AD-Ai32 989 AN INVESTIGATION INTO THE COUPLING OF INTERACTIVE AND 1/3BATCH NETWORK SERVICES IN COINS(U) NAVAL POSTGRADUATE
UNCA17SIFEDSCHOOL MONTEREY CA J 8 KIM JUN 83 FG92 N
00
NAVAL POSTGRADUATE SCHOOLCID Monterey, California
THESIS A
AN INVESTIGATION INTO THE COUPLINGOF INTERACTIVE AND BATCH NETWORK SERVICES .-
IN COINS
by
Joanne Bong Soon Kim
June 1983
CDTrhesis Advisor: N.F. Schneidewind
-~j
t1.Approved for public release; distribution unlimited.
* ~~SECURITY CLASSIFICATION OP THIS PAGE (Urn., oe asmloo_________
PAGE READ INSTRUCTIONSREPORT DCUMENTATION PAG RFORE COMPLETING FORM
I. WIPQ1RTRUNN. GOVT ACCESSION No 3. RECIPIaNT'S CATALOG NUMBER
4. TITLE (OW &I*) S TYPE Of REPORT & PERIOD COVERED
*An Investigation Into The Coupling of Master's Thesis;Interactive and Batch Network Services June 1983in COINS 41. PERFORMING ONG. REPORT NUNSER
7- AUTHOR(A) 11- CONTRACT OR GRANT NUUSER(o)
Joanne Bong Soon Kim
SPERFORING ORGANIZATION NAME AND ADDREISS W0 PROGRAM ELZMENT. PROJECT. TASK* AREA & WOPIC UNIT NUMISERS
Naval Postgraduate SchoolMonterey, California 93940
I I. CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE
*Naval Postgraduate School June 1983Monterey, California 93940 13. NUMSER OF PAGES
___ ___ ___ ___ __ ___ ___ ___ __ ___ ___ ___ __ 194
14- MONITORING AGENCY NAME 6 AODRESS(H d~throut krn Controllng OfiSce) IS. SECURITY CLASS. (of this report)
Unclassified5se. DECLASSIFICATION' OWNGRADING
SCHEOuLE
16. 0STRIW@VTION STATEMENT (of tis Aen)t
Approved for public release; distribution unlimited.
17. 0DSTA111UTION STATEMENT (1of Mebet 0aot 8td In DWoob It diff.,mt bass Repot)
IS. SIJPP14.MSN9TARV NOTES
IS. KEy WRNDS (Coalkoe aooo sidesof Necesar aowpd idmlS* by block Memnber)
NetworksInformat ion-sharingBatch and Interactive CouplingSimulation
W 4 AISTRACT (Cmffirne FOPWO reersldo it necessary sad ides.Qei by block numb.)
Networks were conceived in the 19501s, born in the 1960's* and grew up in the 1970's. Today they consti6tute a technology
with applications in a myriad of disciplines. Informationsharing has been one of the areas greatly aided by computernetworks. The Community On-Line Inteliigence System (COINS)is an information sharing network in the U.S. intelligencecommunity. COINS offers batch and interactive services which
DO 0 1073 EDTION OF I Noy es is oSSLETE
S/N 0102- LP. 014- 6601 SECURITY CLASSIFICATION OF T1418 PAGE (When Dote Bate,.e
IS MV CLASUPICATION OF THUS PAOS (m DOS Bmftt
are separate and independent of each other. The informationacquisition process has elements of interactive and batch.The design of an information sharing network should provideI.the foundation to accommodate this two-phased activity.- Thisthesis introduces the concept of collaboration between theseautonomous network services, proposes a re-allocation ofnetwork capacity in COINS and examines how this new schemecan improve performance and efficiency from a user andmanagerial perspective.
SIN~A cr- 012-L- 1-60
2~
SICURITY CLASSIFICATIO04 OP TWIS PAGWfUS. DOP Dmeetd)
Approved for public release; distribution unlimits-A."
An Investigation Into The Couplingof Interactive an Batch Network Servicesfn COINS :>
by
Jcanne Bong Soon Kim
B.A., University of Hawaii, 1966
Submitted in partial fulfillment of therequirements for the degree of
MASTER OF SCIZNCE IN SYSTEMS TECHNOLOGY(Command, Control and Communications)
from the
NAVAL POSTGRADUATE SCHOOLJune 1983
Author: 44,
Approved by: -Z"-Thesis Advisor
Second Reader
Chairman, com d nrland
ommunications Academic GrCup
Academic Dean
3. °-
& BSTR&CT
Netvwcks were ccnceived in the 1950's, born in the
19601s and grew up in the 19709s. To4ay they constitute a
technology with applications in a myriad of disciplines.
Informaticn sharing has been one of the areas greatly aided• "by computer networks. The Community On-Line Intelligence
System (COINS) is an information sharing network in the U.S.
intelligence community. CCINS offers batch and interactiveservices which are separate and independant of each other.The inforzation acquisition process has elements of interac-
tive and batch. The design of an information sharingnetwork should provide the foundation to accommodate thistwo-phased activity. This thesis introduces the concept of
collatoraticn between these autonomous network services,proposes a re-allocation of network capacity in CCINS andexamines how this new scheme can i2prove performance and
efficiency from a user and managerial perspective.
g4
5Z.
IABLE CF CONTENTS
" 'I. I IDCCIUCTION .................. 11I.o THE CaINS NETWORK . . . . . . .. 13
A. TB!Cciis NE . . . . . . . . . . . . . . . .. . 13
E. CURRENT SYSTEM . . . . . . . . . . . . . . . . 16
C. FUTURE PLANS .. ........... ... . 16
III. 11TUCRK CONFIGORATION . . . . . . . . . . . . . . 19
A. THE SUBNET ENVIRONMENT . . . . . . . . . . . . 19
B. HARDWARE NVIRONENT . ........... 19
C. SOFTWARE ENVIRONMENT . . . . . . . . . . . . . 20
IV. USE SERVICES ............... 2
A. BATCH SERVICES . . . . . . . . . . .... 22
B. INTERACTIVE SERVICES . . . . . . . . . . . . . 22
1. Intelligence Databases . . . . . . . . . . 22
2. User-Support Databases . 23
3. Managerial and Administrative Databases 25
V. NEIHCDOLOGY .................. 26
VI. USER PROFILE INALYSIS . . . . . . . . . . . . . * 28
A. GENERAL wee . ease .. . . . .. e e a . 28"0 B. MODEL DESCRIPTION. . . .. .. . ... . .. 31
C. TIME-LIVE INSPECTION . . . . . . . . . . . . . 341
VII. AN ALTERNATIVE APPROACH:COUPLING OF INTERACTIVE
AND EATCH a e e a e a . e e o a 38
VIII. THE NETWORK SERVICES MODEL . . . . . . . . . . . . 42
--* A. ESIGN GOILS AND CONSIDERATIONS ...... 42
B. HARDWARE AND SOFTWARE ENVIRONMENT . 46
C. FUNCTIONAL DESIGN . . . . . . . . . . . . . . 47
1. Customer Arrival . . . . . . . . . . . . . 47
5
"K Q . .o. -,.- ... " ; .. - .. ' . . .• . . . . .•. . . . ... . . . . .. . . . -
2. Resour.ce Selectiono . . ........ 48
3. Service Profile . . . . . . . . . . . . 48
4. High-Speed Queueing Discipline . . . ; . 50
D. INTERNAL DESIGN . . . . . . . . . . . . e 51
1. Overall Structure ............ 51
2. Event Handling . . . . . . . . . . . . . . 56
3. Data Structures . . . . . . . . . . . . . 60
P. TRELIKINAFY RESULTS . . . . . . . . . . . . . 63
F. MODEL VALIDATION . . . . . . . . 69
G. MODEL APPLICATIONS .............. 70
IX. CCIPARETIVE ANALYSIS . . . . . . . . . . . . . . . 71
I. CCECLUSIONS AND RECOMHENDATIONS . . . . . . . . . 80
A. SUMMARY . . .. . . .. . . . . . . . . .. . 80
1. Current Environment ........... 80
2. Pcpulation Growth ............ 80
3. Data Transfer Growth . . . . . . . . . . . 81
4. Review . . . . . . . . . . . . . . . . . . 82
B. CONCLUSIONS ................. 82
C. RECOMMENDITIONS . . . . . . . . . . . . . . . 83
APPENDIX A: EMPIRICAL DATA ANALYSIS .8.4........
APPENDIX E: OPERATING INSTRUCTIONS FOR INS MODEL .... 89
A. HOST CHARACTERISTICS . . . . . . . . . . . . . 89
S. NETWORK CCNFIGURATION . . . . . . . . . . . . 90
C. AS AND SEUVER-TAS CHARACTERISTICS ...... 91
APPENDIX C: TABLES CF RESULTS . . . . . . . . . . . . . 93
APPENDIX 1: SYSTEM TIME AND EXPECTED LOSS CHARTS . . . . 96
APPENEIX I: FIVE TO EIGHT TAS CONFIGURATION ..... 117
APPENDIX F: EVENT LCGIC DIAGRAMS . . . . . . . . . . . 120
6
&PPIUCII G: INlS PROGEAM LISTING . . . . . . . . . . . 132
INITI S2IAEIIJTIOILLST.IS..T ... .. .... . . 193
LIST OF TABLES
I. TAS operating characteristics . . . . . . . . . . 63
II. Increasing arrival rates . . . . . . . . . . . . . 65
II. Increasing data transfer sizes . . . . . . . . . . 67
IV. flcdel validation results . . . . . . . . . . . . . 69
V. Adding a TAS tc the netork ........... 72
VI. Propcrtion of interactive use . . . . . . . . . . 75
VII. Ranges of system times and expected loss . . . . . 76
VIII. Ranges of proEcrtion of interactive use . . . . . 77
IX. Condensed Comparison Chart . . . . . . . . . . . . 82
X. SCLIS interactive-only time analysis . . . . . . . 8
XI. SCLIS interactive time analysis . . ....... 85
XII. SCIIS data transfer time analysis . . . . . . . . 86
XIII. TASI inter-arrival time analysis . . . . . . . . . 86
XIV. UZS2 inter-arrival time analysis . . . . . . . . . 87
IV. TAS3 inter-arrival time analysis . . . . . . . . . 87
XVI. !AS4 inte--arrival time analysis . . . . . . . . . 88
XVII. Five TkS configuration .............. 93
XVIII. Six TS configuration . . . . . . . . . . . 94
XIX. Seven TAS configuration . . . . . . . . . . . . . 94
XX. Eight TAS configuration . . . . . . . . . . . . . 95
XI1. 5 UIS, 89,018 characters: expected transfer
amcunt 97.920.characters:...117
XXII. 5 lAS, 97,920 characters: expected transfer
acunt 173 ..71.characters:..x118
XXIII. 5 lAS, 107,712 characters: expected transfer
48
ascunt 118XXIV. 5 7AS, 173,471 characters: expected transfer
amount . . . . . . . . . .. 119
XXV. 5 7AS, 190,818 characters: expected transfer
amount .. . . . . . . . . . . . . .. . 119
. - . • o . . . ..8
LIST OF FIGURES
2.1 Criginal COINS configuration . . . . . . . . . . 114
2.2 Current COIlS-I configuration . . . . . . . . . 17
6.1 Cne populaticn source to SOLIS . . . . . . . . . 32
* 6.2 FcUr populaticn sources to SOLIS . . . . . . . . 33
6.3 2-Stage service facility . . . . . . . . . . . . 35
6.4 Time-Line diagram of 1 retrieval session . . . . 36
6.5 Tize-line of 3 retrieval sessions . . . . . . . 37
7.1 SOLIS as a 2-node tandem network ........ 39
7.2 Time-line with 1 data and 2 interactive paths . 408.1 Initial State ................. 53
8.2 State 2 . .. .. . .. . . . . . . . . . . . . 53
8.3 State 3 . .... .. ... . .. .. . .... 54
8.4 State 4 . . . . . . . . . . . . . . . . . . . . 54
8.5 State 5 . . . . . . . . . . . . .. . . . .. . 55
8.6 State 6 . . . . . . . . . . . ..... .... 55
8.7 State 7 . . . . . . . . . . 0 0 56
8.8 System times with increasing arrival rates . . . 66
8.9 System times with increasing transfer sizes . . 68
9.1 System times with increasing TASs ....... 73
9.2 Expected loss rate . . . . . .......... 74
D.1 system times with 89,018 characters . . . . . . 97
D.2 Expected loss with 89,018 characters ...... 98
D.3 System times with 97,920 characters . . . . . . 99
D.4 Expected loss with 97,920 characters . . . . . 130
0.5 System times with 107,712 characters . . . . . 101
D.6 Expected loss with 107,712 characters . . . . 102
D.7 System times with 118,483 characters . . . . . 103
D.8 Expected loss with 118,1183 characters . . . . 10 4
D.9 System times with 130,331 characters . . . . . 105
D.10 Expected loss with 130,331 characters 0 a 0 0 106
9
* * * ~ ***.*'..K---:-J..:..w:;.% Ii'i-. . -.
1i System times with 143,364 characters ,. .. 107
D. 12 Expected loss with 143,364 characters ... 108
D.13 System times with 157,701 characters . . . . . 109
D.14 Expected loss with 157,701 characters .... 110D.15 Systm ties ith 173,471 characters . . . . .11
D.16 Expected loss with 173,471 characters .... 112
D.17 System times with 190,8 18 characters . .113
D.18 Expected loss with 190,818 characters . 0 . 114
D.19 System times with 209,900 characters . . ... 115
D.20 Expected loss with 209,900 characters . ... 116
F.1 MAIN oR.I . e . . . * * . * e . e . . e e . . . 122
P.3 A AHEPRRIVAL . . . . . . . . . . . . . . . . . 123
F.5 UC.IERIVAL . . . . . . . . . . . . . . . . . . 125
F.6 SC.ARRIVkL . . . . . . . . . . . . . . . . . . 126
P.7 SC.DRPkRT .................. 127
P.8 SC.DZPART (ccntinuaticn 1) . . . . . . . . . . 128
P.9 SC.DEPART (ccntinuati4on 2) . . . . . . . . . . 129
F.10 ITHDEP&ET . . . . . . . . . . . . . . . . . . 130[.1.1SIG 3
10
.0
I. _! 10.QUCTIO!
In recent years* we have witnessed changes in informa-
tion searching and sharing practices. With the dramatic
decrease in digital technology and the concomitant advance-
ments in computing and communications, we have seen the
birth of the new technology cf networking. Like any tool,
which is viewed as a solution to a problem, so too
netwcrking and in its many forms has been brought to bear on
a variety of problems [Ref. 1], [Ref. 2]. Information
sharing has been one cf the areas greatly aided by this new
technology. It is now possible to have real-time interac-
tive access to massive amounts of information around the
globe at the touch of one's finger-tips. There are numerous
informaticn sharing networks in private industry, the
Department of Defense (DoD) and other government agencies.
• One of these is the Community On Line Intelligenc. System
(COINS) which interccnnects on-line information storage and
retrieval systems iccated at several locations within the
U.S. Intelligence Ccmmunity. COINS provides world-wide
access tc these information resources.
There was a point when the general belief was that all
network access of the future would be interactive with a
demise of batch processing. However, this view has been
ameloriated after a close inspection of the user needs.Batch prccessing is still very useful and desirable. Inmany cases, a batch facility can enhance the analytic use of
interactive services. COINS has both batch and interactive
network facilities, but they are separate and independent.
In each domain, we can envisage users attempting to use
each facility to do tcth interactive and batch work. What
is called for is some type of coupling of interactive and
. .. 11
a e " " .° . .'.. ." . - .L°.j• .1"L.J.2-i1 -. • . . .... . . .. .
batch network capabilities which matches users' needs. The
purpcse of this thesis is tc introduce the concept cf cclla-
boration between otherwise autonomous operations and to
study a scheme reflecting this synergetic notion. We will
examine what effects this has on performance and efficiercy
from a user and manager perspective. We have designed and
implemented a computer simulation of the flow of user
requests to the interactive facility in COINS to help study
the merits cf the twc approaches.
This thesis is organized as follows:
1. description of the COINS network, its architecture and
its current implementation techniques for interactive
information sharing;
2. discussicn of the evaluation criteria for network
Ferfcrmance;
3. presentation cf an alternate proposal with discussion
of how this new scheme is likely to improve interac-
tive informaticn sharing;
4. description of the interactive network services simu-
lation model;
5. discussion of preliminary results using the 3odel;
6. discussion of the simulation model's applicabili.y in
evaluating an alternative capacity allocation strat.gy
as COINS grows; and
7. ccnclusions and recommendations.
12
:;':::::,:'::' .......... ':' ..........;:.,:..........--:"-.--: - ,... . . ... . .. . . ......
1i. ZU GOINS P-22
1. BZCECOIUND
The Ccmunity On line Intelligence System was establised
on the recommendation of the President's Foreign
Intelligence Board (EPIB) in June 1965 to improve informa-
tion handling methods. The implementation plan called for a
star-configured netwcrk to provide connectivity amcng the
intelligence data prccessors. The concept was to permit an
analyst sitting at his local terminal to access infcrmationeither at his host processor or at a remote centralprocessing unit (cpu). The participants were the Central
Intelligence Agency (CIA), the Defense Intelligence Agency
(DIA), the National Security Agency (NSA), the Nat'onalPhotographic Interpretation Center (NPIC) , the StateDepartment, and the National Indications Center (NIC). The
store-and-forward message switching node was physically
Iccated at DIA. igure 2.1 shows the original COINS
configuraticn. Implicit in this concept was the requirementfor an intelligence crganization to have a cpu connected to
the COINS-switch to access information in COINS. The State
Department and NIC did not have cpus in COINS. Hence access
for tkese two organizations and any others that did not have
cpus was by prccuring a terminal from one of the hcst
processors in the network.Each of the nodes offered the same batch query and
retrieval services to the network as they did to their local
users. Users wculd submit their network queries at theirlocal terminals and some time later would receive their
responses. Depending on the data manipulation tools of the
host, the responses would range from simple data record
13
1'
terminals terminals
I! I
.. ... cp@
-i IDl IkNPIC
jel COINS SWITCH l
11
-- Icpu Cpu
[" ~~~I *... ....
I.I1oig ra.1ls gnl oi confgurainl
.
_. ,. . ....... . ... ,..... .. ....%* * * ... * . . . . . . .. . .:. -'-, ".. .',-.. , --* -2.' .. '-- . '. . '. -',-*','*.*.' - ... - . -. . -... '- . ... .. " .. . . . . . " •
listings to some statistical summaries of numeric informa-
tion.
Over the years CCINS access and participation expanded
with a netting of several military commands under the
management cf DIA. It was called the Intelligence Data
Handling S7stem, Ccmmunications (IDHSC). Its form wassimply the extension of the star-configuration.
By 1975, significant developmeats in teleprocessing
provided the necessary impetus for COINS to move to the next
chapter in networking with the introduction of new network
services. COINS assimilated into its architecturs the
following:
1. the Advanced Research Projects Agency's (ARPA)
networking technology of packet-switching;
2. the Sigint On Line Information System (SOLIS), an
interactive, full-text retrieval system;
3. a user-Terminal Access System (TAS); and
4. Front-Ead processors which connect the database cpu's
tc the new networking technology.
The concept of a TAS was necessitated by a grcwjng
number cf intelligence organizations without Cpus that
wanted access to COINS. This requirement was further rein-
forced by the private sector idea of relieving the database
hosts of terminal handling functions and putting all user
interfaces cn a separate facility. The TAS provides beth
batch query services to the batch hosts and interactive
query services tc the interactive host. with the adoption
of this new technology and services, the network was named
COINS-II. The IDHSC component of COINS kept the star-
configuraticn.In 1976, COINS-II undertook an internetting experiment
with the ARPANET, installing a TAS in Hawaii. As a result
the Pacific Command (PACO) now has secure inte:act1ve
access tc the full-text retrieval system.
15
By 1S80, COINS-II introduced a new kind of TAS. ih Ile
the original TAS is a pure user which does not offer any
databases tc the network, this new TAS has on-line user
support functions and network management information. This
type cf TAS will be denoted as a server-TAS.
