19850020330.pdf - NASA Technical Reports Server
-
Upload
khangminh22 -
Category
Documents
-
view
0 -
download
0
Transcript of 19850020330.pdf - NASA Technical Reports Server
General Disclaimer
One or more of the Following Statements may affect this Document
This document has been reproduced from the best copy furnished by the
organizational source. It is being released in the interest of making available as
much information as possible.
This document may contain data, which exceeds the sheet parameters. It was
furnished in this condition by the organizational source and is the best copy
available.
This document may contain tone-on-tone or color graphs, charts and/or pictures,
which have been reproduced in black and white.
This document is paginated as submitted by the original source.
Portions of this document are not fully legible due to the historical nature of some
of the material. However, it is the best reproduction available from the original
submission.
Produced by the NASA Center for Aerospace Information (CASI)
SYSTEM Al,lf•,LYSIS
For The
Hunts:, i 1 le C-^perat i on 'support CenterDistributed Computer System
(RASA —Ca — 171506) SYSTEM ANALYSIS FOR THE
HUNTSVILLE CFEbATION !j0i?PGB1 CfhTER,01STRIBUIED L08iUTEF SYSTEM Interior REPort,dar. - Jun. 1585 (hisEiEEiEEi State Univ.,eiEsissippi State.) 207 p EC AIJ/hF A01
t,85-28642
UnclasG3/b 2 21493
Interim Report for Period March 1955 through June 1985
.A-NN,UAL REPORT
1985
Submitted by:
D. M .as_ey. Associate In-,est igatorF. M. In gels, Principal Investigator
MI _si =ippi Et ate Univer =_i tElectrical Enaineering Department
Mississippi State, MS 35712'601) —3912
Submitted t]:
NHSA MSFC. AlabamaTechnical Mon it pr: Frank: Emmens, EE332,
(205? 45.3-4629
rJA58-34946
011
SYSTEM ANALYSIS
For The
Hunt i1le Operation Support CenterDistributed Computer System
Interim Peport for Period March 1985 thrc,ugh _Tune
ANNUAL REPORT
1985
Submitted by:
D. Masse y . Associate In iest (ciator.F. M. Inaels. Principal Investigator
Mi =_si__ipp( State Uni.^ers(tyElectrical Engineerinci Department
M (s =- 1 ss 1 pr) i State, MS '9; _?J(601) 325-3912,
Subm(tted t.,;
NASF; MSFC , Alabama.Technical Mon( tor: Frank Emmen _ , EB'32
(205i 453-4029
Nr~S8-34900
C' k,'ER') I El-d OF REPORT
Network Systems Corporation s HYPERchannel netA)orVis a baseband, 50 Megabit per second, high speed localarea network.. HYPERcnannei uti li zes a Carrier SenseMultiple Access (CSMA) data trunk. access protocol, withprior i tized staggered dela y s. . This nett„fork has thecapabilit yof interconnecting various computerresources of differing manufacture, into a singleeft iclent comput i ng fa^illtr.
This. ne twork is currently In use at the Hun tsviIIeOperations Support Center (HOSC). HOSC as a distributedcomputing s ystem, is responsible for data acquisitionand anal ysis during National Weronautics a.nd SpaceAdmir,istration- s (NASA) Space Shuttle operations. HOSCalso provides computing services for Marshall SpaceFlight Center's nMFSC) non -mi ssion actIvItIes.. Amission and non-mission activities chan ge, so do thesupport functions of HOSC change, demonstratinq theneed for some method of simulating activity at HOSC inar lclus contl gurations.
The simulation developed in this ;,fork primarilymodels NSC' s HYPERchanne 1 network, since th is networkbasically determine=_ HOSC's efficiency In accomplishingi ts mission. The model simulates the activit y: of asteady-state ne ti,,jork , repor t I ri g stat i stics such ;= .transmitted bits, collision statistics, tra.me sequence=transmitted, and average me ssa g e de 1 s . Thesestate=t i cs may be useH to evaluate such pertormanceindicators as throughput, utillzat on, and deIay.Thus.the overal 1 performance of the network: ma y bee'lalua t ed, as well as. predlctlnt pos = ible over Icadconditions.
HOI,..I Ti l PEHD THIS PEPC 1RT
Th is report is a full y de t ailed report concerning theinner work.inq_s. of the WPEPchannel Local Area Network.Chapter ” a description of the HOSC system, Chaptera. tuil detailed description of the simulation software(design arch tecLure Chapter =1, 1ndi-.)idual sottwaremodule description I•;ppendlx III); and a presentation ofthe simulation results for sin g le and dua.l trunkoperation, Cha p ter 5. The reader Interested In a. quickg"ery I um and a survey of the HOST- = s tern pertormancemay read Chapter I and Cha p ter 5 onl y . Howe - erknowledge of the HYF'EP,channe 1 adapter's inner work i ngsincluding message frame cons truct.lon and timing 1sdesirable, Chapter
IT _ 1 I V
f0i r ' ''
IN
TABLE OF CONTENTS
Chapter Page
ii k . ! ERU I EW OF PEPORT ....................... i v
TABLE iiF Ci iNTEHTS ................... I ... .
LIST OF TABLES............. .............. .iii
LIST OF FIGURE' .......................... ii+
LIST OF HCPONT'M'= .........................
1 Introduction ............................. 1
1.1 NS-C's WrPERchannel Local AreaNet s.)fork .............................
1 .2 HOSC System 1_1 -ler y l e 1Al. . . . . . . . . . . . . . . . 21.3 Research Objective . . .. ............
2 H7PEPchannel ^Ietl,.jork Description ........ o2. 1 N t ;fork. I omp nen t _ ...... .. ......... .5
2.1.1 Ada pter r,rchitt_ture........... Q
2.2 H'YPERchannel F;otocol=.............. 12
2.2.1 Trij- t --icce=_s Protocol .......... 132. 2.2 Hda p ter -r-;dap ter Li nk: Le u e l
and I .J i rtua.l Ci rcu i t Protocol =-.. 192.2.2.1 Frame and Frame Se.auerce
St ructure .................... 21
2. .2.2 Trunk. Sel__tion.............. 3i+
2.2.2.3 1,)1rtu.a1 C+rcu+tE=.tabIishment ................ 32
2.2.2.4 Data. FIov, Control ............ 3O2._ Intra-Adapter +=ommunica.t+on........ 38
3 HOSC System Description ................. 3P
:.1 T y pical HOSC S y =.tem Act1 1.) it+?=_...... 40
3.2 HC-1 15C System Component =_ .............. 45
N `
Of
Chapter Page
4 Software Design Description .............. 584.1 Software Functions .................. 584.2 Design Constraint =_ .................. 594.3 Design Specifications ............... 59
4.3.1 Simulation Assumptions.......... 59
4.3.2 Parameter Definition............ 604.4 Algorithm Description ............... 62
4.4.1 Overall Simulation Activity..... 62
4.4.2 Model Set-Up .................... 694.5 System Files ........................ 694.6 Reported Statistics ................. 71
4.7 Validation Criteria ................. 72
5 Model Analysis an-' Conclusions...........5.1 Theoretical Performance Bounds. ..5.2 Presentation of Simulat i on^ sults.. 81
5.2.1 Single Trunk HO.1L ,a=_uits ....... 82
5.2.2 Duai Tn i''„6 HOSC Results......... 975.3 Ana ly sts ana Conclusions ............ 110
APPENDIX I Software Source Listing .............117
APPENDIX II Summary of ISO-OSI Model ofDistributed Networks ................168
APPENDIX III Simulation Software ModuleDescription .........................1691. Siml ............................1692. Initialize ......................1693. CharacterizeNetwork .............1724. PrintNetDescription .............1725. FindNext ........................1726. PickA ...........................1757. Acollision ......................1758. Uniform .........................1769. Update ..........................176
10. Print=_.tats ...................... 17911. Activitysummary .................181
APPENDIX IV Typical Single Trunk SimulationResults .............................183
APPENDIX V Typical Dual Trunk SimulationResults .............................1'ry
REFERENCES AND BIBLIOGRAPHY ......................197
vi
j
t
aF
WF
1
..
si
LIST OF TABLESTables Fage
2.1 HYPERchannel Protocol Frame=_. . . . . . . 22
2.2 Frame Form;. t s . . . . . . . . . . . . . 23
2.1 HCSC Data TransfF-: . . . . . . . . . . 42
3.2 Summ?ry of DEC VAX 11/780 I/OCharacteristics . . . . . . . . . . . . 54
3.3 Summary of Perkin Elmer 3240 I/OCharacteristics . . . . . . . . . . . . 57
5.1 Theoretical Bouncs on a HYPERchannelTrunk of Length 100n Feet. . . . . . . . 77
5.2 Calculation of Parameters us:rgSimulation Statistics . . . . . . . . . 83
5.3 Relative Probabilities of Transmitter/Re=eiver Pairs for Figure 5.1 . . . . . 84
5.4 Data Points for Figure 5.2 . . . . . . . 86
5.5 Data Points for Figure 5.3 . . . . . . . 88
5.6 Relative Probabilities for Transmitter/Receiver Pairs for Figure 5.4. . . . . . 98
5.7 Data Points for Figure 5.5 (Trunk 1) .100
5.8 Data Points for Figure 5.5 (Trunk 2) .101
5.9 Data Points for Figures 5.6 and 5.7 .104
.,
Vii
Qi,
LIST OF FIGURES
Figure Page
2.1 Typical HYPERchannel Interconnection . . . . 7
2.2 Block Diagram of NSC HYPERchannel Adapter. . 11
2.3 HYPERchannel Delay Time Events . . . . . . . 16
2.4 Sampls AD8 Contention Timing Calculations . 19
2.5 Message-Only Frame Sequence . . . . . . . . 25
2.6 Timings for Message-Only Sequences . . . . . 26
2.7 Message-with-Data Frame Sequence . . . . . . 27
2.8 Timings for Message-with Data Sequences . . 28
2.9 Adapter Reservation Scheme . . . . . . . . . 33
3.1 Typical HOSC Configuration . . . . . . . . . 41
3.2 Block Diagram of VAX 11/780 Computer . . . . 47
3.3 Bus Configuration of VAX 11/780 . . . . . . 49
3.4 Block Diagram of PE 3244 . . . . . . . . . . 55
4.1 Message-with-Data Sequence for Simulation. 64
4.2 Flow Dia gram of Simulation Activity. . . 65
4.3 Model Set-Up for Simulation. . . . . . . . . 70
5.1 Single Trunk Simulation Set-Lip . . . . . . . 85
5.2 Plot of Uti1i7ation )ersus Offered Loadfor Single Trunk Simulation . . . . . . . . 87
5.3 Plot of Transmitted Control and Da`a Bitsversus Offered Load for Single TrunkSimulatio n . . . . . . . . . . . . . . . . . 90
5.4 Dual Trunk Simulation Set-!gy p . . . . . . . . 99
VIII
ni
r
Figure Page
5.5 Plot of Utilization versus Offered Loadfor Dual Trunk Simulation . . . . . . . . . 102
5.6 Plot of Transmitted Control and Data Bitsversus Offered Load for Dual Trunk (Trunk 1)Simulation . . . . . . . . . . . . . . . . . 105
5.7 Plot of Transmitted Control and Data Bitsversus Offered Load for Dual Trunk (Trunk 2)Simulation . . . . . . . . . . . . . . . . . 106
ix
X
rw
LIST OF ACRONYMS
ASCII Hmerican Standard rode for IntormationInterchange
BDP Data PathBR Bus RequestCHTV Community Hre.a. TelevisionCPU Central Proce=.5Inq UnitCSMA Carrier Sense Flu tiple Hce_sDDP Direct Dat,. PathDEC Digital Equipment CorporatIonDMA Direct Memor y Hcces=_.ECIO Experiment Computer InputiCutputET External TanksFEP Front End Proc=essorHSLN High Speed Local Ne tv)or KHOSC Huntsville Operation Support CenterIiii Input/OutputISO International Standards OrganizationJSC Johnson -;pace Centerk:SC Kennedy Space CenterLPS Launch P r o c e s s
I n a ystem
Mbps Megabits per secondMECCi Main Engine Cut offMER Misaion EvaIua.tion PoomMI PS HI s=_.ion Integration PIannin SystemMPS Main Propulsion Sy_tem1-1SFC Marshal I Space F1 ight renterNHSH Ha.tional Her onautics and Space Administration
h!PP. Non-Processor RequestPJSr He twork S ystems Corporationiii; iiRera.tic na.1 D;ta.OSI Open S y stems InterconnectionPE F'?rkrn El TerPOGO Payload Operations Control CenterRSS Rancae S.atet:: SysternSBI S::nchronous Bacfpl ane InterfaceSP.B Solid Rocket Booster.SSME Space Shuttle Main Engine=.TS Shuttle Transport System!i BA UNIBUS Hdapter1E?US UH I E; IJ Suse - Microsecond
R
t1
1w'
Chapter 1introduction
1.1 NSC's HYPERchannel Local Area Network
Network Systems Corporation's (NSC) HYPERchannel
local area network is a widely used very high =peed, 50
Megabits per second, digital communications facility.
HYPERchannel utilizes microcomputer-ba=_ed adapters and
standard 75 ohm CATV coaxal cable as data trunks, to
interconnect various computer resources within a
computing installation. There are three types of
adapters (Processor, Device, and Link) used to
interface individual equipment to the network of data
trunks. These adapt-^? r s provide for:
• interconnection of equipment from variousmanufacturers.
• high performance communication `)etweenprocessors.
• a sharing of peripheral systems betweenmultiple processors.
• realistic physical location ofinterconnected equipment.
• increased utilization of interconnectedequipment.
• increased tolerance to individualequipment failures.
Finally, Data movement within a HYPERchannel network is
accomplished by use of frames and frame sequences.
These frames contain the necessar yin+or-matron for
addressing and routing, along with associated user
messages and data. A sophisticated internal protocol
is used to prov i de for contention al 1 oca.t i on , er^or
detection, retransmission allocation, and data
movement. These capabilities provide a reliable
network that is irsensitive to configuration, and
single points of tailure. This internal protocol is
the basis. for HYPERchannel sys"em performance and wi l l
be described further in a subsequent chapter.
1.: HOSC System Overview
The Huntsville Operations Suppo-t Center (HOSC),
AS implemented at the Marshall Space Flight Center
(MSC) in Huntsville, Alabama, is a distributed computer
resource facility. HOSC is designed to provide real
time acquisition, analysis, and display of data during,
National Aeronautics and Space Administration s (NASA)
space missions. HOSC provides =_upport primarily for the
Space Shuttle, Space Telescope, and Space Labo^story
missions. Among the resource =_ available at HOSC are
various large minicomputers and peripherals. A large
portion of these resources are interconnected using
NSC's H`r'PEPr_hannel network. The configuration
flexibility afforded by HYPERchannel provides HOSC with
the ability to adapt to future mission requirements and
also provide =_ MSFC with a large computing facilit y for
non-mission activities.
Data handl1na at HUSC .all y into two main
categories, mission and non-mission activities. Mission
2
it
II
I 11
760
I t
` factivities are those that take place during powered
flight. For example, the space shuttle main engine data
is analyzed by the Main Propulsion System (MPS)
processor, which is also sent to a back up processor
+ simultaneously. Data arrives via direct ground links orI
satellite communication links from the Kennedy Space
Center Firing Room at NASA's Kennedy Space Center (KSC)
in Florida or from NASA's Johnson Space Center (J3C) in
Texas. Services provided by the network during missions
are data analysis and presentation services for HOSC
mission support teams. Non-mission activities are also
provided b , HOSC, one of these s support for the
Payload Operations Control Center (POCC) preplanning
activity. Future expansion at HOSC may include computer
resource support for Digital Equipment Corporation's
interactive graphics data base (ICDS), and XEROX
Corporation's text-processing operation (S?GMA), both
of which, ale non-mission activities_..
I 1.3 Research Objective
NSC's HYPERchannel loc?1 area network is a
sophisticated computer network a)1owing considerable
f lexib11 i ty and adaptabs 1 i ty w th regard to computer
r?sources. HYPEP.channel allows a wide variet yof
minicompu t er, s, not necessarily manufactured by the same
company, to be interconnected in a single or
3 ^
-s- — - - - dew -~- - - -
_* r4. 11
t i
Al
multi-trunk network. Thus, computer resources which may
be separated by distance or manufacture r ma;: tie
utilized b y one another within this distributed
computer network. HOSC, as a distributed - omputing
facilit y , utilizes HYPERchannel to accomplish the
interconnection of various computer resources. Mission
-equirements imposed on the HOSC, require that it
posses=_ the ability to adapt and change its resources
according to the dictates of a particular mission. The
I( configuration of the HOSC's resources are mission
i dependent and may be readily changed, howe ,)er, the
! effects of those changes cn system performance are no
readily apparent. The data handling capability of the
HYPERchannel r,e twork, and i is performance in -.)ar i ous_
configurations affect HOSC's system performance
directly. With this in mind, the primary goal of the
research effort was the development of a simuI atior.
model of the HYPERchannel network that could be
manipulated to predict and characterize the nehavior of
Ithe HOSC in a variety of scenarios.
The first step in this analysis was an
investigation of the operatinU properties and
characteristics of a HYPERchannel network. In Chapter 2
of this_ aocument, a functional descriptio.7 f
HYPERchannel s detailed with particular errphasi s on
the protocols usFd by the net .lorV. The second step,
4
I^^
2i
9
detailed in Chapter 3, was the characterization of
various computer resources and possible HOSC activity
scenarios. The third step, detailed in Chapter 4, was
the def i n i t i on and deve 1 opmen t of a sof tware model of a
HYPERchannel network. Using this simulation nodel,r
, Esystem parameters were varied to simulate changes tor
the operating environment of the HOSC. Finally, the
results and conclusions of these manipulations to the
simulation model were compiled and anal yzed in order, to
provide some insight into the present and perhaps
future operating characteristics of the HOSC.
5r^
1
1
4
0 Chapter 2HYPERchannel Network Description
2.1 Network Components
Network Systems Corporation'=. (NSC) HYPERchannel
network is a high speed, baseband local area network. A
HYPERchannel network consists of standard Community
Area Television (CATV) coaxial cables ri =-ed as data
trunks and var i ous. adapter =_. to control network' traff i c
flow. These adapters use a carrier sense multiple
access (CSMA) protocol with prioritized, _taggered
delays to implement traffic flow and control . Network
messages generated by an adapter are composed of frames
and are called frame sequences. These messages are
broadcast a)er a given trunk at a fixed rate of 50
Megabits per se c ond, using a phase modulation technique
with a manchester data format, and are received by
network components through nondir • ection.al taps or ports
(Figure 2.1). Netw ork components at. these ports are
known as network adapters, which control access to a
given trunk. A network adapter can be attached to a=_.
man y as four independent network trunks, enabling a
configuration to match a specific instalIa`ion and
provide:
^i
o incremental expansion
o linear interconnect costF-
o no single point of failure
5
1
3
NSC manufacture=_. three main type:. of network
adapters: processor, device and link. A processor
adapter interface=_ a computer data channel to the
network of data trunk=.. It serves as buffered data path
between the computer attached, and the trunk ne twork.
i The computer communicates with data buffers in thee
adapter at its owr. rate and asynchronous. with
transmissions on the network trunks. The adapter
provides the necessary formatting and internal protocol
to transmit the c=ontents of its buffers o k!er the
selected network trunk. The processor adapter receives
data from the trunk network and provides status
information to the originator of the data. The computer
at the receiving adapter may then access the data and
p any a=.sociated message in the adapter buffer. NSC has
designated th;s adapter Type as A400 HYPERchannel
adapters, herein referred to as adapter=_.. The device
adapter function:. as a remote channel providing a
? computer data channel for the attachment of peripheral
Ican trr, un i ts. This adapter i s dr i k:,,en b ,., tt:-jork
messages from the data trunks. It receive =_. network
messages cor.tai n i no device commands, data, and control
information. It generates messages c=ontaining status or
device data. The device adapter operates multiple
devices in the same manner as a data channel produced
by a computer manufacturer operates multiple de-.^ices.
I.
,a
1
—^_ ^^ r"
The link adapter is used in pairs to provide
communication between remote HYFERchannel networks. A
link adapter receivirg a network message destinrd for a
remote network transmits thismessage over a wide band
communications link to the remote networK. The link
adapter at the remote location receives this me=_.=age
and retransmits it over its own local network. There
are two type =_ of link adapter=_., the terrestrial link
adapter and the satellite link adapter.
Finally, due io ti-ie nature of the HOSC computing
facility only the processor adapter be included in
the model.
2.1.1 Adapter Architecture
Ee::) adap t er, regardle ss=_. of the type of u-er
equipmen t attached. consists of the fol lowing:
• A Ti,cr:)-processor with 4096words of read-only memory (ROM)
• Storage section (Buffer and Control logic)1024 8-bit bytes of control memory withodd parity
4096 8-bit bytes of buffer memory withodd parity
16 working registers16 trunk registers256 extension registers
• One trunk interface
This portion of an adapter i=_. termed the Nucleus
Adapter. The nucleus adapter has two general
9
1 ^`r ^•
^V_
LD61
app Ii cat ions, (processor and device adapter) determined
by the type of equipment attached and the necessary
interface required. Thu=_ an adapter consists of a
spec ific device interface and a nuc1 e"s. adapter. The
device interface will then define the particular
adapter type. An adapter can be divided into four main
sections: micro-processor, buffer, and control logic,
trunx interface, and devici or equipmen* interface
(Figure 2.2). The micro--processor has a 4096 16-bit
word read-only in =_.truction memory with a 320 nano=_econd
cycle time. It handles equipment functions and
responses and manages data flow on the direct data path
betwe:. the equipment and the Pda.pte- buffers. The
buffe^ and control 1 ogi c al ong w, th the trunk
interfaces control the high spead trunk transmissions.
It consists of a 1024 8-bit byte control buffer,
normally used to stack control information, and a data
buffer containing x996 or (optionally) 8192 8-bit
b y tes. This section also contains a flag register and
other registers to specify buffer address, length of
data tra.n mission, and network addressing function=_.
The control logic contained in this section allow
concurrent access to memory by both trunk interfaces
and equipment interfaces.. The 100 Mbps buffers allow a
50 Mbps data movement on the data trunks along with a
50 Mbps data movement with the attached equipment. The
10
- - - 1: -0 - -
i,
IN
tocrYw Ocr
F OwIX ZW¢
j Nz .
U. OO
O li O^'OwHc
U)Ow CL m^
Q
mcUUnzuQ1LG=.
W
O
r
cz
oc
G
1VO
CC
tiN
v1+
00.4
ul
1
11
• tom' ;w" ^:
Y
trunk interface board p up to four) contains. the
necessar y transmitting and receiving electronics and
the high speed logic to control the transmission
envelope-check.words, access code, and network address.
Each trunk interface his the ability to generate a. bus-y
or reserved response and contains the logic to control
trunk contention on its attached data trunk. Finally,
the device interface (up to fouri or equipment
interface contains the circuitry needed to interface a.
specific equipment or device to the adapter. This
interface is unique to a given device and determines
the adapter type.
2.2 HYPERchannel Protocols
HYPERchanne1 adapters support trunk selection,
trunk-access, adapter-adapter virtual circuit, and
host-adapter protocols. The trunk selection protocol is_.
based co a cyclic scan of the connected data trunks.
The trunk-,access protocol is of the carrier sense
multiple access (CSMA) type, with ordered priorities
assigned to each adapter. The adapter-ada p ter virtual
circuit ;p rotocol involves connection eadapter
reservation and deadlock avoidance) and data T 1 ow
control. The assumption of a steady state model
precludes inclu=_.ion of the host-adapter protocol since
a host is represented as a fixed rate data source. In
order to understand the impact of the variou s_. protocols
12
1w
on system performance, they will be described in detail
in the remainder of this section.{
2.2.1 Trunk Access Protocol
HYPERchannel uses a carrier sense multiple access
scheme with prioritized staggered delays to implement a
trunk access protocol. The intention of this scheme is
^Ito:
o ensure that ready adapters defer to on-going transmissions d
o ensure that . • espor.se (acknowledgement)I frames are transmitted without inter-
ference
o provide as much trunk capacity to thehighest priority adapter as it requestsby prioritized access, and provide asmuch capacity to the next highest priorityadapter as it requests, and so on
o sort out collisions without the necessityof generating random retry delays and ensuringthat colliding frames are not involved incollisions when retransmitted.
HYPEP.channel accomplishes this wi tt. four primary
mechanisms: transmitter disable, fixed delay, N delay
7r priori ty del ay, and end de 1 a> . These functions are
implemented on each trunk interface board and can be
idifferent for each trunk attached.
1 Any time the trunk is sensed bus y the adapter
1 tran,^mitter is disabled (unles. it is transmittingi so
that an ongoing transmission will not be interfered
t,,j i t . The fixed de 1 ay per i od i s a de 1 .ay per i od
13
1
following any tra.nsmi lion in which only the receiving
adapter for the last transmission is. allowed to
transmit. This period of time allows a receiving
adapter to respond immediately without being interfered
with by other ready "=_ending adapters". A t,•ansmittirig
adapter which does not receive a response to a
transmission during this period assumes that its last
transmission was to=_.t and wi11 schedule a
retransmission. Following the fixed delay period a
scheduling period begin=.. This period i=_. the N dela y or-
Pr i or i ty delay period and is a unique event for each
adapter on a given trunk. An adap ter '=_ priority delay
is assigned based on the priority (user defined) and
p lacement on the trunk of the adapter, in question.
Following the fixed delay period an adapter ready to
transmit will wait until its priority delay, at which
time it is allowed to transmit without interfe once if
the trunk is idle. If an adapter becomes ready to
transmit during this scheduling period, but after its
priority delay has ex p ired it must wait until i#s
priority delay occurs again or until the end delay
period (defined next) is encountered. The end delay
period occurs if an entire scheduling period passes
without an adapter transmissi or, . After this event a
free-for-all or contention period begins in which any
adapter which become_ read y to transmit may do so. In
114
,r
y
1
this. contention period, collisions become possible if
two adapters sense the t'unk idle and attempt to
transmit nearly simultaneously. These v;.rr ious delay
events are implemented in each adapter b y a timer. This
timer is enabled any time the trunk is sensed idle and
begins to count down to its respective delay events. If
at any time the trunk is sensed busy the timer• is
disablad and loaded with the end delay value. As the
timer counts down the fixed delay, priority delay, and
the end delay events are signaled (Figure 2.3).
These delay settings are set into what NSC terms
as contenticn switches (SW1-SW9), located on each trunk
interface board. These contention switches have 16
discrete positions (0 through F'- , with each position
providing 160 nanoseconds of delay. These switches are
grouped i n sets of three switches per parameter. S1.11 ,
SW2 and SW3 are the least-significan' bit po=_i±ion
switches and SW7, SW8 and SW9 are the most-significant
bit position switches. An adapter's fixed delay 1 s set
into switches cSW7, SW4 and SW1), its priorit y delay is
set into switches (SW8, SW5 and SW2) and f nal1y, its
end delay is set into switches (SV > , SW6 and SW3). The
actual setting= for these switches are calculated from
expressions given by NSC. These expressions when
evaIuateJ, yield decimal numbers which are then
W,
15
1r
Iconverted to hexadecimal equivalents. The hexadecimal
equivalents are then et into the contention switches.
When an adapter receives a transmission frame it
will immediately generate and transmit a response
r frame. So that all ready-to-send adapters will not
interfere with this response, the fixed delay period
^I must be such that all adapters will sense the response
before this delay expires. This relation as given by
NSC [N5CSOal is:
Total trunk cableFixed Delay = length (ft.) + 13 C1)
40
This value as calculated will be the same for all
adapters on a given trunk. The priority delay refers to
the period of time uniquely assigned to each adapter on
a trunk. Th y E time period occurs following the fixed
delay period and is determined by the a.dap ter 's
assigned priority and position on the trunk. The
higher, priority adapter is assigned a priority delay
of 0.413 microseconds, this allows sufficient time for
the highest priority adapter to prepare to retransmit
an unacknol.J edged frame pr i or to i is scheduled
transmission time.
17
Z
The priority dela ys for the remaining adapters on the
trunk is given by [NSC80a):
Priority delay of next
Priority = 10 + highest adapter (decimal -)alue)De 1 ay
(2)
+ Cable length (ft.) to next highestpr i or, i ta.dap ter
40
NSC recommends t;iat prioritie s_ should be assigned
sequentially in order +o maximize throughput on the
trunk. The end delay is calculated for each adapter
such that the lowest priority adapter on making a
transmission is sensed b y all other adapters on the
trunk. This is nece=_sar y since an adapter may transmit
immediately when its end delay is signaled (contention
period). This relay is calculated as [NSC:80al:
Priority delay of lowestEnd Delay = 10 + priority adapter (oectmal value)
(3)Cable length (ft.) from this
+ adapter to farthest adapter40
kn example of the use of (1), (2) and (3) is
illustrated in Figure 2.4. The calculations which
follow are performed for unit #25, trunk 0.
18
.... 'r • Jl^^ ..`mow: - _-'_-• CITI
OF f llli It (^ ^: . Y
4001 60011 20011tEnP.11IIAL TFnMItJA10n
10 Wilt #25
n
IMIT x'05
PnIOniT y 0 F1I10.!ITY I Fn1Un1IY 2 PnIOnITY 3
FIXED DELAY -z 2 1316
.,IJ --- z
AC8 MUNK 80AnD
TI -
SWI!C! I SET TI IJO
FIXED DELAY_P n!C nITY O EL AY
END DELAY
f WiFiF7, UN I T 25 U!IIT 13 1 U!I I T (,5
2 8_1 28 2 8 2 8
3 I T 30 3 F
5T 50 62 67
Figure 2.4 ;nmhle AI)f3 Contention TimingCalculations i NC80a J.
19
I
^I
IRr
N;
Fixed delay = 1200 feet + 13 = 43 10 = 2616
_;O
Priority delay= 10 + 3+ 400 =23 10 = 1171640
End delay = 10 + 63 1 0 + SOO = 93 10 = 5D164 0
These values are then aet into the contention switche
located ors the AG8 trunk. interface board as indicated.
Finally, in the access scheme described thus far, the
highest priority adapters could possibly monopolize the
trunk. To prevent this a. de k)ice Known as a wait
flip-flop is implemented in each adapter. This
flip-flop is =et when an adapter transmits ar.d is
cleared avhen the adapter end delay is signaled. When
the flip-flop is set the adapter is prohibited from
transmitting, the intention of this device is to
provide a fair allocation of the trunk. All adapters
are equipped with this device and adap ter =. k:,j i th th i s
fl i p-f 1 op enabl ed ma y coex i st , on the same trunk, ,,ji th
ad?nter=_.who =_.e flip-flop is disabled.
2.2.2 Adapter-Adapter Link Level and Virtual CircuitProtocols
The followinq sections will deal with data
movement and the protocols involved once an adapter has
gained access to the trunk through the trunk access
protocol. The data. 1 i nk protoc=ol may be v i ewed as
20
nom' ter •^ y 1
On
1r'
having two basic information grouping levels. The basic
information unit is the frame and a higher level
grouping is the frame sequence.
2.2.2.1 Frame and Frame Sequence Structure
The smallest unit of information transmitted over
the network i s the frame. There are three cIAsses of
frames: transmission frames, data frames, and response
frames. Tran=mission frames are generally short frames.
(up to 38 b y te =_) used by adapters for signalling and
status exchanges. Table 2.1 lists these frames and
their functions. There are two forms of data frames.
mes_age proper frames and associated data frame=_
following a message proper frame (Figure 2.8). An
adapter receiving a transmission frame, message pr ,per
or a data Yrame will generate and transmit a response
frame. This response frame =r- rv? s to ackiowledge
receipt of a frame and in some cases ^eturns
information to the transmitting adapter. Frame formats
are listed in Table 2.2. Note from Figure 2.2, that the
fixed del? y period is used to initiate transmission of
ether than acknowledgement frames as will be explained.
As stated previously, a higher, revel information
struc ture is achieved by grouping frames toge t! , er into
frame sequences.. All information exchange= occurring on
the network will be in the form of frame sequences.
There are two types of frame sequence used on the
2i
I
t^
1
Table 2.1 HY PERchannel Protocol Frames [Fran 841.
Transmission Frames
Set Reserve - Reserve receiving adapter
Copy Register - Request for- Register information
i Clear Flao 8 - When set, Flag 8 indicates thatthe ada.pter is ready to rece i -.: , e a
1 frame. When clear, it indicatesthat the frame has been received.
Set Flag A - Flag A, when = !?t, indicate= thatC1 ear F1 a q A the receiver will recei-)e
associated data. It is clearedwhen the last block of associateddata is received.
Clear Flag 9 - When set in 'he receiver, Flag gindicate_ that the receiver isready to receive data. When setin the transmitter, it indicatesthat the transmitter is read y tosend data. When cleared in re-cei -)er, it indurate that thedata block has been receil.;ed.When r_leared in the transmitter,it indicates that data can now bstransmitted.
Data and Message Frames
Message Proper - Used to trarsmit host me=s.agF . = oflength less than or equal to 64bytes.
Associated Data - Used to transmit data blocks oflength up to 2 KbYte s.
Re y onse Fr ames
Response - A receiving adapter sends a re-sponse frame for each non-response frame received. :ts pur-pose is to acknowledge receivedtrames or, as in the case of theresponse to a. copy registersfr e.me, to send requested data.
22
^. _^^ 041- ,
1t
Table 2.2 Frame Formats [FRAN821.
1!
Field Lenqth(bytes)
leading s yncs 12-18frame type . . . 1ac=ess cede . . . 2to address . . . 1+ rom address 1function code 2message length 2check word . . . 2trailing s y nc 8 —
Transmission Frame Format
Field Length(bytes)
leading syncs . 3frame type . . . . 1a•:ce ss code . . . . 2to address . . . . 1from address . . . 1function code . . . 2message lenqth . . 2=heck word . . . . 2trai 1 i nci . . . . . 8
Response Frame Format(no data)
Field Length I(bytes)
leading s y ncs . .12-18frame type . . . 1access code . . . 2to address . . . 1from address 1function code 2message length 2check word . . . 2message/data .8-64/
0-2N:message/datacheckword . . . . 2crailinq sync . . 8
Field Length(bytes)
leading syncs 3frame type . . . 1access code . . . 2to address . . . 1from address 1function code 2message length 2check word 2regi sterinformation 2
checkword . . . . 2trailin g sync . . 8
Message Proper and AssociatedData Frame Format
Response Frame Formatcwith data)
22-
24
network: message-only and message-with-data sequences.
A message-onl y sequence is normally used to transmit
short me sage of up to 64 bytes be tl, ,aeen device r- on the
network. The sequence of frames which make up a
message-only sequence are shown in Figures 2.5 and 2.6.
Data is tr.ansrni tted on the network in 2K byte blocks
(optionally 4K byte blocks) in message-with-data frame
sequences, as shown in Figures 2.7 and 2.8.
In order to promote efficient utilization of the
trunk an adapter does not maintain control of the trunk
throughout an entire message-only or mess_-age-with-data.
sequence. An adapter will relinquish the trunk while
performing tasks not requiring the trunk, these periods
are dep i c tea as del ays in the Figures representing +pie
two types of message sequences. After transmitting the
first frame of a sequence the trunk is released. When
the transmitting adapter is ready to continuF
transmitting it must compete with the other adapters
for trunk access.. After regaining access. to the trunk
the adapter will transmit a. cop y register fr..me. if
this frame is transmitted without a collision, the
receiving adapter will sand a response frame to t1)e
sender. Upon receipt of a response frame tine adapter
captures the trunk by tran =.mitting during the fixed
delay period that foI I ows. The trunk is regained
without interference since any ready to send adapter is
f
X1
y
SENDER
Set Reserve
RECEIVER
-bResponse
Copy Regi stersResponse (Inclodesregister information)
w
Message Proper^- Response
Clear Flag 8'Response
Noce: Frames enclosed within bracket are transmitted withoutinterference by beginning their transmission in the fixeddelay R ±r i od .
Figure 2.5 Message-Onl y Frame Sequence IFP.AN841.
25
i
r
64
12
23
74.5
SENDER RECEIVER CHANNEL CHANNEL DURATIONRELEASED HELD (uSEC)
Delay(Prep aratIonto transmit)
Set Reserve
Response
Delay
Copy Registers toResponse(regi^terinformation)
Hessage(64 byte=_.)
Response
Clear Flag 84— Response
Delay 20
Note: Transmission times do not include propagationdelay.
Figure 2.6 Tim i ngs for Message-Only Sequeoces [FR,AN841.
25
w
64
0
Associated
Data Block
20472048
Associated
is
0
Iles=_.age
Proper
SENDER RECEIVERSet Reserve
Response
Copy Regl stern
goResponse (Inc.reg. info.)
Peceive Data(send message)
Response
Set Flag A.4
Clear F1 as 8Response
P
4 Clear Flag 9Response
Copy Registers4 Response (+ reg.)
P.ece i v, Data(send assoc.data)
Response
Clear Flag 9Response
go Clear Flag 9Pesponse
Copy RegistersResponse (+ reg.)
Receive Data _I (send assoc. data)
P1
do Response
Clear Fiag 9 -ResponLe
Clear Flaq_ 9Response -__O_
Clear Flag A—Response
H ote: Frames Iri brackets transmitted without interference bybeginning their transmission in the fixed delay period.
Figure 2.7 Message-with-Data Frar.? Sequence tFRAH 82i.
i
27
I
64
12
23
96.5
64
12
29
34
12
412
M,
SENDER RECEIVER CHANNEL CHANNEL DURATIONRELEASED
HELD
(uSEC)
•,
Preparat i on to transmi t
Set ReserveResponse
Delay
Copy Register pResponse
Message14 — Response
Set Flaq_ AResponse
Clear Flag 8 — wP,espon ^e
Delay
44 -fCl?ar Flag 9Response
De I ay
Copy Register— 10.q Response
Assoc. Data(2Y, bytes)
aw Resoon=_e
Clear Flag 9 0.Response
De 1 ay
--C1 ear Flag 9Response
•Repeat for each data frame •
•
C1e?r Fl?.g A to ^.Response
12Delay
20
Figure 2.8 Timings fc,r Message-with-Data Sequences1 FP.AI 194 1 .
29
.1
V'
Pi,
jprevented from transmitting during the fixed deIai
period. I4 the sequence to be transmitted is a
message-only sequence, control of the trunk is not
jrelinquished until the entire remaining sequence is
transmitted, see Figure 2.6. The timing and duration of
a message-only Cequence is shown in Figure 2.6.
i1 A message-•with-data sequence is preceded b, , a
message-only sequence, follov)ing the tran=_mis.sion of
the message proper the trunk is released, see Figurei
2.7. When the receiver indicates that it is ready to
receive more data by sending a clear flag 9 frame to
the sender, the sender will compete to regain access to
the trunk. Once the sender regains access to the trunk
it wi11 send a copy register frame to the receiver. I4
successful, it will regain control o* the trunk as
described before. Control of the trunk will not be
relinquished until an associated data frame and clear
flag 9 frame are transmitted by the sender. Thi=-.
procesB is repeated for each associated block of data..
