Analytic evaluation of contention protocols used in distributed real-time systems
dc.contributor.author | Shin, Kang G. | en_US |
dc.contributor.author | Hou, Chao-Ju | en_US |
dc.date.accessioned | 2006-09-11T19:45:27Z | |
dc.date.available | 2006-09-11T19:45:27Z | |
dc.date.issued | 1995-07 | en_US |
dc.identifier.citation | Shin, Kang; Hou, Chao-Ju; (1995). "Analytic evaluation of contention protocols used in distributed real-time systems." Real-Time Systems 9(1): 69-107. <http://hdl.handle.net/2027.42/48090> | en_US |
dc.identifier.issn | 0922-6443 | en_US |
dc.identifier.issn | 1573-1383 | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/48090 | |
dc.description.abstract | The probability of a station failing to deliver packets before their deadlines, called the probability of dynamic failure, P dyn , is an important measure for the communication subsystem of a distributed real-time system. Another closely-related performance measure is the ε- bounded delivery time , T ε , which is defined as the least time needed to deliver a packet with probability greater than 1−ε. Using P dyn and T ε , we comparatively evaluate four contention protocols often used in distributed real-time systems: (i) the token passing protocol and its priority-based variation (called the token scheduling protocol ), and (ii) the P i -persistent protocol and a priority-based variation thereof. The communication subsystem equipped with different contention protocols is modeled first as embedded Markov chains. Then, we derive the probability distributions of access delay, from which P dyn and T ε can be calculated. The blocking probability, Q i , can also be derived from the access delay distribution. These measures are derived first under the assumption of a single buffer at each station. The single-buffer model is then extended to the multiple-buffer case. The effects of buffer size on P dyn , T ε , and Q i , and the performance improvement with multiple buffers are analyzed over a wide range of network traffic. | en_US |
dc.format.extent | 2469158 bytes | |
dc.format.extent | 3115 bytes | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | text/plain | |
dc.language.iso | en_US | |
dc.publisher | Kluwer Academic Publishers; Springer Science+Business Media | en_US |
dc.subject.other | Computer Science | en_US |
dc.subject.other | Performance and Reliability | en_US |
dc.subject.other | Processor Architectures | en_US |
dc.subject.other | Special Purpose and Application-Based Systems | en_US |
dc.subject.other | System Performance and Evaluation | en_US |
dc.subject.other | Communications Engineering, Networks | en_US |
dc.subject.other | Control Engineering | en_US |
dc.subject.other | Deadlines | en_US |
dc.subject.other | Real-time Systems | en_US |
dc.subject.other | Contention Protocols | en_US |
dc.subject.other | Access Delay | en_US |
dc.subject.other | Embedded Markov Chains | en_US |
dc.subject.other | Queueing Theory | en_US |
dc.subject.other | Performance Metrics | en_US |
dc.subject.other | Performance Evaluation | en_US |
dc.title | Analytic evaluation of contention protocols used in distributed real-time systems | en_US |
dc.type | Article | en_US |
dc.subject.hlbsecondlevel | Business (General) | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbsecondlevel | Management | en_US |
dc.subject.hlbsecondlevel | Economics | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.subject.hlbtoplevel | Business | en_US |
dc.description.peerreviewed | Peer Reviewed | en_US |
dc.contributor.affiliationum | Real-Time Computing Laboratory Department of Electrical Engineering and Computer Science, The University of Michigan, 48105-2122, Ann Arbor, MI | en_US |
dc.contributor.affiliationother | Department of Electrical and Computer Engineering, The University of Wisconsin — Madison, 53706-1691, Madison, WI | en_US |
dc.contributor.affiliationumcampus | Ann Arbor | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/48090/1/11241_2005_Article_BF01094173.pdf | en_US |
dc.identifier.doi | http://dx.doi.org/10.1007/BF01094173 | en_US |
dc.identifier.source | Real-Time Systems | en_US |
dc.owningcollname | Interdisciplinary and Peer-Reviewed |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.