{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T15:18:13Z","timestamp":1770995893937,"version":"3.50.1"},"reference-count":65,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1991,10,1]],"date-time":"1991-10-01T00:00:00Z","timestamp":686275200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks and ISDN Systems"],"published-print":{"date-parts":[[1991,10]]},"DOI":"10.1016\/0169-7552(91)90087-s","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T23:11:16Z","timestamp":1060297876000},"page":"193-211","source":"Crossref","is-referenced-by-count":53,"title":["Application of polling models to computer networks"],"prefix":"10.1016","volume":"22","author":[{"given":"Hideaki","family":"Takagi","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0169-7552(91)90087-S_BIB1","first-page":"19","article-title":"Z-Net: A Dual Bus Fiber-Optic LAN Using Active and Passive Switches","author":"Abeysundara","year":"1989","journal-title":"IEEE INFOCOM '89"},{"key":"10.1016\/0169-7552(91)90087-S_BIB2","year":"1985","journal-title":"An American National Standard IEEE Standards for Local Area Networks: Token Ring Access Method and Physical Layer Specifications"},{"key":"10.1016\/0169-7552(91)90087-S_BIB3","year":"1985","journal-title":"An American National Standard IEEE Standards for Local Area Networks: Token-Passing Bus Access Method and Physical Layer Specifications"},{"issue":"2","key":"10.1016\/0169-7552(91)90087-S_BIB4","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1287\/opre.13.2.306","article-title":"queueing with Alternating Priorities","volume":"13","author":"Avi-Itzhak","year":"1965","journal-title":"Oper. Res."},{"issue":"10","key":"10.1016\/0169-7552(91)90087-S_BIB5_1","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1109\/TCOM.1981.1094893","article-title":"Local-area Subnetworks: A Performance Comparison","volume":"29","author":"Bux","year":"1981","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/0169-7552(91)90087-S_BIB5_2","series-title":"Advances in Local Area Networks","first-page":"363","year":"1987"},{"issue":"4","key":"10.1016\/0169-7552(91)90087-S_BIB6","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1147\/sj.234.0351","article-title":"Performance Issues in Local-Area Networks","volume":"23","author":"Bux","year":"1984","journal-title":"IBM Syst. J."},{"key":"10.1016\/0169-7552(91)90087-S_BIB7","series-title":"Local Area Networks: An Advanced Course","first-page":"108","article-title":"Performance Issues","author":"Bux","year":"1985"},{"issue":"2","key":"10.1016\/0169-7552(91)90087-S_BIB8","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1109\/5.18625","article-title":"Token-Ring Local-Area Networks and Their Performance","volume":"77","author":"Bux","year":"1989","journal-title":"Proc. IEEE"},{"issue":"5","key":"10.1016\/0169-7552(91)90087-S_BIB9","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1109\/JSAC.1983.1146004","article-title":"Architecture and Design of a Reliable Token-Ring Network","volume":"1","author":"Bux","year":"1983","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"9","key":"10.1016\/0169-7552(91)90087-S_BIB10","doi-asserted-by":"crossref","first-page":"951","DOI":"10.1109\/TCOM.1977.1093936","article-title":"A Simplified Analysis of Scan Times in an Asymmetrical Newhall Loop with Exhaustive Service","volume":"25","author":"Carsten","year":"1977","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/0169-7552(91)90087-S_BIB11","series-title":"1978 National Telecommunications Conference","first-page":"44.5.1","article-title":"Simplified Statistical Models of Single and Multiple Newhall Loops","author":"Carsten","year":"1978"},{"key":"10.1016\/0169-7552(91)90087-S_BIB12","article-title":"Radio Packet Broadcasted Computer Network \u2014 The Broadcast Recognition Access Method","author":"Chlamtac","year":"1976"},{"issue":"8","key":"10.1016\/0169-7552(91)90087-S_BIB13","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.1109\/TCOM.1979.1094529","article-title":"BRAM: The Broadcast Recognizing Access Method","volume":"27","author":"Chlamtac","year":"1979","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/0169-7552(91)90087-S_BIB14","series-title":"Computer Networking Symposium, Proceedings","first-page":"1","article-title":"Terminal Response Time on Polled Teleprocessing