throbber
Copyright 10 IFAC Distributed Computer Control Systems,
`Seoul, Korea, 1997
`
`AN EXTENDED TCP /IP PROTOCOL OVER THE
`LOCAL AREA NETWORK FOR DCCS
`
`Jaehyun Park, Youngchan Yoon, and Sangchul Lee
`
`Department of Industrial Automation,
`Jnha University,
`Incheon 402-751, Korea
`email:jhyun@rcsl.inha.ac.kr
`
`Abstract: This paper proposes an extended TCP /IP protocol over local area
`networks, that can be used for soft real-time systems including distributed computer
`control systems and manufacturing automation systems. Because the proposed
`protocol extends the standard TCP /IP, all the existing application softwares can
`be used with the proposed protocol without modification. The proposed TCP /IP
`also provides the periodic transmission mode(PTM) , which provides a very efficient
`transmission method of the periodical data for real-time monitoring and control
`systems. With PTM, the periodical data collection and updating the control signals
`are possible with relatively small traffic overhead. This paper includes the computer
`simulation results, and the prototype system has been applied and evaluated to the
`large scale distributed control systems and human-like robot systems.
`
`Keywords: Ethernet, real-time communication
`
`1. INTRODUCTION
`
`Ethernet and TCP /IP pair is one of the most
`popular protocols for the MAC(Medium Access
`Control)(Metcalf and Boggs, 1976) and the mid(cid:173)
`dle range protocol layers in industry. Because
`TCP /IP is ported and used on hundreds of op(cid:173)
`erating systems and hardwares, there are lots of
`system-independent applications developed on the
`top of TCP /IP. Although TCP /IP on the top
`of Ethernet works well for the ordinary network
`applications such as remote login, file transfer, and
`remote procedure call, this is hardly used for the
`real-time applications such as manufacturing au(cid:173)
`tomation and distributed computer control appli(cid:173)
`cations. The major difference between the general
`internet applications and real-time applications
`is the time constraints in the message delivery.
`The usual internet applications permits relatively
`large amount of variances in the message delivery
`time and throughput. The real-time applications,
`however, have strict or very tight requirements in
`
`the message delivery time. Failure to meet these
`requirements may cause a severe trouble in the
`overall system. Although a sophisticated real-time
`network protocols can be used to meet these strict
`real-time constraints, general softwares can not
`be used on the top of these new real-time net(cid:173)
`work protocols without modification. This paper
`focuses an approach to use the popular TCP /IP -
`Ethernet protocols for the soft real-time systems
`with keeping compatibility.
`
`There are many researches to use Ethernet for
`the real-time applications. Because the packet
`collision of Ethernet is one of the major reasons
`why it can hardly used for real-time application,
`most of the researches concentrate on solving
`the packet collision problem (Tanenbaum, 1989).
`BRAM(Broadcast Recognizing Access Method)
`(Chlamtac et al., 1979) and MBRAM(Modified
`BRAM) (Signorile, 1988) are the protocols that
`resolve the collision problem in Ethernet network.
`Although, these protocols are collision-free proto-
`
`97
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1022
`Page 1 of 8
`
`

`

`cols and provide the deterministic latency, there
`are several reasons to prevent these collision-free
`MAC protocols from being widely used.
`
`• No standard contention-free MAC protocol
`is fixed yet. The manufacturer of control de(cid:173)
`vices and softwares are not willing to support
`non-standard protocols. They may want to
`support general solution based on world wide
`standard such as CSMA/CD, token ring, to(cid:173)
`ken bus, TCP /IP, and etc. Backward com(cid:173)
`patibility must be supported so that the ex(cid:173)
`isting software should be reusable.
`• Reprogramming the 1/0 drivers is required
`for all the existing Ethernet devices. In
`case of the embedded MAC drivers, such as
`MC68EN360 CPU, it is impossible to modify
`MAC layer without redesign the chip.
