switched netkdorks(u) naval postgraduate … · in a point to point network, if the links s.lect.d...
TRANSCRIPT
SWITCHED NETKdORKS(U) NAVAL POSTGRADUATE SCHOOL MONTEREYCR H T SCHIRNTRRELLI SEP 83
UNCLASSIFIED F/1712 NL
EEEEEEEEEEEEEEsEohEEEEEEEEEEEEEEmhEEEEEohEI
NAVAL POSTGRADUATE SCHOOLMonterey, California
DTICEECTE
,APR 17 1984
THESISMULTIPLE PATH STATIC ROUTING PROTOCOLS
FOR PACKET SWITCHED NETWORKS
by
Harry Thornberry Schiantarelli
Septebmer 1983
-J
CI hesis Advisor: J. M. WozencraftApproved for public release; distribution unlimited
84 04 16 130
GS~CONY CLASIICAYWN OF THIS 111"IE EWhm Due M8u _______________
REPOR DOCUIENTATMO PAGE REPFORZ COMPLETING FORM-1. NIEPWT2. OVY ACCER,I No MO. RECIPIENT'S CATALOG NUMBER
14. TITLE (aid 411111Me) S. TYPE OF REPORT & PERIOD COVEREDMultiple Path Static Routing Protocols Masterls Thesis:for Packet Switched Networks September 1983
V1 4. PERFORMING ORG. REPORT NUMUER
7. AITM@WJ 6. CONTRACT OR GRANT NUMBER(&)
Harry Thornberry Schiantarelli
9. 11111MFO110111 61MAKIZATION HANE AND A001111U 16. PROGRAM ELEMENT. PROjECT. TASKAREA A WORK UNIT N4U aERS
Naval Postgraduate School* Monterey, California 93943
I I- CONTROLLING OFFICE1 NAME AND ADDRESS 12. REPORT DATE
Naval Postgraduate School September 1983Monterey, California 93943 Is. NUM§60E rOPAGES
I-L NITRMI AGEICYNAM G 351I 11.3wef kn 3= 1adOtne-) IS. SECURITY CLASS. (of this eft)
UNCLASSI FIED
1. DEC~ ASSIFICATIOW DOWNGRADINGCkOULE
*~ ~ s a. sr"UTOM STATEMENT Wo 0-40 &NNW)e
Approved for public release; distribution unlimited
17. 08IOeVmutWX STATEMEN614T (01f eIM a~anmWed In 8leeS ". if 0110etI ona Reet)
If. SUPPLIKIIENTARY OTEKS
Is. KEY W4OS (Cae e se me Of& ff ne.... OW IdwMFl 6F wle"k ..mbw)
Packet Switched Networks; Routing Protocols; Simulation;Statis Routing
20. LISTRACT (Cmfs NM aid* If nmmoee ad ldauly Ap Wleek aadee)
A central issue in the design of a packet switched comnmunica-tions network is the development of an efficient routing protocol,Es which determines the routes followed by the information as ittraverses the network. The performance of a static routingprotocol that allows for multiple path routing based on the useof routing fractions, is analyzed using computer simulation.Comparison is made between the performance of this protocol and
S/N 0 102- LL 0le 14601 1 SECURITY CLASSIFICATION Of' THIS PAGE (SIMM 36e-ertenrec
SiMON I @LAMCA,ON OF ?11111 PG (Obf "0 if bisu
that of a minimum number of hops routing protocol. Routingfractions calculated by two different methods are used andtheir relative performance analyzed. A comparative analysisis done of the performance of this protocol when usingvirtual circuit service and datagram service in the network.Provision is made to extend use of the simulation program toanalyze dynamic routing cases using routing fractions.
Accession ForNTIS GRA&IDTIC TAB
Unannounced LJU3tification
BYDistributionl/
AvailabilitY CodeSAvail and/or
Dist Special
0~ O102- LP. 0O14. 66012
SECURITY CLASSIFICATION air TIWS PA~G(ba 3==
- ~ ~ ~ ~ 7' § .5 ~*w q -77
Approved for public release; distribution unlimited.
Multi a. Path Static Rotinz Protocols~or Packet Switched Me works
byHarry Thrbr-LSchiant ralli
Luten nt Comm anar Paruv an NavyB.S., Naval TulecoumunictUor13 School, P-3ru,197s
Submitted in partial fulfillment of therequirements for the degrees of
RASTER or SaIncE IN TELECOMMUNICATIOSS SYSTEMS MANkGEIENT
and
RASZER Or SCIENCE IN ENGIEERING SCIENCE
from theNAVAL POSTGRADUATE SCHOOL
September 193
Author: ____-
* Approved by:__Thesis Advisor
Second Header
Chairman# Department 3f Administrative Science
Chaipm epovesfE 1041 4 crical Egineering
Dean of Info ir 4 J and Pallcy Sciences
DeA . fSciance and Engineering
3
&BSTRACT
K central issue in the design of a packet sw*tched
communications network Is the devalapment of an efficient*routing proto-ol, which letermines the routes followed by
the information as it traverses the network. The
performance of a static routing pcotocol that allows for
multiple path routing basad on the use of routinag fractions,is analyzed using computer simulation. Comparison i-s madebetween the performance of this protocol and that of aminimum number of hops routing protocol. Routing fractions
calculated by two different methols are used and theirrelative performance analyzed. A comparative analysis Isdone of the performance of this protocol when, using virt-+ualcircuit service and datagram sarvice in the network.
Provision is made to extend use of the simulation program to
analyze dynamic routing cases using routing fractions.
.4 4
TABLE OF CONTENTS
I. INTRODUCTION . . . . . . . . . .. . . . . . . .. 10
A. GENERAL a o o * a * o o * o e e e e . e o * . 10
B. COMBUNICATION NETWORKS. .. . ... .6. . 11
II. PACKET SWITCHED NETWORKS . . . . . . . . . . . . . 13
Ae GENERAL a o a o * a a o m o o a e . . o. . . . 13
B. DATAGRAM AND VIRTUAL-CIRCUIT SERVICES . . . . 16
C. NEZWORK LAYERS AND PROTO3OLS . . . . . . . . . 17
III. RO UTI Irv. .. . . .. . . 22
A . DEFINITION .......... • ....... 22
B. STATIC AND DYNARIC ROUT13 . . . . . . . . . . 24
C. DISTRIBUTED AND CENTRALIZED ROUTING . o . . . 27
D. FLOW CONTROL AND CONGESTI3N CONTROL o . . . . 30
E. ROUTING FRACTIONS ............. .. 36
F. LOOP AVOICANCE . . o . . . . . . . . . .. 39
IV. SIULATION OF A PACKET SWITCHED COMMUNICATIONS
NETWORK o e o o a a % e e . 9 . o o o o . o e o o 41
A. MODEL CHARACTERISTICS .. o . . . .. . . o 41
B. PARAMETERS OF THE PACKET SWITCHED NETWORK . o 45
C. COMPUTER LANGUAGE . . . .... . . . 49
D. SIMULATION PRORAN DESCRIPTION .. o . . .. . 50
E. SIMULATION OUTPUTS DESCRIPTION o o . .. . . . 58
1. INITIAL REPORT . .... . .. . . .. . 59
2. PERIOD REP3RT . . . . . . . . . . . .. 61
3. PERIOD DATA ............... 63
4. NETWORK REPORT . o o . .. . . . ... . . 6a
5. NETWORK DATA .R ... .. ........ 66
V. CONCLUSIONS AND RECO3MENDATIOLS . o o ... . .. 67
A. CONCLUSIONS .. .. . . . . . . . . . . .. 67
B. R0ECORBNDTIONS FOR FUTURE STUDY ....... 73
APPENDIX A: GENERATION OF GEOMETRICALLY DISTRIBUTED
NUMBER OF PACKETS . . . . . . . . . . . . . 75
APPENDIX B: LINK NAME ASSIGNMENT ............ 77
APPENDIX C: MINIMUM NMOBER OF HOPS SINGLE PATH
ROUTING TABLE ............... 79
APPENDIX D: 3RAPHIC REPRESENTATION OF DATA COLLECTED
DURING SIMULArION ......... .... 84
APPENDIX E: SIMULATION PROGRAM . . .......... 91
APPENDIX F: PROGRAM TO GRAPH GENERAL STATISTICS OF
THE SIMULATION RUN . . . . . * * .. .o. . 120
APPENDIX G: PROGRAM TO GRAPH PERIODICAL STATISTICS
OF THE SIMULATION RUN . . . . . . . . .. 129
LIST OF REFERENCES .... ......... . . ... 138
BIBLIOGRAPHY - • .• .... . ............ 141
INITIAL DISTRIBUTION LIST. .... .. .... ..... 142
6
, ? , g . ; .' ....". .-._",'-,.'.. --. '-' , ',...,",..., ,",' ., v , .. .., ...%, .-%.
.P~. .F JA "W - p-7-j. -'- . .7 '7 -.P -Y -
LIST 0F TABLES
I. GgivuLkRIT! CoKipARISON . . . . . . . . . . . . . . 68
II. PERFORMANCE CCNIP&RISON . . . . . . . .. .... 70
Ill. pERpoRgAycz COMPARIsON . e o e 73
7
LIST OF FIGURES
3.1 THROUGHPUT AND TRANSIT DELAY VERSUS OFFERED
LOAD .o. .. . ... .... . . 34
3.2 DELAY VERSUS OFFERED LOAD . . . . . . . . . .. 354.1 NETWORK rOPOLOGY . .. .. .. .. .. .. . .. 49
C.1 SINK-TREE FOR EXTERNAL VERrICES . . . . . . . . 80
C.2 SINK-rREE FOR INTERNAL VERTICES . . . . . . . . 81
C.3 SINK-TREE FOR CENTRAL NODE . . . . . . . . . . . 82
D.1 PKTS STILL IN NETWORK FOR R3UTING-FRACTION
PROTOCOL . .. .. . . . . . . . .. . . . . .. 85
D.2 PKTS. STILL IN NETWORK FOR MINIXUM-HOPS
PROT COL . . . . . . . . . . .e. . . .o. . . . 86
D.3 COMPARISON OF PACKETS STILL IN THE NETWORK . . . 87
D.4 COMPARISON OF MAXIMUM LINK USAGE FOR THE
NETWORK e a * e e e e . . . . . e . . . . .a. 88
D.5 COMPARISON OF AVERAGE QUEUE LENGTH FOR rHE
NETWORK . . . . . . . . . . .*. . . . .e. . . 89
D.6 COMPARISON OF AVG. DELAY FOR COMPLETING TRIP
PKTS .. 90
AC KNOWULEDGE SENT S
I wi.sh to express my thanks to Professor John 3.
Vozencraft for his guidance and patience throughout the
course of this thesis work. His broad knowledge on thq
subject of packet switched networks and of communications in
general made this effort a val.uable experience.
This work is dedicated to my wife Gabriela and my
daughter Gaby, whose constant supp:)rt and the atmosphere of
love they created made it al1, possible.
9.9
I. _.TRODUCZO
% A. GENERAL
In recent ys-ars wq have bs- - xpsr i-nc-na
tschnclogical conver genc.- o f compit: rs =nd
telecommunicaticns in such a way that : has bz=ccm .
difficult to s4parate what s p=ocessing and wa t S
communication. The constant imp rov mrnt i1 coaPu::rprocessing speed and storags capacity -cgether with +heirreduction in price and size, have dafinitivtely influencedthis change, making it increasingly attractive -c us .
programmable computers to control zzommunicaticn networks and
process the information transmitt d thzough them. This
allows the integration of traditional communications withcomputer networks and distributed systems, whi!.e using thesame m.ans of transmission, and thus represents a more
efficient use of the communication channels. Ihis situation
creates the necesity for the development of naw transmission
techniques thit can accomodate tha raquiremants of higher
data rates, as well as procedures to handle larger volumesof information.
A kind of network that is becoming incrasingly popular
is the Packet Switched network. Crucial to the design of
this kind of network is the development of efficient routing
procedures, which determine the routes followed by the
.aforma-ion as it traverses the network. The present studyrepresents further work in that direction and as such
involves ths analysis of a routing proc.durg that uses socalled Routing Fractions.
. . ae.1
B. COMMUNICATION N3TWOPKS
Thera are two basic types 3. communca-_oN. -. :'7c:k*' - ? architectures: Point to Pont and Broadcast. ..- :
point architectures the network normally cor--:t n=- I.i:',ischannels (we will call th-m links), waich may oz I" t
by a band of frequencies, cabl, o-.icT. -t, M - ,z
connecting a pair cf stations (w- will cn1 - .odzs) .
two nod as whc h are not ccn=-icz;ei by a I~ wv- ocommunicate, th=y must Jo so i -t v _ ce r - -
'3 intermediate cd=s. This char-=: 's- . al S
varisty 01 na-work - a n Ml
fsaturs wh.:-n trronnactll . is.: - ::each o ,- - , nv a2lcwinQ -h. ": o-- v3r-C-:'
routes in cass of link faiiu.s or u:gston s~u:--oiu.
In a point to point network, if the links s.lect.d forthe communication are used exclusiv-ly by ths twz nca s fr1the duration of the communication, the -echni~ui is callsi"line switching". In -his casa, both the nod.s an!interconnecting links must be fre.e. before th- info-ma, on
can start to be sent. A classlcal exampla of :h- use cf
this technique is the public talphaaa metwork wne.e all th--links between the caler and recip.ent cf th. -all wi- b_2held for their exclusive use, until th- snd of -hec.mmu. niatior. If one :r mcre of -- s links or the n1-1:?
called is busy, the call setup cannot be completed, and abusy tone is received at the calling node to indicate t-h
procedura must be restar-e.
If inst sad, the links can be shared )y two or mcr=K. communicaicn, and the information that is S-csivel a . inintermsdiate --ode may be stored thzre until -h requi_-:7-output link is fre ai then forwailed, th.6: ai d t e O a, - a. c n iq u s. "
called "store and forward". The aode ciller (scurce nods)does not have to wait for all the links involved in thi
,,..,. 11
0.%........................% -. '*. q *3 0* 3 ~ 3 3 ~ 3
communication, or the destination nds, to be free b-forestarting to send the information. tn most cases this allowsfor a more efficient use of resou:-es. Oth.= advantages of
point to point architectures iclude their ability to
support simultaneous transfer of information between
different stations in the network, and the use of high speedlinks to speel-up this transfer.
In broadcast archit-ect-ures, there is a sir.glecommuncation link shared by all noles, so that informationsent by any node is received by all other nodes. Satel11te
and Bus architectures are some examples of this type of
networks. Since there is only one path for all
communications, the total overall transfer rat e of
information is limited by the banivwith and speed (capacity)of that single channel, and its failure can cause complete
system failure. Another limitation of this architecture is
interference between stations requesting the use of the
channel, so that some kind of coaterBtion-resolving or
polling scheme must be used, maki.ng it more complex and less
efficient.
Broadcast architectures are used mainly in local area
networks (LAN). There the coimunication problem is
restricted to short distances and usually higher capacitylinks %1-10 megabits per second) are available. Examples ofthis kind of architecture are Ethernet from Xearox
Corporation, and Hyperbus from Network System Corporation.
In -his thesis we will concentcate on store-and-forward
nttworks and in particular on so called "Packet Switched"
networks.
12
,, --Ii i ~ i a ' ' -. . .. • , , r ., , , '., '..
-. xx. . -. ..---s 3 .3_ . 6T -7- -p.._
1. GBRUR&L
Perhaps the most popular kiai of store and forward
network today is the packet swltzhed network. In these
networks the communications, or messages, are subdividedinto fixed length parts called "Packets" (usually the packet
size is arouni 1000 bits). Packets are transmitted through
the network asing the best route selected by the routing
protocols (see Chapter I1), wich exists at the time thepacket is released into the network. Each packet traverses
the netwc-k intermixed with packets of other messages.
The main advantage of packet switched networks over line
switched networks is the conservation (reduction) ofswitching time. With line switching, a complete path of
communication must be set up between the source and
destinaticn node before the communication begins. Path setupis established through a signaling process. Before
transmission of a message, a reservation signal is sent
towards the destination. While traveling nods by node to the
destinaticn node, the signal reserves links along the path.
If at any intermediate node it caant find a free link, itwaits for a link to become free while holding the links it
has reserved so far. When a link becoms free it reserves it
and goes to the next node to repeat the same process. When
the signal reaches the desti.nation node, a path has beenreserved between source ant destination nodes. As shown by
Kermani and Kleinrock in (Ref. 1], as the input traffic
increases, a network using line switching saturates very
quickly and the message delay increases rapidly. This rapid
saturation is the result of the overhead imposed by the
13
switches to set the path, which are slow relative to the
duration of a message. Because of the reserva-ion
, operation, and the exclusive use of a path, line swi-tching
is not a good choice particularly if traffic load is high,
since it causes a substantial decrease in the networkcarrying capazity. Therefore, for communication networks
which have many nodes and require the exchange of large
number of messages, the principles used in packet switchednetworks can provide a bstter communica ion scheme.
Packet switched networks support apparent full
connectivity among the nodes by virtue of the store andforward nature of the system. Typically, packet switched
networks use fewer than (3N/2) bi-directional (duplex) links(where N is the number of nodes) , whereas a fully connectednetwork requires (N x (5-1)/2) duplex links. Packetswitched networks allow traffic to be concentrated on higher
speed or lower cost links, as raluired to reduce channel
costs and/or transmission delays. rhay also allow sendingtraffic through alternate routes and around failed orcongested links or nodes, increasiag channel utilization,
reducing trangMssion delay, and making the network morerobust and dependable.
Packet switched networks require that each node be ableto process certain information about the packet itself, and
about the network structure and status, in order to assign
the correct routing to the packet. Due to this requirement
and the further need for high speed processing to operateefficiently, each node in the network is implemented with a
programmable computer that controls its operation andregulates its participation in the network.
Packet switched networks allow for the transmission of
both data and digitized voice coamunications, but somespecial considerations must be taken when doing this.Delays in data communications ars not as critical as in
...
voice communications, and allow che storage an- fur-har
reassembly of the packets to recreate the original message
(as long as all the packets corresponding to a message
eventually arrive to the destination node). Nsvertheless,
bit errors or packet losses are intolerable for data
communications, and a procedure for error
detection/correction is required for proper operation. Incontrast, voice communications allow for s.me level of biterror and even packet loss, since the receiver (the human
brain) will in most cases interpolate and make up for the
errors. Actual experiments show that when the lost packets
constitute less than 1 of the offered voice traffic,
ccnfortable conversation can be maintained [Ref. 2]. On theother hand voice communications require near real-time
processing, and do not accept out of order packets, making
it necessary to implement some kind or priority scheme thatwill give precedence to voice packets over data packets, and
a routine procedure that will ensure the delivery of packets
in the same order they were generated. Speech packets must
meet a strict overall delay constr.aint of less than 200-500miliseccnds [Ref. 3] for comfortable conversations, this
makes it impractical to store the packets of a message in
the receiving node until the last one arrives and then toreorder them; it also ccnstrains the maximum number of linksthey can traverse. This constraint must be taken into
account, particularly when designing the network topology
and/or assigning link capacities, in order to ensure that:packet-time delay does not renter voice communications
useless.
15z . -
B. DATAGRAI AND VIRTUL-CIRCUIT SERVICES
There are two basic kinds of "service" that a packet
switched network can provide, in reference to the way it
delivers its packets: Datagram service,and Virtual Circuit
service. In datagra service the packes, which are
raferred to as "datagrams", are treated as inlependent
entities, that is, each packet of a message 4i routed anddelivered independently of the other packets of the same
message. There is no enforced relationship between the
order in which one node enters datagrams into tho networkand the order in which these same datagrams arrive at their
4: destination mode. The use of this scheme requires each
datagram to contain the whole inforzation necesary for itsrouting. Theref3re, each packet will typically contain in
its header the destination node, the message to which itbelongs, packet number, and any other information required
by the particular routing scheme implemented.By contrast, the virtual circuit is a sequenced se-vice,
that is, the order in which the packets are entered into the
network is the same order in which they arrive at their
destination node. This is guaranteed by requiring that allthe packets of a message follow the same route as the first
packet of that message. In this case each packet needs only
Sto carry in its header an identificaticm of the virtual
circuit to which it belongs, and the different nodes will
automatically route it thorough the links that correspond tothe virtual circuit.
A virtual circuit resembles the line switching technique* -. °
in the sense that all packets of a message traverses the
- same path, but differs from it in that more than ons virtualcircuit say simultaneously include the same link as part of
the route for its packets and thus share the use of that
link. Another important difference is that if a link or
16
., . .
node fails, the packet may be r.-uted through alternate
routes and communication is not lost as it would occur w4th
line switching.Each virtual circuit requires an explicit s.tup
procedure (gemerally done by the first packet of a message
or a "request-to-send" packet) whi.- establishes the route,
followed by a data transfer and an explicit shutdown
procedure. Once the "circuit" has been set, individual
packets do not have to carry their destination address,
since iz was specified during setup, allowing them to carry
more data. Packetized virtual circuits emerge as a
promising approach to pure voice pa-ket networks [Ref. 4].Virtual circuits appear to the ead users as if they were
dedicated lines; however, within the network many diff-.rent
virtual circuits share the same coimunication links. The
network modal that we chose for this study can be configuredto provide either virtual circuit or datagram service. This
characteristiz allows us to compare the behavior of the
routing algorithm for each case.*i Some examples of networks that provide these kind of
services are IBM's System Network Architecture (SNA), which
provides virtual circuit service, &ad DEC's Digital Network
Architecture (DNA), which provides datagram ssrvice.
C. NETWORK LAYBS AND PROTOCOLS
In order to simplify design complexity, most networks
are organized as a series of layers or levels, each one
built upon its predecesor. The purpose of each layer is to
offer certain services to the higher layers, shielding them
from the details of how the servi-es offered are actually
implemented. The rules and conventions that govern the
timing and forward of data exchange between layers are
called protocols, and the set of liyers and protocols are
17
% N~~S
called the network architecture. The basic aims of a network
architecture are that the network has its funstions cleerly
defined and applications and communications are separated.
At the same time, the applications interface to the network
must be as simple as possible.
There is no unique layered structure, but for this study
we will use the one adopted by the International Standards
Organization (ISO), which is a seven layer network model
called the "Reference fodel of Open Systems Interconnection"
also called 3SI [Ref. 5]. The alfferent layers cf this
model are:(1) Physical Layer
(2) Data Link Layer
(3) Network Layer
(4) Transport Layer(5) Session Layer(6) Presentation Layer
(7) pplication Layer
The Physizzal Layer deals with the actual transmission ofthe raw bits over the communication link. It is the set of
electrical or mechanical functions required to establish,
maintain and release physical conneations between the nodes
and transmisian circuits (links). Its main purpose is to
ensure that if a bit 1 was sent, the receiver gets a I and
not a 0. No consideration is tiken with the information
content of the bits, nor with charactsr or frame boundaries.
The Data Link Layer moves ase step away from thePhysical Layer, and its purpose is to present the networkwith an error free Zommunication link. This layer
establishes, maintains and releases a link connectionbetween two nodes. This involves the division of data into
frames, and the corresponding mc.hanisms to transmit themsequentially, detect any error in their transmission, and
process the azknowledgment sent bact by the receiver. Since
18
the Physical Layer merely transmits a strc.am of bits withcutregard to their meaning or structure, -- is up to khe data
link layer -o create and recognize fcame boundaries.
The next layer, the Network Layer, represents the main
concern of this thesis. It determines the mainA characteristics of the units of information, or packets, and
how they are exchanged and routed through the network. This
layer is also called the Communications Subnet layer, since
it receives messages from the origimator, divides them intopackets and ensures that they are correctly received attheir destination, and in the prop--r order. It masks allswitching and direction consideration from the higher lavel
layers. It is in this layer that the kind of service the
network will provide is determined (virtual circuit or
datagram), anI thus it contains the corresponding procedures
to handle it. Routing protocols are therefore the heart of
the network, and their effectiveness and efficiency will
affect the overall performance of the network, probably more
than any other protocol.The nex+ four layers, have to do with the way the
different processes in each node communicate betwsen them,
and with processes in other nodes (?ranspo-t and SessionLayer); and the interfaces with the actual users of the
system (Presentat'ion and kpplication Layer).
The transport layer, also known as the host-host layer,accepts data from the session layer, splits it into smaller
units if needed, passes these to the network layer, andensures that all the pieces arrive correctly at the other
end. It creates a distinct network connection for eachtransport connection required by the session layer, or may
multiplex several transport conaections onto the same
network connection, to reduce the cost. In all cases, thetransport layer makes these network connections transparentto the session layer. this layer is a true source to
19
destination or end-to-and layar, so a program on the scu.ce
node carries on a conversation w!th a similai program on thedestination node, usin; message headers and control
messages. In contrast, at lower layers the protcc,Ils are
carried out by each node and its immediate neighbors
(chained-layer).
The session layer represents the true ust.r interface tothe network. It establishes the logical connection
(session) between users or presentation-layer processes in
different nodes, and maintains and releases it at the users
request. To do this it converts naies to addresses, chqcks
for access permission, type of communicat.ion (half duplex orfull duplex), etc. It also provides connection services
such as recovery, diagnosis and statistics (mainly for
performance measurements and billinji . In some networks thesession and transport layers are merged into a single layer.
The presentation layer performs functions that are
requested sufficiently often by the users. It is then betterto have the system provide then as services, rather than
allow each user to perform them in its own way. These
services include any conversion of information that might beneeded as it is transferred between end users. Someexamples are data compaction, expansion, encryption, sending
4 and receiving formats, convertion of data types and data
representation, terminal handling and file transfer.
The application layer represents the highest level layer
in the network. Its contents usually depends on theindividual users, since they are the ultimate sources anddestinations of information passing through a network. The
application layer does not become directly involved incommunication functions, and thus the need for the end user
to know about internal communications procedures and
protocols of the network is eliainited. The presentation
layer represents the domain of the network users, while the
20
4
A.- DEPIIITION
A central issue in the desiga of a Packet Switching
Network is the selection of the routing protocols which are
responsible for deciding the path to be followed by a packet
as it traverses the network. The basic concern of a routing
protocol is the efficiency of the iaformation transfer. Its
main goal is then to determine the optimal (best) routing
policy, i.e.,the set of routes over which packets have to be
transmitted, in order to optimize a well defined objective
function (like delay, cost, throu;hput, etc.). It asumesthat the integrity of this transfer is provided by othqr
protocols (error protectioan, duplicate detection, security,
etc).