Networks","author":"Chou","year":"1978"},{"issue":"2","key":"10.1016\/0169-7552(91)90087-S_BIB15_1","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/BF01536186","article-title":"Queueing Models of Secondary Storage Devices","volume":"1","author":"Coffman","year":"1986","journal-title":"queueing Systems"},{"key":"10.1016\/0169-7552(91)90087-S_BIB15_2","series-title":"Stochastic Analysis of Computer and Communication Systems","first-page":"549","year":"1990"},{"issue":"3","key":"10.1016\/0169-7552(91)90087-S_BIB16","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1002\/j.1538-7305.1988.tb00253.x","article-title":"Performance Models of Binary Synchronous Communications Multipoint Circuits over Virtual Private-Line Frame Relay Networks","volume":"67","author":"Cole","year":"1988","journal-title":"AT&T Technical Journal"},{"issue":"12","key":"10.1016\/0169-7552(91)90087-S_BIB17","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1109\/TCOM.1986.1096493","article-title":"Performance of Single Access Classes on the IEEE 802.4 Token Bus","volume":"34","author":"Colvin","year":"1986","journal-title":"IEEE Trans. Commun."},{"issue":"4","key":"10.1016\/0169-7552(91)90087-S_BIB18","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1109\/TCOM.1980.1094701","article-title":"Character-Oriented Data Link Control Protocols","volume":"28","author":"Conard","year":"1980","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/0169-7552(91)90087-S_BIB19","series-title":"Communication Architecture for Distributed Systems","author":"Cypser","year":"1978"},{"issue":"1 and 2","key":"10.1016\/0169-7552(91)90087-S_BIB20","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1147\/sj.221.0047","article-title":"A Token-Ring Network for Local Data Communications","volume":"22","author":"Dixon","year":"1983","journal-title":"IBM Syst. J."},{"issue":"6","key":"10.1016\/0169-7552(91)90087-S_BIB21","doi-asserted-by":"crossref","first-page":"997","DOI":"10.1109\/49.1962","article-title":"Analysis and Tuning of the FDDI Media Access Control Protocol","volume":"6","author":"Dykeman","year":"1988","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/0169-7552(91)90087-S_BIB22","series-title":"Teletraffic Issues in an Advanced Information Society ITC-11","first-page":"634","article-title":"Mean Waiting Time for a Token Ring with Nodal Dependent Overheads","author":"Ferguson","year":"1985"},{"issue":"12","key":"10.1016\/0169-7552(91)90087-S_BIB23","doi-asserted-by":"crossref","first-page":"1130","DOI":"10.1109\/TC.1984.1676391","article-title":"Demand Assignment Multiple Access Schemes in Broadcast Bus Local Area Networks","volume":"33","author":"Fine","year":"1984","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/0169-7552(91)90087-S_BIB24","series-title":"Stochastic Analysis of Computer and Communication Systems","first-page":"659","article-title":"Polling Mechanism Models in Communication Systems\u2014Some Application Examples","author":"Grillo","year":"1990"},{"key":"10.1016\/0169-7552(91)90087-S_BIB25","series-title":"Performance Analysis of Local Computer Networks","author":"Hammond","year":"1986"},{"key":"10.1016\/0169-7552(91)90087-S_BIB26","series-title":"Modeling and Analysis of Computer Communications Networks","author":"Hayes","year":"1984"},{"issue":"8","key":"10.1016\/0169-7552(91)90087-S_BIB27","doi-asserted-by":"crossref","first-page":"2547","DOI":"10.1002\/j.1538-7305.1983.tb03193.x","article-title":"Data-Transport Performance Analysis of Fasnet","volume":"62","author":"Heyman","year":"1983","journal-title":"Bell Syst. Tech. J."},{"issue":"2","key":"10.1016\/0169-7552(91)90087-S_BIB28","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/0140-3664(87)90102-2","article-title":"Performance Comparison of Explicit and Implicit Token-Passing Networks","volume":"10","author":"Ibe","year":"1987","journal-title":"Computer Communications"},{"issue":"3","key":"10.1016\/0169-7552(91)90087-S_BIB29","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0169-7552(85)90045-5","article-title":"Hybrinet: A Hybrid Bus and Token Ring Network","volume":"9","author":"Ibe","year":"1985","journal-title":"Comput. Networks ISDN Systems"},{"key":"10.1016\/0169-7552(91)90087-S_BIB30","series-title":"Proposed IEEE Standard 802.6\u2014Distributed Queue Dual Bus (DQDB)\u2014Metropilitan Area Network (MAN)","year":"1989"},{"key":"10.1016\/0169-7552(91)90087-S_BIB31","first-page":"46","article-title":"Performance Analysis of a Token Bus Priority Scheme","author":"Jayasumana","year":"1987","journal-title":"IEEE INFOCOM '87"},{"issue":"2","key":"10.1016\/0169-7552(91)90087-S_BIB32","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1109\/26.2755","article-title":"Comment on \u201cPerformance of Single Access Classes on the IEEE 802.4 Token Bus\u201d","volume":"36","author":"Jayasumana","year":"1988","journal-title":"IEEE Trans. Commun."