Ma.intaininq control of the trunk durinu data frame
transmissions ensures that these f rames are never
involved in collisions, thus only relatively short
frames will ever need retransmission due to col Iisior,
on the truck. The trunk is held durino data fr_.me
transmission b y the sending adapter, by transmitting
synchronization bits during the fixed delay periods
29
ti 'N
r
914;
I following the transmission frames that make up the data
frame sequence. The timing and duration of this
sequence of frames is shown in Figure 2.8. It is
important to note that in all of these sequence
transmissions that during the delay periods, a
transmitting adapter must aIv.axs compete for trunk
access in order to re g ain the trunk.
I
INSC adapters also support an alternate form of
transmission scheme known as the burst mode. In this
4orm of sequence transmission, an adapter will not
i
relinquish the trunk until it completes an entire framei
sequence transmission. According to literature
avaLi I abl e [ FRAN82] , [ FRAN64I t is mode is rare l y used
and will not be detailed in this work.
2.2.2.2 Trunk Selection
Any adapter in a network can be connected to up to
four trunks. Each trunk use- the same trunk .access
protocol and operates independent l y, i.e., each trunk
has a separate interface board within an adapter. The
interface listens for proper Iy addressed incoming
messages and is capable of generating rejection
response frames if its adapter is reserved. An adapter,
having a frame to transmit and contending for a trunk
will scan the trunks. in a specified manner until it
senses a non-busy trunk. The adapter then waits until
the trunk can be captured through the trunk access
j
20
I ^
A=It - .^ L
I
11
protocol. It the trunk is bus y with the adapter' =_ frame
transmission its search terminates; otheru,ise it
continues. Trunks to be t. . ed ._..- _ __ -1 - : - = i ri _
host — adapter message and a receiver's trunks to try may
be specified by the transmitting adapter. A trunk is
said to be disabled if it is not connected or was not
specified as a trunk to try. A t runk is _.aid to be
enabled if it is connected or is specified as G trunk
to try. An adapter will try a trunk by first
Determining whether it is enabled or disabled, if the
trunk i= disabled or bus y it will try the next trunk.
If the trunk is enabled then the adapter determines
whether or not it is bus-. The period o4 time required
to t.r y an enabled trunk is 5.5 mi crosec_onds, suh i 1 e the
time required to try a di=_abled trunk it 2
microseconds. The ability to specify the trunk=_ to try
i n the tr ansm i t ter and rece i . : er prow i d; s a me an to
dedicate trunk=_. to specific types of traffic, e.g.,
= p ort tr ansm i ss i ons on one, long tr?nsmi =_sion E on
Another. Simulation stud i es indicate no benefit is
derived from dedicating trunks for particular message
types. The RbiIity to speci4 y trunks is more useful in
multi trunk net1,.iorks that are not ful l r connected
[FPANd43. It is possible for an adapter connected to
more than one trunk to recei ? mesaaae= sirnul taneou:IY,
when this happens the adapter wi11 accept c. re end
1
reject the others. Communication between adapters on
tvio different trunks, require=_ the _er l) i c p s of an
intermediary. One of the adapters will transmit to a
device attached to an adapter common to Do`.h trunks.
Once this device has received this me=s?Qe sequence it
will then proceed to transmit the sequence to thrf
intended receiver on the other trunk, Thus
communication beti.jeen adapter= on different trunks
consists of sending a message-with-da.ta sequence twice.
2.2.2.3 Virtual Circuit Establishment
An adapter reservation scheme (Figure 2.9) is used
to establish a virtual connection t.eth.ieen adapters
d,?siring to communicate. I;jhen an adapter receives
message from i t at t?shed host . i t w 1 1 f i r s t reser'_Je
itself; that is, the adapter makes itseif inaccessible
tcl recei -red tritnsmi =_s i on 4r•nm any other adapter wi t
the exception of the adapter with which it -s trying t^
communicate. Af`:er reserving Itself, the =_ending
adapter transmi t s a 5°t reser')e frame to the receiving
adapter. if the re=eiv;ng ?adapter is idle; that is, it
is no* reserved, then the rece i -) i ng ada.p ter wi 1 1
transmit a re =_ponse f ,-ame indicating that the adapter
has reserved itself to receive a transmission from the
transmuting adap+.er. Following the reservation of I
receiver, the frame sequence transmission proceeds as
described in section 2.2.2.1. Both the transm+ttinc, and
32
/i5g. NoC f rom
OS^
reserve self
initialize:delav :=1usI.etry n
Figure 2.9 Adapter Peservation Scheme [PR N82f.
4
•
1
t
\ i
receiving adapter =_. Terrain reserved d;jririg the entire
message-only or message - -A' -Lh -data frame sequence
t^an sin i=-.=-i or, . Af t er completing the frame sequence
tran=-mission, the t - ansmitting adapter releases tine
rece i u i ng adapter vii th a c 1 ear f i ag A frame :xnd then
releases itself completing The termination of the
connec t i on ; =_.ee 7 i gure 2.6 ar,d 2. 8.
When a transmitting adapter sends a set reserve
frame to a reserved adapter, the reserved adapte r w i 1 1
respond with a reservation reject frame. The r'irst tim.-
a sending adapter receives •a reservation re;ect frame,
the adapter wiI; delay for a "binary exponential time"
before mak i n another re ser ,.,-.t i o-i at temp t . Fol 1 ow i n
the first reser k.l.at i on re.j ec t i nn the adapte r, wi 1 1 de 1 a.y
I mi crosec ond before making a second attempt. For each
following reservation re.jec"_ion, the adapter will de l, 3y
an amount of time egcal to twice thb previous de1 z;y, up
to 128 microseconds. When this value Q+ dela y (128
micro =_econd=.) is exceeded retry i= advanced by ane, the
delay is reinitialized, and the sequence is repeated
(Figure 2.9). This proces s_ will continue until 3ither a
successful reser ,. , ation occurs or the ada p ter's i,etry
cc,ur,t is exceeded. An adapter`s retry count is base,] on
its unit number, manually set by the uBer and is in the
range of C5 to 250 , If of ter re-..r), count tr i es t`le
adapter is un at) Ie to reserve the r^,cei,:)er, the
!•
<M
I
^4
1
0
transmission is aborted and the senner returns to the
idle state. The s.endinq adapter remains reserved
th r, ouahout the entire reservation attempt p roces s_. This
reserva.t on scheme ,)itt the bi nar> exponential delay=
between transmissions, serves as congestion control on
the net^;^ork b y keeping a send 1nq adapter fro,
manop-lizing the network.
T:, is retry scheme as descr i bed has the potent i al
of causing adap cer deadlock.. Th i s wi 1 1 occur ; f ti--,,a
adapters a t tempt t4 rese rve each other n w 1
simultaneously. They will find each other reserved and
qo throu rth the retry scheme until c.-ne or the other's
retr; • count is exceeded and aborts the attempted
transmission. To al 1 ev i ate this probe em, x back.-off
scheme is scrap 1 oyed by commun i cat i ng adap ter s. Th i s
back-off rijutine enabler, a send ,nq adapter to determine
the identity of the adapter that the rejecting adapter
is att? r ipt inq to reserver ,rc•m th .2 j e C t reswon =_e. It
the sending ada p ter determines that it and the
rejec t i nii adap ter are it }emp t i n to reserk)e one
another, then the sending ada p tsr aborts its
reservation attempt a^d relea=_es itself. The s1 own e=_.s
of this back-off mechanism can cause both adapter= to
abort their reservation attempts, preventin•: _•i the r
adapter frorr. cor.municatirig on the network. The time
35
ta
required for this mechanism to respond is dependent on
the adi .oter model and i= aporoximatel, v bG microseconds.
H second form of deadl cc V. ,,.jh i c the back—off
mechanism will not c.rrect is called a reservation
request loop. This occurs when three or more adapters
attempt to reser-.-P each other,i.e., adapter A attempts
to reserve adapter B, !hile p attempts t•:) reserve C,
and C attempts to r^•^,.ve A. In th^s ca=e the adapters
ha ,e no wa of •iP ;erm i n i n p that this s i teat i on exists
and each adapter w^ l i perform the r e _.ervat i on r e t r y
scheme as nrev l ousl ;/ de scr i bad. This deadlock wi l l onl ;,
be rs so v e d Nh r One of tht? adap -ter' s re try cou p t
expires, causing the adapter to abort :is reservat i on
attempt and re I eaae itself. Serious degradation C
trunk t;iroughput ma y be predic`ed during this
reser , . , at i on rPque=_ I pop per i o IDUP&J793 .
2.2.2.4 Data F l ow Control
Network adapter's are suppl ied with tvjo 2E: byte
buffers c4K. b/te buffers optional.). 40i t two buffers
mane ca.n be f i 1 1 ed/emptied b y tr .ans . fer +r Om/ to trieI
attached host, while the other buffer is emptied/filled
by a network transmission reception. In order to en:.ure
that buffer capac i t y i s not exceeded, a f low control
mechan i =,m i needed. Flow control is ach i e-)ed in tvjo
ways. First, data frame length is limited to adapter
bu++er length. Secc nd, an adapter, =.ending a data frame
a ,.R
L
nor
1
^ ly
4 4^
.:,a
may not send another data -r'rame anti the receiving
adapter specifically requests it. This ensures that an
adapter will not receive da.ta fr?.mss at a rate taster
than an adapter may process them.
Additional techniques used b y adapter to prevent
them from becoming permanently blocked awaiting receipt
of a respon =_.e frame which wi'.1 never' arrive are
described in the fo11owing One of the techniques
involved is the requirement that response trames. begin
their transmission during `he fixed delay period. If an
adapter does not race i v. - a response to a transmi s si ors
it will reschedule the transmission at a later time. ro
Ensurr e that all adapter does no* retransmit
indefinitel y , as viouId be the case if the receiver
address were incorrect or the receiver was.
malfunctioning, a limit is p1aceu on the number of
retransmissions aIIol.,eed. A sct reserve frame will be
transmitted 16 times on each trunk anf-1 then aborted if
no response is received. All other frames wil l be
transmitted 256 tines beTore abort, For the case when
the expec fed re{.ponce i s a non-response -frame i c l ear
flag 9 granting permission to transmit data) a "deaama.n
timer" is used. In a tran_.mitting adapter this time
f; same spans the time from ,,,hen the host's transmi t
message is receive until the last butter i
transmitted and acknowledged. In the receiving adapter
37
i
2ii_
this time begins with the rNceipt of a set reserve
f. ame and doesriot end unti 1 the re: .- ipt of the last
data. buffer. This time span ranges fic•m ,5 to 8
seconds, adjustable in second increment =_-. If all
frame transmissions are not completed before this timer
expires, the transmission i=_. aborted [FRANe2].
2.3 In"ra —Adapte r- Communication
A message transfer betweer, attached hosts on the
same ada p ter is termed an intra — adapter rransfer and i
carried ou`. entirely local to the adapter. This Type of
data transter occurs without utilizing the data trunK
network. An im p ortant consequence rit this type of
transfe f, is that the ad<.pter will appear reserved to
the rest of the n p twork . Obv i ousl , , if the occurrence
of this type of transfer becomes p^edominate then
network performance will suffer. If resources do not
conflict, intra—adapter communication may occur
concurr?ntly with network traffic and cause no
degr_adat i on of netl,,)ork: performance .
}Y
4
W
im
Chapter 3i HOSC System Description
As pr,^viou s-1y stated, HOSC is a distributed
computer network employing many large mini—computers
and NSC's HYPERchaniiel network. The primary task of
HG i_-'C is to provide NASA scientists and engineers withi
near real time acquisition and analysis cf data duringk
Space Shuttle operations. This information a.l 1 ows MSFC
engineers and cen tr 3c for personnel to act in a support
ca p acity to other mission specialists at KSC and JSC.
Some of the primary monitoring and support requirement=_.
of HOSC are pre — launch support -for the Space Shut,.Ie
Main Engine (S,,--,ME), the Externa l Tanks (..ET), the Solid
Rocket Boosters tiSRB's), the Main Propulsion Systems
(MPS), ana the R any e Safety System (RSS). Further,
sup p ort is provided for mission e::periments designed by
MSFC personnel.
NASA has defined the mission of the Flioht
Operations Support Center at HOSC as follows:
During pov!ered f1ight, the HOSC willreceive only data which is in the LPS (LaunchPr_ ,ces.sirig SS ten) at KSC. The shuttlesupport tears 1&6 1 1 be i n the HOSC during thisphase of the mi=".:ior, ano will be th? point ofcontact with the JSC Mission EvA-1uation Roomf.MER) for prc,bl em 6 i =- .cus s- i on and reso1 u t i orgyas required and will be on call duringoroi tai operations_.. The Space L:b andexperiment support team will be located inthe HOSC dur i rig orb tai operations L•jt,enapplicable.
05.
i
Fol Ioiuing completion of the activeShuttle vehicla support activities, data isrecalled as required for more detailedanalysis, and initial preparation is made toprovide support to post flight evaluation[NASA82].
HOSC is located in the west end of A-wind building
4663, at MSFC in Huntsville, Alabama. Figure 3.1 shows
the functional com p onents of one of many HOSC system
configurations. The information contained in the
following =_actions of Chapter 3, is from previous work
published in connection with this same research effort
IMAUL841
3.1 Typical HOSC System Activities
The data processing activities at HOSC can be
placed into two categories, routine d a i I v activities
and missicn/launch activities. A summar y of these
activities by category ar.d some details c' f t ypical data
transfers are outiined in Table 3.1. While this table
and the de =_criptior, that +o I I ows, de s cribe typical
?c t i v i t i es, these are not al 1 the act i v i t i es that HOSC
is. enuaoed in. There are some activities that a.re
defined only for a current mission, i.e., experiment
directed by HOSIC mission spec i :klists. Since these may
change from mission to mission they are not included in
the fol lowing description, but must be characterized
and considered in the specific mission scenario
-equired for the total system analysis.
I . 40
a
aI
"u ^ CLc o wc ^U ^ r
u T^ (n W
w a a
0 REs=
to u
C C® Q WJ yJui
C c n aF-W O
U^ via -^
1
c WW a
}
° z 0
I L
a ^ qqa ao
mU
wG
= c a m
^'
n c a n Va o °
ja U o
o w a C
_ ^ ^+
a M ro
N Y U
►- U -
u d
L7 N m aF
^ v1 a
H
CA I t aY I U p
7 W Q tl
Wa o , zn_ m
zQ ^V,L4
L -4
j^a C _or= I t a
UaWQ
a o^-4-1
00 = Q U
im
I A
41
, 0
1
I
,.1
TNBLE 3 . 1 HOSC Data Transfers
1. ROUTINE DAILY P.CTIVITIESA. POCC Activity
Resources Invol^)eri: MPS Primary (VAX 4)MPS Backup (VAX 1)
Quantity of Data: 1500"100 512-b y te blocks intwo components. 6 8344-byteblocks and 100,000 512-byteblocks.
E. ECIO Data Stream .Generated b y ROMResources I nvul ved: MPS Backup :VAX 1 )
Spacelab °/32
Quantit y of Data: 51.2 kilobyte per secondstream concurrent with POCC.
^fC. IGDS/SIGMA Active ties (Proposed?
Resources Involved: T,_. be determined
aQuantity of Data: Unknovjn .
f' II. ROUTINE LAUNCH ACTIVITIES
H. Routine Dai ly P7t1 l ji ties (Ses Item I.)
B. Main Engine DataResource =_ Involved: STS Prlma.ry (PE 3244)
MPS Backup (':!AX I )
Quanti t y of Dai.?:
C. OD Data StreamP.?sources Involved:
Ouant i t y of Data
50 kilobit per second stream(Launch minus 8 hours untilMEC0)
FEP SSME PE 3244)Cti0 Computer
'T'=- Pr i mart' PE 3244)MPS Backup (VAX 1)
192 k 1 1 obit aer secoridstream into FEP and then toCSO w t Iran=_ter r•f 40percent to STS P-imary andMF Backup. (Launch minusseconds antil MECO)
D. Engineering Displa y ChangesPe_.ourcos Invol ved: STS Primary (PE 3244)
STS Bac=kup (PE 9/32)'Dpacelab 8/32 :PE 2/32)
vuantl t y of Data: Insignificant.
4242 1
-Qi• .
^I
Ore activity not associat:d directl y with the
real-time responsibilities of the network and therefore
a routine daily activity is POCC simulation activity.
The impact of POCC activity on overall performance of
the network stern s_ from the requirement of continuous_
data transfers between network computers. This data i5 ,
currently being transferred be t1,,)een the MPS primary
computer ( I)AX 4) and the MPS backup computer (VAX 1 ) .
During each twenty-four-hour period, this activity
requires the transfer of 150,000 512-byte blocks of
data. This data i s transferred in two components; six
t i m e s each day, ?.n 8344-byte black i s transferred
(50,000 bytes cumulative, with another 100,000
5 112--byte blocks transmitted randoml y but distributed
ievenly throughout the day.
POCC also generates a continual 51.2 kilobit per
second data stream known as the Experiment Computer
Input/Output (ECI0) data stream. Thi s_. data stream is_
ongoing and concurrent with POCC activity. ECIO data is
transferred from the MPS Backup Computer !VAX I) to the
Spacelab 8/32 (PE 8/32c).
The rOLI tine components of the launch day data
activities a.r ,? the Main Engine Data Stream, the
Operat i onal Data (OD) StrFarri, ar,d the E n g i n e e r i nu
D i spla y Change regUests. The Main Engine Data is
collected and disseminated on launch day only. Data i.
43
i
.- • _ _ As
.a.
W'
funneled thro:,gh the network to the MPS Backup Computer
(VAX 1) from the Shutt1A Transport System (STS)
Computer "IPE 7--,, 244). From eight hours before launch
until about twelk.e minutes after launch at Main Engine
'ut Off (MECO) 9 STS Primary accepts. a continuous 50
kilobit per second lata stream direct1;• from the KSC
Firing Room and transfers about 24 percent (12 kilobits
per second) of the total stream to MPS Backup.
The OD Stream is a. 151- kilobit per second data
stream arriving at the Front End P-ocessor Space
Shuttle Main Engine 'FFP SSME) Computer (PE 3244) on
launch day concurrently with some of the Main Enr^inN
Data (launch minus 4 seconds. until ME.CO). This data
arrives from Goddard Space F1ignt Center in Mar land,
and is transferred over the network. ho +h•_ CSO
facility.
The Engineering Di=pla y Change activit y is an
a ! most insignificant addition to the total network
traffic. This activity i nvol ves a transfer from STS
Primar y to STS Backup and Space 1 ab E/32. Th i s tr an_.fer
consists of the name of each engineering con =-ole format
in the support facility that is changer s luring the
prelaunch and launch period (launch minus 9 second =_ to
MECO) [MAUL84].
44
i
R
3.2 HQSC System Components
The Hunt=k p iIle Operations Support Center as a
distributed computer facility uses various computer
^esources interconnected together. The basic components.
involved at HQSC are the computers, communications
processors that receive data from wideband
communications links (sate IIite and terrestrial) and
the h^;.vdwarP recu i red to i nterconnec t these v a r i cw
resources, The inte-.connecting hardware. Network
Systems Corporation's WYPERchannel network, has. been
i previously described, and interconnects a variety of
computer resources of different manufacture, i.r
Digital Equipment Corporation (DEC), Perkin—Elmer (Pr),
and UHIVAC. The bulk o+ the processing power for the
netiuork i performed by the DEC VAX and PE :3240
computer=_.. A cursor y look kUili be given to these two
computers. These computers are examined for the sake of
information only, since in the subsequent anal ys_ is e.11
network users will be represented as fixed rate data
generators.
The Digital Equipment Corporation's VAX serie s c14
computers supports a 32—bit ,,lord architecture that
estaol i s-he= at v i r tua.I address, space of 4.? bi 1 1 ion
b y tes of user — addressatie memor y . Throughput of data in
the system is optim i zed by using a 32 —bit high _peed
data structure that ties together the central
4
L
qM
r
1.,1
processor, main memory, UNIBUS subsystem, MAC38 US
subsystem and the DR780 high spec-d direct memory ;.cce
subsystem. This high speed data structure is known as
the ° y nchronous BackpIar+e Interface (SEI) and a device
linked to it is known as a NEXUS. Each NEXUS receives
every SE tre.nsfer ; e l ec tron i s l og i s i n the I?EXUS
determines whether it is the designated receiver for
the ongoi inq transfer . Data transfers. can occur from CPII
to memory, from I/O controller to memory subsystem, or
from CPU to I/O controller, with maximum aggreg -ate
transfer rates of 13.3 megabytes per second. These
transfer rates are 1 imi ted by the following factor-.:
0 260 nanoseconds/c ycle = 5 million cyclesper, second
• each cycle can carry an entire byte ofdata or address representing a memoryrequest
• one cycle is used to request eight bytesof data to he r ead or a+r i t ten , and twocycles are used to carry data at fourbytes per cycle
o ° million cycles/second e 4 by tes/eyrle =20 million bytes/second
0 20 * 2/3 (1 of every 3 cycles is anaddress) = 13.3 million by tes per second1DEC803
As is sho+^jn in Figure 3.2 , a VAX computer ma,,
interface with more tear, one memor y subsystem. !r the
Case of a two-controller, interleaved memc.ry
46
1,
oZmm
a O
u `^7 NO
m _vO Y m OCL o (o
5U-)N
cu
OOO
Eu
EuO
m mN
O ^- dl
E c ul _^ 3u O NM U o a uO
^Q
uh\
1l OO
m \ g^c CO
E c `^
Ir7ri
0 v LOU q
u oQ
>^^ ^I
s
QaLL-
UD
xv
Em
oao ^r ^Q:0 c0,
Ln
mV)LnQ
U7
m
Z
vcv
nv
O
`O
Ofi
Uvv c
a^y
aEO
U000
Xd
WO
La
00cd
xuO
yN
^" 1
^J
aw.14
Lt.
v ^'arn O
pq
In
in u m
Eo vlu
N C
y) c al
^. o vcn U o
Ln
mo u
u ^'v ^
v+ ^Q --
w
47
M ^
(ilk, `:
con+ i gurat i on , the compu ter wou 1 d al so have two PIEYUS
memory controllers on the SBI.
The IINIBUS Subsystem (UBUS) is. a high speed,
as ynchronous data system that allows communication
between peripheral hardware and the VAX computer. The
VAX. 111780 is capable of supporting four UBUSes: one is
standard, but three more are optional (Figure 3.3). The
UBUS is connected to the 36I through a UBUS Adapter
(UBA) i.,jh i ch perform s_ se ,.,eral impor . tar, t se r- i ces that
are transparent to the user. The UBA provides:
• access to UBUS address space from the SBI
• mapping of the UBUS addresses to SBIaddresses for the direct memory access(DMA) transfers to the system memory
• data transfer paths for UNIBUS deviceaccess to random SBI memory addressesand high speed transfer for devices thattransfer to consecutive, increasingaddresses
• UNIBUS interrupt fielding
• UNIBUS priority arbitration
The address-mapping function is especially
important because the UBI_I S ha.s or, l; eighteen data 1 ine=_.
providing an apparent memory-addressing capabilit y of
only 200 kilo- bytes. Through it=_ addres s_ mapping
a.bi 1 ities, the UBA prok)i des the c3.pabi 1 i ty of mappinq
the UNIBUS adcres s_es. into the SBI addresses so that the
48
11
iIlk
1
T60
^a
^ ^ Z
rcr0w
DCLu
N
o^0co
CL0
r—(3 En a
^ p
¢apc0 .^
0 xm
—
p'rn €
C
Q 3 E
o
.^X a..la mm
::) N 1^
L m Uu to u opz
L'1 pN >Q O W
u u
tm ^
c ^UcpaYU 7Om
N N 41
D =^cc m a
lie
7L D Q LcUcaL7
49
t1
r
fu I 1 sys tem memor y of 16 array boards of 256 K i 1 obytes
each (A gigabytes total) can be accessed.
The UBA accept =_ two forms of input from the !;BIIS:
hardware-generated interrupts and direct memory access
requests. Each device connected to the UEUS may use one
of five priority levels for requesting bus service. A
non-processor request (NPR), which is the hi ghest
priority request, may be used when the device request=
an operation that does not require proce_sor
intervention, such as a direct memory access transfer
to memory or to some other . device. A bus request (BR)
is thus generated when the device wishes to interrupt
the UBA for service. Such service might be a
CPU-directed data transfer or A flig indicating the
existence of an error condition at the peripheral.
Since there are only five priorit y levels and more than
c. r, dev I ce may be connected to a spec i f i c request
1 eve 1 , i f more than one dev i ce makes the same requesi ,
the device that i s_ electrically closest to the UBH
receive =_ the highest priority.
The NPR request for direct memory acces s_ is a very
important feature of the IJBUS subsystem. These DMA
transfers car, be divided into two group s_.: random access
of noncontiguous addresses and sequential access of
s_.equentially increa - ing addresses. For random access.
each UBUs transfer is made through the Direct Data Path
50
1
Ow ,
(DDP, one per UBUS) and is mapped into an SBI transfer.
This procedure allows only one word of data to be
transferred during a single SBI cycle. For devices
capable of requesting s equential access s ervices, use
is made of the Buffered Data Path (BOP). Each UNI BUS
provides fifteen such BDPs which storo the data so that
four UBUS transfer= are performed for each SBI
transter.
The DDP must be used b y devices• not transferr i nq
to consecutively increasing addresses or by devices
that mix read and write functions. The maximum
throughput via the DDP is about 425 ki1ov)ords per
second for write operations and about 316 kiloword=_. per
second for each read operation. These rates will
decrease as other -SBI activity increa.=__es. [DEC801.
Maximum published throughput via the BDP is about
65' 5 k i 1 owords per s econds for both the read and u,r i to
operations, but realistic throughput rates of onl y 1.5
megabits per second are actually expected 1;.iith this.
figure degrading as other SBI activity increase_. BDP
tra p=_.fern are restricted to block tran=_.fer with blocks.
of length greater than one byte. All trans-'ers vii th i n
the bI ock mu =_ . t be to con=_.ecut i ,Jr and increa si n g
addresses and all transfers must be of the same
function, either read or- wri te.
f^
51
1
Li
The MASSBUS subsystem and the DR780 high
p erforma,-ice, 32—bi t par.al let interface wi l l not be
described in this summary, since an understanding cf
their functional characteristic-- is not needed to
determine their relative impacts on the HYPERchannel
network. The influence of both may be felt indirectly,
hol:,jever, since activity on the MAS8BUS or DR -7130 will
translate to SBI activity which will affect GDP and BDP
transfer rates as previously described.
1 The VAX CPU will also not be described in detail
but several comments may be made about the CPU and it=__
effects on system throughput. The CPU represents the
r o t s c c t Pmost intensive tratf i c l oad n h? memory ub_;.^: m in ik
hence on the SBI. Obviously, it the processor is
l engaged in intensive competing, it will request data
ff much more often than i t o-j1 1 1 wr i to data, and th i s
memory access r ,?pre =_ents substantial SBI activity.
Fortunatel y , the large cache memory of eight kilobytes
ava.i 1 abl e to the CPU is able to reduce the SBI tr-.=-L++ i c
load considerably. In addition to the effects of the
CPU on SBI activity, the SBi traffic from other sources
may also affect the CPU efficiency. Published figur?s,
IDEC3Ul, indicate that in a system with two memory
controllers the processor will be sla:-jed by about four
percent per averaged megabyte per second of I/O
traffic, while the impact of a single memory controller
52
Z1
is to slow the processor by a factor varying from two
to four. Table 3.2 summarizes the I/O characteristics
of the DEC AJAX 11/7$0 processing system.
The Perkin Elmer 3240 series c,f computers is also
a high throughput machine with a 32-bit architecture.
The HOSC currently uses two PE 3244 machines with
primary responsibilities as front end processors
r•ece i v i ng real -t ime data streamsfrorrti the KSC f i r i ng
W room.
1 The 3^244 memory subsystem is organized into banks,t
each capable of handling four megabytes of addressable
memory. Total system memory range =_ from 21 56 kiIobytes
in one bank to a full system complement of four
4-megabyte banks, for a maximum of 16 megabytes of
addressable memory. All memory is connec-ed to a common
memory bu=_. which consist=_ of two unidirectional,
asynchronous, 32-bit busses. One bus is dedicated to
memory write functions and the other i =_. dedicated to
memory read functions (Figure 3.4).
Input/Output is accompl ished using fine external
communication busses: one multiplexer bus for medium
=_•peed devices and a maximum of four high-speed Direct
Memory Access (DMA) bus=es that each support eight high
speed bidirectional ports. Each DMA port is controlled
b y a selector channel tied to the multiplexer bus that
controls and terminates transfers through the CPU. Once
v
53
t.
5N
TABLE 3.2 Summary o4 DEC VAX 11/780 I/OCharacter i st i cs
E!
Processor:
32-bit vicird architecture
Main Memory:
Virtual address space:
Cycle Times:
4.3' billion bytes..
800 nanoseconds per 64bit read.1400 nanosecond=_. per 44bit write.
I/O UNIBUS Adapter
Maximum aggregate rate:
1.5 Mb y te/sec throughBPD
Buttered Data Paths (BPD'): 15 total, 8 b y te butteri n e ac h, 695 k i t ovior dsper second read andwrite. Used for fastdata transters.
Direct Data Path (DDP) 425 k: i 1 ov.)or ds/sec forv.ir i to and 316 k. i 1 ov.jords.per second +or read.Used for tran +ers tononconsecutive memorylocation_..
54
I
OF PG:j k Q JUH"t . it
0M,HU
Sutlt 1 2AMR I
^I — — ------- KWUI
' KUM" ACC133 IIMSoo RA SEC
tIC ----------- LMC
61 WSTC co?" "MRi III!
r ^Ixl.
°"u—^ — ^u I CACnio K5114' 111 ^— KVPM ACCZ9Ii DMA
— — _TF"IUTOR
' III
1 DMA rugDMA so$ MAS
lQ_IM't to M1/!
(IPM3 MAI)
coR-ots cRt 8
MOLYI-Qttl LOOC. AIM"
sri s o
;MI"" ttAC" I*32 Itt11CAPD is ttl " ISR32 still CTC
C
1RUM
Figure 3.4 Block Diagram of PE 3244.
55
II
1
n
F
56
1
7"
the channel is activated, the processor is reIeased and
is free to continue processing on an unrelated task.
Published I/O transfer rates for the PE 3244 [-MA bus
indicate that transfer rates of up to 10 megabyte =_ per
second i n the burst mode are possi bl e for each DMA bus
[PEC81I. The I/O characteristics of the PE 3240 series
is summarized in Table 3.3 [MAL ►L84].
to
0E
TABLE 3.3 Summary of Perkin Elmer 3240 I/OCharacteristics
Processor:
32 bit/word.
F Main Memory:
V i rtual Address pace:
lb Megabytes.
Cycle Time:
500 nanoseconds.
DMA Bus Data Transfer Rate
Burst Mode: 10 Megabytes persecond with a maximumof 4 DMA busses per/stem.
57
1
1
:.
Chapter 4Software Design Description
This• chapter describes the development of the
software used to model the HYPEP.channel network. The
intent of the simulation is to accurately model the
characteristics of a HYPEP.channe 1 network. Wh i 1 e, every
possible function of the network is. not characterized,
the protocols which have the most impact on the network
were included to the extent possible. The goal of the
simulation is to provide a software tool to analyze the
characteristics of present and future configurations of
the network at HOSC.
4.1 Software Functions
The simulation model as de v eloped should perform
some primary functions, among these are:
1) provide a relatively easy method ofsimulating the existing system andprovide a means for modifying thesimulation environment so that differentconfigurations may be modeled.
2) provide an output which may be meaning-fully converted to performailLe measuresdescribed in this Chapter and Chapter 5.
3) provide a user friendly interface at alllevels of user interaction.
The so+tware should be designed to be as portable as
possible so that transferral from the development
compu`er to other computer environments should be
accomplished as easily as possible. Also, an;, future
56 I
a
CD
Iii enhancements of the algorithm as designed, should have
the capability of being accomoIished as easily as
possible.
Finally, the development of this simulation as
related to the ISO-OSI model for distributed computer
processing (Appendix II), ma y be thought of, as having
been developed between levels S and 6, the Session and
Presentation levels.
4.2 Design Constraints
The primary design constraint placed on this
imuIation effort was that the simulation be as
transportable ?.s pos_.ib1? between ccrrpUter:
unspecitied size and capabilities. `herefore,
I A.nguaae PASCAL w as chosen due to its vii de=_pre :^. d
availabilit y and richness of data structures.
4.3 Design Specifications
This sec tion deals wi`.h the imposed constraints
an^J assumptions which the model uses to ?.ccemplish its
simulation activity. These assumptions were mode to
keep the model both realistic and manageable.
4.3.1 Simulation Assumptions
In order to maintain viabilit y and model validity
certain assumptions were made. These assumptions ?re a^:
follows:
59
rm
v
1r• N
Qir
i
r
1) Every time an adapter regijests thetrunk, the frame sequence sent is amessage-with-data sequence. Therefore,message-only sequences are excluded.
2) Maximum number of trunks is two.
3) Model will reduce to a single trunkmodel.
4) Any single adapter may be attached toboth trunks (dual trunk model)(1,2,..,N)
5) Trunk lengths are less than, or aqua to1000 feet, Belden 9248 cable data isused (propagation time).
6) Worst case fixed delay, priority deiay,and end delay will be used, as given by(FRAN841.
7) In order for the -,cdel to resemblereality as closely as possible, measuredtransmission frame times will be used(CWAT5821,CFRAN821).
8) Intra-adapter communication is notallowed.
9) The wait flip-flop option is notimplemented.
4.3.2 Parameter Definition
As previou_ly stated worst c^-=e value_ _,f fixed
rela y , priority delay, and end delay are a=ed in the
si m u l ati on . The expression used to evaluate the fixed
dela y on a given trunk is given by:
Fixed dela y = 4 nsec * (trunk 1errath) + 2.08 user (1)
where trunk length is given in +eet. This value
approximate , but is greater than, ti.-lice the end-to-end
60
propagation time for the trunk, plus the time required
by the adapter to formulate and to begin transmitting a
response. This value is the same for each adapter on a
given trunk.
The highest priority adapter i E assigned a
priority delay of 0.48 user. The priority delay for the
remaining adapter=_. on a liven t r unk is given by:
Priority delay (K) = Priority dela y -:K-1)+ 4 ne.ec * d + 1.6 u=_.ec, (2)
K = 2,3,....L
where K is the index of the adapter with priority K and
d is the distance in feet betvieen the adapter kvith
priority K and the adapter with priority (K-1), L
refsrs to the lowest priority adapter. The constant 1.5
u=.ecs i S added to al1e ,)iate oroblems with line
rzflections.
The end dela y of the adapter with priority K i
given by:
End dela y ( K) = Priority delay (L)
+ nsec * d + 1.6 u , ec. (3)
K = 1,2,....L
where L is the lowest priori ty adapter , and d i s the
distance, in feet, from the adapter tjitti priority K to
the adapter farthest from i t [FRHl\184] .
61
i1
-- 'FF
n1 w
These are the rrajo; parameters ujh i ch need to be
calculated for a given configuration of the
HYPERcha.nne 1 network . They are cal cu 1 ated for , ai ven
configuration when the simulation p rogram is executed.
4.4 Algorithm Description
In this section an overall view of the activit y of
the simulation is detailed. Detailed descriptions of
the individual module=_. used by the program are found in
Appendix III.
4.4.1 Overall Simulation Activity
The simulation as developed is a discrete ek.)ent
simulation. The event that drives. the model iE^ an
adapter's next scheduled transmit time. An adapter
trying to transmit will at tempt to obtain a. trunk in
three given time frames. An adapter ma y try to transmit
while the trunk i=_ busy, during the priority delay or
scheduling period, or finally, in the contention
period. If an adapter attempts to transmit while the
trunk is bus y its next transmit time is adjusted to its
=_cheduling period time (.priority delay). If an adapter
attempts "o transmit during the schedulin g period one
of two pos=_.ibil ities exist: 1) it att• ,,npt = to transmit
atter fixed delay but before i is pr i o- i ty del ay event
and 2) it attempts to transmit after its priority delay
event but before the , nd delay e:;ent. In the first
case, the adapter,is allowed `o transmit at It
a2
M^
IN
priority delay event and in the second ca =_e, the
adapter is forced to wait until ics end delay event is
signalled. This is in accordance with NSU s trunk.
access protocol. An adapter attempting to transmit
during the contention period is allowed to 0o =_.o
provided that the trunk is sensed idle. Once the
adapter has gained access. to a trunk thrclugh the trunk
accessprotocol as modeled, it will proceed to send its
message sequence.
In Figure 4.1, a complete message -with-data
sequence is shown. Appropriate timing and program flags
!M1 throuqh 116) are indicated. the algorithm shown in
Figure 4.2, in flow diagram form, illustrates the
overall activities of the simulation program. Using
these two figures a basic description of the program
+low may be performed. The first three blocks in Figure
4.2 perform initialization of program va^iables,
def i n i t i on of the ne twor l, con+ i our, .at i on , and prints a
description of the network to th_ auxiliary file Auxout
maintained bi the program. since trunk acce=_s has been
grantee (.previously described) an adapter w111 attempt
to send transmis=_.ion frames and data frame=_.. Program
flags are used to indicate where in the
message-with-data sequence the pre =_ent tran=_.mittino
adapter is located. The various update blocks !Case
through Case 7) update timing, bit counts, arid flag=..
b3
^1
I ^
1
Mil,
OF FOOk ^..-1+fit
JeH
n• 7
O
G. e
o^N
J
ps:NaY
e
r •^ Y u
.• a
J cn ^Y °
. 7 J
u ° ^
s:^ a ^? ;g J• ^+ r iN "'^ J o a
Y y D.
^ N = a^ uM O p
^ ^ J > e J
c e o. J
e jn r
7 ° Y
3p"D• • y v n rr ^. u J p< c c• . c• D • c F,• D 7 - tr ^. < u ^.
^ rtI ^ .. N •1H
J
7
s
64
•u^c1 •
• 7
r. N
o"
a^V w
®r
GO.r4
LJ
—4J
E
cn
w0
W
aiUGQ)
y
C1
L3
i
aJO11
m
S
r^
aiLJ
M
1
1
r
COF.( ^r
,Sled
Initltlitt
Chereclecltt
runt Ne'rorhnettrtpllon
EIT.e
CJRtenit I .eMrtt Treneelt Tlwe
lwittt Ne Eht•Ivrr fornlwltter
YTee
F
I
Figure 4.2 Flow Diagram of Simulation
1.