`• All nodes connected to physical media should
`support the same scheduling algorithm. Even
`single node that use standard MAC proto(cid:173)
`col may cause unpredictable congestion prob(cid:173)
`lems. Even though a special conflict-free pro(cid:173)
`tocol such as PCSMA (Yavatkar, 1994) is
`developed, most of the MAC protocols can
`not coexist with each other.
`
`These reasons make it difficult to use modified
`MAC protocol for the real-time applications.
`
`Another approach to use TCP /IP - Ethernet
`protocols for the real-time applications is to im(cid:173)
`prove the performance of TCP /IP layer. TCP /IP
`was originally designed to be used in the inter(cid:173)
`networking environment where long latency and
`relatively unreliable data transmission are ex(cid:173)
`pected. To cope with this unreliable connection
`due to inter-networking, multiple steps of error
`controls are provided. To maintain optimal uti(cid:173)
`lization of the low bandwidth channel, standard
`TCP /IP uses the best-effort paradigm for packet
`scheduling, buffer management, feedback, and end
`adjustment(Lefelhocz et al., 1996). Recently, a se(cid:173)
`ries of algorithms and implementation techniques
`improving the performance of the transmission
`control protocol(TCP) have been proposed: TCP
`for the transactions(ISI, 1994; ISI, 1992), receiving
`overhead reduction technique(Clark et al. , 1989),
`and header prediction algorithm(Jacobson, 1990).
`While these researches are useful for the conven(cid:173)
`tional internet applications, they are not efficient
`for the real-time applications over Ethernet-only
`environment that most of the real-time systems
`are used in.
`
`This paper proposes a modified transmission con(cid:173)
`trol protocol(TCP) to reduce communication la(cid:173)
`tency over Ethernet link without modification
`of MAC layer. For this, this paper introduces
`another type of service called least-effort. Even
`though least-effort is not able to be applicable
`to the low bandwidth link, internet, it shows a
`
`relatively high performance for a special purpose
`network such as manufacturing networks based
`on Ethernet that has a higher bandwidth than
`ordinary internet. This paper also proposes a
`special service called PTM(Periodic Transmission
`Mode). This mode increases utilization and results
`in lower transmission delay.
`
`Next section describes the key features of the
`proposed extended TCP protocol. Implementa(cid:173)
`tion issues and evaluation results follows in the
`subsequent sections.
`
`2. KEY FEATURES OF LAN-TCP
`
`This paper extends the standard TCP protocol for
`the Ethernet-only environment, and the proposed
`protocol is called LAN-TCP(TCP for local area
`network only). The LAN-TCP has three major
`features : least-effort strategy, structure oriented
`protocol, and periodic transmission mode. In this
`section, these features are described in detail.
`
`2.1 Least-effort strategy
`
`The standard TCP follows the best-effort strategy
`to transmit a packet over a physical network link
`that is usually slow. TCP sliding window is a
`good example of explai.ning best-effort delivery
`(Comer, 1995; Stevens, 1994). It makes stream
`transmission efficient in wide area network, and it
`is an important feature of TCP for internetwork
`between high speed network and lower one. The
`best-effort strategy, however, increases the pos(cid:173)
`sibility of packet collision when used with high
`speed link like Ethernet. This packet collision
`is one of the major reasons of unexpected la(cid:173)
`tency of packet delivery over Ethernet. To re(cid:173)
`duce this packet collision without modification
`of MAC layer, the least-effort strategy, contrary
`to the best-effort strategy, is proposed in this
`paper. The main idea of the least-effort proto(cid:173)
`col is that a certain limitation of the network
`bandwidth is reserved to single node, and the
`operating system is responsible for managing this
`limitation. The bandwidth limitation reserved to
`each node depends on the system architecture,
`the operating systems, and the transfer rate of
`media. The minimum bandwidth can be set to
`default or required amount requested by applica(cid:173)
`tions when applications open or bind SAP(Service
`Access Point) of transport layer or socket layer
`in BSD socket compatible environment. To max(cid:173)
`imize the effect of the least-effort strategy, LAN(cid:173)
`TCP does not use the sliding window algorithm
`that is derived from the best-effort paradigm and
`developed for the inter-networking purpose. In
`the LAN-TCP, to disable the sliding window, the
`window size is limited to MSS(Maximum Segment
`
`98
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1022
`Page 2 of 8
`
`

`

`Size:(Comer, 1995; Stevens, 1994)). If one of two
`machine has a LAN-TCP facility, bandwidth lim(cid:173)
`itation can be achieved by pseudo window size
`which is described in the next section.
