This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Guaranteeing Synchronous Message Deadlines with the Timed Token Medium Access Control Protocol
March 1994 (vol. 43 no. 3)
pp. 327-339

We study the problem of guaranteeing synchronous message deadlines in token ring networks where the timed token medium access control protocol is employed. Synchronous bandwidth, defined as the maximum time for which a node can transmit its synchronous messages every time it receives the token, is a key parameter in the control of synchronous message transmission. To ensure the transmission of synchronous messages before their deadlines, synchronous capacities must be properly allocated to individual nodes. We address the issue of appropriate allocation of the synchronous capacities. Several synchronous bandwidth allocation schemes are analyzed in terms of their ability to satisfy deadline constraints of synchronous messages. We show that an inappropriate allocation of the synchronous capacities could cause message deadlines to be missed, even if the synchronous traffic is extremely low. We propose a scheme, called the normalized proportional allocation scheme, which can guarantee the synchronous message deadlines for synchronous traffic of up to 33% of available utilization.

[1] G. Agrawal, "Real-time comunication with FDDI networks," Ph.D. Dissertation, Comput. Sci. Dept., Texas A&M Univ., in preparation.
[2] G. Agrawal, B. Chen, W. Zhao and S. Davari, "Guaranteeing synchronous message deadlines with timed token medium access control protocol," Tech. Rep. 92-006, Comput. Sci. Dept., Texas A&M Univ., Apr. 1992.
[3] FDDI Token ring media access control (MAC). ANSI Standard X3.139, 1987.
[4] FDDI Token ring station management, draft proposed--ANSI Standard X3T9.5 rev. 5, May 10, 1989.
[5] L.N. Bhuyan, D. Ghosal, and Q. Yang, "Approximate analysis of single and multiple ring networks,"IEEE Trans. Comput., vol. 38, no. 7, pp. 1027-1040, July 1989.
[6] K. Chae and A. A. Nilsson, "Performance evaluation of FDDI network and interconnected heterogeneous networks," inProc. IEEE Conf. Local Comput. Net., Minneapolis MN, Sept. 30-Oct. 3, 1990, pp. 75-83.
[7] B. Chen, G. Agrawal, and W. Zhao, "Properties of the timed token protocol," Tech. Rep. 92-030, Comput. Sci. Dept., Texas A&M Univ., Oct. 1992.
[8] M. D. Cohn, "A network architecture for advanced aircraft," inProc. IEEE Conf. Local Comput. Net., Minneapolis MN, Oct. 10-12, 1989, pp. 358-364.
[9] S. Davari and S. Dhall, "'An on-line algorithm for real-time tasks allocation," inProc. IEEE Real-Time Syst. Symp., Dec. 1986, pp. 194-200.
[10] S. Davari and W. Zhao, "RMS aids real-time scheduling,"RICIS Rev., vol. 3, no. 1, 1991.
[11] D. Dykeman and W. Bux, "Analysis and tuning of the FDDI media access control protocol,"IEEE J. Select. Areas Commun., vol. 6, no. 6, pp. 997-1010, July 1988.
[12] D. T. Green and D. T. Marlow, "SAFENET--A LAN for navy mission critical systems," inProc. 14th Conf. on Local Comput. Net., Minneapolis, MN, Oct. 1989, pp. 340-346.
[13] R.M. Grow, "A timed token protocol for local area networks," inProc. Electro/82, Token Access Protocols, May 1982.
[14] E. Hotard, "FDDI concentrator design issues," inProc. IEEE Conf. Local Comput. Net., Minneapolis MN, Sept. 30-Oct. 3, 1990, pp. 388-394.
[15] IEEE/ANSI Standard 802.4--1985 "Token passing bus access method and physical layer specifications,"IEEE, New York, 1985.
[16] V. Iyer and S. P. Joshi, "New standards for local networks push upper limits for lightwave data,"Data Commun., pp. 127-138, July 1984.
[17] V. Iyer and S. P. Joshi, "FDDI's 100 M-bps protocol improves on 802.5 Spec's 4-M-bps limit,"Elect. Design News. pp. 151-160, May 2, 1985.
[18] R. Jain, "Performance analysis of FDDI token ring networks: Effect of parameters and guidelines for setting TTRT,"IEEE LTS, pp. 16-22, May 1991.
