19850020330.pdf - NASA Technical Reports Server

208
General Disclaimer One or more of the Following Statements may affect this Document This document has been reproduced from the best copy furnished by the organizational source. It is being released in the interest of making available as much information as possible. This document may contain data, which exceeds the sheet parameters. It was furnished in this condition by the organizational source and is the best copy available. This document may contain tone-on-tone or color graphs, charts and/or pictures, which have been reproduced in black and white. This document is paginated as submitted by the original source. Portions of this document are not fully legible due to the historical nature of some of the material. However, it is the best reproduction available from the original submission. Produced by the NASA Center for Aerospace Information (CASI)

Transcript of 19850020330.pdf - NASA Technical Reports Server

General Disclaimer

One or more of the Following Statements may affect this Document

This document has been reproduced from the best copy furnished by the

organizational source. It is being released in the interest of making available as

much information as possible.

This document may contain data, which exceeds the sheet parameters. It was

furnished in this condition by the organizational source and is the best copy

available.

This document may contain tone-on-tone or color graphs, charts and/or pictures,

which have been reproduced in black and white.

This document is paginated as submitted by the original source.

Portions of this document are not fully legible due to the historical nature of some

of the material. However, it is the best reproduction available from the original

submission.

Produced by the NASA Center for Aerospace Information (CASI)

SYSTEM Al,lf•,LYSIS

For The

Hunts:, i 1 le C-^perat i on 'support CenterDistributed Computer System

(RASA —Ca — 171506) SYSTEM ANALYSIS FOR THE

HUNTSVILLE CFEbATION !j0i?PGB1 CfhTER,01STRIBUIED L08iUTEF SYSTEM Interior REPort,dar. - Jun. 1585 (hisEiEEiEEi State Univ.,eiEsissippi State.) 207 p EC AIJ/hF A01

t,85-28642

UnclasG3/b 2 21493

Interim Report for Period March 1955 through June 1985

.A-NN,UAL REPORT

1985

Submitted by:

D. M .as_ey. Associate In-,est igatorF. M. In gels, Principal Investigator

MI _si =ippi Et ate Univer =_i tElectrical Enaineering Department

Mississippi State, MS 35712'601) —3912

Submitted t]:

NHSA MSFC. AlabamaTechnical Mon it pr: Frank: Emmens, EE332,

(205? 45.3-4629

rJA58-34946

011

SYSTEM ANALYSIS

For The

Hunt i1le Operation Support CenterDistributed Computer System

Interim Peport for Period March 1985 thrc,ugh _Tune

ANNUAL REPORT

1985

Submitted by:

D. Masse y . Associate In iest (ciator.F. M. Inaels. Principal Investigator

Mi =_si__ipp( State Uni.^ers(tyElectrical Engineerinci Department

M (s =- 1 ss 1 pr) i State, MS '9; _?J(601) 325-3912,

Subm(tted t.,;

NASF; MSFC , Alabama.Technical Mon( tor: Frank Emmen _ , EB'32

(205i 453-4029

Nr~S8-34900

C' k,'ER') I El-d OF REPORT

Network Systems Corporation s HYPERchannel netA)orVis a baseband, 50 Megabit per second, high speed localarea network.. HYPERcnannei uti li zes a Carrier SenseMultiple Access (CSMA) data trunk. access protocol, withprior i tized staggered dela y s. . This nett„fork has thecapabilit yof interconnecting various computerresources of differing manufacture, into a singleeft iclent comput i ng fa^illtr.

This. ne twork is currently In use at the Hun tsviIIeOperations Support Center (HOSC). HOSC as a distributedcomputing s ystem, is responsible for data acquisitionand anal ysis during National Weronautics a.nd SpaceAdmir,istration- s (NASA) Space Shuttle operations. HOSCalso provides computing services for Marshall SpaceFlight Center's nMFSC) non -mi ssion actIvItIes.. Amission and non-mission activities chan ge, so do thesupport functions of HOSC change, demonstratinq theneed for some method of simulating activity at HOSC inar lclus contl gurations.

The simulation developed in this ;,fork primarilymodels NSC' s HYPERchanne 1 network, since th is networkbasically determine=_ HOSC's efficiency In accomplishingi ts mission. The model simulates the activit y: of asteady-state ne ti,,jork , repor t I ri g stat i stics such ;= .transmitted bits, collision statistics, tra.me sequence=transmitted, and average me ssa g e de 1 s . Thesestate=t i cs may be useH to evaluate such pertormanceindicators as throughput, utillzat on, and deIay.Thus.the overal 1 performance of the network: ma y bee'lalua t ed, as well as. predlctlnt pos = ible over Icadconditions.

HOI,..I Ti l PEHD THIS PEPC 1RT

Th is report is a full y de t ailed report concerning theinner work.inq_s. of the WPEPchannel Local Area Network.Chapter ” a description of the HOSC system, Chaptera. tuil detailed description of the simulation software(design arch tecLure Chapter =1, 1ndi-.)idual sottwaremodule description I•;ppendlx III); and a presentation ofthe simulation results for sin g le and dua.l trunkoperation, Cha p ter 5. The reader Interested In a. quickg"ery I um and a survey of the HOST- = s tern pertormancemay read Chapter I and Cha p ter 5 onl y . Howe - erknowledge of the HYF'EP,channe 1 adapter's inner work i ngsincluding message frame cons truct.lon and timing 1sdesirable, Chapter

IT _ 1 I V

f0i r ' ''

IN

TABLE OF CONTENTS

Chapter Page

ii k . ! ERU I EW OF PEPORT ....................... i v

TABLE iiF Ci iNTEHTS ................... I ... .

LIST OF TABLES............. .............. .iii

LIST OF FIGURE' .......................... ii+

LIST OF HCPONT'M'= .........................

1 Introduction ............................. 1

1.1 NS-C's WrPERchannel Local AreaNet s.)fork .............................

1 .2 HOSC System 1_1 -ler y l e 1Al. . . . . . . . . . . . . . . . 21.3 Research Objective . . .. ............

2 H7PEPchannel ^Ietl,.jork Description ........ o2. 1 N t ;fork. I omp nen t _ ...... .. ......... .5

2.1.1 Ada pter r,rchitt_ture........... Q

2.2 H'YPERchannel F;otocol=.............. 12

2.2.1 Trij- t --icce=_s Protocol .......... 132. 2.2 Hda p ter -r-;dap ter Li nk: Le u e l

and I .J i rtua.l Ci rcu i t Protocol =-.. 192.2.2.1 Frame and Frame Se.auerce

St ructure .................... 21

2. .2.2 Trunk. Sel__tion.............. 3i+

2.2.2.3 1,)1rtu.a1 C+rcu+tE=.tabIishment ................ 32

2.2.2.4 Data. FIov, Control ............ 3O2._ Intra-Adapter +=ommunica.t+on........ 38

3 HOSC System Description ................. 3P

:.1 T y pical HOSC S y =.tem Act1 1.) it+?=_...... 40

3.2 HC-1 15C System Component =_ .............. 45

N `

Of

Chapter Page

4 Software Design Description .............. 584.1 Software Functions .................. 584.2 Design Constraint =_ .................. 594.3 Design Specifications ............... 59

4.3.1 Simulation Assumptions.......... 59

4.3.2 Parameter Definition............ 604.4 Algorithm Description ............... 62

4.4.1 Overall Simulation Activity..... 62

4.4.2 Model Set-Up .................... 694.5 System Files ........................ 694.6 Reported Statistics ................. 71

4.7 Validation Criteria ................. 72

5 Model Analysis an-' Conclusions...........5.1 Theoretical Performance Bounds. ..5.2 Presentation of Simulat i on^ sults.. 81

5.2.1 Single Trunk HO.1L ­,a=_uits ....... 82

5.2.2 Duai Tn i''„6 HOSC Results......... 975.3 Ana ly sts ana Conclusions ............ 110

APPENDIX I Software Source Listing .............117

APPENDIX II Summary of ISO-OSI Model ofDistributed Networks ................168

APPENDIX III Simulation Software ModuleDescription .........................1691. Siml ............................1692. Initialize ......................1693. CharacterizeNetwork .............1724. PrintNetDescription .............1725. FindNext ........................1726. PickA ...........................1757. Acollision ......................1758. Uniform .........................1769. Update ..........................176

10. Print=_.tats ...................... 17911. Activitysummary .................181

APPENDIX IV Typical Single Trunk SimulationResults .............................183

APPENDIX V Typical Dual Trunk SimulationResults .............................1'ry

REFERENCES AND BIBLIOGRAPHY ......................197

vi

j

t

aF

WF

1

..

si

LIST OF TABLESTables Fage

2.1 HYPERchannel Protocol Frame=_. . . . . . . 22

2.2 Frame Form;. t s . . . . . . . . . . . . . 23

2.1 HCSC Data TransfF-: . . . . . . . . . . 42

3.2 Summ?ry of DEC VAX 11/780 I/OCharacteristics . . . . . . . . . . . . 54

3.3 Summary of Perkin Elmer 3240 I/OCharacteristics . . . . . . . . . . . . 57

5.1 Theoretical Bouncs on a HYPERchannelTrunk of Length 100n Feet. . . . . . . . 77

5.2 Calculation of Parameters us:rgSimulation Statistics . . . . . . . . . 83

5.3 Relative Probabilities of Transmitter/Re=eiver Pairs for Figure 5.1 . . . . . 84

5.4 Data Points for Figure 5.2 . . . . . . . 86

5.5 Data Points for Figure 5.3 . . . . . . . 88

5.6 Relative Probabilities for Transmitter/Receiver Pairs for Figure 5.4. . . . . . 98

5.7 Data Points for Figure 5.5 (Trunk 1) .100

5.8 Data Points for Figure 5.5 (Trunk 2) .101

5.9 Data Points for Figures 5.6 and 5.7 .104

.,

Vii

Qi,

LIST OF FIGURES

Figure Page

2.1 Typical HYPERchannel Interconnection . . . . 7

2.2 Block Diagram of NSC HYPERchannel Adapter. . 11

2.3 HYPERchannel Delay Time Events . . . . . . . 16

2.4 Sampls AD8 Contention Timing Calculations . 19

2.5 Message-Only Frame Sequence . . . . . . . . 25

2.6 Timings for Message-Only Sequences . . . . . 26

2.7 Message-with-Data Frame Sequence . . . . . . 27

2.8 Timings for Message-with Data Sequences . . 28

2.9 Adapter Reservation Scheme . . . . . . . . . 33

3.1 Typical HOSC Configuration . . . . . . . . . 41

3.2 Block Diagram of VAX 11/780 Computer . . . . 47

3.3 Bus Configuration of VAX 11/780 . . . . . . 49

3.4 Block Diagram of PE 3244 . . . . . . . . . . 55

4.1 Message-with-Data Sequence for Simulation. 64

4.2 Flow Dia gram of Simulation Activity. . . 65

4.3 Model Set-Up for Simulation. . . . . . . . . 70

5.1 Single Trunk Simulation Set-Lip . . . . . . . 85

5.2 Plot of Uti1i7ation )ersus Offered Loadfor Single Trunk Simulation . . . . . . . . 87

5.3 Plot of Transmitted Control and Da`a Bitsversus Offered Load for Single TrunkSimulatio n . . . . . . . . . . . . . . . . . 90

5.4 Dual Trunk Simulation Set-!gy p . . . . . . . . 99

VIII

ni

r

Figure Page

5.5 Plot of Utilization versus Offered Loadfor Dual Trunk Simulation . . . . . . . . . 102

5.6 Plot of Transmitted Control and Data Bitsversus Offered Load for Dual Trunk (Trunk 1)Simulation . . . . . . . . . . . . . . . . . 105

5.7 Plot of Transmitted Control and Data Bitsversus Offered Load for Dual Trunk (Trunk 2)Simulation . . . . . . . . . . . . . . . . . 106

ix

X

rw

LIST OF ACRONYMS

ASCII Hmerican Standard rode for IntormationInterchange

BDP Data PathBR Bus RequestCHTV Community Hre.a. TelevisionCPU Central Proce=.5Inq UnitCSMA Carrier Sense Flu tiple Hce_sDDP Direct Dat,. PathDEC Digital Equipment CorporatIonDMA Direct Memor y Hcces=_.ECIO Experiment Computer InputiCutputET External TanksFEP Front End Proc=essorHSLN High Speed Local Ne tv)or KHOSC Huntsville Operation Support CenterIiii Input/OutputISO International Standards OrganizationJSC Johnson -;pace Centerk:SC Kennedy Space CenterLPS Launch P r o c e s s

I n a ystem

Mbps Megabits per secondMECCi Main Engine Cut offMER Misaion EvaIua.tion PoomMI PS HI s=_.ion Integration PIannin SystemMPS Main Propulsion Sy_tem1-1SFC Marshal I Space F1 ight renterNHSH Ha.tional Her onautics and Space Administration

h!PP. Non-Processor RequestPJSr He twork S ystems Corporationiii; iiRera.tic na.1 D;ta.OSI Open S y stems InterconnectionPE F'?rkrn El TerPOGO Payload Operations Control CenterRSS Rancae S.atet:: SysternSBI S::nchronous Bacfpl ane InterfaceSP.B Solid Rocket Booster.SSME Space Shuttle Main Engine=.TS Shuttle Transport System!i BA UNIBUS Hdapter1E?US UH I E; IJ Suse - Microsecond

R

t1

1w'

Chapter 1introduction

1.1 NSC's HYPERchannel Local Area Network

Network Systems Corporation's (NSC) HYPERchannel

local area network is a widely used very high =peed, 50

Megabits per second, digital communications facility.

HYPERchannel utilizes microcomputer-ba=_ed adapters and

standard 75 ohm CATV coaxal cable as data trunks, to

interconnect various computer resources within a

computing installation. There are three types of

adapters (Processor, Device, and Link) used to

interface individual equipment to the network of data

trunks. These adapt-^? r s provide for:

• interconnection of equipment from variousmanufacturers.

• high performance communication `)etweenprocessors.

• a sharing of peripheral systems betweenmultiple processors.

• realistic physical location ofinterconnected equipment.

• increased utilization of interconnectedequipment.

• increased tolerance to individualequipment failures.

Finally, Data movement within a HYPERchannel network is

accomplished by use of frames and frame sequences.

These frames contain the necessar yin+or-matron for

addressing and routing, along with associated user

messages and data. A sophisticated internal protocol

is used to prov i de for contention al 1 oca.t i on , er^or

detection, retransmission allocation, and data

movement. These capabilities provide a reliable

network that is irsensitive to configuration, and

single points of tailure. This internal protocol is

the basis. for HYPERchannel sys"em performance and wi l l

be described further in a subsequent chapter.

1.: HOSC System Overview

The Huntsville Operations Suppo-t Center (HOSC),

AS implemented at the Marshall Space Flight Center

(MSC) in Huntsville, Alabama, is a distributed computer

resource facility. HOSC is designed to provide real

time acquisition, analysis, and display of data during,

National Aeronautics and Space Administration s (NASA)

space missions. HOSC provides =_upport primarily for the

Space Shuttle, Space Telescope, and Space Labo^story

missions. Among the resource =_ available at HOSC are

various large minicomputers and peripherals. A large

portion of these resources are interconnected using

NSC's H`r'PEPr_hannel network. The configuration

flexibility afforded by HYPERchannel provides HOSC with

the ability to adapt to future mission requirements and

also provide =_ MSFC with a large computing facilit y for

non-mission activities.

Data handl1na at HUSC .all y into two main

categories, mission and non-mission activities. Mission

2

it

II

I 11

760

I t

` factivities are those that take place during powered

flight. For example, the space shuttle main engine data

is analyzed by the Main Propulsion System (MPS)

processor, which is also sent to a back up processor

+ simultaneously. Data arrives via direct ground links orI

satellite communication links from the Kennedy Space

Center Firing Room at NASA's Kennedy Space Center (KSC)

in Florida or from NASA's Johnson Space Center (J3C) in

Texas. Services provided by the network during missions

are data analysis and presentation services for HOSC

mission support teams. Non-mission activities are also

provided b , HOSC, one of these s support for the

Payload Operations Control Center (POCC) preplanning

activity. Future expansion at HOSC may include computer

resource support for Digital Equipment Corporation's

interactive graphics data base (ICDS), and XEROX

Corporation's text-processing operation (S?GMA), both

of which, ale non-mission activities_..

I 1.3 Research Objective

NSC's HYPERchannel loc?1 area network is a

sophisticated computer network a)1owing considerable

f lexib11 i ty and adaptabs 1 i ty w th regard to computer

r?sources. HYPEP.channel allows a wide variet yof

minicompu t er, s, not necessarily manufactured by the same

company, to be interconnected in a single or

3 ^

-s- — - - - dew -~- - - -

_* r4. 11

t i

Al

multi-trunk network. Thus, computer resources which may

be separated by distance or manufacture r ma;: tie

utilized b y one another within this distributed

computer network. HOSC, as a distributed - omputing

facilit y , utilizes HYPERchannel to accomplish the

interconnection of various computer resources. Mission

-equirements imposed on the HOSC, require that it

posses=_ the ability to adapt and change its resources

according to the dictates of a particular mission. The

I( configuration of the HOSC's resources are mission

i dependent and may be readily changed, howe ,)er, the

! effects of those changes cn system performance are no

readily apparent. The data handling capability of the

HYPERchannel r,e twork, and i is performance in -.)ar i ous_

configurations affect HOSC's system performance

directly. With this in mind, the primary goal of the

research effort was the development of a simuI atior.

model of the HYPERchannel network that could be

manipulated to predict and characterize the nehavior of

Ithe HOSC in a variety of scenarios.

The first step in this analysis was an

investigation of the operatinU properties and

characteristics of a HYPERchannel network. In Chapter 2

of this_ aocument, a functional descriptio.7 f

HYPERchannel s detailed with particular errphasi s on

the protocols usFd by the net .lorV. The second step,

4

I^^

2i

9

detailed in Chapter 3, was the characterization of

various computer resources and possible HOSC activity

scenarios. The third step, detailed in Chapter 4, was

the def i n i t i on and deve 1 opmen t of a sof tware model of a

HYPERchannel network. Using this simulation nodel,r

, Esystem parameters were varied to simulate changes tor

the operating environment of the HOSC. Finally, the

results and conclusions of these manipulations to the

simulation model were compiled and anal yzed in order, to

provide some insight into the present and perhaps

future operating characteristics of the HOSC.

5r^

1

1

4

0 Chapter 2HYPERchannel Network Description

2.1 Network Components

Network Systems Corporation'=. (NSC) HYPERchannel

network is a high speed, baseband local area network. A

HYPERchannel network consists of standard Community

Area Television (CATV) coaxial cables ri =-ed as data

trunks and var i ous. adapter =_. to control network' traff i c

flow. These adapters use a carrier sense multiple

access (CSMA) protocol with prioritized, _taggered

delays to implement traffic flow and control . Network

messages generated by an adapter are composed of frames

and are called frame sequences. These messages are

broadcast a)er a given trunk at a fixed rate of 50

Megabits per se c ond, using a phase modulation technique

with a manchester data format, and are received by

network components through nondir • ection.al taps or ports

(Figure 2.1). Netw ork components at. these ports are

known as network adapters, which control access to a

given trunk. A network adapter can be attached to a=_.

man y as four independent network trunks, enabling a

configuration to match a specific instalIa`ion and

provide:

^i

o incremental expansion

o linear interconnect costF-

o no single point of failure

5

1

Figure 2.1 Typical HYPERchannel Interconnection.

7

t

3

NSC manufacture=_. three main type:. of network

adapters: processor, device and link. A processor

adapter interface=_ a computer data channel to the

network of data trunk=.. It serves as buffered data path

between the computer attached, and the trunk ne twork.

i The computer communicates with data buffers in thee

adapter at its owr. rate and asynchronous. with

transmissions on the network trunks. The adapter

provides the necessary formatting and internal protocol

to transmit the c=ontents of its buffers o k!er the

selected network trunk. The processor adapter receives

data from the trunk network and provides status

information to the originator of the data. The computer

at the receiving adapter may then access the data and

p any a=.sociated message in the adapter buffer. NSC has

designated th;s adapter Type as A400 HYPERchannel

adapters, herein referred to as adapter=_.. The device

adapter function:. as a remote channel providing a

? computer data channel for the attachment of peripheral

Ican trr, un i ts. This adapter i s dr i k:,,en b ,., tt:-jork

messages from the data trunks. It receive =_. network

messages cor.tai n i no device commands, data, and control

information. It generates messages c=ontaining status or

device data. The device adapter operates multiple

devices in the same manner as a data channel produced

by a computer manufacturer operates multiple de-.^ices.

I.

,a

1

—^_ ^^ r"

The link adapter is used in pairs to provide

communication between remote HYFERchannel networks. A

link adapter receivirg a network message destinrd for a

remote network transmits thismessage over a wide band

communications link to the remote networK. The link

adapter at the remote location receives this me=_.=age

and retransmits it over its own local network. There

are two type =_ of link adapter=_., the terrestrial link

adapter and the satellite link adapter.

Finally, due io ti-ie nature of the HOSC computing

facility only the processor adapter be included in

the model.

2.1.1 Adapter Architecture

Ee::) adap t er, regardle ss=_. of the type of u-er

equipmen t attached. consists of the fol lowing:

• A Ti,cr:)-processor with 4096words of read-only memory (ROM)

• Storage section (Buffer and Control logic)1024 8-bit bytes of control memory withodd parity

4096 8-bit bytes of buffer memory withodd parity

16 working registers16 trunk registers256 extension registers

• One trunk interface

This portion of an adapter i=_. termed the Nucleus

Adapter. The nucleus adapter has two general

9

1 ^`r ^•

^V_

LD61

app Ii cat ions, (processor and device adapter) determined

by the type of equipment attached and the necessary

interface required. Thu=_ an adapter consists of a

spec ific device interface and a nuc1 e"s. adapter. The

device interface will then define the particular

adapter type. An adapter can be divided into four main

sections: micro-processor, buffer, and control logic,

trunx interface, and devici or equipmen* interface

(Figure 2.2). The micro--processor has a 4096 16-bit

word read-only in =_.truction memory with a 320 nano=_econd

cycle time. It handles equipment functions and

responses and manages data flow on the direct data path

betwe:. the equipment and the Pda.pte- buffers. The

buffe^ and control 1 ogi c al ong w, th the trunk

interfaces control the high spead trunk transmissions.

It consists of a 1024 8-bit byte control buffer,

normally used to stack control information, and a data

buffer containing x996 or (optionally) 8192 8-bit

b y tes. This section also contains a flag register and

other registers to specify buffer address, length of

data tra.n mission, and network addressing function=_.

The control logic contained in this section allow

concurrent access to memory by both trunk interfaces

and equipment interfaces.. The 100 Mbps buffers allow a

50 Mbps data movement on the data trunks along with a

50 Mbps data movement with the attached equipment. The

10

- - - 1: -0 - -

i,

IN

tocrYw Ocr

F OwIX ZW¢

j Nz .

U. OO

O li O^'OwHc

U)Ow CL m^

Q

mcUUnzuQ1LG=.

W

O

r

cz

oc

G

1VO

CC

tiN

v1+

00.4

ul

1

11

• tom' ;w" ^:

Y

trunk interface board p up to four) contains. the

necessar y transmitting and receiving electronics and

the high speed logic to control the transmission

envelope-check.words, access code, and network address.

Each trunk interface his the ability to generate a. bus-y

or reserved response and contains the logic to control

trunk contention on its attached data trunk. Finally,

the device interface (up to fouri or equipment

interface contains the circuitry needed to interface a.

specific equipment or device to the adapter. This

interface is unique to a given device and determines

the adapter type.

2.2 HYPERchannel Protocols

HYPERchanne1 adapters support trunk selection,

trunk-access, adapter-adapter virtual circuit, and

host-adapter protocols. The trunk selection protocol is_.

based co a cyclic scan of the connected data trunks.

The trunk-,access protocol is of the carrier sense

multiple access (CSMA) type, with ordered priorities

assigned to each adapter. The adapter-ada p ter virtual

circuit ;p rotocol involves connection eadapter

reservation and deadlock avoidance) and data T 1 ow

control. The assumption of a steady state model

precludes inclu=_.ion of the host-adapter protocol since

a host is represented as a fixed rate data source. In

order to understand the impact of the variou s_. protocols

12

1w

on system performance, they will be described in detail

in the remainder of this section.{

2.2.1 Trunk Access Protocol

HYPERchannel uses a carrier sense multiple access

scheme with prioritized staggered delays to implement a

trunk access protocol. The intention of this scheme is

^Ito:

o ensure that ready adapters defer to on-going transmissions d

o ensure that . • espor.se (acknowledgement)I frames are transmitted without inter-

ference

o provide as much trunk capacity to thehighest priority adapter as it requestsby prioritized access, and provide asmuch capacity to the next highest priorityadapter as it requests, and so on

o sort out collisions without the necessityof generating random retry delays and ensuringthat colliding frames are not involved incollisions when retransmitted.

HYPEP.channel accomplishes this wi tt. four primary

mechanisms: transmitter disable, fixed delay, N delay

7r priori ty del ay, and end de 1 a> . These functions are

implemented on each trunk interface board and can be

idifferent for each trunk attached.

1 Any time the trunk is sensed bus y the adapter

1 tran,^mitter is disabled (unles. it is transmittingi so

that an ongoing transmission will not be interfered

t,,j i t . The fixed de 1 ay per i od i s a de 1 .ay per i od

13

1

following any tra.nsmi lion in which only the receiving

adapter for the last transmission is. allowed to

transmit. This period of time allows a receiving

adapter to respond immediately without being interfered

with by other ready "=_ending adapters". A t,•ansmittirig

adapter which does not receive a response to a

transmission during this period assumes that its last

transmission was to=_.t and wi11 schedule a

retransmission. Following the fixed delay period a

scheduling period begin=.. This period i=_. the N dela y or-

Pr i or i ty delay period and is a unique event for each

adapter on a given trunk. An adap ter '=_ priority delay

is assigned based on the priority (user defined) and

p lacement on the trunk of the adapter, in question.

Following the fixed delay period an adapter ready to

transmit will wait until its priority delay, at which

time it is allowed to transmit without interfe once if

the trunk is idle. If an adapter becomes ready to

transmit during this scheduling period, but after its

priority delay has ex p ired it must wait until i#s

priority delay occurs again or until the end delay

period (defined next) is encountered. The end delay

period occurs if an entire scheduling period passes

without an adapter transmissi or, . After this event a

free-for-all or contention period begins in which any

adapter which become_ read y to transmit may do so. In

114

,r

y

1

this. contention period, collisions become possible if

two adapters sense the t'unk idle and attempt to

transmit nearly simultaneously. These v;.rr ious delay

events are implemented in each adapter b y a timer. This

timer is enabled any time the trunk is sensed idle and

begins to count down to its respective delay events. If

at any time the trunk is sensed busy the timer• is

disablad and loaded with the end delay value. As the

timer counts down the fixed delay, priority delay, and

the end delay events are signaled (Figure 2.3).

These delay settings are set into what NSC terms

as contenticn switches (SW1-SW9), located on each trunk

interface board. These contention switches have 16

discrete positions (0 through F'- , with each position

providing 160 nanoseconds of delay. These switches are

grouped i n sets of three switches per parameter. S1.11 ,

SW2 and SW3 are the least-significan' bit po=_i±ion

switches and SW7, SW8 and SW9 are the most-significant

bit position switches. An adapter's fixed delay 1 s set

into switches cSW7, SW4 and SW1), its priorit y delay is

set into switches (SW8, SW5 and SW2) and f nal1y, its

end delay is set into switches (SV > , SW6 and SW3). The

actual setting= for these switches are calculated from

expressions given by NSC. These expressions when

evaIuateJ, yield decimal numbers which are then

W,

15

1r

LGQ)ywvE

Fv0

vGG^d

U

W

^ x

NQl

{a

Cc+

r- f

L_

B r15

16

ocztcw%#. " .. I .. .OF POUR QUALI - Y

1

Iconverted to hexadecimal equivalents. The hexadecimal

equivalents are then et into the contention switches.

When an adapter receives a transmission frame it

will immediately generate and transmit a response

r frame. So that all ready-to-send adapters will not

interfere with this response, the fixed delay period

^I must be such that all adapters will sense the response

before this delay expires. This relation as given by

NSC [N5CSOal is:

Total trunk cableFixed Delay = length (ft.) + 13 C1)

40

This value as calculated will be the same for all

adapters on a given trunk. The priority delay refers to

the period of time uniquely assigned to each adapter on

a trunk. Th y E time period occurs following the fixed

delay period and is determined by the a.dap ter 's

assigned priority and position on the trunk. The

higher, priority adapter is assigned a priority delay

of 0.413 microseconds, this allows sufficient time for

the highest priority adapter to prepare to retransmit

an unacknol.J edged frame pr i or to i is scheduled

transmission time.

17

Z

The priority dela ys for the remaining adapters on the

trunk is given by [NSC80a):

Priority delay of next

Priority = 10 + highest adapter (decimal -)alue)De 1 ay

(2)

+ Cable length (ft.) to next highestpr i or, i ta.dap ter

40

NSC recommends t;iat prioritie s_ should be assigned

sequentially in order +o maximize throughput on the

trunk. The end delay is calculated for each adapter

such that the lowest priority adapter on making a

transmission is sensed b y all other adapters on the

trunk. This is nece=_sar y since an adapter may transmit

immediately when its end delay is signaled (contention

period). This relay is calculated as [NSC:80al:

Priority delay of lowestEnd Delay = 10 + priority adapter (oectmal value)

(3)Cable length (ft.) from this

+ adapter to farthest adapter40

kn example of the use of (1), (2) and (3) is

illustrated in Figure 2.4. The calculations which

follow are performed for unit #25, trunk 0.

18

.... 'r • Jl^^ ..`mow: - _-'_-• CITI

OF f llli It (^ ^: . Y

4001 60011 20011tEnP.11IIAL TFnMItJA10n

10 Wilt #25

n

IMIT x'05

PnIOniT y 0 F1I10.!ITY I Fn1Un1IY 2 PnIOnITY 3

FIXED DELAY -z 2 1316

.,IJ --- z

AC8 MUNK 80AnD

TI -

SWI!C! I SET TI IJO

FIXED DELAY_P n!C nITY O EL AY

END DELAY

f WiFiF7, UN I T 25 U!IIT 13 1 U!I I T (,5

2 8_1 28 2 8 2 8

3 I T 30 3 F

5T 50 62 67

Figure 2.4 ;nmhle AI)f3 Contention TimingCalculations i NC80a J.

19

I

^I

IRr

N;

Fixed delay = 1200 feet + 13 = 43 10 = 2616

_;O

Priority delay= 10 + 3+ 400 =23 10 = 1171640

End delay = 10 + 63 1 0 + SOO = 93 10 = 5D164 0

These values are then aet into the contention switche

located ors the AG8 trunk. interface board as indicated.

Finally, in the access scheme described thus far, the

highest priority adapters could possibly monopolize the

trunk. To prevent this a. de k)ice Known as a wait

flip-flop is implemented in each adapter. This

flip-flop is =et when an adapter transmits ar.d is

cleared avhen the adapter end delay is signaled. When

the flip-flop is set the adapter is prohibited from

transmitting, the intention of this device is to

provide a fair allocation of the trunk. All adapters

are equipped with this device and adap ter =. k:,j i th th i s

fl i p-f 1 op enabl ed ma y coex i st , on the same trunk, ,,ji th

ad?nter=_.who =_.e flip-flop is disabled.

2.2.2 Adapter-Adapter Link Level and Virtual CircuitProtocols

The followinq sections will deal with data

movement and the protocols involved once an adapter has

gained access to the trunk through the trunk access

protocol. The data. 1 i nk protoc=ol may be v i ewed as

20

nom' ter •^ y 1

On

1r'

having two basic information grouping levels. The basic

information unit is the frame and a higher level

grouping is the frame sequence.

2.2.2.1 Frame and Frame Sequence Structure

The smallest unit of information transmitted over

the network i s the frame. There are three cIAsses of

frames: transmission frames, data frames, and response

frames. Tran=mission frames are generally short frames.

(up to 38 b y te =_) used by adapters for signalling and

status exchanges. Table 2.1 lists these frames and

their functions. There are two forms of data frames.

mes_age proper frames and associated data frame=_

following a message proper frame (Figure 2.8). An

adapter receiving a transmission frame, message pr ,per

or a data Yrame will generate and transmit a response

frame. This response frame =r- rv? s to ackiowledge

receipt of a frame and in some cases ^eturns

information to the transmitting adapter. Frame formats

are listed in Table 2.2. Note from Figure 2.2, that the

fixed del? y period is used to initiate transmission of

ether than acknowledgement frames as will be explained.

As stated previously, a higher, revel information

struc ture is achieved by grouping frames toge t! , er into

frame sequences.. All information exchange= occurring on

the network will be in the form of frame sequences.

There are two types of frame sequence used on the

2i

I

t^

1

Table 2.1 HY PERchannel Protocol Frames [Fran 841.

Transmission Frames

Set Reserve - Reserve receiving adapter

Copy Register - Request for- Register information

i Clear Flao 8 - When set, Flag 8 indicates thatthe ada.pter is ready to rece i -.: , e a

1 frame. When clear, it indicatesthat the frame has been received.

Set Flag A - Flag A, when = !?t, indicate= thatC1 ear F1 a q A the receiver will recei-)e

associated data. It is clearedwhen the last block of associateddata is received.

Clear Flag 9 - When set in 'he receiver, Flag gindicate_ that the receiver isready to receive data. When setin the transmitter, it indicatesthat the transmitter is read y tosend data. When cleared in re-cei -)er, it indurate that thedata block has been receil.;ed.When r_leared in the transmitter,it indicates that data can now bstransmitted.

Data and Message Frames

Message Proper - Used to trarsmit host me=s.agF . = oflength less than or equal to 64bytes.

Associated Data - Used to transmit data blocks oflength up to 2 KbYte s.

Re y onse Fr ames

Response - A receiving adapter sends a re-sponse frame for each non-response frame received. :ts pur-pose is to acknowledge receivedtrames or, as in the case of theresponse to a. copy registersfr e.me, to send requested data.

22

^. _^^ 041- ,

1t

Table 2.2 Frame Formats [FRAN821.

1!

Field Lenqth(bytes)

leading s yncs 12-18frame type . . . 1ac=ess cede . . . 2to address . . . 1+ rom address 1function code 2message length 2check word . . . 2trailing s y nc 8 —

Transmission Frame Format

Field Length(bytes)

leading syncs . 3frame type . . . . 1a•:ce ss code . . . . 2to address . . . . 1from address . . . 1function code . . . 2message lenqth . . 2=heck word . . . . 2trai 1 i nci . . . . . 8

Response Frame Format(no data)

Field Length I(bytes)

leading s y ncs . .12-18frame type . . . 1access code . . . 2to address . . . 1from address 1function code 2message length 2check word . . . 2message/data .8-64/

0-2N:message/datacheckword . . . . 2crailinq sync . . 8

Field Length(bytes)

leading syncs 3frame type . . . 1access code . . . 2to address . . . 1from address 1function code 2message length 2check word 2regi sterinformation 2

checkword . . . . 2trailin g sync . . 8

Message Proper and AssociatedData Frame Format

Response Frame Formatcwith data)

22-

24

network: message-only and message-with-data sequences.

A message-onl y sequence is normally used to transmit

short me sage of up to 64 bytes be tl, ,aeen device r- on the

network. The sequence of frames which make up a

message-only sequence are shown in Figures 2.5 and 2.6.

Data is tr.ansrni tted on the network in 2K byte blocks

(optionally 4K byte blocks) in message-with-data frame

sequences, as shown in Figures 2.7 and 2.8.

In order to promote efficient utilization of the

trunk an adapter does not maintain control of the trunk

throughout an entire message-only or mess_-age-with-data.

sequence. An adapter will relinquish the trunk while

performing tasks not requiring the trunk, these periods

are dep i c tea as del ays in the Figures representing +pie

two types of message sequences. After transmitting the

first frame of a sequence the trunk is released. When

the transmitting adapter is ready to continuF

transmitting it must compete with the other adapters

for trunk access.. After regaining access. to the trunk

the adapter will transmit a. cop y register fr..me. if

this frame is transmitted without a collision, the

receiving adapter will sand a response frame to t1)e

sender. Upon receipt of a response frame tine adapter

captures the trunk by tran =.mitting during the fixed

delay period that foI I ows. The trunk is regained

without interference since any ready to send adapter is

f

X1

y

SENDER

Set Reserve

RECEIVER

-bResponse

Copy Regi stersResponse (Inclodesregister information)

w

Message Proper^- Response

Clear Flag 8'Response

Noce: Frames enclosed within bracket are transmitted withoutinterference by beginning their transmission in the fixeddelay R ±r i od .

Figure 2.5 Message-Onl y Frame Sequence IFP.AN841.

25

i

r

64

12

23

74.5

SENDER RECEIVER CHANNEL CHANNEL DURATIONRELEASED HELD (uSEC)

Delay(Prep aratIonto transmit)

Set Reserve

Response

Delay

Copy Registers toResponse(regi^terinformation)

Hessage(64 byte=_.)

Response

Clear Flag 84— Response

Delay 20

Note: Transmission times do not include propagationdelay.

Figure 2.6 Tim i ngs for Message-Only Sequeoces [FR,AN841.

25

w

64

0

Associated

Data Block

20472048

Associated

is

0

Iles=_.age

Proper

SENDER RECEIVERSet Reserve

Response

Copy Regl stern

goResponse (Inc.reg. info.)

Peceive Data(send message)

Response

Set Flag A.4

Clear F1 as 8Response

P

4 Clear Flag 9Response

Copy Registers4 Response (+ reg.)

P.ece i v, Data(send assoc.data)

Response

Clear Flag 9Response

go Clear Flag 9Pesponse

Copy RegistersResponse (+ reg.)

Receive Data _I (send assoc. data)

P1

do Response

Clear Fiag 9 -ResponLe

Clear Flaq_ 9Response -__O_

Clear Flag A—Response

H ote: Frames Iri brackets transmitted without interference bybeginning their transmission in the fixed delay period.

Figure 2.7 Message-with-Data Frar.? Sequence tFRAH 82i.

i

27

I

64

12

23

96.5

64

12

29

34

12

412

M,

SENDER RECEIVER CHANNEL CHANNEL DURATIONRELEASED

HELD

(uSEC)

•,

Preparat i on to transmi t

Set ReserveResponse

Delay

Copy Register pResponse

Message14 — Response

Set Flaq_ AResponse

Clear Flag 8 — wP,espon ^e

Delay

44 -fCl?ar Flag 9Response

De I ay

Copy Register— 10.q Response

Assoc. Data(2Y, bytes)

aw Resoon=_e

Clear Flag 9 0.Response

De 1 ay

--C1 ear Flag 9Response

•Repeat for each data frame •

C1e?r Fl?.g A to ^.Response

12Delay

20

Figure 2.8 Timings fc,r Message-with-Data Sequences1 FP.AI 194 1 .