In optimizing an objective faction, as for example
minimum-delay, we can use two different-criteria: retinizethe average system delay, or optimize the individual delay
for each source-to-destination traffic requirement.
Fortunately, most routing solutions obtained using these twoapproaches turn out to be similar (less than 1% difference),
especially for large networks with uniform requirements
[Ref. 6]. The system optimization approach, as we will see,is generally used in static routing problems, while theindividual or user optimization concept is most common in
1 h dynamic routing problems.
The degree of difficulty of the routing problem in anynetwork, is strongly influenced by the network topology. Ina star-connected network with full duplex links, for
example, only the control node must have the routinginformation since all traffic must go through it, and the
22
71iA . - - - v v-. .7* '~77 ~
routing will simply be a match of the destination to the
output link that connects to that node. Another simplearrangement is a single ring-connected network. If -the links
are full-duplex, traffic -an reach any destination from any
source either way around the ring, and ths routing algorithm
can be quite trivial, needing no routing table as main
component since the shor-.est path can be easily computed
from the destination node number. But networks are not
always that simple, and more and more sophisticated routing
protocols are required as the complexity of the network
topolcgy increases. Even without knowing the details of the
network traffic, it Is possible to make some general
statements about the optimum routes, based on the network
topology. One example is the Optimality Principle, which
states that if node "B" is on the optimal path from node "A"to "C", then the optimal path from "B" to "C" falls along
the same route.
r Some of the most important packet switched
communications networks in cgrrent operation ars TYSNET
(Public ccmmon carrier network based in the U.S.) , TRANSPAC
(rench's Government PTT data network), ARPANET (U.S.Department of Defense Computer Network), SNA (IBM's System
Network Architecture) and D R& (Digital EquipmentCorporations Digital Network Architecture). The routing
algorithms used in these networks turn out to be variants,
in one form or another, of shortest path algorithms that
route packets from source to destination over the least cost
path. The specific cost criterion used differs among the
networks. Some use a fixed cost for each link in the
network, and usually the cost is assigned inversely
proportional to the link transmission capacity, in bits per
second. For a network with equal capacity links,
. minimization of the path cost then generates a minimum hop
path. Links with high error rates or congestion may be
23
* M\ .< .- . ./,. . W *. V *-~* . *-
* . . . . . . .. . ." • "- . .. . . . . . . . . . . . . . . . . . . .. .. . .
assigned -higher costs to avoid sending too much traffic
through them. Other networks attapt to estimate average
packat time lelay on each link, and use this :o assign a
link cost. The resultant source-dgsination path chosen,tends to be the path with minimum average time delay. OLce
the bes- paths have been determined, routing tables set at
each node are used to route individual packets to the
appropriate outgoing link.
Shortest path with single routms turn out not to be
optimum, if0 the long-term average network delay time is to
be minimized. In this case multiple paths, where fracticnsof the packets at a node are assigned to one of severaloutgoing links (perhaps on a probabilistic basis), provide
for a closer to optimal routing. rhis kind of routing has
not yet been used in routing schemes implemented inoperating networks, although there are plans to incorporatethis procedure in future routing mechanisms for the Canadian
DATAPAC network . (Ref. 7]. In the present study we
investigate the use of a routing protocol that allows for
the routing of packets over multiple paths.
B. STATIC AND DYNAMIC ROUTING
Routing protocols can be groupa.d into two major classes:
Adaptive or Dynamic and Nonadap:ive or Stat4 - . Dynamic
protocols base their routing decisions on measurements or
estimates of the current traffic and topology of th.%.. network, and their routing policies vary in time according
to the fluctuations of these zeasurements. Static
protocols, in contrast, make those decisions independently
from the current status of the network. Their routingpolicies are determined a priori and are time invariant. For
this reason, static protocols must be designed to providesatisfactory performance, on the average, over a range of
* traffic intensities.
.4
, '.'.... ..- € € . .. ....-.- . . -€ -. .-. '€ .-.._ . .. . ..-..2. . . .
.. -.-.- . ' ' , ,- , .... , 'v,. ,,,, ,.,.', . ,,,'* . , ,,.,*. ,. .-,- -,-v. -*- . - ",.... .. ' ...-._ V*o.-.-,
If a dynamic protocol could manage to adapt perfectly tc
the changes in traffic and topology of the network, it will
naturally outperform any static protocol; but traffic loads
vary continuosly, and topology chang-s in most cases can r.ot
-be predicted, so dynamic protocols require complicated
computations which may slow the operation of the network.
Furthermore, sending thn update informaticn thrcugh the
network may itself increase the traffic. Static protocols,
. in contrast, are usually simple, and since their
implementatio is done before bringing up the network, they
do not affect the traffic lcad. Nevertheless, static routing
protocols do not react to drastic changes in traffic or
topology in the network, and since zost traffic is bursty by
nature and r-quipment malfunctions are not infrequent, they
may lead to congestion and misuse of some of the links.
Static Routing is widely used in network design. There
we are interested in determining whether a given traffic
pattern can be accommodated by the network, and if it can,
what will t.e average delay be. Network topology is
%< generally designed interaztively by producing small changes
(addition/delation of links or reducing/increasing lank
capacities) and observing the effects on throughput and
delay performance. This performance evaluation is
accomplished using a static routing algorithm. A method
that applies this process is the "Cut-Saturation" algori-hm
for the topological layout of packet switched networks
[Ref. 8].
The degree of adaptivity of a :r_:ain routing protocol
can be measured in terms of its response time, that is, the
rate of change in the traffic ani topology of the network
M which it is able to track efficiently. There is indeed a
whole spectrum of sclutions to the routing problem betweenthe two extreas mentioned (static and dynamic-). They are
characterized by different respDase times and used for
25
*% %
different applications. & comparative analysis of some
routing alternatives that combine static and dynamic routingfeatures has been done by Rudin [Raf. 9]. If the rak. of
change of conditions in a network is slow, for examp!re, a
periodically refreshed static routing (or "quasistatc")protocol, can be a reasonable solution; but if it is fast, a
dynamic routing scheme may be rsquired.In the static (or quasistatic) routing enviromer.t, e
time between traffic pattern changes is very much largerthan the avecags network transmission time, so that the
routing computation can be performed 4 thp background, at a
vary slow rats, and without increasing the load on links or
nodes mach. In the dynami- routing enviroment, on the otherhand, the tiae between traffic changes is comparable to the
time required to measure such chaages, compute new routpeand implement them. In this case we must be concerned with
the time required to arrive to in optimal solution andinstall it in the nodes, and the amount of overhead
intrqduced in both link and node usage. rhe frequency ofupdating routing tables represents a compromise between the
desire that as soon as a change is detected the information
is immeiiatsly made known in the network, and the amount ofoverhead generated by the updates.
For a fixed network topology aad fixed traffic patternsituation, the optimal static routing protocol representsthe optimal routing scheme. For daterministic steady input
then, dynamic routing protocols that use the system
optimization approach must converge to the optimal staticrouzing, that corresponds to the existing traffic pattern
and network topology.The effectiveness of different static routing protocols
rslative to dynamic routing protocols is not rsally known,
except for some suggestions from simulation. For staticrouting, a well known lower bound for d.lay has been
26
determined by Fratta, Gerla and Klainrock with their- "1Fmow
Deviation Method" [Ref. 10]. Thaza is no cor espond-ng
lower bound known for dynamic routing, but in some cases,
simple dynamic -routing schemes give delays significantly
lower than the best static routing delay for scma specific
network topologies. Examples can be found in rUM (Ref. 11].
Simulation studies at the British National Physical
Laboratory indicate that the addition of a dynamic
capability to a shortest path (static) routing rule may
increase throughput by as much as 50%. [Ref. 12].
An optimal routing strategy will then use a dynamic
protocol that behaves as a statiz one, when traffic and
topology of the network warrants it, and as a normal dynamic
one otherwise. Such a routing protocol should not be
sensitive to small variations in the traffic, and it should
allow routing through multiple paths to maximize utilization
of resources and reduce packet time delay.
C. DISTRIBUTED AND CENTRALIZED ROUTING
Perhaps the most important characteristic that
dif ferentiates the numerous routing schemes that are
currently used in packet-swithched communications networks
is the strategy used to control the selection and
.- implementatiom of the routes under different network
conditions. McQuillan (Ref. 13], defines four catqgories of
control strategies:
(1) Daterministic Control
(2) Isolated Control
(3) Distributed Control
(4) Centralized Control
Deterministic Control implies fixed routes, but nodes
have precomputed tables which can be manually selectel to
deal with line or node outages. &a example of this kind of
27
%.
,r - ; . * -' C:. , a t.L at ... :o a *: . * t -: . - ' t '. *. * - : ._.• r.
network is the SITh network. Isolated control strategies
involve decision making at each node based only on local
information. Information is not aven shared with adjacentnodes, and thus, changes are not propagated out of the node.Distributed control allows each node to make its owndecission on how to adapt to the changes in the network,
based on information obtained locally as well as from othernodes. Furthermore, this strategy tries to propagate
routing information of global importance to all the nodes.
. The last category, centralized control, assigns the
responsibility for all routing decisions to a single node,-i usually called the Network Routing Canter or NPC (possibly
backed up by alternate nodes in case of failurs). In this
case, all nodes must report their status and any networkchanges to the NRC, as wall as receive and adopt routing
decisions from it. Of these four categories, the two most
widely used are Distributed and Centralized Control. Some
examples of networks using distributed routing are ARPANET
and DATkPAC, while TYMNET uses centralized routing.
* Regardless of whether centralizaid on distributed controlis used, hsy both impose in the network a cost in time,
bandwith, buffer space and other natwork resources, to move
routing information f ro m the locations where routing
policies are selected to where they are enforced. Inaddition, if any dynamic routing scheme is used, it must
overcome a problem f undamental to them, namely, the shorttime interval available to deliv.r routing information to
and from the modes before network conditions have changed somuch that the information is obsolete.
For dynamic routing protocolIs we prefer for the
decisions to be made in a distributed fashion. The reason
is that using the centralized approach, the time it takesthe NBC tc receive information fro2 all the nodes, calculatethe routing strategy and send it back zo the appropriate
28
4%
nodes, can be so long that the routing decision may be out
of date. In this case the dynamic routing protocol way looseits adaptiveness and make what is effectively a randomchange. In contrast, distributed schemes do tot have asmuch information, since we can usually expect to have only
Athe past information of all the network (global), thepresent information of the node (local), and partialinformaticn of some other node or group of nodes. The
decision rules are usually simpler, and the propagationdelay for the exchange of status information betweenneighboring nodes, can also be smaller than if sent from acentralized center. This reduces the time elapsed betweenthe change of states and the change of the routing decision.
A distributed scheme reduces the reliance on a cental nodethat may fail. It may also diminish the effects of node and
link failure, since in a centralize! protocol, the routes tobe used by the notification of such failures may in fact bedestroyed by them. In addition it can avoid the increase oftraffic overhead in the proximity of the NRC, due to the
p.riodic collection of status reports from all the nodes,and the distribution of routing decisions from it.
Although a* mixed scheme has yet been implemented, inprinciple it is possible to combine routing strategies to
compensate for each other's defficiencies, and therefore
hope to reach reach an overall improvement of routing
characteristi-s. An example of a routing protocol thatcombines centralized with distributed routing is theDelta-Routing. In this scheme the central controller sends
-, routing tables to the individual nodes, but these are usedin conjunction with local jueue lenaths to select the routesto be taken by individual packets. Other schemes thatcombine centralized with listributed routing are discussedby Chu and Shen [Ref. 14].
29
* ,. . * . , ~ * . .- ~
ip
D. PLOD CONTROL ID CONGESTOI COU1ROL
In mo-t shared communication networks, resources are
dimensioned to meet less than the peak demand requirements,
due to cost factors. ?his underdimension introduces a
reducticn in the usual performance, which should be
acceptable to the users, plus a risk that the actual trafficload may occasionally exceed the level where acceptable
performance is obtained. The traffic load level at whichacceptable performance is just met, and where any increasein it will make performance unacceptable, is called the
overload level. By setting this level the designer ca. makethe risk of non-acceptable performance as small as he want3.Therefore, the overload level is the network's design load
level.
In a packet switched communications network, even when
% v the traffic level does not exceed the overload level, there
is a need to control the rate at which packets flow from one
node to the next and to prevent packets from arriving at the
* receiver at a rate faster that it can handle them. We mustalso make sure that the load imposed on the path between
transmitter and receiver loes not exceed its capacity. A
mechanism to allocate resources to satisfy user demands aslong as there are resources, and to settle contention whenthe network cuts out of resources, is required. This
mechanism is usually called Flow Coatrol. A good definitionof Flow-Control given by Radin [Ref. 15], states that flowcontrol is "a system of algorithms which are used in a
network to prevent a single user or a user group frommonopolizing the network resources to the detriment of otherusers",.
Flow Control may be done between neighboring nodes(local control) or between source and destination
(end-to-end control). Between naighboritg nodes the flow
.4...
30
-* p m*
: : - .:: r ., , V. , " " ?" " " " -" '. ", '* . . '.. . .... -,, .,-. .:. :,-.-,.•. ;.: .I , ,....:.: ... ... ..
.R~I %1 IF. -7
control mechanism must b e design -o ensure that the
transmitter sends packets at a rate acceptable by the
receiver and thus protects the receiver node againstover-flowing its packet buffers and overloading its
* processing capacity. Consequently, it places limits on thenumber of packets at the buffers of the switching nodes.Between source and destination nodes, flow control must be
designed to ensure that the source node does not generatepackets for the destination at a rite higher than that atwhich the latter can accept then. So it places a limit on
the number of packets belonging to a source-destination
pair.All flow control mechanisms eitmar require the sender to
stop sending at some point and wait for an explicit
go-ahead, or permit the receiver to d-sca:d packets at willwith impunity. Two well known flow control mechanisms areStop-and-Wait and Sliding-Window. Some analytic models for
the study of end-to-end and local flow control can be found
in the literature [Ref. 16].When the number of packets releasad into the network by
the nodes is within its carrying capacity, they are alldelivered (except for a few that may be affected bytransmission errors) . But when too many packets are present
in part of the network, it can becoma impossible for packetsto move, because the queues into which they should beaccepted are always full, causing the network performance todegrade; this situation is called Congestion. Congestion
can be brought about by several factors. If the nodes are
too slow to perform the various tasks required (queuing,updating tables, etc), their queues can build up even thoughthere is excess capacity in their output links. On the
other hand even if the processing speed of the nodes isinfinitely fast, queues can build up if the input trafficrate exceeds the capacity of the output lines. This can
31
happen fer enapla if two or more input lines are deliveringpackets all 3f which need to be sent by the same iutput
link. Congestion tends to feed upon itself and become worseif nothing is done to control it. If the traffic increases
too far, performance may collapse completely and almost no
packets be delivered.
Many factors can cause the =crying capacity of the
network to be exceeded and cause congestion, so the network
must be able to react and take some action to control it.Flow control techniques cannot really solve the congestionproblem because traffic is bursty, so any scheme which isadjusted to restrict each user to the mean traffic rate will
provide bad service when the user wants to send a burst oftraffic, even though there is no on gestion. On the other
hand, if the flow control limit is set high enough to permitthe peak traffic to get through, it has little value as a
congestion control mechanism when ssveral users send theirpeak traffic at once. What is really needed is a controlscheme that is only triggered when the system is conges-ed;
this scheme is called Congestion Control. Congestion controlis therefore the set of mechanisms whereby the network
maintains inpat traffic within liits that are compatiblewith its carrying capacity.
In most packet switched networks, if a packet remains
queued for too long at some node before arriving to i1tsdestination, retransmission will occur until a positiveacknowledgemeat is received, this process creates ths
ability to generate traffic within the network itself. With
high volumes of traffic the generation process can create atraffic volume equal to the remaining capacity of the
network. When this critical point is reached all buffers are
full and the network fails and rumains with no throughput;
that is, it cannot receive or successfully transmit a
packet, so that all nodes are caght in a deadly embrace.
32
This extreme case of congestion is called Lock-up and is
irreversible. The only way out is to purge the locked-up
traffic.
The general strategy is therefore preventativa in
nature, and consists of controlling congestion in the first
place. If infinite buffers were provided at the nodes,
there would be no lost traffic aal the network would only
congest at infinite load, well above the overload point (the
point of acceptable delay). If to the contrary buffer size
were very small, the network will congest even at small
traffic loads, well below the overload point. Thus there is
an optimal buffer size which makes overload and congestion
cecur at the same traffic level. rhis is desirable because
it is better to have a congestion control mechanism thatrejects overloading traffic than t3 have excess buffers iniwhich traffic may spend too much time to be useful.
Without effective congestion control, packet mean time
delay will tend to infinity and throughput will tend to
zero, as the network approaches the deadlock load. With
effective congestion control, mean time delay and throughput
will increase until they reach the saturation level and then
stay the same (flatten), remaining insensitive to furtherload increases. The curves in Fig. 3.1 show network
throughput and packet transit time delay versus offered
*load, for networks with and without effective congestion
control.
It shoull be apparent that with effective congestion
control, if the network throughput and packet mean transitdelay flatten as offered load increases, -he mean admittance
delay of packets to the network by the nodes must increase.
Fig. 3.2 shows a comparison between admittance delay and
transit delay, for packets in the network, as offered load
.0, increases.
33
A = With effective congestioncontrol
B = Without congestion controlNetworkthroughput
9 'iA
___________________________offered load
J44.4 Deadlock level
Network meantransit delay
B
A
Offered load
Figure 3.1 THROUGHPUT IND TRINSIr DELAY VERSUS OFFERED LO&D.
Some common types of strategies used in packet switched
"' netvorks for dealing vith congesti~n use pre-allocat.on of
resources, choking off input (that is, requiring the node
sender to reduce its traffic by se21ing it a Choke-Packst),
packet discarding, ar.d restricting the total number of
packets allowed in the network (Isarithoic control). Theireffectiver.ess and performance are analyzed ezt*nsively by
34
Mean A = Admitance delaydela B - Transit delay
A
B
I _______Offered load
_.Deadlock level
Figure 3.2 DELAY VERSUS OFFERED LOAD.
SCHWARTZ and SAAD [Ref. 17], Ireland [Ref. 18] and Davies
[Ref. 19]. Sin.ce pcor routing algorithms often lead to
congestion prblems, and local congestion often requires at
.,., least temporary modification of routing protocols, therouting problem caLnnot be completely divorced from that of
congestion control. However, in this thesis we concentzrate
on the routing protocols under the assumption that thebetter they are, the less congestion is likely to occur in
the network.
U 35
a TW V -. 77Z- .. 777 7 7. .,
E. ROUTING FRACTIONS
Under the appropriate assumptions the optimal rou-.ing
poblem can be formulated as a nonlinear multicomodity flow
problem, so that mathematical programming techniques can be
used to solve it. All the routing protocols mentioned so
far are basel on the assumption 3f the convexity of the
objective function. A very popular analytical model of data
communications networks, which rel~tes the packet tims delay
to the flews and capacities of the links, was intrcduced by
Kleinrock in [Ref. 20]. In this iadel, the steady state- time delay in each link is calculat.l explicity as:
Tij / (Cij - Fij)
where:
i : Is the node origin of Link (iJ)
j : Is the node termination of Link (i,j).
TiJ: Is the expected delay per message experienced
by messages using Link (i,j).
CiJ: Is the capacity of Link (i,jJ in messages p.rsecond.
FiJ: Is the data flow rate in Link (i,j) '. messages
per second.
The routing assignment is then selected to minimize the
expected weighted delay "D", of messages :raversing the
network, whers:
D SUN ( riJ I ij)
(i, J)
This analysis is based on the assumptions that traffic in
each link can be modeled as Poisson message arrivals with
independent exponentially distributad message lengths, and
that queueing delays are ths only nonnegligible source of
delay in the network. The first assumption is the result of
Kleinrock's famous "Independence Assumption", that messages
3.6
.e36
,.,'A " .' t" " ,:,' ' , ., .''''.2''',.'. . . .".. : . -. .","--, / ..X ''vv v''''v.,'. ,,.,,.v .' ,
a, a -S'4 *.*-'...*
loose their indentity at each nals and are aesi.r.ed new
independent lengths. The sacond asSumption, generalized by
Kleinrock in (Ref. 21], accounts for overhead and
, propagation delays. Kleinrock's model is appropriate for
static and qusi-static situations but less appropriate for
dynamic strategies.
A generalization of this model, where the contents of
the queues at the nodes are viewed as continous quantities,
rather than as an integer number if messages or bits, is
proposed by Segall in [Ref. 22]. rhe continuous nature of
his model Is justified by the fact that the affect of any
single message on the total systea performance should be
minimal. Using this continuous mode]l the routing problem can
be formulated as a linear optimal control problem. Solution
to this problem has been approached via a feedback form,
obtained by means of Pontryagin's minimum principle, and
dynamic programming. Another solution involves replacing
some constraints with penalty functions, and uses this
formulation to investigate how to minimize the average
message delay, while disposing of whatever backlogs may
exist in the network at any particular point in time. A
comprehensive study of the feedback sclution has been
presented by Ross in (Ref. 23], and solution has been
obtained for the case in which all messages have the sama
destinaticn and the inputs are constant in time. But the
approach runs into difficulties when the general case is
considered and no solution has yet baen obtained for it.A differeat approach proposed by Wozencraft [Ref. 2]0],
involves changing the objective function while keeping the
same continuous model. Instead of trying to minimize the
average delay, the idea is to minimize the maximum delay.
This minimax approach has been extsasively researched by Ros
in (Ref. 25]. The objective is then to minimize the maximal
saturation ratio (Fij / CiJ) in the netwcrk. Subsequently
37
the next maximal saturation ratio is minimized. It :a-ion
is continued in this way until a unique solution -o thecorresponding problem is found or we have exhausted all
links. At this point we can geraerate a finite set of
fractions (we will call them Routing Fractions) that
represent the proportion of traffic from node "A" (any node)
to node "B" (1estination node) that must be routed through
lnk "C" (any outgoing link of node "Al"). We will call this
procedure: "Successive Saturation".
An alternate solution which rejuizas less computational
effort consists of doing the first iteration of the
Successive Saturation method mentioned before, using its
results to scale the capaizty of the links in the network,
and then finding the set of flows that maximize the sum ofthe exess capacity (slack) of all links. At this point we
have found a finite set of Routing Fractions, as defined
before. We will call this procedure: "Maximum Slack". Both
solutions use linear programming techniques and therefore
enjoy the trei-ndous compatational benefits that they offer.
This thesis is part of a bigger effort to analyze theuse of Routing Fractions in the routing protocols of a
packet switched ccmmunications network. As such i+concentrates on the study of their behavior in a static
multiple path routing strategy. Nevertheless, the modeldeveloped as well as the computer simulation program contain
provisions for future experimentation on their use In a
dynamic routing strategy. These provisions allow theaddition of a computer program that calculates the values of
the Routing Fractions (which is the matter of another thesisbeing undertaken at the present tile). This program couldthen be called upon to recalculate the values of the routing
fractions, when the traffic load or topology changes in the
*network warrant it.
38
Ii°.,
F. LOOP AVOIDANCE
An important characteristic that any routing prctocol
. should have is to be "loop-free". Loop-freedom iefines a*.': p--r destination partial ordering of the nodes in the
network, which is used by the routing protocols for the
propagation of packets through the network, to preven- them
" from looping. A loop-flow exists in the routing protocol%when a packet can potentially loop, that is, it can arrivs
to the same node for the second time in its way to izs
destination. A given packet may be trapped in such a loop
for a significant amount of time. If a large numbs- of
packets start looping they can cause congestion (since
retransmission will occur until a positive acknowledgement
is received) which begins at the locus of the loop and can
s.-rad throughout the network. A loop-flow may exist even
if no individual packet ever loops.
The main reason for a routing protocol to be Loop-free,
is the reduction in packet time lelay. Other important
reasons include the simplification of higher level
protocols, and to prevent some potential deadlocks.
M ost rules and procedures used to develop loop-frea!
routing scheses, are extensions of techniques used in
network graph theory and flow pattern analysis. The
following are some interesting examples of routing
principles derived from these technigues.
If we call the destination node "Sink", and if nods "A
is on a path from node "B" to the sink, we say "A" -sdownstream from "B", and "B" is upstream from "A". In a
loop-free routing protocol, no node zan be both upstream and
downstream from any other node, for a given destination. If
'"T" is a set of links that form a tree in the network graph,
and 'F" is a set of links (not in "r") going "nto node "A",
then the set (T + F) is loop-free since -he links going into
*% .*' 39o, %
Z?
.4.ir .W_ -- - -
node "A" cannot be in a loop. Furthermore the set (T + F -
(ALL LINKS NOT IN ?)) is a tree. Sums of loop-frse tree
flows are not always loop-free as might be expected
[Ref. 26].
The set of optimal routes from all sources to a given
destination form a tree routed at rae destination (such tree
is called the Sink Tree). Therefore, it will not contain
any loop-flows, and each packet will be delivered to its
destination within a finite and bounded number of hops. If
a fixed routing is contructed by zhoosing a maximal tree in
the network graph (that is using only links directed towards
the sink), then the resulting flow is nonnegative and
loop-frae, and the set of all flows determined this way is
clearly convex and loop-free.
In general, no optimal routing protocol can have
loop-flows, a fact which will tend to minimize congestion.
Some routing algorythms o-annot be said to be loop-free but
if the small number of loops whi=h they do form do not
persist (transient), and do not lead to congestion or to a
" significant increase in average network delay, they may be
accepted as efficient. An example of this case is the new.... ARPkNET routing scheme SPF (Shortest-path-first) [Ref. 27]
where a small amount of transient looping occurs while the
network is adapting to a routing change.An algorithm that does not permit looping does not
necessarily result in lower delay, higher throughput, or
- ~ less ccngestion than an algorithm which does. However
research by Gallager [Ref. 28], has proven that the paths in
a minimum distance (optimum) solution, for a network with
link distances greater thin zero is loop-free.