`
`Least-effort strategy is applied only to TCP or
`socket layer in LAN-TCP. There are four reasons
`for this restriction.
`
`• Port de-multiplexing is applied only above
`the IP layer and the output data of IP
`layer are transmitted or queued to IP buffer
`without further de-multiplexing. Generally
`IP fragmentation is not required in local area
`network because TCP process already knows
`the size of MTU(Maximum Transfer Unit). If
`the bandwidth is not managed by TCP pro(cid:173)
`cess, de-multiplexed TCP segments stored at
`IP buffer must be re-arranged to distribute
`transmission rate of each application pro(cid:173)
`cesses. This rearrangement will be another
`overhead of protocol layering and make the
`buffer management complex.
`• Application process should be pended until
`sending system call is terminated if multiple
`segments are sent, and TCP process passes
`segments to the IP process at intervals for
`pending duration.
`• LAN-TCP should be compatible and coex(cid:173)
`istable with TCP. If least-effort delivery is
`not required, the standard TCP connection
`should be explicitly used. IP can not nego(cid:173)
`tiate connection type with remote machine
`due to its connection-less feature. Compati(cid:173)
`bility is an important feature of LAN-TCP.
`If LAN-TCP can not support conventional
`TCP protocol, the problem of difficulty of
`implementation remains same as collision(cid:173)
`free MAC protocol.
`• IP or TCP process must know which ap(cid:173)
`plication process is sending packet and how
`much bandwidth is reserved. IP process can
`be modified to deal with these informa(cid:173)
`tion, but TCP process already has these fa(cid:173)
`cility known as TCB(Transmission Control
`Block) (Comer and Stevens, 1994; Wright
`and Stevens, 1995). TCB can be easily mod(cid:173)
`ified to implement least-effort mechanism.
`
`tured datagram. The destination machine passes
`to the receiver exactly the same sequence and size
`of blocks that the sender passes to it on the source
`machine. This feature makes buffer management
`of LAN-TCP easy and structural.
`
`2.3 Periodic transmission mode
`
`The periodic data transmission is one of the fun(cid:173)
`damental communication method for the real(cid:173)
`time systems including distributed computer con(cid:173)
`trol systems. When a packet is transmitted peri(cid:173)
`odically, the receiver is able to predict next arrival
`time in local area network. LAN-TCP supports a
`special transmission mode for the periodic trans(cid:173)
`mission called PTM(periodic transmission mode) .
`To identify the type of segment data, TCP header
`contains 6--bit fields: URG, ACK, PSH, RST,
`SYN, and FIN. Each bit is used to initiate transi(cid:173)
`tion of TCP state machine( Comer, 1995; Stevens,
`1994). Among them, ACK bit is important for the
`PTM mode. To the TCP acknowledgment scheme,
`ACK is sent by destination machine after segment
`from source machine was received. Although des(cid:173)
`tination machine can generate only last ACK for
`acknowledgment of multiple segments in sliding
`window algorithm, the receiver always generate
`ACK when segment is transmitted periodically
`because each segments are transmitted every the
`fixed interval. Generation of series of ACK can
`be avoided in PTM mode. ACK packets are not
`sent after PTM connection is established. ACK
`packet is used only for negative acknowledgment
`when destination machine didn't receive segment
`until next arrival time. From the queuing analysis
`of CSMA/CD, PTM can reduce the media traffic
`up to half or less(Rom and Sidi, 1990; Tobagi and
`Hunt, 1980).
`
`3. IMPLEMENTATION
`
`This section describes major issues to implement
`the LAN-TCP. The various techniques for opti(cid:173)
`mizing TCP is not implemented in the prototype
`LAN-TCP yet.