29

.1

V'

Pi,

jprevented from transmitting during the fixed deIai

period. I4 the sequence to be transmitted is a

message-only sequence, control of the trunk is not

jrelinquished until the entire remaining sequence is

transmitted, see Figure 2.6. The timing and duration of

a message-only Cequence is shown in Figure 2.6.

i1 A message-•with-data sequence is preceded b, , a

message-only sequence, follov)ing the tran=_mis.sion of

the message proper the trunk is released, see Figurei

2.7. When the receiver indicates that it is ready to

receive more data by sending a clear flag 9 frame to

the sender, the sender will compete to regain access to

the trunk. Once the sender regains access to the trunk

it wi11 send a copy register frame to the receiver. I4

successful, it will regain control o* the trunk as

described before. Control of the trunk will not be

relinquished until an associated data frame and clear

flag 9 frame are transmitted by the sender. Thi=-.

procesB is repeated for each associated block of data..

Ma.intaininq control of the trunk durinu data frame

transmissions ensures that these f rames are never

involved in collisions, thus only relatively short

frames will ever need retransmission due to col Iisior,

on the truck. The trunk is held durino data fr_.me

transmission b y the sending adapter, by transmitting

synchronization bits during the fixed delay periods

29

ti 'N

r

914;

I following the transmission frames that make up the data

frame sequence. The timing and duration of this

sequence of frames is shown in Figure 2.8. It is

important to note that in all of these sequence

transmissions that during the delay periods, a

transmitting adapter must aIv.axs compete for trunk

access in order to re g ain the trunk.

I

INSC adapters also support an alternate form of

transmission scheme known as the burst mode. In this

4orm of sequence transmission, an adapter will not

i

relinquish the trunk until it completes an entire framei

sequence transmission. According to literature

avaLi I abl e [ FRAN82] , [ FRAN64I t is mode is rare l y used

and will not be detailed in this work.

2.2.2.2 Trunk Selection

Any adapter in a network can be connected to up to

four trunks. Each trunk use- the same trunk .access

protocol and operates independent l y, i.e., each trunk

has a separate interface board within an adapter. The

interface listens for proper Iy addressed incoming

messages and is capable of generating rejection

response frames if its adapter is reserved. An adapter,

having a frame to transmit and contending for a trunk

will scan the trunks. in a specified manner until it

senses a non-busy trunk. The adapter then waits until

the trunk can be captured through the trunk access

j

20

I ^

A=It - .^ L

I

11

protocol. It the trunk is bus y with the adapter' =_ frame

transmission its search terminates; otheru,ise it

continues. Trunks to be t. . ed ._..- _ __ -1 - : - = i ri _

host — adapter message and a receiver's trunks to try may

be specified by the transmitting adapter. A trunk is

said to be disabled if it is not connected or was not

specified as a trunk to try. A t runk is _.aid to be

enabled if it is connected or is specified as G trunk

to try. An adapter will try a trunk by first

Determining whether it is enabled or disabled, if the

trunk i= disabled or bus y it will try the next trunk.

If the trunk is enabled then the adapter determines

whether or not it is bus-. The period o4 time required

to t.r y an enabled trunk is 5.5 mi crosec_onds, suh i 1 e the

time required to try a di=_abled trunk it 2

microseconds. The ability to specify the trunk=_ to try

i n the tr ansm i t ter and rece i . : er prow i d; s a me an to

dedicate trunk=_. to specific types of traffic, e.g.,

= p ort tr ansm i ss i ons on one, long tr?nsmi =_sion E on

Another. Simulation stud i es indicate no benefit is

derived from dedicating trunks for particular message

types. The RbiIity to speci4 y trunks is more useful in

multi trunk net1,.iorks that are not ful l r connected

[FPANd43. It is possible for an adapter connected to

more than one trunk to recei ­? mesaaae= sirnul taneou:IY,

when this happens the adapter wi11 accept c. re end

1

reject the others. Communication between adapters on

tvio different trunks, require=_ the _er l) i c p s of an

intermediary. One of the adapters will transmit to a

device attached to an adapter common to Do`.h trunks.

Once this device has received this me=s?Qe sequence it

will then proceed to transmit the sequence to thrf

intended receiver on the other trunk, Thus

communication beti.jeen adapter= on different trunks

consists of sending a message-with-da.ta sequence twice.

2.2.2.3 Virtual Circuit Establishment

An adapter reservation scheme (Figure 2.9) is used

to establish a virtual connection t.eth.ieen adapters

d,?siring to communicate. I;jhen an adapter receives

message from i t at t?shed host . i t w 1 1 f i r s t reser'_Je

itself; that is, the adapter makes itseif inaccessible

tcl recei -red tritnsmi =_s i on 4r•nm any other adapter wi t

the exception of the adapter with which it -s trying t^

communicate. Af`:er reserving Itself, the =_ending

adapter transmi t s a 5°t reser')e frame to the receiving

adapter. if the re=eiv;ng ?adapter is idle; that is, it

is no* reserved, then the rece i -) i ng ada.p ter wi 1 1

transmit a re =_ponse f ,-ame indicating that the adapter

has reserved itself to receive a transmission from the

transmuting adap+.er. Following the reservation of I

receiver, the frame sequence transmission proceeds as

described in section 2.2.2.1. Both the transm+ttinc, and

32

/i5g. NoC f rom

OS^

reserve self

initialize:delav :=1usI.etry n

Figure 2.9 Adapter Peservation Scheme [PR N82f.

4

1

t

\ i

receiving adapter =_. Terrain reserved d;jririg the entire

message-only or message - -A' -Lh -data frame sequence

t^an sin i=-.=-i or, . Af t er completing the frame sequence

tran=-mission, the t - ansmitting adapter releases tine

rece i u i ng adapter vii th a c 1 ear f i ag A frame :xnd then

releases itself completing The termination of the

connec t i on ; =_.ee 7 i gure 2.6 ar,d 2. 8.

When a transmitting adapter sends a set reserve

frame to a reserved adapter, the reserved adapte r w i 1 1

respond with a reservation reject frame. The r'irst tim.-

a sending adapter receives •a reservation re;ect frame,

the adapter wiI; delay for a "binary exponential time"

before mak i n another re ser ,.,-.t i o-i at temp t . Fol 1 ow i n

the first reser k.l.at i on re.j ec t i nn the adapte r, wi 1 1 de 1 a.y

I mi crosec ond before making a second attempt. For each

following reservation re.jec"_ion, the adapter will de l, 3y

an amount of time egcal to twice thb previous de1 z;y, up

to 128 microseconds. When this value Q+ dela y (128

micro =_econd=.) is exceeded retry i= advanced by ane, the

delay is reinitialized, and the sequence is repeated

(Figure 2.9). This proces s_ will continue until 3ither a

successful reser ,. , ation occurs or the ada p ter's i,etry

cc,ur,t is exceeded. An adapter`s retry count is base,] on

its unit number, manually set by the uBer and is in the

range of C5 to 250 , If of ter re-..r), count tr i es t`le

adapter is un at) Ie to reserve the r^,cei,:)er, the

!•

<M

I

^4

1

0

transmission is aborted and the senner returns to the

idle state. The s.endinq adapter remains reserved

th r, ouahout the entire reservation attempt p roces s_. This

reserva.t on scheme ,)itt the bi nar> exponential delay=

between transmissions, serves as congestion control on

the net^;^ork b y keeping a send 1nq adapter fro,

manop-lizing the network.

T:, is retry scheme as descr i bed has the potent i al

of causing adap cer deadlock.. Th i s wi 1 1 occur ; f ti--,,a

adapters a t tempt t4 rese rve each other n w 1

simultaneously. They will find each other reserved and

qo throu rth the retry scheme until c.-ne or the other's

retr; • count is exceeded and aborts the attempted

transmission. To al 1 ev i ate this probe em, x back.-off

scheme is scrap 1 oyed by commun i cat i ng adap ter s. Th i s

back-off rijutine enabler, a send ,nq adapter to determine

the identity of the adapter that the rejecting adapter

is att? r ipt inq to reserver ,rc•m th .2 j e C t reswon =_e. It

the sending ada p ter determines that it and the

rejec t i nii adap ter are it }emp t i n to reserk)e one

another, then the sending ada p tsr aborts its

reservation attempt a^d relea=_es itself. The s1 own e=_.s

of this back-off mechanism can cause both adapter= to

abort their reservation attempts, preventin•: _•i the r

adapter frorr. cor.municatirig on the network. The time

35

ta

required for this mechanism to respond is dependent on

the adi .oter model and i= aporoximatel, v bG microseconds.

H second form of deadl cc V. ,,.jh i c the back—off

mechanism will not c.rrect is called a reservation

request loop. This occurs when three or more adapters

attempt to reser-.-P each other,i.e., adapter A attempts

to reserve adapter B, !hile p attempts t•:) reserve C,

and C attempts to r^•^,.ve A. In th^s ca=e the adapters

ha ,e no wa of •iP ;erm i n i n p that this s i teat i on exists

and each adapter w^ l i perform the r e _.ervat i on r e t r y

scheme as nrev l ousl ;/ de scr i bad. This deadlock wi l l onl ;,

be rs so v e d Nh r One of tht? adap -ter' s re try cou p t

expires, causing the adapter to abort :is reservat i on

attempt and re I eaae itself. Serious degradation C

trunk t;iroughput ma y be predic`ed during this

reser , . , at i on rPque=_ I pop per i o IDUP&J793 .

2.2.2.4 Data F l ow Control

Network adapter's are suppl ied with tvjo 2E: byte

buffers c4K. b/te buffers optional.). 40i t two buffers

mane ca.n be f i 1 1 ed/emptied b y tr .ans . fer +r Om/ to trieI

attached host, while the other buffer is emptied/filled

by a network transmission reception. In order to en:.ure

that buffer capac i t y i s not exceeded, a f low control

mechan i =,m i needed. Flow control is ach i e-)ed in tvjo

ways. First, data frame length is limited to adapter

bu++er length. Secc nd, an adapter, =.ending a data frame

a ,.R

L

nor

1

^ ly

4 4^

.:,a

may not send another data -r'rame anti the receiving

adapter specifically requests it. This ensures that an

adapter will not receive da.ta fr?.mss at a rate taster

than an adapter may process them.

Additional techniques used b y adapter to prevent

them from becoming permanently blocked awaiting receipt

of a respon =_.e frame which wi'.1 never' arrive are

described in the fo11owing One of the techniques

involved is the requirement that response trames. begin

their transmission during `he fixed delay period. If an

adapter does not race i v. - a response to a transmi s si ors

it will reschedule the transmission at a later time. ro

Ensurr e that all adapter does no* retransmit

indefinitel y , as viouId be the case if the receiver

address were incorrect or the receiver was.

malfunctioning, a limit is p1aceu on the number of

retransmissions aIIol.,eed. A sct reserve frame will be

transmitted 16 times on each trunk anf-1 then aborted if

no response is received. All other frames wil l be

transmitted 256 tines beTore abort, For the case when

the expec fed re{.ponce i s a non-response -frame i c l ear

flag 9 granting permission to transmit data) a "deaama.n

timer" is used. In a tran_.mitting adapter this time

f; same spans the time from ,,,hen the host's transmi t

message is receive until the last butter i

transmitted and acknowledged. In the receiving adapter

37

i

2ii_

this time begins with the rNceipt of a set reserve

f. ame and doesriot end unti 1 the re: .- ipt of the last

data. buffer. This time span ranges fic•m ,5 to 8

seconds, adjustable in second increment =_-. If all

frame transmissions are not completed before this timer

expires, the transmission i=_. aborted [FRANe2].

2.3 In"ra —Adapte r- Communication

A message transfer betweer, attached hosts on the

same ada p ter is termed an intra — adapter rransfer and i

carried ou`. entirely local to the adapter. This Type of

data transter occurs without utilizing the data trunK

network. An im p ortant consequence rit this type of

transfe f, is that the ad<.pter will appear reserved to

the rest of the n p twork . Obv i ousl , , if the occurrence

of this type of transfer becomes p^edominate then

network performance will suffer. If resources do not

conflict, intra—adapter communication may occur

concurr?ntly with network traffic and cause no

degr_adat i on of netl,,)ork: performance .

}Y

4

W

im

Chapter 3i HOSC System Description

As pr,^viou s-1y stated, HOSC is a distributed

computer network employing many large mini—computers

and NSC's HYPERchaniiel network. The primary task of

HG i_-'C is to provide NASA scientists and engineers withi

near real time acquisition and analysis cf data duringk

Space Shuttle operations. This information a.l 1 ows MSFC

engineers and cen tr 3c for personnel to act in a support

ca p acity to other mission specialists at KSC and JSC.

Some of the primary monitoring and support requirement=_.

of HOSC are pre — launch support -for the Space Shut,.Ie

Main Engine (S,,--,ME), the Externa l Tanks (..ET), the Solid

Rocket Boosters tiSRB's), the Main Propulsion Systems

(MPS), ana the R any e Safety System (RSS). Further,

sup p ort is provided for mission e::periments designed by

MSFC personnel.

NASA has defined the mission of the Flioht

Operations Support Center at HOSC as follows:

During pov!ered f1ight, the HOSC willreceive only data which is in the LPS (LaunchPr_ ,ces.sirig SS ten) at KSC. The shuttlesupport tears 1&6 1 1 be i n the HOSC during thisphase of the mi=".:ior, ano will be th? point ofcontact with the JSC Mission EvA-1uation Roomf.MER) for prc,bl em 6 i =- .cus s- i on and reso1 u t i orgyas required and will be on call duringoroi tai operations_.. The Space L:b andexperiment support team will be located inthe HOSC dur i rig orb tai operations L•jt,enapplicable.

05.

i

Fol Ioiuing completion of the activeShuttle vehicla support activities, data isrecalled as required for more detailedanalysis, and initial preparation is made toprovide support to post flight evaluation[NASA82].

HOSC is located in the west end of A-wind building

4663, at MSFC in Huntsville, Alabama. Figure 3.1 shows

the functional com p onents of one of many HOSC system

configurations. The information contained in the

following =_actions of Chapter 3, is from previous work

published in connection with this same research effort

IMAUL841

3.1 Typical HOSC System Activities

The data processing activities at HOSC can be

placed into two categories, routine d a i I v activities

and missicn/launch activities. A summar y of these

activities by category ar.d some details c' f t ypical data

transfers are outiined in Table 3.1. While this table

and the de =_criptior, that +o I I ows, de s cribe typical

?c t i v i t i es, these are not al 1 the act i v i t i es that HOSC

is. enuaoed in. There are some activities that a.re

defined only for a current mission, i.e., experiment

directed by HOSIC mission spec i :klists. Since these may

change from mission to mission they are not included in

the fol lowing description, but must be characterized

and considered in the specific mission scenario

-equired for the total system analysis.

I . 40

a

aI

"u ^ CLc o wc ^U ^ r

u T^ (n W

w a a

0 REs=

to u

C C® Q WJ yJui

C c n aF-W O

U^ via -^

1

c WW a

}

° z 0

I L

a ^ qqa ao

mU

wG

= c a m

^'

n c a n Va o °

ja U o

o w a C

_ ^ ^+

a M ro

N Y U

►- U -

u d

L7 N m aF

^ v1 a

H

CA I t aY I U p

7 W Q tl

Wa o , zn_ m

zQ ^V,L4

L -4

j^a C _or= I t a

UaWQ

a o^-4-1

00 = Q U

im

I A

41

, 0

1

I

,.1

TNBLE 3 . 1 HOSC Data Transfers

1. ROUTINE DAILY P.CTIVITIESA. POCC Activity

Resources Invol^)eri: MPS Primary (VAX 4)MPS Backup (VAX 1)

Quantity of Data: 1500"100 512-b y te blocks intwo components. 6 8344-byteblocks and 100,000 512-byteblocks.

E. ECIO Data Stream .Generated b y ROMResources I nvul ved: MPS Backup :VAX 1 )

Spacelab °/32

Quantit y of Data: 51.2 kilobyte per secondstream concurrent with POCC.

^fC. IGDS/SIGMA Active ties (Proposed?

Resources Involved: T,_. be determined

aQuantity of Data: Unknovjn .

f' II. ROUTINE LAUNCH ACTIVITIES

H. Routine Dai ly P7t1 l ji ties (Ses Item I.)

B. Main Engine DataResource =_ Involved: STS Prlma.ry (PE 3244)

MPS Backup (':!AX I )

Quanti t y of Dai.?:

C. OD Data StreamP.?sources Involved:

Ouant i t y of Data

50 kilobit per second stream(Launch minus 8 hours untilMEC0)

FEP SSME PE 3244)Cti0 Computer

'T'=- Pr i mart' PE 3244)MPS Backup (VAX 1)

192 k 1 1 obit aer secoridstream into FEP and then toCSO w t Iran=_ter r•f 40percent to STS P-imary andMF Backup. (Launch minusseconds antil MECO)

D. Engineering Displa y ChangesPe_.ourcos Invol ved: STS Primary (PE 3244)

STS Bac=kup (PE 9/32)'Dpacelab 8/32 :PE 2/32)

vuantl t y of Data: Insignificant.

4242 1

-Qi• .

^I

Ore activity not associat:d directl y with the

real-time responsibilities of the network and therefore

a routine daily activity is POCC simulation activity.

The impact of POCC activity on overall performance of

the network stern s_ from the requirement of continuous_

data transfers between network computers. This data i5 ,

currently being transferred be t1,,)een the MPS primary

computer ( I)AX 4) and the MPS backup computer (VAX 1 ) .

During each twenty-four-hour period, this activity

requires the transfer of 150,000 512-byte blocks of

data. This data i s transferred in two components; six

t i m e s each day, ?.n 8344-byte black i s transferred

(50,000 bytes cumulative, with another 100,000

5 112--byte blocks transmitted randoml y but distributed

ievenly throughout the day.

POCC also generates a continual 51.2 kilobit per

second data stream known as the Experiment Computer

Input/Output (ECI0) data stream. Thi s_. data stream is_

ongoing and concurrent with POCC activity. ECIO data is

transferred from the MPS Backup Computer !VAX I) to the

Spacelab 8/32 (PE 8/32c).

The rOLI tine components of the launch day data

activities a.r ,? the Main Engine Data Stream, the

Operat i onal Data (OD) StrFarri, ar,d the E n g i n e e r i nu

D i spla y Change regUests. The Main Engine Data is

collected and disseminated on launch day only. Data i.

43

i

.- • _ _ As

.a.

W'

funneled thro:,gh the network to the MPS Backup Computer

(VAX 1) from the Shutt1A Transport System (STS)

Computer "IPE 7--,, 244). From eight hours before launch

until about twelk.e minutes after launch at Main Engine

'ut Off (MECO) 9 STS Primary accepts. a continuous 50

kilobit per second lata stream direct1;• from the KSC

Firing Room and transfers about 24 percent (12 kilobits

per second) of the total stream to MPS Backup.

The OD Stream is a. 151- kilobit per second data

stream arriving at the Front End P-ocessor Space

Shuttle Main Engine 'FFP SSME) Computer (PE 3244) on

launch day concurrently with some of the Main Enr^inN

Data (launch minus 4 seconds. until ME.CO). This data

arrives from Goddard Space F1ignt Center in Mar land,

and is transferred over the network. ho +h•_ CSO

facility.

The Engineering Di=pla y Change activit y is an

a ! most insignificant addition to the total network

traffic. This activity i nvol ves a transfer from STS

Primar y to STS Backup and Space 1 ab E/32. Th i s tr an_.fer

consists of the name of each engineering con =-ole format

in the support facility that is changer s luring the

prelaunch and launch period (launch minus 9 second =_ to

MECO) [MAUL84].

44

i

R

3.2 HQSC System Components

The Hunt=k p iIle Operations Support Center as a

distributed computer facility uses various computer

^esources interconnected together. The basic components.

involved at HQSC are the computers, communications

processors that receive data from wideband

communications links (sate IIite and terrestrial) and

the h^;.vdwarP recu i red to i nterconnec t these v a r i cw

resources, The inte-.connecting hardware. Network

Systems Corporation's WYPERchannel network, has. been

i previously described, and interconnects a variety of

computer resources of different manufacture, i.r

Digital Equipment Corporation (DEC), Perkin—Elmer (Pr),

and UHIVAC. The bulk o+ the processing power for the

netiuork i performed by the DEC VAX and PE :3240

computer=_.. A cursor y look kUili be given to these two

computers. These computers are examined for the sake of

information only, since in the subsequent anal ys_ is e.11

network users will be represented as fixed rate data

generators.

The Digital Equipment Corporation's VAX serie s c14

computers supports a 32—bit ,,lord architecture that

estaol i s-he= at v i r tua.I address, space of 4.? bi 1 1 ion

b y tes of user — addressatie memor y . Throughput of data in

the system is optim i zed by using a 32 —bit high _peed

data structure that ties together the central

4

L

qM

r

1.,1

processor, main memory, UNIBUS subsystem, MAC38 US

subsystem and the DR780 high spec-d direct memory ;.cce

subsystem. This high speed data structure is known as

the ° y nchronous BackpIar+e Interface (SEI) and a device

linked to it is known as a NEXUS. Each NEXUS receives

every SE tre.nsfer ; e l ec tron i s l og i s i n the I?EXUS

determines whether it is the designated receiver for

the ongoi inq transfer . Data transfers. can occur from CPII

to memory, from I/O controller to memory subsystem, or

from CPU to I/O controller, with maximum aggreg -ate

transfer rates of 13.3 megabytes per second. These

transfer rates are 1 imi ted by the following factor-.:

0 260 nanoseconds/c ycle = 5 million cyclesper, second

• each cycle can carry an entire byte ofdata or address representing a memoryrequest

• one cycle is used to request eight bytesof data to he r ead or a+r i t ten , and twocycles are used to carry data at fourbytes per cycle

o ° million cycles/second e 4 by tes/eyrle =20 million bytes/second

0 20 * 2/3 (1 of every 3 cycles is anaddress) = 13.3 million by tes per second1DEC803

As is sho+^jn in Figure 3.2 , a VAX computer ma,,

interface with more tear, one memor y subsystem. !r the

Case of a two-controller, interleaved memc.ry

46

1,

oZmm

a O

u `^7 NO

m _vO Y m OCL o (o

5U-)N

cu

OOO

Eu

EuO

m mN

O ^- dl

E c ul _^ 3u O NM U o a uO

^Q

uh\

1l OO

m \ g^c CO

E c `^

Ir7ri

0 v LOU q

u oQ

>^^ ^I

s

QaLL-

UD

xv

Em

oao ^r ^Q:0 c0,

Ln

mV)LnQ

U7

m

Z

vcv

nv

O

`O

Ofi

Uvv c

a^y

aEO

U000

Xd

WO

La

00cd

xuO

yN

^" 1

^J

aw.14

Lt.

v ^'arn O

pq

In

in u m

Eo vlu

N C

y) c al

^. o vcn U o

Ln

mo u

u ^'v ^

v+ ^Q --

w

47

M ^

(ilk, `:

con+ i gurat i on , the compu ter wou 1 d al so have two PIEYUS

memory controllers on the SBI.

The IINIBUS Subsystem (UBUS) is. a high speed,

as ynchronous data system that allows communication

between peripheral hardware and the VAX computer. The

VAX. 111780 is capable of supporting four UBUSes: one is

standard, but three more are optional (Figure 3.3). The

UBUS is connected to the 36I through a UBUS Adapter

(UBA) i.,jh i ch perform s_ se ,.,eral impor . tar, t se r- i ces that

are transparent to the user. The UBA provides:

• access to UBUS address space from the SBI

• mapping of the UBUS addresses to SBIaddresses for the direct memory access(DMA) transfers to the system memory

• data transfer paths for UNIBUS deviceaccess to random SBI memory addressesand high speed transfer for devices thattransfer to consecutive, increasingaddresses

• UNIBUS interrupt fielding

• UNIBUS priority arbitration

The address-mapping function is especially

important because the UBI_I S ha.s or, l; eighteen data 1 ine=_.

providing an apparent memory-addressing capabilit y of

only 200 kilo- bytes. Through it=_ addres s_ mapping

a.bi 1 ities, the UBA prok)i des the c3.pabi 1 i ty of mappinq

the UNIBUS adcres s_es. into the SBI addresses so that the

48

11

iIlk

1

T60

^a

^ ^ Z

rcr0w

DCLu

N

o^0co

CL0

r—(3 En a

^ p

¢apc0 .^

0 xm

p'rn €

C

Q 3 E

o

.^X a..la mm

::) N 1^

L m Uu to u opz

L'1 pN >Q O W

u u

tm ^

c ^UcpaYU 7Om

N N 41

D =^cc m a

lie

7L D Q LcUcaL7

49

t1

r

fu I 1 sys tem memor y of 16 array boards of 256 K i 1 obytes

each (A gigabytes total) can be accessed.

The UBA accept =_ two forms of input from the !;BIIS:

hardware-generated interrupts and direct memory access

requests. Each device connected to the UEUS may use one

of five priority levels for requesting bus service. A

non-processor request (NPR), which is the hi ghest

priority request, may be used when the device request=

an operation that does not require proce_sor

intervention, such as a direct memory access transfer

to memory or to some other . device. A bus request (BR)

is thus generated when the device wishes to interrupt

the UBA for service. Such service might be a

CPU-directed data transfer or A flig indicating the

existence of an error condition at the peripheral.

Since there are only five priorit y levels and more than

c. r, dev I ce may be connected to a spec i f i c request

1 eve 1 , i f more than one dev i ce makes the same requesi ,

the device that i s_ electrically closest to the UBH

receive =_ the highest priority.

The NPR request for direct memory acces s_ is a very

important feature of the IJBUS subsystem. These DMA

transfers car, be divided into two group s_.: random access

of noncontiguous addresses and sequential access of

s_.equentially increa - ing addresses. For random access.

each UBUs transfer is made through the Direct Data Path

50

1

Ow ,

(DDP, one per UBUS) and is mapped into an SBI transfer.

This procedure allows only one word of data to be

transferred during a single SBI cycle. For devices

capable of requesting s equential access s ervices, use

is made of the Buffered Data Path (BOP). Each UNI BUS

provides fifteen such BDPs which storo the data so that

four UBUS transfer= are performed for each SBI

transter.

The DDP must be used b y devices• not transferr i nq

to consecutively increasing addresses or by devices

that mix read and write functions. The maximum

throughput via the DDP is about 425 ki1ov)ords per

second for write operations and about 316 kiloword=_. per

second for each read operation. These rates will

decrease as other -SBI activity increa.=__es. [DEC801.

Maximum published throughput via the BDP is about

65' 5 k i 1 owords per s econds for both the read and u,r i to

operations, but realistic throughput rates of onl y 1.5

megabits per second are actually expected 1;.iith this.

figure degrading as other SBI activity increase_. BDP

tra p=_.fern are restricted to block tran=_.fer with blocks.

of length greater than one byte. All trans-'ers vii th i n

the bI ock mu =_ . t be to con=_.ecut i ,Jr and increa si n g

addresses and all transfers must be of the same

function, either read or- wri te.

f^

51

1

Li

The MASSBUS subsystem and the DR780 high

p erforma,-ice, 32—bi t par.al let interface wi l l not be

described in this summary, since an understanding cf

their functional characteristic-- is not needed to

determine their relative impacts on the HYPERchannel

network. The influence of both may be felt indirectly,

hol:,jever, since activity on the MAS8BUS or DR -7130 will

translate to SBI activity which will affect GDP and BDP

transfer rates as previously described.

1 The VAX CPU will also not be described in detail

but several comments may be made about the CPU and it=__

effects on system throughput. The CPU represents the

r o t s c c t Pmost intensive tratf i c l oad n h? memory ub_;.^: m in ik

hence on the SBI. Obviously, it the processor is

l engaged in intensive competing, it will request data

ff much more often than i t o-j1 1 1 wr i to data, and th i s

memory access r ,?pre =_ents substantial SBI activity.

Fortunatel y , the large cache memory of eight kilobytes

ava.i 1 abl e to the CPU is able to reduce the SBI tr-.=-L++ i c

load considerably. In addition to the effects of the

CPU on SBI activity, the SBi traffic from other sources

may also affect the CPU efficiency. Published figur?s,

IDEC3Ul, indicate that in a system with two memory

controllers the processor will be sla:-jed by about four

percent per averaged megabyte per second of I/O

traffic, while the impact of a single memory controller

52

Z1

is to slow the processor by a factor varying from two

to four. Table 3.2 summarizes the I/O characteristics

of the DEC AJAX 11/7$0 processing system.

The Perkin Elmer 3240 series c,f computers is also

a high throughput machine with a 32-bit architecture.

The HOSC currently uses two PE 3244 machines with

primary responsibilities as front end processors

r•ece i v i ng real -t ime data streamsfrorrti the KSC f i r i ng

W room.

1 The 3^244 memory subsystem is organized into banks,t

each capable of handling four megabytes of addressable

memory. Total system memory range =_ from 21 56 kiIobytes

in one bank to a full system complement of four

4-megabyte banks, for a maximum of 16 megabytes of

addressable memory. All memory is connec-ed to a common

memory bu=_. which consist=_ of two unidirectional,

asynchronous, 32-bit busses. One bus is dedicated to

memory write functions and the other i =_. dedicated to

memory read functions (Figure 3.4).

Input/Output is accompl ished using fine external

communication busses: one multiplexer bus for medium

=_•peed devices and a maximum of four high-speed Direct

Memory Access (DMA) bus=es that each support eight high

speed bidirectional ports. Each DMA port is controlled

b y a selector channel tied to the multiplexer bus that

controls and terminates transfers through the CPU. Once

v

53

t.

5N

TABLE 3.2 Summary o4 DEC VAX 11/780 I/OCharacter i st i cs

E!

Processor:

32-bit vicird architecture

Main Memory:

Virtual address space:

Cycle Times:

4.3' billion bytes..

800 nanoseconds per 64bit read.1400 nanosecond=_. per 44bit write.

I/O UNIBUS Adapter

Maximum aggregate rate:

1.5 Mb y te/sec throughBPD

Buttered Data Paths (BPD'): 15 total, 8 b y te butteri n e ac h, 695 k i t ovior dsper second read andwrite. Used for fastdata transters.

Direct Data Path (DDP) 425 k: i 1 ov.)or ds/sec forv.ir i to and 316 k. i 1 ov.jords.per second +or read.Used for tran +ers tononconsecutive memorylocation_..

54

I

OF PG:j k Q JUH"t . it

0M,HU

Sutlt 1 2AMR I

^I — — ------- KWUI

' KUM" ACC133 IIMSoo RA SEC

tIC ----------- LMC

61 WSTC co?" "MRi III!

r ^Ixl.

°"u—^ — ^u I CACnio K5114' 111 ^— KVPM ACCZ9Ii DMA

— — _TF"IUTOR

' III

1 DMA rugDMA so$ MAS

lQ_IM't to M1/!

(IPM3 MAI)

coR-ots cRt 8

MOLYI-Qttl LOOC. AIM"

sri s o

;MI"" ttAC" I*32 Itt11CAPD is ttl " ISR32 still CTC

C

1RUM

Figure 3.4 Block Diagram of PE 3244.

55

II

1

n

F

56

1

7"

the channel is activated, the processor is reIeased and

is free to continue processing on an unrelated task.

Published I/O transfer rates for the PE 3244 [-MA bus

indicate that transfer rates of up to 10 megabyte =_ per

second i n the burst mode are possi bl e for each DMA bus

[PEC81I. The I/O characteristics of the PE 3240 series

is summarized in Table 3.3 [MAL ►L84].

to

0E

TABLE 3.3 Summary of Perkin Elmer 3240 I/OCharacteristics

Processor:

32 bit/word.

F Main Memory:

V i rtual Address pace:

lb Megabytes.

Cycle Time:

500 nanoseconds.

DMA Bus Data Transfer Rate

Burst Mode: 10 Megabytes persecond with a maximumof 4 DMA busses per/stem.

57

1

1

:.

Chapter 4Software Design Description

This• chapter describes the development of the

software used to model the HYPEP.channel network. The

intent of the simulation is to accurately model the

characteristics of a HYPEP.channe 1 network. Wh i 1 e, every

possible function of the network is. not characterized,

the protocols which have the most impact on the network

were included to the extent possible. The goal of the

simulation is to provide a software tool to analyze the

characteristics of present and future configurations of

the network at HOSC.

4.1 Software Functions

The simulation model as de v eloped should perform

some primary functions, among these are:

1) provide a relatively easy method ofsimulating the existing system andprovide a means for modifying thesimulation environment so that differentconfigurations may be modeled.

2) provide an output which may be meaning-fully converted to performailLe measuresdescribed in this Chapter and Chapter 5.

3) provide a user friendly interface at alllevels of user interaction.

The so+tware should be designed to be as portable as

possible so that transferral from the development

compu`er to other computer environments should be

accomplished as easily as possible. Also, an;, future

56 I

a

CD

Iii enhancements of the algorithm as designed, should have

the capability of being accomoIished as easily as

possible.

Finally, the development of this simulation as

related to the ISO-OSI model for distributed computer

processing (Appendix II), ma y be thought of, as having

been developed between levels S and 6, the Session and

Presentation levels.

4.2 Design Constraints

The primary design constraint placed on this

imuIation effort was that the simulation be as

transportable ?.s pos_.ib1? between ccrrpUter:

unspecitied size and capabilities. `herefore,

I A.nguaae PASCAL w as chosen due to its vii de=_pre :^. d

availabilit y and richness of data structures.

4.3 Design Specifications

This sec tion deals wi`.h the imposed constraints

an^J assumptions which the model uses to ?.ccemplish its

simulation activity. These assumptions were mode to

keep the model both realistic and manageable.

4.3.1 Simulation Assumptions

In order to maintain viabilit y and model validity

certain assumptions were made. These assumptions ?re a^:

follows:

59

rm

v

1r• N

Qir

i

r

1) Every time an adapter regijests thetrunk, the frame sequence sent is amessage-with-data sequence. Therefore,message-only sequences are excluded.

2) Maximum number of trunks is two.

3) Model will reduce to a single trunkmodel.

4) Any single adapter may be attached toboth trunks (dual trunk model)(1,2,..,N)

5) Trunk lengths are less than, or aqua to1000 feet, Belden 9248 cable data isused (propagation time).

6) Worst case fixed delay, priority deiay,and end delay will be used, as given by(FRAN841.

7) In order for the -,cdel to resemblereality as closely as possible, measuredtransmission frame times will be used(CWAT5821,CFRAN821).

8) Intra-adapter communication is notallowed.

9) The wait flip-flop option is notimplemented.

4.3.2 Parameter Definition

As previou_ly stated worst c^-=e value_ _,f fixed

rela y , priority delay, and end delay are a=ed in the

si m u l ati on . The expression used to evaluate the fixed

dela y on a given trunk is given by:

Fixed dela y = 4 nsec * (trunk 1errath) + 2.08 user (1)

where trunk length is given in +eet. This value

approximate , but is greater than, ti.-lice the end-to-end

60

propagation time for the trunk, plus the time required

by the adapter to formulate and to begin transmitting a

response. This value is the same for each adapter on a

given trunk.

The highest priority adapter i E assigned a

priority delay of 0.48 user. The priority delay for the

remaining adapter=_. on a liven t r unk is given by:

Priority delay (K) = Priority dela y -:K-1)+ 4 ne.ec * d + 1.6 u=_.ec, (2)

K = 2,3,....L

where K is the index of the adapter with priority K and

d is the distance in feet betvieen the adapter kvith

priority K and the adapter with priority (K-1), L

refsrs to the lowest priority adapter. The constant 1.5

u=.ecs i S added to al1e ,)iate oroblems with line

rzflections.

The end dela y of the adapter with priority K i

given by:

End dela y ( K) = Priority delay (L)

+ nsec * d + 1.6 u , ec. (3)

K = 1,2,....L

where L is the lowest priori ty adapter , and d i s the

distance, in feet, from the adapter tjitti priority K to

the adapter farthest from i t [FRHl\184] .

61

i1

-- 'FF

n1 w

These are the rrajo; parameters ujh i ch need to be

calculated for a given configuration of the

HYPERcha.nne 1 network . They are cal cu 1 ated for , ai ven

configuration when the simulation p rogram is executed.

4.4 Algorithm Description

In this section an overall view of the activit y of

the simulation is detailed. Detailed descriptions of

the individual module=_. used by the program are found in

Appendix III.

4.4.1 Overall Simulation Activity

The simulation as developed is a discrete ek.)ent

simulation. The event that drives. the model iE^ an

adapter's next scheduled transmit time. An adapter

trying to transmit will at tempt to obtain a. trunk in

three given time frames. An adapter ma y try to transmit

while the trunk i=_ busy, during the priority delay or

scheduling period, or finally, in the contention

period. If an adapter attempts to transmit while the

trunk is bus y its next transmit time is adjusted to its

=_cheduling period time (.priority delay). If an adapter

attempts "o transmit during the schedulin g period one

of two pos=_.ibil ities exist: 1) it att• ,,npt = to transmit

atter fixed delay but before i is pr i o- i ty del ay event

and 2) it attempts to transmit after its priority delay

event but before the , nd delay e:;ent. In the first

case, the adapter,is allowed `o transmit at It

a2

M^

IN

priority delay event and in the second ca =_e, the

adapter is forced to wait until ics end delay event is

signalled. This is in accordance with NSU s trunk.

access protocol. An adapter attempting to transmit

during the contention period is allowed to 0o =_.o

provided that the trunk is sensed idle. Once the

adapter has gained access. to a trunk thrclugh the trunk

accessprotocol as modeled, it will proceed to send its

message sequence.

In Figure 4.1, a complete message -with-data

sequence is shown. Appropriate timing and program flags

!M1 throuqh 116) are indicated. the algorithm shown in

Figure 4.2, in flow diagram form, illustrates the

overall activities of the simulation program. Using

these two figures a basic description of the program

+low may be performed. The first three blocks in Figure

4.2 perform initialization of program va^iables,

def i n i t i on of the ne twor l, con+ i our, .at i on , and prints a

description of the network to th_ auxiliary file Auxout

maintained bi the program. since trunk acce=_s has been

grantee (.previously described) an adapter w111 attempt

to send transmis=_.ion frames and data frame=_.. Program

flags are used to indicate where in the

message-with-data sequence the pre =_ent tran=_.mittino

adapter is located. The various update blocks !Case

through Case 7) update timing, bit counts, arid flag=..

b3

^1

I ^

1

Mil,

OF FOOk ^..-1+fit

JeH

n• 7

O

G. e

o^N

J

ps:NaY

e

r •^ Y u

.• a

J cn ^Y °

. 7 J

u ° ^

s:^ a ^? ;g J• ^+ r iN "'^ J o a

Y y D.

^ N = a^ uM O p

^ ^ J > e J

c e o. J

e jn r

7 ° Y

3p"D• • y v n rr ^. u J p< c c• . c• D • c F,• D 7 - tr ^. < u ^.

