Random access techniques for data transmission over packet switched radio networks.
Random access techniques for data transmission over packet switched radio networks.
Computer network development to achieve resource sharing
AFIPS '70 (Spring) Proceedings of the May 5-7, 1970, spring joint computer conference
The organization of computer resources into a packet radio network
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
Random access techniques for data transmission over packet-switched radio channels
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
Packet radio system: network considerations
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
Technological considerations for packet radio networks
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
Functions and structure of a packet radio station
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
Digital terminals for packet broadcasting
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
On measured behavior of the ARPA network
AFIPS '74 Proceedings of the May 6-10, 1974, national computer conference and exposition
A Measurement Center for the NBS Local Area Computer Network
IEEE Transactions on Computers - Lecture notes in computer science Vol. 174
Hi-index | 0.00 |
The growth of computer networks has proven both the need for and the success of resource sharing technology. A new resource sharing technique, utilizing broadcast channels, has been under development as a Packet Radio system and will shortly undergo testing. In this paper, we consider that Packet Radio system, and examine the measurement tasks necessary to support such important measurement goals as the validation of mathematical models, the evaluation of system protocols and the detection of design flaws. We describe the data necessary to measure the many aspects of network behavior, the tools needed to gather this data and the means of collecting it at a central location; all in a fashion consistent with the system protocols and hardware constraints, and with minimal impact on the system operation itself.