`
`2.2 Structure oriented protocol
`
`3.1 Connection management
`
`TCP is a stream oriented protocol, and TCP's
`stream is unstructured. This unstructured stream
`makes programming inefficient. On the contrary,
`UDP uses structured datagram delivery, but UDP
`doesn't have transmission control facility. Appli(cid:173)
`cation process using UDP is responsible for con(cid:173)
`trolling transmission. LAN-TCP is datagram and
`reliable stream oriented protocol. In the LAN(cid:173)
`TCP, stream is not divided into bytes but struc-
`
`Only a slight modification of standard TCP is re(cid:173)
`quired for implementing the LAN-TCP. The con(cid:173)
`nection establishing and closing scheme of LAN(cid:173)
`TCP is almost same as that of the standard TCP
`except the PTM mode. Generally, TCP options
`follow only SYN segment while the connection
`is established. Standard TCP header contains 6
`reserved bits for future use. Two unused bits
`are used for negotiating connection of LAN-TCP.
`
`99
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1022
`Page 3 of 8
`
`

`

`.......... """ ......
`;···-, n.-.......,__.....,,
`......... ,-:1mmm1m1:1
`.._
`c~:~~~iif ~ ~
`·-----
`I
`
`U l6
`
`,~-'°"'...to
`J2•...-aa11icr
`
`I
`
`16--MI TCPcti..b.a
`
`.,
`.
`
`~Gl-,1
`
`- -~ •)')
`
`'recv' system call
`
`)I
`
`',
`
`16-.flit ........
`
`16-N lfP flCIHla
`
`Awaken by kernel
`
`Suspended
`
`Delay/SI
`
`complete
`
`Delay/Sleep
`
`LAN-TCP
`
`SendACK
`
`Reset PTM timer
`
`'recv' processing
`
`Tenninate system call
`
`Fig. 2. LAN-TCP recv processing
`
`set to the system clock. With this resolution, the
`maximum bandwidth depends on system clock.
`For example, if system clock is 60Hz and media
`MTU is 1500, then burst transfer rate of single
`process can be up to 90 kbytes.
`
`3.3 Periodic transmission mode
`
`The PTM connection is not bi-directional. When
`LAN-TCP connection is established, only sender
`set ' PTM' bit in SYN packet, thus uni-directional
`PTM connection is established. Transmission in(cid:173)
`terval is automatically detected by receiver side,
`and it decreases from initial value to mean value
`gradually.
`
`In PTM mode, PTM timer notifies that next
`packet is not arrived yet, and ACK, which means
`negative acknowledgment in PTM mode, must
`be sent(see Fig. 2). If sender side receives ACK,
`sequence number of ACK is checked, and corre(cid:173)
`sponding segment must be sent again. Standard
`TCP process already has a facility, retransmission
`buffer, enough to solve this problem. Mostly ring(cid:173)
`style buffer is used with retransmission buffer. In
`typical TCP process, acknowledged segment in
`retransmission buffer is removed, but it must be
`left in PTM mode. Segment in ring buffer is not
`removed but destroyed by head pointer of ring
`buffer step by step. If receiver side can not process
`
`Fig. l. LAN-TCP header
`
`One is for LAN-TCP connection and the other is
`for PTM connection. The position of two bits is
`shown in Fig. 1, enclosed by dashed box. 'LAN' is
`used for LAN-TCP connection and 'PTM' is used
`for PTM connection. According to IAB internet
`standard, these bits must be zero(ISI, 1981).
`
`There are some congestion control mechanism for
`best-effort delivery such as slow start algorithm,
`round-trip time measurement, Nagle algorithm.
`These do not need to be implemented in LAN(cid:173)
`TCP because LAN-TCP is only for local area
`network especially inside subnet.
`
`3.2 Additional timers for LAN- TCP
`
`TCP process requires various timers to control
`transmission: retransmission timer, persist timer,
`and keep alive timer(Wright and Stevens, 1995).
