This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
FDDI-M: A Scheme to Double FDDI's Ability of Supporting Synchronous Traffic
November 1995 (vol. 6 no. 11)
pp. 1125-1131

Abstract—Synchronous messages are usually generated periodically and each of them is required to be transmitted before the generation of the next message. Due to the inherent deficiency in its medium access control (MAC) protocol, an FDDI token ring can use at most one half of its ring bandwidth to transmit such synchronous traffic. This deficiency greatly reduces the FDDI’s capability of supporting multimedia applications like real-time voice/video transmissions. In this paper, we show how a few simple modifications to the FDDI’s MAC protocol can remove this deficiency and double a ring’s ability of supporting synchronous traffic. The modified protocol, called FDDI-M, can also achieve a higher throughput for asynchronous traffic than the standard FDDI and the FDDI-II, thus making it useful even for those networks without heavy synchronous traffic.

[1] Fiber Distributed Data Interface (FDDI) - Token Ring Media Access Control(MAC), American National Standard, ANSI X3.139, 1987.
[2] R.M. Grow,“A timed token protocol for local area networks,” Electro 82, May 1982.
[3] F.E. Ross,“An overview of FDDI: The fiber distributed data interface,” IEEE J. Selected Areas in Comm., vol. 7, pp. 1,043-1,051, Sept. 1989.
[4] A.C. Weaver,“Local area networks and busses-an analysis,” Tech. Report, Flight Data Systems, NASA-Johnson Space Center, 1986.
[5] G. Agrawal,B. Chen,W. Zhao,, and S. Davari,“Guaranteeing synchronous message deadlines with the timed token protocol,” Proc. IEEE Int’l Conf. on Distributed Computing Systems. IEEE, June 1992.
[6] Q. Zheng and K.G. Shin,Synchronous bandwidth allocation in FDDI networks,” Proc. ACM Multimedia ’93, pp. 31-38, Aug. 1993.
[7] H. Takagi,“Effects of target token rotation time on the performance of a timed-token protocol,” Proc. of Performance’90, 1990.
[8] K.C. Sevcik and M.J. Johnson,“Cycle time properties of the FDDI token ring protocol,” Tech. Report CSRI-179, Computer Science Research Institute, University of Toronto, 1986.
[9] D. Le Gall, “MPEG: A Video Compression Standard for Multimedia Applications,” Comm. ACM, Apr. 1991.
[10] M. Teener and R. Gvozdanovic,“FDDI-II operation and architectures,” Proc. 14th Conf. on Local Computer Networks, pp. 49-61, 1989.
[11] M. Liebhold and E.M. Hoffert,“Toward an open environment for digital video,” Comm. ACM, vol. 34, pp. 104-112, Apr. 1991.
[12] K.G. Shin and Q. Zheng,“Mixed time-constrained and non-time-constrained communications in local area networks,” IEEE Trans. Comm., pp. 1,668-1,676, Nov. 1993.
[13] Q. Zheng,“Real-time fault-tolerant communication in computer networks,” PhD thesis, Univ. of Michigan, 1993. PostScript version of this thesis isavailable via anonymous ftp from ftp.eecs.umich.edu in directory people/zheng.
[14] M.J. Johnson,“Fairness of channel access for non-time-critical traffic using the FDDI token ring protocol,” Proc. Seminar Real-Time Local Area Networks, pp. 145-157, 1986.

Index Terms:
Local area networks, FDDI, FDDI-II, MAC protocols, synchronous and asynchronous transmissions, multimedia networking, digital motion video.
Citation:
Kang G. Shin, Qin Zheng, "FDDI-M: A Scheme to Double FDDI's Ability of Supporting Synchronous Traffic," IEEE Transactions on Parallel and Distributed Systems, vol. 6, no. 11, pp. 1125-1131, Nov. 1995, doi:10.1109/71.476184
Usage of this product signifies your acceptance of the Terms of Use.