B. CRRINT SYSTUR
Figure 2.2 is a picture of COINS-II today. Currently
there are two ZASs, two server-TASs, one interactive, full-
text retrieval host, and five batch retrieval hosts. The
user TASs are called TAS and AKU. The first TAS retained
the name lAS. The server-TASs are called NSH (Netwcrk
Service Hcst) and TIP (Transfer Research Facility). With
the COINS/FMO develcping a family of TASs, the NSH has
evolved intc a MASTEB-TAS, similar to the concept of the
MASTER-IIRE in AREA technology whereby sof4tware releases and
remote debugging are done. NSH also supports a small cadre
of operaticnal users. TRF is the COINSts developmental
* facility where research ideas can be developed and tested in
an operational ervircnment. The user-support system resides
on TRE. No0 intelligence analysts are supported by TRF. The
database losts have Front-Ends (PEs) to connect them tc the
communicaticns network. Each retrieval system has its cwn
language and each data file has its own coding schemes. As
part of the ARPANET technology, there is a Network Ccnr-rol
Computer 4NCQ for the communications network mcnitorinq and
management.
C. PUTUIR HAINS
Vith respect to network growth, the COINS/P150 antici-
pates two more interactive server-hosts and four more TASs
by 1985 [Ref. 3]. In the area of network services, the
COINS/EMC has a joint effort w~th the Department of the Army
16
- r~ 47 77 W -. -W - .;. - --- V -; -. C 4- t-a a
BATCH BITCH
MCC TAS ISH TRF HOSTI SOLIS HOST2
subnetvork I
'a !
---. -----------
I azpanet I
a. IAU swi-ichl
terminal BAICH EATIH terminalaccess HOST3 HCST4 access isystem system switch2
I (te-minal accesssystem)
BAICH BAICHHOST5 HOST6
igure 2.2 Current COINS-I configuration.
17
in data fusion analysis [Ref. 4]. For temutipiq quer
language problem, COINS is continuing in effort called.ADAPT
which is a network larguage that users would employ. ADAPT
would make the appropriate transforms to the target
languages. The COINS organization is working with the
Center fcr Computer Security at NSA on the multi-level
security problems in networks and in inter-networks. COINS
also has several AEPA-sponsored efforts in ths area of
human-factors engineering for the network user. Here the
concern is with the work environment and the develcpment of
an intelligence analyst work-station of the future (Ref. 5].
18
a.2.
Netvcrk configuration is a combination of commurica-
tions, hardware and software. These components are
discussed in this charter.
A. TB! SUBNE RIVIROUUET
When the term "sub-network', is used below, it will mean
the communications technology supporting host connectivity.
The sub-network configuration of COINS-II is the packet-switching technology of ARPANET. The six IMPs (Interface
Message Frocessors) are distributed over five sites in the
Washingtcn, D.C. area and are connected by 56 kilobit/second
phone lines. The IMPs are a mix of Honeywell- 316s and
C-30s. With the use of a special gateway (GW) and a pair
cf private line interfaces (PLIs), COINS-II is internetted
Swith the ARPANET, resulting in connectivity to Hawaii.
There are 15 hosts in COINS. There are seven intelligence
database cpus (cne interactive and six batch) and seven
terminal access systems (four TASs as described in theprevious chapter, three developed under IDHSC). The last
host is the ?etwcrk Ccntrol Computer.
B. BHSIMBE EBNTIROIU8UT
At the lowest level, the subnet capacity is 56 KB/s.
This is the physical maximum data transmission rate of the
telepbhcne lines. The boxes contributing to the effective
throughput are the communications crypto equipment, the
IaPs, the frcnt-end processors and the hosts. Each of thesecomponents have related software to make them perform their
network functions, and in the case of the cpus their user
services functions.
19
During the installation testing phase of the pack-t-
switching subnet in 1972, effective data throughput
measurements were in the 28-32 KB/s range. The configura-
tion for this testing included PDP-11 cpus connected to the
IMPs. Ill the PDrs had an LH/DH interface unit that
permitted connection to their IMPs according to the BBN 1822
specificaticns for interconnection of a host to IMP. Each
of the cpus had a simple data generation program. The range
of the thrcughput measurements was attributed primarily to
the differing cpu capacities of the PDP 11/40s, PDP 11/45,
and PCP 11/70. 7he next testing level had the same physical
configuraticn but different software environments. The PDP
11/40's were running under ELF-I. the PDP 11/45 was running
under BSX-11 and the PDP 11/70 was running under UNIX. For
each cf these systems, there was an Network Control Prcgram
(NCP) tc handle the host-to-host protocol as specified by
the IEPANET. There was also an application program that
served as a data generatcr. the effective throughput
measurements from this test were in the range of 15 to 20
KB/s. All of these throughputs excludes the host-to-host
protocol overhead.
Since these ueasurements were taken, two server-TASs and
cne lAS were added tc COINS. The TASs are configured to
handle 16 to 64 terminals. These are Teletype Model-40
terminals with CRT, keyboard and printer, and operate in
full-duplex at 2400 baud. The printer is slaved to the CET.
The one data-receive line is directed to the CRT.
C. SOPTUA22 INTIRONNINT
The software environment may be viewed as a trinity
consisting cf ths operating system, the applicaticn software
and the network software. At system generation time, t hese
three ccmponents define the number of ports with which the
20
cpu will perform netvcrk business. For example, a certainamount of memory is allocated for the operating system, theapplication software and the networking software. Insuppcrt cf natvcrk servic9s, a specific amount cf systembuffers is allocated. The number of system buffers in turndefines the number of simultaneous network connections a cpucan handle. Currently all TASs, including the server-TASs
have an interactive network capacity of 24 ports. SCLIS,the interactive datatase resource in COINS, has a netwcrk
capacity cf 15 pcrts.
21
° °, * o" ° ° '.' '. ........° ' , i , ° ." °, o".2, , .. °' ..& . . .
SCLIS, VSH and TRF offer interactive access. The
remaining six intelligence database hosts provide only batch
access. Both batch and interactive are discussed in thischapter.
A. BATCH SURVICES
Use of batch query systems involves a user inputting the
query at the local host and sending it to the remote system.
He then receives a job number or receipt for the query.
Some time later, which can range from minutes to days, the
query response is delivered to the terminal. Responses arepresented to TAS users only if they are logged on to a TAS
and specifically request to see the response.
B. INTERICTIVE SERVICES
The three funticnal interactive services available in
COINS-II today are: intelligence database (SOLIS), user-
support databases (USIS) , and managerial and admrnistrative
databases (BUIS) as explained below.
1. ~Databases
a. General
SOLIS is a partially formatted full-text search
and retrieval system. It contains the last 13 months of
messages and reports produced by the intelligence crganiza-tion. Searching can be done on the formatted fields ard on
the full text in any combination with the normal boclean
operators.
22
- . * . . . . * . .
k. Exchange Discipline
The data exchange between SOLIS and the user is
fall screen. After successful logon, the user is presented
with a form-screen where he can fill in the blanks with his
search terms fo: the full text and the formatted fields.
The user has three different form-screens to choose f:cm.
They are the aND-screen, the 0-screen, and the FREE-screen.
In the AND-screen, the search terms are ANDed together;
while in the OR-screen, the search terms are ORed together.
In the FREE-screen, the user may compose his own boclean
logic of the search terms. Within the AND- and OR-screen,
use of parenthesis is permitted to achieve combinations of
ANDs and CBs. after he has completed filling-in-the-blanks,
the query screen is then forwarded to SOLIS. The response
from SOLIS is again a full screen with the query the user
sent plus the number of messages that satisfied the search.
There is a blank area for the user to fill in, telling SOLIS
what should be done next. At this stage, the user can:
(1) refine or modify the query and send that again;
(2) request display of titles only;
(3) request display of the formatted fields of the
messages;
(4) request display of full-text of the messages;
(5) reguest a new form-screen;
(6) terminate the session; or(7) request forwarding of titles cnly or titles and
fcrmatted fields or complete messages.
2..L . ratabases
a. General
The User Suppcrt Infozmation System (USIS)
offers a variety of help functions to the network user. it
is an attempt at Computer Aided Instruction (CAI) but not in
23
-J
,.- . = - . " o - " .° * . o . . " •- . . - .. . . . . .. . .. , . . . . .. . -
the sase manner as the University of Illinois's PLATO
system. While PLATC interacts with the user posing ques-
tions and checking the user's answers, USIS is primarily a
one-way ccmmunication to the user. In USIS, the user can
ask for cne of several tutorials on the various languages
and data files in the network and learn how to employ TAS
commands and functions. While in USIS, the user can send
messages to and receive messages frCm User-Cantral
concerning aid he canit find in USIS, problems enccunter d
and ccmplaints. There is a limited amount of browsing and
no refinement of output capabilities.
b. Exchange Discipline
USIS initially sends the user a menu of the
available USIS-commands and waits for a response. The
exchange rule from the user to USIS is one character at atime. First-level ccmmands are norally terminated with a
NEWLINE. Lower-level commands are terminated with a special
sequence cf period (. and NEWLINE .on a line by itselIf.
Having reached this point, exchange between USIS and the
user is as fcllows:
(1) USIS sends a screen cf ata;
(2) user may respcnd with browse command of fcrard,
backward or return to the previous level;
(3) request for hard-copy must be done before reaching
this level. The user must indicate it on his first
ccm2and line.
The tutorials are basically copies of the hard-copy language manuals and file guides. They contain sample
queries and outputs, including badly constructed queries andtheir resultant error messages. It also contains a file of
latest-happenings in the network of interest to the user.
An on-line newsletter is not available yet.
214
- °- ----.
* -*-*3*,-~* nm u iz irr.-traiv Databases
a. General
The Netvczk Management Information System (!IIIS)
contains statistics cn file usages, numbox of queries,
number of atorts, size of responses and network problems.
1t prcvidres some basic matrix and chart displays. There is
limited browsing and no output refinement capabilities.
b. Exchange tiscipline
The lata exchange between NMIS and zhe user is
character at a time, which is terminated by the NEWLII4E ke-y.
After successful logcn, NNIS presents a menu to the use: and
asks for a response. After menu selection, NMIS prompts the
user fez search and display (viewed interactively orforwarded) criteria. This kind of exchange continues unt-il
HIS bas encugh information to proceed wi&th the act-ual work.
25
This thesis is that reconfiguring the COINS interactive
capacity intc one ccnsisting of collaborative interactive
and batch functions can be, under certain conditions, supe-
rior to the current form. We plan to describe the nature of
customer activity with a database as a combination of i6nter-
active and batch. It would make sense for the network to
accommodate this two-phased activity in a manner that offers
the best performance from both user and managerial perspec-
tives. The examination will be confined to the work prcfile
cf the .intelligence analyst. This has been prompted by the
abundance of empirical data in this area and the very little
information available for USIS and N3IS activities. The
procedure outlined bere can also be applied when invrsti-
gating user support and managerial activities. we will then
present a particular reconfigured network capacity scheme
whose performance will be ccmpared with the current method.
The available empirical data regarding TAS-custcmers'
usage of SCLIS was gathered from COINS. The data was
analyzed and statistical tests were performed to determine
the underlying distributions of arrival rates and service
times. The work-profile of a 'typical' network SOLIS
customer was derived from SOLIS logs. TAS logs Frovided
data on the percentage of user requests which required SOLIS
access. Appendix A ccntains the results of this analysis.
We implemented a computer simulation to aid in the
comparative analysis. The distributions developed from the
data were used to drive the stochastic models of the varicus
system ccnfigurations. Sensitivity analysis will be
performed with respect to arrival rates and transaction
service timzs. Th.se two parameters were chosen because of
26
the expectation by the COINS/PRO of increased customer popu-
lation and an in-agency study done on the SOLIS print4ng
requirements. This study's conclusion was that there will
he continued growth in demands for hard-copy output
(Ref. 6].
Measurements will be made of
1. average system time which includes service time and
wait time;
2. expected customer loss; and
3. proportion of interactive work.
The first twc measures are directly related to customer
satisfaction while the last may be of more interest tc the
network and database managers. Users are interested in the
amount of time to accomplish a job. This is the total
system time which includes both the service and wait time.
They alsc anticipate an available server when they arrive
for service. If the facility is busy when the customer
arrives, he is lost to the system. If the facility is busy
too cften when the customer arrives, it will discourage
system use and cause severe customer dissatisfacticn.
Althcugh tanagers are ultimately interested in customer
satisfaction, they also focus their attention on utilization
issues. we prcpose a proportion measure with respect to
interactive work. When evaluating an interactive queryrescurce, it is impc.tant to scrutinize and ascertain how
much of this facility is being used for interactivesearching. Putting it another way, we would like tc know
how much cf this facility is being used for non-interactive
processing, that is, batch work. Hence the prcportion
measure will give the percentage of session time which is
used for the search and refinement process. The coiplment
of this is the proportion of time used fcr batch work.
27
K .° .% - .. ..
VI. USER ROFILE &NALYSIS
A. GIUEBIL
Cur model of network structure involves cpu to cpu
connectivity as oppcsed to terminal to cpu connectivity.
This thesis is an examination of a network form which
involves cpu to cpu ccnnectivity for interactive information
sharing. We feel this is an important difference because weare dealing with a terminal interface that is capable of
intelligence, capacity and speed far superior to that of adumb terwinal. The cld adage that a chain is as strong asits weakest link is the same as saying that two devices can
communicate as fast as the slower of the two. The same
hclds true for the other two attributes of capacity andirtelligence. With respect to resource content, the commer-
cial database systems are bibliographic and abstract in
nature. This thesis examines usage of a full-text retrieval
system. ligingtcn has suggested that searching full-text tflarge documents may have a somewhat different pattern fromthe biblicgraphic environment [Ref. 7]. This simply meanswe cannot take full advantage of the work already done for
the ccmmercial database system with respect to detail work-
profile analysis. We will refer to these reports merely to
give credence to cur perception of the dichotomy of
service-time.
User activity must be described in terms that will makeit meaningful to the problam statement, i.e. non-interactive
use of an interactive resource. Customer service-time may
be classified into one of two modes. The first is interac-
tive, and is defined as a continuing dialog between man and
machine. when a user enters a request, he must wait to see
28
q
the system response before proceeding to the next request.
The othe: is called non-interactive and is defined as
follows: when a user enters a request for servic., he ne-d
not wait tc see the system response before he can prcceed to
the next request for service.
There is a plethora of studies on customer activities
with commercial and ncn-Defense interactive network infcrma-
tion rescurces and cnly a very few relating to full-text
retrieval databases. We will refer to these commercial and
non-Defense repcrts to show that we are correct in cur
percepticn of the user work profile. These investigations
ithus far have concentrated primarily on the interactive
nature cf bibliographic searches (Ref. 8], [Ref. 9],
[Ref. 10). [Ref. 11]. Their focus has been on search stra-
tegies, evaluating the impact of user training and
investigating methods to address multiple logon protcccls
and retrieval language problems. However, based on these
reportsr user activity can be viewed from a different
perspective. That is, while the user is connected to this
interactive informaticn resource, his activty may be cate-
gorized as either Intera ctive or batch. Included as
interactive are those user functions for search, refinements
cf search statements, perusal of hits, and if the databasemanagement system permits, narrowing down the hit-list
during perusal. Some studies have described this kind ofactivity as cycles within cycles [Ref. 7] cr a series of
sifting (Bef. 12] through the body of retrieved data until
the user is fairly satisfied with his 'find'. As stated
earlier, there have been numerous investigations into this
aspect cf how the user spends his productive search time atthe network resource. For completeness purposes, in
describing the user's total connect time, the studiesmention rsers commands for hard-copy output. In the commer-
cial database systems, where the charge is primarily
29
according to connect-time, there is a relatively small
amount of time devoted to on-line printout. However, there
is an indication that there may be a fair amount of cff-line
printing done at the database site (for a fee), and thatoutput is sailed to the customer. We define batch work to
te request for hard-ccpy output to the user site. As early
as 1973, informaticn scientists had been calling for an p
interface between batch and interactive in several areas,
one of which is the transmission of large amcunts ofretrieved data to be Eassed later via batch (Ref. 13].
All network access to the commercial information
rescurces are at dial-up speeds ranging from 300 to 2400baud. All custcmer access, with a few exceptions hhich we
will describe shcrtly, are through a variety of dumb dial-up
terminals. The exceptions are found in non-Defense govern-
ment agencies and at research institutions. The impetus of
these efforts was to address the front-end problems of
accessing a variety of retrieval systems each with their cwn
logon prctocols, query languages, and search strategies.
The wcrk in this area has been the development of an int'.l-ligent user interface [Ref. 14], [Ref. 15], [Ref. 16].Their aim has been to aid the user in formulating search
statements, and in scme cases, because of its knowledge of
the kinds cf information in the network, the inteiigent
interface will attempt connections at all hosts with the
database of interest until a connection is established.
Early work in this area was the development of COnnectcr for
Netwcrked Irformaticn Transfer (CONIT) by Marcus at H.I.T.
(Ref. 17]. Subsequent research using software based onCONIT has been carried on in Meadow's Individualized
Instruction for Data Access (IIDA) [Ref. 15], [Ref. 18].
The Network Access Machine (NAM) was developed at the U.3.National Bureau cf Standards (NBS) and Chemical Substances
Inforuaticn Network (CSIN) is now in place supporting the
activities cf the Environmental Protection Agency (EPA).
30
Although the study done by Dlmperic on SOLIS cOncen-
trates cn user query habits, there is still divisicn of
customer work into interactive and batch. Only 'C-e f
senticn is made in the study to hard-copy requests.
Although SOLIS has a large number of directly connected
user terminals, this thesis is interested in looking at the
netwcrk access and utilization of SOLIS. This is a database
of reports, with average report size of approximately 2000
characters. Several years ago, the American Chemical
Society (ACS) together with Bibliographic Retrieval
Services, Inc. (ERS), embarked on a series of experiments to
determine the usefulness of a full-text database (ACS
Journal articles) and their availaniliry for searching
online. The experiment was based on a relatively small test
database (Ref. 19], and looked only at the usefulness issue.
No mention is made of output demands. However, we de rct
feel this in any way invalidates our perception cf customer
activity with a database. When ACS and BRS move tc subse-
quent phases of the study with large test databases, we will
probably then see their reports referring to prin-, and
display ccmmands.
E. BCDEL DESCRIPTION
Tc provide a general framework for describing th .
cirrent approach and the proposed alternate, some elementary
concepts from queueinq theory are used. SOLIS is a facility
with 15 servers. Each server provides the same service at
identical rates. Custcmers arrive at the service facility
from the network at a certain rate. If customer arrival
follows a Poisson process and the service time is expcnen-
tial with parameter mu, this defines an M/M/15 queueing
system. In this simple example, all customers are ccllictad
into cne source. CCINS has four sources, one from each cf
31
*- - - - .• . .- . . --.- --.- -
the TASs. Figure 6.1 and Figure 6.2 represent the transi-
tion frcs cne populaticn pocl to four separate pools.
Statistical analysis and tests for the customer arrival
process tc the TASs, found in Appendix A, show custcmer3
arrive at the lkSs according to a Poisson process with
parameter lambda (i), ± = 1, 2, 3, 4. Arrival rates per hcur
)) S 0 L I S
ETICBKi
)cisson process 3 mu:
. ... servicelambda: arrival . rate
CUSTCHER rate
POEULATICS f-- ---- - - -
Figure 6.1 Cne population source to SOLIS.
at each cf the TASs are 17.68, 9.19, 5.10 and 2.53. TASs
are service facilities, offering network access, through
their 24 forts. Once at a TAS, only a certain percentage of
custcmers request service of SOLIS. The percentage cf users
requesting EOLIS access at each TAS is 0.70, 0.31, 0.098,
and 0.89. A customer request is granted only if there is a
44
32
: 1 - ;> TASpercentage to SOLIS17.6e TAL S0.70
c st ./ I -- - - - - -14
LI
--->1 cs 29.19 0.7, - - -
c ust./ ----- 1hour -- SOLIS...... I-- interactive
-- > I2
9.1 0.318
cust./hcur
. ..
us 2.631
r r
cust-/Ibcur 2 II
Pigure 6.2 Put population sources to SOLIS.
33
t .
free netwczk server cn his local TAS and a fee server at
SOLIS. The user at SCLIS may be engaged in only interactivework during a sessicn or may do both interactive and hatch
work in the session. SOLIS can nov be described as a
2-stage facility, where all customers enter stage 1 and work
there for a certin amount of time. They then prcceed to
stage 2 with a certain probability p or leave the system
with probability 1-p. Figure 6.3 illustrates this concept.
New customers can enter the server only if both stages are
empty. Fzcm the SOLIS monitoring logs, 0.24 of the
customers do only interactive work and 0.76 do both. Thq
distribution of work-time for only interactive work is expo-
nential with an average service time = 10.13 minutes.