^ rtI ^ .. N •1H

J

7

s

64

•u^c1 •

• 7

r. N

o"

a^V w

®r

GO.r4

LJ

—4J

E

cn

w0

W

aiUGQ)

y

C1

L3

i

aJO11

m

S

r^

aiLJ

M

1

1

r

COF.( ^r

,Sled

Initltlitt

Chereclecltt

runt Ne'rorhnettrtpllon

EIT.e

CJRtenit I .eMrtt Treneelt Tlwe

lwittt Ne Eht•Ivrr fornlwltter

YTee

F

I

Figure 4.2 Flow Diagram of Simulation

1.

Activity.

I

65

ti

N YesTrunk 1^\t ^

I ;nitlellr. I

1

TrunVaria

k Ible.

C-0

)F P66,i l Jr.LI'l'

Initi#ilraTrunk T

Variable#

Cen \Tran^rwl t

T

rea

^1p rea

UPI at*Ilse#

care IT set flag n1

No

rle`e.upe.taea#e :et fie M7

flee "a

Uplat#

N2 1CaaeSet fin MJClear lt4

No

FlaTe# [clplate

Mt e#eet fin Ft6

^ ear M^

D

Figure 4.2 Continued.

66

1

C19 'I

Pi

.IOF. POu-

n

NA

""ateCe]e SSet II. N7clear I1^

r Mo

Ten fUpde,e.. Care 6

set fle 116' Clear H^

He

UQI.t. I

Ceie ICie.r N6

,1 ^1 )]t M•ilirnn]+^Il Tln ♦Current

I /Tl^a Mo^--•{ r s e Q C

e+c

Te.

Itlnl Netvorl1 Itlnt [n'Sr.tl.11c. - tietirltr'slAl"Su+...rT

Figure 4.2 Continued.

67

I ^

ti

1

Cas?2 incorporates the adapter reservation scheme I(Figure 2.9). If a receiving adapter can be reserved

for the transmitt;nq adapter the message sequence

transmission will continue, otherwise, the adapter will

return to case2 each pass. throuci h the loop, until it^i reserves its receiver or aborts its tran=_mis=_ion. The

I

message proper from? is updated in c^se4. A messagei

length of 64 bytes is assumed for convenience. Ca.se5

updates the tran_.mission segment in which a data block:

is sent. In case6, determination of whether or not

another data sequence need =_. to be sent (based on the

attached device's buffer size) is made. If anothe7 data

block is required, then the period of time t'— t" will

be repeated, this will continue as required. In case',

updates to me =_=age delay (th •: time difference between

initial transmission time and the final trarsmission

time), trunk sequence transmission tally, and adapter

next transmission time are performed. The transmitting

and r e c e i v i n q adapter'_ are released for• ether

transmissions in case? also. The simulation will

continue until the user defined maximum time or the

maximum number of me=-sage sequences is exceeded. The

simulation will then print output statistic =_. to an

interactive terminal and an output file.

68

f

I 4.4.2 Model Set-Up

Figure 4.3 illustrate=. the basic set-up of the

network con+Iguration which the simulation program

operates on. All configurations to be modeled should be

set up accord in? to this diagram. In the ca c_e of a

single trunk configuration, adapters I through N are

used.

The =_.imulation (SiMIi u_es. this model

con+iguration to properl y identify and c=haracterize the

network adapter's, their attached devices, and data

sources.

4.5 System Files

There are three tiles associated vjIth the

simulation: program, Dfile, and Auxout files. The

program file (5im1) may be maintained as either c_ource

or object code since normal operation of the program

requires no changes to the program file. The files

Dfile and Au;<out a.re maintained ac standard ASCII text

files. Dfile cone:ins. a description of the network, and

is used by the program file for parameter values.

Auxout contains a text description of the network and

is used to store output statistics from a particular

program execution.

At the beginning of a program execution, an

interactive query allovls the user to use the network

configuration defined in the Dfile or define a new

69

• .'y^''' "rte. ^.. ^ . 4

c

^v

Ev^

uc

n_

L^L

n

v

0.z.

7

La

7

Cs,

Ki

r01► `^ ate. ?. ^^

t

i

77

1

con+iguration, which is then placed in this f le. The

auxi 1 iar y file Auxout, .s a. print formatted fi le and

may be directed to a printer for a hard cop y of a

program execution's statistics. Additionally, Auxout is

totally maintained by the pr on , art: file and thus ie.

transparent to the user until a print out of a

=_imuIation run is desired.

4.6 Reported Statistics

The network statistics, as comp i 1-d by the model,

are such that the y al lo,., the computation of measure=_

which indicate network performance. These measures are

defined as follows:

• D: The delay that occurs from the timean adapter becomes ready to transmita message sequence u.itil it actuallycompletes its transmission.

• S: The throughput of the local network;reported as the total rate of datatransmitted over the network.

• U: The utilization of the network; thisis given as normalized throughput.

o 0: Offered load; the total rate of datapresented to the network.

^there pos s ible the =_tatis t ic5 necessary to calculate

these measures will be reported for the entire ne t!-jork ,

the individual trunks, and the individual a.daptera.

I

!I

11

1•r

.61717''

4.7 Validation Criteria

Wh i le every attempt has !7een made to make th i s

simulation as close to the real =s=tem as possible,

software implementation of an electrc,nic s y stem has its

limitations. This simulation effort has been aimed

primarily at modeling the various protocols implemented

b! a HYPERchannel netkmork. It has been shown that these

protocols are the factor=_ ha -)ing the most impact on

s y stem performance I PAH841 , CWATS80I , [GOr&,09I , aid so

on. Therefor e, the simulation ,jas designed to model

ithese parameters as closel y as po^zsib, l The validit•r

o+ this model rests on a cle,r under_tandina of the

operation of HYPERchannel networks and the relationship

of this operation on s ystem performance.

Finally, it v) as not Peas i ble or practical t

establish a validation te s t bed at HO IIC. This due

1 arge 1 to the requ i remen is p l aced on the f ac i l i t y and

Its stated mi_ston. Thus , the model -),1 idAtion was done

emp r cal1y, based on knowledge of tide HfPEPchanneI

= y stem and the components attached at HOSC.

72t

0)9^77.­.W

Chap ter 5Model Analysis and Conclusions

In this chapter some of the theoretical consider-

-it i on i nk)ol v i ng H'YPERchanne 1 n twork performancet

measures will be developed. The results of exercisi nc.

the model in various configurations (based on the HOSC

esystem and components) will be presented. Finally, the

conclusion section, will attempt to describe the

results and their relation to operatinf, condi t i onE atf

t

H O'S C.

5.1 Theoretical Performance Bounds

In Chapter 4, se ,, erai stat,stirs .-jere discussed as

ti being important ; ndicators of network performance.

These were i den ti+ied as S, U, and D. S defined as

r throughput, is the rate of data f 1 ow or, the network. U

€P

or utilization, is normalized through p ut, this being

Ithe +rac`.ion of network cacao ty being u t i 1 ized, and

finall y , D or delay, i s the dela y between the time an

adapter re q uests the trunk and the t-me at which it

completes a transm =lion. In order +or the e-eper mental

,),lues to ha f)e meaning, some theoretical determination

of these stati st cs i s needed so that com p ar i son= may

t be made. In order to determine theoreticall y theset

vaiuea the network factors which most affect HSLN

performance mus t be V.noimn . The +ac for s .jh i c a++e -- t

tt^F.v

?3 I

1

this performance. i)dependent o+ the a, r ta,ched equipment

• Bandwidth• Propagation del ay• Number of bi ts per frame• Local network protocol• Offered load• Number of stations ESTALLS41

he + i r s t three of these t:.c t or letermine ?.

p?r?.meter ?., +rom 1 ,1hich th? netl.,iork utilization U. and

t hroJghput S ma ., be - jet?rmin ed.

Sin '_a a lo.:al area net.,,,,ork __ d. atinqu ehe^ +rom

I ono h au l n twork s and mu 1 t i pr .oce=_ _or =- -s tems b y the

bandwidth E, and distance =_ r.d, ink.)ol - ?d. The oroduct

1j-f the aw tt.,o term= ' E • d.; c an oe 1J =_?d to ch ..r ac ter i ze

the r.?t!-.jork. The tr?n5mi 3=1 on I?n,:jth :)r the med i Um m a^

be Ll e term! nedb^ di !idin^ this q u ?.ntIt'/ b:• the

pro p a gation - ,e Ioci ti '); of the m?dium. Thi s quant t.,

m?- be caicul •.ted a= f011-:)W

Tr?nam az1on Lengtn = g

Net-ork, System '=nrpr,r?.tio n =_U G^est= _ ?iu? .'f

-^u :er : e n t o+ the .peed f 1 ght be u _ed ror

pr opa g ati7n e1C.:,t. when attemotinci t.o e =_t?bI h

n._ t imorv. per4orm.n,:-^, Us n 4 th e a l Je o+ TO Me g a,.b i t? p er

=_.cond + or E. _ssum ng d to b? 1400 ?t, ?nd a=ink a

• 1

t -al ue of 1 .2 x 108 meter s/ sec for prop_agat i on ,e 1 o c i ty,

t ^ the theorc-t!cal transmission length of a 1000 foot

HYPERchannel network; is 127 bits.r

' The ratio of transmission bit length, to the

length of a typical frame (L) is the dimensionles_

quantity a. Thus,

a = tran=_mi s_ i on 1 ength of trunk,tyoir_.aI frame length bi*._,

or

a = BdVL

Since d/V is the wor=t ca se propagation time ;n

the medium it may be replaced with the H',`PERchannei

Fixeo Dela y . Pecall Ong from Chapter 4 that Fixed Deli/

may be calculated as

Fixed Dela y = 4 nsec f ,trunk length) + 2.i!8 uses,

the parameter a may be calculated as

a = B F,xed Delay?L

Thu =_ for a HYr^E-:RchannPI trunk of 1^ngth 1iii10 feet,

a is determined to be 0.0109. Typical values of a for a

HSU,I range from 0.01 to ot;e^ 1 . Hn intui tive discussion

of the mean i ng0 of the parameter a i s found i n Wi 1 1 i .am

c;tal 1 i n a ' s Lo cal Ne twor le. s. Th i s par ~me ter i s u d to

75

.1

1!

M

provide :,n upper bound on the utilization o+ the

netojork., Stallings also points out that this h;:pothesis

appears to be supported by experimental evidence; a

Part o+ t h i di_ ,_ussion +olicws:

....Consider a perfectly e++ic1ent accessmechanism that allows on!y one transmissionat a tine. As soon as one transmission isover, another node begins transmuting.Furthermore, the tran =_mission is puredata--no o-)erhe-ad bi ts.... 1;jhat i s themaximum possible utiiization o+ the network -'It can `:e expressed as the ratio o+ totalthroughput of the system }o the rapacit y orbandwidth:

U = throughputB

Li(Prcpagat i on + tran=_m i ss D n time;B

Li ( D/Q + L/B)B

+ a

So, utilization varies inversely v)ith a[STALL84].

Table 5.1 shows an example u_ i ng a to predict thQ

theoretical bo .-jnds on a network simil -Ar to the sy_.tem

at HCiSC. Un+ortunatel y , this method does not accc)unt

fDr the access protocol o+ the network:. Furthermore. it

assumes that the maximum propagation time i ncurred

on each transmission and that or, l one transmission ma,,

occur at a t i me. Despite these _h•_rtcomings, upper

76

. ^ UIP

:o

1 Theoretical Bounds on a HYpERchanne\Trunk of Length 1000 Feet.

Fixed Dela y = 6.08 usec

Bit Length = 127.0325 bits

a = 0.O1O9

U = \ = O.9892' =

S = ^ ° B = c, !-Ib/t sec

For an arbitrarr period cf t/me, t, the total bits

transferred ar*:

Total Bits =S*t

for t = 40 seconds

Total Bits = 1978 Megabits

1

lr

bounds on throughput and utilization may be calculated

using these techniques.

Another derivation o+ utilization which takes into

conside-atlon the effects of the protocol on the

network performance , ba y ed on the wr)rV of Robert

Metcalfe and Da"id Boggs IMETC763 is considered. Their

work is based on the Ethernet system which is a local

area network: operating under a CSMA/CD medium access

protocol with c=haracteristics similar to HYPERchannel.

;assume that there are N active nodes on the

^t•twor!: , ?ach ha-.) i ng l den t i cal data generating

, `g arazteristics. Furthermore, of ter a stat i on has

transmit t ed its packet, another station becomes ready

to transmit i t s packet , so that N a i so represents the

total offered 1 oad on tree network. Stal i l ng= i n h i s

amplification of CMETC763 n 0 t e S that time on th?

network ma ybe dI ,.)lded ; n t o t"uo component=_:

transmission internal (t;me required to transmit a

complete packet over the medium, , and a contention

nter,)aI (sequence of slots U)i t a colt ision or no

transml s it on; . Throu gin pu t then , becomes the rat i o cif

time tran =_mittino to the total time.

Recall that a ma y be written a

A = propagation timet r an sm l s =_ i on t i me

,j

t

t

IM

where the propagat i on t ime i s the worst case val lie of

time to transmit a frame o ,.er the medium, and

i transmission time is the time required to get a

complete frame onto the medium. If transmission time is

normalized to one, then a becomes propagation time. The

m n imum 1 ength of the tr ansmi ss i on sl of must be chosen

to al 1 ovi for the detes=t i on of a col 1 i s on and i s. equal

to twic? the end-to-end propagation time (1/2a) .

Following 'St al1inq's approach for the development

of the equations describing throughput and utilization,

the average 1 ength o* the con ter, t i ors i n ter-)al i

!e term ined b y first computing A, the probability that

exactly one station attempt :. transmission in a slot

an,^ acquires access to t'?^ nedl um. This is the bincmi.al

probability that any one stator, attempts to tr:.nsmi*

:.nd the others do not,

1

1 I

= t•d p( 1 - p, N - 1

ieih i c i s the probab 1 i tv that the de= i red oo_currence

acquisition Df the trunk) wi11 occur ir, N independent

triais. Since maximum throughput and utilization are

the quantities cf interest, maximizing A ,dill require

that p = i.'N so that,

7i

11

r4 = C 1 - 1/N.,N - 1

The estimated mean length of contention interval,

!rj, in slots i s.

i

..r

i Fr[ i =lots in row with :k col l i si oni=1 or no transmission followed by a

slot with no transm ssion]

o.

i=1

x

1.,jhich con-.: erges to,

E[!^i) I .H

The max imun ,al ue o+ utilization may now be

determined, vjhich is the length o+ a transmis_.ion

n ter-,, al as a proportion o f a cic r ^ c o n s i s.t i nqa of a

stransm i _sion and a contention interval

IJ = transmis_ on ti.nej total time

= tr:.nsm i s i on t ernetrar=_m i ssion time + contention time

= 1 _l + :a 1 - A

H

:; 1 r

^l

,t

n

For the 10 0 0 +oot HYPERchanne 1 ne tk..1C, r k prev i ousl v

described, assuming N = 4, U = U.971 and S is 48.55

Megabi t=_. per =_econd vwh i c corresponas n i cel y 1wi t the

results obtained using onl:r a < Tab le 5.1?.

The calculation of the parameter D or me=_sage

delay is not so ob-.ious. It appears empirically, that D

increases. without bound as the network approache

saturation. Hs the number of nodes increases, ac do the

number o+ acc;-ss reque=_ t the number of col l i s i on=_ ,

the number o+ retransmissions and also the time dela y a

node e y.per,ences before access is obtained, =_o D, Does

appear to i ncrease •Ni thout bound.

5.2 Presentation of Simulation Results

The Dre -iiou s =_ection pre =e ^ ta d analytical

techn iques u =_e+uI for Rred;cting the peak., or upper

1 imi is o+ a. HYPERchannel network c p erformance. Wh i i e

thy_ i_ useful for pred;ctinq top end performance, it

doe= not provide any usetul nformation about a

particuIar con +igurat ion o+ the networV.

The purpose o+ thi =_ simu1a.tion effort is to

prow i de the engi neers :.nd sc i en t i s s at Hii;C: 1wi t a

so+tware tool •)h i =h w1 1 1 prov i de i nformat i on on ne tl,,,ork

F rrformanc ai n a va.r i e t o+ con+ i qurat i on . Th i s

section presents results from this model for the

ne twork de=_.cr i p t i ons shown i n F i qure, 5. 1 and 5.4.

Detailed descriptions o+ these con+igurat+ons, along

SI

t

W

with simulation results are given in section 5.2.1 and

i the resu 1 is for a dual trunk. cant i gust ion are qi ven in

section 5.2.2.

5.2.1 Single Trunk HOSC Results.

The single trunk configuration, as shoe,,in in Figure

5. 1 , and de+ tried in terms of the model in Hppendi x 11J,

,:t)a = con s idered. Table 5.3 contain= a listing o+ the

rel a.t ive probabi 1 i ties th.a.t R Q ,en tran_mi t t e r :ji 1 1

-attempt to transmit to a of ven rece i l)er . This is used

by the =.imulation to establish the virtual Connection

be tw., -n de-) ices for commun i cat ; on . I n order to gauge

the performance o+ this con+ i qurat on over a !,a de r a.nge

of input loading, the topology o+ the net s;_fork a

defined was kept constant. The uttered 10?.d to the

network was ;cried b InCreasing the data source

generation rates to the de-) i ce s_ shown.i

Table 5.2 illustrates 'he method for computing

s y stem ner+ormance measures from simulation st_atisti_s

Tables 5.4 and 5.5, contain data points cal_ul.a`ed from

=1mu1•atlon runs, with each data point r'ep^esentlrig a

simulation run. These data points 1.vere plotted as s_h-_i,un

n F i aur- es 5. 2* and 5.

82

.s

11

r

w,

NI

Table 5.2 Cal cula.tion o+ Par=.meter=_ usinq_

Simulation Statistics.

S (throughput) = Tot I Bi is Trari=_mi ttedSimulation Time

U (utilization) =

Bari dvii dth

bi t°5G Mbit= per second

D ( dela y ) = Hv g. Message Dela y De l.- ce 1+ Avg. Message Delay De-)ice

+ as. Ay-a. Message Delay Device nn

The above expression for delay is used in the case1,,here tranami t t i ng dev I ces. ha-)e f i n i to Avera g e Mess-ageDelays. For the case where a transmuting Deviceattempt to transmit messa ges but ha an AverageMessage Dela y equal to zero (Average Message Dela y = ^^,:.rid Abort count > 0) it is assumed, that Me =_aqe Delay,or Delay, for the Network exceeded simulation time.

Offered Load is compiled by the simulation andoutput as one o+ i t_ statistics.

11

Y^

1

V '1

1

Table 5.3 Relative Probabilities for Transmitter/Rece i -:,er Pair= for Fi qijre 5. 1 .

Tran =_.mit ter/ Receiver Probability

111-311 0.7

111-321 0.3

211-4 1 1 .1)

221-421 1.0

11-211 0.01

33 11 221 U.01

321-211 0.01

321-221 0.01

331-421 1.0

34

a1

O

O '

uo OJ

o

ti

v1

Y

:J

^ df

u-.

v

:C..r

Ls.

•CCC y ^ ^ ,

P.m

I

1

1'c •O •

< K

85

. Dil

't

1

`'

OF FL

Table 5.4 Data Point= tar Figure 5.2

s +

R

4

5Plbxtes/sec

UMbytes

.0008092 . Ci00 1 2 1 5 . 0 234998

.0024680 .6003949 .0470083

.0040020 .000x403 0'0`2`,

.00671901 .1010751 . 1 1 21 1 40

.0142275 .0022764 .2242640

.029095o .0046553 .4486710

.0431299 .0069008 .1^7^341 0

.0586719 .00'3875 .8984520

. 0 7S`0 755 . 0 1 1 t•921 1. 12245A0

.1421105 .0227377 2.2420000

.118972 .0?.9036 4.4840000320 281 3 . 0 51 2450 .6 . 72'9n it n5137168 .11821946 9.969123110.5548880 .0887821 11.2103000.93-0150 .149624 22.-1200000

1.5409865 .2465578 44.84010002.3634718 .3781550 67.26030002.3250275 .3720044 89.68000003. 4732500 .5557200 224.20000003.6444500 .5831120 448.400000114.5387500 .7261400 672.60000004.60'3c. 250 .7373800 896.80000004.6521500 .74450 30 1 1 21 . OIDi1 CIO i111

4.7345000 .7575000 2242.00000004._510500 .6962640 4:40.00000004.8016750 .7682680 67_0.00000004.8004000 .76x,0640 8968.0CI000004.70 ?8500 .7676560 11210.0000000

Average C-= e '_ _

.0021383Ci01 :;,50ij001 78330016166

.0015533

.0016850

.0016283001`11600185830042466

.38757660u.54 7500042916

140>40J ,4 ii

.4622500140>40>40140>40

4 r^> 4 C,

>40>40>40

66

^Aa li

aJ

N

L

tilization versus Offered Load:)r Single 'Trunk Simulation.

39

t1

- sue' _ - , . ^'•^

., r

Offered Load (Log Bits)

WEIR C=)I

T?ble 5.5 Data Points for Figure 5.3.

Control BitsMbits

.1005832` . 3076200P .4885992

.67209121 .7754192

1 .635,49603.3552900

{ 5.09739206.83254-08.424640016.438120027. 1 1 o8800

43. 003472 002.547020074.7621600

134.9088000204.0576000

i347.8608000353.9296000539.07681300685. 70 860 13 0

1 562.904800050..03200013564. 3<;^20000543. 6464000624.7024000527.836200052c' . 1 13 6 0 C, 052'S.7168001)

Data Bitsrib is

.177536520456.854160

1.1634161.3745812.9146165.960952'? . 71 '^3c011.9770401 4.9°976028.992240-ill . 690 1 OU58.011760

1 I) 1 .8.,,400C,102.3072001 ,t^4 . 616000289.070400408.488000390.079200572.364800480.5176008o9. 3-116000910 . 7220 013924.616000971 .3920013767. 82480 1'11008.6900001 1)08. 0080001006.6000013

13 BitsMb is

.1879984

.3760664

.5642040

.7210600

.89691201.79411203.58'?36805.3867230

. 1 3751 603.'i79r,0ii017.93o000035.872000053.837500071.753840089.5824000

179.3600000358.7208000538.13624000717.440,01)IDfj

1 7G^ . 6011111111111

D'587.20111)0005380.801300007174.4000000g9-t„x.000[100017936.000000034729.00000005 )..1)3.0000013071744.000000089686.0000000

R8

`t1

E 0

1

v y

71

inC J kr

4> f

Qb 7 i^ 11Offered Load (Loe bits)

(a) : n

a,O

n

n

0

J1

V CJQ

•r.

r

J J :4

Offered Load (Lor bits)

(b)

Figure 5.3 Plot of Transmitted Control and Data Bitsversus Offered Load for Single Trunk Simulation.

39

t1

e

A

w W) W u) w u) co u)o• m a^ r f` n ^D n

( s7 ^8 80^)

s7^g a^a^ Fa>>^wsua.^^,

.-1

1

.-1

Wf9 t) T k) m U) D ul r9^+ m rm r- r- W

Tq

D n n

( S1 ^l)

sl{q jolluo:) paa7Twsuull

Nu-4

m

00O

^.1

brovr-a

b

4I)w'LO

C^ O

•r1

L

N ^u E-4 •4f'0 to

M ^

U G^ rp 4.d H-

C 11^-4

to-4 Go •-+4 fnLc 4v oV w

b

a.) OU ,..3.4E -JN yG 4r1 'U4 WH 'LO

'LO N

L Nv 4-4 va >

v4

00-4w

,4 NL.4

c]T

0

brov

r-

m4v

D w'LO

tin

90

1

♦r 1

1

1

The system configuration and data flow rates

indicated in figure 5.1 are a typical loading of the

main trunk of the HOSC system. The total offered

load (G) for the system as depicted in figure 5.1 is

computed as follows (G the offered load is the total

number of data bits offered to the channel):

DEVICE DATA ARP, I kIAL RATE

lil 15 Kbytes/sec = 120 kbps

211 4 Kbytes/sec = 32 kbps

221 6.4 Kbytes/sec = 51.2 kbps

311 1 Kbytes/sec = 8 kbps

321 1 kb y tes/sec = 8 kbps

331 .625 Kbytes/sec = 5 kbps

411 0

421 0

431 0

IN

TOTAL OFFERED LOA` = 224.2 kbps.

In a 40 second period a total of 8.976 Mbits or

6.953 (Loci bits) would be offered for transmission

across the HYPERchannel's network. Referring to

figure 5,2 the utilization of the HYPERchannel trunk

for this offered load is approximately 2;:. The

throughput rate is thus (.02) * (50 Mbits per

second) = 1 Mbps. Obviously the system is nowhere

91

Q41

near its upper limit in data throughput rate, trunk

utilization and hence not in offered load.

The approximate number of total bits

transmitted to send a 2 kb y te block of data ma y be

estimated from figure 2.8 using Table 2.2 as a

reference. From figure 2.8 it is apparent that 7

transmission frame format f i el ds, 9 response frame

fields, and 2 response frames with data format

fields are transmitted to accomplish t`:e

transmission of 2 kby tes of data. This amounts to

an absolute minimum transmission of 1900 bits total

for 15000 bits of data or absolute minimum overhead

of 22.5%. For longer data blocks the overhead is a

smaller percentage and ma y be calculated b y the

relationship (assuming no collisions):

ABSOLUTE MINIMUM TOTAL BITS SENT

PER 2 KBYTES OF DATA = 19500 + (N-1)18500

where N = the number of 2 kbytes of

data.

The educt i or, in transmission ok^erhead for

mul*-^;e transmission of data segements

of 2 kbytes of data is not si gn i f i cant in number, of

bits transmitted but the timing and number of times

the channel is free for contention is r?duced by a

significant amount. It will be obser , )ed from the

92

rf

I ^

F

sue" •- -

--4.

simulation rune. that an average overhead of 50Y for

low offered load and 100% for high offered load is

the case. This overhead increase is due to the

non—intege multiples of 2 kbytes of data to be sent

and to collisions.

Figure 5.3 depicts the average delay and number

of collisions versus offered 1oad. The average

delay is an aggregate delay number and a 1.-roe delay

is indicative that at least one device is

experiencing a large dela y , Thus it ma y ir- =;te

that onl y one dev i ce i s unab l - to t- ansmi t but all

the remainin g ^r _es may be transmitting

satisfactorily. However it is an indicator that

things are begining to sour on the overall network

performance.

Likewise the number of collisions is an

aggregate sum and indicates the relative number of

retry transmission attempts the s y stem is

experiencing. Since the HYPERchannel is not a pure

contention s y stem (such as ETHERNET) the increase of

collisions does not necessarily indicate

accompan y ing data loss or absolute inability of an

adapter to communicate. Again it is an indicator

that thing= are riot so well on the overall netvvcrk.

93

t1

r

117- qW-^.

v ^^•

OW

From the results of figure 5.3 it is apparent

' that as the offered load increases past about I.5

(31.62 Mbits for 40 seconds or 790 kbits per second)

the system is beginning to experience traffic

congestion. The system's trunk utilization, figure

5.2, is seen to start a rise at this point (7.5) of

of(vOd ioad and it may be observed that at an

offered load of about 9.5 (3162 Mbits for 40 seconds.

or 79 Mbits per second) the trunk utilization is

entering saturation. At this point it is safe to

sa y that some devices are gust not able to transmit

all their data. Somewhere in between these two

offered loads is a point that would do well to be

identified as the maximum useful offered lord

condition. Using the rule of thumt for normal

maximum operating offered load for pure contention

systems (ETHERNET is an example of a pure

contention system) the maximum operating offered

load would be set to approximately 1/2e or 13.35% of

the channel bandwidth. For slotted contention

systems this rule of thumb figure is approximately

1/e or 36.7%. The H'r'PERchanneI i s a hybrid

priority/contention system with prioritized time

slottinq and it is reasonable to ex p ect to load the

system to the 36.7% trunk utilization. Inspecting

94

1

the graph of trunk ut i 1 i zat i on versos offered load,

figure 5.21 , it Is observed that the offered load for

a utilization figure of 36.7% is approximately 8.5

(log bits) or a 7.9 Mbps aggregrate rate (316 Mbits

in a 40 second).

Inspection of the graphs for the transmitted

control bits and the transmitted data bits versus

offered load, figure 5.3, also illustrate that at

8.5 offered load the control bits and data bit

curves start to enter saturation. Thus it is

reasonable to state that the maximum operating

offe^ed load (in pure aggregrate rate data bits)

should be 8.5. This is an aggregrate rate of

offered data of 7.9 Mbps or 15.8% of the channel

bandwidth of 50 Mbits. Remember that an absolute

minimum of 22.5% overhead i needed at low collision

rates and thus 7.9 Mbps of offered data plus 2?.5%

overhead is approximately 9.6775 Mbps or, 19.35% of

the channel bandwidth. (This assumes all data

blocks are inteqral 2 Kbytes in size).

A further comment of the figure 5.3c and 5.3 d

is in order. The offered data to the channel, G,

:see Table 5.5) is only the actual data to be

transmitted. The actual number of data and control

bits required (as evidenced from the simulation

95

J

11M

tM

t

i

runs), which when added together equal the channel

throughput S, will not equal G but be greater thani

G.

It should be observed that for low offered load

the actual transmitted bits on the channel amounts

to 2.54 times the offered load and at high offered

load this figure decreases to about 2 times the

offered load until saturation tales place. This

apparent increase in efficiency is mi sleaoing since

the prioritize' time slotting mode of operation

replaces the contention portion of the channel

algorithm and stagnation of the throughput (U*B)

takes place.

Thus the 7.9 Mbps offered aggregate load

corresponds to about 16 Mbps to 18 Mbps actual1

channel offered total load or 36% of the channel

bandwidth.

FROM THIS DISCUSSION AND THE SIMULATION

RESULTS COUPLED WITH THE ANALYTICAL RESULTS

IT IS RECOMMENDED THAT THE TOTAL AGGREGr'iTE

OFFERED DATA TO THE HYPERchannel SHOULD BE

HELD TO 8 Mbps OR LESS. IN FACT DUE TO THE

UNCERTAINT'( OF ESTIMATING AGGREGATE DATA RATES

A MAXIMUM OF 4 Mbps WOULD SEEM PRUDENT.

96

I5.2.2 Dual Trunk HOSC Results

The dual trunk configuration as shown in

Figure 5.4 and detailed in Appendix V, was

considered. Once again, the relative probabilities

for transmitter/

receiver pairs in this configuration are contained

in Table 5.6. In order to compare the effect of the

dual trunk configuration with the )reuious results,

the configuration of trunk 2 1n Figure 5.4 was

defined as the n-::ile trunk confiouration

previously considered. The topology of this

configuration was held constant and the offered

load var i ed, the resulting data points are

contained in Tables 5.7, 5. 80, and 5.9. These data

points were plotted as shown in Figures 5.5, 5.6,

and 5.7.

In a secenario that has been ,fudged to be a

normal environment for the HOSC dual trunk system,

the transmissions from trunk 1 to trunk 2 have

aggregate data rate of 10 kbytes/sec. The device

on trunk 1 alwa ys transmitts acros s_. the trunks to

trunk 2. The cross traffic from trunk 2 to trunk 1

has a lower data rate and a lower, probabi11ty of

request for transmission. Thus the majority of

9%

1

04f,

Table 5..5 Relative Probabilities for Transmitter/Peceiver Pairs +or Figure 5.4.

Transmitter/Receiver

1 1 1 -521

211-411

211-421

311-531

321-521

321-111

411-311

411-321

421-311

421-321

431-521

Probability

1.0

0.7

0.

1.0

1.3

0.3

0.01

0.01

0.01

0.01

1.0

98

^I

ti

?GL .

O 4 n ^ OJ C

< d ^ ^ n O^ 4 ^ • 7

a U uN ' • U^ W O •

^ • W O Y O

.n1C.N WW H .

<F1.0

O

I ^O .^O 6 / ^r

< ry H

. I y G W

N rr /Ff y U.1 .r

En.:1 r-

i rl .

e JY

o °U

H y

N

y I^< W ^ Y

°

4

a<y

< W

l

0

i

D <sat

CIL

yr^

L

Fi

.n<

rn

^-1

.-1v70

•1

y

99

TaL^le 5.% Data Point =_ for Figure 5.5 (Trunk 1)

S U r, A-)erage DMb y tes/sec Mbytes_ secs

.00017973 .000028758 .0155758 .0006650

.00065895 .000105433 .04.573.30 .0018928

.00116560 .000186500 .0760532 .0018800

.00161704 .000258726 .109071) .0015842

.00239248 .0003827p7 .1521:90 .11014942

.00711533 .001138454 .4564050 .0013442

.011$9340 .001'025'40 .76:0820 .0013142

.01665555 .0026a4880 1.0658o00 .00,3000

.02376770 .003802830 1.5233900 .00110111)

.07053307 .J112852921 4.5644800 .0013228

.11621025 .018593600 7.0050000 .0064371

.16076790 .025722800 10.649o000 .0014928

.2256948,:) . 0361 1 1 1 1 1 15. 21 1 60011 , 111167786

.60678250 .0970352011 45.6?00000 .0288557

.01607500 .146572000 76 A50Jn00 .1i'j773001.1720'750 .187532400 106.4700000 401.50 327750 .240524400 1 52 . 1 1) 1) O u 0 1:1 . 712555772.52247200 .403590000 45c,.310130000 )-1.02.93269750 .4^-923100 7-.0.5000000 >403.15442500 .504700000 1064.7000000 ?403.4350000 .5 4960000 1377.0000000 >403.49356500 .558970000 4563.0000000 >40:-.5247!250 .503960-400 7605,1301-10000 >40

3.54453500 .567125000 10647.0000000 40

100

1^

U

Table 5.8 Data Points +or Figure 5.5 (Trunk 2).

SH bytes:,sec

.00017973

.00142330

.00204550

.00321635

.00478900

.01557770

.02o4142603715009.05333650.10056900.16651150.32703950.34178971. 865532t50

2.4?4515001.384273722.05963550L.24 087f(1.889152401.9243-114401.939254002.314184202.387359752.40758250

U

.000028758

.000227728

.000327280

.00051461t

.000766240

.00:492400

.001902940

.005944016

.008533800

.025691050

. 13 2"664180 005232o322.05468o000.138485200.399122400. 221 48=;800.329541600.519?74CI iii.302200000.30789';,OO CI

.310280000

. 0269000

.382057500

.3852001!00

GMbYte

.0155758

. 1]-407330

.0760532

.1090.'10

.1521190

.4564050

.76108201.0656001.5233900-1.564480, i7.605000010.649600015.21100045.n31001)1'11)7x.05000013

106.4700000152.100000045.,- 3000001)760 .501]0001]

1 i1 o4 . 70000C,01 37,1 . 0 ID 0 ID 0 0 114563. i)Qpljljiiil

7 .505 . 000000010647.000004101

Aver acie U

sec

.00O6o50

.0015928

.0013800

.01-1 1584 2

.0014942

.0013442

.0013142

. Ciif 13000

.0013000001 ?2280'] 64371

.001 4'28

.0007786

. 1) 2-8,v557

.09?7300> 0

.7125557>4 0>40>40>40>4040^0

I.

101

t1

C

C 30.A

2N

,4•r iu

0

Offered Load (Log bits) Trunk 1

(a)

E-iS

., •, if

.•

c ►^o

2

^ 1

6 ie 11

Offered Load (Log bits) Trunk 2

(b)

Figure 5.5 Plot of Utilization versus Offered Loadfor Dual Trunk Simulation.

102

1

OF K-

J

^r

? 1M 11

Offered Load (log bits)

(c)

n IEA

O ^^

y 1 ~^^

•. ;

o ^

:J s.

r ^^ 1 ^_^ 1J V 1

Offered Load (log bits)

(d)

Figure 5.5 Plot of utilization versus Offered Load

for Dual Trunk Simulation.

103 I ^

1

Table 5.9 Data Points for Figure=_. 5.6 and 5.7.

Trunk 1 Trunk 2Control Data Control Data 13

Mbits Mbits Mbits Mhits Mbits

.?27870 .026112 .327870 .026112 .1-2460

. 12021 9 .095744 .229786 .2,6680 .37386

.207651 165366 .339076 .315528 .60842

.29508:? 2350JI=- .52c096 ._;

. -,26231 .339456 .761 1 90 .771480 1 .21 3951.2677o8 i.009064 2.416856 2.569176 3.o51242.120224 1.688576 4.083456 4.375576 o.i!88o52,972682 2.36748E 5.728200 6.1727c0 8. 526884.24045o 3.377152 8.220800 8.873680 12.18712

12.568..'20 10.009600 24.681128 26.717520 X6.5158420.699520 16.4853611 44.027040 9.256640 60.8400028.644880 22.813200 59.468240 45. 20520 x:5.1968040.207760 32.0220011 93.209000 1o.174320 121 .6980108.088000 36.082400 193.222400 33.748000 ;c,5.0,100C113.210400 129.933o00 411.237o1]0 38.700720 008.40000208.792000 16o.272800 440.801000 2.10599:: 851.70000274.172000 206.876800 631.889600 27.193'50 121o.80000449.335200 357.85o000 396.320000 142.42,8000 3650.40000522.411200 4 16.052000 607.6 4 9 6'1 1] .032768 60 4.00000

5cc1 .91 ,980 1 0 447. 499200 61 5.,t,8 0 60 C', .1 1 0 206 =51 7 . c,01100595.59( 600 474. 32480 0 520 . 44480 0 . 1 1 0-188 1 1 C; 1 13 00 ii 0

X 0.745600 457.195200 717.39:3600 2_.145360 36504.0ID111-C16. 3.976000 453.948000 733.2008001 30.' 14320 It. 0840.O;ii1j1]1j_•7^.87 .^ i100 454.3752 111! 732.42081101 38.0015c.40 S517b.0U00i1

.1:04

11

1

N ^L r--4^ uF

L

0 G

b uGFb

-4 ctiO 7t-+ oLG uO oU 'L

b bL O

E bN a)

uO y14 u C

'44 OO ^

lu LO N ^

L NO L.

r I C1 •-a

'D

t!l

N

htl.4ELI

Qr'

S, ;y.

m^LA-1 14

.-1

m

N

•D

.JI tiw__ L)

1) m L• ) m !n rD 4) (4) 4)[O m t` t- kD 10 Y) M ) Y

( s7T9 80-1)

Sllg g i g t1 paj7lwsue3,L

I

^J

sn 4) 9 4) O 4) 4) is0) T to t,- C- 'D 4) Y)

( 5 1 18 20.1)

'5 119 io17uoD pa>>lwsuejL

NL.4C13

on0

-d

0

cuLiyw'LO

.4

OL.4m

?i toO

ImOJ

N

T1O4v

^uO

47

4)Y

105

^w

,- . -.- . r

N

N ^+^ G•A :1m la

H

Lm -A^ G

'tl iJcH

- roC)uoL^.. L.1a OV ku

a) ^u

E bN 71

c u^ mt, w G

^u uO V) fy

G -4L ti 7

O L+ E—a v • -aw > cn

n

111

!UuO00.4

W

InCD k CJ 6) (D 4) CO Y)a) r- r` kD T " h Y

( s7T9 ?0-1)

s 7j9 eiea pd77[wsusll

106

1

5N

h^

W

If

r^

T W)O

►-7

OO

^ buv

D WWO

W9 0 (M Y)T CO CO ti r` kD to h Y) Y

( s II q 20-1)

s^19 jos1u0-j ;)aaalwsURjL

L.4

m

Mav

arj

bOuyW'L

qVPW

4k)

the cross trunk transmissions occur from trunk 1 to

trunk 2. This is envisioned as the worst case

condition for cross trunk traffic since the

destination trunk is the busiest trunk.

