Professional Documents
Culture Documents
Invited Paper
Medium access control (MAC) schemes, protocols, and architec- to share efficiently local processing and computing
tures for high-speed local area (LAN) and metropolitan area (MAN)
resources while also serving t o interconnect local user ter-
networks and modeling and analysis techniques for their perfor-
mance evaluation are reviewed and categorized. In describing the minals, workstations, and processing devices. Private-com-
multitude of features characterizing such MAC schemes, we iden- pany metropolitan area networks (MAN’S) are used by an
tify various aspects of topological structures, including logical-bus organization to provide similar services along with inter-
(broadcast) and mesh topologies, slotted and unslotted channel- communications capabilities among more widely distrib-
ization schemes, and frame distribution and removal methods. To
support integrated broadband services, both circuit and packet uted user resources; they also serve as backbone networks
switching procedures are considered. that interconnect distributed user LAN’s, spanning dis-
MAC procedures are categorized in terms of their characteristic tances of hundreds of kilometers. Public MAN’S can allow
structures assumed in providing for the sharing of multiple-access users to share effectively the system communications and
communications channel over the assignment (time, frequency,
networking assets; they provide the private organization
code, space) space. Four key MAC classes are identified: fixed-
assignment, random-access, demand-assignment/polling, and with a MAN system (regarded as a virtual private MAN) as
demand-assignment/reservation. well as a metropolitan access network into regional or wide
A multilevel categorization of a high-speed telecommunications area public telecommunications networks. A hierarchical
network hierarchy is presented. Level-0 includes user-premises sta- categorization of such a telecommunications network
tions and LAN‘s. The level-1 MAN-1 hierarchy provides a backbone
for the interconnection of level-0 networks as well as a subscriber
architecture with regard to the role of the LAN and MAN
local access network into higher levels. The level-2 MAN-2 network systems i s presented in a latter section.
serves to interconnect level-1 remote unit nodes as well as a MAN Performance and cost-effective LAN and MAN system
access network, while a level-3 MAN-3 network is a metropolitan architectures need to employ efficient methods to share the
trunk network. Architectural options, examples, and operational system communications nodal and channel resources. To
speeds for each level are discussed. As examples illustrating the
architectures and techniques used for high-speed local and met- facilitate the sharing of the communications medium (or
ropolitan area networks, the IEEE 802.6 DQDB, FDDI, buffer inser- media) among the network stations, a proper medium
tion, and other MAC schemes are presented. access control (MAC) scheme must be implemented to con-
Modeling and analysis techniques are then reviewed for key trol, coordinate, and supervise the access of user infor-
classes of relevant MAC schemes, including fixed-assignment
TDMA schemes; demand-assignment reservation schemes, involv-
mation tolfrom the shared communications media.
ing in particular pure packet-switched, pure circuit-switched, and In this paper, we categorize and review the features,
hybrid-switched integrated-services demand-assignment TDMA architectures,and principles of key MAC schemes for high-
and TDM structures; demand-assigned polling procedures; and speed LAN and MAN systems. We relatethesearchitectures
random-access policies. to the hierarchical structure of a telecommunications net-
work. We overview the MAC protocol operation of key LAN
I. INTRODUCTION and MAN systems, as defined by standards committees. We
Local Area Networks (LAN’s) provide communications consider currently examined MAC protocol approaches as
services within the customer premises, enabling the user well as methods to be employed and investigatedfor future
implementations, when broadband-ISDN (B-ISDN) ser-
Manuscript received February2,1989; revised June27,1989.This vicesare to be supported. Subsequently,wewill also review
work was supported in part by the National Science Foundation a number of works involved in the development of math-
under grant ECS84-06497and in part by the UCLA Academic Senate ematical models and analysis techniques that can be
Committee on Research.
Theauthorsarewith the Electrical Engineering Department, 6731 invoked in providing for the design and performance eval-
Boetler Hall, University of California, Los Angeles, CA 90024. uation of major classes of MAC protocols. In doing so, we
I E E E Log Number 8933915. will not present an exhaustive list of all MAC schemes and
RUEIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 169
tains addressing information, it is copied automaticallyfrom the token, thus enabling it to immediately retransmit its
the medium by the intended destination station or stations, MAC message frame if the latter is determined not to have
so that MAC routing i s automatically achieved. Typically been properly received by the destination.
bus, ring, or broadcast star topologies are used to simplify The latter token ring LAN uses twisted-pair or coaxial
the characterization of the broadcasting path. media at transmission rates of 1-40 Mb/s. At 10 Mb/s, the
The communications link is set upas a bus (for a physical transmission timeofa1OOO bit frame isequal tolOOps,which
bus implementation) or as a point-to-point link (for a phys- is longer than the typical propagation time across the
ical ring implementation). The corresponding station inter- medium when the overall LAN length is shorter than 20 km,
face unit (SIU) acts as a passive or active MAC repeater. A considering a propagation rate of about 5 ps/km.
passive MAC node does not interfere with ongoing trans- In turn, when considering a 150-Mb/s LAN or MAN fiber-
missions along the bus and is able to copy the messages optic based system-such as the FDDI token ring or the
transmitted across the bus system. DQDB reservation bus systems, which can span longer dis-
An active MAC station interface unit operates in one of tances of around 100 km-the corresponding frame trans-
two possible modes. mission time and network-wide propagation delay are equal
to 6.67~sand 500ps, respectively. For a corresponding MAN
1) Repeat mode: where it performs as a repeater, serv- system that operates at a channel rate of 1 Gb/s, the prop-
ing to repeat the frame it receives; agation delay of 500 p s is much larger than the frame trans-
2) Nonrepeat mode: in which the SIU is not repeating mission time of 1 p s . Thus, under such high transmission
the information it receives from the medium. rate conditions, each message transmission occupies only
In the latter case, under a logical bus configuration, the SIU a small physical length of the logical bus network medium.
i s also typically set to be in a “stripping mode,” stripping It is therefore not efficient, from the perspectiveof message
from the medium the information it receives. During this delay and channel bandwidth MAC utilization considera-
time, the SIU is able to transmit messages across the tions, to provide for only a single transmission at a time
medium, provided it gains permission to do so from the acrossthelogical bus medium.Thefollowing modeofoper-
underlying MAC protocol. Note that if the SIU is provided ation i s thus preferred.
with a store-and-forwardcapability, it can store all the infor- b) Multiple simultaneous frame transmissions along
mation it receives while being in a nonrepeat mode and the logical bus medium: While permitting multiple-frame
retransmit this information, if so desired, at a subsequent transmissions across the medium, we can consider two dif-
time. ferent procedures as they relate to whether single or mul-
A logical-bus topology can also be associated with an tiple simultaneous message frame transmission initiations
active interface of the station onto the fiber budbuses. This are allowed.
for example, isthecase forthe IEEE802.6 DQDB(distributed
queue dual bus) [I] or Bellcore’s Metrocore [5] irnplemen- b.7) A single transmission initiation i s allowed at any
tations. Under DQDB, the station overwrites each passing instant of time. When a fiberoptic-based token-ring MAC
bus bit through optical-to-electrical conversion, an elec- scheme, such as FDDI, is used, the station releases the token
trical “or” write operation and an electrical-to-optical immediately following the transmission of the station’s
reconversion. The active interface of the station can also message, rather than waiting to fully receive its own mes-
provide it with the capacity to strip bits, and thus message sage prior to releasing the token. In this manner, multiple
frames, off the bus. simultaneous transmissions can take place across the bus,
MAC procedures for logical bus configurations can also allowing for a better utilization of the bus space-bandwidth
be characterized by the following features, which involve resources.
both the method used for removing message frames and Many times, a slotted access scheme is used for logical
theconstraints imposed upon the number of simultaneous bus linear topologies. Under such a scheme, as illustrated
transmissions carried along the medium. As to the latter by the FASNET MAC procedure, a bus controller i s respon-
feature, we differentiate between the following implemen- sible for generating successive time slots within recurring
tations. time cycles. A slot propagates along the unidirectional fiber-
7) Frame Transmission Initiations i n Relation to the bus as an idle slot until captured by a busy station; the slot
Number of Simultaneous Transmissions Along the Logical is then designated as busy and is used for carrying the
Bus: inserted message segment. A busy station senses the
medium and captures an available idle slot which it then
a) Single message frame transmission across the uses to transmit its own message segment. For fairness rea-
medium: A single MAC-frame transmission is permitted sons, a busy station is allowed to transmit only a single seg-
across the medium at any time instant; thus no more than ment during each time cycle. In this manner, such MAC
one station can initiate a transmission onto the medium at schemes (a number of which will be reviewed later) strive
any given time instant, and no other station can initiate a to schedule busy station accesses onto the medium such
transmission until this later transmission is removed from that one will follow the other as soon as possible, so that
the medium. a message train i s generated while efficiently utilizing the
This i s the technique employed by the IEEE 802.5 token medium bandwidth and space (length) dimensions. How-
ring LAN, in which a station holding the token does not ever, note that no more than a single station i s allowed at
release it until it receives its own frame (following a full cir- any time to initiate transmissions onto the unidirectional
culation around the ring). This simplifies the operation of medium; transmission initiations occur in an order that
the protocol and provides the station with the ability to matches the positional location of the stations along the
review its acknowledged message frame prior to releasing fiber.
RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 171
to their characteristic delay and throughput requirements. fluctuations. Voiceand certain videoand datatraffic sources
For example, voice packets must subscribe to strict end-to- can be categorized as synchronous or isochronous sources.
end time-delay limits, while video packets induce high Under acceptable time-frame limits, such sources can be
throughput support requirements. Such related MAC supported through the allocation of synchronous or iso-
issues are further discussed in subsequent sections. chronous circuits.
An isochronous circuit i s allocated across a multiple-
C. Hybrid Logical Bus and Buffered Switching Topologies access channel by the MAC layer by invoking a circuit-
switching procedure. Thus each isochronouscircuit i s asso-
Note that many high-speed multi-gigabit communica-
ciated with slots which are allocated, during each cycle on
tions networking architectures that cover wider areas (such
a dedicated basis, to the isochronous source transmitting
as MANSand WANs), i.e., wide area networks many times
across this circuit.
need to combine broadcast (logical bus) and mesh (switch-
ing) architectures to yield an efficient, reliable, and respon- b) Asynchronous services: Asynchronous sources
sive integrated-services fiber-based network. generate information in a random fashion. Information
In considering logical-bus topologies with active SIU‘s, messages are generated at random times and may also be
we already noted that certain nodes can be designated to of random length. This i s the typical situation with data
act as store-and-forward processors and also serve as frame sources and services.
removal supervisory nodes. Such nodes can operate as MAC Asynchronous sources sharing a multiple-access channel
bridge gateways. These gateways serve to isolate the seg- can be well supported by the employment of a packet-
ments interconnecting them, each segment operating as an switching-based MAC protocol. Virtual circuit or datagram
independent logical bus network. These gateways act to packet-switching services can be provided.
filter MAC frame interconnections between these seg-
Examining the list of services just presented, operating
ments. The individual segments can operate efficiently
at various speed levels, we note that many high-speed LAN
when they serve a local community of stations that gen-
and MAN systems must provide support to a heteroge-
erates a distinct traffic throughput, noting that each seg-
neous mixture of asynchronous and isochronous sources.
ment spans a shorter distance, thus reducing the effect of
Hence high-speed LAN and MAN networks must be able
the end-to-end propagation delay on message perfor-
to implement MAC schemes that provide acceptable grade-
mance. Access priority can be given in each segment to the
of-service levels under such an integrated environment. For
intersegment packets which traverse this segment, to
this purpose, the following approaches can be outlined (as
ensure their timely distribution.
a MAC procedure, as well as a network layer discipline.)
