Copyright Warning & Restrictions

The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material.

Under certain conditions specified in the law, libraries and archives are authorized to furnish a photocopy or other reproduction. One of these specified conditions is that the photocopy or reproduction is not to be “used for any purpose other than private study, scholarship, or research.” If a, user makes a request for, or later uses, a photocopy or reproduction for purposes in excess of “fair use” that user may be liable for copyright infringement,

This institution reserves the right to refuse to accept a copying order if, in its judgment, fulfillment of the order would involve violation of copyright law.

Please Note: The author retains the copyright while the New Jersey Institute of Technology reserves the right to distribute this thesis or dissertation

Printing note: If you do not wish to print this page, then select “Pages from: first page # to: last page #” on the print dialog screen

The Van Houten library has removed some of the personal information and all signatures from the approval page and biographical sketches of theses and dissertations in order to protect the identity of NJIT graduates and faculty.

TOKEN BUS LAN PERFORMANCE: MODELING AND SIMULATION

y AMES KUOO

esis sumie o e acuy o e Gauae scoo o e ew esey Isiue O ecoogy i aia uime o e equieme o e egee o Mase o Sciece i Eecica Egieeig auay 199 APPROVAL SHEET

Title of Thesis: Token Bus LAN Performance: Modeling and Simulation.

Name of the Candidate: Ramesh Kurnool Master of Science in Electrical Engineering, 1990.

Thesis Approved :

Dr. Anthony Robbi Date Associate Professor Electrical Engineering

Dr. C. N. Manikopoulos Date Associate Professor Electrical Engineering

Dr. Irving Wang Date Associate Professor Electrical Engineering IA

ame ames Kuoo

egee a ae o e Coee MSEE 199

Secoay Eucaio Goeme uio Coege Kuoo A Iia

Coegiae Isiuios Aee ae egee

ew esey Isiue o ecoogy 9/7-1/9 MSEE

Coege o Egg Uiesiy /-11/ E

Mao Eecica Egieeig

Mio Comue Sysems ABSTRACT

ie o esis oke us A eomace Moeig a Simuaio ames Kuoo Mase o Sciece 199 esis iece y oesso Aoy ai

A simuaio moe ase o CSIM a ocess oiee simuae aguage o aaye e eomace o e oke us ooco is eeoe eomace measues suc as ougu aeage eay a maimum eay e acke ae esee Sysem eomace is aaye o iee oas ume o saios ewok egs iee ysica a ogica isiuio o e saios wi acke eg as a aamee eious suies wee ase o e eay-ougu aaysis wi o iscussio o e eec o aiaio o e ogica a ysica isiuio o e saios o e eomace o e moe wic is oe i e ese esis e oa is oee o e ewok i e om o a seam o aa ackes wi uiomy isiue ie-aia imes A comaiso o e oke us moe wi a o a CSMA/C moe sows a e ysica isiuio o e saios as a miimum eec o e eomace o e moe i e case o e oke us moe u as a cosieae eec o a o e CSMA/C moe ACKNOWLEDGMENTS

I wish to express my sincere gratitude to Dr. Anthony Robbi for his valuable guidance, inspiration and encouragement during the entire course of this thesis. I am deeply indebted to Mrs. Perkins, Miss. Sandra Huffman, Miss.

Susana Saldarriaga and Mr. Bill Bowman at Document Preparation Centre for all their willful help and support. Furthermore, I would like to acknowledge the

Computer Aided Engineering Laboratory and the staff for providing the resources vital for the thesis work. Last, but certainly not the least I am indebted to my room partners Mr. Pratap Pasupuleti and Mr.Nanda Kanuri and my parents for their constant moral support, valuable guidance and encouragement. TABLE OF CONTENTS

CHAPTER Page I INTRODUCTION 1 II PROTOCOL AND MODEL DESCRIPTION 11

III SIMULATION DESIGN AND EXPERIMENTS 26 IV SIMULATION RESULTS 36 V COMPARATIVE PERFORMANCE WITH CSMA/CD MODEL . . . . 54 VI COMPARATIVE RESULTS FROM ANALYTICAL AND SIMULATION STUDIES 62 VII CONCLUSIONS 66

APPENDIX A

CSIM AND SOURCE LISTING OF SIMULATOR 68 REFERENCES 81 1

CHAPTER I INTRODUCTION

The design, installation, and operation of computer networks is vital to the functioning of modem computerized organizations. Over the past decade, complex and diverse networks have been established, trying together mainframes, minicomputers, personal computers, terminals, and other devices, such as communications controllers and cluster controllers [1]. Many of today's networks use public facilities to provide users with access to the processing capabilities and data storage facilities associated with the mainframes and to permit fast interchange of information among the users of the network. As the cost of micro electronic devices has dropped, the intelligence in the various devices that are attached to the network has increased. Intelligent terminals, minicomputers, personal computers, and other programmable devices are all part of these large networks. These networks

are called wide area networks (WANS). In parallel with the growth of wide area networks, there has been another area of expansion in the use of computing facilities. Personal computers have spread rapidly and widely throughout organizations. As the use of personal computers has grown, so has grown a need for these personal computers to communicate-with each other and with the larger, centralized data processing facilities of the organization. In order to make this feasible a type of networking technology known as (LAN) has been developed. A local area network is a communications network that provides iecoecio o a aiey o eices wii a sma aea ese aa commuicaig eices ae oe cae as oes o Saios [5] A e u o is ecae e isae ase wowie sou e i ecess o wo miio As I is eeoe ecomig moe a moe imoa o ewok esiges o eauae e aiiy o As a use aious commuicaio oocos o ae e esie message oas ume o saios a esie eg o e ewok I is ue imoa o ae a geea sceme o moeig a simuaio o ese oocos wic ca e use o assess e eomace o ew oocos

A. Local Area Network Considerations: e ese e owas isiue aa ocessig coue wi e icease emasis o oice auomaio a e eosie gow ae i e use o auomae oice emias isays a comues as ceae a ema o moe eiiiy i emia isaaio a iecoecio sysems[1] esoa woksaios ae emegig as a meas o iceasig oea ouciiy y aowig e iiiua oice wokeso ceica a oessioa o sae access o os sysems commo aa ases eiea ies a emoe comue ewoks e woksaio ise may age aywee om a ow cos keyoa/isay eice o a sma comue[1] e iusy esose o is ee as esue i seea oosas a oeigs o commuicaio sysems seciicay esige o ocaie aa ase ese As ae iee o oie a aso mecaism o igia ecoe aa a e as we as o o-coe aa(acsimie oice a u- 3 moio ieo A A ca oe a souio a aesses ese ese a uue ees o iusy we ase o a commuicaios aciecue a ysica wiig saegy a aows o gow a migaio io e 1s ceuy A A ca e eie e as a iomaio aso sysem o aa ase amog oice sysem emias cusee cooes o os sysems ia a iecoecig meium wii e ous o a sige oice uiig uiig come o camus e geogaica cosais eimiae e ee o use commo-caie aciiies us iceasig e aa ase caaciy o e A y aowig ecoomica aa asmissio aes o may miio is e seco oays ewok asmissio ecoogy emis e ase o age ocks o aa a ese aes wi sime eo maageme oceues a coo oocos ese asmissio aes aso emi a age ume o aa emias o sae e commo ysica iecoecio ik wi miimum eomace egaaio esuig om esouce coeio B. Standards for LANs e IEEEs A saa is e key saa o oca aea ewoks is oec as a eaiosi o e ISO OSI (Oe sysems Iecoecio eeece moe as sow i ig 11 e aciecua moe is a se o ieaces e owe oio o e ISO OSI moe as ee su sucue y e oec [] as sow i ig 1 I aicua e ucios eome y e aa ik aye ae ee isiue oe wo suayes a "ogica ik Coo(C" a ue suaye a "Meium Access Coo(MAC" e owe suaye e C aye sees o geeae a iee e ik coo commas wie e comemeay owe aye e

ig 11 ISO OSI Moe 5

Fig 1.2 IEEE 802 Project Sublayer Model 6

MAC sees o ame e aa uis a acquie e ig o access e meium Aoe e oom wo ayes e ie ayes seciie y e ISO moe sou oeae ieeey Wii is sucue e oec as eie ou saas; a C saa a ee saas o meium access coo ogee wi ei associae ysica ayes o use wi e C saa ee suc saas ae (1 Caie sese muie access wi coisio eecio(CSMA/C ( oke-assig us access (3 oke ig access e "oke-assig us" access meo e suec o is esis is oe o e meium access coo eciques wic gies e ig o e saios coece o e meium o asmi ike CSMA/C e oke assig us access meo commuicaes y oacasig e sigas geeae a eac saio o a saios aace o e meium e meium sees as a commo us oug wic e aace saios ca asmi Aoug CSMA/C is wiey use i oices uig e eeome o saa eoe om e Geea Moos a oe comaies ieese i acoy auomaio a seious eseaios aou i ue o e oaiisic eaio o e MAC ooco ee is a sig cace a a saio mig ae o wai aiaiy og o se a ame (ie e wos case is uoue I e oke us meo ee ae saios a eac saio akes secos o se a ame So o ame wi ee ae o wai moe a secos o ge a cace o e asmie [5] e acoy auomaio eoe i 7