Similarly, the work-time distribution for both interactiveand batch is also expcnential with an average service time =
12.92 minutes. For the purposes of the analysis, the seccnd
work-time was separated into the individual times for inzer-
active and batch. Statistical tests on the data showed thatthese distributions are also exponential with average
service time for interactive work = 6.2 minutes and average
service time for sending retrieved data = 6.8 minutes. Thisanalysis may be found in Appendix A.
C. TIME-LINE INSPECTION
With the definitions of customer service-time from
above, we now suggest a time-diagram which permits a graph-
ical view of the partitions of work-time. Figure 6.4 is one
such diagram. The begin and end times of a customer sessionare indicated. This session time is subdivided into inter-active and batch parts. Considering the amount of time the
interactive resource is occupied servicing this custcmer,then the proportion of interactive use is at the 0.6 level
or 60% of the time. Another very simple situation is shcwn
34)=3
* 4 4 -
4 ,
i exit
iiSOLIS Sevice Facility
.* -. *4.- ... .. - .. ... -. . - -
st e 2 1-P
(k aNeh)
,I,
~(or)
st I II1
+--act-i
I
Pigure 6.3 2-Stage service facility.
35
"--------
'pI
<7]
XzRXxIzxxxxxxxxxxxx lxxxx I
0 510begin end1
I
in tezract% :ive X XXXXX
batch
I
Figure 6.4 Tine-Line diagram of I retrieval session.
in Figure 6.5 . The three horizontal time lines reflect the
facility's ability tc handle up to three customers at a
time. Time again is divided into its respective work modes
of interactive and batch. This case is simplified by having
all three users starting and ending at the same time. The
propcrticn cf interactive use is 0.40. The number of
custcmers the system was able to service in these ten time
units is three and their average service :ime is ten unit.
The real world dces not operate in this manner. 7hese
diagrams were used tc give some insight into the problem at
hand. The ccmputer simulation has incorporated the vulti;l
TASs, their customer arrival dist. ibuaions, percentages of
SOLIS requests and the SOLIS work profile distributicns.
36
. i .. 'o - -o .. - . . Q o 1 , m° , . , . . . . q . ,o ' j - .. - - - .. •
xxxxxxxxxxxixxxxxxxxxx
--- * -. *
0 5 10
interactive: XXXXX
batch -
- -- ,.. - --- .. ___'_ __ _ _ _ __ '_ __ __ __-' I
Figure 6.5 Time-line of 3 retrieval sessions.
37
MILO
vII. hi &j H.I!I gg .qJ€: o !i o I!I .RcTrRAN
A majcr drawback of the current method is that SOLIS is
set up as a 2-stage facility. Stage 2 is purely batch in
nature and the server is kept busy transmitting data at a
comparatively slow s;eed to what the server believes to be a
terminal. While the customer is in stage 2, no new customer
can enter the server to begin his stage 1 processing. With
a substantial population of users, most of whom request a
fair amount of data to be transmitted back to their TAS,
either for printing at their local terminals or for further
manipulation at their local TAS, we can easily foresee scme
problems. One way cf addressing this kind of situaticr is
to provide a high-speed background data-transmiasion
facility between the server-cpu and user-cpu. Peferring
back to our model of SOLIS, we propose a transformaticn from
a single ncde, 2-stage facility, to a 2-node tandem netwcrk
as shcwn in Figure 7.1 Each box in that figure describes a
queueing system consisting of a queue and serve-(s). Within
each box is given tke node number. Node 1 represents the
interactive facility with 14 servers and node 2 is the hatch
facility with 1-server. The original 15 interactive ports
on SOLIS are re-allccated to 14 interactive and one batch.
When a customer has completed work in node 1 and has gener-
ated data to be sent back to him, his work reques ia
forwarded tc node 2 for processing. This arrangement now
leaves node 1 free for interactive work.
The price for this design is that we usurp one cf the 2(4
servers on TAS and cne of the 15 servers on SOLIS. Using
cur simplified time-line diagram again, Figure 7.2 illus-
trates hcw three users can be accommodated on two
38
- .. . ,... . .. . . .. . . . . . . .
exit I I
node 2 itit, I
pr'cceed tonode 2
(or)
node 1I I
, I
11 2 3 14-----------
ent e r
figure 7.1 SCLIS as a 2-node tandem netvork.
39
.
interactive paths and all their data transfer requests on
II
IXXXXXXXXXZXXXxZXxxXXXXXXXXXYYYYYY!!YYYYYYYYY I
0 5 10 1ZZ222222ZZ Z
0 5 10
0 5 10begin and
I Iinteractive resource: --------
hatch resource:- -
interactive work: XXXXiYYYYY!zzzzz I
batch work:
Figure 7.2 Tine-line with 1 data and 2 interactive paths.
the one high-speed link with capacity to spare.
The ctber expense would occur in those cases when the
user wants the data printed at his terminal as soon as
possible. In the cutrrent situation, when the user gives the
command to print the data, the system then begins tc deliver
the data at his terminal-printer at an approximate rate of
2400 baud. In this new proposal, the user must wait fcr the
Cpu 6t cpu transfer (at an approximate rate of 20 KB/=) and
any queue time at node 2 before seeing any data at his
printer. This particular side-effect must be considered
40
-, , .. ., ., . . - . .
very carefully in tlke evaluation ,bacauseo this may bs too
much ef an inconvenience to the cUStOMer.
41
VIII. IBE Muon_ SER!ICOS HODE1
This chapter will discuss the model's goals, functional
design, internal design, preliminary results, "validation and
appl icaticns.
1. CESIGI GOALS AND CONSIDERATIONS
The Network Services Model is a discrete event simula-
tion that models netwcrk resource allocation in response to
arriving customers' requests. It does not attempt to model
the irternal operaticns of the server hosts and user opus,
nor the particular flow of messages and packets through the
COINS-II subnet. Instead, it focuses on modeling the
network from the point-of-view of how the natwork capacity
of the server and the user Cpus is consumed in support of
interactive database query and retrieval services. It si~u-
lates customer arrivals at the user cpus, their request for
interactive network access, the allocation of network
resources if available for the session, and their
de-allocatien at session completion. Design and implementa-
tion ware motivated by the following seven design goals.
1. The mcdel should be a faithful representation of the
network entities contributing to interactive services.
2. The model should serve as a realistic simulat.icn of
customer activity and allocation of resources based on
this activity.
3. It should be able to take the same customer activity
and allocate resources based on the alternate
proposal.4. I-s shculd provide metrics for performance compazison
between the twc approaches.
42
. . . . . . ... . . .
711
5. It shculd serve as a measurement tool fcr doing snsi -
tivity analysis as arrival rates and work prcfile
distributions change.
6. As we acquire further insight into custcmer work
habits (substantiated by more detailed logging and
mcnitoring data), the model should be flexible enough
tc acccamodate these statistics.
7. The model should be extensible and easy to mcdify so
that it can serve as a long term design tool for the
COINS/PHO.
Cne cf the most important objectives of the model is
that it he a faithful portrayal of the allocation of netwcrk
capacity by the TkSs, server-TASs and HOST when providing
interactive network services. It is essential that the
model behaves in a manner consistent with the flow of inter-
active Jcb requests through COINS-II. Interactive jobrequests are initiated from a TAS or server-TAS, never from
the HCST. For example, customers arrive at one of the TASs
or server-IASs according to some distribution. Having
arrived at a TAS, the customer then requests services tc cne
cf the interactive resource in the network. Customers at
any TAS may request services at any of the server-TASs or
HOST. Cn the other hand, customers at any server-TAS may
request services at the HOST or any of the server-TASs
except its own. If there is an available port at the
user-cpu and the database-cpu, the demand is honored and the
apprcpriate resources are allocated for the duration of thesessicn. These events should occur in the model in the same
fashion that they do in real life.
Statistics ccncezning customer arrival and their ngtwcrk
requests ware gathered from the accounting logs of the
user-cpus. The model, therefore uses these distributions
for the generation of network events. Characteristics of
the sessicn are anotker important aspect of this study. The
43
empirical data collected from COINS-II offers statisticallysufficient informaticn only for the SOLIS database host.Hence our particular analysis will be confined to evaluating
network utilization Cf one database resource. It must be
pointed cut that this is not a limitation of the simulation
model. It will support up to n-database resources, with thesize ¢f n dependent only on the size and capabilities of thecomputer the simulaticn model is run on. The descripticn cfthis simulation will ke of its full capabilites.
with the main issue being the comparison of two methods,
there are two approaches to model implementation. One wouldbe tc implement two simulations, each reflecting a parti-
cular strategy; cr implement one simulation usingappropriate flag setting to regulate the simulation control
flow for one strategy or other. Since only one aspect ofinteractive processing is changed, the later method is used.It was felt this is tetter than having to contend with main-
taining two separate programs.Since the model's main purpose is tc furnish perfcrmance
measurements of the two approaches, it must be able to take
the same set of distributions and work profiles and execute
for the current system and then execute for the alternate
strategy. These distributions and work profiles of thedatabase-cpus are input parameters to the simulation,
thereby giving the model some level of flexibility.Performance measurements are done in the two general areas
cA number of customers refused and average system time. Themodel can be run with the provision of queues for custcmersawaiting network access. When the model is run with queues,further measurements are taken for the average wait time andthe average wait time, given the queue is not empty. With
respect to the alternative proposal, average system time ismeasured cn two levels. One measure incorporates the time
it takes tc get all the output printed at the customer
.dl 44
terminal, (sorvice-timel) while the other measure inccrpo-
rates the time it takes to get all the output only tc the
user-cpu (service-time2). We feel it is important to make
this kind of distinction because of the variety of int-nded
W ujes cf the retrieved data once it arrives at the user-cpu.
The simplest activity is the mere printing of the data atthe user-site. However, as reviewed in the literature and
in light of the en-going work by the COINS/PMO, there is a
definite shift from straight printing to some data massaging
and scme early efforts in data fusion. There arq no machine
logs available to indicate to what degree this is occurring,
so these twc statistics are computed to provide the range of
possible expected system times. System-time2 is important
also because it provides an indication of how much sooner a
network path becomes free for re-use.
To be a practical design tool, the model should be able
to be used by the COINS/PMO and its personnel to investigate
the impact on customer services as the network grows with
respect tc more user-cpus and more interactive database-
cpus. The analysis in this thesis is based on the current
configuraticn and wcrkload in COuL-II. However, in ths
next 12-mcnth period, COINS expects to introduce two acre
TASs into the netwprk and two more in the next twc years.
The model should be able to accommodate such changes in
network configuration and workload. For this reascr, infor-
mation ccncerning each database-cpu and user-cpu ar.
specified as run-time parameters to the model. The number
cf HCSTs, TASs and server-TASs and their respective
profiles, including their network capacity and customer
arrival rates are part of the data read in atc run-time.
This flexibility to adapt to network changes was a major
influence for modular implementation.
'45
SINSCEIET 11.5 was used because it is equipped %ith the
mecharics for handling discrete-event simulations and hat
much of the versatility of a general programming language.
It has the traditional concepts of permanent and temporary
entities, ownership and membership in sets and queues. To
add a new TAS to the model, a minimum of three changes must
be made to the simulation. A new ARRIVAL-event must be
added tc the structure, a command to initiate the start of
arrivals for this new TAS, and finally, at the close cf the
simulation, there most be a command to terminate the arri-
vals for this new TAS. If the interarrival distributicn of
the custcmers to this new TAS is the same as one of the
existing 1ASs, but with different arrival rate, then thesame call can be made, using the different parameter. If
however, the distribution is different, it is only a matter
of writing a routine describing the distribution and calling
this new routine for the next arrival. For the database-
cpus, the cnly new work that would be required is when itswork-profile distrihution is lifferent from any of the
cthers already in the model. If i is different, a similar
procedure must be followed as was described above fcr a new
LAS.
B. HIRECRBE AND SOF2UARE ENVIBCNKENT
The Interactive Services Model runs on the IEM 3033
Attached Erccessor System under OS/VS2 at the W.R. Church
Computer Center, Naval Postgraduate School. The software is
a SIMSCRIPT 11.5 program which has approximately 1,350
executable source language statements. Work areas are
dynamically created during execution, depending on the input
parameters. At-ention must be given to the Job Control
Language (JCL) setup with respect to execution time and
storage requirements for the job. Runs for -his thesis were
46
I
defined as a CLASS G job, permitting 15 minutes cpu time.
The source code is the property of the U.S. governwent.
Anyone interested in possible use of the program should
contact the author. Operating instructions for the prcgzam
can be fcund in Appendix B to this thesis.
C. PONCTIONIL DESIGN
The ucdel specifies when certain events are to occur,
based on the distributions given for each event. Ir. the
alternate method, the queueing discipline of the high-speed
facility contributes in deciding when departure events are
to take place. The SIBSCRIPT 11.5 timing routine ac-ually
handles the clock advances and the firing off of event
processing according to schedule.
After initializing its internal tables based oninput parameters, a customer arrival is scheduled for eachcf the user-cpus, and the simulation begins. There are a
total of 13 events that can take place in a simulaticn run.Five events handle the arrival of customers to each of the
user-cpus, and one terminates the simulation. The start
state of the model is defined as no customers and no inter-active network capacity is being used. Parameter input
specifies the available resources for interactive servicesfor each of the cpus. The remaining seven evets are
concerned with the sequence of events that begins with the
cus-cmer requesting an interactive network service tc theissuance of a command to initiate the retrieved datatransfer and the steps involved in execu-ting that command tothe user-cpu, then to the database-cpu and the subsequent
transmissicn of the data back through the network to theuser terminal. The section on event handling prcvides a
47
8* " '"" - _ i ; -,. ; ,.".".",•-". -".". . ". •" .. " . . . . .. ,".. ."-"., ."., " ".• •.
e. i n i'U4*i7.. . . . . . .. T *
4T-
more detailed description of these internally genera-adevents. Each of the user-cpus have their own arrival ratss
whose inter-arrival times follows some distribution. Thekind cf distribution and its parameters can be specified as
input parameters. Analysis of the inter-arrival times from
the empirical data shows that its distribution is expcnen-tial. The SINSCRIPI 11.5 statistical distribution packagesoffers a fairly wide range of distribution functions to
choose fzcm. They include erlang, gamma and beta to mentiona few. For a comprehensive list the reader shculd see
[Ref. 20].
2. IL __r. ge.ction
Selection of which interactive database cpu is also
derived from the empirical data. Throughout the simulaticn,
the mcdel maintains the currently available nqtwork capacityfor each component. If there is sufficient network capacityat the user-cpu and the requested database-cpu, the appro-
priate resources will be busy for the duration of thesessicn. If there is insufficient or no facility free, the
request will either be refused or placed in a queue,
depending cn the run-time parameters. Each time resources
become free, the earliest job request in a queue matching
the available capacity is selected for processing.
3..2.; _ ce Pr o f 1
Icg data from each of the database cpus were used to
define the session Frofiles of interactive service times,data transfer times and the percentage of custcmers
requesting data transfers. These parameters can be modifiedat run time without changing the program code. Two pcssible
things can ccur at this point. if the customer has onlyinteractive work to perform, the resources are tied up for
just this period of time. However, should there be demand
48
m m m mmIm m m
lmlm m m( - m m l- /mh = ---- , .. . . .
for print-data, then the network resources are kept busy fcr
the duraticn of the interactive portion plus the data
mransfer portion. The time defined for the data t:-ansfer
portion is based on the distribution of output character
size, transformed tc number of bits divided by speed cf the
terminal. For example, if the number of characters is
50,000 and each character is transmitted as an 11-tit code
with the terminal speed as 2400 baud, then the time for the
transfer tc take place is
(50,OCO x 11) / 2400 -229 seconds = 3.8 minutes
Pcr the alternate proposal, when print-data is
demanded, the interactive resource is freed for further
interactive work, and the data is sent en the high-speed
facility if it is free. If the high-speed facility is notfree, the transfer request is placed in a queue until such
time as the resource becomes available. For the purpcs.s of
this model, the network potential is estimated zc be 20
KB/s. In the example given above, the transfer would take
(50,OCO x 11) / 20,000 = 27.5 seconds = .45 minutesThis specific implementation permi-s three different
distributicns which are uniform, normal and exponential.
This was done to indicate to potential users of the mcdel,
that the mcdel is rct restricted to only the expcnential
distribution, and that adding a new distribution is a simple
exercise because the program only calls the statistical
distribution functicns of SISCRIPT.
Although this thesis is primarily concerned with how
to get more interactive work done on the interactive
resource, it must still consider how long it will take forthe customer to eventually get his product. In the scenario
just described, the data will be at the user-cpu in 27.8
seconds; however, it is not at the user terminal. And
furthermore, that 27.5 seconds is straight transit time and
does not include any queue time if the transfer request had
49
% , % . . - . . • •° .
to wait it a queue. Should the customer want the data at
his terminal, it would take another 3.8 minutes for it to betransferred from the user-cpu to the terminal. It is £umpor-tant that the model take these issues into consideration bykeeping statistics on these different system times sc that afairer ccparison can be made.
4. f._-1pled gueueig pjgscipline
In the real system, when the network resources arebusy, customer requests for SOLIS access do not wait in thequeue; they are lost to the system. For the alternatemethcd, queues can develop at the high-speed server. Its
queueing discipline .s described next.Arrivals to this one-server facility can come from
four different population sources or TASs. When the task
arrives and the server is free, the data is transmitted
immediately to the appropriate TAS. However, if the serveris busy when the task arrives, the task is placed in a queuecf work des~ined for the TAS from which the work originated.
Once tk9 server has started transmitting data to a TAS, itwill continue to so until the queue for that TAS has been
emptied. For example, let there be three TASs, denoted byTASI, TAS2 and TAS3. Furthermore, let there be two data
files for each of the TASs that the high-speed facility must
transfer. The server will begin work on the TS-queue whose
task arrived the earliest. In this example, let the task in
TASI-queue have the earliest arrival time. Then the server
will begin data transmissicn to TASi first. When that is*: completed, it will proceed to the second task in the queue
for TASi. If a new task arrives for transmission to TASI
before tte server has completed servicing the first twotransmissions, the server will proceed to work on task threeafter it has completed the first two transmissions. Say nowthat the server has completed task three and no new work has
50
Ft.-1
arrived fcr transmission to TASI, then the server will pick
the next earliest task waiting in the TAS2-queue and the
TAS3-gueue.
D. INTERNAL DESIGN
1. Cnzerall §_rcu
Using SINSCRIPT 11.5 has given the INS model a very
simple control structure. The permanent and temporary qnti-
ties and their relationships to each other are defined in
the PRIEAELE section of the model. All the events, their
attritutes and priority handling are also declared in this
secticn. The global variables and any counting and aver-
aging are specified here. Program MAIN is concerned only
with managing the general flow of control including the
setting up of the initial system state and providing the
starting events that will set the simulation in motion. The
simulation is not begun until an explicit statement START
SIMULATIC is issued by MAIN. At that point, control is
transferred to the SIMSCRIPT 11.5 timing mechanism. The
timing mechanism manages the flow of control from event toevent as they are scheduled to occur. When an eventprocessing has completed, the timer searches through theevents-list, locking for the earliest next-event to sche-dule. The timer then updates the system clock and transfers
control tc the event routine. When no further events arefound on the events-list, the timer returns control back to
MAIN.
To illustrate this point, the following example and
rccompanying seven Figures are provided. Let there be two
TASs, denoted as TASI and TAS2. Suppose TASI has two
network pcrts and TAS2 has three network ports, and let
SOLIS have two netwcrk ports. Figure 8. 1 is a picture at
the start of the simulation, the clock is at time - 0
,5
4. 5 1
".