40
,"~ %'
•..°',.-.".. ,.. . '.2-. .....,,.'. .' D.' .- "-.'. .' ,,,.% '. "A,.''- ".",."' "" ."". '."-. "" .•.• . .-.- -•.•A
IT- RAMT11 A O1 1- ilCKI S!IC _EQ COI!UIIC ONS NETWORK
1. MODEL CHAR&CTERISTICS
In the analysis of t..e =outing protocols of a packet
switched network, simulitio has proven to be a powerful
too! to investigate their performance and carry out
comparative studies of the differeat strategies. In scme
cases, such as with distributed dynamic routing, simulation
has been relied on almost exclusively because of the time
vaying behavior of the set of i.tarac-ive queues, whose
theoretical study is still in its infancy.
In simulation the network and its protocols are modeled
in terms of a computer program. Nevertheless, it must not
be an emulation seeking to duplicate every small de-.ail ofthe network operation. & simulation model that tries to
cover every detail is an extremely expensive, wasteful, and
slow-running operation. As a genaral rule one should only
. 4 simulate the system features that are relevant. Therefore
the simulation of a routing algorithm must describe theOR nodal queue handling procedures, and the routing process
itself, in full detail.The model we chose is that of a set of nodes connected
"-' by unidirectional communication links. The number of
outgoing cr incoming links is not limited by the model; this
- allows for the configuration of the network in almost any
topology desired. Each link has a buffer (we will call it a
queue) where packets are stored if the link is busy.
Transmission of packets from the queue of each link is done
in a FIFO (First in first out) fashion. Nevertheless, some
'a packet-prioritizing scheme can be easily added to the model,
wi.hout affecting its structure.
411*.,
Our model assumes noise-free llraks, that Is, packsts
arrive at their destination without any errors and no packet
loss is experienced during transmission. Similarly,
queueing delays and transmission tima are assumed to be th?
"- only nonnegligible sources of delays in the natwork.
Message traffic in a packet switched network can be
modeled as a Poissor process, with the length of the
messages gecmetrically distributed. Accordingly, our model
uses a message gnerator that genaratas poisson distributed
messages (by using exponentially Jistributad interarrival
times), and the number of packets for each message (message
length) is generated from a geometric distribution.
Traffic load is another parameter that can be set to any
. ?.esired level in our model, and two ways of doing it are
;rovided. The first accomplishes this by setting the
average number of new messages for the network per second.
The inverse of this number is then used as the mean of the
exponential distribution used to generate the message
interarrival times as mentioned before. The second does it
by setting the average number of packets per tessage. This
number is then used as the mean of th. geometric
distribution from which the length of each message (in
packets) is generated. Both numbers are real as inputs by
the model so they can be set to any desired value.
The model accepts as inputs the probability of each node
being -the source of a message, and the conditional
probability of each nods being the destination Qiven a
- source node. With these two sets of inputs, it calculates
the probability of each possible zombination of nodes(node-pair) being source and destination of a message. When
a message is generated, the model picks a node-pair randomly
and assigns them as source and destination of the message
1-0 le respectively.
42
As indicated in chapter thras, the Routing Ftictions
represent the proportion of traffi.c from nods "A" (any "ode)
to nods "B" (lestination node) that must be routed through
link "C" (any outgoing link of nole "") . This nanrs of
the Routing Fractions make them readily available for their
use in a multiple path routing scheme.
The routing protocol procedures of the model arecontained in a separate module (see routine 'PIZK.BEST.LINK'
in the program description sections , to allow them to be
easily changel if required. values of the routing fractions
corresponding to each link are real by the model, and used
by the nodes to select the outgoing link by which to route
each packet. This selection is lone by picking a routing
fraction probabilisticly, and using the link that
corresponds to it as the selectal outgoing link. This
procedure, as mentioned before, allows for multiple paths in
the routing of traffic destined to any node.
Since our study concentrates on their use in a static
routing scheme, the values of the routing fractions do not
change throughout the simulation :an. Nevartheless, themode & allows for the addition of a Routing Fraction
recalculaticn procedure, which could be executed when -he
traffic load or topology changes i the network require it.
This addition will change the mod-L's static routing scheme
into a dynamic one.
*'.. In order to make the model more flexible in adapting to
different testing conditions, we allow the network to be
configured to provide either Datagram or Virtual Circuit
services. When in the Datagram Service Configuration, the
route in terms of links to be traversed by each packet (on
its way from the source node to the destination node), is
determined sequentially. As the pac=kt arrives to each node,
the next outgoing link to be travgrsed by it is determined
$ by the model. This procedure is -hen repeated at each node
43
until the packet arrives to its destination node. There,
data from it is collected by the model for the statisticalanalysis of the network behavior, and then destroyed by the
model. In this way, each individual packet wi1 travarse a
route specially determined for it at each node, and nodirect relationship exists between this route anl the routesof the other packets of the same message. Consequently, in
this procedure packets of the sama message car (and most
often do) follow different paths through the network ontheir way to their destination. Yhis as we saw before,
complies with the characteristics of Datagram Service.
In the virtual Circuit service configuration, in
contrast, the complete route to be followed by a message isdetermined at the moment of its creation. This route will
then be followed by all the packets belonging to that
message. No route change is therefore experienced by anypacket after it leaves the sour=3 node. 9hen a packet
arrives at a mode, the model checks its predetermined route
and sends the packet to the corresponding outgoing link.
This procedure is repeated at every node until the packet
arrives to its destination, where data from it is collected(for the same statistical purposes as in datagram) and thepacket destroyed by the model.
As it is in most packet switched networks in operation,in our model the size of all the data packets is the same,but it can be defined to be any number of bits. In order todo this the model accepts this size as an input, and fixes
the size of all the packets to it. If there were arequirement to allow packets to be of different size, amechanism .c generate these sizes could be easily added to
the model.
Another important parameter of our network model is the
link capacity, i.e. the data carrying speed of each link, inbits per second. Our model reads t~e capacity of each link
4"
Uo-
and then uses it to calculite the time required for a packet
to traverse that link (transmission time). This
transmission time is further used to schedule the arrival of
the packet at the next node. The model can therefore accept
any value of capacity for each individual link, as long as
it is in bits per second.
As mnentioned before, each liLk has a buffer or queue to
store packets waiting for transmission. In our model we have
chosen not to limit the size of these queues, in order to
allow the study of the behavior of tho routing fractions
without introducing any other process that could affect the
results of the analysis.
Most of the parameters of the model can be changed very
easily, to allow the simulation of different testing
conditicns, as we will see. As an example the number of
nodes and links do not have a theoregicai limit, but must be
set before the simulation starts, and remain fixed for the
duration of the run. Nevertheless, there ars some indirect
ways of changing the topology of tha network during the run,
such as setting the corresponding routing fractions of any
link to zero. This will prevent aaymore traffic from going
into it. In this way we can represent a link failure.
B. PARAMETERS OF THE PACKET SWITCHED NETWORK
4 The definition of the different variables whose values
must be read is inputs by the program is the following:
1) N.VODE : Number of nodes of the network, integer number.
2) N.LINK : Number of links of the network, integer number.
3) CONNECTED : Integer two-dimensional matrix that indicates
the way the links are connected in the network.
Each row represents a link and each column a node.
So position CONNECTED(A,B) must have a value of 1if link 'A' starts in node 'B', a value of -1 if
4&5
&Z* e.
link 'A' ends in node 'B' and a value of 0
elsewere.
14) PR.ORIG : Real 1-dimensional matrix, each row represents
a node and contains the probability of a message
-'' being originated in that node.
.: 5) PR.DEST : Real two-dimensional matrix, fach rowrepresents an origin node and each column a
destination nole. So position pr. dest (AB)
contains the probability that a message that was
originated in riode A his as its destination node
IBe,
6) ROUT.FRAC : Real two-dimensional matrix, 4ach row
-. represents a link and each column a node. So for
position ROUT. PRAC (k,BI , it contains the
proportion of the traffic destined to node 'B',
that should be sent by link 'A' i.e. routing
fraztion of link 'A' for node 'B'. If no traf ficfor node 'B' can be seat by link '' its value
should be zero. For our study (static scheme),these values do not change during the simulation
run. For the future us=. of this program in a
dynamic routing scheme, these will only be the
initial values of the routing fractions. During
the simulation run, their values should be
4. recalculated every time the conditions in the
network so require (see event 'NEW.ROUT.FRAC' in
section "D" of this chapter).
7) LNK.CAPACIY : Integer 1-dimensional matrix, each row
represents a link and contains the capacity of___. that link in bits per second.
8) TINE. LINIT : Real number that represents the length ofA time the simulation run will last, in seconds.
r. .. 9) REPT.TIME : Real number that r.pre.ssnts the interval of
time between 'WET.REPORT' events, in seconds.
'46I. .
a.-...
-- J VIV '.W•VV
10) UP.TIME " Real number that represents the interval of
time between 'NEW.ROUT.FR&C' events, in sconds.
11) COLL.INT : Real number that .apresents -he interval of
time between 'DAT .COLLECrION' events, in seconds.
12) LAP.TIME : Real number that rapresents the int-erval oftime between 'LAP.TOTALS.RESET' events, in seconds
(see event 'LAP. TOTALS.RESET in section "D" of
this chapter).
13) L!NGTH.PKT : Integer number zha: represents the lengthof i packet in bits.
14) AVG.MPS.NET : Real number that represents the average
number of messages per second th. n.twork will
genera te.
15) AVG.PKTS.MSG : Real nmber that represents the average
number of packets-per-message the network will
generate.
16) PBNT : Integer number that represents the printing
condition for the run. Depending on 'he value set
V. it can print the following:.
0 =a> Initial data, network topology, net rsparts,data collection messages, period reports,
collect period data messages, restart
period totals messages, lap totals reset
messages, destruction message, and end of
simulation messagg.
I -> All in 0 plus trace of all packets.
2 -> All in 0 and 1 plUs information of all links
every time it performs a 'NEW.MSG' or an
.END.XT1 event.
17) O.DE : liteger number that represen-s the configuration
of the network for the simulation. It can take th-following values:
1-> Dataaram service networkA 2 - Virtual Circuit service network
47
-' I I l I i i i I l i I I . i l -i . . . . . .
A " . : % " """". +
The 1opolcgy of the network used for our simulation :s shown- in figure 4-I. It consists of a set of thirteen nodes
connected by sixty unidirectional links. ro simplify the
drawing each line interconnecting two Lodes in, Figure 4.1represents two links, one in each direction. Each link inour model is assigned a number for its idsatification.
Appendix B c3ntains a list of the link numbers with their
corresponding origin and termination ncdes. As mentioned
before, each link owns a giaeue (or buffer) where packets are
stored temporarily while waiti ng for their transmissior ifthe link is busy. These queues have no limit in their size.
- The link capacity (the rate at which data is carried
through the link measured in bits per second) of all linkswas set to 20,000 bits per second, which is the transmission
rate that modern modems allow over dedicated lines. Thepacket length used was 1000 bits, which is approximately themaximum packet size allowed ia ARPANET (1008 bits).Transmission time is calculated by the model every time itstarts to transmit a packet .through a link. For this it ,sesthe capacity Df the link involved, and the packet length.
The probability of a node pair to be selected as sourceand destination of a message, was initially set to be equal
. for all nodes. Later a non-uniforn listribution was also
4 used to compare the behavior of the routing scheme in
balanced and unbalanced traffic situations.
The mean 2umber of messages per second for the network
-- and mean packets per message where set to different valuesto analize the response of the network to different traffic
loads.
Two sets of routing fractions were used. The first setwas calculated by the successive saturation method and the
second set was calculated using the maximum slack approach.
as explained in chapter II1. Both sets where tested underthe same network and traffic conditions.U 48
.'- F * *"9,, 'q'2':',** ,.'.'*,'... . ..... . .. ,...*'.- ...- ,.'..*:':-.2."'. .-. . . . . . ." ...:"..;-z . -. , . -.. .. . _
-'f
-.PI IL
.113
Figure 4. 1 NETVORK rOPOLOGY.
-" C. CONmPUTER LANW/&GE
The siulation of our packet switched natwo-rk model was
dons using the SIMSCRIPr 11.5 Zo~mputer Language. This'.language was selected bkcause it pcov-6des an -_zc,%llent means
for discrete-event simulation. Another important
characteristi of this language is that it allovs the use of
Fortran subroutines. This feature makes it possible to take
49
U% ? ' . . . . .. *.* . f. .
. • -t ame
(m.e e ee ee ~ . q a e o. ee'
"e" em~ *e" ° • m -
• e e
q ' -
.-J
advantage of existing subroutines or programs, rather J-han
to waste time reprograming them in SIMSCRIPI 11.5.
SIMSCRIPT 11.5 language uses e.glish-like statements and
allows for the insertion of some ax -a words, that mak- it
•_ f."easier to real (sven by someons wi-4: little przactice in this
lanquage). fhese characteristics make a program writ-aen in
Simscript 11.5 almost self-documented and only some short
comments are needed. Nevertheless, care was taken to make
the program as modular and structured as possible, to make
it easier to change and understand. in additior. .c the
simulation p-ogram, two other programs where written in
Fortran language for the display and graphinq of data
collected from a simulation run, using the Disspla graphics
software package.
D. SIMULATION PROGRAM DESCRIPTION
In writing the program one of the main objectives, as
mentioned before, was to make it flexible so as to adapt to
possible variations in the network topology or rsquirements
of -he simulation. Consequently the values of the input
parameters can be set to adipt to most simulation
requirements, as seen before.
The program is divided in three major parts, the first
part is called the PREAMBLE, the second is called the .AI.,and the third contains all the Subroutines and Events.
The preamble contains mode and limension d.finit-ons of
Global Variables, declaration of Events and Event
priorities, and definition of Statistical Variables and
program Functions.
The main program is the drive; of the simulation, it
calls and schedules the initializing Rcutines and Events,
and starts and ends the simulation.
50
p..
:1° AL .. !.6
The modularity in this program is mainly accomplished by
dividing the rest of the -ode into subroutines and Even-s.
The main difference between a Subroutine and an Event, is
that a Subroutine is called upon to perform a function (orprocedure) by another Subroutine or Evant, whereas an Event
is scheduled to occur (perform its function) at a certain
point in tima. While Subroutines return control to their
caller an Event returns control to the timing mechanism of
the SINSCRIPT 11.5 system (we will call it the Timing
]Routine) .
The different Subroutines and Events contained in the
program, and the functions they perform, are t-he following:
- ROUTINE NETWORK. CONSTRUCr ION
This routine reads the number cf nodes aid links, andconstructs the network based on those parameters.
- ROUTINE INIrIALIZATION
This routine reads the values of the initial conditions
chosen by the user and ititializas all Global Variables
for the simulation run. It thin finds the probability
of each possible pair of aodes being source and
destination of a message, by using the input variables
'PR.ORIG' and 'PR.DEST' using probability's General
Multiplication rule. After that it stores these values
and the corresponding node names in the matrix
'P1IRS(A,BC)', where "A" is the probability of the
pair, "B" the source node, and '." the destination node.
- ROUTINE PRINT.INIT.CONDIIONS
This routine prints the initial setup of the network,
and values of the initial con'.itions chosen for the% simulation run.
- ROUTINE SELECT.MNODESThis routine selects & node-pair by picking a razdom
number uniformly distributed from 0.0 to 1.0, and
comparing it with all the node-pi-r probabilities listed
51
in an a ccummulat iv a fashion. Thea node roa:
corresponding to the probability range where the random
number falls, is selected. I: then assigns the numbe:
corresponlig to the row of tie matrix 'PAIRS' that
" contains the aode-pair selected, to the variable 'LOW'
and returns this value.
- ROUTINE TO PICK.BEST.LINK GIVEN N).DE, DE.ST
This routine selects the best outgoing link, given the
node where the packet is (I3.DE), and the packet
deszinatian (DE.ST). It first finds the value of the
routing fraction of each outgoing link of 'NO.DE' that
corresponds to the destination node 'DE.ST'. Selection
is then done by pizking a random number uniformly
distributed from 0.0 to 1.0 and matching it to the
values of the routing fractions found, listed in an
accummulativs fashion. The routing fraction that
corresponis to the range where the number falls,
determines the link to be used. The name of the link
chosen is returned as the value of the variable
B'ST.PCK'.-,ROUTINE TO SET. VIRTUAL .CIRCUII GIVEN START.NODE AND
END.NODE YIELDING IY' AND 'BE.LI'
This routine finds the Virtual Circuit for a message,
given its origin node (START.NDDE) and destination node
(END. NODE . To do this it calls the routine'PICK.BESr.LINK' with the values of 'START.NODE' and
'END.NODE', and sets a counter to 1. When the value of
'BST.PCK' is receiv ed back, it compares the
termination-node of that link with 'END.NODE'. If they
- do not coincide, it calls 'PICK.BEST.LINK' again, but
this time with the name of the termination-node of
IBST.PCKI and 1END.NODE1. It then increases the counterto 2. The process is repeated until the termination node
of 'BST.P::K', and with 'END.N3DE' are the same. The
52[-.
a. ' - ." ,- ,- ,- .- • - , -, o - , . • • . . ,. . . . - . . .- . . . .. . ... .4.4 , % . . .. . . - . - - . . - . . . . . . . . . . . . . .
number of links in the Virtual Circuit is then reur-- rcu-: -6-urned
as the value of the variable 'I', and the name of hs
succesive links cn the Virtual ircuit, as the values of
the array 'BE.LI'.
- ROUTINE PERIOD.REPORT
This routine calculates and prints th4 status and
statistical data of ths network, collected by the system
during a period. The starting time of a period is taken
from the variable ,LAST.PERIOD' (which is reset every
time this routine is sxecuted), and the ending time from
'TIME.V'. The ro utine 'RESTART.PERIOD.TOTALS',
reinitializes all the totals an variables used in each
period, so status and statistical data collected during
each period is independent of the rest.
- ROUTINE COLLECT.PERIOD.DATA
This routine calculates and outputs some period data to
'UNIT 9', for further graphing and/or analysis. The
starting time of a period is taKen from the variable
'LAST.PERIOD' (which is reset every time this routine is
executed), and the ending time from 'TIME.V'. The
'. routine 'RESTART.PERIOD.TOTALS', reinitializes all thetotals aad variables used ia each period, so data
collected during each period is independent of the rest.1'Unit 9' must be defined as one of the system units
(printer, tape, mass-storage, etc.), before the program
can run.
- ROUTINE RESrIRT. PERIOD.TOTALS
This routine reinitializes the totals and global
variables used in a period, and sets the period starting
time, every 'UP.TIME' seconds.
- EVENT NEW.MSG
This event calls the routine 'SELECT.NODES' and using
the value of 'LOW' returned by it, finds the origin and
destination nodes for the message from the corresponding
53
...
:'I., : . . . ... ..; ..:/ 4. :.;; . <.<:;::}. . . .,-,;.;,:-.-.-...-.- -.:...:.:
".. .. . . ...,
row of the matrix 'P&IRS'. Oaa= this is don- ths eveInt
picks a geometrically distributed random number,
following the procedure indicated in appendix A, and
uses it as the number of packets for this message.
If 'MO.DE = 1' has been selztad, the evert calls'PICK.BEST. LINK' (giving the source and destination
nodes of the message), to find the best outgoing link
(from the source noda). It -. en finds the number of
packets ia the Propagation Queue (queue where packets
are stored for a period equal to their transmission-timeover that link, to simula-e that they are been
transmitted) and the Status (c=lition that indicates if
a packet is being transmitted by the link) of this link,
and saves this information for further use. After doing
+his, it generates the packets indicated by 'NUM.PKTS',
and for each one, it creates a record wirh the name of
the scurce node and files it in the 'TRIP.RECORD' of the
packet. The event then files the packets in th. queue
of the outgoing link selected.
If 'MO.DE - 2 has been sel-cted, the event calls
S'SET.VIRTUAL.CIRCUIT' (giving the source and destination
nodes of the message), to fiad the Virtual Circuit for
the packets of the message. It than uses the first link
of 'BE.LI', as the the best outgoing link (from the
source node). rhe event then finds the number of packets
in the Propagation Queue and the S-.atus of this link,
and saves this information for farther use. After thisit creates each of thq packets indicated by 'INU.PKTS',
records the rest of their Virtual Circuit 4n their
'TRIP.RECORD', and files them in the queue of the link
selected.
When the process is completed, for any 'MO.DE' selected,
the event recalls the values of the Status and
Propagation Queue size of the link selected, and only if
54
I'.,' -. ,,-...' X ',, ;v,- ,-.-',.'..:-," * , ."-' '- -. -- -. •" - - .. . . . .- - - - .. . . ..'4', ,= ; -,., "gnA,,M ,, 2 .. _ :,., .. ,-, . , . , ,.. .. . ,. .; . o .,., .. , . . . .
*.
they were both zero (which meias no packet is currently
being transmitted by it or link is idle), schedulss an
event START.XMT for this link to be executed "NOW". It
..&s important to mention that events scheduled to be
executed NOW, within an event, are executed as soon as
. the event returns control to the timing routine. They
preceed events having the same avent-timu (time at which
they must be execu:ell, that may have been scheduled
before.
The event NEW. MSG then picks a random number
exponentially distributed as the new message
interarrival-time, ani schedules another avent NEW.•SG
at that time from now, if there is enough time before
. the end of the run. If there is not enough time left it
does not scheduled it. after this the ;event returns
contrcl to the Timing Routine.
-. EVENT START. XT GIVEN LI. NK
This event removes the first packet from the queue of
'LI.NK' and finds out its destination node. If this
node coincides with the termihation-node of 'LI.NK' It- schedules an event 'ARRIVAL' for this litk, in
transmission-time seconds from now. If they do not
coincide, it schedules an event 'XMT.END' for this link,
in transmission-time seconds froa now. After scheduling
one of these events, it files the packet in the
Propagation Queue of ILI.NK' a.d returns control to the
Timing Routine.
- EVENT END.XHT GIVEN XMT.LINK
This eve.r removes the packet from the propagation queue
of 'XMT.LINK'. If 'O.DE = 1' has been selected, itchecks if the termination-node 3f 'IXT.LINK' is equal to
any of the records of the packet's 'TRIP.REZDRD'. If so,
the packet has looped, ana the event collects
information about it, destroys the packet, and returns
.55
-.J
K. W-
control to the timing routine. If not, the event calls
'PICK.BEST.LINK' with the termination-node of 'XMT.LINK'
and the destiation node of the packet to find ths newbest cutgoing link. It then finds the number of packets
in the Propagation Queue and Status of this link, andsaves this information for furthar use. After doing
this, it creates a record with rha name of the
termination-node of OKKT.LINK', and filas i t in the
'TRIP.REC3RD' of the packet. rhe avent then files the
packet in the queue of the outgoing link salected.
If 'MO.DE = 2' has been selectad, the event reads the
next lirk of the pazket's Virtual Circuit from its
'TRIP. REMORD'. It then finds the number of packets in
the Propagation Queue and the Status of this link, and
savas this information for further use. After this, it
files the packet in the queue of that link.
When the process is complsted for any 'HO.DE' selected,
except fcr the case when the packet loopel in 'NO.DE =1' (in this case control has already bz.en returned to
the timing routine, and no furthar action is taken by
the event), the event recalls the values of the Status
and Propagation Queue size of the link selected, and
only if they ware both zero, which means no packet is
currently being transmitted by it (or link is idle),schedules an event START.Xmr for this link to be
executed "NOW". Finally the avqnt returns ccntrol to
the Timing Routine.- EVENT ARRIVAL GIVEN ARR.LNK
This event removes the first packet from the PropagationQueue of 'ARR.LNK', reccrds information about it and
destroys the packet.
- EVENT NEW.ROUT.FRkC
This event was added to allow for the further use of
this program, to investigate the behavior of the Routing
56
I. .. , , . ' '¢ ' .. : .',-' , . .. _"...- .. .. . .. .,. . . . . . • . .. .. . -. . . .
47
Fractions in a dynamic routing scheme. This can be
accomplished by inserting in this event, or calling from
it, a subroutine to recalculate the Routing Fractions.
To aid in this recalculation of the Routing Fractions,
this event collects information of queue length,
utilizatin per period (percentage of time the link is
busy per period) , and utilization per lap (percentags oftime the link is busy per lap), of every link.
The new subroutine can then use the information
collected by this event, and any of the global variables
of the prDgram like 'LNK.CAPA:-I]Y ° and 'CONNECTED', to
find the new routing fractions. By setting the value of
the variable 'UP.TIME', the event INEW.ROUT.FRACI can be
executed at any time 5uring the simulation run, when the
conditions in the network require it.
- EVENT LAP.TOTALS. RESET
This event reinitializes lap totals of the simulation,
every 'LLP.TThEI econis. The purpose of the lap totals
is to allow the simulation to keep statistics of link
utilization for arbitrary periols (laps) to be selected
by the user by setting the value of the variable
'LAP.TINR'. The ability to calculate link utilization
per lap was added to allow its use by the event
,NEW.ROUT.FRAC' when the dynamic case is analized.- EVENT N!T.REPORr
This event calculates and prints status and statistical
data of the simulation, up to the time it is performel.
Since variables and totals involved are rot reset duringthe run, every time this event is performed its
calculations are done for the period from time z4ro up
to the time of execution. This event is executed every
'REPT.TIME' seconds.
- EVENT DATA.COLLECTION
*4. 57
%.
.. This event calculates and outputs some simulation data
to 'UNIT 8' for further graphing and/or analysis. Since
variables and totals involved are not reset during the
. run, every time this event is performed its calculations
are done for the period from tixe zero up to the time of
.4 execution. 'Unit 8' must be defined as onq of the
system units (printer, tape, mass-storaga, etc.) , before
the program can run.
-EVENT DESTRICTION
This event cancels all events that rqmain scheduled for
execution in the Timing Routine. So after execu-ion of
this event, control of the program retu_-ns to statement
following 'START SIMULATION' in the 'MAIN' (or driver of
the program) , and the simulation can be ended.