ike e coceua iea o a ig u i o ike is ysica imemeaio ecause a eak i e ig cae wi ig e woe ewok ow ue ey oe a a ig is a oo i o e iea ooogy o mos assemy ies As a esu a ew saa was eeoe aig e ousess o e cae use y e CSMA/C meo 3 u e kow wos case eaio o a ig .. Discussion of the Physical layer o e ysica aye e oke us uses a oaa coaia cae use o cae eeisio ee iee aaog mouaio scemes ae emie i e oke us meo (1 ase coiuous equecy Si Keyig ( ase coee equecy Si Keyig (3 Muiee uoiay Amiue mouae ase Si Keyig aa aes o 5 a 1 Ms ae ossie usig e ase coee equecy si keyig o e muiee uoiay AM/SK wo imoa asecs o e ewok sie ae oea eg o e cae a oa ume o os I yica siuaios ase-coiuous-SK ye o aaog mouaio is use I suc acica ewoks e cae eg is usuay imie y cae aeuaio e maimum ewok egs aciee wi commeciay-aaiae caes ay om 1 mees o 7 mees [] Aoug e ysica aye seciicaio icues e use o eeaes o ee e uk cae eyo e emie eg is as aey ee eee i acice a suc use may comomise e simiciy oewise oee y e ase-coiuous-SK ye o seice e ume o os i e aoe

ewoks as yicay age om o aoimaey 3 is seciicaio oes o cosai eiciy e maimum ume o os o is a ume eiciy eie cae aamees e eee ewok ooogy is a og uace uk equiig a sige uk cae o e oue o eey saio sie i u is seciicaio oes coe e use o acie egeeaie eeaes o acig e aa is asee ewee e saios i e om o ackes Eac acke is a coecio o a iie ume o yes (o e 51 1 ec e eiciecy o e ewok is agey eee o e sie o e ackes eig se a is ig we age ackes ae use is is ue o e age uiiaio o e us y e aa ackes a age acke egs A IEEE Saas Commiee as uise is ASI/IEEE s oke-assig us Access Meo i 195 I as see wiesea imemeaio ougou iusy C. Performance of a network e eomace o a A measue y e ougu aciee a e eay suee y e ackes is a ucio o seea aamees o e ooco a e ewok ese aamees icue e ume o saios ewok ooogy ewok eg acke eg a e isiuio o e saios [1] e eomace o a eowok is ey muc iuece y e eg o e ewok wic is e isace ewee e wo aes saios I e ese oke us moe as e saios om a ogica ig e eomace o e moe is osee o aious ysica a ogica isiuio o e saios o e us 9

Simuaio suies a ae ee oe o e oke us eomace so a wee coceae o e eay-ougu eaiosi a e eec o e oee oa o e eomace o e moe [3] [11] Some suies wee coceae o e ackowegeme a ioiy mecaisms i oke us ewoks [9] Some oe suies wee ase o e queueig aaysis o e aa ackes i e ues o e saios A e aoe meioe suies ae assume oe aicua case o e ysica a ogica isiuio o e saios o e us o eo as ee mae so a o es e eec o aiaio o e ysica a ogica isiuio o e saios o e eomace o e moe ue i mos o e aoe meioe simuaio suies eey saio is moee y a ai o ocesses e is eig ae o se a eceie aa ackes usig e us a e seco eig ae o ac as a aic geeao[1] ue a saio queues e aa ackes o asmissio i e ouu ue ui i eceies e oke e oke us moe eeoe i is esis cosies e aic geeaig coiios wic ae iee om ose assume i e aoe meioe suies e aic is oee o e moe y a aic geeao i e om o a seam o aa ackes Eac aa acke is assige a souce a a esiaio saio a aom [1] e souce ca o e same as e esiaio saio Eey saio as a ue wi a caaciy o soig eacy oe aa acke I a e saios ae ou usy ie ei ues ae u e aic geeao wais o a aom ime i oe o e saios is ee o acce a aa acke I is ocess o waiig e queuig eay o e aa ackes a e aic geeao is o cosiee 1

I e ese moe i aiio o e eay-ougu aaysis iee ysica a e ogica isiuio o e saios ae ee cosiee e moe assumes wo iee yes o ysica isiuio amey (1 Uiom ( Cusee om I e uiom isiuio e saios ae sace uiomy aog e ewok eg weeas i e cusee om e saios ae iie io a ume o equa o uequa sie cuses wo cases o ogica isiuio ae cosiee i is moe e is eig e es case i wic e ysica a ogica eigos coicie eac oe a e wos case i wic e ogica eigos ae seaae y a age isace e eec aiaio o e ysica a e ogica isiuio o e saios o e eomace o e moe is osee i a e eeimes e eais o wic ae eaie ae i Cae I e eais o e ysica a ogica isiuio o e saios ae gie i CaeIII CSIM a ocess oiee simuaio aguage wic is imemee as a suese o e C ogammig aguage is use as a simuaio oo CSIM as a ume o eaues wic ease e ask o uiig simuaio moes ey icue moeig sysems esouces message assig aa coecio a euggig [1

CSIM is copyrighted by Microelectronics and Computer Technology Corporation, 1985 11

CHAPTER II PROTOCOL AND MODEL DESCRIPTION

is cae eses e esciio o e moe o wic e ooco is ese a a oeiew o esciio o e ooco a is ese ueis cae aso eies e aamees use i e simuaio o e oke-assig us ooco

A. Protocol Description. e IEEE saas icue wo access coo meos ase o e oke assig ecique Oe o ese meos is use o a ewok wi us ooogy a e oe o a ewok wi ig ooogy e oke assig saa emoyig e us ooogy kow as oke us is eie i IEEE saa is is e asis o e Geea Moos MA aciecue a is use eesiey i acoy auomaio [] Wi e oke us aoac coo o e asmissio meium is eemie y ossessio o a oke wic is asse om saio o a saio i a ogica ig

A.1. Overview of Token bus method: e ig o access e ysica meium is gie y e oke e oke is a coo ame a gies momeay coo oe e meium e oke is asse om oe saio o aoe eey omig a ogica ig oma seay sae oeaio cosiss o wo ases []; amey 1

(1 aa ase ase ( oke ase ase I e is ase e saio wic is e oke oe ases aa o e us Ae aseig e aa e oke oe ases e oke o is successo i is oke ase ase eey eiquisig is coo oe e us a e ocess eeas e maieace ucios o e ogica ig so ome wii e saios oie o e oowig (1 ig iiiaiaio ( os oke ecoey (3 ew saios aiio o e ig ( Geea ousekeeig o e ogica ig e ysica oeig o e saios o e us is ieee o e ogica oeig [] aoug i may e eae o i as sow i e eame o ig 1 e oke meium access meo is aways sequeia i a ogica sese a is uig oma seay sae oeaio e ig o access e meium asses om saio o saio e meium access coo(MAC suaye oies sequeia access o e sae us meium i a ogicay cicua asio is MAC suaye eemies we a saio as e ig o access e sae meium y ecogiig a acceig e oke om is eecesso saio

A MAC IEA SUCUE e MAC aye eoms seea ucios wic ae oosey coue 13

Fig 2.1 Logical Ring on Physical Bus 1

e esciios a seciicaios o e MAC aye i is saa ae ogaie i ems o oe o e seea ossie aiioig o ese ucios e aiioig o e MAC aye is iusae i e ig wic sows ie asycoous ogica "macies" eac o wic aes some o e MAC ucios ese aiios ae as oows (1 Ieace Macie(IM ( Access Coo Macie(ACM (3 eceie Macie(CM ( asmi Macie(M (5 egeeaie eeae Macie(M e uose o eac macie is eaie eow A.2.1. Interface Machine: is macie acs as a ue a ieace ewee e C a MAC ayes I iees a icomig aa a oe seice imiies a geeaes aoiae ougoig seice imiies ue i aes queuig o seice equess I aso eoms e aess ecogiio ucio o eceie C ames acceig oy ose aesse o is saio A.2.2. Access Control Machine: is macie cooeaes wi e ACMs o is eow saios i aig e oke o coo e asmissio access o e sae us e ACM is esosie o e oowig i Iiiaiaio a maieace o e ig ii akig cae o ewy amie saios iii eecio a ecoey om aus a aiues i e ewok A.2.3. Receive Machine: is macie acces ius om e ysica aye assemes em io ames wic i aiaes a asses em o e IM a 15

Fig 2.2 MAC Layer Functional Partitioning 1

ACM e M accomises is y ecogiig e ame sa a e eimies ceckig e ame ceck sequece a aiaig e ames sucue M is aso esosie o eceio o oise us a quie coiios is oise us coiio is eae we e saio is iseig o e us o some esose A.2.4. Transmit Machine: is macie geeay acces a aa ame om e ACM a asmis i as a sequece o aomic symos i a oe oma o e ysica aye e M uis a MAC ooco-aa-ui y eacig eac ame wi e equie eame a saig eimie a aeig e ame coo sequece a e eimie A.2.5. Regenerative Repeater Machine: is macie is a oioa MAC comoe ese oy i secia "eeae saios" eg i a oaa o a ea-e emouao I suc saios e M eeas e icomig aomic symo seam om e ysica aye ack o e ysica aye o easmissio O a ese ie macies e ACM is o e mos ciica a e mos come I is e key coo mecaism o e oke-us meo e IM a M aiciae eaiy i e oeaio o e MAC aye ooco

