TY - GEN
T1 - LAN protocol modelling and performance evaluation
AU - Yuang, Maria C.
AU - Hsu, S. J.
PY - 1994/1/1
Y1 - 1994/1/1
N2 - Medium Access Control (MAC) protocols for Local Area Networks (LANs), yielding minimal delay and maximal throughput, have emerged as essential for supporting real-time applications. Design and performance analysis of these protocols have been informal and ad hoc. Such informal methods lead to ambiguities and result in time-consuming redesign should errors occur. This paper presents a formal method of modelling and performance evaluation for LAN protocols based on an Extended Finite State Machine (EFSM) model. Initially, this paper describes the EFSM model embodying the specification of delay, probability, and exclusive use of resources. From the EFSM representation of the protocol, a so-called timed-expanded tree is constructed. Based on the constructed tree, this paper presents the throughput evaluation upon having verified that the protocol preserves a particular property referred to as cyclicity. Consequently, LAN protocols can be formally and automatically modelled and analyzed.
AB - Medium Access Control (MAC) protocols for Local Area Networks (LANs), yielding minimal delay and maximal throughput, have emerged as essential for supporting real-time applications. Design and performance analysis of these protocols have been informal and ad hoc. Such informal methods lead to ambiguities and result in time-consuming redesign should errors occur. This paper presents a formal method of modelling and performance evaluation for LAN protocols based on an Extended Finite State Machine (EFSM) model. Initially, this paper describes the EFSM model embodying the specification of delay, probability, and exclusive use of resources. From the EFSM representation of the protocol, a so-called timed-expanded tree is constructed. Based on the constructed tree, this paper presents the throughput evaluation upon having verified that the protocol preserves a particular property referred to as cyclicity. Consequently, LAN protocols can be formally and automatically modelled and analyzed.
UR - http://www.scopus.com/inward/record.url?scp=0027929715&partnerID=8YFLogxK
U2 - 10.1109/ICC.1994.368796
DO - 10.1109/ICC.1994.368796
M3 - Conference contribution
AN - SCOPUS:0027929715
SN - 0780318269
T3 - Conference Record - International Conference on Communications
SP - 685
EP - 689
BT - Conference Record - International Conference on Communications
PB - Publ by IEEE
Y2 - 1 May 1994 through 5 May 1994
ER -