Looking at the curves from figures 5.5, 5.6

and 5." it may be obBerved that for trunk 1 the

operational parameters under increasing offered

load are very similar to that for the single trunk

secenario, the exception being the lowered trunk

utilization before saturation is encountered.

Aga iii the maximum offerea load operationg point is

seen to occur for about 3.5 offered load and hence

as before the trunk 1 aggregate offered load should

be held to 8 Mbps or less.

The situation is not as good for trunk 2. The

cras s_ trunk traffic ham p ers the normal traffic flow

for trunk 2 and it is apparent from the simulation

curves that the maximum aggregate offered data load

should be held to less than 8 or 2.5 Mbps. This is

considerably less than that for the singie trunk

simulation and clearly demonstrates the effect of

heavy cross trunk communication requirements.

Froin figure 3.4 the aggregate offered data

load of the two trunks may be calculated. This

107

1

1'

was judged to represent a t ypical operating load

for the dual trunk HOSC system.

DEVICE DATA ARRIVAL RATE

111 10 Kbytes/sec = 80 kbps

TRUNK 1 TOTAL OFFERED LOAD = 80 kbps

211 15 kbytesisec = 120 kbps

311 4 Kbytes/sec 32 kbps

321 6.4 kbytes/sec = 51.2 kbps

411 1 Kbytes/sec = 8 kbps

421 1 Kbytes/sec = 8 kbpsIN

431 1 kbytes,"sec = 8 kbps

511 0

52: 0

531 0

TRUNK 2 TOTAL OFFERED 'OAD = 224.2 kbps.

The aggregate offered data load for trunk 1 is

80 kbps (6.505 log bits) and for trunk 2 is 224.2

kbps (6.952 log bits). These offered aggregate

data rates are less than the desired maximum by a

cons der abl a amount and room for gr-?wth ex i sts.

There is an allowable factor of 100 for trunk 1 and

an allowable factor of 10 for trunk 2 growth rates.

Keeping in mind that this aggregate data load for

108 t

EN I14 ASSIGNING

THEY ARE MOST

r

1

4^

trunk 2 is the same as for the single trunk

simulation configuration of figure 5.1 it is

easily ;discerned that the cross trunk traffic whileI

amounting to a 35% increase in trunk 2 traffic

lowers the maximum operating offered load

potential o7 trunk 2 by a factor of almost 4 (down

from 8 Mbps to 2.5 Mbps). Furthermore the curve of

figure 5.5 illustrates that the utilization of

trunk 1 saturates at 55% as opposed to the 75%

point for the single trunk case.

FOP, DUAL CONFIGURATIONS IT SHOULD BE NOTED

THAT THE MAXIMUM AGGREGATE OPERATING LOAD

POTENTIAL OF THE TRUNKS IS LOWERED BY A

CONSIDERABLE AMOUNT. THIS ARISES FROM THE

NECESSITY OF DUAL RESERVATION OF BOTH TRUNK

ADAPTERS. THE CROSS TRUNK TRAFFIC LOWERS

THE MAXIMUM OPERATING UTILIZATION POTENTIAL

70 APPROXIMATELY 75% OF THAT FOR THE SINGLE

TRUNK.

5.3 Analysis and Conclusions

The goal of this work was to develop a =.of tware

tool, with partic=ular emphasis on NSC`s HYPERchannel

network, to aid the engineers and scientists at the

HOSC, to perform s ystem analysis. This study began with

a description of the HYPERchannel and the various

protocols implemented by the network. The relationship

of these protocols to s ystem performance was discussed.

The s ystem components which make up the HOSC were

exam i ned, these components are examined for information

ipurposes, in that the attributes of these devices were

used to define the test configurations presented in

section 5.2. The configurations chosen for testing by

the simulation, are oased on the system shown in Figure

3.1. The results of this testing a. • e presented inr

section 5.2 of this work.

The data, which appear in Section 5.2, are plottedm^

in all cases versus the Log (base 10) of offered load,

where offered 1 -Dad i s ex. pres=_.ed i n b ts. So that x

offered load of 7 on any plot i s the i nk. , erse Log ( base

10 ) of 7 a)h i c i q u a I to 1 x 107 b i t=_ . I n F i Qure i

(5.2 and 5.5) utilization is plotted versus offered

load. Utilization is a dimen- onless figure ranging

from U to 1. In Figures (5.3, 5.6, and 5.7) the Lc.,g

(.base 10) of transmitted control and data bits are

plotted versus offered load. As before a value of 7 on

110

11

the offered load axis represents 1 x 10 7 bit=_, Whether

this is data or control bits, is indicated on the axis

of its respective plot. Finally, the simulation time

used, 40 seconds, was the same for all simulation runs.

The results obtained from the =_.in91e trunk

configuration of the model are found in Figures 5.2 and

5.3. The results as plotted in Figure 5.2 and tabulated

in Table 5.3, compare fa-.orably with results obtained

by other researchers [FRAN82], [FRAN64], and [WATS801.

While nu:nerical results differ due to different

topologies bung modeled, overall performance of the

network is essentially the same. The overall

pe^formance of th i s netwoi, k, and that reported

elsewhere, appear: to approach some relatively constant

I eve 1 (saturation) as offered load increa_es. A

slightly different presentation of these results are

plotted in Figure 5.3 and tabulated in Table 5.5. This -.

data. is presented as transmitted control and data. bits

versus offered load. These plots re-present the actual

amount of data and control bi is being transmuted oy

the network versus offered load. Control bits are these

bits trxn =_mitted by an adapter to perform )etwork

functions and are consilered overhead loadin g . Data

bits transmitted, are those bits offered to the network

b y attached dev i ces for• transfer over the n twork .

Offered load represents the total amount of data

111 1

U. I

u

presented to the nets.,jork for transmission over the

network. Thus, as offered load increases, the amount of

data bits transmitted should increase. Since network

services are requested, network functions increase,

thereby increasing the amount :)f network messages

relating to these functions. This will c;u=e a

corresponding increase in the amount of control bits

being transmitted over the networK. The plots in Figure

5.3, both exhibit nearly linear properties until a

certain point coffered load approximately equal to '>>

is reached, after which the data and control bits

transmitted remain nearly constant.

An offered load of 9 on these plots, represents an

aggregate offered load of 3.:25 Mb y tas/sec beinU

presented to the neti:jork for transmission. This is

equ i val en t to an off ne twork source reo 1_est i ng ne tvjorL,

services every 0.04 usec. According to puhiished

1.0

f i gures C FRAH823 , ( FRAM84] , and [ I.!ATS82] , an adap ter

requesting *he trunk, transmitting its data, and then

releasing itself and its receiving adapter will re.1uire

A minimum of 840 usec to send one message-with-data

sequence containing one 2 Kby te data block. If the off

network sources' data rates are such that net•A)orh.

services are requested faster than the network can

process these requests, then data loss will occur. At

this point the network is en ter irng saturation. Thi=s. is

112 1

cJ

reflected in the plots of data bits transmitted versus

offered load. After uf+ered lead exceeds the point

where offered load is approximately S', any further

increase in the offered load does not produce a

corr-sponding increase in the amount of data and

control bits transmitted. This indicates that the

network is saturated and can not transmit an ,/ greater

amount o+ data or control bits.

The normal offered load to the network, based on

observations of the s y stem described in Chapter 3, and

de ta. i 1 ed in Appendix I'), appear s_ to be approximately

6.95 (Offered Load). This figure results from summation

o+ the data rates applied to the network, multiplied by

simulation time, and then performing a Log -"ba.Le 10''

operat or on the resu l t . Thus t I =_ rye ti.,ork i s,

according to simulation results, operating below its

potential b y a factor of approximately 100. This_

indicates that e>, pansion o+ this configuration would be

pos_.ibl? t o some extent.

In order to exam i ne the effects f a second trunk

added to a network , the con+ i gur.at i D pi shown in F i cur e

5.4, and detailed in Appendix V, 1.Nas modeled, This

configuration is simiIar to the single trunk

con+iguration in that the topology o+ trunk 2 (Figure

5.4) 1 s the same as that shown in Figure 5.1. In order

to ob=.er-)e the e++ec is on trunk 2) due to another trunk

113

-4i

7 '.ems+ = y

having access to it, the probability of a transmi=_sion

to trunk 2 from trunk 1 ,ras set higher than the

probability o+ the re-)erne operation. It should be

apparent, that a dual trunk network in which each trunk

hRs need of onl y sporadic use of the other, would have

noticeably better performance than the con+ guration

presented in this work. The results of modelino this

configuration are plotted in Figures 5.5 through 5.7,

and are tabulated in Tables 5.' through 5.-;.

Examination of these re su 1 t.s shows that trunk 1 i s

reIati 1e Iy unaffected, althou gh utilization is lower.

Utilization in this case is approximately constant at a

val ue of 0 .55 for i ncreas i ng off=_ red l oad. Th i s f i Qure

is approximatel y 25% less than the comparable value for

a =_ i nol e trunk ne ti..)ork , th ; s i s due 1 arise 1 y to the

topology of the network . On trunk 1 there are t"..)o

adapters, which communicate exclusively with each

other. There i s a 1 arger number of adapters c,n trunK 2;

which affec t = the common adapter to both trunk., in

that, multi-trunk operation is =lower. This slownes s of

the multi -trunk operation ma y be attributed to the

common adapter hav i rig to compete for a bus i er trunk to

complete its' tran=_mission. 7 h ,js, the common adapter

will be reserved for longer periods of time, directly

a+fec ` Ina throughput, and conse q uentl y utilization, on

both trunk =_. Performance on trunk 1 of th i s topology,

114

t

1^ r

. _ 1

R

c^

with the exception of lower utilization, is rougrily the

same a ,a that of a single trunk network, as expected.

However, the results fo r, trunk 2 are drastically

reduced from that of a single trunk configuration. An

Examination of Figures 5.2 and 5.5. show that

ut i 1 ization of the trunk. is ve r y nearly the aa,me for an

offered load of approximately 5 to a load of eery

near 1 y S. Af ter an offered 1 oad of 8 i s reached, the

dual trunk con+ i gurat i on' s u t i l i zat ion i s dr as i c a i l y

reduced. In Figure 5.6, the con ,:rol and data. bits

trar.smi tted ovar trunk I are plotted. These curvss

exhibit behavior similar to that of the single trunk

model discussed pre , )iousl y . This is not the c.?.se for

the control and data bits transmitted over trunk 2

(Figure 5.7). Both of these plots exhibit linear

beha-) i or to a certain extent, but while the control

bits transmitted are anti slightli affe,_t-d, the

transmitted data is drasticalI x altered at the same

point that utilization breaks doi.in . Based an the

description of this retwork contained ir, append V.

the normal o+fered load is approximatel y 7.08. ms shown

in the plotted da t a, t his- topology ha.s ver:: limited

r?nice in regard to offered load, which makes it

vu i nerabl e to perforrr,_.,.._a degr 3dat i on due to 1 oad

variation.

1

115

t

i'l,

Thus, : single trunk s ystem exhibits greater

potential for expansion than the dual trunk topology

modeled. Rather than allow a dual trunk system of this

nature, it would be better (Performance related) to

place the additional device seeking communication 1.Aiith 1i

another trunk , at a h i gh rate , ph;/si cal 1 y on the trunk

it re q uests the most.

The val i di t of t i s simul at i on i s based c,n the

understandino of the s y stem and the structure of the

model . Whi l e it 1Ajould be better to ?stabl ish g al idi t;•

by comparison with actual configurations and their

measured performance, the feasibility of establishing a

test bed for this purpose is remote, due largel y to the

intensive mission requ rements at the HOSC.

Finally, the author be i eoes that the stated

resew,- ch Qoa 1 -7 have been reache(3. Howe ,.)er, in thi

model, as in all things there is considerable room for

impro-.)ement. Future expansion of the model might be

made, to includ? intra-adapter mes_age trnsfers, and

more than one adapter to more than one trunk. This.

i-jould ser-)e to lend more accurac y and sophistication to

`he present model. The current model appears to p,:)s=e=_.=_

reasonable accuracy and vAl i di ty, wi th the stated

conditions under which it was developed.

116

I ,

04 J

APPENDIX I

Sott^,^are Source Listing

ri

117

1I

1

6 "

,1

.

118

U., I

OF POOR QUALA Y

OO

O

m

^a<

NN

O

.............. ..............................:

2 r 1,! N 1- S N H• J O 0 2 < U 2 • n

J 2 J 7< O 2• L Y< J O N 7 N¢ W O W

Z H 7 f f r W Z N .•• 7 N 2 N v N Y ^l• V¢ r T J N v) d N r J N r ti L J r r.• < r

¢ Or

W 7 J O Y t r¢ I u W L J V m r i t 7• u v 2 V O O V N Z •- < L K O¢ N T J • O

0 a• Y 7r 2 7 Z N 7 p w O r .+ Y O

¢< v O¢ J V V 2 < y. L H O r J t r¢ 22 N O w /1 w{ N J Z S N Q O W f < O x 7 00

N N• 2 J V' N>> J W O U T Z W O • nZ O Z J V V 2 0 H 4 O< N r Q 2 R J ^• V W r 7 2 < 2

• O•+ <<<r 2T y W mar <J 2L f S OJ u •- 2 7 0 N r 7 w L< N S w J J

• r<< a W O ^u N V •-• 2 u r> .n L u Z¢ r V Z 2 •2 J J W ^ ¢ ••• O a r r 7 r

.^

O n < O .. W Z W Z W J N V S T t N d •- a y. O 7• v 0

rZ' y r 1"1 ¢ r<< N{ r p N Y •D N W N N Z O • O Na W J •-• ^ 7 7 2 2 N 2¢ •^• a u ti x •

• O W <¢ C 7 r r 2 v V 2 V O O •[ L ^• W W J • J • 2V J ^ L r < r 2 0 0 a •-• ^ a • H N N u m

A` a r a O N O r O N Y N W< 2 r •<

• J • O>•• Z u' p 2 W W H 2 r N O W N 7 ti ¢ •-• S < N

• L>r

S V N r r 7 N N< 2 7 N N ¢ r r O r N L N•'• Z¢ 2 7 r O n .-. O 7 Z w 7< R¢ O A

• N 2 W n. y. < O Z •-• L Z r Z ^ r • 0 0 1N 2 O I 2 O r o Z W N

• t 7 Z . 2 r r< V L V S .^ Z N •-• Z <<¢ V • LN 2 O G K ^ 7 r¢ C Z Z r .+ Z 2 J w T.

• •-• Z .Y r 2 y N N S t W O Z N W O W r 4 •••• •y

JY W r O r 7 •-• J< S Z v O r r 0 O v

• ¢ ZO< U¢ J¢ T r 0 .•• V r J< N 2 J V •a w •-. W ti 2 V 7 2 r N 6 W m r J r •<

• ^ .'J N{ J rJ y. N 7 r> N N V J O V L N J'^ < O • J J¢ n V O< y. J¢ O< Z O ^ W T O J S O I J< W a w

• W O2 >

¢¢ r¢ Z O¢ L >` U N U u RO W< O a C u 7 << ^ ••• a> N U G V N S> O O• J

uU 4 < u •^ •+ << W t< W< C

W W 2 N Or

•+ < WON > R > O^ • 1 T N• O O

p7 W O V O V Y 2 r N Q ^u < •L r v p 2 .2 N < J¢ r wt 2 2¢ —u 0 Z 7

• O. J= W

r• 'D r N 2 O¢ Q< W v 2 r O 0 r V w r J • n

Y < J N .+ Y Z O N ^< O r 7>< m< 6• O< <

wN V r N N V r¢ v U S Z i.. S• 7

O H Y W W <¢ 7 O O N W 2 YI N< W 2 W G W p N 2 O• L ¢ N N L J V S 7M1 J¢ W Z O V 0 00 J Z W O W> 7

< O I W J< Z 2 m r< Z Z N• W Y r L

rY O J{ Y N V W r W L J u 1• ^ <

a n t nN

V 22 r • Z N .. 0 7 7• < p W y N O 2 Y 0¢ W N V N V .•^• V< N; y, r i 2 N• 4

7 1 u J "• 7♦ Z 2 3 r n V Z r 2 r f. 2 w > r, > Or 0< J r ¢ 2 r O r 0 1< Y ••• 2 < W< W

2 • O• N?

W 2 2¢ W W S r 4 7 yJ 2 2 Z S u r< J v• y 0 2 2 N

r -1< Z t u r 2 r r Z N< r O u V¢ O< W<

J N O Z N m a O V O W S< W L > a f ti W 7 0 7• 2 2 W< N n.r ^¢ O a u W V J • L

r< r< N D H r I w. G Y W< O •- n N ♦ f< O <• r 7 J L L m < Y< S O u 7 N W n G 2 O V Y O L ^/. r) Z> •

0N

< < S S O --- N •-. f O N f 2< 2 2^< L W< W•• • • • . • • •

•• • • • • • • • • • • • • • •

• . • • • • • • • • • • • . • • • . . • • • . • • • • . • • • • . • . • • • • • . • . • OV ¢

a^ V ^

^ N M• J N p A fl O O r •^ J N O A O V O N /1 J VI O A O P O ^ ••+ J N O A O p 0 ^ ^` J ^^ O A T I+ 17 ^.+ r r r r .+ r r — ^ N N N N N N N •V N N •". r•1 n • •1 /• r1 In r/1 h h J J J! J J J J J J .i ./^ N

7

¢J

L0

J

G

W^

WP-It)

- `V

OF F'liul? 4i rr•rtr^

• VYQO

Z n.T

ZY Z

< .-• 2

p f

< x

• Q Z

n ^

O x ¢d Y ¢• L

Q Z

^ 7xf

O ••1 O

W O •+• O N ♦

n • V Nn

N ^ O nN Z a

u H L w Y

Q n O ZMDI.

O p O ¢

N f < < x31 T u Q n L7 7 ! Y n JZ Z d Z O Zx 0 7 W ¢

N<< Q Q Z u2 T_ L n r O •+ iO

z r ^^O O N NQ Y H

W J <• w 3

< W OZ mO < n I- J

N ¢ J • .•. J nN F > J > < O

•A J< J l V VW N n J H J

L 7 S ^ Z L NN O < >. f Z ^ r.2 W Q J O » NQ <O^ti ZZ ^-^- F W ^»d Q u. ula

. v d d n^ a N .N..-. m Nx L 7 w r J W<W W O U .-• J¢ W W OZ W N Q < O u

3 ^ 3 .-• QJ F- W O •-. > > W

W ^ N .. > Y mT< V> ^Y O O T

Z uF• • O J7 >> O W T.

T QZ L T» J u. O O • ^ V

< O u <

• Q v ¢ W J •^`^ J w W V H f J J ••

t .! V .^ W u K< J ••J W Q W W< L Z< ¢ 1- ^- f Z r Q ¢ W < <

2 Z L •+ •• ¢ w Y

J •Y OU> H T T T W O O

ti f 1-- u u H H H H <

x O .-• J W V N» J T.x W< U N T 7< O W ^ N2 H N 3 V¢ t W 3 U V T 1

W2 • p Q YW W O SI V H u. 73 2 f W Q ¢

ZJ m n O

S > J HO O .-• Z W< r

W 7 V ¢f- >- U Q N Q Y< t W u l f W Z OZ 2 R< O N f 7

N W d ¢ ..r ^H^Z N ]..< I-

•2 » Y. W ! J

O x p X 3 ^D Z R S <•¢ ^ 1 V 1 7 df m O Z f Y F O W U N¢ Y pS L w f 2 0— Z<Z» 7 0¢ W f W Z W Q p

^ i T pN u O>- ►O Iu • I I •A L L t 2 w

W Y Z 7 0 W<< N O WZ<ZQ I Q>- 7 z u

J> ^ 7 Q V^ F N N •^•N W •^ Z Q ti ^• p R ^+ • Ll v W~ • v pa V v u

u ^Y v J• 2 Q J J W

v

¢ W W V W Ju u¢ s •• <• Q V ••< W

p ^- H 2 .. Q¢ O L L •-. W» ao »

Y • L < WQ < x ¢ ¢ Q <

n ^ ► W Qp O Z ^- L r ¢

¢ W ¢ •. 7 N O V N NW Y O O Z W O ¢ 7Q. Z •-. p p w r m p p f

W J L »z

W W O^ Q dT- +

•• a 2^ v ••mom

O x Oo_

w o o w z ^J¢ •-• a Z W d

n nK

Qw M•

WO

f N2 .+.-• J aO 7O O

NnYH

N •O I- C) O o ^ N r J- O I^ < P n; NMI J N O A• P 0; ; -, JrOA ICO O ► , M J N •O A •D O O N ^^ .! V• •O 1^ QN N N r1 N ^-I d O O O d d O •O d d A 1^ I^ I^ I^ A I^ I^ n f^ t0 Cl m m C) m m m m P P P P 0 P P O P P O O G 0 0 0 0 0 !7

1191

I•1

S

W• ^ 7Y W ¢ ¢ ^z S W o W7 V m W L

Y¢ N Z W2 r 7 W S7 2 2 7 V¢ ¢ .Oi A Nr n r .+

z z2 ^ < 7 J OO p > Jn ¢

W .+ J ¢ ^q <Z ¢ N W A >

1^a¢ao^Y

< Nx Y z O L Wr < H < p QJ ¢ ^

O W "] L WW

p W O ¢•A U

J 7 p W rO < W u dr r > N Z <or JfO Q2 W• O

J J J< l < V¢ ¢ ¢

J 2

Y Y Y 6 ..J J J •• rW W W U0 o c. »O X ^. J r•. o a

N ¢Y2 r^ N N OQ N Y Y <r Y 2 L p

L 7 ^ <Q 7 Q ^O ¢ > Zu O

~ ¢ ¢ ZY ¢ f• O TK O Y. r OJ WWo > a i >

< JJiT^ J W W^nnon•. o

O JO < 7.+ o Xa2 vM wu. r.^

v v v v W.1

J J J J wW W W ^U .

SiV K Q m ¢

Z '.-. Y Y > Y

< < < <•• J J J J u

W W W U OY 0 0 n J¢ N N N t

.-• O X r ZaaW^. r•.

.rig..OF Fo6li (1 ;j - f '^

xrJ<

T r••• W 1

N r )• O x r r

r Jx <

u L J r 2• 7 <J Q •-• J ^^. r r <

u 3•. WN 2 O

V .+¢

W LO 7u v v N

WZ O

Nv

7J J J •J ¢v < < < K W

• 1 W YI W ^U♦ t .^ Q Q Q Q z

• 2 Z Z Z i W< • Q

J J J J J w r X YU U U 0 0 R U t.000 or L Jx _m m m i 0 m 2 .• J ar W

m •. J O rY J r •+ 2 N¢

H J N O b J m< Z •••Z Lli i mr o•+u•L W o

r

0O

. o r2 >O O•-• r O

r, s > ¢O

O^ N T W

W C LO p Q

O ¢ W n7 r

Z V < WN Q rW Q QO W IQ

• < Q YI6 ."• N< W N Z ^Z u U< r 7 2

m <v }W W 7 r N O r JO O U r D VN Q N < O

L O • U N p mJ•••• 76rQ<N • % Y W W

O m > O O• J w < ^ Z <

I..I ^ W J Hr u

u Z ^J J u

< < N < W W >w Q Q QO J W ¢ QW 0. QY n 7 W W <v m o ^< u <

on uQ ^ .^2 0 ¢ ¢ O

O W L 7 W < J..IOQ 7oY. o

•-. O Z N r J N6

OOWWu>0

ra

n ^0z ^

a v zr N a^ N ^< < pp< W r

O `.fU N l^ c

2 WO Vo r

¢ W W r ^V W N 2 2

W O¢ 7. o W

> u mw Z T w ZO ^ 7 Z t

z Qrrp w u

OJ u ` J

J <^ J wu < ¢1U ••

Q r

.. V r JW LL ^ W

o u ^ .-Q > NO wv oc^cnW

O QZ.

O

O

¢

n<<

O O ^ N H J ^^ O 1^ T O O .• H J N O A ff O CI ^ N H J N A 1^ O P O ^ N H J ^/^ •(` I^ O. O Cl r H J h O 1^ m P O rO• rJ NNNNNNNNNHHH H H.+^H 1 J JJ J J J J J J./^ NNh •/• A A 0 0

1210 1

r9

J NJ 2r N J ¢J Y ~O ♦ < Y

n u A \ J n ZH Y w f 7

J O ti\W <

r h•< W N!-• X •- Jf .-. n 7

2J l ^ T N

H J YW ¢' ti2 0 O N

N Jti w O 7N

Z w u Y.+ O W.D p

•-. R ^•• N Z d fJ¢ H

Y J << w Jw d a o r^ < ¢ i < J Wd O< <

\ J < Ou ♦ ti

p O H O w O WO N m t 0

N Yo.-. v nW V ^a^oiz

N Z ti w 2 H .•.u¢¢ 7

¢V O Y p

V ¢W W ♦m^ r x^

\ ♦^ Y z o ^

! d T. ^ J Z\< 7 u a7 f 7 0 J •-• ^ J O W^2 O Z 'u < ••u L < X N 7^.-..+Y7 !< Z ^¢ u X

!r X • N ti d J Yu< . \ a ♦ 7 V ZV T¢

• W y F• YY O w¢ 7

> < N n:. V Y¢ J V Y f

2 ^ w< O J N^Z < < H •+ < X V <

N< < O N r¢ N• Y W f

^¢♦ ^ ^ •- 41

N Z A N d •-• ! WQ 2 ^^ ^ +u I- rrp ¢¢ W J H D O .-. W 2 V< w H J J< << ^ i, W<

r. Y D L O ¢ wO d O Z<! J t f s n7 p 7 ¢ +c ^. <u^

>

n ♦ ♦ nt7 •ZOW N •

¢ ZO • L

¢ ¢2 OY ¢V d

W V Z • 2m 7

z x uJ Z J

OY. Z N w 7nO O u Z J O W • O

0 0 0 ^ ^ •¢z.O d u O

¢ u,

z d • r ^O ^ •• O ¢ W • W

^ W H V u O 7 ..Y N iJ ¢ . • R

p ` Yl V W > •^ •- ¢f O D a¢ •• 7

• J • du N V •+ • • p

N ¢ Y H d V 2 W \R O !- Y O C L Z 2

w < • O ¢ O W ¢W Y ti ro¢ V • Y •• J Q •• OV u 0 7! 4 Y ¢¢ Y V 7^d v x ••ou mZ u J W 2 J¢ •• d•~ V d O .-. \ J V

w O n J 7 0 p H 2\ Za .n .-• d Z L Y .+ u J

7 2¢ O r u V T. d J^ u u u u u

T ZO O

< <

O O

^ rQ ¢•O+ O

¢d d

O O<

7 7J J Jf ^ < ^ O

V Y W Y O7 •- 7

2 ¢ Z ¢ J

JY

2^ Q W

JZ •... r. V

J >

o n o

O ¢Z <W Z <

WO Z

JY

2N d Oti H Yx W

Oti O

! u

• r••e

J

z

7O

Vd

J•/• O A a ^ O O ^• J n J Y•• O h • O P O r• N n J N O A .O P O ^ N• . J! n• f i A m O O n N n J N • O I^ O P O•• n J v` O I^ m0 0 0 O O O f- A A 1^ • . A n A A A O a 1 •D ' Y l. n O. O m^ a O P P P P PPP P P P O O O O O O O U O G ^ ^• ^ r• ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^^ •- ^ ^ ^ ^ ^ ^ •- r .-• •- r r ^ ^ ^ ^ ^ ^ ^ ^ N N N N N N N N N N N N n f • . N N N N N

121

• 1

['I'

m .

OF

o2 J< J

{N_ ~1O 2

O< N f

1J N

J J •-u .p> W OJ > Ot H

J N ~1< wY

OI 1O< W W Oa W 1 .-. ^ O< i 2 O O> < 7 . 7 O N

' Q ^ p O2{ u 7 G V 2J p .n 0 W p .-•R O ¢ I- I"I W u W

2 O r J • n O u NLL 7 ! Q lot ♦

1W O ¢ u J

T- 1I Z¢

G> W .O W O •C•V 7. < •- < N O w 0 "O 000

O Q O ^- 2 •J< !- O O N ^ C I N

V Npr 7 •OOONN ••WW WWWWW •OANMM••2^ O O W L¢ • H { p • Z ."• O . .. N^ N N N N N N N! O2< Q S J ul t < W X N N N • J J J J J J J O N O >.+ J O m r Z

J <O O O N< I--I Q N .. .• .. YI W •• N n<<< t t< • 11

V 7 •• < ti• w O 0 0 A J L Q L L W K Y W W Y• W W W W 1-• •• I T H JRI .+ Y R I •-. V¢ W 7 J W O f p V u u < •+ V N N N N N N II ul ^- T ON N >< ♦ Y V 7 X O N

T O < J •- 2 J .-• •- p < V h J 7 H J ¢ `•• < •• .. •• .. .• .• . N f !. Y Y ¢ ¢H

< 0 2 U •-. J W •+ J 2 J J • Y w N 0 J N O H N! p O~ J[I • U W O 7 < O¢ H •. ^ O< I•+ W< O N< O w ^ N •n J N O m J 0 w Q m 7 R^ w¢ 7 i2; S7! .+ i I W < V N l u Q u V 2 N L i i i L L t m .+ O r H T<¢ T

O J A V— O 2 O— 1 J •• Z ti /OQ r >< O 7 f < H r

Z u J •p• ¢ N O •• V Ye•^is .+ u WY _..{ r < 7O ♦ 7 J QZ ^ 1.71-1

♦ ¢u -.Liz a -wIDO> 31

J + O l wm ¢ pu u u u u u u u u O

r t

J N N N N N N N N N N N n; N N N N N N N I I N N N N N N N N N N N N N N N ----------- N N n i N N N N n IO C r N H J r O A •> P O^ ^l M J Y\ h A SI P O .- r J vl O A L P O '• ^• J N r A r O ^ r N h J^ O A SIP O ^NNN J N N N N r 1/ 1 r l/ 1 h M 3. • n F I/ 1 J J J J J J J J ) N N N V 1 V 1 O O O t 1 0 0 0 0 0 0 A A A. A

T T

122

I

O 00 0 0 W O< W 7 0 n 2 . 0 0 N N O O O Ou. C; 0 0 0 0 0 J-. Nn r N p -J(3 0 0N N N — U N• .< O .. .. •. N 11 N N T N M N 11 M N O

! O W •• •• T> .• L O . NO • N» R • ♦ y M N w L Y N N U O IJ O ••W S J O Y• J J 0 0 0 .-• •• •• Y> J J>» y O> J .1 T J r r r r

V J J J cD W ^- <u w<•^ ) J J J rr J •+•-. C; 8 C; 8V< N< 11 I N l O J O O J r r ^. > J<< f r t m m m T.

r r !- J •• • r Y •-. W J O W V ¢ < r r J < r ^ N N 11 II . 01¢ Z i 11 T J f W N Z r N O f W O •L f W r ^ N < N N ^- f r < •• •• •• •• JO .-. 7 .. ^ J r r r L r J K of r K O ^ N ^( N O A Il .-- Y Y Z r Z r•^ Q Z < O O u .+ ¢<<¢ O .-. Z Q¢ Q W w O Q Q O< O< .- N H J u4 0 7^ V> J 2 r m r L L 1 I- W W r r > Q N N N T r r V O V O r r r '• O

0z •.

za JC U

w Z

> •• Z'. r

Y •`Z A >7 v .ar n n

z ao N ..W 4

Z ¢ Nf W

r r vw L ¢ WQ ^ O W NO 7 `

r uW r

W p •. •.2 N nr W N NQ Y

Z z2

Y• w G u 7 77 C ^ Q Qan. ^ ¢ uW Z Z Qr J J r ^ .J

W W < WQ r r WW Q Q WQ ^ J Q

J M p A T O U ^ NHJ N S A T P O ^ N H J N d A C C O ^ N H J In ^ A II O O ^ N H J VI O I. T. O CI _• N H J 1n Yl A OiA A AAA A Q1 W TQI QI aD np 1p Tale P P P O P P OP P 0000000000 ^ ^NNNNNNN I`INN N N I J N N N N N I' I N N N N N N N N N N N N N N N N^• H M• H H H H H M H H H M M^ H H M H M H H H M H H N ^ M M H

0z0u

OZO

2Oti

O1O

o ^o z

aO

vO

Or

N pO O O•

123 N^ 1I

O U7 2¢O

W

Qp

►Z

Y2O.-. O

• Z Z< J < J

r ¢ r1 Z a V 2 +7 t w 7 a WV W Z W 2O S J

Z . O Z ..O+ r n < O.

Ln . l

y QQ

W.

y-¢

.+ VI S A N .J •+ Z A N

. Z 7 V ... 2 7 v •+ 2< O . Z .Y ¢ ..

Z Q r n .-. W S r n ;7 r f S

rQ .•-. W

¢W

u ^ .-. NJ 6 N r w

IL AO V ..

J v Cf 1 /n

r •-.¢ Z V N 7 N WO Z Z w¢ f W O W% ¢ O

V^.! ^

n ¢• W U^ J¢ ^- T. r 4 N

IJ¢

r LT r

N m r h. 7 f W •". 7 r Df •^. J 7 7 7 . n i 7. •• ••

7 Z Q > •. w r J LL r YS Z r W .Z

!, NN

LO N h O

^ r W >h• 2 b •-• J .- O Tp r W O < u U 2 7 v r 7 L J

Z JA."I ! J p wprl2 v < .- Z^- W Z w¢ I 2 S.n ^ 7r7 7 Q •-•7r W nO Q r W C •-.a •• z a d .^ ^ .+ o u o ^ a u z o-L L^

Qv r v vt W S Q 2!aW m..^w O um r.a- i J

2N v N 2f oW

•-. ^7 .+ 7 Y. u. N<¢ W N w H W 7< b l9 O

^ ^ ! W L r f w N l W •-• W I2 T .-• Z .• V O Z J T J J¢ N N r m WOO <r

^J WZ

d N ..2^

.•T r •-•

. f . . J W ^ ^ O O Y u. Y/Z L Z 7 N u/ C

y 2 r wu U

v Q d 7O 2! 7 T

r o.h+

^Z z v z Z z v 2 z .. 2 Z 2 •3 7 2 2 Z.Q Z N ^- b •-. a Q .7J J T J J J 2 J J T J J J Z J J 7 V Q J r W 7 7 ^- i'I ^er

Y J w . J W^^or

Y J Wnor

W J N wtir

W^^m

W t¢ 0 d •+ W i0ror o ••r •-•z WZ rm wW Q

] Jt Q lb Q W Q] l ¢ J

R Y/ ¢l ¢ ]

7 Ql J

=¢ .-. J

Q] .-.

Q W V. JJI R u w Zp •.

O WJW

W 2 .••

P O .' N r. J Y• O A RI O O N M J r` O h- RIP U N H -! h O ^. s• P CI N h- J r O h- RIO G' • N r J N d s• P O h-N H M M H H M H :n H H J J J J J -) J J J J v, H ./^ H N N v N r ./^ p 0 0 f1 0 0 0 •O O O A A A h. A A 1 • - A A h. m Rf m RlH HH M HHY•MHHH HHH HHM HMMhIHMM HHHh^M Mh•H •IM!^ hIMMHM ••IMHMHMH MHHHHMHM

124^I

nnnnnn n.-.

o

W u

uW

W HL a H z

W p • WY O

n •O •

•¢ u

JW r• t W p f

• O N > O < GO tn Y I W < ►

O a f r < C 7J O ¢ Z .-• R 7 2h• • V .• ¢ N W •^ Z' 1.W ^•2 w

O 7¢ •• W Ju J f• <W<< C

N Z n r a m D W I . •< 1. R

6 m uO > <

< f¢n

WY N

J^

r < ¢ma n tr a

< C C J m i¢<20 > J O u•fu 6 Z< J Y ^• ••

R-

^ L F-I R a .O ♦ W O 4¢•^ H N N u u

O u >pR uuuu — uuuu

WJY2

• 7af

J

OW ♦ N

Z^ • J J7 • mp • <

• i 1

• O N< • p

J '].^ O 6

J• O ^ J Y N •• OJ • J O Z Y n •. O

7 C <Y•7 •

U.. p

t 7^ a

G< G

R J R O W O T<W W• W W U ! O ! T IJ•

Wa N 7 C J O LZ 7 z u 0W O Z7 W O W W O

H W• G W J J •' J J r•1 tr

JO W O O^ 0 0^

W l• tr 0^ ^ MS L„¢ a • Y n v

7 f• L ..J J Ju

W •••• w Va • ^ p a r F^

m7 • z 0 J •-• R •+ aG e 0 a a nW • ¢ •-. •^ v¢ J W J l .•O > .o¢ ^ up

11

Ji

~ R wJ ^ 2

J

>Ur". W

W n ^ 7< R pW < 7.