A.3. MAC Definitions: Ciica MAC aamees wic ae cosaie y is seciicaio ae eie as oows A.3.1. MAC-symbols: e smaes ui o iomaio ecage ewee wo MAC suaye eiies [] e si MAC- symos ae eie i ae 1 17

AME AEIAIO

eo oe 1 o_aa a_ie siece S a_siga

ae 1 MAC symos Coeioa iay a 1 aa is ae se a eceie as eo a oe MAC-symos eseciey A3 MAC_symo_ime e ime equie o se a sige MAC_symo ieica o a symos is is e iese o e A aa ae as sow i ae

omia omia aa ae MAC_symo_ime

1 M/s 1 mico seco 5 M/s mico secos 1 M/s 1 mico secos

ae MAC symo imes 18

A.3.3. Octet time: Coesos o e ime iea equie o asmi eig MAC-symos

A.4. Elements of MAC Sublayer Operation: e MAC ooco as eeoe is iee o e ous i sese a i sou oeae a suie muie cocue eos [3] ese eos may e cause y commuicaio eos o saio aiues ese eos may icue muie okes os oke oke-ass aiue ea saio(saio wi ioeaie eceie a uicae saio aess e ese moe ue suy is assume o e ee o eos A.4.1. Basic Operation: Seay sae oeaio (e ewok coiio wee a ogica ig as ee esaise a o eo coiios ae ese simy equies e seig o e oke o a seciic successo saio as eac saio is iise asmiig A e saios ae coece o a commo meium wic is a us mae o a oaa coaia cae ysicay e oke us is a iea o ee-sae cae oo wic e saios ae aace ogicay saios ae ogaie io a ig wi eac saio kowig e aess o e saio o is "e" (S a "ig" (S aa om kowig is ow aess (S We e ogica ig is iiiaie e iges umee saio os e oke a may se e is aa ame Ae i is oe wi asmiig i asses e emissio o is immeiae eigo y seig e eigo a secia coo ame cae a oke e oke oagaes aou e ogica ig wi oy e oke oe eig emie o asmi ames Sice oy oe saio is aowe o asmi 19

aa ames a a ime coisios wi o occu A imoa oi o eaie is a sice e cae is ieey a oacas meium eac saio eceies eey ame iscaig ose o aesse o i We a saio asses e oke i ses a oke ame seciicay aesse o is ogica eigo i e ig iesecie o wee e saio is ysicay ocae o e cae I is aso imoa o oe a we saios ae is owee o ey wi o e i e ig so e MAC ooco as oisios o aig o a eeig saios om e ig

A.5. Frame Format of IEEE 802.4 Std: e oke us ame oma is sow i e ig3 e aious comoes o e ame ae escie e A.5.1. Preamble: e eame ae ecees eey asmie ame eame is se y a MAC aye as a aoiae ume o a_ie symos is wi e ecoe y e eceie moem as aiay aa symos a occu ousie e ame eimies eame is imaiy use y e eceiig moem o acquie siga ee a ase ock y usig a kow ae agee uo y e a e saios A secoay uose o e eame is o guaaee a miimum e eimie(E o sa eimie(S ime eio o aow saios o ocess e ame eiousy eceie e miimum amou o eame asmie is eee o e aa ae o e meium a e mouaio sceme imemee e saa equies a e uaio o e eame sa e a eas mico secos egaess o e aa ae [] Fig 2.3 Frame format of token bus 1

A.5.2. Start Delimiter(SD): e ame sucue equies a sa eimie wic egis e ame e sa eimie cosiss o sigaig aes a ae aways isiguisae om aa A.5.3. Frame Control Field: e ame oce(C eemies wa cass o ame is eig se is ie is o oe oce aious yes o casses icue MAC coo C aa Saio maageme aa a Secia uose aa(esee o uue use A.5.4. Destination Address Field(DA): e esiaio aess ieiies e saio o wic e ame is esie is may e o oces eeig o e ume o is use o aessig Aesses sa e eie 1 is o is i eg A aesses o a gie A sa e o e same eg A.5.5. Source Address Field(SA): e souce aess ieiies e saio oigiaig e ame a as e same oma a eg as e esiaio aess i a gie ame A.5.6. MAC Data Unit Field: eeig o e i ae seciie i e ames ame coo oce e MAC aa ui ie ca coai a C ooco aa ui wic is use o ecage C iomaio ewee C eiies o a MAC maageme aa ame wic is use o ecage maageme iomaio ewee MAC maageme eiies o a aue seciic o oe o e MAC coo ames A.5.7. Frame Check Sequence (FCS) field: e CS is a 3 i ame ceckig sequece A.5.8. End Delimiter(ED): e ame sucue equies a e eimie wic es e ame a eemies e osiio o e ame ceck sequece e

aa ewee e S a e E sa e a iega ume o oces A is ewee e sa a e eimies ae coee y e ame ceck sequece A.5.9. Token frame: e oke ame is a secia MAC coo ame wic gies a saio e ig o asmi is ame as a sucue sow i e ig 3 is ame as e A = e aess o e saios successo i e ogica ig e oke ame as a u aa_ui

A.6. The Token Bus MAC Sublayer Protocol. We e ig is iiiaie saios ae isee io i i e esceig oe o ei aesses oke assig is aso oe om ig o ow aesses Eac ime a saio ossesses e oke i ca asmi ames o a ceai amou o ime cae e oke o ime e i mus ass e oke o I e ames ae so eoug seea cosecuie ames may e se I a saio as o aa i asses e oke immeiaey uo eceiig i e oke us eies ou ioiy casses a o aic wi e owes a e iges Eac saio is ieay eig iie io ou susaios oe a eac ioiy ee As iu comes io e MAC suaye om aoe e aa ae cecke o ioiy a oue o oe o e ou susaios us eac susaio maiais is ime wi siuae ime kow as age oaio coue(C We a saio eceies e oke i egis asmiig e ames o ioiy cass We i is oe e oke is asse ieay o e ioiy susaio wic may e asmi ui is ime eies a wic oi e oke is asse ieay o ioiy susaio is ocess is eeae ui a is ames ae ee se o is ime as eie 3

Agai we e saio oes o ae ay ames o se i simy asses e oke o is successo e ioiy sceme is eyo e scoe o e ese moe e moe assumes a sige ioiy o a e aa ackes

A7 Logical Ring Maintenance. om ime o ime saios ae owee u a wa o oi e ig Oe saios saios ue o a eae e ig e MAC suaye ooco oies a eaie seciicaio o eacy ow is is oe wie maiaiig e kow wos case ou o oke oaio eow a ie skec o is mecaism is gie Oce e ig as ee esaise eac saios ieace maiais e aesses o e eecesso a successo saios ieay eioicay e oke oe soicis is om saios o cuey i e ig a wis o oi y seig oe o e solicit successor ames e soiciaio ame gies e sees aess a is successos aess Saios isie a age may i o ee(o kee e ig soe i esceig oe o ei aesses Ae e saio ses e solicit successor ame i oes a esose wiow wic is a cooe iea o ime (equa o oe so ime I o saio is o ee wii a so ime( as i Eee e esose wiow is cose a e oke oe coiues wi is oma usiess [4]. I eacy oe saio is o ee i is isee io e ig a ecomes e oke oes successo I moe saios i o ee a e same ime e ames wi coie a e gae as i Eee e oke oe wi e u a aiaio agoim saig wi e oacas o a resolve contention ame 24

The solicitation of new stations will not interfere with the guaranteed worst case for the token rotation. Each station has a timer that is reset whenever it acquires the token. When the station receives the token the old value of this timer is inspected just before the timer is reset. If it exceeds a threshold value, there has been too much traffic recently, so not bids may be solicited this time around. No guarantee is provided for how long a station may have to wait to join the ring when traffic is heavy, but in practice it should not be more than a few seconds. Leaving the ring is easy. Consider a station A, with successor B, and predecessor C. To leave the ring, A sends C a set_successor frame telling it that henceforth its successor is B instead of A. Then A stops transmitting.

Due to transmission errors or hardware failures, problems can arise with the logical ring or the token. For example, if a station tries to pass the token to a station that has gone down, what happens? The solution is straight forward. After passing the token, a station listens to see if the successor either transmits a valid frame passes the token. If it does neither, the token is passed a second time.