},{"issue":"6","key":"10.1016\/0169-7552(91)90087-S_BIB33","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1109\/26.31140","article-title":"Throughput Analysis of the IEEE 802.4 Priority Scheme","volume":"37","author":"Jayasumana","year":"1989","journal-title":"IEEE Trans. Commun."},{"issue":"6","key":"10.1016\/0169-7552(91)90087-S_BIB34","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1109\/TCOM.1987.1096832","article-title":"Proof That Timing Requirements of the FDDI Token Ring Protocol Are Satisfied","volume":"35","author":"Johnson","year":"1987","journal-title":"IEEE Trans. Commun."},{"issue":"7","key":"10.1016\/0169-7552(91)90087-S_BIB35","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1109\/TCOM.1980.1094751","article-title":"Packet Switching in Radio Channels: New Conflict-Free Access Schemes","volume":"28","author":"Kleinrock","year":"1980","journal-title":"IEEE Trans. Commun."},{"issue":"3","key":"10.1016\/0169-7552(91)90087-S_BIB36","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1002\/j.1538-7305.1988.tb00252.x","article-title":"SNA\/SDLC Performance over ISDN Frame-Relay, Virtual-Circuit Data Networks","volume":"67","author":"Kumar","year":"1988","journal-title":"AT&T Technical Journal"},{"key":"10.1016\/0169-7552(91)90087-S_BIB37","first-page":"163","article-title":"Distributed Loop Computer Networks","volume":"17","author":"Liu","year":"1978"},{"issue":"1","key":"10.1016\/0169-7552(91)90087-S_BIB38","first-page":"166","article-title":"The Efficiency of N Machines Uni-Directionally Patrolled by One Operative When Walking Time and Repair Times Are Constants","volume":"19","author":"Mack","year":"1957","journal-title":"Journal of the Royal Statistical Society"},{"key":"10.1016\/0169-7552(91)90087-S_BIB39","series-title":"Computer Network Architectures","author":"Meijer","year":"1982"},{"issue":"3","key":"10.1016\/0169-7552(91)90087-S_BIB40","first-page":"330","article-title":"Evaluation of HDLC-NRM Terminal Accomodation Methods in Packet Switched Networks","volume":"J65-D","author":"Nomura","year":"1982","journal-title":"The Transactions of the Institute of Electronics and Communication Engineers of Japan"},{"key":"10.1016\/0169-7552(91)90087-S_BIB41","first-page":"796","article-title":"Throughput Analysis of a Timer-Controlled Token-Passing Protocol under Heavy Load","author":"Pang","year":"1988","journal-title":"IEEE INFOCOM'88"},{"key":"10.1016\/0169-7552(91)90087-S_BIB42","first-page":"332","article-title":"Generalized Access Control Strategies for Token Passing Systems","author":"Pang","year":"1989","journal-title":"IEEE INFOCOM '89"},{"issue":"7","key":"10.1016\/0169-7552(91)90087-S_BIB43","doi-asserted-by":"crossref","first-page":"694","DOI":"10.1109\/26.31161","article-title":"Throughput Analysis of a Timer Controlled Token Passing Protocol under Heavy Load","volume":"37","author":"Pang","year":"1989","journal-title":"IEEE Trans. Commun."},{"issue":"4","key":"10.1016\/0169-7552(91)90087-S_BIB44","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/0140-3664(79)90091-4","article-title":"Survey of Computer Communications Loop Networks: Part 1","volume":"2","author":"Penney","year":"1979","journal-title":"Computer Communications"},{"issue":"5","key":"10.1016\/0169-7552(91)90087-S_BIB45","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/0140-3664(79)90005-7","article-title":"Survey of Computer Communications Loop Networks: Part 2","volume":"2","author":"Penney","year":"1979","journal-title":"Computer Communications"},{"issue":"5","key":"10.1016\/0169-7552(91)90087-S_BIB46","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MCOM.1986.1093085","article-title":"FDDI\u2014a Tutorial","volume":"24","author":"Ross","year":"1986","journal-title":"IEEE Commun. Mag."