Activity.
I
65
ti
N YesTrunk 1^\t ^
I ;nitlellr. I
1
TrunVaria
k Ible.
C-0
)F P66,i l Jr.LI'l'
Initi#ilraTrunk T
Variable#
Cen \Tran^rwl t
T
rea
^1p rea
UPI at*Ilse#
care IT set flag n1
No
rle`e.upe.taea#e :et fie M7
flee "a
Uplat#
N2 1CaaeSet fin MJClear lt4
No
FlaTe# [clplate
Mt e#eet fin Ft6
^ ear M^
D
Figure 4.2 Continued.
66
1
C19 'I
Pi
.IOF. POu-
n
NA
""ateCe]e SSet II. N7clear I1^
r Mo
Ten fUpde,e.. Care 6
set fle 116' Clear H^
He
UQI.t. I
Ceie ICie.r N6
,1 ^1 )]t M•ilirnn]+^Il Tln ♦Current
I /Tl^a Mo^--•{ r s e Q C
e+c
Te.
Itlnl Netvorl1 Itlnt [n'Sr.tl.11c. - tietirltr'slAl"Su+...rT
Figure 4.2 Continued.
67
I ^
ti
1
Cas?2 incorporates the adapter reservation scheme I(Figure 2.9). If a receiving adapter can be reserved
for the transmitt;nq adapter the message sequence
transmission will continue, otherwise, the adapter will
return to case2 each pass. throuci h the loop, until it^i reserves its receiver or aborts its tran=_mis=_ion. The
I
message proper from? is updated in c^se4. A messagei
length of 64 bytes is assumed for convenience. Ca.se5
updates the tran_.mission segment in which a data block:
is sent. In case6, determination of whether or not
another data sequence need =_. to be sent (based on the
attached device's buffer size) is made. If anothe7 data
block is required, then the period of time t'— t" will
be repeated, this will continue as required. In case',
updates to me =_=age delay (th •: time difference between
initial transmission time and the final trarsmission
time), trunk sequence transmission tally, and adapter
next transmission time are performed. The transmitting
and r e c e i v i n q adapter'_ are released for• ether
transmissions in case? also. The simulation will
continue until the user defined maximum time or the
maximum number of me=-sage sequences is exceeded. The
simulation will then print output statistic =_. to an
interactive terminal and an output file.
68
f
I 4.4.2 Model Set-Up
Figure 4.3 illustrate=. the basic set-up of the
network con+Iguration which the simulation program
operates on. All configurations to be modeled should be
set up accord in? to this diagram. In the ca c_e of a
single trunk configuration, adapters I through N are
used.
The =_.imulation (SiMIi u_es. this model
con+iguration to properl y identify and c=haracterize the
network adapter's, their attached devices, and data
sources.
4.5 System Files
There are three tiles associated vjIth the
simulation: program, Dfile, and Auxout files. The
program file (5im1) may be maintained as either c_ource
or object code since normal operation of the program
requires no changes to the program file. The files
Dfile and Au;<out a.re maintained ac standard ASCII text
files. Dfile cone:ins. a description of the network, and
is used by the program file for parameter values.
Auxout contains a text description of the network and
is used to store output statistics from a particular
program execution.
At the beginning of a program execution, an
interactive query allovls the user to use the network
configuration defined in the Dfile or define a new
69
• .'y^''' "rte. ^.. ^ . 4
1
con+iguration, which is then placed in this f le. The
auxi 1 iar y file Auxout, .s a. print formatted fi le and
may be directed to a printer for a hard cop y of a
program execution's statistics. Additionally, Auxout is
totally maintained by the pr on , art: file and thus ie.
transparent to the user until a print out of a
=_imuIation run is desired.
4.6 Reported Statistics
The network statistics, as comp i 1-d by the model,
are such that the y al lo,., the computation of measure=_
which indicate network performance. These measures are
defined as follows:
• D: The delay that occurs from the timean adapter becomes ready to transmita message sequence u.itil it actuallycompletes its transmission.
• S: The throughput of the local network;reported as the total rate of datatransmitted over the network.
• U: The utilization of the network; thisis given as normalized throughput.
o 0: Offered load; the total rate of datapresented to the network.
^there pos s ible the =_tatis t ic5 necessary to calculate
these measures will be reported for the entire ne t!-jork ,
the individual trunks, and the individual a.daptera.
I
!I
11
1•r
.61717''
4.7 Validation Criteria
Wh i le every attempt has !7een made to make th i s
simulation as close to the real =s=tem as possible,
software implementation of an electrc,nic s y stem has its
limitations. This simulation effort has been aimed
primarily at modeling the various protocols implemented
b! a HYPERchannel netkmork. It has been shown that these
protocols are the factor=_ ha -)ing the most impact on
s y stem performance I PAH841 , CWATS80I , [GOr&,09I , aid so
on. Therefor e, the simulation ,jas designed to model
ithese parameters as closel y as po^zsib, l The validit•r
o+ this model rests on a cle,r under_tandina of the
operation of HYPERchannel networks and the relationship
of this operation on s ystem performance.
Finally, it v) as not Peas i ble or practical t
establish a validation te s t bed at HO IIC. This due
1 arge 1 to the requ i remen is p l aced on the f ac i l i t y and
Its stated mi_ston. Thus , the model -),1 idAtion was done
emp r cal1y, based on knowledge of tide HfPEPchanneI
= y stem and the components attached at HOSC.
72t
0)9^77..W
Chap ter 5Model Analysis and Conclusions
In this chapter some of the theoretical consider-
-it i on i nk)ol v i ng H'YPERchanne 1 n twork performancet
measures will be developed. The results of exercisi nc.
the model in various configurations (based on the HOSC
esystem and components) will be presented. Finally, the
conclusion section, will attempt to describe the
results and their relation to operatinf, condi t i onE atf
t
H O'S C.
5.1 Theoretical Performance Bounds
In Chapter 4, se ,, erai stat,stirs .-jere discussed as
ti being important ; ndicators of network performance.
These were i den ti+ied as S, U, and D. S defined as
r throughput, is the rate of data f 1 ow or, the network. U
€P
or utilization, is normalized through p ut, this being
Ithe +rac`.ion of network cacao ty being u t i 1 ized, and
finall y , D or delay, i s the dela y between the time an
adapter re q uests the trunk and the t-me at which it
completes a transm =lion. In order +or the e-eper mental
,),lues to ha f)e meaning, some theoretical determination
of these stati st cs i s needed so that com p ar i son= may
t be made. In order to determine theoreticall y theset
vaiuea the network factors which most affect HSLN
performance mus t be V.noimn . The +ac for s .jh i c a++e -- t
tt^F.v
?3 I
1
this performance. i)dependent o+ the a, r ta,ched equipment
• Bandwidth• Propagation del ay• Number of bi ts per frame• Local network protocol• Offered load• Number of stations ESTALLS41
he + i r s t three of these t:.c t or letermine ?.
p?r?.meter ?., +rom 1 ,1hich th? netl.,iork utilization U. and
t hroJghput S ma ., be - jet?rmin ed.
Sin '_a a lo.:al area net.,,,,ork __ d. atinqu ehe^ +rom
I ono h au l n twork s and mu 1 t i pr .oce=_ _or =- -s tems b y the
bandwidth E, and distance =_ r.d, ink.)ol - ?d. The oroduct
1j-f the aw tt.,o term= ' E • d.; c an oe 1J =_?d to ch ..r ac ter i ze
the r.?t!-.jork. The tr?n5mi 3=1 on I?n,:jth :)r the med i Um m a^
be Ll e term! nedb^ di !idin^ this q u ?.ntIt'/ b:• the
pro p a gation - ,e Ioci ti '); of the m?dium. Thi s quant t.,
m?- be caicul •.ted a= f011-:)W
Tr?nam az1on Lengtn = g
Net-ork, System '=nrpr,r?.tio n =_U G^est= _ ?iu? .'f
-^u :er : e n t o+ the .peed f 1 ght be u _ed ror
pr opa g ati7n e1C.:,t. when attemotinci t.o e =_t?bI h
n._ t imorv. per4orm.n,:-^, Us n 4 th e a l Je o+ TO Me g a,.b i t? p er
=_.cond + or E. _ssum ng d to b? 1400 ?t, ?nd a=ink a
• 1
t -al ue of 1 .2 x 108 meter s/ sec for prop_agat i on ,e 1 o c i ty,
t ^ the theorc-t!cal transmission length of a 1000 foot
HYPERchannel network; is 127 bits.r
' The ratio of transmission bit length, to the
length of a typical frame (L) is the dimensionles_
quantity a. Thus,
a = tran=_mi s_ i on 1 ength of trunk,tyoir_.aI frame length bi*._,
or
a = BdVL
Since d/V is the wor=t ca se propagation time ;n
the medium it may be replaced with the H',`PERchannei
Fixeo Dela y . Pecall Ong from Chapter 4 that Fixed Deli/
may be calculated as
Fixed Dela y = 4 nsec f ,trunk length) + 2.i!8 uses,
the parameter a may be calculated as
a = B F,xed Delay?L
Thu =_ for a HYr^E-:RchannPI trunk of 1^ngth 1iii10 feet,
a is determined to be 0.0109. Typical values of a for a
HSU,I range from 0.01 to ot;e^ 1 . Hn intui tive discussion
of the mean i ng0 of the parameter a i s found i n Wi 1 1 i .am
c;tal 1 i n a ' s Lo cal Ne twor le. s. Th i s par ~me ter i s u d to
75
.1
1!
M
provide :,n upper bound on the utilization o+ the
netojork., Stallings also points out that this h;:pothesis
appears to be supported by experimental evidence; a
Part o+ t h i di_ ,_ussion +olicws:
....Consider a perfectly e++ic1ent accessmechanism that allows on!y one transmissionat a tine. As soon as one transmission isover, another node begins transmuting.Furthermore, the tran =_mission is puredata--no o-)erhe-ad bi ts.... 1;jhat i s themaximum possible utiiization o+ the network -'It can `:e expressed as the ratio o+ totalthroughput of the system }o the rapacit y orbandwidth:
U = throughputB
Li(Prcpagat i on + tran=_m i ss D n time;B
Li ( D/Q + L/B)B
+ a
So, utilization varies inversely v)ith a[STALL84].
Table 5.1 shows an example u_ i ng a to predict thQ
theoretical bo .-jnds on a network simil -Ar to the sy_.tem
at HCiSC. Un+ortunatel y , this method does not accc)unt
fDr the access protocol o+ the network:. Furthermore. it
assumes that the maximum propagation time i ncurred
on each transmission and that or, l one transmission ma,,
occur at a t i me. Despite these _h•_rtcomings, upper
76
. ^ UIP
:o
1 Theoretical Bounds on a HYpERchanne\Trunk of Length 1000 Feet.
Fixed Dela y = 6.08 usec
Bit Length = 127.0325 bits
a = 0.O1O9
U = \ = O.9892' =
S = ^ ° B = c, !-Ib/t sec
For an arbitrarr period cf t/me, t, the total bits
transferred ar*:
Total Bits =S*t
for t = 40 seconds
Total Bits = 1978 Megabits
1
lr
bounds on throughput and utilization may be calculated
using these techniques.
Another derivation o+ utilization which takes into
conside-atlon the effects of the protocol on the
network performance , ba y ed on the wr)rV of Robert
Metcalfe and Da"id Boggs IMETC763 is considered. Their
work is based on the Ethernet system which is a local
area network: operating under a CSMA/CD medium access
protocol with c=haracteristics similar to HYPERchannel.
;assume that there are N active nodes on the
^t•twor!: , ?ach ha-.) i ng l den t i cal data generating
, `g arazteristics. Furthermore, of ter a stat i on has
transmit t ed its packet, another station becomes ready
to transmit i t s packet , so that N a i so represents the
total offered 1 oad on tree network. Stal i l ng= i n h i s
amplification of CMETC763 n 0 t e S that time on th?
network ma ybe dI ,.)lded ; n t o t"uo component=_:
transmission internal (t;me required to transmit a
complete packet over the medium, , and a contention
nter,)aI (sequence of slots U)i t a colt ision or no
transml s it on; . Throu gin pu t then , becomes the rat i o cif
time tran =_mittino to the total time.
Recall that a ma y be written a
A = propagation timet r an sm l s =_ i on t i me
,j
t
t
IM
where the propagat i on t ime i s the worst case val lie of
time to transmit a frame o ,.er the medium, and
i transmission time is the time required to get a
complete frame onto the medium. If transmission time is
normalized to one, then a becomes propagation time. The
m n imum 1 ength of the tr ansmi ss i on sl of must be chosen
to al 1 ovi for the detes=t i on of a col 1 i s on and i s. equal
to twic? the end-to-end propagation time (1/2a) .
Following 'St al1inq's approach for the development
of the equations describing throughput and utilization,
the average 1 ength o* the con ter, t i ors i n ter-)al i
!e term ined b y first computing A, the probability that
exactly one station attempt :. transmission in a slot
an,^ acquires access to t'?^ nedl um. This is the bincmi.al
probability that any one stator, attempts to tr:.nsmi*
:.nd the others do not,
1
1 I
= t•d p( 1 - p, N - 1
ieih i c i s the probab 1 i tv that the de= i red oo_currence
acquisition Df the trunk) wi11 occur ir, N independent
triais. Since maximum throughput and utilization are
the quantities cf interest, maximizing A ,dill require
that p = i.'N so that,
7i
11
r4 = C 1 - 1/N.,N - 1
The estimated mean length of contention interval,
!rj, in slots i s.
i
..r
i Fr[ i =lots in row with :k col l i si oni=1 or no transmission followed by a
slot with no transm ssion]
o.
i=1
x
1.,jhich con-.: erges to,
E[!^i) I .H
The max imun ,al ue o+ utilization may now be
determined, vjhich is the length o+ a transmis_.ion
n ter-,, al as a proportion o f a cic r ^ c o n s i s.t i nqa of a
stransm i _sion and a contention interval
IJ = transmis_ on ti.nej total time
= tr:.nsm i s i on t ernetrar=_m i ssion time + contention time
= 1 _l + :a 1 - A
H
:; 1 r
^l
,t
n
For the 10 0 0 +oot HYPERchanne 1 ne tk..1C, r k prev i ousl v
described, assuming N = 4, U = U.971 and S is 48.55
Megabi t=_. per =_econd vwh i c corresponas n i cel y 1wi t the
results obtained using onl:r a < Tab le 5.1?.
The calculation of the parameter D or me=_sage
delay is not so ob-.ious. It appears empirically, that D
increases. without bound as the network approache
saturation. Hs the number of nodes increases, ac do the
number o+ acc;-ss reque=_ t the number of col l i s i on=_ ,
the number o+ retransmissions and also the time dela y a
node e y.per,ences before access is obtained, =_o D, Does
appear to i ncrease •Ni thout bound.
5.2 Presentation of Simulation Results
The Dre -iiou s =_ection pre =e ^ ta d analytical
techn iques u =_e+uI for Rred;cting the peak., or upper
1 imi is o+ a. HYPERchannel network c p erformance. Wh i i e
thy_ i_ useful for pred;ctinq top end performance, it
doe= not provide any usetul nformation about a
particuIar con +igurat ion o+ the networV.
The purpose o+ thi =_ simu1a.tion effort is to
prow i de the engi neers :.nd sc i en t i s s at Hii;C: 1wi t a
so+tware tool •)h i =h w1 1 1 prov i de i nformat i on on ne tl,,,ork
F rrformanc ai n a va.r i e t o+ con+ i qurat i on . Th i s
section presents results from this model for the
ne twork de=_.cr i p t i ons shown i n F i qure, 5. 1 and 5.4.
Detailed descriptions o+ these con+igurat+ons, along
SI
t
„
W
with simulation results are given in section 5.2.1 and
i the resu 1 is for a dual trunk. cant i gust ion are qi ven in
section 5.2.2.
5.2.1 Single Trunk HOSC Results.
The single trunk configuration, as shoe,,in in Figure
5. 1 , and de+ tried in terms of the model in Hppendi x 11J,
,:t)a = con s idered. Table 5.3 contain= a listing o+ the
rel a.t ive probabi 1 i ties th.a.t R Q ,en tran_mi t t e r :ji 1 1
-attempt to transmit to a of ven rece i l)er . This is used
by the =.imulation to establish the virtual Connection
be tw., -n de-) ices for commun i cat ; on . I n order to gauge
the performance o+ this con+ i qurat on over a !,a de r a.nge
of input loading, the topology o+ the net s;_fork a
defined was kept constant. The uttered 10?.d to the
network was ;cried b InCreasing the data source
generation rates to the de-) i ce s_ shown.i
Table 5.2 illustrates 'he method for computing
s y stem ner+ormance measures from simulation st_atisti_s
Tables 5.4 and 5.5, contain data points cal_ul.a`ed from
=1mu1•atlon runs, with each data point r'ep^esentlrig a
simulation run. These data points 1.vere plotted as s_h-_i,un
n F i aur- es 5. 2* and 5.
82
.s
11
r
w,
NI
Table 5.2 Cal cula.tion o+ Par=.meter=_ usinq_
Simulation Statistics.
S (throughput) = Tot I Bi is Trari=_mi ttedSimulation Time
U (utilization) =
Bari dvii dth
bi t°5G Mbit= per second
D ( dela y ) = Hv g. Message Dela y De l.- ce 1+ Avg. Message Delay De-)ice
+ as. Ay-a. Message Delay Device nn
The above expression for delay is used in the case1,,here tranami t t i ng dev I ces. ha-)e f i n i to Avera g e Mess-ageDelays. For the case where a transmuting Deviceattempt to transmit messa ges but ha an AverageMessage Dela y equal to zero (Average Message Dela y = ^^,:.rid Abort count > 0) it is assumed, that Me =_aqe Delay,or Delay, for the Network exceeded simulation time.
Offered Load is compiled by the simulation andoutput as one o+ i t_ statistics.
11
Y^
1
V '1
1
Table 5.3 Relative Probabilities for Transmitter/Rece i -:,er Pair= for Fi qijre 5. 1 .
Tran =_.mit ter/ Receiver Probability
111-311 0.7
111-321 0.3
211-4 1 1 .1)
221-421 1.0
11-211 0.01
33 11 221 U.01
321-211 0.01
321-221 0.01
331-421 1.0
34
a1
1
`'
OF FL
Table 5.4 Data Point= tar Figure 5.2
s +
R
4
5Plbxtes/sec
UMbytes
.0008092 . Ci00 1 2 1 5 . 0 234998
.0024680 .6003949 .0470083
.0040020 .000x403 0'0`2`,
.00671901 .1010751 . 1 1 21 1 40
.0142275 .0022764 .2242640
.029095o .0046553 .4486710
.0431299 .0069008 .1^7^341 0
.0586719 .00'3875 .8984520
. 0 7S`0 755 . 0 1 1 t•921 1. 12245A0
.1421105 .0227377 2.2420000
.118972 .0?.9036 4.4840000320 281 3 . 0 51 2450 .6 . 72'9n it n5137168 .11821946 9.969123110.5548880 .0887821 11.2103000.93-0150 .149624 22.-1200000
1.5409865 .2465578 44.84010002.3634718 .3781550 67.26030002.3250275 .3720044 89.68000003. 4732500 .5557200 224.20000003.6444500 .5831120 448.400000114.5387500 .7261400 672.60000004.60'3c. 250 .7373800 896.80000004.6521500 .74450 30 1 1 21 . OIDi1 CIO i111
4.7345000 .7575000 2242.00000004._510500 .6962640 4:40.00000004.8016750 .7682680 67_0.00000004.8004000 .76x,0640 8968.0CI000004.70 ?8500 .7676560 11210.0000000
Average C-= e '_ _
.0021383Ci01 :;,50ij001 78330016166
.0015533
.0016850
.0016283001`11600185830042466
.38757660u.54 7500042916
140>40J ,4 ii
.4622500140>40>40140>40
4 r^> 4 C,
>40>40>40
66
^Aa li
aJ
N
L
tilization versus Offered Load:)r Single 'Trunk Simulation.
39
t1
- sue' _ - , . ^'•^
., r
Offered Load (Log Bits)
WEIR C=)I
T?ble 5.5 Data Points for Figure 5.3.
Control BitsMbits
.1005832` . 3076200P .4885992
.67209121 .7754192
1 .635,49603.3552900
{ 5.09739206.83254-08.424640016.438120027. 1 1 o8800
43. 003472 002.547020074.7621600
134.9088000204.0576000
i347.8608000353.9296000539.07681300685. 70 860 13 0
1 562.904800050..03200013564. 3<;^20000543. 6464000624.7024000527.836200052c' . 1 13 6 0 C, 052'S.7168001)
Data Bitsrib is
.177536520456.854160
1.1634161.3745812.9146165.960952'? . 71 '^3c011.9770401 4.9°976028.992240-ill . 690 1 OU58.011760
1 I) 1 .8.,,400C,102.3072001 ,t^4 . 616000289.070400408.488000390.079200572.364800480.5176008o9. 3-116000910 . 7220 013924.616000971 .3920013767. 82480 1'11008.6900001 1)08. 0080001006.6000013
13 BitsMb is
.1879984
.3760664
.5642040
.7210600
.89691201.79411203.58'?36805.3867230
. 1 3751 603.'i79r,0ii017.93o000035.872000053.837500071.753840089.5824000
179.3600000358.7208000538.13624000717.440,01)IDfj
1 7G^ . 6011111111111
D'587.20111)0005380.801300007174.4000000g9-t„x.000[100017936.000000034729.00000005 )..1)3.0000013071744.000000089686.0000000
R8
`t1
E 0
1
v y
71
inC J kr
4> f
Qb 7 i^ 11Offered Load (Loe bits)
(a) : n
a,O
n
n
0
J1
V CJQ
•r.
r
J J :4
Offered Load (Lor bits)
(b)
Figure 5.3 Plot of Transmitted Control and Data Bitsversus Offered Load for Single Trunk Simulation.
39
t1
e
A
w W) W u) w u) co u)o• m a^ r f` n ^D n
( s7 ^8 80^)
s7^g a^a^ Fa>>^wsua.^^,
.-1
1
.-1
Wf9 t) T k) m U) D ul r9^+ m rm r- r- W
Tq
D n n
( S1 ^l)
sl{q jolluo:) paa7Twsuull
Nu-4
m
00O
^.1
brovr-a
b
4I)w'LO
C^ O
•r1
L
N ^u E-4 •4f'0 to
M ^
U G^ rp 4.d H-
C 11^-4
to-4 Go •-+4 fnLc 4v oV w
b
a.) OU ,..3.4E -JN yG 4r1 'U4 WH 'LO
'LO N
L Nv 4-4 va >
v4
00-4w
,4 NL.4
c]T
0
brov
r-
m4v
D w'LO
tin
90
1
♦r 1
1
1
The system configuration and data flow rates
indicated in figure 5.1 are a typical loading of the
main trunk of the HOSC system. The total offered
load (G) for the system as depicted in figure 5.1 is
computed as follows (G the offered load is the total
number of data bits offered to the channel):
DEVICE DATA ARP, I kIAL RATE
lil 15 Kbytes/sec = 120 kbps
211 4 Kbytes/sec = 32 kbps
221 6.4 Kbytes/sec = 51.2 kbps
311 1 Kbytes/sec = 8 kbps
321 1 kb y tes/sec = 8 kbps
331 .625 Kbytes/sec = 5 kbps
411 0
421 0
431 0
IN
TOTAL OFFERED LOA` = 224.2 kbps.
In a 40 second period a total of 8.976 Mbits or
6.953 (Loci bits) would be offered for transmission
across the HYPERchannel's network. Referring to
figure 5,2 the utilization of the HYPERchannel trunk
for this offered load is approximately 2;:. The
throughput rate is thus (.02) * (50 Mbits per
second) = 1 Mbps. Obviously the system is nowhere
91
Q41
near its upper limit in data throughput rate, trunk
utilization and hence not in offered load.
The approximate number of total bits
transmitted to send a 2 kb y te block of data ma y be
estimated from figure 2.8 using Table 2.2 as a
reference. From figure 2.8 it is apparent that 7
transmission frame format f i el ds, 9 response frame
fields, and 2 response frames with data format
fields are transmitted to accomplish t`:e
transmission of 2 kby tes of data. This amounts to
an absolute minimum transmission of 1900 bits total
for 15000 bits of data or absolute minimum overhead
of 22.5%. For longer data blocks the overhead is a
smaller percentage and ma y be calculated b y the
relationship (assuming no collisions):
ABSOLUTE MINIMUM TOTAL BITS SENT
PER 2 KBYTES OF DATA = 19500 + (N-1)18500
where N = the number of 2 kbytes of
data.
The educt i or, in transmission ok^erhead for
mul*-^;e transmission of data segements
of 2 kbytes of data is not si gn i f i cant in number, of
bits transmitted but the timing and number of times
the channel is free for contention is r?duced by a
significant amount. It will be obser , )ed from the
92
rf
I ^
F
sue" •- -
--4.
simulation rune. that an average overhead of 50Y for
low offered load and 100% for high offered load is
the case. This overhead increase is due to the
non—intege multiples of 2 kbytes of data to be sent
and to collisions.
Figure 5.3 depicts the average delay and number
of collisions versus offered 1oad. The average
delay is an aggregate delay number and a 1.-roe delay
is indicative that at least one device is
experiencing a large dela y , Thus it ma y ir- =;te
that onl y one dev i ce i s unab l - to t- ansmi t but all
the remainin g ^r _es may be transmitting
satisfactorily. However it is an indicator that
things are begining to sour on the overall network
performance.
Likewise the number of collisions is an
aggregate sum and indicates the relative number of
retry transmission attempts the s y stem is
experiencing. Since the HYPERchannel is not a pure
contention s y stem (such as ETHERNET) the increase of
collisions does not necessarily indicate
accompan y ing data loss or absolute inability of an
adapter to communicate. Again it is an indicator
that thing= are riot so well on the overall netvvcrk.
93
t1
r
117- qW-^.
v ^^•
OW
From the results of figure 5.3 it is apparent
' that as the offered load increases past about I.5
(31.62 Mbits for 40 seconds or 790 kbits per second)
the system is beginning to experience traffic
congestion. The system's trunk utilization, figure
5.2, is seen to start a rise at this point (7.5) of
of(vOd ioad and it may be observed that at an
offered load of about 9.5 (3162 Mbits for 40 seconds.
or 79 Mbits per second) the trunk utilization is
entering saturation. At this point it is safe to
sa y that some devices are gust not able to transmit
all their data. Somewhere in between these two
offered loads is a point that would do well to be
identified as the maximum useful offered lord
condition. Using the rule of thumt for normal
maximum operating offered load for pure contention
systems (ETHERNET is an example of a pure
contention system) the maximum operating offered
load would be set to approximately 1/2e or 13.35% of
the channel bandwidth. For slotted contention
systems this rule of thumb figure is approximately
1/e or 36.7%. The H'r'PERchanneI i s a hybrid
priority/contention system with prioritized time
slottinq and it is reasonable to ex p ect to load the
system to the 36.7% trunk utilization. Inspecting
94
1
the graph of trunk ut i 1 i zat i on versos offered load,
figure 5.21 , it Is observed that the offered load for
a utilization figure of 36.7% is approximately 8.5
(log bits) or a 7.9 Mbps aggregrate rate (316 Mbits
in a 40 second).
Inspection of the graphs for the transmitted
control bits and the transmitted data bits versus
offered load, figure 5.3, also illustrate that at
8.5 offered load the control bits and data bit
curves start to enter saturation. Thus it is
reasonable to state that the maximum operating
offe^ed load (in pure aggregrate rate data bits)
should be 8.5. This is an aggregrate rate of
offered data of 7.9 Mbps or 15.8% of the channel
bandwidth of 50 Mbits. Remember that an absolute
minimum of 22.5% overhead i needed at low collision
rates and thus 7.9 Mbps of offered data plus 2?.5%
overhead is approximately 9.6775 Mbps or, 19.35% of
the channel bandwidth. (This assumes all data
blocks are inteqral 2 Kbytes in size).
A further comment of the figure 5.3c and 5.3 d
is in order. The offered data to the channel, G,
:see Table 5.5) is only the actual data to be
transmitted. The actual number of data and control
bits required (as evidenced from the simulation
95
J
11M
tM
t
i
runs), which when added together equal the channel
throughput S, will not equal G but be greater thani
G.
It should be observed that for low offered load
the actual transmitted bits on the channel amounts
to 2.54 times the offered load and at high offered
load this figure decreases to about 2 times the
offered load until saturation tales place. This
apparent increase in efficiency is mi sleaoing since
the prioritize' time slotting mode of operation
replaces the contention portion of the channel
algorithm and stagnation of the throughput (U*B)
takes place.
Thus the 7.9 Mbps offered aggregate load
corresponds to about 16 Mbps to 18 Mbps actual1
channel offered total load or 36% of the channel
bandwidth.
FROM THIS DISCUSSION AND THE SIMULATION
RESULTS COUPLED WITH THE ANALYTICAL RESULTS
IT IS RECOMMENDED THAT THE TOTAL AGGREGr'iTE
OFFERED DATA TO THE HYPERchannel SHOULD BE
HELD TO 8 Mbps OR LESS. IN FACT DUE TO THE
UNCERTAINT'( OF ESTIMATING AGGREGATE DATA RATES
A MAXIMUM OF 4 Mbps WOULD SEEM PRUDENT.
96
I5.2.2 Dual Trunk HOSC Results
The dual trunk configuration as shown in
Figure 5.4 and detailed in Appendix V, was
considered. Once again, the relative probabilities
for transmitter/
receiver pairs in this configuration are contained
in Table 5.6. In order to compare the effect of the
dual trunk configuration with the )reuious results,
the configuration of trunk 2 1n Figure 5.4 was
defined as the n-::ile trunk confiouration
previously considered. The topology of this
configuration was held constant and the offered
load var i ed, the resulting data points are
contained in Tables 5.7, 5. 80, and 5.9. These data
points were plotted as shown in Figures 5.5, 5.6,
and 5.7.
In a secenario that has been ,fudged to be a
normal environment for the HOSC dual trunk system,
the transmissions from trunk 1 to trunk 2 have
aggregate data rate of 10 kbytes/sec. The device
on trunk 1 alwa ys transmitts acros s_. the trunks to
trunk 2. The cross traffic from trunk 2 to trunk 1
has a lower data rate and a lower, probabi11ty of
request for transmission. Thus the majority of
9%
1
04f,
Table 5..5 Relative Probabilities for Transmitter/Peceiver Pairs +or Figure 5.4.
Transmitter/Receiver
1 1 1 -521
211-411
211-421
311-531
321-521
321-111
411-311
411-321
421-311
421-321
431-521
Probability
1.0
0.7
0.
1.0
1.3
0.3
0.01
0.01
0.01
0.01
1.0
98
^I
ti
?GL .
O 4 n ^ OJ C
< d ^ ^ n O^ 4 ^ • 7
a U uN ' • U^ W O •
^ • W O Y O
.n1C.N WW H .
<F1.0
O
I ^O .^O 6 / ^r
< ry H
. I y G W
N rr /Ff y U.1 .r
En.:1 r-
i rl .
e JY
o °U
•
H y
N
y I^< W ^ Y
°
4
a<y
< W
l
0
i
D <sat
CIL
yr^
L
Fi
.n<
rn
^-1
.-1v70
•1
y
99
TaL^le 5.% Data Point =_ for Figure 5.5 (Trunk 1)
S U r, A-)erage DMb y tes/sec Mbytes_ secs
.00017973 .000028758 .0155758 .0006650
.00065895 .000105433 .04.573.30 .0018928
.00116560 .000186500 .0760532 .0018800
.00161704 .000258726 .109071) .0015842
.00239248 .0003827p7 .1521:90 .11014942
.00711533 .001138454 .4564050 .0013442
.011$9340 .001'025'40 .76:0820 .0013142
.01665555 .0026a4880 1.0658o00 .00,3000
.02376770 .003802830 1.5233900 .00110111)
.07053307 .J112852921 4.5644800 .0013228
.11621025 .018593600 7.0050000 .0064371
.16076790 .025722800 10.649o000 .0014928
.2256948,:) . 0361 1 1 1 1 1 15. 21 1 60011 , 111167786
.60678250 .0970352011 45.6?00000 .0288557
.01607500 .146572000 76 A50Jn00 .1i'j773001.1720'750 .187532400 106.4700000 401.50 327750 .240524400 1 52 . 1 1) 1) O u 0 1:1 . 712555772.52247200 .403590000 45c,.310130000 )-1.02.93269750 .4^-923100 7-.0.5000000 >403.15442500 .504700000 1064.7000000 ?403.4350000 .5 4960000 1377.0000000 >403.49356500 .558970000 4563.0000000 >40:-.5247!250 .503960-400 7605,1301-10000 >40
3.54453500 .567125000 10647.0000000 40
100
1^
U
Table 5.8 Data Points +or Figure 5.5 (Trunk 2).
SH bytes:,sec
.00017973
.00142330
.00204550
.00321635
.00478900
.01557770
.02o4142603715009.05333650.10056900.16651150.32703950.34178971. 865532t50
2.4?4515001.384273722.05963550L.24 087f(1.889152401.9243-114401.939254002.314184202.387359752.40758250
U
.000028758
.000227728
.000327280
.00051461t
.000766240
.00:492400
.001902940
.005944016
.008533800
.025691050
. 13 2"664180 005232o322.05468o000.138485200.399122400. 221 48=;800.329541600.519?74CI iii.302200000.30789';,OO CI
.310280000
. 0269000
.382057500
.3852001!00
GMbYte
.0155758
. 1]-407330
.0760532
.1090.'10
.1521190
.4564050
.76108201.0656001.5233900-1.564480, i7.605000010.649600015.21100045.n31001)1'11)7x.05000013
106.4700000152.100000045.,- 3000001)760 .501]0001]
1 i1 o4 . 70000C,01 37,1 . 0 ID 0 ID 0 0 114563. i)Qpljljiiil
7 .505 . 000000010647.000004101
Aver acie U
sec
.00O6o50
.0015928
.0013800
.01-1 1584 2
.0014942
.0013442
.0013142
. Ciif 13000
.0013000001 ?2280'] 64371
.001 4'28
.0007786
. 1) 2-8,v557
.09?7300> 0
.7125557>4 0>40>40>40>4040^0
I.
101
t1
C
C 30.A
2N
,4•r iu
0
Offered Load (Log bits) Trunk 1
(a)
E-iS
., •, if
.•
c ►^o
2
^ 1
6 ie 11
Offered Load (Log bits) Trunk 2
(b)
Figure 5.5 Plot of Utilization versus Offered Loadfor Dual Trunk Simulation.
102
1
OF K-
J
^r
? 1M 11
Offered Load (log bits)
(c)
n IEA
O ^^
y 1 ~^^
•. ;
o ^
:J s.
r ^^ 1 ^_^ 1J V 1
Offered Load (log bits)
(d)
Figure 5.5 Plot of utilization versus Offered Load
for Dual Trunk Simulation.
103 I ^
1
Table 5.9 Data Points for Figure=_. 5.6 and 5.7.
Trunk 1 Trunk 2Control Data Control Data 13
Mbits Mbits Mbits Mhits Mbits
.?27870 .026112 .327870 .026112 .1-2460
. 12021 9 .095744 .229786 .2,6680 .37386
.207651 165366 .339076 .315528 .60842
.29508:? 2350JI=- .52c096 ._;
. -,26231 .339456 .761 1 90 .771480 1 .21 3951.2677o8 i.009064 2.416856 2.569176 3.o51242.120224 1.688576 4.083456 4.375576 o.i!88o52,972682 2.36748E 5.728200 6.1727c0 8. 526884.24045o 3.377152 8.220800 8.873680 12.18712
12.568..'20 10.009600 24.681128 26.717520 X6.5158420.699520 16.4853611 44.027040 9.256640 60.8400028.644880 22.813200 59.468240 45. 20520 x:5.1968040.207760 32.0220011 93.209000 1o.174320 121 .6980108.088000 36.082400 193.222400 33.748000 ;c,5.0,100C113.210400 129.933o00 411.237o1]0 38.700720 008.40000208.792000 16o.272800 440.801000 2.10599:: 851.70000274.172000 206.876800 631.889600 27.193'50 121o.80000449.335200 357.85o000 396.320000 142.42,8000 3650.40000522.411200 4 16.052000 607.6 4 9 6'1 1] .032768 60 4.00000
5cc1 .91 ,980 1 0 447. 499200 61 5.,t,8 0 60 C', .1 1 0 206 =51 7 . c,01100595.59( 600 474. 32480 0 520 . 44480 0 . 1 1 0-188 1 1 C; 1 13 00 ii 0
X 0.745600 457.195200 717.39:3600 2_.145360 36504.0ID111-C16. 3.976000 453.948000 733.2008001 30.' 14320 It. 0840.O;ii1j1]1j_•7^.87 .^ i100 454.3752 111! 732.42081101 38.0015c.40 S517b.0U00i1
.1:04
11
1
N ^L r--4^ uF
L
0 G
b uGFb
-4 ctiO 7t-+ oLG uO oU 'L
b bL O
E bN a)
uO y14 u C
'44 OO ^
lu LO N ^
L NO L.
r I C1 •-a
'D
t!l
N
htl.4ELI
Qr'
S, ;y.
m^LA-1 14
.-1
m
N
•D
.JI tiw__ L)
1) m L• ) m !n rD 4) (4) 4)[O m t` t- kD 10 Y) M ) Y
( s7T9 80-1)
Sllg g i g t1 paj7lwsue3,L
I
^J
sn 4) 9 4) O 4) 4) is0) T to t,- C- 'D 4) Y)
( 5 1 18 20.1)
'5 119 io17uoD pa>>lwsuejL
NL.4C13
on0
-d
0
cuLiyw'LO
.4
OL.4m
?i toO
ImOJ
N
T1O4v
^uO
47
4)Y
105
^w
,- . -.- . r
N
N ^+^ G•A :1m la
H
Lm -A^ G
'tl iJcH
- roC)uoL^.. L.1a OV ku
a) ^u
E bN 71
c u^ mt, w G
^u uO V) fy
G -4L ti 7
O L+ E—a v • -aw > cn
n
111
!UuO00.4
W
InCD k CJ 6) (D 4) CO Y)a) r- r` kD T " h Y
( s7T9 ?0-1)
s 7j9 eiea pd77[wsusll
106
1
5N
h^
W
If
r^
T W)O
►-7
OO
^ buv
D WWO
W9 0 (M Y)T CO CO ti r` kD to h Y) Y
( s II q 20-1)
s^19 jos1u0-j ;)aaalwsURjL
L.4
m
Mav
arj
bOuyW'L
qVPW
4k)
the cross trunk transmissions occur from trunk 1 to
trunk 2. This is envisioned as the worst case
condition for cross trunk traffic since the
destination trunk is the busiest trunk.