Even if that fails the station transmits a who_followsframe specifying the address of its successor. When the failed station's successor sees a who_follows frame,it responds by sending a set_successor frame to the the station whose successor failed, naming itself as the new successor. In this way the failed station is removed from the ring. Thus the logical ring is maintained. The model assumes a stable steady-state as far as the membership of the logical ring is concerned. Thus the performance figures computed are the upper bounds. 5

B. Model Description. We ae ieese i eauaig e eomace o oke-us ewok wic imemes e IEEE saa a oes a uackowege aagam seice o e aa-ik uses is meas e aagam seice oee ee is o esosie o maagig ay ackowegeme mecaisms ewee emoe saios e oowig geea assumios ae ee mae o e moe e ewok aciecue icues a ume o saios coece o a sae commuicaio cae ase o e IEEE seciicaios Eac saio is moee y a ai o ocesses e is is o se a eceie e ackes a e seco o ass e oke o is successo ae i is oe wi e asmissio o ackes Aiioay eac saio ca acce a aa acke om a see wic geeaes e simuae ewok oa e oke is asse y e saios esiig o e meium accoig o a ogica ig; e oke gies coo o e asmissio cae Eac saio as a ue o soe e ackes o e ese moe e caaciy o e ue is imie o oe acke e ogica ig is assume o e saic ie o wiows ae oee o aow o assie saios o e icue i e ogica ig o sa ay saio sa eae e ogica ig [11] A saio is acie i i as a acke o asmi i is ue a is iacie i as o ackes e saio oig e oke asmis eacy oe acke i i is acie a immeiaey asses e oke i i is o

CHAPTER HI SIMULATION DESIGN AND EXPERIMENTS

CSIM a ocess oiee simuaio aguage (imemee o o o e C ogammig aguage is use o imemeaio o e moe a e simuaio I is aoac ocesses ae eie wic ae ieee ogams o oceues wic ca eecue i aae (seuo wi oe ocesses [3] e ocesses aea o eecue i aae I e CSIM moe e commuicaios meium is ecae as facility , a asmissios ae ecae as events. Simuae ime is asse y usig a hold ucio e esciio o a ese ucios is gie i Aei A

A. Description of the software model e sowae moe comises saios coue ogee i a ogica ig I a ogica ig e saios ae assige ogica osiios i a oee sequece wi e as meme o e sequece oowe y e is e ysica oeig o e saios o e us is ieee o e ogica oeig I oe wos e ogica successo o a saio may o e is immeiae ysica eigo Eac saio as a ue o soe a sige ougoig aa acke o iie eg (is Eac saio kows e aess o is eecesso (S a is successo (S aa om kowig is ow aess (S I eac eeime e ume o saios e ewok eg e saio isiuio a e acke eg ae use as aamees Eac eeime cosiss o uig e moe o 1 ackes wic 27 are given to the overall network as load. These packets are offered to the model by a traffic generator which generates a stream of packets. For every packet, a source station and destination station are selected randomly [12]. Care was taken in the random selection of the source station, that it is neither in the transmission process nor its buffer is full. Obviously, the source station cannot be the destination. If the buffers of all the stations are found full, then the traffic generator waits for a random time until one of the stations is found ready to receive a packet. During this process the delay experienced by a data packet at the traffic generator before being assigned to any station is not considered. Further the time taken by traffic generator to assign a data packet to a station is assumed to be zero. Any station can transmit a data packet if it has the token and pass the token to its successor station after transmitting the packet. A station holds the token for a certain time given by the "token hold time" if it has a data packet to transmit. This token hold time is the maximum time that a station can hold the token to transmit the data packet. In the present model the token hold time is set to a time large enough for a station to transmit one packet of variable length. The token hold time is changed according to the packet length and is same for all the stations in the model. The length of the token is same for all the experiments. Until a station receives the token, a data packet waits in the buffer. Thereby the token enables the station to transmit the packet to its destination. A station passes the token to its successor immediately if it has no packet to transmit.

A.1.Time-domain discussion This section gives the time domain features from

e iew oi o e asmiig saio e aious imigs ioe uig e aa a oke asmissios ae sow i e ig 3 A e imigs ecouee uig e simuaio ae eie i e ig 31 e geea ogic imemee a ay saio is eaie ceay i e ow ca gie i e ig 3 e a o e ow ca aoe e cice make i e ig 3 is o simuae e owe a o e ow ca wic is simuae eais e seay sae oeaio o e moe o sa wi e iges aesse saio wic is e mase saio i e ogica ig geeaes e oke a sas asmiig e aa acke i is ue as oe Oewise i us asses e oke o is successo a so o is ese moe oes o ea wi e eceio sie o commuicaio a aig o asmissio eos ese issues ae eae a e ige ees o e ooco e oee oa o e ewok is cooe y e ime ga ewee acke asmissios o e aic geeao Ae eey asmissio iiiaio e ime ga o e e asmissio is seece aomy wii a age gie y wo aamees 1 a [1] 1 a ae wo iege aues y ayig e aues o 1 a e ie aia ae o e ackes a e saios is cage usig a aom ucio wic geeaes a iege ewee 1 a e aues o 1 a coo e oee oa i eac eeime e eais o cacuaio o e oee oa is gie ae i is cae o eac eeime e acke eg a e oke eg ae ke cosa IEEE S saas ae use o e moe As e e saas cae caaciies o 15 a 1 Ms(mega is e seco [] ae ossie o e ese moe e cae caaciy is assume o e 1 Ms Fig 3.1 Time domain picture from the view point of the transmitting station, 3

ig 3 ow ca o e ogic a e saios 31

B. Physical Distribution of the stations e saio isiuio is aie o ceai eeimes i e oowig coiguaios B.1.Uniform: Saios ae sace uiomy aog e eg o e ewok( wi sacig ewee eey ai o aace saios eig / -1 as sow i e ig 33

ig 33 Saio isiuio Uiom sacig

B.2.Equal-sized Clusters: e saios ae iie io c cuses wi eac cuse aig / c ume o saios e cees o e cuses ae uiomy sace aog e ewok e saios i eac cuse ae sace uiomy (ig 3

ig 3 Saio isiuio Equa sie cuses

B.3.Unequal-sized clusters: e saios ae iie io c cuses wi eac cuse aig a iee ume o saios (ig 35 32

Fig 3.5

Station distribution. Unequal-sized clusters

C. Logical Distribution of the stations In the token bus accessing method the stations form a logical ring as already discussed. The logical neighbor of any station may not be its physical neighbor. In the present model we cosie two different logical distributions. In the first distribution, which is the best case, the logical neighbors are same as the physical neighbors. In the other distribution, the worst case, the logical neighbours are physically apart by a maximum possible distance.

D. Statistical Measurements The statistical measurements, collected during the simulation runs are offered load, throughput, and average packet delay. Further the maximum delay of a data packet is also recorded. D.1. Offered Load (G): Offered load is the total number of bits offered to the network. It includes the bits due to the control packets, tokens. The offered load

(normalized) is calculated by dividing the total packet bit rate, in bits per second 33

(oa ume o ackes oee o e ewok icuig e okes y e cae caaciy 1 Ms e omua use o comuaio o e oee oa i e ese moe is gie as

G = ( (O_O-ACKES ACKE_EG + OA_OKES OKE_EG sim_ime caaciy (1

wee O_O_ACKES is e oa ume o aa ackes oee o e ewok ACKE_EG is e eg o e aa acke i is (51 1 ec OA_OKES is e oa ume o oke asmissios y e saios uig e sim_ime OKE_EG is e eg o e oke ame wic is assume o e 11 is sim_ime is e oa ime simuae y e moe caaciy is e cae caaciy wic is assume o e1Ms I e oke us access meo we a saio as o acke o asmi i as o ass e oke o is eigo Ee i ee ae o ackes oee o e ewok e saios wic ae ie ae o ass e oke amog emsees Sice e oee oa ioes e okes ee aways eiss a o-eo oee oa ee i e asece o aa ackes D.2. Input Load (G'): We eie aoe oa cae as "iu oa" (G eie as e ume 3

o aa is oee o e ewok e seco omaie o sysem caaciy e iu oa is gie y e omua G = (O_O_ACKES ACKE_EG/sim_ime caaciy ( e iu oa oes o ake e oke asmissios io cosieaio D.3. Throughput (S): e ougu o e moe is cacuae y e omua

Wee i is e ime ake o asmi a oagae a aa acke om a saio i o a saio ookig ack o e ig 3 i icues e oagaio eay iwic is e ime ake o oagae e aa acke om e saio i o e saio sim_ime is e oa simuae ime a caaciy is e caaciy o e ewok (1 Ms D.4. Average delay (D): e aeage eay is e aeage acke eay cacuae y e omua

wee is e oa ume o ackes oee o e moe i is e ime ake o a aa acke o asmi successuy om e saio i o e saio

us e ime se y e acke i e ue ( u om ig 3 ui e saio eceies e oke eaig asmissio us i eies e oa eay o oe acke 35

D.5. Maximum Delay (D max ) This is maimum eay eeiece y a aa acke O e 1 aa ackes oee o e ewok as e oa oe aa acke wi eeiece e maimum eay a oe aa ackes max wi e

e maimum o a igs

us e simuaio aamees ae ee eaie a e esus o ese eeimes ae gie i e oowig cae 36

CHAPTER IV

SIMULATION RESULTS

A. Overview of the experiments:

The performance of the LAN is modeled with various parameters like packet length, station distribution, logical distribution of the stations, number of stations and offered load which is controlled by the values of the packet arrival rates R1 and R2. Each experiment consists of running the model for 1000 packets. In each experiment the load offered to the network is varied by varying the arrival rate of the packets at the stations by varying the values of R1 and R2. In some experiments the packet length is varied for all other constant parameters. In some experiments the physical station distribution is varied from uniform to clusters for all other constant parameters. In some other experiments the number of stations is varied from 5 to 50 for all other constant parameters. Finally in some experiments the performance of the model is tested for different network lengths with all other parameters constant. In most of the experiments the network length is assumed to be of 1000 meters with 20 stations distributed uniformly. In all the experiments the token hold time is same for all the stations, time enough for a station to transmit one data packet and pass the token to its successor. B. Discussion of the results The results of various experiments are discussed in this section. B.1. Throughput Versus Offered load: Figure Fig 4.1 shows the variation of the throughput with the offered load for a packet length of 512 bytes. It is observed that at lower loads the throughput increases nearly linearly with the offered load. As the offered load becomes higher 000 tr20ttn2 bt

