On the Effectiveness of the FDDI-M Medium Access Protocol for Real-Time Traffic

Edward Chan, Daoxu Chen, Victor C.S. Lee, Jiannong Cao, Chan Hee Lee

Research output: Journal article publicationJournal articleAcademic researchpeer-review


FDDI networks have been widely deployed to support real-time traffic such as voice and video communications. However FDDI's medium access control (MAC) protocol can transmit synchronous messages up to at most one half of the total bandwidth of the FDDI network. In a recent paper by K. Shin and Q. Zheng [Shin95], a modification to the FDDI MAC protocol, called FDDI-M, has been proposed to double a ring's ability to support synchronous traffic. In this paper we present an analytical study of the timing properties of the FDDI-M protocol. Using the Worst Case Achievable Utilization (WCAU) as the performance metric, we first evaluate the performance of various synchronous bandwidth allocation (SBA) schemes in guaranteeing synchronous message deadlines. It is found that, in comparison with FDDI, the FDDI-M protocol results in a higher WCAU for the normalized proportional SBA scheme. However, for the local SBA schemes, the WCAU values remain zero. Next, other performance metrics such as throughput and percentage of frames missing deadlines are examined using simulation. A series of simulations using actual MEPG video traffic confirms that FDDI-M does provide superior synchronous transmission characteristics.
Original languageEnglish
Pages (from-to)371-389
Number of pages19
JournalJournal of Supercomputing
Issue number4
Publication statusPublished - 1 Jan 1997
Externally publishedYes


  • FDDI
  • Medium-access control
  • Multimedia communication
  • Performance evaluation
  • Real-time communications
  • Synchronous bandwidth allocation
  • Video transmission

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Information Systems
  • Hardware and Architecture


Dive into the research topics of 'On the Effectiveness of the FDDI-M Medium Access Protocol for Real-Time Traffic'. Together they form a unique fingerprint.

Cite this