Service Classes and Bandwidth Requirements:
Local area and metropolitan area networks that serve as A pure (fast) circuit-switching approach i s used;
components of an integrated services digital network extending the technique currently used across the
(ISDN) provide support to a large multitude of service public switched telephone network. However, cir-
classes. cuits allocated to bursty data sources lead to poor
bandwidth utilization across the multiple-access
a) Low-speed services (0.1 kb/s-100 kb/s), including channel. When ample bandwidth can be made avail-
telemetry, data, voice, and slow-motion imaging. able to overcome this poor utilization, this drawback
b) Medium-speed services (1 Mbls-IO Mbls), including can be traded against the relative simplicity of the cir-
data and imaging. cuit-switching MAC procedure which entails the
c) High-speed services (50 Mb/s-I Gb/s), including TV, implementation of an efficient demand-assigned cir-
high-definition lV (HDTV), data, imaging, video on cuit allocation scheme.
demand (VOD), multimedia messaging, teleconfer- A pure (fast) packet-switching technique is employed.
encing, video, database services, etc. It i s then necessary to ensure that isochronous
Such services are frequently classified into the following sources are provided with acceptable network delay
categories. limits. This approach requires the MAC algorithm
controlling the packet-switched-based sharing of the
a) Synchronous a n d isochronous services: These ser- mutiple-access channel to provide proper limited
vices generate information in a steady time-synchronous delay to all packet classes, or to incorporate priority-
fashion, or in a nearly synchronous fashion. based schemes that can assign higher priority to iso-
In providing multiple-access support for such services chronous-service-related packets for the purpose of
while guaranteeing acceptable grade-of-service level, it is ensuring their timely delivery.
many times advantageous to allocate the channel to the The Bellcore’s switched multimegabit distribution
source in a synchronous fashion; i.e., at fixed instants of service (SMDS) [9] i s an example of a service that i s
time and for fixed durations that correspond to the syn- based on datagram packet-switched MAN and inter-
chronous characteristics of the generated message streams; connected MAN systems.The IBM PARIS network [IO]
or, to permit higher flexibility in implementation, to allo- i s an illustration of a pure network-wide fast packet-
cate the channel to the source isochronously, in a nearly switching approach.
time-periodic fashion, at a desired average rate. Thus an An integrated use of circuit-switching and packet-
“isochronous circuit or channel” provides for the delivery switching disciplines is made. Isochronous sources
of fixed quanta of traffic data over fixed time intervals (time- are allocated isochronous circuits upon demand,
frames or cycles), relative t o a certain time reference. The while asynchronous services are supported on a
position within the timeframe of the time-slot dedicated to packet-switched basis. This i s the approach currently
an isochronous circuit can otherwise be subjected to time adopted by the FDDI-II and DQDB systems.
-~ ~
D. Channel Timing formats Such an ATM structure is illustrated by the DQDB system
outlined later.
In classifying, examining, and developing MAC proce-
dures, we identify the following key channel timing for- c) Hyper-slotted Channel. This entails a hybrid struc-
mats. ture, whereby cycles and hyper-slots are defined, while time
slots can also be dynamically defined so that dual opera-
a) Unslottedchannel. No time slots are defined for use tional modes can be supported. Designated time slots can
by the MAC layer process. Message frames can be of vari- be used for a slotted operation, while the remaining period
able length and a station can start its transmission onto the within each hyper-slot or cycle can be used for an unslotted
channel at anytime, when permitted in accordance with the MAC operation.
underlying MAC scheme. Such an implementation is exemplified by the FDDI-II
The IEEE 802.3-IEEE802.5 CSMA/CD, token bus and token networkwhich providesforthedefinition of a synchronous
ring LAN protocols, and the FDDl fiber token-ring protocol cycle, and the allocation of certain isochronous slots within
are examples of such protocols. Other pure packet-switch- each such cycle, for supporting isochronous sources. In
ing architectures also involve no specified time boundaries turn, asynchronous sources use the unslotted FDDl token
for the transmission of MAC level message frames. ring MAC scheme, in a manner which, at the MAC su b-layer,
b) Slotted Channel. Time slots are defined such that is independent of and transparent to the isochronous oper-
each time slot is of fixed duration. The frame structure of ation.
a time slot i s also defined, including an header field that can Layered Protocols and the MAC Sublayer:
serve to identify the type, status, and construction of the In relation to the OS1 reference model, the data link layer
information carried by the time slot. Several time slot types of LAN and MAN networks i s subdivided into the medium
can be identified, so that time slots of different types can access control (MAC) lower sublayer and the logical link
be of different lengths and can be designated for allocation control (LLC) upper sublayer. Services provided bythe MAC
to different service classes. layer allow the local protocol entity to exchange MAC mes-
Time slots can also be grouped to form superslots, in sage frames (which are the MAC sublayer protocol data
accordance with a specified structure, with the header units) with remote MAC entities.
(label) of the superslot identifying the designation of each The MAC sublayer provides the following services.
embedded slot. MAC sublayer services are provided to the LLC sub-
Consecutivecollections of time slotscan begrouped into layer. LLC service data units (SDU’s) are submitted to
cycles (or time-frames). Each cycle is also properly struc- the MAC sublayer for transmission through proper
tured, having a header field which provides time, slot, and multiple-access medium sharing. In turn, MAC pro-
cycle synchronization information as well as designation of tocol data units (PDU’s) received from the medium
the specific structural composition of the underlying cycle. and destined to the LLC, are transferrred to the LLC
CCITT has been considering a slotted channel structure, sublayer as proper LLC-SDU’s.
operated in an asynchronous transfer mode (ATM) or a syn- The underlying LLC-SDU’s includesourceand des-
chronous transfer mode (STM). The ATM structure has been tination addresses, the data itself, and service class
considered by CClTT as a target solution for implementing and quality of service parameters.
B-ISDN. Slots are allocated to stations in accordance with MAC sublayer services are similarly provided to
the MAC scheme, resulting in message streams that consist directlyconnected isochronous and nonisochronous
of ATDM interleaved cells (segments, slots). These streams channel users (CU’s), allowing a local CU entity to
can be distributed over the network through the use of cell exchange CU-data units with peer CU entities.
switching procedures employing fast packet switching or These are connection-oriented services whereby,
asynchronous time division switching procedures. The STM after an initial connection setup, the channel user i s
structure is considered by CClTTas an interim arrangement able to directly access the communications channel
used during the evolution of the telecommunications net- through the proper mediation of the MAC sublayer.
work towards attaining B-ISDN capabilities. It involves the The CU generates and receives its data units through
employment of a synchronous TDM MAC procedure in the MAC sublayer over an existing connection, on an
implementing a circuit-switching-based bandwidth allo- isochronous or nonisochronous basis. Such CU-
cation scheme. SDU’s contain the data itself and possibly service
An integrated ATM and STM approach can also be imple- quality parameters; no addressing information is
mented over a slotted channel. needed, since an established connection i s involved.
The use of a slotted channel structure provides the MAC MAC sublayer services are provided to the local MAC
process with avery useful facilityfor effectively sharing the station management entity via the local MAC layer
underlying multiple-access channel. Time slots can be management interface.
properly and dynamically designated for use by active iso- Examplesof theseservices includetheopening and
chronous and asynchronous sources, invoking integrated closing of an isochronous or nonisochronous con-
circuit-switching and packet-switching MAC algorithms. nection, its profile, features, and the physical medium
One notes, however, that, due to the fixed length of the slot, it should be transmitted on, and the establishment
a message must be broken down into individual segments and disestablishment of the binding between the
whereby each segment (constituting the MAC message channel user and the connection end-point identi-
frame) i s allocated a separate slot. This is of particular con- fier.
cern to asynchronous service message types. A slotkeg- The MAC sublayer requires services from the phys-
ment assembly-reassembly (SAR) process must thus be ical layer for the physical transmission and reception
included as part of the MAC level protocol implementation. of information bits.
RUBlN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 173
os1
Reference _-----
Model
1 r-----------
Physical Physical
(Instance 1)
\ Medium2
Physical
Layer rn (Physical (Station
Manage-
ment)
U (Physical Medium
Fig. 2. MAC layer and its interfacing layers. (a) For IEEE 802.6. (b) For FDDI.
In Fig. 2, we show the associated layers as implemented cation of a number of key resource dimensions. The assign-
by the IEEE 802.6 DQDB system and by the FDDI system, as ment space considered i s the (T, F, C, s) = (time, frequency,
they relate to the OS! data link and physical layers. code, space) space. The allocation of access to the shared
medium is provided to stations' messages and sessionslcalls
111. CATEGORIZATION OF MEDIUM
ACCESSCONTROL through the assignment of slots, segments, and cells of the
PROCEDURES time, frequency, code, and space dimensions.
1) Time Division Scheduling: Stations share a prescribed
A multitude of access control procedures are used by sta-
channel frequency band by having their transmissions
tionsto shareagroupof multiaccesschannels, such asthose
scheduled to take place at different segments of time. Typ-
configured in a logical bus (broadcast) topology. We pro-
ically, only a single messagecan be transmitted successfully
vide in this section a classification of MAC schemes.
across the designated channel at any instant of time.
2) Frequency and Wavelength Division Allocation: The
A. MAC Dimensions
bandwidth of the communications channel i s divided into
The multiple-access communications medium resource multiple disjoint frequency bands (or wavelength channels
can be shared among the network stations through the allo- for an optical channel), so that a station can be allocated
A
Signaling(S1G) Information
Technique Transmission
(IT) Method
A
SIG IT AT
SIG
T,F,C,S
Fixed Adaptive
’ F C s
Channel Sensing
Signaling Channel
Establishment
FA DA
Per-station Signaling
Accsss Scheme
A
PollIRespnse
Amss
I I
Polling Reservation
Rez2nment
FA.RA.DA FA,RA.DA
RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 175
~~ __ ~~
ne1 resource that it can permanently use for accessing the occurwithout a properflowcontrol regulation toguarantee
channel. Corresponding access control procedures thus maximum delay limits for packets associated with isochro-
include TDMA (time division multiple access), FDMA (fre- nous and real-time based services. It i s shown in [22] that
quency division multiple access), WDM (wavelength divi- a random-access scheme can be employed in a movable-
sion multiplexing), CDMA (code division multiple access), slot-TDMA arrangement to capture a slot across a channel
and SDMA (space division multiple access) schemes. A cor- and then ensure that slots similarly positioned in subse-
responding signaling procedure is implemented to ensure quent time-frames are reserved for the establishment of
that station transmission boundaries are well recognized such an isochronous circuit. As such, the random access
by the participating stations along the respective (T, F, C, scheme is used as a signaling protocol serving a reservation
5 ) dimensions. MAC algorithm, as will be noted later.
Medium resources (along each dimension) can be Non-channel-sensing random access procedures yield
assigned on a fixed basis to specified sessionskonnections, low channel utilization levels. In turn, the efficiency of a
to a station, or to a group of stations. When allocated to a channel-sensing random access procedure critically
connectionkall, such schemes provide the basis for the depends upon the timeliness of the sensed channel occu-
establishment of isochronous circuits and can lead to effi- pancy information, and thus upon the overhead durations
cient sharing of the medium bandwidth resources for the associated with sensing the channel (and affected by chan-
support of many voice, video, high-speeddata, and real-time nel propagation delays and certain station idle detection,
session connections when a steady traffic stream of infor- turnaround, and acquisition delay times [17]). Hence, for
mation i s generated. Effective channel sharing can also high-speed logical-bussystems, when channel-sensing-type
result when such channel resources are dedicated for random-access schemes are used, performance degrada-
exclusive use by a station or a group of stations, provided tion i s caused by the very high ratio of the channel prop-
the latter generate steady traffic streams which can effi- agation delay t o the packet transmission time. Under such
ciently utilize the dedicated resources at an acceptable a scheme, a busy station is required to obtain the channel
quality-of-servicelevel. This is illustrated by use of packet- state prior to initiating a transmission. However, since a sta-
switched TDMA (PS-TDMA)and circuit-switched TDMA (CS- tion’s transmission must propagate across the total logical-
TDMA) schemes, which are described and modeled in sec- bus medium before its existence can be sensed by all net-
tions VI-VII. work stations, and since stations make uncoordinated
Under a “random-access” (RA) scheme, stations contend access decisions under a random-access scheme, these
for access to the communications channel in accordance decisions are based on incomplete channel state infor-
with an algorithm that can lead to time-simultaneous (over- mation that can lead to excessive message collisions.
lapping, colliding) transmissions by several stations across The degrading effects of the propagation-delay-to-mes-
the same frequency band, causing at times the retrans- sage-transmission-time ratio can be somewhat reduced by
mission of certain packets. the following approaches.