1. SIMULATION OUTPUTS DESCRIPTION
The main purpose of any simulation is to provide a maans
tc observe and measure different parameters of interest, of
a process that resembles the actual bahavior of a specific' system. Thus an evaluation of its performance and other
important characterist-ics can be obtained, without the need
for a physical implementation of the system. To accomplish
this, five modules of our program whare designed to collect,
calculate and output information aboat the simulation run.4 They are:
-Routine ' PRINT.1NIT.CONDII:NS'
-Routine 'PERIOD. REPORT'-Routine 'COLLE-.PERIOD. D&Tk'
-Event 'NIT.REPORT'
-Ev ant 'DATA.COLLECTION'
- The following subsections describe the contents of outputs
generated by these modules, and include a brief explatation
of the names used in them (which zust be complemented byinformation given in previous sections of this chapter).
I FZj 58
'"In addition to these modules the program of Appendix F
was written to allow the graphing of data collected by the
event 'DATA.C3LLECTION' using the Disspla Graphics Software
. package. Sisilarly, the program of Appendix G allows
graphing of data collected by routine 'COLLECT. PERIOD. DATA'.A sample cf some of the plots these programs can produce is
shown in Appendix D.
The routine 'PEINT.INITIAL. CONDITIONS' performs two
functions. First, it prints a report of the network s9tup
and initial conditions of the sinulation (we will call it
"Initial Rsp rt "). Second, it outputs most of this
information to 'Unit 81 and 'Unit 9', for its further uss in
the graphing and/or analysis of ata collected by Evqnt
'DATA.COLLECTION' and Routine 'COLLECT.PERIOD.D&TA',
respectively. Units 8 and 9 can be any unit of the computer
* system used, previously defined by the user.
The report printed by this rouzine is divided in
four sections, which contain the following information:
a) A list of the following variables -hat control the
simulation indicating their values read by the program:
- NUMBER OF NODES
Number of nodes of the network, as indicated by the
input variable 'N.tIODE'.
- NUMBER OF LINKS
Number of links of the network, as indicated by the
input variable 'N.LINK'.
- DURATION OF SIMULATION
Time in seconds when the rua will stop, as indicated
by the input variable 'TIME.LI4IT'.
- REPORT GENERATION INTERVAL1W
Time interval between 'NET.REPORT' events inseconds, as indicated by the i.put variable
'REPT. rINE'.
59
42.
- ROUTING UPDATE INTERVAL
Time interval between *IEW.ROUT.FRAC' events in
seconds, as indicated by the input variable
'UP.TINE'. This is a provision for the future use
of the program in the analyisis of the dynamic case.
- DATA COLLECTION INTERVAL
Tim interval between 'DATA.COLLECTION' events in
seconds, as indicated by the input variable
-. 'COLL.INT'.
- LAP INTERVAL
Time interval between 'LAP.TOTALS.RESEV' events in
seconds, as indicated by the input variable
*LAP.TIBE'.
- PACKCT LENGTH
Length of packets in bits, as indicated by the input
variable 'LENGTH.PKT'.
. - AVG. MESSAGES PER SECOND FOR NETWORK
Avera;e number of messages-per-second for the
network, as indicated by the input variable
§¥VG.dPS.NET'.
- AVG. PACKETS PER NESSAGE FOR NETWORK
Average number of packets-per-message for the
network, as indicated by the iaput variable
". -. ' kVG.PKTS. BSG'.
-'PRINT CONDITION
Print condition for the run, as indicated by the
input variable 'PRNT'.
M"BODE SELECTED
Type of service to be provided by the network, asa,.
indicated by the input variable 'MO.DE'.
• b) A list of all the links in the network including theirF7 name, node origin, node destination, and capacity (in
bits per second) , as indicated by the input variables
'CONNECTED1, and 'LNK.C&PACITY'.
60
c) A list of the Routia; Fractions that have non-zero
values, influding the nodes to which they correspond, as
indicated by the input variable OROUT.FRALC'.d) A list of ths node pairs that have non-zero probability
of being selected as origin and de.stination of a message,
as calculated by the program frot the values of the input
variables 'PR.ORIG', and 'PR.DEST#.
Data output by this routine to 'Un it 8' of the system
includes the folloving:
- NUMBER OF NODES (same as Initial Report).
- NUMBER OF LINKS (same as Initial Report).
- NODE SELECTED (same as Initial Raport).
- PICKET LENGTH (same as Initial Report).
- AVG. MESSAGES PER SECOND FOR NETWORK (same as Ini-ial
Report).
- DURATION OF SIMULATION (same as Iaitial Report).- ROUTING UPDATE INTERVAL (same as Initial Report).
- LAP INTERVAL (same as Initial Report).
- DATA COLLECTION INTERVAL (same as Initial Report).
.. - AVG. PACKETS PER MESSAGE FOR NETWORK (same as Initial
Report).
Data output by this routine to 'Unit 9' of the system,
includes the same information indicated for 'Unit 8', except
for "DATA COLLECTION INTERVAL" which is not included.
"_a :'2 . L _U 9. J .R 21 T
The routine 'PERIOD.REPOar' collects sta-us and
statistical information during a period of -he simulaticn,
and prints it in a report-like format (we will call it"Period Report") . As mentioned before, information of each
period is independant from the rest, since the routineh -'. 'RESTART.PERIOD.TOrALS' r2.initializgs all the variables and
totals involved. This report is divided in thq following, P4three sections:
61
% .. ....
a) A list of all the links In the network (including -heir
origin and destination nodes for ease of identification),
indicating their period utilization (proportion of time
being involved in transmission or "busy") ; the mean,
maximum value, and standard deviation of their "queue
size" for the period; and the present size of their queue
and propagation queue.
b) A list of the status and statistics of the network, which
includes the following information:
- AVERAGE LINK UTILIZATION
Average calculated using the "1in k utilization"
values of all links, for ths period. Its worth
noting that a value of 'MAXIMUM LINK UTILIZATION' isnot included as a periodical statistic, because for
any useful analysis the traffic load usel will cause
this quantity to be 1.0 for most periods, and
therefore it loses its significance.
- AVERAGE QUEUE SIZE
Average calculated using the "mean queue size" of
all links (in packets) , for the perio4.
- MAXIMUM QUEUE SIZE
Is the largest value observed, of the "queue size"
of all links (in packets), during the period.
- STD.DEV. OF QUEUE SIZE
Is the average value of the "standard deviation" of
the "gueug size" of all links, for the period.
- NUMBER OF MESSAGES GENERATED (For the period).
- NUMBER OF PACKETS GENERATED (For the period).
- AVERAGE PACKETS PER MESSAGE (For the period).
- NUMBER OF PACKETS COMPLETED TRIP (During the period).
- NUMBER OF PACKETS THAT LOOPED (During the period).
- TOTAL NUMBER OF PACKETS STILL IN NETWORK (At the end of
the period).
62
po"e
c) A list of statistics of the packets that arrived tc their
destinatiom during the periol which includes the
following information:
- AVG. LENGTH OF TRIP
Average of "trip length" values of all packers that
arrived to their final destination during the
period, .In "hops".
- AVG. TOTAL TRIP TIME
Average of "trip time" values of all packets that
arrived to their final destinalicn during the
periol, in seconds.
- AVG. TIME SPENT IN QUEUE
Average of "mean time spent in queue" values of all
packets that arrived to their final destination
during the period, in seconls.
- AVG. TIME PER HOP
Average of "mean time per hop" values of all packets
that arrived to their final destination during the
period, in seconds.
3. PERIOD 2A&
The routine 'COLLECT.PERIOD.DATA' collects status
and statistizal information during a period of the
simulation (we will call it "Perial Data"), and outputs it
to 'UNIT 9', for its further graph and/or analysis. As in
the case of Period Report, information of each period is
independent from the rest. Data collected and output by
this routine corresponds to the following information:
- Time of execution of the routin (or end of the period),
in seconds.
- TOTAL NUMBER OF PACKETS STILL IN NETWORK (Same as Period
Report).AVERAGE LINK UTILIZATION (Same as Pariod Raport).
-AVERGE QUEUE SIZE (Same as Perlol Report).
-MAXIAum QUEUE SIZE (Same as Period Report).
63
- AVG. LENGTH OF rRIP (Same as Period Report)
- AVG. TOTAL TRIP TIME (Same as Period Report).
- AVG. TIME SPENT IN QUEUE (Same as Period report).
A - NUMBER OF P&CKETS THAT L3OPED (Same as Period Report)
4. NEWORK REPORT
The event 'NET.REPORT'• when execu t ed, collects
status and statistical information about the simulation and
prints a report (we will call it "Network Report"), that
rasembles the Period Report. The main difference be ween
this two reports is the time frame used to compute the data
used by them. While for Period Report variables and totals
used are reset at the end of each period, for Network Report
they are never reset. In consecuenze, each Network Report
% ccntains information for the "period" from time zero (start
cf simulaticon , up to its execution time.
The Network Report is divided in thres sections,
which contain the following information:
a) A list of all the links in the network (including their
origin and destination nodes for ease of identification)
indicating thei.r u-ilizition up to now; th. me-an, maximum
value, and standard deviation of their "queue size" up to
now; and the present size of their queue and propagation
queue.
b) A list of the status ani statistics of the ne.twork, which
includes the following information:
- AVERAGE LINK UTILIZATION
Average calculated using the "link utilization"
values of all links, up to now.
- MAXIMUM LINK UTILIZATIONLarges. value observed, of the "Link Utilization"
for all links, up to now.
- AVERAGE 2UEUE SIZE
I6
:- ,. .-%:.- -.-. .. ,.-'%"-" ..- ,. .' .', -. -'. ",.,, . " "%"% % .- .- ,-., . . ,- . -, -%-. . . .- -.. . .- -
A' vera~e calculated using the ,,imean queue si zq,, of
'--p .-
-- all links (in packets), up to now.i - MAXIMUM QUEUE SIZE
" The largest value obs.erved, of hro "queue size" of';:'all links (in packets) , up to now.
9 .
. - .- STD.DEV. OF QUEUE SIZE9.m -The average value of the "standad daviaio " of sihze
"lueu siz " of all links, p to now.
, - NUMBER OF MESSAGES GENERATED (Up -to --ow)•T .- NUMBER OF PACKETS GENERATED (Up to now)•.
- AVERAGE PACKETS PER MESSAGE (Up to now).
-", '- NUMBER OF PACKETS COMPLETED TRIP (Up to now)•% - NUMBER OF PACKETS THAr LOOPED (Up to now).
- TOTAL NUMBER OF PACKETS STILL IN NETWORK (Up to now)
w - AVERAGE PACKETS IN THE NETWOORK (Up to now).c) A lis of statistics cf the packts that arived to thei_
destination up to now, which includes the following
' ;"- information:S- AVG. LENSTH OF TRIP
/ ',Average of "trip length" values of all packets that• .arrive.d to their final destination up to n.ow, in
.4.
- . "ho ps"'- AVG. TOTAL TRIP TIME
he"Average of "trip time" values of all packets thae
.9-
aerived to hair final dsinaa.ion up to now, in
': second s.
. - AVG. TIME SPENT IN QUEUE. ,..Average of "1mean time spent in queue,$ values of all- " packets -hat ar.-ived to their final !c-stiration up
- N"Bo now, in seconds- AVG TIME PER HOP
; Average of "mean time- per hap" values of all packe.ts-NMERthat Oarived -o thAir final destination up 3 now,
°"" 65
-9,.. >i ,.- ', 'i ,.- ''''',,';,,, .. ' ... ,..,.,. - , " . ' " .-,-".-•-"-•-"-"-", . ,.'. - . - - .... , . : , . - ,.-. . -. -.-. . . .: .- . . . .-. . '."
5~~. _NETWORK DATA
As in the case of the Natwork Report, the event
'DATA.COLLECTION' when executed, collects status and
statistical information of the simalation (we will call it
"Network Data") , for the "period" from -time zsro (start of
simulation) , up to its ex'cution tize. It then outputs this
data to 'UNIT 8', for its further graphing and/or analysis.
Data collected and output by this routine corzesponds to the
following information:
- - Time of exe-ution of the event, in seconds.
... - TOTAL NUMBER OF PACKETS STILL IN NETWORK (Same as Network
Report).
- AVERAGE LINK UTILIZATION (Same as Network Report).
- AVERAGE QUEUE SIZE (Same as Network Report)
- MAXIMUM QUEUE SIZE (Same as Network Report).
- AVG. LENGTH OF TRIP (Same as Network Report).
- AVG. TOTAL TRIP TIME (Same as Network Report).
- AVG. TIME SPENT IN QUEUE (Same as Network Report).
- - NUMBER OF PACKETS THAT LJOPED (Saie as Network Report).
- MAXIMUM LINK UTILIZATION (Same as Hetwork Report).
- AVERAGE PACKETS IN THE NETWORK (Same as Network Report)
* % .-
-a
p.-%. .6
-4 e
. . . . ~ i -A , ' [ ? ,r+ + , + , +" , , T -
,... . . .. . . . . . .
-.
T. CONCLUSIONS iND REC3MENDTIOIS
A. CONCLUSIONS
The simulation was run at diffr ent traffic loads, which
allowed us to determine the maximum load that the
routing-fraction protocol could handle with this network
configuration before saturating (we will call it satura-ion
load). As shown in Figure D. 1 of Appendix D, for the
uniformly distributed traffic case with all link capacities
set to 20,000 bits-per-s.cond, saturazion load was found to
be 440 packets-per-second into the network. This load was
then generated usin difeen egrees of traffic_granularity, i.e., differEnt combinations of
messages-psr-second and packets-per-message (both for the
network).
As shown in table 1, for -ha different degrees of
traffic granularity tested (fo: the saturation load
maintained at the same level) the _anning average of packets
in the network, total time delay of packets that completed
trip, average time spent in queue of packets that completed
trip, and average queue size, where found to increase
proportionally with the number of packets-per-message.
The maximum link utilization for the aetwork was
observed to decrease by a very small amount as we increased
the number of packets-per-message. This reduction in link
utilization is caused by the time fiztor that is included in
its calculation (link utilization represents the propor-ion
of time a link is involved in trzasmislon of packets or
"busy"), and the lower average namber of messages received
by the nodes for the same period. As we increase the number
of packets-per-message while keepi.ng the same saturation
67
*.--°- -* --- * & iIi~ ii:::
ABLE I
GRANULARITY COMPARISON
ROUTING FRACTIONS
(440 msg/sec 223 msg/sec 110 msg/secpkt/msg 2 pkt/msg 4 pkt 'msg
RUNNING AVERAGEPKTS IN 116.17 252.04 468.06NETWORK(in pkts)
TOTAL TIMEDELAY PKTS 0.260 0.562 1.056
COMPLETING TRIP(in secs)
AVERAGE TIMEIN UUEUE PKTS 0.164 3.466 0.962COm LETING TRIP
(in secs)
AVERAGE QUEUESIZE 1.22 3.48 7.09
(in pkts)
level, we reluce the number of messages-per-second into -.he
network. These changas will inzrease the message
interarrival-time which is exponentially distributed with
mean: ( 1 / messages-per-second ). In addition for the same
period, fewer nodes will receive new messages. The final
effect is that on the average, there will be an increase inthe time queues will be empty waiting for a new packet to
%arrive, aid maximum link utilization will be slightly lower.
The running average number of packets in the network at
the saturation level, for the different degrees of
granularity, was found to be apr ximatelly equal to the
theoretical value given by Little's formula [Ref. 29], which
states that:
E(N) - E(T) x L
where:
E(N): Average value of packets i the network.
68
•.
E(T) : Average value of time delay.
L : Average packets per second entering the network.
This results zonfirm that the proto.-ol behaves correctly for
different traffic situations and conforms with the
theoretical values expected.
A series of tests where perforaed using unbalanced
traffic generation patterns, to investigat e protocol
performance under these conditions. The results of cours-
showed that for unbalanced traffic situations performance
degraded, due to the use of routi.ng fractions which where
calculated for a different (uniforaly distributed) traffic
load.
For the static routing case, than, an estimation of the
traffic distribution is of primary impcrtance if routing
*fractions are to be used, since the procedure used for their
calculation will render a set of routing fractions which areoptimal only for that traffic distribution. This result
4allows us to anticipate that for the dynamic case (where
recalculation of the routing fractions to be used by the
protocol will oe done when variations in traffic
characteristics or topology in the network warrant it), the
protocol should render as good r.esults as for the static
case, since this recalculation prcDedure will maintain the
routing fractions suited for existing conditions in the
network. The main consideration will then be to determine
when this routing fraction recalculation should be done.
A minimum number of hops (minimum-hops) , single-path,
static routing protocol was also calculated, as indicated in
Appendix C. Simulation runs where performed for the
minimum-hops and routing-fraction protocols under the same.S- conditions to determine their relative performance. Results
showed that the maximum load that the minimum-hops protocol
could handle before saturation was 335 packets-psr-second
69
- % 6 9
into the network (see Figure D.2 of Appendix D) . This load
is 23% lower than the one found for the routing-frac-on
protocol.
As shown in Table II and Figures D.3 to D.5 of Appendix
D, performance of the routing-fraztion protocol for the 335
packets-per-second load was found to be significantly better
than the performance of the minimum-hops protocol with the
same traffic load.
'p
TABLE II
PERFORIA CE COMPARISON
.4.'
ROUTING MINIMUMFRACTION HOPS
335 msqs-=z 335 msg/sec1 pktl.-msg 1 pkt/meg
RUNNIN3 AVERAGEPKTS IN 50.31 102.34PETWOR K(in pkts)
TOTAL TIMEDELAY PKrS 0.148 0.301
COMPLETING TRIP(in secs)
AVERAGE TIMEIN QUEUE PKTS 0.052 0.211CO LETING TRIP
(in secs)
AVERAGE QUEUESIZE 0.297 .198
(in pkts)
From the different status ani statistical infora-.ion
gathered by the events and routines of the simulat ion
program, the "Running Average of Packets in the Network",
"$Average Total Trip Time", "Average Time in Queue", and
"Average Queue Size", where found to give the b-st
indication of the way the protocol handled the -raffic
70
. ." .-.* v..,*. . , ..*',%
**7o -. 6 - .v
during the simulation, and therefore were prefsred as
performance measures and for comparison between pro-occis.
In a similar way "Maxiaa m Link Utilization" and "Tozal
Number of Packets Still in the Network", gave us a better
indication of the maximum traffic loads the routing protocol
could handle.In addition "Number of Packets that Completed
Trip" when compared with "Number of Packets Generated"
indicated the protocclfs throughput performance.Throughout our research the use of the graphing programs
of Appendix F and Appendix G proved to be extremely useful
since they provided an excellent means of visualizing and
comparing large amounts of information. A sample output ofsome of the plots these programs can produce is shown in
Appendix D.
A comparison was done between the virtual circuit
service and datagram service configurations. For thiscomparison we used the successive saturation set of routingfracticns, uniformly distributel traffic and link capacities
set to 20,000 bits-per-second. Results showed that there isno significant difference between th.3 two. This similarity
is explained by the fact that the routing fractions usedremain fixed throughout the simulatior, run and thus no
difference is introduced by select-.ag the complete route of
the message at the time it is generated.
All the tests mentioned previously where done using a
set of routing fractions generated by the Successive
Saturation method. As indicated in Chapter III Section E,
another way of calculating routing fractions is the Maximum
Slack method. In order to determine their relative
performance, several simulation tests where performed using
routing fractions calculated by the Successive Saturation
method, and then repeated under the same conditions using
routing fractions calculated by the Maximum Slack method.
71
% %'..
Results showed that for a networkwith excess carrying
capacity, i.e., traffic load much lower than the satu-aion
load, the Maximum Slack set of routing fractions performed
equally to the Successive Saturatioa set. For the case of
traffic load near the saturation load, the SuccessiveV..-Saturation set performed better, and even gave a higher
level of saturation load. This difference ia performance is
explained by the fact that when calculating the routing
fractions using the 3aximum Slack aethod, we maximiz- tho
sum of the slack saturatioa-ratio 3f all links, which tands
to saturate more the links with higher capacity. In
contrast, in the Successive Saturation method we tend to
distribute saturation more uniformly among the links.
The maximum-slack routing fractions will therefore tend
to use the excess capacity of the network, when there is
some, and its performance then approaches that of the
successive-saturation set. When there is no excess capacity
in the network (near the saturation load) , the routing
fractions calculated by th- successive-saturation method
make better use of the available capicity, by spreading the
traffic more uniformly over the network, ani thus have a
V better performance.
Comparison was also made between the maximum slack set
of routing fractions and the miniaum-hops protocol. The
saturation load of maximum-slack routing fractions was 420packets-per-second, while for minizuam-hops protocol it was
335 packets-per-second, which is 191 lower than the former.
Is shown in Table III, for the 335 packets-per-second load
we found that the maximum slack set of routing fractions
also rendered a much better performance than the
minimum-hops protocol.
From thase results w ma Y conclude that the
routing-fraction protocol is a much better alternative for
static routing applications than :he minimum-hops, single
72
%:; /
T& BLE III
PERPFORMA CE COMPARISON
MAXIMUM MINIMUMSLACK HOPS
335 usg/saz 335 sg/sec1 pkt/msg 1 pk'.Zmsg
RUNNINE AVERAGE 123PKTS IN 49.77 102.34.ETWOR K
(n pkts)! TOTAL TIME
S. DELAY PKTS 0.146 0.301COMPLET ING TRIP(n s sCS)
9~~ AVERAGE TIMEIN QUEUZ PKTS 0.052 0.211CO PLETING TRIP
(in s cs)
AVIRAGE QUEUESIZE 0. 297 1. 198':>2(in pkts)
path routing protocol. In ailition, the successive
. saturation method should always be used when working with
. traffic loads that are close to the saturation load, and themaximum slack method shoald only be used when there is
enough excess capacity in the network (compared to the
. saturation load), or when simplicity in the calculation isrequired.
B. RECOMMENDaTIONS FOR FUTURE STUDY
The present study was done kepiag in mind the futurg
use of some of its contents for the investiga'!on of the
performance of routing fractions in a dynamic routingapplication. additicns have been made, when possible, of
'A mechanisms that will facilitate this future work.
Furthermore, provisions have been made in the simulation
73
program, to allow for the insertion of a subprogram to
recalculate the values of the routin; fractions.For the analysis of the static case, status and
statistical information was obtained mainly from events
IET.REPORT ° and 'DATA.COLLECTION', which use a time basis
V." f-om the start of the simulation up to event execution time
("total-time") . In contrast data from routines
'PERIOD.REPORE' and 'COLLEZT.PERIOD.DATA', which use a time
basis from the start of period to tie end of the same ppriod
("period-time") , was used mostly for validation of
total-time data. Nevertheless we 4ave designed the latter
with similar capabilities for gathering status and
statistical information about the simulation as the former.
This is because we expect the periol-time data to become the
preferad scurce of information for the analysis of the
dynamic case, given the periodical nature of its process.
we can also anticipate that tha jueue size and link
utilization measurements will play an impcrtant rol in the
decision cf when to recalctlate the values of the routing
fractions, since their values directly reflect when a link
is being saturated.
The built-in capability of the simulation program to
configure the network to provide virtual Circuit service
should also become an important subject of investigation for
the dynamic cise. This aspect bezomas more evident if we
recognize that for this case routing fractions will change
their values.from time to time, and thus mixtures of virtual
circuits created using different sets of routing fractionswill exist qimultanecusly in the network, the interactions
among which should be studied.
rem
744
-S.j
.- ..
GENlERAIONI OF GBOHBTRTCALLY DISTRIBUTED NUMlBER OF PACKETS
The Geome3tric distribution is closelyv rela-ed to the
Binomial distribution. The variiole in the Geometric
distribution is the number of triils preceding the first
success, in a sequence of indepealant. Binomial trials with
probabilityv Df occurence equal to "1pit. I -s probability
densityv function QPDF) is:
X-1
p ( 1 - p) for x = 1, 2, 3...
0 otherwise
The mean of the Gecmet-iz distribation is (1/p) and the
variance (1-p) /p2. A G eometrical ly distributed random
number can be generated diractlyv from a standard
un~iformly-distributed numb-er, byv mappiag It to the Geometric
cammulative distribution function (CDP). 1 he CDP of the.
Geometric distribution is:
1 - (1-p) for x = 1, 2p 3,r...
0 for x < 1
Let "y" be a number uniformly ditribu-ted between 0.0 and1.0, then:
x
-0a0
lr(1 -Y)- x ln(I- P)
x l n (1-y) / ln(1-p)
75I~L
GEI LSIQ OF~ N1v Gj"TIAL ITItJE ~BRO AKT
Since "y" is uniformly distributed from 0.0 to 1.0, then
(1-y) will also be uniformly distributed from 0.0 to 1.0,
therefore:
, x = in(y) / ln(1-pI
We must then round "x" to the closest integer that is higher
or equal to it (since the Geometric is a di screte
distribution), to get the value of the random number we are
looking for.
To determine the number of pik.ts fo- each message
generated during the simulation run, we follow this
procedure, and assign the value of the number obtained to
the variable 'NUM.PKTS'. This variable is then used by the
program, to zontrol the number of pdckets generated for the
message.
-A.
.7
: -76
_'I..-...x
.. LINK ILE SSIGINEIT
LINK NO DE NODENAME ORIG rERMINATION
2 1 33 1 44 1 55 2 16 2 37 2 68 2 99 3 1
10 3 211 3412 3 613 3 71l4 4 115 4 316 4 517 4 718 4 819 5 120 5 421 5 822 5 1223 6 224 6 325 6 726 6 927 6 1028 7 329 7 430 7 631 7 831 7 103 ~ 7 1134 8 435 8 536 8 737 8 1138 8 1239 9 240 9 641 9 1042 9 13413 10 644 1 0 7
4- 6 10 11, r,, 47 1 0 1 3
4:: 9 11 850 1 1 10: : :51 1 1 1 2
., : . .5 2 1 1 1 3. ,.5 3 1 2 5
,a54 !12 855 12 11
;...v56 12 17
Moov
57 13 958 13 1059 13 1160 13 12
o. .
.8
,..
-a
',
N...
