Abstract
SNA is both an architecture and a set of products built in conformance with the architecture (1,2,3). The architecture is layered and precisely defined; it is both evolutionary and cost effective for implementing products. Perhaps the largest component of cost effectiveness is
SNA's DLC and routing protocols have been discussed elsewhere (4,5,6); this talk examines protocols on sessions between logical units (LU-LU session protocols) and illustrates the results of design choices by comparing the performance of various configurations.
- 1 E. H. Sussenguth, "Systems Network Architecture: A Perspective," ICCC 1978 Conference Proceedings, Kyoto, Japan (1978).Google Scholar
- 2 Systems Network Architecture Format and Protocol Reference Manual: Architecture Logic, SC30-3112; available through the local IBM Branch Office. This is a definitive reference for details of SNA.Google Scholar
- 3 Systems Network Architecture: Concepts and Products, GC30-3072; available through the local IBM Branch Office.Google Scholar
- 4 J. P. Gray and T. B. McNeill, "SNA multiple-system networking," IBM Systems Journal 18, No. 2, pp. 263-297, 1979.Google ScholarDigital Library
- 5 R.A. Donnan and J. R. Kersey, "Synchronous data link control: A perspective," IBM Systems Journal 13, No. 2, pp. 140-162, 1974. The requirements for, and benefits of, SDLC.Google ScholarDigital Library
- 6 G. A. Deaton and D. J. Franse, "Analyzing IBM's 3270 Performance Over Satellite Links," Data Communications, October 1980.Google Scholar
Index Terms
- Performance of SNA's LU-LU session protocols
Recommendations
Performance of SNA's LU-LU session protocols
Proceedings of the Computer Network Performance SymposiumSNA is both an architecture and a set of products built in conformance with the architecture (1,2,3). The architecture is layered and precisely defined; it is both evolutionary and cost effective for implementing products. Perhaps the largest component ...
Protocols for Multiparty Coin Toss with a Dishonest Majority
Coin-tossing protocols are protocols that generate a random bit with uniform distribution, although some corrupted parties might try to bias the output. These protocols are used as a building block in many cryptographic protocols. Cleve (Proc. of the ...
Two-phase Nonrepudiation Protocols
ICCCNT '16: Proceedings of the 7th International Conference on Computing Communication and Networking TechnologiesA nonrepudiation protocol from party S to party R performs two tasks. First, the protocol enables party S to send to party R some text x along with a proof (that can convince a judge) that x was indeed sent by S. Second, the protocol enables party R to ...
Comments