4. 38 the throughput is stabilized at a maximum value. It can also be observed that the offered load will not be reduced to zero. This is due to the between the stations even when none of the stations have data packets to transmit. This prevents the offered load from reducing to zero in the absence of data packet transmission. The throughput of an ideal network (a network that has no overhead or token passing) increases to accommodate the load up to an offered load equal to the full capacity of the system; then remains at 1.0, which means that the network is fully utilized [3]. In the present experiment, the overhead due to the token passing always causes the performance to fall short of this ideal. Fig 4.2 shows the offered load-throughput relation for a shorter packet length. The slope of this curve is less than that of the curve with a higher packet length. This is because there is relatively more token overhead due to the token passing at smaller packet lengths. The difference of the slopes of both these curves can be better seen from Fig 4.3, where they are plotted together. It can also be observed that the maximum throughput value is higher for longer packets. This is because,the channel capacity being the same, the proportion of the number of useful data bits carried by the medium at any instance decreases as the packet length decreases. B.2. Effect of the total length of the network on the throughput The total length of the network is the distance between the farthest stations . The following Table 4.1 gives the values of the throughput achieved for various lengths with a packet length of 4096 bits ,token length of 112 bits for 20 stations. 28 bt000tr20ttn

4.2 1 mees;saios;uiomy isiue

4. 1

1 ougu oa eg (mees

1 1 9 1 1 1 97 5 1 1 971 1 1 1 9 1 1 957 1 1 9 1 1 919 1 1 3 9 1 1 3 93 5 1 3 959 1 1 3 95 1 3 937 1 3 99 1 3 95 1 3 93 1 3 959 5 3 955 1 3 9 3 933 3 9 3 9 1

ae 1 ougu o iee ewok egs 42

From Table 4.1 it can be observed that for a given packet length (4096 bits) as the length of the network is increased, the throughput of the network is decreased.

As the length of the network is increased, the distance travelled by the token is increased. This increases the token delay, which is part of the time that a packet has to wait before it is transmitted by the source station to its destination.

The increase in the token delay has the effect of increasing the total simulated time, which brings down the throughput. B.3. Throughput Versus Input load:

Fig 4.4 shows the variation of the throughput with input load defined in

the last chapter. It can be seen from the figure that the throughput increases

linearly with the input load and stabilizes to a maximum throughput at higher

loads. A striking difference between Fig 4.3 and 4.4 is that the the curve in the

Fig 4.3 passes through the zero origin where as the curve in Fig 4.4 does not pass

through the origin. This implies that the input load is zero when no data packets

are offered to the network, where as the offered load will never be zero, owing to

the token passing between the idle stations when they have no data packets to

transmit. Further the offered load to the network is greater than the input load.

This is due to the fact that the offered load includes not only the data packets

offered to the network but also the token passing between the stations ,whereas

the input load includes only the data packets.

B.4. Average Delay Versus Throughput

Fig 4.5 and Fig 4.6 show the variation of the average packet delay with

the throughput for two different packet lengths. As the arrival rate of the packets

at the stations increases, the offered load increases. As a result of the increased 2 bt20 ttn 000 tr

4.4 2 bt20 ttn000 tr

4.f 28 bt20 ttn 000 tr

46 offered load, the throughput of the model increases. This has an effect of increasing the average token rotation period. Average token rotation period is the average time taken by the token to complete one round of passing through all the stations in the logical ring. A station has to wait for the token before it transmits a packet. So, as the average token rotation period increases the average packet delay increases. It can be observed from the figures that the average packet delay increases gradually with the throughput and attains a maximum at the highest throughput. Delay-throughput analysis of two different packet lengths (in bytes) is shown in the figure Fig 4.7. The use of longer packets yields better throughput , but at the cost of increase in the time delay. The sensitivity of the model to varying packet lengths can be seen from the figure Fig 4.7. In this delay analysis the additional overhead to the data packet transmission caused by the token transmission is considered. The maximum delay experienced by a data packet is recorded for each experiment. A situation arises where the traffic generator supplies a data packet to a station that has just passed the token to its successor. In such a case the data packet has to wait in the buffer until the station receives the token in the next round. Thus the data packet experiences the maximum delay under the above mentioned conditions. The maximum delay experienced by a data packet is recorded as 8,945.55 micro seconds. B.5. Throughput Versus Number of stations Results of experiments with four different packet lengths (64, 128, 256 and 512 bytes) as a parameter, uniformly distributed in 1000 meters are shown in the Fig 4.8. It can be seen that as the packet length increases the maximum throughput increases. It can also be seen that as the number of stations increases for any packet length the performance of the LAN is enhanced. This is because as the number of stations is increased within the same length, the stations will be located close to one another . Thus, less time is spent in token passing and the 1000 meters,20 stations;uniformly distributed

4. 1 mees uiomy isiue

ig 49 overhead due to the token passing is decreased. B.6. Throughput Versus Station Distribution

Results of experiments with equal sized clusters and unequal sized clusters, for the best case with different intercluster spacing are as shown in the Table 4.2, Table 4.3. The model has a 1000 meters length and a packet length of 512 bytes. All equal sized clusters are symmetrical about the physical center of the network. Table 4.2 shows the maximum throughput achieved when the 20 stations are in equal sized clusters with intracluster spacing being 10 meters. It can be seen that there is only a slight change in the throughput for a change in the number of clusters, all else being equal

Configuration Inter-cluster Maximum separation throughput

2 clusters 410.0 meters 0.976

4 clusters 280.0 meters 0.973

10 clusters 100.0 meters 0.974

Uniform 55.0 meters 0.973

Table 4.2 Equal sized clusters Table 4.3 shows the maximum throughput achieved when the 20 stations 50 are in unequal clusters with the intercluster space being 10 meters. Even in this case there is a negligible change in the throughput for the change in the number of clusters

Configuration Inter-cluster Maximum separation throughput

3 clusters (10,5,5) 415.0 meters 0.977 2 clusters (15,5) 820.0 meters 0.976 2 clusters (19,1) 820.0 meters 0.975

Table 4.3 Unequal sized clusters These results confirm that physical configuration of the workstaions has a minimal effect on the throughput. This is due to the fact that the total distances travelled by the token in all the above mentioned physical configurations is the

same. Therefore the token overhead is the same. C. Effect of logical distribution of stations on the performance of the model As explained in the previous chapter the model is tested for two different logical distributions of the stations. The first case of distribution being the best

case where the logical neighbours are same as the physical neighbours and the other case being the worst case where logical neighbours are physically apart by a maximum distance. In this experiment the stations are uniformly distributed on a length of 1000 meters. Results of this experiment are as shown in the Table 4.4. 51

1 ougu ougu oa eg (es case (wos case (mees

1 1 9 977 1 1 1 97 971 5 1 1 971 99 1 1 1 9 95 1 1 957 95 1 1 9 95 1 1 919 99 1 1 3 9 95 1 1 3 9 91 5 1 3 9 959 1 1 3 95 95 1 3 937 93 1 3 99 9 1 3 75 1 3 91 959 1 3 957 95 5 3 99 95 1 3 939 935 3 97 95 3 9 9 3 9 79 1

ae Comaiso o ougu o e es a wos cases (Uiom isiuio 5

I ca e osee om e esus a ee is o a aeciae ieece i e ougu o e A ewee e wo cases We ca ie om is a e ogica isiuio o e saios oes o ae a eec o e eomace o e moe we e saios ae isiue uiomy is is imaiy ecause e oke oeea is ieee o e ogica isiuio o e saios e oke as o ass oug a e saios iesecie o ei ocaios o e meium as suc e oke oeea wi e e same O e oe a i e saios ae isiue i e om o cuses as eaie i e eious cae e ougu o e wos case o e ogica isiuio is ess a a o e es case is is ecause we e saios ae isiue i e om o cuses e isace aee y e oke ewee e saios i e wos case is icease is iceases e oke eay wic is a o e ime a a acke as o wai eoe i ges asmie y e souce saio o is esiaio is icease i e oke eay as e eec o iceasig e oa simuae ime wic as e eec o eceasig e ougu A cose ook a ae 5 sows a e ougu i e case o e wos case eceases as e ie-cuse isace is icease is is ecause as e ie-cuse isace is icease e isace aee y e oke i oe oaio wi e icease iceasig e oke eay eey eceasig e ougu 53

Configuration Inter-cluster Throughput Throughput

separation (best case) (worst case)

2 clusters 810.0 meters 0.976 0.912

4 clusters 280.0 meters 0.973 0.934 10 clusters 100.0 meters 0.974 0.945

Table 4.5 Comparison of throughput for best and worst cases

(non-uniform distribution)

An implication of the results from Table 4.4 and Table 4.5 is that when the stations are uniformly distributed, the logical distribution of the stations does not have an appreciable effect on the throughput of the network. This is because, the token overhead will be the same in both the cases as the token has to pass through all the stations irrespective of their locations on the medium. But, when the stations are distributed in the form of clusters, there will be a fall in the throughput. This is due to the fact that the distance travelled by the token will be large wdhen compared to the best case, which decreases the throughput. 5

