Performance models for communication networks in manufacturing environment

Meng Chu Zhou, Huanxin Henry Xiong, Constantine N. Manikopoulos

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The performance analysis of computer communication networks for manufacturing automation has been investigated by a number tJf researchers. Muny analytical and simulation models have been proposed. Basically, we can classxv these models as queueing models, queueing network models, simulation models and Petri net models. In this paper , an overview of various models and a Petri net method or modeling and performance of token bus local area networks tire presented. In our Petri net models, the four differcnt service types in these networks are modeled and their performance can be derived for both symmelric and asymmetric cases. In order to deal with Inrge networks, an appro,ximationscheme I, F introduced.

Original languageEnglish (US)
Title of host publicationProceedings of the 4th International Conference on Computer Integrated Manufacturing and Automation Technology, CIMAT 1994
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages417-422
Number of pages6
ISBN (Electronic)0818665106, 9780818665103
DOIs
StatePublished - 1994
Event4th International Conference on Computer Integrated Manufacturing and Automation Technology, CIMAT 1994 - Troy, United States
Duration: Oct 10 1994Oct 12 1994

Publication series

NameProceedings of the 4th International Conference on Computer Integrated Manufacturing and Automation Technology, CIMAT 1994

Conference

Conference4th International Conference on Computer Integrated Manufacturing and Automation Technology, CIMAT 1994
CountryUnited States
CityTroy
Period10/10/9410/12/94

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Industrial and Manufacturing Engineering
  • Control and Optimization

Fingerprint Dive into the research topics of 'Performance models for communication networks in manufacturing environment'. Together they form a unique fingerprint.

Cite this