/2 Examination of access technologies for broadband communications ITU-D STUDY GROUP 2 3rd STUDY PERIOD (2002-2006) Report on broadband access technologies DISCLAIMER This report has been prepared by many volunteers from different Administrations and companies.
    [Show full text]
  • Wang Systems Networking VS Network Core (Standard Components) Software Bulletin Release 8.21 Release 8.30
    ... ·.·,:·:··.···'Wang Systems Networkiitg VS Network Core (Standard Components) Software Bulletin Release 8.21 Release 8.30 .. ' ~ t -..~ ~. ·.J. ~ \~ --- ..,·I Wang Systems Networking VS Network Core (Standard Components) Software Bulletin Release 8.21 Release 8.30 1st Edition - July 1986 Copyright c Wang Laboratories, Inc., 1986 71 S-0542.01 i\'14§• WANG LABORATORIES, INC. ONE INDUSTRIAL AVE., LOWELL, MA 01851 TEL. (617) 459-5000, TWX 710-343-6769, TELEX 94-7421 Disclaimer of Warranties and Limitation of Liabilities The staff of Wang Laboratories, Inc., has taken due care in preparing this manual. How­ ever, nothing contained herein modifies or alters in any way the standard terms and conditions of the Wang purchase, lease, or license agreement by which the product was acquired, nor increases in any way Wang's liability to the customer. In no event shall Wang or its subsidiaries be liable for incidental or consequential damages in connection with or arising from the use of the product, the accompanying manual, or any related materials. Software Notice All Wang Program Products (software) are licensed to customers in accordance with the terms and conditions of the Wang Standard Software License. No title or ownership of Wang software is transferred, and any use of the software beyond the terms of the aforesaid license, without the written authorization of Wang, is prohibited. Warning This equipment generates, uses, and can radiate radio frequency energy and, if not ,~ installed and used in accordance with the instructions manual, may cause interference to radio communications. It has been tested and found to comply with the limits for a Class A computing device, pursuant to Subpart J of Part 15 of FCC rules, which are designed to provide reasonable protection against such interference when operated in a commercial environment.
    [Show full text]
  • Telemedicine and Rural Health Care Applications 
    Symposium www.jpgmonline.com TTelemedicine elemedicine and Rural Health Care Applications Smith AC, Bensink M, Armfield N, Stillman J, Caffery L The University of ABSTRACTABSTRACTA ABSTRACTABSTRACTBSTRACT Queensland, Centre for Telemedicine has the potential to help facilitate the delivery of health services to rural areas. In the right Online Health, Australia. circumstances, telemedicine may also be useful for the delivery of education and teaching programmes and Correspondence: the facilitation of administrative meetings. In this paper reference is made to a variety of telemedicine applications Anthony C. Smith, in Australia and other countries including telepaediatrics, home telehealth, critical care telemedicine for new E-mail: [email protected] born babies, telemedicine in developing countries, health screening via e-mail, and teleradiology. These applications represent some of the broad range of telemedicine applications possible. An overriding imperative is to focus on the clinical problem first with careful consideration given to the significant organisational changes which are associated with the introduction of a new service or alternative method of service delivery. For telemedicine to be effective it is also important that all sites involved are adequately resourced in terms of staff, equipment, telecommunications, technical support and training. In addition, there are a number of logistical factors which are important when considering the development of a telemedicine service including site selection, clinician empowerment,
    [Show full text]
  • Introduction to Data Communications & Networks What Is Data Communication?
    LECTURE-1 Introduction to Data Communications & Networks What is data communication? Not to be confused with telecommunication— ◦ Any process that permits the passage from a sender to one or more receivers of information of any nature, delivered in any easy to use form by any electromagnetic system. What is data communication? Data communication- ◦ Defined as a subset of telecommunication involving the transmission of data to and from computers and components of computer systems. More specifically data communication is transmitted via mediums such as wires, coaxial cables, fiber optics, or radiated electromagnetic waves such as broadcast radio, infrared light, microwaves, and satellites. History of Telecommunications Invention of telegraph Samuel Morse – 1837 Invention of telephone- Alexander Graham Bell – 1876 Development of wireless – 1896 Concept of universal access and growth of AT&T (American Telephone & Telegraph) - 1983 History of Telecommunications Continued…. Telecommunications Act of 1996 Three main developments that led to the growth of data communications systems: ◦ Large-scale integration of circuits reduced the cost and size of terminals and communication equipment ◦ Developments of software systems made establishment of communication networks easy ◦ Competition among providers of transmission facilities reduced the cost of data circuits History of Data Communication Transistor developed by Bell Labs Hush-a-Phone Case Carterfone case MCI (Microwave Communications Inc.) and Long Distance Creation of networks (LAN’s and WAN’s) Data Link Protocols Microcomputers Hush-a-Phone Case The Hush-A-Phone was a device designed to attach to the transmitter of a telephone to reduce noise pollution and increase privacy. A voice silencer designed for confidential conversation, clear transmission and office quiet.