Looking at the curves from figures 5.5, 5.6
and 5." it may be obBerved that for trunk 1 the
operational parameters under increasing offered
load are very similar to that for the single trunk
secenario, the exception being the lowered trunk
utilization before saturation is encountered.
Aga iii the maximum offerea load operationg point is
seen to occur for about 3.5 offered load and hence
as before the trunk 1 aggregate offered load should
be held to 8 Mbps or less.
The situation is not as good for trunk 2. The
cras s_ trunk traffic ham p ers the normal traffic flow
for trunk 2 and it is apparent from the simulation
curves that the maximum aggregate offered data load
should be held to less than 8 or 2.5 Mbps. This is
considerably less than that for the singie trunk
simulation and clearly demonstrates the effect of
heavy cross trunk communication requirements.
Froin figure 3.4 the aggregate offered data
load of the two trunks may be calculated. This
107
1
1'
was judged to represent a t ypical operating load
for the dual trunk HOSC system.
DEVICE DATA ARRIVAL RATE
111 10 Kbytes/sec = 80 kbps
TRUNK 1 TOTAL OFFERED LOAD = 80 kbps
211 15 kbytesisec = 120 kbps
311 4 Kbytes/sec 32 kbps
321 6.4 kbytes/sec = 51.2 kbps
411 1 Kbytes/sec = 8 kbps
421 1 Kbytes/sec = 8 kbpsIN
431 1 kbytes,"sec = 8 kbps
511 0
52: 0
531 0
TRUNK 2 TOTAL OFFERED 'OAD = 224.2 kbps.
The aggregate offered data load for trunk 1 is
80 kbps (6.505 log bits) and for trunk 2 is 224.2
kbps (6.952 log bits). These offered aggregate
data rates are less than the desired maximum by a
cons der abl a amount and room for gr-?wth ex i sts.
There is an allowable factor of 100 for trunk 1 and
an allowable factor of 10 for trunk 2 growth rates.
Keeping in mind that this aggregate data load for
108 t
EN I14 ASSIGNING
THEY ARE MOST
r
1
4^
trunk 2 is the same as for the single trunk
simulation configuration of figure 5.1 it is
easily ;discerned that the cross trunk traffic whileI
amounting to a 35% increase in trunk 2 traffic
lowers the maximum operating offered load
potential o7 trunk 2 by a factor of almost 4 (down
from 8 Mbps to 2.5 Mbps). Furthermore the curve of
figure 5.5 illustrates that the utilization of
trunk 1 saturates at 55% as opposed to the 75%
point for the single trunk case.
FOP, DUAL CONFIGURATIONS IT SHOULD BE NOTED
THAT THE MAXIMUM AGGREGATE OPERATING LOAD
POTENTIAL OF THE TRUNKS IS LOWERED BY A
CONSIDERABLE AMOUNT. THIS ARISES FROM THE
NECESSITY OF DUAL RESERVATION OF BOTH TRUNK
ADAPTERS. THE CROSS TRUNK TRAFFIC LOWERS
THE MAXIMUM OPERATING UTILIZATION POTENTIAL
70 APPROXIMATELY 75% OF THAT FOR THE SINGLE
TRUNK.
5.3 Analysis and Conclusions
The goal of this work was to develop a =.of tware
tool, with partic=ular emphasis on NSC`s HYPERchannel
network, to aid the engineers and scientists at the
HOSC, to perform s ystem analysis. This study began with
a description of the HYPERchannel and the various
protocols implemented by the network. The relationship
of these protocols to s ystem performance was discussed.
The s ystem components which make up the HOSC were
exam i ned, these components are examined for information
ipurposes, in that the attributes of these devices were
used to define the test configurations presented in
section 5.2. The configurations chosen for testing by
the simulation, are oased on the system shown in Figure
3.1. The results of this testing a. • e presented inr
section 5.2 of this work.
The data, which appear in Section 5.2, are plottedm^
in all cases versus the Log (base 10) of offered load,
where offered 1 -Dad i s ex. pres=_.ed i n b ts. So that x
offered load of 7 on any plot i s the i nk. , erse Log ( base
10 ) of 7 a)h i c i q u a I to 1 x 107 b i t=_ . I n F i Qure i
(5.2 and 5.5) utilization is plotted versus offered
load. Utilization is a dimen- onless figure ranging
from U to 1. In Figures (5.3, 5.6, and 5.7) the Lc.,g
(.base 10) of transmitted control and data bits are
plotted versus offered load. As before a value of 7 on
110
11
the offered load axis represents 1 x 10 7 bit=_, Whether
this is data or control bits, is indicated on the axis
of its respective plot. Finally, the simulation time
used, 40 seconds, was the same for all simulation runs.
The results obtained from the =_.in91e trunk
configuration of the model are found in Figures 5.2 and
5.3. The results as plotted in Figure 5.2 and tabulated
in Table 5.3, compare fa-.orably with results obtained
by other researchers [FRAN82], [FRAN64], and [WATS801.
While nu:nerical results differ due to different
topologies bung modeled, overall performance of the
network is essentially the same. The overall
pe^formance of th i s netwoi, k, and that reported
elsewhere, appear: to approach some relatively constant
I eve 1 (saturation) as offered load increa_es. A
slightly different presentation of these results are
plotted in Figure 5.3 and tabulated in Table 5.5. This -.
data. is presented as transmitted control and data. bits
versus offered load. These plots re-present the actual
amount of data and control bi is being transmuted oy
the network versus offered load. Control bits are these
bits trxn =_mitted by an adapter to perform )etwork
functions and are consilered overhead loadin g . Data
bits transmitted, are those bits offered to the network
b y attached dev i ces for• transfer over the n twork .
Offered load represents the total amount of data
111 1
U. I
u
presented to the nets.,jork for transmission over the
network. Thus, as offered load increases, the amount of
data bits transmitted should increase. Since network
services are requested, network functions increase,
thereby increasing the amount :)f network messages
relating to these functions. This will c;u=e a
corresponding increase in the amount of control bits
being transmitted over the networK. The plots in Figure
5.3, both exhibit nearly linear properties until a
certain point coffered load approximately equal to '>>
is reached, after which the data and control bits
transmitted remain nearly constant.
An offered load of 9 on these plots, represents an
aggregate offered load of 3.:25 Mb y tas/sec beinU
presented to the neti:jork for transmission. This is
equ i val en t to an off ne twork source reo 1_est i ng ne tvjorL,
services every 0.04 usec. According to puhiished
1.0
f i gures C FRAH823 , ( FRAM84] , and [ I.!ATS82] , an adap ter
requesting *he trunk, transmitting its data, and then
releasing itself and its receiving adapter will re.1uire
A minimum of 840 usec to send one message-with-data
sequence containing one 2 Kby te data block. If the off
network sources' data rates are such that net•A)orh.
services are requested faster than the network can
process these requests, then data loss will occur. At
this point the network is en ter irng saturation. Thi=s. is
112 1
cJ
reflected in the plots of data bits transmitted versus
offered load. After uf+ered lead exceeds the point
where offered load is approximately S', any further
increase in the offered load does not produce a
corr-sponding increase in the amount of data and
control bits transmitted. This indicates that the
network is saturated and can not transmit an ,/ greater
amount o+ data or control bits.
The normal offered load to the network, based on
observations of the s y stem described in Chapter 3, and
de ta. i 1 ed in Appendix I'), appear s_ to be approximately
6.95 (Offered Load). This figure results from summation
o+ the data rates applied to the network, multiplied by
simulation time, and then performing a Log -"ba.Le 10''
operat or on the resu l t . Thus t I =_ rye ti.,ork i s,
according to simulation results, operating below its
potential b y a factor of approximately 100. This_
indicates that e>, pansion o+ this configuration would be
pos_.ibl? t o some extent.
In order to exam i ne the effects f a second trunk
added to a network , the con+ i gur.at i D pi shown in F i cur e
5.4, and detailed in Appendix V, 1.Nas modeled, This
configuration is simiIar to the single trunk
con+iguration in that the topology o+ trunk 2 (Figure
5.4) 1 s the same as that shown in Figure 5.1. In order
to ob=.er-)e the e++ec is on trunk 2) due to another trunk
113
-4i
7 '.ems+ = y
having access to it, the probability of a transmi=_sion
to trunk 2 from trunk 1 ,ras set higher than the
probability o+ the re-)erne operation. It should be
apparent, that a dual trunk network in which each trunk
hRs need of onl y sporadic use of the other, would have
noticeably better performance than the con+ guration
presented in this work. The results of modelino this
configuration are plotted in Figures 5.5 through 5.7,
and are tabulated in Tables 5.' through 5.-;.
Examination of these re su 1 t.s shows that trunk 1 i s
reIati 1e Iy unaffected, althou gh utilization is lower.
Utilization in this case is approximately constant at a
val ue of 0 .55 for i ncreas i ng off=_ red l oad. Th i s f i Qure
is approximatel y 25% less than the comparable value for
a =_ i nol e trunk ne ti..)ork , th ; s i s due 1 arise 1 y to the
topology of the network . On trunk 1 there are t"..)o
adapters, which communicate exclusively with each
other. There i s a 1 arger number of adapters c,n trunK 2;
which affec t = the common adapter to both trunk., in
that, multi-trunk operation is =lower. This slownes s of
the multi -trunk operation ma y be attributed to the
common adapter hav i rig to compete for a bus i er trunk to
complete its' tran=_mission. 7 h ,js, the common adapter
will be reserved for longer periods of time, directly
a+fec ` Ina throughput, and conse q uentl y utilization, on
both trunk =_. Performance on trunk 1 of th i s topology,
114
t
1^ r
. _ 1
R
c^
with the exception of lower utilization, is rougrily the
same a ,a that of a single trunk network, as expected.
However, the results fo r, trunk 2 are drastically
reduced from that of a single trunk configuration. An
Examination of Figures 5.2 and 5.5. show that
ut i 1 ization of the trunk. is ve r y nearly the aa,me for an
offered load of approximately 5 to a load of eery
near 1 y S. Af ter an offered 1 oad of 8 i s reached, the
dual trunk con+ i gurat i on' s u t i l i zat ion i s dr as i c a i l y
reduced. In Figure 5.6, the con ,:rol and data. bits
trar.smi tted ovar trunk I are plotted. These curvss
exhibit behavior similar to that of the single trunk
model discussed pre , )iousl y . This is not the c.?.se for
the control and data bits transmitted over trunk 2
(Figure 5.7). Both of these plots exhibit linear
beha-) i or to a certain extent, but while the control
bits transmitted are anti slightli affe,_t-d, the
transmitted data is drasticalI x altered at the same
point that utilization breaks doi.in . Based an the
description of this retwork contained ir, append V.
the normal o+fered load is approximatel y 7.08. ms shown
in the plotted da t a, t his- topology ha.s ver:: limited
r?nice in regard to offered load, which makes it
vu i nerabl e to perforrr,_.,.._a degr 3dat i on due to 1 oad
variation.
1
115
t
i'l,
Thus, : single trunk s ystem exhibits greater
potential for expansion than the dual trunk topology
modeled. Rather than allow a dual trunk system of this
nature, it would be better (Performance related) to
place the additional device seeking communication 1.Aiith 1i
another trunk , at a h i gh rate , ph;/si cal 1 y on the trunk
it re q uests the most.
The val i di t of t i s simul at i on i s based c,n the
understandino of the s y stem and the structure of the
model . Whi l e it 1Ajould be better to ?stabl ish g al idi t;•
by comparison with actual configurations and their
measured performance, the feasibility of establishing a
test bed for this purpose is remote, due largel y to the
intensive mission requ rements at the HOSC.
Finally, the author be i eoes that the stated
resew,- ch Qoa 1 -7 have been reache(3. Howe ,.)er, in thi
model, as in all things there is considerable room for
impro-.)ement. Future expansion of the model might be
made, to includ? intra-adapter mes_age trnsfers, and
more than one adapter to more than one trunk. This.
i-jould ser-)e to lend more accurac y and sophistication to
`he present model. The current model appears to p,:)s=e=_.=_
reasonable accuracy and vAl i di ty, wi th the stated
conditions under which it was developed.
116
I ,
118
U., I
OF POOR QUALA Y
OO
O
m
^a<
NN
O
.............. ..............................:
2 r 1,! N 1- S N H• J O 0 2 < U 2 • n
J 2 J 7< O 2• L Y< J O N 7 N¢ W O W
Z H 7 f f r W Z N .•• 7 N 2 N v N Y ^l• V¢ r T J N v) d N r J N r ti L J r r.• < r
¢ Or
W 7 J O Y t r¢ I u W L J V m r i t 7• u v 2 V O O V N Z •- < L K O¢ N T J • O
0 a• Y 7r 2 7 Z N 7 p w O r .+ Y O
¢< v O¢ J V V 2 < y. L H O r J t r¢ 22 N O w /1 w{ N J Z S N Q O W f < O x 7 00
N N• 2 J V' N>> J W O U T Z W O • nZ O Z J V V 2 0 H 4 O< N r Q 2 R J ^• V W r 7 2 < 2
• O•+ <<<r 2T y W mar <J 2L f S OJ u •- 2 7 0 N r 7 w L< N S w J J
• r<< a W O ^u N V •-• 2 u r> .n L u Z¢ r V Z 2 •2 J J W ^ ¢ ••• O a r r 7 r
.^
O n < O .. W Z W Z W J N V S T t N d •- a y. O 7• v 0
rZ' y r 1"1 ¢ r<< N{ r p N Y •D N W N N Z O • O Na W J •-• ^ 7 7 2 2 N 2¢ •^• a u ti x •
• O W <¢ C 7 r r 2 v V 2 V O O •[ L ^• W W J • J • 2V J ^ L r < r 2 0 0 a •-• ^ a • H N N u m
A` a r a O N O r O N Y N W< 2 r •<
• J • O>•• Z u' p 2 W W H 2 r N O W N 7 ti ¢ •-• S < N
• L>r
S V N r r 7 N N< 2 7 N N ¢ r r O r N L N•'• Z¢ 2 7 r O n .-. O 7 Z w 7< R¢ O A
• N 2 W n. y. < O Z •-• L Z r Z ^ r • 0 0 1N 2 O I 2 O r o Z W N
• t 7 Z . 2 r r< V L V S .^ Z N •-• Z <<¢ V • LN 2 O G K ^ 7 r¢ C Z Z r .+ Z 2 J w T.
• •-• Z .Y r 2 y N N S t W O Z N W O W r 4 •••• •y
JY W r O r 7 •-• J< S Z v O r r 0 O v
• ¢ ZO< U¢ J¢ T r 0 .•• V r J< N 2 J V •a w •-. W ti 2 V 7 2 r N 6 W m r J r •<
• ^ .'J N{ J rJ y. N 7 r> N N V J O V L N J'^ < O • J J¢ n V O< y. J¢ O< Z O ^ W T O J S O I J< W a w
• W O2 >
¢¢ r¢ Z O¢ L >` U N U u RO W< O a C u 7 << ^ ••• a> N U G V N S> O O• J
uU 4 < u •^ •+ << W t< W< C
W W 2 N Or
•+ < WON > R > O^ • 1 T N• O O
p7 W O V O V Y 2 r N Q ^u < •L r v p 2 .2 N < J¢ r wt 2 2¢ —u 0 Z 7
• O. J= W
r• 'D r N 2 O¢ Q< W v 2 r O 0 r V w r J • n
Y < J N .+ Y Z O N ^< O r 7>< m< 6• O< <
wN V r N N V r¢ v U S Z i.. S• 7
O H Y W W <¢ 7 O O N W 2 YI N< W 2 W G W p N 2 O• L ¢ N N L J V S 7M1 J¢ W Z O V 0 00 J Z W O W> 7
< O I W J< Z 2 m r< Z Z N• W Y r L
rY O J{ Y N V W r W L J u 1• ^ <
a n t nN
V 22 r • Z N .. 0 7 7• < p W y N O 2 Y 0¢ W N V N V .•^• V< N; y, r i 2 N• 4
7 1 u J "• 7♦ Z 2 3 r n V Z r 2 r f. 2 w > r, > Or 0< J r ¢ 2 r O r 0 1< Y ••• 2 < W< W
2 • O• N?
W 2 2¢ W W S r 4 7 yJ 2 2 Z S u r< J v• y 0 2 2 N
r -1< Z t u r 2 r r Z N< r O u V¢ O< W<
J N O Z N m a O V O W S< W L > a f ti W 7 0 7• 2 2 W< N n.r ^¢ O a u W V J • L
r< r< N D H r I w. G Y W< O •- n N ♦ f< O <• r 7 J L L m < Y< S O u 7 N W n G 2 O V Y O L ^/. r) Z> •
0N
< < S S O --- N •-. f O N f 2< 2 2^< L W< W•• • • • . • • •
•• • • • • • • • • • • • • • •
L¢
• . • • • • • • • • • • • . • • • . . • • • . • • • • . • • • • . • . • • • • • . • . • OV ¢
a^ V ^
^ N M• J N p A fl O O r •^ J N O A O V O N /1 J VI O A O P O ^ ••+ J N O A O p 0 ^ ^` J ^^ O A T I+ 17 ^.+ r r r r .+ r r — ^ N N N N N N N •V N N •". r•1 n • •1 /• r1 In r/1 h h J J J! J J J J J J .i ./^ N
J¢
7
¢J
L0
J
G
W^
•
WP-It)
- `V
OF F'liul? 4i rr•rtr^
• VYQO
Z n.T
ZY Z
< .-• 2
u»
p f
< x
• Q Z
n ^
O x ¢d Y ¢• L
Q Z
^ 7xf
O ••1 O
W O •+• O N ♦
n • V Nn
N ^ O nN Z a
u H L w Y
Q n O ZMDI.
O p O ¢
N f < < x31 T u Q n L7 7 ! Y n JZ Z d Z O Zx 0 7 W ¢
N<< Q Q Z u2 T_ L n r O •+ iO
z r ^^O O N NQ Y H
W J <• w 3
< W OZ mO < n I- J
N ¢ J • .•. J nN F > J > < O
•A J< J l V VW N n J H J
L 7 S ^ Z L NN O < >. f Z ^ r.2 W Q J O » NQ <O^ti ZZ ^-^- F W ^»d Q u. ula
. v d d n^ a N .N..-. m Nx L 7 w r J W<W W O U .-• J¢ W W OZ W N Q < O u
3 ^ 3 .-• QJ F- W O •-. > > W
W ^ N .. > Y mT< V> ^Y O O T
Z uF• • O J7 >> O W T.
T QZ L T» J u. O O • ^ V
< O u <
• Q v ¢ W J •^`^ J w W V H f J J ••
t .! V .^ W u K< J ••J W Q W W< L Z< ¢ 1- ^- f Z r Q ¢ W < <
2 Z L •+ •• ¢ w Y
J •Y OU> H T T T W O O
ti f 1-- u u H H H H <
x O .-• J W V N» J T.x W< U N T 7< O W ^ N2 H N 3 V¢ t W 3 U V T 1
W2 • p Q YW W O SI V H u. 73 2 f W Q ¢
ZJ m n O
S > J HO O .-• Z W< r
W 7 V ¢f- >- U Q N Q Y< t W u l f W Z OZ 2 R< O N f 7
N W d ¢ ..r ^H^Z N ]..< I-
•2 » Y. W ! J
O x p X 3 ^D Z R S <•¢ ^ 1 V 1 7 df m O Z f Y F O W U N¢ Y pS L w f 2 0— Z<Z» 7 0¢ W f W Z W Q p
^ i T pN u O>- ►O Iu • I I •A L L t 2 w
W Y Z 7 0 W<< N O WZ<ZQ I Q>- 7 z u
J> ^ 7 Q V^ F N N •^•N W •^ Z Q ti ^• p R ^+ • Ll v W~ • v pa V v u
u ^Y v J• 2 Q J J W
v
¢ W W V W Ju u¢ s •• <• Q V ••< W
p ^- H 2 .. Q¢ O L L •-. W» ao »
Y • L < WQ < x ¢ ¢ Q <
n ^ ► W Qp O Z ^- L r ¢
¢ W ¢ •. 7 N O V N NW Y O O Z W O ¢ 7Q. Z •-. p p w r m p p f
W J L »z
W W O^ Q dT- +
•• a 2^ v ••mom
O x Oo_
w o o w z ^J¢ •-• a Z W d
n nK
Qw M•
WO
f N2 .+.-• J aO 7O O
NnYH
N •O I- C) O o ^ N r J- O I^ < P n; NMI J N O A• P 0; ; -, JrOA ICO O ► , M J N •O A •D O O N ^^ .! V• •O 1^ QN N N r1 N ^-I d O O O d d O •O d d A 1^ I^ I^ I^ A I^ I^ n f^ t0 Cl m m C) m m m m P P P P 0 P P O P P O O G 0 0 0 0 0 !7
1191
I•1
S
W• ^ 7Y W ¢ ¢ ^z S W o W7 V m W L
Y¢ N Z W2 r 7 W S7 2 2 7 V¢ ¢ .Oi A Nr n r .+
z z2 ^ < 7 J OO p > Jn ¢
W .+ J ¢ ^q <Z ¢ N W A >
1^a¢ao^Y
< Nx Y z O L Wr < H < p QJ ¢ ^
O W "] L WW
p W O ¢•A U
J 7 p W rO < W u dr r > N Z <or JfO Q2 W• O
J J J< l < V¢ ¢ ¢
J 2
Y Y Y 6 ..J J J •• rW W W U0 o c. »O X ^. J r•. o a
N ¢Y2 r^ N N OQ N Y Y <r Y 2 L p
L 7 ^ <Q 7 Q ^O ¢ > Zu O
~ ¢ ¢ ZY ¢ f• O TK O Y. r OJ WWo > a i >
< JJiT^ J W W^nnon•. o
O JO < 7.+ o Xa2 vM wu. r.^
v v v v W.1
J J J J wW W W ^U .
SiV K Q m ¢
Z '.-. Y Y > Y
< < < <•• J J J J u
W W W U OY 0 0 n J¢ N N N t
.-• O X r ZaaW^. r•.
.rig..OF Fo6li (1 ;j - f '^
xrJ<
•
T r••• W 1
N r )• O x r r
r Jx <
u L J r 2• 7 <J Q •-• J ^^. r r <
u 3•. WN 2 O
V .+¢
W LO 7u v v N
WZ O
Nv
7J J J •J ¢v < < < K W
• 1 W YI W ^U♦ t .^ Q Q Q Q z
• 2 Z Z Z i W< • Q
J J J J J w r X YU U U 0 0 R U t.000 or L Jx _m m m i 0 m 2 .• J ar W
m •. J O rY J r •+ 2 N¢
H J N O b J m< Z •••Z Lli i mr o•+u•L W o
r
0O
. o r2 >O O•-• r O
r, s > ¢O
O^ N T W
W C LO p Q
O ¢ W n7 r
Z V < WN Q rW Q QO W IQ
• < Q YI6 ."• N< W N Z ^Z u U< r 7 2
m <v }W W 7 r N O r JO O U r D VN Q N < O
L O • U N p mJ•••• 76rQ<N • % Y W W
O m > O O• J w < ^ Z <
I..I ^ W J Hr u
u Z ^J J u
< < N < W W >w Q Q QO J W ¢ QW 0. QY n 7 W W <v m o ^< u <
on uQ ^ .^2 0 ¢ ¢ O
O W L 7 W < J..IOQ 7oY. o
•-. O Z N r J N6
OOWWu>0
ra
n ^0z ^
a v zr N a^ N ^< < pp< W r
O `.fU N l^ c
2 WO Vo r
¢ W W r ^V W N 2 2
W O¢ 7. o W
> u mw Z T w ZO ^ 7 Z t
z Qrrp w u
OJ u ` J
J <^ J wu < ¢1U ••
Q r
.. V r JW LL ^ W
o u ^ .-Q > NO wv oc^cnW
O QZ.
O
O
¢
n<<
O O ^ N H J ^^ O 1^ T O O .• H J N O A ff O CI ^ N H J N A 1^ O P O ^ N H J ^/^ •(` I^ O. O Cl r H J h O 1^ m P O rO• rJ NNNNNNNNNHHH H H.+^H 1 J JJ J J J J J J./^ NNh •/• A A 0 0
1210 1
r9
J NJ 2r N J ¢J Y ~O ♦ < Y
n u A \ J n ZH Y w f 7
J O ti\W <
r h•< W N!-• X •- Jf .-. n 7
2J l ^ T N
H J YW ¢' ti2 0 O N
N Jti w O 7N
Z w u Y.+ O W.D p
•-. R ^•• N Z d fJ¢ H
Y J << w Jw d a o r^ < ¢ i < J Wd O< <
\ J < Ou ♦ ti
p O H O w O WO N m t 0
N Yo.-. v nW V ^a^oiz
N Z ti w 2 H .•.u¢¢ 7
¢V O Y p
V ¢W W ♦m^ r x^
\ ♦^ Y z o ^
! d T. ^ J Z\< 7 u a7 f 7 0 J •-• ^ J O W^2 O Z 'u < ••u L < X N 7^.-..+Y7 !< Z ^¢ u X
!r X • N ti d J Yu< . \ a ♦ 7 V ZV T¢
• W y F• YY O w¢ 7
> < N n:. V Y¢ J V Y f
2 ^ w< O J N^Z < < H •+ < X V <
N< < O N r¢ N• Y W f
^¢♦ ^ ^ •- 41
N Z A N d •-• ! WQ 2 ^^ ^ +u I- rrp ¢¢ W J H D O .-. W 2 V< w H J J< << ^ i, W<
r. Y D L O ¢ wO d O Z<! J t f s n7 p 7 ¢ +c ^. <u^
>
n ♦ ♦ nt7 •ZOW N •
¢ ZO • L
¢ ¢2 OY ¢V d
W V Z • 2m 7
z x uJ Z J
OY. Z N w 7nO O u Z J O W • O
0 0 0 ^ ^ •¢z.O d u O
¢ u,
z d • r ^O ^ •• O ¢ W • W
^ W H V u O 7 ..Y N iJ ¢ . • R
p ` Yl V W > •^ •- ¢f O D a¢ •• 7
• J • du N V •+ • • p
N ¢ Y H d V 2 W \R O !- Y O C L Z 2
w < • O ¢ O W ¢W Y ti ro¢ V • Y •• J Q •• OV u 0 7! 4 Y ¢¢ Y V 7^d v x ••ou mZ u J W 2 J¢ •• d•~ V d O .-. \ J V
w O n J 7 0 p H 2\ Za .n .-• d Z L Y .+ u J
7 2¢ O r u V T. d J^ u u u u u
T ZO O
< <
O O
^ rQ ¢•O+ O
¢d d
O O<
7 7J J Jf ^ < ^ O
V Y W Y O7 •- 7
2 ¢ Z ¢ J
JY
2^ Q W
JZ •... r. V
J >
o n o
O ¢Z <W Z <
WO Z
JY
2N d Oti H Yx W
Oti O
! u
• r••e
•
•
J
z
7O
Vd
J•/• O A a ^ O O ^• J n J Y•• O h • O P O r• N n J N O A .O P O ^ N• . J! n• f i A m O O n N n J N • O I^ O P O•• n J v` O I^ m0 0 0 O O O f- A A 1^ • . A n A A A O a 1 •D ' Y l. n O. O m^ a O P P P P PPP P P P O O O O O O O U O G ^ ^• ^ r• ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^^ •- ^ ^ ^ ^ ^ ^ •- r .-• •- r r ^ ^ ^ ^ ^ ^ ^ ^ N N N N N N N N N N N N n f • . N N N N N
121
• 1
['I'
m .
OF
o2 J< J
{N_ ~1O 2
O< N f
1J N
J J •-u .p> W OJ > Ot H
J N ~1< wY
OI 1O< W W Oa W 1 .-. ^ O< i 2 O O> < 7 . 7 O N
' Q ^ p O2{ u 7 G V 2J p .n 0 W p .-•R O ¢ I- I"I W u W
2 O r J • n O u NLL 7 ! Q lot ♦
1W O ¢ u J
T- 1I Z¢
G> W .O W O •C•V 7. < •- < N O w 0 "O 000
O Q O ^- 2 •J< !- O O N ^ C I N
V Npr 7 •OOONN ••WW WWWWW •OANMM••2^ O O W L¢ • H { p • Z ."• O . .. N^ N N N N N N N! O2< Q S J ul t < W X N N N • J J J J J J J O N O >.+ J O m r Z
J <O O O N< I--I Q N .. .• .. YI W •• N n<<< t t< • 11
V 7 •• < ti• w O 0 0 A J L Q L L W K Y W W Y• W W W W 1-• •• I T H JRI .+ Y R I •-. V¢ W 7 J W O f p V u u < •+ V N N N N N N II ul ^- T ON N >< ♦ Y V 7 X O N
T O < J •- 2 J .-• •- p < V h J 7 H J ¢ `•• < •• .. •• .. .• .• . N f !. Y Y ¢ ¢H
< 0 2 U •-. J W •+ J 2 J J • Y w N 0 J N O H N! p O~ J[I • U W O 7 < O¢ H •. ^ O< I•+ W< O N< O w ^ N •n J N O m J 0 w Q m 7 R^ w¢ 7 i2; S7! .+ i I W < V N l u Q u V 2 N L i i i L L t m .+ O r H T<¢ T
O J A V— O 2 O— 1 J •• Z ti /OQ r >< O 7 f < H r
Z u J •p• ¢ N O •• V Ye•^is .+ u WY _..{ r < 7O ♦ 7 J QZ ^ 1.71-1
♦ ¢u -.Liz a -wIDO> 31
J + O l wm ¢ pu u u u u u u u u O
r t
J N N N N N N N N N N N n; N N N N N N N I I N N N N N N N N N N N N N N N ----------- N N n i N N N N n IO C r N H J r O A •> P O^ ^l M J Y\ h A SI P O .- r J vl O A L P O '• ^• J N r A r O ^ r N h J^ O A SIP O ^NNN J N N N N r 1/ 1 r l/ 1 h M 3. • n F I/ 1 J J J J J J J J ) N N N V 1 V 1 O O O t 1 0 0 0 0 0 0 A A A. A
T T
122
I
O 00 0 0 W O< W 7 0 n 2 . 0 0 N N O O O Ou. C; 0 0 0 0 0 J-. Nn r N p -J(3 0 0N N N — U N• .< O .. .. •. N 11 N N T N M N 11 M N O
! O W •• •• T> .• L O . NO • N» R • ♦ y M N w L Y N N U O IJ O ••W S J O Y• J J 0 0 0 .-• •• •• Y> J J>» y O> J .1 T J r r r r
V J J J cD W ^- <u w<•^ ) J J J rr J •+•-. C; 8 C; 8V< N< 11 I N l O J O O J r r ^. > J<< f r t m m m T.
r r !- J •• • r Y •-. W J O W V ¢ < r r J < r ^ N N 11 II . 01¢ Z i 11 T J f W N Z r N O f W O •L f W r ^ N < N N ^- f r < •• •• •• •• JO .-. 7 .. ^ J r r r L r J K of r K O ^ N ^( N O A Il .-- Y Y Z r Z r•^ Q Z < O O u .+ ¢<<¢ O .-. Z Q¢ Q W w O Q Q O< O< .- N H J u4 0 7^ V> J 2 r m r L L 1 I- W W r r > Q N N N T r r V O V O r r r '• O
0z •.
za JC U
w Z
> •• Z'. r
Y •`Z A >7 v .ar n n
z ao N ..W 4
Z ¢ Nf W
r r vw L ¢ WQ ^ O W NO 7 `
r uW r
W p •. •.2 N nr W N NQ Y
Z z2
Y• w G u 7 77 C ^ Q Qan. ^ ¢ uW Z Z Qr J J r ^ .J
W W < WQ r r WW Q Q WQ ^ J Q
J M p A T O U ^ NHJ N S A T P O ^ N H J N d A C C O ^ N H J In ^ A II O O ^ N H J VI O I. T. O CI _• N H J 1n Yl A OiA A AAA A Q1 W TQI QI aD np 1p Tale P P P O P P OP P 0000000000 ^ ^NNNNNNN I`INN N N I J N N N N N I' I N N N N N N N N N N N N N N N N^• H M• H H H H H M H H H M M^ H H M H M H H H M H H N ^ M M H
0z0u
OZO
2Oti
O1O
o ^o z
aO
vO
Or
N pO O O•
123 N^ 1I
O U7 2¢O
W
Qp
►Z
Y2O.-. O
• Z Z< J < J
r ¢ r1 Z a V 2 +7 t w 7 a WV W Z W 2O S J
Z . O Z ..O+ r n < O.
Ln . l
y QQ
W.
y-¢
.+ VI S A N .J •+ Z A N
. Z 7 V ... 2 7 v •+ 2< O . Z .Y ¢ ..
Z Q r n .-. W S r n ;7 r f S
rQ .•-. W
¢W
u ^ .-. NJ 6 N r w
IL AO V ..
J v Cf 1 /n
r •-.¢ Z V N 7 N WO Z Z w¢ f W O W% ¢ O
V^.! ^
n ¢• W U^ J¢ ^- T. r 4 N
IJ¢
r LT r
N m r h. 7 f W •". 7 r Df •^. J 7 7 7 . n i 7. •• ••
7 Z Q > •. w r J LL r YS Z r W .Z
!, NN
LO N h O
^ r W >h• 2 b •-• J .- O Tp r W O < u U 2 7 v r 7 L J
Z JA."I ! J p wprl2 v < .- Z^- W Z w¢ I 2 S.n ^ 7r7 7 Q •-•7r W nO Q r W C •-.a •• z a d .^ ^ .+ o u o ^ a u z o-L L^
Qv r v vt W S Q 2!aW m..^w O um r.a- i J
2N v N 2f oW
•-. ^7 .+ 7 Y. u. N<¢ W N w H W 7< b l9 O
^ ^ ! W L r f w N l W •-• W I2 T .-• Z .• V O Z J T J J¢ N N r m WOO <r
^J WZ
d N ..2^
.•T r •-•
. f . . J W ^ ^ O O Y u. Y/Z L Z 7 N u/ C
y 2 r wu U
v Q d 7O 2! 7 T
r o.h+
^Z z v z Z z v 2 z .. 2 Z 2 •3 7 2 2 Z.Q Z N ^- b •-. a Q .7J J T J J J 2 J J T J J J Z J J 7 V Q J r W 7 7 ^- i'I ^er
Y J w . J W^^or
Y J Wnor
W J N wtir
W^^m
W t¢ 0 d •+ W i0ror o ••r •-•z WZ rm wW Q
] Jt Q lb Q W Q] l ¢ J
R Y/ ¢l ¢ ]
7 Ql J
=¢ .-. J
Q] .-.
Q W V. JJI R u w Zp •.
O WJW
W 2 .••
P O .' N r. J Y• O A RI O O N M J r` O h- RIP U N H -! h O ^. s• P CI N h- J r O h- RIO G' • N r J N d s• P O h-N H M M H H M H :n H H J J J J J -) J J J J v, H ./^ H N N v N r ./^ p 0 0 f1 0 0 0 •O O O A A A h. A A 1 • - A A h. m Rf m RlH HH M HHY•MHHH HHH HHM HMMhIHMM HHHh^M Mh•H •IM!^ hIMMHM ••IMHMHMH MHHHHMHM
124^I
nnnnnn n.-.
o
W u
uW
W HL a H z
W p • WY O
n •O •
•¢ u
JW r• t W p f
• O N > O < GO tn Y I W < ►
O a f r < C 7J O ¢ Z .-• R 7 2h• • V .• ¢ N W •^ Z' 1.W ^•2 w
O 7¢ •• W Ju J f• <W<< C
N Z n r a m D W I . •< 1. R
6 m uO > <
< f¢n
WY N
J^
r < ¢ma n tr a
< C C J m i¢<20 > J O u•fu 6 Z< J Y ^• ••
R-
^ L F-I R a .O ♦ W O 4¢•^ H N N u u
O u >pR uuuu — uuuu
WJY2
• 7af
J
OW ♦ N
Z^ • J J7 • mp • <
• i 1
• O N< • p
J '].^ O 6
J• O ^ J Y N •• OJ • J O Z Y n •. O
7 C <Y•7 •
U.. p
t 7^ a
G< G
R J R O W O T<W W• W W U ! O ! T IJ•
Wa N 7 C J O LZ 7 z u 0W O Z7 W O W W O
H W• G W J J •' J J r•1 tr
JO W O O^ 0 0^
W l• tr 0^ ^ MS L„¢ a • Y n v
7 f• L ..J J Ju
W •••• w Va • ^ p a r F^
m7 • z 0 J •-• R •+ aG e 0 a a nW • ¢ •-. •^ v¢ J W J l .•O > .o¢ ^ up
11
Ji
~ R wJ ^ 2
J
>Ur". W
W n ^ 7< R pW < 7.