... ........-...........-...... -, . - . . ... - • .- . .. . .
minutes. All the resources are free and are indicat.d by
empty boxes. In Figure 8.2, the clock has advanced to time
* 2 minutes and shows a customer has arrived and requested
network access to SCIS. The Figure shows a path estab-
lished betwsen TkSi and SOLIS and the allocation of the
network Ecrts. The Fort boxes are Xed. Customerl is in an
interactive session with SOLIS. From customer work profile,
it is determined that customerl will have an iteractivesessicn cf 6 minutes, followed by request for hard-copy that
will last 7 minutes. &ccording to the interarrival distri-buticn of customers, customer2 arrives at TAS2 at time = 5
minutes, with a work profile of 6 minutes of interactivework and no hard-copy request. Figure 8.3 shows the state
cf the mcdel at time = 5 minutes. There are now two paths
to SOLIS, one from TASI that started at time = 2 minutes andthe seccnd one that started in this time. The next event to
occur is at time = 8 minutes when customeri at TASI
completes his interactive work and now goes intc batch
processing. This is indicated in Figure 8.4 and the path
doing batch processing is indicated as B. Another customer
arrives at TIS1 is the next event that occurs at time = 10
minutes. Figure 8.5 shows an attempt to establish a path
tetween TASI and SOLIS, but is not successful because of
insufficient resource at SOLIS. Customer3 is lost to thesystem. The next event occurs at time = 11 minutes when
custcmer2 has completed his interactive work with SCLIS.
Figure 8.6 shows the path between TAS2 and SOLIS is now
free. The next event occurs at time = 14 minutes whencus"cmerl has completed his batch processing. Figure 8.7
now shows the path between TAS1 and SOLIS is now free.
52
. .. . . . . • . . . .. .
1Y ~t -e--- - I .
time 0
TIS1 SOLIS
I -I I I
TAS2---- ---
1-+ Event 1 at time 0
__ __ __ _ __ __ _
Figure 8.1 Initial State.
time 2
TASI SOLIS+-- custcmer 1lxi-- - - - ----- ---- +
TAS2 4 -----';"I I
Event 2 at time = 2.. : -- +-Int era ctivg4 session:"-, I Port occupied : XX
Figure 8.2 State 2.
53
-7 .
time =5
TAS1 SOLIS+--+custcmer 1 +--+-xx ----- xx.
I I /1/IX I+--+ I+--+-/
TAS2 /+--+custcmer 2 /
Event 3 at time = 5 minutesi iInteractive session:
Port occupied : XX
Figure 8.3 State 3.
time = 8 minutes
TA51 SOLIS+--+custcmer 1 +--+-tXXI EEEEEBBBBEBBBEEBBBBBEBBEBBBBB IXXI+--+ +---+-
I I I///IXXI-vent / time -
+--+custcmr 2 /I Xx III///
Event 4 at time = 8 minutesi i-- - I~nteractive session:I I :1/I///
Batch vork : BBB.BPort occupied : XX
Figure 8.4 State 4.
54
= |-
. . . .. . . . . . . . . . . . . . . . . .. . - •.. .
time - 10 minutesTASI SOLIS+--+customer 1 -+I XXI EEEBEBBBBEBBBEEEBBBBEBBBBBBBBB IXII
IXlcustcmer 3, blccked //1/11+-/ -- ,-
TAiS2/+--+customer 2 !+-- t Event 5 at time = 10 minutes
Interactive session:
Eatch work : BBBBBEcrt occupied : XX
Figure 8.5 State 5.
time 11 minutes
TAS1 SOLIS+ --+custcmer 1I XXIEBEEEBBBBBBBBEEBBBBBEBBEEBBBBBIXXII I I I
TAS2----
I I+--+. Event 6 at time = 11 minutes
+--- Interactive session:I I Eatch work : BBBBB
+- -__crt occupied : X
Figure 8.6 State 6.
55
time = 14 minutesTAS1 SOLIS---- +--- -I I I I
I I I I+----+ -- ,-
T&S2+----I I+.--, Event 7 at time = 14 minutes
Interactive session:IEatch work : BBBBB
Port occupied : XX
Figure 8.7 State 7.
For each set of network configuration, four runs are
made. The two major categories are the current and the
alternate proposal. And within each of these cases, the
model is run two times, one for the situation where
custcmers gc away when the netwcr.k resources are not avai-
lable; and the other, where they are placed in a queue. All
queues axe considered to be first-in-first-out (FIFC).
Sequencing through these four iterazions is managed by MAIN.
2. j_ f j 2 " ij .
There are 13 events that can occur in the mcdel.They will be described in chrcnological order. The reader
is referred to Appendix F of this thesis for the logic
diagrams cf these internally generated events.
V"
56
:,
a. Events 1-5: TASX.ARRIVAL, where x - 1, 2, ... ,
5
There are five events that handle the customer
arrivals at each of the user-cpus. The work perfcrmed inthese events are:
1) schedule the next arrival according to the distribu-
ticn for this user-cpu.
2) determine which interactive network host to request
services.
3) determine the wcrk profile at this interactive host.4) if the current network capacity permits, seize the
atrcpriate resources.5) if there is tc be no print-data command, schedule a
departure at tte end cf the interactive portion.6) if there is to be print-data comaand, schedule the
event to handle the priat-data command.
7) If the current network capacity is not able to satisfythe request, file the request into the queue for new
work cr ignore the request, depending on the inputarameter.
8) update the appropriate statistics gathering variables.
b. Event 6: THDEPART
The next event is the departure from the systemat the end of the interactive portion. The work perfcrmedhere are:
1) release the interactive network resources.2) If there are any other departures of this same nature
in the events-list that is to occur at this same timeinstant, process this event by releasing the interac-IL> tive network resources used by this event.
3) Having updated the network availability, searchthrough the queues of new work for any job request
57
that can be satisfied and schedule the appropriate
events. If there are no job requests waitirg in the
queue, return tc the main timing routine.
4) Update the appropriate statistics gathering variables.
c. Event 7: USEND
Event tc handle sending print-command to the
user-cpu. Schedules the event at the user-cpu to handle the
print-ccmmard in the amount of time to send the command fromthe custcmer terminal to he user-cpu.
d. Event 8: UC.ARRIVAL
The event to process the print-command at the
user-cpu performs the following:
1) If the user-cpu is busy handling another command, file
tle request in the queue for the user-cpu.
2) If the user-cpu is free, set the user-cpu flag to busy
and schedule tte event to release user-cpu rescurce in
the arcunt of time to process the request.
e. Event 9: UC.DEPART
The event to free the user-cpu after processing
the print-ccmand does the following work:
1) Set the user-cEu flag free.2) Schedule event to handle print-command at the
sezver-cpu.
3) If there is more work in the user-cpu queue, take the
next task, set the flag to busy and schedule the event
tc release user-cpu resource in the amount of time to
process the request.
4) If the queue is empty, return to the main timing
routine.
58
4%*t4 y* ~ .- * - . -
f. Event 10: SC.ARBIVhL
Event at the server-cpu to handle the prirt-
ccmmand dces the follcwing work:
1) If server-cpu is busy handling another print-commard,
file the request in the queue for the server-cpu.2) If the server-cpu is free, set the server-cpu flag to
busy and schedule the event to release the server-cpurescurca in the amount of time to prepare the date fortransmission.
g. Event 11: SC.DEPABT
Event to free the server-cpu after preparing the
*data fcr trarsmissicn performs the following work:1) set the server-cpu flag free.2) Schedule the event to send the data to the user.
Current method: Schedule release of in-neractive rescurce
in the amount cf time to transmit the data.
Alternate methcd: Schedule release of the interactive
resource now and send the requested data on the high-speed facility if it is available, otherwise place it
in the queue of work for the high-speed facility.3) If there are pending print-command tasks in the queue,
work cn the earliest task, set the flag busy and sche-
dule the event to release the server-cpu rescurce in
the azcunt of time to prepare the data for transmis-
sion.4) Fcr the alternate proposal, release the interactive
resource and icck for other events that are ccmplexed
at this same time.
59
4w
.--.
h. Event 12: LTHDE PANT
The event handles the departure from the system
of those who requested data transfers. The appropriate
statistics gathering variables are updated. Based on what
* departure has occurred, the appropriate network resources
are released. However, for the alternate configuration,where we are using a high-speed facility to pass all print-
data output, this particular resource is not released until
its queue is emptied.
i. Event 13: CLOSING
This event cancels the scheduled TAS arrivals.
SIMSCRIPT 11.5 provides a framework for handling
concepts in simulaticn such as permane-nt and temporary enti-
ties, queues and events.
a. Permanent Entities
There are four kinds of permanent entities. The
first twc are HOST and TAS. The server-TAS is included as
both a HOST and a 7AS because it really serves these two
functions. The important attributes for the HOST and TAS
are tkeir taximum number of network ports and a flag-fieldto denote when it is a server-AS. Since th. model handlesin detail, the sequence of events beginning with the user
issuing tte prin t-command, additional attributes of a busy-
flag and a queue have been defined.
To handle TAS to HOST connectivity, a permanent
entity called TASHOS7 is defined. The important attributes
of this entity are the maximum network paths between a given
TAS and a give.i HOST and identification of this given TAS
and giver HOST. For example, suppose there are two TASs,
60
. . . ,, . . ~. * .* . .. -. .. . . . . . . - - .. . + . . + . .+ . .+ . + .+ . +. . - . - .
.7
called TAS1 and TAS2 and one HOST. TASI has a capacity for
tan interactive ports, TAS2 has a capacity for 25 inte=ac-
tive ports, and HCST has a capacity for 15 interactive
ports. This results in two permanent antities called
TASHOST. The first cne is for connectivity between TAS1 and
HOST with a maximum possitle capacity of ten interactive
paths. The second TASHOST is for the connectivity tetween
TAS2 and HOST with a maximum possible capacity for 15 inter-
active paths.
The fourth type of permanent entity is same in
concept as TASHOST and is called LPATH, reflecting the
high-speed data transfer facility between a TAS and a HOST.
LPATH has a queue and the attributes to identify which TAS
and which HCST.
t. Tempcrary Entities
Temporary entities are created and destroyed
during the course of the simulation and are called tasks.
They are created only when a request for service cannct be
honored because the service facility is busy. They are
placed in a queue and remcved only when a server becomes
free. All queue disciplines are first-in-first-out (FIFC).
There is a potential for four different kinds of tempcary
entities that can be created during a simulated run. They
are:
TASK: Created when there is insufficient network capacity
tc support an interactive session. It is placed
in the appropriate TASHOST queue.
UTASK: Created when the TAS is busy handling ancther user
request to send the print data commanI to the
HOST. It is placed in the queue for the TAS.
STASK: Created when the HOST is busy handling ancther
user request to prepare data for transmissicn to
the iser. It is placed in the queue for the HOST.
61
"," ** .. . -' 4*" " " . . . : , - .".. - . . . , .i . . -, ' -. . .. ., - --.
LTASK: Created only in the model of the alternate
proposal. It is created when the high-speed
facility LPATH is busy servicing another transis-
sion request. It is placed in the appropriate
LPETH queue.
c. Parameters
To make the simulation as flexible as pcssible,
the program has the mechanisms for describing the dc-sired
network configuraticn and characteristics at run-time.HOST characteristics include:
1) number of interactive ports;
2) prcportion of customers doing only interactive work;
3) for customers dcing only interactive work, the distri-bution and its parameters which describe this servicetime; The simulation expects service time in minutes.
4) for requests of hard-copy output, the distribution and
its parameters describing the amount of characters
that Js to be transmitted; The simulation expects the
number of characters and will make the transfcrmationinto the amount of time to transmit the data.
5) for sessions wbere a user will do both interactive and
batch work, the distribution of the interactive
pcrticn of the session and its parameters describing
this service time. The simulation expects :nteractive
service time in minutes.TAS characteristics include:
1) arrival rate of customers to the TAS; The simulationexpects this to be in the number cf customers per
hour. Furthermcre, the simulation assumes this to bea Ecisson process.
2) number of interactive ports;
3) of the customers arriving, the proportion which willrequest some network access;
62
*.1
4) for those TAS customers requesting network access, theproportion of users using each of the network database
facilities;
,. PRBLININARY RESULIS
There is particular interest in the comparison of
performance as the arrival rates and the amount of data tobe transferred at the end of an interactive session is
increased. The methcdology adopted was to run the model
with the empirical data from COIS-II and establish that asthe baseline. This baseline consisted of four TASs and oneinteractive host. All four TSs have 24 available ports for
network access. Table I shows the parameters of the base-
TABLE I
TAS ojerating characteristics
arrival % toTAS 0 # ports rate SOLISTAS 1 24 17.68 0.70TAS 2 214 9.19 0.31TAS 3 24 5.10 3.098TAS 4 24 2.63 0.82
(c ustcm ers/hour)
line configuration of the four TASs. Customer arrival rates
to these lASs ranged from 2.63 to 17.68 customers per hour.The proportion of customers selecting to go to SOLIS rangedbetween 0.70 to 0.82. After establishing this baseline,several runs were made increasing only the arrival rates of
63
n nm n m mn nm m m -. ' " ****.- =' .h * - .-;' m '.. . . . .. .. " " . . . ," "."
TIAS2 to AS4 until they all reached 17.68 customes per
hour. The next series of runs started with the four TASS
and progressed up tc eight TASs. All arrival rates were
17.68 custcmers per hcur.
The cther variable of interest is the amount of data to
-. be transmitted on this interactive connection. The appcrach
to this was similar to what was done with the arrival rates.
Starting with the original empirical data, subsequent runsinvolved increases in the data transfer amount. The initial
run was for 89,018 characters. This was increased by 10%incresents tc 209,900 characters.
The next series cf runs involved the additicn of newTASs to the network first starting with the original data
*transfer demands and proceeding up to 209,900 characters.
In this third series of runs, each of the TASs had an
arrival rate of 17.68 customers per hour.
Table II shows the results of the baseline configuration
and wcrklcad as the arrival rates wers varied. They dc not
show any problem with the expected customer Icss. The times
A given are in minutes. In the alternate method, two kinds of
system time were measured. System timel includes the tran-
smissicn of data to the user terminal, while system time2
considers the service completed as soon as the data is
received at the TS. As expected, system timel is alwayslarger than the system time for the current method. The
differences range from 44 to 52 seconds. On the other hand,
comparing s~steu time2 with the system time of the currentmethod, system time2 is smaller by about 4.5 minutes. (range
of 4 minutes 30 seconds to 4 minutes and 42 seconds).
Graphing these results in Figurs 8.8 presents a better
picture of where systes tinel and system time2 lie in rela-tion to the system time of the current method. With respect
to user services, Figure 8.8 indicates that, if the customer
wants the data printed at his terminal site immediately, he
64.°9
N,N . . . . . . . .
I r . ,l Ill ''l '" I l " iii Iiii iijI
I .I
I IIi I
.I I - . I
I" .
I. I I" II ' l II - "- ,- I --± " . .. I -"
TABLE II
Increasing arrival rates
CHANGE CURSINT ALTERNATEIN SYSTEM EXPTD SYSTEM SYSTEM EXPTDARRIVAL TIME LOSS TINE1 TIAE2 LOSS
1 12.43 0.0 13.17 8.01 0.02 12.39 0.0 13.17 8.01 0.03 12.41 0.0 13.18 8.00 0.04 12.42 0.0 13.21 8.03 0.05 12.143 0.0 13.23 8.03 0.06 12.38 Q.0 13.19 8.01 0.0712.35 8:01 13.17 8.02 0.0I812.36 00 13.20 8.04 0.0912.35 0.004 13.21 8.05 0.01
ARRIVAL RATES1 17.68, .1, 9.190 2.63 CUSTOMERS PER HCUR2: 17.68, 17., 9.1 5 10 CUSTOMERS PER HOUR3 17.68, 17.68, 10.11, 5.61 CUSTOMERS PER HOUR4: 17.68, 17.68, 12.02, 6.20 CUSTOMERS PER HOUR5 17.68. 17.68, 14.80, 7.47 CUSTOMERS PER HOUR6: 17.68, 17.68, 17.68, 9.04 CUSTOMERS PER HOUR7: 17.68, 17.68, 17.68, 12.02 CUSTOMERS PER HOUR9: 17.68 76 17.6, 14.80 CUSTOERS PER HOR9: 1L 8 AS.6 17568 CUSTOSERS PER HOUR
times are in minutes
will have to wait abcut a minute longer in method 2 than he
does currently. On the other hand, if the customer is not
interested in printing the data immediately, or wants to
have it merged with cther query results at a later time, he
can be ccipleted with his work about 4.5 minutes sooner in
method 2 than he does currently.
Table III shows the results of the baseline configura-tion and wczkload as the data amounts to be transferred was
increased. System timel exceeds the system time of method 1
65
'Si
MINUOIS13.6 - B B B B B B- B B B
- A A A A A A A A12.2
- I
10.8
- II- I
- I- I
9.4I
8.0+ C C C C C C C C C
0.0 2.0 4.0 6.0 8.C 9.0 IARRIVAL RATES
A: System time for current methodB: System t$me1 (to the terminal) for alernate: System t.me1 (o the cpa) for floernate
1: 9.6 9.19 5 10 2 63 CUSTOMERS PER HOUr2 : 17.6e, 1 .66, 51 9 i4~ 10 CUSTOMERS PER HOUR17.68V 17.68, 10.11, 5.61 CUSTOMERS PER HOUR4: 7.6817.68. 12.02, 6.20 CUSTOMERS PER HOUR
17.66, 17.68 14.80, 7.47 CUSTOMERS PER HOUR6: 17.68, 17.68, 17.68, 9.04 CUSTOMERS PER HOUR
17.68, 17.68, 17.68 1s.80 CUSTCMERS PER HOUR9 ALL 4 TASIS AT 17.64 CUSTOMERS PR HOUR
Figure 8.8 System times with increasing arrival rates.
between 44 seconds tc 2 minutes and 15 seconds, as the
transfer size increases. The range of differences between
system time2 and the system time of the current method
ranges between 4 tc 10 minutes, as the transfer size
increases. Expected customer loss is again ze:c for bcth
66
i,.;,i,,: .:, , .. ,... ,; , . **.. ; -... -:.:. ..:.: ....:.. -- * . .... . ... - . . . . - . .-
TABLE III -
Increasing data transfer sizesI I
current alternatesyssystem system exptd I
# ctars i ime loss timel time2 loss
e6018. 12.43 0.0 13.17 8.01 0.097920. 12.95 0.0 13.78 8.10 0.0
107712. 13.51 0.0 14.45 8.20 0.0118483. 14.14 0.0 15.18 8.31 0.0130331. 14.83 0.0 16.01 8.45 0.0143364. 15.58 0.0 16.91 8.60 0.0 !157701. 16.41 0.0 17.92 8.77 0.0 I173471. 17.33 0.0 19.06 9.00 0.0190818. 18.34 0.0 20.31 9.24 0.0209900. 19.45 0.0 21.70 9.52 0.0
times are in minutes
cases. Gzarhing these results in figure 8.9 shows the rala-tionships between these system times.
Based on the assumptions of the model, results thus farseem to sugcest there is no apparent danger of customer loss
either at the present workload or as the arrival rates and
data transfqr sizes are increased for the four TASs. The
disadvantage of method 2 is the extra amount cf time
(between 1 to 2 minutes) the intelligence analyst mus-
remain at the terminal to have his output printed immedi-ately at his printer. If the customer does not require the
printcut immediately, there is an advantage because he
completes his work scmewhere between 4 to 10 minutes socner.
This also means there is an extra 4 to 10 minutes during
which ancther interactive search and refinement sessior canbe started. Ccnsidering data fusion efforts sponsored by
the CCINS/rNO, this 4 to 10 minutes is an advantage tc the
TAS because it can receive the data in this shorter amount
67
NINUIES22.0.
BB A- B
-. l + B5A-AI
B A B-I ::- B A AI.15.0. B A
B Aa A
B B A%%,.-.11.5
•-C CC C C C C
8.0,C C C CS------------------------------------------
90000. 120000. 150000. 180000. 210000.Number of Characters Transferredin a 4 TAS's operational environment
A: System time for current methodE: System timel (to the terminal) for alternateC: System time2 (to the cpu) for alternate
Figure 8.9 System times with increasing transfer sizes.
of time and can proceed with the work of data fusion that
tuch sccner.
A valuable asset of any model is its ability to h.lp usanswer the "What if..." questions illuminating potential
problems and benefits. They can aid us in determining scmecourse of action in long-range systems planning. ge have
just looked at the cases where arrival rates and datatransfer amounts were varied within the present COINS-II
environment. Further examination of the changes cf these
68J.l ° .
-. parameters are required as the network environment changes,
in particular as more operational TASs are introduced tc the
network. The next chapter contains the comapartive analysis
of these two methods as one to four TASs are added to
COINS-II.