    [Show full text]
  • 1 China's CSNET Connection 1987 – Origin of the China Academic
    China’s CSNET Connection 1987 – origin of the China Academic Network CANET by Werner Zorn (29.06.2012, 23:00/10.07.2012) Hasso-Plattner-Institute at Potsdam University/KIT - Karlsruhe Institute of Technology The Chinese – German computer network cooperation, leading to the E-Mail “Across the Great Wall we can reach every corner in the world” on Sep. 14, 1987, had its origin in a World Bank project 1982, out of which 19 Chinese universities were equipped with SIEMENS computers. Prof. Wang Yunfeng, being the lead of that project from the university side, renewed his contacts to the German scientific- technical community from the 1940ies, as he studied machinery in Berlin as scholar of the Humboldt foundation. The important milestones within our cooperation are listed in the following timeline, chosen under the aspect that, if not successfully reached, the project itself would have ended at that point unconditionally. An explanation strictly following the timeline might be boring and also unnecessary with respect to the available literature [1]. It was therefore decided to comment and emphasize selected items under the following aspects: The key note speech in 09/1983 about the newly launched DFN-project in Germany immediately raised the request from the audience of not only telling but also supporting the participating institutes and scientists in building up similar network infrastructures and services in China. This whole issue took place at a time, where such networks did not exist in Germany, nor elsewhere in Europe, and regarding the underlying OSI-architecture and protocols nowhere in the world, not even in US.
    [Show full text]
  • Module 2 Communication Switching
    Module 2 Communication Switching Version 1 ECE , IIT Kharagpur Lesson 3 Message and Packet Switching Version 1 ECE , IIT Kharagpur LESSON OBJECTIVE General This lesson will develop the concepts of message and packet switching. Specific The learner shall be able to 1. Understand what are Message and Packet switching. 2. Know the application of Packet switching. 3. Know statistical multiplexing and its usefulness. 2.2.1 MESSAGE SWITCHING It has been explained earlier that switching plays a very important role in telecommunication networks. It enables any two users to communicate with each other. Voice being a very vital medium of human communication, telephone was invented. It permitted long distance voice communication. The need of a user to talk to a desired person out of many persons on a real time basis lead to the concept of establishing a direct path between the caller and the called users. Circuit switching was conceived to be an appropriate technique for the purpose. Telephone systems use circuit switching largely to date because it serves the purpose very well. However, a major drawback of circuit switching is the requirement of a dedicated path between the calling and the called parties. This means reserving resources like the chain of switches and transmission media over the entire path. This is obviously a costly proposition. A question arises : is there a cheaper solution? It took quite some time – many years to get the answer. However, it is interesting to know that electrical communication in the form of Telegraph arrived earlier than the Telephone. Further, telegraph was much cheaper than telephone communication.
    [Show full text]
  • The Road to Telehealth
    THE ROAD TO TELEHEALTH Kathy J. Chorba Executive Director [email protected] What Is Telemedicine? Direct clinical care provided from a distance using electronic communication to provide or support clinical care What Is Telehealth? Telehealth is a more global term, which includes Telemedicine and other uses of communication technology • Health Professional Education • Disaster Response • Public Health • Consumer Education • Evaluation Research • Regional Health Information Sharing Telemedicine Technologies • Live video is used for real-time patient-provider consultations, provider-to-provider discussions, and language translation services. • Store & Forward technologies electronically transmit patient information between primary care providers and medical specialists. Information could include digital images, X-rays, video clips and photos. • Remote patient monitoring uses telehealth technologies to collect medical data from patients in one location and electronically transmit that information to health care providers in a different location, real-time and/or store & forward. Live Video Teleconsultation Live Video is used for real-time patient-provider consultations, provider-to-provider discussions, and language translation services. High-speed broadband Outpatient or Inpatient specialty consultation “The Primary Care Provider can’t be an expert in every field” Javeed Siddiqui, MD, Infectious Disease Specialist Telehealth specialty Referring •Education catered to the consultation gives individual needs Provider •Reduced Isolation
    [Show full text]
  • The Project the Project IP Contribution at Work Now and in the Future
    TheThe ProjectProject IPIP contributioncontribution atat workwork NowNow andand inin thethe futurefuture Abdelrahim Suleiman ASBU Technical Director Jean-Pierre De Muyt VP Sales Newtec Agenda •The drivers • What it is now • The network opening up • The technology •Future roadmap ASBU : The next generation network This presentation outlines the implementation of the new ASBU Network based on the latest advanced technologies. MENOS Network (Multimedia Exchange Network Over Satellite), as first of its kind, enables new business models and create tremendous opportunities for the ASBU members and all potential users in the value chain of satellite networks. ASBU Broadcasters challenges • Multi-channel, multi-platform universe — requires massive investment to keep pace • Cost of current generation Audio- and TV Earth Station • Cost of keeping up with technology CAPEX changes (DVB-S2, MPEG-4) and • New service demands (VoIP, Store & Forward, Archiving, File Exchange, E-mail, Internet Access, …) • Complexity of managing multiple networks & technologies • Cost-efficient exchange of data, voice, audio OPEX and video • Supporting a broad range of TX bit rates • Careful manual planning & coordination of transmissions in pre-defined satellite slots • Control & Manage multitude of services (Video, Audio, Data, Tel., Intranet, …) ASBU Key Advantages • Easy to use terminals –Always on –Automated • Lower terminal cost –Small, low power –IP based • Higher flexibility – Multiplexing of all services over IP • Lower operational cost – Better use of space capacity
