You are on page 1of 36

Media Access Control for High-speed Local

Area and Metropolitan Area


Communications Networks
IZHAK RUBIN, FELLOW, IEEE AND JOSEPH E. BAKER, MEMBER, IEEE

Invited Paper

Medium access control (MAC) schemes, protocols, and architec- to share efficiently local processing and computing
tures for high-speed local area (LAN) and metropolitan area (MAN)
resources while also serving t o interconnect local user ter-
networks and modeling and analysis techniques for their perfor-
mance evaluation are reviewed and categorized. In describing the minals, workstations, and processing devices. Private-com-
multitude of features characterizing such MAC schemes, we iden- pany metropolitan area networks (MAN’S) are used by an
tify various aspects of topological structures, including logical-bus organization to provide similar services along with inter-
(broadcast) and mesh topologies, slotted and unslotted channel- communications capabilities among more widely distrib-
ization schemes, and frame distribution and removal methods. To
support integrated broadband services, both circuit and packet uted user resources; they also serve as backbone networks
switching procedures are considered. that interconnect distributed user LAN’s, spanning dis-
MAC procedures are categorized in terms of their characteristic tances of hundreds of kilometers. Public MAN’S can allow
structures assumed in providing for the sharing of multiple-access users to share effectively the system communications and
communications channel over the assignment (time, frequency,
networking assets; they provide the private organization
code, space) space. Four key MAC classes are identified: fixed-
assignment, random-access, demand-assignment/polling, and with a MAN system (regarded as a virtual private MAN) as
demand-assignment/reservation. well as a metropolitan access network into regional or wide
A multilevel categorization of a high-speed telecommunications area public telecommunications networks. A hierarchical
network hierarchy is presented. Level-0 includes user-premises sta- categorization of such a telecommunications network
tions and LAN‘s. The level-1 MAN-1 hierarchy provides a backbone
for the interconnection of level-0 networks as well as a subscriber
architecture with regard to the role of the LAN and MAN
local access network into higher levels. The level-2 MAN-2 network systems i s presented in a latter section.
serves to interconnect level-1 remote unit nodes as well as a MAN Performance and cost-effective LAN and MAN system
access network, while a level-3 MAN-3 network is a metropolitan architectures need to employ efficient methods to share the
trunk network. Architectural options, examples, and operational system communications nodal and channel resources. To
speeds for each level are discussed. As examples illustrating the
architectures and techniques used for high-speed local and met- facilitate the sharing of the communications medium (or
ropolitan area networks, the IEEE 802.6 DQDB, FDDI, buffer inser- media) among the network stations, a proper medium
tion, and other MAC schemes are presented. access control (MAC) scheme must be implemented to con-
Modeling and analysis techniques are then reviewed for key trol, coordinate, and supervise the access of user infor-
classes of relevant MAC schemes, including fixed-assignment
TDMA schemes; demand-assignment reservation schemes, involv-
mation tolfrom the shared communications media.
ing in particular pure packet-switched, pure circuit-switched, and In this paper, we categorize and review the features,
hybrid-switched integrated-services demand-assignment TDMA architectures,and principles of key MAC schemes for high-
and TDM structures; demand-assigned polling procedures; and speed LAN and MAN systems. We relatethesearchitectures
random-access policies. to the hierarchical structure of a telecommunications net-
work. We overview the MAC protocol operation of key LAN
I. INTRODUCTION and MAN systems, as defined by standards committees. We
Local Area Networks (LAN’s) provide communications consider currently examined MAC protocol approaches as
services within the customer premises, enabling the user well as methods to be employed and investigatedfor future
implementations, when broadband-ISDN (B-ISDN) ser-
Manuscript received February2,1989; revised June27,1989.This vicesare to be supported. Subsequently,wewill also review
work was supported in part by the National Science Foundation a number of works involved in the development of math-
under grant ECS84-06497and in part by the UCLA Academic Senate ematical models and analysis techniques that can be
Committee on Research.
Theauthorsarewith the Electrical Engineering Department, 6731 invoked in providing for the design and performance eval-
Boetler Hall, University of California, Los Angeles, CA 90024. uation of major classes of MAC protocols. In doing so, we
I E E E Log Number 8933915. will not present an exhaustive list of all MAC schemes and

0018-9219/90/0100-0168$01.000 1990 IEEE

168 PROCEEDINGS OF THE IEEE, VOL. 78, NO. 1, JANUARY 1990


related implementation and analysis investigations (the It is noted that when fiber links are used, due to the uni-
reader is, however, referred to a number of overview and directional nature of the channel, to achieve full station-to-
research papers for further details and the exposition of station connectivity a bus network implementation neces-
other schemes and modeling approaches). Rather we will sitates the use of two buses. As depicted in Fig. l(b2), the
emphasize the fundamental MAC architectures and most common approach is toemploy two separatecounter-
schemes that we believe can serve as the backbone for the directional buses. Stations can then access each fiber bus
evolving high-speed LAN and MAN systems. The latter are through the use of a proper read (sense) tap followed by
used as private networks or as part of the new public tele- a write tap. Alternate approaches involve the use of a single
communications network that i s currentlychanging to sup- folded fiber bus (Fig. 20), to which a station i s connected
port narrowband-ISDN services, and will be further evolv- through sense and write taps on the upstream (outbound)
ing to be able eventually to provide B-ISDN services. end and through a receive tapon thedownstream (inbound)
end, or the use of a doubly folded fiber bus (as shown in
FOR HIGH-SPEED
II. FEATURESOF MAC IMPLEMENTATIONS Fig. 19).
LAN AND MAN SYSTEMS
c) A ring topology, under which the stations are con-
Typically employed LAN topologies are shown in Fig. 1 nected b y o i n t - t o - p o i n t links in typically a closed-loop
and are characterized as follows. topology is shown in Fig. l(c). In a physical ring network
a) A star topology, under which each station can implementation, each station connects to the ring through
directly access a single central node, i s shown in Fig. l(a). an active interface, so that transmissions across the ring pass
A switching star network results when the central node pro- through and are delayed in the register of the ring interface
vides store and forward buffering and switching functions, units (RIU’s) they traverse. To increase network reliability,
while a broadcast star network involves the employment of such implementations include special circuits for ensuring
the central node as an unbuffered repeater which reflects a rapid elimination of afailed RIU; prevention of such afail-
all the incoming signals into all outgoing lines. ure wll reduce the chances of a prolonged overall network
failure. Due to the use of an active interface, the station is
b) A& topology, under which stations are connected now able to strip characters or messages it receives off the
to a bus backbone channel, i s shown in Fig. l(b). Under a medium, as well as overwrite onto symbols and messages
transmitted across the medium, when the latter pass its
interface.
An active interface into the medium further enables the
station to amplifythe information it passes along, thus lead-
ing to considerable reduction of the insertion loss. This is
(a) of particular importance in interfacing afiberoptic medium:
a passsive interface causes a distinct insertion loss, thus
leading to a significant limitation in the number of stations
that can be passively connected to a fiber bus without the
incorporation of optical amplifiers.
Electrical amplification and MAC processing at the active
interface involve double conversion: optical-to-electronic
U of the received signal and electronic-to-optical of the ampli-
fied transmitted signal. Asa result, the station’s access burst
rate must be selected so that it i s compatible with the elec-
tronics processing rate at the station interface, ensuring that
no rate mismatch exists at the electronics/optics interfaces
between the potentially very high transmission burst rate
across the optical channel and the limited processing rate
capacity of the electronic VLSl access processor at the sta-
tion’s medium interface unit. Since the latter electrical pro-
cessing rate limit i s typically taken to be in the neighbor-
(C) hood of 1.0-7.0 Gb/s, it i s advantageous to limit the rate of
Fig. 1. LAN topologies. (a) Star. (b) Bus. (c)Ring. the station’s access to an optical channel to be n o higher
than about 1.0 Gbls [4].

In considering general high-speed local and metropoli-


logical bus topology, each station’s message transmissions
tan area networks, the following frame distribution topol-
are broadcast to all network stations. Under a physical bus
ogies can be distinguished for basic implementations:
implementation, the station i s passively connected to the
broadcast (logical bus) topology and mesh (switching)
bus, so that a station’s failure does not interfere with the
topology.
operation of the bus network. The station is then able to
sense and receive all transmissions that cross its interface
A) Broadcast (Logical Bus) Topology
with the bus; however, it i s not able t o strip information off
the bus or to properly overwrite information passed along Under such a distribution method, station messages are
the bus; it can transmit its own messages across the bus routed through the use of a broadcasting method. Since
when assigned to do so by the employed MAC protocol. each message frame (the MAC level protocol data unit) con-

RUEIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 169
tains addressing information, it is copied automaticallyfrom the token, thus enabling it to immediately retransmit its
the medium by the intended destination station or stations, MAC message frame if the latter is determined not to have
so that MAC routing i s automatically achieved. Typically been properly received by the destination.
bus, ring, or broadcast star topologies are used to simplify The latter token ring LAN uses twisted-pair or coaxial
the characterization of the broadcasting path. media at transmission rates of 1-40 Mb/s. At 10 Mb/s, the
The communications link is set upas a bus (for a physical transmission timeofa1OOO bit frame isequal tolOOps,which
bus implementation) or as a point-to-point link (for a phys- is longer than the typical propagation time across the
ical ring implementation). The corresponding station inter- medium when the overall LAN length is shorter than 20 km,
face unit (SIU) acts as a passive or active MAC repeater. A considering a propagation rate of about 5 ps/km.
passive MAC node does not interfere with ongoing trans- In turn, when considering a 150-Mb/s LAN or MAN fiber-
missions along the bus and is able to copy the messages optic based system-such as the FDDI token ring or the
transmitted across the bus system. DQDB reservation bus systems, which can span longer dis-
An active MAC station interface unit operates in one of tances of around 100 km-the corresponding frame trans-
two possible modes. mission time and network-wide propagation delay are equal
to 6.67~sand 500ps, respectively. For a corresponding MAN
1) Repeat mode: where it performs as a repeater, serv- system that operates at a channel rate of 1 Gb/s, the prop-
ing to repeat the frame it receives; agation delay of 500 p s is much larger than the frame trans-
2) Nonrepeat mode: in which the SIU is not repeating mission time of 1 p s . Thus, under such high transmission
the information it receives from the medium. rate conditions, each message transmission occupies only
In the latter case, under a logical bus configuration, the SIU a small physical length of the logical bus network medium.
i s also typically set to be in a “stripping mode,” stripping It is therefore not efficient, from the perspectiveof message
from the medium the information it receives. During this delay and channel bandwidth MAC utilization considera-
time, the SIU is able to transmit messages across the tions, to provide for only a single transmission at a time
medium, provided it gains permission to do so from the acrossthelogical bus medium.Thefollowing modeofoper-
underlying MAC protocol. Note that if the SIU is provided ation i s thus preferred.
with a store-and-forwardcapability, it can store all the infor- b) Multiple simultaneous frame transmissions along
mation it receives while being in a nonrepeat mode and the logical bus medium: While permitting multiple-frame
retransmit this information, if so desired, at a subsequent transmissions across the medium, we can consider two dif-
time. ferent procedures as they relate to whether single or mul-
A logical-bus topology can also be associated with an tiple simultaneous message frame transmission initiations
active interface of the station onto the fiber budbuses. This are allowed.
for example, isthecase forthe IEEE802.6 DQDB(distributed
queue dual bus) [I] or Bellcore’s Metrocore [5] irnplemen- b.7) A single transmission initiation i s allowed at any
tations. Under DQDB, the station overwrites each passing instant of time. When a fiberoptic-based token-ring MAC
bus bit through optical-to-electrical conversion, an elec- scheme, such as FDDI, is used, the station releases the token
trical “or” write operation and an electrical-to-optical immediately following the transmission of the station’s
reconversion. The active interface of the station can also message, rather than waiting to fully receive its own mes-
provide it with the capacity to strip bits, and thus message sage prior to releasing the token. In this manner, multiple
frames, off the bus. simultaneous transmissions can take place across the bus,
MAC procedures for logical bus configurations can also allowing for a better utilization of the bus space-bandwidth
be characterized by the following features, which involve resources.
both the method used for removing message frames and Many times, a slotted access scheme is used for logical
theconstraints imposed upon the number of simultaneous bus linear topologies. Under such a scheme, as illustrated
transmissions carried along the medium. As to the latter by the FASNET MAC procedure, a bus controller i s respon-
feature, we differentiate between the following implemen- sible for generating successive time slots within recurring
tations. time cycles. A slot propagates along the unidirectional fiber-
7) Frame Transmission Initiations i n Relation to the bus as an idle slot until captured by a busy station; the slot
Number of Simultaneous Transmissions Along the Logical is then designated as busy and is used for carrying the
Bus: inserted message segment. A busy station senses the
medium and captures an available idle slot which it then
a) Single message frame transmission across the uses to transmit its own message segment. For fairness rea-
medium: A single MAC-frame transmission is permitted sons, a busy station is allowed to transmit only a single seg-
across the medium at any time instant; thus no more than ment during each time cycle. In this manner, such MAC
one station can initiate a transmission onto the medium at schemes (a number of which will be reviewed later) strive
any given time instant, and no other station can initiate a to schedule busy station accesses onto the medium such
transmission until this later transmission is removed from that one will follow the other as soon as possible, so that
the medium. a message train i s generated while efficiently utilizing the
This i s the technique employed by the IEEE 802.5 token medium bandwidth and space (length) dimensions. How-
ring LAN, in which a station holding the token does not ever, note that no more than a single station i s allowed at
release it until it receives its own frame (following a full cir- any time to initiate transmissions onto the unidirectional
culation around the ring). This simplifies the operation of medium; transmission initiations occur in an order that
the protocol and provides the station with the ability to matches the positional location of the stations along the
review its acknowledged message frame prior to releasing fiber.

170 PROCEEDINGS OF THE IEEE, VOL. 78, NO. 1, JANUARY 1990


b.2) Multiple simultaneous frame transmission initia- Concurrent transmissions are also attained by a buffer
tionsareincluded in theMACprotocol. In usingsuchaMAC insertion ring architecture, as illustrated in section V.
scheduling feature, multiple stations are permitted to ini- When such a scheme is applied to a bus system with
tiate frame transmissions at the same time, accessing the actively connected SIU's, which i s controlled by a slotted
medium at sufficiently distant physical locations so that access scheme, the destination station is responsible for
multiple transmissions can propagate time-simultaneously stripping the information contained in the slot destined to
along the space dimension of the shared medium. The itself from the bus, and releasingthe corresponding slot for
underlying MAC algorithm must ensure that these simul- potential use by a downstream station [6].
taneous transmissions do not cause any frame overlaps
c) Removal b y supervisory nodes: It can be beneficial
(col1isions).
to employ special supervisory nodes, located across the
In a ring system, such a procedure can involve the proper
medium, to remove frames from the medium. In this man-
use of multiple tokens or ring buffer insertions at each sta-
ner, the frame destination removal process can be imple-
tion's interface. In a logical bus operation, when a "slotted"
mented in only supervisory nodes, relieving regular nodes
channel structure i s employed, such an operation can be
of this task.
implemented through the designation of slots for use by
Using such frame-removal supervisor nodes, the system
a proper station or group of stations, in accordance with
interconnectivity patterns can be divided (statically or
various system requests and interconnectivity conditions.
dynamically) into a number of modes. Under an extensively
For example, in the DQDB MAN, stations indicate their
divisive mode, the supervisory stations allow communi-
requests for channel slots, so that propagating idle slots
cations to take place only between stations that are located
along each fiber bus can be identified with a proper station
between two neighboring supervisory stations. Under a less
to which they are oriented; in this manner, multiple simul-
divisive connectivity mode, the system i s divided into longer
taneous frame transmission initiations and ongoing mes-
disjoint communication segments. Under a full broadcast
sage propagations can take place. The same applies when
mode, each frame i s broadcast to all network stations.
TDMA and demand-assigned circuit or packet-switched
Dependent upon the network traffic pattern, time cycles
TDMA MAC schemes are used.
can be defined such that during each of which a specific
Further enhancements in bandwidth and space utiliza-
mode of operation i s invoked.
tion can be achieved by incorporating in the MAC scheme
If such supervisory stations (or any station) are operated
an appropriate message frame removal method, as indi-
as a store-and-forward buffered switching unit, then clearly
cated in the following.
the distribution processesacross the medium segments can
2) Frame Removal Method: When considering a logical
be isolated and intersegment message frames would then
bus network with active SIU's, the removal of frames from
be delivered across the logical bus system in a "multiple-
the logical bus system can be in accordance with the fol-
hop" (multiretransmission) fashion. This i s the role played
lowing methods.
by buffer-insertion ring architectures for the specialized
a) Source removal: Considering loop topologies, under ring topologyand, in general, bythe mesh (switching)archi-
a source removal method the source station is responsible tectures discussed in the following.
for the removal of its own transmitted frames. This is, as
noted in the preceding, the scheme employed by the IEEE B. Mesh (Switching) Topology
802.5 and fi ber-based FDDl token-ring systems. Such a MAC
Under a mesh (switching) topology, the network topol-
feature permits the source station to receive immediate
ogy can be configured as an arbitrary mesh graph. The net-
acknowledgment from its destination station (which is
work nodes provide bufferingand switching services. Com-
appended as a frame trailer) or to identify immediate no-
munications channels are set up as point-to-point links
response when the destination station is not operative.
interconnecting the network nodes. Messages are routed
b) Destination removal: Under such a scheme, a sta- through the network, through the use of specially devel-
tion, upon identifying a passing frame destined for itself, oped MAC and packet (network) layered routing algo-
removesthis framefrom themedium. Under such aremoval rithms; e.g., using source routing approaches [A, or based
policy, a frame i s not broadcast across the overall length of upon special network and subnetwork structures (hierar-
medium, but just occupies a space segment of the medium chical grids, for example [8]),or the designation of proper
that spans the distance between the source and destination spanning routing tree graphs [A.
stations. Such a method can lead to a more complex MAC From a medium-access control aspect, a point-to-point
protocol and management scheme. Improvement in delay channel in a mesh network needs to be efficiently shared
and throughput levels can, however, be realized through among the multitude of messages and connections that are
spatial re-use, particularlywhena noticeable fraction of the scheduled to traverse it. In supporting an integrated circuit-
system traffic flows among stations that are closely located switched and packet-switched implementation, a time cycle
with respect to each other's position across the network (timeframe) is typically defined, during which a number of
medium. slots are allocated to the supported circuits that use this
To apply such a scheme to a token ring system, multiple channel, while the remainder of the cycle slots are allocated
tokens are allowed and properlydistributed across the ring. for the transmission of the packets waiting in the buffers
When two closely located stations are communicating, feeding the channel. Frequently, priority-based disciplines
other tokens can be used by other stations, located away must be employed in statistically multiplexing the buffered
from the occupied segment($, to initiate their own non- packets across the packet-switched portion of the shared
overlapping communications paths. The same applies to a link, so that packets belonging to different service classes
token bus system with destination removal capabilities. can be guaranteed their desired grade of service as it relates

RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 171
to their characteristic delay and throughput requirements. fluctuations. Voiceand certain videoand datatraffic sources
For example, voice packets must subscribe to strict end-to- can be categorized as synchronous or isochronous sources.
end time-delay limits, while video packets induce high Under acceptable time-frame limits, such sources can be
throughput support requirements. Such related MAC supported through the allocation of synchronous or iso-
issues are further discussed in subsequent sections. chronous circuits.
An isochronous circuit i s allocated across a multiple-
C. Hybrid Logical Bus and Buffered Switching Topologies access channel by the MAC layer by invoking a circuit-
switching procedure. Thus each isochronouscircuit i s asso-
Note that many high-speed multi-gigabit communica-
ciated with slots which are allocated, during each cycle on
tions networking architectures that cover wider areas (such
a dedicated basis, to the isochronous source transmitting
as MANSand WANs), i.e., wide area networks many times
across this circuit.
need to combine broadcast (logical bus) and mesh (switch-
ing) architectures to yield an efficient, reliable, and respon- b) Asynchronous services: Asynchronous sources
sive integrated-services fiber-based network. generate information in a random fashion. Information
In considering logical-bus topologies with active SIU‘s, messages are generated at random times and may also be
we already noted that certain nodes can be designated to of random length. This i s the typical situation with data
act as store-and-forward processors and also serve as frame sources and services.
removal supervisory nodes. Such nodes can operate as MAC Asynchronous sources sharing a multiple-access channel
bridge gateways. These gateways serve to isolate the seg- can be well supported by the employment of a packet-
ments interconnecting them, each segment operating as an switching-based MAC protocol. Virtual circuit or datagram
independent logical bus network. These gateways act to packet-switching services can be provided.
filter MAC frame interconnections between these seg-
Examining the list of services just presented, operating
ments. The individual segments can operate efficiently
at various speed levels, we note that many high-speed LAN
when they serve a local community of stations that gen-
and MAN systems must provide support to a heteroge-
erates a distinct traffic throughput, noting that each seg-
neous mixture of asynchronous and isochronous sources.
ment spans a shorter distance, thus reducing the effect of
Hence high-speed LAN and MAN networks must be able
the end-to-end propagation delay on message perfor-
to implement MAC schemes that provide acceptable grade-
mance. Access priority can be given in each segment to the
of-service levels under such an integrated environment. For
intersegment packets which traverse this segment, to
this purpose, the following approaches can be outlined (as
ensure their timely distribution.
a MAC procedure, as well as a network layer discipline.)
Service Classes and Bandwidth Requirements:
Local area and metropolitan area networks that serve as A pure (fast) circuit-switching approach i s used;
components of an integrated services digital network extending the technique currently used across the
(ISDN) provide support to a large multitude of service public switched telephone network. However, cir-
classes. cuits allocated to bursty data sources lead to poor
bandwidth utilization across the multiple-access
a) Low-speed services (0.1 kb/s-100 kb/s), including channel. When ample bandwidth can be made avail-
telemetry, data, voice, and slow-motion imaging. able to overcome this poor utilization, this drawback
b) Medium-speed services (1 Mbls-IO Mbls), including can be traded against the relative simplicity of the cir-
data and imaging. cuit-switching MAC procedure which entails the
c) High-speed services (50 Mb/s-I Gb/s), including TV, implementation of an efficient demand-assigned cir-
high-definition lV (HDTV), data, imaging, video on cuit allocation scheme.
demand (VOD), multimedia messaging, teleconfer- A pure (fast) packet-switching technique is employed.
encing, video, database services, etc. It i s then necessary to ensure that isochronous
Such services are frequently classified into the following sources are provided with acceptable network delay
categories. limits. This approach requires the MAC algorithm
controlling the packet-switched-based sharing of the
a) Synchronous a n d isochronous services: These ser- mutiple-access channel to provide proper limited
vices generate information in a steady time-synchronous delay to all packet classes, or to incorporate priority-
fashion, or in a nearly synchronous fashion. based schemes that can assign higher priority to iso-
In providing multiple-access support for such services chronous-service-related packets for the purpose of
while guaranteeing acceptable grade-of-service level, it is ensuring their timely delivery.
many times advantageous to allocate the channel to the The Bellcore’s switched multimegabit distribution
source in a synchronous fashion; i.e., at fixed instants of service (SMDS) [9] i s an example of a service that i s
time and for fixed durations that correspond to the syn- based on datagram packet-switched MAN and inter-
chronous characteristics of the generated message streams; connected MAN systems.The IBM PARIS network [IO]
or, to permit higher flexibility in implementation, to allo- i s an illustration of a pure network-wide fast packet-
cate the channel to the source isochronously, in a nearly switching approach.
time-periodic fashion, at a desired average rate. Thus an An integrated use of circuit-switching and packet-
“isochronous circuit or channel” provides for the delivery switching disciplines is made. Isochronous sources
of fixed quanta of traffic data over fixed time intervals (time- are allocated isochronous circuits upon demand,
frames or cycles), relative t o a certain time reference. The while asynchronous services are supported on a
position within the timeframe of the time-slot dedicated to packet-switched basis. This i s the approach currently
an isochronous circuit can otherwise be subjected to time adopted by the FDDI-II and DQDB systems.