L r r2 a

.Z..•+ 7 O r

o n G n! N • O OW C C

7 v ^ J 7

JL < v WW p .-•.+ a7

n

J

Z

YIa7

O Oz 7W 6 v(1O 7 4z o nW ^un O •

J N O A tl O C'• ^ N /. J 1/. A h ll 0 0^ N h J N A I^ O O O ^ N M J .n O A r 0 0^ N h J v. A I^ ff 0 0^ N r J V. O A O^ O n0 aJ sl m 0 0 0 0 0 P? P O 00000000000 ^ ^N NNN N N N M1Mrnrnh.n .nM• r h •n In h h h .n M M h M h I • M J J J J J J •/ J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J

125

1

00

Oo Y ••+

r•Ifp N

Ya

•• O

7 p O nZ

eo

-..•7

o o^ < N

z ..O wt• u W W Oti •>( N J J J O •"•

.. W N Y u O T..+

a ^f LL Jr O W W

oJ N

o < W CZ) > p z z•-. p p p W 7a u z •^ •^ J W J J > W

< n 7 `• 7 .. 2 •^ ti 0Z

Z Z< O

••• ••• 1• O

J J Jn' W

Q •r N WO •^ p

O •-• 17 m p^ ^ ►• ^- II

O • <n G

,O J J f II r 0 O W Z •+ f 2 7 •^• J J J J J w K u V >> u p u Y d YIQ w W u r Q Z > G W Z u 2 H f) r J n Or O p T p d v. J O Z Q W p •r W m Q •. O

N •-• O,I •+ 7 O J J F F v p A r 7 r U A ^- , 7•- 2

,Y O O W .• O 2 2 2 2 2 < Z 2< < Z

O O n w n O J J J J ZO• O

J .1 J J J Z l ^ Op Z > J •u p O Z W W z •+ u •^ z 11 < f)

♦<p O p p

n w 1O p 0 2 Z

v A<2

•••-+ ti H ^- ^ ^- H VlA •+

pZ

r 1-p , 2 ~

J J J J Z Hv

J J J Z W n n¢ R R 7 m W Z u J R2 Z Z •+ 6 Z Z W H H fD 7 J l l l W f) ••• •1

Q •^ N J J J +• < J F •+ H H Hu

Y 1 •-•O p p O Y 2 O Z W O V •+ t 1 O 7

ufL Z 2 2 2 7 L •-• V •• 2 V •• m 1 ^ ) - W O OJ J J J n r n n r Z W Z •^

C up Z W u W F V•3.• H H f f

t• OZ

m 1 V 7 •+Yi •+

Wj

y'J •-• v m W Q m ^ uI Oz W a a a a O Zr fD l 1 l l •^ u ^ iu p

r^

ZW

O O; NInJ N OA t O O WN - J n •OA n0 0-`NI• J In OA :)Q O — - II J N OA f O O NM.• N Or toO O NM•n J J J J J J J J J J N N 0 0 O O O O O O O O A ^- A I^ A AAA A A O rn m n a) b o T al •O O O A IfJ J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J

126

V

1I

.01

00

•-• O YO

N W

O ^• V Y R .•. Vo R ^ O rt

3 ^ nN f O .•• • N

< N R ^,U R O O

p 6 -R O N •-^ V u< O u. 7 0 W N Y W O w W ••p .+ M- Z i. ^ H R J V O J J H< < W m r

n .•• ♦ W ^../ T R W l J V. W .••Q Z 2 W W W V J S V. ^- W O n 2L Y> J J J R S O W J< n Z O2 • J J ► ^ O^ LL U 1 A J J v

W O O O N W • V W WO u. 0 0 Y O LL O YI W w W u f H H JH N •[ O W Z Z l Z U J J J J _ N U L •-•

O p W L J w 0 r 2 v O O O O O p V. J W 2 •+r t) R O v >! r R v< r ID

O ♦ Ov `- •-• R n R O W Z SJ SJ J

S S) O N Z W Z♦ W W W ..i h H 2 0 •f 7 l ^ ^- ^ J < 2 •• I J

J J J J p J Z w p W W W WO .- < tO r< Z• f v H O

O F W 0 2 •-. ^- W .+ Z7. 0000 N < 2•+ N < •+ R R R.+R rm R WL r Q r V» 7 7>> > pO H 2 S S l Z •f 2x

VW 2

V p J J J J r f w Y 1- m< r m W O

r G Z r^ f f R W^ R 7 2< r •+ O N) O W

2 M V n S.2 l r LL O• Z W > > y n 2

Z S ti m 3r , O

V Z SN R WY S O m w 07 V r

2R W

W O^ m zW o.. 2

J N a I^ n o O ^- N H J N a I. O O O ^ A. H J N a I• f1 O O ^ N H J N a ^. n P O ^ hI J v. n f- n P O H N H J N a w Op? P (} P O O O CIO O O O O O r ^- N N N N N N N N N N H H H H H H H H H H J J J J J J J J JJ J J J J J 3 N N r V• Y• N N N II r N V r N h Y 3` N r N N N N N V• N N 3• N N V• r N r 3. N N N Y l r` V• N V• v N V• u.

12.7 .I

1

HR7t

R7O

U

Z

C4

O ♦ a J< Y

O 2a v mQ O

7Q

V O a 2 •-2 J w ul

Zm W O H

• I < O U

•. aO ^ Y O

1 a ^o Z 1 O• • O 7 7 2

., m ai r H 2

Y Y •+ ^ Oa 6U O

• a Wu a u.

^ Z.+

y

Z O - •^O 0 • •+ O Q

T TW

aW Q

Y Y S fO L 2 •• < •• v

s^ 7 7z

0 .. ..L r a•• aNG O

Z ^N ^ ^ Q

af.

•^ O Z a•- . • u z o^ x a

a •• •• O CJ

Y WZ J

Oa<

y i.. 7'

Z V► Cr N N Z L J •1 W O I O J: N Y Y a z Otz:

z :a- n Zu N Y 2 z V O '- 7n 2 7 7 7 ► - 70 Z

vYG • 7 Q Q I C Z Z ••

Q > 1- J ^ - 7 J Z 77 2 O - - ti V. ^ T v Z N w J Q OOw ']

OC

72 2 2 L 2 Z

Ov= Oi

v Y2 ••

J 2Z W J 2 Z ^

Y •- OZ Z •-• < .^ C

ti J JJJ J .I r 7 7 •••^ 7 • • J J2 7•+a W• ti IrO T ^ y Z W W W O Z Z ••'• ^9 •-• t 0 W J 7 J •' O D U

4 H ^- f f .•' Z f W t W Z f f O~

S S yn 2 •! ^^ •Z m J Q w ••• < m•+ Q a Q a Q t[ J t 0 'l Q Wu r m } J J J l 7 •••• W J r 7 AZ •Z.•^f ••

au

m

On

n oa o! nyQO F

O

On

•x

O

I-

v

O C^ N ••• J •n .p A .^ 0 0 N •n J N pA •D O O n• n J N O A ff 0 f) N M J V• O A o 0 O N J V^ f^ h a• O O N MJ N N N N N N p 0 Q O O p 0 4 0 0 I^ A ^ A A A A A A A 0 0 of tl n of W m V) ^ A 0 0 0 0 0 0 0 0 0 0 0 0 0r• V. r r• N V. 3^ V` N V N V V` 3• M Y. Y V• M N V\ V• N v. r\ h N r', N V. r V• V• N V r r• N N V\ • V. V. N N N V'. N V • M V• ^) O ^• Y•

128t1

•ti

=-T

Ur I •

N < T NN>.. • J 7 • N• N . T

7 Jo Y OY: n T o .yr••

or o •• r,n ^ 1 ^ W ^

c^^^ W a z o^ < z

'iJnY z J- u n^^ ^

W WL^

^_ oO O

o^O

o Q 4- J (^

R W Q 1 r 7 I • 4 • Z^< •••'. r J 2 O 1 N 1- f ti V. !Z

O ^ wT R O 11

V <Q O H • XI U .". ► . S

p Q a < z .. ^ orO N < J O O Z W A

♦ Df < 1 -n < O if J W Z^ Z - ^ r,

4 W J O r Z 2 W< O t) N O

z0 1 r .- z .• r. W N s n< H J W 7 2 ^ '•• O O J Z O.

Z < O T r• • ur r u .• Z •-. J n

•. Z O Z W O t < J 4r f •

~< O O .

•• v C Y 7 Z 4> l O ON. W o t a •• Z A

p > W O O 4 V N V O Z W W J •+r N F• < V . Z t.^N V 7 Z i. x L 4 L

•• • ^ O ^+ Y Z J w O .-.r )T T u< r - r 2 T r S 0 O .- O u .•• I

n •• r H J ••• r] - n J V Z.• sr Y aa•. < o .a .-

n O Z Z ti p .•. O . n N .•Nr•

N O N V^< J Z Z 1- 4 X .. •. O

J J -• n O rN

O •i 4 ^-4

>H r Q N N Q V .• • . ► . .. •[ Q . ^ G4 ..< .

. R X •... .. Z r Z S s Z v 2 J v 2O!

p . u O► ► W O. •i

QO W N •• 4 Y J J t i J J f J Z J W J J J •^ 4 X Z i Z N Z. . D - ^ Z u. f J W W O W J W J V' Y. W r • J J J^ W r r

Z O < q r p. ^ i^ Y. O a r f^ 0 ^- ! O r W« V i< V ^.r 2 2 2 f r 2< T v J z 2 2 2 2 r V R t O W R¢ n V .-. ` Q n O V Z •^ W r r 4 m

J JJJNI JJ. JZWJJJ- JZJ W)7- n 7) >Q JW JJ JZ •.Z W4nQI W . J•-^W^^oo

w J 0 W W J w v al W T 1 .^ ^- D O l l J R .+ .+^^ ro^^l-^ ^ o^

.^ r t. n n l t f R • .-• n f• l W n r

R iO 1V

T 7 J) 7 R 7 7 7 n .. J 1 7 ) .[ J u X.

J N Y. 1^• 1 D O .- N II J r d A n 1 O O r N /. J N G A n 1? O r N. n J N•• A Q I A O r ^• J r V A f l O O ^ N M J N d H n 1O O O r' ] r] . ].- ^ ^ N N N N N N N N N N 1 •' ^ .1 I1 I1 1 n I I M 1 i n. n h J J JI ♦ J J J J J J N N .I • N N v.. n N. nO t1 0 0 0 O 0 O 0 •> O <' 0 0 0 Y. O •^ 0 0 t. O •^ 0 0 0 0 0 •O 0 0 0 O 0 0 fl 0 0 0 0 d O O •O O ^. V A O O O '^+ ♦1 O Y•

129

1

1

o

JOI

p O- os W

r

W ¢ 1- W p >1- v o ^. w p- < p O> p r• Z • V L NZ

< ^ L Z< O < r^ v W OS p Y n F r 2 < r m < 2

W V ^ • W 2 Y ^ r- •'^ 7 WJ < .-• V r N r W Y f W O ID

-IL• ^ Z •+ ♦ D ♦ 2 Jv J N O J u¢ Jp 7 - N l

N .L O r r • ^¢ Z A W d- L Wr ala V W W T W < O • >•♦ ¢NV ♦ W¢ J<p Q < Q V f p ^ N Z m ••• W¢ n Z W m p N 2 !

• S r J •'• G L\ • - W W V W o r W J W ••• < •• ^- Q'f W W C N P •] r J •^ 4 0 U^ ¢ O

•'! r ^o•. a o^

a P< N<

t_l h< W N N W J< J • Wo r^ z mP W o

^z

> (J V^a- -

41• S\ O¢ X2 •1 CN •• •• << W •• W N < N • P ♦ W ♦ p

7 ••• •• T • - - O¢ V • •• 11 O A •• •• W N V N N Z nJ J W 1.0

W NZ

Z W¢ 0V O

• Z N^ w N^ W .. W J

rJ

O •• /L '•-^

.. r• ¢ N- .- .. m r O W < V ID •r r> T r (i Z

J L d O .- { Z v N Z Z W L- r 0¢• P O W •• •• - 2^ ^< !t r J J Z •• J J 2 r J 2¢ J a .=z 2 K f Z J 2 ♦ Z 2 2 0 2 2

.. 0 2+ •• W W J w ^U J< w J W m T U w r• /- D J J n J J J •-• J O11 < •••• r pv L r O¢ r M1 J V K W < < W- • W-

Z v Z y r T. ! V 'if •+ < a 2 •+ < •i ^•I Wr r X O • r r

J 2 J 2 a .+ J 2 Z W r ••+ ¢ n w Z¢ ¢ W¢ W^ f J W a 2 ..U J1- O

J n: rU n O

Jr O

Y r •D O r p 7 l¢ 0 2 3 n V 1¢ m O r C •-• W Z •^S V^

nC ¢ ¢¢¢3 3 3

¢3

r t < w < < ¢Q W7 a

1-O1 ¢ 1- J ^ ¢

O•r

rmZ

PUr NH J •U 1♦>.0 0 •-NHJrdA ? C) NMJNCA •.+00•-NI J •On -P O •- ni - J r •OA m0 Or-NMIv♦ 00 d O d 0 0d dd AA)^A1^A AAnnap eD mUf T•p aD ND T6 O • P p P J• PP P POC' L 0000C♦ r r• •-• • ra •n o o •o a o 0 o a a+ •D c o a o 0 0 ,D o o •o •o r o 0 0 0 •c, o 0 0 o a+ •o o o •D •o o •o n n r^ ^. n n ^ z n n A

130

1

o14t!^rnjnt - .. ..

OF

WO3r

L f7z p

^•

¢O

¢ W J

< pO

<

ZW

n nZ •. H

n> Z ^ . O

J

• J u2 f•

.. .. Z 4J

@ n Iof ^W •. n

r ^^ u n p < @ aN V .. Z n^ J w A u W X^ O •• < M x CL <^ J S W R ¢ ••.

J W O rp W F 2 ti d Z A

L ¢ a W . ¢ @ •. •• O ^ IU Z Z ^ Z p o ^ ^J ¢ O ^- •-. Z Z H¢ O ••. A p V•• O 2 N Z J J 2 J• 0 2 Z Q

•- p f <• <• n¢ n@ a ^ n W d@ O w J S M ¢ .1 n '+ 7 ^•

N v•• O •• Z.t--. OZ¢^ ^ J ••

ZV2 • JJZf•< /,

¢ Z •••^J2vW

a! V O u p W •^ l l¢ t om¢ u u U 0ZNW Z-.

0-0 ¢..Gf

N- ¢ M N ti G G T I H O u y 2 0V or

Z S Z ,Y"¢ Z v Z< Zz J J 2 J •-•

2 •• •I7 z •-• ••

¢ W¢ nJ z l .+

W¢ W^Y <

J •- J J_ w J W v t7 V V+ O W V' l [^ ¢¢ V O W V G J L u. 2¢ ••• ^ O^ S N W ^ 2 J W ^¢

f 2 2 .-• t -• W .p w J to u u W -• T O •+ 7u.'1 wa .-. W 2 Su l

¢ ¢ ¢ V Z)¢ 3 3 W i3 3 7 •-. 1•

•7w p u

Z ••W p7W

J r 0 ^- if O C1 .- N r J N O A it •^ 1"1 N Y • J r h A P O N M J N -O A a. P O .- N M J •fl A aD P :7 N M J N YI r ap

i^

NNNNNN IVN nI NM MM MMMM M M J J J J J J J J -f J N1n N•!^ M ul 3^Y, q< O •n Yld L UA A A A A n. A A AA A A A I • - A A I • _ A A A I^ A A I- A A A A A A A r. A A r A A A A A n A N A n A ^. AAA A A A A A

.. .A V A • Y

131a

t

r^41

IL

1

t ^^

O). 1J OO r

d PV t

1W

JO

1

OJ

1 C O O• 1 o n¢ r 1

O u 01

O • Y Z TO

1¢ ¢ i

LL O 2« l WL J S ^-

►1

W f O L ♦ W H < .••n ap P N W 2 O n ♦ O

J < rri u P -• Y Y <

¢ .Jp n< i

u o n< KH I Z J J

-17K L ¢ W u w W T,

n n L O 0 0 • 0 0 Nn •• o a ^ n =

U J •-• O p D r ••

J J O ^•••W • wO

W11 Hr.

Y u.n p p' J H L ^ < L 1 •+ N N n

J ¢ ¢^ N k O^ < W W >> ♦ 7Z 1 n/ u i t h H « f

F O O <, r O f `- O T 0 0 O p T U pp p v n O • L 1 t < K < L Gn a O n O< O J 1 O) O^ U w

N p .0 -Ma V O< W 7: 11 M n Z OL L L U U R R O N < n < J J _l

¢ TY~

i r N T w Y N J O 1 •-• r OO '^ O•+ Iu L V O Z 11 T.0 Z •. •-r

< •• u¢ W UCL

D T 111- V W ¢ R 2 •-• S ^••• R¢¢U O O O W ^ Y O N i w F Y W W ^ Y ^' 1 1 -(

n 1 ^ '- t n 1 N O 2 RIp • O ^< r O. I O tV •+ 0 2 <^ Y Z •^tw O

• 1• l^¢

< (: O • t l7 `-•Jw O 1 0 ~

n f< 1r^

rl S W<< O

ZJ •t¢ W

W •. 7 N Z 2 W Z ..Zr- .1 •• ^- m W Y m••• m W M V m W -• W < •^ O

1 1 Na^

.+ ^^ ^ .^ a n .+ tTr •.¢ w Sw z•. ..

0 0 ¢ R) ^- m w n ¢ti r< r r 7 2 O

P O ••I J N T O O -^ N K. J N (1 A m O O N M J N O A Q• O l7 N J N •O A T O O N r -f N •^1 A Q, O O N nOAA AAA A AA AA amep Ql rnmmrnTm P P P P O PO T O • POOn 000U000 ^ •••NN NNAAA A A A A A A A A A A A A A A A A I- A A A A A A A A A A A rp RI ar O¢ O T m T •D m m T w m m QI Q` G Q1 T s. o• O

132

Ir

AL

_.L__

133

1 • . y w J< d♦ J L

xN FYI ^O . 2 ^.Y '1

1.. 2 :- Jp p ..L 2 y •' J W< ^ .•

1 J f ^ N W ••¢ -0 r O ¢ W O

..O 1 Z OU L R U

Q 7 < iZ

¢ H,-.

a O < W O n ¢ y <Y. N W ¢ V .• QI ^ •-

^ Z Z •• Y W< 1- 2 Q r ¢ Y

1 p ^^ O O J 2 7 N

H J 1, T Z_ ¢ O .n u Y^Z < W ¢ p^• v O N vl Q^ v O N n ] r

y •+ KZ O J Z W

^J Q p •-• a W Q

r^N

•. - ^• r O t •-• 7 a J :u

¢ N H <V 7 2 r

Q !- alf•< '^

< w1- 0 0

< OO O V' 2

O •+ V 1.I < p W u f W O 2 •+ F •• ••¢ 2

H N> t 2 0 Q 2W O. J

• O< r •J y ¢ H .-

W NJ U W U 6

••J ¢ ¢ O • 2 .. .• .. Q O •+ <

.,'^

p ti Z W (. O Q .. v F N ' O .. .. W O ^ p y Z Z v ry Z T< J ¢ H W J •'• ••• ► m 2 < ¢ J J S •• J J

N .-. ♦ Q 1- • K .nW

¢ a < ^ i v 2 W ti L 2 J v .. < 2 ^ ^- O T. I- ^[µ1p

N W N ~ W •... Q J Z.- .• r W•n 2 <^ J 2 2 .'• N .. ••. f J •. r

•^ NN^ -• ^ F•

. D• ~ ~W^

•. ¢ N M O W JQ F 2 Z 0 2 z f O

'u J¢r. Q p

^W JV p

Y Z 'W1-

•-• ¢ S W ZO ¢ r[0 3 3 R 3 3

< •] Q Q y G 4 w<¢ Z O V¢ WW

¢ w W O Q W O Jv Hv

v<• < v< v • A t z Z F W •.• W Z W 3¢ 3 ¢ ^- J l K2 N Z Z O Z •+ J Z 2 2 2 2 • .^ O Q QI

'-• 2 J J< J Z w J J J J Z ^ Z T. l] d¢¢ ¢ w Y. p uW p J W J p W W J W r y W 0 3 3 3¢ •'• 1•.. p H O N E H F O ^- .] •^ m

^ Q ¢ 6 ¢ W r¢ .L ¢ ¢ w n 7 m3 a 3 3 3 Q W 3 3 3 3 Q 3 ..

J r n A m 0 O N r J N J A Of 0 0 .•• N /+ J I/ • •O A T O U N 3^ v V\ -0 A n• O O N r J N-0 A a .^ C'' 1^ J N +^ A mN N N N N N •• 1/^ h M 1 "^ h I1 h/ 1 • J J J J J J J J J J r N• n v\ v 3\ O-0-0 0 0 0 11 O U-0 A A A A A A A A Am Q l a O^ T Q l Y I a Q' m a^ C n ¢^ T T+ 1 n m a O' s' a l Q) O I T T 41 CJ m. ^ m! , (O O -^ T^ a^ T T. •' O S I a I+ >) a C O T C. 4l rt l G•

r'

34

` 1 -

IM V N

JJ

.^

W2

nH

. nl 2 J N• O: O

Q K N. O JQ

OZW p

f F• U H 2> < p J Wa a p ^

J -1 2 W ••+ O•.. V•

Nn O V WPOW

v^

O •¢J '-

r

W \^ W Ut 7 6 1• T v

p l O O W M Jyl p > 11 N

Z 2 J V ^•• 4 <W •Y ? J ^ N m

W 7 U W p m^ n- Q1 N J Z J

•+ LJ W

Q•< < e

W7

W O 4O

<. •^ 7w 1 00.0 r ♦ ¢ • ¢ m 21- 2 ♦ ¢ N- C M< w N w 11 ^• < W •• ••

'-O

<• ><

N^ L 7¢ •-• 2

u^•K •+ •• m L0. O w

O • ZW .• 1-

H •-•2

Z.J J

¢ V •• N O A N rv¢ ry luK m p ¢ K J ¢ WL •• J •• •• O •• W 1 R N •-• O ¢ • < O ¢ 11 r f

11 7 u •. NV• nl ••+ ¢ x

. m H 1- 7 ••N¢ 2 u

Z v • 7J 2 ^• ^

tR 2 •. N

L¢••• J

L^^' K

•^ N Y C O R - Z 1- v J O Q 11 N H p ^ Z N V e Y• J< W S w7 ti J Z •z J a < L •-• L N L •+ ►• Z `^ Z n 2¢ •• K 2 •-• < W •- O m W N •OJ< W J W m R C) w O J< J } O '.^ 2 J 2 J +•• 7 •-• D- w¢ ¢ u Z \ w< Y JV¢ H O •^ < K J V r< Z r r f U

Z <O Z -

W • Y J W< U• U V Y.N e e H O

O W ^ l e' ¢¢ V7 :7

4 •-•ulW7

W S2}¢ .w

•)•J W ` 7 < r. J < ^ •• •-• < .+ 1n W J •V V V W J w.n ^}a a^ p r o.• w +¢ ¢ Tau< m u}¢ ^~ w .•^

z W i ^ Zm }

}

P O H J Y) r r_ M P 0;; N H J l n 0 I- • 1 0 U•- N H J N O A e• P O •' N H J N n f- Q• P O^ N H J V• •[ I T I P O^ nA m el m m T m D ••• T t* O P p P P O O P C O 1 ) J 0 0 0 Q V O N N ry ry ^) +J ry N n+ •^ H n Hn e) D R+ T T e • T m T W m m el a) n n •D m a+ o C 0 P P 0 6 0 P P 0 0 P O O P O O O P P P O O P P ^ P 0 0 0 O O R O

,A

1

^iG1

or F

0O

♦ Wd

< rJ ♦pry O¢ Id W

OJ

1

oc ¢ I Hp W

o < ^n o

m ^ W H •^ O^ p

^r J p u

II 2 n 1 CI a nm .. n

O <• •¢ O Y Y n I

• + 1 2 Z 1 O L O

J .0 L F )• J• u ¢ J J .-

W F f^^ W W W¢¢n. d dvuu n

2 p•+ ^-

dn o00

U G O V Y [ K¢z•. <

n< Zd du

f-.^W p wW p

U!

OL

Z r^I-^^

r. d dn< a

W O Z 2 u<<Z OW :] O W 11 O C O H H NW O d L O O a

2 O <'-. L'1 NI O

2 Z Lp ta

< uL¢

J uu¢ x

L i WW^x n n r o^- n r t

2 .Y•^ •• ¢ u d U pV` M Z t Vf n O O Oy7 2fJ O

.. < Z v < w <

K J n m V¢ •~-.mom

u^w pm O O 7

< 1^ LL•

JWN¢d

N¢ df 1dlp ^l ^u+z dz r

z

~

r.

x^-

^n •

zr

0O .-• ^ N Tp « u 0 < <N R f-

¢ I.0 W

J J• W W

¢ I. ¢ o pp .Ix

< N Nf N H f J J U p

O d •-. O W Z LG. • < p • f ♦ G I.

r p . O

W ¢ O u6 ^- 7 W¢ f W IU< v L f ^^ Jp d F W u p p

^ o < w o pOL

< p O< 0

^

p2

< <a^ < u l

w L <o mod

i u i d¢ n d 1WL W a ••Lr

p O Y H W 1-• W W WT. p d

•O L M •+ oZa L1.0 0 < .• o ..• Oo

u ¢ up o z W

< ^ oz

n11 ••

u z a w ^ m

.. V A 7 Op

~2

z o p m wW L L ¢

W W O

Jr •OA 6.00^N.^ J v`dA a100^n1 M. J 3•h A•"00^^^/I J In •OATOO^ N^^J ICON QfP O^N^^JN dA nH /1 r.1 h h J J J J!! J .J J J N v. N N N N N ./^ O O O O O ^. O C O O A • _ A A A A A A I`. 1Va m m IV m a d m 'DO P P O R P V P P O O O P R P O O P R D O O O O O R O 0 0 0 0 7 D O O P V O P P O P V P R O P 0 0 t` O O P y

7I

L

1r.

'~7

135

W!

10.,

R^

OF Hui .. ti^,._.. •'

M 1

M

0'< oJ 2 1

O WO .1S O

1mO

x W Z•+ J m N

Y O ^ 27 NQ P ^

¢ 1 ZP 2 w Y OO • • O f J

O J 1 2 • J Y ^• II^ J W D

0 0 < u o .+< O • J ^

•R

♦ 2J W

O OO

n Z J 1J • ^ < N W O O N

O O O L O O t WO .^D .... L .. Z ♦ w 2

x L O Y Y f ¢ vW W ¢ 'J < < < U• Y

¢ Hul •^ O

••• 2♦H • n

H J J Z<w J T

♦ ¢W O

U Y Y O Y Y Q W w J W u .-• Q S J x J W A r Zzz m-0U I ^Y t G. K K O r 0 ^ x r Z O O J .^ N ry ¢

0 0u. << O O 0 ul F•¢ J J J •. •• T J Jun W

z O .- O L a 1-. 4 .-z O

O W YN L 7.

J 7L L L7 O O

• IIW W W •• •• W N

u. Y Y0 0 0<<

OZ

O W r N u nY Y IJ W G ••

n a•• O

r O Z Z 2 u u J J J Y J_ 1 •-. d ­-Z Z z S LL. w r Y0 Z YU •< . O ♦ O u- Y Y _/ J Jo O Z 0 2 << J¢ W w 0

J^ JlW f

J J ~p p 0 << G C O O O N N < •-. LLI w v p W Q. Z

^•L ¢ ¢ J d v JJ^Y 2 <•( <xF V 7. Jd 2 ^ ON Oa ^• J t z Z Z w W Z JO O Z J J J O p J v V¢¢¢ r_ H e r ^ u r m¢ 7 •+ IY ..J p G U •+ O •. O M U p II < •-• p p p O W Z

S •( < v O .. Z U• < < < x Y < u. pl W ¢ QI I•+ 0 0

•I• V < < nH u O S •+

d 2 W •• J •-•Z ZJ J •-•

rr Z W^'+ 1- m ¢ ¢ Q w r- ¢ •-• u

Ou.

a z.-d w12,

pp

y 0 W 2 W W• W W O W A¢ Z ¢ w J T v ¢ ¢ u. ¢ ¢ u.O W

C^ O^ N n J V+ O A QJ O O N r. J r` •!+ A O G ^' N n J h O h n O G• • N r+ J V+ O A T O n N n J r O h T! f G^ N ns+0 J D O OO? O? O 000 C+000000^ •- ^NNNrvry NNN ♦ nllnn.inrnnnn J J J JP O P P O P

1, 0 0 0 P U C + 0 0 0 0 0 C' ` O O O C: C+ C.1 O U O U O C+ G O G U O O O C^ C + C) U O O G O O D U O O O U C+

51

136

•ia

1

r ♦_ ♦ 1 - . .

W

K

O •.

O r . Wf 7 ^- FT W <

Y U 2 .- <.- ¢ 1 R

Z

¢ V

o ern •.o^ ^

O N . 7 W ¢n nn •-. ^ oz

W V ¢ ¢ n W N Y .-• Z r

^ 2^ '^ O J < t J •-• Z W ^< A« N W O^ O l 0 w 7 f p ! i L 7

.0 O T_ Tr. W N < N ♦ < r N Xn .♦ O 7 7••+ T W W u On .•.+ l7 Z Z u J_ J J J _J W

~ I^ ^ « O •• N w J Jt `I N O W r< V. r O .. H 7

•• •• f f T f 0 0 0 0 0 <¢ ¢Yl ,^ J n M W O ¢

.. u• Ir ¢ Z 2 2 2 Z f< L Z Z•- I T I ^ O L • •^ J J J J J a C W

O n O: .-. O •< •^ Z H ••. f 0 !'f O O !) S J V x W X2 Zw O G. r 21'.p.- Jn n r o W o G< J N J ¢ 7

J V

OO

J

ZV

. X

0rc

mm T M1

^ a II O J Z `••W . 2 •• O <•

^+ I X W S•-• ¢ J Ip O ^ O ^- 2 N

J^ 2 R ••O o v ./O^w ¢ f Z 7 u-U¢ A r• ZO ¢d

W W Z • v 0 X •-. ^ •^.2 n J^ • II 2 t • c • f 7 7 a u V 0 0

X .-. J^ W< W Zx u .. o z c z s u u z¢ m Wti¢ • O W f r. < ,u W J W

n H z 2 .•• c K V¢¢¢ z.. n u. J l V -^ I+ 7 7 7< K O ,^ Z N m V V

K J 2 0' < .^ m u W JH <.+7 W W`- u u¢X = Ww ^ mz i

J H p A O'.? O^ NHJ u^,[.A MO O K m Jr• NH J:c N e^O^ O ► H J v. `OA TP O^NHJ N•OA Tl J J J -I J N N N N N N O d V O O O O O O t A A A A A A A A A A b M M 0 '+f M M m Y1 M O U? O` O • P R it TC i U 0 CJ U O O C U O O O O U O O O O O O O O O O O 7 •' ? O O O C` • 7 C O O O O O O O O cm, O O O U O O C` O O O O O J^.-^.-^ r ^.-.- • ^.. ^.-^ ^.- ^.-^- ^'-^ r r r r• .-.-^ -^^ ^ ^.- ^ - ^.-^ -'• ^ ^ ^.-^ ^ ^ ^.. ^ ter•

13/

I,

UV

e z on W Z

pmrJ •+

^Y

¢R

N^

^ ♦ T . Qm

••O O O 7

m R In p P n . n ^^H H n O .+p,n

I: < N x a 1 aJ O Q

^• m ••[] O l •

i •J U J¢^

Q V V VJ N D J W N J •^ S W R R W

v O Q^ H2 •+ 0 2 z

Zz W

<O O

f N p O r Wp ^ c^ ¢ ti• S .••^-V U •-,

J O .- < p 2^ v

n 1--p •• l • .L Q H 1"L O S ^L Z W 7 2 ¢ ^

2 f R R¢ ¢ f O •• N W y J Q ¢ O . O O n^ J J r.o 1 ^^

^•. 00 •U Ul L

l'J Q¢ d V ..' O 11 Z v f 7 Z ♦ ^ r 0 . 7 7 r+Z ^^V. m wp YQI^ fff V> O u(!.

J ZW W

•• U .- J¢ OCl Q v Q O.- J S«

¢ W W W J y J6

W N. . WW ♦ V N♦ Z ••

N ♦ O R•• W ti W

W O r 0 0 •- G^ .+ .- N N Y O Q 7 O Q. II J 7~ r W^

W .+ ^ pz r. < <i ..arN p p <lu n

<c¢ onQ =r <

w —o oIlk

z7x 2 •.. ..o l of ♦ r r a u N 11 ¢ 2 2 W o 0 2

71...2 Q H , 41 W II wr•

Z H .. o v Z O O H O w O O FO• < J J J •• J +-•

v¢ u W 2 Z .- ,r << J In J< R •-•

. U r •j H 1 ¢ r < .- 6¢ W O U W J W C, lO 7 1 ^U r y r 2 p 1 0 In v¢ iI. Qd 2 w ¢ + w ¢ 1^

' S O o 0 0« p N < 2 ul < W O N O QI7 . . - - v f z z Z W W Z Z S u u• •>; .-• w wW O i O J J J O O J m

R1.1 •-. mZy

H < 2 p p O ---W O • • u<<< x ► < Q lL' 1

7--, Z Z o W- W r 0 W • O mW xZ

YZ 2

u17H H W R Q R •^ H Q

•+N]v r

W J w Q Wa u ^^ r

m^

rI

P O N 1I10 A mP O^ NH J N OA m0 0r' NH J NY1h 6l P O^NH J N •q A mT O ^ N 3IJ 1n (1A T.P O^ NMP O V 0 0 0 0 0 0 0 0 •- N N N N N N N N N N H r• 1 H H H H H H J -I J• J -) J J J 31 N InV r r

138

1

i

aW O

nW

]( J ff¢ W Z ^

6 W 2 ^V

¢^ •• m

• ? O ^ To

^ p ^ .. < x^ w<• x a

2 m W ¢ J^^- W m•. 2 ^- ..• A 2 1

u V N W Z • V •• m ..p O ('u N ^ K L N . 2 •• O . J w (

¢ I- ¢¢ J ♦ W¢< W u .2f L W 1^

J W'•• ^

W A U .-. SJ •• m 2 N

v 0¢ ^ a-2 •-. ^ Z Lp (• f • ¢ SD J L y d^ < C] Q Z J W O Q ti .. O ¢ D

< Z O W m<< O O 7 ¢ O . W n u p ••. 6 /^ D Z 2¢ N Z<¢ ¢¢O p .••. V T p 0 J. m a- W W 2 • J J 11

Z f • f r O.-. 7 •+ W a- (- 7 J ••

^`< < a OA X

S J a- N11 .-. •• ^• < S Z<<

V u 0 0W Z

Q a M1 as ../ p •.W W C O

w W loon •• .. x ux

y.o z nzz mW

Nm W z•• J J J J N J ► • ^' O W ^- 2< W w .^ Z¢ W J u• p

.-. •• Y Ju v u r N• J W ^- v M 2 >< N W Q¢ J w .-. W Z••. ^- l

p O p 0 W O <¢ 7¢N•.

^-y

i 7 •-• ¢ yW J< V J O

V Q¢¢; mW W >> Z

W OZ

H v v H r O¢ a- H <u

¢ p ^ Z N m U u l W¢ Z Z 2 Z< 2 f 2 2 2 0 2 Q< ^ q w JW J J J J¢ J O w < •+ J W r Wf- p p p n > p .J Was ^ •^ u Q

J H m O7 p 6¢ 6 ¢ a- ¢ O^ W 2 S

^ W pQ Z

W raz ..w pL

J N• O n g P 0- N r J N• O A g P 0 •- N! •. J N .O h a n O O e. i a n. a r O.- U P O •• N 3. r O A g O O N M• J N O "- nrNNN y. v. OO A A AA O A q OI+ IrA A n Ati n1. 1^ qq gg Ol qqq 3l q P P P 0 0 P O O 4 P C?GOOO OOOO

f a! V N N N N N N N

139

1

'i(a

• z• o

0

•W •p

Yn r1 r+ • O

• ♦ 7 • Y• • 7

• Z • Z

• M • • ZW • .. O

Yw

• • J• • N p

2 n Q • • yW • Z

• W J ♦ Q O M1 QO •-. • t O

o c .z < a

• y p • H O ♦ • ♦ • ^S d^ N J O• •7 • O •- O• U • 4O w7 • •• W O ^M

^•< J

w J• G O p

w 7 • 2 7 C • • OV J C x L • ti H y •-N W 2• J 0 7 L •• 7 7 7 7

• p^ • 7^ f 7 7 7 7 7 7 7• x 7• r a 0 0• U V G O O V U• (• 7 7^ J V

W M R •2 ^ V •

Y 7p

•- 7 0^O^

x x • x77 • 7

x •t x x x7'.>>7 ^ •

« tH

< x

Z-+ Y x 7r < ^ J J^ J• .-.R W O 7t 22 L L7 Z l L Z p2w

Q G Z• .[ v• J J J J J J J J J < .•• ti H f- • ti •-^ • ^ i •. 7

^-W

^^W W

r ^r^^^^/• .-n

e d• z ti x W a a QQ J

U W ••. •-. a^n Q W Q Q Q Q Q O. R Q

y ID 7 l ^^ l l• J • Z O 1 Q m 7 7 1 3 7 7 S 7 m 7

p .+ W O• Q ti V v Q W

Oa u u uu u v

f^ A

Q

2

< Q

7nZ

W•1 n

J 02 r ^W pG <_ uW p O

Z p U

w ^ n

W ••O Uui G

7

^' II

51

{..• i'L. I-- ._,.

p 0.- N M J. r.- O F g O O ^ N h J. n O^ f n O. O ^ N M .. N O A g f• O ^ N r J N• p A q 0 C l ^ N Y r J r O A a f l• O W NO r ^ N N N N N N r V N N N M M h M N H M M M J J J J J J J J J J N I^ N N 1n N N r .^ h U d U ONN N N v N N N N N N I •J N N N N N N N/• 1 N N N N N N N N N N ry N f J N I • J N N N N N N N N N N N N N N N N N N N • V^ r^ r^ r ^ r^ ^ ^ ^ r .• — — — •• r^ ^ r^ ^ r^ ^ r^ r ^ ^ r- r- ^ r^ ^ ^ ^ ^ r ^ ^ ^ r ^ ^ r .. ^ ^ .• ^ ^ ^ ^ ^ •^ r

140

r.

N

n NW 7 O. ^ w

O > Yp Y ^• h

G N

6 N 1J N O U I- J.. .. Z

.. Y Z YJ 7 • Y 7

O H O ^ Op 7 I[ 7

O SZ xT Y J O 2 7^ u = em u K x W <

s 7 0 0 5 7 lo Kr..- = ao i

• 7 7 J J

2<< 2 Z W v Z WO T W W W a V •-/ O •-• O .^ •-.