L r r2 a
.Z..•+ 7 O r
o n G n! N • O OW C C
7 v ^ J 7
JL < v WW p .-•.+ a7
n
J
Z
YIa7
O Oz 7W 6 v(1O 7 4z o nW ^un O •
J N O A tl O C'• ^ N /. J 1/. A h ll 0 0^ N h J N A I^ O O O ^ N M J .n O A r 0 0^ N h J v. A I^ ff 0 0^ N r J V. O A O^ O n0 aJ sl m 0 0 0 0 0 P? P O 00000000000 ^ ^N NNN N N N M1Mrnrnh.n .nM• r h •n In h h h .n M M h M h I • M J J J J J J •/ J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J
125
1
00
Oo Y ••+
r•Ifp N
Ya
•• O
7 p O nZ
eo
-..•7
o o^ < N
z ..O wt• u W W Oti •>( N J J J O •"•
.. W N Y u O T..+
a ^f LL Jr O W W
oJ N
o < W CZ) > p z z•-. p p p W 7a u z •^ •^ J W J J > W
< n 7 `• 7 .. 2 •^ ti 0Z
Z Z< O
••• ••• 1• O
J J Jn' W
Q •r N WO •^ p
O •-• 17 m p^ ^ ►• ^- II
O • <n G
,O J J f II r 0 O W Z •+ f 2 7 •^• J J J J J w K u V >> u p u Y d YIQ w W u r Q Z > G W Z u 2 H f) r J n Or O p T p d v. J O Z Q W p •r W m Q •. O
N •-• O,I •+ 7 O J J F F v p A r 7 r U A ^- , 7•- 2
,Y O O W .• O 2 2 2 2 2 < Z 2< < Z
O O n w n O J J J J ZO• O
J .1 J J J Z l ^ Op Z > J •u p O Z W W z •+ u •^ z 11 < f)
♦<p O p p
n w 1O p 0 2 Z
v A<2
•••-+ ti H ^- ^ ^- H VlA •+
pZ
r 1-p , 2 ~
J J J J Z Hv
J J J Z W n n¢ R R 7 m W Z u J R2 Z Z •+ 6 Z Z W H H fD 7 J l l l W f) ••• •1
Q •^ N J J J +• < J F •+ H H Hu
Y 1 •-•O p p O Y 2 O Z W O V •+ t 1 O 7
ufL Z 2 2 2 7 L •-• V •• 2 V •• m 1 ^ ) - W O OJ J J J n r n n r Z W Z •^
C up Z W u W F V•3.• H H f f
t• OZ
m 1 V 7 •+Yi •+
Wj
y'J •-• v m W Q m ^ uI Oz W a a a a O Zr fD l 1 l l •^ u ^ iu p
r^
ZW
O O; NInJ N OA t O O WN - J n •OA n0 0-`NI• J In OA :)Q O — - II J N OA f O O NM.• N Or toO O NM•n J J J J J J J J J J N N 0 0 O O O O O O O O A ^- A I^ A AAA A A O rn m n a) b o T al •O O O A IfJ J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J
126
V
1I
.01
00
•-• O YO
N W
O ^• V Y R .•. Vo R ^ O rt
3 ^ nN f O .•• • N
< N R ^,U R O O
p 6 -R O N •-^ V u< O u. 7 0 W N Y W O w W ••p .+ M- Z i. ^ H R J V O J J H< < W m r
n .•• ♦ W ^../ T R W l J V. W .••Q Z 2 W W W V J S V. ^- W O n 2L Y> J J J R S O W J< n Z O2 • J J ► ^ O^ LL U 1 A J J v
W O O O N W • V W WO u. 0 0 Y O LL O YI W w W u f H H JH N •[ O W Z Z l Z U J J J J _ N U L •-•
O p W L J w 0 r 2 v O O O O O p V. J W 2 •+r t) R O v >! r R v< r ID
O ♦ Ov `- •-• R n R O W Z SJ SJ J
S S) O N Z W Z♦ W W W ..i h H 2 0 •f 7 l ^ ^- ^ J < 2 •• I J
J J J J p J Z w p W W W WO .- < tO r< Z• f v H O
O F W 0 2 •-. ^- W .+ Z7. 0000 N < 2•+ N < •+ R R R.+R rm R WL r Q r V» 7 7>> > pO H 2 S S l Z •f 2x
VW 2
V p J J J J r f w Y 1- m< r m W O
r G Z r^ f f R W^ R 7 2< r •+ O N) O W
2 M V n S.2 l r LL O• Z W > > y n 2
Z S ti m 3r , O
V Z SN R WY S O m w 07 V r
2R W
W O^ m zW o.. 2
J N a I^ n o O ^- N H J N a I. O O O ^ A. H J N a I• f1 O O ^ N H J N a ^. n P O ^ hI J v. n f- n P O H N H J N a w Op? P (} P O O O CIO O O O O O r ^- N N N N N N N N N N H H H H H H H H H H J J J J J J J J JJ J J J J J 3 N N r V• Y• N N N II r N V r N h Y 3` N r N N N N N V• N N 3• N N V• r N r 3. N N N Y l r` V• N V• v N V• u.
12.7 .I
1
HR7t
R7O
U
Z
C4
O ♦ a J< Y
O 2a v mQ O
7Q
V O a 2 •-2 J w ul
Zm W O H
• I < O U
•. aO ^ Y O
1 a ^o Z 1 O• • O 7 7 2
., m ai r H 2
Y Y •+ ^ Oa 6U O
• a Wu a u.
^ Z.+
y
Z O - •^O 0 • •+ O Q
T TW
aW Q
Y Y S fO L 2 •• < •• v
s^ 7 7z
0 .. ..L r a•• aNG O
Z ^N ^ ^ Q
af.
•^ O Z a•- . • u z o^ x a
a •• •• O CJ
Y WZ J
Oa<
y i.. 7'
Z V► Cr N N Z L J •1 W O I O J: N Y Y a z Otz:
z :a- n Zu N Y 2 z V O '- 7n 2 7 7 7 ► - 70 Z
vYG • 7 Q Q I C Z Z ••
Q > 1- J ^ - 7 J Z 77 2 O - - ti V. ^ T v Z N w J Q OOw ']
OC
72 2 2 L 2 Z
Ov= Oi
v Y2 ••
J 2Z W J 2 Z ^
Y •- OZ Z •-• < .^ C
ti J JJJ J .I r 7 7 •••^ 7 • • J J2 7•+a W• ti IrO T ^ y Z W W W O Z Z ••'• ^9 •-• t 0 W J 7 J •' O D U
4 H ^- f f .•' Z f W t W Z f f O~
S S yn 2 •! ^^ •Z m J Q w ••• < m•+ Q a Q a Q t[ J t 0 'l Q Wu r m } J J J l 7 •••• W J r 7 AZ •Z.•^f ••
au
m
On
n oa o! nyQO F
O
On
•x
O
I-
v
O C^ N ••• J •n .p A .^ 0 0 N •n J N pA •D O O n• n J N O A ff 0 f) N M J V• O A o 0 O N J V^ f^ h a• O O N MJ N N N N N N p 0 Q O O p 0 4 0 0 I^ A ^ A A A A A A A 0 0 of tl n of W m V) ^ A 0 0 0 0 0 0 0 0 0 0 0 0 0r• V. r r• N V. 3^ V` N V N V V` 3• M Y. Y V• M N V\ V• N v. r\ h N r', N V. r V• V• N V r r• N N V\ • V. V. N N N V'. N V • M V• ^) O ^• Y•
128t1
•ti
=-T
Ur I •
N < T NN>.. • J 7 • N• N . T
7 Jo Y OY: n T o .yr••
or o •• r,n ^ 1 ^ W ^
c^^^ W a z o^ < z
'iJnY z J- u n^^ ^
W WL^
^_ oO O
o^O
o Q 4- J (^
R W Q 1 r 7 I • 4 • Z^< •••'. r J 2 O 1 N 1- f ti V. !Z
O ^ wT R O 11
V <Q O H • XI U .". ► . S
p Q a < z .. ^ orO N < J O O Z W A
♦ Df < 1 -n < O if J W Z^ Z - ^ r,
4 W J O r Z 2 W< O t) N O
z0 1 r .- z .• r. W N s n< H J W 7 2 ^ '•• O O J Z O.
Z < O T r• • ur r u .• Z •-. J n
•. Z O Z W O t < J 4r f •
~< O O .
•• v C Y 7 Z 4> l O ON. W o t a •• Z A
p > W O O 4 V N V O Z W W J •+r N F• < V . Z t.^N V 7 Z i. x L 4 L
•• • ^ O ^+ Y Z J w O .-.r )T T u< r - r 2 T r S 0 O .- O u .•• I
n •• r H J ••• r] - n J V Z.• sr Y aa•. < o .a .-
n O Z Z ti p .•. O . n N .•Nr•
N O N V^< J Z Z 1- 4 X .. •. O
J J -• n O rN
O •i 4 ^-4
>H r Q N N Q V .• • . ► . .. •[ Q . ^ G4 ..< .
. R X •... .. Z r Z S s Z v 2 J v 2O!
p . u O► ► W O. •i
QO W N •• 4 Y J J t i J J f J Z J W J J J •^ 4 X Z i Z N Z. . D - ^ Z u. f J W W O W J W J V' Y. W r • J J J^ W r r
Z O < q r p. ^ i^ Y. O a r f^ 0 ^- ! O r W« V i< V ^.r 2 2 2 f r 2< T v J z 2 2 2 2 r V R t O W R¢ n V .-. ` Q n O V Z •^ W r r 4 m
J JJJNI JJ. JZWJJJ- JZJ W)7- n 7) >Q JW JJ JZ •.Z W4nQI W . J•-^W^^oo
w J 0 W W J w v al W T 1 .^ ^- D O l l J R .+ .+^^ ro^^l-^ ^ o^
.^ r t. n n l t f R • .-• n f• l W n r
R iO 1V
T 7 J) 7 R 7 7 7 n .. J 1 7 ) .[ J u X.
J N Y. 1^• 1 D O .- N II J r d A n 1 O O r N /. J N G A n 1? O r N. n J N•• A Q I A O r ^• J r V A f l O O ^ N M J N d H n 1O O O r' ] r] . ].- ^ ^ N N N N N N N N N N 1 •' ^ .1 I1 I1 1 n I I M 1 i n. n h J J JI ♦ J J J J J J N N .I • N N v.. n N. nO t1 0 0 0 O 0 O 0 •> O <' 0 0 0 Y. O •^ 0 0 t. O •^ 0 0 0 0 0 •O 0 0 0 O 0 0 fl 0 0 0 0 d O O •O O ^. V A O O O '^+ ♦1 O Y•
129
1
1
o
JOI
p O- os W
r
W ¢ 1- W p >1- v o ^. w p- < p O> p r• Z • V L NZ
< ^ L Z< O < r^ v W OS p Y n F r 2 < r m < 2
W V ^ • W 2 Y ^ r- •'^ 7 WJ < .-• V r N r W Y f W O ID
-IL• ^ Z •+ ♦ D ♦ 2 Jv J N O J u¢ Jp 7 - N l
N .L O r r • ^¢ Z A W d- L Wr ala V W W T W < O • >•♦ ¢NV ♦ W¢ J<p Q < Q V f p ^ N Z m ••• W¢ n Z W m p N 2 !
• S r J •'• G L\ • - W W V W o r W J W ••• < •• ^- Q'f W W C N P •] r J •^ 4 0 U^ ¢ O
•'! r ^o•. a o^
a P< N<
t_l h< W N N W J< J • Wo r^ z mP W o
^z
> (J V^a- -
41• S\ O¢ X2 •1 CN •• •• << W •• W N < N • P ♦ W ♦ p
7 ••• •• T • - - O¢ V • •• 11 O A •• •• W N V N N Z nJ J W 1.0
W NZ
Z W¢ 0V O
• Z N^ w N^ W .. W J
rJ
O •• /L '•-^
.. r• ¢ N- .- .. m r O W < V ID •r r> T r (i Z
J L d O .- { Z v N Z Z W L- r 0¢• P O W •• •• - 2^ ^< !t r J J Z •• J J 2 r J 2¢ J a .=z 2 K f Z J 2 ♦ Z 2 2 0 2 2
.. 0 2+ •• W W J w ^U J< w J W m T U w r• /- D J J n J J J •-• J O11 < •••• r pv L r O¢ r M1 J V K W < < W- • W-
Z v Z y r T. ! V 'if •+ < a 2 •+ < •i ^•I Wr r X O • r r
J 2 J 2 a .+ J 2 Z W r ••+ ¢ n w Z¢ ¢ W¢ W^ f J W a 2 ..U J1- O
J n: rU n O
Jr O
Y r •D O r p 7 l¢ 0 2 3 n V 1¢ m O r C •-• W Z •^S V^
nC ¢ ¢¢¢3 3 3
¢3
r t < w < < ¢Q W7 a
1-O1 ¢ 1- J ^ ¢
O•r
rmZ
PUr NH J •U 1♦>.0 0 •-NHJrdA ? C) NMJNCA •.+00•-NI J •On -P O •- ni - J r •OA m0 Or-NMIv♦ 00 d O d 0 0d dd AA)^A1^A AAnnap eD mUf T•p aD ND T6 O • P p P J• PP P POC' L 0000C♦ r r• •-• • ra •n o o •o a o 0 o a a+ •D c o a o 0 0 ,D o o •o •o r o 0 0 0 •c, o 0 0 o a+ •o o o •D •o o •o n n r^ ^. n n ^ z n n A
130
1
o14t!^rnjnt - .. ..
OF
WO3r
L f7z p
^•
¢O
¢ W J
< pO
<
ZW
n nZ •. H
n> Z ^ . O
J
• J u2 f•
.. .. Z 4J
@ n Iof ^W •. n
r ^^ u n p < @ aN V .. Z n^ J w A u W X^ O •• < M x CL <^ J S W R ¢ ••.
J W O rp W F 2 ti d Z A
L ¢ a W . ¢ @ •. •• O ^ IU Z Z ^ Z p o ^ ^J ¢ O ^- •-. Z Z H¢ O ••. A p V•• O 2 N Z J J 2 J• 0 2 Z Q
•- p f <• <• n¢ n@ a ^ n W d@ O w J S M ¢ .1 n '+ 7 ^•
N v•• O •• Z.t--. OZ¢^ ^ J ••
ZV2 • JJZf•< /,
¢ Z •••^J2vW
a! V O u p W •^ l l¢ t om¢ u u U 0ZNW Z-.
0-0 ¢..Gf
N- ¢ M N ti G G T I H O u y 2 0V or
Z S Z ,Y"¢ Z v Z< Zz J J 2 J •-•
2 •• •I7 z •-• ••
¢ W¢ nJ z l .+
W¢ W^Y <
J •- J J_ w J W v t7 V V+ O W V' l [^ ¢¢ V O W V G J L u. 2¢ ••• ^ O^ S N W ^ 2 J W ^¢
f 2 2 .-• t -• W .p w J to u u W -• T O •+ 7u.'1 wa .-. W 2 Su l
¢ ¢ ¢ V Z)¢ 3 3 W i3 3 7 •-. 1•
•7w p u
Z ••W p7W
J r 0 ^- if O C1 .- N r J N O A it •^ 1"1 N Y • J r h A P O N M J N -O A a. P O .- N M J •fl A aD P :7 N M J N YI r ap
i^
NNNNNN IVN nI NM MM MMMM M M J J J J J J J J -f J N1n N•!^ M ul 3^Y, q< O •n Yld L UA A A A A n. A A AA A A A I • - A A I • _ A A A I^ A A I- A A A A A A A r. A A r A A A A A n A N A n A ^. AAA A A A A A
.. .A V A • Y
131a
t
r^41
IL
1
t ^^
O). 1J OO r
d PV t
1W
JO
1
OJ
1 C O O• 1 o n¢ r 1
O u 01
O • Y Z TO
1¢ ¢ i
LL O 2« l WL J S ^-
►1
W f O L ♦ W H < .••n ap P N W 2 O n ♦ O
J < rri u P -• Y Y <
¢ .Jp n< i
u o n< KH I Z J J
-17K L ¢ W u w W T,
n n L O 0 0 • 0 0 Nn •• o a ^ n =
U J •-• O p D r ••
J J O ^•••W • wO
W11 Hr.
Y u.n p p' J H L ^ < L 1 •+ N N n
J ¢ ¢^ N k O^ < W W >> ♦ 7Z 1 n/ u i t h H « f
F O O <, r O f `- O T 0 0 O p T U pp p v n O • L 1 t < K < L Gn a O n O< O J 1 O) O^ U w
N p .0 -Ma V O< W 7: 11 M n Z OL L L U U R R O N < n < J J _l
¢ TY~
i r N T w Y N J O 1 •-• r OO '^ O•+ Iu L V O Z 11 T.0 Z •. •-r
< •• u¢ W UCL
D T 111- V W ¢ R 2 •-• S ^••• R¢¢U O O O W ^ Y O N i w F Y W W ^ Y ^' 1 1 -(
n 1 ^ '- t n 1 N O 2 RIp • O ^< r O. I O tV •+ 0 2 <^ Y Z •^tw O
• 1• l^¢
< (: O • t l7 `-•Jw O 1 0 ~
n f< 1r^
rl S W<< O
ZJ •t¢ W
W •. 7 N Z 2 W Z ..Zr- .1 •• ^- m W Y m••• m W M V m W -• W < •^ O
1 1 Na^
.+ ^^ ^ .^ a n .+ tTr •.¢ w Sw z•. ..
0 0 ¢ R) ^- m w n ¢ti r< r r 7 2 O
P O ••I J N T O O -^ N K. J N (1 A m O O N M J N O A Q• O l7 N J N •O A T O O N r -f N •^1 A Q, O O N nOAA AAA A AA AA amep Ql rnmmrnTm P P P P O PO T O • POOn 000U000 ^ •••NN NNAAA A A A A A A A A A A A A A A A A I- A A A A A A A A A A A rp RI ar O¢ O T m T •D m m T w m m QI Q` G Q1 T s. o• O
132
Ir
AL
_.L__
133
1 • . y w J< d♦ J L
xN FYI ^O . 2 ^.Y '1
1.. 2 :- Jp p ..L 2 y •' J W< ^ .•
1 J f ^ N W ••¢ -0 r O ¢ W O
..O 1 Z OU L R U
Q 7 < iZ
¢ H,-.
a O < W O n ¢ y <Y. N W ¢ V .• QI ^ •-
^ Z Z •• Y W< 1- 2 Q r ¢ Y
1 p ^^ O O J 2 7 N
H J 1, T Z_ ¢ O .n u Y^Z < W ¢ p^• v O N vl Q^ v O N n ] r
y •+ KZ O J Z W
^J Q p •-• a W Q
r^N
•. - ^• r O t •-• 7 a J :u
¢ N H <V 7 2 r
Q !- alf•< '^
< w1- 0 0
< OO O V' 2
O •+ V 1.I < p W u f W O 2 •+ F •• ••¢ 2
H N> t 2 0 Q 2W O. J
• O< r •J y ¢ H .-
W NJ U W U 6
••J ¢ ¢ O • 2 .. .• .. Q O •+ <
.,'^
p ti Z W (. O Q .. v F N ' O .. .. W O ^ p y Z Z v ry Z T< J ¢ H W J •'• ••• ► m 2 < ¢ J J S •• J J
N .-. ♦ Q 1- • K .nW
¢ a < ^ i v 2 W ti L 2 J v .. < 2 ^ ^- O T. I- ^[µ1p
N W N ~ W •... Q J Z.- .• r W•n 2 <^ J 2 2 .'• N .. ••. f J •. r
•^ NN^ -• ^ F•
. D• ~ ~W^
•. ¢ N M O W JQ F 2 Z 0 2 z f O
'u J¢r. Q p
^W JV p
Y Z 'W1-
•-• ¢ S W ZO ¢ r[0 3 3 R 3 3
< •] Q Q y G 4 w<¢ Z O V¢ WW
¢ w W O Q W O Jv Hv
v<• < v< v • A t z Z F W •.• W Z W 3¢ 3 ¢ ^- J l K2 N Z Z O Z •+ J Z 2 2 2 2 • .^ O Q QI
'-• 2 J J< J Z w J J J J Z ^ Z T. l] d¢¢ ¢ w Y. p uW p J W J p W W J W r y W 0 3 3 3¢ •'• 1•.. p H O N E H F O ^- .] •^ m
^ Q ¢ 6 ¢ W r¢ .L ¢ ¢ w n 7 m3 a 3 3 3 Q W 3 3 3 3 Q 3 ..
J r n A m 0 O N r J N J A Of 0 0 .•• N /+ J I/ • •O A T O U N 3^ v V\ -0 A n• O O N r J N-0 A a .^ C'' 1^ J N +^ A mN N N N N N •• 1/^ h M 1 "^ h I1 h/ 1 • J J J J J J J J J J r N• n v\ v 3\ O-0-0 0 0 0 11 O U-0 A A A A A A A A Am Q l a O^ T Q l Y I a Q' m a^ C n ¢^ T T+ 1 n m a O' s' a l Q) O I T T 41 CJ m. ^ m! , (O O -^ T^ a^ T T. •' O S I a I+ >) a C O T C. 4l rt l G•
r'
34
` 1 -
IM V N
JJ
.^
W2
nH
. nl 2 J N• O: O
Q K N. O JQ
OZW p
f F• U H 2> < p J Wa a p ^
J -1 2 W ••+ O•.. V•
Nn O V WPOW
v^
O •¢J '-
r
W \^ W Ut 7 6 1• T v
p l O O W M Jyl p > 11 N
Z 2 J V ^•• 4 <W •Y ? J ^ N m
W 7 U W p m^ n- Q1 N J Z J
•+ LJ W
Q•< < e
W7
W O 4O
<. •^ 7w 1 00.0 r ♦ ¢ • ¢ m 21- 2 ♦ ¢ N- C M< w N w 11 ^• < W •• ••
'-O
<• ><
N^ L 7¢ •-• 2
u^•K •+ •• m L0. O w
O • ZW .• 1-
H •-•2
Z.J J
¢ V •• N O A N rv¢ ry luK m p ¢ K J ¢ WL •• J •• •• O •• W 1 R N •-• O ¢ • < O ¢ 11 r f
11 7 u •. NV• nl ••+ ¢ x
. m H 1- 7 ••N¢ 2 u
Z v • 7J 2 ^• ^
tR 2 •. N
L¢••• J
L^^' K
•^ N Y C O R - Z 1- v J O Q 11 N H p ^ Z N V e Y• J< W S w7 ti J Z •z J a < L •-• L N L •+ ►• Z `^ Z n 2¢ •• K 2 •-• < W •- O m W N •OJ< W J W m R C) w O J< J } O '.^ 2 J 2 J +•• 7 •-• D- w¢ ¢ u Z \ w< Y JV¢ H O •^ < K J V r< Z r r f U
Z <O Z -
W • Y J W< U• U V Y.N e e H O
O W ^ l e' ¢¢ V7 :7
4 •-•ulW7
W S2}¢ .w
•)•J W ` 7 < r. J < ^ •• •-• < .+ 1n W J •V V V W J w.n ^}a a^ p r o.• w +¢ ¢ Tau< m u}¢ ^~ w .•^
z W i ^ Zm }
}
P O H J Y) r r_ M P 0;; N H J l n 0 I- • 1 0 U•- N H J N O A e• P O •' N H J N n f- Q• P O^ N H J V• •[ I T I P O^ nA m el m m T m D ••• T t* O P p P P O O P C O 1 ) J 0 0 0 Q V O N N ry ry ^) +J ry N n+ •^ H n Hn e) D R+ T T e • T m T W m m el a) n n •D m a+ o C 0 P P 0 6 0 P P 0 0 P O O P O O O P P P O O P P ^ P 0 0 0 O O R O
,A
1
^iG1
or F
0O
♦ Wd
< rJ ♦pry O¢ Id W
OJ
1
oc ¢ I Hp W
o < ^n o
m ^ W H •^ O^ p
^r J p u
II 2 n 1 CI a nm .. n
O <• •¢ O Y Y n I
• + 1 2 Z 1 O L O
J .0 L F )• J• u ¢ J J .-
W F f^^ W W W¢¢n. d dvuu n
2 p•+ ^-
dn o00
U G O V Y [ K¢z•. <
n< Zd du
f-.^W p wW p
U!
OL
Z r^I-^^
r. d dn< a
W O Z 2 u<<Z OW :] O W 11 O C O H H NW O d L O O a
2 O <'-. L'1 NI O
2 Z Lp ta
< uL¢
J uu¢ x
L i WW^x n n r o^- n r t
2 .Y•^ •• ¢ u d U pV` M Z t Vf n O O Oy7 2fJ O
.. < Z v < w <
K J n m V¢ •~-.mom
u^w pm O O 7
< 1^ LL•
JWN¢d
N¢ df 1dlp ^l ^u+z dz r
z
~
r.
x^-
^n •
zr
0O .-• ^ N Tp « u 0 < <N R f-
¢ I.0 W
J J• W W
¢ I. ¢ o pp .Ix
< N Nf N H f J J U p
O d •-. O W Z LG. • < p • f ♦ G I.
r p . O
W ¢ O u6 ^- 7 W¢ f W IU< v L f ^^ Jp d F W u p p
^ o < w o pOL
< p O< 0
^
p2
< <a^ < u l
w L <o mod
i u i d¢ n d 1WL W a ••Lr
p O Y H W 1-• W W WT. p d
•O L M •+ oZa L1.0 0 < .• o ..• Oo
u ¢ up o z W
< ^ oz
n11 ••
u z a w ^ m
.. V A 7 Op
~2
z o p m wW L L ¢
W W O
Jr •OA 6.00^N.^ J v`dA a100^n1 M. J 3•h A•"00^^^/I J In •OATOO^ N^^J ICON QfP O^N^^JN dA nH /1 r.1 h h J J J J!! J .J J J N v. N N N N N ./^ O O O O O ^. O C O O A • _ A A A A A A I`. 1Va m m IV m a d m 'DO P P O R P V P P O O O P R P O O P R D O O O O O R O 0 0 0 0 7 D O O P V O P P O P V P R O P 0 0 t` O O P y
7I
L
1r.
'~7
135
W!
10.,
R^
OF Hui .. ti^,._.. •'
M 1
M
0'< oJ 2 1
O WO .1S O
1mO
x W Z•+ J m N
Y O ^ 27 NQ P ^
¢ 1 ZP 2 w Y OO • • O f J
O J 1 2 • J Y ^• II^ J W D
0 0 < u o .+< O • J ^
•R
♦ 2J W
O OO
n Z J 1J • ^ < N W O O N
O O O L O O t WO .^D .... L .. Z ♦ w 2
x L O Y Y f ¢ vW W ¢ 'J < < < U• Y
¢ Hul •^ O
••• 2♦H • n
H J J Z<w J T
♦ ¢W O
U Y Y O Y Y Q W w J W u .-• Q S J x J W A r Zzz m-0U I ^Y t G. K K O r 0 ^ x r Z O O J .^ N ry ¢
0 0u. << O O 0 ul F•¢ J J J •. •• T J Jun W
z O .- O L a 1-. 4 .-z O
O W YN L 7.
J 7L L L7 O O
• IIW W W •• •• W N
u. Y Y0 0 0<<
OZ
O W r N u nY Y IJ W G ••
n a•• O
r O Z Z 2 u u J J J Y J_ 1 •-. d -Z Z z S LL. w r Y0 Z YU •< . O ♦ O u- Y Y _/ J Jo O Z 0 2 << J¢ W w 0
J^ JlW f
J J ~p p 0 << G C O O O N N < •-. LLI w v p W Q. Z
^•L ¢ ¢ J d v JJ^Y 2 <•( <xF V 7. Jd 2 ^ ON Oa ^• J t z Z Z w W Z JO O Z J J J O p J v V¢¢¢ r_ H e r ^ u r m¢ 7 •+ IY ..J p G U •+ O •. O M U p II < •-• p p p O W Z
S •( < v O .. Z U• < < < x Y < u. pl W ¢ QI I•+ 0 0
•I• V < < nH u O S •+
d 2 W •• J •-•Z ZJ J •-•
rr Z W^'+ 1- m ¢ ¢ Q w r- ¢ •-• u
Ou.
a z.-d w12,
pp
y 0 W 2 W W• W W O W A¢ Z ¢ w J T v ¢ ¢ u. ¢ ¢ u.O W
C^ O^ N n J V+ O A QJ O O N r. J r` •!+ A O G ^' N n J h O h n O G• • N r+ J V+ O A T O n N n J r O h T! f G^ N ns+0 J D O OO? O? O 000 C+000000^ •- ^NNNrvry NNN ♦ nllnn.inrnnnn J J J JP O P P O P
1, 0 0 0 P U C + 0 0 0 0 0 C' ` O O O C: C+ C.1 O U O U O C+ G O G U O O O C^ C + C) U O O G O O D U O O O U C+
51
136
•ia
1
r ♦_ ♦ 1 - . .
W
K
O •.
O r . Wf 7 ^- FT W <
Y U 2 .- <.- ¢ 1 R
Z
¢ V
o ern •.o^ ^
O N . 7 W ¢n nn •-. ^ oz
W V ¢ ¢ n W N Y .-• Z r
^ 2^ '^ O J < t J •-• Z W ^< A« N W O^ O l 0 w 7 f p ! i L 7
.0 O T_ Tr. W N < N ♦ < r N Xn .♦ O 7 7••+ T W W u On .•.+ l7 Z Z u J_ J J J _J W
~ I^ ^ « O •• N w J Jt `I N O W r< V. r O .. H 7
•• •• f f T f 0 0 0 0 0 <¢ ¢Yl ,^ J n M W O ¢
.. u• Ir ¢ Z 2 2 2 Z f< L Z Z•- I T I ^ O L • •^ J J J J J a C W
O n O: .-. O •< •^ Z H ••. f 0 !'f O O !) S J V x W X2 Zw O G. r 21'.p.- Jn n r o W o G< J N J ¢ 7
J V
OO
J
ZV
. X
0rc
mm T M1
^ a II O J Z `••W . 2 •• O <•
^+ I X W S•-• ¢ J Ip O ^ O ^- 2 N
J^ 2 R ••O o v ./O^w ¢ f Z 7 u-U¢ A r• ZO ¢d
W W Z • v 0 X •-. ^ •^.2 n J^ • II 2 t • c • f 7 7 a u V 0 0
X .-. J^ W< W Zx u .. o z c z s u u z¢ m Wti¢ • O W f r. < ,u W J W
n H z 2 .•• c K V¢¢¢ z.. n u. J l V -^ I+ 7 7 7< K O ,^ Z N m V V
K J 2 0' < .^ m u W JH <.+7 W W`- u u¢X = Ww ^ mz i
J H p A O'.? O^ NHJ u^,[.A MO O K m Jr• NH J:c N e^O^ O ► H J v. `OA TP O^NHJ N•OA Tl J J J -I J N N N N N N O d V O O O O O O t A A A A A A A A A A b M M 0 '+f M M m Y1 M O U? O` O • P R it TC i U 0 CJ U O O C U O O O O U O O O O O O O O O O O 7 •' ? O O O C` • 7 C O O O O O O O O cm, O O O U O O C` O O O O O J^.-^.-^ r ^.-.- • ^.. ^.-^ ^.- ^.-^- ^'-^ r r r r• .-.-^ -^^ ^ ^.- ^ - ^.-^ -'• ^ ^ ^.-^ ^ ^ ^.. ^ ter•
13/
I,
UV
e z on W Z
pmrJ •+
^Y
¢R
N^
^ ♦ T . Qm
••O O O 7
m R In p P n . n ^^H H n O .+p,n
I: < N x a 1 aJ O Q
^• m ••[] O l •
i •J U J¢^
Q V V VJ N D J W N J •^ S W R R W
v O Q^ H2 •+ 0 2 z
Zz W
<O O
f N p O r Wp ^ c^ ¢ ti• S .••^-V U •-,
J O .- < p 2^ v
n 1--p •• l • .L Q H 1"L O S ^L Z W 7 2 ¢ ^
2 f R R¢ ¢ f O •• N W y J Q ¢ O . O O n^ J J r.o 1 ^^
^•. 00 •U Ul L
l'J Q¢ d V ..' O 11 Z v f 7 Z ♦ ^ r 0 . 7 7 r+Z ^^V. m wp YQI^ fff V> O u(!.
J ZW W
•• U .- J¢ OCl Q v Q O.- J S«
¢ W W W J y J6
W N. . WW ♦ V N♦ Z ••
N ♦ O R•• W ti W
W O r 0 0 •- G^ .+ .- N N Y O Q 7 O Q. II J 7~ r W^
W .+ ^ pz r. < <i ..arN p p <lu n
<c¢ onQ =r <
w —o oIlk
z7x 2 •.. ..o l of ♦ r r a u N 11 ¢ 2 2 W o 0 2
71...2 Q H , 41 W II wr•
Z H .. o v Z O O H O w O O FO• < J J J •• J +-•
v¢ u W 2 Z .- ,r << J In J< R •-•
. U r •j H 1 ¢ r < .- 6¢ W O U W J W C, lO 7 1 ^U r y r 2 p 1 0 In v¢ iI. Qd 2 w ¢ + w ¢ 1^
' S O o 0 0« p N < 2 ul < W O N O QI7 . . - - v f z z Z W W Z Z S u u• •>; .-• w wW O i O J J J O O J m
R1.1 •-. mZy
H < 2 p p O ---W O • • u<<< x ► < Q lL' 1
7--, Z Z o W- W r 0 W • O mW xZ
YZ 2
u17H H W R Q R •^ H Q
•+N]v r
W J w Q Wa u ^^ r
m^
rI
P O N 1I10 A mP O^ NH J N OA m0 0r' NH J NY1h 6l P O^NH J N •q A mT O ^ N 3IJ 1n (1A T.P O^ NMP O V 0 0 0 0 0 0 0 0 •- N N N N N N N N N N H r• 1 H H H H H H J -I J• J -) J J J 31 N InV r r
138
1
i
aW O
nW
]( J ff¢ W Z ^
6 W 2 ^V
¢^ •• m
• ? O ^ To
^ p ^ .. < x^ w<• x a
2 m W ¢ J^^- W m•. 2 ^- ..• A 2 1
u V N W Z • V •• m ..p O ('u N ^ K L N . 2 •• O . J w (
¢ I- ¢¢ J ♦ W¢< W u .2f L W 1^
J W'•• ^
W A U .-. SJ •• m 2 N
v 0¢ ^ a-2 •-. ^ Z Lp (• f • ¢ SD J L y d^ < C] Q Z J W O Q ti .. O ¢ D
< Z O W m<< O O 7 ¢ O . W n u p ••. 6 /^ D Z 2¢ N Z<¢ ¢¢O p .••. V T p 0 J. m a- W W 2 • J J 11
Z f • f r O.-. 7 •+ W a- (- 7 J ••
^`< < a OA X
S J a- N11 .-. •• ^• < S Z<<
V u 0 0W Z
Q a M1 as ../ p •.W W C O
w W loon •• .. x ux
y.o z nzz mW
Nm W z•• J J J J N J ► • ^' O W ^- 2< W w .^ Z¢ W J u• p
.-. •• Y Ju v u r N• J W ^- v M 2 >< N W Q¢ J w .-. W Z••. ^- l
p O p 0 W O <¢ 7¢N•.
^-y
i 7 •-• ¢ yW J< V J O
V Q¢¢; mW W >> Z
W OZ
H v v H r O¢ a- H <u
¢ p ^ Z N m U u l W¢ Z Z 2 Z< 2 f 2 2 2 0 2 Q< ^ q w JW J J J J¢ J O w < •+ J W r Wf- p p p n > p .J Was ^ •^ u Q
J H m O7 p 6¢ 6 ¢ a- ¢ O^ W 2 S
^ W pQ Z
W raz ..w pL
J N• O n g P 0- N r J N• O A g P 0 •- N! •. J N .O h a n O O e. i a n. a r O.- U P O •• N 3. r O A g O O N M• J N O "- nrNNN y. v. OO A A AA O A q OI+ IrA A n Ati n1. 1^ qq gg Ol qqq 3l q P P P 0 0 P O O 4 P C?GOOO OOOO
f a! V N N N N N N N
139
1
'i(a
• z• o
0
•W •p
•
Yn r1 r+ • O
• ♦ 7 • Y• • 7
• Z • Z
• M • • ZW • .. O
Yw
• • J• • N p
2 n Q • • yW • Z
• W J ♦ Q O M1 QO •-. • t O
o c .z < a
• y p • H O ♦ • ♦ • ^S d^ N J O• •7 • O •- O• U • 4O w7 • •• W O ^M
^•< J
w J• G O p
w 7 • 2 7 C • • OV J C x L • ti H y •-N W 2• J 0 7 L •• 7 7 7 7
• p^ • 7^ f 7 7 7 7 7 7 7• x 7• r a 0 0• U V G O O V U• (• 7 7^ J V
W M R •2 ^ V •
Y 7p
•- 7 0^O^
x x • x77 • 7
x •t x x x7'.>>7 ^ •
« tH
< x
Z-+ Y x 7r < ^ J J^ J• .-.R W O 7t 22 L L7 Z l L Z p2w
Q G Z• .[ v• J J J J J J J J J < .•• ti H f- • ti •-^ • ^ i •. 7
^-W
^^W W
r ^r^^^^/• .-n
e d• z ti x W a a QQ J
U W ••. •-. a^n Q W Q Q Q Q Q O. R Q
y ID 7 l ^^ l l• J • Z O 1 Q m 7 7 1 3 7 7 S 7 m 7
p .+ W O• Q ti V v Q W
Oa u u uu u v
f^ A
Q
2
< Q
7nZ
W•1 n
J 02 r ^W pG <_ uW p O
Z p U
w ^ n
W ••O Uui G
7
^' II
51
{..• i'L. I-- ._,.
p 0.- N M J. r.- O F g O O ^ N h J. n O^ f n O. O ^ N M .. N O A g f• O ^ N r J N• p A q 0 C l ^ N Y r J r O A a f l• O W NO r ^ N N N N N N r V N N N M M h M N H M M M J J J J J J J J J J N I^ N N 1n N N r .^ h U d U ONN N N v N N N N N N I •J N N N N N N N/• 1 N N N N N N N N N N ry N f J N I • J N N N N N N N N N N N N N N N N N N N • V^ r^ r^ r ^ r^ ^ ^ ^ r .• — — — •• r^ ^ r^ ^ r^ ^ r^ r ^ ^ r- r- ^ r^ ^ ^ ^ ^ r ^ ^ ^ r ^ ^ r .. ^ ^ .• ^ ^ ^ ^ ^ •^ r
140
r.
N
n NW 7 O. ^ w
O > Yp Y ^• h
G N
6 N 1J N O U I- J.. .. Z
.. Y Z YJ 7 • Y 7
O H O ^ Op 7 I[ 7
O SZ xT Y J O 2 7^ u = em u K x W <
s 7 0 0 5 7 lo Kr..- = ao i
• 7 7 J J
2<< 2 Z W v Z WO T W W W a V •-/ O •-• O .^ •-.