P. MCDE VALIDATION
The model is validated on the observed reference points.Its results from the baseline configuration is compared to
the measurements from actual performance for average system
time, customer loss and proportion of interactive use. Theempirical data indicated no customer loss due to non-
availability of network ports. The average system time for
all SOLIS users was 12.19 minutes and the proporticn ofinteractiie use was 0.602. Using cuszomer arrival rates and
work profiles from the empirical data, the model predicte4
an expected system time of 12.43 minates, no customer loss
and 0.60 proportion of interactiv usa. Table IV shows this
TABLE IV
Model validation results
modelobserved results7Isystin time(minutes) 12.19 12.43
cus:cuer loss 0.0 0.0
prcpcrticn ofinteractive use 0.60 O.bO
69
comparison. The important underlying assumptions of this
model are the distributions describing customer inter-
arrival times and customer service times. As long as -he
arrival prccess continues to be Poisson, with parameter
lambda, and the service time remains exponential with param-
eter Zu, then the results from the model may be considered
valid.
G. BODRI APPLICATIONS
Cur investigations are based on the demands of fcur TASs
on SOLIS. Network demands on USIS and NUIS were not
included tecause of the lack of empirical data describingthose activities. However, the INS model has baen designed
and implemented to handle these kinds of network services.
As soon as COINS can collect such customer profile infcrma-tion, it can simply be given to the model as input
parameters. No program modification is required.
Although the discussion of model entities were in terms
of HOSTs and TASs and server-TASs, the reader should be
reminded cf their definitions in order to find a mcre
general application of the INS model. HOSTs are pure
servers, and TASs are pure users. Serve=-TASs, on the cther
hand, are a hybrid user and server which both offer services
to and uses services from the network. Hence, when a new
node is added to COINS, it can be categorized as a server,
user, or hybrid. For example, when a gateway between COINS
and some network I is installed, it too can ba classified as
one of the three entities. If the gateway provides twc-way
service of permitting users in network X to access COINS
services and permitting COINS customers to access services
in X, then the gatela7 may be called a hybrid system. Itcan be ±nccrporated into the model as a server-TAS.
70
*, . _ S . . _ . .. . o- . o o o - .. . .. . .- . o .. ,, .... .-.. ,* . .* . .- . * . . -.
. IX. SMO RAUU iNiALrSI
'4. The CCIIS/PHO is actively involved with the installation
of three new TASs. One TAS will be located at Lawrence
Livericre Laboratory in California, and the second one will
be at the State Department in Washington, D.C. A variation
of the basic TS will be installed at DIA and serve as a
gateway between IDHSC and CCINS, permitting IDHSC custcmers
interactive access to COINS. For the purposes cf our
analysis, this gateway is a TAS. It is a source of interac-
tive custcmers to CCINS-II. The COINS/PMO is engaged in
preliminary discussicns with several intelligence crganiza-
tions for installations of a TAS at their sites. In light
of this custcme.- growth over the next several years, we feel
it would be useful to ask the model the "What if ... " ques-
tions. What if we had five operational TASs? ...sixcperaticnal T&Ss? and on up to eight operational TASs.
The methodology was to run the model, establishing a
baseline cf four fully operational TASs. Then fcr each
subsequent run, add a TAS functioning in an operational
* mode. The model was iterated five times, starting with the
configuration of four TiSs and ending with a total cf eightTASs. Table V summarizes the results of these runs. Once
again, system timel exceeds system time of method 1 by abcur1 minute, and system time2 is less than system time of thecurrent method by abCut 4 minutes. Figure 9.1 is the graph
of these results. The interesting result is expectedcustomer loss. There is a jump from a 0% expected lcss withfour cperatcnal lASs to a 4 expected loss with five opera-
tional TASs in the current method. The alternative is stillat a zerc expected loss. For method 1, once there is a
non-zero expected loss at five TASs, expected less increases
about 8.6 percentage points each time a new TKS is added,
71S°
€, - . * - -° ° . . . . . . • . . . . . ° . .. . .*°. .. . . .
.. ]
.3,
TIBL V
Adding a TAS to the network
current alternate
# atem exutd 81te s yst3M exptllotis tise1 tl2 loss
4 12.35 C.000 13.21 8.050 0.05 12.33 0.039 13.24 8.110 0.06 12.24 0.115 13.23 8.130 0.0107 12.30 C.215 13.29 8.190 0.0408 12.30 C.300 13.35 8.220 0.089
times are in minutes
ending with a customer loss rate of 30% for eight TASs. Onthe other hand, in method 2, the first non-zerc expected
customer loss is at six TASs, with about a 4 percertagepoint increase for each additional TAS, ending with a
customer loss rate of 9% for eight TASs. The arrival rate
cf 17.68 customers per hour was used for all TASs. These
expected loss values are plotted in Figure 9.2 . The slcpecf the line describing expected loss for the current systemis 0.0768 while the slope for the alternative system is
0.0217.
Revl.eving these findings in light of the third measure
of prcporticn of interactive work will provide infcrmationcn what propcrticn of the session time is consumed in doing
interactive work. Using the same runs to construct Table V
for the ccmparisons of system times, Table VI wasconstructed showing the proportion of interactive use as a
new TAS is added to each iteration. It can be seen imredi-
ately that fcr method 1. the proportion of interactive useis only at 0.61 while expected customer loss rises to 30%.
72
.'', ,'',", %,... . .,.... ,- . '. '.,-,.' .'. . . . .. ". % '. . " . . .. .. • .. .
89018 EXPECTED AMOUNT CHARACTERS TRANSMITTED
MINUTES14.0
- B B-E B B12.5+ AL
- A A A A
11.0-
9.5"
C C
8.0+ C C C4 +.. ...- 4-.. . . .. + -- - - --.. .. 4 -.. ... .. - --... ..
4.0 5.0 6.0 7.0 8.0 9.01NUMBER OF TASIS
A: SYSTEM TIME (CURRENT)B: SYSTEM TINEI (TO TEMINAL)C: SYSTEM TIME2 (TO THI)
Figure 9.1 System times with increasing TASs.
This is saying while there is only 61% interactive wvck, the
port allccation scheme involved will not be able to service
0.30 cf the customers in an eight TAS environment. In the
alternative method, the proportion of interactive use is 1.0and the expected customer lcss rises :o 9%. The differencein the pzoporticn of use between the two methods occurs
73
..
!I
1 89018 EXPECTED AMOUNT CHARACTERS TRANSMITTED
EXEICTED LOSS0.320
0.24C- A
0.160
- A" " B
0.08C
B
0.0 +2 ---------------------------------.----------.......
4.0 5.0 6.0 7.0 8.0NUMBER OF TASIS
A: CURRENT SYSTEMB: ALTERNATE SYSTEM
BE!EESSION ECtATION FOR A = - 0.326 +0.0768 X1S.D. &BCUT REGRESSION LINE IS 0.02175
BEGEISSICI ECUATION FOR B = - 0.103 +0.0218 X1S.D. ABCUT REGRESSION LINE IS 0.01830
Figure 9.2 Expected loss rate.
because iD method 1, tcth interactive and data transfer wcrk
cccur cui the 15 SOLIS ports while in method 2, only interac-
tive processing occurs on the 14 SOLIS ports with all data
transfers are handled by one high-speed port. The prcpor-
tion cf use remains at 0.61 for method 1 because the
0
74
---
T ABLE V1 - |
Proportion of interactive use
cuarent alternateSroportion proportion
t of .nter- exptd of Inter- exptdUS active use loss active use loss4 0.60 0.00 1.00 0.305 0.61 0.04 1.00 0.006 0.61 0.12 1.00 0.017 0.61 0.22 1.00 0.048 0.61 0.30 1.00 0.09
division cf work in a session is not being varied. The
parameters for the amcunt of time the customer spends in theinteractive portion and the amount of data being requestedfor transfer have nct been changed. The variable being
changed is the number of population sources to SOLIS. This
is being increased fzcm four to eight. The performance of
method 2 is clearly ;referable.The amount of data transferred is the other parameter of
interest. To study the impact of increasing batch demands
on COINS, we started with a base number of TASs, and for
each bass number, iterated through the model while
increasing the transfer demands. The base numbers used werefiv, to eight. Just as we did in the original configuration
of fcur 1ASs, the number of characters to be transferred isincreased from 89,018 to 209900. Appendix C contains thesummarized results cf these runs. The relationships
observed between the system time of the current methcd andsystem timel and system time2 of the alternate approach
generally holds. As the amount of data increases, system
time l increases from about 1 minute to 3 minutes over the
75
16.-
j
system time of method 1. And system time2 ranges between 4.
to 9 minutes less than the system time of the current
system. The interesting statistic is the changes in
expected customer loss. Fcr the current method, each time
the amcunt cf data transferred is incremented, there is a
correspcnding jump in the percentage of expected customer
loss ranging from I to 3 percentage points. This phencena
is not observed in tlhe alternate approach. The percentage
of expected loss remains the same for all increases in
transfer demands. These findings are condensed to one line
entries fcr each netwcrk configuration in Table VII For
example, the second line of Table VII contains the condensed
results fcr five TeSs functioning under larger data trans-
fers ranging from 89,018 to 209,900 characters. The loss
column indicates a range of 4% to 21% expected customer
TABLE VI
Ranges of system times and expected loss
CURRENT ALTERNATE# SYSTEM EXPECTED SYSTEM SYSTE-M EXPECTEDTAS TIME LCSS TIMEt TIME2 LOSS
4 12. 41-19.45 .OC-.00 13.17-21.70 8.01- 9.52 .00-.005 12.33-19.29 .04-.21 13.21-22.39 8.11-10.30 .00-.006 12.24- 19.23 .12-.34 13.23-22.29 8.13-10.29 .01-.017 12.30-19.16 .22-.44 13.29-22.32 8.19-10.30 .04-.048 12.30-19.39 .30-.53 13.35-22.30 8.22-10.21 .09-.09
times are in minutes
loss. Table VIII is the companion to Table VII The table
"- shows the range of proportion of interactive use together
with expected custcuer loss. For the current method,
76
J
..............................
TABLE VIII
Ranges of proportion of interactive use
current alternate0 o~rtion proportion
nter- expected of inrer- expectedTS active use oss active use oss
4, 0.62-0.51 0.00-0.0O0 1.00 0. 00-0.005 0.61-0.50 0.04-0.21 1.00 0.00-0.006 0.61-0.50 0.12-0.34 1.00 0.01-0.017 0.61-0.51 0.22-0.44 1.00 0.04-0.048 0.61-0.50 0.30-0.53 1.00 0.09-0.09
propcrt-cn of use is about 0.61 when the expected number of
characters to transfer is 89,018. As the number of charac-
ters is increased to 209,000, the proportion of use drops to
about 0.50. In metbcd 1, it is quite apparent that as mcre
of the session time is used for data transfers, the price isincreased expected customer loss.
Appendix D has ten sets of graphs for the ten differentdata trarssission aucunts. For each set, there is one graph
showing the relaticnships between the system times and
another graph cosparing expected loss as the number of TASs
is increased. For each expected loss graph, the calculated
regressicn line and error about the calculated line is
shown. Although customer loss also occurs in method 2, the
slope of the expected loss line for method 2 is consistently
smaller tkan the slope of method 1, as seen in the plots in
Appendix D.Close examination of the numbers describing the perfcr-
ance of method 2, reveals that expected customer loss isnot necessarily because of larger data transfers, but rather
the ccnfiguration is approaching its limits in satisfying
77
-,. o - o - .. o - .. . . . . . .... . .. . . . . . . . . .,
the purely interactive demands. This is consistent with curfindings in Table VII, where given a network environment anda certain customer interactive work-profile, no fluctuations
are otserved in expected loss for the alternate methcd, as
increases in the data transfer sizes are made. Referring to
the model of SOLIS as a 2-node network in tandem, providesan explanaticn of this phenomena. Recall that method 2 issimply a reallocaticn of network capacity of method 1,wherety 14 cf the available 15 SOLIS ports are devoted only
to interactive wcrk and all batch work is conducted on cne
port. Increased data transfer sizes only impacts node 2.It was of interest to uncover the kind of situation that
would result in expected customer loss. a closer look wastaken when TUSS is introduced into COINS. The approach
taken was for each increase in data size transfer, the
arrival rate was varied from 2.68 to 17.68 customers perhour. kppendix 2 cortains the results of these runs. They
indicate that a configuration of four operational TASs with
a fifth functioning at a rate of 5.10 customers per hour,
and expected data transfer size of 107,712 characters, thenetwork can expect tc lose 1% of the customers.
We feel the analysis certainly indicates that a reallo-cation of the interactive ports performs better than the
present retbcd. Nevertheless, there are other concerns the
COINS/EPIC must address before deciding on this reallocation
scheme. These lie in the area of implementation. We have
provided the conceptual basis that reallocation is betterand have not looked at the price of iaplementaticn.
although examining implementation costs is beyond the scopeof this thesis, we are compelled to mention the more impor-tant aspects contributing to this cost. In cur view, host
, to hcst prctocol development and network integration are themost serious issues. Converting SOLIS from a 2-stage
facility to a 2-node network in tandem requires prcoessing
78
4.... . . . . .- -.-.
intelligence in both SOLIS and the TASs. This needs to be
carefully specified cn the host as well as on the applica-tion level.
After the issue cf protocols has bean addressed, the
problems of network integration becomes paramount. A well
thought cut transiticn plan must be develcped, wherebynetwork perturbation is kept at an acceptable level. Atransitior generally suggests operating in the old and newsystems in parallel. The COINS/PMO has experience in thisarea, since the network transitioned from a star stcre-and-
forward switch netwczk to one of packet-switching. Dual
services were maintained until all nodes were ready tooperate at the new level.
79
X. c2 D.TS. N U R.Q2...E_.jATjONS
A. SUHAINY
Hithin an ojerational network environment cf fcur
TASs and cne interactive database host (SOLIS), the alter-
nate proposal has a work completion time 4.5 minutes less
than with the current method. This is an advantage if
concern is in freeing an interactive path for a new interac-
tive search and refinement session or getting the data back
to the TAS for fcllcw-on processing of information fusicn or
editing. The alternate proposal takes about a minute lcnger
than the present method to have the data printed at the
terminal site. From a proportion of use standpoint, the
porticn cf the interactive capactiy of method 2 when used,
is completely devoted only to interactive work. However, in
methcd 1, cnly 0.61 cf the interactive capacity is utilized
for interactive work. The reaaining 0.39 is used for file
transfer functions. Despite this fact, the work demands of
four lASs with SOLIS do not indicate any expected customer
loss in the present configuration and certainly not in the
alternate prcposal.
2. .Uzz r cwt_
Customer grcuth was considered as more TASs wereadded. A transfcrm cf SOLIS from a 2-stage service facility
to a 2-node network in tandem exhibits robustness as the
worklcad increases. It is less sensitive to growth than the
current method. As the number of TASs was increased from
four to eight, the completion time to a TAS was abcut 4
minutes less in methcd 2 than in method 1, while completion
80
4%
time t.c a customer terminal was about a minute longer in the
alternate than in the current method. In terms of expected
customer loss and prcportion of use, method 2 displayed an
expected loss range of zero at four TASs to 0.09 at eight
TASs with a propcrticn of use of 1.0. The current approach
exhibited an expected loss range of zero at four TASs to
0.30 at eight TASs with a proportion 3f use of 0.61.
"- 3. 12aia ransf~e Growth
Examining growth in terms of larger file transfers,
the current method was considerably more sensitive to
changes in filesize than the alternative approach. When the
file transfer size is increased from 89,018 to 209,900 char-
acters, completion time to a TAS in method 2 is consistently
4 to 9 minutes shorter than method 1. Completion time tc a
terminal in method 2 ranged from 1 to 3 minutes longer thanthe current method. Similarly, while the proportion of use
remained at 1.0 for the alternate method, this value dropped
from 0.61 to 0.50 fvr the current method for all environ-
ments as the transfer size increased. An expected customer
loss cf C.04 is first noticed in the five TAS environment
for method 1 as transfer size was increased, while an
expected loss of 0.01 is first observed in a six AS
configuration for method 2. For sach network conf4.guration
from five to eight TASs as the data saize is increased, the
expected customer loss in method 1 increases while the loss
remains constant for method 2. For example, in a six TAS
envi:cnment, as data transfer size is increased, the
expected loss in method 1 ranges from 0.12 to 0.34 while
expected loss of method 2 remains constant at 0.01.
81, o,
*4. Feviev
Table IX was prepared to provide a summarized vie9w
of prcpcrticn of use and expected loss when the number of
TASs and data transfer amounts are varied. In the current
*ethcd, the proporticn of use metri1c is sensitive only todata transfer increases. The alternate approach shcws no
- .variation in this variable. Since expected loss is cbserved
* -in both methods as each of the parameters is varied, we can
only ask the questi4on how much better is one from the othsr.
It is quite evident that method 2 i6s substantially more
TABLE XI
condensed comparison Chart
I PROPCIETION OFI NTEBACTIVE USE LOSS
ICURRENI LLTERNATE CURRENT ALTERNATEI As grcwth .61-.61 1.0-1.0 0-30% 0 -9 I(4 tc 8)
IData irowth .61-.50 1.0-1.0 0-53% 0-9%(89 08 toI
stable than the current method.
B. COCUIONS
Jcb specializaticn has frequently been the path to
higher efficiency and better performance as systems grow.
So, it is no great surprise that as customer pcpulation
82
growth and demand for larger data transfers are realized, a
configuraticn whcse underlying philosophy is one of snecial-
ization would perform better than a non-specialized system.
Customer work-profile is a key parametar in the evaluation
just performed. The benefits and advantages of this reallo-
* cation scheme can only be realized if the customer
work-profile remains approximately the same as the expirical
data suggests or if the profile changes in favor of larger
data transfers. In other words, if the profile changes to
where users are spending more time in the interactive mode
than in the batch mode, the new arrangement may not improve
services and in extreme cases will decrease performance.
C. BICCONUNDIIONS
In light of customer population growth alone, scme
consideration should be given to reallocation. However,
when both population and data transfer growth are antici-
pated, we reccmmerd serious consideration of this new
allocaticn scheme. This involves efforts in the development
and evaluation of host and process level protocols and a
carefully designed igplementation plan addressing the rrcb-
lems of operating in a period of transition.
-8
* 83
d, * * . .
EPIRICAL DATA ANALYSIS
TABLE I
SOLIS interactive-only time analysis
sclis interactive time analysis(no bard-copy request)
chi-squared goodness of fit test (exponential)n= 6e mean = 10.13 minutes c qchi- squaredsins. #obs p E(x) statistic
O_ 5 28 .39 26.5 .086-10 13 .24 16.3 .6711-15 13 .14 9.5 1.2916-20 7 .09 6.1 .1321-25 3 .05 3.4 .0526-30 2 .03 2.0 0.0031-35 2 .02 1.4 .26
df = 5 chi-squara = 2.47alpha critical > .25
84
-I"x ,,/, -.' ,- ,- , -t . -' . -. . - - - ..... .,.t.-,-, . . .-. .. *, . , ", , .- . . " ..
TABLE XI
SOLIS interactive time analysis
solis interactive time analysis(with hard-copy request)
chi-squared goodness of fit test (exponential)
n=212 mean = 6.2 minuteschi-squaredsins. #obs p E (x) st atist ic
0- 5 133 .62 131.17 .026-10 43 .21 44.63 .0511-15 19 .09 19.98 .0416-20 7 .04 8.94 .4211-25 4 .02 4.00 0.026-30 4 .01 2.12 1.6631-35 2 .003 .80 1.80df = 5 chi-square =3.99alpha critical > .25
m
85
-1 -.. ,: :-..-........-.... .... . . . .. . . . . .. .• *Z%.
S.Sat TABLE XII
SOLXS data transfer time analysis
chi-squared goodness of fit test (axponential)
n=191 mean = 6.8 minutes chi-squared
ains. #obs p E(x) statistic1- 5 109 .52 99.3 .9476-10 45 .25 47.7 .15211-15 20 .12 22.9 .36716-20 9 .06 11.9 .54021-25 5 .03 5.7 .08526-30 1 .01 1.9 .42631-35 2 .01 1.9 .005
df = 5 chi-square 2.52alpha critical > .25
TABLE XIII
TASI inter-arrival time analysis
cbi-sguared goodness of fit test (exponential)
n=114 mean = 3.393 sinutes chi-squaredmins. #obs p E(x) statfs-ic
0-2 95 .579 100.7 .323-5 15 .24 41.76 .256-8 18 .10 17.40 .029-11 8 .04 6.96 .1512-14 6 .02 3.48 1.8215-17 1 .01 1.74 .3118-20 1 .003 .52 .44
df = 5 chi-square = 3.31alpha critical > .25
86
I p ; ; :; ; . :.: { - -.:: .. ..... ,. . ,.,.. . .. .. . . . .. .