• f^ ► \- '- G W tr Z W Y Z W tr•• Z V Ir m^ W N l a 7

••/ Z W tr tr tr W J

•1 ^ m 1 l^ H W rtr /D 7O

AJ

• r C• .•• Z

p Y.-• N

LN H

Y N OW • Y

ma W < a ..tr ^ 0 7 -

Y J O mtr m n O nW

• Kp 7 W 0

2 •^NZ

YN •o

< N W ptr L

` N T O •+ tr ^\

m• I W• O •A m NO m N p

\\J-

L W7 V

N J NH H \ tr

Z Q W u J WH N O tr • - -

• K H 7 ^••• ' • 7Nd NIr O> - - mH Q •• H O N W

W L Ir p

• 7 •" O O I- Ui v I• J n

Y ^• '- 7 70 7♦ 7 7 V ♦ 7 U W f K x<I-o oW Yo ^^ w• ^ 7•+7 x K N ^ x a L 2< ZO r 7 O 7 J J ^ Jx f7 ..•

t- x f) ^ ON a

Z Y•• ^• Y ► YK

--jz s z

^ J ^ J 2 W tr tr R trW W W W W Y Y m J J J J►► ^. Y Y

a a K J77.2 7

trl ^

or

(iww

' wit \ \^IY^( •Y M!. /.ate

(m

Oi I i

N

= N7tr Y

w Z

- U L' .•• v T vW -

.• Y N N ^ N

V Y Y =W \ <O I^ J A < A

• Z 'Y J. .w 7` 7 2 Y •O • W N

a.w O Y •-P P OO Z\ / T u D ON Z u Y ^

tr JU• K•

I^ •• O W Q O ••` T M Y^ aY N Y < n K W K O<•• <♦

P J A< •W Z a J. J T Jtr C W

J ♦ O \ o \ o ♦ o N•` O • W A Q U J N J N J N

P O •w r p•• < P

Ya .w

Ha I-

• - W

Y V O ~.t r K Y t r Y Y H Y Y Y H )J- J t • N 7 7 7 ^^ 7

W .Jp ♦ n ♦ Y

O O O O O O O J./ xx Ii

O^ J n J tr ^ 7 7 7 7 7 7 7 J

a zw•zV z v ra o pY N J J J J

/`. Y Y Y N Y

YZ

W W W WY Y Y H Y Y

^

7 7J7 >> >2«+ o(^ I- O O O O G tr .. t tr tr tr tr ^[ tr •. ZK 7 x /[+[ Ia I- V 7777 7 lT O/•.7 u 7 J 7 7 7 2< k f< K << ^ '1l W 2

V vZ< Z L Z VJ v J J J •+Y r T

trR t = tr27>> 7 J

V.t 7 u

J r O A n O O ^ N H J N .O T- ff O C] ^ N H J •I. •J I^ •" O O H N M J •^ C 1w tf P V ^ NH J N K! A N O O ^ N H J v1 A N nO A O O 0 0 I. I` A A I- I. A A A n n n A O a W O O O O P P? R P P O O P P l l O C` 0 0 0 O O G I J.h N N (. • N N N h N N N N N N N N N N N N N• V N N h N N N N N N N N N( • H H Y• n I'. Y• . H H H H M H i

• t

141

L

riiii

rl

J CN < Y 7 mW > J Z O

-' ^ w m o s •a ^ s z •

o • ra • • a

♦ 2N Oa p

D • a••

= NU

?v. r W rN

•• 1L7 O r O

V •+J •

D• •

•• a•H O Z v O • Y • •Y 2 V a J ^ • a • •

^^ ••uJ

a <W m

••• oa W

• ••

• t•

a z- m : a o:. R ^ W N O C_ r • f r N W N

WN a. v• Y W r O O

W n J •I W W = W J O • •-•J •• J •-• a u O 7 O < • a .3^•• a

•n NN D 7 ^ z %

A•• R f1

••. O a

>J

O O 3•^[ %%

> JO a

OC

a •W

W N. 1 O 7 J W r ^ d >L J . Z a a Z 2 7 • ♦ •

. >V•-.- a r rte+ A v Y• •

r, Jr 2 •+ O

• an

J 7 •- J J 7 u •- v J V W a n r •!r a 0 0 Z O O O a N Y a W .• • •7 r % •f rO a 7 1 •[

ZJ

%7

a^ ^

VZr r n•-

O r J R a.- a Y• 3

..0. O• O •- p•^• O

7 ^+ J V) J u O r O O •- a 0 •• ••4.J J J J f ••• Z tl W

uO • • O

• W W W W V J O w• 2• a N p . •• •. r rrr r r .- Z W.- m V

i wrW O ZO

<C r r 7 7 7

O O fir ar < t: a t •+ zu7ar•-n Z 7.J • J 7777) 7 • %yi s) .) ) ) 7 W O •+ O 0 0• O O O O J O O• a 7 7 7

uO ) 7 7 r 7 7 7 7 7 7 Ju

Z •• n 4 i .• fa <. <faa<• p TTT••w O V

Zy W

Z n Z Z X Z Z .' T ZRO

J J J ^+, O N r

•J J J J J J J J J < T r .-

Z •W G a u

Z W W•- r

W W W Y Wr r r r Z^ 9••

R R Q

W ^ p I S a W v a a a a a s a a r .pZ 7 •-• O m\ 7 S 7 7 1 1 7 7 1W a Vr

r W1 ^1 ..

4

.M

•• NNNN NNNN NN nn HHn HH/1 J J J J J J J J J J N HNV •I^ O OO Q O OOO O V S- A r- An H n H n n M n n n H n H n n n H n H H 3 n H 3 H n H H 3 n n •^ 3 • 3

It 142

^ ^^•. _.ice. ^ -

1

r

tt)

II

OF P^,.l; ^^ . ....

Jv <f >

T a

- > w R JW z .+ ri n r W G

^'-K N D 7 N- f Y aO CN O R YR^ S tr J

^[ • •Z-a u

Yu

2 N • ^ S .- a- R NC• < ar

Z N N t W A II1Y

V > •.•7 •• f N O F L W ••• .- V4 Y .. r ci n ! t R

• 7 7 Z ^^ ^• U W 7w Ou • 7

N ~ W •/. O a L W W T rV 2 N r N u 7 ••• O ' O 7 V N^ J O B

r.W . N>'n ti O t o •• a 7 ..O O O N N • N 7 •'• ... 7 . p O. J N

W ••P ^ •. J J N .•• •• . 1 •^

. . ]L

pL r)

ti ^.7 J^ 7

Y Y Z -J .7 J •+O W O 4 T d ••• .. . 7 w O .? 0 0 !'• O O x 7 J ^

.. O .. D .. - 7 Z Y ti H ^- Y 7 7 1 7 J Js a r> Y> a > O O W J J 7 J V J 7 U W << •^ < a a s J QJ. f Y Y x n O O O W O O-V

fW J J• 4 O 7 7 7 7O O O Z < J tia 7 7 1

x 17

x x^ 7

^ L L 2J J J

L a r_1 J S

v•• N .. 7 7 7 2 Z 7v V

•^ 2 f ^- 1; f f f .•- t- ^- Od O t O •

<< <Y Jv '

W OZ ZJ

2J Z

J • Z •f f ^t l Jl•]

- Z L L Y ^- ! Y Y W) J) J 1Jf Y Z ^u VJ l R `- TJ

H H f Y H 1- Y I ,f J W •+ Y f ^_ H f H (I >

7 7 7 7 7 7 7 7 7 OL<

W p V L .^Y O W J Z u)

R ti) C V a• •t 1 a s

O lO0 0 0 0 0 0 0 0 0 Y a Z w m W •] Z W 7 J 7

17 • t vx x x x

7 7^ 7 7 7 7 7 J —< wV

f J: t •. JJ J l w .0 O

a< a a< a Z W rZ T

L 1 2 v l V S v ZJ J J J J •^

W W Wl

tr r: r ^ r v a O

Z J 7 7 J J J J J r

J N O A n P O ^ N n J v• ^ 1•- O D O .- N I• J N C N N O O . Y /• J N O h 0 0 0 ^ N I• J •n V A fl P O r •n J v. A N wn ^. 1^^ A O^OOn 00 u) OOOP P O p T P P 7- ? p 0000O000UO ^ •-N NNNN N N.v •JM In r. )n /• ^ in h n /• I• h r n r n .• ••• J J J J J J ♦ •. J J) J J J J J I J J J •I J J J J J J J J

143

J Z{ f-¢ 2

W• W Tf

• l'1 TW 7H Z

• 1OO

o zW {W

a v ^♦ a 7

< W L^ N 7

r n

¢ < VO

N OW •

l F rJ •

• 2 7 W• J 2

u u ¢Z7r ^

L

OL

rJ

0O WW "

M

J 11 r. A N •• ¢O ^ O ON N E O r

• • M 2 2H N 7

v l J u L V O2 w 7o m wu

J

S 2 • 22 OH •-• W

d r N L

V W rN N NW T 2O m < W

¢ W O

0::wr 2 Z

W t tt• a ^F- ^•• 2 w

^ Vr 1-F x W ^w r W z

a 2 r•00^ W^ Z N •+ M

W R L2 W .-. • Z

w T O F ^-W Z H f

W 1-ux xW <W W

7 0 W 2 Zw •Om

ti2

N NF p

uf- W

I mr O• f aa r^•-a

llw.

o'

^ Jr m•r {O N

¢ Q

W N• N

♦ 10 7O 77¢ •. xO p O u ^ 7

'J 7 7 • W< < V Z Z

Z v ..

Z u•Ju r+

^V

W ry^• f- M ¢

.•u 2 a K

J fn

•-• 1 l u O OJ U•2 • . O Y

Z m - N N• W p W

W Of

OOz •. ^

•-z

w O2 M ¢W o •• az .w O

Z ¢W O¢ 7

2 O •^ OW •^ O W

uw C

Qa

0S

P O ^ N I ^ J N 'O A Y I O O ^ 1` I M J 1 n• O A 0 0 0 ^ N M J Y r. (f A R f P O ^ N M J 1/ 1 •O A Q 1 O O ^ N M J N d r 0 D P G' 1 ^ N MN M M M M M M M M M M J J J J J J J ! J J u 1 h N +n N r^ n r v, u t d • O 0 0 0 d O d d O A A A A A A A AAA T^ • D T fJ J J J J J J J J J J J J J J J J J J •` J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J -: J -f J

144

a

t 9r (

.r I-

1

Y

7

S

OO Op N n

Y x N H W¢u 2 u O • Z Z J O

L 1 O w UI u.u Z u O O . W

J } N d 7 N OO x

O N •- p...

N001 ^

• uOr•¢ d N

O . r ¢ aOr O O• N 2 u.W r n Q.. ^ u .. o m

O > ^ OO ¢ W¢ w O O 7 ¢ • u O N

0 7 .- p ^ o o . aW 0p U^ •- n

w H l I^ 11 v

♦ ¢7 J 7O¢ Y O

W O •-. O . O V O O• • N .0[^•nQ W O• L< 00 O Y • } Z

V L"•ti O^U J n^ ^ Jv 3^ ^ J

• Of^ ^ 7 •-• A

V• n T 2 u .. p^ v 7 < L

^ SR u Z w

O< W 2 R } U p 0 0 6 •- ♦ ^ N • W O Z^

^ f J N^>O r• < x L 7 L O •• O O f S H> HW 7 h L J u z O w 7 z 7 O •"•

nZID < Z • V

Jr •• 7 Q w N <7 LzOwn

z n zpp io

.1p •'• <« <^^

< nzn ^••

tix

.+mw pau >.

F f r• < F w r w a¢ M J w 6 u Q . . ^••• Z 7 C• f •- O W H Q H W x .+ f< 2 Y Z H Q<

rz-

W m O •• •• •• S S W w Z ti S¢ V •-• ¢ W 4Z NO

w•-r-m ti r-• 7n f T u

V a nL O•- W

< O N^ r^ >>

H 2>

u, d7 •-•

• pO L

p

mS u^ uu o.. .^ a uu.^uu

a

J V• n f. T P O ^• J V` O A Ql P n J r O 1 T O O N n J r d A T P O r• N n J V\ r n T P O •^ h J h •(• h nn rtl •G ^•1Tm P P P P O P PP P OOOOO OOOOO^ N N NNNNNNNNnhn.l Mrn nMJ J J J J J J J J J J J J J J J u. ^ N - N r r N N v N r N N N r v Y- N N

145 \1

c 'm

I

N< Z2 OZ •- •O as

J •rJ NO ZV O

OO < a •

GN O O O• 2 LW N

7aO Y

r• R 2 =7 W Z ¢ ^

¢ C W 2 W Q2 H 2 ^

VZ

OO

Oo

Z S•2 < LH E L

2 ¢ W O E O • N Z•-• O1 ^ O V W C

< 00 V Z•^ W ^ ¢ A 2 < L I

.+ O JJ

A u2

^ ^ OIY •+Z O O

WJ

a 4w J• J

d v Z II J Z 2 0< ^ O< O F V•( S •• II •-• O D O E ^ E O • W

O O L n 0 ••Z •• ^L C L DI O O

n¢ N G 2 2 ^ < 7 v OV

T rl O • •• V ••O W W ¢ u + 7 N h L •r L O

Z ¢ 7 Ir f <r V U w U L O II O 11 II Z7 7 S D W W u •^ C V 7 w a O •• ••

v•• •• • p Z

Cf • J O 7< m W N V w H N • •-•J O< r O h •+ J N f A W HO J

W< Z •• Z w ul 6 V w

NO N N ••

O< V O 7 t O < v JT I^ a N O Z V V O O < v O w ti O N O J

• ^ O r• • m J~ w^ Z O] QI 2 J w p Z '- w H

v• Y

J O 2 O 7 •-• O W •-• T O • Z♦ O¢ a 0 Z 7 O

¢.+I.a ^ a 1. t woz

••

•^as

^ ^ Wz ..

. >7

PO Nr J N •O mO C• NhJN Of Q1P O NrJ NdA mp O N 3• J N •Ol mP O^Nn J In •O I^ QJ O O NrI J J J J J J J J J J N In N a a O O d d 0 0 0 0 1^ r^ /^ 1^ 1^ I^ A 1^ A A rD ^ L w of m m rn T O) •) O O?

In N r r h N -N N - h N r N r ^ r N N N N r N r r N v Y• N o v

146

w^

,...

Q0.'

OF F:.

WJr

O.. O ..O• N zc .• o

n Jd W J

Z T T. O

l ^ f <m

Z Zz

^• Z^. HOL <.^ L O

O W JQ ¢ i

O Oti p

L O^ V Y dO ... Z

n 1 O ^ W ♦a

o p rY 2 X11 1 7 <

i .'a 1- O .- I J2 J O <

¢ u. O Z7 F- ¢ r ♦ x

O O ~ R N n l JJ N n 0 J W •^

p O n ¢ a H > 7 J ^-.^ L W l x ¢ J J H x

¢ w ^ ^ u 0 0 ^- O J u

7u ^-'ZO • u0 J^

O .•• > Q A u J x.r O L v •• N O W

O p T• W N u 2O O O u¢ Z

> 2 • i N O s 11 ,.<00 2 Z •-• Zv m N 7^ 6 N JL

O J r ¢ O ^ O< J J J J^u Z~ ^- N< 2 U J J J x

u 0 ¢ ^¢ Om Z.•u000 WO H w n '- ^ Z C W< Z^ U' < V u u 2 0

^ O ^ O •+ L •-• i i Zn v .. < Z L •] w 7 m W O

Z < W ^ ^ ^•a ^ 2Y, N O f Y Z l,'J ~ ^ m W OZ .. < O Z

r o ^

W ra m

Z ZZ WH S

OLv p T

< W <a L JO ¢ O

ti O OF•

NO 1 0 Z V Y 2

p .. o o a

s o a x2 .-u^ 7 p Y

< < ti O W <S J H¢ x N .- L J

O ¢ ^ L ¢ O wO 7 .• .L Z ♦ ^ p

O O 1- ON O N '_' ¢ 1 Y .¢ A O J

O V p• X J W ^ WO n H a L

¢ uu O••1 ¢ L ^ >¢ W of J J^

O 7 u ^ v H f W O n ¢ J J H x< O '-• T Z O '- O J u F•O •-• C L v . J xL O O p• .. O WJ > 2 i • n u tZ -.n-: L N N f ¢ w Z

OU 22 •"• 7 L N wT OTO O • H = m N L ti r• J w .. ••

J .+^H W • Q < OO V 2 ^ n 0 N W .+ O< J ^- H V f< O¢ W ^ d W N< 2 J J J J FI W n < • U m Z •-. O J J J xL 1- O M O ^ Z n W< Z'- ^^ u 0 0 p iuO r d v .. < Z ••' I .-• l i H •-. W< u u u Z'J N O ^- Y S u w 1- ti w 3

• •<O ^- W W mz ¢ M

^ W

O W V O W2 N W rW J m

J •n f1 P m O O ^ N r. J V` d I^ T O O ^ N )n J V\ d^ m P O ^ N I. J N Y) P n P O ► N r. J N .<) N T P O ^ N M J^ O h TP T T P P P O<J0000 •7000 r N N N N - .V Al NNH - r--rn rnM r J J J J J J J J J

v v) v, In o a o .+ o ,o o •o o o o •o o o o o o o .o o o o •o o •o •o o o o o o o •o ,o o a o 0 0 0 o a o o:2 :2

147

t1

^1^

1 S •- W • ¢1 2 u r-. L7 U Y I N F • p

N Z• I+ ¢ N . < Z • Z J

F r w O F w W.. K F ^

♦ Z W N N F<H J .-• x J O •• ¢m F W • F

. p•+a L:! L • F 7 F• N F N •

2 2 N Z N N ^[ u0 0o N . 0.

o LO ••. O <- • F J r n uZ< 0. N¢¢ J tp I HO F N 7 F W J • > p p W Fu Z w U F< < O RY O¢ w p ¢ F p • J

T U < W J <JN•-. T w<O Y m •U X V• u W 7 v O O •• >> F ♦ F

No 22 • O.-O ww•. F•• <2- a U v O O p 7 7O x nG Z 2'Z Z 2 F w 0¢

¢. 0.

T C'r G•+ L O n<<

F F I ZW

Fx NO W ^. p t > Y G L < F F n n 0 . w F

•w W O N

W N < N w L S z LJ 2 7

¢¢ Ox 7

=n I

• F W< .+ • Z [^ Z W F F p N n n t- ¢G 2• <w •IZ L¢ ^ •OF p• O F 0. 0. F F •. •. JF Fz n • Gan Y^oo<^ < Vuz_ -.o a<< ,. <w p .. • m

aN

o .o J¢w

Wapp u^a r.a.

^.u

z N• ^ ou zo< wF oa < a a v F'u O J•

ur Z •+r•+ 2 W W L¢ O • 0 0 0 -<

O • O W V'- F

F ••• FO < 2

S S wJ J J F

I Z lE W O2 J• KWOF¢I1L GF O OOO ^'Ir p 22FF1]pNpKHL SFW O• ^ 2¢ •^ W R .+ ♦ Z • A n J 11 1 .- T 2 •• •-• F •-•

U• O •- 0. u u u F O J ♦ I O •• n h. .. < .. F v F O r V u) 7 m O• < • ¢ O ¢ • • •• • • LLM¢• F

U W W 7O V 0. II N m YIZ• O . L • O Q m N U A Z .. .. .. W a

0. ¢¢ a H V -• •-• J O < p N <F Y F F O N m< •• F F F U

G • > mZW

P U^ H J NOAOP C'1^NHJNOA mOO^ HJN•OA In0O^ HJr rA s. P 0^ HJNOAQI0 O^NHJN NN NN HNO 0 0 0 0 O o O OOAAAAAA AA AA mmT•O T.O men mTPP PPG PO PPP 00000 oor•0000•oo.I ^+ooa000<I000u000000coo o+1000 o0 oo.n000000000Ar ^- A

148

t1

r

^.. p ly

OO

NH

¢7V

OF-

W

>J

O nW <

z 2 u•-• H Wr 0

W Zm

<

z0

o NO

0

¢7

N

OOO

N V¢7

O OO O u

O W

OW > '-

7 ¢ OO 7

T O•• ZN O W >

On r <

O LxH J w

L 1 7Z O J O ^¢W 2 u < HS'-

O L 2O L W O a

OU N

> V 2 V ¢ ••• W O J uZ ^ O < .-n 9 HpW 7 f O a Z < o 2 n 2ti O /< O . n •• < 2 n V 0 0 0

a r u a o w< z•2 O o- < Y 2 "J N. m w0O Z r¢ N M O r Z

rmrZ

7 ••<OraWO Z

N. 7 ^.-• Z V

^ S0 1y

O2

J W Z W m WJ ^ N O O r. a r

rO O ••< 2 '-• V O l1

< l W 2 •^ W m LLr O ^- W •-•

H 2 J V¢ ••• mr W n ^r'^ 2^

^ m

♦ O O

^7 6 T¢ LH W OF

TO

N HN O O • • O O W •. O

O Y O ^ O O Z 0 0•.Z a. J f O O

O N 7 2^ O^Z O •. T O O < U

W J W O 2 N r L 0 ^ ."^ 7 > O OW T .. H .. O 7

W O RJ O

^~

•-. N OO L

ZO r.-N f V ^-w

n Non s w INY n

I .s N n ti^n w•• J ..

V •^ O .^ .] < W O WF. r v r O J O< O ••• O

H < Z< N II

W .L N .. ...-.

x' ^¢ LLO r O

N IIZ•• .. ..

O •-. Y f wW

2•^ V R< O N •-• m W p W l< O N

^ a a a = z N W a a a^ Q• W J 10

J N. p A •+'+ PO N••• J N • O A C U O O ^ N I n J N Y 1 A T O O ^ N N J N • O A a I P O r N I n J^/` • O A N P O ^ N r n J N^ A aO G O O 00 r r r• N N N N N N N N N N h H M H r h H h M / J J J J J J J J J J N N Y 1 N. . N N N v.A A A n A A M A A A A A A A A A A A A A A A A A A A h A A A A A A A A A A A A A A I h A A A A f^ A A A A A^ hr ^- ^ ^ r ^ ^ ^ ^ ^ ^ r r r r r '• r r ^ ^ r r r ^ ^ r ^ r ^ r ^ ^ ^ ^ r ^ ^ r ^ r r r ^ ^ r r •- ^ r '- •^ ^ r .-

149

ia

f

p •oo^s

- O p .. p .J p J ^ O

O Q 7 a p OO

Op N1

< ¢u t

< 7u¢

^ W ♦ U <I 1 uV p 2 Z 1 W

Q• 7 n 2

o slo z a

J O L o Q O o 0 0O O S

7 ^L ♦

1u t 0

u o¢ U

U f aN

o ^ o vnO N I Ot

♦ ♦ ♦ •+ ♦ O

O ¢ 1 I •Q u Z W O W N W ♦ N

7 O < O¢ J W f > ti W

O T lu O O < Y ^• t H I-O 0 2 W O 7 7 W ¢ ¢ H ti ♦♦ N 2 N Y Z 2 O- O W O ¢¢ T O N ¢ J O 6 N 0

J I r+ f Y ti N- H H W O • x X 1- m u ♦- 7 u ZH n<¢ N O O O X F f m f <O f Q N 11 L Z •• ► H ^- 1 II 11 N ^¢

¢~ ~

¢ u ¢ •• u 0 O I"I t ^- x •• •• •• •• M •• C ^-Q

J Wr U 7

U¢ u Z¢ 1"1 II ti N 11

t ^- 2 mH u W<m< w 2 2

2W N • N A NW V¢ I Y p O N • .• •• Z Z Z T Y. F- T W f V O f

p n• J ~ Z D< O x Y¢ w f .. .. N .. ^. ¢ t f '• m .-• m <<

N•F• < O< V J' f R p p p

•W V ti .•• U F• 'V U1 II /)

O J O G< Z<< L ^ i IIL p f Y p p 2 x Y 2< Y I- Z< Y ^- • • a< Z

f< Z .+ J J O W N W f 0 K L Z p n ^ 11 M Q •-• N Z ••• N N L Or• ¢ 4 < Z ti l] 4 4. Q W f J ti O f 2 ^- LL W W 7 0^ • .. Y a.7 ¢ J O G YI U¢ _) O O •' K S

Z l7 ry .-• O ^- 7 2 ti W O N W w W O < ^- NZ V W J~

K Q X ^- .p V 2 11 W ti 10 U Z ( t•ti W V Z• O ••. r .. s m 2 f f W M r 4 m W J m W•-. ID w p 2 V ^^ J I. Z ^- W .-. W u U Z L L •-• w .r ^2 Z

W

w 7u Ip

^ •^ m•-• 7

wx

P Or N^nJNaA TO O r NIIJr aAm POr N••aJrOA mP Or Nan JNaA ^O Or NMa JInaA mO O. Nnn O0 aaaa OAAAAAAAAA AOmR] mm OQaO mmP PPP ff PP P P000000Or1U00r

A I• A A A A A h AAA AAA AAA AAA A A 1- A !^ A A A A A A A A A n A AAA A A T W m m m a^ r W o W m Rl a •rrrr r r ^- r r r r^ r r r r r r r ^ ^• r r r r ^- r r r r r r r ^- ^. r r r r r r •- r r r r ^• r r r r ^• r r r

1f,,

1

I ,4^

11Ir

A

e"

z0

V< pD NO 4 N¢ 7d ¢ i

O d 1Z

d Z7 G N H M J ••a O ^- v O < .-<u w •

Rfu J

1 R a N z N >z W o u L < ♦ a7 p N O ti • 1 •. O 2pa

¢

7¢ O

O Y^ N

x < x< O O O 1 2 < 2 • JN N W J W J <•^ O S W 2 •« H W wO O ^ p .. '- x 2 v O N♦ H OR 1 1 ^ •O ♦ t ^ f ^- ••• ti J J xH W o f

>> O < v O A OL O w • ¢ ¢ ♦ I x J •^ N O

O < O p p a. ^ W H W 6 . Z N< N W 1t ¢ > ] <O H TW L xz f O ti p ¢ W N .. .. Z

N 11 • A H • (", WON Z u Q ¢ << ti H m W• J J¢ •"• /"• A O

7 W ^- O H^ r x N Z << < O O N 11u, u. x J H m F f ' 11 ••

^T Z N

u U uR R R Z Nw m m W=

rA N

¢ Ati W •^ < u 11

N ~ 1 4 Z •-• S f f 2 V •• A n > J ^- J V V^!.

••.. O H R W p O H H H

~A • •. ¢ Z •• < N¢ <<<^ H N

S 4 d O. A N•• > z ti •-• 2 N J^ J J k N fW /^ N R ti A 11 << f • •• • < H f W V r W m 0 •^ 1• W W p p <L V .. .. .. O p 0 Y 2 J 2 ► < Z¢ Q W I i W L« O N 2 0 •-• Z ul J^- Y f d Y R

K K tZ

R d ^L w i

d l7 0

•-• x JO t'1 W W

mp YI V u

W N wJ p

Z Y Y N < R G d S Z S •-• W N 6¢ Y Z O Z N W ¢ ••• W w •• O 1- W i] F H f V W F J f << ,^ m w J m

Z2

l7 7 u. p p < •-• W •-• W V v •-• W W

u^ A] •-• 7^J^ 7 7 7 m(•1 W p Z Z •-• w

ZW O V ^-•Z w w

W N VJ

J N d A m P O ^ N h .] If, •O ^ m O O ^ N h J N Yf h m P 0 ••• N n J r O^ ^, O O ^ N N O n n, P O ^ N n J N d n m

•-• N N N N N N N N N N ,+l h h r.1 ^'• H H h • f• In J J J J J J J J J J In N N u, N ,n N N O O O C O O A d d,n m m a m m v+ a. m v, a• m m m n m m m e a, m m m m m a. m m m m m v• m m m s, a^ a, m m m m a m m m m m m a m ^ n, m o,

15i

n o¢ O R Q O •.< J < J p .^V u ¢ R

<• v

tl u

•-+ J.n a >Y < .(

2 1 Z Iu J O U

3 l W p pp 2 O S u l pQ l • Q 1 S< p 0 < p 0 7 2 ¢ NV tV rJ u¢ O V J d 1-

.a ♦ O Wp u uc .-

F- > • J O > Or it i1

w ♦ L O^- L 71 .-• p O Q

O O ^r> 7 N> L L n ♦ U O •\ U O

n U ¢ N O O ti Z O H O O U ••H 7 V f J V • Y H W ^ W

zO H O¢

^+n m<7

L z00 ^ p'n n N ♦ ♦ ♦ .- •- sp

>.. ..

Z.. .. a m

• K ][ H Js

2xf

.. t oO L

> o O Q•-• TO

> <TW ¢! YI H H u J p O O T O U

Z > W f > W H •• F H H J O O N V•-• Q^ >• m ^ W }[ W W O • < A W p w N W N O < H

o f .Y Z<> •-

V H N2<> H

< fO r

W i L uS .. N

JJ

V O w p•. v •. W p W ^p v p 2 QU S •-.¢ .+ ^ N Z ^+ N ^n L •. <^ ! N N Q U J W O

H• Q 7 0 0 W 1 6 7 0 C > N .. •. W N 11 N N W W 2W^ m •/ Z ^n W f Q1 V 2 2 N • T N < W 2 •• .. .. 2 •• •• H ^-

W m w J m ^ 7 p 2 X V •+ < 6 p •+ • 1 ..•y W W m

32 •• ! •- U 1- uW 4 2 7 0 1- J J

<p

H 2O •••

•+ V<u

O NQ .S Q

p W ,> < p N¢2 N w¢ Q¢ S

O l rZ p Y R

2 p W •-• ¢ K K J J • • < t i ^! W m W J m W< K 4w Z N V<< W O O p W Ir W ti!

VW J W u 2 V u 2 Z x V W m ZW m W O •-• •- W

yZ p W •J •-• m nw 2 W 7 3

w < m

O OrNr JN •AA af A O•-NlnJrhA a1OO^N n J rOA mP 0Y• Nn Jr •OA nPO^ rJ N OAmO O^N roAAAA A A A An A of tb m g al 'D maf •n^P P P 000 O T O P O •']OOOOOU 00 ^ •^NNNNm ip T o al al !. •1 T al al s m al a^ O m n n o a) a) aJ a+ a, n T a) al ap al 0 O P O O P P P P P P O P O O P P 0 0 0 0 P O O

'.52

1'

4

'row..r.r

iI

0

<Va6OQa

4r AW (J

..• . 1

^ D D U• 7 J J O •.

Q Q O •. J ^w < a < d o

u u V n 7 J1 1 1 h< Oo

O 2 2u u

T1 1 l t u 1 7 a

. O O O Q Q•+ N . R Q 7C <

<L < O

N< I N K^ V

t O 1N p

V

O O J Y^ v J N .. v . Q 1 K p•"• < J W

.. . .. . • p.J z r_

N N W N N W U •+ p fr T ^ I- > T W ♦ R

O O• 1 I NN u > >L •+

^^ K < ^ a < Ta Q o T^ ^ T ti N 7 O H ♦ ^-^- s a na Q o<Q mQ 1 1 V O ^- V O ^- f. .• J

K^ N < 7 '- >t H V Jf ti ti '- ♦- n n M .. Q m k ti f J 0.♦ 2 NG^ W t0

N.O t[ WW T

ZN N W

WT. •• . Z

H a• W Ow 2 V M

Z a K T S ^ H> ^.• T f v•T •• .^M .. n ^ ti Q W J 7 n 2 N

•R Y •

•••

N N V O .-• r ti ! NZ Y T S K< 7^ << J

^> ^• K ti v <

Q RQ n a • R..z^^ .-•21-.. ^n n N z.-u^ uw r H i w T 7 0

R Qf V O a Q

W V O HO W V O< Q OZ N W V p ^ 2

Z N^ J

•• •• H Q l r J J2 J 0 Ja J J

J F w f J f K< u m w J m W .+ m N r .-• h Q w 0 01. V<< I .J V O O"W •+ w ^ J u .+ W ^ L L L O

Z N W V V Z ZW J m W ^U p

W Z

On

NH

U

v >7 ..O O

p no•O r o

2^W T. O

= W ^ O O^ r p 7WO

2n O

KnV

w n wp .•. O

JCi M N

D 2 .-• V< N OH W

QQ Q W

o•vwm2 T w

'^mZ S V•+ ti W

wrJ V •-• mw ^

N m<V

J N O h ^ O f] ♦- M• J N O 1^ 0 0 0 .- N rn J N A I. Ql P O D .^ J v+ O h T P ['I ^ .^ J N A A m P O ^ N H J r A h •N N N N 3^ H M .9 r /+ J J J J J J J J J -1 1/• N N .n N r 0 0 0 0 0 0 O A O O A r^ ^ A 1^ ^ A ^O O O O P O O O O O O O O O O O O O O P O P O O O P O O O O P O 0 0 0 (• O O O O O O O P O O O O O O P O 0 0 0

153

t1 ^

L

if

Z0

G a0

n•

n n 0 -O J 7 0 .+ P ►O G Q ¢ d N t

N¢ vu v N Q

Q f1 I

♦O

On

W • z2 2 V 1GJ

¢n

^. ^ 1 Q HR N O O J Z <

O 7 O Q 07 ^+.- O C t ♦ O < O t v. o ^^

N OQ O

tf V O u • n'-• O v n<1

JO1n

♦♦ n ., z s o

O o 1 ♦♦ R v 1 W O ^•1N N W V p 1-• p f

O N W O ^Yn o m .-• L •+ tiU r U • 1 1 ^ m r > i

rO ^

} <1 Q O ♦

N VS t ♦- t O 1- ♦

!♦ r•

^

p L ^•1 r r V ti t 7 H • N H u Jr

^ N Hti

¢•- ti H ♦- s_ m

•• n N Nti)[

x F H J O

un

N Z r S N N = •• •. .• O N W UW

Wnw Wp p

Wwm m zi ••

H Vi W z Y.z^ N • .iO ^ O S S t t W 2 •• 1-

^ I- N N n 1- .-• } H} n W J^ N 2 N^ Jn G •• •• •• m .. < a a s .. ..

• O Y !^ R Y 2 Y 7 f N u ` x NW V t p N O t¢ n n T p n l ¢ .r 2< Z Z N N H 2 t p

W Q¢¢ 2 ti! W L ti! w f 7 p V V O r •+ Z N . Z N .. .. ti n l ^- J J uJ m Yf I Y N W W .^ Q Q U Q O W V O¢ O ♦- J 2 7 p x J J nW f W f J H ^ f J •- < f W m ti t Vv u ► S r m n .• W O •^ Q n w 0 0 •• • f S

W7 ~

•+ W u V N W J m W I i L Z S W V f t 2 u V G •• VW W N V 2 Uu 7 S V

J m ulW w O V. .^ Qf

2W

7m

<

11

0 0 1' 1 J v+ 0 A t 1 0 U M• J N n A f 1 0 0 r N 1.1 J V• O ♦- a+ 0 0 r• O J r• • p A 0 0 O r N 1 J N. t) A I R O N I1Aa14 T1 b T TT T^nf P P P P P O O O OP

noC, 000 NNNNN N^ V Hrgnr

O O P O O P O O O O O V O 0 0 0 0 0 0 0 0 OOf.^00000 000000 00^'OOC^OOOOOOOO^^OOf)OO^ r ^ r ^ ^ ^ ^ ^ ^ ^ ^ ^ •• ^ ^ ^ ^^ ^ ^ N N N N N N N N N N N N N N N N N N N N N N N N N N N N N/ V N^ V N N

154 6

s 1

^1^

UV

1. •

o_O 2 W7 r O

V •^O ^ r

ai Or O2 J O 4•• O O

JZ

ti OZ Y ¢ L

O J ^ • ON ^ m .- O ^Y v I m r .-.J •m n

V t0/- 1: o

>>

Q>

••• '••z z s s p

vn L

2w 1- ^ a

N vo

UY

Y ^ J m •^ m OHO 00 •• a NVl

Jm ♦ •i OCU W

O O Zv 0-- T O O V

^O O

Wi.

r ^ ^ O O 1 N 1 1 > 0 0 OZ (• T ^ I W Y • y 2 r C U > 0 0 •• 1 1 ►Z Z S I N •QIn ^mm O _ L Or < J f •^ Y • O O ^- N O O ^ Lm I J h Y n J J R M N H t Q n L ♦ NZn

^ YJ ^

/t T V•• L

J •• .•n

10 n O •• AV

W O Wp r o

N W NW p W f f f ti ••

N ^-!- ti

O m f .• N J ^•^.

••^ r ••• r n ^ O a N a• NO

M ~M T .. Ql Z •• •• •• •• T ^. Z r i NV

••N

^•R W A p W m T W r

J M y 2 W N T O^ W N N W Z •• •• 2 •• •• W 2 2< I T

UY Z u

m V •• J r p2 v V1 ti S m Z'

♦•• J •n

H m ID O.•+ V<

WO N

R Q •[p W 17 f O N GZ N W t R Q Z

O •• ••f ^ .. ..

••^ n V J •-• 7 , RI

WN m Z W m Y. J m W O Y> Y T

Y m V •-• J •+ V W J W O r W a 4 O v p 4 ^1- Z^ J W J v 1- m fD 7 W W ^• W Z •- • W f. •- I W• ^ pO •+ W •^ T T

WN m 'Y I t^

T VW 61

W Jr W .-•JW

► W `- J rW

^ r•- J f

•-• W v v

•m

P u b A .[t I♦ O• N r J N e A- O O N r J v^ o A r O O N Mt J r O A n 0 O N n J N V) r. 7l D O N M J r O N nr•1 I1 ^t N1 .n Nt J J J J J J J J J J N o Vt vt.n •n r ' n • n V t 0 0 0 0 0 0 0 0 0 O A A A I. A A A A a A n n n n Yt n n n nO U J O U O 0-- ,2220"

U O U O O O O O U O O O O p O 000 U O 0 0 0 0 0 0- 1't O V 0 0 0 0 0 U 0 0 0 U U U U n NNNNNNNNIV NNNN N NN NN NNNIJNNNNN NNNNNry NNNNN NN

'-1

I

155

1^t

E

r"

('4)

OF F -.

0aWQ

o e ^.7 ^ • O ^ J

< \ ^ 7 Ju V 7 3t¢

f R O U1 1 < u p

z u 1\7

\s} ^ 1 Q. o o ^ c a

a.na o.nf z o n ..

N •••• O. f 1 < Om ••. a •D v ` n a J t

a 0 a S T 7^. p M O F N

H Wf f^ r^

V♦ v < O Kn

m u• F C^ G^ I- W^ L •+ L

f 1 fL w •-.•-• O H •

T•- ♦ W

tW

Z^ T. AN ti Z

V U H U G H N< J f • V J

• • •7 t mm.• K

x r J O>< Ju p

SO

_ .. .• •• •• .. .. I- H W V.. . Z I •I Z V •

L N a N W • I• W ••I- •• •- ^ ^ `- T \ w J J • W Z • N

Y 7 .- T^ r f ^ .. K H> •

n•< a

> l'I T •- S O W ^.! T •- N OIX

••a •• f 2 H J J u lW rJ < f Z N W U a a l

•. T V [l •- W J O V O r Wti J

7 ••• m -/ N WO. • r[ J J

T 7 0 W •> O •<O

•- ZO r

VT V• V t a Oz Lv•.mW V u c•.

J m W OW Z O

f1 .-. H WV .-. tp

•.