[19] A. P. Jayasumana and P. N. Werahera, "Performance of fibre distributed data interface network for multiple classes of traffic,"IEEE Proc., pt. E, vol. 137, no. 5, pp. 401-408, Sept. 1990.
[20] M. J. Johnson, "Reliability mechanisms of the FDDI high bandwidth token ring protocol,"Comput. Net. ISDN Syst., vol. II., no. 2, pp. 121-131, 1986.
[21] M. J. Johnson, "Proof that timing requirements of the FDDI token ring protocols are satisfied,"IEEE Trans. Commun., vol. COM-35, no. 6, pp. 620-625, June 1987.
[22] R. J. Kochanski and J. L. Paige, "SAFENET--The standard and its application,"IEEE LCS, vol. 2, no. 1., pp. 46-51, Feb. 1991.
[23] J. F. Kurose, M. Schwartz, and T. Yemini, "Controlling window protocols for time-constrained communication in a multiple access environment," inProc. 8th IEEE Int. Data Commun. Symp., 1983.
[24] C. C. Lim, L. Yao, and W. Zhao, "A comparative study of three token ring protocols for real-time communications,"IEEE Conf. Distributed Computing Syst., Arlington, Texas, May 1991, pp. 308-317.
[25] C. L. Liu and J. W. Layland, "Scheduling algorithms for multiprogramming in a hard real-time environment,"J. ACM, vol. 20, no. 1, pp. 46-61, Jan. 1973.
[26] N. Malcolm and W. Zhao, "Version selection schemes for hard real-time communications," inProc. IEEE Real-time Syst. Symp., San Antonio, TX, Dec. 1991, pp. 12-21.
[27] P. Martini and T. Meuser, "Service integration in FDDI," inProc. IEEE Conf. on Local Computer Networks, Minneapolis MN, Sept. 30-Oct. 3, 1990, pp. 23-32.
[28] J. Mccool, "FDDI--getting to the inside of the ring,"Data Commun., vol. 17, pp. 185-192, Mar. 1988.
[29] A. K. Mok and M. L. Dertouzos, "Multiprocessor scheduling in a hard real-time environment," inProc. Texas Conf. Computing Syst., Nov. 1978.
[30] J. Ng and J. Liu, "Performance of local area network protocols for hard real-time applications," inIEEE Conf. Distributed Computing Syst.s, Arlington, TX, May 1991, pp. 318-326.
[31] K.B. Ocheltree and R. M. Montalvo, "FDDI ring management," inProc. IEEE Conf. Local Computer Networks, Minneapolis MN, Oct. 10-12, 1989, pp. 18-23.
[32] K. B. Ocheltree, "Using redundancy in FDDI networks,"Proc. IEEE Conf. Local Comput. Net., Minneapolis MN, Sept. 30-Oct. 3, 1990, pp. 261-267.
[33] J. L. Paige, "SAFENET--A navy approach to computer networking," inProc. IEEE Conf. Local Comput. Net., Minneapolis MN, Sept. 30-Oct. 3, 1990, pp. 268-273.
[34] J. Pang and F. A. Tobagi, "Throughput analysis of a timer controlled token passing protocol under heavy load,"IEEE Trans. Commun., vol. 37, no. 7, pp. 694-702, July 1989.
[35] K. Ramamritham, "Channel characteristics in local area hard real-time systems,"Comput. Networks ISDN Syst., vol. 3, no. 13, 1987.
[36] F. E. Ross, "FDDI-A tutorial,"IEEE Commun. Mag., vol. 24, no. 5, pp. 10-17, May 1986.
[37] F. E. Ross, "Rings are round for good,"IEEE Net. Mag., Jan. 1987.
[38] F.E. Ross, "An Overview of FDDI: The Fiber Distributed Data Interface,"IEEE J. Selected Areas in Comm., Vol. 7, No. 7, Sept. 1989, p. 1,043.
[39] SAE, Aerospace Systems Division, Committee AS-2, "Linear token-passing multiple data bus," AS4074.1, Version 4.0, Jan. 25, 1988.
[40] R. Sankar and Y. Y. Yang, "Performance analysis of FDDI," inProc. IEEE Conf. Local Comput. Net., Minneapolis MN, Oct. 10-12, 1989, pp. 328-332.
[41] K. C. Sevcik and M. J. Johnson, "Cycle time properties of the FDDI token ring protocol,"IEEE Trans. Software Eng., vol. SE-13, no. 3, pp. 376-385, Mar. 1987.