TABLE XI!TAS2 inter-arrival tine analysis
chi-squared goodness of fit test (exponential) p
n=11e mean = 6.!2 minutes ch-qIaemins. #ohs p E(X) statistic
0- 5 58 .53 63.1 .1426-10 36 .214 29.35 1.511-15 9 .11 13.64 1.516:20 7 .05 6.34 .06I21 2r- 3 .02 2.9 0.026-30 2 .01 1.36 .2931-35 2 .005 .63 2.9
*>36 1 .004 .55 .36df - 6 chi-square =7.03alpha critical > .25
TABLE IVTAS3 inter-ar rival time analysis
chisquredgoodness of fit test (exponential)n-e ma 11.76 minutesI
mine. #ohs p E(X) error0- 7 141 .'49 39.9 .0268-15 20 .2149 20.2 0.016-23 8 .126 10.25 .14924-31 6 .064 5.19 .1242-39 3 .032 2.63 .05
U4-147 2 .016 1.33 .33>e1 .014 1.17 .026
df x 5 chi-square z 1.0146alpha critical > .25
87
TABLE ZVI
TIS4 inter-arrival time analysis
chi-squared goodness of fit test (exponential)
n- 29 mean = 22.82 minutes
uins. #obs p S(x) error
0-21 15 .618 17.9 .46922-43 10 .235 6.8 1.5044-65 2 .089 2.6 .1366-e7 2 .034 .98 1.06
df = 2 chi-square = 3.16alpba critical > .05
88
OPERIT!IG INSTRUCTIONS FOR INS BODEL
There are 3 categories of parameter input for the INS
odel. Infcrmation is required describing host(s) charac-
teristics, the netwcrk environment and finally TAS and
server-TAS descripticns.
A. HCST CHBACTERISTICS
For each interactive hcst, the following infcrmation
must be input:
1. proportion of customers doing only iateractive work.That is, those ccstomers that will not _equest a hard-
copy output.
FCBflAT: real. For example: .24
2. distribution describing the interactive-only session
time and the parameters for that distribution. This is a
series of 3 fields.
field 1: must be integer value of 1 or 2 cr 3, depending
on tke distributicn.,* 1 - uniform
,* 2 = ncrual
3 z exponential
F MTCET: integer. For example 3
field 2 and 3: Farameters for the distribution and they
must he in minutes.
if uniform: n1 and n2, where distribution is unifcrm
between nl and z2.
PCBEAT: real. For example 5.2 10.3
89
° : - ... . . . . . . . . . .." . .. . .?" - -" " . . % %.. " .... . -.,% % . ..
if normal: n1 and n2, where n1 is the mean and n2 is -hestandard deviation.
FCRHAT: real. For example 6.8 2.5
if expcnential: nl, where n1 is the mean. Note for thiscase, scme number must be input for n2 even though thatis meaningless. This is because of a minor inflexibilityin the program structure.
PCHMhT: real. For example 6.2
3. distribution, describing the amount of charactersrequested in a hard-copy command, and the parameters forthat distribution. This too is a series of 3 fields.Their formats are as those described above.
4. distribution describing the interactive time when a
hard-ccry request is made, and the parameters for thatdistribution. The parameters must be in minutes. This
is a series of 3 fields and their formats are exactly asthcse described atove.
5. hi-speed flag: used to indicate whether or not thehost is to be considered as having a hi-speed transfer
facility when the alternate configuration is run.
0 = nc hi-speed facility1 =yes
6. number of ports: this is the number of interactivepcrts the host is cffering to the aetwork.
ECEMAT: integer. For example 15
B. iUTUCIK CONFIGURATION
This is the number of TASs, HOSTs and server-TiSs in thenetwork. The numbers must be input in that order.
PORMAT: integer. For example 4 1 0
90
Comment: if server-TASs are not to be considerai as
offering network services, then the number of server-TASs
Must te zero. However, if it still functions as a TAS, they
should be included in the number of TASs.
C. [IS AND SERVUR-TAS CHARACTERISTICS
The fields and formats describing the TAS and the
server-TAS are exactly the same. TAS characteristics must
be input first, followed by the server-TAS. This is so
because the program first builds the data structures for the
TASs, then the server-TASs. The unique thing about theserver-TASs is that they also function as HOSTs, hence they
are alsc duplicated in the HOST data structures with an
extra flag-field indicating that they are really a
server-US. This flag-field is for port accounting
purposes. If a custcmer from 1 server-TAS requests access
to a netvcrk resource, its accounting tables as a TAS are
updated to reflect this. However, its accounting tables asa HOSI must also be updated to reflect a busy condition.
The following information must be input:
1. customer arrival rats per hour.FORdIT: real. For example, 17.68
2. rusber of ports available for interactive work.
FORMAT: integer. For example, 24
3. prcpcrtion of users requesting network access.
FORMAT: real. For example .70
4. Ihe next 3 fields describe the proportion of custcmerswanting access to SOLIS, USIS, and NUIS. Because of a minor
shortcoming of the way the program was written, thesenumbers must be cumulative. For example, if there are .80
ig going to SOLIS, .10 going to USIS and .10 going to NUIS,this information must be input as
0.80 .90 1.0
FORMAT: real. For example .80 .90 1.0
91
5. bi-speed flag: used to Indicate whether or not the TAS
or server-AS is to be considered as having a hi-.speedtransfer facility vben the alternate configuration is ruD.
o = no hi-speed facility
1= yes
92
AIUfIRU. _£
TABLES OF RESULTS
The fcllcving four Tables show performance measurements
of a network configuration vith five, six, seven and eight
lAS's as the data transfer amount is increased.
I
TABLE XIVII
Five TIS configuration
current alternate# char. system exptd pro.of system system exp d
time lOSS use timel tIme2 loss89018 12.33 .40 .610 13.24 8.11 .02097920 12.84 .050 .600 13.88 8.24 .020
107712 13.41 .060 .590 14.60 8.39 .020118483 14.04 .070 .570 15.39 8.56 .020 I130331 14.71 .090 .560 16.27 8.76 .0201433E4 15.46 .110 .550 17.24 8.98 .020157731 16.32 .130 .540 18.33 9.24 .020170 81 17.22 .150 .530 19.52 9.53 .020190818 18.18 .300 .520 20.87 9.88 .0202C9SC0 19.29 .340 .510 22.39 10.30 .020
times are in minutes
93
_"_,r ' ' '~~~~~~~. '..'" " ' " "" ' "' " . . " " " . ...
TABLE IVIII
Six TAS configuration
current alternate# char. system ex~td pro.of syszem system exptd
time loss use timel time2 lcss
89018 12.24 .120 .610 13.23 8.13 .01197920 12.75 .130 .600 13.87 8.27 .011107712 13.29 .150 .590 14.58 8.42 .011118483 13.90 .170 .570 15.37 8.59 .011130331 14.59 .200 .560 16.24 8.79 .0111433E4 15.31 .220 .550 17.22 9.03 .0111577C1 16.16 .250 .540 18.30 9.28 .011173471 17.06 .280 .c30 19.50 9.58 .011190818 18.00 .300 .520 20.82 9.91 .0112C9900 19.23 .340 .500 22.29 10.29 .011
times are in minutes
TABLE XIX
Seven TAS configuration
current alternate# char. system exptd pro.of system system exptd
time lcss use t-u91 time2 loss
89C18 12.30 .22 .61 13.29 8.19 .0497920 12.79 .24 .60 13.97 8.33 .04107712 13.33 .26 .59 14.-66 8.49 .04118483 13.98 .28 .57 15.45 8.66 .04130331 14.66 .31 .56 16.33 8.86 .041433E4 15.43 .33 .55 17.29 9.08 .041577/01 16.21 .36 .54 18.37 9.33 .04
1734"1 17.13 .39 .53 19.55 9.61 .04190818 18.23 .42 .51 20.87 9.94 .042C99C0 19.16 .44 .51 22.32 10.30 .04
times are in minutes
94
, , ", " " - .- . . ... . ..
TABLE XX
Right TAS configuration
6Icurrent alternate
# char, system exptd pro.of System system exptdtime IcSS use timel time2 icss
89018 12.30 .30 .61 13.35 8.22 .09
57580 12.85 .33 .60 14.01 8.37 .09107712 13.38 .35 .58 14.72 8.52 .09118483 13.98 .37 .57 15.51 8.69 .09130331 1.69 .40 .56 16.38 8.88 .09143364 15.47 .42 .55 17.34 9.09 .09157701 16.25 .45 .54 18.41 9.33 .09173471 17.14 .47 .53 19 58 9.60 .09190818 18.22 .50 .52 20.86 9.88 .092(9900 19.39 .53 :s5 22.30 10.21 .09
times are in minutes
,95
L:,4
2".1
I,
S -
* 9
S
.5..V -. . . . .
1D-A132 989 RN INVESTIGATION INTO THE COUPLING OF INTERACTIVE AND 2/3BATCH NETWORK SERVICES IN COINS(U) NAVAL POSTGRADUATESCHOOL MONTEREY CA J B KIM JUN 8-
UNCLASSIFIED F/G 912 NLillllEEimEnniE/limE/I/EEiB/IK//E//E/////EEIEII//EE//IE//IEIIEIIEEEEEEEEEIIEEIIIEEIIEE
* '-.-. n-. .- -.- . -.. ..- - - -
9&11 L1.0 JjM58w
11.11 ..
1a 1 1.
"22
111.25 Ii 16
MICROCOPY RESOLUTION TEST CHART* NATIONAL BUREAU OF STANDARDS -1963-A
....-.
S,.°
SYSTER TIRE AND EXPECTED LOSS CHARTS
There are a pair cf graphs for each increment cf data
transfer sizes. Tke first graph shows the relationships
between the syste times of the two methods. The second is
a plct cf the expected loss of the two approaches. For beth
graphs, the x-axis is the numter of TAS's operating in the
netvczk with arrival rate of 17.68 customers per hour. All
tines are in minutes.
o."
L-.
8 IN UT IS
l.4
BBE E
12.5; AA AA
f - -- -
114.0B
~-
9. 5
C C8.0; C C C
4.0 5.0 6.0 7.0 8.0NUMBER OF TAS'S
A: SYSTEM TI'E (CURRENT)B: SYSTEM TISEt (TO TERMINAL)C: SYSTEM TIME, (TO TAS)
Figure D.1 System times vith 89,018 characters.
97
. *' ,, ,.4 . . *~ -. ,-....,-.. -,. - - ," ,-. .- ,."... . .. .. ,.-,. . .. ." . .. -.- - .. . . .. . . .• 'P'"; ,',,.,,-, , , ,, ." .,. ..- ,. ,,.. ... .. ... .. .. . .. .. .. . . . . .*T .. *4. ,. . . ... . . . . . .
-II
0. 2IISETD LOSI
0.240
- A
C.160 I
0.080B
BBI0.0.2 I
4.0 5.0 6.0 7.0 8.0NUMBER OF TASIS
A: CURRENT SYSTEM IB: ALTERNATE SYSTEM2: BOTH SYSTEMS
REGRESSION EQUATION FOR A - - 0.326 .0.0768 X1:S.D. ABOUT REGRESSION LINE IS S = 0.02175 j
REGRESSION EQUATION FOR B a - 0.103 .0.0218 XlS.D. IBOUT REGRESSION LINE IS S 0.01830
figure D.2 Rxpected loss with 89#018 characters.
98
I. ..,. .;.- .. . .-. ..: ... .. . ... -. . . .. .. .... . . . . . . . . . . . ,. . . . ... .
-, . -.4,7I ,. w .2. . . . f.. - *,, -,o. , . .-. . - . . , . .:. . - . , . . .r " - ,. r - : r
-
'f I--97920 EXPECTI AMOUNT CHARACTERS TRANSMITTED
MfINUTES14.0+ E B B B
12A A A A". I12.5_
11.0
9.5
8 .0 -c
'.0 5.0 6.0 7.0 ;.i
NOMBER OF TAS'S
A: SYSTEM TIME (CURRENT)B: SYSTEM TIMEI ITO T!RMINAL)C: SYSTEM TIME2 (TO TAS)
figure D.3 System times with 97,920 characters.
99
"'' S" " - ,'f * . ." %" - ', t . " .. . * -, " • .. " ., ".:: - . .. . .; . .. .
97920 EXPECTED AMOUNT CHARACTERS TRANSMITTED
EXPECTED LOSS0.360
A
O.27C
A
0.180
A
0.090 B
BB
- ~B0.0 2 E
(.0 -.0 6.0 7.0 .0NUMBER OF TASIS
A: CURRENT SYSTEMB: <ERNATE SYSTEM2: BOTH SYSTEMS
DEGRESSICH E8UATION FOR A= - 0.350 +0.0832 X1S.D. ABOUT REGRESSION LINE IS 0.02071
REGRESSICN EQUATION FOR B = - 0.103 +0.0218 X1S.D. ABOUT REGRESSION LINE IS 0.01830
Figure D.4 Zpected loss vith 97,920 characters.
100
Io |
i
107712 EXPECTJL AMOUNT CHARACTERS TRANSMITTED
"'- ; 15.5
-E E B B B
14.0-A
A A A A
12.5
11.0
9.5
- C C
8.0 C
e ... .. .. . . ....... eeeee -------... eee....eee...
4.0 5.0 6.0 7.0 8.0NUMBER OF TIS'S
A: SYSTEM TIME (CURRENTB: SYSTEM TINE1 (TO TERLINAL)C: SYSTEM TIME2 (TO TAS) I
ggure D.5 System times vith 107,712 characters.
101
• " " " , 1. , '.,% '.,%,.,..'.'.'.',.;. .c .... . -2".. , .... ," .." * .• , -.,.' - .. .. .'.'- .. .', ".• " . ..
107712 EXPECTEC AMOUNT CHARACTERS TRANSMITTED
EXPECTED LOSS0.360
0.270- A
C.180
0.090; B
A BB
0.0 +2 B-------------------------- +.---------------------
4.0 5.0 6.0 7.0 8.0NUMBER OF TkSIS
A: CURRENT SYSTEMB: ALTERNATE SYSTEM2: BOTH SYSTEMS
SEGRESSION EGUATION FOR A = - 0.365 +0.0882 X1S.D. ABCUT REGRESSION LINE = 0.01780
REGRESSION ECUATION FOR B = - 0.102 +0.0217 X1S.D. ABCUT REGRESSION LINE = 0.01819
Figure D.6 Expected loss with 107,712 characters.
.
-,' 102
.- ..............
I.I
118483 EZPECTz! AMOUNT CHARACTERS TRANSMITTED
16.0
- B B- ! E B
14.0; A A A A A
12.0
10.0
- C CSC C8.0
S....... .......-------------------------
40 5.0 6.0 7.0 8.0NUBBER OF TASIS
A: SYSTEM TIME (CURRENT)B: SYSTEM TIMEI (TO TERMINAL)C: SYSTEM TIME2 (TO TAS)
Figure D.7 System times vith 118,483 characters.
103
1XPICTEE LOSS0.40 A
0.~30A
- B1 0.0 2 E4.0 5.0 6.0 7.0 8.0
NUMBER OF TAS'S
A: CURRENT SYSTEMB- ALTERNATE SYSTEM2: BOTH SYSTEMS
SEGRESSION ECUATION FOR A 0.302 0.0217 XS.D. AECUT THE REGRESSION LINE =0.01409
Pigaze D.8 Bzptcted loss with 118v483 characters.
N.,
1014
e, ,. "; •. . .
130331 EXPECTED AMOUNT CHARACTERS TRANSMITTED
.9 NJIIS18.0
E B B B16.C; B
-I A A A
12.0A- I
10.0
*- C C C C C
8.0-- -- -5-0- 6.---
4.0 5.0 6.0 7.0 8.0NUMBER OF TASIS
A: SYSTEM TIME (CURRENT)
B: SYSTEM TIBE1 (TO TERMINAL)C: SYSTEM TIME2 (TO TAS)
Figuze D.9 Slstes times with 130v331 characters.
105
EXPECTED LOSS0.40+
0.30+ A
0.20;
0.10
A B
BI0.0 + B
4.0 5.0 6.0 7.0 8.0NUMBER OF TASIS
A: CURRENT SYSTEMB: ALTERNATE SYSTEM
REGRESSICN EQUATION FOR A = - 0.393 +0.0988 glS.D. ABOUT THE REGRESSION LINE = 0.01087
REGRESSICN EQUATION FOR B = - 0.102 +0.0217 X1S.D. AB OT THE REGRESSION LINE = 0.01787
Figure C.10 Expected loss uith 130,331 characters.
106
143364 EXPECTIE AMOUNT CHARACTERS TRANSMITTED
MINUTES18.0
-g 8 8 B
16.0A ,A
14.0
12.0
10. C
-C C CC C
8.04.0 5.0 6.0 7.0 8.0
NUMBER OF TAS'S
A: SYSEM TIE )B: SYSTEM TI-EI TO TBRINAL)C: SYSTEM TIAE2TO TAS)
Figure D.11 System times with 143,364 characters.
107
* .**. . . . . . . . .
.i,.':EjPEC7IED LOSSO.50
! -
- I
0.20
I- I
O.10
AB
I- IB
-A B0.0 + E E I+-,,. ......--- -........ ----........ -----
4.0 5.0 6.0 7.0 8.0
NUMBER OF TAS'S I
A: CURRENT SYSTEM IB: ALTERNATE SYSTEM
REGRESSIOtI EQUATION FOR A = - 0.393 +0.103 XlS.D. ABCOT THE REGRESSION LINE = 0.008702
REGRESSION E"UATION FOR B = - 0.102 +0.0217X1
S.D. ABCOT THE REGRESSION LINE = 0.01819
Figure D.12 Expected loss with 143,364 characters.
.1
"" 108
' ,,"~~~~~~~~~~~~~~~.--.-."..-..'.-...-... .. i. ...- .. ...-.. .... ,. .- •i,
157701 EXPECTED AMOUNT CHARACTERS TRANSMITTED
HINUIES19.0
-B B B B-E
16.5+ A A
11.5
*C C C9.0; C C
*4.0 5.0 6.0 7.0 8.0NUMBER OF TAS'S
A: SYSTEM TIME (CURRENTB: SYSTEM TIME1 (TO T ERMINAL)C: SYSTEM TINE2 (TO TAS)
Figure 0-.13 System tines with 157,,701 characters.
109
, • .. . . . . . . . . . . .- .o . O o . . . .o . . .. . o . w o . . . . . . ~ , .. v . °.
EXPE.C7E LOSS0.50
.0.4 A'-: 0.40
A I
0.30
- A
C.20
A0.10
BBE B
- A B0.0 + -E
4.1 5.0 6.0 7.0 8.0NUMBER OF TASeS
A: CURRENT SYSTEMB: ALTERNATE SYSTEM
REGRESSION IGUATION FOR A = - 0.403 +0.107 X1S.D. AECUT THE REGRESSION LINE = 0.0099
REGRESSION ECU&TION FOR B-- - 0.102 +0.0217X1S.C. AECUT THE REGRESSION LINE =0.0181
Figuze D.14 Expected loss with 157,701 characters.
110
i . . " .o . . . o . . . . . , . -. , . . . .- . . . .° . o . .
173471 EXPECTED AMOUNT CHARACTERS TRANSMITTED
MINUTIS21.5
19.C
-A
165A A A A j16.5
14.0
11.5
- C C C C9.0
4.0 5.0 6.0 7.0 8.0NUMBER OF TASIS
A: SYSTEM TIME (CURRENT)B: SYSTEM TIME1 (TO TERMINAL)C: SYSTEM TIAE2 (TO TAS)
F igure D.15 System times with 173,471 characters.
' 111
4,
.1
EXPECI E LOSS0.5CA
0.40
0 - A
0.20
*- At
0.10; B
-~ BB
0.0 + B E------------------------- ---
4.0 5.0 6.0 7.0 8.0NUMBER OF TAS'S
A: CURRENT SYSTEMB: ALTERNATE SYSTEM
REGRESSION EQUATION FOR A = - 0.398 +0.110 X1S.D. AROUT THE REGRESSION LINE = 0.0148
I REGRESSION IQUATICN FOR B = - 0.103 +0.021 Xl-.D. ABOUT THE REGRESSION LINE = 0.0185
I-_ _ _ __
Figure D.16 Expected loss with 173,471 characters.
112
V.
