FDDI - A tutorial

  title={FDDI - A tutorial},
  author={Floyd E. Ross},
  journal={IEEE Communications Magazine},
  • F. E. Ross
  • Published 1 May 1986
  • Computer Science
  • IEEE Communications Magazine

Figures from this paper

Analysis of CISC versus RISC microprocessors for FDDI network interfaces
  • D. B. Tolley
  • Computer Science
    [1991] Proceedings 16th Conference on Local Computer Networks
  • 1991
The model indicates that the CISC processors may outperform the RISC processors in FDDI and other high speed networks where data movement requirements are significantly larger than the protocol processing overhead.
Análisis de soluciones para redes de comunicaciones cableadas para su uso en dispositivos IOT
The use of power electric line is valued as alternative to considering the deployment of an IoT network, through a hybrid communication architecture focused on sail alternative, which includes TCP/IP communication over Ethernet, PLC and IC.
Register insertion/self-token protocol for high speed ring LANs
  • T. Taketa, K. Tanno
  • Computer Science
    [1990] Proceedings. 15th Conference on Local Computer Networks
  • 1990
A new ring access control scheme adopting a multiple-token protocol, which shows good properties for shorter packets, becoming more superior to the token-ring and the FDDI-I protocols as the packet length decreases.
Virtual Tele-Education and ATM-based Networks
This article describes dominant network technologies which are used as infrastructure for tele-education systems and presents European projects for teleeducation network infrastructure as well as, some ATM-based network trials in the multimedia area.
Optical fibre local area networks
Current limitations in the digital communications have sparked an interest in new ways to increase carrier frequencies and the actual information carrying bandwidth. The adoption of optical fibre
Self-Stabilizing Symmetry Breaking in Constant Space
The subproblem of reducing an arbitrary but nonzero number of tokens to exactly one token is solved in hardware and takes only small polynomial time.
This work reviews the various types of protocols for contention control in multi-access resource systems to aid in the understanding of why they have evolved and under which conditions they have been successful.
Analysis of an FDDI network supporting multiple-priority stations with single-packet buffers
The authors present exact analysis of a nonsymmetric multipriority token ring network with single packet buffers under a timed-token protocol, similar to that used for medium access control of the
Exploiting the Attenuation of Fiber-optic Passive Taps to Create Large High-Capacity
A local- or metropolitan-area network that exploits the power losses of fiber-optic passive taps so that wavelengths can be reused in different portions of the network is proposed, making it possible to design a large, high-capacity, multichannel network with many concurrent transmissions.
An efficient guaranteed bandwidth and balancing mechanism for high speed MANs
A new mechanism is introduced, the Guaranteed Bandwidth and Balancing Mechanism (GBBM), that combines the advantages of the previous two mechanisms and can significantly improve the throughput and delay performance of the stations.