Based on the POPSMAC protocol proposed in Chung-Sheng Li et al. (1993), we propose an improved medium access protocol for wavelength division multiple access (WDMA) photonic networks. Using the same set of photonic de...
详细信息
ISBN:
(纸本)0818672935
Based on the POPSMAC protocol proposed in Chung-Sheng Li et al. (1993), we propose an improved medium access protocol for wavelength division multiple access (WDMA) photonic networks. Using the same set of photonic devices as in POPSMAC, the proposed protocol alleviates the drawbacks of the POPSMAC protocol, e.g., invalid data transmissions following receiver collisions and possible acknowledgement packet collisions with header/data packets, while retaining many advantages of POPSMAC. As a result, the network performance in terms of the throughput and the packet delay is improved. Analytical models based on the timing diagram analysis, the continuous-time Markov chain, and the randomization technique are developed to assess the performance of the proposed protocol. The performance is evaluated in terms of channel utilization, mean packet delay, and packet delay distribution with variations in the number of nodes, the offered traffic, the size of data packets, and the network propagation delay. Numerical results show that the proposed protocol achieves better channel utilization and incurs lower packet delays than POPSMAC.
The reliability of a real-time digital control computer depends not only on the reliability of the hardware and software used, but also on the time delay in computing the control output, because of the negative effect...
详细信息
The reliability of a real-time digital control computer depends not only on the reliability of the hardware and software used, but also on the time delay in computing the control output, because of the negative effects of computingtime delay on control system performance. For a given fixed sampling interval, the effects of computingtime delay are classified into the delay and loss problems, The delay problem, occurs when the computingtime delay is nonzero but smaller than the sampling interval, while the loss problem occurs when the computingtime delay is greater than, or equal to, the sampling interval, i,e., loss of the control output, These two problems are analyzed as a means of evaluating real-time control systems, First, a generic analysis of the effects of computingtime delay is presented along with necessary conditions for system stability, Then, we present both qualitative and quantitative analyses of the computingtime delay effects on a robot control system, deriving upper bounds of the computingtime delay with respect to system stability and system performance.
Ensuring that a distributed system with strict dependability constraints meets its prescribed specification is a growing challenge that confronts software developers and system engineers. This paper presents a techniq...
Ensuring that a distributed system with strict dependability constraints meets its prescribed specification is a growing challenge that confronts software developers and system engineers. This paper presents a technique for probing and fault injection of fault-tolerant distributed protocols. The proposed technique, called script-driven probing and fault injection, can be used for studying the behaviour of distributed systems and for detecting design and implementation errors of fault-tolerant protocols. The focus of this work is on fault injection techniques that can be used to demonstrate three aspects of a target protocol: detection of design or implementation errors;identification of violations of protocol specifications;and insight into design decisions made by the implementers. The emphasis of our approach is on experimental techniques intended to identify specific ''problems'' in a protocol or its implementation rather than the evaluation of system dependability through statistical metrics such as fault coverage. To demonstrate the capabilities of this technique, the paper describes a probing and fault injection toot, called the PFI tool (probe/fault injection tool), and a summary of several extensive experiments that studied the behaviour of two protocols: the Transmission Control Protocol (TCP) and a group membership protocol (GMP).
Opens in BICMOS structures are analyzed here. It is shown that some opens cannot be detected by stuck-fault or other functional tests, since some transistors in BiCMOS gates do not affect the logical function of the g...
详细信息
Opens in BICMOS structures are analyzed here. It is shown that some opens cannot be detected by stuck-fault or other functional tests, since some transistors in BiCMOS gates do not affect the logical function of the gate. A switch-level model for CMOS circuits is extended to include bipolar devices. With this switch-level model, opens that cannot be detected by stuck-faults or other functional tests are easily identified. It is also shown that, in BICMOS circuits, an open defect in one transistor can accelerate the wearout of another nondefective transistor.