172 PROCEEDINGS OF THE IEEE, VOL. 78, NO. 1, JANUARY 1990

-~ ~
D. Channel Timing formats Such an ATM structure is illustrated by the DQDB system
outlined later.
In classifying, examining, and developing MAC proce-
dures, we identify the following key channel timing for- c) Hyper-slotted Channel. This entails a hybrid struc-
mats. ture, whereby cycles and hyper-slots are defined, while time
slots can also be dynamically defined so that dual opera-
a) Unslottedchannel. No time slots are defined for use tional modes can be supported. Designated time slots can
by the MAC layer process. Message frames can be of vari- be used for a slotted operation, while the remaining period
able length and a station can start its transmission onto the within each hyper-slot or cycle can be used for an unslotted
channel at anytime, when permitted in accordance with the MAC operation.
underlying MAC scheme. Such an implementation is exemplified by the FDDI-II
The IEEE 802.3-IEEE802.5 CSMA/CD, token bus and token networkwhich providesforthedefinition of a synchronous
ring LAN protocols, and the FDDl fiber token-ring protocol cycle, and the allocation of certain isochronous slots within
are examples of such protocols. Other pure packet-switch- each such cycle, for supporting isochronous sources. In
ing architectures also involve no specified time boundaries turn, asynchronous sources use the unslotted FDDl token
for the transmission of MAC level message frames. ring MAC scheme, in a manner which, at the MAC su b-layer,
b) Slotted Channel. Time slots are defined such that is independent of and transparent to the isochronous oper-
each time slot is of fixed duration. The frame structure of ation.
a time slot i s also defined, including an header field that can Layered Protocols and the MAC Sublayer:
serve to identify the type, status, and construction of the In relation to the OS1 reference model, the data link layer
information carried by the time slot. Several time slot types of LAN and MAN networks i s subdivided into the medium
can be identified, so that time slots of different types can access control (MAC) lower sublayer and the logical link
be of different lengths and can be designated for allocation control (LLC) upper sublayer. Services provided bythe MAC
to different service classes. layer allow the local protocol entity to exchange MAC mes-
Time slots can also be grouped to form superslots, in sage frames (which are the MAC sublayer protocol data
accordance with a specified structure, with the header units) with remote MAC entities.
(label) of the superslot identifying the designation of each The MAC sublayer provides the following services.
embedded slot. MAC sublayer services are provided to the LLC sub-
Consecutivecollections of time slotscan begrouped into layer. LLC service data units (SDU’s) are submitted to
cycles (or time-frames). Each cycle is also properly struc- the MAC sublayer for transmission through proper
tured, having a header field which provides time, slot, and multiple-access medium sharing. In turn, MAC pro-
cycle synchronization information as well as designation of tocol data units (PDU’s) received from the medium
the specific structural composition of the underlying cycle. and destined to the LLC, are transferrred to the LLC
CCITT has been considering a slotted channel structure, sublayer as proper LLC-SDU’s.
operated in an asynchronous transfer mode (ATM) or a syn- The underlying LLC-SDU’s includesourceand des-
chronous transfer mode (STM). The ATM structure has been tination addresses, the data itself, and service class
considered by CClTT as a target solution for implementing and quality of service parameters.
B-ISDN. Slots are allocated to stations in accordance with MAC sublayer services are similarly provided to
the MAC scheme, resulting in message streams that consist directlyconnected isochronous and nonisochronous
of ATDM interleaved cells (segments, slots). These streams channel users (CU’s), allowing a local CU entity to
can be distributed over the network through the use of cell exchange CU-data units with peer CU entities.
switching procedures employing fast packet switching or These are connection-oriented services whereby,
asynchronous time division switching procedures. The STM after an initial connection setup, the channel user i s
structure is considered by CClTTas an interim arrangement able to directly access the communications channel
used during the evolution of the telecommunications net- through the proper mediation of the MAC sublayer.
work towards attaining B-ISDN capabilities. It involves the The CU generates and receives its data units through
employment of a synchronous TDM MAC procedure in the MAC sublayer over an existing connection, on an
implementing a circuit-switching-based bandwidth allo- isochronous or nonisochronous basis. Such CU-
cation scheme. SDU’s contain the data itself and possibly service
An integrated ATM and STM approach can also be imple- quality parameters; no addressing information is
mented over a slotted channel. needed, since an established connection i s involved.
The use of a slotted channel structure provides the MAC MAC sublayer services are provided to the local MAC
process with avery useful facilityfor effectively sharing the station management entity via the local MAC layer
underlying multiple-access channel. Time slots can be management interface.
properly and dynamically designated for use by active iso- Examplesof theseservices includetheopening and
chronous and asynchronous sources, invoking integrated closing of an isochronous or nonisochronous con-
circuit-switching and packet-switching MAC algorithms. nection, its profile, features, and the physical medium
One notes, however, that, due to the fixed length of the slot, it should be transmitted on, and the establishment
a message must be broken down into individual segments and disestablishment of the binding between the
whereby each segment (constituting the MAC message channel user and the connection end-point identi-
frame) i s allocated a separate slot. This is of particular con- fier.
cern to asynchronous service message types. A slotkeg- The MAC sublayer requires services from the phys-
ment assembly-reassembly (SAR) process must thus be ical layer for the physical transmission and reception
included as part of the MAC level protocol implementation. of information bits.

RUBlN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 173
os1
Reference _-----
Model
1 r-----------

Physical Physical

(Instance 1)

\ Medium2

Data Link 802.2


Layer

Physical
Layer rn (Physical (Station
Manage-
ment)

U (Physical Medium

Fig. 2. MAC layer and its interfacing layers. (a) For IEEE 802.6. (b) For FDDI.

In Fig. 2, we show the associated layers as implemented cation of a number of key resource dimensions. The assign-
by the IEEE 802.6 DQDB system and by the FDDI system, as ment space considered i s the (T, F, C, s) = (time, frequency,
they relate to the OS! data link and physical layers. code, space) space. The allocation of access to the shared
medium is provided to stations' messages and sessionslcalls
111. CATEGORIZATION OF MEDIUM
ACCESSCONTROL through the assignment of slots, segments, and cells of the
PROCEDURES time, frequency, code, and space dimensions.
1) Time Division Scheduling: Stations share a prescribed
A multitude of access control procedures are used by sta-
channel frequency band by having their transmissions
tionsto shareagroupof multiaccesschannels, such asthose
scheduled to take place at different segments of time. Typ-
configured in a logical bus (broadcast) topology. We pro-
ically, only a single messagecan be transmitted successfully
vide in this section a classification of MAC schemes.
across the designated channel at any instant of time.
2) Frequency and Wavelength Division Allocation: The
A. MAC Dimensions
bandwidth of the communications channel i s divided into
The multiple-access communications medium resource multiple disjoint frequency bands (or wavelength channels
can be shared among the network stations through the allo- for an optical channel), so that a station can be allocated

174 PROCEEDINGS OF THE IEEE, VOL. 78, NO. 1, JANUARY 1990


a group, consisting of one or more frequencylwavelength wavelength division methods, in that they induce a ”chan-
bands, for use in accessing the medium. Multiple simul- nel selection” algorithm that provides an allocation of dis-
taneous transmissions can take place across the channel, tinct frequency/wavelength or physical channels to a user
whereby each messagetransmissionoccupies adistinct fre- or a group of users. In turn, once users have been assigned
quencylwavelength channel. such afrequencylwavelength band, the sharingof this band
3) Code Division Multiple Access: Each station’s mes- is controlled in accordance with a time division and/or code
sage i s properly encoded so that multiple messages can be division MAC method.
transmitted simultaneously in timeand in a successful man- Under acombined useof thesedimensions, the medium
ner using a single-band shared communications channel, access control algorithm serves to schedule the transmis-
so that each message transmission is correctly received by sion of a message by an active station by specifying the
its destined station. selected channel (in a frequency/wavelength division or
Typically, orthogonal (or nearly orthogonal) pseudo-noise space division manner) and subsequently specify the time
sequences are used to randomly spread segments of a mes- slot(s) and/or multiple-access codes to be used, in accor-
sage over a wide frequency band (frequency hopping dancewith the employed time division and/or codedivision
method), or to time-correlate the message bit stream (direct methods.
sequencing method). A message can be encoded by an
address-based key sequence that is associated with the
B. MAC Categories
identity of the source, the destination, or proper combi-
nation of the source and destination group association. In Fig. 3, we show our categorization of medium access
Awider frequency band isoccupied by such code-divided control procedures over the preceding defined (T, F, C, S)
signals. In return, a common frequency band can be used assignment space. Three classes of access control policies
by all network stations to successfully carry, simulta- are identified: fixed assignment (FA), demand assignment
neously in time, multiple message transmissions. (DA), and random access (RA). Within each class, we iden-
4) Space Division Multiple Access: Communications tify the signaling (SIG) component and the information
channelsaresharedalongtheirspacedimension.Forexam- transmission (IT) method used. Note that within each class,
ple,this involvesthesharingof groupsof physicallydistinct both circuit-switching (synchronous, isochronous and STM
links, or multiple space segments located across a single modes) and packet-switching (asynchronous and ATM
logical-bus network as described in section II. modes) and their combined use to support integrated-ser-
Considering the structure of the access control proce- vices, are possible.
dure from the dimensional allocation point of view, note Under a “fixed assignment” (FA) scheme, a station i s ded-
the similarity between the space division and frequency/ icated,overthe(T,F,C,S)space,toacommunicationschan-

Fixed Assigned (FA) Demand Assignment (DA) Random-Access(RA)

A
Signaling(S1G) Information
Technique Transmission
(IT) Method
A
SIG IT AT
SIG

T,F,C,S

Fixed Adaptive
’ F C s
Channel Sensing

Signaling Channel
Establishment

FA DA

Per-station Signaling
Accsss Scheme

A
PollIRespnse
Amss
I I
Polling Reservation

Rez2nment

FA.RA.DA FA,RA.DA

Fig. 3. Categorization of medium access control procedures.

RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 175

~~ __ ~~
ne1 resource that it can permanently use for accessing the occurwithout a properflowcontrol regulation toguarantee
channel. Corresponding access control procedures thus maximum delay limits for packets associated with isochro-
include TDMA (time division multiple access), FDMA (fre- nous and real-time based services. It i s shown in [22] that
quency division multiple access), WDM (wavelength divi- a random-access scheme can be employed in a movable-
sion multiplexing), CDMA (code division multiple access), slot-TDMA arrangement to capture a slot across a channel
and SDMA (space division multiple access) schemes. A cor- and then ensure that slots similarly positioned in subse-
responding signaling procedure is implemented to ensure quent time-frames are reserved for the establishment of
that station transmission boundaries are well recognized such an isochronous circuit. As such, the random access
by the participating stations along the respective (T, F, C, scheme is used as a signaling protocol serving a reservation
5 ) dimensions. MAC algorithm, as will be noted later.
Medium resources (along each dimension) can be Non-channel-sensing random access procedures yield
assigned on a fixed basis to specified sessionskonnections, low channel utilization levels. In turn, the efficiency of a
to a station, or to a group of stations. When allocated to a channel-sensing random access procedure critically
connectionkall, such schemes provide the basis for the depends upon the timeliness of the sensed channel occu-
establishment of isochronous circuits and can lead to effi- pancy information, and thus upon the overhead durations
cient sharing of the medium bandwidth resources for the associated with sensing the channel (and affected by chan-
support of many voice, video, high-speeddata, and real-time nel propagation delays and certain station idle detection,
session connections when a steady traffic stream of infor- turnaround, and acquisition delay times [17]). Hence, for
mation i s generated. Effective channel sharing can also high-speed logical-bussystems, when channel-sensing-type
result when such channel resources are dedicated for random-access schemes are used, performance degrada-
exclusive use by a station or a group of stations, provided tion i s caused by the very high ratio of the channel prop-
the latter generate steady traffic streams which can effi- agation delay t o the packet transmission time. Under such
ciently utilize the dedicated resources at an acceptable a scheme, a busy station is required to obtain the channel
quality-of-servicelevel. This is illustrated by use of packet- state prior to initiating a transmission. However, since a sta-
switched TDMA (PS-TDMA)and circuit-switched TDMA (CS- tion’s transmission must propagate across the total logical-
TDMA) schemes, which are described and modeled in sec- bus medium before its existence can be sensed by all net-
tions VI-VII. work stations, and since stations make uncoordinated
Under a “random-access” (RA) scheme, stations contend access decisions under a random-access scheme, these
for access to the communications channel in accordance decisions are based on incomplete channel state infor-
with an algorithm that can lead to time-simultaneous (over- mation that can lead to excessive message collisions.
lapping, colliding) transmissions by several stations across The degrading effects of the propagation-delay-to-mes-
the same frequency band, causing at times the retrans- sage-transmission-time ratio can be somewhat reduced by
mission of certain packets. the following approaches.
Under fixed random-access schemes, a station transmits
its message frames across the channel at random times, in Limit the overall propagation delay by dividing the
a slotted or unslotted fashion, without coordinating its overall network into multiple tiers as illustrated by
access with other stations. A station which detects (through the double-tier LAN and MAN architecture investi-
channel sensing, or through nonreceipt of a positive gated in [23]. The network stations are divided into
acknowledgement from its destination) its transmission to groups. A shared backbone medium i s used to pro-
collide with another transmission will retransmit its mes- vide interconnection between groups (on a broad-
sage after a properly computed random retransmission cast global basis using repeaters as gateways, or on
delay (whose duration may depend upon the estimated a store-and-forward bridged basis), using a noncon-
channel state of congestion). Under an adaptive channel- tention (non-random-access) based MAC algorithm.
sensing random-access algorithm, a busy station first A random-access MAC strategy can be used for con-
senses the channel to gain certain channel state informa- trolling the access of messages across the shared
tion, and then uses this information to schedule its message group medium, which now spansa much shorter dis-
for transmission in accordance with the underlying pro- tance and thus involves considerably reduced prop-
tocol, again without undertaking full access coordination agation delays.
with all other network stations. Various fixed (such as While the propagation delay depends on the con-
ALOHA [I31 and group random access [14]) and adaptive ducting medium and i s independent of the trans-
channel-sensing random-access algorithms (such as CSMA mission speed, the packet transmission time is
[15], CSMAKD [16], DGRA [ I q , tree-random-access colli- reduced as the transmission speed increased. The
sion resolution [I81 and others [19]-[21]) can be invoked. propagation-delay-to-message-transmission-time ra-
In general, random-access schemes are not well suited tio can be reduced by using FDMAIWDMA or SDMA
as information transmission methods for governing the methods to replace the single-band high-bandwidth
accessof information messagesontoavery high speed fiber medium with a group of shared multiple channels,
communications channel, unless provisions are made to each of lower bandwidth [24]. Clearly this will provide
considerably limit the extent of message overlaps due to an improvement only if the underlying services can
collisions, or to limit the use of this access technique to cer- be efficiently supported over such a reduced band-
tain low-throughput messaging classes. width channel when a random-access (or other MAC)
A random-access procedure i s typically employed for scheme i s used.
supporting packet-switching services. At higher normal- As noted in the preceding, random-access schemes
ized throughput levels, high packet delay variances can can serve, as part of other MAC architectures, as

176 PROCEEDINGS OF THE IEEE, VOL. 78, NO. 1, JANUARY 1990


effective procedures for transmitting signaling pack- message, and by buffer-insertion schemes whereby a sta-
ets for demand-assigned schemes. Random-access tion is permitted toaccess the ring if its ring buffer i s empty.
schemescan also be used in conjunction with CDMA Additional constraints are typically imposed on the station
(code division multiple access) and SSMA (spread in utilizing these implicit polling messages for access to the
spectrum multiple access) procedures, over high channel t o ensure a fair allocation of communications net-
speed channels [12]. Other uses of random-access work bandwidth. Such constraints many times guarantee
schemes over high-speed channels are outlined in that a station can transmit a quota of packets within a prop-
section IX. erly defined cycle.
A multitude of access policies can be adopted in imple-
Under a “demand assigned” (DA) scheme, a “signaling” menting integrated-services polling and reservation algo-
procedure is implemented to allow certain network entities rithms. Note that polling techniques are used in imple-
to be informed about the transmission and networking menting the IEEE 802.4-802.5 token bus and token ring
needs and demands of the network stations. Once these LAN’s, the FDDl fiber LAN, and many other fiber bus and
network entities are informed, a centralized or distributed ring network systems (see sections V and VIII). Reservation
algorithm i s used to allocate to the demanding stations techniques (see also sections V and VII) are employed by
communications resource segments over the (T, F, C, S) the QPSX [26]-[27] and IEEE 802.6 DQDB high-speed MAN
assignment space. networks (whereby a slotted positional-priority implicit
The specific methods used in establishing the signaling polling access procedure is used to provide access t o reser-
channel and i n controllingtheaccessof individual demand- vation bits), AT&T Datakit [28] switch and local network,
ing stations onto this channel characterize the features of demand-assigned TDMA, FDMA and WDM systems and
the established demand-assignment scheme. various attempt-and-defer methods for access control onto
The signaling channel can be established as an out-of- a unidirectional fiber medium [20], and for many other mul-
band or in-band fixed channel to which communications tiple-access network systems. Integrated reservation and
resources are dedicated, as is the case for many DAiTDMA, polling schemes are used by FDDI-II [29], double-tier archi-
DNFDMA, or DAAWDMA schemes. In turn, a moredynamic tectures [23], and other protocols that provide for inte-
and adaptive procedurecan be used to announce theestab- grated-services support.
lishment of a signalingchannel at certain appropriate times,
as i s the case for the many polling, implicit polling, slotted,
and packet-train type access methodologies [20], [21].
Iv. MULTILEVEL
CATEGORIZATION
AND MAC
INTERCONNECTED
OF HIGH-SPEED
CHARACTERIZATION
The schemes used to provide for the access of stations
LANIMAN NETWORK ARCHITECTURES
onto the signaling channel are divided here into two cat-
egories: “pol Ii ng” and “reservation” procedures. In Fig. 4, we describe a multilevel categorization of the
Under a reservation scheme, it i s up to the individual sta- high-speed telecommunications networking hierarchy. At
tion to generate a reservation packet and transmit it across level 0, we include the user premises stations, terminals,
the signaling (reservation) channel to inform the network and local area networks. User-based bus, ring and star,
about i t s needs for communications resources. The station twisted-pair, radio, coaxial, or fiber-based LAN’s are typi-
can identify its requirements, as they occur or in advance, cally employed. Included are the IEEE 802 local area net-
in accordance with the type of service required (isochro- works, token bus, token ring, and CSMNCD type, oper-
nous versus asynchronous, for example) and the prece- ating at 4-12 Mbls, FDDl LAN’s operating at 100 Mb/s, as
dence level of its messages and sessions/connections. well as workstations, individual or multiplexed, and packet-
Reservation and assignment messages are many times radio networks operating at Kb/s ranges.
transmitted over an in-band or out-of-band multiple-access The level-I MAN-I network hierarchy provides a back-
channel, so that a MAC procedure must be implemented bone for the interconnection of the level-0 user networks;
to control the access of these MAC-signaling messages. it also serves as a subscriber local access network used to
Fixed-assigned, random-access, or demand-assigned MAC connect the level-0 networks and stations to higher level
strategies can be employed for this purpose. communications networks and nodes. In a telecommuni-
Under a polling procedure, it is the responsibility of the cations network implementation of MAN-I, the commu-
network system to query the network stations so that it can nications channels are fiber loops currently planned for
find out their transmission needs, currently or in advance. operation at typically the 140-560 Mb/s range. Intercon-
Polling and polling-response messages can be transmitted nection nodes serve as MAC bridges or as layer-3 gateways
over an in-band or out-of-band multiple-accesschannel, so (routers).
that a MAC procedure must be implemented to control the In illustrating the physical layer subscriber-network
access of these MAC-signaling messages. Fixed-assigned, interface (SNI) for multimegabit services, as outlined by
random-access,or demand-assignedMAC strategies can be Bellcore’s SMDS [9], an electrical DSX-3 type interface i s
employed for this purpose. considered for earlier implementations while an optical
Under an implicit polling procedure, stations are granted OC-I andlor OC-3 is recommended for later implementa-
access into the medium (one at a time, or in a concurrent tions, when SONET (synchronous optical network) equip-
noninterfering fashion) when certain network state con- ment becomes available. An electrical DSX-3 interface
ditions occur; such conditions can be deduced directly by involves an asynchronous DS3 signal, operating a t a line
each station without requiring the station to receive an rateof 44.736Mbaud. Aframeformat i s used, with the frame
explicit polling message prior to access initiation. Such divided further into subframesand blocks.The information
schemes are illustrated by slotted bus systems whereby the payload net rate is approximately 44.21 Mbls. SONET i s
arrival of an idle slot at a station serves as a n implicit polling based on an optical signal format that i s constructed as a