% r .%
-4'8
.4%.,. . , , .- ,€:''"o ."... .% r:.,.,,,.., ,..,,.,,,.. .% . . ... ,(. -"-% . -". '. ."." '. ,"-"." '.' . .",
KII5MNMBRO HOPS SINGLE PATH ROUTING TABLE
To calculate the values of -a min.imum number of hops
*(minimum-hops) single path routing table for the network of
our study (sea Figure 4.1 of Chapter IV) , where all links
havs equal weight, we used the networks symme-ry to SiMD1±fy
the procedure. We therefore diviled the process into ohe
f llowing 4 steps:
1) Find the sink-tree (sezt of rcares for packets from all
nodes to the node selezcted) for one of the nodes
located at the external ver-tices o-f the network. The
resulting sink-tree shown in Figure C.1, can then be
transformed into a sink-tree for the rest1 of the nodes
located at external vertices of t-he network, by simply
rotating
2) Repeat the procedure mantioned before bu this time for
nodes located at internal vertices of the network. The
resulting sik-tree is shown at Figure C.2.
*
3) F.Ind the sink-tree for the node located at the center of
the network. The resulting tree Is shown in Figure
C.3.4l) Using the foregoing sink-tres construct the
corresponding routing table. rhe resulting table is
shown in Table IV The left column indicates the
- sending node, the upper row indicates the destination
node, and the contents of the table indicates the nodevia which traffic has to be sent.
79
"""lctd. 5enlv.tie ft ntok ysml
roatn iv
*:,- .r.. .., * r . - ..-. ,.-, .. .. .... .. -., .*_ .,.. ,. , . - .. .;.o-;,- _ . -? >_..X -. . .t 3 .. t. ._. .?
NETWORK
95-
%*4,
Figure C.1 SINK-TREE FOR EXTERN&L VERTICES.
80
,S.. ,> "",' ; IX ,",", , , .' .,.> '',,. ,,. . . . , . .. ". ," . . ' .. v v "... . . .,,' ,".
dWI -f * . W7* A7 I 2 . ~2. :, .- - T7. -7
ABLE IV
ROUTING TABLE
FROM TO NODE
NODE 1 2 3 4 5 6 7 8 9 10 11 12 13
1 - 2 3 4 5 2 3 5 2 2 5 5 2
2 1 - 3 1 1 6 6 1 9 9 9 9 9
3 1 2 - L 4 6 7 4 6 6 7 4 7
4 1 3 3 - 5 3 7 8 7 7 8 8 8
5 1 1 1 4 - 1 4 3 1 12 12 12 12
6 3 2 3 3 3 - 7 7 9 10 10 7 10
7 4 3 3 4 8 6 - 8 6 10 11 11 10
8 4 7 4 4 5 7 7 - 11 11 11 12 11
9 2 2 2 2 13 6 10 13 - 10 13 13 13
10 6 6 6 7 7 6 7 11 9 - 11 11 13
11 7 10 7 8 8 10 7 8 10 10 - 12 13
12 5 5 5 5 5 13 8 8 13 13 11 - 13
13 12 9 9 12 12 9 11 12 9 10 11 12 -
83
W4 PP IEDT
GRAPHIC REPRESENT&TION OF DATA COLLECTED DURING SIMULATION
The following plots where obtained using the graphing
programs of kppendixes E and F. Due to space constraints
only the most important data is shown plotted.
-"-1 Figure D. 1 shows the number if packets st ll in the
. network for '440 packets-per-second (satuzation load), and
460 packets-per-second (highe- than satu-ation load) for -he
routing-fraction protocol.
Figure D.2 shows the number of packets still in the
network for 335 packets-par-second (saturati-on load), and
350 packets-par-second (higher than saturation load) for ths
minimum number of hops (miaimum-hopsi protocol.
Figures D.3 to D.6 represent a graphic comparison of
data collected during simulation of the routing-fraction and
minimum-hops protocols, for the 335 packets-per-second load.
The upper plot of each figur. corresponds to data from the
routing-fraction protocol, and the lower plot to data from
the minimum-hops protocol.
6% %
. 84
i* V
-<.4-.*.\., ,,,
P=cKET STILL IN NETOR
I 4 - - --t CONOITIONS 07 SIMIJLTION
- M.e-' Ors . NODES : 13
NL*OWE 0r LINKS ' 60-RVG MESS PER S C: 440.00
". - RVS PACKETS PER MSG.: 1.00f. PA K T LENGTH s 100 BITS
SERVICE t ORTRGtM
ORRT0ON Or RUNt 170.0OESCS
- - UPORTC NTRVAL -20.OOSCCS
0.0 11.0 ;.0 S1. . 0 wl 0. 0 18. 0 l a. ix I . 0,! TtI (SECS)
P...CETS STILL IN NETWORK
I i[ N PKBO'NI or SIUATO
r MAW L' Or LINS t60
.. , /PACKET L[NG;. , tI O aeI S
-- : OUDMI CN OF guNt 170.O0 5E"S
-do-
S1.0 * .0 64.0 n US 0.0 10.0 111.0 33.0 13.0 IM0.TIME ISCCS)
NIP. -% Figure D.1 ~~PROTS STILL IN NEWOKFOTOUIG-RCTO POOCL
.% tJWR-NOES11
°GAGCTP.n,. 20
- --. PAKTTENOT a 000SIT
.85Cp'G
",---ll-
"" ." , , ." " " -" . ." -" ." " " ." . ' , .- ' " " , " " " " , , " - " . . ," " " -" ", ' . " - - -, ." . . .-a- -• ' . . . . # " "5- - - - - - -'- .., . '. -' .. . .. . , , -' -. -" , --: - . ." , " -- . , • .- . , , ., .'
Pfl*CTS STILL IN NCTNM
- - - . - - OMITIONS Or SIMULATION
KM oNU r' N0 0C5 s 13
• ~IMBR OW INKIS : 60o' - -G M'SSGES PR SCCz 335.00
a~V PACET p Fxr ER t SL: 1.00
K - -- - - PAOCCT LENGTH i 2000 8173
S* E ScRVIC
0IMAIGN Of RUDt 170.OOSMC5
- -UPD INTRVAL t 20.005=ct LAP INTERVAL a10.0 .OSCCS
0.0 7.0 34.0 13.0 U.0 n.0 10.0 li.G 11.0 153.0 170.0TIME ISEC
- - - - - OWOTIONS Cr SILtLATION
K-------------------------- ------- ------------
NU W Or LIP NS t 60
--- -I -VG MESSAGES PER SM. 350.00* AVS PACKETS PER M1SG., 1.00
too PACKET LENGTH : 1OO1ITS
* SERVIC t DATAGRR"DURtATION Wr Rul: 170.005C05LR INTERV. I0.0OSCCS
.. 0 37.0 4.0 S 0. 05.0 t0.0 111.0 L.0 353.3 ' .o
Figure D.2 PKTS. STILL IN NETWORK FOR MINIMUM-HOPS PROTOCOL.
":". .
Q.74
86
%.-*
rpo1E STILL. IN ICT5MM
'.5.~ --------------------------
S. MISCR Or LINKS s 60I - -- - - MVISIAGCS PER SM 335.00
AMG PACKCTS PER HI.i t1.00
PCT LENTH : 1000 BITSSERVIM ORTAWMI
- - --- ------- ---- DURTION Or "s~ 170.00SMC
AM I~nA - .0'
TIMC (MM~I
at CODTOSOr3qLT
£~~~~ - ------ - -------- WEOTOES£1
a NUMBER Or* LINK~S 60I ~ ~ ~ ~ ~ ~ t -- - - - VSSfaGsP" scca 335.00* AVMG PACKETS PER 115.t 1.00
.5 PACKET LDNGTh & 1000 BITS
V.,DURATION or RUta 170.00WEC
UPOATC INTERVALt 20.OOSCCSLAP INTERMI. 10I.O0SEES
'%
3.3 3.0 [email protected] 51.40 .0 M.11 20.0 111.0 330.0 13.0 1M.6
Figure D. 3 COMPARISON OF PACKETS STILL IN THE NETWORK,
5 87
L.Pq
<.1w
CMQITIOM 7 SIILTIO4
NOW Of LINKS s6W-r6 AiI55 C5 PCRtSEC: 35.00
gF114 PFIKETS PER M. 1 1.00* PftxcT LDWTh I Iwo0 BITS
too OKTION Or RUN: 170.00WMIPCATE INTERVWI. s 20.00WEC
- - -- - - - - - - IP INTERVFL. 10:.oosccs
0.6 11. 240 1.0 0.0 *. l34.0 11.0 3:1.0 353.0 Me0
TINC tsccSI
lInimtLINKJSUraRt VC NCTWeORK
-O Or LIS t 60
%AVG PrCKETS PCR WA5.: 1.00
4. - PKICET LNGTHs 1000 BITS
- - 1 UNAITION OrRI"s3I7O:OO0SS- - ifM IkTRVL s 2O.OSCM
0. t3 0 34.0 13.0 U0.0 E-0 12-00 11.0 133.0 133.0 10.0
FiguIre 0.4 COBPABISOK OF HAZINUMr LINK USAGE POR THE NETWORK.
Los
88
''a T
~~CONDOITIONIS O1r S]IMTION~
'9L O F" or ("WES 13
ISER Or LINKSC W6NVPiAKETS PER mSS.I 1.00
pfo= a tO00 t O TS
SERVICE I tTFA1W- I oION or RNU 174.30.M0 C!
OtTIR Ivt.A 20.coSL INTERVALI 10.QO0sm
L . . . . i I -.-- _B ar2 C
,.,..O* . 0 1 1 .0 B a a M ,IS m a~ I . O 11 l.0 I5 . , 31 3.0 l iS A l
TIMC ISEcl
.. wmam Q=u LW"m ral tcMcM
i ] COMN Or IITLAN
-. ,.-.. W Nooc : 13
MR W Or LIKiS 60- -- - - - - -CSSfacs PERSCC: 35-5.
M'G PACKTS PER MA.: 1.00PAKET .LW M 9 1000 ITS
S-, . .SERVICE a OfiTAGANI
U.JATION or UttNS 170.OOSC!- -- - - -UPDATE INTEVAL s2.SCCS
LI? INTERVAL 3 10.005SCS
.. I
- " so al a If. e 11 51 A IL .0 102.0 &11.0 35. 113.0 I1.rem TilE SC I
Figure D.5 COHP&RISON OF AVERAGE 2UE5E LENGTH FOR THE NETWORK.
89
. , ; ... - .. ,., .. ,;- . . . . , , ,, . , .-.- . . . . . . . . . . . .". - .:-" - :- -* .. * ,,, 'a *'-a, ,.-,. ,.,-..'.;,'.,-,&.,'a. " - ;.",-, .;, . .. , .'/ .. .-. -..- ,.-..,,.-
RVEC ELR MW rl LCPI-TR1IP PrICCIS
WSW Of LINKCS t 60
- - - - - VIPCSSNCS PCR SMC 335.00N - -- --- ----- --- AW PRCETS PCRt WA5.s 1.00
-. POCT LCNMT s 1000 BITS
oDrR10 Or RUN. 170.OOSCCSS- - LFRIMt INTMRWW : 20.OOSMO
~- -- - - UP INTCRVFIL s 10.OOSCCS
---- - --------
e- 3WWkw11
0 J rLNSs6
0W ESGSPRSC 3.
64 ~ ~ ~ ~ ~ ~ V 174CT PERg MG.0 1.00SI. 160 4 r.@ :
4l~ UPCLA? INTRVA 2OL.CaSEPPWICE
V - - INERM 10.00SC3
8.4. 17gCU 34A 11.0 U.:600. 1. 110 I-~~~~TM - GNSGCmcSC:330
FiueD6 CMAIO fAG EA O OPEIGTI K
-LA~T 19IICi20
90OTL~&hm200BT
APPENDIX E
SIMULATION PROGRAM
(A I I
Iii lb( * I I II
" * n. I0 4(/Z I I !I 1- I I
lb .44/ * Au1 1 ~ III I-- CC* I 1 .41- z i
1at" 49 3.4 I.-a. p"0*3'U. I I W&. I d I=..QCo * _Q 1'. 1 g 4 in q I ( 30
.4w "409- CL - I I 9 J 0-4 I 111 M -46 -1 *.W 1~~I4 - . 0I OIN ujc * tb lI 4I Ia.j..I 4.lb = Q * z.. I I 4)I 0 4 S 'OI 4
*I 20Z S I. * I n I 43u I '-4., * 4II 't/ 0.UU'I I OWI
C).;Ibo *il <ZJ I -(3 I 0 (~Z "LUlJJ mq I3 I.0 Q I-"409 (A -aj ch I IiO I 0 -i I
'4~tz 04/ * ZOm I 4I 40W IOu~IL 1 0Z 5 I 0.0Z~Wn~ I Iwa
z -' * I I S X ZL 01- I II-a (n. 4) I 0..j . I cc 490w I.-CA I Xt-
04c0 * ~ 1- (A I WI .1 C3 I *- I )(LU4- -- Z *j I2 I I Q45-4/l 0I 5 A W. ~ I o
I L * ZW. J I I -Z L 6 I cc Z W 0 " 1 Z 4 J I 4-m *J P" I> I 0~t OOyL I W'4uiz. I I - a *Z I 1--
t. - * 0 4.uvJ I I-:I U I CLO. '. S OZ.. c. 4~44 * U S.4~W-a I PCd)W9u.3 f, I t. I.1mJ I -
cc. Z * OUI1- I I 4/) ! 'I /U.. I 0-.W 0 * I x _) 4c- * I _)4
"41 *1'- 19- I o Zwo cc I I-04/) 394 ) C9 .lb0.j * I'/10 I z -~Z-u I z a..no I w Z 1r4<1- c
* i 0. F_/ I-S V)Iwwq~ I .. iO.J I.LLu I _j a4 I >j
V 43o *0. w41I I a C w 0 I 1-ccc * '40093*ipL *I 44 I WI "q441-4WUJL I "xUI40 I W4oclt0 I QW.
IAI-MI * 1. 41. - I o~dm I 1- 4/10W I W~4 SW I W0 ~ ~ ~ ~ ~~ .4QL* tZ101zaz mIZ1 I W3-Wz 430
lb LL)0 q.a uo.. 0- Luz-.z ~ U '-. w (I OIA-J I j m
a Qgo~o J L. -'LUUJ ILuua~J LU0. 1.coi t44UJz 1a
* ui m~co I Lu I-)-)-4ZZ Cie,= Cie 1- C3 c)')* >36 1 p Ib2 * ~ lI-I UJLIUJ U. L6 1 W wuu. I ZWWWUL I-I
lk .jc o lc 1 41 2> LJU cc > >wL I > I -''4L lI0 *4s-)4 I ce I 'k~.WW 00 30 WQ Iu IJ3 - LuLuW I ocZgA I- 4 Lu S I 0. I z
*'UW a ..- . . ..- j L.ine~~~~eu.u M *.e ~ ~ m0 ~ m U. .0
*t X
I I I IC I -i
I. q,. I I i
I .4 m I t~ I I 6I.)e*
uj~~~ 104 -JO-wwxI Im I..JO Icucoa 1 *..-4 1 .4 4
04 ..v 0-tw I I 0Wd.. I 0I U -cc U.0 I z IZ44cc ic I V41-(i 0 '-
1 P 'n~'-q I _0 I 1. 09c I 9L I *o3 - I e1 jyjc0.- - I Z ''JIC I -iJie-- 1 zx -u
I -1U- >44 I OM I "Jao 4<c 4. il- O CLo I -iI u~D: UOIZLI <Wt I WW *.ZC.IW(AX C1 00 x z I n I ft -- I c~e-JCf I -F ie I a!
I Z44W 9 Oz I I. CC44 I -Jzz I x-f.I%*I -x WWx 4 ZO. I UJ I c.l"cbcbc I 44q4 I cf.-A4t.
I :)w4 < U-w I Z.o I (Z 4 . -Z -- I (fL0j .O0 II W)~O ,Ow I 01-U I WOZ 0. 4. I 4414 1 - ~ I1* 1 '' l4 (Z 1 Qo- I I-tw-j I 4UJgs I ~-ZI -.J7L34 .uj4JL I LUZ Z oxx .'U'U( I3 J.J1-.. I 4.D.J II XX IQqx 1 1-- 1 Z 3W I 44-ZUD44 I .. JI-n~o. 1 ..
I Ut. I ZL I LUWWI-4 I WW .LUVW I -JU.0 XI -CcW m-OJZ I -Z I .. J ZZ 1 ""44 1 z .4r/1tI
1 Z~(.0 I "4k.f'- I * .4Zc3IJU I -.'fl W g m1 WI4c C -W4 I z 0 Z zw I ..J.Z0-... 1 0 o-0.J I I--
WI <(A. I <3. WiuzJ 1 1 "W. " I ... 0ZI4UJLOLUWW4OW..J 1 .4 NI rx can44 00~j0 a 1I 00- '-I m
I ZU- ZOz(LJ-4 0 1- I 1'ZZ I4 '1Z 1 Wz0 .J. I
I 1I--Z...U- 1 I 1OO-s 1 EAU1Z(/# a OZ.. I >
I v)-L=<UL z '..U W0W ow 0 <O41 04- I iI 44Z 4 0 1 Zt I 0 Z W I 11011 I L(3 *)(0 I I--
$ w~~ I4JPL -0 1 I I4WIUZq I I- -. '-cCr I '.. OC.3 I cI fI-Z.wI 0.4 1 01'-'l C'J" I Xj-q~( c0 0.4
4t W:3 <43.4 1 * I 0'-'0"( I 14 11CLic I LJI~W I coI ~ ~ ~ l .-.- 4 4j .. , 4 I ackJ4 -4 I .0ZLnIe-cel-
1Is q- 0u > UZ Il Z 1 U . I 1.4 I :N 1 eLW-. 0 I>lI L)U4 I C3Z)L-4 I CCC90-444a I Zin *)L. 1 -4
WI '-4 4ca * 9 10./o-1 Q-.44] I flJi)0Uli) 1 1
.~ I MV3M==:DLULUZ 1 I 04(/ LWUUI) I LUL U L044LI I *0-Ie:3- I I LZ* Iz 1 *.4I41* I~ i 4(flUz 1 4'4z I Wmomm- I I-
QQI~ 11U )Z -Q U(44 -I)-.UU Uf.-u..W4.L I 4. 0 I
.144 4 .4a a a=. a OC5000. . . o.nao. I .J...IQ.
0.1~~~~~~~ 2J4~~. III1Z*I
4 I I wu W WWW LUWWW IL~z~4~iU I %
* z I *I I
I 4d I I
* 7ic
* 4I 0 I* Lj<
IU 0'40 I 4 - I
(n -# 4 1. (A I I
LU4I 1A I Z- x. *1.- * I I40 * 0. Iu ' 0-4 z- * ui I I
I" I I IU -1 0 LI 1-- I I0.( I * LLO I cl . Z-J *Z M ( I I-3 I I I Z.4 Zi z- '-C LL * I Ion I I CA4 .11 III! (-41
I *I- z -0 UJ
1-. I3. P" CL j 5 LLJI . 00 1 1
LI. o Uz. I ~Z* 1 *L z- e .j ~ *0 0t0~' -4- 1 0 .. Z -Z C 40 *MIU) I*(-W I * ' I ZO.-4~ A. ac'- *.0 L I '-
4LLJ IM x ce u 0 "1-0 1U O-L.JL -z ^I
Q::L~ 0i 1 UX * 0 1 *Z6 0.4ci 1.............. a490 u(A-0.. .. .. .. II', (A**4m )m " 00 "
co I
=Z I I I
* Z I I I
* >. I I
" 0 1
U.00 I Uj I I c*~ ~ 4J I IOc I~ Z I 1
*. * I I t I_U M *Z -i4 I l I
% 3* >.<I Ii I 1I
w.. a Ob Z ~ o I 3 I I
ou Y LIw 1 1 N -j I C0 I (A IZ ~ j Q m 0 101< L I
*0 *.U '-qO u g*-0 314 :p
-0 *a~ 0I-LLV-z-v IWd~j- UI >I W Z uLLS~I LUI t>(lu.Z-o I mo
LU e-40u-~u.J<* W 4 IZL I = I1 0
cu Zuj 0-14 .9 MZd . U * 0 0 4I %xc l-J -4 -i N d-*_J U W I~ IZ CL
*<j W"* W4 1 01t O I CC OGL-L WLL 1*z1 11i 1 4 II)CL U
4CZI~ if .f:3 OUuUJUJ *" Z 4 I-0 1 UI Ilv ,I
) *>_0 LA.I U Z U)1LUUJU- C)LUZ - C. 4) IL-a LU 4
0 Ze 00W-. - U) Ju *' Wo D I.J1 W
01-~0 -- * 0 -1. -1 4
1*j
*( .5- m ,L
0; .)P0UU
z~n z-404 L
uJl SO OG-r u0 uW. I= 0 ofto
z ~ 6 0r. 44.IW q6JUX 44IJ
C3 0 0 -J4. Ll. - z a4zl
UJL i) U. 011 ..J 0i J a
CL CL.0CL11- fa 0. I fi ~ w ... 4 0 U4 <
4t LU 0. ..4>N0.0>.so 0 071 L
0. be ccr -4'-. *0W4 IIFU j 0"aCL LU (U6 -WO.U 0. tU U CL 0. U *t
l- M a .'.. 0 tA ~ ~ I IIc 0 06CJ 0 Pt70 0%oUC : 0 00. 4u * JLJ= 0- o.u 4w 0-'.
Zc.L ZOu *r 4-0 ZO -O.... - 4ZZD Ja LL -
% 4 c(W- 4.4Z W W ) ~ 6.-QC
AD-R148 166 MULTIPLE PATH STATIC ROUTING PROTOCOLS FOR PRCKET 2/2SWITCHED NETI4ORKS(U) NARIR POSTGRADUATE SCHOOL MONTEREYCA H T SCHIANTARELLI SEP 83
UNCLSSIFIED F/G 17/2 NL
EEmhEEEEEEEEEE
1. I M Q5
111114. Q. 3 2
1111- 111= 1.
MICROCOPY RESOLUTION TEST C)hARTNTm94W BAAU-"O STANDARDS-1963-A
kL
I VIMOh-VI 04
*0 tG A If
IC
$A O I
*5a
z z I.- I I
~*0 I341 4CS
*4 Q I.L Aj* z OI 3M 0* 1.I uc I O2w.
0* I~a 104 1f-x1.0 0U0CLA o 0 -* I I" 630"
Xx 0 Q 0OC~a 0 0N -J-J 1 04 Z4 tIz I qkc
No"OLUZZ~ *ZI. CL 1- 1 -0 1 M 1-Cl'
UJ4-. ( a- gIWC 0 .OL 0 '-4U *0 0- I-ZI M.^1Z
1-0 cc4 *5- -U IWQ 02 I00 0 00 0 M0 *I- 2-. 1-41 ..J'-.j
1010 . 0 -M qz U44 . I J442*.&I-&C. jc 1.1 A t& ta1118 4 fJ UU U JJLLLLUUL wU ~ wamaaU m1CM C
I--W N N .J-j- .J.--.JJJJ..q 0 C~ a OC *1 a 0 a.~5 -
0 ~ . ~** UU. ~ I .J14 96
%4* L~S~U
I I U I
I IqL x-2C
zf I 44
L41- 5 U J*I'
OW O.5 - 1.-Q 2* I 2
(j~4j ~ ~ ~ 0"0 4UI O
*** Qf Sos ZI -* 1- -400 I ** A a .3 0Q "0 04ul ie.4
*63n **a le usZ "0 4c 2UpWU *9 10L- 00 .J4
UUW~~41 **dft9W
*/* C44 00 WI"G 4 ~ 00*** Q '4U 0.c U. 00.j 2.** low - .I .0Z * c. 99O4*
oz* 44 iJS 49* ~ ~ ~ 34 P (54 I.W -W49 m.oo
CZZWAC*a.404 C2 01 ol .JZCC-i 04%' IOw~Q- 00*Uf CO.J jf I.. .. Iw'..-u.j jam 0 0
14.Jzac**j* 2 if IW .-9 00. 004z J.ZP"*- 4* cc * mI ZZOW63 "* zIem Z.C:;I -I* 264 64M.4om 044' **G.W2*-J41 4ZOUJ "449 Maoi ILZ .C9 -2o I #AS.-
..dWM4v" Z**e ~ *jt (1.6J MOW .JJA I W .J'4 _VSI ca
0C'- aC4--J-AW4--W:)WI x 03 =WI 2 CC. ot MWI Q.WQ.L3u.6Z.Ju.O~DIs.-. I "4. Q.z "4"4 3 QLZ IS29-
* QQ.L WO4 43uli-.4 I .3 I-$"e A N U .3 1-.-. IW cUIILU6 W=JaWfAI4Z-J I Z-Z ~I =.-. 4 JI 0~-0-
49093o2.JJf -j I 0* z
ccat"-Z3zi-C 1404 1 4 cc 4 1 40 a0P4 IA USWwww-alm" .r~ I.eU - I.-I LU. I- I W.. .3 I.-I P
O~40-4~* ZWO.Z I Q.Q.Z I CLI.2 I0'-.'-.q I cc O-.'- 1 I
S 0 o~gW I a lg: 0zZ maCQCI0 &4cZU).I LL ..Jefl. LL -J44L I U.
97
14 C I I I
"V * I Io9 cc I-* I I
49 CL ILJ
0 6 - ,
dit a* Pe I- ac*v4~ ~ ~ -- .- du I I m
0 t* od* '4,aw
ft *s -4 I- ac S I I~a zi *UX CS ft II
t- 0 v4 I -
Qh" a. . I
a14 -o 4 S 1 C; 39*.* 2 213!I
-- Jc- me .*IU6 fl-s" ZW* *4 LU0 -4+ W3
(a*p * U (34 I u at 00014 Q . 0f . * i j Ie"t
O .XQ Qpm.4 owm A 0-0 o"% I La alI WIA& -J
* M* 0-(.5 *F0 *0 m W " IZ I Il 1e44W i- 4
tug I AO" WL.JL t I Zo I 4--Ci
4 Q0* * 2 1. 1 s I P"I I"4*0C
zL M LUGO eWI ac a a0 = aI.J lL4*
.2~ s.~'e-.2 - - 0 u I~I * 11a90.