`Some of them are disabled while LAN-TCP con(cid:173)
`nection is established. Besides these standard
`timers, two additional timers are added for LAN(cid:173)
`TCP: in-band timer and PTM timer. In-band
`timer is used by sender side for bandwidth lim(cid:173)
`itation, and PTM timer is used by receiver side
`to send ACK for negative acknowledgment while
`PTM connection is established. Before a TCP
`segment is sent, TCP process must check whether
`in-band timer is expired or not. If in-band timer
`is already expired, segment is sent immediately,
`otherwise, TCP process is delayed until the timer
`is expired. After a segment was sent, in-band
`timer is initiated. The operation of two timers are
`depicted in Fig. 2 and Fig. 3. If PTM connection
`was established, all of TCP timer must be disabled
`in PTM connection requester except keep alive
`timer, in-band timer, and PTM timer. In most
`operating systems, the resolution of TCP timer
`is around several tens of mili-second unit. This
`resolution is sufficient to manage control mecha(cid:173)
`nism of the standard TCP, but higher resolution
`is required for LAN-TCP. It is somewhat easy
`to obtain higher resolution in RTOS(Real Time
`Operating System). POSIX standard supports a
`function 'nanosleep' which has higher resolution,
`but real resolution is bounded up system clock and
`depends on operating system and processor. To fix
`this variation, the resolution of LAN-TCP timer is
`
`100
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1022
`Page 4 of 8
`
`

`

`ID0000
`
`700000
`
`f=
`
`~ SOXIOO
`fi
`i'"""°°
`
`0
`
`(b) PTM mode
`
`300<00
`
`2CD000
`
`//! /
`
`/
`!
`:
`
`:_./'
`:
`...
`
`---_ ... -.::.--.-:~--~::_J_·:~L32~--------'
`
`-(cid:173)~ -(cid:173)"'""-
`
`. _.. .... --
`
`ACI(-
`
`(a) Nonnal mode
`
`·--
`
`1100,-,-----,-,--,--,-----,-,- ~ -- ~ - - -
`100 •• ··
`3:1:) . . ..
`
`,eoo ~ ,- - - - - - - -·- - - - ------ -J:::;: .
`io...-•··
`
`I :- ,,/,.iJ3:=:i=,=~,~
`: .__.·:~:~:_·"'_ .. ----------
`
`.,•
`
`...... -·······
`
`200 ....._,,:...___,__...._ ___ .____.__....__.....___._ _
`
`_.____J
`
`Fig. 4. Evaluated Performance of CSMA/CD with
`20 nodes
`,..,,.,--,----.--~-~~~--r- ~ - - , - -
`100 ·• ·
`!00 . • ..
`too •O ••
`1100 - 11· •
`
`~ -
`
`I
`
`900000
`
`Fig. 3. finite state machine used for LAN-TCP
`send processing
`periodic packets in time by unexpected distur(cid:173)
`bance, then series of segments can be dropped.
`If dropped packets are out of ring buffer, these
`packets can not be retransmitted. In this case, the
`receiver must send source quench ICMP message,
`or the connection will be aborted. ICMP is only
`for internet protocol, but it is the only way to
`notify alert status.
`
`3.4 Backward compatibility
`
`Because the LAN-TCP is compatible with the
`standard TCP, the connection between the LAN(cid:173)
`TCP nodes and the ordinary TCP nodes can be
`established, and two protocols work well without
`conflict at all. TCP has a facility known as window
`size advertisement to manage sliding windows.
`Window size in TCP header(see Fig. 1) is the
`size of free TCP buffer in remote machine's TCP
`process. Local machine sends full size of window
`which can be received and stored in remote ma(cid:173)
`chine. To prevent remote machine from sending
`more than one segment of window, pseudo window
`size is used in LAN-TCP. If one of two machine
`adopts LAN-TCP, bandwidth limitation can be
`achieved easily by pseudo window size. LAN-TCP
`uses pseudo window size rather than actual win(cid:173)
`dow size when the remote machine doesn't sup(cid:173)
`port bandwidth limitation. The maximum pseudo
`
`101
`
`u,,aoo
`___ _ __.__..,.:;.__,,L.-_.....___._ _ _._ _ _.____J
`200
`G
`l00
`1000
`1200
`1400
`1500
`1SX>
`&00
`20'JO
`~ -]
`
`Fig. 5. Delay on LLC with 20 nodes
`
`window size will be limited to MSS(Ma.ximum
`Segment Size).