RUBlN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 177
Level o
LAN I :;:-;
Subscriber
Local Access
I MAN Access
1 Level 3
MAN-3
Metropolitan
Trunk Networl
WAN.
Backbone Nets
Long-Distance
6 Distribution
Networks

Resldentiai
or Business CPE Remote Local
Subscribers untts Exchange

Fiber Loop Fiber Feeders MuiIi-GbpS


140-560 Mbps 0.6-2.4 Gbps Fiber Links

Fig. 4. High-speed telecommunications networking hierarchy.

progressive hierarchy of synchronously interleaved tribu-


tary signals. The lowest standard optical signal and inter-
face i s called OC-I, where the STS-1 51.84 Mb/s rate signal
i s the electrical equivalent. Synchronous byte-interleaved
multiplexing procedures are used to obtain higher rates.
The OC-N rate i s equal to 51.840 x N Mb/s. The SONET net-
work is synchronous, so that all SONET terminals must be
synchronized by timing references traceable to a stratum-
1 clock.
A number of different characteristic MAC architectures
can be considered as MAN-I networks, as shown in Figs.
5-8. In Fig. 5, we show a MAN-I architecture that employs
a bus backbone in providing access and interconnection
for traffic generated by level-0 nets and stations. Fig. 6. Level-I MAN-I architecture, using ring broadcast
Note that more than a single bus channel (implemented backbone.
as distinct different links, or by using wavelength division

Fig. 5. Level-I MAN-I architecture, using bus broadcast Fig. 7. Level-I MAN-I architecture, using mesh switching
backbone. backbone.

178 PROCEEDINGS OF THE IEEE, VOL. 78, NO. 1, JANUARY 1990

-___
receivers, and thus have time-simultaneous access to only
a limited number of backbone channels.
b.1) A single-hop communications access i s pro-
vided between all or a limited number of MAN-I gateway
nodes. An appropriate combined channel selection/MAC
procedure i s developed to efficiently share the assignment
space (T, F, C, S).
b.2) A subset of the MAN-I gateway nodes can inter-
communicate through multihop transmissions across the
MAN-I backbone network. Under this setup, nodes need
to provide switching services to multihop MAC frames, so
that these frames are retransmitted across the backbone
channel until they reach their eventual gateway destination
node($. See [4] for an investigation of a class of multihop
interconnectivity routing patterns.

Fig. 8. Level-I MAN-I architecture, using star backbone.


It isnoted thatwhilealimited numberof related selection
algorithms have been examined for various other appli-
cations (including for SSMA and satellite-switched TDMA
multiplexingover oneor morefibers) aretypically involved.
systems), development and investigation of combined
These multiple channels are used to provide a network
selection and medium-access procedures for multichannel
gigabitor multigigabitcapacity,while requiringa single sta-
high-speed integrated-services networks remains.
tion or user net interface to occur at the reduced single
When a single-bus backbone channel i s implemented as
channel rate, thus providing for a feasible implementation,
a MAN-I architecture (of the type shown in Fig. 5), one needs
incorporating the maximum speed imposed by the inter-
to consider the MAC policies indicated in the preceding,
face of the electrical processor (station's communications
includingvarious fixed assigned and demand-assigned pro-
processing module) with the optical link. As part of the allo-
cedures, and their combined implementations. For exam-
cation of access across the assignment space (T, F, C, S), a
ple, Bellcore's Metrocore network experiment [5] utilizes
channel selection algorithm i s defined, in conjunction with
afiber backboneoperatingat 140 Mblswhich i s shared using
the underlying employed channel-medium-access algo-
a FASNET MAC procedure (see section VIII). This backbone
rithm, to supervise, coordinate, and control the access of
i s used to interconnect terminals directly through
user transmissions onto the backbone channels. In exam-
RS-232 interfaces, or to interconnect LAN's, such as those
ining the range of such selection procedures, we note the
of the Ethernet type, through MAC gateways. At the edges
following elements.
of each bus, this implementation uses headend nodes that
a) If the number of backbone channels i s limited, it is provide link synchronization and certain frame generation
practical to provide for reception and transmission on each functions. Using multiplexers at the backbone gateway
channel by each station or user net. Each backbonegateway nodes, this implementation can provide also forthe sharing
node can then communicate with every other gateway node of a number of fiber links, leading to the availability of 1.7
in a properly coordinated single-hop manner. Gb/s communications backbone bandwidth.
Such an implementation requires the use at the station The IEEE 802.6 DQDB MAN network is also configured as
of multiple transmitters and receivers andlor the employ- a bus system. It consists of dual fiber backbone links con-
ment of a certain number of agile transmitters and tunable figured as a logical bus (with a regenerative interface at the
receivers. station)which i s shared bythe network stationsthrough the
See [25] for an example of a selection scheme whereby use of an appropriate reservation procedure (see section
a, station is receiving on only a single band but i s able to V for a description). Time-frames, slots, and minislots are
transmit on any system band. Note that the maximum nor- defined and are allocated to user stations per their requests
malized channel throughput rate, which for single-band in fixed segment durations. Provisions are made for mul-
explicit or implicit polling MAC schemes i s typically of the tiple-priorities, integrated isochronous and asynchronous
+ +
order of 1/[1 alN1 can be reduced to 1/[1 a / N 2 ] under services, and improved network survivability.
symmetric traffic distribution when Nbands are employed, A MAN-I architecture that uses a ring broadcast back-
using a similar MAC scheme, where parameter "a"denotes bone is shown in Fig. 6. The FDDI-I and I I implementations
the ratio between the logical-bus propogation delay and the serve as examples of such high-speed ring networks when
message transmission time across each band. The impact atoken ring MACarchitecture i s used. Buffer insertion rings
of parameter "a" can be eliminated when fixed assigned can also be considered.
procedures or proper reservation schemes (such as DA/ In Fig. 7, we show a MAN-I architecture which employs
TDMAIFDMA) are used. a mesh switching backbone. Such a backbone involves the
b) When a high number of channels i s used, such as use of point-to-point links (as for a ring backbone) and it
i s the casewhen a large degree of wavelength division mul- incorporates store-and-forward switching functions at the
tiplexing is employed (dense-WDM system), one can use a nodes. When a ring topology i s selected, buffered insertion
proper combination of the following approaches, under rings are considered, inducing a simple routing strategy
the imposition of practical implementation constraints that (see section V). Under mesh topologies, a routing proce-
requireeach station or level-0 net to have a relatively limited dure needs to be invoked since, in general, messages will
number of associated fixed andlor tunable transmitters and not be broadcast across the mesh backbone network. Fast

RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 179
circuit and packet switching procedures, as well as their
integrated versions, are considered.
A much simplified backbone architecture is shown in Fig.
8, where a star backbone i s used. A broadcast or switching
star can be employed. This architecture exhibits control and
topological advantages and disadvantages associated with
a central node topology; the central node may have to be
backed up to increase network survivability.
\\
As noted in Fig. 4, the level-2 MAN-2 network provides
for the interconnection of the level-I remote unit nodes,
and also serves as a MAN access network providing access
to the higher-level metropolitan area network. A MAN-2
network uses fiber feeder communications channels that
are currently planned to operate in a public telecommu-
nications network at a rate range of 0.6-2.4 Gbls, and in a
multi-gigabit/s range for future implementations.
MAN-2 network MAC architectures can be characterized
in a manner similar to that used for MAN-I networks. A
MAN-2 network can provide interconnection and access to
MAN-I networks through the use of proper gateways and
backbone networks that are configured as follows:

a) a broadcast bus (Fig. 9);


Fig. 10. Level-2 MAN-II architecture, using bus broadcast
backbone.

c) a mesh architecture using switching nodes and mesh


topology (Fig. 12).
It i s noted that a MAN-2 i s fed by message and callkession
traffic streams from i t s interconnected MAN-I networks.
Such traffic streams are thus statistically characterized as
more steady and less bursty processes, inducing access
control and switching solutions that can be very different
from those used at lower network levels. At this level, more
use can thus be made of fixed allocations, circuit dedica-
tions, and demand-assigned reservation or polling-based
procedures that provide for longerterm allocationofcircuit
and packet slots for access by MAN-I subnetworks.
As shown in Fig. 4, the level-3 MAN-3 network is a met-
ropolitan trunk network that provides for the intercon-
nection of level-2 MAN-2 network gateway nodes (such as
local exchange nodes) as well as for the access of MAN-2
messages and calls onto longer-distance and distribution-
type wide area networks (WAN'S).Multi-gigabit/s links are
used within a MAN-3 architecture. Typically, fast packet-
switching and circuit-switching mesh architectures are
employed at this level, when longer distances are involved;
however, multi-gigabit broadcast-type architectures could
be considered for regional coverage. An illustration of a
combined network architecture consisting of user LAN's,
MAN-I, MAN-2, and MAN-3 network levels is shown in Fig.
Fig. 9. Level-2 MAN-II architecture, using bus broadcast
13.
backbone.
V. EXAMPLES OF HIGH-SPEED
LOCALAND METROPOLITAN
AREANETWORKS
b) a star (see Fig. 10, where a double star configuration
In categorizing the LAN and MAN MAC architectures
i s shown, being the architecture selected for imple-
described in sections Ill-IV, we identify the following
mentation bya number of European PTT's; or see Fig.
classes of networks, when characterized by their backbone
11, where a star MAN-2 network i s used to intercon-
transmission rate.
nect a multitude of different MAN-I implementa-
tions; such a star configuration must be properly Class 1: Local area networks operating at the 1-12
backed u p by other star nodes to provide the desired Mb/s range, typically using twisted-pair and
availability and reliability features); coaxial cable media; such as the IEEE 802.3, IEEE

180 PROCEEDINGS OF THE IEEE, VOL. 78, NO. 1, JANUARY 1990


Fig. 11. Level-2 MAN-II star architecture, using star backbone.

802.4, and IEEE 802.5 LAN’s that employ CSMAl multi-gigabitls MAC circuit implementations described in
CD (random-access), token bus (polling) and [5]. Gallium arsenide (CaAs) IC’s operating in the 1-2 Gb/s
token ring (polling), respectively, as MAC range can be used to implement 8:l and 16:l multiplexers
schemes. 2nd corresponding 1:8 and 1:16 demultiplexers allowing an
Class 2: High-speed LAN and MAN systems operating existing 150 Mbls silicon-based MAC IC to utilize a logical
at a backbone rate of about 100-150 Mbls, such bus backbone operating at 1.2- 2.4 Gb/s.
as the FDDI-I, FDDI-II, IEEE 802.6 DQDB, and To resolve the optical versus electrical rate mismatch,
the experimental METROCORE network; with class 4 and class 5 networks can be implemented through
potential improvements to throughputs of 400- the use of multiple-channel and multiple-band configu-
800 Mb/s. rations, employing FDMAlWDMA and SDMA techniques,
Class 3: LAN and MAN systems using a backbone rate where each band can be shared by using a class-2-based
of 1-2 Gbls. MAC algorithm coupled with a selection algorithm which
Class 4: LAN and MAN systems employing backbones is used to allocate the channelslbands. Here, a node can
at rates of multi-gigabitls. operate not just as a MAC repeater across a logical bus net-
Class 5: Terabitls MAN systems. work, but also as a MAC store-and-forward switch, as
described in previous sections, leading to network seg-
Class 1 networks have been widely evaluated, discussed,
mentation and multiple-hop network coverage. Integrated
and analyzed. We thus outline in this section the MAC
logicahbus and fast-switching mesh architectures could be
structureof illustrativeclass 2 networks. In subsequent sec-
effectively used for class 4 and 5 networks.
tions, we discuss the modeling and performance analysis
of MAC procedures employed by such networks, as well
A. The IEEE 802.6 Distributed Queue Dual Bus (DQDB)
as by other networks belonging to other classes.
MAC Scheme
Class 3 networks can be similarly implemented through
the useof a single logical bus backbone networkor by using The lEEE802.6distributed queuedual bus(DQDB) system
high-speed multiplexing of a station’s traffic into multiple [ I ] is a local and metropolitan area network that uses a dual
logical-bus systems. An example of such a multiplexing bus configuration utilizing a reservation procedure (called
arrangement employing current technology is given by the a distributed queueing scheme) as the medium access con-

RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 181

~~
a- U

n-
Fig. 12. Level-2 MAN-II mesh architecture, using switching nodes.

trol method. This sytem is based on the QPSX system devel-


oped by Telecom Australia [26].
Each station node interfaces bus A and bus B. Each bus
spare number of octets (so that each cycle frame contains
an integral number of complete slots). It is passed down-
stream along the bus.
has a frame generator head which i s responsible for syn- The slot serves as the basic information carrying unit. Each
chronizing the bus and generating slots and frames. The slot contains a fixed number of octets. Each slot contains
busescan beconfigured in an open-bus topology, as shown an access control field (ACF) followed by a fixed size “seg-
in Fig. l(b2), or in a looped-bus topology, where the buses ment.” Two types of slots are identified: queue-arbitrated
are looped (but not physically connected to form a closed (QA) and nonarbitrated (NA). A slot-type bit in the ACF i s
loop), as shown in Fig. 14, leading to the colo,cation of the marked by the frame generator to identify the type of the
frame generators. The latter configuration contributes to slot.
increased reliability, since a single bus disconnect can be The ACF field contains the bits that control access to a
isolated and circumvented by closing the opening at the slot. In particular, it contains a BUSY field (1 bit) used to
current location of the default framegenerator and locating indicate whether the slot is busy or empty and a REQUEST
the new frame generator at a position next to the fault dis- field (4 bits), which is used by stations to indicate a reser-
connection in the bus. vation for a slot; a request at priority level I i s indicated by
Stations actively interface the unidirectional fiber bus the REQ-I bit in this field set to one, I = 0, 1, 2, 3.
through a logical OR “overwrite” operation. A station can QA slots are used to transfer asynchronous segments.
thus strip information it receives off the bus by overwriting The BUSY bit in the ACF i s set to 0 by the frame generator
it. to indicate the slot is empty. A station (node) which gains
The layered structure of the DQDB protocols is shown access to the QA slot to transfer its asynchronous segment
in Fig. 2(a). The MAC layer provides services to the logical marks the slot as busy by setting i t s BUSY bit to 1, and writes
link control (LLC) sublayer, to the nonisochronous channel its asynchronous segment into the segment field. NA slots
user (NCU), to the isochronous channel user (ICU), and to are used to transfer isochronous-sample segments. They
the station manager, as discussed in section Ill. are generated by the frame generator, which sets their BUSY
Time-frames (cycles) are generated across each bus by bits to 1.Variable-length LLC PDU’s are transferred through
the bus frame generator head. The MAC cycle frame con- a segmentation and reassembly (SAR) process, which pro-
sists of a frame header followed by N slots, and a possibly vides a conversion between the LLC MAC frames and

182 PROCEEDINGS OF THE IEEE, VOL. 78, NO. 1, JANUARY 1990

~~
Fig. 13. Overall network architecture consisting of LAN’s, MAN-l’s, MAN-11’s and MAN-
I l l network levels.

BUS A
3 DEFAULT D
FRAME BUS B
GENERATOR

-7
Fig. 14. Looped bus topology for DQDB network.

derived MAC PDU’s that fit into the fixed-length MAC seg- Astation can request its segmentto be transmitted across
ments. either bus A or B (or both), and be considered at priority
The medium-access control for transfer of asynchronous I, I = 0, 1, 2, 3, where level 3 is the highest priority level.
segments i s governed by a reservation scheme. The latter, There are thus eight (x, I ) instances of the DQSM at each
called a distributed queue procedure, controls the write node corresponding to each possible combination of
function for the queue-arbitrated access control entity. The requested bus x and priority level 1.
operation can be specified by a distributed queue state The station will not process another (x, I ) request of prior-
machine (DQSM) and the request queue machine (RQM) ity I to write bus x until a previous (x, I ) segment writing to
[I], summarized as follows. the bus commences.

RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 183
Asynchronous segments for transmission on the bus are Access to the reservation channel is provided on-a posi-
received by the station and are placed in the local (x, I) out- tional priority basis, whereby a node can access any empty
standing request queue. Request for access to bus x is sig- request field that passes itself across the unidirectional bus.
naled to other nodes by an OR-write operation performed Under an earlier DQDB version, a station i s required to
on the REQUEsTsUbfieldof slots passing on theopposite bus, transmit its reservation before it is permitted to transmit its
bus y. This operation i s controlled by the RQM. The latter corresponding segment. Under a later version, this rule was
sends a request (reservation)by setting the REQ-Ibit on bus changed to allow a station to transmit i t s queued segment
y i n the first slot in which REQ-I bit i s not set when received. upon thecaptureof an idle slot (after itscountdown counter
Subsequently, to provide for the access of an (x, I)seg- has reached the 0 state) and to transmit its reservation on
ment, the station's DQSM operates as follows. The DQSM the opposite bus when it is able to do so.
continuously maintains a count of the requests generated Thus, under the earlier version, a node located closer to
by nodesdownstream on busxthat are still outstanding (by the frame generator for bus ycan gain access to the request
recording the number of such requests on bus y and channel on bus y in advance of other nodes which are
observing the number of empty slots passing itself on bus located downstream along the same bus. A measure of fair-
x to satisfy these requests). An (x, I) request counter i s used ness i s attained by not allowing a node to make another
to maintain this count. When an asynchronous (x, I)seg- request until its previous segment is transmitted. Such a
ment transmit request i s generated, the DQSM moves into reservation procedure can lead to situations in which a
a countdown state. It then transfers the current state of the group of busy stations capture the bus without allowing
(x, I) request counter to a countdown counter (and sets the stations located downstream to this group (along the reser-
former count state to 0).The state of the countdown counter vation bus) access to the message bus.
i s decremented by one for each empty slot that passes the Under the later reservation rule, such reservation lock-
node on bus x, oriented towards stations which are down- outs and delays are typically avoided since stations are not
stream to itself and which have already sent reservations required to wait for the transmission of their reservation
at the same or higher priority level, or for higher priority bits prior to the transmission of their information seg-
segments subsequently submitted for transmission and ments. Uneven bandwidth distribution patterns can still be
residing in its own buffer. The countdown counter needs exhibited. For example, downstream stations which are
to increase its count by one for each subsequent reser- widelydistant from an upstream one can generate requests
vation request it identifies on busy, or i s self-generated, for for segments that have already been transmitted, prevent-
higher priority segments. When the corresponding count ing this station from accessing the bus.
state equals zero, the DQSM is in the standby state, and Possible improvements in the reservation scheme could
when an empty QA slot i s observed on bus x, this slot i s also be related to using batch- or connection-related reser-
marked busy and the asynchronous segment i s written into vations, whereby requests are made for batches of seg-
this slot. ments or at certain session start and termination times [30]
The nonarbitrated slot access control scheme operates rather than for every individual segment.
bywriting the node's isochronous sampleor samples, iden- Algorithms have been developed and investigatedto pre-
tified by a label and a list of one or more (octet, offset) pairs, vent lockout and unfair access phenomena, leading to fair
onto the requested bus within the appropriate busy NA slot. bandwidth allocationsand channel access patterns1941, [951.
The latter is identified by having the same label in the iso- In [95], such an algorithm allocates to each station a
chronous-sample segment header of the slot. Then, the bounded quota of segments, which it i s permitted to trans-
node OR writes each octet in the list into the NA slot at the mit during an underlying cycle. A recently proposed mod-
specified offset. ification requires a station to let an idle slot pass-by after
Considering nonisochronous operation, the efficiency of consecutively transmitting a specified (e.g., 8) number of
operation of the DQDB MAC procedure as a reservation segments.
scheme for the sharing of a logical bus system is related to The DQDB scheme employs a broadcast strategy to route
the efficiency of the reservation procedure and the utili- segments. As noted before, the space and bandwidth assets
zation of the logical-bus medium dimensions. Transmis- of the unidirectional fiber bus can be better utilized when
sions of information segments across the bus are coordi- a destination removal scheme is used, whereby the des-
nated by adistributed queue procedure underwhich station tination node, or a specially equipped supervisory node,
requests are queued and accommodated on a one-seg- copies its received segment from the bus and releases the
ment-per-stationat-a-time basis. This corresponds to a dis- slot for use as an empty slot by stations located downstream
tributed round-robin or processor-sharing queueing model, along the bus. Such a destination release scheme can lead
whereby the intended bus server provides each packet a to substantial improvements in bandwidth and delay per-
single-segment service-quantumper visit round. It i s noted, formance.
however, that stations can experience unfair bandwidth
allocation related to their position along the bus. For exam-
B. The FDDI-I and FDDI-I1MAC Schemes
ple, consider two widely separated, highly busy stations,
one located close to the frame generator and the other The fiber distributed data interface (FDDI) i s a proposed
located much further downstream. Due to propagation American National Standard for 100 Mbls token ring using
delay, it takes a relatively long period of time for the reser- an optical fiber medium. A recent enhancement, FDDI-II,
vations made on the opposite bus by the distant station to adds a circuit-switching capability, so that the network can
reach the closer station. In the meanwhile, the latter (being integrate data with voice, video, and sensor data streams.
positioned closer to the slot generator) captures available A maximum configuration consists of 500 stations (each sta-
idle slots, permitting only infrequently an idle slot for the tion representing two physical connections) linked by 100
distant station to pass by. km of fiber cable.