CHAPTER V COMPARATIVE PERFORMANCE WITH CSMA/CD MODEL

e uose o is cae is o gie some isig io e eaie eomace o e ese moe emoyig oke us access meo wi a o aoe moe emoyig CSMA/C access meo Caie Sese Muie Access wi Coisio eecio (CSMA/C meia access meo is a meas y wic wo o moe saios sae a commo us asmissio meium I is a W (ise wie ak ewok [5] I CSMA/C ee is o cea saio cooig e asmissio aciiies o a e saios I is access meo we a saio as a aa acke o se i is ises o e meium o see i ayoe ese is asmiig I e meium is ou usy e saio wais ui e meium ecomes ie We a saio eecs a ie meium i asmis a aa ame ee is a sma cace a us ae a saio egis seig aoe saio wi ecome eay o se a sese e cae I e is saios siga as o ye eace e seco oe e ae wi sese a ie cae a wi aso egi seig esuig i a coisio I a coisio occus e saio wais a aom amou o ime a easmis e aa ame a is coie o comaiso we cosie e wo moes wi ieica oa geeaig coiios o e moes ae saios i a ewok eg o 1 mees e cae caaciy i o e moes is 1 Ms Comparison of throughput o o moes e ougu is eee o e acke eg a e 55

ume o saios o a ie ume o saios a ieica aic coiios e ougu o o moes icease wi e icease i e acke eg u e maimum ougu aciee i e CSMA/C moe is ess a a o e oke us moe is is ue e ig coisio ae a ig oas i CSMA/C moe I e oke us ee is o cace o e ackes o coie e eomace o e oke us imoes ey muc a ige oas e ieece i e ougu o o moes ca e see om e ae 51

acke eg i yes o o saios 1 5 51 CS CS CS CS

77 55 91 7 95 77 5 7 5 7 1 9 71 9 7 1 7 5 7 93 9 75 79 3 5 93 3 97 7 5 1 9 5 9 9

ae 51 Maimum ougu oke us CS CSMA/C om a cose ook a e esus i e aoe ae i ca e see a e 5

ougu o a CS MA/C moe eceases as e ume o saios wii a gie eg is icease is is ue o geae ikeioo o coisios u e eomace o e oke us moe imoes as e iesaio isace eceases ecause ess ime is se i oke assig e ysica coiguaio o e saios o e us as a make eec o e ougu o e CSMA/C moe As see eaie e oke us moe is quie isesiie o e cage i e ysica coiguaio o e moe ecause e oeea ue o e oke assig wi e e same iesecie o e ysica coiguaio o e saios as aeay iscusse i e eious cae e cage o e ougu wi a cage i e ysica coiguaio ca e osee om e ae 5 a 53

Aeage Maimum ougu Coiguaio seaaio m oke us CSMA/C

cuses 513 97 57 cuses 35 97 5 1 cuses 351 97 Uiom 31 97 1

ae 5 Equa sie cuses 57

Average Maximum Throughput Configuration separation, m Token Bus CSMA/CD

3 clusters(10,5,5) 455.98 0.97 0.57 2 clusters(15,5) 393.48 0.97 0.59 2 clusters(19,1) 112.75 0.97 0.69

Table 5.3 Unequal sized clusters Comparison of average packet delay The average packet delays for various values of the throughput can be observed from the Table 5.4. It can be seen that at lower loads the CSMA/CD method offers the shortest delay (milli seconds). This is because the stations do not have to wait for a token; they can transmit data immediately. In the token passing method the delay suffered by a packet at lower loads is higher than that of the CSMA/CD. This is because, the overhead due to token-passing is relatively severe at lower loads. But at higher loads the delay suffered by a data packet in the token bus model is very much less than the delay in CSMA/CD model. The higher delay in the CSMA/CD model is due to an increase in frequency of collisions. The variation of the average packet delay with the throughput for

both the models can be seen from Fig 5.1. 5

ougu Aeage eay Aeage eay (mii sec (mii sec (CSMA/C (OKE US

9 7 1 15 597 3 9 59 5 7 57 53 55 7 3 5 1 5 1

ae 5 Aeage eay esus ougu

Comaig e oee oa o e wo moes i is see a e oee oa i e case o e CSMA/C moe icues e oigiay asmie aa ackes a e easmissios we oios o some o e aa ackes ae os i coisio e oee oa wi e eo we o ackes ae oee o e 1 mees; saios; uiomy isiue; 51 yes

Fig 5.1 60 network. But in the case of the token bus model, since the access to the medium is controlled by the token, the offered load includes both the tokens and the data packets. There are no collisions or retransmissions in the case of the token bus. In the token bus model the offered load will never reduce to zero because the token will always be passing among the stations. Finally ,the CSMA/CD method is more nondeterministic [5], which is often inappropriate for real time work. But the token bus accessing method is more deterministic than the CSMA/CD. The token passing bus method has excellent throughput and efficiency at high load. Discussion of the MAP protocol:

A group of people working under the auspices of IEEE was set up to write official standards for the LANs. Many people were invited to join the committee and contribute to the work. Some of these people came from General Motors, which was carefully looking at LANs. GM wanted to set up a network for factories. An important application of the GM network was factory automation, in which all the robots working on the assembly lines would all be interconnected by a LAN [5]. Since the cars on the assembly lines move by at a fixed rate, whether the robots are ready or not, GM felt it essential to have a LAN in which the worst case transmission time had an upper bound that was known in advance. CSMA/CD does not have this property. Essentially, CSMA/CD works by having all the machines listen to the cable. If the cable is idle, any machine can transmit. If two stations transmit at the same time, there is a collision, in which case they all stop, wait a random period of time, and try again later. In theory, there is no upper bound on the time 1 a saio mig ae o wai o se a message GM came u wi e A cae token bus i wic saios ook us ou-oi us giig a eemiisic wos-case eomace ae a a saisica oe [5] GM a oe comaies cocee wi acoy auomaio ceay saw e ee o ao seciic oocos i eac OSI aye is wok e o e MAP (Manufacturing Automation Protocol) usig e oke us MA ooco oows ey cosey o e OSI moe MA uses e oke us o e ysica meium I uses e IEEE aa ik ooco C (ogica ik Coo i e aa ik aye i coecioess moe as e seice aaiae o e ewok aye

CAE I

COMAAIE ESUS OM AAYICA A SIMUAIO SUIES

I e ese cae a comaiso o e simuaio esus oaie i e eious caes wi e oe wi ose o e aayica esus

o e uose o aaysis we cosie a gou o acie saios omig a ogica ig We cosie oe ou o oke assig assumig a eey saio ges e oke oy oce e ume o saios asmiig i oe oke oaio ees uo wee o o a saio as ackes o asmi wic ees o e aia ae o e ackes a eac saio A iacie saio us asses e oke o is ogica eigo I geea e ougu o a ewok [1] ca e eie as

wee is e ime se o e ewok asmiig messages a Y is e oeea associae wi e message ases e oeea cacuaio ees uo e ume o ackes asmie ecause o eac acke ase e oke a oe associae oeeas ae aso asmie I ee ae o ackes waiig o asmissio a ay saio e oke is asse wiou eig use o e uose o aaysis we assume a a e saios ae aa 63 packets to transmit. This is the case for the maximum throughput. We consider the best case of the token bus for our analytical model in which the logical neighbors coincide with the physical neighbors. The following assumptions are made in the evaluation of the throughput for the token bus:

(a) An explicit token scheme is considered; and (b) The token is not an integral part of the packet, but is transmitted as a separate packet. (c) The logical ring is assumed to be static, i.e., no addition or deletion of stations is possible.

(d) The total length of the network is assumed to be 1,000 meters. The throughput for this model can be derived to the form as shown in the equation (2)

where a is the normalized propagation delay defined as

where R is the data rate(channel capacity), d is the length of the total length of the network, V is the propagation velocity, which is about two- thirds of the speed 64 of light, and L is the length of the data frame transmitted. and q is the normalized token overhead delay defined as

q = token transmission time / message transmission time (4)

Consider the model with 20 stations and with the following parameters:

Packet length = 4096 bits Token length = 112 bits Speed of the channel = 2 * 10 m/sec. Capacity of the channel = 10 Mbps. Length of the network = 1,000 meters.

Substituting these parameters in the above formula for the throughput , we get the value of the throughput as S = 0.969. For the same packet length of 4096 bits, the simulated model yields a throughput of 0.972.