Ensuring that a system meets its prescribed specification is a growing challenge that confronts software developers and system engineers. Meeting this challenge is particularly important for distributed systems with s...
详细信息
ISBN:
(纸本)3540600426
Ensuring that a system meets its prescribed specification is a growing challenge that confronts software developers and system engineers. Meeting this challenge is particularly important for distributed systems with strict dependability and timeliness constraints. This paper presents a technique, called script-driven probing and fault injection, for the evaluation and validation of dependable protocols. The proposed approach can be used to demonstrate three aspects of a target protocol: i) detection of design or implementation errors, ii) identification of violations of protocol specifications, and iii) insight into design decisions made by the implementers. To demonstrate the capabilities of this technique, the paper briefly describes a probing and fault injection tool called the PFI tool, and several experiments on two protocols: the Transmission Control Protocol (TCP) [4, 24] and the Group Membership Protocol (GMP) [19]. The tool can be used to delay, drop, reorder, duplicate, and modify messages. It can also introduce new messages into the system to probe participants. In the case of TCP, we used the PFI tool to duplicate the experiments reported in [7] on several TCP implementations without access to the vendors' TCP source code in a very short time. We also ran several new experiments that are difficult to perform using past approaches based on packet monitoring and filtering. In the case of GMP, we used the tool to test the fault-tolerance capabilities of an implementation under various failure models including daemon/link crash, send/receive omissions, and timing failures. Furthermore, by selective reordering of messages and spontaneous transmission of new messages, we were able to guide a distributed computation into hard to reach global states without instrumenting the protocol implementation.
This paper presents pp-mess-sim, an object-oriented discrete-event simulation environment for evaluating multicomputer networks. The simulator provides a toolboz of various network topologies, communication workloads,...
详细信息
Scheduling messages on the controller area network (CAN) corresponds to assigning identifiers (IDs) to messages according to their priorities. If fixed priority scheduling such as deadline monotonic (DM) is used to ca...
详细信息
Free Cl2 etching of InP/In0.53Ga0.47As at high temperatures was investigated for the fabrication of nanostructures. The effects of Cl2 flow rate, mask material, and substrate temperature on the sample etch rate, surfa...
Free Cl2 etching of InP/In0.53Ga0.47As at high temperatures was investigated for the fabrication of nanostructures. The effects of Cl2 flow rate, mask material, and substrate temperature on the sample etch rate, surface morphology, and etch profile are described. The etch profile is found to be temperature dependent for stripes along the crystal directions studied, namely, 〈110〉, 〈11̄0〉, and 〈010〉. The profile was affected by the choice of mask material among Ti and SiO2. The etch characteristics are found to be suitable for controlled etch of quantum wires. The etch technique is compatible with in situ etch and regrowth when SiO2 is used as the etch mask, since InP does not grow on SiO2 surfaces and allows selective regrowth immediately after etching. Quantum well wires (QWWs) with widths as low as 30 nm were fabricated using electron beam lithography and free‐Cl2 etching. Low temperature photoluminescence (PL) was used to characterize the QWWs. The normalized PL efficiency of narrow free‐Cl2 etched QWWs was found to be higher than that of ion‐assisted dry‐etched wires and comparable to that of wet‐etched wires.
It is difficult to define and evaluate a meaningful performance metric when many packets are generated and exchanged concurrently in mesh-connected multicomputers equipped with wormhole switching and virtual channels....
详细信息
It is difficult to define and evaluate a meaningful performance metric when many packets are generated and exchanged concurrently in mesh-connected multicomputers equipped with wormhole switching and virtual channels. Thus, an approximate metric/cost function must be chosen so that when, task modules are mapped by optimizing this function, the actual performance of the mapping is also optimized. Several low-complexity cost functions are evaluated using the simulated annealing optimization process. The mappings found by optimizing these cost functions are then fed into a flit-level simulator to evaluate their actual performance. One particular cost function is found to be very effective.
暂无评论