Proceedings of the ACM 1980 Annual Conference on - ACM 80 1980
DOI: 10.1145/800176.809964
|View full text |Cite
|
Sign up to set email alerts
|

The Distributed Double-Loop Computer Network (DDLCN)

Abstract: This paper

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

1988
1988
1994
1994

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…The other association (made only when full connectivity cannot be achieved on either loop) is called loopback. Nodes making a loopback association are referred to as loopback nodes A standard token passing scheme governs the access to the network [3][4] [5]. Only a node that "owns" the token may transmits a packet of information.…”
Section: Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The other association (made only when full connectivity cannot be achieved on either loop) is called loopback. Nodes making a loopback association are referred to as loopback nodes A standard token passing scheme governs the access to the network [3][4] [5]. Only a node that "owns" the token may transmits a packet of information.…”
Section: Modelmentioning
confidence: 99%
“…Other schemes enhance the ring's reliability by adding more cables to it. Two famous architectures --the daisy chain [2] and the double loop [3]--have each node connected to four unidirectional links, two incoming and two outgoing. Thus when one loop is broken the nodes can use the other one for transmission.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, there has been considerable research i n to methods of enhancing the fault tolerance of a loop network, where fault tolerance is some measure of the likelihood that connectivity among nodes is maintained despite failures. Liu et al 2 proposed the Distributed Double Loop Computer Network DDLCN which consists of two counter-rotating loops. FDDI, DQDB, and SONET are examples of a pair of counter-rotating loops.…”
Section: Introductionmentioning
confidence: 99%