LUZ I I
Ta I I I
; IIIIcat I I I
a* Z# I I :
a W" I Q*l ~ JC I I I
-. 1 * a 3. IL I 10 *4 - I o I Iin ( LuU.* TUA #I- I 1I4 zj t3; 1 us I foa
IA* 144 I c I I # 1 u -4:* z1 ea *-1* I di1Z I I vv
39 9 '.4 is fl I ZI40* *"q5. I" l k4 1aIscu
I~~~. *e -I I39 911-4 1c I P4 P0 mU t
440 o * %A- I o I OfaI g 10 69q 0 .32 1.- U I ao CIZj3 A I
u W I CuI 0 J*-eJlP- 4- o w*020 1 4.1 U. O. Oz 4=O-A c** o 1- 02 0 44u UJpq Q dz us %
A Li" IP 2 I 4 QL1 4 % ag ma ujw* c .404 -Au 6"-4 6 I 44L IW Q c 9%*20U =2OCWe A LP-- 1 Z41 1 L -"- Z L p~o
Jje " $.- WO I='- ""1 :52 ( 0."ctA'A * VIZ 144 5-0C T I I i C"* L. * W40. "~ I N "V 40*u =2W' 1 9
6-43- *" =0 14 41 Z= C6 pi"4*ll =WZJ -"aZZ 4z w*IJ-' $-"to I * ~ -01 u c6w4 L..(4o0 3-0* i e 106 44. IM~- CL31OM (
ae ww twetw~ujM4 WOL MU Jo Z-J3 omuIL zl asaaflofo lmt 0 .ft 4 2+ 06.
99 - .g m g g i u
2'.J 1- r
* M I- I I
*U (a- I , I -* J
* W% I I *4-294 1 1 -44
*U 21A I * Q.6-US- I I *-I W
*2 u4 I * 44044g"L*Fc I :) * C
ac * c- I J * - Qut46I- O"p- I I *if I.-2w z
*4 Wz I 1 0-S00*Z w 9I 1 * ac bmaE..
*2 246 I us * f 4*-~~ ~ 2P.S I* *
*4p I- %c I4 * * 4-HA2WO=6- 49CM I aI w al7 m A-Z'z
Mu £3 I t NoL ."2
I R~U I Z I 2y )o quI
*.Jo *u IwI-~~~ Id. a.0 1- uIi 'n'< :004
*.-d 4D 04 Od I LX" I * Z z 4 c0t 4012t
PO #U *42 - 11-1-1 52.85 2 Q0' M 4 CL- WC-6-*>4 I0 SWZI *8 -Zt* z IIL6
W31-uu~ (1.-2 1 W AS 0 ; SP.4 ( QQ0N. - *W JIA4 4I.1*uq~g 0"1 >~ LU *0 LLs 3C0 A i " 44
*Ut I- *.l W*x~p-Ujop*2 a2 aC)03 CC * * . L ~.-.21 S4 I.-1 I.-CA 1~ "41 LW4U 04 6-.0-M 0 4(.
CL 20--a o9 (2 zo - ~ W-1I~ 0 *.~.6
AagWe w c* in.e. .a .j..JU. -J"- Q cjjof (Z ' a U.2o a
10
1 7u * I
WI I CIE
I~~~i In N *
I I4 eN u.I 0.cr 0 :31- s * :2
I"d * * * I I Il1I0 > I V~~a4
1* ta1 1 4+-*6 "a 13 'AN -old"* U " * 00 * 0 0a
a I I cII 2N -3V I.J I .*.*x U240 C''20rj
U j2* G.l WZ_0** O* *
us .-* J 0 -J DNN 4Oc
9"0I - NwO- .JwaO. .Zez =a' 3dp nIMAUb" 9
4IC lW 00:CL US- WoWccp= CO* I~ ~ W z'd4 Z!t& Z0 ZW~4~0Ius 0~I.~N4in 4* *1e Z5~Zp.U... .
A W 0.0 IZ~t 0 JC 0.0.alul d xd~d*3.4~c %%%u ZOZ LUOOSOe
1 QIWV, 1u 1 f4 f.ZZg-.* -a em0.I 4 j .162 Iu IXmZZW*L 3 Iu w ~ .
a- I A4 xn NaC 0W (3" W0 MigiAn
I L 04t 1~ cc C1 .i'WttuQ. 3&ui=J2 xx I qqqxvn )% %* U I ld~o No #A wq jd.em2* 'ec x N Wl I U I
*i)z I NI 4AW ta0l Z~ sac* -JO qz NI 0 I Za C3
i wZ I Zu I Z(.w2.J31 II X -.JC.Z zzI0x~j) ZM7-ejf$I 00-axw4 Wen 10 Z(. Il *WWU .I NuOe.
iJO i U14 I if mz~ I' *L 4ca. 0.2UL-if ui 1 0 0
10 1
r!l 3 P. P. P,*u-
A~~
-c
0 0 %q~qmI I
I 0W.Ww.- Iui fAI4t4I I0.
39 1s)W.4 o I I0II *i 1 a a Q I I C4
1 .-. 1.-s 2 4 Ot . I 11*UI * 40ev- I I 16
*g I M0 PI-Wt4 I I NCO.
***a.** Z I .LI4Z4 I CI I**#"I- 1 * 4WWW I Iu0 02u) ac CI** 0.0
410 -. J Zo 341* * WW--Wac 41414 3041 0"0 I I 0
* 64-c-~ CH14*4 1 1 Op "0e.4 t161f-0.8 1-* * 1 - -
zr 0 11889** *0-s 4 0
L W4u00.' Iti1* * 11 1~. 03 Z 00J2"WIW 423 * )"LI -tsj *d
*NW~ 4-Io4 0*-44 44' I Ix
PWt. 4 - M41* JflZJ 1 04cut $-%a
ag o c 0AZ. 0.110 1 JAC "4"~ -jt W 4uq9qc4J 102 P U *cL 04sI3- I x I +2 + 2 40 CI
.L'nLWLL m 0'4-4 a1 449 2 1. IU0 A840440 a 4-... W l1t 4 . J02
0t 4I4 &Lx I-o.-quu 41 # -JA to- Z=-ILzat0 0 411..4 414 *0 u 1M w C) Z7zcLW~ ~ -44~1 -. 4 WITU- I44 IL I **W2 J.. 0.
0. 20.ufmusW 4% 40. am I AL6U Zz f&I
39 3i.u.0IL - f4WW 0 40 fatjq 1 1" 1 Z0 0 WCL 0 ==b'3 WZI11-l2 "" P- Ui CL OL a I ccJzo 1% 0 1--.J4; .3
-Il SMIU yWW- (2c%4q O4 *j aM us4J q oWW I oc 0-4 Wj ZAL CC0j 0.00 04u.C 41I UZI I 0uz x. LJO
CL J!2I .3C584. 60 I'm 1~'. g~ 0 0 Z66 0 e.Zd0.~~~~~~ ~ . 1 U .O I 1 0 0 *I- 0"
LLSd 41W '-t I -t~dI u 0 JZZ O2J 4Lj 14046. cg-'flo0 I32 I Z== ZZJ0P- IIIL
It- *4- P-L 12W, I 22'CJ7 T Zc jIu 41 W) .oC I 1.- 3
* ~ q I0CK 1241ussu 2iW .i 4z 22
* t-*- 1-tLILm. " ' I 0 3134 0-0 M IL 13-a 01-1- S.4 3 * SZ. * 0....... * SM we- SMSMO OSMWJ 'A
102
V * I * I0 0a 1 Q- 11
og 5U * I 44 I
va * U 1 64 (A I
*~ ~ 5 O 4 ** LU'40 1Is
PA 41 4c o.U LU I cci jii* 04T 1-
0 0L *N A I I tn~~
*~c 4 SLU I 0LU. 4b N 4 ZUQ.44 I Z
941% 0J .1i I- -j.i:)O*t zW0 LU 4W& * XUWOW.M I.-
cm~ 41 I x 163 4 4142-lW IUWI*4.w * a$" I at I4W * 0040 1Lllc
Oh * 2-0 .Z k6 *zU- IZ0"0 r I L. * LL 011 0 I 1
* 041 uZ I U _8z 4 1 -caZ- - I (
0149- 14 4.6 I.~ U a 1 1-.ac.: 3 1-0 4 1 U-@-""A a
LU O 4 04 .J.. 6 I- W40 I.d44 ge I.4 64M ..4 * 41U Ma.Iz~
ac% U.-I- *-4#A4(A I11.0 44 o-4 0:4W~ 22ac 441110 * 1cfI- 1-f- 0* IU1C I 4C
40 40C 0 141 NO I445 00 1.- 41 *IIO 1 -ZS, 0" .* "e- 4 1-1- 0* ZWW'4q 1- 0
44 0 Q *0~ -Jc 0 04 -. U96*44 1 Um2-- ' 0 : ; -LU if 204 s tlq" 12M..-. p Vq a I"C a0.. 0 444 94 "499013 l
0.0 UW a ~ *0 I3 $-w so lit ac * COa .J2 Iof-X Lu *O 6-M I 20.2 U P"" LU*O 402UW' I.
0%" * . CL * Z'- 0 00 CL * #AaC(AZ I(.OF-ccI- pe em 0* 08 00~ 'n '-.c
oo= kjkia.ac =C* N~ *"oafW a* Z"Z$- 100" So I-W W41 01 uJUU 9*wtL_4ICC4 #A "*- -J *I- LUZ I ""na 0 0 1*0. 0.0. "- * U. e 4-- 1-e
ium-a1. .4 j8 W. Z4 I ZWQJOULW Q. 64 41 w6J. * Iuu 1 -zO.*U a L2 44- I ac-600400UWW LU (Dc. P-Ox1Z 1 -1
S&A. UJO 411F- 0-0 1 tu ag.4..aeI-Z== CC *IA Z4949aeUf- 1 -
-J 9Wq t ,Ia IAC KI-0.0" *- IJ44f . 'A 440 2 I UlbZe * "-5 I 5--C0jg .JW'904.Utt Z-PouiJ tu
Lu 4;% 1-0 m111------ 01-0 LU U-44. aCV6 WUZ- a ow a aa C w*J WWWWJALUCD OjZ -bf aO ... a a Laf Ia
103
*al
A dab cc
t- 4 0u
us *u40 0 *
0I - -J z-
4U #447 Ul
wv z ~ Lu
*3r -Lu .u 4A 0
*j 00=44
1. "O J 313 C).-ZL
4A * 9 0-0
taIUC II *-wO IM0 ""Q
4404 a(a-G c * 39 ** ** QfU t-I o* 34..4 0 a *3* #A 0-4~1* t48
I .4cI14 l~o J 14~J ac
C" o JI I~'( -. @W194trJ 4g. LIA*i 0wo oz .1 6Lu >
I x A, J. 1--*4.Jg4- 4UW g S.
1 -04' 00.0 A-d NWU 14 C- . J- U,' t.-
IJ 'A I = ,~ * "O.A04 .-.Kfl tjm Qq 00 3P I
WZOXZ o 1, 4qjlt- 44,40;'-. A z..u.ju- W4 cm Qo .azz~Jw..-
wl "I z 1 3Z~a- ** .4- L-(.-.0ft.I .l@ I ao *V@ 0- owW*P 0 ZW~60 ce V4WUI-I a-A1 2%1 Lao-.a Ilb'-=-. zu~u N4 &U 0101- .~ fto4
0 V- I.gU 'Z %I, aUU a.4'.a 34''i kl 1- Ztz 0 cVU. 04 -- 4 - t 40v.04. .J.-.Z lo 43 lU4IUU t.J3S
I* I .. WWWWWOU. atu J~, 49 IcaU-.h'-4~l 34C
a 0 ae o J..J..Jioj V ' z dge _ ,--4S
104
i
4.J"oI- gUU g
44 V.4 0 .0 C 0o w
ow OW a JJ V1-E uw o : C
:$ 0 14 '4
A 4, P400200
Awa12: .2 it Q----~lc- 0 oZ 3.5-LU at 0 a-~w WO- 4a Wj
ol 0 taCaO"ows-00 - 00agh atww Z 0" (3 eA14 L 0J.0~1~~~ 0 O 4 9
-9C0 Vm-KI5 U~ o I- 44'4%I w0-MZ02'.
ao u~ uo I-MA ta 09 [email protected] 4. woc 9"1314 4IL ui 3 Wq e*u.u
WJ *w IEm Z a.C 42~ 54l .2t4 aP.aaI.zjaa.za w,- I* .5 sa ~J-fA ) '4ZO 04 -qWI-W JLL
4IAW21-UW . AL 2U1 2Zu "00g I-I1--61.-g1t-104J301 WU C94 WWWWWJWWQ9 4W9J1
0-90 01 3'14 31 '5.Ga 39 ...-. 1.iJ. Zt'4 U [email protected] 4AI A&JoU j
1" .4- U.
105
Lu*e~oe
0z
-
OLU
CU Ij~
ogo
-,00 *1- *Z I W.uj
0-t I-C., *l )W44fl ",.f ac Zy*I-- I-cOa.4 Q- 041U U-09 063 is l.~ ac 0. aeI-W -
v-*C. i W 00. M 1=140ca M- ULU UJ *'J%-I-
a cc F I-Q WWoe 1-0199 0
a '4 itCl0* C23Z 0* 31 U.004 0.Qg *Za0.* ZC26-ICLXZ * 00
OL - 44 ""-* .. 0*e 41 W
Ce.- 0 -1I-..* ML Ya a U.II IIh ;..4 II; %0 1.-4z~qz-X~j I
u420 " -Q04*. GWI a-. **cIA aiti O "
2 1 4 "Z6".AUI- 31flwuj"~ "4t C
3 UU t-IS 3 OC011 c eM
*.s Aw- 6Qb~f2*t0I Op6( P.9ULP4nLC
09 ae'3 poa9 ,-IC6 C ULZ9C p .
04.jp"CL9.4 CC 1 00o" a P4W ,tuu.9 s0eeOU4IWQCt )-tccz-30 C~l -
J- U=4t 49 O-o:L-11& 4 jw-
(3 04 ZV 0 1" W)t 04XV~ 'v
C) * LA I "ab
Li * ILI3 ~ : -4 * L4uluIloL * UJZ i I
m. * Slo I II ~ l * p9-o 5 l
cce * 00*M I * JZ%V Z *U 450": 1 *0 0
4A mu I I L6-m- ~ jU LU *~ I Ii
00 * e jQoZ
it 0 *i uZqL I I *3*
zW *iM1C 9 Cy"'- I *0. -"-j *J 0 4 0 uj I *31.9-4
I- 03 z Ow ZX.e0I- ;2. * V) OaC.-L Iw -4*L a UJ. - *". U. J1 i U%-4-0
*a. LU :) LU * IJ4W I 3-
z OAA * WO 0** 2 *i .JLLL
I- .. Z . Xg =W C19>0
W-- Pq..w . *Z i I ca I U Li-CL$"*to~ ~ LU *9- *T IB iULZ1 -
: 84 Wt 4Zp"&4 *i 10-Z I "I O.&A.xro ~ ~ ~ 4 P: OUzj4 -a je U- I ULIA"- l* -s wl J~ A LP-C4L *m Z4" I ULI U6Y - 4WUi
IA 64- *P 0 "4 0- u *4 1. 0 E114 j CiJ .
0 9C0 CCUk Z- 0~ ZOI I~l 4,-!I Lu j(31w-l..z %- 1*- LiLl I UJOIM of.- CC4.
CC WVX. JUJ 3e" cc >WWZJ I I In eUB I
* j -1 2-G J -"- C3 49 Liom *(, P~ -41 04N( 419L .
4.4- - 5 -N.J- z UJ*.CtJ w *(- OAML I~ I ix1U6- I--
Li P-- *O IXl- Z'A "4 LU * 1-_ = ..J I Z4 I _j 4.Zf~W Z* )1-0
'.4 C~d LiLA r4>dqW~Zn~ *1 -IL401- W4 1 U. -Odc 4
4Li.3 Li4A. 0..II i- 431-0 t" LL 21- LiOmlO No.-IU. JLUL JlUjZm w >pw e em - a e A - ae LUAL lb .JW
%Ot*4c1-' -g w..n LU ..... a - 0 0 - we J.
107
9-~~~~~~ %*~9*j ~Y .' V ~ ~ v -~,c..-. ~ . .S
44
9116 6 C %i L
0 LU C .4AW O I ILUG QC uju~lI I
0. a * 40x 4 tr (7xiUzLU
Z J 3 LUJ* 1
t* 1. LU 0~ 4 6Is 1 I.ac-d tU U * AIA0U I q I
Z . * 4c" c 1 x I
z* -0 *LL CL I f..(J410 W.. L*0 U I a- I
*%L UG. z QUe*a. al WWE4-44 z I I u
Z I- C.J acZ Z 22O I13Zi I
.JJ At 11. )(wC 41z e IZ~ :)z 6 a.CLU-9-iw LUZa J 41zaa zC
%: I*-pt- 9L-Z - 41 6-4444 le I% .4 L cp *0 '4 2m * 404U 66
1-3= 2. 1 Lu * I-. 4 41 .4. 1 L I I2u .J %LU 041a :2z~ 41 41 0.U.ca 1 0ci12-aJ6=*Z '..JW 41i ONW th* ICJ . -1 1 C
Z4 ( *.e- (D. 2-. *x (ACMU 0 I~ z 1w0~ MwW4 2w -JW-. 41 0.0. 62 Jl Lq
CL *--J= I2' x 41 LU I I goJ I I-czt-w &-. .0 ""9 *W 'w 41 2 -- 40 $&C I I"
Z.ccL0CL - 3..W* t- * 41 OUOU..~ I~ 6 01. W1- vpw~ .- 0 oe * u..cc ( 1 0I-39 .LI XCL I- Ux 41 O-We 9. 1 44C
..J 4.qU .- 139 0JLQ .6'- - j~c 0.09 .J 41 ZZ.-. I 0
IwtZO.4 s 2 ..5(7 Z-. -0 U.c" 41X 6U-04 -9- - I 0au1(#AuJ4UJU .00 C- IAI-. . . LLs *U a' >2 0 U IUs 01 0.&UM.JCLw 4 .I 0a ON .0 0 *1J tUW- as I O)UZ I
Op I-.l 41 -. 0LW 0. 41 41i Owc~djw% 12 I t U, 'N.4 I.- x.. 41 3 a -i 4A Z " -4 U)'40 - I2M(I IA.
N30 0 . Ri00 41.. 2W " >0 a -CC Z(349. . 1 >46W0. Z 44 CDIJ~ -2*Lcc 4t 1 412 >L U * P4 I-
*JO "- U Job a*z a. >0 -. 4D a9 a( aI aI USJ i * g. a LU~~au W4U)414 ft% 3'Et4414 -41O 2w 0 W 6 4a a
ON4I0 10J w . .J.*6- 1 .. 'lO) U
'0U UwI.. (. -- U
~z&~~suJw~ ~ * ~ * ~9 %
(A3
04A 0
* 4*Z v(*0 (A
sh a 3 a
A4t- mw*Q 0 . ~* 0 ! * ; C
I- ft CL U.
I- z q.. -.
*04 I.: 4~ -.9 .J m.
a USX " .4-Ci .&I* -i ft 4Ox L. sS V* ..... fm
- -s +8 1.- l is Stu e -
zU 430c 0 V'4s-Cc
'-go =la U)" MC3 qz *s- w
- - - - - - - -.
SIL
.JZ
0 s
06 dbi oft4ft *
Z j OZOZ . - LU* d .
Vo UAW 4s U jz OUca- -o wm -. " L a U = us S
14 ( **L ** P"4ci1 -G3W P" * II. at-tm L* )gl 0 a
50 Ja * v gzcUZ 49
.49 Z 4C 0 . -A 69L a. 4140 a a.4JU,:J I-0 I-; 5 A 1-0 W e0c4- 0oseo
14tU.flu I- LULW* ft"@ ~ Z a
" .J 4 91A " 0 @"4 20 V) Z 3r 1t o _~MO- Ode :x.a 04- 3:; 0 1O =W tn.* gae4 39 oz
31t:- 01 VA4A tn0m14 #A 00 e .44..Q6 ( h6; WI" 6"f UA.SM LJJW9- "AL-4 a..
a &ODU) r. .a0* uq WQ 0-4j* @9MG. C I-*J* u
z Jai NwJww WUJ 9.Jl-C* eWW"JM* CL C16 uJ.-L* 0.2.JwU wu-ij f" *91CO -019 to OZ:& 4..J= 6"C 04 **.DNI-0a Mw~-m ci q0 j~ja
0.6 ~ ~ ~ ~ ~ ~ ~ 1 *..J4OI---026 0 Z0 49111-914's9L WOZZ2(4.0 04 =I*JI- c. 00.- tu 3BIA. W"u
)' 0a 649p-14 I.o~-Z Oct d ,.. J4pvw U.06 1 W%.4 a.w w3m0J&QZ.4WW 4 9 4t1- 16 x Uww&uj. -J310" accc a. Jau. CL
C4 US.- 41 ZaC j24
4-. -j..uLJ-JU...
.4 110
I; *-7 *
#AA us4 j
1- t- MW
44 j 31 ML
at Z9 *r 00- c
I- j LU3 a 1W41 64d &L 0 C* a
Ee a 1Mu 0 0 39 x 02dct '4 Mv 6- co a uWuC"
090, * -m 10f db.1 1 u*Ia2- a. .41-4 'C" 4 404
62 j 9L 0 4 Swjso 1-t 4-4 x wo 00 41 dqf *c
acz0 aD0 X 3X I- 41 C.
Joe-44 j4 LU * w= I 4LA- * w0-4deo 2 o£2 I". 2O -Z= f- oz @ ollat"~ 49-oo 6 44 Av.W 4- z xi ** Wag.2'-4 44 46w 4B4 .4% j~l ZU(3 C9
EWO Jtmw o4 4 4 0'o- on- 4* *2 Um.ac3 q44 (a 04 us1.40C4 2
39n =x 4 j~( 'U-Io-41 j (ft 0 ac1 usmu OL 'UOW'4 . Z .2D Z.g* x4 4
4-% t46.al 3 t O 9-52W ft 1 mu,-
TV)P. O9-o W49W 9-.w a 61W-JI 4& * 0- *0.4C" c Zu *UD.46 Zul.-.6 .. j4 1 41 P-49
01 3 0~.~ 31" BIIL ' C uj-AL 60.. 4 W2226 4 o juo a
1W41c a Z41 49 Qe1j a tao &
9-WO-or
*9 lI 0- ***ii z * aJ **
I" I- '4.* * *
19 U. gfo dft 44 .440SC 1 q-CU -Ip-64a~
24~ _* lflmp 0 4.3*4*f** a. A.0 "_4*4
Ig 1 4: w W.(" *CUJ I- OI*
9 IL 4w C ZNz ""K ILO *4** I ac %J* -~lmwAxm
0 ae -4 -PO1 at2 378 a -0-4 .jda. +"84 us. 4-J'.
ac 2Ig CA qlac. 03 S& z . - .'49 IJA ~ ujLq__L Ib*. I 4 . .0,+CLU C
I 2 - Zs.W4 Q
q. Ia-. + 0 LU*mI CL wo.Cu~*( 4LI G909 0 CL9O*0
I at -3~ N0 00 04mo-U ~e0J. 4 44 6
I I 0 ~ gzcco a.-C w4-0gZ~ a. *aCO aCU* 4
I a I. -I -J-03 [email protected]*Q. =O. - G.*4141 3Ia"V I 31;V Ul'UULUe.sIW *.** -
39s LU9C lo ' =U .RW 5N0431O ea Jm~0.'
d&Q I SUAC. =UwUji4qw'w~u w~uu O& LJ.JW 4 N VD3A 4."t .439
1 J49 13C m & Z4Z-_.-aG ZZ ILeo~p OsIL Ih4 W"4 oc2
I C909 1 0. NO.W JO t- U&0604- P-4WMI-G-£t WJ..JQ-G ISJI 4W1 U S o -1942.Pr$0P* *Iin8.eOWLU& (D 4"000. W£(.D1 (21 1- LU o P- Lu oaW* 4PI *a.0. 0 *9t£0ac6CLO 94
I 29Z I 0*.-JZ ag'pq 4 -JZ.1* 3w* 4ULZ%,Iw- FcZ C9Z . *tO-CLh-3 CL
u * ZZZZ9 ac
I-Ia '4a1* 4 aUU
fte0 mae a a. (La p
112
CL M..1va
*LXO M3I I
32 1f (aI- IP40 (3..I #3 I I
"0 :0"IPQ (a I IC3 * M-. (30LL CI I I
*- CL CI Iw.( I*6 4(1 4
UPac * WAM 0( I I
Z* * I- (q - I) I I
ON* miZ.CO43 I I
ZU (IvEX- MALL N %0* 3 =) (90U1WI0U z*t *4 a.3 0 3.Qme.ZM( I I
*~A c w44( z m
U. (909 00=1 I Iz U. (saga Oam I I
WU,*U OV64 * w-.ae4(3 I IM~ =1 CL3 CIS(3I I M
01- -1 "4 ffa43czM(f3
jau lcnuWNI I 0ie -
".C 3z in Z(3 I
" e* aC P 1WC44 MZL -OM I caI I.OUZ6A O~
31V :! "0= .- eqOc3I -a 904 * .4z""L4I* )Z~u 4 - .- %V ZZ(Uu i-WZ( I ag 4~n ZI dt j~z*J I- *wC b 4 - M .m(I41 MAI 0*j0 C30
ow 0* 0 W6 OF5- (UWIP I- I 4X 0. dO"W0.t.Aj~t -0 do * j' es W3ZZ e.(1 I G -OWi *Gs44 &-*GC
Zft * v4S 1- *6 .J.- mag304.tu IC Lo 45 WO. 0*o"0- 0 4
z-~ 4 .4*0 IJ w t3L4(3II*W *0OC&J w..j vl 0 * x- UzO l qxl .. ,wr.f I -Z I J wU 4 W
ccJ :34 IL I *-w -0 CS34 00( .. IgOi m.j.ja, (Now-1e 1 4*Z A-3 V1m..JW( I WI Xz-J NeePAJ j eeAI41-
'twu-~ 0 0 *Z WOC MtU4C- .WW(M I ZI ~Ut35--CLLPtU C0 31-0 tu L. 9 a ZZw"W~I--a
.J -UJozw > a w.. Cw w~ a~t w L wUjIJ WLU
113
-Ag
z >
I J*
*U I.3 0.'in.
cc Z4
Z* I .4 4 0U
*u~ (a *. IZ9 c 40 434 *at ..- U 2.11Z -
4 rIp* U wB -CLo
M6- a I-t 0"* .Q 0-
IA6 1 *LU 39~1 1-C "4 n t-cc c
Uj - S IL 0.j&E 0 (.j 1 0- 122 dw 9 Q-" ~0 F
J-4 C20 p- M JCm M C
4i it; "44 82IAI0 *CU 0 t
St * I- B 3CA CWw* I.e" :I Z t a4 $-I414c Ac I Wu r0* q22- LA 0"9-4 .6 *r- -2
0.0 ac*.00at O..zW 1 AoC9000
-JO 2m U.0. 2 JU A
44 2 '1 2 . 0 3w0 f MI-
CV I Jib 25 JWUL.-U _j JLZ
I~~~ wWch.." 0... 4I 00 044*4 .W
I O. .. W* LUJZ .Eu I ~ ~1142
'ius
4 * co I I* It I b- I II*41C I I4 * I CY
emI L * ~ t I I Vh*A-9 * qJ0 I I It 0I
*A **4 0* 0
-ALX I I I*4 41* X~ I I I *No Aj
4A *LU
* 2 * I I I zi*i a.bt I I 103C 9
I -o-e I I Z-ux z~1 I~ *U A I
IA I4 * 6w"20 3 AI. P.l Wua *S I IA v -ft4
* I -o I- Mu-~ I IZ A 4IKf '4 M '60 eac I I I G-3u
I- O do. I SK ZA A.43 x L4 1 4L 4K A Al- wag I m. I N z
01 6 1- 1W*- ML~
1. 4 I 1 UJ- '4* 0A5.0j6 I I.- 4
41n x A4 A. So* -Og'II 3u 1 0"~#a~ dc K I-4 to* a-cu I " IW'4S-I -j~~ it
*. I Z.00. . 0* A OX q 21 X441 1 "0 01*-a cc I -404A 10. 0- *ie QOZ.-W dig '.9 00. 1.WI 0 Ow
N4 "A' C6 *0 -UI 6ca I 0L140 4c 60I- I- I 0-3c4 *0. PNIWjo 1 64U~~' 1o ' .1 O 0 " 9
*0 z I wzzx 24 A *w z~c I~tz I "I 0Z'4Wftj0 z
C0. W I Aus1- GA. 0 I- WZ0404 x I ZZIW =ZM ". Ix I.-
:Ai'4 fohtNw ; Zu IK..K ..J'3.3Kcj g q
x4 tuc :5~p *I- xuc- I 2 4c1 ma z qhI UCI- I Zwk 0.w4~ *2 1- S I" I- I 0.2whI W
LU "* 0 OW3-0 wu UL. L6 a I x aK
U*Wmooo4.. .1p 4-WaCLwoL...ewm.. *in *...A.Ja.JA4'4&1mZ-.