`
`If applications use PTM, they need to use spe(cid:173)
`cial socket system call rather than standard
`socket system call. These applications pass pa(cid:173)
`rameters different from normal LAN-TCP con(cid:173)
`nection when create the end point of connection.
`For example, 'socket' system call can be called
`with new parameter 'SOCK.PSTREAM' rather
`than 'SOCK..STREAM', if PTM connection is
`required. If remote machine doesn't support LAN(cid:173)
`TCP, PTM connection can not be established,
`thus the connection will be aborted. In this case,
`normal LAN-TCP connection is established and
`works well without conflict with conventional
`TCP.
`
`4. PERFORMANCE EVALUATION
`
`To evaluate the performance of the proposed pro(cid:173)
`tocol, a computer simulation package is devel(cid:173)
`oped. In the CSMA/CD protocol, if two stations
`detect an idle state and begin transmission at
`the same time, a collision will occur. Any station
`detecting a collision stops its transmission and
`generates jam signal, and then waits a random
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1022
`Page 5 of 8
`
`

`

`period of time before retransmission. To avoid
`overloading the channel, the range of retrans(cid:173)
`mission interval increases using a binary expo(cid:173)
`nential back off algorithm. The complete anal(cid:173)
`ysis of binary exponential back off algorithm is
`very complex. Even though the simplified models
`were proposed(Tobagi and Hunt, 1980; Boggs et
`al., 1988), the precise model with complete binary
`exponential back off algorithm should be used to
`evaluate the performance of the proposed proto(cid:173)
`col. Additionally, to evaluate the effect of physical
`environment, simulation model should contain a
`facility of handling propagation delay.
`
`The first simulation is evaluating the basic uti(cid:173)
`lization under heavy load to validate the com(cid:173)
`puter simulation package itself. Utilization of the
`CSMA/CD shown in Fig. 4 is almost same as the
`measured utilization by Shoch and Hupp(Shoch
`and Hupp, 1980). Evaluated utilization is up
`to 95% with 20 nodes and ll00bytes of packet
`length. Average transmission delay from network
`layer to the destination node is shown in Fig. 5.
`
`4.1 Simulation model
`
`The network configuration simulated consists of
`four components(two periodic servers, one burst
`server, and one burst client) , and two groups of
`periodic sources. Periodic server receives packets
`from the periodic data sources and sends acknowl(cid:173)
`edgment packet to them in standard TCP model,
`but in the LAN-TCP model, acknowledgment
`packet is not sent.
`
`Burst server and burst client exchange series of
`segments and acknowledgment packets as sliding
`window scheme. Burst client in this simulator
`does not generate packets by probability function
`but follows actual transmission scheme which ex(cid:173)
`changes one acknowledgment packet per several
`segments. Burst client does its best to transmit
`packets as soon as possible in conventional TCP
`model, but in the LAN-TCP model, transmission
`interval is never exceeded a preset limitation re(cid:173)
`served at each node.
`
`4.2 Simulation results
`
`Fig. 6 through Fig. 8 show a delay, average load,
`and number of collisions using the proposed pro(cid:173)
`tocol and standard TCP for the same network
`configuration. Fig. 6 shows the transmission delay
`observed at the network layer under the various
`load condition generated by periodic sources with
`10 % of variance of transmission interval. The effi(cid:173)
`ciency of PTM connection can be measured in this
`figure. There is significantly higher delay under
`conventional TCP than proposed protocol when
`
`, I.AH TCP ·• ·
`10 ,-bk ~
`:, pencxlc ~ · LN' TcP ·• ·
`10 p,4lltodc ~ • 1'CP •
`2'~IOUIIW-TCP •
`
`,00 .
`
`...