184 PROCEEDINGS OF THE IEEE, VOL. 78, NO. 1, JANUARY 1990

~~
Information is transmitted on the FDDl in frames [2], [31]. nel, marking itaseitherassigned toan isochronouschannel
A distributed-polling medium-access control procedure i s or as released for use by the token channel.
used. A single token exists, and only the station which has In comparing the DQDB and FDDl MAC schemes, one
seized the token i s permitted t o transmit across the chan- considers the differences in operation and performance
nel. Each station removes (strips) its own transmitted MAC between reservation/processor-sharing (PS) distributed
frames from the ring (logical bus), and can thus receive queue-based and polling-based MAC procedures. The per-
immediate ACK, appended by the destination as a trailer formance of these schemes is noted in subsequent sections
to the frame. The transmitting station issues the token to depend upon the reservation/PS delays and the polling-
immediately at the termination of its transmission, so that cycle latency delays. At lower traffic loads, the polling
the next busy station along the ring can seize it following scheme induces messagedelays due to token latency, while
the latest transmission which crosses its interface. An idle the reservation scheme induces relatively low reservation
station repeats the token, while a busy one strips it from delays. As the traffic load increases, the polling procedure
the ring. Two types of tokens are defined: restricted and i s less affected by cycle latency factors, while a reservation
unrestricted tokens. procedure can experience higher message delays due to
The access of nonisochronous frames onto the medium the higher load imposed upon the reservation channel,
i s controlled by a timed token rotation (TTR) protocol. Each leading to higher reservation delays. Such delay-versus-
station continuously records the time elapsed since it has throughput performance features havealso been noted for
last received the token. An initialization procedure i s used the DQDB and FDDI-II models simulated in [37]. Note, how-
to select a target token rotation time (TTRT) through a bid- ever, that under the later DQDB reservation rule, segment
ding process where each station bids for a token rotation transmissions can occur prior to the transmission of reser-
time (TRT) and the minimum such time i s selected. Two vation bits, so that the impact of reservation delays i s
classes of service are defined: synchronous, under which reduced. Packet delays are now primarily affected by the
a station can capture the token whenever it has synchro- distributed-queue PS system and its dependencies upon
nous frames to transmit; and asynchronous, which permits the locations of station along the bus, particularly when a
a station to capture a token only if the current TRT i s lower long bus span i s involved. As noted in the preceding, unfair
than the established TTRT. To support multiple priority lev- bandwidth allocation patterns can occur under the DQDB
els for asynchronous frames, additional time thresholds are scheme, unless a proper fair-access regulation algorithm i s
defined for each priority level. In this manner, a message incorporated.
of a certain priority level is allowed to be transmitted by its Both schemes employ a demand-assigned reservation
station, when the latter captures the token, only if the dif- procedure for circuit-switching allocation of isochronous
ference between the time this station has already used at circuits. Under FDDI-II, the packet-switched token chan-
this ring access (in transmitting higher priority messages) nels are byte-interleaved within 96 data groups, leading to
and thetime since the token last visited this station i s higher a packet mean delay which is nearly independent of the
than the corresponding time threshold associated with the isochronous channel arrangement.
underlying message priority level. This priority-based access Note that the DQDB protocol employs a slotted ATM
protocol is similar to the one used for the IEEE 802.4 token structure, which i s currently recommended by CClTT as a
bus LAN system. channelization structure for support of broadband ISDN
Using this procedure, stations can request and establish services in conjunction with fast packet-switching archi-
guaranteed bandwidth and response time for synchronous tectures.
frames. A guaranteed maximum response time is estab-
lished for the ring, since the arrival time between two suc-
C. Buffer Insertion Rings
cessive tokens at a station can be shown to not exceed the
value of 2 x TTRT. Buffer insertion rings have also been investigated as can-
As a polling scheme, the performance of FDDl is limited didates for fi ber-based high-speed network architectures.
by the ring walk (RW) time, which i s expressed as the ring The network i s configured as a ring, so that ring interface
latency representing the time it takes the token to propa- units (R1U’s)areconnected by point-to-point links. Each sta-
gate around the ring under no-load conditions. The ring tion i s associated with two buffers: a station buffer, which
throughput i s thus proportional to 1-RWITTRT.While lower stores the station’s packets waiting for accessing the ring;
TTRT values (such as 4-8 ms) yield lower guaranteed and a ring buffer, which i s inserted into the ring. In-transit
response times (lower than 8-16 ms), higher TTRT values packets arriving at the station’s ring interface unit from the
need to be selected to provide for better bandwidth uti- ring’s incoming unidirectional link are delayed at the ring
lization under higher load conditions. The ring latency var- buffer.
ies from a small value of 0.081 ms for a 50-station IO-km LAN An illustrative access protocol to such a ring i s given by
to a value of 0.808 ms for a 530-stations 100-km LAN. Using the IBM METARING network architecture [96]. Two coun-
a TTRT value of 50 ms for a LAN that supports 75 stations, terdirectional rings are used, with each station connected
30 km of fiber, and has a ring latency RW = 0.25 ms, a max- t o both rings. A station transmits its packets o n the ring that
imum utilization of 99.5 percent can be achieved [30]. provides the shortest path to its destination. Packets are
Under FDDI-II, a circuit-switched service i s embedded removed from the ring by their destination stations. No
into the token ring structure by the creation of a cycle for- token i s employed. A station having a ready packet to trans-
mat. A cycle master station i s assigned the responsibility to mit examines its ring buffer. If the latter is occupied, the
generate the cycles, one cycle every 125 p s , using an 8-kHz station queues itspacket,deferringaccesstothering traffic.
frequency reference clock. Each cycle has a cycle header In turn, if the ring buffer i s empty, the station proceeds to
which contains an isochronous channel template consist- transmit i t s packet across the ring. A packet that arrives
ingof 16symbols, one for each potential isochronous chan- across the ring at a (nondestination) station’s RIU during

RUBIN AND BAKER. MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 185
the time this station i s engaged in the transmission of i t s (and position)of station slots per cycle to be fixed, the delay-
own packet, is held in the ring buffer until the latter packet throughput performance provided to the station’s mes-
transmission terminates. In turn, such a packet arriving at sages i s independent of the performance provided to mes-
a RIU when the associated station i s not transmitting i s sages of any other station. The performance of a single sta-
immediately (after only a short delay in the buffer, as in a tion can thus be evaluated.
token ring system) retransmitted onto the outgoing link in A number of studies have been carried out in investi-
a cut-through fashion. gating the performance of TDMA systems under which the
Such an architecture can provide a significant increase underlying station i s allocated a single slot per cycle. For-
in the network throughput, approaching an average chan- mulas for the generating function and moments of the
nel capacity utilization of 400 percent due to the spatial queuesize(number of messages held in the station’s buffer,
reuse induced by the dual-ring structure and by the con- at any time in steady-state) distribution for such a TDMA
currency of destination-removed transmissions across each system have been derived in [39], [41], [42]. The generating
ring (which by itself yields an average of 100 percent function and moments of the message delay (total time
improvement in capacity utilization under a uniform traffic elapsed from the instant of message arrival to the instant
distribution). that the full message is transmitted across the channel) dis-
It is noted that in computingthe ringtransmission latency, tribution have been derived in [40], [41]. Performance anal-
in comparison with a token ring architecture, it is now nec- yses for such TDMA systems operating under station’s
essary to account for the additional packet delays that can buffer capacity limitations are presented in [49] and [93].
be incurred in the ring buffers along the message path. Related models have also been studied in [45] and [46].
However, since high-speed fiber finks are involved, the lat- The latter paper studies the performance of single-packet
ter latencies are usually dominated by the longer propa- messages transmitted by a single station along a discrete-
gation delay component of the ring traversal.time. time channel which is characterized by alternate available
An implementation of a buffer insertion ring for high- and blocked periods of random durations.
speed transmissions must incorporate a fairness control Under a priority-based TDMA scheme, the station’s mes-
algorithm to ensure equitable and fair access to the ring sages are queued for transmission in accordance with their
stations. In [96] such an algorithm i s presented; it uses con- priority levels. For a single-slot-per-cycle TDMA assign-
trol signals that are embedded in unused physical-layer- ment, assuming messages to arrive at the system in accor-
based coded signals. The latter control signals can traverse dance with a Poisson process, message delay analysis has
the ring within a period of time which is close to the ring been carried out in [44] for a nonpreemptive priority dis-
propagation delay, independently of any current message cipline, and in [51], [52] for preemptive-resume service pol-
transmissions across the ring. Such signals are transmitted icies. Message delay and system queue-size results, for a
on ring A for providing fairness control of transmissions general independent (cycle to cycle) arrival process, for a
across the counterdirectional ring B. The signaling scheme (station allocation of a) single-slot-per-cycle priority TDMA
i s used by a station to prevent itself from being blocked system using preemptive or nonpreemptive multiple prior-
from entering the ring by a downstream station that trans- ity-class service policies, have been derived in [48].
mitsan excessive numberof packets,ensuringthatastation The latter analysis involves the study of priority-based
is provided acess to the ring within a period of time deter- single-server discrete-time queueing systems. It thus
mined by the cycle of the signaling message. induces a TDMA cycle-gated service model, under which
message arrivals are recorded at the end of each cycle, so
that messages arriving during the frame are randomly
VI. MODELING OF FIXED ASSIGNED
AND ANALYSIS MAC
ordered for transmission while messages arriving in dif-
SCHEMES
ferent frames are ordered in a first-come first-served basis.
Under a fixed assigned MAC procedure, each station is Note that when message length distributions are indepen-
allocated a fixed resource of the shared communications dent of the message priority class, the system queue-size
medium, on a dedicated basis, across each dimension of distribution, and thus the average message delay, i s insen-
the {T, F, C, S } assignment space. sitive to the latter ordering, provided a work-conserving
Time division multiple access (TDMA) and frequencydivi- service discipline i s employed. The results in [48] for buffer
sion multiple access (FDMA) procedures have been most occupancy and message delay performance thus also apply
often utilized as fixed-assignment MAC schemes. In the fol- to the analysis of slotted FDMA systems, whereby a station
lowing, we outline models and performance analysis i s provided adedicated time-slotted frequency band forthe
approaches for TDMA systems; the corresponding analysis transmission of i t s buffered messages.
of FDMA systems i s also noted. The following formulas describe the message delay per-
A slotted channel isconsidered. Undera packet-switched formance of a station allocated a single slot per cycle in a
TDMA (PS-TDMA; simplified as TDMA henceforth), a sta- TDMA system, operating as a cycle-gated service system
tion sharing a multiple-access medium i s allocated a num- [40], [41]. Assume messages to arrive at the station in accor-
ber of slots during each cycle (timeframe). The station uses dance with the arrival sequence N = {N,, n 2 I } , which
these slots to transmit its buffered messages across the consists of independent identically distributed (i.i.d.) ran-
communications channel. Messages arriving at the station dom variables, where N, denotes the number of messages
are segmented into MAC packets (frames) so that the sta- arriving at the station during the nth cycle. Set the gen-
tion can transmit a single packet duringeach oneof itsded- erating function (z-transform) and first two moments of N,
icated slots. The station can thus statistically multiplex (on to be given by N*(z), n, = €(N,,),n2 = UN:), respectively.
a priority basis, if desired) its packets while ordering them A message contains a random number of packets B , which
for transmission across the channel. Assuming the number i s governed by a general distribution whose generating

186 PROCEEDINGS OF THE IEEE, VOL. 78, NO. 1, JANUARY 1990


function and moments are given by B*(z), = E @ ) , P2 = The generating function and mean of the wait-time distri-
€(B2), respectively. Each packet transmission time i s equal bution are expressed in terms of the corresponding dis-
to a single slot. A cycle (time frame) consists of M slots. crete time system (M = 1)variables as
The station generates an average of p = n,P packets per
cycle while it i s allocated only a single slot per cycle. For w*(z) = WE(zM), E(W) = Mf(WD).
p < 1, the station’s throughput rate i s equal t o p (packets/ The effective message transmission time statistics are given
service slot). The station queue-size process then reaches
by
steady state. We assume henceforth that p < 1and present
steady-state performance equations. T*(z) = z ’ - ~ B * ( z ~ ) , €(T) = MP + 1 - M,
The message waiting time (W) in the station buffer i s the noting that the intertransmission times between the first
time measured from the instant the message arrives at the B - 1 packets included in a message are each equal to a
station to the instant i t s transmission starts. For M = 1,when cycle duration of M slots, while the last packet terminates
the channel i s dedicated to the underlying station, so that the message transmission after an additional single trans-
a discrete time queueing system model results which i s of mission slot.
interest for multiplexing and slotted FDMA systems, the The preceding components are then combined t o yield
z-transform of the steady-state message wait-time WD the generating function of the message delay distribution.
(expressed in slots) i s given by For the special case of a Poisson arrival process at the sta-
tion, with a station’s message arrival intensity of X [mes-
WE(Z) = { ( I - p)(z - l ) [ z - N*(B*(z))l-I)
sages/slot], the station’s frame arrival generating function
* {I - N*(B*(z))][n,(l - B*(z))l-’}. i s equal to

for IzI I1. Notethat agroupof messages may arriveduring N*(z) = exp [MX(z - I)],
asinglecycle intothestation.Thefirst messageofthisgroup yielding the following mean delay expressions:
of messages to be selected for service i s called the group
leader. The first term in this expression accounts for the
waiting time of the group leader [41], while the second term
represents the waiting time of the message beyond that of E(D) = [(M - + ME(W,) + [MO + 1 - MI + 1/2
1)/2]
the group leader. The corresponding mean message wait-
= Mp[2(1 - p)]-’(/32/P) + MP + 1 - M/2,
ing-time in the station’s buffer i s obtained from this equa-
tion, to be given by where p = MAP < 1. Note that since a Poisson process i s
acontinuous-time arrival point process, an additional mean
delay of 112 slot has been included to account for the aver-
age latency between the message arrival within a slot and
+ (P/Z)[(n,/n,) - 11. its discrete-time recording at the end of the slot. Also note
The generating function and mean of the corresponding that the difference between the mean message delays com-
message delay D D (expressed in slots), which i s equal to the puted for corresponding TDMA and FDMA systems [40] i s
sum of the message wait time and i t s transmission time, are given by
thus equal to E(DF) - €(DT) = (M - 1)/2.

DE(Z) = W;(Z)B*(Z), f ( D D ) = €(WD) + P. For TDMA systems in which a station i s provided multiple
slots, say N, per cycle (consisting of M slots), the following
For aTDMA system with M > 1, so that the station i s allo- two cases are noted.
cated a single slot per each cycle which consists of M slots, If the station slots are uniformly distributed overthecycle,
the message steady-state delay D i s expressed as D = F + such that the ratio M/N = K i s an integer, the TDMA system
+
W T, where F is the message frame-latency component model can be reduced to that of a TDMA system, under
expressing the period of time elapsed between the message which the station i s dedicated a single slot per cycle by rede-
slot of arrival and the start of the station’s next service slot; fining the system cycle to be equal to K slots.
W is the message waiting time, measured from the latter On the other hand, consider aTDMA system in which the
time to the start of the message’s first transmission slot; and station is allocated N continguous slots during each cycle,
Trepresents the stations effective transmission time, which and set M = N + L. An exact analysis for such a system is
i s equal to the total time it takes to transmit all the packets provided in [43] for fixed-length messages, and in a recent
belonging to the underlying message. As noted, assuming extension by same authors to messages which contain a
station messages arriving within the same frame to be geometrically distributed random number of messages.
ordered randomly (among themselves) for subsequent This study also presents simple tight upper and lower
transmissions, the aforementioned three delay compo- bounds for the average station buffer queue size and mes-
nents are statistically independent, and the corresponding sage delay. These bounds are presented in the following.
generating function i s given by Station messages are assumed to arrive independently from
slot to slot in accordance with the i.i.d. sequence {A,, n 2
D*(z) = F*(z) W*(z) T*(z).
I } , where A, denotes the number of station messages arriv-
For message arrival processes that induce uniform arrival ing during the nth slot, so that N*(z) = [A*(z)lM, A*(z) =
distributions across the cycle, we have, (zI < 1, €(zAn), a = €(A,), a2 = €(A:). The message arrival rate at the
station is thusequal t o a mess/slot. Each message i s assumed
F*(z) = M - ’ ( l - zM)(l - z)-’, €(F) = (M - 1)/2. to contain a random number of packets governed by a geo-

RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 187

- _ _ _
metric distribution with parameter 9, and a mean of l I q Since the session holding time is manytimes much longer
(packetdmessage). than the cycle duration, the cycle microstructure (involving
Steady-state conditions are attained for (aI9) < (NIM), the specific station slot configuration) is usually neglected,
noting that the throughput rate is equal t o d q (packets/slot), and conventional blocking or delayed queueing system
while the system's per-station service rate (and throughput models are utilized to derive system performance.
capacity) is given by NIM. Exact results for the generating An analysis which incorporates the cycle microstructure
function of the distribution of the system message queue- i s presented in [47] for a CS-TDMA scheme which employs
size X (expressing the total number of messages queued at a delayed service. Requests are queued and served on a
the station buffer, at steady state) are obtained in [43], with FCFS basis. Each request requires the establishment of a
the mean message queue size E ( X ) shown to satisfy the fol- circuit that consists of a single slot per cycle, for the dura-
lowing bounds: tion of the session. The station can thus accommodate N
simultaneous active circuits. Results are first obtained for
Q < E(X) < Q + (N - 1)(L/M)/2 the queue-size and waiting-time distribution sfor adiscrete-
where time geom'"'IgeomIN queueing system. These results are
then used to derive the generating function for the station
Q = [241 - CY) + a2]/[2(q - a)] system size distribution under a CS-TDMA scheme. The
+ {Lq[a2 - a* + a(2 - 9)]}/[2(9 - a)(Nq - Ma)]. associated computation requires the solution of (N 1)2N +
linear equations. To derive a more computationally effec-
We note that the upper and lower bounds for the mean tive procedure, tight lower and upper bounds are obtained
queue-size differ at most by constant value of (N - 1)/2. For for the mean queue size and mean message delay func-
N = 1, a station i s allocated a single slot per cycle and the tions, requiring the solution of, at most, 3 N linear equa-
upper and lower bounds coincide, yielding E ( X ) = Q. tions. It i s also proved in [47] that a slot distribution con-
Message delay analysis for a TDMA system in which a sta- figuration which distributes station slots uniformlyover the
tion i s allocated N contiguous slots per cycle i s carried out cycle yields a mean message delay lower bound.
in [43] for a number of common message arrival point pro-
cess models, yielding expressions for the generating func-
VII. MODELINGAND ANALYSIS
OF DEMAND-ASSIGNID
tion of the message delay distribution. The mean message
RESERVATIONMAC SCHEMES
delay can be obtained using Little's formula, E(D) = E(X)a,
and is thus bounded through the use of the preceding pre- Under a demand-assigned reservation access control
sented bounds for E(X). For a continuous-time Poisson pro- scheme, an active station first generates a reservation mes-
cess with station message arrival rate equal to A, we set €(D) sage which it then transmits either to a central control sta-
=P E ( X ) + 1I2. tion or to all stations when a distributed control scheme is
In comparing system performance under the two afore- employed. The station i s then allocated a transmission cell
mentioned slot allocation configurations, when the ratio across the {T, F, C, S } assignment space. For the purpose
MIN is assumed to be a positive integer, under the traffic of carrying reservation messages, a reservation channel i s
model presented, the following result i s proved in [43]. The established and a reservation access-control algorithm is
steady-state station mean queue-size and mean message invoked. To assess the efficiency of such a demand-assigned
delay experienced under the contiguous slot allocation operation, one needs to evaluate the combined message
configuration is lower bounded by the corresponding per- delay (or sessionkall blocking) versus system throughput
formance levels attained when slots are uniformly distrib- performance, involving the joint operation of the reser-
uted across the frame. vation and information transmission schemes.
For schemes that involve a general allocation of station We review here a number of such demand-assigned
slots across the frame, the following results are available. TDMA (DAiTDMA) schemes, which use reservation pro-
For such TDMA systems with Poisson arrival streams and cedures to share acommunications medium on atime-divi-
single-packet messages, generating functions for the sion basis. Assume a slotted channel whose timeline con-
packet-size distribution are obtained in [go]. In [91], using sists of cycles (frames), each containing M slots.
asimilar model, it is shown that auniform distribution yields Under an in-band reservation procedure, a reservation
a mean packet delay lower bound, as already noted. In [92], period i s established during each cycle for transmission of
this model i s analyzed with the assumption of multipacket reservation packets across the main shared channel. For
messages to yield expressions for the generating functions example, under such a fixed reservation access control
of the system packet size and message delays. Note that all (FRAC) scheme [41], a fixed number of slots (or minislots)
of these results require one to solve for the multiple roots N, is allocated during each frame for stations to transmit
of a functional equation. In turn, note that the bounds pre- their reservation packets, in accordance with a specified
sented are readily computed. access control scheme, such as a fixed-assigned TDMA
Under a circuit-switched TDMA (CS-TDMA)scheme, each (whereby each station is allocated a reservation minislot for
station i s also allocated N slots per cycle. A station provides the transmission of its reservation packet) or such as a ran-
access to thechannel for i t s sessions by assigning to a ready dom-access method. A reservation delay D,,, is incurred by
session one of its dedicated circuits, for the total duration an active station in transmitting i t s reservation message.
of the session. Under a blocking service, a session is blocked The remainder of the period, consisting of N = M - N,
if upon its arrival no available circuit can be allocated by slots, i s available for information transmission of reserved-
the station. Under a delayed service, session requests for for messages.
circuit assignments arequeued atthe station request buffer Transmitted reservations can be considered to wait for
and are satisfied on a FCFS (or priority) basis. service in an equivalent single queue, which is the physical

188 PROCEEDINGS OF THE IEEE, VOL. 78, NO. 1, JANUARY 1990

~ ~ _ _
reservation queue at the central controller when a centrally the concurrent blocking probability (designating the prob-
controlled reservation scheme is implemented, or i s a "dis- ability that both the destination station i s busy and that no
tributed queue" whose state represents the reservation sufficient capacity can be allocated for the establishment
queue state at each station when a distributed control of the requested circuit). It is noted that destination-busy
implementation i s employed. Then, considering message probabilities can provide a major contribution to the over-
delay or blocking performance for arbitrary messages or all blocking probability under certain network conditions,
sessions which have already made their reservations, a and that the circuit-blocking and destination-busy proba-
TDMA model can be employed. For example, consider a bilities are many times inversely affected by the connec-
packet-switching DA/TDMA service (DA/PS-TDMA scheme). tivity configuration and the associated sizes of the com-
The queueing delay performance of reserved messages can mu n icating groups.
then be derived from the analysis presented in section VI In considering demand-assigned reservation schemes,
for a PS-TDMA system [43] by associating the reservation there is considerable interest in sharing the communica-
queue with a superstation, which is served in accordance tions medium among a multiplicity of services, including
with a TDMA scheme, which provides the station N = M - the integration of datalvoice and data/voice/video services.
N,,, service slots during each cycle of M slots. The arrival Using a demand-assigned reservation scheme, each station
message stream at this station consists of the arrivals of all can be allocated a fixed bandwidth, or a fixed number of
message reservations. The latter arrival point process can time slots per cycle, and then multiplex its multiple-service
at times be modeled as the superposition of all message packets and connections across its dedicate cell. In addi-
arrival processes at the stations; in particular, this statistical tion, a portion (or all) of the shared channel bandwidth can
characterization applies when nearly fixed or relatively low beallocated to stations upon the receipt of their reservation
reservation delays are experienced. Otherwise, a more request, depending upon the requested service type. Inte-
involved characterization of the reservation output process grated-services network systems can provide flexibility and
i s required; this may require a much more complex exact versatility in terminal connectivity and can capitalize on the
or approximate queueing analysis. A similar approach i s economics of equipment commonality to yield better
used when a circuit-switched reservation system (DA/CS- resource utilization and more efficient implementations of
TDMA) i s considered. network operations, maintenance, and administrative
When using a circuit-switching discipline, and consid- functions.
ering the establishment of end-to-end connections across In relation to the employed switching discipline, the fol-
a network of communications links, a reservation message lowing integrated-services MAC systems are observed:
fora session setup can be satisfied only if the requested link
a) integrated-services packet-switching MAC systems,
capacity can be made available and allocated across each
b) integrated-services circuit-switching MAC systems,
one of the links belonging to the connection path. Under
c) integrated-services hybrid packet and circuit-switch-
a blocking service, if no such end-to-end circuit can be allo-
ing MAC systems.
cated, the request i s blocked. Due to the complex statistical
dependencies which consequently exist between the states In a pure packet-switching MAC system, packets belong-
of different links, blocking performance analyses for cir- ing to different service classes (data, voice, video, etc.) can
cuit-switched networks have been carried out by many be treated equally. As a result, it is necessary to ensure that
researchers through the use of a link congestion indepen- the attained performance levels (including packet delays
dence assumption, which takes the blocking events over and loss probabilities) are acceptable for the provision of
different links to be statistically independent. Infinite each service. In turn, a more efficient utilization of the
source models are then employed and Erlang's loss formula shared bandwidth resources can be achieved through the
is typically used to compute the blocking probability(grade- use of service-type-based packet priorities, as well as the
of-service) performance for each link (see, for example, [53]- incorporation of flow control and congestion control
[58] and the references therein). For the blocking perfor- schemes to ensure that certain admitted packets (or packet
mance analysis of a single multiple-access communications sessions/bursts) can be provided with acceptable delay and
channel (such as a satellite communications channel or a loss probability levels.
shared terrestrial trunk group) when finite source models Such considerations are essential in the design of a fast
are used (so that each station can be engaged in, at most, packet-switching network. The fast packet switch itself can
a single connection at a time), see [59]-[61]. be regarded as a packet-switched MAC system that must
The blocking performance of interconnected circuit- operate under the limitations described. See [63] for an
switched MAN's (or LAN's), each represented as a multiple- illustration and a corresponding analysis of a packet switch
access channel whose bandwidth is shared among all local node in a real-time system environment. It is shown that
stationsforthe purposeof establishing local aswell as long- with a small number of buffers, the node (under essentially
distance connections, i s investigated in [62]. Each pair of an output buffering configuration) can provide a guaran-
MAN's i s interconnected by a multiple-access communi- teed delay bound for high-priority traffic, a low average
cations channel backbone. Finite-source models are delay for low-priority traffic, no loss of packets at the input,
assumed, and a realistic connectivity configuration has been and low probability of packet loss at the output.
specified so that each station can be assumed to statistically In a pure circuit-switching integrated-services MAC sys-
communicate with stations that belong to a specified set of tem, the communications medium provides multiple-rate
target stations rather than with (potentially) all network sta- circuit connections to a diverse mixture of service types.
tions. The computed blocking probability functions are Connections for different service types require different
expressed as the sum of three components: the destination channel bandwidth (time slot) allocations. The perfor-
blocking probability, the circuit blocking probability, and mance behavior of such demand-assigned reservation cir-

RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 189

__
cuit-switched MAC systems involves the computation of the support of circuit-switched connections while the sec-
the underlying blocking probability levels provided to each ond part, which contains a fixed number of M - N, slots/
service class, under a specified procedure for sharing the cycle, i s used for the transmission of packets by packet-
channel among the different service classes. The latter pro- switched stations. Integrated voiceldata systems can thus
cedures typically involve fully dedicated components be accommodated through the provision of a circuit-
(whereby each class is dedicated a minimal amount of chan- switched service to thevoice sessions and a packet-switched
nel bandwidth) as well as partially shared components service to the data stations. The blocking or delay analysis
(which provide for sharing of a certain amount of channel of the circuit-switched component can be approximated
bandwidth among certain service classes). For related through the use of N, server queueing-system models, such
blocking analysis, we refer to the aforementioned papers as the MIGlN,,lN,, model, when a blocking (blocked-call
presenting analysis for circuit-switching networks, using lost) service i s provided. Such models disregard the details
either infinite-source models (such as [55], [58]) and Erlang's of the cyclic structure (eftectively assuming call arrivals and
loss formula or employing finite-source models and Engset- terminations to be recorded at the end of their correspond-
type equations ([60]-[62]). In [64], blocking performance ing cycles), noting that many times the calllsession holding
analysis i s carried out for an integrated-services circuit- times are much longer than the cycle duration. An exact
switched channel, using finite-source station models and delay (or blocking) analysis which incorporates the micro-
realistic connectivity patterns. As in [62], the behavior of structureof the framecan be carried out by using the results
each service class is characterized in terms of the corre- of the DAlCS-TDMA model developed in [47l. For this pur-
sponding blocking probability components, including the pose, the superstation under investigation is assumed to
circuit-blocking and destination-busy probabilities. It i s also receive the totality of network reservations for circuit allo-
demonstrated in [64], as previously noted in [65], that when cations. This station is allocated N,, slots per each cycle of
wideband and narrowband service types are multiplexed M slots. The delay computed for a reservation message buff-
over a shared wideband circuit-switched communications ered at this station thus serves to exhibit the delay expe-
channel, fluctuations are observed in the blocking perfor- rienced by a circuit-switched station.
mance of the narrowband service, for a fixed total traffic Similarly, when considering the delays experienced by
load, because the fractional traffic load share of the wide- messages transmitted during the packet-switched part of
band service type i s varied. It is also noted that, to guarantee the cycle, the results presented in [43] (as well as other anal-
an acceptable grade-of-service to the wideband service class yses; see previous section) for TDMA schemes can be
as well as reduce the aforementioned fluctuations, it is invoked when fixed-assigned or demand-assigned reser-
advantageous to dedicate an appropriate minimum num- vation TDMA procedures are used by the packet-switched
ber of circuits for allocation to only wideband service con- stations. Thus, for example, a station which is allocated K
nections; the remaining bandwidth can be effectively slots within the packet-switched part of each cycle i s expe-
shared among the various service types. riencing the same delay performance as a station supported
In reducing the transit delay of information along a cir- under a PS-TDMA schemewhich is allocated Kslots per each
cuit-switched multihop lightwave network, it can beadvan- cycle of M slots. A similar approach i s used when packet-
tageoustoallocatethetime slotswithin each cycle(overthe switched stations are controlled by a DAlPS-TDMA MAC
TDM links constituting the connection path) so that no procedure during their dedicated cycle portion.
store-and-forward (time-slot interchange) delays are U nder a movable-bou ndary hy brid-switc h ing MAC sys-
incurred within the network. In this manner, information tem,the boundaryisdynamicallydetermined for each cycle,
transmitted across the circuit i s guaranteed a transmission based upon the current demand for communications sup-
slot to be available immediately upon arrival at each inter- port. In an integrated CS-voicelPS-data system, priority is
mediate node. As a result, optical switches can be used, often provided to voice connections, with a certain mini-
eliminating excess delays created by the slower electronic mum number of data slots reserved for PS-data transmis-
components. Such a slot assignment procedure has been sions. In addition, each portion of the cycle not occupied
investigated in [661. by CS-voice connections can be allocated for packet trans-
Integrated-services MAC systems that employ a hybrid missions. In considering the performance analysis of such
of circuit-switched and packet-switched procedures have aMACpolicy,wenotethefollowing. LetN,denotethe num-
been regularly employed by and planned for many high- ber of slots occupied by active CS connections during the
speed local and metropolitan area networks. We consider tth cycle. (For example, a slot can accommodate L voice con-
in the following such systems that operate on a time-shar- nections; e.g., in the IEEE 802.6 DQDB, L = 64, under one
ing demand-assigned reservation (DAlTDMA) basis. To of the currently stated configurations.) Then, M - N, slots
accommodate both circuit-switched and packet-switched are made available within the tth cycle for the transmission
services, the time cycle i s divided into two parts. The first of PS packets. The blocking (or delay) performance of the
part i s allocated for the support of circuit-switched con- CS component i s carried out by following the approaches
nections while the second part i s used for the transmission noted in the preceding paragraphs since CS connections
of packets belonging to carried packet-switched sessions. are provided priority. This analysis can also provide the sta-
In relation to the establishment of the boundary between tistics of the CS connection-size process N = {N,, t 2 I}.
the cycle's circuit-switched and packet-switched parts, we The performance of the PS component clearly depends
distinguish two categories of schemes: fixed boundary and upon the statistics of N. As shown in [67], when considering
movable boundary. a channel multiplexing configuration, with total PS-packet
Under a fixed-boundary scheme, the cycle is divided per- arrival rate equal to Xps (packetslslot) and packet transmis-
manently (or for a specified period of time) into two fixed sion time equal to a single slot duration, the stability con-
parts. The first part, consisting of N,, slotslcycle, is used for dition for the movable-boundary multiplexor i s given by

190 PROCEEDINGS OF THE IEEE, VOL. 78, NO. 1, JANUARY 1990


MA,, < M - E{N} tecture under investigation. Additional discussions and
analyses of movable-boundary systems appear in [77]-[80].
which requires the packet arrival rate to be lower than the
In [43] such an analysis i s carried out for the QPSX scheme,
average available channel PS service rate. The PS queue sat-
which forms the basis of the IEEE 802.6 DQDB MAC system.
isfying this stability condition i s said to be globally stable.
Under a July 1988 version of the IEEE 802.6 DQDB docu-
A cycle or period governed by an allocation of N, = j cir-
ment, label multiplexing has replaced position multiplex-
cuits is said to be in mode j . A period during which MA,,
ing, so that two modes of isochronous service are possible:
> M - N, is designated as an overload period. During such
1) a slot i s shared by L octets (voice samples) belonging to
a period, the PS service rate i s lower than the PS arrival rate
L separatecircuitconnections;2)asinglecircuitconnection
and the queue is said to be locally unstable, while it may
consists of a whole 64-octet slot which i s transmitted every
be at the same time globally stable [34], [67]-[69].
64 cycles. Under mode-I operation, slots can be wasted by
It is particularly important for a hybrid switching system
being partially occupied by less than L circuits. This waste
toavoid local instabilities. Sincethe holding timeof circuits
can be reduced under a repacking policy which requires
are long (can be measured in minutes) relative to packet
reassignment of the busy isochronous octets at each ter-
transmission and interarrival times (measured many times
mination of a circuit connection. The analysis of the result-
in milliseconds), an overload period can last for a relatively
ing movable boundary scheme then follows through use
long period of time. It is thus essential that proper flow con-
of the approaches presented. However, repacking proce-
trol strategies be applied to prevent overload conditions
dures are usually avoided due to their complexities and pro-
and local instabilities.
cessing cost. The most commonly used circuit allocation
If local instabilities are avoided, the packet queueing per-
policy i s the first-fit procedure, which assigns to a new cir-
formance under a slowly varying service rate can be accu-
cuit connection the first available octet (lowest octet num-
rately evaluated by using the quasi-stationary approach [34],
ber). Octets are not reassigned following a circuit termi-
[67, [70]. Under this method, one first obtains the steady-
nation so that "holes" can be created, leading to increased
state distribution for N, deriving P { N = j } , j > 0, as com-
waste in slot utilization. For the performance of such
puted from the analysis of the CS component. Then, the PS
schemes, see [34] and the references therein.
queueing system is analyzed for every j for which P{N =
Many of the approaches just mentioned for the analysis
j } > 0 by assuming it to constantly reside in mode j . The
of the integrated-services packet-switched system segment
underlying PS average performance i s subsequently com-
assume the offered traffic streams to be modeled by Pois-
puted as theweighted averageof the corresponding PS per-
son processes. However, it has been demonstrated that
formance measures obtained separately for each capacity
such models can lead, in many situations, to grossly incor-
mode. Thus the computation of the distribution of the PS
rect performance predictions (see, for example, [81]). While
state X i s given by
for certain systems operating under low traffic intensities,
P{X = i} = C P{X = i )N = j } PIN = j). Poisson models might suffice [82], under higher traffic
I
intensity conditions the Poisson process model can prove
See also [71]-[73]. to be inadequate for predicting packet loss and delay per-
The delay analysis of a PS component which i s controlled formance. A batch Poisson process model has been used
by aTDMA or a DA/PS-TDMA procedure can thus be carried in [83] for systems operating under heavy traffic conditions.
out as follows using a quasi-stationary approach. Under Alternative traffic models have been employed t o char-
mode j , the PS component is allocated M - j slots per cycle, acterize traffic processes. Doubly stochastic Poisson pro-
and its corresponding TDMA or DA/TDMA analysis follows cesses and, in particular, Markov modulated Poisson pro-
the results and techniques presented in the preceding sec- cess (MMPP) models have been used by many researchers
tion and in [43]. The latter results, which incorporate the as approximations for a packet stream. Under a MMPP, the
microstructure of the cycle, are then averaged using the intensityofthe Poisson processfluctuatesamonga number
P { N = j } weights indicated above. of traffic activity states; a Markov process is used to model
Performance analysiswhen the packet queue can become the evolution of the traffic activity process. In [72]-[73], a
locally unstable i s much more complex. For such systems, two-state MMPP model i s used to describe the evolution
we note the following. A movable boundary analysis was of a bursty traffic process, as the latter fluctuates between
carried out in [74] assuming gated service (PS messages are a high-intensity modeand alow-intensitymode,and tocarry
admitted only at cycle boundaries) and that the CS con- out the related queueing analysis for single-server and mul-
nection sizevariables { N,} are statistically independent and tichannel queueing systems. It is shown that for a globally
identicallydistributed. It has, however, been shown bysim- stable system which is locally unstable during high inten-
ulations performed in [75] that the latter independence sity modes, the message queueing delays and queue-sizes
assumption leads to a considerable reduction in PS queue can significantly grow as the switching rate between the
sizes. The process N i s noted to be highly correlated, so that modes decreases. For a corresponding globally stable sys-
overload modes tend to persist for relatively long periods tem that i s controlled to stay also locally stable under each
of time, leading to sustained growth in the PS data backlog mode, it i s shown that the global message queue-size and
during those periods. To incorporate such effects, matrix- delay behavior is calculated through the weighted average
geometric methods combined with phase-type approxi- of the corresponding behavior results computed separately
mations [68]-[69], [76] or fluid approximations [70] can be when the system is driven by a single-mode traffic process.
employed for performance evaluation of the PS queueing See also [69], [84], and [85] for the use of the MMPP model
system. To reduce computational complexities, it is to describe system traffic streams, including combined
required to further develop efficient approximation tech- packetized voice and data streams.
niqueswhich are tailored to the specific MAC system archi- Traffic streams generated by packet voice sources are

RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 191

~
highly dominated by the deterministic packet interarrival Polling systems can be distinguished from each other in
times occurring during voice activity bursts. As a result, a number of ways.
while Poisson-based models can provide acceptable Buffering: In some systems, stations buffer, at most, one
approximations for traffic streams when an average packet message and do not generate a new message until the buff-
performance i s determined, their use for the calculation of ered message has been transmitted. For example, if a sta-
loss and delay performance for packets belonging to a tion isavocoder, it may not startforminganewvoice packet
stream generated by a single source can be highly inac- until the buffer has been emptied. In other systems, a num-
curate [86]. Performance levels for such single-stream pack- ber of messages can be buffered at one time.
ets can be highly correlated during certain time periods. Type of Service:
More precise analyses can be carried out through the use
Exhaustive service: When polled, a station continues
of models such as those presented in [84] and [87]-[89],
transmitting messages until its buffer is empty.
which use multilayered models to incorporate randomness
Gated service: When polled, a station transmits all
in the generation and termination times of calls and pack-
those messages that were present when the polling
ets. Under such models, the active call population i s itself
message arrived.
random.
Limited service: When polled, a station transmits, at
Multilayer traffic models need to also be used for a more
most, one (or, more generally, at most, k ) messages.
faithful description of many network admitted broadband
Note that there i s no difference between exhaustive,
service streams which are flow controlled at different layers
gated, and limited service when the stations have sin-
of the OS1 model. For example, in [88], randomly arriving
gle message buffers. Also, the performanceof thethree
calls/sessionsare flow-controlled at the session level, so that
disciplines are virtually identical when the probability
only admitted calls can generate packets which are then
of any station having more than one message when
processed by the shared queueing system or, equivalently,
polled is low (for example, if the system has a large
the MAC system. A nested set of multilayered stochastic
number of low usage stations).
process models i s thus required to characterize the traffic
Adaptive service: The number of messages transmitted
processes generated by sources engaged in various broad-
bya polled station isafunction of the station’scurrent
band services, as well as to model superimposed broad-
number of buffered messages and of prescribed sta-
band-ISDN traffic streams, in terms of the underlying sta-
tion and message priority parameters.
tistics characterizing the traffic component at the call/
Messagepriorities: If different types of messages have
session, burst, message, packet, and segment levels.
different priorities, they can be given different levels
of service by polling for low-priority messages only
VIII. AND ANALYSIS
MODELING OF POLLING SYSTEMS when there are no high-priority messages in the sys-
tem, or by using different service rules for different
Polling schemes, like other access control protocols, are service classes.
used to share common communication resources among Delay constraints: In systems where messages have
agroupof stationsor users. Polling schemestaketheir name delay constraints, the length of time that a polled sta-
from the following type of early application: the “polling” tion can spend transmitting during a particular poll
of a group of terminals by a terminal controller (see Fig. 15). can be made to depend upon the length of time since
The terminal controller polls each of the terminals in turn, the last poll. Thus, when the system i s busy and the
checking to see if the terminal has a message to transmit length of times between consecutive polls of a station
to the computer. If so, the terminal i s given permission to increases, the stations are not allowed to transmit as
transmit the message. If not, the controller polls the next much. This can be used to limit the maximum cycle
terminal. time.
We can immediately see many variations on this basic
approach. Wecan eliminatethecontroller and havethe sta- Polling Order:
tions pass a polling message, or token, among themselves
(distributed control.) With some topologies, stations can Circular order: If there are N stations, they are polled
consider periodsof silenceto be implicittokenswhich indi- in the order 1, 2, . . , N, 1, 2, . . . .
1

cate that the station(s) ahead of them in the polling order General service order table: The stations are polled
have nothing to transmit. accordingtoafixed table.Astation can begiven higher
A number of access protocols for high-speed networks priority by listing it more than once per cycle.
have aspects of traditional polling schemes mixed with Random order: After service i s completed at one sta-
aspectsof othertypesof protocols. Wewill distinguish poll- tion, the next station to be polled can be chosen ran-
ing schemes from other multiple-access protocols by con- domly [97].
sideration of the following properties.