115
"5&~~~~~~~~~WE ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ f Aw- %r--.u -w~~~~~ -. ~w ~~ ~ -
W t1 * o
WI 4cSO **g I 4
19-j*~~ 3 #- L-u- * 44'-u--11 G o
at * 9 17-:0 ** I
z I* A. 4% ** 0 zu I 0* 0-i *S NQ= I *.
3 z i 01 O *44*-5- at.**
ZZ ft1 4c jaZt 0-U;3uZ2- a*
; 2 Z" db 90* *~ 5. 44 1* a4v0- o- L*4* *
0429:) WM02 04-4A 144944 0 04 M LU Wglu~ 0- a.114.iw* ZSM t 3*N41*1 00w-No Oa 310 9 6GO 41*
.~~41 4~ I-.JN Mu41- .J-Z 0OOme- -*i-2410* WI-m4 A A* - W.O. UILU*Aol- 37=4
*JIL s 90 *Ar -L x . #-- . -ww-19 -- -VI-C addo Z 0*4 0m 4.-.0.L~ -w~4AI4-jI I- L41W
-JZW4 *2 I- i 0Z- 1-dN uqI-~~: =69, lu-t 04 Wocx 0"0"F*4 a j 11 4 cc~
J= 0 **WS49 W4j j.-Z 39 aZZWWj&I- ..o...5. J444~ 4 I- O-CLUJ
a41Wa *U z Z WCL33OJ..JuaCW = W0.
w4.J0 U0 i U.0 Ji *WK()(0 -- c 491 f 0041AM.'e4 M; VI W Q6L4&& > 224CU
- -* No OP 31 S j 0WO P f % Z X I 0 0
4M= %2S2-4'(.J ZAxqc . I V) " -0 5~4zc-z 444
0-4'-. Z=( z o x0 4401I 9JIL4 4sx * ic z 0 0 gum1 z"11-4
f:VAiov 41-f 00Ig-ffl
OowwwO- II II,4M :
116
IN
? tit& Z!?& 4* , . .. I~ ' %*
Lw -e-v-1 V
11's-UL * a
* 4 1If t Uc
*(* -su
IA.JZ#A I z IIfZCO 3USZ ~ 4ft0~ I -i I dbw
i I x 1. 49C -f 4a l1 x I 6z XO
* Oc.Jc.i I *:.. -3J INust a g.(7w g z I-*i
le U s.- = I ~ I b Il-A.-I- lo 004AI I I 1 +04-2.J C4
* W II. g 00
L A us*z c~e I IuA1J49 i" 1--j 6
o" 0 0*q I-aU 0 IZO - d LJ%"we A*6 p 4U.LaL I -W10 & - oIj FCt
_ 3 ba Aat I 1 0O mb. x z 2z.0-4 * 1- COUA, I OA1 C2 b40M4a jqx 4A C
ozoU)WI I 9wiI u)ILI IL I z=2,z2 gz c~Z I-J I.
264. -i VbZ.o 00 0x O-W bVA *- I-0.-U 21 Z q~ju JL -"490tA0 )' o * I. I.U ==Oz A4 1 44UJ-- q" 9 a
om~fw t 40m) * $- -UL I v" I '. 02B(D IA~ 111- *i I. 00 4-.
pq ~ ~ (.50A1' IU( 49 **.64W. aJ. 0.4.aq oaw JJ.
* * 426 I -117
M~~~'~~~U ~ ~ 0 -a - rWW- al.rr -.. -u~~'F~J 7 -. p -is -P -. *ib -a I.-- V.'I V: - 6- .----.- ~
141
1-00. I
I- us1I
Z 02 Cet 0 2U)
0 ~ ~ ~ IW Us-0 I
* '.4 *IWI- L
Oc *u I a aL
2O .- =1 zJ IZ; 0a* 1- oW * - IC I- 0 0
VJ *6 4-)Z Z 2iU*i' too.J t1 41M I .. .
4ji *4 2b C n t .
41 1-f 1- *
I- P2d 41 wo pqt i2LP"%00 r
2.- 1100 a W W4 41 0JW *0 44 49 W sixa -aa -I-0- a 044 Us 0 9 P4 ZCL I -#U 90109 49CM MZ0 ~U
I- Jlb* Jl- *'n.4W f I )-0&1 * 1-5w 1- 6J O=X 2 I ao =-O 5w 5.0 0=-oP-O -- 4 4 us Q 410 -0- cc I.33W ae1 -1 1-02 .1-'
* Z 4 w a =0 4 *~ uz. z I cjb uiQuz - 491 4q.'- uitP-f 00 c-W Wv - *I.- .-.W,- I z .- ' X) n WX) aq
z~2 Z 41 qop Z'4 I WO. 41112 4WL O4LU 1-W-1 W44 Z~K W W m- L 1O. Z1 -1 1-Zl eI
44a af% *W W 0JI 41 JOLUZ-J >mJ 0 00 0 2.J0 20- C k"4cp U c Cru WW.2u W a a1 a41 L I JW JUJ JW UWL
I Uac
a~ 31
0 #U I.*2MA F~u c
. V) U*
-I--IG) I. *
wa 0c- _.j *1 *
.4 0 Us 0 U , *4U V t
Up. Aw U zm- 4 0 U I .. I
CL 4g*a -10M *CULCZIw
OZ300 00U 00 0 Je.I*f Z
.4.9. JIW6 *J. i C k CU
1-U Z4 I-119
-APPENDIX F
-PROGRAM TO GRAPH GENERAL STATISTICS OF THE SIMULATION RUN
a~.-.a a h
b". cy * s41.04
% 1-4 A "q 01%
aU) 4lb h. CL .4 '-
if 04~ 0. a~~ W h 4A 08040va1~ c. *mJ(- mZLis w 3m .- . -*
16.W CW 0A. LUJZ '-. '-io)Z*6 1-- -4,-24 U .'
4Z .4 lbWI -..U 41. (fl1- 10- ~ *,.g
440 S-Xa.Jp-I-= t- ZOtb1- 3-
o Ot)a .O'Q it W4 -a* Z~ oe- cc . f Q.. ~ ~ ~ 4 .'. (*U ..a0 0 I4Z1 4 C.2j O ~.3~' 0 14 W
.. a ' . lk 01c 41- inusW =X.J 0. t -z 1- .-4 .JI. qA z a 00.2e 00o 0g *Atqu 1--41aj Lq VA va ~ pf ai~-.-, o"j a . I-cy,- '. ..
Z Jzoif a X"Z** 0 4Z ..J4 I. .- 4I4140r4U0N ~ 1"0 V6. * .om 4Wh-P0.Iu CL ,-1 b*- :DCI )4 I
1-* "p ""4~ %a LJ j 94 1~ 0. ui Wo
_* !!! Ik n -4 ZX 1 j k04 ZL.Iu09
. .1-W V) OG.w .O"G4 w "3-o w~aU)a
a t w '. a W_ . u a LSI -Z2 Zi-..I 0 c Z$ - J(J'.).'J.'.4U-
aWIu w 4w c 04
.3U.).14jQ Li Lij L6 P_ of-L
WA.1 10-oz-0 Zd oiWW.4X-4 3.20N -4 _"N N-at v I~L w-3f_~V4' .a4 - ~
M.--" Iw JU Cr* CLO6 "JLI.- I"AI3 t c- - x- . 09 z u-t
NN In * 0 b 0 L
-4040 0 m N 4--
0'0n t% 0 1 amin an InOP4 0 0 U% a q4a 0 In
"" i -o am OO 0 0:;: 0. _o 1-0 _ aU* - 0, :
o * 3n .o iQ 1- 00 a NNO 1 4 o 0 0 ca ob4.0r MIn% *. NN 0 In 0 .0
V- .4 0q (v N-c N coo to r- .440a4c -# w. C 0.-l - <-~ P-4 4 "J
O0 t a t td ft b4 . M e- 00. af aOA I -% AM400- ge sqnOI0'O ac~ Inuo X OI XIO
-44.40 00 a 4t"Jo * a 40M- 0 0-0 4.-I .0
*'m N UW4 4 4C"40 -0 cc go 34 cc N)V -4 -4UL = .4X - *L Ze 0 0 4a-4>-4g In 0. . ** U. * -Z4 -C
C~ ~ itas *-men CAVt - Cm -J -- ZJ Z04 ;j 1*~ m
Q4010 *IL4IU0O-%01-0c ft0 0 0014 4.'w-l
-A- I aC4.44 *e 09 P- 4* -. "4- UJ am * w LCOUD - l C9~9~Lu6.H4. 0 WA 49 -40 1--** -t taeifw o I- i- I UwUwM*
Nbel-lw- .Q 491A NO. 45.- o. <Q) M0 0-< -C
-dI 00"> -.. ztn U 1 .IZ0- (30 -CCLU 0epaZ L (D a 04 J a~ C0I ft -j L1 "4I~f Dw -94D
ILI~~~4Z49 MOLL. >-c.4- -4 w Zta(A Az .- U.04t"WWWZWZ aW -... inin a.... cgJLU .. J a.. OXZ * 0I0-'CC*qLUJUZ-ZL4a
ac ~.JL~fo-inq a - w-S--,..z-i wwo Jos-qo.-o J.. aJ- i..o * Oldbl Z-iii. - (31-i
~4~W. . - XLLQ L5.d 49 4COCZ.C IC- g 4UO OU)W(3 49 <81 -cot<W~'.lLUL-i.0 .J'Ala 5-~1 W~- a ( *s..(3 1 uI U W i 0
%0 41.1N N11 .~4-)I.fl Nf .4 t~- 0 ~ ''QZ I3 0'A~l3M gU'A0 J i).WLa * '. UiVD0n I1 Q 0oW. U nt00>
U ZZZ0400.- n.4~e~'0.UJ~~ N4~ *Zn 1210~4.
4c
*1%c
* In
"-W 0 OW0494V- 44
.0" f0 oS. l . .b .0
%0~~ ~ ~* O U Lfl CYOI I 4 a4-0 .4A NN A
tg VO *- -4- " N 4w0o -sn "4" Pe4 in 4Dw .4 * IJ e4
'0 0-0O me -0 N Z0t a 0. 0r 40=S4.C '1O *- t-4 CO0 C 0 0 - %-j
o No SM*4- M*e% ffiA = 0"o1P 4 99 o co acf4
P4 a 4 - 'A ON 4D Qd * 0 ~ --
0 44CO44 4bC bo b **k 0 4. :il" 1 4 *.t *.~w 0 a 49" :04100 W( ~ Is co o 9 100d U -e 0* * 4bc3>D' b-r
4):)04-m 4.o- 1-404. 01 40*4c $- 1-0: -4 ma0,
eccv(5j 0CN~I.24- C049c I- u4- -l ~d4WC-,j 449-400= 8.
's. Oc~tlo 41-. O -4~- 0 0L 41et @.-Z l -1 aw w (3 4U
M.S." *034m .4oI-4 00C"3 0U w* t S0. u t04Z Io-e .L-LIwc:L'L:-4x 4
00 *c ze .-.s- ".-UCCV4 U6 .Li.J10 N 0-0 1 2.(-7fc~c-jO- Z9 4 4- W.J..-JOS. o N Of-C *b arnt~flWuj 1- 4" 1 (a t=440.9 4.W WJ.J(J o
* Ie Qi.J.J"~N. LU @No Ze * IUO efvlx:)=0 :3 _.- I c,~4c4We 4., I-19 4w j-SW ~ ~ ~ ~ ~ ~ ~ 0 .eV-4 I..1W4.s* ( G 2-t x 1( 0 1 Lu.U- w We O C. 4U ft.-44
.L~'~ogLiqia Q V) e0We-)(c . -( .4 "C cIl( .13244.W~20.. OO0- Z *2)(amqmU O ~x40.J -ftW 440C.8.1- fl8').4Il I*'.2u A- L I ZOZZq*.4.ad-j tnl.-INO-.0.~w t3mw a s Jm :) we -m w ~44-. 0 '4".4u.. ae 0.4 "I .re -C .0 m 6 ~J
3p .JC0-4)UIJi.iC0.J.E0Ji#0..J.. 11 JZJ00IL J->C2Z#0Le'1JflZ'l-Je.J --- j.L0L~lJ. if..J
#0VI~W444~~0-U~~d)I/l1 Ow
12
Li iL
~. J2~ ~ *..~. .~. ~ -. X 7' 5 P . TZTV~--~' y%- TMV7 U
.026
cc 44W - -00 0'0 O .o- . O
oa Ln 0 0 OAMi
N * " .4V- t
0at zo 0 - f U1-0 00 010I 0O4-=*- '411 "41.-4 *4 N- 1 C .4" *"
c- ca .1 p .4 c i &-cm co c
Ac 1-0 -o 00. 'W < 1 . m09-o ACM* * q 0
* 49-. 0l 0(Z go 04>* 0
N -0i.1- O i e I4 IN.4-W I MN nn f N
M40: W= w owUj 44 M on*Z N I4J..uCIO ccgo.OZ 4 MW MM q Z10044-e OWA 0 0N.m- 3-. m-4 am -3 0UM *e) _jlij .- -~
OWCO a-q3m a 25 *Z0 0V ~" CS~
01-~.4,10- U. - .J I 4j4 1 ~ O We** CD-40..4.. Loz ac.) I*M( 6 33 Z ~ I Uj-L..MU L~4qC dC * W a.. *
- "4UOV 3 r . .(30 La I.-a *r 03-.ZI-"43~jlO-- '0~'*.o -4. " 3-.N 0 -44 - $3-- 02W. 4-4 3- C0.4A 49 -4- N 0-493 s.
LUCOL49LU 0WLU-JLU ~ 4 I W 0=9&>ZCLOJ-%ZA~e.4CU alA l&'j c t2 GN"4 -( % jI ~ z4L9cfI-Lft mzo4 .o *:"04-c 0U "-"uw a004Z4 Z CLM~. (04D t go.~' .mo4a aj b
a "0 0 4-" z- 1 Wg1.0qI3~bL)fl 3 *~~.
WWWW WZO= zzww z~gco-"LLUZIZUJLIU 04'fULUQC 3 .JJIWIM .q. -034>30II .wN* 11 W--3Z-0WO~34030 ,
O2JJJJJ-WJ-.0 0 4-iiO. 2 ZlU J--JJJ.JJ--.J-31.J-4-W3W.,40.Z 40Z.0X.0J.JJ.J-. J- 21p.J.-.J.J-JJJ -0 -ii-ii i j---- J-.-.4'44 .Jfl.4 cZ
* N -4 *3-IW WeLU ' I ~14U4 4 W--J'ja N.3-4*3.
- U a - W Ofl(.O J3 3~44W . -. 4U.JI123L 2
04 N M 04- 0 U
"440"4 4
LU4# - aC n* a %.b-f
C 10 0
; 0-. Y.eI09A 00 "4 ca OCC4M"a.-0La qtt efco* C3 cc 40 3-1
'a. CL C 3
0. * iio UN
.4.40wn. -N N)4 . -q. *C, jrts .4. 0 .- s
*M0C 00e * -. a . 0*0AZ -LUCs * 04 o - a.
;;ac .*.4 I 4 OM 20oao 0 -... .4 In 1C0 4LU Agw I CO Aqf4 c iS. C4~u -. -9 - %i- = 0acli E Iq
OXX4- Wm 00 1I'~'~~ 00 4 O.J f0N w Z - Ztn .Q IJ =M 4L4~.- e *4NO"#*4. -0 41 u. qc40
-s~~~~~~~l -Wz 2 g- OL o -J--e ~~ *4 -0Z O.. 1acK r,0. 4149~I- ~ 0.I
JJJJ 4..-JZ0.J0.J_---1. 4-.J.J.Jj ~ ... UJ eZ
l WO .4 2 OW -QQ We 1JU4 We0"4lh. Qqj in4. I-. wWW~N 041 .-2'O W~mO-4O-O U -W.20.4 Q
411, in-Z 4 W W .4 o 2 4 2 0~ .J 4W .* ua 0 * -0,O~O ~e4s~e4'U~4 ~Q4~02CL
oil0 ~ 4- * w4'4 4L..j.u.~ SI4 I W
*44Z0 ( ..J-I ~~4We4. .14J.#4eJ e.* 00oW. .
4%L
'dm
* & t40v4%(
p- -0 u .f0- 4
caa )4 49cw .f
NJ40 go 0 0f 0 go a L eoU 0 Inwf 0 0 . .N * *9 YC
r-aab 4 a 0 o"s o a. 4bn n 0N inin 0
.4v4 0 N N v4,4 0 . N*. ~ - Q 4,4 4 4b bON -
cooO64 a -f a- *9 (3+- * 000 0 ;00 A 004 0 In CM I. OCtn 51
Q71 o 10 -4 44 "4. 10.4
* 0q4 V4 CC GCO0 :*M a. I Ino W 4 -4 so 0
a 0 alto 0 -- co CC I Oom.I4 ' w e v4 a Oqc44 ft qc #0.. :3 o4c 1 4 a
j 0 L MD 00 A* C4f-IO 0I~ '~ . :1 'PL 40 ml.45.- 44": 0- L)0a. q. an a5 ac 4 f
il* ;..Jsf "* I- .-" .W
O w -z o MeqA.00 X &
LL1 04Z4 ~ . .Z.. a44aa C4l-4 to4 I5. a L. L1 C44 .0...03 go -.4 a- .so o.4 -o wc W- aem j.4 oo 01 o. )I#Oee 44.s a
5 .Js -ieCD. ov"i) m. mit 4.. "A" ' 44- * =4 f..J *4u. 44.44 .Wgg-IO WW0Q0-40210-0 C. -JWO 4a I o. J~l
0l~~~..Z 40Zc~q3w-cwtuj .0~ Z 4W. -. SL-4WCOO~ 01I44 4.W.J.ft aNmU .~ "In1 S.Wt a. v 403,16
I- 9 4CC4W.u 4.0 .. #wj-jI'N~ Wj o Ze a 0 S#4WCIDz . .~ "0 9449W* 4.-I II- W- Z &a. OIL *An 491-. -4t-LW4'4 4 am 90Q-w(SqW o eg - Z omv'0 34.445 4 44 v-.~4~ a ag-I* N N4z~~~ 03 42-o-a c44J04fic. .aj LL. &OWia .a a -"OZ t &" sit .4b
01 U=%0p4>24l aeftm W'.. lkw.-e .w 0 0oCWU.J Iu- 440 I -OM~U, !c4.CLL. - zw4OI~ 44)N.4*2%- U I 2Z249&494
Pow o Im O m -m wOt .4 4.dlq 0 -*...4 o o u.-0 DI
ww .~.ww ww.ww ~ ww ww w 4JJ w.. W.JOwV.Jw w
(.3C0w~w0CDC~u'DCDWCD0bCD0DCD0wW~wwZOwg.
4440~4ZZ404 * 4Z4444Z.JQOWW0w~Wtw44442442 JUWLIAO.444Z01& ~~0'44444'4.In
4444~4q4II44JWW444~UW)125~44
24 %140Cl .a
ca0 ad%00f O- f n V
44 ( 44N6-4LU go in O L
.0 0 0 1*444It0 00 ON N
Ob e, - 0 00 .0 *- ul lb 40a4 *4 -c 4,4 * N - 4
co SO4A1 CV-. '4 M ~ a. 4V4 Z)' 4*c" Ceo0 sh (41. ca~ M ab 0 0 cD -o
Vt. *0-OA in Of 6-00 4ce 24c 1 w 0 4 w 99)o -
&O* -Q4- 4M- L w. z ru 4& UjftS * C 0 ft
449.0 = - 0 ft1 QP1-f %tn 0 4in M o--. .4ete "49 a 0 "1JJ 9. *so)0 S4-z0.4ca
40-1- 0iS a 0 04 * - CKI44AW1 1 tI so. g a:30 -Z-Sl 40.-on o . 4 S 1 4 1 4949 L t0 *C C% q d~ 1 2 -
GP~ 44ae 4ZOO-9 .4 LU OZ&OD4N -0 LI0.4Zqt _G.. (Le=a- dltaa
-491 'Z zI 48 2(42101-0- C C (4(423-0 wW0Q0-40~-0 a--4~I0 - - il ""Z.)--I20 ~5
W~.4..2Z 40-040c..q 400-0 t L-U-uoW..9e UL-A.bf N40 G.wW5, a~ J1 CWObAL L "', !"-2I CDO(~..~ 2p-m 00.) .J04(41 U mO Za a O'4 OI4WWW0J M4 d.Jt9- I Cldl4C U.-di 4. -a 4*Q.JJft04fu WAO10440-- 41-wu4sog4 q5 .J 0-ale 1- LUab U.i Z ML. aW e4no" I.-e4w
injxm-g ac'04JO. e 00 eOL -omrLuZc - z 0(242' mW..4foa ac40A- cb-ft-wm2sum0.0wL4fo~ 320 O*L20.j Wm (409 I
a (2je.90 -Jo a a. ja wqvvq.. aJ 4Di4 -4 P" 0c .. * 4 is~ a* -j
%I 40dt4CU LL *Z44Z1-NW4C h4gLU 0444 4-Cd.4 q44m4cL .44Pl.44UJI 1II.40 42 0.~.gZ444(.J4I~4IJf
~I
a 1
.1126
df ft m-
(L 0.0 mo0" 0; 1&
cc . 1f-
o1i co n a a am.9 to WS N 4 0. 4.0 Id nC
4m .UC p 4 .4 a U dt .#.tf 4m 0 0 01- 00..*.. 0... 0
I- w . 4 010 4 0 0 0-J
co cc I ~ 44. 0 m9no -CI -g cooU .
ll) 010 0r~ e Owe c-04=40 v*m 0 U "0 .4t -i. L4 *0 - *'Mm 0.4 .
cc a *aobI LUN Mm bA ~tf m "44ft a CO b aem
m1-ono- .8 02.-. 04nt 000..~ft 4c6-.J .00-46-4 (a *o0.".m L
4m"40 6-m4. 4 W10.. 44-K"*M04 0.*4903 0LUC4 .4t 0. * ~04Zqc f.omm M 4e a-cc 6b-4c m4 0
Usolof mUP0~ -4 zl .j OVMJe. )U.M 1-ww Q4me a1-40.10-0 ac 'WM .0 x 0U3I.D-g1Z- Wjuwo00I40 0-0 IwC
D" ..wa0.- IL 'eU(3 40 l 1-0I000404"..~ 04.4WO-4N4 f .. 49 LUO s Z oco" 03140 4 .A .ml a a NM o+4 0.