`
`300
`
`I
`
`I
`a
`·• •••
`
`t
`
`20
`
`25
`
`, __ .. _ - - - i - i "'
`
`30
`
`35
`
`Fig. 6. Delay on LLC under loads generated by
`periodic sources (packet length is 258bytes)
`
`, . .,,.
`
`·•.
`
`~
`······~ .. ~=~:~:········- --. --~: .. · .. ::-.......... =.~---···· .. -;-....... .
`____ ···_··-_· ........... :·····--... _ ....... ....................... ~..., .
`.. .
`
`100000 -~-
`
`~ .
`~ 10C,,0
`~
`&
`Ct 1000
`
`Fig. 7. Transmission delay caused by transient
`burst transmission
`burst transmission is performed(Fig. 7). In a TCP
`burst transmission, average load can not exceed by
`unity because the transmission is based on packet
`exchange(Fig. 9). Even though this type of traffic
`is not continued long, it can cause critical problem
`in industrial network, especially very long delay,
`even transmission failure on MAC layer. From
`the simulation result, many transmission failures
`caused by 16 contiguous collisions are occurred
`as the number of collisions is increased (Fig. 8).
`The reason of huge delay is best-effort transmis(cid:173)
`sion which makes the average load around unity
`abruptly. Fig. 9 shows the effect of best-effort
`transmission under low load. For example, offered
`load is 348kbytes/sec with 25 mili-second of trans(cid:173)
`fer interval by 24 TCP periodic sources. The load
`is increased to 1044kbytes/sec after burst trans(cid:173)
`mission is started. This load results in significant
`transmission delay(Fig 7) and collisions(Fig 8). By
`the simulation result, 20~220 packets are dropped
`by transmission failure.
`
`Of course, this number of collisions is not practi(cid:173)
`cal because burst transmission is never continued
`long during tens second. The number of colli(cid:173)
`sions and transmission delay are varied by the
`start time of periodic transmission. Consider the
`
`102
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1022
`Page 6 of 8
`
`

`

`uoo
`
`'"'°
`
`...,
`
`,00
`
`~
`
`~
`
`~
`
`~
`
`' ......
`.... ······::·o::.::::•-.•.~:··:-.:::•::: ·:.:·:·:·
`............. -······-
`o '---,__-== =-=--=-~L.;;..=a::..:::=a::.=~
`u
`u
`~
`~
`Tf'WIIII.-WWVIIOl,-klClc:~,..J
`
`..
`
`teristics, the proposed TCP /Il' includes periodic
`transmission mode(PTM), which provides a very
`efficient transmission method of the periodical
`data for real-time monitoring and control systems.
`With PTM, periodical data collection and up(cid:173)
`dating the control signal are possible with rela(cid:173)
`tively small traffic overhead. Computer simulation
`shows the proposed TCP /Il' has relative higher
`performance compare to the ordinary TCP /Il'
`protocol.
`
`The prototype system has been applied and evalu(cid:173)
`ated to the large scale distributed control systems
`and human-like robot systems. Optimization of
`the proposed protocol is required to be used for a
`large scale distributed system and fine calibration
`may be necessary to maximize real-time perfor(cid:173)
`mance to the base operating system.
`
`6. REFERENCES
`
`Boggs, D.R., J .C. Mogul and C.A. Kent (1988).
`Measured capacity of an ethernet: Myths and
`reality. Proceeding of ACM SIGCOMM '88
`pp. 222-234 .
`Chiamtac, Imrich, William R. Franta and K. Dan
`Levin (1979). BRAM: The broadcast recog(cid:173)
`nizing access method. IEEE Transactions on
`Communications 27(8), 1183-1189 .
`Clark, David D., Van Jacobson, John Romkey and
`Howard Salwen (1989). An analysis of tcp
`processing overhead. IEEE Communication
`Magazine pp. 23- 29.
`Comer, Douglase (1995). Internetworking with
`TCP /JP Volume I : Principles,Protocols, and
`Architecture. Prentice Hall, Inc. Englewood
`Cliffs, New Jersey.