Decreasing the packet length to 1024 bits, with the same token length of 112 bits the analytical model gives a throughput of 0.88, where as the simulated model yields a throughput of 0.87. Delay analysis: A system with a known worst case is a ring with the stations take turns sending data packets. We consider a logical ring with N stations in which the token is rotating. Each data packet has to wait in the buffer until the station gets 5

e oke o asmi e aa acke We eie e wos case oke oaio ime as e ime ake y e oke o go a ou e ogica ig oce is icues e oig ime o e oke a eac saio e aeage acke eay is e aeage ime ake y e aa acke o asmi om e souce saio o e esiaio us e ime se y e aa acke i e souce ue ui e saio eceies e oke us i ca e see a e aeage acke eay ees o e oke oaio ime e geea eessio o e wos case oke oaio ime o e es case o e ogica isiuio o e saios is gie y e equaio (5

wee is e aa acke asmissio ime o e moe wi saios a a acke eg o 9 is comuaio o e wos case oke oaio ime gies a aue o mii secos o e same aamees e simuae moe gies a wos case oke oaio ime o 37 mii secos o a acke eg o 1 is e aayica moe gies e wos case oke oaio as mii secos e simuae moe gies a wos case oke oaio o 5 mii secos

us i is osee a e simuae moe gae e esus ey cose o ose o aayica esus

CAE II COCUSIOS

Simuaio suy o seea asecs o e oke us eomace is esee A owe oas e oeea ue o e oke-assig amog e saios causes ow cae uiiaio yieig ow ougu u a ige oas oke us yies a ecee ougu wiou sowig ay egaaio e use o oge ackes yies ee uiiaio o e cae u wi a icease i e aeage acke eay e oee oa o e ewok is ee euce o eo ue o e oke assigs ee i oe o e saios ae aa ackes o asmi e eomace o e oke us imoes as e ume o saios wii a gie eg o e ewok is icease o a gie ume o saios a a gie acke eg e ougu o e ewok eceases as e ewok eg iceases e ysica isiuio o e saios o e us as a eas eec o e ougu o e ewok We e saios ae isiue uiomy e ieece o e ougu ewee e es case a e wos case o e ogica isiuio o e saios is egigie O e oe a we e saios ae isiue i e om o cuses ee is a sig ecease i e ougu i e case o e wos case iay a comaiso o e eomace o e oke us moe is comae wi a o aoe moe usig CSMA/C access meo e simuae moe i is esis oes o cosie e i mecaism oee y e oke us ooco e oke us ooco eae 7

ioiy mecaism i wic e aa acke s ae iee ioiies o uue wok eesio o e ese moe is ossie so as o icue e ioiy mecaism A eesie suy ca e mae o see ow e awi wi e aocae o aious ioiie aa ackes ue e e aic geeaig eiome ca e cage a e eomace o e moe ca e suie ue ese coiios

AEI A

CSIM A SOUCE ISIG O SIMUAO

CSIM is a ocess oiee simuaio aguage wic is imemee as a suese o e C ogammig aguage I CSIM a ocess is a ieee ogam o oceue wic ca eecue i aae wi oe ocesses (e ocesses oy aea o eecue i aae CSIM simuaes aae o simuaeous sequeces o aciiies CSIM oies a eee se o eaues wic aciiae e imemeaio o ocess oiee simuaio moes ese ae imemee as a se o eesios o e C ogammig aguage A CSIM ogam accesses ese eaues ia ucio o oceue cas om a C ogam cosuce y e moee CSIM applied to communication system: I e CSIM moe e commuicaio meium is ecae as a aciiy , wic is a aa oec a ca e esee a eease y ocesses A aciiy ca e i oe o e wo saes;

USY o EE I a ocess esees a EE aciiy e aciiy is assige o a ocess a e ocess coiues If a ocess esees a USY aciiy e ocess is susee ui aoe ocess eeases a aciiy We is aes e waiig ocess is gie coo o e aciiy a eecuio esumes Summary of the CSIM statements used: CSIM is emee i C ogammig aguage I aiio o C e oowig saemes o CSIM ae use i e simuaio 9

Declarations and Initializers: Iiiaies ae eay eecuae CSIM ucios wic eu oies o CSIM aa sucues Iiiaie saemes mus e eecue ae e create saeme i e esecie ocesses

1 EE e; e = ee("ame"; e aoe ecaaio ecaes e(a aiae o ye EE o e a oie o a ee o ame "ame" Ees ecae i e sim(is ocess ae goay accessie Ees ecae i aoe ocesses ae oca o e ecaig ocess ese oca ees ca e asse as aamees o oe ocesses oca ees ae eee we e ecaig ocess emiaes e asmissios ae ecae as events i e CSIM moe A event is aoe ki o aa oec as wo saes; occured a not-occured. We a ocess waits o a ee wic is i theoccured sae e ee is auomaicay ace i e not-occured sae a e ocess coiues We a ocess waits o a ee wic is i e not-occured sae eecuio o e ocess is susee We some oe ocess sets a ee e ee is ace i e occured sae ACIIY ; = aciiy ("ame"; e aoe ecaaio ecaes (a aiae o ye ACIIY o e a aciiy o ame "ame" aciiies sou e ecae wi goa aiaes a iiiaie i e sim(mai ocess io o e egiig o e simuaio a o e moe 70

Execution Statements: 1. clear(ev); This statement resets event ev to a not-occured state. The event must have been declared to be of type EVENT and initialized using an event statement.

2. hold(t); This statement is used to suspend a process for a simulated time interval of length t. The variable t should be of type float. 3. release(f); This statement is used to release a facility f. f must have been declared to be of type FACILITY and initialized with afacility statement. 4. reserve(f); This statement is used to reserve a facility f. If the facility is already reserved by other processes, then the reserving process is suspended until the facility is released so that it can gain access to the facility. 5. set(ev); This statement sets an event ev to the occured state. 6. t = simtime();

This statement sets t to the current simulated time. This is a function of type float.

7. terminate();

This function is used to end of terminate a process that is executing. A terminat statement is not required if the process exits normally. 8. rerun();

The rerun statement causes the simulation support system to be completely 7 1 reinitialized (with the exception of the random number function). This feature is used to obtain several independent executions of the models.

Operation: The CSIM command file, csim should be copied to the present working directory or a path is to be set properly so as to access it. The CSIM programs are compiled by the command csim filename.c and executable module is placed in the file a.out. All the standard options to the C compiler can be used, including the -o option which specifies a name for the executable module. The command a.out -T will cause a CSIM debugging event trace to be created on the standard output file. The first executable procedure must be named sim. Sim must contain a create function. The header file csim.h must be included with proper path at the beginning of the program. The create function causes a procedure to be set up as a process, capable of executing in a pseudo-parallel manner with other processes. 72

DESCRIPTION OF THE CSIM CODE FOLLOWS a 1 13 199 eo age 1 ,AA OKE US MOE WI WEY SAIOS I A EG O MEES

/ eae/ ies /

icue sio icue ma icue "/us/mesua/csim/i/csim" icue u/us/mesu/uses/k7/ee/okes" / coais e aamees ike acke eg oke egcaaciy o e ewok oagaio see ec/

/ Goa aiae ecaaios / i oa_is; suc k i_oke(; i siiiaie(; saic i s isace( = { 55555(555555555555555; / iiiaiig e ie saio isaces / saic i oe[]-{ 13579111113115117119 }; / iiiaiig e ogica oeig o e saios / EE e e1 e e3 e e5 e e7 e e9 e1 e1 e11 e1 e13 ei e15 e1 e17 e1 e19; / ecaig e ees / i i_a_s(o_y_e(; ee oa o(; ee i aom(; oa OKE_O_IME; ou o oaios; oa ea_im•; suc s / sucue a os o eais o e cue aa acke ou mess_a_ime; oa e_ime; i i; ciic[_OIC5iA_s(O_OAIS];

suc k /" sucue oig e eais o e saio cuey oig e oke /

i s o; / ume (A.- -uie oig e oke cuey A / i okeis; /A isace - u•oe y e oke A/ i e_i /A isace ayeie y e oke ae i cosse e 11 aio i e ogica ig / oa ime_Ie; /A ime se y e oke a e saio A / }o k e; saic i ceck-; / egiig- o e im ocess A/

sim(

i i s - ( e - i p, t L017•11!": - 'Tit e7;

ou C okee Mcy ageeay - acke_eay - 4

a 1 13 199 eo age

oke_eay-messageeay-aeage_eay-oa_eay- a_oke eay- aacke_eay-sum_yake_eay-S--a_k_eay = o_keay - ; i o_y_is a_souce_oa_es_ooa_iscou ; i e_saaoke_os;

ceae ("sie" / iiiaiig a e ees / e ee("e"; e = ee("e1"; e ee("e"; e3 ee ("e3" e ee("e"; e5 = ee("e5"; e ee ("e"; e7 = ee("e7"; ee ee("e"; e9 ee ("e9" e1 - ee("e1"; ei - ee("e11"; e - ee("e1"; e13 ee("e13"; e1 - ee("e1"; e15 = ee("e15"; e1 ee("e1"; e17 - ee("e17"; ei - ee("e1"; eI9 - oe("e19"; oke - aciiy ("oke";