• f^ ► \- '- G W tr Z W Y Z W tr•• Z V Ir m^ W N l a 7
••/ Z W tr tr tr W J
•1 ^ m 1 l^ H W rtr /D 7O
AJ
• r C• .•• Z
p Y.-• N
LN H
Y N OW • Y
ma W < a ..tr ^ 0 7 -
Y J O mtr m n O nW
• Kp 7 W 0
2 •^NZ
YN •o
< N W ptr L
` N T O •+ tr ^\
m• I W• O •A m NO m N p
\\J-
L W7 V
N J NH H \ tr
Z Q W u J WH N O tr • - -
• K H 7 ^••• ' • 7Nd NIr O> - - mH Q •• H O N W
W L Ir p
• 7 •" O O I- Ui v I• J n
Y ^• '- 7 70 7♦ 7 7 V ♦ 7 U W f K x<I-o oW Yo ^^ w• ^ 7•+7 x K N ^ x a L 2< ZO r 7 O 7 J J ^ Jx f7 ..•
t- x f) ^ ON a
Z Y•• ^• Y ► YK
--jz s z
^ J ^ J 2 W tr tr R trW W W W W Y Y m J J J J►► ^. Y Y
a a K J77.2 7
trl ^
or
(iww
' wit \ \^IY^( •Y M!. /.ate
(m
Oi I i
N
= N7tr Y
w Z
- U L' .•• v T vW -
.• Y N N ^ N
V Y Y =W \ <O I^ J A < A
• Z 'Y J. .w 7` 7 2 Y •O • W N
a.w O Y •-P P OO Z\ / T u D ON Z u Y ^
tr JU• K•
I^ •• O W Q O ••` T M Y^ aY N Y < n K W K O<•• <♦
P J A< •W Z a J. J T Jtr C W
J ♦ O \ o \ o ♦ o N•` O • W A Q U J N J N J N
P O •w r p•• < P
Ya .w
Ha I-
• - W
Y V O ~.t r K Y t r Y Y H Y Y Y H )J- J t • N 7 7 7 ^^ 7
W .Jp ♦ n ♦ Y
O O O O O O O J./ xx Ii
O^ J n J tr ^ 7 7 7 7 7 7 7 J
a zw•zV z v ra o pY N J J J J
/`. Y Y Y N Y
YZ
W W W WY Y Y H Y Y
^
7 7J7 >> >2«+ o(^ I- O O O O G tr .. t tr tr tr tr ^[ tr •. ZK 7 x /[+[ Ia I- V 7777 7 lT O/•.7 u 7 J 7 7 7 2< k f< K << ^ '1l W 2
V vZ< Z L Z VJ v J J J •+Y r T
trR t = tr27>> 7 J
V.t 7 u
J r O A n O O ^ N H J N .O T- ff O C] ^ N H J •I. •J I^ •" O O H N M J •^ C 1w tf P V ^ NH J N K! A N O O ^ N H J v1 A N nO A O O 0 0 I. I` A A I- I. A A A n n n A O a W O O O O P P? R P P O O P P l l O C` 0 0 0 O O G I J.h N N (. • N N N h N N N N N N N N N N N N N• V N N h N N N N N N N N N( • H H Y• n I'. Y• . H H H H M H i
• t
141
L
riiii
rl
J CN < Y 7 mW > J Z O
-' ^ w m o s •a ^ s z •
o • ra • • a
♦ 2N Oa p
D • a••
= NU
?v. r W rN
•• 1L7 O r O
V •+J •
D• •
•• a•H O Z v O • Y • •Y 2 V a J ^ • a • •
^^ ••uJ
a <W m
••• oa W
• ••
• t•
a z- m : a o:. R ^ W N O C_ r • f r N W N
WN a. v• Y W r O O
W n J •I W W = W J O • •-•J •• J •-• a u O 7 O < • a .3^•• a
•n NN D 7 ^ z %
A•• R f1
••. O a
>J
O O 3•^[ %%
> JO a
OC
a •W
W N. 1 O 7 J W r ^ d >L J . Z a a Z 2 7 • ♦ •
. >V•-.- a r rte+ A v Y• •
r, Jr 2 •+ O
• an
J 7 •- J J 7 u •- v J V W a n r •!r a 0 0 Z O O O a N Y a W .• • •7 r % •f rO a 7 1 •[
ZJ
%7
a^ ^
VZr r n•-
O r J R a.- a Y• 3
..0. O• O •- p•^• O
7 ^+ J V) J u O r O O •- a 0 •• ••4.J J J J f ••• Z tl W
uO • • O
• W W W W V J O w• 2• a N p . •• •. r rrr r r .- Z W.- m V
i wrW O ZO
<C r r 7 7 7
O O fir ar < t: a t •+ zu7ar•-n Z 7.J • J 7777) 7 • %yi s) .) ) ) 7 W O •+ O 0 0• O O O O J O O• a 7 7 7
uO ) 7 7 r 7 7 7 7 7 7 Ju
Z •• n 4 i .• fa <. <faa<• p TTT••w O V
Zy W
Z n Z Z X Z Z .' T ZRO
J J J ^+, O N r
•J J J J J J J J J < T r .-
Z •W G a u
Z W W•- r
W W W Y Wr r r r Z^ 9••
R R Q
W ^ p I S a W v a a a a a s a a r .pZ 7 •-• O m\ 7 S 7 7 1 1 7 7 1W a Vr
r W1 ^1 ..
4
.M
•• NNNN NNNN NN nn HHn HH/1 J J J J J J J J J J N HNV •I^ O OO Q O OOO O V S- A r- An H n H n n M n n n H n H n n n H n H H 3 n H 3 H n H H 3 n n •^ 3 • 3
It 142
^ ^^•. _.ice. ^ -
1
r
tt)
II
OF P^,.l; ^^ . ....
Jv <f >
T a
- > w R JW z .+ ri n r W G
^'-K N D 7 N- f Y aO CN O R YR^ S tr J
^[ • •Z-a u
Yu
2 N • ^ S .- a- R NC• < ar
Z N N t W A II1Y
V > •.•7 •• f N O F L W ••• .- V4 Y .. r ci n ! t R
• 7 7 Z ^^ ^• U W 7w Ou • 7
N ~ W •/. O a L W W T rV 2 N r N u 7 ••• O ' O 7 V N^ J O B
r.W . N>'n ti O t o •• a 7 ..O O O N N • N 7 •'• ... 7 . p O. J N
W ••P ^ •. J J N .•• •• . 1 •^
. . ]L
pL r)
ti ^.7 J^ 7
Y Y Z -J .7 J •+O W O 4 T d ••• .. . 7 w O .? 0 0 !'• O O x 7 J ^
.. O .. D .. - 7 Z Y ti H ^- Y 7 7 1 7 J Js a r> Y> a > O O W J J 7 J V J 7 U W << •^ < a a s J QJ. f Y Y x n O O O W O O-V
fW J J• 4 O 7 7 7 7O O O Z < J tia 7 7 1
x 17
x x^ 7
^ L L 2J J J
L a r_1 J S
v•• N .. 7 7 7 2 Z 7v V
•^ 2 f ^- 1; f f f .•- t- ^- Od O t O •
<< <Y Jv '
W OZ ZJ
2J Z
J • Z •f f ^t l Jl•]
- Z L L Y ^- ! Y Y W) J) J 1Jf Y Z ^u VJ l R `- TJ
H H f Y H 1- Y I ,f J W •+ Y f ^_ H f H (I >
7 7 7 7 7 7 7 7 7 OL<
W p V L .^Y O W J Z u)
R ti) C V a• •t 1 a s
O lO0 0 0 0 0 0 0 0 0 Y a Z w m W •] Z W 7 J 7
17 • t vx x x x
7 7^ 7 7 7 7 7 J —< wV
f J: t •. JJ J l w .0 O
a< a a< a Z W rZ T
L 1 2 v l V S v ZJ J J J J •^
W W Wl
tr r: r ^ r v a O
Z J 7 7 J J J J J r
J N O A n P O ^ N n J v• ^ 1•- O D O .- N I• J N C N N O O . Y /• J N O h 0 0 0 ^ N I• J •n V A fl P O r •n J v. A N wn ^. 1^^ A O^OOn 00 u) OOOP P O p T P P 7- ? p 0000O000UO ^ •-N NNNN N N.v •JM In r. )n /• ^ in h n /• I• h r n r n .• ••• J J J J J J ♦ •. J J) J J J J J I J J J •I J J J J J J J J
143
J Z{ f-¢ 2
W• W Tf
• l'1 TW 7H Z
• 1OO
o zW {W
a v ^♦ a 7
< W L^ N 7
r n
¢ < VO
N OW •
l F rJ •
• 2 7 W• J 2
u u ¢Z7r ^
L
OL
rJ
0O WW "
M
J 11 r. A N •• ¢O ^ O ON N E O r
• • M 2 2H N 7
v l J u L V O2 w 7o m wu
J
S 2 • 22 OH •-• W
d r N L
V W rN N NW T 2O m < W
¢ W O
0::wr 2 Z
W t tt• a ^F- ^•• 2 w
^ Vr 1-F x W ^w r W z
a 2 r•00^ W^ Z N •+ M
W R L2 W .-. • Z
w T O F ^-W Z H f
W 1-ux xW <W W
7 0 W 2 Zw •Om
ti2
N NF p
uf- W
I mr O• f aa r^•-a
llw.
o'
^ Jr m•r {O N
¢ Q
W N• N
♦ 10 7O 77¢ •. xO p O u ^ 7
'J 7 7 • W< < V Z Z
Z v ..
Z u•Ju r+
^V
W ry^• f- M ¢
.•u 2 a K
J fn
•-• 1 l u O OJ U•2 • . O Y
Z m - N N• W p W
W Of
OOz •. ^
•-z
w O2 M ¢W o •• az .w O
Z ¢W O¢ 7
2 O •^ OW •^ O W
uw C
Qa
0S
P O ^ N I ^ J N 'O A Y I O O ^ 1` I M J 1 n• O A 0 0 0 ^ N M J Y r. (f A R f P O ^ N M J 1/ 1 •O A Q 1 O O ^ N M J N d r 0 D P G' 1 ^ N MN M M M M M M M M M M J J J J J J J ! J J u 1 h N +n N r^ n r v, u t d • O 0 0 0 d O d d O A A A A A A A AAA T^ • D T fJ J J J J J J J J J J J J J J J J J J •` J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J -: J -f J
144
a
t 9r (
.r I-
1
Y
7
S
OO Op N n
Y x N H W¢u 2 u O • Z Z J O
L 1 O w UI u.u Z u O O . W
J } N d 7 N OO x
O N •- p...
N001 ^
• uOr•¢ d N
O . r ¢ aOr O O• N 2 u.W r n Q.. ^ u .. o m
O > ^ OO ¢ W¢ w O O 7 ¢ • u O N
0 7 .- p ^ o o . aW 0p U^ •- n
w H l I^ 11 v
♦ ¢7 J 7O¢ Y O
W O •-. O . O V O O• • N .0[^•nQ W O• L< 00 O Y • } Z
V L"•ti O^U J n^ ^ Jv 3^ ^ J
• Of^ ^ 7 •-• A
V• n T 2 u .. p^ v 7 < L
^ SR u Z w
O< W 2 R } U p 0 0 6 •- ♦ ^ N • W O Z^
^ f J N^>O r• < x L 7 L O •• O O f S H> HW 7 h L J u z O w 7 z 7 O •"•
nZID < Z • V
Jr •• 7 Q w N <7 LzOwn
z n zpp io
.1p •'• <« <^^
< nzn ^••
tix
.+mw pau >.
F f r• < F w r w a¢ M J w 6 u Q . . ^••• Z 7 C• f •- O W H Q H W x .+ f< 2 Y Z H Q<
rz-
W m O •• •• •• S S W w Z ti S¢ V •-• ¢ W 4Z NO
w•-r-m ti r-• 7n f T u
V a nL O•- W
< O N^ r^ >>
H 2>
u, d7 •-•
• pO L
p
mS u^ uu o.. .^ a uu.^uu
a
J V• n f. T P O ^• J V` O A Ql P n J r O 1 T O O N n J r d A T P O r• N n J V\ r n T P O •^ h J h •(• h nn rtl •G ^•1Tm P P P P O P PP P OOOOO OOOOO^ N N NNNNNNNNnhn.l Mrn nMJ J J J J J J J J J J J J J J J u. ^ N - N r r N N v N r N N N r v Y- N N
145 \1
c 'm
I
•
N< Z2 OZ •- •O as
J •rJ NO ZV O
OO < a •
GN O O O• 2 LW N
7aO Y
r• R 2 =7 W Z ¢ ^
¢ C W 2 W Q2 H 2 ^
VZ
OO
Oo
Z S•2 < LH E L
2 ¢ W O E O • N Z•-• O1 ^ O V W C
< 00 V Z•^ W ^ ¢ A 2 < L I
.+ O JJ
A u2
^ ^ OIY •+Z O O
WJ
a 4w J• J
d v Z II J Z 2 0< ^ O< O F V•( S •• II •-• O D O E ^ E O • W
O O L n 0 ••Z •• ^L C L DI O O
n¢ N G 2 2 ^ < 7 v OV
T rl O • •• V ••O W W ¢ u + 7 N h L •r L O
Z ¢ 7 Ir f <r V U w U L O II O 11 II Z7 7 S D W W u •^ C V 7 w a O •• ••
v•• •• • p Z
Cf • J O 7< m W N V w H N • •-•J O< r O h •+ J N f A W HO J
W< Z •• Z w ul 6 V w
NO N N ••
O< V O 7 t O < v JT I^ a N O Z V V O O < v O w ti O N O J
• ^ O r• • m J~ w^ Z O] QI 2 J w p Z '- w H
v• Y
J O 2 O 7 •-• O W •-• T O • Z♦ O¢ a 0 Z 7 O
¢.+I.a ^ a 1. t woz
••
•^as
^ ^ Wz ..
. >7
PO Nr J N •O mO C• NhJN Of Q1P O NrJ NdA mp O N 3• J N •Ol mP O^Nn J In •O I^ QJ O O NrI J J J J J J J J J J N In N a a O O d d 0 0 0 0 1^ r^ /^ 1^ 1^ I^ A 1^ A A rD ^ L w of m m rn T O) •) O O?
In N r r h N -N N - h N r N r ^ r N N N N r N r r N v Y• N o v
146
w^
,...
Q0.'
OF F:.
WJr
O.. O ..O• N zc .• o
n Jd W J
Z T T. O
l ^ f <m
Z Zz
^• Z^. HOL <.^ L O
O W JQ ¢ i
O Oti p
L O^ V Y dO ... Z
n 1 O ^ W ♦a
o p rY 2 X11 1 7 <
i .'a 1- O .- I J2 J O <
¢ u. O Z7 F- ¢ r ♦ x
O O ~ R N n l JJ N n 0 J W •^
p O n ¢ a H > 7 J ^-.^ L W l x ¢ J J H x
¢ w ^ ^ u 0 0 ^- O J u
7u ^-'ZO • u0 J^
O .•• > Q A u J x.r O L v •• N O W
O p T• W N u 2O O O u¢ Z
> 2 • i N O s 11 ,.<00 2 Z •-• Zv m N 7^ 6 N JL
O J r ¢ O ^ O< J J J J^u Z~ ^- N< 2 U J J J x
u 0 ¢ ^¢ Om Z.•u000 WO H w n '- ^ Z C W< Z^ U' < V u u 2 0
^ O ^ O •+ L •-• i i Zn v .. < Z L •] w 7 m W O
Z < W ^ ^ ^•a ^ 2Y, N O f Y Z l,'J ~ ^ m W OZ .. < O Z
r o ^
W ra m
Z ZZ WH S
OLv p T
< W <a L JO ¢ O
ti O OF•
NO 1 0 Z V Y 2
p .. o o a
s o a x2 .-u^ 7 p Y
< < ti O W <S J H¢ x N .- L J
O ¢ ^ L ¢ O wO 7 .• .L Z ♦ ^ p
O O 1- ON O N '_' ¢ 1 Y .¢ A O J
O V p• X J W ^ WO n H a L
¢ uu O••1 ¢ L ^ >¢ W of J J^
O 7 u ^ v H f W O n ¢ J J H x< O '-• T Z O '- O J u F•O •-• C L v . J xL O O p• .. O WJ > 2 i • n u tZ -.n-: L N N f ¢ w Z
OU 22 •"• 7 L N wT OTO O • H = m N L ti r• J w .. ••
J .+^H W • Q < OO V 2 ^ n 0 N W .+ O< J ^- H V f< O¢ W ^ d W N< 2 J J J J FI W n < • U m Z •-. O J J J xL 1- O M O ^ Z n W< Z'- ^^ u 0 0 p iuO r d v .. < Z ••' I .-• l i H •-. W< u u u Z'J N O ^- Y S u w 1- ti w 3
• •<O ^- W W mz ¢ M
^ W
O W V O W2 N W rW J m
J •n f1 P m O O ^ N r. J V` d I^ T O O ^ N )n J V\ d^ m P O ^ N I. J N Y) P n P O ► N r. J N .<) N T P O ^ N M J^ O h TP T T P P P O<J0000 •7000 r N N N N - .V Al NNH - r--rn rnM r J J J J J J J J J
v v) v, In o a o .+ o ,o o •o o o o •o o o o o o o .o o o o •o o •o •o o o o o o o •o ,o o a o 0 0 0 o a o o:2 :2
147
t1
^1^
1 S •- W • ¢1 2 u r-. L7 U Y I N F • p
N Z• I+ ¢ N . < Z • Z J
F r w O F w W.. K F ^
♦ Z W N N F<H J .-• x J O •• ¢m F W • F
. p•+a L:! L • F 7 F• N F N •
2 2 N Z N N ^[ u0 0o N . 0.
o LO ••. O <- • F J r n uZ< 0. N¢¢ J tp I HO F N 7 F W J • > p p W Fu Z w U F< < O RY O¢ w p ¢ F p • J
T U < W J <JN•-. T w<O Y m •U X V• u W 7 v O O •• >> F ♦ F
No 22 • O.-O ww•. F•• <2- a U v O O p 7 7O x nG Z 2'Z Z 2 F w 0¢
¢. 0.
T C'r G•+ L O n<<
F F I ZW
Fx NO W ^. p t > Y G L < F F n n 0 . w F
•w W O N
W N < N w L S z LJ 2 7
¢¢ Ox 7
=n I
• F W< .+ • Z [^ Z W F F p N n n t- ¢G 2• <w •IZ L¢ ^ •OF p• O F 0. 0. F F •. •. JF Fz n • Gan Y^oo<^ < Vuz_ -.o a<< ,. <w p .. • m
aN
o .o J¢w
Wapp u^a r.a.
^.u
z N• ^ ou zo< wF oa < a a v F'u O J•
ur Z •+r•+ 2 W W L¢ O • 0 0 0 -<
O • O W V'- F
F ••• FO < 2
S S wJ J J F
I Z lE W O2 J• KWOF¢I1L GF O OOO ^'Ir p 22FF1]pNpKHL SFW O• ^ 2¢ •^ W R .+ ♦ Z • A n J 11 1 .- T 2 •• •-• F •-•
U• O •- 0. u u u F O J ♦ I O •• n h. .. < .. F v F O r V u) 7 m O• < • ¢ O ¢ • • •• • • LLM¢• F
U W W 7O V 0. II N m YIZ• O . L • O Q m N U A Z .. .. .. W a
0. ¢¢ a H V -• •-• J O < p N <F Y F F O N m< •• F F F U
G • > mZW
P U^ H J NOAOP C'1^NHJNOA mOO^ HJN•OA In0O^ HJr rA s. P 0^ HJNOAQI0 O^NHJN NN NN HNO 0 0 0 0 O o O OOAAAAAA AA AA mmT•O T.O men mTPP PPG PO PPP 00000 oor•0000•oo.I ^+ooa000<I000u000000coo o+1000 o0 oo.n000000000Ar ^- A
148
t1
r
^.. p ly
OO
NH
¢7V
OF-
W
>J
O nW <
z 2 u•-• H Wr 0
W Zm
<
z0
o NO
0
¢7
N
OOO
N V¢7
O OO O u
O W
OW > '-
7 ¢ OO 7
T O•• ZN O W >
On r <
O LxH J w
L 1 7Z O J O ^¢W 2 u < HS'-
O L 2O L W O a
OU N
> V 2 V ¢ ••• W O J uZ ^ O < .-n 9 HpW 7 f O a Z < o 2 n 2ti O /< O . n •• < 2 n V 0 0 0
a r u a o w< z•2 O o- < Y 2 "J N. m w0O Z r¢ N M O r Z
rmrZ
7 ••<OraWO Z
N. 7 ^.-• Z V
^ S0 1y
O2
J W Z W m WJ ^ N O O r. a r
rO O ••< 2 '-• V O l1
< l W 2 •^ W m LLr O ^- W •-•
H 2 J V¢ ••• mr W n ^r'^ 2^
^ m
♦ O O
^7 6 T¢ LH W OF
TO
N HN O O • • O O W •. O
O Y O ^ O O Z 0 0•.Z a. J f O O
O N 7 2^ O^Z O •. T O O < U
W J W O 2 N r L 0 ^ ."^ 7 > O OW T .. H .. O 7
W O RJ O
^~
•-. N OO L
ZO r.-N f V ^-w
n Non s w INY n
I .s N n ti^n w•• J ..
V •^ O .^ .] < W O WF. r v r O J O< O ••• O
H < Z< N II
W .L N .. ...-.
x' ^¢ LLO r O
N IIZ•• .. ..
O •-. Y f wW
2•^ V R< O N •-• m W p W l< O N
^ a a a = z N W a a a^ Q• W J 10
J N. p A •+'+ PO N••• J N • O A C U O O ^ N I n J N Y 1 A T O O ^ N N J N • O A a I P O r N I n J^/` • O A N P O ^ N r n J N^ A aO G O O 00 r r r• N N N N N N N N N N h H M H r h H h M / J J J J J J J J J J N N Y 1 N. . N N N v.A A A n A A M A A A A A A A A A A A A A A A A A A A h A A A A A A A A A A A A A A I h A A A A f^ A A A A A^ hr ^- ^ ^ r ^ ^ ^ ^ ^ ^ r r r r r '• r r ^ ^ r r r ^ ^ r ^ r ^ r ^ ^ ^ ^ r ^ ^ r ^ r r r ^ ^ r r •- ^ r '- •^ ^ r .-
149
ia
f
p •oo^s
- O p .. p .J p J ^ O
O Q 7 a p OO
Op N1
< ¢u t
< 7u¢
^ W ♦ U <I 1 uV p 2 Z 1 W
Q• 7 n 2
o slo z a
J O L o Q O o 0 0O O S
7 ^L ♦
1u t 0
u o¢ U
U f aN
o ^ o vnO N I Ot
♦ ♦ ♦ •+ ♦ O
O ¢ 1 I •Q u Z W O W N W ♦ N
7 O < O¢ J W f > ti W
O T lu O O < Y ^• t H I-O 0 2 W O 7 7 W ¢ ¢ H ti ♦♦ N 2 N Y Z 2 O- O W O ¢¢ T O N ¢ J O 6 N 0
J I r+ f Y ti N- H H W O • x X 1- m u ♦- 7 u ZH n<¢ N O O O X F f m f <O f Q N 11 L Z •• ► H ^- 1 II 11 N ^¢
¢~ ~
¢ u ¢ •• u 0 O I"I t ^- x •• •• •• •• M •• C ^-Q
J Wr U 7
U¢ u Z¢ 1"1 II ti N 11
t ^- 2 mH u W<m< w 2 2
2W N • N A NW V¢ I Y p O N • .• •• Z Z Z T Y. F- T W f V O f
p n• J ~ Z D< O x Y¢ w f .. .. N .. ^. ¢ t f '• m .-• m <<
N•F• < O< V J' f R p p p
•W V ti .•• U F• 'V U1 II /)
O J O G< Z<< L ^ i IIL p f Y p p 2 x Y 2< Y I- Z< Y ^- • • a< Z
f< Z .+ J J O W N W f 0 K L Z p n ^ 11 M Q •-• N Z ••• N N L Or• ¢ 4 < Z ti l] 4 4. Q W f J ti O f 2 ^- LL W W 7 0^ • .. Y a.7 ¢ J O G YI U¢ _) O O •' K S
Z l7 ry .-• O ^- 7 2 ti W O N W w W O < ^- NZ V W J~
K Q X ^- .p V 2 11 W ti 10 U Z ( t•ti W V Z• O ••. r .. s m 2 f f W M r 4 m W J m W•-. ID w p 2 V ^^ J I. Z ^- W .-. W u U Z L L •-• w .r ^2 Z
W
w 7u Ip
^ •^ m•-• 7
wx
P Or N^nJNaA TO O r NIIJr aAm POr N••aJrOA mP Or Nan JNaA ^O Or NMa JInaA mO O. Nnn O0 aaaa OAAAAAAAAA AOmR] mm OQaO mmP PPP ff PP P P000000Or1U00r
A I• A A A A A h AAA AAA AAA AAA A A 1- A !^ A A A A A A A A A n A AAA A A T W m m m a^ r W o W m Rl a •rrrr r r ^- r r r r^ r r r r r r r ^ ^• r r r r ^- r r r r r r r ^- ^. r r r r r r •- r r r r ^• r r r r ^• r r r
1f,,
1
I ,4^
11Ir
A
e"
z0
V< pD NO 4 N¢ 7d ¢ i
O d 1Z
d Z7 G N H M J ••a O ^- v O < .-<u w •
Rfu J
1 R a N z N >z W o u L < ♦ a7 p N O ti • 1 •. O 2pa
¢
7¢ O
O Y^ N
x < x< O O O 1 2 < 2 • JN N W J W J <•^ O S W 2 •« H W wO O ^ p .. '- x 2 v O N♦ H OR 1 1 ^ •O ♦ t ^ f ^- ••• ti J J xH W o f
>> O < v O A OL O w • ¢ ¢ ♦ I x J •^ N O
O < O p p a. ^ W H W 6 . Z N< N W 1t ¢ > ] <O H TW L xz f O ti p ¢ W N .. .. Z
N 11 • A H • (", WON Z u Q ¢ << ti H m W• J J¢ •"• /"• A O
7 W ^- O H^ r x N Z << < O O N 11u, u. x J H m F f ' 11 ••
^T Z N
u U uR R R Z Nw m m W=
rA N
¢ Ati W •^ < u 11
N ~ 1 4 Z •-• S f f 2 V •• A n > J ^- J V V^!.
••.. O H R W p O H H H
~A • •. ¢ Z •• < N¢ <<<^ H N
S 4 d O. A N•• > z ti •-• 2 N J^ J J k N fW /^ N R ti A 11 << f • •• • < H f W V r W m 0 •^ 1• W W p p <L V .. .. .. O p 0 Y 2 J 2 ► < Z¢ Q W I i W L« O N 2 0 •-• Z ul J^- Y f d Y R
K K tZ
R d ^L w i
d l7 0
•-• x JO t'1 W W
mp YI V u
W N wJ p
Z Y Y N < R G d S Z S •-• W N 6¢ Y Z O Z N W ¢ ••• W w •• O 1- W i] F H f V W F J f << ,^ m w J m
Z2
l7 7 u. p p < •-• W •-• W V v •-• W W
u^ A] •-• 7^J^ 7 7 7 m(•1 W p Z Z •-• w
ZW O V ^-•Z w w
W N VJ
J N d A m P O ^ N h .] If, •O ^ m O O ^ N h J N Yf h m P 0 ••• N n J r O^ ^, O O ^ N N O n n, P O ^ N n J N d n m
•-• N N N N N N N N N N ,+l h h r.1 ^'• H H h • f• In J J J J J J J J J J In N N u, N ,n N N O O O C O O A d d,n m m a m m v+ a. m v, a• m m m n m m m e a, m m m m m a. m m m m m v• m m m s, a^ a, m m m m a m m m m m m a m ^ n, m o,
15i
n o¢ O R Q O •.< J < J p .^V u ¢ R
<• v
tl u
•-+ J.n a >Y < .(
2 1 Z Iu J O U
3 l W p pp 2 O S u l pQ l • Q 1 S< p 0 < p 0 7 2 ¢ NV tV rJ u¢ O V J d 1-
.a ♦ O Wp u uc .-
F- > • J O > Or it i1
w ♦ L O^- L 71 .-• p O Q
O O ^r> 7 N> L L n ♦ U O •\ U O
n U ¢ N O O ti Z O H O O U ••H 7 V f J V • Y H W ^ W
zO H O¢
^+n m<7
L z00 ^ p'n n N ♦ ♦ ♦ .- •- sp
>.. ..
Z.. .. a m
• K ][ H Js
2xf
.. t oO L
> o O Q•-• TO
> <TW ¢! YI H H u J p O O T O U
Z > W f > W H •• F H H J O O N V•-• Q^ >• m ^ W }[ W W O • < A W p w N W N O < H
o f .Y Z<> •-
V H N2<> H
< fO r
W i L uS .. N
JJ
V O w p•. v •. W p W ^p v p 2 QU S •-.¢ .+ ^ N Z ^+ N ^n L •. <^ ! N N Q U J W O
H• Q 7 0 0 W 1 6 7 0 C > N .. •. W N 11 N N W W 2W^ m •/ Z ^n W f Q1 V 2 2 N • T N < W 2 •• .. .. 2 •• •• H ^-
W m w J m ^ 7 p 2 X V •+ < 6 p •+ • 1 ..•y W W m
32 •• ! •- U 1- uW 4 2 7 0 1- J J
<p
H 2O •••
•+ V<u
O NQ .S Q
p W ,> < p N¢2 N w¢ Q¢ S
O l rZ p Y R
2 p W •-• ¢ K K J J • • < t i ^! W m W J m W< K 4w Z N V<< W O O p W Ir W ti!
VW J W u 2 V u 2 Z x V W m ZW m W O •-• •- W
yZ p W •J •-• m nw 2 W 7 3
w < m
O OrNr JN •AA af A O•-NlnJrhA a1OO^N n J rOA mP 0Y• Nn Jr •OA nPO^ rJ N OAmO O^N roAAAA A A A An A of tb m g al 'D maf •n^P P P 000 O T O P O •']OOOOOU 00 ^ •^NNNNm ip T o al al !. •1 T al al s m al a^ O m n n o a) a) aJ a+ a, n T a) al ap al 0 O P O O P P P P P P O P O O P P 0 0 0 0 P O O
'.52
1'
4
'row..r.r
iI
0
<Va6OQa
4r AW (J
..• . 1
^ D D U• 7 J J O •.
Q Q O •. J ^w < a < d o
u u V n 7 J1 1 1 h< Oo
O 2 2u u
T1 1 l t u 1 7 a
. O O O Q Q•+ N . R Q 7C <
<L < O
N< I N K^ V
t O 1N p
V
O O J Y^ v J N .. v . Q 1 K p•"• < J W
.. . .. . • p.J z r_
N N W N N W U •+ p fr T ^ I- > T W ♦ R
O O• 1 I NN u > >L •+
^^ K < ^ a < Ta Q o T^ ^ T ti N 7 O H ♦ ^-^- s a na Q o<Q mQ 1 1 V O ^- V O ^- f. .• J
K^ N < 7 '- >t H V Jf ti ti '- ♦- n n M .. Q m k ti f J 0.♦ 2 NG^ W t0
N.O t[ WW T
ZN N W
WT. •• . Z
H a• W Ow 2 V M
Z a K T S ^ H> ^.• T f v•T •• .^M .. n ^ ti Q W J 7 n 2 N
•R Y •
•••
N N V O .-• r ti ! NZ Y T S K< 7^ << J
^> ^• K ti v <
Q RQ n a • R..z^^ .-•21-.. ^n n N z.-u^ uw r H i w T 7 0
R Qf V O a Q
W V O HO W V O< Q OZ N W V p ^ 2
Z N^ J
•• •• H Q l r J J2 J 0 Ja J J
J F w f J f K< u m w J m W .+ m N r .-• h Q w 0 01. V<< I .J V O O"W •+ w ^ J u .+ W ^ L L L O
Z N W V V Z ZW J m W ^U p
W Z
On
NH
U
v >7 ..O O
p no•O r o
2^W T. O
= W ^ O O^ r p 7WO
2n O
KnV
w n wp .•. O
JCi M N
D 2 .-• V< N OH W
QQ Q W
o•vwm2 T w
'^mZ S V•+ ti W
wrJ V •-• mw ^
N m<V
J N O h ^ O f] ♦- M• J N O 1^ 0 0 0 .- N rn J N A I. Ql P O D .^ J v+ O h T P ['I ^ .^ J N A A m P O ^ N H J r A h •N N N N 3^ H M .9 r /+ J J J J J J J J J -1 1/• N N .n N r 0 0 0 0 0 0 O A O O A r^ ^ A 1^ ^ A ^O O O O P O O O O O O O O O O O O O O P O P O O O P O O O O P O 0 0 0 (• O O O O O O O P O O O O O O P O 0 0 0
153
t1 ^
L
if
Z0
G a0
n•
n n 0 -O J 7 0 .+ P ►O G Q ¢ d N t
N¢ vu v N Q
Q f1 I
♦O
On
W • z2 2 V 1GJ
¢n
^. ^ 1 Q HR N O O J Z <
O 7 O Q 07 ^+.- O C t ♦ O < O t v. o ^^
N OQ O
tf V O u • n'-• O v n<1
JO1n
♦♦ n ., z s o
O o 1 ♦♦ R v 1 W O ^•1N N W V p 1-• p f
O N W O ^Yn o m .-• L •+ tiU r U • 1 1 ^ m r > i
rO ^
} <1 Q O ♦
N VS t ♦- t O 1- ♦
!♦ r•
^
p L ^•1 r r V ti t 7 H • N H u Jr
^ N Hti
¢•- ti H ♦- s_ m
•• n N Nti)[
x F H J O
un
N Z r S N N = •• •. .• O N W UW
Wnw Wp p
Wwm m zi ••
H Vi W z Y.z^ N • .iO ^ O S S t t W 2 •• 1-
^ I- N N n 1- .-• } H} n W J^ N 2 N^ Jn G •• •• •• m .. < a a s .. ..
• O Y !^ R Y 2 Y 7 f N u ` x NW V t p N O t¢ n n T p n l ¢ .r 2< Z Z N N H 2 t p
W Q¢¢ 2 ti! W L ti! w f 7 p V V O r •+ Z N . Z N .. .. ti n l ^- J J uJ m Yf I Y N W W .^ Q Q U Q O W V O¢ O ♦- J 2 7 p x J J nW f W f J H ^ f J •- < f W m ti t Vv u ► S r m n .• W O •^ Q n w 0 0 •• • f S
W7 ~
•+ W u V N W J m W I i L Z S W V f t 2 u V G •• VW W N V 2 Uu 7 S V
J m ulW w O V. .^ Qf
2W
7m
<
11
0 0 1' 1 J v+ 0 A t 1 0 U M• J N n A f 1 0 0 r N 1.1 J V• O ♦- a+ 0 0 r• O J r• • p A 0 0 O r N 1 J N. t) A I R O N I1Aa14 T1 b T TT T^nf P P P P P O O O OP
noC, 000 NNNNN N^ V Hrgnr
O O P O O P O O O O O V O 0 0 0 0 0 0 0 0 OOf.^00000 000000 00^'OOC^OOOOOOOO^^OOf)OO^ r ^ r ^ ^ ^ ^ ^ ^ ^ ^ ^ •• ^ ^ ^ ^^ ^ ^ N N N N N N N N N N N N N N N N N N N N N N N N N N N N N/ V N^ V N N
154 6
s 1
^1^
UV
1. •
o_O 2 W7 r O
V •^O ^ r
ai Or O2 J O 4•• O O
JZ
ti OZ Y ¢ L
O J ^ • ON ^ m .- O ^Y v I m r .-.J •m n
V t0/- 1: o
>>
Q>
••• '••z z s s p
vn L
2w 1- ^ a
N vo
UY
Y ^ J m •^ m OHO 00 •• a NVl
Jm ♦ •i OCU W
O O Zv 0-- T O O V
^O O
Wi.
r ^ ^ O O 1 N 1 1 > 0 0 OZ (• T ^ I W Y • y 2 r C U > 0 0 •• 1 1 ►Z Z S I N •QIn ^mm O _ L Or < J f •^ Y • O O ^- N O O ^ Lm I J h Y n J J R M N H t Q n L ♦ NZn
^ YJ ^
/t T V•• L
J •• .•n
10 n O •• AV
W O Wp r o
N W NW p W f f f ti ••
N ^-!- ti
O m f .• N J ^•^.
••^ r ••• r n ^ O a N a• NO
M ~M T .. Ql Z •• •• •• •• T ^. Z r i NV
••N
^•R W A p W m T W r
J M y 2 W N T O^ W N N W Z •• •• 2 •• •• W 2 2< I T
UY Z u
m V •• J r p2 v V1 ti S m Z'
♦•• J •n
H m ID O.•+ V<
WO N
R Q •[p W 17 f O N GZ N W t R Q Z
O •• ••f ^ .. ..
••^ n V J •-• 7 , RI
WN m Z W m Y. J m W O Y> Y T
Y m V •-• J •+ V W J W O r W a 4 O v p 4 ^1- Z^ J W J v 1- m fD 7 W W ^• W Z •- • W f. •- I W• ^ pO •+ W •^ T T
WN m 'Y I t^
T VW 61
W Jr W .-•JW
► W `- J rW
^ r•- J f
•-• W v v
•m
P u b A .[t I♦ O• N r J N e A- O O N r J v^ o A r O O N Mt J r O A n 0 O N n J N V) r. 7l D O N M J r O N nr•1 I1 ^t N1 .n Nt J J J J J J J J J J N o Vt vt.n •n r ' n • n V t 0 0 0 0 0 0 0 0 0 O A A A I. A A A A a A n n n n Yt n n n nO U J O U O 0-- ,2220"
U O U O O O O O U O O O O p O 000 U O 0 0 0 0 0 0- 1't O V 0 0 0 0 0 U 0 0 0 U U U U n NNNNNNNNIV NNNN N NN NN NNNIJNNNNN NNNNNry NNNNN NN
'-1
I
155
1^t
E
r"
('4)
OF F -.
0aWQ
o e ^.7 ^ • O ^ J
< \ ^ 7 Ju V 7 3t¢
f R O U1 1 < u p
z u 1\7
\s} ^ 1 Q. o o ^ c a
a.na o.nf z o n ..
N •••• O. f 1 < Om ••. a •D v ` n a J t
a 0 a S T 7^. p M O F N
H Wf f^ r^
V♦ v < O Kn
m u• F C^ G^ I- W^ L •+ L
f 1 fL w •-.•-• O H •
T•- ♦ W
tW
Z^ T. AN ti Z
V U H U G H N< J f • V J
• • •7 t mm.• K
x r J O>< Ju p
SO
_ .. .• •• •• .. .. I- H W V.. . Z I •I Z V •
L N a N W • I• W ••I- •• •- ^ ^ `- T \ w J J • W Z • N
Y 7 .- T^ r f ^ .. K H> •
n•< a
> l'I T •- S O W ^.! T •- N OIX
••a •• f 2 H J J u lW rJ < f Z N W U a a l
•. T V [l •- W J O V O r Wti J
7 ••• m -/ N WO. • r[ J J
T 7 0 W •> O •<O
•- ZO r
VT V• V t a Oz Lv•.mW V u c•.
J m W OW Z O
f1 .-. H WV .-. tp
•.
W ZW
w ^< m
O
ZL^ n
O • QL O O ••v O .- OO V T ' O'2 J > O O< m 2 •+ = O
Y^ J f O THU O a V
O• • V J r O
rO V VN Yw T ^. .. ..r Y Y O .-•
^ J N J •^ V< p N pT mJ
O f a 7- m Y
O O ^ N r J r d A fl O O ^ N •n J N e A n O O r r J •n O A n O n r n; 3. J N O A n O O ^ N I^ J r D A .n O O ^ Nm O P P 0[• 0 0 POP 0 0 0 0 0 0 (^ U 0 0—.-^ N N N N N N N N N N n/^• n/ n• n .^ n 1 r n -/ J J JO U O Cr O O C^ O O O n/V N N N N N N N N N /V N N N ----------- N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N
]56
I^
-•K—
hr.
to
v o 0< o ^s 1 1
0_ c: op p O P
• 7 J O •• N N
D T u V n n J7 ^^ J
1 1 s ^b = = t
• ) 7 V 1 < < R^ D O I¢ V y p^ N 7 Z
O< U f 2 0\ 1 1J T < ♦ A u O V 2 1 n pU O V (f v O .. p. R =
O •♦ ♦♦ f c v o .. Jr h 1 s rr TV R U ti) h) n O tU p 2
• O V .. I 1 r W> T ♦ ♦ .N m N m h Y t^ T Y
U n n O¢ Ot ► ^( h^ U ^ O b t L L V F V f N J h> r 0 ti h N< 710 . x x ♦- Jr T O H r n 7¢ x h ♦- u JO L N .. .. .. .. m w m • • Z W T h J Oh R L^ Z •n W W T O x J yH h W A p W .p m L Z J 7 n J J n x W W OW G w r r n w 1C w• h = ..
n^ .. ror.n n .. ...Q V• Z Y S H Z h f t- V 2 .. . T ^. ..Z •. •• •. O R p. n ¢ n 6 n 1 t .-. 2 .- •-. Z N h J ••. L x
f ♦- n W n ♦- n W L 7 D ti V O¢ n W l7 O¢ O ► Z N m V r O W O W V J N W D T n 7 Aw V< ^ N p IL ¢ y H T N V H L N h^ W L L S Z N W L L t l r 7 0 a• J Jb b l Z I♦ 1- J I- •- J h f< u, m W J m W ^ .•^ O^ u, m W J m W p rl V u f F J JJ m ¢ w ul r W u V •-. iY m l r W Z N W f< W Gl UW : m u u T v 1.