},{"issue":"7","key":"10.1016\/0169-7552(91)90087-S_BIB47","doi-asserted-by":"crossref","first-page":"1043","DOI":"10.1109\/49.44552","article-title":"An Overview of FDDI: The Fiber Distributed Data Interface","volume":"7","author":"Ross","year":"1989","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/0169-7552(91)90087-S_BIB48","article-title":"Multiplexing Techniques for Data Transmission over Packet Switched Radio Systems","author":"Scholl","year":"1976"},{"key":"10.1016\/0169-7552(91)90087-S_BIB49","series-title":"Computer-Communication Network Design and Analysis","author":"Schwartz","year":"1977"},{"key":"10.1016\/0169-7552(91)90087-S_BIB50","series-title":"Telecommunication Networks: Protocols, Modeling and Analysis","author":"Schwartz","year":"1987"},{"issue":"3","key":"10.1016\/0169-7552(91)90087-S_BIB51","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1109\/TSE.1987.233169","article-title":"Cycle Time Properties of the FDDI Token Ring Protocol","volume":"13","author":"Sevcik","year":"1987","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/0169-7552(91)90087-S_BIB52","article-title":"Optimal Control of a Signalized Intersection, Part I: Introduction: Structure of Intersection Models, Part II: Determining the Optimal Switching Policies, and Part III: Descriptive Stochastic Models","author":"Stidham","year":"1969"},{"issue":"5","key":"10.1016\/0169-7552(91)90087-S_BIB53","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1147\/rd.275.0481","article-title":"A Local Communications Network Based on Interconnected Token-Access Rings: A Tutorial","volume":"27","author":"Strole","year":"1983","journal-title":"IBM J. Res. Dev."},{"key":"10.1016\/0169-7552(91)90087-S_BIB54","first-page":"655","article-title":"Analysis of the Communications Aspects of an Inquiry-Response System","volume":"35","author":"Sykes","year":"1969"},{"key":"10.1016\/0169-7552(91)90087-S_BIB55","series-title":"Analysis of Polling Systems","author":"Takagi","year":"1986"},{"issue":"1","key":"10.1016\/0169-7552(91)90087-S_BIB56","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/62058.62059","article-title":"Queueing Analysis of Polling Models","volume":"20","author":"Takagi","year":"1988","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/0169-7552(91)90087-S_BIB57","series-title":"Stochastic Analysis of Computer and Communication Systems","first-page":"267","article-title":"queueing Analysis of Polling Models: an Update","author":"Takagi","year":"1990"},{"key":"10.1016\/0169-7552(91)90087-S_BIB58","series-title":"Performance '90","first-page":"363","article-title":"Effects of the Target Token Rotation Time on the Performance of a Timed-Token Protocol","author":"Takagi","year":"1990"},{"key":"10.1016\/0169-7552(91)90087-S_BIB59","series-title":"Computer Networks","author":"Tanenbaum","year":"1988"},{"issue":"8","key":"10.1016\/0169-7552(91)90087-S_BIB60","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1109\/TCOM.1976.1093393","article-title":"Packet Switching in Radio Channels: Part III \u2014 Polling and Dynamic Split-Channel Reservation Multiple Channel Access","volume":"24","author":"Tobagi","year":"1976","journal-title":"IEEE Trans. Commum."},{"key":"10.1016\/0169-7552(91)90087-S_BIB61","series-title":"Local Computer Network Technologies","author":"Tropper","year":"1981"},{"issue":"3","key":"10.1016\/0169-7552(91)90087-S_BIB62","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1109\/TC.1985.1676564","article-title":"Load Sharing in Distributed Systems","volume":"34","author":"Wang","year":"1985","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/0169-7552(91)90087-S_BIB63","series-title":"Proceedings of the Symposium on Computer-Communications Networks and Teletraffic","first-page":"29","article-title":"Traffic Flow in a Distributed Loop Switching System","author":"Yuen","year":"1972"}],"container-title":["Computer Networks and ISDN Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016975529190087S?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016975529190087S?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T07:24:34Z","timestamp":1552634674000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/016975529190087S"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991,10]]},"references-count":65,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1991,10]]}},"alternative-id":["016975529190087S"],"URL":"https:\/\/doi.org\/10.1016\/0169-7552(91)90087-s","relation":{},"ISSN":["0169-7552"],"issn-type":[{"value":"0169-7552","type":"print"}],"subject":[],"published":{"date-parts":[[1991,10]]}}}