19C818 EXPECTID AMOUNT CHARACTERS TRANSMITTED
~10 EEB B B
8..A A k A A
15. C
12.0
C C
405.0 6.0 7.0 8.0NUMBER OF TAS'S
k: SYSTEMI TIME (CURR ENT)B: SYSTEM TI1191 (TO TERINAL)C: SYSTES TILIE2 (TO TAS)
Figure D.17 System times with 190,818 characters.
113
IXPECTIC LOSS
0.50
0.40
0.30; A
C.20
0.10- B
0.0+ E --- ...... ------- - ----4.0 5.0 6.0 7.0 8.0
NUMBER OF TAS'SA: CURRENT SYSTEMB: ALTERNATE SYSTEM
BEGRESSION EQUATION FOR A = - 0.398 +0.115 XlS.C. AECUT THE REGRESSION LINE = 0.01880
REGRESSION ELINTION FOR B 0.102 +0.0217 X1S.C. AEJUT THE REGRESSION LINE 0.01819
Figure D.18 Expected loss with 190,818 characters.
114
.. i....---------------------. -- - - - - - - - -
2C9900 EXPECTIC AMOUNT CBA~ACTERS TRANSMITTEDI
MINUTES24.0
-E E B B B
21.0-
15.01
-C c C C C9.0
4 .0 5.0 6.0 7.0 8.0NUMBER OF TAS
A: SYSTEM TIME (CURRENT)C: SYSTEM TIME2 (TO TAS) ALB: SYSTEM TIMEl (TO TERMN)
Figure D.19 System times vith 209v900 characters.
115
II-V
!XPECIED LOSS
0.60A
0.45; A
".. C.15-B
A
- B0.0 EaC 4a -
t4.0 -.0 6.0 7.0 8.0NUMBER OF TkSIS
A: CURRENT SYSTEMB: ALTERNATE SYSTEM
REGRESSION IGUkTION FOR A 0.384 0.117 X1S.D. AECUT THE REGRESSION LINE = 0.02349
REGRESSION EQUATION FOR B = - 0.102 0.0217 X1S.D. AECUT THE REGRESSION LINE = 0.01819
Figure D.20 Expected loss with 209,900 characters.
116
............. ............ .. ..............
FIVE TO EIGHT TAS COIFIGURATION
These Tables are the results of simulation runs of a
five TAS environment, where four TAS's are running in a
fully operational mode and the arrival rate of the fifth TAS
is incriased over each run from 2.68 customers pgr hour to17.68 custcuers per hcur. For each of these arrival rates
for TAS5, runs were made with varying the data transferamount. The lastda ccluan in the Tables refer to the lamtda
cf [1S5. The remaining four TAS's are running at 17.68customers per hour.
TABLE 1I2
5 TAS, 89,018 characters: expected transfer amount I1current alternate
sstem exptd prop. e s stem sstem exptd Ilamkda time lcss cf us timal t.me2 loss
2.68 12.33 .0 .61 13.18 8.05 .05.10 12.33 .006 .61 13.21 8.06 .05.61 12.32 .011 .61 13.21 8.07 .06.20 12.33 .009 .61 13.23 8.08 07.47 12.32 .012 .61 13.22 8.08 .0 !9.04 12.34 .015 .61 13.22 6.07 .014:8 12.33 .031 .61 13.23 8.10 .00117.68 12.33 .039 .61 13.24 8.11 .001
times are in ainuteslamda rate is per hour
117
_1_.
.-. . "
TABLE XXII
5 TAS, 97,920 characters: expected transfer amount
current alternatesystem exptd prop. system system exptd
lambda mIae loss or use timel time2 loss
2.68 12.84 C07 .60 13.81 8.16 .05.10 12.85 .009 .60 13.84 8.18 .05.61 12.84 .014 .60 13.84 8.18 .06.20 12.85 .011 .60 13.87 8.20 .07.47 12.84 .016 .60 13.85 8.20 .09.04 12.85 .019 .60 13.85 8.20 .0
12.02 12.83 .025 .60 13.86 8.21 .014.80 12.82 .038 .60 13.87 8.22 .00117.68 12.84 .049 .60 13.88 8.24 .001
times are in minutesIlambda rate is per hourII
TABLE XXIII
5 TaMg 107,712 characters: expected transfer amount
current alternatesystem exptd ;rop. sys:sm system exp-d
lambda time loss o use tmel t:me2 loss
2.68 13.41 .011 .59 14.51 8.30 .05.10 13.42 .015 .59 14.54 8.32 .05.61 13.40 .018 .59 14.54 8.31 .06.20 13.42 .016 .59 14.57 8.34 .07.47 13.41 .C22 .59 14.55 8.33 .09.04 13.42 .026 .59 14.56 8.34 .0
12.02 13.41 .033 .59 14.56 8.35 .014.80 13.38 .046 .59 14.58 8.37 .00117.68 13.41 .058 .59 14.60 8.39 .001
times are in minuteslambda rate is per hour
118
..... :. ... . . .... . -. . . ? -..., . - .. . . -
-Z "6 __ 2I N ILTQ .F i11V.J %
TABLE XXIV
5 TASv 173,471 characters: expected transfer amount
current alternatesystem exptd Erop. system system exptd
lambda time oss of use timel time2 loss
2.63 17.24 .052 .53 19.34 9.34 .05.10 17.18 .060 .53 19.38 9.36 .05.61 17.25 .066 .53 19.40 9.38 .06.20 17.19 .064 .53 19.44 9.40 .07.4" 17.20 .078 .53 19.40 9.39 .09.04 17.24 .087 .53 19.43 9.41 .0i!12.02 17.16 .104 .53 19.45 9.44 .0
14.80 17.21 .133 .53 19.49 9.49 .017,68 17.22 .151 .53 19.52 9.53 .0
times are in minuteslambda rate, is per hour
TAS, 190,818 characters: expected transfer amount
*current alternatelakasystem exptd Erop. system system excti
2.63 18.18 .060 .52 20.66 9.65 .05.13 18.25 .080 .52 20.74 9.71 .05.61 18.22 .084 .52 20.72 9.70 .06.20 18.19 .082 .52 20.76 9.73 .07.47 18.21 .096 .52 20.72 9.72 .09.04 18.28 .110 .51 20.73 9.71 .0
12.02 18.22 .130 :5j 20.77 9.77 .0I14.80 18.19 .157 52 20.81 9.80 .00117.68 18.18 .177 .52 20.87 9.88 .001times are in minctesI
* lambda rate is per hour
119
EVENT LOGIC DIAGRAMS
This Appendix contains the logic diagrams of the inter-
nally generated events of the INS model. The following list
of terms and definitions are included to aid in the reading
of tte diagrams.
1. THCUEUE: Queue of network requests. There is cne for
every possible combination of TAS and HOST. TASKs are
placed in the appropriate THQUEUE as defined by the
TAS and HOST identifier.
2. TASK: Temporary entity that may belong to a THQUEUE.
3. LQUEUZ: High-speed facility queue. There is one for
every possible combination of TAS and HOST. LTASKs
a-e placed in the appropriate LQUEUE as defined by the
TAS and HOST identifier.
4. LTASK: Temporary entity that may belong to a LQUEUE.
5. NU2: Expected service time for the interactive session
when hard-copy demand "is also requested.
6. NU1: Expected service time for an interactive session
when nc hard-ccpy demand is submitted.
7. N-31: Expected service time for data transfer in the
current method.
8. HU32: Expected service time for the data transfer in
thle alternate method.
9. BETURN: Return to the SINSCRIPT 11.5 timing routine.
120
*., " -'.:,:.--- - -.-. , .. .. .. :: .::: 1,. .. .. : ..- ; ... -: :-; . . ....... ::-: :. : :i; ' . : - : . ._ '. . . _ % ,, -------- ,---------..---..--...-..-- . . .. .. ... .. .
-~~~7 -7- -V.*..~
MAI
initialize model variablesrea parameters-
---------------------------------------------create permanent enti.ties - paths between tas ;1pin newr configuration
-------------- ----------------------------
iterate through mcdel for current method thenSfor alternate method
SI ~initialize random number seeds II schedule custcaer arrival to tasstart simull tionat terminatc rnreusI reset model va leess
IIand nosl
aa
iigure P.1 MAIN.
121
*~q*~~ *t .sch *dule,..usto'.... ........ .o . as
TASx.AERIVAL: custcmer arrival to a tas+- - - - -- - - - - - - - - - - - - ---
Iscbidule the next custoler in amount of timedef ned by the exponential inter-arrival idistribution with parameter 1/lambda
----------------------------+-----------------Icustomer network request I
yes n .o--- --- -- --
2. determine datatase host I I2. determine work profile
I I
available none available
+----------- - ------- 4- ------------
1 SeiZe rescurce I1.if queues permitted12 if hard-copy demand create temporar-yschedule event for task with customer
customer to send attributes:in cudin at offi~e task in appro-ime defined by expo- priate thqueue
.- nential 1istribution 2. if no queues,with parameter xu2 customer is lost to
". if nc hard-copy the systemI -. schedule customer
dgpartur in amtof !time def ined expo-Inential distriButionwith param sul
-- - - - - -- - - - - ---
REIUHN REURj
Figure P.2 TAS ARRIVAL.
122
a.- . . . .
TBDEPIRT: Customer departures for current methcd
and fcr cases when no hard-copy requests are made
r update accounting variables Irelease network resources I
S IIf any cther departures at this same time instantl1. remove this event from the events list -2. update accounting variables I3. release netwcrk resources
)i
1. search through all acn-empty thqueue's for atask that canbe serviced by the availablezescurces.
2. if such a task is found,remove task frcm thqueueseize the netwcrk resourceif no ard-copy demands, tim
sch.dule custcaer departure in amount of timedefined by exponential distribution withp * arameter mul .
if bard-copy demand, . _ .scheule event to send print-cmadt ain amount of time defined by exponentialdistribution with parameter mu2
RET RN
Figure F.3 THDEPkRT.
123
- _ _
USINE: Customer sends print command to TAS
• -
schodulq event at tbe user-tas to handleuser Flint ccumand in the amount of time totransmt command from terminal to cpu
IRET IRN
Pigure PoA USEND.
124
* ' '' ". '. ",. " , - . ** ." -. -. -. - ."-,". . .
UC.ARSIVIL: At TkS to handle print command
state of tas resource
busy Ifree
1. ceatetemprar 1. set tas resourceentity, utask, with I jbusy eet~
2.f2 sakintsrelease tas resourcequeue in amount of time t
process theI
Irequest,
Figure 1.5 gC.ARRIVALe
125
SCARBIVAL: Print command arrives at host
4-L state of host resource
busy [free
-................. -----------------------create tempo;ary I. set host resource
entity, st'ask with busycustomer attributes 2 2. schedule event to2. file stask in host release host rssourcequeue in amount of t-me toIrepare data forea nsm i ssi1on.
------------- 4-------------------.. -
EIURN REIURN
Figure F.6 SC.ARRIVAL.
126
. 4, . - ' ., . , - - . - , , . ,, ., , . . .. . . - .. : .-- , .- . .. . . - .. , . ..
! Ii
SC.DEIART: host has completed preparation ofdata fcr transfer
set host resource free
method !
current I alternate4.-----------.------------------------I •I
schedule a comletion of data | release networktIansfe: in am% cf tile de- I I resourcesfined by the expcnent4.al dis- I Itributicn with paraseter 2u31 I I I
* ------------------------------------. 4---------------4.
•---- Ila I-.....-4--, I
.--- - ------------------------------Istate of host I Istate of high speed facilitylqueue ! I I
4.-----------4 4-----------------------------------
busy I free
1 reate temporary i1 . seize high speedItast with cus- resourcetomer attritutes 2. schedule comgle-2. file Itask in tion of data x e- inIlqueue amt of time lefinedby th-p exponential
dlstribut-on withparamater mu32
------------ --- --- ask -
.z2 I IzI I IzI I4.--- . __-__-__ __ ___ __ ___ __-___-
Figure F.7 SC.D3PART.
127
1 ,. ' ., . . - - .,, ' .. , .. . . . . . - . .. . - .. ..
S'e
SC.DEPAIRT (continuation 1)
Izl
+ . .. .. .. + . .. . . ..state of thqueue I+ I
not empty I empty---------------------- -----------------------------------
I. remove eaoliest task in thqueue that IIcan te serv ceda by available resources2: qeize network resources3.i.f nc hard-copy demands,
schedule customer departure in amt iof time defined ty exponentialdistribution vith parameter mul
4-.if hard-copy demands, . 1schdule event tc send print commandto tas in amount of t .me defined byexpcnential distribution vithp alameter mu2.
*- -- - --- e e e e e e e e e e e e e e e e
Ia II a I---- +-i-+- I
Pigure 1.8 SC.DIP&ET (continuation 1).
128
* * C C*
SC.DIEABT (continuation 2)
Iz2,-----+
not empty I emptyi II1. remuve earliest stask from queue2. set host resource busyZ. schedult this event to release host !rescurce n amount of time toprepare data for transfer.
----- ------------ ----------------- +
RE2IU RETUIN
Figure F.9 SC.DEPABT (continuation 2).
129
*~ .* .. . . . .. .~ .' . ..
LTBDEFIST: hard-copy transfer completed
gupdate accounting variables I
- -.....-----------
I method g
currents alternate------------------------ -- 4.-
lichedule customer state of high speed queue
-- - not empty I empty
1. remove earliest ltask fromI Iquee 02. schedule this event in amt of ,time jefined by exponential Id str iutcn with parameter mu32
3. destroy Itisk Ia -- n4.-------------+
if an cther transfers completed at this tie1. reove event from events-list2. update account+-ng variables3 fcr alternate case,
If state of hi-speed queue not-empty,rescve earliest ltast from I ueieschedule this event in ant of time definedby expcn ntial distribution with parameter mu32destrci: ita sk ..
4. for current case, schedule a customerdeparture
figure P. 10 LTHDEP&RT.
130
" ,4 . - , -. ',- - ' - . _' -, . .. - _. , - -: _ . .' '. ' ,- , - . . . , . .. . " . . . . ' ' . '
CICSIUG: Halts customer arrivals to the TASs
Cancel the customer arrival to the TAS
RET IRN
Figure F.11 CLOSING.
131
S3
131"
,-,, , '.. . - ' .. ' S, . . S, , - S 5).. . , . . . . . .. . . '.. . . . 5. - . . .- . - -
~~~~~~~~~~~~~~~~~. ....... .. ... . ,..... ...... ,.... ...... . .... . : ..u ,. ... .,, ,;.,
:.,
INS PROGRIN LISTING
This 1p endix cortains the program listing for the simu-
lation ucdel and the Job Control Language statements that
were used to run tha simulation at the W. R. Church ComFuter
Center.
.13
.'
• . 132
*44Q
*14 64*H E2
* 1-4 E-
M E-4 E- *n
mm pa0. %H
04 1114 *W :04 02
*000 di Ad4 91as== tn *m (nb ..
*4a Wa H4. HH =0a% . r@11 Oda C-4 U)s 4H M CD
*h 0.. ocm 4c-9cm E4 44 P Da
*01A4: Do 0.4 i I~ I
*9-04-4* 4 W4raJWa) 2 o 422 A14 2d0W
E--4 222 #J 4 aE4 4H *40.4 * M H2W-4 2 0 WE- 4 V)%=hd *020 L-4* mu) m tn 0 oq Q4 " .o bm W
Od) w 0 * tn =a - M E4wJl 14. a4 * . 9. * 4 4a w n nCo l 0 *E.c
ad dZdw1 * tn W Ird0 42 ow Ww=WQQ5 4 4 E- 1- 0'-. ; *-42AP As * u.4l4H2~ tnQ q2vOJ0 5W v
CW *04""P4 * 04 M 2CDC 4G d.q d* cn 14E04a -; = P"u=~ m (MN *QM~ L4f)4rw Ad 040 p %0S -4b14 =3 6 o(%A * H3 * 2-% mowo4 W 10464"3M H ) E4 4-04C N
*4 bw 41n w-U 22 e E4 U)H.m w in s42- w o4tU) ao
*14H~ Lr) * U) Q4 IQ )4 14oc 0'2 4 b mci 2 cmi o dr
4-0. c* MuTh * Cfl.J044 W I(nFH3-a =1o4 &a14 9-4 0C41 *44h bo M'14 22 W0- U)4d~o W :.
V 41 4Z4.9N **o bU I~UCEC )g4l9UIJ4 .#=~C~~Oc~d *4k * ("1)4 mU) Wiag 04 Q~ = m a3Jafl.W4an adU)"Yoli( *cu *~ 01W W W W... U) ulch4 22 CA 0L
03C * HE-M * ~ MM M :-4 :i1g03 M- 4-1G02"0* 140 ma' . 0iU-4" W 4 Cl)4.0 ) U 44 0 ot
6UQ **O ..9hamma 0WWI-m4ftW0 9-M ~ ~ 2 ) C(44 4FJ
.. 0~* u4o * G)U120)o14~042 PQ*4)0* 44Q000 44
~gg ~~~aa 4 F'~z4a~,~a 1 33 I 94 l )2 l .
;4 c
cncn -3cn
W40 04 M-
0404 Nq H
Nb) CDWHo )c
E-4& Doem14
m 8H m tnHH E-4 4CO4
MU)tflU) t04 4
E-4 tnC c3 c
E-4 % H
04 HU AdH q H Hzo
E-4 :mN01 %H C3 H- O
do 04 L) =0L 4 004 W OJ1 E4 w-H
d4 N4 9 H =.-4U) c1E-4 E14
0 0 E41k 0 o0 z
Pao 0 N w %~z PQ~ Na U aWnU
QN Q V; 04 H 3cO 14a 0
:00 4 W& U4 OHU 14 tnE ~ H )-4. En %-lI tn" Q E4 1-4
U ~ I %c U) UE4 W IW 1L1 4E- WOCW= l H 04 tN w a v414 0 4 0! 0 4 0%1
U).LU M4H Hl OQU04c 0.4 2S 4U f a( -%PoNa NUt % 1 U) 1O ONZ ==An " 6M =0 0.4
2Q 2 I#2U2 4)E-44E 4to 04 a-)o % 8 t 004cns-H sN H E-0 H4414- HH H Nd SH*4 0 N 4
H=44 O 4I b-4 204 2e HCnE -I024basm3ft4w ul1O 4 *E4MN~ QamN H 2 O~M AU~ lb 04=m
WA4 0000 H4 *-0 4 "H r4 *2 W E-4EM W
M4PO w3 04WCUO WC M Oc ImU
pp 4 O 0-O44 4 44 E-4)44s44
E-4 4 pa
k 134
En mga
w $4aca
H w4 H
4 4 ow A"Hn po a -
W 0 E4 "im paE- Hg C
J 09: 44 H-.cn00H HnasE-46*1 c4 E- 0
F4 4A cn 84i.04p -4 f
~3H in cn eno40 asG E-0i 04 Oo
0 I4 C -4 me 02E4 E-4=m %H 0Z 4 (n ZnH .8E4 en %. 0
in wa CzHi-4 0 0ene P n 0 23 E404 =04 404 8-4 64 PQ E4
o~ Kf.en 0 ow tn: W4 E-4 U &40 Dotn 64 Aam44 4E84 % v" raE-4 ra W~ 8O 4 -4 tn o H I
'1w 04 4 4 84 E0PQ H(n CA ad ocn E 40.