^ W
------------------------------ N— 1V N- N N N N- N N N N • V N N N N N N N f ♦ n^
157
J N O A f C P O .- t n J N O n • 1 0 0^ N/^ r p A t O O .^ N M -t 3 B O A to O (, ^ .n J r. O A .T O O ^ N Y• J Y• O n nI J J J J J N N ./^ h Y. N O O O O V O U O A O A A A A A A A A R fu 0 0 n) O 'D •f aD .n T P O P P O P P P O
1`I
Zy^ ..
. 0.4
loe
zUH<l7<OUs
CL o
0 a<o a <o = u u0 ^s 1 1
z z0 • ^ z0 a .. .. N o
`¢ > > o T < • u 0 u p0 0 o a ^
Oo
O O ••oO
_O J> F
Y WJ> f
..r
^' O r• O O ^ W O O J r J rZ
^ O ' O o K F- 6, w H m •W 2 r 0 r 1 1 r f V2 > 0 0 O ^ < ^ K - h K ^- Y
>I- Z
H.-. S OO L
> T OO
W =O
<r
¢O
¢ ♦ O r 2W¢ O
V N 2W¢ O
JJ ♦ -
2 ti OF- L ¢ ¢ L L xx of .•. u u,ruO O O f rr+ ti W Y ti ^
N W u H t ^- H F H % A n n n A• A W O W N O VI Q N x x .. .. .. .. .. .. W F-
< V O .+ O W ^Y Z N W W Z y Vd J r v r O •+ O Q W O O W m m Z 2 Y W
¢JO N M 11 n n 11 M
W ZH^ Z<
Y< 1; Z J> r
Y J .+J> fJ r •• i••
N V W 2 •• .. .. 2 •. .. 1 .. •. n .. t .- m K H ml H < O .-• •. .. H u ^- V .V Y IIV M1 r IJ < O 3 1 O W tJ < O N O p Y¢ 1L 1L Z Y Z r• <^ J: N<^ J ••
< F 2 W Q Q¢ 2 1/I W Q¢ Q 2 < R r d ¢ O a 2 Q r 0 2 .-• O N Z • • JO O .-• W m W J m W H= W T Y L W 1:J O ti V W R O O W tJ W¢ 0 0
G K Z 2 IJ r W S W h W Q Q W N F u 1! •/f W N ^- u ZZ •• .^ ti J H •- J Y K< u. m W J m W 7 AW O •^
ZO AZ 2 IJ W m
7rW •+ W U V `• W
N ^I
W W 1m
O Or• Nn JrA1^ mP 0r• N r1 J r CH TO O ♦ Nh J V\ OH C1P O^NHJ r 0I^ a • O Or• NrJN .O I ^OO^ ryO U O O O O O O O O O r r• N N N N ^, N N N N N n r r l n ♦ r I. r M h. n J J J J J-^ J J J J. n N u 1•/^N N N N N N N I • N N N N N N N P N N N N N N h I N N N N N N I V N N N N N P, N A' N M N N N N M, N N I .. N^N N N .J N N N N N N ,J N nI N N N N N N N N N N N N N N N ry N N N N N N N N N N N N N N N N N N N N N N N N N N
158
try
.1.= 0.
OF - - -
Z 1:1
> p ¢O W ^ 't D ^ OI o u T O r 2
Y ♦ O W r > W OO> 2 u J JN f ^> U W+ O^ <<
J > L V> w 0 N N .^. ^ OC W O J J X ^< s
• p O r 2 0 < < r .< R u N II1 N ^ N ^< f v¢ YQ 1 ¢ ep .. •. Z r n p N .. ..
•• W ^u •• 11 ^ r n O N < p f V V r VM . n< .- r • N r 0< Z<< L O• t J n W r n < O J x •• 2< Z r J J V Wx J W O •-. W O •( Z '[ < ^- r N Z r .-• W p N .r Q ZJ p N Z r V r w W J r^ W Oa N Z N v 2 •- N 2 p m l 2Z N r 7 r r 2 T 0 WW LL n .W+^
YJ
rJ<
m<
2r<O
OO
OOr
NW Q r
¢ OJ VO ¢
o U2 ¢ O
r oNO J7 O ^ >
Z O Or ^ O ¢O F r
^> r u Z
O ¢m > OL o
• r-. >
f ^ > W wpW^
2 > W O r N N K O << r••• w0
O uJ JQ<< r
I.I. r Vr K<
^< W 1. n O < r v N N W OZ ^ < Q r .. .< <R V n 11 N O •. LQ W .O N/^ V¢ IU p W r n O N • 11
Q wo r o <^^ 7o N¢ N e N
.. .... r n< un< o zr ^< N R¢ r < O t V V r•n n<o ••u..J xxr oa zaarrNY f 0< 1:J •7 n r ^- U < i .-. J J X N W Y '.O< Z Y << •• ^- T (^ 7 r V r ^ W W p J Gr < Z rN i t V
J J Jfp r N. m
x 0 ^Yw G N
•. S r .•. W p N Z O •-. ID LO r r 2 mWW Z Z r .-. W r O N L Z •^ Q L r 7 O
O.-. r `+7 m W 7 Tr V r 7 ^ uv w 3m
Wr
Zf
On
NO
J h hA s+P Or' I. I .nJ r OA WO. O ^Nln J r pA ATP O ^-NrJ v^ 0A a + fl ^. NrnJ N BOA TO O.•'N1n J N •p Arn^'O !` JJ O'n 00 O'O DA A A A.^ AA I. AAD JO muf sl^mat a.0 ? P P PP P P P? P 000000060
fi IV' I N — N — I•. N - NNN - Nf• ^NNNNNNNNNN Nf^N NNNNNNN !`I :J-NNN--N--- 1h-h- InJ N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N nl IJ N N N N N N N N N N •J 'J N N N N N N N
1591
t^c
rY1 ^.
OJ o<
O •• Op .•. O
n K2 ^ J.. N Q
2 < r1 Q
^ OV 1 Z u O OH ¢ W R N
J 7 l_ 2 7 0O 1 r 0 0 J ^ O
Ov - I =
0Op N
NJ
^Q7 O
O¢
Q •^ O pN d^ O J n ♦ ••
< On O • T . •. JO r ^ LJ ^ •-1 > O ♦ O O HJ > w O< ♦ W [^ J J L x
x vwi .n i n..-. r ..> w 0 ♦- W S WW p Y J J w aO 6 J < < < 2
•n<r. <^
ti ^ ^]2 '^
Q u R .. .. O Q f. x x ti J O
n ♦ O Q W ^- f f V J¢ •• •. O O
•W ti d O N . .. f H ••. J O •+ O .•.
U¢ W f d K Q¢ 1•• x }^ J V • ZH d J 4 •• O. •• < O K V l7 ^- W Z Z V 11 r- V
^ d < J .• ^- n Il r 7< 2< K L O Z ••p K 0,V x •• 2 < Z.-• JJOw n
.1. w<K O< I H •^ S H 1.. ¢ N O • .• .. W N N Op < Zr<
—«r s Y Ny
S z s <cdS r l7 h e'f w w d 0 J .-• S d Z H u ^-
=H. •. ^-• L 2ONO^f fD ^ p 2 7 p H JJ.. jIp 2 w¢ ¢ x JJ • . vvv7
W O W V<< W 0 7 0Z N V V Z V V 2 • ♦W J com W OW ^ O
W l ••W O O2 zW u.
:
:
J
¢
4U ^dMti
O
.- z
• ^dec
K V ♦ ¢• F- W W 2t 2 a-.
Z • •+ H OO
d p
R d OO
• Od
¢ Z ¢O
1.
O O N n J v. Q I e 1 7 O.- r 1 H J 1 n a h. O? O r- N H J v.• o r• n 0 0 N H J N O W P O . N n J r d A m 0 O r• r+ r'O r• ^ N• V N N N N N N N N H H H H H H H H H H _. .. J J J J J J J J 1I. N 0 0 0 On n H M n n H H H H H H H n n HHnn H r . H H H n H H H H M n n n M H H n Y V l n H H H H n H . n n HN N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N fJ N N N N N N N N N N N r. N N N N N r y N N N
150
z
C.,.
^^ NY Yn 2 Z7 7
• ^- ZJ 1 1 O
UZ S 2 N
^ O O O N
L L r,Z
0 0 0 O N Z Z Z 2 ¢ n0 0 ^ O < < < ^ W^ ^ Y ¢ d S Y L•• •
¢ nO 7
n r^
YZ
Z^
W^ F F
Z u O ^^ V T T ¢ ►• ] T ^ n i
W W I W 2 Z Z < < N F 1 >I L .-. L Z p ¢ v 1 Y ^ n n
J ^ J Y Z > >^- n Y n • Z •• O O O v v 2 Jzz z a^W w ^
¢ v,L
In .nT
¢Y •. < t ^-p p p O J J J N J • L^
7 7 u > > O ^ m a v lu u < O^- N N < < N
' N u Y •. Y JZ 2 N N Q V W 2^ S •. fJ J J L YW Y w J Vf 7 J^
J ¢ J < 2^ Z v^ a !t h O.w> ¢ J n 7 7 n /- i• n x>> .. ^ 7 7 7 7 O < O O J ¢ U
V N N V n n )t ^ k. 'if
< a • ON T. O O O:J^ O^ O^ O^ O O O U O O ^ O O t 7 0 0 0p ¢ .+ L O N N N^ N N N V^ N n N • • N V l N ^ N ^ N •• N
v • •N 11 ^ •• Y Y ¢ L W > > > >•• O .J ^J ^J .J ^J ^a ♦ n ♦ J .n .n
2 W W n nnnn J S n <n < n<n n<n<2 .-nr< n Z ^^ nnn l unu '- un >>> ^V 77777<
01000.xM - 3. inn 7J 7J .0 7<J1- a , u 7u 7V7t7t 7<7a
O<O C^ W O ^ O N (' i nn 1• . n x x x x x o n x 0 x 7 x J x .-. x n n x Y x Y x n x N x T x x¢ x¢n 7 7 J 7 7 7 W 7 W < 7 0 7 0.. ........ 7¢ 7¢ 7 J¢ 7¢ 7' O W 7 u 7 u
Z < < •( •• t 4 < « N N < N f N < V < n < .- < N < n « < n < d t d «7 Z^Nn
R R¢<n .-.
v v- v v Y). 2 2 2 Z Z
v vZ Z
v v r v YL 2 L Z Z
vZ
v2
z2 Z
v v r r v v2 Z T 2 Z 2
.- V w w p LL• R J J J J J J J J J J J J J J 7 J J J J J JW ^ 4 a Z ^+ ¢ W W ¢ 2 ^Y w W ¢ Z u W¢ l W
rm wJd O n n n nn nr.n n n n.-. n n n np p ¢ p p W p Z p ¢ p p p Z p r w p p p ¢ p ¢J 3 3 1 .1 w m 3 3 W J J l 3 r. 9 J l w 3 .-• m 3 l 3 l l 3 W
J V7 m 0 O^ f n J^ Vl A T P O^ N II J 1n h A ai P O^ N M J V. •A A m P O ^ N h J 1n O n m P O^ .n J v •ff A TO O 0 0 o O n n n n n n n :- A A p1 0A aD 'O R1 T A 71 m up P? .f. T P O P T P P O O O O f J O O O O O ^ ^-^ fn h In - - H M - h -- - - N M1 N H h Nl M h J J J J J J J J J J J J! J J J J J JN N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N . V N N ^J N N N N N N N N N
161
f,
I
it
^ r N NY Y Y Y .. J Y YZ Z Z Z Z Z
^ a ¢ a ar r r r • ^
¢r
¢rWII I I I r N z z N
1 > Yr z zI o W o _m
`.i M o 0
r r O r N N N
I. O O ^- O r NZrW
i rI A L L r. r r L L t
t Z 2 ••• Z •+ T O • N Q z Z Z N 7> f •. L ^. < . L < . L < J < < <¢.-. N NN Z •• Oa Y u L L 7Z N
r rW 2 w w z w < .+ J O ¢ r I- r < < 7rn < W r< r ♦ O ¢ a
W rr a wmrmwmr m Wc^ rY r >- 2• r i i r i L vt r Q W z Z ZJ^ <¢
rp i W m. - m- Wr r mY L Z7O 7 J
O VIr .n J .•• J. >• ♦ J m O ^. 7 Wv<. O• m N O N m N O N m N ¢ N N N p NJ Y H V Q N
r ^ 4^3 ^ ^ R ^
•<^J ♦ J L L L
< N Vr r. 2 2 2 r
oaiaoo<af Nr..
< •-•r r O
Jr 7
J>
J>
Q2 . O
o- oa <o C .. or o r.••m^
V r'J DO v000 u •J 00~
^ Z 0 1 N < <- A - . ♦ . ♦ . ♦ O 2 7 N N J^ J •".W O Q W W
UO.-O O
O . OO • O
• O • O O OO • O • O • O O W
♦ nO S •
¢R u
J •• ti •• < ••J^ .^ rv+NmNO NTNONTNRI NO N V 7 7 r 71n D- ON <r Of O
. S - - I/I - I/• - - - • • O J J J J J r O♦ r . r r ♦ ti ♦ r ♦ r ♦ r ♦ r •< ♦ J ♦ J J J ♦ J ♦ rr V f7< 7 • f
f7
rN -) M m.
•-• r .+ 7 m 7 m S m mD x7 r
r r 07 7 J --
O O f 7 O <r.-O< O< O f 0< O f Z.- J J uO W 0r O Y O ^ O ^ O ^ O ^ O N O N O •^ O CI LL •• •• ^ O 2 ^ J••<_•f t K¢ K 2 r Y< Y< x >< < K r •.( . . . W r .• A .• O • J . -7•-• 7 w 7 J 7 2 7r J 2 7r 72 7r >•.• 770 ^ O O O~
< r < p < ¢ < O < < < O < < < O < < < m < M1 v N N J f . - r N^ v0u
v V vOv .•.pU
Y YZ Z Z g Z 2 Z Z z z 2 z z Z Z z z z T z Z z z zJ JZ W J
tir J JO Z w J J J J2 w W ^
J J J^ '-
J J J J J 7W W W Q J7 J J J J J 7R. z •-. r ^ r r r r .- '- f- ^ f- r rW V •-• O •-• V ..• O W V w O .-. U• •+ O •.•
W¢ r¢ ur v Q 2 1/I w a ¢ a 2¢ Q C ¢¢¢¢¢ Q Z R a rt OJ m J • Yr l •-• m l l W J m 1 > I ^ W) ^^ 3 3 J 1 J1 •-• W J 1 W> > 2 i .-•
J O ^ n • n J r a A RIP C I• N• n J 3• a A R I P O.- N r n J I n a A T P O•- r J h a A m P O.- N r n J^/` a A^ P O r rNNNNNNNN r rr•nrnr r•I -f f J J f J J J J JI/• /^^ A .^+a a a o a it a a 0 0AA AJ J J J -J J J J J J J J J J J J J J J •f J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J JN N N N N N N N N 'J N N N N N N N N N N N N N N N ry ry N N N N N N N N N N N N N N N N N N N N N N N N N N nl N
162 I
I,
F
OF PGCiR:+. •^^ 1 r'
11
NN 2
r r N N ^Z O Y t Y WO
zZ 22 L ^•7 7 J 7 Y¢ ¢ ¢ m
ILiT N -
2z t< ¢ W G1 N
Y L ^ L ^ ti ••• C •••• ^- . WY 2 W f N O N I-• N O N F •^ •OJ Q W W > > L ^' ^ L •-ati 1
T L ^ H •-•} .. > •• 2^ •-•< Y f Y
N Y H Y N Y •- >Z .0 •-• m Z Ill u m
L N O W< n
1 Y W a Q1NT < T i i <r!. T 2^ OZ 7 f r Z. ti- Z. m
Q r aJx aJx Zx W 2x ^^ N ♦ N •Qr N t •[ J Y N J N N H N W N f N ¢ u
J U N ^ N Z Q. 2 - Y -• H ^ W!
NQL
^ N • f A Y n Y n J •'• f A J ,
f•J o Y O
m• m •o F O O r O
► rm
V FO •-
a .. AA
2 Z < < n O C) G I O J O Y O J C^ Y O TT ^• Y J •• J •• 7 J¢ ♦ O f m ♦ O^ m ♦ J o J W
z •• z •• < o Q •o ¢ o 0 0 < o o W t W Q W W Wo
< o . QJ o 7 0 .-rL ^ rt ^ o ^
.- o z o n1o< o o <
ti •• 7 r O O•<m
2 • r • 2 • ^-o m< m o m< .o
ow O 7<^ N r •• x •• x •• x •• ^ •. x u m n ^ o •- ud •• W 2 D
J > > ZJ
O•-Of^• f
O AOtiU V O u0 VC Vf
O u0u1- \ N
O^Or♦ N ♦ N
O fOHO ^O^- O\O
Of^ ^ '
r•^ ^ ^.. N • N .. f . H Y T m Jt Q• Q) QI r .. J
Q D: ¢ W Y) 7 t H H < fi
z 2 z 2 Z 7 2 Z Z 2z o
2 2 u 2 oo z z o z <
S u Z o Z u Z O.. mz 2 Z vJ J J J J J J J J J J J f J J J J J J J J J
Z W W w •mil W Z ^Y W O Z W Z W^~+
H f H H f f '•o• .~+
^- Z r H ••• H F 1- ♦ H r hoo• n W u .+
w v Q a Q Q a Q Q 2 N W Q a 2 a Q Z N W Q Q Q Z Q a s 2m 3 1 3 1 J l J J 1 W J m J 3 w 7 •-• m 3 J ^u J ID ^ 3 1 J w J 3 J W
J U l• O A O 1 P O N r • - f V`• O A O O.- N n J V` .O A m P O -- N n J N O A ?) P O N n J Y` • O A m P O N n J Y`• O A a)A A A AA A ^)mmm ^ m mmmmP O O P P O A O P P OO 00; C) 00 ••• r• NNNNNNNNNJ J J J J J J JJ J J J J J J J J J J J •. J J J J J N N - N V1 .. V• -- N N V` - vl N hN N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N
163
• <
t
N
e-
>
H
<
Q
W
Ud
Q
W J
•-• WQ
Y
^ J
w t
<>
H
F V - J¢ 2 ti ..O-
O J • .H
.. ..rf ♦ ♦ Z.. (L r O 7
N O . •• ^ OW .
Z ♦ V ♦ W ..7 < N > >
• L r
w. •> H V V Z••• n Q ♦> 2 J ♦ 7^- 2 JP <O •^ •• JO
W ♦ N Z> . h w O
uN t .
> ^ Z rW d Z . < J Z•
J Z 2J r N h w P f 7 R J 7 7
fH> a- D m e-r H e-f ti1-H H H7 7 7 7 7 7 7 7 0 7 7 7 7 7 7 7 7oovon000pv000^^op
x x x x x x x x x x x x x xJ 7 7 7 7 7 7 7 7 7 7 J 7 7 7 7 7
Z 2 2= Z Z Z V V .. _ .. v v 2 2
W w w J J w w J W JW F W F W F V F2 > e- e- e- e- e- fV Q Q Q Q¢¢¢¢¢¢¢ Q Q¢ Q a¢W J J J 7 J J J » > J 3 J mm Jm
JM
w O
^ H^ u
< Q2 ^
J
N >J u2 w ti
W O •+S ! L <> ♦ JIn
O O 7
o m.A ..V ♦ V\ e-
Y J^ 7• W W
O e- Y a N
Q .+ Qv o
OO .•. u J J ♦
O ^ n J a ^O N •• O A P
O O Z \ ^O O <
Q w ••• < J A v¢ 7u OJ •• O J.•.
U w • W •• . -J On
< .u.. o o AnD >`
i / W F H f H H •-< W 7 O O Z 7 7 7 7 7 JV•OC2 Ten •> 000000O u w u O<• x x x x x
i r+ 2 0¢ J •• 7 7 7 J 7 77 J u F W • W <<<<<<= H p > v
O¢ 2 r• d N< v v 2 Z LO H W w < Y v^ J
w w WF e• d n ^ < W W u^ W W^ d 0 .• Z J T O H I- F- •-• H H
r• ^ L r.• p> Y S V O V. Q Q Q Q Q ¢ D
n •• < O e• w i ti J 7 J J J J W•• i Q en m
> V.•.n Q rQ O 7 u2-
•
•
••
• V•
• o
• Z
1U
O
w •
wVm
PO r•NrJ V•ar. mPOr• NnJhaA nOO^Nr JV` aA aIO O^NnJ r` aA ^P O^NrJNar mO LIrNMr ^ n n r r M M n n n h •I J J J J J J J J J N N N r• 3. 3, r• a a a a 0 V) a a n a n n A I^ A h A r. A A .h Qf of mV• N •/^ N V• •!• N V• N V\ N V\ h N V V• N N V• N V\ N V\ V• N r h V• V\ N h V• V\ V• hN N N N N N N N N N N N N N N N --:2 N N .V N N N N N N N N N N N N N N N N N N N N N N N N N N N N N rV N N N N
164
II
TP, I
a% Am
OF. POU't
0p0O
a z
f,o a o 0
27O
<L NO O . O N C
x 0 0 0 >>>> ^>> OfJ w(J^O
T .- ^ 2 [lu t < «
J J J J J J J JO II O V I W W W W W Wz .• a >f; L, 2 pppp pogoO •+ L O ^- N Nu H p S 2 2 0 r. O X F w O x >
J L fi W O O O K Z w O K L •'• W
¢ Y ^ L 7 Z 7 n 1- •..< ¢ C1
uF Z O Z .+ p W > w . 11 11 tl M • tl tl 11 = r
O W O r O H Q p W N O w l J < .. .. r. .. J .. .. .. .. ><
n O> •• K w Z a < L I r u Z ti a > ti D uJ L ¢ O T w H ti> O O N n tl w 2 II •• J Y> J tl J>> J > WO W H L f• ••• ¢ T¢ V tl tl •• ••W ti^ W<< u w t< ¢ tiU ••+ L •-. u F• W
^•.. p n 2 0 J J 0 t p J J 0 W RW F- ti L F! H v f V• II ^ f ^ R J J W W p 1• J ^ W O
Y O v ^- f nT W 2 ~ •+ < f
v Y w Y O Y 2^ O f 0 p W 2 J 0 f 0 A W w p T¢ W H < Y Y f Q N R <¢ •+ ¢. Q I- •••• O X ¢¢ H r••. O x ¢<O J .- W 1 2 W 11 n 11 C Y O H¢ f W> J 1•• > IJ << O¢ Z H O 'f << U¢ Z •+ O ^]^f <
TH
p p ¢ • •• .. f y< 2H¢ 2 K •
F N>J
W 2 W I. O F R W r =♦ O- W m W
W U v H R W u. TID W
H S WO •-• 41
2 T Su u r r H ..
D u ~ m Z l ~Jw Wl
J N • A N P O; N- J N 0 I+ m P O N h J —0, f P O N /1 J r •O T P O N M J N V A T O O •- 3• J •/. n n TTT W f) ••f OJ? P O T P P P P PP O UOOOOOOOO^ •-^ .^NNN NN NNN•nrr nyr N yr d r d O •O O •O d d O •O d d <] O d •4 O •O •O d d <I d O^ •O O d d •n d •O .O d r d v` hN N N N N N N^ N N N N N N N N N N N N N N N N N N N N N n/ N N N N N f^ N N N N N N N N N N I • N N N N N N N N
167
1
I
)
JOOWx
L
• O21O 2 ) Z JQ W < W L )S J Su f W ti
p J• n n
i x < d ) Q_ W ^% • W v
W p )a v
^Q r< Q )
L a J Q J O <w p W J
Q QO O
♦ n pO ♦ J
wO
N) w
I< Hx O•••
Lx )
J r< OWK< W W W J ^•• Q
Q JO W J J J J J
O Wn ♦ O U ^
O ^Y W W W W W n •••J J x 2 W 2L t •+
r l x l L 2
W O r 0 7
OO F
N J O AW W
K .^ Q .+ OQ
N N y ♦ y O <♦L T
< < < < Z2 11 2 1
7 u<
2 w O •. 1 ••Q l 2 Z 2 2 2 2 2 Q O ••O p O O O O O O < X Q x 2
QN < ••. f - H
y ^• < ^-V 1-
l KO ^-
L u 11 x x Q 2 ^-O O O O O V W A w f W xQ 2 A< i 2 2 2 2 2 Z 2 V Z WC r n J• 7
2 0 2 0 T O T 0 2 0 2 UW V W V W
K •.. ZV
x p 2 r S r 2 ^ 2 v 2 ••• 2 r fL m^
~ ~'ll ^ w ^- W H W 1•• W K X X •••.
F C H f •- ti H ) W ^- aX ^ 2 '• < N< N< J < v< o < 2 Z r ir z• ri 0! cs oL nr oL o z•+ .+ X..v n s d a n av W> r - W> u. 7 W 7 W J V ^ O 2 Qr
7 N ¢] w
K Nr
OmN
x <L <
O
) NJ MJ< mNA ti
2N •. uW Vvn>i
♦Q tiO u N< HN r
<W
F ♦ <W O< L >
Z ^ TO < F•W •+ ^1 Q m >r
O . 2 ^ Z 1- Q ^- OT p y o. 7 r • 7 ^O J O J o Z •• o n a 0Q Q Q Q
2 << << Q W y.. LN 7
ti 7J u
W ^- V V V V Y > N F N U< • 1 A N ^. F- - TO Y 2 •• •• Z •• •• w K J J
O D < H ti >W ^- H Z N w I- H 7 J • ^-
O u. m W J N Q V Q KJ Z '• W H O • p< TW W Z
7
(t) .I
iI,
J
00-•v- J V, .&O^NMJ=a .f O^N'n J ln aI 11 00 .: N nJ N aA ffO O^NY•J in OASt pO^N rM J J J J J! J J J J vl N r0 N N V• r N N a a O a a a 0 0 a a A A A A A A A A A A iD •O ^O 'a •O aD T •n •» 0 0 0 0a a a +! W a a a a a a a a a a a o o a a o <l a a a a a a a a a a U a a a a a a a a a a a a a a a C a a a aN N N N N N N N N N N N N N N N N N N N N N N N N fIN N N ry N N N N N N N N N N N N nl N N N N - -N N N N N N N N
166
a
h
_t
ir
,I
I
M M M ••. h I^ O Mp n p J n•• n
• ^ D N O O U ^ UW
Z 2 c^v.a as OO O •- J J O•-O
F OC+O ^^ NQO H
dNp N
A A A A A Uw iC) O O O U
n o z0
.co z 000000o Q • •-• m oR R V
w p 2< J f O J O N N ON
yN •-•L J< O lv aa0
Q N N W Q< t O ^ J J U CJO O J W 'hO vI Q OUO ^7 ^ NQR
OO
0O
J 2 2 N w• O A A A A OOOO OO C,
• W u UOOOOOy..
= O V h J A Y Nt Z z o a• a ••DroveQ r` J a <OJ
LQO^u •a o NO N N J < D I C O O Y• M v •"^ O AQ ^Y Z •ti OONA aIn J N6 J i O M ^• A I• J N
O L O a A A .- a 0Z
•.O< n ^I II •
O O C) 0 0 a Y 1Q 0 0 0 0 0 0 0V 0000000
= W I D O•. Q
W O n O N J J a J OJ D 2 001nA a^•rpt
W= H
ON
U U •' ^ ^ A A JO O •^ A A ^ a
G O I C < R ♦ x 2 00 N J N A OW J Q J 0 0 0 0 0 0 0
^
z O V 2 V z p O wC) O CJ O O M N L m
Q < Q Q G Q Q Q
< NQ n p ^
^J 2 Z ^- J J
J O^ O• p l^ W p Q p A A A A N
a H T DOgo
I I I I O NN U
0p ID O I„ M •
U O O N u n • II•- '7 O
E
1' •
167
IN
APPENDIX IISummary of ISO-O SI Model of Distributed Network=_
Layer
Definition
1. Physical Concerned with tran=_.mis=_.ion ofunstructured bit stream o k . , er physicallink; involves such ;.arameters assignal voltage swing and bit duration;deals with the mechanical, electrical,and procedureal characteristics toestablish, maintain, and deactivate thephysical link. (RS-232-C, RS-449, X.29)
2. Data Link Converts an unreliable transmissionchannel into a reliable one; sendsblocks of data (frame--.) w ; th checksum;uses error• detection and frameaknowledgement (HDLG, SOLO, BiSync)
3. Network Transmits packets of data through anetwork; packets may be independent(datagram) or tra ,)erse a preestablishednetwork connection (virtual circuit);responsible for routing and congestioncontrol. (X.25, layer 3)
4. Transport Provides reliable, transparent transfero+ data between end point=_.; providesend-to-end error recover y and flowcontrol
5. Session Provides means of establishing,manaoing, and terminating connection(session) between two processes; mayprovide checkpoint and restart service,quaran t i ne ser y i c?
6. Presentation Pe , +orms generally use+ul transform-ations on data to provide a standard-ized application interface and toprovide common communications services;i.e., encr yption, text compression,reformatting
7. Application P rovides services. to the users of GSIenvironment; i.e.. t ransaction ser,)er,file tra rl_.fer protocol, ne tl;jorkmanagement
T h i s. =_urrimary taken from, Local Networks, AnIntroduction, b y 1.0i l l i am Sta.l l ings (STr LL84] .
168
t
V..
U APPENDIX IIISimulation Software Module Descriptions
1. Simi.
Simi is the top level procedure of the simulation
program. It controls simulation activity and flow in
the simulation environment. Referring to Figure 4.2,
the first *hree blocks perform v ariable initialization,
define the simulation network configuration, and prints
a description of the network in the auxiliary file
Auxout. The loop indicated is the actual simulation
activit y (described in subsequent sections). Simi ,.► ill
print compiled overall network statistics to the system
default output device and to the auxiliar yfile Auxout,
b y invoking Printstats. The procedure Activitysummary
prints a breakdown of the network statistics b ydevice,i
to the auxiliary file (Auxout).
2. Initialize
Thi=_ procedure is used to initialize certain
global variables which need to be spec if i ed for each
executi o') of the program. Table III.1, is a. listing of
the interactive queries posed by thi s_ procedure, along
with an yconstraints in-^olved. The remainino variables
which do not re-auire user-intervention are also
initialized in this section.
169
t1
4
r
Table III.1 Interactive Queries Posed by INITIALIZE
Quern: Is there more than one Trunk ? Y:es or N)oResponse:
Y or N, if answered yes then theflag Trunks is set true, otherwise,Trunks is Set false.
Example: YVariable: Trunks = True
Query: Identification heading for run:Response: Valid re sp on ses. a.re alphanumeric string
with length less than 50 characters.Heading appears on each output page.
Example: Simulation Configuration TestVariabl y : Heading
Query: Maximum run time in secondsResponse: Valid re =.p onse=_. are real positive numbers
which represent the time a simulation runwill execute
Example: 40Variable: Max time
Quer y : Maximum Successful Sequence Transmissions ?Response: Valid responses are rea l pu_iti-^e numbers
i,Aih i (:h represent the number of sur_cr-ssf1.0message-with-data sequences will be
F transferred over the enure networksimulation ends l.kihen Maxseqtx or Maxtimeis exceeded
Example: 1 ii0oii0Variable: Max=,egtx
r
Query: Seed for Random Number GeneratorResponse: Integer number. For best results, the
number specified should be an odd,positive number with :.t least 5 digitsand not divisible by 5 or 7.
Ex am p le: 16227Variable: U
The following queries will be posed if Trunks is True.
i^Query: Was the last Run a Single Trunk
Configure.tion Y)es or N)oResponse: Y or N, if answered yes, Inputmode =
interacti -je, thus forcing redefinition ofthe network. If answered no then the
` tolIov.iirig query, will be posed.` Example: Y
170
t
^- ^j
i`V'
Variable: Inputmode
Query: Input Mode: I)nteractive or F)ile ?
Response: This query will be posed only ifthe 1 as t run k,,ias a dual trunkconfiguration, this is indicated byanswering no to the above queryIf answered F, the network configurationused will be read out of the Dfile. Ifanswered I, then the network will havebe redefined t: y the user
Example: FVariable Inputmode
The following queries will be posed if Trunk=. = False
Quer y : Was the last run a Dual Trunk configurationY)es o,- N)o
Response: As before, yes will 'orce redefinitionof the network and no vji 1 1 cause thenext quer y to be posed.
Example: Nt)a.r i abl n : Inputmode
Quer y : Input Mode: I)nteractive or F)ile ?Response: A before, answering no to the above
quer y will allow this quer y to be posed.The effect of this quer y is the same asabove
Ex amp I IVariable: Inputmode
171 1
,01111111
3. CharacterizeNetwork
Procedure ._haracterizeNetwork eata.bl rshe: the
experimental framework of the simirlation. The
individual adapters, devices, and sources are defined.
There are titlo +ays tc establ i sh an exuer imental mcode r ,
interactively, or trom an auxi 1 iary fi le (N i ) E). The
method employed is de!ermined b ythe t.al,,? %)f
Inputmc1jr, defined b yprocedure Initialize. if
Inputmode is equal to interactive, then the System
description will he Nrovided b y the user interactively.
A sub-procedure P,ewriteDfile w i I i be called to store
this interactive system description in the Dfile. If
Inputmode equals +ile, then the system description used
is the one stored in the auxiliary file (Dfile),
implying at prev i ous run where Dfile was created
interactively. A detai led I istinq of the ir,ter:active
queries posed 'b y Char ac ter izeNetwork is presented in
Table III.2.
4. PrintnetCescription
The p- ,tee o-i th i s procec;ure i s to pr i n It a
detailed descr,,-itior, of the system being modeled in the
auxiliary file Auxout.
5. FiadNext(Tmitter)
As prev iou=_.ly stated this model is a discrete
event simulation. The event which drives the simulation
is an Zdapter's next scheduled transmit time. The
1'2
tM
AT-
►.. ,:,rte ^ , x
Table II1.2 Queries Posed by CHARACTI-RIZENETWORK
Query: Length of Trunks in feet (used for enddelay)Trunk 1:Trunk 2: ( appears for dual trunk )
Response: Fl o s,iti real numberVa g r a.bl e : Trunk 1 ength [ 1 ]
Query: Number of Adapters in Network:Response: Integer number in range 1 to Maxrnumad.antensVar i abl e : Numotada.p ters
I n the Dual Trunk catse the followino query will be made
Query: Which Adapter is Common to both Trunks ? •Response Integer n,imber in range 1 to MaxnumadapterVariable: Comm--d
Query: Adapter #i: Distance in ft. from priority 1adapter otr Trunk 1
Response: Positive real numbersVariable: Ada p ter[ i l .distfromF;l
Query: Adapter Priority: Give .n integerform,i.e., n = 1,2,....
Response: Pos i t i v p i nteger numbersVariable: Adapterp[il.Pl F
Query: Adapter Retry Count: This must be a uniquenumber for each adapter, in the range 0-64 4
Response: Positive integer numbersVariable: A.daD`erp(il.retryct
The following two queries are made for the commonadapter two both trunks
Query: Distance ire ft. from priority 1 adapter onTrunk 2
Response: Posi t i ,:ie real numbers')ariahle: Adapter[Commadl.DisttrtAl
Query: Adapter Priority: Give in integerform,i.e., n = 1,2,.....
Response: Positive real numbersVariable: Adapter[Commadl.P2
Query: Adapter[il.Device[jl desc.lptionDevice status (Open or Closed)
ReeEponse: 0 c C. C if Ada ,,i ter, [iI Device[jIhas an active, network ae ,:) ice con-
171
1
Wi
J w. 1I'
nected to it. 0 otherwise.Variable: Adapter[il.DeviceCj].Open
Query: Device ID (<= 24 Char)Response: Alphanumeric =trinqVariable: Adapter[i].Device(il .Id
Query: Device to Adapter I/O rate (Bytes/sec)Response: Positive real number representinq the speed
of the de k.) i ce I/O port.k ariable: Adapter[i].DeviceCjl.tferra.to
Quer y : Number of Uata Sources in Device(j]:Response: Integer number representin gi the number o+
data sources supplying the device with dataVariable: Adapter( i]. Devi -_e[ .jl Numo+sources
Quer y : Data Source(k) ID:Response: Al ph anuineri string with length 214
haractersVariable: Adapter[i].De-,ice[j].Source[k].Id
Query: SourceCk] Data gen rate (Bytes/sec)Response: Real number, representing the rate at
which data arrives at device.Variable: Hdap ter Ci7. De l) iceC.jI Source( VI.Genrate
Query: Buffer size in bytesResponse: Integer number, size of buffer filled in
device before network transmission isrequested.
Variable: Adapter[il.Device[j].,:_,^_.-_i^[k.].E;uf+ersize
Query: Receiver Id code ? (0 to end list)Response-3 digit inte ger number, representing
Adapter#,Device#,and Source#Variable: Adapter[ iI Device( j].SourceCk:].Id
Query: Probability ?Respon=_.e: Positive real number to < number 1
representing the reIative probabilitythat the Rbo ,.,e rece i ver lyji 1 1 be tran
k mitted to b y thisadap ter Ii].deviceIj].sojrceCkI
Variable: Adap ter IiI Device[iI Source IkI Prob
I {
II
174
1
4
Il
procedure FinoNext scans all ad ,+pters. and picks the one
with the smallest next time to t r ansmit, compared to
(Currenttime) =_. emulation time. After selecting one
adapter, it will then determine if thi s_ adapter is
reserved for a. reception of a messa ge sequence from
another adapter. If the adapter is reserved, then it is
forced to wait, if not reserved then it is returned to
the main program as the current transmitter.