Stations do not have to request permission totransmit;


they are asked.
Stations do not receive a fixed allocation of time; if a
polled station has nothing to transmit, another station
will be granted access.
The right to transmit i s granted to, at most, one station
at a time (see previous sections for discussions of this
property). Fig. 15. Computer example.

192 PROCEEDINGS OF THE IEEE, VOL. 78, NO. 1, JANUARY 1990


Station 3 for an exponentiallydistributed period of time,
with parameter A,. The messages are all of fixed
length, b. Walk times are also of fixed lengths.
We let r, be the walk time from station ito sta-
r; tion i + 1 (rN i s the walk time from station N
to station 1).

Model3: We will use this model for evaluating packet


Station N ’ Station2 delay when the stations can be modeled as
Poisson sources with large buffers (or when
there are many stations with low traffic rates,
so that buffer occupancies are not pro-
Station 1 nounced).
A collection of N stations with infinite queues
Fig. 16. Basic model. are cyclically polled by a single server.
Messages arriveat station iaccordingto a Pois-
son process with rate A,. Message lengths are
Adaptive order: The order of stations to be polled i s governed by a general distribution (expressed
dynamically determined by the underlying system in terms of the required transmission time)
state conditions, and possibly also by knowing the sta- B,(.), which has first and second moments b,
tions‘ states and priority conditions. and bj2).We will assume that the first and sec-
ond moments are finite. The total message
A. General Results arrival rateisA = CfJ=,A,.Theofferedtrafficdue
1) Mathematical Model: We will model the various poll- to station i i s p , = A,b,, and the total offered
ing systems with the following abstract model (see Fig. 16): traffic i s p = c,”,~p , .
The walk times between station i and station
The system has N queues (stations)and a single server. i + 1 are independent, identically distributed
The queues can have either finite or infinite buffers. random variables with mean r, and second
Messages arrive to the queues at random. moment rj2). We will assume that the first and
, The server wal ks from queue to queue in a fixed order. second moments are finite. The mean walk
It takes the server a random amount of time to walk time per cycle i s R = r,. The second
from one queue to the next. moment of the walk time per cycle i s R”’.
When the server reaches a queue, it transmits some We assume that the arrival, message length,
or all (depending upon the underlying type of service and walk time processes are all mutually inde-
employed) of the waiting messages, if any, and then pendent.
walks to the next queue. It takes the server a random
amount of time to transmit a message. 2) DelayAnalysis for Model2: Since all stations have sin-
gle message buffers under model 2, the system i s stable for
We will consider three special cases of this model. all traffic rates.
Model I : We will use this model for evaluating the max- Mack etal. [98] calculated the steady-state distribution for
imum possible throughput available with a the number of transmissions per cycle for a symmetric ver-
particular protocol. sion of this model. Scholl and Potier [99] used Mack‘s result
N stations with single message queues are forthe mean numberoftransmissions percycletocalculate
cyclically polled by a single server. Exactly M the mean message waiting time. Kaye [IOO] calculated the
of the N stations have ready messages during distribution of message delay. Takagi [I011 reviews these
each cycle. The messages are all of fixed length, results and generalizes them in a number of directions.
b, (where we measure the length in required Tobagi and Fine [I021 applied the results of Mack and Kaye
transmission time.)Walktimesarealsoof fixed to the analysis of delay in Expressnet.
lengths. We let r, be the walk time from station Consider a polling system satisfying model 2 with iden-
+
itostationi 1(fNisthewalktimefrom station tical arrival rates and message lengths for all stations. That
N to station 1). is, suppose that for any station i, the time between the ter-
mination of a message transmission and the next message
Model 2: We will use this model for evaluating packet arrival i s exponentially distributed with parameter A, the
delay in systems where stations have single +
walk time from station i to station i 1 is a constant r,, and
packet buffers and where the packet gener- the message length i s b.
ation time i s (at least approximately) expo- LetE[Q] bethe mean number of messagesserved in acycle
nentially distributed. of the system. Then ([IOI, 981)
N stations are cyclically polled by a single
server.
Each station has a single packet buffer. If sta-
tion i has a message (consisting of a single
packet) waiting for transmission, no new mes-
sage will be generated. After the message has
been transmitted, the station will remain idle

RUBlN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 193
The mean cycle time is given by When the system i s stationary, we know that the average
number of messages which arrive at each station during a
c =R + bE[Q] cycle must equal the average number of messages trans-
and the mean message waiting time i s given by mitted by the station during a cycle. The average number
of messages arriving at station iduring a cycle i s simply h,c.
E[W] = ( N - l ) b - l l h + -.NR The average number of messages transmitted by station i
E[Q1 during a cycle is equal to the average dwell time at idivided
3) Flow Analysis for Model 3: In this section we will use by the average message length for station imessages. Set-
simple balance-of-flow arguments (see Kuehn [103]) to cal- ting these two quantities equal, we find
culate the maximum throughput, average cycle time, and
average queue sizes at server arrival instants for model 3
d, = h,cb, = p , ~ i
, = 1, . . . ,N.
under gated, exhaustive, and limited-to-one service. Substituting in (3), we have
We call a polling system “stable” if for positive message N N
lengths and finite arrival rates the average queue sizes are
bounded. Under gated and exhaustive service, the polling
c = c plc + c r,.
r=1 ,=I

system in model 3 will be stable if and only if the total traffic Solving for the average cycle time, we find
intensity, p, is less than one. We assume henceforth that p
N
< 1. t ri
For limited-to-one service, we have to impose additional R
c = i=l
7 - -- (4)
conditions o n each station. In particular, we require that 1- p ‘
each station has, on average, less than one arrival per cycle I-Cp,
i=l
(noting that the mean cycle time is given by (4) below):
Theaverage number of messagesarrivingat station iduring
hi < (1 - p)/R j = 1, 2, . . ,N. a cycle i s thus
In the following, we will assume that the system param-
h,c =
A, R
-
eters satisfy the stability conditions and that the system has
1-P
reached steady state.
Let di be the average dwell time per visit of the server at and the mean dwell time at station i i s
station i.A cycle of the system consists of the sum of the
dwell times at each of the stations plus the sum of the walk
times. The average cycle time i s thus
N N The “intervisit time” at station i i s the time between the
c = c di + c r,.
i=l i=l
(3) server leaving station iat the end of its service, and the serv-
er’s return. Since a cycle (from station i’s point of view) con-
See Fig. 17 for details. sists of the server‘s dwell time at iplus the intervisit time,

C
Fig. 17. Average dwell times and walk times.

194 PROCEEDINGS OF THE IEEE, VOL. 78, NO. 1, JANUARY 1990


the mean intervisit time i s result extends previous results of Fuhrmann [105], [I121and
Fuhrmann and Cooper [117], [113].
Define
Upto be a random variable with the same distribution
4) Delay Analysis for Model 3:
astheamountof unfinishedworkin the polling system
Stochastic decompositions: Conservation laws and
at an arbitrary point in time;
decomposition principles have proven to be very useful
to be a random variable with the same distri-
tools in the analysis of queueing models. Recently, a num-
bution as the amount of unfinished work in the"asso-
ber of such powerful and useful results have been devel-
ciated" M/G/I queueing system at an arbitrary point
oped for polling systems. In this section we will present a
in time(the"associated"M/G/l queue isasinglequeue
very general stochastic decomposition of the total unfin-
serving the total of all the messages arriving to the N
ished work process, in a polling system satisfying model 3,
stations; that is, it i s an MIGII queue with arrival rate
into components which are readily calculated for several
equal to A and message length distribution equal to
common service disciplines.
In general, the total amount of unfinished work in a poll-
E,",, ( V A )B,(*)).
Y to be a random variable with the same distribution
ing system at any point in time i s a complicated function
as the amount of work at an arbitrary point during a
depending upon the message arrival streams, station inter-
walk time.
actions, and service discipline. We will see that we can split
the total unfinished work in the system into two cornpo- Theorem 7: Assume that the polling system i s ergodic
nents which respectively correspond to the amount of and stationary. Then
unfinishedworkthatwould beobserved ifall thewalktimes
were identically zero, and to theextraamount of unfinished
UP uM/G/I +
work due to the non-zero walk times. where and Yare independent.
This decomposition leadsto a"pseudo-conservation law" Pseudo-ConservationLaws: Pseudo-conservation laws for
for a weighted sum (summed over the N stations) of the polling systems with exhaustive or gated service were dis-
mean message waiting times. (The "pseudo-" prefix i s due covered by Ferguson and Aminetzeh [118]. Similar laws for
tothefactthatthevalueoftheweighted sumdependsupon limited service were first presented by Watson [119], Fuhr-
the service discipline, so that there i s not true conserva- mann [105], and Fuhrmann and Cooper [112], [117]. Using
tion). This pseudo-conservation law lets us calculate the the decomposition principle given by Theorem 1, we obtain
exact waiting times for symmetric systems. We can also use [I091 the following.
it to find the exact waiting times in systems with a single Theorem 2: Consider an ergodic polling system with
nodesendingall thetraffic (seealso [104]and [IOlIfor direct
mixed service strategies. Let
approaches to this problem). The law also gives us an easy
way to develop or check approximate solutions for other E be the group of stations which receive exhaustive ser-
systems. Because the pseudo-conservation law only tells us vice;
what theweighted sum of the mean waiting times is, in gen- G be the group of stations which receive gated service;
eral we cannot use it to derive exact solutions for asym- L be the group of stations which receive limited-to-one
metric systems. service.
For an M/G/I queue with independent server vacations,
the notion of stochastic decomposition i s quite precise. The Then
waiting time i s represented as the sum of two independent
random variables: one with the same distribution as the
waiting time in an M/G/I queue with the same arrival rate
and service time distribution but no server vacations, and
the other with the same distribution as the forward recurr-
ence time of the vacation time distribution ([105], [106]).
It turnsout that this notion of decomposition isveryfun- +-I-R p c Pf.
damental. Stochastic decomposition of various types have isC,L

been shown to hold for avarietyof queueing models ([105]-


Note that this equation gives us information only about the
[1161).
weighted "sum" of the mean message waiting times. Thus
Decompositions have been developed for various
wecannot usethis resulttosolvedirectlyforthemean mes-
queueingand polling modelsforwaitingtimes, the number
sage waiting times at each station in an asymmetric system.
of customers in the system at a random point, and/or the
However, for symmetric systems we are able to calculate
total amount of unfinished work in the system at an arbi-
the mean message waiting time, since it is the same at each
trary point in time. For the polling systems we are con-
station. Also, we can use this equation to develop or eval-
cerned with, the relevant decomposition is one due to
uate approximate solutions for asymmetric systems.
Boxma and Groenendijk [log], who show that the unfin-
ished work found in the polling system at an arbitrary point Approximations for the Mean Delay in Asymmetric Sys-
in time equals (in distribution) the unfinished work found tems: Precise delay results are available for many polling
in the "associated" M/G/I system (defined in the following) models. Takagi [I011 provides a good exposition of many
at an arbitrary point in time, plus the amount of work found analytic results. However, many of the results for asym-
in the polling system at an arbitrary pointduringawalktirne, metric systems require the solution of sets of simultaneous
and that these latter two quantities are independent. This equations. In this section, we present simple closed-form

RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 195

~ ~-
approximations for asymmetric systems with exhaustive, performance of such priority schemes. Results can be very
gated, or limited-to-one service. dependent upon the specific assumptions of the model
Everitt [I201 used the pseudo-conservation lawto develop about the traffic characteristics and the buffering ability of
a simple approximation for the mean waiting time in an the stations. Also, the tractabilityof theanalysis can depend
asymmetric polling system with exhaustive or gated ser- greatly upon fine details of the protocol.
vice. He uses the approximating assumption that the sec- As an example, we will present results of an analysis by
ond moments of the cycle time are the same for all of the Tsai and Rubin [I251 of a scheme which i s quite similar to
N stations (we knowthatthe first momentsare, in fact, iden- atoken ring.Anapproximateanalysisof asimilar model can
tical.) This assumption is reasonablyvalid when the system be found in [126]. A model which is similar to a token bus
i s not too asymmetric or when the traffic rates are low. The with priorities is analyzed in [1271. A scheme using general
average mean waiting time at station i i s then given by station priorities i s analyzed in [128], while a scheme with
HOLP station priorities and constant walk times is analyzed
in [129].
TbeMode1:We use a model where the high-priority traffic
follows model 2 while the low priority traffic follows model
3. Specifically, weconsider a symmetric polling system with
N stations and two message classes: class 1 (high priority)
and class 2 (low priority.) The walk time from one station

i
N \
to the next i s aconstant r. The length of a high priority mes-
(1 - P) ,
sage is a constant b l , and the length of a low priority mes-
sage i s a constantb2.Each station has asingle message buffer
-I
for high-priority messages. Following the transmission of
a high-priority message from a station, the length of time
where " k " takes the value for gated service and ' I - "
' I + "
until the next arrival of a high-priority message at the station
for exhaustive service. For an asymmetric system operating
isexponentiallydistributed with mean l/X1. Each station also
under high traffic conditions, other approximating tech-
has an infinite buffer for low-priority messages, which arrive
niques have been developed (e.g., [121]).
according to a Poisson process with rate h2.
Boxma and Meister ([121]) developed an approximation
The Protocol: The server (or token) visits the stations cy-
for limited-to-one service using the same assumptions as
clicly. The server i s in either a high-priority or low-priority
those of tveritt. The following result i s then obtained:
state.
I - P + P l , 1- P Suppose the server i s in the low-priority state when it
E[W,I = ' " ' N
reaches a station. Then
I1 - -p p- --X X,R
R N
(1 - P) P c
+ , = 1 oo ff
I = I - if the station has a waiting high-priority message, it
transmits the message and changes the server to the
high-priority state; the server then walks to the next
station;
* if the station does not have a high-priority message,
but does have waiting low-priority messages, it trans-
1 mits one message and changes the server to the high-
priority state; the server then walks to the next station;
(5)
if the station has no messages waiting, the server con-
tinues on to the next station and remains in the low-
5) Delay Constraints a n d Priorities: Many of the planned
priority state.
high-speed LAN's and MAN'Smust support real-time traffic
which has tight limits on transmission delays. Examples of Suppose the server i s in the high-priority state when it
real-time traffic include digitized voice and network man- reaches a station. Then
agement and control information. Various polling schemes if the station has a waiting high-priority message, it
have been developed which incorporate delay constraints
transmits the message; the server then walks to the
and different priority levelsfor different typesoftraffic. Lirn- next station, remaining in the high-priority state;
ited service schemes guarantee that stations receive per-
if the station has no waiting high-priority message and
mission to transmit within a fixed period o l time. Timed-
the server has visited all the stations without finding
token protocols such as the IEEE 802.4 token bus standard
any high-priority messages, then the server i s switched
[I221 and the FDDI protocol [I231 guarantee maximum to the low-priority state; if the station has awaiting low-
delays to stations lor various message classes by limiting
priority message, and if it has not transmitted a low-
the station holdingtimesaccordingtothecurrent cycletime
priority message since the last time the server arrived
and the highest priority waiting message. The IEEE 802.5
in a low-priority state, it can transmit a single low-prior-
token ring standard [I241 establishes message priority
ity message; the server then continues to the next sta-
classes and allows stations to transmit only messages whose
tion;
priority level i s at least as high as the current token priority otherwise, the server continues to the next station,
level. The token priority is raised and lowered by having
remaining in the high-priority state.
stations place requests in the headers of the messages or
tokens as they pass by. The Analysis: We define a high-priority busy period as that
It i s very difficult to analyze the throughput and delay lasting from the instant the server enters the high-priority

196 PROCEEDINGS OF THE IEEE, VOL. 78, NO. 1, IANUARY 1990

- _ _ ~ _ _ _ - ~~
state to the instant the server returns to the low-priority maximum message delay. For interactive data, we are most
state. There are two types of high-priority busy periods, interested in knowing the mean (and higher moments) of
which correspond to the two times when the server can the message delay as a function of the offered traffic.
change from the low-priority state to the high-priority state. If the number of voice sources changes slowly in com-
parison to the variations in asynchronous traffic, a quasi-
1) A type-I high-priority busy period begins when the stationary approach can be used to analyze the delay of the
server i s in the low-priority state and it reaches a sta-
asynchronous traffic ([70], [67], and [34]). That is, a level of
tion.
synchronous traffic is fixed, and the resulting delay of the
If the station has a waiting high-priority message, the
asynchronous traffic i s calculated (a constant level of syn-
server immediately switches to the high-priority state
chronous traffic can simply be included in the overhead,
and transmits the station’s message. The server
as far as the asynchronous traffic i s concerned). The results
remains in the high-priority state and polls the sta- for various levels of synchronous traffic are combined by
tions for high-priority messages. The server remains weighting them by the probability distribution for the syn-
in the high-priority state until on some cycle ending
chronous traffic.
with a visit to station i, none of the stations have a
I) FDDI:
waiting high-priority message. It then switches to the
low-priority state, and the type-I high-priority busy TheProtoco1:The FDDl i s a proposed standard for a 100
period ends. The server can then transmit a waiting Mbls token ring using fiber optic cabling [123], [130]. The
low-priority message from station i, if there are any. stations are arranged in a ring and they control access to
If the station does not have a waiting high-priority the channel by passing a token around the ring. The station
message, we take the length of the high-priority busy holding the token may transmit messages in accordance
period to be zero. with the token-holding rules discussed in the following.
We let GI be a random variable with the same dis- Oncea station has finished transmitting messages, it imme-
tribution as the length of a type-I busy period. diately sends the token to the next station. (See also section
2) A type-2 high-priority busy period begins at the end
V.)
of a low-priority message transmission (by, for exam-
When the ring is initialized, the stations negotiate a target
ple, station i.) The server switches to high priority and
token rotation time (TTRT). The protocol guarantees that
polls for high-priority messages. The server remains
theaveragetoken rotation time(cycle time)will be less than
in the high-priority state until on some cycle ending
TTRTand that the maximum token rotation time will be less
with a visit to station i,none of the stations have a
than 2.TTRT. Thus stations with tight delay constraints will
waiting high-priority message. It then switches to the
request a small TTRT. The smallest requested TTRT is
low-priority state, and the type-2-high-priority busy
selected and is used by all of the stations. We will see in the
period ends. The server then proceeds to the next
proceeding that the choice of TTRT greatly affects the uti-
station. lization of the ring.
We let G2 be a random variable with the same dis-
The FDDI protocol defines two categories of traffic: syn-
tribution as the length of a type-2 busy period.
chronous and asynchronous. Synchronous traffic has very
Rubin and Tsai [I251show that the delay for the low-prior- tight time constraints. Whenever a station receives a token,
ity messages i s the same as in a single-priority symmetric it i s allowed to transmit any queued synchronous traffic.
polling system with limited-to-one service, walk times equal Higher levels of the protocol grant permission to transmit
+ +
to r G 7 ,and service times equal to b2 C2.Thus we can synchronous messages. However, in any cycle, the total
use (5) to calculate the mean waiting time for class-two mes- amount of time that i s devoted to synchronous messages
sages once we know the first two moments of GI and G2. must be less than TTRT
An exact solution for those moments requires the solution Asynchronous traffic i s transmitted as time permits. Each
of several sets of linear equations, each ~ o n t a i n i n g 2 ~ e q u a - station has atoken-rotation timer and a token-holding timer;
tions. Tsai and Rubin present approximate solutions which theseareused tocontrol theamount of timethat thestation
reduce the problem to solving sets of N +
1 linear equa- is allowed to transmit asynchronous messages. The token-
tions. rotation timer i s used to measure the time between suc-
Straightforward consideration of the protocol shows that cessive receptions of the token. When a station receives the
the maximum waiting time for a high-priority message i s token, it checks its token-rotation timer. If the time elapsed
equal to exceeds the TTRT, the station is not allowed to transmit any
asynchronous traffic. Otherwise, the token-holding timer
Wyax = Nr + (N - l ) b l + b2, i s loaded with the value of the token-rotation timer, and the
station begins transmitting asynchronous messages. After
The mean delay for high-prioritymessages can be derived
each transmission, it checks to see whether the token-hold-
in a manner similar to that for low-priority messages.
ing time threshold has been crossed. Once it has been, the
token is passed to the next station. Up to eight message
B. Applications
priority levels can be established by using different thresh-
Wewill now consider several high-speed networkswhich old values for different message types. The maximum
use polling schemes tocontrol access. All of these networks threshold value is TTRT [130].
aredesigned to supporta mixof traffic types: digitized voice, Maximum throughput: We will now consider the max-
interactive data, and so on. For sources such as digitized imum ring utilization as a function of the TTRT and token-
voice, we are most concerned with knowing the number holding thresholds.
of users which can be supported by the network, and the First, suppose that all the traffic i s from a single asyn-