I U elm Zin o O 044j 1- swo .oN -0-1 C94G4WmU 4m -o 4.J.J.o4e LU ow Z-mm 04 i -1144 &4 M 91wbC34 -I 0-4 Ijg w mZ OC4UMII o4-44- *5U40 *4
1._ - v)Pi -~ .4.4ui x in , N NVI 1.4 "404U0..U -4JI 0WUajJ ob - .ZnztnZ( 6.to"g.~c aC-304U4J -6 LU o&.0Wu4coa 0 OZWU>0.1 Lu- via I 0W0mldIfAz40.0W--e0t.zw0.04Q.WA~at lcMW.IAf LU -N-~( Zin- t I2ZfZwc0.4.- q04f0.i.4f 0on M a Jol 04.14 0 "'4..du.m 40 a "a 04 Zm CL= (am ow m ft m ,m m .jom4tv
us..JJJ4-jj.J-J.z-
VQQIQQQ QQQ~i
I CL
.1127
4!
tme"
tn 44
co 0"0 - a
*4 P4 0 b 0f 0 mu44 V i5, *8 4 0 P4-54 .8"
0 ~ 1 a.' =f L*~ ae 0 NN eA"
0P4 - 49 .- 9 0 4. *
'440 a0 N 0o
0 V44 COW ~~46'4 9"4
p"0 w-.* 04mSVA I-O~MtO0m 40
A 0x( 0m~' 444M. . .. m - *-I
(A -w A I U.-ag44LUQZ4 - 3C 4e*d- OC=Q.0J -0 4 1 O..Ac - o m44 pm 4 p.4 'C.4
4'aC -A aO ~ acolI 44 *.11.5-0 0Q0I"N 40 te Z01-1I.: Z j '42.J-.31 W .4 -M0~ "" sm
0AU00Z a _Zczoaaj-cW.*j~%Q 4 *o
Ns"4Z ob 32nf L3 I Z0 ZZ4CL.40CL- Lq.4Q*n0lLs4.JoU)_v~~.4lwwQLe 0 f444ft~ am b~o em . 0 (5m 0 jo ae :) ft jm .4. _4 I wam a W 0 1--w -Www noww wJw~Cg wW w q b#.
0-WZ wWWWWWWWZ
Jt-JJJJJJJJ JJJ.J-J.J~-J--JJ JJJJJJ.....Cgx444444444 4 4444J..JJ.JJ..JJii- 44q4444uJ.u.E 4444444441OoZ
UUUUUU UUUJLP128 ~
APPENDIX G
96ROGRAN TO GRAPH PERIODICAL STATISTICS OF THE SIM4ULATION RUN
wU 301 U 0 -
,a IV 0a
46Z4 16 x 44 1 '013 %*cf 0 4w.
wU 10a a e~ 11V6 to V- I. -CL 7-
C69L qU '%O z a z.4
V0.0. m . J Z 4bw
44 z= h 0 c dit 0 id
Uh -ioU Is el Qza" NW 3
04 kLU ( i UI jf "110 z f.
U 9 4 ZI lUd .Idd MM Nwdo. 4 -
!y 1440. "A4N ( GtW * LU% Idif 8 flA.
4 WW U44) -5*.l1- dd.0l .- *-. I- -Ow60
C9U =4 va ..13J ("Iim u 0 l 1- CA i
X '.4n X - QJ
Id. L1 U tu (4 ZI * .
OIj U. ~ w 4 VU ""-j M-4.- ..J 4 JIo NCL~~4 -ll wW C 4 n . .
V&4U *4-4' LAS- 0. to 4 s.W4-if 0.mO. U ) 44Ni-@6- - a od-06- XC '- 4. m.G.A - a 0 diV.ZU AIZ-06- V 04 '.4ck *-a C4 00 441.2- -
V) .- zUI 3wl-" I- "'I4 40044 0 I- -
*440'4 LU "0.OviddLI
U 10. UQ 44 Zo0."~* 0c am "qc4 0 so. d.LU -a * cUa .JUUI4mIw6146 04 3 WLoddtnoode.-ion-ANO001cZOujWc49=
Z 1-v ~jZQv!L 0%J16-'4 ul-6-..alZ
*6 LcU.J' A 6-do 042 000. N N CNr c wia d = .J. O.0wwZ0 -J.-JwwJ
Uh odid 6- Us LUc usi-~0.w ..IQ 0411c ZZ .l .J Q0
I& ~ ~ L ZOdfdiod Vk C9 ch (. 40 Q
~ZQ t 01L 'Jj0Z1 .
gw U6- 10 0 6 Uw4 '0'. -04.JJ..129JJ.J
Sp( M4 0
OC4.ft- ft i nC Ont-bi
C4 In tn4- MN04" *0 0 e 0 04 Cofte .W . .m, m4 own V
In I0 af*~ ob 0 0 4 0 004 m 0NOn M 6 4.0n In -ft lid NN 0A
ft 64M .4 .949. -4 C4 9 *.0 l.
00 * * P -. ~j -0W -.- 0 f*0.sis 0 " M 0 1.- IM4 03O- Wi OI a
1 00 -o G 0 t lcc- M4m ,O1, 4 ob 0 4cnb=*C 8- coo W. of r4N 0 4
.434 iI 60 OC4' 040 4 0 O-jo .644 j "- CL U. 4a 0 V40 4' t
ft -"M l am 04gp .a . &Z 06 - =I 0I oe -- J-Z -4ft- - 004ia 0 44 a 0 - L* .*Lts *f 06 f .
0 .. . 004iA0 0". 1 - 1-ceot o4cal V I1'44=u
tudo0caoc.qc 44400 s W.o 4 UCC. mb~ Ut 4u)0W0c~
(4 a (Dl4-6Z-0 W00-40i0 x -Z.JW0 * 00 1 a .-Z6 LI.It -c="M0W04qme 40oZ. Oic0..J "0 qn'44Z ft N -Z I UIUI4
I- GC4a4W.U 44- 1--- 4tJ..J.JO.4Nm Iii Om Ze 0 LUC W .4WX 0-4-o (Z40 44I o 0 4 muu .4OZ z- 01t -M
I030.00 N. N4I.-. t"V4-UM N(4tg 4CC act4.ix ft 0 -4z x.0cs co 1 0W0=39 (4AZ4O.0WLU.--ZWO~i.W4.WO. LUC oZWWUO. WL VIO I =W0 9>ui
!!8FZZwILo.40. >44N 40.1..4(w 'r'NOLu.. a inz- Q I z0oz4Oc*-0 Ic . ~ e LO (5. in 0e o jo p 0 ft Jw m m4444 0 P4'.4w4um. m00 0. p4m X~ W.Fww 0 -
WUWDW00M5WUJ 50W(500(5(~gUUIUULUJ OwGZZO LU .4 C(5w(ZUJUA4440404Z4240~~~~~~40)tn 4 Z42Wee4w~W.4f4444
5.(-#Ztt(((.JI4oUtX0U 0u(nu
130
44o
1-0 1-0
Z 4 0Cl 34
in in Ias". 0b 0 * a "0 0 b S
0=4 In Nf C) 4000AI04 O 3-44 0 0~ a *
af-m -00 04 ;C tL' tw-
0 a . n O"44P 0.mm 4b o. 0 WL 0 cc 4.ea 4 09 C-t -4 44 ."4o 0 4 ft 04
40ZO s4% CLm *4 0 I to .6.* LU 0 C 0 0Q.
0049 0~f 1-- (D -Q (3- 00 f1Ammom e u40 a o*d* .3 MZ000 -4
Vw&0 04V L, 4C -49'.'.R 0I 0q zW OI-j a4 Om CD 0 *mA
0dajaa e p 4IAL3c.tO:l (7 L WCQ.0 - 1- ' 1 0 4Sfl(3dlaic*JA "49 . .0 4 - N-0-4 -'1 4in o"L eJ 0u "4 *O 4c 4-
*9 w*jjptml U2.. "44m a *0 1-o OO-W= jj- I CC4 CU1 4 .. '. **44.49L 41 Us 1-41 Ui -C 0244 '-.11- CC,1 4wwM to a.8 .8 0UCMU~w~f~U~
40 -4 40 .- "4~ C 4 b 4 " 1 -iaCw6-tQ at't G9 o1-.atr ae a .,~43 3Cq.4a -t e- . G h1-1Z-0 WwU01-40LU 0W W W..JWN LU 0141r- .U WO I Z 1-1-1-26-0 UW
ja wa 0 P4"4LLOw f 00"ID m cft Dm-fw qw"omp 4I "Of o 0 %0" ~ ju
J4 4 W...JO e N 9-4m~ Ioumni .4 a 4.901"PONWOO(DO 4 W(S.J.
4.-.44.88O. me Z. * 0 WOAUA .iAWOOGC Z O .1-S 424W4. 1. 4L~iuzuw~jiCU..J.8
V"J Nob'4-.1W ' 4~ 3.~ 0- w .2., w. .
N~-1~~via4-44-Il U) .4 4. 1 z a ~~131-1~
%
- ~ 4 d~ m~ p p. .
r0
*.I WI-I*.0
o 1"M 040 46 f o b moow A 0 IA
.4 0VC4. .0Md. ON4 a
In~~0 t- oz 0. M 4 .-- 0-e* 01~ 6 0O.0 . zkn4 * 0.
4'4 "A2 W m4 '4 a GOC.-~e4-4 ."4 M I
40..-aM 0c10044 m~f 00-4
*.4.4O 4" IO 41.- * 2 AD a - .O4U-49f $A~ I4~ fQgucfi o va z .4. 0C) W-.- O 4m
U& w 4 4 - O~ O& nf eeAm (Do ookf.~ ot 1o50al-4030-cl wd IM N *~A a'4 (.0-ftwZl0- LWOC-40>4-
402.- 099=0-j ULm ' Z I 4t-uW-.G W~u:'4.. Coz 22 4Z.0
404 1 4 S W 4 I o 44W.J.A.. N -14"C40 uh ow Ze a 0 20o 6442020 ( .Jl- I G944C. As P-0 4j.jjs"Nm LAS -m
!;10-0441.40 N4wi 0u4.z~ Qo 44".2 N -'UJm14
OCR--*
U4L44Z44Z44.J4C30WtZWw0WJO=w4-UU4404042424044 * *424aUJL~UL~z44Z&
a. 1~444.J444JI44G.U 4X20SLI.~~'0 Z42 414.J14 'jU 414 LJU tfl
14444132
4
I. C) i a ftA I CIO 0 IA0 4L
1. B. & ta 0 o0 i
11 -- - U 00 a-% a <4u I- NO44 A. 0 N- k-
4 44 040-40 * N 44 .4 40 0
*1-w 0 a 01-Ouj ai -N CM -dO
0 a P4 e4 ~ dSC ~ tf Pg.. 0_ inaLL. NN0 40 .4 4.v40-0C 0 CM - I0-.
I.-Lutu lo slo0 -('IN .40 -0 64tt U V
4ogL 0f-14 a0 . 4i. D O - to 04 (D a4 a
a U4db-M) 0 4dgW*CO' M~f ft CC 0 0OM
0-cqnI Z:)O- aQ~ 0- O * ..4'd N -44I CA N:3 044
21- **- ~ ac - Z ..4 p4 a.4 A-.. I 0 4 zq a L M. N .fa 0,49c 9>-4 e- 4 i 0t
L6 0 l= c .a4 12. "Of 4A. so* .. 2I41- a '4. 4~ 1-.'i
-40 491 0:5 InId!.!Sft -40 0-4 IO , 0 -0
OWoi a aWg" a0 RIA QI ft em (.I---Z- W -00- W 1 -. 1~
. 0 LUC 64411I10 CL A- I 0949094UW 49w I-m OW..J-.N. UJ am 2. a 0 WOI 044UJ
In~c % (4 (4*w 40441-I
tU& &C *ZB.#U4-J -U 040 1 UIUB O *2W
0 .40"u4 a -W Zm 0. %w". ""f 0~.a ~ ... *i44-g(w~jc,~Q cc--*~S p W~
(iA5W.J3 Owwzxujo ozc"UA"UZw.4 UPJxcuutuutujujco=&4
~ * *444Z 4444in10Qw
n10.n4XOI ~~O n~nJ4J4"wU'4 .ein~~iI.JI133L442
%
WiP --* W7o~ ow - .o-. J ~ j y w
'VU
.'lid0 .,
so* Ata
:s 4 0
Coc ft 0 ; u
ON I~*0 U n -4 10
coi W% o S-03-t t _"o
fa., 0 0 0 emN 'u
44 Qe 0 ' do0 1-0 emvw OWUi3 X_an"4 . . ft, 0 owel- :34- 0o M I.4
-a.is jo so Om m saino -to ems com m 0 iosa4 4-4 ow Nj N -4 .4 0 ols lool 40 1e~eeme 40 L- .4 - Gb .mQ4- #* f m4lf CL Z zILuqjO M oo a * m-c =~4 0 0c - ase ism 0'4
4CCe Co-4 00 '0 m om o14)1 A OIIA( 0 ~
>0.4 so U. Qq4c m e *0 a.~ osccas oc-4 4 0 m~ x~o-N
Iss. .4 **D q 0 C4 .4 -J~P -g S 0 (A o n41 -we-U.: "ICU 614 "a 0p 4'A(3 I-~ em so Z
_* 1.* 1 FOoJJoz 4 .~ 14~mm-4 40 z a-
Q34m so 0--c 1 9 C~cm a*-.*-44I- Is V. .. -
p"I.-~~~( eQ0 M.~gl qq" I.s4M wemQ9 4mL~~j .6 -1
OLU "0-J0 I Q4C44e.4 4- me 4*Q4u"fm a-r we .. m so 0 n L -StAWOW I"0-0t W. ip I LeJwJmI aLw4 -m33- t4.5U* -4 0 Z - 1-
-*a. I.- g ca asD~ N . 41-0 ,4- NwQ~- .OW 44 m4J- ZQCC z, - z Wi O 4vKW.4.Z 4Oup"m a0s"j3'j - J CC -OUA9 C e 4
OWO -*v4 1- a as 4W c4m 0mm Zoo..s-~ fu m o 0 W0 - o-x4-4-o .4W O '-4 .u4. ~ ~ ~ 'p -O.. e fvq GoeI m -- l~ a -I.we4.4I e - 44e4.4 (3g,..O.- OQ
'40.1 1l-v aefteN N JJ4ws4- N ~ 4.e 4mQo.i
Oalo3mo UI~n"x Z Z".40O Nz-e4 X4J44 OcL jN. le Aoo Zm 140.1 O amK . 3mmS* J mmJ 4-.4e4 '.Uww *a w29p eL.jwwww tuuuju ujc .. jwwwwwuwwUCuwww Uw~wwwLZXJ ~ tua wm 4 MCC "q, ~
2Z0 :w4(((w(wO w4(WWC(0(tt61J~w~0~
a-.4wmW w14444004Z4Z 14 Z4Z Z4.J NW s4 wiW wf
~I OL s~~04 ~llul-~ft4J, f~ AL ~ Z0U~ 0
d -o
MMI-L
- 6 -f t
4900 LA Ne4 0.
4a at C1
4; 00- G. - e * L 0 000soi 0In Om ab 0ot 00 0
* ..0 4 -4C4 r'- o4 U.-o a" a. " m
- a -4 P4 a ""V - I 0 (L 14 0 ga V4 IN O In a * m N4.0 0. 4 -0 - X4 I- oN N40 a.4.4. -4 1 N N - 1~ 3 0Ww 104* omm0 0 :)N44j 1-4 I..D m-mLn Q* #4: t o 6inW P.3
00. gtnme 0- tz *.co 00. C9 lumt0m.4 4D 04 0 0 .4U0_ m 4% 4 - UJ 0-2 4.40 00
mmN tf %-N N"~ l M- 4 -0. .J -I '._4 *. N* .4.*.4 -4 0 Wm -0 a -... = 4 S n. CO -0-: *U f4nft
oeft * se oan qqcm 00m ab 1-4 2U _io.x ** t
O"W ~ ~ 4 (AZLUCO
0 1 O-4b4 4- 3-m 4.4 ac-4 _ 4-0 0U 4/30Wc -4 30 tLUUCOI4023L LUefm.~,4. ;*~ 1mm m0 ZU (2 - f
%I a o o~ow!,w m0ww . Z.tV4 .04cm 4 1 -aa w LU -W(34 23 Om av* .-. C3 g-c .J.-(2 ob 0. N3 a-4I-0 1 us4 i "I-3 co 4
-, I U0a4CLU 44.4(.JJ4MwL ~m* Za4 w -C) UO*V Wa. -IM I Qc99xu
% " Go -co4 a. N Z. P44 041-0 .ta 44d 4"CL- I = GCO - 1 4
% ~ ~ ~ ~ / X me)#( W. ou:190-~304 LULU0Wa3-40 -LU atl -LU-J3 S.0 a Z t~ xI xA. . m0 1 -'A3-4~zWLm,-22 4OL~CLC US 03WW- %w~ qno'4 I U.3-U.34A
Z8Z* .4(4 '-m(~f4 3b GNqOUWOj U3-0 10ZOZ4flQ
w.4 w~ "40 Zo Ma. (2- op.4 ., Jw .43LU4- Mm 4.- Jm .4 rqL - ft Q. "4w
03 __J_. N._J~lj.JJ.Jj i i.443 - JJ NU3C- ..4..4m 4'4.- .. JJ i- Niid
Z 24U3C3 m ~ .4'04U. mJLU~ mLU~2 mm -~ ~2'f~ '.D
0 3 LUO02ww...1 -u~s135
U I QZZa.4~a.- N0~.4.I~il.~ 0N.~CU mIn~a~j ZOZ~%
* 1- 1; Z-a01
- C4
mm In A0 -9-0* -. 0 . 1-1 0 *-
CD 04I in 4o 44.0P 4 4 Qo-0 0" t f0 0(3 a -.a 640
0 % 0 Om4 in 0.ont 0 .0 mi'.u 0 mm -.4- 0 C4 a ; 44
V4 t4 0 C2 "V4cm 0 .am"~ Woc ; t
:0 4.0O1- -In W W4 NO an . m4.0N 0 a.44q# m - ). M4-4 o N(3 -4
"0 AC mnD: _ Q - co (304 I9no "4"4a 4- F-40 44 w~ m * O~
ft0>9OO 0*-C in -ft OA I 0on *nOO O O:3 ='a a qc4%JN.4*l4 .40 1-l
CL4J 0 4ur I -4.40 000 0ccco
*uo N c 44 m 0-:4 CO*qgo . .4 0daILCdOLxjx4-"(o04 - V 0 44 I- M Z~ m .- J an :1 -4 - 1 M W M 4 0 - 10 - 'AIn.
to O 0I44O.J0 as-0c 4#0. s-uz u 0CL 0600 z *- .I-OZI-o Luucc~l-q40 #M W .- -0 r -OI I4 ". w * 0 40--Z- 4"4uJ
04 "49* U.4I(- 0, %j -0 40 t>. 4 CL. 49" cc U 4 . .4-.4C I.- I*ft-.p~4W- 44U ONE Ze a C) 0 01 0c -- I 44 ca4q 4 -
gd".,C14no --- -~ Wool -i 41. A m * -0 *~- 1-4 " 4W fttjs-ac Qco '.4Q. * s-. U O LX 0. a - Io 3EL4CI WAD ftl6-44-a Q
0. 0xj:. LU"4 40o..z.. N .41 0 - tn::Oe 1.60424M-xo.- tn(cN
U .w UU. me on a M~e J- .40c0 ""4 Je CLM m4L~m ft. 09 *44 ft~
s.--g-s - w--.-J..J--J.J..J.-0w 1 ...- " m - -J.ojj -J.J--J...-s-J . w-W~W.4*12 02.0i~O. 4 ) m. *2 .2 ~s-~s-~w~~"4.J
m6-44~)~U136J
AllJc % 6L44m4("4 ~ . m 0 ai- ~
~.4b
-CIOon CO C.4
L ce1-ca.0m ~e4-4f-0A
*41- .441 0
cc.4 Q% co
.0 -Z L-I f
.4"o ew4U L -
1' 4MI-r F-.4 mum cmo~J~m4C 0.. "q..
s0#=~jlf- ft4 0 -
0
IrUN-W~137
Vw
LIST OF REFERENCES
1. Kermani P. and Klainrock L., 'I& Tradeoff Study ofSwitching System in Computer Communication Natworks",ERE TVol. C-29, No. 12, Dec.,
2. Gold B., "Digital Speech Netw2oks", Proc. IEEE Vol.65, Dec., 1977.
3. lug N. E. and Gruber J. G., "Statistical Multiplexingof D~ta and Encoded Voice in a Transpa.ren.Intelligence Network"# Pro:. Fifth Data Comm.symposium, Sept., 1977.
4. Nemeth A.G., "Behavior of a Link in a PVC Network",Lincoln Labora-ory ESD-TR-76-338, Dec., 1976.
5. Tanenbaum A. Goanuter netwok s, Prentice-Hall Inc.,Nev Jersey, 1981.
6. Gerla Ko, "The Design of Store-and-Forward Networksfor Co. pu t.r Communications"i Ph.D. Disse:tation,School oi. Engineerin; and Ap ilad Science, Universityof California, Los Angeles, Jan., 1973.
7. Schwartz N. and Starn T., "Routing Technigues Used inComputer Communication Networ:ks", IEEE Trans. onComa., Vol. Com-28, go. , April, 1980.
8. Chou W., Eckl J Frank H. and Gerla M., 'ACut-Saturation Algorithm for ropologicl Desin ofPacket-Switched Communications" Proc. IEEE Nat-ionalTelecom. Conference, San Diego, Dec., 1973.
9. Rudin H. "On Routing and Delta. Routing: A Taxonomy andPerformanne Comparison of Techniques forPacket-Switched Networks', IEEE rrans. on Comm., Vol.CO-240, No. 1, Jan., 1976.
10. Fratta L., Gerla N. and Klsinrock L. "The FlowDeviation Method", Networks Vol. 3, No. , 1973.
11. Tnu T.S., "Adaptive Routinq in Compute: CommunicationNetworks", Ph.D. Dissertat1.n, Columbia Univsrsity,1978.
138
.
V.
12. Karr I.&. at al, "A Simulation Study of Routing andFlow Cont;ol Problems In a Hierarchicall ConnectqdPacket Switching Network", Pr3o. ICCC, 1975.
13. AcQuillan J. M., "Adaptive Roating ilgorithms forDistributed Conuter Networks", Bolt, Beranek andNewman, Report 2 31, May, 1974.
11. Chu W.V. and Shen M.T."A Hierarchical Routing and FlowControl Policy for Packet-Switched Netwo:ks", Proc.Iat. Symposium_ on Computer Perfcrmance Mcdaling,Measu.emen. and Evaluation, rork-ovn Heights, Aug.,1977.
15. Rudin H., "Chairman's Remarks: An Introducticn to FlowControl.", Proc, Int. Symp. Flow Control in ComputerNetworks, Versailles, France, 1979.
16. Pennotti N.C. and Schwartz N., "Con estion Control inStore and Forward Tandem Link3", IEEE trans. Cn Comm.,Vol. CO1-23, No. 12, Dec., 1975.
17. Saad S. and Schwartz M., "Analysis of CongestionControl Techniques in :on 44er CommunicationNetworks", Proc IU. Symp. Fl w'Control in ComputerNetworks, ¥ersalles, France, 1979.
18. Irland 5. I. "Analysis ani Simulation of Congestionin Packet Switched etwcrks", University of waterloo,Corn. Comm. Network Group, Rip. E-61, &pril, 1977.
19. Davies D. V°, "The Control of Congestion in PacketSwitchinq Networks", 1AEE Erans. or. Ccm., Vol.CON-20, Ro. 3. June-, 197.
20. Kleinrock L., Cgmmanica-ion jets: ;Socha;tSc MqssageFlow ang Delay, Now York, Kc &vH.ll, 19b4.
21. Kleinro:k L., "Analytic and Simulation Methods inComputer Network Desiqn", in -oaf. Rec. Sprinq JointComput. Conf., AFIPS Cont. Proc., pp. 569-579, 1970.
22. Segall a "The Modelling of &daptive Routing in Datacommun. iraion Networks" IEEE rrans. on Comm., Vol.CON-25, No. 1, Jan., 1917.
23. Ross F., "The Application of Optimal Control Theory toDynamic Routing in Data Communication Networks" PZ.DD _sert tion, Massachusetts rnst.Tech., cam ridge,1976.
139
'I
24. ozencraft J.N., Gallager R.G., and Sgal A., "FirstAnnual Report on Data Network Re1i bility" ESLInternal Report ESL-IR-677, M.I.T., July# 1976.
25. Ros F., "Roating to Minimiza the Maximum Congestion ina Ccmunication Network", Ph.D. Dissertation, R.I.T.,1978.
26. Older W., Qualitative Anallsis of Cong stior SensitiveRouting, IFIP North-Holland Pablishing Company, 1979.
27. McQuillan J., Richer I. and Rosen E., "The New RoutingAlgorithm for the Ar anet", IEEE Trans. on CoAz., Vol.CO -28, No. 5, May, 1980.
28. Gallager R., "A Minimum Delay Routing Algorithm, UsingDistribated Computation" TEr..Tans. oaComm., Vol.-Com-25, NO. 1, Jan., 1971.
29. Little D.C., "I Proof of the aieueing Formula: L=l1",ODerations Research r Vol 9, 1961.
4140
''lep.
v-'
I, BIB LIOGRaPR!
Chrtien G.J LeydIe N. V., NkTO &vanced Study InstituteSeries, pp. 315-376, Nether ands, 19"5.
McQuillan ff., "Interactions Between Routing and Ccn estionControl in Coputer Networks" Proc. Int. Symp. Flow ontrolin Computer Networks, Versailies, France: Feb., 1979.
Frank H. and Chow V., "Routing in Computer Networks",Networks, VoL 1 pp. 99-122, 1971.
Slyke R., Chow W. and Frank H., "Avoidiag Simulation inSiaulatinq Couputqr Communication Networks", Proc. NationalComputer Conf. 165, 1973.
Felt A., "Dynamic Multicommodity Flow Schedules", Ph.D.
Dissertation, Naval Postgraduate Scbhol, Monterey, 1981.
14
INITIAL DISTRIBUTI39 LIST
Sl No. Copies
1. Defense Technical Informatioa Center 2Cameron *tati n 22314Alexandria, Virginia 22314
2. Library, Code 0142 2Naval Postgraduate SchoolMonterey, California 93943
3. Department Chairman, Code 62 1D~partmEnt of Electrical EngineeringNaval Post raduate SzhoclMonterey, California 93943
4. Prof. o. M. Vozencraft, Code 62Wn 3Department of Electrical EngineeringNaval Post graduate SchoolMonterey, California 93943
5. Lieutenant Commander Harry Tharnberry 2Peruvian NavyClemente X 135 San IsidroL ma, Pru
6. Lieutenant Colcnel Knon Sik Bak 1Korean &rmySHC Box 1328Naval Postgraduate SchoolMonterey, California 93943
7. Lieutenant Petros Magoulas 1Helenic Ai: Force41 Kilkis Street,Patras, Greece
'
142
NIL-