    [Show full text]
  • Telemedicine in College Health: Pre-Travel Consultations
    Telemedicine in College Health: Pre‐travel consultations Bill Neighbor, MD and Anne Terry, ARNP Objectives 1. To identify potential uses for telemedicine services within a clinical system focused on college health 2. To understand how to implement a telemedicine program 3. To understand reimbursement for telemedicine services Purpose • Our purpose is to ensure that clinicians providing health care to college students are aware that telemedicine services can be utilized. Overview Terminology • Telehealth—larger umbrella including telenursing, telepharmacy • Telemedicine=delivery of medical care Types of Telehealth • Asynchronous=Store and Forward, e.g., E‐care • Synchronous=Interactive in real time • Remote monitoring=data gathered from devices stored in EHR • Case‐based teleconferencing • Mobile health—uses mobile devices Examples of use by specialty • Radiology—half of all telehealth • Trauma • Dermatology • Preventive health services (exercise, nutrition, weight, tobacco) • Mental Health • Diabetes • Stroke • Prison Health • Burns • Community Health Services, .e.g, • Pain management Extension for Community Health Outcomes (ECHO) at UW Why Telehealth • Access • Low‐value in office visits • Cost of care in dollars • Technologies becoming less expensive • Cost of care in patient time and tavel • High mobile phone use • Cost of care in facilities • Potential for greater patient • Lost work time involvement in their own care (eg. mobile apps) • Coordination of care & health outcomes Barriers • Reimbursement • Security and Privacy • Privileging
    [Show full text]
  • Circuit Switching
    Circuit Switching Network resources (e.g., bandwidth) divided into “pieces” Pieces allocated to and reserved for calls Computer Networks Resource idle if not used by owner (no sharing) Ways to divide link bandwidth into “pieces” • frequency division multiplexing (FDM) frequency Example: Lecture 36: 4 users time QoS, Priority Queueing, VC, WFQ • time division multiplexing (TDM) frequency time Packet Switching Bandwidth division into “pieces” Packet Switching: Dedicated allocation Each end-to-end data stream Resource reservation Statistical Multiplexing divided into packets 10 Mbps C Packets from multiple users share network resources A Ethernet statistical multiplexing Each packet uses full link bandwidth B 1.5 Mbps Resources used as needed queue of packets waiting for output Resource contention: link • aggregate resource demand can exceed amount available D • congestion: packets queued, wait for link use E • store and forward: packets move one hop at a time Sequence of A’s and B’s packets does not have a fixed • each node receives complete packet before forwarding pattern ⇒ statistical multiplexing Packet vs. Circuit Switching Pros and Cons of Packet Switching Packet switching allows more users to use network! Advantages: great for bursty data • resource sharing For example: • simpler, no call setup • 1 Mbps link • each user: • sends 100 kbps when “active” Disadvantages: excessive congestion, N users • active 10% of time 1 Mbps link packet delay and loss • protocols needed for reliable data transfer circuit-switching: 10 users • congestion control • no service guarantee: “best-effort” service packet switching: with 35 users, probability that more than 10 are active at the same time < .0004 Better than Best-Effort Service Example: HTTP vs.
    [Show full text]
  • Telehealth Laws State & Reimbursement Policies
    FALL 2019 FALL STATE TELEHEALTH LAWS & REIMBURSEMENT POLICIES A COMPREHENSIVE SCAN OF THE 50 STATES & THE DISTRICT OF COLUMBIA & THE DISTRICT OF THE 50 STATES SCAN A COMPREHENSIVE State Telehealth Laws and Medicaid Program Policies INTRODUCTION The Center for Connected Health Policy’s (CCHP) Fall 2019 release of the “State Telehealth Laws and Reimbursement Policies” report highlights the changes that have taken place in state telehealth policy. The report offers policymakers, health advocates, and other interested health care professionals a summary guide of telehealth-related policies, laws, and regulations for all 50 states and the District of Columbia. While this guide focuses primarily on Medicaid fee-for-service policies, information on managed care is noted in the report if it was available. The report also notes particular areas where we were unable to find information. Every effort was made to capture the most recent policy language in each state as of September 2019. Recently passed legislation and regulation have also been included in this version of the document with their effective date noted in the report (if applicable). This information also is available electronically in the form of an interactive map and search tool accessible on our website cchpca.org. Consistent with previous editions, the information will be updated biannually, as laws, regulations and administrative policies are constantly changing. TELEHEALTH POLICY TRENDS States continue to refine and expand their telehealth reimbursement policies though they are not treated across the board in the same manner as in-person delivered services. Limitations in regards to reimbursable modality, services and location of the patient continue to be seen.
    [Show full text]