Multiple-access protocols and time-constrained communication
ACM Computing Surveys (CSUR)
Virtual Time CSMA Protocols for Hard Real-Time Communication
IEEE Transactions on Software Engineering
Channel characteristics in local-area hard real-time systems
Computer Networks and ISDN Systems
Internetworking with TCP/IP (vol. 2, 2nd ed.): design, implementation, and internals
Internetworking with TCP/IP (vol. 2, 2nd ed.): design, implementation, and internals
Hard real-time communication in multiple-access networks
Real-Time Systems
Task behavior monitoring for adaptive real-time communication
Real-Time Systems
Hard Real-Time Systems
Window Mac Protocols for Real-Time Communication Services
Window Mac Protocols for Real-Time Communication Services
Research: Network access protocol for hard real-time communication systems
Computer Communications
Robustness of real-time local area network protocols
Computer Communications
Dynamic real-time channel establishment in multiple access bus networks
Computer Communications
Hi-index | 0.24 |
In a distributed real-time system, tasks scheduled on different nodes communicate by message passing mechanisms. In such a system, where messages are characterized by service times and deadlines, the timely delivery of messages before their deadlines, is of prime importance. In this article, we consider the problem of time-constrained communication over a multiple access network. Prior work in this area has resulted in very few protocols that can bound the worst case channel access time in order to ensure predictability of message transmission. These protocols cannot efficiently support messages having multiple packets (packet is a basic unit of transmission) which are needed in most peer-to-peer and client-server real-time applications. As a solution to the problem, we propose best effort protocols based on CSMA/CD protocol with deterministic collision resolution, that use a concept of message deferment, which is based on laxity (laxity is the maximum amount of time that the transmission of a message can be delayed). We study the effectiveness of the proposed protocols through extensive simulation studies by comparing them with well known protocols. The simulation results indicate the superiority of the proposed protocols.