Under fixed random-access schemes, a station transmits
its message frames across the channel at random times, in Limit the overall propagation delay by dividing the
a slotted or unslotted fashion, without coordinating its overall network into multiple tiers as illustrated by
access with other stations. A station which detects (through the double-tier LAN and MAN architecture investi-
channel sensing, or through nonreceipt of a positive gated in [23]. The network stations are divided into
acknowledgement from its destination) its transmission to groups. A shared backbone medium i s used to pro-
collide with another transmission will retransmit its mes- vide interconnection between groups (on a broad-
sage after a properly computed random retransmission cast global basis using repeaters as gateways, or on
delay (whose duration may depend upon the estimated a store-and-forward bridged basis), using a noncon-
channel state of congestion). Under an adaptive channel- tention (non-random-access) based MAC algorithm.
sensing random-access algorithm, a busy station first A random-access MAC strategy can be used for con-
senses the channel to gain certain channel state informa- trolling the access of messages across the shared
tion, and then uses this information to schedule its message group medium, which now spansa much shorter dis-
for transmission in accordance with the underlying pro- tance and thus involves considerably reduced prop-
tocol, again without undertaking full access coordination agation delays.
with all other network stations. Various fixed (such as While the propagation delay depends on the con-
ALOHA [I31 and group random access [14]) and adaptive ducting medium and i s independent of the trans-
channel-sensing random-access algorithms (such as CSMA mission speed, the packet transmission time is
[15], CSMAKD [16], DGRA [ I q , tree-random-access colli- reduced as the transmission speed increased. The
sion resolution [I81 and others [19]-[21]) can be invoked. propagation-delay-to-message-transmission-time ra-
In general, random-access schemes are not well suited tio can be reduced by using FDMAIWDMA or SDMA
as information transmission methods for governing the methods to replace the single-band high-bandwidth
accessof information messagesontoavery high speed fiber medium with a group of shared multiple channels,
communications channel, unless provisions are made to each of lower bandwidth [24]. Clearly this will provide
considerably limit the extent of message overlaps due to an improvement only if the underlying services can
collisions, or to limit the use of this access technique to cer- be efficiently supported over such a reduced band-
tain low-throughput messaging classes. width channel when a random-access (or other MAC)
A random-access procedure i s typically employed for scheme i s used.
supporting packet-switching services. At higher normal- As noted in the preceding, random-access schemes
ized throughput levels, high packet delay variances can can serve, as part of other MAC architectures, as
RUBlN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 177
Level o
LAN I :;:-;
Subscriber
Local Access
I MAN Access
1 Level 3
MAN-3
Metropolitan
Trunk Networl
WAN.
Backbone Nets
Long-Distance
6 Distribution
Networks
Resldentiai
or Business CPE Remote Local
Subscribers untts Exchange
Fig. 5. Level-I MAN-I architecture, using bus broadcast Fig. 7. Level-I MAN-I architecture, using mesh switching
backbone. backbone.
-___
receivers, and thus have time-simultaneous access to only
a limited number of backbone channels.
b.1) A single-hop communications access i s pro-
vided between all or a limited number of MAN-I gateway
nodes. An appropriate combined channel selection/MAC
procedure i s developed to efficiently share the assignment
space (T, F, C, S).
b.2) A subset of the MAN-I gateway nodes can inter-
communicate through multihop transmissions across the
MAN-I backbone network. Under this setup, nodes need
to provide switching services to multihop MAC frames, so
that these frames are retransmitted across the backbone
channel until they reach their eventual gateway destination
node($. See [4] for an investigation of a class of multihop
interconnectivity routing patterns.
RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 179
circuit and packet switching procedures, as well as their
integrated versions, are considered.
A much simplified backbone architecture is shown in Fig.
8, where a star backbone i s used. A broadcast or switching
star can be employed. This architecture exhibits control and
topological advantages and disadvantages associated with
a central node topology; the central node may have to be
backed up to increase network survivability.
\\
As noted in Fig. 4, the level-2 MAN-2 network provides
for the interconnection of the level-I remote unit nodes,
and also serves as a MAN access network providing access
to the higher-level metropolitan area network. A MAN-2
network uses fiber feeder communications channels that
are currently planned to operate in a public telecommu-
nications network at a rate range of 0.6-2.4 Gbls, and in a
multi-gigabit/s range for future implementations.
MAN-2 network MAC architectures can be characterized
in a manner similar to that used for MAN-I networks. A
MAN-2 network can provide interconnection and access to
MAN-I networks through the use of proper gateways and
backbone networks that are configured as follows:
802.4, and IEEE 802.5 LAN’s that employ CSMAl multi-gigabitls MAC circuit implementations described in
CD (random-access), token bus (polling) and [5]. Gallium arsenide (CaAs) IC’s operating in the 1-2 Gb/s
token ring (polling), respectively, as MAC range can be used to implement 8:l and 16:l multiplexers
schemes. 2nd corresponding 1:8 and 1:16 demultiplexers allowing an
Class 2: High-speed LAN and MAN systems operating existing 150 Mbls silicon-based MAC IC to utilize a logical
at a backbone rate of about 100-150 Mbls, such bus backbone operating at 1.2- 2.4 Gb/s.
as the FDDI-I, FDDI-II, IEEE 802.6 DQDB, and To resolve the optical versus electrical rate mismatch,
the experimental METROCORE network; with class 4 and class 5 networks can be implemented through
potential improvements to throughputs of 400- the use of multiple-channel and multiple-band configu-
800 Mb/s. rations, employing FDMAlWDMA and SDMA techniques,
Class 3: LAN and MAN systems using a backbone rate where each band can be shared by using a class-2-based
of 1-2 Gbls. MAC algorithm coupled with a selection algorithm which
Class 4: LAN and MAN systems employing backbones is used to allocate the channelslbands. Here, a node can
at rates of multi-gigabitls. operate not just as a MAC repeater across a logical bus net-
Class 5: Terabitls MAN systems. work, but also as a MAC store-and-forward switch, as
described in previous sections, leading to network seg-
Class 1 networks have been widely evaluated, discussed,
mentation and multiple-hop network coverage. Integrated
and analyzed. We thus outline in this section the MAC
logicahbus and fast-switching mesh architectures could be
structureof illustrativeclass 2 networks. In subsequent sec-
effectively used for class 4 and 5 networks.
tions, we discuss the modeling and performance analysis
of MAC procedures employed by such networks, as well
A. The IEEE 802.6 Distributed Queue Dual Bus (DQDB)
as by other networks belonging to other classes.
MAC Scheme
Class 3 networks can be similarly implemented through
the useof a single logical bus backbone networkor by using The lEEE802.6distributed queuedual bus(DQDB) system
high-speed multiplexing of a station’s traffic into multiple [ I ] is a local and metropolitan area network that uses a dual
logical-bus systems. An example of such a multiplexing bus configuration utilizing a reservation procedure (called
arrangement employing current technology is given by the a distributed queueing scheme) as the medium access con-
RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 181
~~
a- U
n-
Fig. 12. Level-2 MAN-II mesh architecture, using switching nodes.
~~
Fig. 13. Overall network architecture consisting of LAN’s, MAN-l’s, MAN-11’s and MAN-
I l l network levels.
BUS A
3 DEFAULT D
FRAME BUS B
GENERATOR
-7
Fig. 14. Looped bus topology for DQDB network.
derived MAC PDU’s that fit into the fixed-length MAC seg- Astation can request its segmentto be transmitted across
ments. either bus A or B (or both), and be considered at priority
The medium-access control for transfer of asynchronous I, I = 0, 1, 2, 3, where level 3 is the highest priority level.
segments i s governed by a reservation scheme. The latter, There are thus eight (x, I ) instances of the DQSM at each
called a distributed queue procedure, controls the write node corresponding to each possible combination of
function for the queue-arbitrated access control entity. The requested bus x and priority level 1.
operation can be specified by a distributed queue state The station will not process another (x, I ) request of prior-
machine (DQSM) and the request queue machine (RQM) ity I to write bus x until a previous (x, I ) segment writing to
[I], summarized as follows. the bus commences.
RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 183
Asynchronous segments for transmission on the bus are Access to the reservation channel is provided on-a posi-
received by the station and are placed in the local (x, I) out- tional priority basis, whereby a node can access any empty
standing request queue. Request for access to bus x is sig- request field that passes itself across the unidirectional bus.
naled to other nodes by an OR-write operation performed Under an earlier DQDB version, a station i s required to
on the REQUEsTsUbfieldof slots passing on theopposite bus, transmit its reservation before it is permitted to transmit its
bus y. This operation i s controlled by the RQM. The latter corresponding segment. Under a later version, this rule was
sends a request (reservation)by setting the REQ-Ibit on bus changed to allow a station to transmit i t s queued segment
y i n the first slot in which REQ-I bit i s not set when received. upon thecaptureof an idle slot (after itscountdown counter
Subsequently, to provide for the access of an (x, I)seg- has reached the 0 state) and to transmit its reservation on
ment, the station's DQSM operates as follows. The DQSM the opposite bus when it is able to do so.
continuously maintains a count of the requests generated Thus, under the earlier version, a node located closer to
by nodesdownstream on busxthat are still outstanding (by the frame generator for bus ycan gain access to the request
recording the number of such requests on bus y and channel on bus y in advance of other nodes which are
observing the number of empty slots passing itself on bus located downstream along the same bus. A measure of fair-
x to satisfy these requests). An (x, I) request counter i s used ness i s attained by not allowing a node to make another
to maintain this count. When an asynchronous (x, I)seg- request until its previous segment is transmitted. Such a
ment transmit request i s generated, the DQSM moves into reservation procedure can lead to situations in which a
a countdown state. It then transfers the current state of the group of busy stations capture the bus without allowing
(x, I) request counter to a countdown counter (and sets the stations located downstream to this group (along the reser-
former count state to 0).The state of the countdown counter vation bus) access to the message bus.
i s decremented by one for each empty slot that passes the Under the later reservation rule, such reservation lock-
node on bus x, oriented towards stations which are down- outs and delays are typically avoided since stations are not
stream to itself and which have already sent reservations required to wait for the transmission of their reservation
at the same or higher priority level, or for higher priority bits prior to the transmission of their information seg-
segments subsequently submitted for transmission and ments. Uneven bandwidth distribution patterns can still be
residing in its own buffer. The countdown counter needs exhibited. For example, downstream stations which are
to increase its count by one for each subsequent reser- widelydistant from an upstream one can generate requests
vation request it identifies on busy, or i s self-generated, for for segments that have already been transmitted, prevent-
higher priority segments. When the corresponding count ing this station from accessing the bus.
state equals zero, the DQSM is in the standby state, and Possible improvements in the reservation scheme could
when an empty QA slot i s observed on bus x, this slot i s also be related to using batch- or connection-related reser-
marked busy and the asynchronous segment i s written into vations, whereby requests are made for batches of seg-
this slot. ments or at certain session start and termination times [30]
The nonarbitrated slot access control scheme operates rather than for every individual segment.
bywriting the node's isochronous sampleor samples, iden- Algorithms have been developed and investigatedto pre-
tified by a label and a list of one or more (octet, offset) pairs, vent lockout and unfair access phenomena, leading to fair
onto the requested bus within the appropriate busy NA slot. bandwidth allocationsand channel access patterns1941, [951.
The latter is identified by having the same label in the iso- In [95], such an algorithm allocates to each station a
chronous-sample segment header of the slot. Then, the bounded quota of segments, which it i s permitted to trans-
node OR writes each octet in the list into the NA slot at the mit during an underlying cycle. A recently proposed mod-
specified offset. ification requires a station to let an idle slot pass-by after
Considering nonisochronous operation, the efficiency of consecutively transmitting a specified (e.g., 8) number of
operation of the DQDB MAC procedure as a reservation segments.
scheme for the sharing of a logical bus system is related to The DQDB scheme employs a broadcast strategy to route
the efficiency of the reservation procedure and the utili- segments. As noted before, the space and bandwidth assets
zation of the logical-bus medium dimensions. Transmis- of the unidirectional fiber bus can be better utilized when
sions of information segments across the bus are coordi- a destination removal scheme is used, whereby the des-
nated by adistributed queue procedure underwhich station tination node, or a specially equipped supervisory node,
requests are queued and accommodated on a one-seg- copies its received segment from the bus and releases the
ment-per-stationat-a-time basis. This corresponds to a dis- slot for use as an empty slot by stations located downstream
tributed round-robin or processor-sharing queueing model, along the bus. Such a destination release scheme can lead
whereby the intended bus server provides each packet a to substantial improvements in bandwidth and delay per-
single-segment service-quantumper visit round. It i s noted, formance.
however, that stations can experience unfair bandwidth
allocation related to their position along the bus. For exam-
B. The FDDI-I and FDDI-I1MAC Schemes
ple, consider two widely separated, highly busy stations,
one located close to the frame generator and the other The fiber distributed data interface (FDDI) i s a proposed
located much further downstream. Due to propagation American National Standard for 100 Mbls token ring using
delay, it takes a relatively long period of time for the reser- an optical fiber medium. A recent enhancement, FDDI-II,
vations made on the opposite bus by the distant station to adds a circuit-switching capability, so that the network can
reach the closer station. In the meanwhile, the latter (being integrate data with voice, video, and sensor data streams.
positioned closer to the slot generator) captures available A maximum configuration consists of 500 stations (each sta-
idle slots, permitting only infrequently an idle slot for the tion representing two physical connections) linked by 100
distant station to pass by. km of fiber cable.
~~
Information is transmitted on the FDDl in frames [2], [31]. nel, marking itaseitherassigned toan isochronouschannel
A distributed-polling medium-access control procedure i s or as released for use by the token channel.
used. A single token exists, and only the station which has In comparing the DQDB and FDDl MAC schemes, one
seized the token i s permitted t o transmit across the chan- considers the differences in operation and performance
nel. Each station removes (strips) its own transmitted MAC between reservation/processor-sharing (PS) distributed
frames from the ring (logical bus), and can thus receive queue-based and polling-based MAC procedures. The per-
immediate ACK, appended by the destination as a trailer formance of these schemes is noted in subsequent sections
to the frame. The transmitting station issues the token to depend upon the reservation/PS delays and the polling-
immediately at the termination of its transmission, so that cycle latency delays. At lower traffic loads, the polling
the next busy station along the ring can seize it following scheme induces messagedelays due to token latency, while
the latest transmission which crosses its interface. An idle the reservation scheme induces relatively low reservation
station repeats the token, while a busy one strips it from delays. As the traffic load increases, the polling procedure
the ring. Two types of tokens are defined: restricted and i s less affected by cycle latency factors, while a reservation
unrestricted tokens. procedure can experience higher message delays due to
The access of nonisochronous frames onto the medium the higher load imposed upon the reservation channel,
i s controlled by a timed token rotation (TTR) protocol. Each leading to higher reservation delays. Such delay-versus-
station continuously records the time elapsed since it has throughput performance features havealso been noted for
last received the token. An initialization procedure i s used the DQDB and FDDI-II models simulated in [37]. Note, how-
to select a target token rotation time (TTRT) through a bid- ever, that under the later DQDB reservation rule, segment
ding process where each station bids for a token rotation transmissions can occur prior to the transmission of reser-
time (TRT) and the minimum such time i s selected. Two vation bits, so that the impact of reservation delays i s
classes of service are defined: synchronous, under which reduced. Packet delays are now primarily affected by the
a station can capture the token whenever it has synchro- distributed-queue PS system and its dependencies upon
nous frames to transmit; and asynchronous, which permits the locations of station along the bus, particularly when a
a station to capture a token only if the current TRT i s lower long bus span i s involved. As noted in the preceding, unfair
than the established TTRT. To support multiple priority lev- bandwidth allocation patterns can occur under the DQDB
els for asynchronous frames, additional time thresholds are scheme, unless a proper fair-access regulation algorithm i s
defined for each priority level. In this manner, a message incorporated.
of a certain priority level is allowed to be transmitted by its Both schemes employ a demand-assigned reservation
station, when the latter captures the token, only if the dif- procedure for circuit-switching allocation of isochronous
ference between the time this station has already used at circuits. Under FDDI-II, the packet-switched token chan-
this ring access (in transmitting higher priority messages) nels are byte-interleaved within 96 data groups, leading to
and thetime since the token last visited this station i s higher a packet mean delay which is nearly independent of the
than the corresponding time threshold associated with the isochronous channel arrangement.
underlying message priority level. This priority-based access Note that the DQDB protocol employs a slotted ATM
protocol is similar to the one used for the IEEE 802.4 token structure, which i s currently recommended by CClTT as a
bus LAN system. channelization structure for support of broadband ISDN
Using this procedure, stations can request and establish services in conjunction with fast packet-switching archi-
guaranteed bandwidth and response time for synchronous tectures.
frames. A guaranteed maximum response time is estab-
lished for the ring, since the arrival time between two suc-
C. Buffer Insertion Rings
cessive tokens at a station can be shown to not exceed the
value of 2 x TTRT. Buffer insertion rings have also been investigated as can-
As a polling scheme, the performance of FDDl is limited didates for fi ber-based high-speed network architectures.
by the ring walk (RW) time, which i s expressed as the ring The network i s configured as a ring, so that ring interface
latency representing the time it takes the token to propa- units (R1U’s)areconnected by point-to-point links. Each sta-
gate around the ring under no-load conditions. The ring tion i s associated with two buffers: a station buffer, which
throughput i s thus proportional to 1-RWITTRT.While lower stores the station’s packets waiting for accessing the ring;
TTRT values (such as 4-8 ms) yield lower guaranteed and a ring buffer, which i s inserted into the ring. In-transit
response times (lower than 8-16 ms), higher TTRT values packets arriving at the station’s ring interface unit from the
need to be selected to provide for better bandwidth uti- ring’s incoming unidirectional link are delayed at the ring
lization under higher load conditions. The ring latency var- buffer.
ies from a small value of 0.081 ms for a 50-station IO-km LAN An illustrative access protocol to such a ring i s given by
to a value of 0.808 ms for a 530-stations 100-km LAN. Using the IBM METARING network architecture [96]. Two coun-
a TTRT value of 50 ms for a LAN that supports 75 stations, terdirectional rings are used, with each station connected
30 km of fiber, and has a ring latency RW = 0.25 ms, a max- t o both rings. A station transmits its packets o n the ring that
imum utilization of 99.5 percent can be achieved [30]. provides the shortest path to its destination. Packets are
Under FDDI-II, a circuit-switched service i s embedded removed from the ring by their destination stations. No
into the token ring structure by the creation of a cycle for- token i s employed. A station having a ready packet to trans-
mat. A cycle master station i s assigned the responsibility to mit examines its ring buffer. If the latter is occupied, the
generate the cycles, one cycle every 125 p s , using an 8-kHz station queues itspacket,deferringaccesstothering traffic.
frequency reference clock. Each cycle has a cycle header In turn, if the ring buffer i s empty, the station proceeds to
which contains an isochronous channel template consist- transmit i t s packet across the ring. A packet that arrives
ingof 16symbols, one for each potential isochronous chan- across the ring at a (nondestination) station’s RIU during
RUBIN AND BAKER. MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 185
the time this station i s engaged in the transmission of i t s (and position)of station slots per cycle to be fixed, the delay-
own packet, is held in the ring buffer until the latter packet throughput performance provided to the station’s mes-
transmission terminates. In turn, such a packet arriving at sages i s independent of the performance provided to mes-
a RIU when the associated station i s not transmitting i s sages of any other station. The performance of a single sta-
immediately (after only a short delay in the buffer, as in a tion can thus be evaluated.
token ring system) retransmitted onto the outgoing link in A number of studies have been carried out in investi-
a cut-through fashion. gating the performance of TDMA systems under which the
Such an architecture can provide a significant increase underlying station i s allocated a single slot per cycle. For-
in the network throughput, approaching an average chan- mulas for the generating function and moments of the
nel capacity utilization of 400 percent due to the spatial queuesize(number of messages held in the station’s buffer,
reuse induced by the dual-ring structure and by the con- at any time in steady-state) distribution for such a TDMA
currency of destination-removed transmissions across each system have been derived in [39], [41], [42]. The generating
ring (which by itself yields an average of 100 percent function and moments of the message delay (total time
improvement in capacity utilization under a uniform traffic elapsed from the instant of message arrival to the instant
distribution). that the full message is transmitted across the channel) dis-
It is noted that in computingthe ringtransmission latency, tribution have been derived in [40], [41]. Performance anal-
in comparison with a token ring architecture, it is now nec- yses for such TDMA systems operating under station’s
essary to account for the additional packet delays that can buffer capacity limitations are presented in [49] and [93].
be incurred in the ring buffers along the message path. Related models have also been studied in [45] and [46].
However, since high-speed fiber finks are involved, the lat- The latter paper studies the performance of single-packet
ter latencies are usually dominated by the longer propa- messages transmitted by a single station along a discrete-
gation delay component of the ring traversal.time. time channel which is characterized by alternate available
An implementation of a buffer insertion ring for high- and blocked periods of random durations.
speed transmissions must incorporate a fairness control Under a priority-based TDMA scheme, the station’s mes-
algorithm to ensure equitable and fair access to the ring sages are queued for transmission in accordance with their
stations. In [96] such an algorithm i s presented; it uses con- priority levels. For a single-slot-per-cycle TDMA assign-
trol signals that are embedded in unused physical-layer- ment, assuming messages to arrive at the system in accor-
based coded signals. The latter control signals can traverse dance with a Poisson process, message delay analysis has
the ring within a period of time which is close to the ring been carried out in [44] for a nonpreemptive priority dis-
propagation delay, independently of any current message cipline, and in [51], [52] for preemptive-resume service pol-
transmissions across the ring. Such signals are transmitted icies. Message delay and system queue-size results, for a
on ring A for providing fairness control of transmissions general independent (cycle to cycle) arrival process, for a
across the counterdirectional ring B. The signaling scheme (station allocation of a) single-slot-per-cycle priority TDMA
i s used by a station to prevent itself from being blocked system using preemptive or nonpreemptive multiple prior-
from entering the ring by a downstream station that trans- ity-class service policies, have been derived in [48].
mitsan excessive numberof packets,ensuringthatastation The latter analysis involves the study of priority-based
is provided acess to the ring within a period of time deter- single-server discrete-time queueing systems. It thus
mined by the cycle of the signaling message. induces a TDMA cycle-gated service model, under which
message arrivals are recorded at the end of each cycle, so
that messages arriving during the frame are randomly
VI. MODELING OF FIXED ASSIGNED
AND ANALYSIS MAC
ordered for transmission while messages arriving in dif-
SCHEMES
ferent frames are ordered in a first-come first-served basis.
Under a fixed assigned MAC procedure, each station is Note that when message length distributions are indepen-
allocated a fixed resource of the shared communications dent of the message priority class, the system queue-size
medium, on a dedicated basis, across each dimension of distribution, and thus the average message delay, i s insen-
the {T, F, C, S } assignment space. sitive to the latter ordering, provided a work-conserving
Time division multiple access (TDMA) and frequencydivi- service discipline i s employed. The results in [48] for buffer
sion multiple access (FDMA) procedures have been most occupancy and message delay performance thus also apply
often utilized as fixed-assignment MAC schemes. In the fol- to the analysis of slotted FDMA systems, whereby a station
lowing, we outline models and performance analysis i s provided adedicated time-slotted frequency band forthe
approaches for TDMA systems; the corresponding analysis transmission of i t s buffered messages.
of FDMA systems i s also noted. The following formulas describe the message delay per-
A slotted channel isconsidered. Undera packet-switched formance of a station allocated a single slot per cycle in a
TDMA (PS-TDMA; simplified as TDMA henceforth), a sta- TDMA system, operating as a cycle-gated service system
tion sharing a multiple-access medium i s allocated a num- [40], [41]. Assume messages to arrive at the station in accor-
ber of slots during each cycle (timeframe). The station uses dance with the arrival sequence N = {N,, n 2 I } , which
these slots to transmit its buffered messages across the consists of independent identically distributed (i.i.d.) ran-
communications channel. Messages arriving at the station dom variables, where N, denotes the number of messages
are segmented into MAC packets (frames) so that the sta- arriving at the station during the nth cycle. Set the gen-
tion can transmit a single packet duringeach oneof itsded- erating function (z-transform) and first two moments of N,
icated slots. The station can thus statistically multiplex (on to be given by N*(z), n, = €(N,,),n2 = UN:), respectively.
a priority basis, if desired) its packets while ordering them A message contains a random number of packets B , which
for transmission across the channel. Assuming the number i s governed by a general distribution whose generating
for IzI I1. Notethat agroupof messages may arriveduring N*(z) = exp [MX(z - I)],
asinglecycle intothestation.Thefirst messageofthisgroup yielding the following mean delay expressions:
of messages to be selected for service i s called the group
leader. The first term in this expression accounts for the
waiting time of the group leader [41], while the second term
represents the waiting time of the message beyond that of E(D) = [(M - + ME(W,) + [MO + 1 - MI + 1/2
1)/2]
the group leader. The corresponding mean message wait-
= Mp[2(1 - p)]-’(/32/P) + MP + 1 - M/2,
ing-time in the station’s buffer i s obtained from this equa-
tion, to be given by where p = MAP < 1. Note that since a Poisson process i s
acontinuous-time arrival point process, an additional mean
delay of 112 slot has been included to account for the aver-
age latency between the message arrival within a slot and
+ (P/Z)[(n,/n,) - 11. its discrete-time recording at the end of the slot. Also note
The generating function and mean of the corresponding that the difference between the mean message delays com-
message delay D D (expressed in slots), which i s equal to the puted for corresponding TDMA and FDMA systems [40] i s
sum of the message wait time and i t s transmission time, are given by
thus equal to E(DF) - €(DT) = (M - 1)/2.
DE(Z) = W;(Z)B*(Z), f ( D D ) = €(WD) + P. For TDMA systems in which a station i s provided multiple
slots, say N, per cycle (consisting of M slots), the following
For aTDMA system with M > 1, so that the station i s allo- two cases are noted.
cated a single slot per each cycle which consists of M slots, If the station slots are uniformly distributed overthecycle,
the message steady-state delay D i s expressed as D = F + such that the ratio M/N = K i s an integer, the TDMA system
+
W T, where F is the message frame-latency component model can be reduced to that of a TDMA system, under
expressing the period of time elapsed between the message which the station i s dedicated a single slot per cycle by rede-
slot of arrival and the start of the station’s next service slot; fining the system cycle to be equal to K slots.
W is the message waiting time, measured from the latter On the other hand, consider aTDMA system in which the
time to the start of the message’s first transmission slot; and station is allocated N continguous slots during each cycle,
Trepresents the stations effective transmission time, which and set M = N + L. An exact analysis for such a system is
i s equal to the total time it takes to transmit all the packets provided in [43] for fixed-length messages, and in a recent
belonging to the underlying message. As noted, assuming extension by same authors to messages which contain a
station messages arriving within the same frame to be geometrically distributed random number of messages.
ordered randomly (among themselves) for subsequent This study also presents simple tight upper and lower
transmissions, the aforementioned three delay compo- bounds for the average station buffer queue size and mes-
nents are statistically independent, and the corresponding sage delay. These bounds are presented in the following.
generating function i s given by Station messages are assumed to arrive independently from
slot to slot in accordance with the i.i.d. sequence {A,, n 2
D*(z) = F*(z) W*(z) T*(z).
I } , where A, denotes the number of station messages arriv-
For message arrival processes that induce uniform arrival ing during the nth slot, so that N*(z) = [A*(z)lM, A*(z) =
distributions across the cycle, we have, (zI < 1, €(zAn), a = €(A,), a2 = €(A:). The message arrival rate at the
station is thusequal t o a mess/slot. Each message i s assumed
F*(z) = M - ’ ( l - zM)(l - z)-’, €(F) = (M - 1)/2. to contain a random number of packets governed by a geo-
RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 187
- _ _ _
metric distribution with parameter 9, and a mean of l I q Since the session holding time is manytimes much longer
(packetdmessage). than the cycle duration, the cycle microstructure (involving
Steady-state conditions are attained for (aI9) < (NIM), the specific station slot configuration) is usually neglected,
noting that the throughput rate is equal t o d q (packets/slot), and conventional blocking or delayed queueing system
while the system's per-station service rate (and throughput models are utilized to derive system performance.
capacity) is given by NIM. Exact results for the generating An analysis which incorporates the cycle microstructure
function of the distribution of the system message queue- i s presented in [47] for a CS-TDMA scheme which employs
size X (expressing the total number of messages queued at a delayed service. Requests are queued and served on a
the station buffer, at steady state) are obtained in [43], with FCFS basis. Each request requires the establishment of a
the mean message queue size E ( X ) shown to satisfy the fol- circuit that consists of a single slot per cycle, for the dura-
lowing bounds: tion of the session. The station can thus accommodate N
simultaneous active circuits. Results are first obtained for
Q < E(X) < Q + (N - 1)(L/M)/2 the queue-size and waiting-time distribution sfor adiscrete-
where time geom'"'IgeomIN queueing system. These results are
then used to derive the generating function for the station
Q = [241 - CY) + a2]/[2(q - a)] system size distribution under a CS-TDMA scheme. The
+ {Lq[a2 - a* + a(2 - 9)]}/[2(9 - a)(Nq - Ma)]. associated computation requires the solution of (N 1)2N +
linear equations. To derive a more computationally effec-
We note that the upper and lower bounds for the mean tive procedure, tight lower and upper bounds are obtained
queue-size differ at most by constant value of (N - 1)/2. For for the mean queue size and mean message delay func-
N = 1, a station i s allocated a single slot per cycle and the tions, requiring the solution of, at most, 3 N linear equa-
upper and lower bounds coincide, yielding E ( X ) = Q. tions. It i s also proved in [47] that a slot distribution con-
Message delay analysis for a TDMA system in which a sta- figuration which distributes station slots uniformlyover the
tion i s allocated N contiguous slots per cycle i s carried out cycle yields a mean message delay lower bound.
in [43] for a number of common message arrival point pro-
cess models, yielding expressions for the generating func-
VII. MODELINGAND ANALYSIS
OF DEMAND-ASSIGNID
tion of the message delay distribution. The mean message
RESERVATIONMAC SCHEMES
delay can be obtained using Little's formula, E(D) = E(X)a,
and is thus bounded through the use of the preceding pre- Under a demand-assigned reservation access control
sented bounds for E(X). For a continuous-time Poisson pro- scheme, an active station first generates a reservation mes-
cess with station message arrival rate equal to A, we set €(D) sage which it then transmits either to a central control sta-
=P E ( X ) + 1I2. tion or to all stations when a distributed control scheme is
In comparing system performance under the two afore- employed. The station i s then allocated a transmission cell
mentioned slot allocation configurations, when the ratio across the {T, F, C, S } assignment space. For the purpose
MIN is assumed to be a positive integer, under the traffic of carrying reservation messages, a reservation channel i s
model presented, the following result i s proved in [43]. The established and a reservation access-control algorithm is
steady-state station mean queue-size and mean message invoked. To assess the efficiency of such a demand-assigned
delay experienced under the contiguous slot allocation operation, one needs to evaluate the combined message
configuration is lower bounded by the corresponding per- delay (or sessionkall blocking) versus system throughput
formance levels attained when slots are uniformly distrib- performance, involving the joint operation of the reser-
uted across the frame. vation and information transmission schemes.
For schemes that involve a general allocation of station We review here a number of such demand-assigned
slots across the frame, the following results are available. TDMA (DAiTDMA) schemes, which use reservation pro-
For such TDMA systems with Poisson arrival streams and cedures to share acommunications medium on atime-divi-
single-packet messages, generating functions for the sion basis. Assume a slotted channel whose timeline con-
packet-size distribution are obtained in [go]. In [91], using sists of cycles (frames), each containing M slots.
asimilar model, it is shown that auniform distribution yields Under an in-band reservation procedure, a reservation
a mean packet delay lower bound, as already noted. In [92], period i s established during each cycle for transmission of
this model i s analyzed with the assumption of multipacket reservation packets across the main shared channel. For
messages to yield expressions for the generating functions example, under such a fixed reservation access control
of the system packet size and message delays. Note that all (FRAC) scheme [41], a fixed number of slots (or minislots)
of these results require one to solve for the multiple roots N, is allocated during each frame for stations to transmit
of a functional equation. In turn, note that the bounds pre- their reservation packets, in accordance with a specified
sented are readily computed. access control scheme, such as a fixed-assigned TDMA
Under a circuit-switched TDMA (CS-TDMA)scheme, each (whereby each station is allocated a reservation minislot for
station i s also allocated N slots per cycle. A station provides the transmission of its reservation packet) or such as a ran-
access to thechannel for i t s sessions by assigning to a ready dom-access method. A reservation delay D,,, is incurred by
session one of its dedicated circuits, for the total duration an active station in transmitting i t s reservation message.
of the session. Under a blocking service, a session is blocked The remainder of the period, consisting of N = M - N,
if upon its arrival no available circuit can be allocated by slots, i s available for information transmission of reserved-
the station. Under a delayed service, session requests for for messages.
circuit assignments arequeued atthe station request buffer Transmitted reservations can be considered to wait for
and are satisfied on a FCFS (or priority) basis. service in an equivalent single queue, which is the physical
~ ~ _ _
reservation queue at the central controller when a centrally the concurrent blocking probability (designating the prob-
controlled reservation scheme is implemented, or i s a "dis- ability that both the destination station i s busy and that no
tributed queue" whose state represents the reservation sufficient capacity can be allocated for the establishment
queue state at each station when a distributed control of the requested circuit). It is noted that destination-busy
implementation i s employed. Then, considering message probabilities can provide a major contribution to the over-
delay or blocking performance for arbitrary messages or all blocking probability under certain network conditions,
sessions which have already made their reservations, a and that the circuit-blocking and destination-busy proba-
TDMA model can be employed. For example, consider a bilities are many times inversely affected by the connec-
packet-switching DA/TDMA service (DA/PS-TDMA scheme). tivity configuration and the associated sizes of the com-
The queueing delay performance of reserved messages can mu n icating groups.
then be derived from the analysis presented in section VI In considering demand-assigned reservation schemes,
for a PS-TDMA system [43] by associating the reservation there is considerable interest in sharing the communica-
queue with a superstation, which is served in accordance tions medium among a multiplicity of services, including
with a TDMA scheme, which provides the station N = M - the integration of datalvoice and data/voice/video services.
N,,, service slots during each cycle of M slots. The arrival Using a demand-assigned reservation scheme, each station
message stream at this station consists of the arrivals of all can be allocated a fixed bandwidth, or a fixed number of
message reservations. The latter arrival point process can time slots per cycle, and then multiplex its multiple-service
at times be modeled as the superposition of all message packets and connections across its dedicate cell. In addi-
arrival processes at the stations; in particular, this statistical tion, a portion (or all) of the shared channel bandwidth can
characterization applies when nearly fixed or relatively low beallocated to stations upon the receipt of their reservation
reservation delays are experienced. Otherwise, a more request, depending upon the requested service type. Inte-
involved characterization of the reservation output process grated-services network systems can provide flexibility and
i s required; this may require a much more complex exact versatility in terminal connectivity and can capitalize on the
or approximate queueing analysis. A similar approach i s economics of equipment commonality to yield better
used when a circuit-switched reservation system (DA/CS- resource utilization and more efficient implementations of
TDMA) i s considered. network operations, maintenance, and administrative
When using a circuit-switching discipline, and consid- functions.
ering the establishment of end-to-end connections across In relation to the employed switching discipline, the fol-
a network of communications links, a reservation message lowing integrated-services MAC systems are observed:
fora session setup can be satisfied only if the requested link
a) integrated-services packet-switching MAC systems,
capacity can be made available and allocated across each
b) integrated-services circuit-switching MAC systems,
one of the links belonging to the connection path. Under
c) integrated-services hybrid packet and circuit-switch-
a blocking service, if no such end-to-end circuit can be allo-
ing MAC systems.
cated, the request i s blocked. Due to the complex statistical
dependencies which consequently exist between the states In a pure packet-switching MAC system, packets belong-
of different links, blocking performance analyses for cir- ing to different service classes (data, voice, video, etc.) can
cuit-switched networks have been carried out by many be treated equally. As a result, it is necessary to ensure that
researchers through the use of a link congestion indepen- the attained performance levels (including packet delays
dence assumption, which takes the blocking events over and loss probabilities) are acceptable for the provision of
different links to be statistically independent. Infinite each service. In turn, a more efficient utilization of the
source models are then employed and Erlang's loss formula shared bandwidth resources can be achieved through the
is typically used to compute the blocking probability(grade- use of service-type-based packet priorities, as well as the
of-service) performance for each link (see, for example, [53]- incorporation of flow control and congestion control
[58] and the references therein). For the blocking perfor- schemes to ensure that certain admitted packets (or packet
mance analysis of a single multiple-access communications sessions/bursts) can be provided with acceptable delay and
channel (such as a satellite communications channel or a loss probability levels.
shared terrestrial trunk group) when finite source models Such considerations are essential in the design of a fast
are used (so that each station can be engaged in, at most, packet-switching network. The fast packet switch itself can
a single connection at a time), see [59]-[61]. be regarded as a packet-switched MAC system that must
The blocking performance of interconnected circuit- operate under the limitations described. See [63] for an
switched MAN's (or LAN's), each represented as a multiple- illustration and a corresponding analysis of a packet switch
access channel whose bandwidth is shared among all local node in a real-time system environment. It is shown that
stationsforthe purposeof establishing local aswell as long- with a small number of buffers, the node (under essentially
distance connections, i s investigated in [62]. Each pair of an output buffering configuration) can provide a guaran-
MAN's i s interconnected by a multiple-access communi- teed delay bound for high-priority traffic, a low average
cations channel backbone. Finite-source models are delay for low-priority traffic, no loss of packets at the input,
assumed, and a realistic connectivity configuration has been and low probability of packet loss at the output.
specified so that each station can be assumed to statistically In a pure circuit-switching integrated-services MAC sys-
communicate with stations that belong to a specified set of tem, the communications medium provides multiple-rate
target stations rather than with (potentially) all network sta- circuit connections to a diverse mixture of service types.
tions. The computed blocking probability functions are Connections for different service types require different
expressed as the sum of three components: the destination channel bandwidth (time slot) allocations. The perfor-
blocking probability, the circuit blocking probability, and mance behavior of such demand-assigned reservation cir-
RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 189
__
cuit-switched MAC systems involves the computation of the support of circuit-switched connections while the sec-
the underlying blocking probability levels provided to each ond part, which contains a fixed number of M - N, slots/
service class, under a specified procedure for sharing the cycle, i s used for the transmission of packets by packet-
channel among the different service classes. The latter pro- switched stations. Integrated voiceldata systems can thus
cedures typically involve fully dedicated components be accommodated through the provision of a circuit-
(whereby each class is dedicated a minimal amount of chan- switched service to thevoice sessions and a packet-switched
nel bandwidth) as well as partially shared components service to the data stations. The blocking or delay analysis
(which provide for sharing of a certain amount of channel of the circuit-switched component can be approximated
bandwidth among certain service classes). For related through the use of N, server queueing-system models, such
blocking analysis, we refer to the aforementioned papers as the MIGlN,,lN,, model, when a blocking (blocked-call
presenting analysis for circuit-switching networks, using lost) service i s provided. Such models disregard the details
either infinite-source models (such as [55], [58]) and Erlang's of the cyclic structure (eftectively assuming call arrivals and
loss formula or employing finite-source models and Engset- terminations to be recorded at the end of their correspond-
type equations ([60]-[62]). In [64], blocking performance ing cycles), noting that many times the calllsession holding
analysis i s carried out for an integrated-services circuit- times are much longer than the cycle duration. An exact
switched channel, using finite-source station models and delay (or blocking) analysis which incorporates the micro-
realistic connectivity patterns. As in [62], the behavior of structureof the framecan be carried out by using the results
each service class is characterized in terms of the corre- of the DAlCS-TDMA model developed in [47l. For this pur-
sponding blocking probability components, including the pose, the superstation under investigation is assumed to
circuit-blocking and destination-busy probabilities. It i s also receive the totality of network reservations for circuit allo-
demonstrated in [64], as previously noted in [65], that when cations. This station is allocated N,, slots per each cycle of
wideband and narrowband service types are multiplexed M slots. The delay computed for a reservation message buff-
over a shared wideband circuit-switched communications ered at this station thus serves to exhibit the delay expe-
channel, fluctuations are observed in the blocking perfor- rienced by a circuit-switched station.
mance of the narrowband service, for a fixed total traffic Similarly, when considering the delays experienced by
load, because the fractional traffic load share of the wide- messages transmitted during the packet-switched part of
band service type i s varied. It is also noted that, to guarantee the cycle, the results presented in [43] (as well as other anal-
an acceptable grade-of-service to the wideband service class yses; see previous section) for TDMA schemes can be
as well as reduce the aforementioned fluctuations, it is invoked when fixed-assigned or demand-assigned reser-
advantageous to dedicate an appropriate minimum num- vation TDMA procedures are used by the packet-switched
ber of circuits for allocation to only wideband service con- stations. Thus, for example, a station which is allocated K
nections; the remaining bandwidth can be effectively slots within the packet-switched part of each cycle i s expe-
shared among the various service types. riencing the same delay performance as a station supported
In reducing the transit delay of information along a cir- under a PS-TDMA schemewhich is allocated Kslots per each
cuit-switched multihop lightwave network, it can beadvan- cycle of M slots. A similar approach i s used when packet-
tageoustoallocatethetime slotswithin each cycle(overthe switched stations are controlled by a DAlPS-TDMA MAC
TDM links constituting the connection path) so that no procedure during their dedicated cycle portion.
store-and-forward (time-slot interchange) delays are U nder a movable-bou ndary hy brid-switc h ing MAC sys-
incurred within the network. In this manner, information tem,the boundaryisdynamicallydetermined for each cycle,
transmitted across the circuit i s guaranteed a transmission based upon the current demand for communications sup-
slot to be available immediately upon arrival at each inter- port. In an integrated CS-voicelPS-data system, priority is
mediate node. As a result, optical switches can be used, often provided to voice connections, with a certain mini-
eliminating excess delays created by the slower electronic mum number of data slots reserved for PS-data transmis-
components. Such a slot assignment procedure has been sions. In addition, each portion of the cycle not occupied
investigated in [661. by CS-voice connections can be allocated for packet trans-
Integrated-services MAC systems that employ a hybrid missions. In considering the performance analysis of such
of circuit-switched and packet-switched procedures have aMACpolicy,wenotethefollowing. LetN,denotethe num-
been regularly employed by and planned for many high- ber of slots occupied by active CS connections during the
speed local and metropolitan area networks. We consider tth cycle. (For example, a slot can accommodate L voice con-
in the following such systems that operate on a time-shar- nections; e.g., in the IEEE 802.6 DQDB, L = 64, under one
ing demand-assigned reservation (DAlTDMA) basis. To of the currently stated configurations.) Then, M - N, slots
accommodate both circuit-switched and packet-switched are made available within the tth cycle for the transmission
services, the time cycle i s divided into two parts. The first of PS packets. The blocking (or delay) performance of the
part i s allocated for the support of circuit-switched con- CS component i s carried out by following the approaches
nections while the second part i s used for the transmission noted in the preceding paragraphs since CS connections
of packets belonging to carried packet-switched sessions. are provided priority. This analysis can also provide the sta-
In relation to the establishment of the boundary between tistics of the CS connection-size process N = {N,, t 2 I}.
the cycle's circuit-switched and packet-switched parts, we The performance of the PS component clearly depends
distinguish two categories of schemes: fixed boundary and upon the statistics of N. As shown in [67], when considering
movable boundary. a channel multiplexing configuration, with total PS-packet
Under a fixed-boundary scheme, the cycle is divided per- arrival rate equal to Xps (packetslslot) and packet transmis-
manently (or for a specified period of time) into two fixed sion time equal to a single slot duration, the stability con-
parts. The first part, consisting of N,, slotslcycle, is used for dition for the movable-boundary multiplexor i s given by
RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 191
~
highly dominated by the deterministic packet interarrival Polling systems can be distinguished from each other in
times occurring during voice activity bursts. As a result, a number of ways.
while Poisson-based models can provide acceptable Buffering: In some systems, stations buffer, at most, one
approximations for traffic streams when an average packet message and do not generate a new message until the buff-
performance i s determined, their use for the calculation of ered message has been transmitted. For example, if a sta-
loss and delay performance for packets belonging to a tion isavocoder, it may not startforminganewvoice packet
stream generated by a single source can be highly inac- until the buffer has been emptied. In other systems, a num-
curate [86]. Performance levels for such single-stream pack- ber of messages can be buffered at one time.
ets can be highly correlated during certain time periods. Type of Service:
More precise analyses can be carried out through the use
Exhaustive service: When polled, a station continues
of models such as those presented in [84] and [87]-[89],
transmitting messages until its buffer is empty.
which use multilayered models to incorporate randomness
Gated service: When polled, a station transmits all
in the generation and termination times of calls and pack-
those messages that were present when the polling
ets. Under such models, the active call population i s itself
message arrived.
random.
Limited service: When polled, a station transmits, at
Multilayer traffic models need to also be used for a more
most, one (or, more generally, at most, k ) messages.
faithful description of many network admitted broadband
Note that there i s no difference between exhaustive,
service streams which are flow controlled at different layers
gated, and limited service when the stations have sin-
of the OS1 model. For example, in [88], randomly arriving
gle message buffers. Also, the performanceof thethree
calls/sessionsare flow-controlled at the session level, so that
disciplines are virtually identical when the probability
only admitted calls can generate packets which are then
of any station having more than one message when
processed by the shared queueing system or, equivalently,
polled is low (for example, if the system has a large
the MAC system. A nested set of multilayered stochastic
number of low usage stations).
process models i s thus required to characterize the traffic
Adaptive service: The number of messages transmitted
processes generated by sources engaged in various broad-
bya polled station isafunction of the station’scurrent
band services, as well as to model superimposed broad-
number of buffered messages and of prescribed sta-
band-ISDN traffic streams, in terms of the underlying sta-
tion and message priority parameters.
tistics characterizing the traffic component at the call/
Messagepriorities: If different types of messages have
session, burst, message, packet, and segment levels.
different priorities, they can be given different levels
of service by polling for low-priority messages only
VIII. AND ANALYSIS
MODELING OF POLLING SYSTEMS when there are no high-priority messages in the sys-
tem, or by using different service rules for different
Polling schemes, like other access control protocols, are service classes.
used to share common communication resources among Delay constraints: In systems where messages have
agroupof stationsor users. Polling schemestaketheir name delay constraints, the length of time that a polled sta-
from the following type of early application: the “polling” tion can spend transmitting during a particular poll
of a group of terminals by a terminal controller (see Fig. 15). can be made to depend upon the length of time since
The terminal controller polls each of the terminals in turn, the last poll. Thus, when the system i s busy and the
checking to see if the terminal has a message to transmit length of times between consecutive polls of a station
to the computer. If so, the terminal i s given permission to increases, the stations are not allowed to transmit as
transmit the message. If not, the controller polls the next much. This can be used to limit the maximum cycle
terminal. time.
We can immediately see many variations on this basic
approach. Wecan eliminatethecontroller and havethe sta- Polling Order:
tions pass a polling message, or token, among themselves
(distributed control.) With some topologies, stations can Circular order: If there are N stations, they are polled
consider periodsof silenceto be implicittokenswhich indi- in the order 1, 2, . . , N, 1, 2, . . . .
1
cate that the station(s) ahead of them in the polling order General service order table: The stations are polled
have nothing to transmit. accordingtoafixed table.Astation can begiven higher
A number of access protocols for high-speed networks priority by listing it more than once per cycle.
have aspects of traditional polling schemes mixed with Random order: After service i s completed at one sta-
aspectsof othertypesof protocols. Wewill distinguish poll- tion, the next station to be polled can be chosen ran-
ing schemes from other multiple-access protocols by con- domly [97].
sideration of the following properties.
RUBlN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 193
The mean cycle time is given by When the system i s stationary, we know that the average
number of messages which arrive at each station during a
c =R + bE[Q] cycle must equal the average number of messages trans-
and the mean message waiting time i s given by mitted by the station during a cycle. The average number
of messages arriving at station iduring a cycle i s simply h,c.
E[W] = ( N - l ) b - l l h + -.NR The average number of messages transmitted by station i
E[Q1 during a cycle is equal to the average dwell time at idivided
3) Flow Analysis for Model 3: In this section we will use by the average message length for station imessages. Set-
simple balance-of-flow arguments (see Kuehn [103]) to cal- ting these two quantities equal, we find
culate the maximum throughput, average cycle time, and
average queue sizes at server arrival instants for model 3
d, = h,cb, = p , ~ i
, = 1, . . . ,N.
under gated, exhaustive, and limited-to-one service. Substituting in (3), we have
We call a polling system “stable” if for positive message N N
lengths and finite arrival rates the average queue sizes are
bounded. Under gated and exhaustive service, the polling
c = c plc + c r,.
r=1 ,=I
system in model 3 will be stable if and only if the total traffic Solving for the average cycle time, we find
intensity, p, is less than one. We assume henceforth that p
N
< 1. t ri
For limited-to-one service, we have to impose additional R
c = i=l
7 - -- (4)
conditions o n each station. In particular, we require that 1- p ‘
each station has, on average, less than one arrival per cycle I-Cp,
i=l
(noting that the mean cycle time is given by (4) below):
Theaverage number of messagesarrivingat station iduring
hi < (1 - p)/R j = 1, 2, . . ,N. a cycle i s thus
In the following, we will assume that the system param-
h,c =
A, R
-
eters satisfy the stability conditions and that the system has
1-P
reached steady state.
Let di be the average dwell time per visit of the server at and the mean dwell time at station i i s
station i.A cycle of the system consists of the sum of the
dwell times at each of the stations plus the sum of the walk
times. The average cycle time i s thus
N N The “intervisit time” at station i i s the time between the
c = c di + c r,.
i=l i=l
(3) server leaving station iat the end of its service, and the serv-
er’s return. Since a cycle (from station i’s point of view) con-
See Fig. 17 for details. sists of the server‘s dwell time at iplus the intervisit time,
C
Fig. 17. Average dwell times and walk times.
RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 195
~ ~-
approximations for asymmetric systems with exhaustive, performance of such priority schemes. Results can be very
gated, or limited-to-one service. dependent upon the specific assumptions of the model
Everitt [I201 used the pseudo-conservation lawto develop about the traffic characteristics and the buffering ability of
a simple approximation for the mean waiting time in an the stations. Also, the tractabilityof theanalysis can depend
asymmetric polling system with exhaustive or gated ser- greatly upon fine details of the protocol.
vice. He uses the approximating assumption that the sec- As an example, we will present results of an analysis by
ond moments of the cycle time are the same for all of the Tsai and Rubin [I251 of a scheme which i s quite similar to
N stations (we knowthatthe first momentsare, in fact, iden- atoken ring.Anapproximateanalysisof asimilar model can
tical.) This assumption is reasonablyvalid when the system be found in [126]. A model which is similar to a token bus
i s not too asymmetric or when the traffic rates are low. The with priorities is analyzed in [1271. A scheme using general
average mean waiting time at station i i s then given by station priorities i s analyzed in [128], while a scheme with
HOLP station priorities and constant walk times is analyzed
in [129].
TbeMode1:We use a model where the high-priority traffic
follows model 2 while the low priority traffic follows model
3. Specifically, weconsider a symmetric polling system with
N stations and two message classes: class 1 (high priority)
and class 2 (low priority.) The walk time from one station
i
N \
to the next i s aconstant r. The length of a high priority mes-
(1 - P) ,
sage is a constant b l , and the length of a low priority mes-
sage i s a constantb2.Each station has asingle message buffer
-I
for high-priority messages. Following the transmission of
a high-priority message from a station, the length of time
where " k " takes the value for gated service and ' I - "
' I + "
until the next arrival of a high-priority message at the station
for exhaustive service. For an asymmetric system operating
isexponentiallydistributed with mean l/X1. Each station also
under high traffic conditions, other approximating tech-
has an infinite buffer for low-priority messages, which arrive
niques have been developed (e.g., [121]).
according to a Poisson process with rate h2.
Boxma and Meister ([121]) developed an approximation
The Protocol: The server (or token) visits the stations cy-
for limited-to-one service using the same assumptions as
clicly. The server i s in either a high-priority or low-priority
those of tveritt. The following result i s then obtained:
state.
I - P + P l , 1- P Suppose the server i s in the low-priority state when it
E[W,I = ' " ' N
reaches a station. Then
I1 - -p p- --X X,R
R N
(1 - P) P c
+ , = 1 oo ff
I = I - if the station has a waiting high-priority message, it
transmits the message and changes the server to the
high-priority state; the server then walks to the next
station;
* if the station does not have a high-priority message,
but does have waiting low-priority messages, it trans-
1 mits one message and changes the server to the high-
priority state; the server then walks to the next station;
(5)
if the station has no messages waiting, the server con-
tinues on to the next station and remains in the low-
5) Delay Constraints a n d Priorities: Many of the planned
priority state.
high-speed LAN's and MAN'Smust support real-time traffic
which has tight limits on transmission delays. Examples of Suppose the server i s in the high-priority state when it
real-time traffic include digitized voice and network man- reaches a station. Then
agement and control information. Various polling schemes if the station has a waiting high-priority message, it
have been developed which incorporate delay constraints
transmits the message; the server then walks to the
and different priority levelsfor different typesoftraffic. Lirn- next station, remaining in the high-priority state;
ited service schemes guarantee that stations receive per-
if the station has no waiting high-priority message and
mission to transmit within a fixed period o l time. Timed-
the server has visited all the stations without finding
token protocols such as the IEEE 802.4 token bus standard
any high-priority messages, then the server i s switched
[I221 and the FDDI protocol [I231 guarantee maximum to the low-priority state; if the station has awaiting low-
delays to stations lor various message classes by limiting
priority message, and if it has not transmitted a low-
the station holdingtimesaccordingtothecurrent cycletime
priority message since the last time the server arrived
and the highest priority waiting message. The IEEE 802.5
in a low-priority state, it can transmit a single low-prior-
token ring standard [I241 establishes message priority
ity message; the server then continues to the next sta-
classes and allows stations to transmit only messages whose
tion;
priority level i s at least as high as the current token priority otherwise, the server continues to the next station,
level. The token priority is raised and lowered by having
remaining in the high-priority state.
stations place requests in the headers of the messages or
tokens as they pass by. The Analysis: We define a high-priority busy period as that
It i s very difficult to analyze the throughput and delay lasting from the instant the server enters the high-priority
- _ _ ~ _ _ _ - ~~
state to the instant the server returns to the low-priority maximum message delay. For interactive data, we are most
state. There are two types of high-priority busy periods, interested in knowing the mean (and higher moments) of
which correspond to the two times when the server can the message delay as a function of the offered traffic.
change from the low-priority state to the high-priority state. If the number of voice sources changes slowly in com-
parison to the variations in asynchronous traffic, a quasi-
1) A type-I high-priority busy period begins when the stationary approach can be used to analyze the delay of the
server i s in the low-priority state and it reaches a sta-
asynchronous traffic ([70], [67], and [34]). That is, a level of
tion.
synchronous traffic is fixed, and the resulting delay of the
If the station has a waiting high-priority message, the
asynchronous traffic i s calculated (a constant level of syn-
server immediately switches to the high-priority state
chronous traffic can simply be included in the overhead,
and transmits the station’s message. The server
as far as the asynchronous traffic i s concerned). The results
remains in the high-priority state and polls the sta- for various levels of synchronous traffic are combined by
tions for high-priority messages. The server remains weighting them by the probability distribution for the syn-
in the high-priority state until on some cycle ending
chronous traffic.
with a visit to station i, none of the stations have a
I) FDDI:
waiting high-priority message. It then switches to the
low-priority state, and the type-I high-priority busy TheProtoco1:The FDDl i s a proposed standard for a 100
period ends. The server can then transmit a waiting Mbls token ring using fiber optic cabling [123], [130]. The
low-priority message from station i, if there are any. stations are arranged in a ring and they control access to
If the station does not have a waiting high-priority the channel by passing a token around the ring. The station
message, we take the length of the high-priority busy holding the token may transmit messages in accordance
period to be zero. with the token-holding rules discussed in the following.
We let GI be a random variable with the same dis- Oncea station has finished transmitting messages, it imme-
tribution as the length of a type-I busy period. diately sends the token to the next station. (See also section
2) A type-2 high-priority busy period begins at the end
V.)
of a low-priority message transmission (by, for exam-
When the ring is initialized, the stations negotiate a target
ple, station i.) The server switches to high priority and
token rotation time (TTRT). The protocol guarantees that
polls for high-priority messages. The server remains
theaveragetoken rotation time(cycle time)will be less than
in the high-priority state until on some cycle ending
TTRTand that the maximum token rotation time will be less
with a visit to station i,none of the stations have a
than 2.TTRT. Thus stations with tight delay constraints will
waiting high-priority message. It then switches to the
request a small TTRT. The smallest requested TTRT is
low-priority state, and the type-2-high-priority busy
selected and is used by all of the stations. We will see in the
period ends. The server then proceeds to the next
proceeding that the choice of TTRT greatly affects the uti-
station. lization of the ring.
We let G2 be a random variable with the same dis-
The FDDI protocol defines two categories of traffic: syn-
tribution as the length of a type-2 busy period.
chronous and asynchronous. Synchronous traffic has very
Rubin and Tsai [I251show that the delay for the low-prior- tight time constraints. Whenever a station receives a token,
ity messages i s the same as in a single-priority symmetric it i s allowed to transmit any queued synchronous traffic.
polling system with limited-to-one service, walk times equal Higher levels of the protocol grant permission to transmit
+ +
to r G 7 ,and service times equal to b2 C2.Thus we can synchronous messages. However, in any cycle, the total
use (5) to calculate the mean waiting time for class-two mes- amount of time that i s devoted to synchronous messages
sages once we know the first two moments of GI and G2. must be less than TTRT
An exact solution for those moments requires the solution Asynchronous traffic i s transmitted as time permits. Each
of several sets of linear equations, each ~ o n t a i n i n g 2 ~ e q u a - station has atoken-rotation timer and a token-holding timer;
tions. Tsai and Rubin present approximate solutions which theseareused tocontrol theamount of timethat thestation
reduce the problem to solving sets of N +
1 linear equa- is allowed to transmit asynchronous messages. The token-
tions. rotation timer i s used to measure the time between suc-
Straightforward consideration of the protocol shows that cessive receptions of the token. When a station receives the
the maximum waiting time for a high-priority message i s token, it checks its token-rotation timer. If the time elapsed
equal to exceeds the TTRT, the station is not allowed to transmit any
asynchronous traffic. Otherwise, the token-holding timer
Wyax = Nr + (N - l ) b l + b2, i s loaded with the value of the token-rotation timer, and the
station begins transmitting asynchronous messages. After
The mean delay for high-prioritymessages can be derived
each transmission, it checks to see whether the token-hold-
in a manner similar to that for low-priority messages.
ing time threshold has been crossed. Once it has been, the
token is passed to the next station. Up to eight message
B. Applications
priority levels can be established by using different thresh-
Wewill now consider several high-speed networkswhich old values for different message types. The maximum
use polling schemes tocontrol access. All of these networks threshold value is TTRT [130].
aredesigned to supporta mixof traffic types: digitized voice, Maximum throughput: We will now consider the max-
interactive data, and so on. For sources such as digitized imum ring utilization as a function of the TTRT and token-
voice, we are most concerned with knowing the number holding thresholds.
of users which can be supported by the network, and the First, suppose that all the traffic i s from a single asyn-
RUBlN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 197
-~
chronous priority level. Then the maximum utilization i s The stations at the head and tail of the buses perform spe-
bounded above by [130]: cial functions. The two buses operate independently(except
for piggybacking control information, as described in the
TTRT - R
following), so we can focus upon one bus. Consider the bus
TRT
with station 1 at the head end and station N at the tail. Sta-
where R is the total walk time per cycle (ring latency.) tion 1 generates message frames. Each message frame con-
Now suppose that there are m priority levels of asyn- sists of a header and a fixed-length data field. The stations
chronous traffic, and that exactly NI stations have priority all generate corresponding fixed-length messages. The
level i messages ready to transmit during each cycle. Let PI header contains addressing fields plus a bit to indicate
be the token holding threshold for priority level i. whether the frame is in use, a bit to indicate whether a par-
It can be shown [I301 that the lowest priority message that ticular frame starts a new cycle, and a bit which is used to
will ever be transmitted under these conditions belongs to start new cycles on the other bus.
the class "low," which is the lowest priority level satisfying The frames are organized into cycles. Stations are allowed
rn to transmit, at most, one message per cycle. Only stations
(N - NIow + 1) PI - C
low + 1
[NI . PI] - R > 0 which have a message ready at the beginning of a cycle are
allowed to transmit during the cycle; newly arriving mes-
where N = NI is the total number of stations trans- sages have to wait until the next cycle.
mitting. At the completion of one cycle (see the preceding) the
Dykeman and Bux [I301 show that the normalized head station starts a new cycle by setting the "start cycle"
throughput of priority i messages i s given by bit in the header of the next outgoing frame. Stations that
have a ready message when they see the start cycle bit are
allowed to put their message into the first empty frame they
rn
see. They mark the frame as busy so that no downstream
( N + I ) * R + c
/ = low
yl station will overwrite their message. Once an empty slot
reaches the tail station (station N ) , all eligible stations have
where transmitted and it i s time to start a new cycle. Note that sta-
tion N i s the head station on theother bus. In the next frame
(N - NI,, + 1) . PI that it generates on the other bus, it sets the bit to indicate
that the cycle on this bus has ended. When the frame
reaches station 1, station 1 starts a new cycle.
low + 1 Maximum throughput: The overhead for the Fasnet
scheme consists of the frame headers for slots containing
message transmissions, plus the idle slots at the end of each
cycle. We normalize parameters so that the transmission
time for a slot equals 1. Let a be the normalized end-to-end
propagation delay, and let h be the normalized length of
(- C/ = low yl + PI - R I i = low + 1, , m. a message header. There are an integral number of slots
between the end of one cycle and the start of the next, and
Delay:As we just stated, the maximum cycle time in the on average, the normalized length of this period i s [I391
FDDl ring is2. TRT. Becauseofthecomplexityofthetimed r2al + I.
token protocol, studies of the average delay performance
of FDDl for asychronous traffic have used simulation rather The maximum throughput (per bus) for Fasnet i s thus
than an analytical approach [131]-[134]. A model such as the approximately [I391
one presented in section VIII-A1 could be used to approx-
1
imate the performance of FDDI.
2) Fasnet: Fasnet was proposed by Limb and Flores [135], I +h + ( r 2 a l + I)/N'
[136]. It has been incorporated in the METROCORETM[137], Delay:The maximum message delay i s two cycles [139]:
[I381 metropolitan area network design.
The Protocol: Fasnet i s designed for a system with two ( 2 -~ I)(I + h) + r2al + I.
unidirectional broadcast buses which connect the stations
Tobagi and Fine [I401 analyze the delay characteristics of
in opposite directions (see Fig. 18). Stations wishing to
Fasnet for asynchronous traffic under the message stream
transmit messages choose the bus that places them
assumptionsof model 2. They considerthe numberof back-
upstream of the message destination.
logged users at the start of each round, which forms an
embedded Markov chain. To calculate the mean waiting
Channel A times, they derive the transition matrix for the embedded
chain and then use it to calculate the stationary distribution
of the number of stations with ready messages at the start
of a round, call it
n = (To, .. * ,TN).
Channel B Letting s be the expected throughput and wthe expected
Fig. 18. Fasnet topology. waiting time of an arbitrary packet,
RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 199
~~
upstream stations are passing its transmit tap. If so, it defers, IEEE 802.6 Working Group document no. 802.8-88/61, July
giving preference to the upstream station. Otherwise, the 1988.
station transmits its message. If the stations use passive taps, [8] M. A. Rodrigues, ”A fair MAC access scheme,” IEEE 802.6
Working Group document no. 802.8-88/62, July 1988.
messages from upstream stations whose transmissions [9] G. Estes, R. Klessig, and D. Spears, ”ATM cell structure pro-
reach the station after it starts transmittingwill collide with posal,” TIS1.1 Technical Subcommittee Working Group
it. Furthermore, the message will collide with those of Document, Broadband Aspects of ISDN, document no.
downstream stations which are in the middle of a trans- TlS1.1/88-419, Oct. 1988.
mission when it reaches their transmit tap. If the message [IO] I€€€ Network, Special Issue on Network Interconnection,
vol. 2, no. 1, Jan. 1988.
collides with another, it i s retransmitted after a random [Ill N. F. Maxemchuck, “Regular mesh topologies in local and
delay. Various persistence strategies can be used for mes- metropolitan area networks,“ AT&T Tech. I., vol. 64, no. 7,
sages which are delayed because of ongoing upstream pp. 1659-1685, Sept. 1985.
transmissions. [I21 “Metropolitan area network generic framework system
requirements in support of switched multimegabit dataser-
If the stations use active taps, messages from upstream vice,” Bellcore Technical Advisory Report, TA-TSY-000772,
stations will be shifted off the channel, and the transmis- Feb. 1988.
sion of the most downstream station will succeed. When 131 I. Cidon, I. S. Copal, and H. Melesis, “PARIS: An approach
active taps are used, the priority given to upstream stations to private integrated networks,” in Proc. ICC‘87, Seattle, WA,
June1987; and I. Cidon and I. Gopal, “PARIS: An approach
in starting transmissions balances with the priority given to
to integrated high-speed private networks,” IBM Thomas J.
downstream stations in collisions, and results in a fair pro- Watson Research Center, technical report, 1988.
tocol. A I-persistent retry strategy for delayed messageswill 141 M. B. Pursley, “Frequency-hop transmission for satellite
result in the most downstream sourcewith a ready message packet switching and terrestrial packet radio networks,”/€€€
succeeding. Trans. Inform. Theory, vol. 32, no. 5, Sept. 1986.
151 M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt,
A CSMA-CD scheme can be implemented by having sta- Spread Spectrum Communications, vols. 1-111, Rockville,
tions also listen to the signal that reaches their transmit taps MD: Computer Science Press, 1985.
from upstream while they are transmitting. A station does 161 S. Resheff and I. Rubin, “Delay-throughput performance of
not transmit if an upstream station is transmitting, and stops asynchronous communications nets using spread-spec-
trum error-corrected signals,” in Proc. 7987 Conf. on Infor-
transmitting if an upstream station starts. When a l-per-
mation Sciences and Systems, The Johns Hopkins Univer-
sistent retry strategy i s used trains of packets are formed, sity, Mar. 1987.
much as in Expressnet, but there i s no cyclic structure. Max- 171 N. Abramson, “The ALOHA system-Another alternative for
emchuk analyzes the delay-throughput characteristics of computer communications,’’ in Computer Communica-
these schemes. We refer the reader to his paper [I411 for tions Networks, N. Abramson and F. Kuo, Eds. Englewood
Cliffs. NI: Prentice Hall. 1973.
the analysis. I ,
RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 201
__
-
Modeling and Analysis. Reading, MA: Addison-Wesley, [I031 P. Kuehn, “Multiqueue systems with nonexhaustive cyclic
1987. service,” BellSyst. Tech. I. , 58, pp. 671-698, Mar. 1979.
vol.
[79] K. Sriram, P. K.Varshney,and J. G. Shanthikumar,”Discrete- [I041 L. D. Moraes and I. Rubin, “On the performance of gated
time analysis of integrated voice/data multiplexers with and and exhaustive polling under unbalanced traffic,” in Proc.
without speech activity detectors,” /€E€ J. Select. Areas Globecom ’83, San Diego, CA, Nov. 1983.
Commun., vol. SAC-I, no. 6, pp. 1124-1132, Dec. 1983. [I051 S. Fuhrmann, “A note on the M/GlI queue with server vaca-
[80] P. Zafiropoulo, “Flexible multiplexing for network sup- tions,” Operat. Res., vol. 32, pp. 1368-1373, Nov./Dec. 1984.
porting line-switched and packet-switched data traffic,” in [I061 H. Levy and L. Kleinrock, “A queue with starter and aqueue
PrOC. ICCC, 1974, pp. 517-523. with vacations: Delay analysis by decomposition,” Operat.
[81] R. jain and S. A. Routhier, “Packet trains-Measurement and Res., vol. 34, pp. 426-436, MayIJune 1986.
a new model for computer network traffic,” /€€€I.Selected [IO71 0. Boxmaand W. Groenendijk, “Pseudo-conservation laws
Areas Commun., vol. 4, pp. 986-995, 1986. in cyclic-service systems,” Tech. Rep. OS-R8606, Centre for
[82] K. Sriram and W. Whitt, “Characterizing superposition Mathematics and Computer Science, Amsterdam, 1986;also
arrival processesin packet multiplexers for voice and data,” in Journal of Applied Probability, vol. 24,1987.
/€E€/. Selected Areas Commun., vol. 4, pp. 833-846, 1986. [I081 0. Boxma and B. Meister, “Waiting times in multi-queue
[83] K. W. Fendick, V. R. Saksena, and W. Whitt, ”Dependence systems with cyclic service,” Perform. Eva/., vol. 7, pp. 59-
in packet queues: A multi-class batch-Poisson model,” in 70, Feb. 1987; also, IBM Research Report RZ1348, 1984.
Proc. of ITC-12, Paper 1.48.5, 1988. [I091 0. Boxma and W. Croenendijk, “Waiting times in discrete-
1841 1. Filipiak, “Accuracy of traffic modeling in fast packet time cyclic-service systems,” /€€€ Trans. Commun., vol.
switching,” in Proc. GLOBECOM’88, Ft. Lauderdale, FL, Nov. COM-36, pp. 164-170, Feb. 1988.
1988. [I101 B. Doshi, “A note on stochastic decomposition in a GlIGll
[85] H. Heffesand D. M. Lucantoni, “A Markov modulated char- queue with vacation or set-up times,”]. Appl. Probabil., vol.
acterization of packetized voice and data traffic and related 22, pp. 419-428, 1985.
statistical multiplexer performance,” / € € E J. Selected Areas [ I l l ] B. Doshi, “Queueing systems with vacations-A survey,”
Commun., vol. 4, pp. 856-868, 1986. Queueing Syst., vol. 1, pp. 29-66, June1986.
1861 V. Ramaswami, “Traffic performance modeling for packet [I121 S. Fuhrmann, “Symmetric queues served in cyclic order,”
communication: Whence, where and whither,” Keynote Operat. Res. Lett., vol. 4, pp. 139-144, Oct. 1985.
Address, Third Australian Teletraffic Seminar, Nov. 1988. [I131 S. Fuhrmann and R. B. Cooper, “Stochastic decompositions
[87] V. Ramaswami and G. Latouich, ”Modeling packet arrivals in the MIGII queue with generalized vacations,” Operat.
from asynchronous input lines,” in Proc. of ITC-72, Paper Res., vol. 33, pp. 1117-1129, Sept./Oct. 1985.
4.1A.5, 1988. 11141 S. Fuhrmann, “Inequalities for cyclic service systems with
[88] S. Katz and I. Rubin, ”Session admission control for a mul- limited service disciplines,” l€€€/l€lC€Global Telecommun.
tiple-access communication channel,” in Proc. l€€€ Conf. (Tokyo, Japan, Nov. 1987), pp. 182-186.
INFOCOM’87, San Francisco, CA, Mar. 1987. [I151 S. Fuhrmann and Y. Wang, “Analysis of cyclic service sys-
[89] A. Descloux, ”Contention probabilities in packet commu- tems with limited service: Bounds and approximations,”
nication networks with strung input processes,” in Proc. of Performance Evaluation, vol. 9, no. 1, pp. 35-54, Nov. 1988.
ITC-12, Paper 5.1A.1, 1988. [I161 J. G. Shanthikumar, ”On stochastic decomposition in
[go] R. R.Anderson,G.J. Foschini,and B.Gopinath,”Aqueueing MIGII type queues with generalized server vacations,”
model for a hybrid data multiplexer,” BellSyst. Tech. I. ,
pp. Operat. Res., vol. 36, pp. 566-569, July/Aug. 1988.
279-301,1979. [117] S. Fuhrmann and R. Cooper, “Application of decomposition
I911 M. Hofri and 2. Rosberg, “Packet delay under the golden principle in M/G/l vacation model to two continuum cyclic
ration weighted TDM policy in a multiple access channel,” queueing models-especially token-ring LAN’s,’’ AT&T
/€E€ Trans. Inform. Theory, vol. 33, no. 3, pp. 341-349,1987. Techn. I., vol. 64, pp. 1091-1099, May/June1985.
1921 R. Rom and M. Sidi, “Message delay distribution in gen- [I181 M. Ferguson and Y. Aminetzah, “Exact results for nonsym-
eralized time division multiple access (TDMA),” Technical metric token ring systems,” / € E € Trans. Commun., vol. COM-
Report, Department of Electrical Engineering, Technion, 33, pp. 223-231, Mar. 1985.
Israel, EE Pub. no. 699, Nov. 1988. [I191 K. S. Watson, “Performance evaluation of cyclic service
[93] T. Y. Yan, “On the delay analysis of a finite capacity TDMA strategies-A survey,” in Performance’84. New York: North
channel,” /€€€Trans.Commun., vol. 30, pp. 1937-1942,1982, Holland, 1984, pp. 521-533.
[94] j. Filipiak, ”Access protection for fairness in a distributed [I201 D. Everitt, “Simple approximations for token rings,” / € E €
queue dual bus metropolitan area network,” in Proc. lnt. Trans. Commun., vol. COM-34, pp. 719-721, July1986.
Conf. on Communications, Boston, MA, June1989. 1211 0. Boxma and B. Meister, ”Waiting-time approximations for
[95] P. Potter and M. Zukerman, “Cyclic request control for pro- cyclic-service systems with switch-over times,” Report OS-
vision of guaranteed bandwidth within the DQDB frame- R8510, Centre for Mathematics and Computer Science,
work,”Technical Report, Telecomm Australia ResearchLab- Amsterdam, Sept. 1985.
oratories, Clyton, Vic., Australia, 1989. 1221 Draft International Standard for Token-PassingBus Access
[96] I. Cidon and Y. Ofek, “METARING-A ring with fairness and Method, ANSlllEEE Standard 802.4-1985.
spatial reuse,” Research Report, IBM T. J.Watson Research 1231 F. E. Ross, “FDDI-A tutorial,“ / € E € Commun. Mag., vol. 24,
Center, 1989. pp. 10-17, May 1986.
[97] L. Kleinrock and H. Levy, “The analysis of random polling 124) /SO Draft Proposal for Token Ring Access Method, ANSI/
systems,” Operat. Res., vol. 36, pp. 716-732, July 1985. IEEE Standard 802.5-1985.
[98] C. Mack, T. Murphy, and N. Webb, “The efficiency of N 1251 Z. Tsai and I. Rubin, “Performance of token schemes sup-
machines unidirectionally patrolled byone operative when porting delay-constrained priority traffic streams,” in Proc.
walking time and repair times are constants,”]. Royalstatis. / € € E INFOCOM, 1989.
Soc., Series B, vol. 19, no. 1, pp. 166-172, 1957. [I261 J. E. Baker, “Multiple access communications with priori-
[99] M. Scholl and D. Potier, “Finite and infinite source models tized service,” Ph.D. thesis, University of California, Los
for communication systemsunder polling,”Tech. Rep.308, Angeles, 1986.
IRlA Rapport de Recherche, May 1978. [I271 I. Rubin and Z. Tsai, “Performance analysis for a message
[IOO] A. Kaye, “Analysis of a distributed control loop for data priority-based polling scheme,” in Proc. /€€€-/CC88, Phil-
transmission,” in Proc. Symp. on Computer-Comrnunica- adelphia, PA, June 1988.
tions Networks and Teletraffic, Polytechnic Institute of [I281 J. E. Bakerand I. Rubin,“Pollingwithageneral serviceorder
Brooklyn, Apr. 1972, pp. 47-58. table,” /€€E Trans. Commun., vol. COM-35, pp. 283-288, Mar.
[I011 H. Takagi, Analysis of Polling Systems. Cambridge, MA: 1987; also presented at Globecom ’86 in Houston, TX, Nov.
MIT Press, 1986. 1986.
[I021 F. A. Tobagi and M. Fine, “Performance of unidirectional [I291 I. Rubin and J. E. Baker, ”Performance analysis for a ter-
broadcast local area networks: Expressnetand Fasnet,” / E € € minal-priority contentionless access algorithm for multiple-
J. Selected Areas Commun., vol. SAC-I, pp. 913-926, Nov. access communications,” /€€€ Trans. Commun., vol. COM-
1983. 34, pp. 569-575, June1986.
RUBIN AND BAKER: MEDIA ACCESS CONTROL FOR HIGH-SPEED COMMUNICATIONS NETWORKS 203