{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T06:10:05Z","timestamp":1698214205034},"reference-count":18,"publisher":"Wiley","issue":"3","license":[{"start":{"date-parts":[[2008,9,12]],"date-time":"2008-09-12T00:00:00Z","timestamp":1221177600000},"content-version":"vor","delay-in-days":5978,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Trans Emerging Tel Tech"],"published-print":{"date-parts":[[1992,5]]},"abstract":"Abstract<\/jats:title>After a recently reported application of the SRPT principle to the Ethernet LAN based on the CSMA\/CD access protocol we present in this paper further SRPT applications to the token passing LANs Token Bus, Token Ring and the FDDI high speed LAN. Messages are sorted in the station transmit queues according to their length and transmitted over the network using the standardized priority classes to prefer short messages. It will be shown that under a typical user scenario the mean value as well as the standard deviation and the correlation of the transfer time are remarkably reduced compared to FIFO operation.<\/jats:p>","DOI":"10.1002\/ett.4460030310","type":"journal-article","created":{"date-parts":[[2008,9,12]],"date-time":"2008-09-12T12:28:21Z","timestamp":1221222501000},"page":"281-288","source":"Crossref","is-referenced-by-count":0,"title":["Further applications of the optimal strategy srpt to media access protocols in local area networks"],"prefix":"10.1002","volume":"3","author":[{"given":"Leonhard","family":"Schmickler","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2008,9,12]]},"reference":[{"key":"e_1_2_1_2_2","unstructured":"Xerox system integration standard: Internet transport protocols. Xerox December1981."},{"key":"e_1_2_1_3_2","volume-title":"Token\u2010passing bus access method and physical layer Specifications","author":"IEEE 802.4","year":"1985"},{"key":"e_1_2_1_4_2","volume-title":"Token ring access method and physical layer specifications","author":"IEEE 802.5","year":"1989"},{"key":"e_1_2_1_5_2","unstructured":"FDDI token ring media access control (MAC). Feb.1986. ANSI Document No. X3T9.5."},{"key":"e_1_2_1_6_2","first-page":"11","volume-title":"Performance of Data Communication Systems and their Application","author":"Bux W.","year":"1981"},{"issue":"5","key":"e_1_2_1_7_2","first-page":"384","article-title":"Local correlation properties of random sequences generated by queueing system M\/M\/I","volume":"44","author":"Ding W.","year":"1990","journal-title":"AEO"},{"issue":"6","key":"e_1_2_1_8_2","doi-asserted-by":"crossref","first-page":"977","DOI":"10.1109\/49.1962","article-title":"Analysis and tuning of the FDDI media access control protocol","volume":"6","author":"Dykeman D.","year":"1988","journal-title":"IEEE Selected Areas in Communications"},{"issue":"4","key":"e_1_2_1_9_2","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1109\/TCOM.1986.1096548","article-title":"Evaluation of the optimal SRPT strategy with overhead","volume":"34","author":"G\u00f6rg C.","year":"1986","journal-title":"IEEE Trans. Commun."},{"issue":"5","key":"e_1_2_1_10_2","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1109\/26.54967","article-title":"Further results on a new combined strategy based on the SRPT principle","volume":"38","author":"G\u00f6rg C.","year":"1990","journal-title":"IEEE Trans. Commun."},{"key":"e_1_2_1_11_2","volume-title":"Performance analysis of local computer networks","author":"Hammond J. L.","year":"1986"},{"key":"e_1_2_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/26.31140"},{"key":"e_1_2_1_13_2","unstructured":"R.Perera:Contributions to the theory of queueing systems wuth the optimal strategies SPT and SRPT. PhD thesis RWTH Aachen 1989. (In Germain)."},{"key":"e_1_2_1_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-75079-3_24"},{"key":"e_1_2_1_15_2","unstructured":"L.Schmickler C.Gorg:Performance evaluation of a new CSMA\/CD protocol based on the SRPT principle. In:Proc. ofGLOBECOM'89 paper 26.3 Dallas Nov.1989 p.924\u2013929."},{"key":"e_1_2_1_16_2","doi-asserted-by":"publisher","DOI":"10.1287\/opre.14.4.670"},{"key":"e_1_2_1_17_2","doi-asserted-by":"publisher","DOI":"10.1287\/opre.16.3.687"},{"key":"e_1_2_1_18_2","first-page":"243","article-title":"Improved simulation by application of the objective Bayes\u2010Statistics","volume":"34","author":"Schreiber F.","year":"1980","journal-title":"AE\u00dc"},{"key":"e_1_2_1_19_2","first-page":"258","article-title":"The empirical stationary distribution function of markovian correlated random sequences","volume":"41","author":"Schreiber F.","year":"1987","journal-title":"AE\u00dc"}],"container-title":["European Transactions on Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fett.4460030310","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.4460030310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T13:39:05Z","timestamp":1698154745000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.4460030310"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,5]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1992,5]]}},"alternative-id":["10.1002\/ett.4460030310"],"URL":"https:\/\/doi.org\/10.1002\/ett.4460030310","archive":["Portico"],"relation":{},"ISSN":["1124-318X","1541-8251"],"issn-type":[{"value":"1124-318X","type":"print"},{"value":"1541-8251","type":"electronic"}],"subject":[],"published":{"date-parts":[[1992,5]]}}}