This Article 
 Bibliographic References 
 Add to: 
Deferring Real-Time Traffic for Improved Non-Real-Time Communication in FDDI Networks
December 1995 (vol. 44 no. 12)
pp. 1420-1428

Abstract—The fiber distributed data interface (FDDI) is suitable for real-time communication because of the high speed and the performance guarantees it provides. However, these guarantees are achieved at the expense of non-real-time traffic because the real-time messages are given higher priority over non-real-time messages, resulting in excessive delays for non-real-time messages. In this paper, we propose a scheme for reducing the response time of non-real-time messages while still providing the same guarantees to real-time messages. In particular, the proposed approach gives higher priority to real-time messages only when it is absolutely necessary in order for them to meet their deadlines. Non-real-time messages are thus transmitted ahead of real-time messages whenever possible. We present an algorithm for determining when and by how much the transmission of a real-time message can be deferred without jeopardizing its deadline. The proposed approach is evaluated through simulation. The simulation results show that a substantial reduction in the mean response time of non-real-time messages is achieved when using the proposed approach.

[1] “Fiber distributed data interface (FDDI)—Token ring media accesscontrol (MAC),” ANSI Standard X3.139, 1987.
[2] G. Agrawal,B. Chen,W. Zhao,, and S. Davari,“Guaranteeing synchronous message deadlines with the timed tokenprotocol,” Proc. Distributed Computing Systems, pp. 468-475, June 1992.
[3] G. Agrawal,B. Chen,W. Zhao,, and S. Davari,“Guaranteeing synchronous message deadlines with the timed token mediumaccess control protocol,” IEEE Trans. Computers, vol. 43, no. 3, pp. 327-339, Mar. 1994.
[4] B. Chen,G. Agrawal,, and W. Zhao,“Optimal synchronous capacity allocation for hard real-time communicationswith the timed token protocol,” Proc. Real-Time Systems Symp., pp. 198-207, Dec. 1992.
[5] D. Dykeman and W. Bux,“Analysis and tuning of the FDDI media access control protocol,” IEEE J. Selected Areas in Comm., vol. 6, no. 6, pp. 997-1,010, July 1988.
[6] D. Le Gall, “MPEG: A Video Compression Standard for Multimedia Applications,” Comm. ACM, Apr. 1991.
[7] R.M. Grow,“A timed token protocol for local area networks,” Proc. Electro 82, May 1982.
[8] M. Hamdaoui and P. Ramanathan,“Selection of timed token MAC protocol parameters to guarantee messagedeadlines,” Technical Report ECE-92-10, Dept. of Electrical and Computer Eng., Univ. of Wisconsin-Madison, Nov. 1992.
[9] M. Hamdaoui and P. Ramanathan,“Selecting timed token protocol parameters to guarantee real-timemessages,” Proc. Parallel and Distributed Real-Time Systems Workshop, Apr. 1993.
[10] R. Jain,“Performance analysis of FDDI token ring networks: Effect of parameters andguidelines for setting TTRT,” IEEE Lightwave Telecommunications Systems, vol. 2, no. 2, pp. 16-22, May 1991.
[11] A.P. Jayasumana and P.N. Werahera,“Performance of fibre distributed data interface network for multipleclasses of traffic,” IEE Proc., vol. 137, Pt. E, no. 5, pp. 401-408, Sept. 1990.
[12] M.J. Johnson,“Proof that timing requirements of the FDDI token ring protocol aresatisfied,” IEEE Trans. Computers, vol. 35, no. 6, pp. 620-625, June 1987.
[13] S.P. Joshi,“High-performance networks: A focus on the fiber distributed data interface(FDDI) standard,” IEEE Micro, pp. 8-14, June 1986.
[14] M. Keshtgary and A.P. Jayasumana,“Bandwidth allocation in FDDI-II for isochronous, synchronous and asynchronoustraffic,” Proc. Conf. Local Computer Networks, pp. 196-204, Sept. 1993.
[15] N. Malcolm and W. Zhao,“Guaranteeing synchronous messages with arbitrary deadline constraints in anFDDI network,” Proc. Conf. Local Computer Networks, pp. 186-195, Sept. 1993.
[16] P. Montuschi,A. Valenzano,, and L. Ciminiera,“Selection of token holding times in timed-token protocols,” IEEE Trans. Industrial Electronics, vol. 37, no. 6, pp. 442-451, Dec. 1990.
[17] J. Pang and F.A. Tobagi,“Throughput analysis of a timer controlled token passing protocol underheavy load,” IEEE Trans. Computers, vol. 37, no. 7, pp. 694-702, July 1989.
[18] F.E. Ross,“FDDI—A tutorial,” IEEE Comm. Magazine, vol. 24, no. 5, pp. 10-17, May 1986.
[19] F.E. Ross,“An overview of FDDI: The fiber distributed data interface,” IEEE J. Selected Areas in Comm., vol. 7, no. 7, pp. 1,043-1,051, Sept. 1989.
[20] M.A. Saleh,I.W. Habib,, and T.N. Saadawi,“Simulation analysis of a communication link with statistically multiplexedbursty voice sources,” IEEE J. Selected Areas in Comm., vol. 11, no. 3, pp. 432-442, Apr. 1993.
[21] R. Sankar and Y.Y. Yang,“Performance analysis of FDDI,” Proc. IEEE Conf. Local Computer Networks, pp. 328-332, Oct. 1989.
[22] K.C. Sevcik and M.J. Johnson,“Cycle time properties of the FDDI token ring protocol,” IEEE Trans. Software Engineering, pp. 376-385, 1987.
[23] K. Sriram and W. Whitt,“Characterizing superposition arrival processes in packet multiplexers forvoice and data,” IEEE J. Selected Areas in Comm., vol. 4, no. 6,, Sept. 1986.
[24] J.N. Ulm,“A timed token ring local area network and its performancecharacteristics,” Proc. IEEE Conf. Local Computer Networks, pp. 50-56, Feb. 1982.

Index Terms:
Real-time communication, non-real-time communication, timed token protocol, FDDI.
Parameswaran Ramanathan, Moncef Hamdaoui, "Deferring Real-Time Traffic for Improved Non-Real-Time Communication in FDDI Networks," IEEE Transactions on Computers, vol. 44, no. 12, pp. 1420-1428, Dec. 1995, doi:10.1109/12.477247
Usage of this product signifies your acceptance of the Terms of Use.