{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T05:17:00Z","timestamp":1698124620656},"reference-count":10,"publisher":"Wiley","issue":"13","license":[{"start":{"date-parts":[[2007,3,21]],"date-time":"2007-03-21T00:00:00Z","timestamp":1174435200000},"content-version":"vor","delay-in-days":5558,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Systems &amp; Computers in Japan"],"published-print":{"date-parts":[[1992,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This paper considers the simulation method for the performance evaluation based on the formally described protocol specifications. Here, the simulation using the FSM model is outlined first, and a model called unitary token model, which is derived by simplifying the FSM model, is proposed. The configuration of an experimental system is presented which reads in such a model and executes the simulation. Then the data transfer by four layers, i.e., the transport and the lower layers in OSI model, is considered and an example is shown where the simulation actually is executed for evaluation.<\/jats:p><jats:p>From the viewpoint of the method of analysis, the model for the individual process in this paper is the general FSM model, but the waiting due to the sharing of the CPU and the channel among processes is considered as a part of the computation in the simulation. By this elaboration, the performance can be evaluated based on the independent descriptions, even in a situation where several kinds of communications exist as in the case of the two\u2010way communication and the multiplex system. In the simplified model, the result of evaluation can be obtained in a simple way by reducing the task in the execution, by pre\u2010examining the communication protocol that is executed iteratively by the process.<\/jats:p>","DOI":"10.1002\/scj.4690231301","type":"journal-article","created":{"date-parts":[[2007,7,7]],"date-time":"2007-07-07T22:44:20Z","timestamp":1183848260000},"page":"1-14","source":"Crossref","is-referenced-by-count":0,"title":["Performance evaluation of communication networks based on FSM specifications of protocols"],"prefix":"10.1002","volume":"23","author":[{"given":"Akiko","family":"Nakahara","sequence":"first","affiliation":[]},{"given":"Hitoshi","family":"Aida","sequence":"additional","affiliation":[]},{"given":"Tadao","family":"Saito","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2007,3,21]]},"reference":[{"key":"e_1_2_1_2_2","volume":"8807","author":"ISO.","year":"1987","journal-title":"LOTUS\u2014A Formal Description Technique Based on the Temporal Ordering of Observational Behavior"},{"key":"e_1_2_1_3_2","volume":"9074","author":"ISO.","year":"1987","journal-title":"Estelle\u2014A Formal Description Technique Based on an Extended State Transition Model"},{"key":"e_1_2_1_4_2","first-page":"515","article-title":"An Improved Algorithm for Estimating Protocol Performance","author":"Rudin H.","year":"1985","journal-title":"Protocol Specification, Testing, and Verification"},{"key":"e_1_2_1_5_2","first-page":"561","article-title":"Performance Analysis Using Timed Petri Nets","author":"Razouk R. R.","year":"1985","journal-title":"Protocol Specification, Testing, and Verification"},{"key":"e_1_2_1_6_2","first-page":"269","article-title":"Protocol Verification in the Presence of Time","author":"Sajkowski M.","year":"1987","journal-title":"Protocol Specification, Testing, and Verification"},{"key":"e_1_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/0140-3664(90)90174-F"},{"issue":"7","key":"e_1_2_1_8_2","first-page":"562","article-title":"Evaluation of network transmission efficiency with multilayered protocol","volume":"72","author":"Aida H.","year":"1989","journal-title":"Trans. (D\u2010I) I.E.I.C.E., Japan"},{"issue":"4","key":"e_1_2_1_9_2","first-page":"424","article-title":"Evaluation of transmission efficiency of network with multilayered protocol","volume":"73","author":"Saito T.","year":"1990","journal-title":"Trans. (D\u2010I) I.E.I.C.E., Japan"},{"issue":"4","key":"e_1_2_1_10_2","first-page":"317","article-title":"Construction of translator from protocol specifications based on Estelle and ASN 1 to Ada","volume":"73","author":"Hasegawa T.","year":"1990","journal-title":"Trans. (B\u2010I) I.E.I.C.E., Japan"},{"key":"e_1_2_1_11_2","volume-title":"Jap. Stand. Assoc","year":"1986"}],"container-title":["Systems and Computers in Japan"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fscj.4690231301","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/scj.4690231301","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T18:19:24Z","timestamp":1698085164000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/scj.4690231301"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,1]]},"references-count":10,"journal-issue":{"issue":"13","published-print":{"date-parts":[[1992,1]]}},"alternative-id":["10.1002\/scj.4690231301"],"URL":"https:\/\/doi.org\/10.1002\/scj.4690231301","archive":["Portico"],"relation":{},"ISSN":["0882-1666","1520-684X"],"issn-type":[{"value":"0882-1666","type":"print"},{"value":"1520-684X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1992,1]]}}}