-e(e; / eiq i e e% / e(i;

se_ so (e5 ; ;e (e; se (e7; se (e; se (e9; se (e1; se (e11 ; se (e1; se (e13; se (ei; se (e15; se (e1; se (e17; se (e1; se (e19 OKE_O_IME = OKE_IME +(o_y_is/OkE_O_SEE; o_oke_ime = (O_O_SAIOSOKE_O_IME; oa_is = s_iiiaie(; wie(cou O O ACKES a 1 13 199 eo age 3 75

o_okes = ; cue_ime =o(; ie_ga = aom(1; i (s1=-

ie_ga-; s1=1;} cue_ime - - iegM; a_souce_o aom(O_OSAIGS_ -1;/aom ucio o ick e souce saio /

a_es_o - Iom(O_O_SAIOS - 1 ; /aom ucio o ick u e esiaio/ sim_ime cue_ime; / sim ime kees ack o e cue simuae ime / i(saio(a_souce_o]-messe ime sim_ime

e_s - i_a_s(a_souce_osim_ime; i(e_s -= -1

oke - i_oke(okecue_ime; coiue; 1 ese a_souce_o-es;

wiie(asouceo--aese

a_eso-aom(OOSAIOUS-1; cou++; i(i;93 "couksimime; / use o euggig / ii"a_souceoa_us_o; / use o euggig / i(sim_ime cue_ime { oke io nrder I 0 ]; t 01:on t it [o [ --; i oke - 0; okee_i - ;

eie

oke - iok(okcueime; } / is i is o e i / i 33 "okcsookeokoisokeimse; oke os - okeoeiskckeei; i(okeo - -aie(a;ouceo-_;is okeeay --(saio(asouceo]- s_is okeokeis/Eui;1 ese oke_eay = (saio(a_souceo]- s_iu+ oais-okeei- ( okrr, oko I /TOKIMLPPA':::PEEli: i(okeeay oke_eay1 (oa_is-kokekoke isk + a 1 13 199 eo age 6 saio[a_souce_o]-s_is/OKE_O_SEE;

oke eay = (a_souce_o - okes_o - 1 OKE_O i(okeeay oke_eay = (O_O_SAIOS okes_o-1 + a_souce_o OKE OE o okes += oke_eay/OKE_O_IME; i(sim_ime--eue_ime oko_eay += OKE_O_IME; i(okeime_se

oke eay += OKE_O_IME okeime_se; o_oiCes++; 1 i(okes_o--a_souce_o (okeoke_is== II okeime_se ( oke_eay (o_oke_ime-okeime_se; oke eay (oa_is/; o okes = O_O_SAIOS-1; 1 o_k eay += (oke eay + oke_eay; i ( aa ese == 1 /i e ue o e saio as e acke o se we e oke is eceie /

esee(oke; o (OKE_O_IME; /oig e oke o e o ime we e saio as a aa acke o ase / eease(oke; /eease e oke a ass i o e successo /

ese / i e ue o e saio oes o ae a aa acke o asmi /

eease (oke; / ass e oke o is successo / 1 / message_eay gies e oagaio eay o e aa acke om e souce esiaio saio /

message_eiay -(y_s[a_es_o]-s_is - y_s[a_souce_o]-s_i MESSAGEOSEE;

i (message eay message eay

/ Message_eay is e sum o e asmissio a oagaio eays o e aa acke /

Message_eay = message_eay +(oa PACKET_LENGTH/CAPACITY;

/acke eay acua eay eeiece y a aa acke wic icues e waiig ime o e aa acke i e ue o e souce saio /

acke eay Message_eay + oke_eay+oke_eay;

i(acke_eay maeay

maeay = acke eay; /cacuaes e maimum eay eeiece a 1 13 199 eo age 5 y a aa acke / sum acke_eay += acke_eay; / oa eay o a e aa ackes / i(sim_imeoke_eay+oke_eay+Message_eay ma_ime ma_ime sim_ime+oke_eay-oke_eay+Message_eay; / ma_ime is e oa simuae ime / saio[a_souce_o]-mess_e_ime im ime + oke_eay -1-oke_eay;

oa_eay += Message eay;

/oa_eay is e sum o e asmissio a oagaio eays o a aa ackes / okes += o okes; / kees ack o e oa oke asmissios uig e eie simuaio / }/o wie oo/ a_acke_eay sum_acke_eay/O_O_ACKES;/comues e aeage acke eay/

S ((oaeay/maime/1; /S comues e omaie ougu o e moe /

=(((ACKE_EGO_O_ACKES + (okesOYEEG /ma_ime /1 ; / comues e omaie oee oa /

G = ( (ACKEEGOOACKES/ma_ime/1; / G comues e omaie iu oa /

i(" 131 3 3 131 %3" ( GSa_acke_eay maeay; eu(; 1 / e sucue eow is use o i e osiio o e oke a a gie isace o ime /

suc k i_oke(eseeseime s rr c k ese; oa ese ime; { oa ca_ime = oeay; i e_soke_s_isco-O s-; ca c; i(ese1ei

o eay (oa_is-saio[OOSAIO-1]-sis - eseei/OKE_O_SEE; i (o eay - eseime

ca ime = o eay; ce k-; eseso=oe[O]; eseoke_is-saio[oe(]]-s_is; esee_i=; s-1;

ese a 1 13 199 eo age 78 1 ca ime = 1; esee_i += ese imeOKE O SEE;

1 i(eseime_se

i(OKE_O_IME eseime_se - eseime

ca_ime = OKE_O_IME - eseime_se; eseime_se = ;

1

ese

ca_ime - 1; eseime_se += ese ime;

1

i(ca_ime = 1 1 we(ca_ime = ese_ime { i(co==1 II ceck==

ceck=1; i(ca_ime + OKE_O_IME ese ime

eseime_se = ese_ime ca_ime; caime-1;

ese ca ime += OKE O IME;

i -1

es = (eseso + 1; i((e_s == O_O_SAIOS s==

oke_s_is=oa_is y_s[e_s 11-sis; o_eay = oke_s_is/OKE_O_SEE; i(o_eay ese_ime - ca_ime

esee_i += (ese_ime - ca_imeOKE_OSEE; caime=1;

C se

eses_o = e s; i (e_s—O_O_SAIOS e_s=oe(]; eseoke_is = saio[e_s]-s_is; ca_ime += o_eay; a 1 13 199 eo age 7 79

e_s=oe[]; } i(e_s O_O_SAIOS { e_s=oe[]; i(ca_ime = 1

oke_sis=saio(e_s]-s_is-eseoke_is; i(oke_s_is

oke_s_is=saio[e_s]-s_is; e_s=1; 1 o_eay oke_s_is/OKE_O_SEE; i (o_eay ese ime ca_ime ( eseoke is += (ese ime - ca_imeOKE_O_SE i(eseoeis oa is eseoke is oa_is; ca_ime 1; ] ese

e s; eses_o eseoke_is saio[e_s]-s_is; ca_ime += o_eay;

}

co=1; 1

eu(ese;

/ e ucio eow is use o iiiaie e isiuio o e saios gie ie saio isaces a e ogica oeig o e saios / s_iiiaie(

i oa isace; i iis=; o(i=;iO_O_SAIOS;i++

y_s[i] (suc s maoc(sieo(suc s; saio[i] (suc s maoc(sieo(suc s; i += s_isace[i]; y_s[i]-s_is = is; y_s[i]-mess_a_ime = ; oa_is += s isace(oe[i]]; saio[i]- s i oa_is; saio[i]- mess ac ime = ;

oa_is += y_s[i-1]-s_is; eu(oa is; o_y_e( / is ucio is use o cacuae e oa eg o e ewok w ie saio isaces / ( i ie-; o(i-;iO_O_SAIOS;i++ e += s_isace[i]; eu(e;

i_a_s(usy_sa_ime / is ucio is use o ick u e souce saio geeao we a e saios ae usy / i usy s; og oa a_ime;

i is; o(i-1;i-OOSAIOS;i++

s i+usy_s; i (s O_O_SAIOS-1 s O_O_SAIOS; i(saio[s]-mess_e_ime a_ime eu(s; } eu(-1; 81

EEECES

[1] James Martin Local Area Networks Architecture & Implementation, Arben Group, Prentice Hall, 1984. [2] WEE Standards for Local Area Networks: Token Bus Accessing method ANSI/IEEE Std 802.4-1985 ISO/DIS 8802/4. [3] Stallings, William, "Local Network Performance", IEEE Communications Magazine, vol 22, pp. 3-41, Mr '84. [4] Herb Schwetman, "CSIM: A C-Based, Process-oriented simulation Language," Research Report, Microelectronics and Computer Technology Corporation, Austin, Texas. [5] Tanenbaum A.S. , Computer Networks. Englewood Cliffs, NJ: Prentice- Hall, 1988. [6] Mischa Schwartz., NETWORKS Protocols, Modeling and Analysis. Addison-Wesley Publishing company, 1987. [7] Kernighan, B.W. and D.M. Ritchie, The C Programming Language. Engle-Wood Cliffs, NJ: Prentice Hall, 1978. [8] Herb Schwetman, CSIM Reference Manual(Revision 12). Austin, Texas: Mcc,1987. [9] Anura P. Jayasumana , "Throughput Analysis of the IEEE 802.4 Priority Scheme", IEEE Transactions on Communications, Vol 37, No.6, June 1989. pp.565-571. [10] A.K.Sood, S.Akhtar and K.Y. Srinivasan, "An extended Token bus Protocol for embedded networks", Computers & Elect Engg Vol.14 No.3/4, pp.105-123, 1988. [11] Peter MARTINI, Otto SPANIOL, "Token-passing in high speed backbone networks for campus-wide environments," "Modeling Techniques and Performance Evaluation, Elsevieer Science Publishers , 1987. [12] Nanda K. Kanuri "CSMA/CD LAN Performance: Modeling and simulation in CSIM", Vol 20 Part 3, Proceedings of the Twentieth Annual Pittsburgh Conference held May 4-5, 1989. pp 1003-1007.