W ZW

w ^< m

O

ZL^ n

O • QL O O ••v O .- OO V T ' O'2 J > O O< m 2 •+ = O

Y^ J f O THU O a V

O• • V J r O

rO V VN Yw T ^. .. ..r Y Y O .-•

^ J N J •^ V< p N pT mJ

O f a 7- m Y

O O ^ N r J r d A fl O O ^ N •n J N e A n O O r r J •n O A n O n r n; 3. J N O A n O O ^ N I^ J r D A .n O O ^ Nm O P P 0[• 0 0 POP 0 0 0 0 0 0 (^ U 0 0—.-^ N N N N N N N N N N n/^• n/ n• n .^ n 1 r n -/ J J JO U O Cr O O C^ O O O n/V N N N N N N N N N /V N N N ----------- N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N

]56

I^

-•K—

hr.

to

v o 0< o ^s 1 1

0_ c: op p O P

• 7 J O •• N N

D T u V n n J7 ^^ J

1 1 s ^b = = t

• ) 7 V 1 < < R^ D O I¢ V y p^ N 7 Z

O< U f 2 0\ 1 1J T < ♦ A u O V 2 1 n pU O V (f v O .. p. R =

O •♦ ♦♦ f c v o .. Jr h 1 s rr TV R U ti) h) n O tU p 2

• O V .. I 1 r W> T ♦ ♦ .N m N m h Y t^ T Y

U n n O¢ Ot ► ^( h^ U ^ O b t L L V F V f N J h> r 0 ti h N< 710 . x x ♦- Jr T O H r n 7¢ x h ♦- u JO L N .. .. .. .. m w m • • Z W T h J Oh R L^ Z •n W W T O x J yH h W A p W .p m L Z J 7 n J J n x W W OW G w r r n w 1C w• h = ..

n^ .. ror.n n .. ...Q V• Z Y S H Z h f t- V 2 .. . T ^. ..Z •. •• •. O R p. n ¢ n 6 n 1 t .-. 2 .- •-. Z N h J ••. L x

f ♦- n W n ♦- n W L 7 D ti V O¢ n W l7 O¢ O ► Z N m V r O W O W V J N W D T n 7 Aw V< ^ N p IL ¢ y H T N V H L N h^ W L L S Z N W L L t l r 7 0 a• J Jb b l Z I♦ 1- J I- •- J h f< u, m W J m W ^ .•^ O^ u, m W J m W p rl V u f F J JJ m ¢ w ul r W u V •-. iY m l r W Z N W f< W Gl UW : m u u T v 1.

^ W

------------------------------ N— 1V N- N N N N- N N N N • V N N N N N N N f ♦ n^

157

J N O A f C P O .- t n J N O n • 1 0 0^ N/^ r p A t O O .^ N M -t 3 B O A to O (, ^ .n J r. O A .T O O ^ N Y• J Y• O n nI J J J J J N N ./^ h Y. N O O O O V O U O A O A A A A A A A A R fu 0 0 n) O 'D •f aD .n T P O P P O P P P O

1`I

Zy^ ..

. 0.4

loe

zUH<l7<OUs

CL o

0 a<o a <o = u u0 ^s 1 1

z z0 • ^ z0 a .. .. N o

`¢ > > o T < • u 0 u p0 0 o a ^

Oo

O O ••oO

_O J> F

Y WJ> f

..r

^' O r• O O ^ W O O J r J rZ

^ O ' O o K F- 6, w H m •W 2 r 0 r 1 1 r f V2 > 0 0 O ^ < ^ K - h K ^- Y

>I- Z

H.-. S OO L

> T OO

W =O

<r

¢O

¢ ♦ O r 2W¢ O

V N 2W¢ O

JJ ♦ -

2 ti OF- L ¢ ¢ L L xx of .•. u u,ruO O O f rr+ ti W Y ti ^

N W u H t ^- H F H % A n n n A• A W O W N O VI Q N x x .. .. .. .. .. .. W F-

< V O .+ O W ^Y Z N W W Z y Vd J r v r O •+ O Q W O O W m m Z 2 Y W

¢JO N M 11 n n 11 M

W ZH^ Z<

Y< 1; Z J> r

Y J .+J> fJ r •• i••

N V W 2 •• .. .. 2 •. .. 1 .. •. n .. t .- m K H ml H < O .-• •. .. H u ^- V .V Y IIV M1 r IJ < O 3 1 O W tJ < O N O p Y¢ 1L 1L Z Y Z r• <^ J: N<^ J ••

< F 2 W Q Q¢ 2 1/I W Q¢ Q 2 < R r d ¢ O a 2 Q r 0 2 .-• O N Z • • JO O .-• W m W J m W H= W T Y L W 1:J O ti V W R O O W tJ W¢ 0 0

G K Z 2 IJ r W S W h W Q Q W N F u 1! •/f W N ^- u ZZ •• .^ ti J H •- J Y K< u. m W J m W 7 AW O •^

ZO AZ 2 IJ W m

7rW •+ W U V `• W

N ^I

W W 1m

O Or• Nn JrA1^ mP 0r• N r1 J r CH TO O ♦ Nh J V\ OH C1P O^NHJ r 0I^ a • O Or• NrJN .O I ^OO^ ryO U O O O O O O O O O r r• N N N N ^, N N N N N n r r l n ♦ r I. r M h. n J J J J J-^ J J J J. n N u 1•/^N N N N N N N I • N N N N N N N P N N N N N N h I N N N N N N I V N N N N N P, N A' N M N N N N M, N N I .. N^N N N .J N N N N N N ,J N nI N N N N N N N N N N N N N N N ry N N N N N N N N N N N N N N N N N N N N N N N N N N

158

try

.1.= 0.

OF - - -

Z 1:1

> p ¢O W ^ 't D ^ OI o u T O r 2

Y ♦ O W r > W OO> 2 u J JN f ^> U W+ O^ <<

J > L V> w 0 N N .^. ^ OC W O J J X ^< s

• p O r 2 0 < < r .< R u N II1 N ^ N ^< f v¢ YQ 1 ¢ ep .. •. Z r n p N .. ..

•• W ^u •• 11 ^ r n O N < p f V V r VM . n< .- r • N r 0< Z<< L O• t J n W r n < O J x •• 2< Z r J J V Wx J W O •-. W O •( Z '[ < ^- r N Z r .-• W p N .r Q ZJ p N Z r V r w W J r^ W Oa N Z N v 2 •- N 2 p m l 2Z N r 7 r r 2 T 0 WW LL n .W+^

YJ

rJ<

m<

2r<O

OO

OOr

NW Q r

¢ OJ VO ¢

o U2 ¢ O

r oNO J7 O ^ >

Z O Or ^ O ¢O F r

^> r u Z

O ¢m > OL o

• r-. >

f ^ > W wpW^

2 > W O r N N K O << r••• w0

O uJ JQ<< r

I.I. r Vr K<

^< W 1. n O < r v N N W OZ ^ < Q r .. .< <R V n 11 N O •. LQ W .O N/^ V¢ IU p W r n O N • 11

Q wo r o <^^ 7o N¢ N e N

.. .... r n< un< o zr ^< N R¢ r < O t V V r•n n<o ••u..J xxr oa zaarrNY f 0< 1:J •7 n r ^- U < i .-. J J X N W Y '.O< Z Y << •• ^- T (^ 7 r V r ^ W W p J Gr < Z rN i t V

J J Jfp r N. m

x 0 ^Yw G N

•. S r .•. W p N Z O •-. ID LO r r 2 mWW Z Z r .-. W r O N L Z •^ Q L r 7 O

O.-. r `+7 m W 7 Tr V r 7 ^ uv w 3m

Wr

Zf

On

NO

J h hA s+P Or' I. I .nJ r OA WO. O ^Nln J r pA ATP O ^-NrJ v^ 0A a + fl ^. NrnJ N BOA TO O.•'N1n J N •p Arn^'O !` JJ O'n 00 O'O DA A A A.^ AA I. AAD JO muf sl^mat a.0 ? P P PP P P P? P 000000060

fi IV' I N — N — I•. N - NNN - Nf• ^NNNNNNNNNN Nf^N NNNNNNN !`I :J-NNN--N--- 1h-h- InJ N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N nl IJ N N N N N N N N N N •J 'J N N N N N N N

1591

t^c

rY1 ^.

OJ o<

O •• Op .•. O

n K2 ^ J.. N Q

2 < r1 Q

^ OV 1 Z u O OH ¢ W R N

J 7 l_ 2 7 0O 1 r 0 0 J ^ O

Ov - I =

0Op N

NJ

^Q7 O

Q •^ O pN d^ O J n ♦ ••

< On O • T . •. JO r ^ LJ ^ •-1 > O ♦ O O HJ > w O< ♦ W [^ J J L x

x vwi .n i n..-. r ..> w 0 ♦- W S WW p Y J J w aO 6 J < < < 2

•n<r. <^

ti ^ ^]2 '^

Q u R .. .. O Q f. x x ti J O

n ♦ O Q W ^- f f V J¢ •• •. O O

•W ti d O N . .. f H ••. J O •+ O .•.

U¢ W f d K Q¢ 1•• x }^ J V • ZH d J 4 •• O. •• < O K V l7 ^- W Z Z V 11 r- V

^ d < J .• ^- n Il r 7< 2< K L O Z ••p K 0,V x •• 2 < Z.-• JJOw n

.1. w<K O< I H •^ S H 1.. ¢ N O • .• .. W N N Op < Zr<

—«r s Y Ny

S z s <cdS r l7 h e'f w w d 0 J .-• S d Z H u ^-

=H. •. ^-• L 2ONO^f fD ^ p 2 7 p H JJ.. jIp 2 w¢ ¢ x JJ • . vvv7

W O W V<< W 0 7 0Z N V V Z V V 2 • ♦W J com W OW ^ O

W l ••W O O2 zW u.

:

:

J

¢

4U ^dMti

O

.- z

• ^dec

K V ♦ ¢• F- W W 2t 2 a-.

Z • •+ H OO

d p

R d OO

• Od

¢ Z ¢O

1.

O O N n J v. Q I e 1 7 O.- r 1 H J 1 n a h. O? O r- N H J v.• o r• n 0 0 N H J N O W P O . N n J r d A m 0 O r• r+ r'O r• ^ N• V N N N N N N N N H H H H H H H H H H _. .. J J J J J J J J 1I. N 0 0 0 On n H M n n H H H H H H H n n HHnn H r . H H H n H H H H M n n n M H H n Y V l n H H H H n H . n n HN N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N fJ N N N N N N N N N N N r. N N N N N r y N N N

150

z

C.,.

^^ NY Yn 2 Z7 7

• ^- ZJ 1 1 O

UZ S 2 N

^ O O O N

L L r,Z

0 0 0 O N Z Z Z 2 ¢ n0 0 ^ O < < < ^ W^ ^ Y ¢ d S Y L•• •

¢ nO 7

n r^

YZ

Z^

W^ F F

Z u O ^^ V T T ¢ ►• ] T ^ n i

W W I W 2 Z Z < < N F 1 >I L .-. L Z p ¢ v 1 Y ^ n n

J ^ J Y Z > >^- n Y n • Z •• O O O v v 2 Jzz z a^W w ^

¢ v,L

In .nT

¢Y •. < t ^-p p p O J J J N J • L^

7 7 u > > O ^ m a v lu u < O^- N N < < N

' N u Y •. Y JZ 2 N N Q V W 2^ S •. fJ J J L YW Y w J Vf 7 J^

J ¢ J < 2^ Z v^ a !t h O.w> ¢ J n 7 7 n /- i• n x>> .. ^ 7 7 7 7 O < O O J ¢ U

V N N V n n )t ^ k. 'if

< a • ON T. O O O:J^ O^ O^ O^ O O O U O O ^ O O t 7 0 0 0p ¢ .+ L O N N N^ N N N V^ N n N • • N V l N ^ N ^ N •• N

v • •N 11 ^ •• Y Y ¢ L W > > > >•• O .J ^J ^J .J ^J ^a ♦ n ♦ J .n .n

2 W W n nnnn J S n <n < n<n n<n<2 .-nr< n Z ^^ nnn l unu '- un >>> ^V 77777<

01000.xM - 3. inn 7J 7J .0 7<J1- a , u 7u 7V7t7t 7<7a

O<O C^ W O ^ O N (' i nn 1• . n x x x x x o n x 0 x 7 x J x .-. x n n x Y x Y x n x N x T x x¢ x¢n 7 7 J 7 7 7 W 7 W < 7 0 7 0.. ........ 7¢ 7¢ 7 J¢ 7¢ 7' O W 7 u 7 u

Z < < •( •• t 4 < « N N < N f N < V < n < .- < N < n « < n < d t d «7 Z^Nn

R R¢<n .-.

v v- v v Y). 2 2 2 Z Z

v vZ Z

v v r v YL 2 L Z Z

vZ

v2

z2 Z

v v r r v v2 Z T 2 Z 2

.- V w w p LL• R J J J J J J J J J J J J J J 7 J J J J J JW ^ 4 a Z ^+ ¢ W W ¢ 2 ^Y w W ¢ Z u W¢ l W

rm wJd O n n n nn nr.n n n n.-. n n n np p ¢ p p W p Z p ¢ p p p Z p r w p p p ¢ p ¢J 3 3 1 .1 w m 3 3 W J J l 3 r. 9 J l w 3 .-• m 3 l 3 l l 3 W

J V7 m 0 O^ f n J^ Vl A T P O^ N II J 1n h A ai P O^ N M J V. •A A m P O ^ N h J 1n O n m P O^ .n J v •ff A TO O 0 0 o O n n n n n n n :- A A p1 0A aD 'O R1 T A 71 m up P? .f. T P O P T P P O O O O f J O O O O O ^ ^-^ fn h In - - H M - h -- - - N M1 N H h Nl M h J J J J J J J J J J J J! J J J J J JN N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N . V N N ^J N N N N N N N N N

161

f,

I

it

^ r N NY Y Y Y .. J Y YZ Z Z Z Z Z

^ a ¢ a ar r r r • ^

¢r

¢rWII I I I r N z z N

1 > Yr z zI o W o _m

`.i M o 0

r r O r N N N

I. O O ^- O r NZrW

i rI A L L r. r r L L t

t Z 2 ••• Z •+ T O • N Q z Z Z N 7> f •. L ^. < . L < . L < J < < <¢.-. N NN Z •• Oa Y u L L 7Z N

r rW 2 w w z w < .+ J O ¢ r I- r < < 7rn < W r< r ♦ O ¢ a

W rr a wmrmwmr m Wc^ rY r >- 2• r i i r i L vt r Q W z Z ZJ^ <¢

rp i W m. - m- Wr r mY L Z7O 7 J

O VIr .n J .•• J. >• ♦ J m O ^. 7 Wv<. O• m N O N m N O N m N ¢ N N N p NJ Y H V Q N

r ^ 4^3 ^ ^ R ^

•<^J ♦ J L L L

< N Vr r. 2 2 2 r

oaiaoo<af Nr..

< •-•r r O

Jr 7

J>

J>

Q2 . O

o- oa <o C .. or o r.••m^

V r'J DO v000 u •J 00~

^ Z 0 1 N < <- A - . ♦ . ♦ . ♦ O 2 7 N N J^ J •".W O Q W W

UO.-O O

O . OO • O

• O • O O OO • O • O • O O W

♦ nO S •

¢R u

J •• ti •• < ••J^ .^ rv+NmNO NTNONTNRI NO N V 7 7 r 71n D- ON <r Of O

. S - - I/I - I/• - - - • • O J J J J J r O♦ r . r r ♦ ti ♦ r ♦ r ♦ r ♦ r •< ♦ J ♦ J J J ♦ J ♦ rr V f7< 7 • f

f7

rN -) M m.

•-• r .+ 7 m 7 m S m mD x7 r

r r 07 7 J --

O O f 7 O <r.-O< O< O f 0< O f Z.- J J uO W 0r O Y O ^ O ^ O ^ O ^ O N O N O •^ O CI LL •• •• ^ O 2 ^ J••<_•f t K¢ K 2 r Y< Y< x >< < K r •.( . . . W r .• A .• O • J . -7•-• 7 w 7 J 7 2 7r J 2 7r 72 7r >•.• 770 ^ O O O~

< r < p < ¢ < O < < < O < < < O < < < m < M1 v N N J f . - r N^ v0u

v V vOv .•.pU

Y YZ Z Z g Z 2 Z Z z z 2 z z Z Z z z z T z Z z z zJ JZ W J

tir J JO Z w J J J J2 w W ^

J J J^ '-

J J J J J 7W W W Q J7 J J J J J 7R. z •-. r ^ r r r r .- '- f- ^ f- r rW V •-• O •-• V ..• O W V w O .-. U• •+ O •.•

W¢ r¢ ur v Q 2 1/I w a ¢ a 2¢ Q C ¢¢¢¢¢ Q Z R a rt OJ m J • Yr l •-• m l l W J m 1 > I ^ W) ^^ 3 3 J 1 J1 •-• W J 1 W> > 2 i .-•

J O ^ n • n J r a A RIP C I• N• n J 3• a A R I P O.- N r n J I n a A T P O•- r J h a A m P O.- N r n J^/` a A^ P O r rNNNNNNNN r rr•nrnr r•I -f f J J f J J J J JI/• /^^ A .^+a a a o a it a a 0 0AA AJ J J J -J J J J J J J J J J J J J J J •f J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J JN N N N N N N N N 'J N N N N N N N N N N N N N N N ry ry N N N N N N N N N N N N N N N N N N N N N N N N N N nl N

162 I

I,

F

OF PGCiR:+. •^^ 1 r'

11

NN 2

r r N N ^Z O Y t Y WO

zZ 22 L ^•7 7 J 7 Y¢ ¢ ¢ m

ILiT N -

2z t< ¢ W G1 N

Y L ^ L ^ ti ••• C •••• ^- . WY 2 W f N O N I-• N O N F •^ •OJ Q W W > > L ^' ^ L •-ati 1

T L ^ H •-•} .. > •• 2^ •-•< Y f Y

N Y H Y N Y •- >Z .0 •-• m Z Ill u m

L N O W< n

1 Y W a Q1NT < T i i <r!. T 2^ OZ 7 f r Z. ti- Z. m

Q r aJx aJx Zx W 2x ^^ N ♦ N •Qr N t •[ J Y N J N N H N W N f N ¢ u

J U N ^ N Z Q. 2 - Y -• H ^ W!

NQL

^ N • f A Y n Y n J •'• f A J ,

f•J o Y O

m• m •o F O O r O

► rm

V FO •-

a .. AA

2 Z < < n O C) G I O J O Y O J C^ Y O TT ^• Y J •• J •• 7 J¢ ♦ O f m ♦ O^ m ♦ J o J W

z •• z •• < o Q •o ¢ o 0 0 < o o W t W Q W W Wo

< o . QJ o 7 0 .-rL ^ rt ^ o ^

.- o z o n1o< o o <

ti •• 7 r O O•<m

2 • r • 2 • ^-o m< m o m< .o

ow O 7<^ N r •• x •• x •• x •• ^ •. x u m n ^ o •- ud •• W 2 D

J > > ZJ

O•-Of^• f

O AOtiU V O u0 VC Vf

O u0u1- \ N

O^Or♦ N ♦ N

O fOHO ^O^- O\O

Of^ ^ '

r•^ ^ ^.. N • N .. f . H Y T m Jt Q• Q) QI r .. J

Q D: ¢ W Y) 7 t H H < fi

z 2 z 2 Z 7 2 Z Z 2z o

2 2 u 2 oo z z o z <

S u Z o Z u Z O.. mz 2 Z vJ J J J J J J J J J J J f J J J J J J J J J

Z W W w •mil W Z ^Y W O Z W Z W^~+

H f H H f f '•o• .~+

^- Z r H ••• H F 1- ♦ H r hoo• n W u .+

w v Q a Q Q a Q Q 2 N W Q a 2 a Q Z N W Q Q Q Z Q a s 2m 3 1 3 1 J l J J 1 W J m J 3 w 7 •-• m 3 J ^u J ID ^ 3 1 J w J 3 J W

J U l• O A O 1 P O N r • - f V`• O A O O.- N n J V` .O A m P O -- N n J N O A ?) P O N n J Y` • O A m P O N n J Y`• O A a)A A A AA A ^)mmm ^ m mmmmP O O P P O A O P P OO 00; C) 00 ••• r• NNNNNNNNNJ J J J J J J JJ J J J J J J J J J J J •. J J J J J N N - N V1 .. V• -- N N V` - vl N hN N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N

163

• <

t

N

e-

>

H

<

Q

W

Ud

Q

W J

•-• WQ

Y

^ J

w t

<>

H

F V - J¢ 2 ti ..O-

O J • .H

.. ..rf ♦ ♦ Z.. (L r O 7

N O . •• ^ OW .

Z ♦ V ♦ W ..7 < N > >

• L r

w. •> H V V Z••• n Q ♦> 2 J ♦ 7^- 2 JP <O •^ •• JO

W ♦ N Z> . h w O

uN t .

> ^ Z rW d Z . < J Z•

J Z 2J r N h w P f 7 R J 7 7

fH> a- D m e-r H e-f ti1-H H H7 7 7 7 7 7 7 7 0 7 7 7 7 7 7 7 7oovon000pv000^^op

x x x x x x x x x x x x x xJ 7 7 7 7 7 7 7 7 7 7 J 7 7 7 7 7

Z 2 2= Z Z Z V V .. _ .. v v 2 2

W w w J J w w J W JW F W F W F V F2 > e- e- e- e- e- fV Q Q Q Q¢¢¢¢¢¢¢ Q Q¢ Q a¢W J J J 7 J J J » > J 3 J mm Jm

JM

w O

^ H^ u

< Q2 ^

J

N >J u2 w ti

W O •+S ! L <> ♦ JIn

O O 7

o m.A ..V ♦ V\ e-

Y J^ 7• W W

O e- Y a N

Q .+ Qv o

OO .•. u J J ♦

O ^ n J a ^O N •• O A P

O O Z \ ^O O <

Q w ••• < J A v¢ 7u OJ •• O J.•.

U w • W •• . -J On

< .u.. o o AnD >`

i / W F H f H H •-< W 7 O O Z 7 7 7 7 7 JV•OC2 Ten •> 000000O u w u O<• x x x x x

i r+ 2 0¢ J •• 7 7 7 J 7 77 J u F W • W <<<<<<= H p > v

O¢ 2 r• d N< v v 2 Z LO H W w < Y v^ J

w w WF e• d n ^ < W W u^ W W^ d 0 .• Z J T O H I- F- •-• H H

r• ^ L r.• p> Y S V O V. Q Q Q Q Q ¢ D

n •• < O e• w i ti J 7 J J J J W•• i Q en m

> V.•.n Q rQ O 7 u2-

••

• V•

• o

• Z

1U

O

w •

wVm

PO r•NrJ V•ar. mPOr• NnJhaA nOO^Nr JV` aA aIO O^NnJ r` aA ^P O^NrJNar mO LIrNMr ^ n n r r M M n n n h •I J J J J J J J J J N N N r• 3. 3, r• a a a a 0 V) a a n a n n A I^ A h A r. A A .h Qf of mV• N •/^ N V• •!• N V• N V\ N V\ h N V V• N N V• N V\ N V\ V• N r h V• V\ N h V• V\ V• hN N N N N N N N N N N N N N N N --:2 N N .V N N N N N N N N N N N N N N N N N N N N N N N N N N N N N rV N N N N

164

II

TP, I

a% Am

OF. POU't

0p0O

a z

f,o a o 0

27O

<L NO O . O N C

x 0 0 0 >>>> ^>> OfJ w(J^O

T .- ^ 2 [lu t < «

J J J J J J J JO II O V I W W W W W Wz .• a >f; L, 2 pppp pogoO •+ L O ^- N Nu H p S 2 2 0 r. O X F w O x >

J L fi W O O O K Z w O K L •'• W

¢ Y ^ L 7 Z 7 n 1- •..< ¢ C1

uF Z O Z .+ p W > w . 11 11 tl M • tl tl 11 = r

O W O r O H Q p W N O w l J < .. .. r. .. J .. .. .. .. ><

n O> •• K w Z a < L I r u Z ti a > ti D uJ L ¢ O T w H ti> O O N n tl w 2 II •• J Y> J tl J>> J > WO W H L f• ••• ¢ T¢ V tl tl •• ••W ti^ W<< u w t< ¢ tiU ••+ L •-. u F• W

^•.. p n 2 0 J J 0 t p J J 0 W RW F- ti L F! H v f V• II ^ f ^ R J J W W p 1• J ^ W O

Y O v ^- f nT W 2 ~ •+ < f

v Y w Y O Y 2^ O f 0 p W 2 J 0 f 0 A W w p T¢ W H < Y Y f Q N R <¢ •+ ¢. Q I- •••• O X ¢¢ H r••. O x ¢<O J .- W 1 2 W 11 n 11 C Y O H¢ f W> J 1•• > IJ << O¢ Z H O 'f << U¢ Z •+ O ^]^f <

TH

p p ¢ • •• .. f y< 2H¢ 2 K •

F N>J

W 2 W I. O F R W r =♦ O- W m W

W U v H R W u. TID W

H S WO •-• 41

2 T Su u r r H ..

D u ~ m Z l ~Jw Wl

J N • A N P O; N- J N 0 I+ m P O N h J —0, f P O N /1 J r •O T P O N M J N V A T O O •- 3• J •/. n n TTT W f) ••f OJ? P O T P P P P PP O UOOOOOOOO^ •-^ .^NNN NN NNN•nrr nyr N yr d r d O •O O •O d d O •O d d <] O d •4 O •O •O d d <I d O^ •O O d d •n d •O .O d r d v` hN N N N N N N^ N N N N N N N N N N N N N N N N N N N N N n/ N N N N N f^ N N N N N N N N N N I • N N N N N N N N

167

1

I

)

JOOWx

L

• O21O 2 ) Z JQ W < W L )S J Su f W ti

p J• n n

i x < d ) Q_ W ^% • W v

W p )a v

^Q r< Q )

L a J Q J O <w p W J

Q QO O

♦ n pO ♦ J

wO

N) w

I< Hx O•••

Lx )

J r< OWK< W W W J ^•• Q

Q JO W J J J J J

O Wn ♦ O U ^

O ^Y W W W W W n •••J J x 2 W 2L t •+

r l x l L 2

W O r 0 7

OO F

N J O AW W

K .^ Q .+ OQ

N N y ♦ y O <♦L T

< < < < Z2 11 2 1

7 u<

2 w O •. 1 ••Q l 2 Z 2 2 2 2 2 Q O ••O p O O O O O O < X Q x 2

QN < ••. f - H

y ^• < ^-V 1-

l KO ^-

L u 11 x x Q 2 ^-O O O O O V W A w f W xQ 2 A< i 2 2 2 2 2 Z 2 V Z WC r n J• 7

2 0 2 0 T O T 0 2 0 2 UW V W V W

K •.. ZV

x p 2 r S r 2 ^ 2 v 2 ••• 2 r fL m^

~ ~'ll ^ w ^- W H W 1•• W K X X •••.

F C H f •- ti H ) W ^- aX ^ 2 '• < N< N< J < v< o < 2 Z r ir z• ri 0! cs oL nr oL o z•+ .+ X..v n s d a n av W> r - W> u. 7 W 7 W J V ^ O 2 Qr

7 N ¢] w

K Nr

OmN

x <L <

O

) NJ MJ< mNA ti

2N •. uW Vvn>i

♦Q tiO u N< HN r

<W

F ♦ <W O< L >

Z ^ TO < F•W •+ ^1 Q m >r

O . 2 ^ Z 1- Q ^- OT p y o. 7 r • 7 ^O J O J o Z •• o n a 0Q Q Q Q

2 << << Q W y.. LN 7

ti 7J u

W ^- V V V V Y > N F N U< • 1 A N ^. F- - TO Y 2 •• •• Z •• •• w K J J

O D < H ti >W ^- H Z N w I- H 7 J • ^-

O u. m W J N Q V Q KJ Z '• W H O • p< TW W Z

7

(t) .I

iI,

J

00-•v- J V, .&O^NMJ=a .f O^N'n J ln aI 11 00 .: N nJ N aA ffO O^NY•J in OASt pO^N rM J J J J J! J J J J vl N r0 N N V• r N N a a O a a a 0 0 a a A A A A A A A A A A iD •O ^O 'a •O aD T •n •» 0 0 0 0a a a +! W a a a a a a a a a a a o o a a o <l a a a a a a a a a a U a a a a a a a a a a a a a a a C a a a aN N N N N N N N N N N N N N N N N N N N N N N N N fIN N N ry N N N N N N N N N N N N nl N N N N - -N N N N N N N N

166

a

h

_t

ir

,I

I

M M M ••. h I^ O Mp n p J n•• n

• ^ D N O O U ^ UW

Z 2 c^v.a as OO O •- J J O•-O

F OC+O ^^ NQO H

dNp N

A A A A A Uw iC) O O O U

n o z0

.co z 000000o Q • •-• m oR R V

w p 2< J f O J O N N ON

yN •-•L J< O lv aa0

Q N N W Q< t O ^ J J U CJO O J W 'hO vI Q OUO ^7 ^ NQR

OO

0O

J 2 2 N w• O A A A A OOOO OO C,

• W u UOOOOOy..

= O V h J A Y Nt Z z o a• a ••DroveQ r` J a <OJ

LQO^u •a o NO N N J < D I C O O Y• M v •"^ O AQ ^Y Z •ti OONA aIn J N6 J i O M ^• A I• J N

O L O a A A .- a 0Z

•.O< n ^I II •

O O C) 0 0 a Y 1Q 0 0 0 0 0 0 0V 0000000

= W I D O•. Q

W O n O N J J a J OJ D 2 001nA a^•rpt

W= H

ON

U U •' ^ ^ A A JO O •^ A A ^ a

G O I C < R ♦ x 2 00 N J N A OW J Q J 0 0 0 0 0 0 0

^

z O V 2 V z p O wC) O CJ O O M N L m

Q < Q Q G Q Q Q

< NQ n p ^

^J 2 Z ^- J J

J O^ O• p l^ W p Q p A A A A N

a H T DOgo

I I I I O NN U

0p ID O I„ M •

U O O N u n • II•- '7 O

E

1' •

167

IN

APPENDIX IISummary of ISO-O SI Model of Distributed Network=_

Layer

Definition

1. Physical Concerned with tran=_.mis=_.ion ofunstructured bit stream o k . , er physicallink; involves such ;.arameters assignal voltage swing and bit duration;deals with the mechanical, electrical,and procedureal characteristics toestablish, maintain, and deactivate thephysical link. (RS-232-C, RS-449, X.29)

2. Data Link Converts an unreliable transmissionchannel into a reliable one; sendsblocks of data (frame--.) w ; th checksum;uses error• detection and frameaknowledgement (HDLG, SOLO, BiSync)

3. Network Transmits packets of data through anetwork; packets may be independent(datagram) or tra ,)erse a preestablishednetwork connection (virtual circuit);responsible for routing and congestioncontrol. (X.25, layer 3)

4. Transport Provides reliable, transparent transfero+ data between end point=_.; providesend-to-end error recover y and flowcontrol

5. Session Provides means of establishing,manaoing, and terminating connection(session) between two processes; mayprovide checkpoint and restart service,quaran t i ne ser y i c?

6. Presentation Pe , +orms generally use+ul transform-ations on data to provide a standard-ized application interface and toprovide common communications services;i.e., encr yption, text compression,reformatting

7. Application P rovides services. to the users of GSIenvironment; i.e.. t ransaction ser,)er,file tra rl_.fer protocol, ne tl;jorkmanagement

T h i s. =_urrimary taken from, Local Networks, AnIntroduction, b y 1.0i l l i am Sta.l l ings (STr LL84] .

168

t

V..

U APPENDIX IIISimulation Software Module Descriptions

1. Simi.

Simi is the top level procedure of the simulation

program. It controls simulation activity and flow in

the simulation environment. Referring to Figure 4.2,

the first *hree blocks perform v ariable initialization,

define the simulation network configuration, and prints

a description of the network in the auxiliary file

Auxout. The loop indicated is the actual simulation

activit y (described in subsequent sections). Simi ,.► ill

print compiled overall network statistics to the system

default output device and to the auxiliar yfile Auxout,

b y invoking Printstats. The procedure Activitysummary

prints a breakdown of the network statistics b ydevice,i

to the auxiliary file (Auxout).

2. Initialize

Thi=_ procedure is used to initialize certain

global variables which need to be spec if i ed for each

executi o') of the program. Table III.1, is a. listing of

the interactive queries posed by thi s_ procedure, along

with an yconstraints in-^olved. The remainino variables

which do not re-auire user-intervention are also

initialized in this section.

169

t1

4

r

Table III.1 Interactive Queries Posed by INITIALIZE

Quern: Is there more than one Trunk ? Y:es or N)oResponse:

Y or N, if answered yes then theflag Trunks is set true, otherwise,Trunks is Set false.

Example: YVariable: Trunks = True

Query: Identification heading for run:Response: Valid re sp on ses. a.re alphanumeric string

with length less than 50 characters.Heading appears on each output page.

Example: Simulation Configuration TestVariabl y : Heading

Query: Maximum run time in secondsResponse: Valid re =.p onse=_. are real positive numbers

which represent the time a simulation runwill execute

Example: 40Variable: Max time

Quer y : Maximum Successful Sequence Transmissions ?Response: Valid responses are rea l pu_iti-^e numbers

i,Aih i (:h represent the number of sur_cr-ssf1.0message-with-data sequences will be

F transferred over the enure networksimulation ends l.kihen Maxseqtx or Maxtimeis exceeded

Example: 1 ii0oii0Variable: Max=,egtx

r

Query: Seed for Random Number GeneratorResponse: Integer number. For best results, the

number specified should be an odd,positive number with :.t least 5 digitsand not divisible by 5 or 7.

Ex am p le: 16227Variable: U

The following queries will be posed if Trunks is True.

i^Query: Was the last Run a Single Trunk

Configure.tion Y)es or N)oResponse: Y or N, if answered yes, Inputmode =

interacti -je, thus forcing redefinition ofthe network. If answered no then the

` tolIov.iirig query, will be posed.` Example: Y

170

t

^- ^j

i`V'

Variable: Inputmode

Query: Input Mode: I)nteractive or F)ile ?

Response: This query will be posed only ifthe 1 as t run k,,ias a dual trunkconfiguration, this is indicated byanswering no to the above queryIf answered F, the network configurationused will be read out of the Dfile. Ifanswered I, then the network will havebe redefined t: y the user

Example: FVariable Inputmode

The following queries will be posed if Trunk=. = False

Quer y : Was the last run a Dual Trunk configurationY)es o,- N)o

Response: As before, yes will 'orce redefinitionof the network and no vji 1 1 cause thenext quer y to be posed.

Example: Nt)a.r i abl n : Inputmode

Quer y : Input Mode: I)nteractive or F)ile ?Response: A before, answering no to the above

quer y will allow this quer y to be posed.The effect of this quer y is the same asabove

Ex amp I IVariable: Inputmode

171 1

,01111111

3. CharacterizeNetwork

Procedure ._haracterizeNetwork eata.bl rshe: the

experimental framework of the simirlation. The

individual adapters, devices, and sources are defined.

There are titlo +ays tc establ i sh an exuer imental mcode r ,

interactively, or trom an auxi 1 iary fi le (N i ) E). The

method employed is de!ermined b ythe t.al,,? %)f

Inputmc1jr, defined b yprocedure Initialize. if

Inputmode is equal to interactive, then the System

description will he Nrovided b y the user interactively.

A sub-procedure P,ewriteDfile w i I i be called to store

this interactive system description in the Dfile. If

Inputmode equals +ile, then the system description used

is the one stored in the auxiliary file (Dfile),

implying at prev i ous run where Dfile was created

interactively. A detai led I istinq of the ir,ter:active

queries posed 'b y Char ac ter izeNetwork is presented in

Table III.2.

4. PrintnetCescription

The p- ,tee o-i th i s procec;ure i s to pr i n It a

detailed descr,,-itior, of the system being modeled in the

auxiliary file Auxout.

5. FiadNext(Tmitter)

As prev iou=_.ly stated this model is a discrete

event simulation. The event which drives the simulation

is an Zdapter's next scheduled transmit time. The

1'2

tM

AT-

►.. ,:,rte ^ , x

Table II1.2 Queries Posed by CHARACTI-RIZENETWORK

Query: Length of Trunks in feet (used for enddelay)Trunk 1:Trunk 2: ( appears for dual trunk )

Response: Fl o s,iti real numberVa g r a.bl e : Trunk 1 ength [ 1 ]

Query: Number of Adapters in Network:Response: Integer number in range 1 to Maxrnumad.antensVar i abl e : Numotada.p ters

I n the Dual Trunk catse the followino query will be made

Query: Which Adapter is Common to both Trunks ? •Response Integer n,imber in range 1 to MaxnumadapterVariable: Comm--d

Query: Adapter #i: Distance in ft. from priority 1adapter otr Trunk 1

Response: Positive real numbersVariable: Ada p ter[ i l .distfromF;l

Query: Adapter Priority: Give .n integerform,i.e., n = 1,2,....

Response: Pos i t i v p i nteger numbersVariable: Adapterp[il.Pl F

Query: Adapter Retry Count: This must be a uniquenumber for each adapter, in the range 0-64 4

Response: Positive integer numbersVariable: A.daD`erp(il.retryct

The following two queries are made for the commonadapter two both trunks

Query: Distance ire ft. from priority 1 adapter onTrunk 2

Response: Posi t i ,:ie real numbers')ariahle: Adapter[Commadl.DisttrtAl

Query: Adapter Priority: Give in integerform,i.e., n = 1,2,.....

Response: Positive real numbersVariable: Adapter[Commadl.P2

Query: Adapter[il.Device[jl desc.lptionDevice status (Open or Closed)

ReeEponse: 0 c C. C if Ada ,,i ter, [iI Device[jIhas an active, network ae ,:) ice con-

171

1

Wi

J w. 1I'

nected to it. 0 otherwise.Variable: Adapter[il.DeviceCj].Open

Query: Device ID (<= 24 Char)Response: Alphanumeric =trinqVariable: Adapter[i].Device(il .Id

Query: Device to Adapter I/O rate (Bytes/sec)Response: Positive real number representinq the speed

of the de k.) i ce I/O port.k ariable: Adapter[i].DeviceCjl.tferra.to

Quer y : Number of Uata Sources in Device(j]:Response: Integer number representin gi the number o+

data sources supplying the device with dataVariable: Adapter( i]. Devi -_e[ .jl Numo+sources

Quer y : Data Source(k) ID:Response: Al ph anuineri string with length 214

haractersVariable: Adapter[i].De-,ice[j].Source[k].Id

Query: SourceCk] Data gen rate (Bytes/sec)Response: Real number, representing the rate at

which data arrives at device.Variable: Hdap ter Ci7. De l) iceC.jI Source( VI.Genrate

Query: Buffer size in bytesResponse: Integer number, size of buffer filled in

device before network transmission isrequested.

Variable: Adapter[il.Device[j].,:_,^_.-_i^[k.].E;uf+ersize

Query: Receiver Id code ? (0 to end list)Response-3 digit inte ger number, representing

Adapter#,Device#,and Source#Variable: Adapter[ iI Device( j].SourceCk:].Id

Query: Probability ?Respon=_.e: Positive real number to < number 1

representing the reIative probabilitythat the Rbo ,.,e rece i ver lyji 1 1 be tran

k mitted to b y thisadap ter Ii].deviceIj].sojrceCkI

Variable: Adap ter IiI Device[iI Source IkI Prob

I {

II

174

1

4

Il

procedure FinoNext scans all ad ,+pters. and picks the one

with the smallest next time to t r ansmit, compared to

(Currenttime) =_. emulation time. After selecting one

adapter, it will then determine if thi s_ adapter is

reserved for a. reception of a messa ge sequence from

another adapter. If the adapter is reserved, then it is

forced to wait, if not reserved then it is returned to

the main program as the current transmitter.