`Comer, Douglase and David L. Stevens (1994). In(cid:173)
`ternetworking with TCP /IP Volume II : De(cid:173)
`sign,Implementation, and Internals. Prentice
`Hall, Inc. Englewood Cliffs, New Jersey.
`(1981). Transmission control protocol.
`RFC793.
`ISI (1992). Extending TCP for transactions -
`concepts. RFCJ 379.
`ISI (1994). T /TCP - TCP extensions for transac(cid:173)
`tions functional specification. RFC1644-
`Jacobson, V. (1990). 4BSD TCP header predic(cid:173)
`tion. Computer Communication Review.
`Lefeihocz, Christopher, Bryan Lyles, Scott
`Shenker and Lucia Zhang (1996). Congestion
`control for best-effort service: Why we need a
`new paradigm. IEEE Network pp. 10-19.
`Yletcalf, R.M. and D.R. Boggs (1976). Ethernet:
`Distributed packet switching for local comp(cid:173)
`tuter networks. Communication of the A CM
`19(7), 395-404.
`Rom, Raphael and Moshe Sidi (1990). Multiple
`Access Protocols. Springer-Verlag. New York.
`
`ISI
`
`Fig. 8. Number of collisions under burst transmis(cid:173)
`sion
`
`1,00
`
`i s
`i 1()00
`g ...
`...
`5 ...,
`
`i
`1
`R
`1
`
`,00
`
`0 •
`
`•. 111,
`
`,::::~:::~::"'''':!::•:-· -·--• --
`.... ··:·:_•.:.---=~.:::::·~:~: : ...... _ ... :·::~:-:::
`
`Fig. 9. A variation of channel utilization
`
`worst case, if all nodes start periodic transmission
`and the transmission interval is not varied, then
`extreme transmission delay is occurred without
`burst transmission. On the other hand, if the
`start time is well distributed, then no collision is
`detected at all. So, periodic transmission which is
`based on system clock has potential problem.
`
`If the simulation results(Fig 6, Fig 7, and Fig 8)
`are acceptable in real world, 20 periodic sources
`generating 200bytes of control data at each 10
`mili-second and some LAN-TCP hosts can be
`feasible configuration.
`
`5. CONCLUSION
`
`This paper describes an effort to use industry
`standard TCP /IP - Ethernet for soft real-time
`systems including distributed computer control
`systems and manufacturing automation systems.
`To maintain the backward compatibility, the stan(cid:173)
`dard TCP header is extended to reduce traffic
`overhead and include periodic transmission mode.
`Because the proposed protocol extends the stan(cid:173)
`dard TCP /Il', all the existing application soft(cid:173)
`wares the proposed TCP /Il' can be used with(cid:173)
`out modification. Besides soft real-time charac-
`
`103
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1022
`Page 7 of 8
`
`

`

`Shoch, John F . and Jon A. Hupp (1980). Measured
`Performance of an Ethernet Local Network.
`Xerox Corporation. California.
`Signorile, Robert P. (1988) . MBRAM-A priority
`protocol for PC based local area networks.
`IEEE Network 2(4), 55-59.
`Stevens, W. Richard (1994). TCP/IP fllustrated,
`Volume 1. Addison-Wesley Publishing Com(cid:173)
`pany. Massachusetts.
`Tanenbaum, Andrew S. (1989). Computer Net(cid:173)
`works. Prentice Hall, Inc .. Englewood Cliffs,
`New Jersey.
`Tobagi, F.A. and V.B . Hunt (1980). Performance
`analysis of carrier sense multiple access with
`collision detection. Comput. Networks 4, 245-
`259.
`Wright, Gary R. and W.Richard Stevens (1995).
`TCP /IP fllustrated, Volume 2 : The Imple(cid:173)
`mentation. Addison-Wesley Publishing Com(cid:173)
`pany. Massachusetts.
`Yavatkar, Rajendra (1994). A reservation-based
`CSMA protocol for intergrated manufac(cid:173)
`IEEE TI-ans. on Sys(cid:173)
`turing networks.
`tems,MAN, and Cybernetics 24(8) , 1247-
`1258.
`
`104
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1022
`Page 8 of 8
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket