This Article 
 Bibliographic References 
 Add to: 
Transparent (Cut-Through) Bridging of CSMA/CD Networks: Performance Analysis and Implementation
February 1994 (vol. 43 no. 2)
pp. 247-253

The increasing popularity of local area networks (LANs) and the limitations of a single LAN (on its geographical coverage, information-carrying capacity, and number of stations) have triggered tremendous interest in the study and implementation of interconnected LANs. The authors address the problem of interconnecting the widely deployed CSMA/CD LANs (or LAN segments) via a transparent bridge. A transparent bridge is so called because it "learns" about the network structure and organization during its operation, i.e., it learns about the location of the network stations relative to the bridge in order to do the forwarding of frames selectively; also, the stations need not be aware of the presence of the bridge. The authors make two important contributions. First, they present an approximate analytical model of a transparent CSMA/CD bridge which can be either of the normal store-and-forward type or of the novel cut-through variety (introduced by Kwok and Mukherjee). Using the analytical model, which is also verified via simulation, the performance of the cut-through bridge is compared with (and found to be superior than) that of the normal bridge. Secondly they present the design of a cut-through bridge which can be easily implemented using off-the-shelf components.

[1] C. Kwok and B. Mukherjee, "Cut-through bridging for CSMA/CD local area networks," inProc. IEEE Int. Conf. Commun. '89, Boston, MA, June 1989.
[2] P. E. Green, Jr., Ed.,Network Interconnection and Protocol Conversion. New York: IEEE Press, 1988.
[3] IEEE J. Select. Areas Commun., Special Issue on Interconnection of Local Area Networks, vol. SAC-5, Dec. 1987.
[4] IEEE Network Mag., Special Issue on Network Interconnection, vol. 2, Jan. 1988.
[5] IEEE, "Carrier sense multiple access with collision detection (CSMA/CD) access method," Amer. Nat. Standards ANSI/IEEE Std. 802.3, 1985.
[6] IEEE, "Token-passing bus access method," Amer. Nat. Standards ANSI/IEEE Std. 802.4, 1985.
[7] IEEE, "Token ring access method," Amer. Nat. Standards ANSI/IEEE Std. 802.5, 1985.
[8] F. Backes, "Transparent bridges for interconnection of IEEE 802 LANS,"IEEE Network Mag., vol. 2, pp. 5-9, Jan. 1988.
[9] R. C. Dixon and D. A. Pitt, "Addressing, bridging and source routing,"IEEE Network Mag., vol. 2, pp. 25-32, Jan. 1988.
[10] D. A. Pitt and J. L. Winkler, "Table-free bridging,"IEEE J. Select. Areas Commun., vol. SAC-5, pp. 1454-1462, Dec. 1987.
[11] C. Kwok, "Bridging techniques for CSMA/CD networks-Design, analysis, and implementation," M.S. thesis, Div. Comput. Sci.. Univ. California, Davis, Feb. 1989.
[12] G. M. Exley and L. Merakos, "Throughput-delay performance of interconnected CSMA local area networks,"IEEE J. Select. Areas Commun., vol. SAC-5, pp. 1380-1390, Dec. 1987.
[13] L. Merakos. G. M. Exley, and C. Bisdikian, "Interconnection of CSMA local area networks: The frequency division approach,"IEEE Trans. Commun., vol. COM-35, pp. 730-738, July 1987.
[14] T. D. Todd, "An access control protocol using instantaneous bandwidth reconfiguration,"Comput. Networks and ISDN Syst., vol. 12, pp. 99-106, 1987.
[15] C. C. Ko, W. C. Wong, and K. M. Lye, "Performance of CSMA/CD networks connected by bridges," inProc. IEEE Int. Conf. Commun. '88, Philadelphia, PA, June 1988, pp. 119-123.
[16] D. R. Boggs, J. C. Mogul, and C. A. Kent, "Measured capacity of an Ethernet; Myths and reality," inProc. ACM Data Commun. Symp., Stanford, CA, Aug. 1988.
[17] J. F. Shoch and J. A. Hupp, "Measured performance of an Ethernet local area network,"Commun. ACM, vol. 23, no. 12, pp. 711-721, 1980.

Index Terms:
carrier sense multiple access; local area networks; performance evaluation; CSMA/CD networks; LANs; local area networks; transparent bridge; performance analysis; transparent CSMA/CD bridge; cut-through bridge.
C.K. Kwok, B. Mukherjee, "Transparent (Cut-Through) Bridging of CSMA/CD Networks: Performance Analysis and Implementation," IEEE Transactions on Computers, vol. 43, no. 2, pp. 247-253, Feb. 1994, doi:10.1109/12.262133
Usage of this product signifies your acceptance of the Terms of Use.