[42] L. Sha and J. B. Goodenough, "Real-time scheduling theory and Ada*,"IEEE Comput., pp. 53-62, Apr. 1990.
[43] K. G. Shin and C. Hou, "Analytic evaluation of contention protocols used for real-time systems," inProc. IEEE Real-Time Syst. Symp., Dec. 1990, pp. 136-145.
[44] R. Southard, "Fibre optics: A winning technology for LANs,"Electronics, vol. 61, pp. 111-114, Feb. 1988.
[45] W. Stallings,"Computer Communication Standards, Vol 2: Local Area Network Standards. Indianapolis, IN: Howard W. Sams&Co., 1987.
[46] J. Stankovic, "A perspective on distributed computer systems,"IEEE Trans. Comput., vol. C-33, no. 12, Dec. 1984.
[47] H. Stone and S. H. Bokhai, "Control of distributed processes,"IEEE Comput., vol. 11, no. 7, pp. 1102-1115, July 1978.
[48] J. K. Strosnider, J. Lehoczky, and L. Sha, "Advanced real-time scheduling using the IEEE 802.5 token ring," inProc. IEEE Real-Time Systems Symp., Dec 1988, pp. 42-52.
[49] F. A. Tobagi, "Multiaccess protocols and real-time communications in local area networks," presented at theAdvanced Sem. Real-time Local Area Net., Bandol, France, Apr. 16-18, 1986.
[50] J. F. Torgerson, "FDDI MAC services design considerations," inProc. IEEE Conf. Local Comput. Net., Minneapolis MN, Oct. 10-12, 1989, pp. 41-48.
[51] R. W. Uhlhorn, "The fibre-optic high-speed data bus for a new generation of military aircraft,"IEEE LCS, vol. 2, no. 1, pp. 36-45, Feb. 1991.
[52] J. N. Ulm, "A timed token ring local area network and its performance characteristics," inProc. Conf Local Comput. Net., Feb. 1982, pp. 50-56.
[53] A. Valenzano, P. Montuschi, and L. Ciminiera, "Some properties of timed token medium access protocols,"IEEE Trans. Software Eng., vol. 16, no. 8, pp. 858-869, Aug. 1990.
[54] A. C. Weaver and R. Simoncic, "Communications for the NASA space station,"Proc. IEEE Conf Local Comput. Net., Minneapolis MN, Oct. 10-12, 1989, pp. 333-346.
[55] L. Yao and W. Zhao, "Performance of an extended IEEE 802.5 protocol in hard real-time systems," inProc. IEEE Conf. Comput. Commun., INFOCOM '91, Apr. 1991, pp. 469-478.
[56] S. Yau, Ed., Special Issue on Distributed Computer Systems, inIEEE Trans. Comput., vol. 38, no. 8, Aug. 1989.
[57] W. Zhao and K. Ramamritham, "Virtual time CSMA protocols for hard real-time communication,"IEEE Trans. Software Eng., vol. SE-13, no. 8, Aug. 1987.
[58] W. Zhao, J. A. Stankovic, and K. Ramamritham, "A multi-access window protocol for time constrained communications," inProc. IEEE Conf. Distributed Computing Syst., June 1988.
[59] W. Zhao, C. Barter, and N. Malcolm, "Virtual time CSMA protocols with two version message model for real-time communications," inProc. IEEE Conf Net., Singapore, July 1989, pp. 295-300.
[60] W. Zhao, J. A. Stankovic, and K. Ramamritham, "A window protocol for transmission of time constrained messages,"IEEE Trans. Comput., vol. 39, no. 9, pp. 1186-1203, Sept. 1990.

Index Terms:
protocols; token networks; FDDI; local area networks; performance evaluation; hard real-time distributed system; FDDI; timed token medium access control protocol; synchronous messages; performance evaluation; performance analysis; synchronous bandwidth; worst case achievable utilization; synchronous message deadlines; token ring networks; deadline constraints; normalized proportional allocation scheme.
Citation:
G. Agrawal, B. Chen, W. Zhao, S. Davari, "Guaranteeing Synchronous Message Deadlines with the Timed Token Medium Access Control Protocol," IEEE Transactions on Computers, vol. 43, no. 3, pp. 327-339, March 1994, doi:10.1109/12.272433
Usage of this product signifies your acceptance of the Terms of Use.