6. PickA(Tmitter;
Th i s procedure i s used to p i ck a ^ece i ver for a
transmitting adapter. The current transmitter's
at,^ibutes are passed to thi s_. procedure, and an
aop^opriate receiver is selected based on its list of
possible receivers and the relative probability of the
adapter being a receiver for the transmitter, . This
procedure also determines whether a transmitter is
attempting to transmit to a different trunk. If
:kt tempt enq .a dual trunk communication, the trans_.mitter
is assigned an intermediate receiver which is common to
both trunks.
7. ACollision
The purpose of the boolean function Ai=olli s_.ion, i
to determine whether or not the current transmitter has
unre s_.tricted use of the simulated transmi s_.sic-i medium.
If another device attempts to transmit djring a time
period of equal to, or,less than , twice the
175
1
I - — .
119,
bi
W.
propagation time between the two, a collision condition
will be declared. Thus. ACollision scans the network
devices comparing their next transmit time to the
current transmitter's next transmit time and determines
whether or not a collision has occurred. In dual trunk
simulations the function ACollision will scan vhich
ever trunk is being used by the current transmitter. If
a collision is declared, then collision statistics are
updated, and both the current transmitter s and
colliding adapter's next transmission times are
updated.
8. Uniform
The Uniform procedure functions as a Random Humber
Generator. It genera r e- oseudo —random numbers in the
range u < number < 1. This procedure is used in various
sections of the simulation in order to inject some
randomness in the selection of receivers and in )ar>inQ
some time parameters.
9. Update
Update is the procedure in +,v)h i ch the bulk of the
iYPERchannel protocol is modeled. As pre ,.^iously stated,
the simulation is. driver, by a. discrete e k.-ent. This type
of simulation is often referred to as activity
scanning, or event scanning. The event which drives the
simulation is a transmit request b' e an adapter. Each
device is assumed to possess certain attribute=_.
176
t
t;^i
bl
31
determined from obserna*ion=_ of the real system. As an
example of this. if a device receives data from aniii
off-net source to transmit over the network at an
average rate of 15 Kilob y tes per second, and stores
• this data in a r:byte buffer, i t wi 11 request a
network transmission every 0.1365 seconds. This then
serve=_. to generate transmission requests for the
simulation and in turn, bec=omes the event which drives
ithe simulation clock.
This procedure consists of seven cases, each of
which updates the current transmitter according to
where it is in a mess-ge-with-data sequence
transmission. The time periods involved are illustrated
in Figure 4.1, where the individual cases are indicated
and the program flags that signal the case an adapter
will go to on a transmit request.
iCaael: The first time an adapter signals a request
to transmit there wi 1 1 be no message f l a.gs ac t i ve ,
indicating the beginning of a message sequence. Case
air i 1 1 be invoked and the adapter wi 1 1 reserve i tse 1 f,
initialize dela yto 1 usec and retry to zero
(reservation scheme), set M1 true, and adjust its next
t me to transmit by 64 uses.
Case2: This case incorporates the adapter
reservation scheme (Figure 2.9). An adapter entering
(Case2, Lase3, Cas.e4, Cases, Case6, or Case') is first
177
4
. 6J,)
checked to see if i t is involved in a col 1 i si on wi th
I other devices. If no collision is detected the adapter
is checked for dual trunk communication, if it is, then
an intermediate destination is determined. If not, then
the adapter's intended receiver is checked to see if it
i s reserved by another adapter. If the intended
receiver is not re ser-.:, ed, then the receiving Adapter-
,,,j i 11 be set reser ,:)ed. Appropriate adjustments to the
various Iran=_m i s__ i on times, bit counts, message flags,
and trunk parameters are made. If, however, the
}
intended receiver is al ready res.ervr-d, the tr ansmi t t i ng
adapter o.i' iII enter the retry-delay re=ervation schemet
and -ts message flag will not be changed. Thus, the
ada p ter will -1-urn t,_, Case!. °each time selected until
it reserves a receiver, or ;kborts it s tran=_•mission. If
a. col 1 i s i on is detected when ._ n ter i ng 'Case2, Case 3,
Ca_•e4, Cas-e5, Case 6, or Ca=_.e7) then , appropr i ate
adjustments to adapter and trunk ,iming is made.
Case?: Th i s case deal s u.)i th the message proper.
portior of the message sequence. If no collision i•s
detected, adjustments are made to the adapter And trunk
parameters.
Ca-e4: This case is essentially the same as Cas.e3,
with the exception o+ the values used to update adapter
. and trunk parameters.
lib
W—
IM
.1
Cases: In Case5 a determination of how man y data
c-equences need to be transmitted is made, this based on
the size of the data buffer of the transmitting source.
The first sequence will be updated and if more than one
equence i to be sent then message flag l •14 will not be
chanced. App; .^,,r i ate t i m i n adjustment =_ anti made i r.
this section also.
Case6: When all data sequences have been sent,
Case6 i s invoked. Appropriate timing adjustments are
made in this section.
Case7: There are three pos=_ibiIities encounte^ed
in this section: same trunk communication, adapter to
common trunk adapter communication, and c=ommon trunk
adapter to adapter communication. T h ? last t';Jo in
cimbination c.mpri_.e a dual trunk communication. In all
cases this is the termination of a message sequence.
Both, the receiver and tran=_.mitter are released, and
appropriate timing adjustments are made.
10 Printstats
Thi s pro ce dure compi les and writes. to `he system
deta.uIt output device, and auxiliary file (Auxo 1jt), an
overall summary of network activity. Examples of this
fE fol 1 ow:
179 \
Sinqle Trunk Simulation Results
*** End of Run 1`le twork Statistics ***
Current Time : nn.nnnn secs
Successful Sequence Transmissions :nnnnn
Collisions (Frames) :nnnnnMaiis (Frames) :n.nE+nn
Total Attempts (Sequences) :nnnnnTotal Aborts :nnnnn
Total Trunk Act; ,je Time :nn.nnnn secs
Total Active Time :nn.nnn f.
Control Bytes Transmitted :n.nnnnnE+nn Mbytes
Data Bytes Transmitted :n.nnnnnE+nn MbytesTotal Bytes Transmitted :n.nnnnnE+nn t1bytes_
Total Offered Load :n.nnnnnE+nn Mbytes
M
Dual Trunk Simulation Results
*** End of Run Network Statistic=#*Current Time : nn.nnnn secs
Successful Sequence Transmissions
Successful Sequence Transmissions—Trunk. 1SuccessfuI Sequence T ranSmis- icns—Trunk 2Collisions (Fr.•.mes)Waits (I+ Frames)Total Attempts (Sequences)Total Abort=_.Attempted Trunk —Trunk TransmissionsSuccessful Trunk—Trunk Trans.mis=_ion=
Trunk 1 Active TimeTrunk 2 Active TimeTotal Trunk Active Time
Trunk I Ac t i ,)e TimeTrunk 2 Active TimeTotal Trunk Active Time
:nnnnn:nnnnnr nnnn:nnnnn:n.nE+nri:nnnnn:nnnnn:nnnnnnr,n ',n:n.nnnn secs:n.nnnn secs:n.nnnn secs:nnnnnn is:nn.nnn:nn.nnn %
Control B y tes Transmitted Trunk 1 :n.nn Mb y te=-
Data Bytes Transmitted Trunk I :n.nn Mbytea
Control Bytes Transmitted Trunk. 2 :n.nn MbytesData Byte= Transmitted Trunk 2 :n.nn Mbytes_
Total Bytes Transmitted :n .nn M bytes
Total Offered Load :n.rn Mbytes
180
I1. Activity Sumnary
Th i s procedure prints. de to i led t)reakdown by
device, of network activities. This summary is printed
to the system de+ai.jl t output de l.) i ce, and the aux i 1 i ary
file (Auxcut). The categories detailed are as follows:
Time Active: Time device spent trans-mitting and receiving.
Time Waiting: Time de l) ice spent waitingto transmit due to itsadapter t,eing reserved.
Time inCollision=_.: Time involved in collisions
b y de l i ce .
Average MessageDelay: This is the average time
length of a messagesequence sent by thisdevice. If this number is0, either the de k);ce can`ttransmit, or it tried tobut never sent an entiremessage sequence. In thelatter ca=_.e, mes =_.aq_e delaywould have to be > thansimulated run time.
Abort count: Number of aborted tran=_.mis-_.ion attempts (reservationscheme).
Transmissionfount: Plumber of succe s sful 1
transmitted sequences
Reception Count: Number of successfullyreceived sequences
Wait Count: Number of times. devicehad to wait to transmit
OD
181
1
V
Collision Count: plumber of times engaciedin a collision. (note:these numbers are actuallydoubt e the total shown i noverall statistics due toone count for each col -
I lidinq adapter.
of
W'
M;
182
._...`^.. -- — -- ----^--•c- ,,mac: • -.,., .
ii
OF QU' L" y.
)1
1134
m0W ONO W^) N
W OH
P Um H OOO W r ] U
1- OO < NO nO JH.-O W 2< J ^
} t N•..N m H Y f7 Q .-
< r • O O GN• H Q 2^ •^ 1 1
O W•Y fJ W> ♦ Z •N OO•• 7 u W W 2 •• .<OQ Q^^ V n w•. H
I J O J ' N< N Z •+N . N 7 J •• ••
NW O a 2 < •+ O .+ Y T<W W na Va•.- -N F• = GI u N l •.
N N l• Y Z N^ n O a m m."• J •• W H J n <<"J
T O p W a W m Yl alN W V ^[ W O O
U O ^^^ a W r n Z a> a RO P ^ rp •- > u- 7 J •..-. p pO o A m O W 7 0 Q<n o .,o < C L QmN^ Au
Ow^u 7w Y.V 1+ J Z •t p
O 11
a - z 2
Z fl J W a n 67 U ^ •.t O
v ZH
U r) 1)
^ •o r z ^+ oZ U J J 7 l J Jn . a o a •-
^ z •- N n N •/. NJ !) o- wW }Q <
> r NY• HJ < s •- N H J
.. } ur J.- D Y Q W A D
• R Q J W uo W< n W a n
a r H< ^ J W > >A .-• n Q m> T Wp r •- Y
6Q
N uQ Q A
ON u uO W
< a o- a
•
•
SO
n
u ^• w a
aV At <
2
IN
•
2O
n N•
W Qo w
• Y nn oti
• Z
tip
Q
OF F:. •; ^r^ ,._3^'l^
n
W
>m
H
m
O OJ W O
• V`
IJ W O WO N O NO
^ J G ^ O OU p > O u
o. no m 00v• o.O W^V O •-U^ O ^ OO t rJ C < c)O /
¢U ••U
O ill J N C J OZO w 7< O W Z a O Nqu •-O >nN Ov ^ O>N r
N m.wn ¢p N m^ ¢ ¢Ua ^- • 00 00zn.^ ♦nan¢ rte .♦ •• C] N O W .•. • (l N CJ W ^.u p W ♦ 2 N O ul O W ♦ r w) p1- O V u 2 •. .a0¢ .U'^O ^ > U W 2 ..<O¢ZNJVO ^Q O 7 N / U 7 W N ti H
UU J <N Z •-•N 7 J UU ^- O <N L'^/ • N d f N 7 J ••U < p W 0 7 u O1 ► < J W •• O 1 •' T>N T < V f N ^ Z Y m J r a> f .-• r T v m J
N A W Z N• ¢ ^i Q m O S N r♦ R O/ mNO .a J J d .~ f O a ul e m m H J d <~ i (• W u a W m mO ^/ # ^J r1 ¢ V W V Y W O
O O n n W >.♦ J ^^ •-1 d Nm u• >u. 7 7•- •••do
vG'L Ww 70 oaa>q 1•. O Z a O m N a- D u X O< L O ill N ti G V
O O - O D&di•+JZN u< O z
OO W
o >.. JzN dO 1 1
• 1 W 1 Wu u o ¢ o ¢
I N ¢ ¢ = 7# ^ • O U aI
Z V - Jr
Jz
• d70.-•- u u u o
1- O YG' 22
zO^ N O Nz u» r 7 r > >n • o o < < ^
< 2 t N r[ N In vJ •• n rt > nJ a ¢ ^ N n - I
> W JH G W/ W O W O
o w. o W t W s^ f 3 J W > J lu > >
Q ••• OO W T> W m>d •. •-< o n n n
^^ W urV.le •I n n
185
O
d 1.1
¢u ^W /
• Y d^ o0
Z
1^
z +J70^s c^> 17 Yu^2 0 7O • Q•7 >< Z
J aJ
.. O0
U wq NC• OO ^O •-
OG U
qh
-U
(I
OF POOR Qi. ALi rY
W
m m mO p OW n W O ON N • VO W O W1"I N O N N NW C] O d.- O ^ r O O
N r O •••^ ^ O m ^ O m O O
•/• 1 N 1 r.J 1O O • W OO u 0 0 O w 0 0 O W N
O OO < O O < O O t mO •• L O ¢ •• O O •• I^O ¢ JO r O JO.- O ¢ J vO W Z a 0 O w 2 < O 11 O W Z< ^- MOU '-O>O••• O U 1- O >O•n Ou f O> •-••^N W > •-• r O • N W ¢ O • ••• W Y •-• 4 N
N mH NRNN N W- 2 — MN m••WOQO
• 0 0 0 a Y • 0 0 0 < Y • 0 0N R Z N W 1 1 N N¢ 2 N •t 1 1 O N¢ L •n
•• O N O W •• O N C W •+ •• O N O W ww O W ♦ Z ~ N O O W O W ♦ Z N O O W O W • 2 N OSOU w 2 • ^O y W W 2 • YOU W Z ••<O¢ __VV — — <O ¢ N^ V O ^^ <OR h•'^ V O¢ O 7 .. H r ¢ O 7 ••. Y Y ¢ O 7 rr H^
t)u N a N2 •-• UO N <NZ •-• t) V ^ O aN 2•+¢ • N J J ¢ H N 7 J ¢ H N 7 JWO N<•.•O.. Y Y W O N ¢ <•"•O •+ W O N R <•• O •-•N < •-• m w < •-• m w < •^•Z < T •^ ^ S Y m J J Z < T •^ - 2 Y m J J Z < T n• rr 2 Y m J< 0 7 •-• < U V ^ < O 7 •-• < y O •-• < 7 •+ < V V •••
S N^¢ O tr m m ¢ Z N a¢ 0¢ m m ¢• i N s a 0¢ mr W • J n << •- J D << H W W 1•. J 6 <
~/ 0 7 w¢ W m m m ~ 1 0 W¢ w m m Q: 30 C W m CN •-• u Y W O O 7 u W V Y W O O w V Y W O
J!O un >•.7 J^•.n 4 ^m W m>•^ J ^Y •-•A 4 efl •Y >^ 77^•-•Oo m W 7otr < o m w 70¢ <•- om W
n o< i a c w— o^-x o< z N o o N^ o u x 0<= N o rn N^ o u m N^ o ya 0 7 a a 0 7 n 0 7 w>.. J z a >•+JZi a ..JL.. a
1 1 N 1 N1 W 1
O n' ¢ O ¢W
M N 6 N ¢ Z
O O O
J J J ^
•. u S V = U S O^ f f
2 N ^ O N ^7 J Z J z 7 Z 7
u < < a <F N Y N Y N H
Y N R N Q N Q N¢
> ^ > ^ N > N••• N N w N N
y¢ W O O W O O W O
O •+ •+ ¢ r r W tr uV V
^ ¢ 6 ¢ tr W ¢a > J W w > J iu > J W >
D m >> m» m> W
< O D O ON V
O W W O w W O WO R R p R R 4 K
f
^e
.m
1 2O
♦ H^ J
• N '• W ¢
o wYan a0 0• s <
2
186
\1
OOO U0n r•
nO O
(1• u Or u J
Y^ ••2 OJO ^ ^•tr O
O Y HO 2 2
2 O J 7O a O
O ^ uT< 2 >w .. o ¢O >
J t .c> W J
J r O WO W
R ¢ O J Hf ) Y.a D.¢ r-• K r <v . O D
0 IL
<0<
NWH V> Wm N
u o aW O aN •P
U PNW P
Pa
m o 0a 1
O •• P WO ) P O
OO < OO N J ry ^O W S< N ^O u H O B J
> r v Oh N ^ m H W I^ ¢
U •• n¢ LP•.• • O N O WW O W ♦ Z^ NS OU W 2 •• W< O¢ ^ O U O¢ O 7 Z
V J N<N S •+r N 7
W O N ¢ t ••• O .+J
< ••o i um^- m w N <
Z < i H ^ 2 Y m< o ^•+ a uo
z N r¢ n trR H ^ J O
i ^' W ¢ w mJ N r V YJ ^ H V tr •-• .. ¢ Z ^ .-.r m ^ n W .. 7 ^
o a. ^ N tr < uo<=NO n ^-o^ O 7 T
p •-• J 2 N d
1
wv
OJu i
OJ 2
<
N ¢Y
^ Vtr
^ Jm
0Nna
> W •m N
V O PW O PN .PO PNPO> P C,
m o 0P ^O •• P
O W P O^ O
O < rO W J NO Z < N NO u ^- O^ JN W > r ¢ Qr N m'- w
•n¢ 2a •^O N OW O W ♦ Z^ N>Ou W Z ••< 0¢ N O V O¢ O 3 J0 0 N< N Z
WO ) tr < •+O ••+
•-• m W <2 < v i •^ ^ 2 v m
n< o t17•-• <uoa 2 N r¢ O trr f w u. m Y J ^
I O t W v W' m^ N• -. J U^ u Y W^m V W•♦77 ^an o m 7 N¢< u
f. < L <om T•OU 7 H
s •+ J 2 d1 NI w
W¢
Ju T.
N O7 Zr a
N
N
trV3 JW m0
n0
H UT ^um N
u O PW O P
•PO P
NW PH P> P ^m ao
P WO •• PO W P U
OO < OU ¢ .. NO N JO W 2 < ^ 3 •U u H O 7^ JN W r Y ••• ¢ d •rN •n ^- W1^ ¢
/) ¢ 2 P u•• p N O W '.w O W ♦ 2 •A> p u< O ¢ / ^ O u O¢ O 7 J •-• > f
O O N< N Z ••.tr • N ^- N 7 J
< W .. o a u m^- J m u N
2 <^ 7. ry ^ Z Y mJ< O m 7 •-• < u U
v 2 N 1 ¢ t^ ¢R
W •O ^• J 4
~ L O < W ¢ mN N r J V U Y
m W W W .^ 7 trJ .-ev om u 7 0 <^
O < L< O In N I- O VO 7 Nd •-• J 2 O
1 N1 W¢W
r•of Wu x
N p7 2
<<^- NN ¢
r y
vW
? Jw m0
N0n
OO
7
0
187
QO
t.J1
.1
_O ^N^.. o o ^ v v ^J uO
O O O Oa .^ n
ur r ^ Q'-` .-A TY
Z2-1- _n^ v o o r vw ou u¢
r^
>+N
Z0
N fr =N O P O ^OZ U !n N1 MI A A<¢ N
Nw 1m m >T
L L LLT
H 1N 000
O O O ORZO 7 O O O O O
O ♦ ♦ ♦ O !D JO a u
O P x♦d ^ W A O O J
V^ P JN A O
NJ
A VI A P J A NIn J r O tf P
L a J J•• •. .. •• •• L O O O O G
.. •. .. .. ..•• JN
N 1 1 1 1 1L < /1 J M♦ J
^- O V W ^ ^ N N NN •-. Z T O
HT Of W
<
N N < v 2 NZ .-. 2 O O O O O
fH p O O O1
O O O
N N L N WT O O O O
Y¢
^O L O
t•• JJ O ^ O U O
O O O^ O 7 uH a W F ^W O Z T r- D W2 J H .'•
N N 7~
7 H r= W W A W N f •r7 u i L W wL Z•+L O¢ Z« N ^.+ <L N < O O A O
W a¢ w H N Z O w p O O 0 O7 1- 2< J Lr Z O O O O IJ
O •• O v v N u w f¢ O O O U OO
HN O N
a T N¢ HW ^-
D 1-rO O O O O
2 L L f Y H ti N ¢ <W J N W¢ 2 u > N ^
•- 7 Z H O O< m W ti^- O H m 6 f
H a s ^- J J r IG O• Z N N O m
W¢
.+ N J Ju J F< f
J ti< O
¢ JH<
J< T W O ^ 'O N
u .l .•. f fO~
2 1"' A u Qf M> > p a 0 0 O t O O f W A.• . O A O N•^ N u^ H H f N u 4 H ^ .-. TH w IV T
• W O• f Uf 0 o O O Z O OV< J L
f¢ W
DA
4 J^ z uN
¢ oT J WW Q - p N W ^ 7 N
W f Od 1- W 7 flp ! ^ p N u N F ~ /< L < N
¢ON
ON
GT
138
o
P
O
O
OOWO
O
1 O
O O OJ O O OW W WC1 A OO O O
C^ O OO O OO O O U
U O U OO O O O
O TN O 7
PU U JO O O O
i7
m m'^ ^ 7 N< r+t
7 J Jtr^ d W
`^ J u J uI^l d N < t
d W F d 6Z 1i N ^n y^
189`i1
k
••
• 2O
• r• Z ^
• • u e♦ • N• • W Y• • D• t-
Y a ^• ¢ t• • O D
• 2•
•
Nf>m
u OO•y
\ O wO N
W O^ O Jm O O
p w O O^ O
O t OO ¢ •• OO J ^ ] ^p w 2 < OOu f- O>O^nN m ♦-wu ¢o
< ^ • U O•7 .. ••I W y •1 W W
•• O N O
•F ^ .0Z N OO V W W 2 ••
H< O ¢ O V yaoo ry^0 0 '• K N L• N H 7 J
u0 < r0 •+<¢ W •. p i V m H
u r O m W N < rN Z < T •^ .- Z Y m J
O < O l 7 •-• < V O •-•N N^ .. Q S r!^ O Q m
p W V w W W J n<o ... ow.W,wv m mO 2J N Y W U
U O r u V r .. ¢ z <^ ao N m > 4. > > ^ n0 o m< W^ o Q
O ^J-t Lr omN^ouO O \ O <
O n J Z O n• p
' W• V O V Q
WN ¢ 2 2 2
Y ^ •• U W W2 J V w a n nJ O ••• •• ti
O O OQ o
O z 2 N D N N N2 O > > J Z > > >
> H N H f N< 2> N W N NJ •• Oa rY Y W .>• ryn K >
Jt rc ^ WN N r J> w J
••• •• ^ W Q W Op W b r
! Qo J•-O w l p w¢W Q .. o D m T W WH 0 r H < O O D ^a ^n wK N VO O W
•
•♦
ZO V
6 NJOOO
• Y nO
O D• 3 K
2Y2a
• 2O
<
1 n
N1-e Q
n
n n
191
11
4
A ^.
m
O
• O• O
nUO u
• O N• w U ^u
< n R^ ¢ 0 7
uoi
NI OW < 6
••
VW
N f U2 u
O NN N N Q .
• Nu W ♦-w u. WO W F n
• O N N N w H• O U Ul ¢
i • 0 0? MUI U^u• O O I O nl u
♦ 0 0 0 0 7 nO O > J Z NO O 1O u
1O
^ •N M w
N• Z N N
u•^ • R Y Y
~• 7 7 ZZ Q Q JO Y r- O
J7
^ • Y T Z< O O YJ QW Y Y •-
N
•• M
J J ¢Y w U•
r• H O O ¢
UI! Q O J f V
O ul a A
W ¢ .-• •7 O
nOt
OF Md
!
O W
Y ^n <O OF a
2
!I^I
EI
WHm
vW O
Ll WN O NO
r•Pn
Um OO r• • WU W O O
^ OO an •• nO . J MO w 2 < J ^
♦ - O T M NY W N .
<'- 00 OM ¢ Z^ u. l l
. N N O uw U w T + Z ~ N O O
V W ^ W w 24 (^ Q O ^ ^ V O -• I^ M
NU J N a N LN < r N J.0 O a R < .-r O r Y Y
••os umti^V ^ 2 m W N a wW t a d! ti ^ Z Y m J J
N V •• Q 2 N! Q n ¢ m mu v ^ .-w^. W .-JG a <
Nn NU O
r n n w¢ W m m m^ N u Y u 0 0
U P ^ J f a W W¢ Z a T Q¢O O O m O w 7 0¢ a r
O O U 0 4 1' T O O N H O UO O O ^ u 7 wO O O+ J Z R dO • 1 ^
0 1u O
N IYn ¢W
N I •• N Q Z Z 2O W w
J L O N J ^ O JO ^ •• 7 0 u ti
O O :7O O' n YO Y z Y O ZO .^ Z•) 7 J
O 7ZUR
OZ
N7 7 7
• Q V O • ^- < ♦- YY Z F N f f H
Z Y < p N Q N N N• O ¢ J
W Y Y > r- N< Y O t t •-• J JJ a Q J J .- W N M JUI J F W W u •. .•O W
O wO O W O p
Q H •+ WO J ti ¢ O J Va n n W a e Q
x ti< .-. x ti > J u > >I•. O O •-. O m T> W W W
N w wN V VO Wn K R
192
-1 T
^ ` •141. ^ c.' .^
- - -_
OF NUvIt
WO O
N
rm u mO W OO N O N0- N O WO N U NO O r J OJ U O O
o m o
0 0
• o00
ED
U a¢ J ^ U Z J N
O- W S>~ O u W S S~
r O R N W r O Rm r rOPI Q. r r 000
h K 2 V. ♦ N N< 2 ^ ♦ 1
O R •+ W •• O N 0 6 r W W
♦ W N O W O W ♦ W N U Ow 2 2 u/ 11 W
^ O W O r ^ l 0¢ S N J W O r•- n•u •.r Qo Jw ^..
^ a
u u a o /rl ..<uNiJ 1-0 O Q •- r ... > >•f Lnlr < J w ..a n mr r
W W O N a W m w O N 4 •-•
7 •^ t 0 •-• < o w J •^ <Orz N a¢ Q m Q .• o z N s Q Q m m
rnK r•u •-aa<W¢ u nl 7. p W W R W n^ m
u Y lu O •7 •-• R ^ V K W O O
w^ O Q r O T r W 7 /7 6 rO m N ti u x 0 a Z•♦ O m N r u
< ^ U ^ OD, > •-• J T N pN 1 N
1 W6 O Q
Q
01r u zr r
O •• OZ Z< 7 <N R N
N^ rn > nl r•-^ N r
W O W O OR r Q r •-•
w Q QJ ^ > J wm > W m > l0
N Y/ YN V V
O W O W WD R O R R
NfmOO N
N O wW O N
U Om
o• o •• o
o0
_• O ¢ J
O N f JO u w > >
•N W r r O¢
N Y •+ W 2 N N♦ • Dlr ^ Or`O• N< S w l l
~•• O N U¢ w WW O W ♦ W N O •7r O u ^ W 2 2 w
• • <O K •- W O •-•^^♦ • • ¢ 07 J •U •-•r
U OZ • • w O No • • < . r.m^•-
N m w O N< •-•^ J Z < Z ••/ ^ I m J Jas a o 7 •+ < p ^•.
♦¢
P N N ¢ .• Z N i Q Q QI m. n a f
O u ~{ O Z w Q u " !n•• U N N N r V Y W V p
W R U^U ern ¢.•.. n 2> Q oO W •• 0 0 a J ^D u p > W O J •+ n n
r •♦Y n ••
C 0•00
O (nw^ O R rx 0<L N OrD N•-u
• R a U O O a^ o^ n0 0 0 0 > .-• J 2 Z .l7 < •H
• O O 1W
• •o v• o ¢I N J W
♦ • • 2 N N J•
7 •¢ Y Ix
V 2r
♦ • Z 2 r♦ • 7 I oL ¢ ¢ J
wZ
• • OH •-Uu
J fr
• • > Z 2 <• < O O ►
J NO f < W
> r•n
J J ¢ r• J > w• r O O Q W O O
W¢ O J F•
W ¢ o-r •-•p w< o Q nrx r < > J uR r O O W Q>a W r < o •/.w
6 N W^/1 V
O O Y/ W< d R ¢
2 2W
a nO O
^ 7ti< <
J
X
1O
O
r
193
OF PV^/^1 ^I
NW
f ^} }.n u m
W O W O\ O N O N
p wO N N N
^ O O d ON f O
m m oOO OJ O Op Op O aO K J N O a J /.O a J O N a JO V W Z^ O U W S? ••N W T } O Q^ O Q
N } •-• W Q NN MN^ Y QOm^}o m o
Cio ^ mo
N< T LL 1 1 O N< Z•^ ♦•• O N O Q r W W •• O N p¢ ..WO W ♦ w -OO WO W NOr O u ^• W Z W • O V W Z Z W
UU N.•• ^U aQ • N N< N J Q • N < N J • ••W O R T} u 0 Q
< .<i mom} < •.: m^N Z iu O N< r N W u1 O N< r= f S •+ 2 m J J 2 < L ••^ Z m J
^ .0 r ^ Q f< I.. W r LL<f. o wn w mm s. o wn Y m
N •-• 7 U U Y IY O U N .^ U W V Y iY O ••
rp u•n emu. 77 .-• LL LL 10 7•^ 7 7.+LLO m W 7 0 R f O m w 7 0 Q}
O< L N O 'O N LL O< T LL O m N H V\ O 7 LL \ 0 7 W.•• J Z L d •-• J Z u• d
1I
¢ O QW
Q ZO W
u^ J W LLZ u Z OH H
Z N Z N}
N < lQ ^
W ^ N N^ • - N 1 N
n M1 J
W O O W O
Y^ Q W QJ W W ^ J W 7m » m >
p oN uN V N UO W O WQ 1 K d Q
194
N Ni^ uf W
m TW O P
C . PT•
Or Pm P
TO P♦ .J .. T
IYOrJ K J ^
• O NN•• O u w Z 7
• H N } rm I ^ Oo n f z ..
w O W ♦ .Y. O u• Y Z Z w<CQ ^1 w
N7 r H.01
U O N N .-•Z
¢ • N < N JW O Q 1- r
O N f Y^ f S mw w N <
LL < 7 •-' f 0 nNN ^Q •• T N
u! O w W l U L u• n wN O N N J ^ • ••. V W V Y .. Nu i Q •• O •- O J 7} Q O •. u. Q Z^ nO W •• O o P N 10 W LL^ u. J n •+♦ 0 0 ^ /• c m W 7 0 ^ e1Y LL •
O; 0O O0 O<U L N O m N
W\ 7 H } WO O O O LL r J 2 N D 67< O O I 1H I IW O O o ¢Z N N W
N• • Y O O•• 2 N N J J• t 7 u Z u
Q Y Y •-• Z 2 z
7 7 Z O•
S Q R 7O ti ► O Z
7 < 7M•
• •V
} Z Z < N< O O } KJ n N NY ► } } TO < < W
• J J QY } W W
^ N• f O O Q
nW^ Q O J ^ u
O W < ^Q •• •O O W m 0n .. } < o
^<
NN
O<
OA.
bi •
1I
1,
OF
f NT O T OO P W O JN U P• P 0 0-O O
O PP P
e/ O rp OP
O O?
O oO •• P O •• PO ti OU Q J N O Q J .r•O < N O N
NO u W 2> A u W 2>F O tr r O Q^ N ► w W Rm^ H O
^ N 1 rm^^ O
r < 2 ^ < Z u.• O N O R . O N O e •••W O W • w^ N W O W N
^ O u w 2 2 u ^ U u w S 2/a O R N O W U •+ < O Q 1'1 0 W OQ on N •U ••H QO7 • V •^`.
rJ ON<
U •J• N N J
W •J W trN J
W O N Q ^- ua s a s m
w< s m
7 m w N<.. w e N<
< na 7 •+ <nQ T N 1 a Q ^ a n.n ^••. <o7 N• Q Q•. a ^ n
~ l^^ W u- m •- o
o a w a u L O t W e W-1 u r N .+ J u u V W•- Q r Q r> n 7 f Q 1• Q Z>
m W> u. 7 ^..amuu' 7r,n ^>u. 7 7•+
n+1O mu W 70Q fo<_< o m N o< r a c m N0 7 e
•-IJ Z N a0 s
Q w JZ7
N p1 N
aWO •s W
F 1 UH
2< J a 7
tiN < a^ Q
~
N ^ N
tr
n J
aWJ W> J >mN
W m WD O
NO
NO
e e
u0 0 ^ ^ W O 0 a mJ ^ O N N ^ ^Or Y1 •Ur J
r N•l YZ 27 7
1 1 Z O
N N N O -
N 2 2 2 N<
222fN N N N •-• LY NOO N N • Q7 O I Z 2 tr^
O a n Q 2 ~ Yc ^ •- r- ^ -• Y tN ^ Z J= W W V J QJ u u u I L W s^tr Z I Z<< N r 1
W W Y/ l Q .-• 1 V7 7 ^ 1. Y r
O •• 000 ^••• N S J
W W f 7 Ro N N N s N Q^Z L f •. tiu/ w J J J 3/ W Q J
~ W 1- 4 r ~ O W u.• H ^N N •y < H
• 2 W N W e NW • N J 4 W WQ - <
u J •-.7 7 7 7 0< U ^u N NNU 7•-^ < N
195t
- ^ 11
2O ►..ZN 7O O O O O O O OJ VJO
n O O O ^ O O O O O< V ., r
iOY 74 7 O o
r o O o o n a nW p O aV uW
r r J
2V
N f•• 7T 7N O O ff P P m m P O O Oz u o .. .^ n n nsH
H rz zO 7 O O O O O O O O O Oi O
V
R Wa V
n J ♦ O O 7L O O
0O O O O O O O (^
7N
1 1 1 1 1 t 1W
T_ + a n J ff n n O 7 nY NH e .f w a a N N N . rl O O•+ 2 > D> O^ W
<
l + r+ N•• 2 O U n O O O a O U OO O O O O G O O O O Ot N W
T U O (^ O O •] O nJ
o J O O r U O O O O OU
0 0 o n o 0 o u nW o 0 0 0 0 0 0 0 0 0T .^ O O O O 0 O 0 0 0 OH ti
O O O O O O O O O UO O O O O O O O O U<
1
r OrNn P1 n
• W J n •-. O N N^
O N•-•Y u r> ••' U• Y. O U U O N O
O O p O 02 O O O A O OWJ =< s
tr W O!n
aO
WZ
nO
J ! _
N < N u nlR tr o
> J OO •
r 2 . p^
N ^ i N ^ ^ l N<,
/.W f
Q7
^J J
u < a
m0• ^<
1-N U
W/I V
^ nJ J J
s WV. V
t\ C o l H D DO tr N U T T V. N •n N
jRl'Gnti."tL Pl*o acs
OF POOR QOALn-i
N N N N NW W W Y
N N Y Tm Q1 d DI m ►
W W W 1 7 T 1! IDN N N !ooN u
ACC oocl00 0•^ O I 1 ♦ ♦ U
m a J N M N • W WP{•n n JA r Inn 31 ^ r m .A J N N nNN^O n n 0.- aP n J
t N O--CA
C C3- I^ t1
0 0 0 0 0 • NY\ J r r •..
I[ H Y Y2 L I 2J J 7 7tr .i tr tr
1 I I IO 4
W f O! Y O Y O W
• f f Y 7 Y YW W N f N H! 7 W 1- 1 2•+T +• 7 0
Y .. W ti tr N N z of>> H T1 2 < J
W W V < l 0>> f H Y) N Q N R ► O
W Y V1- H f < 1- H ~ N
V U S ► N W.( < 7 ^ N< T ^Y S W
Q F Y^ N 1 • Y Y J J Y J Y T O
T S f (^ O^ [. toY Y J 7> ti tr tr J JZ n OJ 7 Y f l- 1- 2 Y T 1-tr t U O f U< U OH 1- ^- N M H V {^ V O f H
1=
1961
1
4 VIM
1
REFERENCES AND BIBLIOGRAPHY
DE080 Digital Equipment Corporation, VAX HardwareHandbook. Ma ynard, Ma: 1981.
DEC31 Digital Equipment Corporation, VAXArchitecture. f-Ikynard, Ma: 1981
DEC82 Digital Equipment Corporation, VAX SoftwareHandbook, Maynard, Ma:l'r31-1982.
D0NN79 Donnelly, J. E., and Yeh, J. W. "Interactionbetween Protocol Levels. in a Prioritized CEMABroadcast Net,.,jork." Computer Networks,March 79
FRAN80 Franta, W. R., and Bilodeau, M. B. "Analysisof a Prioritized CSMA Protocol Based onStaggered Delays." Acta Informatica,June, 1980.
FRAN82 Franta, W. R., and Heath, M. B. "Performanceof HYPERchannel Networks: Parameters, Measure-ments, Models, and Analysis " University ofMinnesota, Computer Science Department,Technical Report 82-3, January, 1982.
F.1;1AN84 Franta, W. R., and Heath, M. B. "Measurementand Analsis of HYPERchannel Networks.' IEEETransactions on Computers, March, 1984.
HEr182 He yman, D. P. "An Anal ysis of the Carrier-SenseMultiple Hccess Protocol." The bell SystemTechnical Journal, Vol.61, No.B, Oct., 1='132.
MAUL84 Mauldin, J. D. "A Software Model of theHYPERchannel Local Area Network at theHuntsville Operation Support Center." Thesissubmitted to Mississippi State University,Mississippi State, 11s. 198.1.
METC76 Metcalfe, R. M., and Bo+fs, D. R. "Ethernet:Packet Switching for Local Networks."Communications o+ the ACM, Jul y , 1976.
NHS• ,82 National Aeronautics and Space Administration.George C. 11arsnall Space Flight Center."Shuttle Program: HOST, Operations ProceduresDocument." SPMD 1.2.1, Revision 6, May, 1982.
197
1-(0
1rr \, ^' ~ ^_.^ •hi►_..._ ___ sue_ ( ,
NSC79 Network Systems Corporation. A400 AdapterReference Manual, 42990008. Brookl yn Park,MN: 1979.
NSC80a Network S ystems Corporation. Nucle-is AdapterReference Manual, 4290003. Brookl yn Park,[IN: 1980.
NSC80b Network S ystems Corporation. H1rPERchanneISystems Description, A01--000002. BrooklynPark, MN: 1980.
NSC81 Network S ystem Corporation. PI 13/14Peripheral Interface Reference Manual,42990015. Brookl yn Park, MN: 1981.
PEC81 Perkin Elmer Corporation. "Model 324CIProcessors," Product Information Sheet. OceanPort, NJ: 1981.
STAL84 Stallings. W. Local Networks. New York:MacMillan Publishi ng Company, 1984.
WATS82 Watson. B. W. ")al i dat i on of a. Discrete E-)entComputer Model of Network Systems Corporation'sHYPERchannel". 7th Conference on LocalComputer Network =_. Minneapolis, t-1N: 15182.
YEH79 Yeh. J. W. "Simulations of Local ComputerNetworks". 4th Conference on Local ComputerNetworks. Minneapolis, MIA: 1979.
1
298
1