6. PickA(Tmitter;

Th i s procedure i s used to p i ck a ^ece i ver for a

transmitting adapter. The current transmitter's

at,^ibutes are passed to thi s_. procedure, and an

aop^opriate receiver is selected based on its list of

possible receivers and the relative probability of the

adapter being a receiver for the transmitter, . This

procedure also determines whether a transmitter is

attempting to transmit to a different trunk. If

:kt tempt enq .a dual trunk communication, the trans_.mitter

is assigned an intermediate receiver which is common to

both trunks.

7. ACollision

The purpose of the boolean function Ai=olli s_.ion, i

to determine whether or not the current transmitter has

unre s_.tricted use of the simulated transmi s_.sic-i medium.

If another device attempts to transmit djring a time

period of equal to, or,less than , twice the

175

1

I - — .

119,

bi

W.

propagation time between the two, a collision condition

will be declared. Thus. ACollision scans the network

devices comparing their next transmit time to the

current transmitter's next transmit time and determines

whether or not a collision has occurred. In dual trunk

simulations the function ACollision will scan vhich

ever trunk is being used by the current transmitter. If

a collision is declared, then collision statistics are

updated, and both the current transmitter s and

colliding adapter's next transmission times are

updated.

8. Uniform

The Uniform procedure functions as a Random Humber

Generator. It genera r e- oseudo —random numbers in the

range u < number < 1. This procedure is used in various

sections of the simulation in order to inject some

randomness in the selection of receivers and in )ar>inQ

some time parameters.

9. Update

Update is the procedure in +,v)h i ch the bulk of the

iYPERchannel protocol is modeled. As pre ,.^iously stated,

the simulation is. driver, by a. discrete e k.-ent. This type

of simulation is often referred to as activity

scanning, or event scanning. The event which drives the

simulation is a transmit request b' e an adapter. Each

device is assumed to possess certain attribute=_.

176

t

t;^i

bl

31

determined from obserna*ion=_ of the real system. As an

example of this. if a device receives data from aniii

off-net source to transmit over the network at an

average rate of 15 Kilob y tes per second, and stores

• this data in a r:byte buffer, i t wi 11 request a

network transmission every 0.1365 seconds. This then

serve=_. to generate transmission requests for the

simulation and in turn, bec=omes the event which drives

ithe simulation clock.

This procedure consists of seven cases, each of

which updates the current transmitter according to

where it is in a mess-ge-with-data sequence

transmission. The time periods involved are illustrated

in Figure 4.1, where the individual cases are indicated

and the program flags that signal the case an adapter

will go to on a transmit request.

iCaael: The first time an adapter signals a request

to transmit there wi 1 1 be no message f l a.gs ac t i ve ,

indicating the beginning of a message sequence. Case

air i 1 1 be invoked and the adapter wi 1 1 reserve i tse 1 f,

initialize dela yto 1 usec and retry to zero

(reservation scheme), set M1 true, and adjust its next

t me to transmit by 64 uses.

Case2: This case incorporates the adapter

reservation scheme (Figure 2.9). An adapter entering

(Case2, Lase3, Cas.e4, Cases, Case6, or Case') is first

177

4

. 6J,)

checked to see if i t is involved in a col 1 i si on wi th

I other devices. If no collision is detected the adapter

is checked for dual trunk communication, if it is, then

an intermediate destination is determined. If not, then

the adapter's intended receiver is checked to see if it

i s reserved by another adapter. If the intended

receiver is not re ser-.:, ed, then the receiving Adapter-

,,,j i 11 be set reser ,:)ed. Appropriate adjustments to the

various Iran=_m i s__ i on times, bit counts, message flags,

and trunk parameters are made. If, however, the

}

intended receiver is al ready res.ervr-d, the tr ansmi t t i ng

adapter o.i' iII enter the retry-delay re=ervation schemet

and -ts message flag will not be changed. Thus, the

ada p ter will -1-urn t,_, Case!. °each time selected until

it reserves a receiver, or ;kborts it s tran=_•mission. If

a. col 1 i s i on is detected when ._ n ter i ng 'Case2, Case 3,

Ca_•e4, Cas-e5, Case 6, or Ca=_.e7) then , appropr i ate

adjustments to adapter and trunk ,iming is made.

Case?: Th i s case deal s u.)i th the message proper.

portior of the message sequence. If no collision i•s

detected, adjustments are made to the adapter And trunk

parameters.

Ca-e4: This case is essentially the same as Cas.e3,

with the exception o+ the values used to update adapter

. and trunk parameters.

lib

W—

IM

.1

Cases: In Case5 a determination of how man y data

c-equences need to be transmitted is made, this based on

the size of the data buffer of the transmitting source.

The first sequence will be updated and if more than one

equence i to be sent then message flag l •14 will not be

chanced. App; .^,,r i ate t i m i n adjustment =_ anti made i r.

this section also.

Case6: When all data sequences have been sent,

Case6 i s invoked. Appropriate timing adjustments are

made in this section.

Case7: There are three pos=_ibiIities encounte^ed

in this section: same trunk communication, adapter to

common trunk adapter communication, and c=ommon trunk

adapter to adapter communication. T h ? last t';Jo in

cimbination c.mpri_.e a dual trunk communication. In all

cases this is the termination of a message sequence.

Both, the receiver and tran=_.mitter are released, and

appropriate timing adjustments are made.

10 Printstats

Thi s pro ce dure compi les and writes. to `he system

deta.uIt output device, and auxiliary file (Auxo 1jt), an

overall summary of network activity. Examples of this

fE fol 1 ow:

179 \

Sinqle Trunk Simulation Results

*** End of Run 1`le twork Statistics ***

Current Time : nn.nnnn secs

Successful Sequence Transmissions :nnnnn

Collisions (Frames) :nnnnnMaiis (Frames) :n.nE+nn

Total Attempts (Sequences) :nnnnnTotal Aborts :nnnnn

Total Trunk Act; ,je Time :nn.nnnn secs

Total Active Time :nn.nnn f.

Control Bytes Transmitted :n.nnnnnE+nn Mbytes

Data Bytes Transmitted :n.nnnnnE+nn MbytesTotal Bytes Transmitted :n.nnnnnE+nn t1bytes_

Total Offered Load :n.nnnnnE+nn Mbytes

M

Dual Trunk Simulation Results

*** End of Run Network Statistic=#*Current Time : nn.nnnn secs

Successful Sequence Transmissions

Successful Sequence Transmissions—Trunk. 1SuccessfuI Sequence T ranSmis- icns—Trunk 2Collisions (Fr.•.mes)Waits (I+ Frames)Total Attempts (Sequences)Total Abort=_.Attempted Trunk —Trunk TransmissionsSuccessful Trunk—Trunk Trans.mis=_ion=

Trunk 1 Active TimeTrunk 2 Active TimeTotal Trunk Active Time

Trunk I Ac t i ,)e TimeTrunk 2 Active TimeTotal Trunk Active Time

:nnnnn:nnnnnr nnnn:nnnnn:n.nE+nri:nnnnn:nnnnn:nnnnnnr,n ',n:n.nnnn secs:n.nnnn secs:n.nnnn secs:nnnnnn is:nn.nnn:nn.nnn %

Control B y tes Transmitted Trunk 1 :n.nn Mb y te=-

Data Bytes Transmitted Trunk I :n.nn Mbytea

Control Bytes Transmitted Trunk. 2 :n.nn MbytesData Byte= Transmitted Trunk 2 :n.nn Mbytes_

Total Bytes Transmitted :n .nn M bytes

Total Offered Load :n.rn Mbytes

180

I1. Activity Sumnary

Th i s procedure prints. de to i led t)reakdown by

device, of network activities. This summary is printed

to the system de+ai.jl t output de l.) i ce, and the aux i 1 i ary

file (Auxcut). The categories detailed are as follows:

Time Active: Time device spent trans-mitting and receiving.

Time Waiting: Time de l) ice spent waitingto transmit due to itsadapter t,eing reserved.

Time inCollision=_.: Time involved in collisions

b y de l i ce .

Average MessageDelay: This is the average time

length of a messagesequence sent by thisdevice. If this number is0, either the de k);ce can`ttransmit, or it tried tobut never sent an entiremessage sequence. In thelatter ca=_.e, mes =_.aq_e delaywould have to be > thansimulated run time.

Abort count: Number of aborted tran=_.mis-_.ion attempts (reservationscheme).

Transmissionfount: Plumber of succe s sful 1

transmitted sequences

Reception Count: Number of successfullyreceived sequences

Wait Count: Number of times. devicehad to wait to transmit

OD

181

1

V

Collision Count: plumber of times engaciedin a collision. (note:these numbers are actuallydoubt e the total shown i noverall statistics due toone count for each col -

I lidinq adapter.

of

W'

M;

182

._...`^.. -- — -- ----^--•c- ,,mac: • -.,., .

- .. . 1

APPENDIX IV

T ypical Single Trunk Simulation Results

183 11

ii

OF QU' L" y.

)1

1134

m0W ONO W^) N

W OH

P Um H OOO W r ] U

1- OO < NO nO JH.-O W 2< J ^

} t N•..N m H Y f7 Q .-

< r • O O GN• H Q 2^ •^ 1 1

O W•Y fJ W> ♦ Z •N OO•• 7 u W W 2 •• .<OQ Q^^ V n w•. H

I J O J ' N< N Z •+N . N 7 J •• ••

NW O a 2 < •+ O .+ Y T<W W na Va•.- -N F• = GI u N l •.

N N l• Y Z N^ n O a m m."• J •• W H J n <<"J

T O p W a W m Yl alN W V ^[ W O O

U O ^^^ a W r n Z a> a RO P ^ rp •- > u- 7 J •..-. p pO o A m O W 7 0 Q<n o .,o < C L QmN^ Au

Ow^u 7w Y.V 1+ J Z •t p

O 11

a - z 2

Z fl J W a n 67 U ^ •.t O

v ZH

U r) 1)

^ •o r z ^+ oZ U J J 7 l J Jn . a o a •-

^ z •- N n N •/. NJ !) o- wW }Q <

> r NY• HJ < s •- N H J

.. } ur J.- D Y Q W A D

• R Q J W uo W< n W a n

a r H< ^ J W > >A .-• n Q m> T Wp r •- Y

6Q

N uQ Q A

ON u uO W

< a o- a

SO

n

u ^• w a

aV At <

2

IN

2O

n N•

W Qo w

• Y nn oti

• Z

tip

Q

OF F:. •; ^r^ ,._3^'l^

n

W

>m

H

m

O OJ W O

• V`

IJ W O WO N O NO

^ J G ^ O OU p > O u

o. no m 00v• o.O W^V O •-U^ O ^ OO t rJ C < c)O /

¢U ••U

O ill J N C J OZO w 7< O W Z a O Nqu •-O >nN Ov ^ O>N r

N m.wn ¢p N m^ ¢ ¢Ua ^- • 00 00zn.^ ♦nan¢ rte .♦ •• C] N O W .•. • (l N CJ W ^.u p W ♦ 2 N O ul O W ♦ r w) p1- O V u 2 •. .a0¢ .U'^O ^ > U W 2 ..<O¢ZNJVO ^Q O 7 N / U 7 W N ti H

UU J <N Z •-•N 7 J UU ^- O <N L'^/ • N d f N 7 J ••U < p W 0 7 u O1 ► < J W •• O 1 •' T>N T < V f N ^ Z Y m J r a> f .-• r T v m J

N A W Z N• ¢ ^i Q m O S N r♦ R O/ mNO .a J J d .~ f O a ul e m m H J d <~ i (• W u a W m mO ^/ # ^J r1 ¢ V W V Y W O

O O n n W >.♦ J ^^ •-1 d Nm u• >u. 7 7•- •••do

vG'L Ww 70 oaa>q 1•. O Z a O m N a- D u X O< L O ill N ti G V

O O - O D&di•+JZN u< O z

OO W

o >.. JzN dO 1 1

• 1 W 1 Wu u o ¢ o ¢

I N ¢ ¢ = 7# ^ • O U aI

Z V - Jr

Jz

• d70.-•- u u u o

1- O YG' 22

zO^ N O Nz u» r 7 r > >n • o o < < ^

< 2 t N r[ N In vJ •• n rt > nJ a ¢ ^ N n - I

> W JH G W/ W O W O

o w. o W t W s^ f 3 J W > J lu > >

Q ••• OO W T> W m>d •. •-< o n n n

^^ W urV.le •I n n

185

O

d 1.1

¢u ^W /

• Y d^ o0

Z

1^

z +J70^s c^> 17 Yu^2 0 7O • Q•7 >< Z

J aJ

.. O0

U wq NC• OO ^O •-

OG U

qh

-U

(I

OF POOR Qi. ALi rY

W

m m mO p OW n W O ON N • VO W O W1"I N O N N NW C] O d.- O ^ r O O

N r O •••^ ^ O m ^ O m O O

•/• 1 N 1 r.J 1O O • W OO u 0 0 O w 0 0 O W N

O OO < O O < O O t mO •• L O ¢ •• O O •• I^O ¢ JO r O JO.- O ¢ J vO W Z a 0 O w 2 < O 11 O W Z< ^- MOU '-O>O••• O U 1- O >O•n Ou f O> •-••^N W > •-• r O • N W ¢ O • ••• W Y •-• 4 N

N mH NRNN N W- 2 — MN m••WOQO

• 0 0 0 a Y • 0 0 0 < Y • 0 0N R Z N W 1 1 N N¢ 2 N •t 1 1 O N¢ L •n

•• O N O W •• O N C W •+ •• O N O W ww O W ♦ Z ~ N O O W O W ♦ Z N O O W O W • 2 N OSOU w 2 • ^O y W W 2 • YOU W Z ••<O¢ __VV — — <O ¢ N^ V O ^^ <OR h•'^ V O¢ O 7 .. H r ¢ O 7 ••. Y Y ¢ O 7 rr H^

t)u N a N2 •-• UO N <NZ •-• t) V ^ O aN 2•+¢ • N J J ¢ H N 7 J ¢ H N 7 JWO N<•.•O.. Y Y W O N ¢ <•"•O •+ W O N R <•• O •-•N < •-• m w < •-• m w < •^•Z < T •^ ^ S Y m J J Z < T •^ - 2 Y m J J Z < T n• rr 2 Y m J< 0 7 •-• < U V ^ < O 7 •-• < y O •-• < 7 •+ < V V •••

S N^¢ O tr m m ¢ Z N a¢ 0¢ m m ¢• i N s a 0¢ mr W • J n << •- J D << H W W 1•. J 6 <

~/ 0 7 w¢ W m m m ~ 1 0 W¢ w m m Q: 30 C W m CN •-• u Y W O O 7 u W V Y W O O w V Y W O

J!O un >•.7 J^•.n 4 ^m W m>•^ J ^Y •-•A 4 efl •Y >^ 77^•-•Oo m W 7otr < o m w 70¢ <•- om W

n o< i a c w— o^-x o< z N o o N^ o u x 0<= N o rn N^ o u m N^ o ya 0 7 a a 0 7 n 0 7 w>.. J z a >•+JZi a ..JL.. a

1 1 N 1 N1 W 1

O n' ¢ O ¢W

M N 6 N ¢ Z

O O O

J J J ^

•. u S V = U S O^ f f

2 N ^ O N ^7 J Z J z 7 Z 7

u < < a <F N Y N Y N H

Y N R N Q N Q N¢

> ^ > ^ N > N••• N N w N N

y¢ W O O W O O W O

O •+ •+ ¢ r r W tr uV V

^ ¢ 6 ¢ tr W ¢a > J W w > J iu > J W >

D m >> m» m> W

< O D O ON V

O W W O w W O WO R R p R R 4 K

f

^e

.m

1 2O

♦ H^ J

• N '• W ¢

o wYan a0 0• s <

2

186

\1

OOO U0n r•

nO O

(1• u Or u J

Y^ ••2 OJO ^ ^•tr O

O Y HO 2 2

2 O J 7O a O

O ^ uT< 2 >w .. o ¢O >

J t .c> W J

J r O WO W

R ¢ O J Hf ) Y.a D.¢ r-• K r <v . O D

0 IL

<0<

NWH V> Wm N

u o aW O aN •P

U PNW P

Pa

m o 0a 1

O •• P WO ) P O

OO < OO N J ry ^O W S< N ^O u H O B J

> r v Oh N ^ m H W I^ ¢

U •• n¢ LP•.• • O N O WW O W ♦ Z^ NS OU W 2 •• W< O¢ ^ O U O¢ O 7 Z

V J N<N S •+r N 7

W O N ¢ t ••• O .+J

< ••o i um^- m w N <

Z < i H ^ 2 Y m< o ^•+ a uo

z N r¢ n trR H ^ J O

i ^' W ¢ w mJ N r V YJ ^ H V tr •-• .. ¢ Z ^ .-.r m ^ n W .. 7 ^

o a. ^ N tr < uo<=NO n ^-o^ O 7 T

p •-• J 2 N d

1

wv

OJu i

OJ 2

<

N ¢Y

^ Vtr

^ Jm

0Nna

> W •m N

V O PW O PN .PO PNPO> P C,

m o 0P ^O •• P

O W P O^ O

O < rO W J NO Z < N NO u ^- O^ JN W > r ¢ Qr N m'- w

•n¢ 2a •^O N OW O W ♦ Z^ N>Ou W Z ••< 0¢ N O V O¢ O 3 J0 0 N< N Z

WO ) tr < •+O ••+

•-• m W <2 < v i •^ ^ 2 v m

n< o t17•-• <uoa 2 N r¢ O trr f w u. m Y J ^

I O t W v W' m^ N• -. J U^ u Y W^m V W•♦77 ^an o m 7 N¢< u

f. < L <om T•OU 7 H

s •+ J 2 d1 NI w

Ju T.

N O7 Zr a

N

N

trV3 JW m0

n0

H UT ^um N

u O PW O P

•PO P

NW PH P> P ^m ao

P WO •• PO W P U

OO < OU ¢ .. NO N JO W 2 < ^ 3 •U u H O 7^ JN W r Y ••• ¢ d •rN •n ^- W1^ ¢

/) ¢ 2 P u•• p N O W '.w O W ♦ 2 •A> p u< O ¢ / ^ O u O¢ O 7 J •-• > f

O O N< N Z ••.tr • N ^- N 7 J

< W .. o a u m^- J m u N

2 <^ 7. ry ^ Z Y mJ< O m 7 •-• < u U

v 2 N 1 ¢ t^ ¢R

W •O ^• J 4

~ L O < W ¢ mN N r J V U Y

m W W W .^ 7 trJ .-ev om u 7 0 <^

O < L< O In N I- O VO 7 Nd •-• J 2 O

1 N1 W¢W

r•of Wu x

N p7 2

<<^- NN ¢

r y

vW

? Jw m0

N0n

OO

7

0

187

QO

t.J1

.1

_O ^N^.. o o ^ v v ^J uO

O O O Oa .^ n

ur r ^ Q'-` .-A TY

Z2-1- _n^ v o o r vw ou u¢

r^

>+N

Z0

N fr =N O P O ^OZ U !n N1 MI A A<¢ N

Nw 1m m >T

L L LLT

H 1N 000

O O O ORZO 7 O O O O O

O ♦ ♦ ♦ O !D JO a u

O P x♦d ^ W A O O J

V^ P JN A O

NJ

A VI A P J A NIn J r O tf P

L a J J•• •. .. •• •• L O O O O G

.. •. .. .. ..•• JN

N 1 1 1 1 1L < /1 J M♦ J

^- O V W ^ ^ N N NN •-. Z T O

HT Of W

<

N N < v 2 NZ .-. 2 O O O O O

fH p O O O1

O O O

N N L N WT O O O O

^O L O

t•• JJ O ^ O U O

O O O^ O 7 uH a W F ^W O Z T r- D W2 J H .'•

N N 7~

7 H r= W W A W N f •r7 u i L W wL Z•+L O¢ Z« N ^.+ <L N < O O A O

W a¢ w H N Z O w p O O 0 O7 1- 2< J Lr Z O O O O IJ

O •• O v v N u w f¢ O O O U OO

HN O N

a T N¢ HW ^-

D 1-rO O O O O

2 L L f Y H ti N ¢ <W J N W¢ 2 u > N ^

•- 7 Z H O O< m W ti^- O H m 6 f

H a s ^- J J r IG O• Z N N O m

.+ N J Ju J F< f

J ti< O

¢ JH<

J< T W O ^ 'O N

u .l .•. f fO~

2 1"' A u Qf M> > p a 0 0 O t O O f W A.• . O A O N•^ N u^ H H f N u 4 H ^ .-. TH w IV T

• W O• f Uf 0 o O O Z O OV< J L

f¢ W

DA

4 J^ z uN

¢ oT J WW Q - p N W ^ 7 N

W f Od 1- W 7 flp ! ^ p N u N F ~ /< L < N

¢ON

ON

GT

138

o

P

O

O

OOWO

O

1 O

O O OJ O O OW W WC1 A OO O O

C^ O OO O OO O O U

U O U OO O O O

O TN O 7

PU U JO O O O

i7

m m'^ ^ 7 N< r+t

7 J Jtr^ d W

`^ J u J uI^l d N < t

d W F d 6Z 1i N ^n y^

189`i1

k

APPENDIX V

T ypical Dual Trunk Simulation Results

190t

••

• 2O

• r• Z ^

• • u e♦ • N• • W Y• • D• t-

Y a ^• ¢ t• • O D

• 2•

Nf>m

u OO•y

\ O wO N

W O^ O Jm O O

p w O O^ O

O t OO ¢ •• OO J ^ ] ^p w 2 < OOu f- O>O^nN m ♦-wu ¢o

< ^ • U O•7 .. ••I W y •1 W W

•• O N O

•F ^ .0Z N OO V W W 2 ••

H< O ¢ O V yaoo ry^0 0 '• K N L• N H 7 J

u0 < r0 •+<¢ W •. p i V m H

u r O m W N < rN Z < T •^ .- Z Y m J

O < O l 7 •-• < V O •-•N N^ .. Q S r!^ O Q m

p W V w W W J n<o ... ow.W,wv m mO 2J N Y W U

U O r u V r .. ¢ z <^ ao N m > 4. > > ^ n0 o m< W^ o Q

O ^J-t Lr omN^ouO O \ O <

O n J Z O n• p

' W• V O V Q

WN ¢ 2 2 2

Y ^ •• U W W2 J V w a n nJ O ••• •• ti

O O OQ o

O z 2 N D N N N2 O > > J Z > > >

> H N H f N< 2> N W N NJ •• Oa rY Y W .>• ryn K >

Jt rc ^ WN N r J> w J

••• •• ^ W Q W Op W b r

! Qo J•-O w l p w¢W Q .. o D m T W WH 0 r H < O O D ^a ^n wK N VO O W

•♦

ZO V

6 NJOOO

• Y nO

O D• 3 K

2Y2a

• 2O

<

1 n

N1-e Q

n

n n

191

11

4

A ^.

m

O

• O• O

nUO u

• O N• w U ^u

< n R^ ¢ 0 7

uoi

NI OW < 6

••

VW

N f U2 u

O NN N N Q .

• Nu W ♦-w u. WO W F n

• O N N N w H• O U Ul ¢

i • 0 0? MUI U^u• O O I O nl u

♦ 0 0 0 0 7 nO O > J Z NO O 1O u

1O

^ •N M w

N• Z N N

u•^ • R Y Y

~• 7 7 ZZ Q Q JO Y r- O

J7

^ • Y T Z< O O YJ QW Y Y •-

N

•• M

J J ¢Y w U•

r• H O O ¢

UI! Q O J f V

O ul a A

W ¢ .-• •7 O

nOt

OF Md

!

O W

Y ^n <O OF a

2

!I^I

EI

WHm

vW O

Ll WN O NO

r•Pn

Um OO r• • WU W O O

^ OO an •• nO . J MO w 2 < J ^

♦ - O T M NY W N .

<'- 00 OM ¢ Z^ u. l l

. N N O uw U w T + Z ~ N O O

V W ^ W w 24 (^ Q O ^ ^ V O -• I^ M

NU J N a N LN < r N J.0 O a R < .-r O r Y Y

••os umti^V ^ 2 m W N a wW t a d! ti ^ Z Y m J J

N V •• Q 2 N! Q n ¢ m mu v ^ .-w^. W .-JG a <

Nn NU O

r n n w¢ W m m m^ N u Y u 0 0

U P ^ J f a W W¢ Z a T Q¢O O O m O w 7 0¢ a r

O O U 0 4 1' T O O N H O UO O O ^ u 7 wO O O+ J Z R dO • 1 ^

0 1u O

N IYn ¢W

N I •• N Q Z Z 2O W w

J L O N J ^ O JO ^ •• 7 0 u ti

O O :7O O' n YO Y z Y O ZO .^ Z•) 7 J

O 7ZUR

OZ

N7 7 7

• Q V O • ^- < ♦- YY Z F N f f H

Z Y < p N Q N N N• O ¢ J

W Y Y > r- N< Y O t t •-• J JJ a Q J J .- W N M JUI J F W W u •. .•O W

O wO O W O p

Q H •+ WO J ti ¢ O J Va n n W a e Q

x ti< .-. x ti > J u > >I•. O O •-. O m T> W W W

N w wN V VO Wn K R

192

-1 T

^ ` •141. ^ c.' .^

- - -_

OF NUvIt

WO O

N

rm u mO W OO N O N0- N O WO N U NO O r J OJ U O O

o m o

0 0

• o00

ED

U a¢ J ^ U Z J N

O- W S>~ O u W S S~

r O R N W r O Rm r rOPI Q. r r 000

h K 2 V. ♦ N N< 2 ^ ♦ 1

O R •+ W •• O N 0 6 r W W

♦ W N O W O W ♦ W N U Ow 2 2 u/ 11 W

^ O W O r ^ l 0¢ S N J W O r•- n•u •.r Qo Jw ^..

^ a

u u a o /rl ..<uNiJ 1-0 O Q •- r ... > >•f Lnlr < J w ..a n mr r

W W O N a W m w O N 4 •-•

7 •^ t 0 •-• < o w J •^ <Orz N a¢ Q m Q .• o z N s Q Q m m

rnK r•u •-aa<W¢ u nl 7. p W W R W n^ m

u Y lu O •7 •-• R ^ V K W O O

w^ O Q r O T r W 7 /7 6 rO m N ti u x 0 a Z•♦ O m N r u

< ^ U ^ OD, > •-• J T N pN 1 N

1 W6 O Q

Q

01r u zr r

O •• OZ Z< 7 <N R N

N^ rn > nl r•-^ N r

W O W O OR r Q r •-•

w Q QJ ^ > J wm > W m > l0

N Y/ YN V V

O W O W WD R O R R

NfmOO N

N O wW O N

U Om

o• o •• o

o0

_• O ¢ J

O N f JO u w > >

•N W r r O¢

N Y •+ W 2 N N♦ • Dlr ^ Or`O• N< S w l l

~•• O N U¢ w WW O W ♦ W N O •7r O u ^ W 2 2 w

• • <O K •- W O •-•^^♦ • • ¢ 07 J •U •-•r

U OZ • • w O No • • < . r.m^•-

N m w O N< •-•^ J Z < Z ••/ ^ I m J Jas a o 7 •+ < p ^•.

♦¢

P N N ¢ .• Z N i Q Q QI m. n a f

O u ~{ O Z w Q u " !n•• U N N N r V Y W V p

W R U^U ern ¢.•.. n 2> Q oO W •• 0 0 a J ^D u p > W O J •+ n n

r •♦Y n ••

C 0•00

O (nw^ O R rx 0<L N OrD N•-u

• R a U O O a^ o^ n0 0 0 0 > .-• J 2 Z .l7 < •H

• O O 1W

• •o v• o ¢I N J W

♦ • • 2 N N J•

7 •¢ Y Ix

V 2r

♦ • Z 2 r♦ • 7 I oL ¢ ¢ J

wZ

• • OH •-Uu

J fr

• • > Z 2 <• < O O ►

J NO f < W

> r•n

J J ¢ r• J > w• r O O Q W O O

W¢ O J F•

W ¢ o-r •-•p w< o Q nrx r < > J uR r O O W Q>a W r < o •/.w

6 N W^/1 V

O O Y/ W< d R ¢

2 2W

a nO O

^ 7ti< <

J

X

1O

O

r

193

OF PV^/^1 ^I

NW

f ^} }.n u m

W O W O\ O N O N

p wO N N N

^ O O d ON f O

m m oOO OJ O Op Op O aO K J N O a J /.O a J O N a JO V W Z^ O U W S? ••N W T } O Q^ O Q

N } •-• W Q NN MN^ Y QOm^}o m o

Cio ^ mo

N< T LL 1 1 O N< Z•^ ♦•• O N O Q r W W •• O N p¢ ..WO W ♦ w -OO WO W NOr O u ^• W Z W • O V W Z Z W

UU N.•• ^U aQ • N N< N J Q • N < N J • ••W O R T} u 0 Q

< .<i mom} < •.: m^N Z iu O N< r N W u1 O N< r= f S •+ 2 m J J 2 < L ••^ Z m J

^ .0 r ^ Q f< I.. W r LL<f. o wn w mm s. o wn Y m

N •-• 7 U U Y IY O U N .^ U W V Y iY O ••

rp u•n emu. 77 .-• LL LL 10 7•^ 7 7.+LLO m W 7 0 R f O m w 7 0 Q}

O< L N O 'O N LL O< T LL O m N H V\ O 7 LL \ 0 7 W.•• J Z L d •-• J Z u• d

1I

¢ O QW

Q ZO W

u^ J W LLZ u Z OH H

Z N Z N}

N < lQ ^

W ^ N N^ • - N 1 N

n M1 J

W O O W O

Y^ Q W QJ W W ^ J W 7m » m >

p oN uN V N UO W O WQ 1 K d Q

194

N Ni^ uf W

m TW O P

C . PT•

Or Pm P

TO P♦ .J .. T

IYOrJ K J ^

• O NN•• O u w Z 7

• H N } rm I ^ Oo n f z ..

w O W ♦ .Y. O u• Y Z Z w<CQ ^1 w

N7 r H.01

U O N N .-•Z

¢ • N < N JW O Q 1- r

O N f Y^ f S mw w N <

LL < 7 •-' f 0 nNN ^Q •• T N

u! O w W l U L u• n wN O N N J ^ • ••. V W V Y .. Nu i Q •• O •- O J 7} Q O •. u. Q Z^ nO W •• O o P N 10 W LL^ u. J n •+♦ 0 0 ^ /• c m W 7 0 ^ e1Y LL •

O; 0O O0 O<U L N O m N

W\ 7 H } WO O O O LL r J 2 N D 67< O O I 1H I IW O O o ¢Z N N W

N• • Y O O•• 2 N N J J• t 7 u Z u

Q Y Y •-• Z 2 z

7 7 Z O•

S Q R 7O ti ► O Z

7 < 7M•

• •V

} Z Z < N< O O } KJ n N NY ► } } TO < < W

• J J QY } W W

^ N• f O O Q

nW^ Q O J ^ u

O W < ^Q •• •O O W m 0n .. } < o

^<

NN

O<

OA.

bi •

1I

1,

OF

f NT O T OO P W O JN U P• P 0 0-O O

O PP P

e/ O rp OP

O O?

O oO •• P O •• PO ti OU Q J N O Q J .r•O < N O N

NO u W 2> A u W 2>F O tr r O Q^ N ► w W Rm^ H O

^ N 1 rm^^ O

r < 2 ^ < Z u.• O N O R . O N O e •••W O W • w^ N W O W N

^ O u w 2 2 u ^ U u w S 2/a O R N O W U •+ < O Q 1'1 0 W OQ on N •U ••H QO7 • V •^`.

rJ ON<

U •J• N N J

W •J W trN J

W O N Q ^- ua s a s m

w< s m

7 m w N<.. w e N<

< na 7 •+ <nQ T N 1 a Q ^ a n.n ^••. <o7 N• Q Q•. a ^ n

~ l^^ W u- m •- o

o a w a u L O t W e W-1 u r N .+ J u u V W•- Q r Q r> n 7 f Q 1• Q Z>

m W> u. 7 ^..amuu' 7r,n ^>u. 7 7•+

n+1O mu W 70Q fo<_< o m N o< r a c m N0 7 e

•-IJ Z N a0 s

Q w JZ7

N p1 N

aWO •s W

F 1 UH

2< J a 7

tiN < a^ Q

~

N ^ N

tr

n J

aWJ W> J >mN

W m WD O

NO

NO

e e

u0 0 ^ ^ W O 0 a mJ ^ O N N ^ ^Or Y1 •Ur J

r N•l YZ 27 7

1 1 Z O

N N N O -

N 2 2 2 N<

222fN N N N •-• LY NOO N N • Q7 O I Z 2 tr^

O a n Q 2 ~ Yc ^ •- r- ^ -• Y tN ^ Z J= W W V J QJ u u u I L W s^tr Z I Z<< N r 1

W W Y/ l Q .-• 1 V7 7 ^ 1. Y r

O •• 000 ^••• N S J

W W f 7 Ro N N N s N Q^Z L f •. tiu/ w J J J 3/ W Q J

~ W 1- 4 r ~ O W u.• H ^N N •y < H

• 2 W N W e NW • N J 4 W WQ - <

u J •-.7 7 7 7 0< U ^u N NNU 7•-^ < N

195t

- ^ 11

2O ►..ZN 7O O O O O O O OJ VJO

n O O O ^ O O O O O< V ., r

iOY 74 7 O o

r o O o o n a nW p O aV uW

r r J

2V

N f•• 7T 7N O O ff P P m m P O O Oz u o .. .^ n n nsH

H rz zO 7 O O O O O O O O O Oi O

V

R Wa V

n J ♦ O O 7L O O

0O O O O O O O (^

7N

1 1 1 1 1 t 1W

T_ + a n J ff n n O 7 nY NH e .f w a a N N N . rl O O•+ 2 > D> O^ W

<

l + r+ N•• 2 O U n O O O a O U OO O O O O G O O O O Ot N W

T U O (^ O O •] O nJ

o J O O r U O O O O OU

0 0 o n o 0 o u nW o 0 0 0 0 0 0 0 0 0T .^ O O O O 0 O 0 0 0 OH ti

O O O O O O O O O UO O O O O O O O O U<

1

r OrNn P1 n

• W J n •-. O N N^

O N•-•Y u r> ••' U• Y. O U U O N O

O O p O 02 O O O A O OWJ =< s

tr W O!n

aO

WZ

nO

J ! _

N < N u nlR tr o

> J OO •

r 2 . p^

N ^ i N ^ ^ l N<,

/.W f

Q7

^J J

u < a

m0• ^<

1-N U

W/I V

^ nJ J J

s WV. V

t\ C o l H D DO tr N U T T V. N •n N

jRl'Gnti."tL Pl*o acs

OF POOR QOALn-i

N N N N NW W W Y

N N Y Tm Q1 d DI m ►

W W W 1 7 T 1! IDN N N !ooN u

ACC oocl00 0•^ O I 1 ♦ ♦ U

m a J N M N • W WP{•n n JA r Inn 31 ^ r m .A J N N nNN^O n n 0.- aP n J

t N O--CA

C C3- I^ t1

0 0 0 0 0 • NY\ J r r •..

I[ H Y Y2 L I 2J J 7 7tr .i tr tr

1 I I IO 4

W f O! Y O Y O W

• f f Y 7 Y YW W N f N H! 7 W 1- 1 2•+T +• 7 0

Y .. W ti tr N N z of>> H T1 2 < J

W W V < l 0>> f H Y) N Q N R ► O

W Y V1- H f < 1- H ~ N

V U S ► N W.( < 7 ^ N< T ^Y S W

Q F Y^ N 1 • Y Y J J Y J Y T O

T S f (^ O^ [. toY Y J 7> ti tr tr J JZ n OJ 7 Y f l- 1- 2 Y T 1-tr t U O f U< U OH 1- ^- N M H V {^ V O f H

1=

1961

1

4 VIM

1

REFERENCES AND BIBLIOGRAPHY

DE080 Digital Equipment Corporation, VAX HardwareHandbook. Ma ynard, Ma: 1981.

DEC31 Digital Equipment Corporation, VAXArchitecture. f-Ikynard, Ma: 1981

DEC82 Digital Equipment Corporation, VAX SoftwareHandbook, Maynard, Ma:l'r31-1982.

D0NN79 Donnelly, J. E., and Yeh, J. W. "Interactionbetween Protocol Levels. in a Prioritized CEMABroadcast Net,.,jork." Computer Networks,March 79

FRAN80 Franta, W. R., and Bilodeau, M. B. "Analysisof a Prioritized CSMA Protocol Based onStaggered Delays." Acta Informatica,June, 1980.

FRAN82 Franta, W. R., and Heath, M. B. "Performanceof HYPERchannel Networks: Parameters, Measure-ments, Models, and Analysis " University ofMinnesota, Computer Science Department,Technical Report 82-3, January, 1982.

F.1;1AN84 Franta, W. R., and Heath, M. B. "Measurementand Analsis of HYPERchannel Networks.' IEEETransactions on Computers, March, 1984.

HEr182 He yman, D. P. "An Anal ysis of the Carrier-SenseMultiple Hccess Protocol." The bell SystemTechnical Journal, Vol.61, No.B, Oct., 1='132.

MAUL84 Mauldin, J. D. "A Software Model of theHYPERchannel Local Area Network at theHuntsville Operation Support Center." Thesissubmitted to Mississippi State University,Mississippi State, 11s. 198.1.

METC76 Metcalfe, R. M., and Bo+fs, D. R. "Ethernet:Packet Switching for Local Networks."Communications o+ the ACM, Jul y , 1976.

NHS• ,82 National Aeronautics and Space Administration.George C. 11arsnall Space Flight Center."Shuttle Program: HOST, Operations ProceduresDocument." SPMD 1.2.1, Revision 6, May, 1982.

197

1-(0

1rr \, ^' ~ ^_.^ •hi►_..._ ___ sue_ ( ,

NSC79 Network Systems Corporation. A400 AdapterReference Manual, 42990008. Brookl yn Park,MN: 1979.

NSC80a Network S ystems Corporation. Nucle-is AdapterReference Manual, 4290003. Brookl yn Park,[IN: 1980.

NSC80b Network S ystems Corporation. H1rPERchanneISystems Description, A01--000002. BrooklynPark, MN: 1980.

NSC81 Network S ystem Corporation. PI 13/14Peripheral Interface Reference Manual,42990015. Brookl yn Park, MN: 1981.

PEC81 Perkin Elmer Corporation. "Model 324CIProcessors," Product Information Sheet. OceanPort, NJ: 1981.

STAL84 Stallings. W. Local Networks. New York:MacMillan Publishi ng Company, 1984.

WATS82 Watson. B. W. ")al i dat i on of a. Discrete E-)entComputer Model of Network Systems Corporation'sHYPERchannel". 7th Conference on LocalComputer Network =_. Minneapolis, t-1N: 15182.

YEH79 Yeh. J. W. "Simulations of Local ComputerNetworks". 4th Conference on Local ComputerNetworks. Minneapolis, MIA: 1979.

1

298

1