RUBlN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 197

-~
chronous priority level. Then the maximum utilization i s The stations at the head and tail of the buses perform spe-
bounded above by [130]: cial functions. The two buses operate independently(except
for piggybacking control information, as described in the
TTRT - R
following), so we can focus upon one bus. Consider the bus
TRT
with station 1 at the head end and station N at the tail. Sta-
where R is the total walk time per cycle (ring latency.) tion 1 generates message frames. Each message frame con-
Now suppose that there are m priority levels of asyn- sists of a header and a fixed-length data field. The stations
chronous traffic, and that exactly NI stations have priority all generate corresponding fixed-length messages. The
level i messages ready to transmit during each cycle. Let PI header contains addressing fields plus a bit to indicate
be the token holding threshold for priority level i. whether the frame is in use, a bit to indicate whether a par-
It can be shown [I301 that the lowest priority message that ticular frame starts a new cycle, and a bit which is used to
will ever be transmitted under these conditions belongs to start new cycles on the other bus.
the class "low," which is the lowest priority level satisfying The frames are organized into cycles. Stations are allowed
rn to transmit, at most, one message per cycle. Only stations
(N - NIow + 1) PI - C
low + 1
[NI . PI] - R > 0 which have a message ready at the beginning of a cycle are
allowed to transmit during the cycle; newly arriving mes-
where N = NI is the total number of stations trans- sages have to wait until the next cycle.
mitting. At the completion of one cycle (see the preceding) the
Dykeman and Bux [I301 show that the normalized head station starts a new cycle by setting the "start cycle"
throughput of priority i messages i s given by bit in the header of the next outgoing frame. Stations that
have a ready message when they see the start cycle bit are
allowed to put their message into the first empty frame they
rn
see. They mark the frame as busy so that no downstream
( N + I ) * R + c
/ = low
yl station will overwrite their message. Once an empty slot
reaches the tail station (station N ) , all eligible stations have
where transmitted and it i s time to start a new cycle. Note that sta-
tion N i s the head station on theother bus. In the next frame
(N - NI,, + 1) . PI that it generates on the other bus, it sets the bit to indicate
that the cycle on this bus has ended. When the frame
reaches station 1, station 1 starts a new cycle.
low + 1 Maximum throughput: The overhead for the Fasnet
scheme consists of the frame headers for slots containing
message transmissions, plus the idle slots at the end of each
cycle. We normalize parameters so that the transmission
time for a slot equals 1. Let a be the normalized end-to-end
propagation delay, and let h be the normalized length of
(- C/ = low yl + PI - R I i = low + 1, , m. a message header. There are an integral number of slots
between the end of one cycle and the start of the next, and
Delay:As we just stated, the maximum cycle time in the on average, the normalized length of this period i s [I391
FDDl ring is2. TRT. Becauseofthecomplexityofthetimed r2al + I.
token protocol, studies of the average delay performance
of FDDl for asychronous traffic have used simulation rather The maximum throughput (per bus) for Fasnet i s thus
than an analytical approach [131]-[134]. A model such as the approximately [I391
one presented in section VIII-A1 could be used to approx-
1
imate the performance of FDDI.
2) Fasnet: Fasnet was proposed by Limb and Flores [135], I +h + ( r 2 a l + I)/N'
[136]. It has been incorporated in the METROCORETM[137], Delay:The maximum message delay i s two cycles [139]:
[I381 metropolitan area network design.
The Protocol: Fasnet i s designed for a system with two ( 2 -~ I)(I + h) + r2al + I.
unidirectional broadcast buses which connect the stations
Tobagi and Fine [I401 analyze the delay characteristics of
in opposite directions (see Fig. 18). Stations wishing to
Fasnet for asynchronous traffic under the message stream
transmit messages choose the bus that places them
assumptionsof model 2. They considerthe numberof back-
upstream of the message destination.
logged users at the start of each round, which forms an
embedded Markov chain. To calculate the mean waiting
Channel A times, they derive the transition matrix for the embedded
chain and then use it to calculate the stationary distribution
of the number of stations with ready messages at the start
of a round, call it

n = (To, .. * ,TN).
Channel B Letting s be the expected throughput and wthe expected
Fig. 18. Fasnet topology. waiting time of an arbitrary packet,

198 PROCEEDINGS OF THE IEEE, VOL. 78, NO. 1, JANUARY 1990


N ing with the upstream traffic). It repeats the preceding
c
i=l
i7rj steps.
s = N ,
The resulting pattern of transmissions fits the standard
C
i=O
+
T , ( ~ ( I h) + r2al + I) polling scheme exactly, and standard polling results can be
used to analyze the performance of Expressnet.
and Maximum throughput: Tobagi, Borgonovo, and Fratta
N I [IO21 show that when N stations are always busy, the chan-
w = - - - - (Ith) nel throughput i s given by
S A
3) Expressnet: 1
The Protocol: The Expressnet protocol [102], [I401 is 1 + 2a/N
designed for a single unidirectional broadcast bus. The wherea is the ratio of the propagation delay to the message
topologyof Expressnet i s shown in Fig. 19. Stations transmit length.
Delay: If messages are of fixed length (normalized here
to 1,) the maximum cycle time for Expressnet is [I391
N(l + w + 26) + 2a + 6,
wherew i s the normalized length of the message preamble,
and 6 i s the normalized carrier detection time.
Fig. 19. Expressnet topology. Whichever of the polling models best fits the station mes-
sage arrival processes, buffering capabilities, and trans-
on the lower channel and receiveon the upper channel. We mission limits of a particular implementation can be used
see that any message transmission will pass the transmit to analyze the delay performance of Expressnet.Tobagi and
taps of the downstream stations and the receive taps of all Fine [I401 use model 2 to analyze Expressnet and compare
of the stations. it to Fasnet.
Stations can sense any transmissions due to upstream
users that reach their transmit tap. IX. THE MODELING OF RANDOM ACCESS
AND ANALYSIS
The protocol i s an implicit token-passing scheme. On SCHEMES
each cycle, the most upstream station has the first oppor-
The performance of traditional random access schemes
tunity to transmit. Suppose that it transmits a message. The
is limited by the ratio of the end-to-end propagation delay
message will propagate past the transmit taps of all the other
to the average message length (denoted a). In a high-speed
stations, and then past the receive taps of all the stations.
network, a can be very large, thus making such schemes
As the end of the first station’s message passes the transmit
very inefficient. Recently, Maxemchuk [I411 and Muhkh-
tap of the second station, the station i s allowed to begin
erjee and Meditch [142], [I431 have proposed random access
transmittinga message. If thesecond stationsdoes not have
schemes for unidirectional broadcast buses which are not
a message, the third station will be allowed to start trans-
limited by a.
mitting when the end of station one’s message passes its
Maxemchuk considers a group of N stations arranged in
transmit tap. The messages which are transmitted form a
a D-net configuration (see Fig. 20). (The access schemes are
“train.”As thetrain of messages passes each station‘s trans-
also applicable to other configurations.) Stations transmit
mit tap, the station is allowed to append a message to the
messages through their transmit tap on the lower curve of
train. Finally, the train reaches the transmit tap of the most
the “D” and receive transmissions through their receive
downstream station, and then begins to pass the receive
taps on the upper curve of the “D.” The taps can be either
taps of the stations, in the same order as before. As the end
active or passive. He discusses versions of ALOHA, CSMA,
of thetrain passesthe receive tapof each station, the station
and CSMA-CD for the network.
knows that the train is finished and a new cycle has begun.
The stations can implement an ALOHA scheme by trans-
From the station‘s point of view, the protocol works as
mitting whenever they have a ready message. By checking
follows [140].
the signal which reaches its receive tap after propagating
A station with a ready message waits until it hears either around the loop, a transmitting station can tell whether its
the end of a message passing its transmit tap or the end transmission was successful, without explicit acknowledg-
of a train passing its receive tap. ments. Stations retransmit collided messages after random
The station then begins transmitting the message. It delays. The channel can be either slotted or unslotted.
also monitors the channel for any messages coming A CSMA scheme that uses only information available at
from upstream (e.g., if station 3, say, detects the end the transmit tap can be implemented as follows. Before
of a message from station 1 passing its transmit tap, transmitting, a station checks whether any messages from
it may start transmitting before detecting that station
2 has appended a message to the train. A similar sit-

- uation arises when a new train i s started).


If the station detects a messagecomingfrom upstream,
it aborts i t s transmission and defers to the upstream
station (the protocol assumes that the station will
always detect any upstream traffic, and will be able to
abort i t s transmission quickly enough to avoid collid- Fig. 20. D-net topology.

RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 199

~~
upstream stations are passing its transmit tap. If so, it defers, IEEE 802.6 Working Group document no. 802.8-88/61, July
giving preference to the upstream station. Otherwise, the 1988.
station transmits its message. If the stations use passive taps, [8] M. A. Rodrigues, ”A fair MAC access scheme,” IEEE 802.6
Working Group document no. 802.8-88/62, July 1988.
messages from upstream stations whose transmissions [9] G. Estes, R. Klessig, and D. Spears, ”ATM cell structure pro-
reach the station after it starts transmittingwill collide with posal,” TIS1.1 Technical Subcommittee Working Group
it. Furthermore, the message will collide with those of Document, Broadband Aspects of ISDN, document no.
downstream stations which are in the middle of a trans- TlS1.1/88-419, Oct. 1988.
mission when it reaches their transmit tap. If the message [IO] I€€€ Network, Special Issue on Network Interconnection,
vol. 2, no. 1, Jan. 1988.
collides with another, it i s retransmitted after a random [Ill N. F. Maxemchuck, “Regular mesh topologies in local and
delay. Various persistence strategies can be used for mes- metropolitan area networks,“ AT&T Tech. I., vol. 64, no. 7,
sages which are delayed because of ongoing upstream pp. 1659-1685, Sept. 1985.
transmissions. [I21 “Metropolitan area network generic framework system
requirements in support of switched multimegabit dataser-
If the stations use active taps, messages from upstream vice,” Bellcore Technical Advisory Report, TA-TSY-000772,
stations will be shifted off the channel, and the transmis- Feb. 1988.
sion of the most downstream station will succeed. When 131 I. Cidon, I. S. Copal, and H. Melesis, “PARIS: An approach
active taps are used, the priority given to upstream stations to private integrated networks,” in Proc. ICC‘87, Seattle, WA,
June1987; and I. Cidon and I. Gopal, “PARIS: An approach
in starting transmissions balances with the priority given to
to integrated high-speed private networks,” IBM Thomas J.
downstream stations in collisions, and results in a fair pro- Watson Research Center, technical report, 1988.
tocol. A I-persistent retry strategy for delayed messageswill 141 M. B. Pursley, “Frequency-hop transmission for satellite
result in the most downstream sourcewith a ready message packet switching and terrestrial packet radio networks,”/€€€
succeeding. Trans. Inform. Theory, vol. 32, no. 5, Sept. 1986.
151 M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt,
A CSMA-CD scheme can be implemented by having sta- Spread Spectrum Communications, vols. 1-111, Rockville,
tions also listen to the signal that reaches their transmit taps MD: Computer Science Press, 1985.
from upstream while they are transmitting. A station does 161 S. Resheff and I. Rubin, “Delay-throughput performance of
not transmit if an upstream station is transmitting, and stops asynchronous communications nets using spread-spec-
trum error-corrected signals,” in Proc. 7987 Conf. on Infor-
transmitting if an upstream station starts. When a l-per-
mation Sciences and Systems, The Johns Hopkins Univer-
sistent retry strategy i s used trains of packets are formed, sity, Mar. 1987.
much as in Expressnet, but there i s no cyclic structure. Max- 171 N. Abramson, “The ALOHA system-Another alternative for
emchuk analyzes the delay-throughput characteristics of computer communications,’’ in Computer Communica-
these schemes. We refer the reader to his paper [I411 for tions Networks, N. Abramson and F. Kuo, Eds. Englewood
Cliffs. NI: Prentice Hall. 1973.
the analysis. I ,

I. Rubin, ”Group random-accessdisciplines for multi-access


Mukherjee and Meditch [142], [I431 consider an access broadcast channels,” I€€€Trans. Inform. Theory, Sept. 1978.
scheme that could be implemented for any of the topol- L. Kleinrock and F. A. Tobagi, “Packet switching in radio
ogies shown in Figs. 18-20. O n a single unidirectional bus channels, Part I-Carrier sense multiple access models and
their throughput-delay characteristics,” I€€€ Trans. Com-
(or on each bus of a dual-bus system) the head station gen-
mum, vol. 23, pp. 1417-1433, Dec. 1975.
erates empty slots. When an empty slot reaches a station- F. A. Tobagi and V. B. Hunt, “Performance analysis of carrier
say i,which has a ready message-with probability p , , the sense multiple access with collision detection,” Comput.
station transmits its packet in the slot. With probability 1 Networks, vol. 4, no. 5, pp. 245-259, Nov. 1980.
- p , , the station waits until the next empty slot and repeats I. Rubin, “Synchronous and carrier sense asynchronous
dynamic group random access schemes for multiple-access
the procedure. The authors investigate the question of how communications,” I€€€Trans. Commun., vol. 31, no. 9, pp.
tochoose thep,‘s toachievefairness; they alsocalculate the 1063-1077, Sept. 1983.
system throughput and delay. E. D. Sykas, Comments on ”Synchronous and channel sense
asynchronous dynamic group-random-access schemes for
multiple-access communications,” I€€€ Trans. Commun.,
REFERENCES vol. COM-33, no. 6, pp. 577-578, June1985.
~ 3 1J. I. Capetanakis,”Treealgorithmfor packet broadcastchan-
[I] Draft of proposed IEEE Standard 802.6, Distributed Queue nels,” /€€E Trans. Inform. Theory, vol. 25, no. 5, pp. 505-515,
Dual Bus (DQDB) Metropolitan Area Network (MAN), June Sept. 1979.
1988. ~241 P. Mathys and P. Flajolet, “Q-ary collision resolution algo-
[2] Draft of proposed American National Standard, FDDI Token rithms in random-access systemswith free or blocked chan-
Ring Media Access Channel, ASC X3T9.5, Feb. 1986. nel access,” I€€€ Trans. Inform. Theory, vol. 31, no. 2, pp.
[3] F. A. Tobagi and M. Fine, ”Performance of unidirectional 217-243, Mar. 1985.
broadcast local area networks: EXPRESSNET and Fastnet,” N. F. Maxemchuk, “Twelve random access strategies for
/€€E Trans. Selected Areas in Communications, vol. SAC-I, fiberoptic networks,” I€€€Trans. Commun., vol. COM-36,
no. 5, pp. 913-926, Nov. 1983. pp. 942-950, Aug. 1988.
[4] A. S. Acampora, M. J. Karol, and M. G. Hluchyj, “Terabit M. Fine and F. A. Tobagi, “Demand assignment multiple
lightwave networks: The multi-hop approach,” AT&T Tech. access schemes in broadcast bus local area networks,” I€€€
I., vol. 66, no. 6, NovJDec. 1987. Trans. Computers,vol. C-33, no. 12, pp. 1130-1159, Dec. 1984.
[5] A. Albanese, M. W. Garrett, A. Ippoliti, H. Izadpanah, M. A. S. R. Sachs, “Alternative local area network access proto-
Karr, M. Maszczak, and D. Shia, ”Bellcore METROCORE cols,‘‘ I€€€Commun. Mag., vol. 26, no. 3, pp. 25-45, Mar.
Network-A test bed for metropolitan area network 1988.
research,” in Proc. /€E€ GLOBECOM’88, Hollywood, FL., N. F. Maxemchuk, “A variation on CSMA/CD that yields
Nov. 1988. movable TDM slots in integrated voice/data local net-
[6] A. M. Perdikaris and M. A. Rodrigues, “Destination release works,” Bell Syst. Tech. /., vol. 61, no. 7, Sept. 1982.
of segments in the IEEE 802.6 protocol,” IEEE 802.6 Working I. Rubin and Z.Tsai,"Perforrnanceofdouble-tier accesscon-
Group document no. 802.8-88/59, July 1988. trol schemes usinga polling backbone for metropolitan and
[7l H. Hagirahim and G. H. Clapp, “Fairness and performance interconnected communication networks,” I€€€1. Select.
of destination release scheme in the IEEE 802.6 MAC-layer,” Areas Commun., vol. SAC-5, no. 9, pp. 1403-1417, Dec. 1987.

200 PROCEEDINGS OF THE IEEE, VOL. 78, NO. 1, JANUARY 1990


[30] I. Chlamtac and A. Ganz, “Design and analysis of very high [541 A. Girard and Y. Ouimet, ”End-to-end blocking for circuit-
speed network architectures,” IEEE Trans. Commun., vol. switched networks: Polynomial algorithms for some special
36, pp. 252-262, Mar. 1988. cases,“ IEEE Trans. Commun., vol. 31, no. 12, pp. 1269-1273,
[31] I. Chlamtac and A. Ganz, “Frequency-time controlled mul- Dec. 1983.
tichannel networks for high-speed communication,” IEEE J. Kaufman, “Blocking in a shared resource environment,”
Trans. Commun., vol. 36, pp. 430-440, Apr. 1988. /FEE Trans. Commun., vol. 29, pp. 1474-1481, 1981.
[32] I. Chlamtac and A. Ganz, “A multibus train communication D. Mitra, “Asymptotic analysisand computational methods
(AMTRAC) architecture for high-speed fiberoptic net- for a class of simple circuit-switched networks with block-
works,” /EEL:/. Selected Areas Commun., vol. 6, no. 6, pp. ing,“ Adv. Appl. Probability, pp. 219-239, 1987.
903-912, July 1988. [571 P. J. Deschamps, “Analytic approximation of blocking prob-
[33] R. M. Newman and J. L. Hullett, “Distributed queueing: A abilities in circuit-switched communication networks,” IEEE
fast and efficient packet access protocol for QPSX,” in Proc. Trans. Commun., vol. 27, pp. 603-606,1979.
lCCC‘86, Munich, 1986. F. P. Kelly, “Blocking probabilities in large circuit-switched
(341 M. Zukerman, “Approximations for performance evalua- networks,” Adv. Appl. Probability,vol. 18, pp. 473-505,1986.
tion of the packet access queue in QPSX: The IEEE 802.6 G. Barberisand R. Brignolo, “Capacity allocation in a DAMA
evolving MAN standard,”]. Austral. Telecommun. Res., vol. satellite system,” IEEE Trans. Commun., vol. 30, no. 7, pp.
22, no. 2, pp. 53-62,1988. 1750-1757, July 1982.
[35] M. Zukerman, “QPSX-The effect of circuit allocation on ). M. Aein and G . S. Kosovych, “Satellite capacity alloca-
packet capacity under bursty traffic,” in Proc. IEEE ICC‘88, tion,’’ Proc. IEEE, vol. 65, pp. 332-342, 1977.
Philadelphia, PA, June 1988. H. Inose, Digital Integrated Communications Systems.
[36] A. S. Acampora and M. G. Hluchyj, “A new local area net- Tokyo: Univ. of Tokyo Press, Japan, 1979.
work architecture using a centralized bus,” IEEE Commun. I. Rubin and J. K. Lee, “Performance analysis of intercon-
Mag., vol. 22, no. 8, Aug. 1984. nected metropolitan area circuit-switched telecommuni-
(371 M. N. Huber, K. Sauer, and W. Schodl, “QPSX and FDDI-11: cations networks,” lEEE Trans. Commun., vol. 36, pp. 171-
Performance study of high speed LAN’s,’’ in Proc. EFOULAN 185, Feb. 1988.
88 Conf., Amsterdam, June 1988. I.Cidon, I. Gopal, G. Grover, and M. Sidi, “Real-time packet-
[38] F. E. Ross, ”FDDI-A tutorial,” IEEE Commun. Mag., vol. 24, switching: A performance analysis,” IEEE ]. SelectedAreas
no. 5, pp. 10-17, May 1986. Commun., vol. 6, no. 9, pp. 1576-1586, Dec. 1988.
(391 W. W. Chu and A. G. Konheim, “On the analysis and mod- I. Rubin and I. K. Lee,”Performance of integrated datalvoice
eling of a class of computer communication systems,” IEEE circuit-switched multi-access communications channels,”
Trans. Commun., vol. 20, pp. 645-660, 1972. in Proc. /FEE GLOBECOM’88 Conf., pp. 16.2.1-16.2.5, Ft. Lau-
[40] I. Rubin, “Message Delays in FDMA and TDMA Commu- derdale, FL, Nov. 1988.
nication Channels,” IEEE Trans. Commun., vol. 27, pp. 769- L. A. Gimpleson, “Analysis of mixtures of wide and narrow
777,1979. band traffic,“ /FEE Trans. Commun., vol. 13, no. 3, pp. 258-
(411 1. Rubin, “Access control disciplines for multi-access com- 266, Sept. 1965.
munications channels: Reservation and TDMA schemes,” I. Chlamtac, A. Ganz, and G . Karmi, “Circuit switching in
IEEE Trans. Inform. Theory, vol. 25, pp. 516-526, 1979. multi-hop lightwave networks,” in Proc. ACM SICCOMM
[42] S. S. Lam, “Delay analysis of a time division multiple access Workshop, Stanford, CA, Aug. 1988.
(TDMA) channel,” IEEE Trans. Commun., vol. 25, pp. 1489- A. G. Konheim and M. Reiser, “The movable-boundarymul-
1494,1977. tiplexer stability and decomposability,” in Teletraffic Anal-
[43] I. Rubin and Z. Zhang, “Message delay analysis for TDMA ysis and Computer PerformanceEvaluation. North Holland,
schemes using contiguous-slot assignments,” in Proc. /EEL 1986.
ICC‘88, Philadelphia, PA, June 1988. M. F. Neuts, “Further resultson the MlMll queue with ran-
[44] I. Rubin and L. F. DeMoraes, “Message delay distributions domly varying rates,” Opsearch, vol. 15, pp. 139-157, 1978.
for a TDMA scheme under nonpreemptive priority disci- M. F. Neuts, Matrix-Geometric Solutions in Stochastic
pline,” JEEE Trans. Commun., vol. COM-32, no. 5, pp. 583- Models: An Algorithmic Approach. Baltimore: The Johns
588, May 1984. Hopkins University Press, 1981.
[45] A. G. Konheim and B. Meister, “Service in a loop system,” A. Leon-Garcia, R. H. Kwong, and G. H. Williams, “Perfor-
1. Assoc. Computing Mach., vol. 19, pp. 92-108, 1972. mance evaluation methods for an integrated voice/data
[46] H. Bruneel, ”A general treatment of discrete time buffers link,” IEEE Trans. Commun., vol. 30, no. 8, pp. 1848-1858,
with one randomly interrupted output line,” European 1. 1982.
Operations Res., vol. 27, pp. 67-81, 1986. U. Yechiali and P. Naor, ”Queueing problems with heter-
[471 I. Rubin and Z. Zhang, “Message delay and queue size anal- ogeneous arrivalsand service,” OperationsRes., vol. 19, pp.
ysis for circuit-switched TDMA systems,” UCLA Technical 722-734,1971.
Report UCLA-ENG-8846,1988. M. Zukerman and I. Rubin, “Queueing performance of a
[48] I. Rubin and Z. Tsai, “Message delay analysis of priority multichannel system under bursty traffic conditions and
TDMA, FDMA, and discrete-time schemes for multiple- state dependent service rates,“ Aust. Telecommun. Res. I.,
access communications,” /FEE Trans. Inform. Theory, vol. vol. 21, no. 2, Nov. 1987.
IT-35, no. 3, pp. 637-647, May 1989. M. Zukerman and I. Rubin, ”Queue size and delay analysis
[49] L. P. Clare and I. Rubin, “Queueing analysis of TDMA with for a communication system subject to traffic activity mode
limited and unlimited buffer capacity,” in Proc. IEEE changes,” IEEE Trans. Commun., vol. 34, pp. 622-628,
INFOCOM’83, San Diego, CA, Apr. 1983. 1986.
[SO] H. Bruneel, “Message delay in TDMA channels with con- M. J. Fischer and T. C. Harris, “A model for evaluating the
tiguous output,” IEEF Trans. Commun., vol. 34, no. 7, pp. performance of an integrated circuit and packet-switched
681-684,1986. multiplex structure,” IEEE Trans. Commun., vol. 24, no. 2,
[SI] M. G. Hluchyj, C.D. Tsao, and R. R. Boorstyn, “Performance pp. 195-202, Feb. 1976.
analysisof a preemptive priority queue with applications to C. J. Weinstein, M. K. Malpass, and M. J. Fisher,”Datatraffic
packet communication systems,” Bell Syst. Tech. J., vol. 62, performance of an integrated circuit and packet-switched
pp. 3225-3245, Dec. 1983. multiplestructure,” /FEE Trans. Commun., vol. 28, p. 873-877,
(521 L. F. M. DeMoraes, “Message delay analysis for a TDMA June1980.
scheme operating under a preemptive priority discipline,” G. F. Williams and A. Leon-Garcia, “Performance analysis
in Proc. CLOBfCOM’87, Tokyo, Japan, pp. 53.6.1-53.6.5, Nov. of integrated voice and data hybrid-switched links,” IEEE
1987. Trans. Commun., vol. 32, no. 6, pp. 695-706, June1984.
[53] P. M. Lin, B. J. Leon, and C. R. Stewart, “Analysis of circuit K. Kummerle, “Performance analysisofan integrated hybrid-
switched networks employing originating-office control switched multiplex structure,” in Proc. ICCC, Stockholm,
with spill-forward,” IEEE Trans. Commun., vol. 26, no. 6, pp. 1974, pp. 508-515.
754-765, June 1978. M. Schwartz, Telecommunication Networks-Protocols,

RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 201

__
-
Modeling and Analysis. Reading, MA: Addison-Wesley, [I031 P. Kuehn, “Multiqueue systems with nonexhaustive cyclic
1987. service,” BellSyst. Tech. I. , 58, pp. 671-698, Mar. 1979.
vol.
[79] K. Sriram, P. K.Varshney,and J. G. Shanthikumar,”Discrete- [I041 L. D. Moraes and I. Rubin, “On the performance of gated
time analysis of integrated voice/data multiplexers with and and exhaustive polling under unbalanced traffic,” in Proc.
without speech activity detectors,” /€E€ J. Select. Areas Globecom ’83, San Diego, CA, Nov. 1983.
Commun., vol. SAC-I, no. 6, pp. 1124-1132, Dec. 1983. [I051 S. Fuhrmann, “A note on the M/GlI queue with server vaca-
[80] P. Zafiropoulo, “Flexible multiplexing for network sup- tions,” Operat. Res., vol. 32, pp. 1368-1373, Nov./Dec. 1984.
porting line-switched and packet-switched data traffic,” in [I061 H. Levy and L. Kleinrock, “A queue with starter and aqueue
PrOC. ICCC, 1974, pp. 517-523. with vacations: Delay analysis by decomposition,” Operat.
[81] R. jain and S. A. Routhier, “Packet trains-Measurement and Res., vol. 34, pp. 426-436, MayIJune 1986.
a new model for computer network traffic,” /€€€I.Selected [IO71 0. Boxmaand W. Groenendijk, “Pseudo-conservation laws
Areas Commun., vol. 4, pp. 986-995, 1986. in cyclic-service systems,” Tech. Rep. OS-R8606, Centre for
[82] K. Sriram and W. Whitt, “Characterizing superposition Mathematics and Computer Science, Amsterdam, 1986;also
arrival processesin packet multiplexers for voice and data,” in Journal of Applied Probability, vol. 24,1987.
/€E€/. Selected Areas Commun., vol. 4, pp. 833-846, 1986. [I081 0. Boxma and B. Meister, “Waiting times in multi-queue
[83] K. W. Fendick, V. R. Saksena, and W. Whitt, ”Dependence systems with cyclic service,” Perform. Eva/., vol. 7, pp. 59-
in packet queues: A multi-class batch-Poisson model,” in 70, Feb. 1987; also, IBM Research Report RZ1348, 1984.
Proc. of ITC-12, Paper 1.48.5, 1988. [I091 0. Boxma and W. Croenendijk, “Waiting times in discrete-
1841 1. Filipiak, “Accuracy of traffic modeling in fast packet time cyclic-service systems,” /€€€ Trans. Commun., vol.
switching,” in Proc. GLOBECOM’88, Ft. Lauderdale, FL, Nov. COM-36, pp. 164-170, Feb. 1988.
1988. [I101 B. Doshi, “A note on stochastic decomposition in a GlIGll
[85] H. Heffesand D. M. Lucantoni, “A Markov modulated char- queue with vacation or set-up times,”]. Appl. Probabil., vol.
acterization of packetized voice and data traffic and related 22, pp. 419-428, 1985.
statistical multiplexer performance,” / € € E J. Selected Areas [ I l l ] B. Doshi, “Queueing systems with vacations-A survey,”
Commun., vol. 4, pp. 856-868, 1986. Queueing Syst., vol. 1, pp. 29-66, June1986.
1861 V. Ramaswami, “Traffic performance modeling for packet [I121 S. Fuhrmann, “Symmetric queues served in cyclic order,”
communication: Whence, where and whither,” Keynote Operat. Res. Lett., vol. 4, pp. 139-144, Oct. 1985.
Address, Third Australian Teletraffic Seminar, Nov. 1988. [I131 S. Fuhrmann and R. B. Cooper, “Stochastic decompositions
[87] V. Ramaswami and G. Latouich, ”Modeling packet arrivals in the MIGII queue with generalized vacations,” Operat.
from asynchronous input lines,” in Proc. of ITC-72, Paper Res., vol. 33, pp. 1117-1129, Sept./Oct. 1985.
4.1A.5, 1988. 11141 S. Fuhrmann, “Inequalities for cyclic service systems with
[88] S. Katz and I. Rubin, ”Session admission control for a mul- limited service disciplines,” l€€€/l€lC€Global Telecommun.
tiple-access communication channel,” in Proc. l€€€ Conf. (Tokyo, Japan, Nov. 1987), pp. 182-186.
INFOCOM’87, San Francisco, CA, Mar. 1987. [I151 S. Fuhrmann and Y. Wang, “Analysis of cyclic service sys-
[89] A. Descloux, ”Contention probabilities in packet commu- tems with limited service: Bounds and approximations,”
nication networks with strung input processes,” in Proc. of Performance Evaluation, vol. 9, no. 1, pp. 35-54, Nov. 1988.
ITC-12, Paper 5.1A.1, 1988. [I161 J. G. Shanthikumar, ”On stochastic decomposition in
[go] R. R.Anderson,G.J. Foschini,and B.Gopinath,”Aqueueing MIGII type queues with generalized server vacations,”
model for a hybrid data multiplexer,” BellSyst. Tech. I. ,
pp. Operat. Res., vol. 36, pp. 566-569, July/Aug. 1988.
279-301,1979. [117] S. Fuhrmann and R. Cooper, “Application of decomposition
I911 M. Hofri and 2. Rosberg, “Packet delay under the golden principle in M/G/l vacation model to two continuum cyclic
ration weighted TDM policy in a multiple access channel,” queueing models-especially token-ring LAN’s,’’ AT&T
/€E€ Trans. Inform. Theory, vol. 33, no. 3, pp. 341-349,1987. Techn. I., vol. 64, pp. 1091-1099, May/June1985.
1921 R. Rom and M. Sidi, “Message delay distribution in gen- [I181 M. Ferguson and Y. Aminetzah, “Exact results for nonsym-
eralized time division multiple access (TDMA),” Technical metric token ring systems,” / € E € Trans. Commun., vol. COM-
Report, Department of Electrical Engineering, Technion, 33, pp. 223-231, Mar. 1985.
Israel, EE Pub. no. 699, Nov. 1988. [I191 K. S. Watson, “Performance evaluation of cyclic service
[93] T. Y. Yan, “On the delay analysis of a finite capacity TDMA strategies-A survey,” in Performance’84. New York: North
channel,” /€€€Trans.Commun., vol. 30, pp. 1937-1942,1982, Holland, 1984, pp. 521-533.
[94] j. Filipiak, ”Access protection for fairness in a distributed [I201 D. Everitt, “Simple approximations for token rings,” / € E €
queue dual bus metropolitan area network,” in Proc. lnt. Trans. Commun., vol. COM-34, pp. 719-721, July1986.
Conf. on Communications, Boston, MA, June1989. 1211 0. Boxma and B. Meister, ”Waiting-time approximations for
[95] P. Potter and M. Zukerman, “Cyclic request control for pro- cyclic-service systems with switch-over times,” Report OS-
vision of guaranteed bandwidth within the DQDB frame- R8510, Centre for Mathematics and Computer Science,
work,”Technical Report, Telecomm Australia ResearchLab- Amsterdam, Sept. 1985.
oratories, Clyton, Vic., Australia, 1989. 1221 Draft International Standard for Token-PassingBus Access
[96] I. Cidon and Y. Ofek, “METARING-A ring with fairness and Method, ANSlllEEE Standard 802.4-1985.
spatial reuse,” Research Report, IBM T. J.Watson Research 1231 F. E. Ross, “FDDI-A tutorial,“ / € E € Commun. Mag., vol. 24,
Center, 1989. pp. 10-17, May 1986.
[97] L. Kleinrock and H. Levy, “The analysis of random polling 124) /SO Draft Proposal for Token Ring Access Method, ANSI/
systems,” Operat. Res., vol. 36, pp. 716-732, July 1985. IEEE Standard 802.5-1985.
[98] C. Mack, T. Murphy, and N. Webb, “The efficiency of N 1251 Z. Tsai and I. Rubin, “Performance of token schemes sup-
machines unidirectionally patrolled byone operative when porting delay-constrained priority traffic streams,” in Proc.
walking time and repair times are constants,”]. Royalstatis. / € € E INFOCOM, 1989.
Soc., Series B, vol. 19, no. 1, pp. 166-172, 1957. [I261 J. E. Baker, “Multiple access communications with priori-
[99] M. Scholl and D. Potier, “Finite and infinite source models tized service,” Ph.D. thesis, University of California, Los
for communication systemsunder polling,”Tech. Rep.308, Angeles, 1986.
IRlA Rapport de Recherche, May 1978. [I271 I. Rubin and Z. Tsai, “Performance analysis for a message
[IOO] A. Kaye, “Analysis of a distributed control loop for data priority-based polling scheme,” in Proc. /€€€-/CC88, Phil-
transmission,” in Proc. Symp. on Computer-Comrnunica- adelphia, PA, June 1988.
tions Networks and Teletraffic, Polytechnic Institute of [I281 J. E. Bakerand I. Rubin,“Pollingwithageneral serviceorder
Brooklyn, Apr. 1972, pp. 47-58. table,” /€€E Trans. Commun., vol. COM-35, pp. 283-288, Mar.
[I011 H. Takagi, Analysis of Polling Systems. Cambridge, MA: 1987; also presented at Globecom ’86 in Houston, TX, Nov.
MIT Press, 1986. 1986.
[I021 F. A. Tobagi and M. Fine, “Performance of unidirectional [I291 I. Rubin and J. E. Baker, ”Performance analysis for a ter-
broadcast local area networks: Expressnetand Fasnet,” / E € € minal-priority contentionless access algorithm for multiple-
J. Selected Areas Commun., vol. SAC-I, pp. 913-926, Nov. access communications,” /€€€ Trans. Commun., vol. COM-
1983. 34, pp. 569-575, June1986.

202 PROCEEDINGS OF THE IEEE, VOL. 78, NO. 1, JANUARY 1990


D. Dykeman and W. Bux, “Analysis and tuning of the FDDl lzhak Rubin (Fellow, IEEE)received the B.Sc.
media access control protocol,” lEEE Trans. Selected Areas and M.Sc. degreesfrom theTechnion-Israel
Commun., vol. 6, pp. 997-1010, July 1988. InstituteofTechnology, Haifa, Israel, in1964
J. M. Ulm, “A timed token ring local area network and its and 1968, respectively, and the Ph.D. degree
performance characteristics,” in Proc. /E€€7th Local Com- from Princeton University, Princeton, NJ,in
puter Networks Conf., Feb. 1982, pp. 50-56. 1970, all in electrical engineering.
M. W. Atkinson and A. R. K. Sastry, “A simulation model for During 1964-1967, he served as a Com-
the FDDl token passing ring scheme,” in Proc. IEEElnt.Conf. munications Engineer and Officer in the
Commun., 1987, pp. 37.1.1-37.1.5. Israeli Signal Corps. In 1967-1968, he
A. Coyal and D. Dias, “Performance of priority protocols on worked as an Electronics and C3Engineer
high speed token ring networks,” in Proc. 3rdlnt. Conf. on in the Israel Aircraft Industries. Since 1970
Data Communications System Performance, Rio de Janeiro, he has been on the faculty of the UCLA School of Engineering and
Brazil, June1987, pp. 25-34. Applied Science, where he i s currently a Professor in the Electrical
D. Dykernan and W. Bux, “An investigation of the FDDl Engineering Department. He has had extensive research, publi-
media-accesscontrol protocol,” in Proc. 5th European Fibre cations, consulting, and industrial experience in the design and
Optic Communication and Local Area Networks Conf., analysis of commercial and military telecommunications systems
Basel, Switzerland, June1987, pp. 229-236. and networks, computer communications networks; local, met-
J. Limb and C. Flores, “Description of Fasnet-A unidirec- ropolitan, and satellite communications networks; queueing and
tional local-area communications network,” BellSyst. Tech. multiple-access schemes; information processing and stochastic
I., pp. 1413-1440, Sept. 1982. processbased models; and C3systems. During 1979-1980, he served
J. 0. Limband L. E. Flamm,”Adistributed local area network as acting Chief Scientist of the Xerox Telecommunications Net-
packet protocol for combined voice and data transmis- work(XTEN). At UCLA, he i s leadinga large research group. Healso
sion,” lEEE Trans. Selected Areas Commun., vol. SAC-I, pp. serves as President of I R I Corporation, a leading team of telecom-
926-934, NOV.1983. munications, computer communications, and C3experts that pro-
A. Albanese, M. Garrett, A. Ippoliti, H. Izadpanah, M. Karr, vides consulting, analysis, design, and seminar services.
M. Maszczak, and D. Shia, ”Bellcore METROCORETMnet- Dr. Rubin served as Cochairman of the 1981 IEEE International
work-A test-bed for metropolitan area network research,” Symposium on Information Theory, as Program Chairman of the
in Proc. CLOBECOM ‘88, Hollywood, FL, Nov. 1988. 1984 NSF-UCLA Workshop on Personal Communications, and as
M. Garrett, “Media access control layer for the METRO- Program Chairman of the1987 IEEE INFOCOM Conference. He also
CORETMnetwork,” in Proc. FOULAN ’88, Atlanta, CA, Sept. serves as ah Editor of the ~EEETRANSACTIONSON COMMUNICATIONS. He
1988. i s a member of Eta Kappa Nu.
M. Fine and F. A. Tobagi, “Demand assignment multiple
access schemes in broadcast bus local area network,” /€€E JosephE. Baker (Member, IEEE) received the
Trans. Computers, vol. C-33, pp. 1130-1159, Dec. 1984. B.S. degree in economics/system science,
F. A. Tobagi, F. Borgonovo, and L. Fratta, ”Expressnet: A high- the M.S. degree in communications and
performance integrated-services local area network,” /€E€ telecommunications engineering, and the
Trans. Selected Areas Commun., vol. SAC-I, pp. 898-912, Ph.D. degree in electrical engineeringfrom
Nov. 1983. the Universityof California, Los Angeles, in
N. F. Maxemchuk, “Twelve random access strategies for 1982, 1983, and 1986, respectively.
fiber optic networks,” /E€€Trans. Commun., vol. 36, pp. 942- During 1986-1988, he worked as a Con-
950, Aug. 1988. sultant on telecommunication and com-
B. Mukherjee and J. S. Meditch, “Thep,-persistent protocol puter communication systems for IRI Cor-
for unidirectional broadcast bus networks,” /E€€ Trans. poration and was also a Lecturer and
Commun., vol. 36, pp. 1277-1286, Dec. 1988. Research Engineer at UCLA. Since 1988, he has been a member of
B. Mukherjee and J. S. Meditch, “Integrating voice with the the technical staff of the Rockwell International Science Center,
p,-persistent protocol for unidirectional broadcast bus net- Thousand Oaks, CA. His research interests include the perfor-
works,” / E € € Trans. Commun., vol. 36, pp. 1287-1295, Dec. manceanalysis of communication protocols,and thedesignofeffi-
1988. cient techniques for analyzing large systems.

RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 203

You might also like