'-4 4.4 * 412 one
W4 &'-1 0 %14 cn 84ui
I* enw Ote 8 H H I I H H H om n ' ' 4 8 ~H H -0 *m U04 0A4 E- 4 od =024 = ar~4 =
E4 W4~ m.[08mc4 in miE V H %E-8. 4
e n qw~- 44. U..e....H C.4n8sco o cn % %14E- Amt -en3 484 090 =onmoI-e %0M4 me L- Em4 *cn E4~~ *eno
09 '-4lW M H k440h40 4444 g E4 4 4 0had -4 JJ'H ix %*E4U 0
W44 134 1 4 534X4 p
4.ot.r~j b4:1 J4 > WP 2 0
135
paa
(n 44
-n o4s4 cc
W44 go) 44) WU
04 0.
o4 P13 0 H
rz-4 WH 002U U) 4PQO 4
W4 4 04U
03 E4t 4 n
E4(i W H 04 4E-0H H rl n 4 *d U) H
EI 4 540 0U)win0tna U) 5 0 m ni
4 4 U)) w - d3.44 E4 e b 0
=aq U) vi9 4 l -4 E-404( we (4 4 U) enE s) 4k -iPQ " U E-4 E4 4 oc i
E- 04 00 m4 U)Q 09 44 4
04 04 U) lbD E- .12) -4 b 4 5 44 4 HH H I
0 0Qa Hl 3C4 4 HE 4L-E4 4HH 0 0 0C- 009 =b m so54i- En ad.~ PC Ow3 ad~4 4 44dd 4
a . W=1.141I AC %W e ;l41j E-4 JSUM E ))544U- % %a F-&a .-o .Ia.IUU)U2U))U)U)
m4'"U4 4 U*4 .. ~ 43P W P -4 -4 A 04 O-0 a 04H5.OBC- = 0 0402 4 a 4 a 4 4k-4 acdc 4
%2I 004 I313 V) In C 14 &4 00 42 0
E-4=~ ~~~~S *"4-4a% , ww 4=t iEmv 4P s~innnnn
WaaWE-402MM~n njWQM E4"VM -44 0AM - - Ut d0 4olO
wpau-9 u =4- " cow (" 4Esc aa o oP )v D c -
mutnamag n;mnpl& D mc136a
paum :0 A .w . W W uP
H E4 H H 1F4 6 E4 di
W Iq 04 mfl W 0DO E- - 4 *CflUvl"44Hd LbC) aD A94k4oIq b 04 " W=
.4 c V im 04= Cd4 WUW AC -4U 0 W heA 94=w4.44 adg on No ao) fc9 4 0 00 wp M 390
04 W4H -4~ Ow =m 0 14411 M L -4 H- m% U o" -4<1 di o4 ce4 a* c h0w
P- * 4 41 J Q2 0 e OPe OheheI'.hee oCdh 0 Mo &4 PLs. n U) p tb wPmPQ 00 E-40 E-400000 00 0 00
104~U do 04 9# n i -4.4 m. 14 44 ).4 H inU
.4 )nH HHW~l49 W
"a 4 14 om= tn -4
DIP)OH"041 no2U 14 -4
0 Modal QdHVl E4CD 194 No-4ctn H-4I2b) w~o4uiHmm 0% %m 4
a H0m) paw- 2 22 m wo-o(U m m -)1l4r &4 &1 OI-4 dg 4.1 .Vm. 0-4 0 wo4mmIA m ~H 1.4 =C5 C40 NOW co W %W
-IHwm)PMI H=00.4 U) WNWmPm 21 Ih3C,.4C %a
0 W41 H) Uw14014 .4144104 01 04=4W 1W0 041U)~~~ HO "1)01 4PmE-) 0H 04 & 51 041J115E1o
E- %0 ~~-4C/ .fo W4 .ww =0w94f
* 2 0*" 0he~w. M W) *42'4O= sC 1-4" W 4~~(0.2 54%a0'. "2m Pm)JH'4WH =amp" 1k) 11
0% oz 4 CO=Od A- mmo0s.I ww) 1kUU09'0 W=E14= N=%Doc mW W6)4Mk 11)1 % 4 ==04& E-4 =E-4 1-4w3 WNW) 1-4-414
14)1 w'4'4C ECI)a -,o inI 2 14 U) =02221k WmMb- m c I Z E4 0H20 (Jo U)4U)14E4[41414U)UWv coo ZEL H UcnDp141.4214p4 u)"o a m * u)4 is 94oim
= wgu.4 "4 -'" .442U1 W&Il44 0404"Q "Q0 an 0x U)om040643 (n 04 %ADPO= tEf4m P C- sI4W AVL 0e1-4WE-4 31[404 s4Q1q4h U Eras-I4 =0494O wO = otgcf 0 9O0
20 4 14U).4 eU) %00.04 a E-4=0164 HE-$ 64 =E4 CD o-2 E-4 0- A 400U)U14 0 E4 4 omooCdo %mmo4c= on Pw(1 "tlU oc.414. n-;4 wi).3-.-11 * owk
CD MONk ME-M= Woc= %m w4411201 o4mow) HH o 4 Ho 2s.)EjccUm 2 2144004 No)1 WO.. @00014E'40U= ME-4H= E-4= E-4CD*=NW .1 40 %= tw
%. HH- M 4-9-lI. E-4s- -4 4bs-I.p. s-C s-I .-I s
222012 11J3&jkrI5 44 4p4b4.0404 P-4 P49)" 4
w~w~w ww " " 414 s14 "- s4
00000000=0=0 4 4C4b4& 4 4& 1 - -4E -
137
"A
31 HH WN W 4 0
4. 0 W " HH H HN W0 14a A E-4 E4 E4E4M
WC, H O -m H4 . . a 14 C403PL i.EA H .4 E4 s.~ -4 E4 W a;WWM .1E4 0 .H 04H. A 0 E
OIEM H C 14 4 0 a N4 m4 P4 Wf N- E-MO4mH 60 =J R4= R4M 1 N4 iz x
Hm" mm QEI4 =a mwA 4 0 H E-4
W 4 ow w4 HP a 4 w 0 n a000d 001 R4 0R4 0h4 Re 01 Ri 0 0e Ad
0 0 0E-4 -4 E1
H H H
EA E- 4 6-4ca0-
Ad '4 '4 %M 0 %lb tb Ac WWO ~ W
00'4M 0 OCD W OND In L CD Cd HH lb H'4020Vt 01 WAD4 04 OD4D ri0 WQ N0WC3 go E-4E41E4 E40N'POS4 00S dN0'CA %'0 ' CD' 044N * oH
IRIHON~ ~ ~ ~ ~~"= 04D 4 E01E0 DII.'m 1
'4 M i P w c g 0420 dig 3C 00 PQ M %4040464 0H
ME40 1do (O04 0 m(4Iaw=W OIN Q~mWM 04.-I
1-4 =0UVIC4 WON ifl1414M [4C-4= Mo= .4=Wf14I NWNww4 4 46-eN E-4WOC2'4 lb(/2C4
CV C-4 -4 U) E-12 54.4 04 04 L=an(vHHW1LIp4ZHm
0 n UeCf AU L-4"4. 0kl M-m~~J'H g~ 4" R e L* s1-4HC 141-
UPAN340HO a0 0D D 9 '4' N HH4H .N 4 H
=E14pam2moo eU3 44m~e1~'.~44pim eHod * U H 'Z4i4 '49~~U'p.u
H~~ SM p
D-.o$ d- 10 4 Po I -e04 104 pot sbq Poo -4 -4 m0 m
14P41464 1414 P4 141" 4" 4A 4"m
"444.4 P4.4 '4 .4.4."4."4 4 ww11 p"
138
- 7 -o'
cnp* Q
CD *n 00000
* * .n 0p-* E*a E44* M*0 -
* 000 *- 1 c M w9 pD .lpO
(n *4 0 * c - j*40 *ww=a 3aa wwww
CN M 2* * 0
*l Ur (1 UoU"W L4Wc m*010 =a WwMMMH 40000M
w *Wo60 4n U) - U)
*a WN 04 -NPQ mo *H W - 0w m
* * S _ 0* * 2 H
*139
q~c.
U) H
0411 tn
t=nt U)m
E-.1 0 a 4
=E.4 H- c
H U) .4
ulE4 in H4
m 0 =r -
= Hdo21 -404 lo C C4vH* E U)c r4 a% 'Ic ~ ~ ~ ~ I .4do W94 5 0 )~w =0w
HI 12m m. U)
MM A ~ o C0U. CD U) H -
W4 WNE-4 di Q$.ULI W4 WAm 4040 M ) .4 =*
an IMM W U) H14 Of U) 4 u) H* U-4; A4 4 W40 E4 )0 C EH O 0
H 4440% 2 24'4b2 0 0;04H ca in How- HO wm 0 Ow
'40'4.40~ ~140
*n *3 S I* O41 x II
* * I u-41 m* II *A = I) U)
I *H IO S U)d I J
I E-.I4 aHU OEO I o* 1 I adl I.4E 20-4= I H
* * I 0=11-1H2 a 1 00* 4 I PWC-AHW OCAg40 I b.4
* * 1 00 2 Z&OE40OI 4 1 = si*0* 1 0142UPknPib1 04 a
* * I Qi 1-kE44n H H H=C41 C 4r nh*i4 I m Pa~ci m oi i wai - e l
12 00-0 0 ONDOOI-I- I C-4 m0-*H* * 00 = C-4 -4 w -f 22 N 1- W I H 0 b
E-4* I =,=14E-IH22240 00 1 3c H41* 1 C*Hm1M0W 0U) a-1 En 0 = c*0* I CA 1 .4 " - CNI 10 =2 E a*2* I 04H )HHW0ARDOI En2 H) 1. ACm
t4Mb C V*4- I *a~~0 4 14HU*04* Q -od- M CIMIIIA ~I E-4 H z E44H* I 440 04 154Uk 14 ( 4 Q- w HnMr
**141mc I- &E-44lb 00 1 -ma Hci mu4.* I H -PC61E-.4Wob 1 04 f4t U) 0X = c
H144 I E402920H001 I E-4 04 m m 'An 209H 1 2t"4A 02O4 3C.DkI % M C) H 0 4' *n-A VH1.4 1 140 Old 4 1 1 14 m r - a z .=40
I m pw2Z r U) U)f 1 042 ol .NI Ua)- 0 U g411 04.4ib -4b. w 4w-2 do f Olt 0I~~~ 1 .44 ifi E4 c 0P 414o
E.4 %* 11 ra If~b ~ IfH 3c 14 ' 0441H* of of~21 l4 go to0 (a) 00 99so 5 II w)4E0'4If M-
P* Il 41 r41 2100p 11 H 42141.44O 4 A* 4 -* 4 Ima 0004.0.02 wi H 4 E U- 11S i $
4 4 1 1 Me- -. 4402.I L2 L*0 a i a E-40m 4 w U
411 I IO~.O~ O4w AAW0m 0 -141 4 4 I go bo . J 4 W4 vi2e-
*4 41 H Im P 4 II E14 U 0 . 1 2-41 -14 I Q. in b==H I012 11
=14 I H". 2-0 01d bb E1404 4 0 to~ c . . - ~ ass.a
41411 I I 0141
MCD in 1(4m 4
tn- lb )04
U) +
312 3c -000c
14mt wa- 4i aU04I U) H4 O n -
1-l4 t 14-A0
di tn + E-4 E4H 4A =C4
m %OA 4 31 0 H- 0 -c3i m 0 E4 0 O00%n0
ON Ow4 041=114 14dU) ad A411 9E4 *c 04 U:C4 P H1 M4Add r Ja441 E-4-40 -k a44% a4
C-4 =)~Ua U) cn sa IN E 4 IQ* f
tno)* lb %EM 4 0 W4 ad E- 1 i414- af.-1 12 ] P 4 53 4 b ago ad
a- * 0 a _11dltnw 1 ixH Ilk E-* f a H dE-4 E-4~'IE~ 1-4H 04P )hi D
* C Dw(ic %c 401 "D Pi4 "Ha E-4 OH 10-wo 4u OEO If 00U Os1" 4~b -
Z;I- C wtn (xp wE Occ1c tn 01414 E4 ~OC 1-e w4 4 mhiol =m) MM M ., t iO
mco . O~fl4 '. %m 0 4 W - -0 io m 1 w-, eOC11-I aaIM a0c4 4 n- E4 QoC 9Ul 4044
U)sE4- a AW HM-I 0) A 4 V- QJU -4-4 Od &4 V.V0M~a H 14 14 4 'Cmag
04 'im"O HU Il Q 0 w4 a.-'- 0 1
cri4114mfm *n =44u) go U) U) CL4h321014 Iwo3~s U U4 U 0 D-4 (jo
as d m dM0 =0 00 a i o~ia OU)U b 14 s-40E; Aa
04 H~
h~IAb3I ~ ) I ~ 1I11 II O0O~14.2)
(1)
0
IIt
'a,. so - "3
0 1 i 4 It! OA
ma Mf 94 tOO-f E4 iM in4 E-4 m A n
3c4 3c 4 0 in4~0a 1 [. ~ 00
9404 0w-U) EAl4 d aww-) 4m4 14 m14= 1-4 E- w* E- HI 9414U 12
(n. QI UI (. 0 .go ) 0A 4U w 0 014A04
If 11 OV- 9- E -4 92I.4 02 C4 Q0 Cmqj W1IN 0 HE-4 14 E-4 H so 4b 1 H' W.Iu' M
U)U)- m)U Dol 30I 1 000 If Q E-4 14
0 * * MU 02 ;74 Had owm HoH QM~m ==WON~ k4H7E14bQ 011-41E41140 OA64 CA
ow 06 04 4 C-I P4 W14140ro4 r 4 Q 4CI~q w E4 414E0 dultft44 t-irJU)14Q
g..40 WJ~ M4 3141
143
L U7- 77=.
* v
C- *
* pa
1**114
*I H
*n *
o* E1 "12
*H4 C3 0lO 9
*0 4 2np 0 -
oi w 01P4*E4IQI
* E h- 4 0-1-* * CD 0 ow roIf
* * n~PI~ PQfl5
* * 41 2, H0
41 * ~i 54 1 144
.44t
*M EticU)
* ,q
* )4
0 Hba * E
H E 94 *
H4 %.4W *
0 =) E4 %0*a I- S.4
0 *n V- WE-4 1 41l* 94
6 '%fm * U)' E2E4actnl -% U) 14~4 Hr
E-4 3c ft % v% %A 0 3 C
in bdd)d~ E- 0 I- * Mw
Hn 4b HH "U 04 bbd04 94O 41waatl Mt -m- -CD E4 0 mpo = oc gm H) 94*02 P l q3003 M 40 4
04 00 ~ ~ mms R.--.. 4 1 0 =f'41 0
94 0 Q WI 94
1-4a cdmlu 14 t-40 11 E--994w
H- 0) w Ha-ImaHac) 41 - bSH4
E41 * a~ CV304E- bdix9449 I= E-~)94 4*441 W 01-.44 4 .44P0U M10Z
41~E-a 0 I 204=~ 9
41 .II. U M''~ 1 94 C14-
NO~9sIb~4 .44- 1 9
'la
*-ft*E-4
* * U)**0 c)
* * 4 E-4
* * ) 0
04 E-0
*1 4 0n in
* * lb
0 E-E-b.. *H* PW 0a tn V)
*pa ad 0En F-4V
*0* C
* * * E-4 0 '49.*4* %W 1400640
c0 WAOE4*6* pq wJ .(
*N U)4 Ac in
*o * ) '4 0M * E-4 4 4 00' U3 c4 )
* "-4 Uct4" 0
* * 4 14fl4 = 104 m4 E14 E.4 0 E-4*C* *4 E- U) 4 ad H. '4 H*
* n * ~ m) 042 'H* c) c 35 mE3 39* * 4P E-4-~4HL?* W~ 04
* * U) 4 go' 161* r *W E-4 4 oJ *- m- * C 41
.* 0 LU4 2m fn) v) w.Jl W () U) w-,414 ~I-4" M 14"4 Q4 go0!
41ma * Q2400.- E4 041 w- -zJ4pa ~ U)04ala ('.04d*1 2 m2EA41~~~ us 2 1 14 Uam414 H ul Am*44
* A41*00 m
II
146
-p -' - -s-p.'~ rr~rwcv r~rrr~~wit;.. ~ ~rr~~rr- ~. -* ~flrl ww~whwv~rY~w~ Fvr
* * I1 If
*a *EI I
** Wa i-b- = I
* * - Ad SI
*H* lot9* * E- W Il* * CAI St
* * a E 4 14* * If IS~l
*0* 04 flowIS*2* E4c. 110
CD * * -4 i 3ci*2* 46 U I- Obl
*H=*04 0.11PIU)IE41I
M0 E-4 Ifw - 111
* * 0-M O ItS -0* n41* 0 -0 If in2 4 N 4 I o-
*0*mi ECI4 if49
ad mc.i- 0 S1I. of II
*34 H4do I- ) OCFU) a5-411 u0sU4-4A u 044 =o I SI I
* *4 if % .S 1104 i3 w n - If I Q-
*,13 *-& 46N VN 4 I4 "M(
*o * 0n "(2- C Dlit I M
*c *4 64 5It I1N~f 149
(J40 0410 .2; w- d 2 ~U it I*c4w * 144 C'IC UdW E-4W 1149 51
*L *i 2oo WIS Wi wl0 NWI
* * ml 14-It) UISS 1 00 m H 00. 147 R
- --. . -- - -- .Q
ww7.w .rw~1 .. - -- o
ON EA*M * N* * 0 Cl* * N * C
**9 U* *b 0
*4 *0 0 4-*3 *
*r *- ca4 ~
* 41 014 H5t*o* H H 92 Mb6
*M* ad IDOI a
*- 41n 0it4 - H =E.*- 41a 4 Hn
*4 % o p4 v mf~
41 * 0 P~ 4 a
I=44 CoO H NaomHw410=10004*040 a 4 H
I*E11 "t N 9- C4 E-won1 4i W) E-
* a* 0 0 1-40 64-4 "E041N4 N 144 4a N u 4 4
* *~ *a . 04 vat 4 04 ad)r
*t *f iS- 4 40t44 C4 " 004 H
41W 41 pa0 Of64 m4 O1 0 04 0 E-0 H41 104 N 1. 0 "W 0 . 0
4141 Odig .4 4 Z -4 00 14 0
4 (N8
E-%
**
*- *-4*b * * 0*99 * *
E4 0 %0%H Pag NO*l
* 41%3M~n* v
a * IQ SCO
41 t4 M1 -4
* 14* aCA P
*14*
4%*I
* 4*
*0*
*0* in
* *- %Q %*W L
* * m *z 04o- O4*9E-
*- * 4.PCG* P4 W* d * 4 u e"P04 * P2**u * C=040c ww0I6 44 **
* a *4 0 0 *d ra*
*C *M*E- * * OREf i
0** PL
.. 9, *91*0
*14
E-
01
W4*
I-I4LA.
64 ~ ~~~~~ 0 4%%,%o *0 O
W1** *-t rNf4% "WH %= -4O N. % AM4 OPNA dME 4*-w V
era How w wS0Ef~-4O W4At4=M C~ @ aWl4*=4
* C0
pa 0. E4n Q*0
4*-4pa 2n*
4.7 -- P. 7.. . . . - . . - .. . . * . .
E-4F4
**a*4 :044** *1E-
A A E- 1- ZE-4 EH In
E-4* -a o L
*r W.4 0 H
E-44
H04 PA4* E4 W
at =4 0 -
*0o 0m4 4 544 L- (
0%40to*m * * ~ E-4 =I%00 E *-4* noN%0 0 E4Ho%
*,c * * S.,6000-0 c PIC1NW%-.pto w414 L- d m0 ON4*% a 0kop :A- f
*1-4* w;QC OM 26*= 0 4-.@=
WOU UH42* W1 W4*M.*Od 2x * =*O -0CHC - C- 40
04~~ " 5H4-
D* E*4 54 V -
O* H 44 4
4 2 24* * *L
152
ooU) 0H~ 94
U)n
0 0
0 C-4
94
E- 1-4
E-4* 0l
94 C-4 H
H )
E4 ow *
E H lb H0
0n HE4 M - fr
*W "4 ~wa E.* 4* mom %-
-4 b- a = E- t4*
0 4 wtnc E- ad*
owa* go =0 0() P6 2*= 043 E-4 M cH
* E-4b2 H * - k..1 HP4 64. pq ow P4
02.OS3 PL 0Ib P94944 m- q-cE4 H1 94 U)~ v W
0 E- mwe E-= 0 E- "-4000(*4 E- Ml E-4C M II')V
mW V o 06" W2
- 0 9 w4 L-4a Q29k44 asI 2ua Ho ad MaeM 0&
04 ~ 04 U)0e~ 40d H04
2 **l
r 153
S. *0
*
E* *
* ******C* ** pa* *
* *Mn *"
* Admm pa1E*4 l*=0
w H 94H
in *9-4*tn
*0*
*OW0*ci
*1S4
. .. . . . . .*
- - . - -. . - -. -- . . . . . - . . - . . . . . - - . .
E-
*Q A * *-n1* *4 tmC40-* * a A O- d0
* * -*0* 0 n p inH &
* IS* pq2 .c -
* 4* c 4 W 10ME-
Imc* HOW54 0
*40 *D (4 * 0 E-9E
*z * caw 04 at 041 * q 4vEI- H P4
* H 0" = *02 m=*m *5 L-1 HUI 13 E- 4 SP %sL-*241 2c 540 HZE0PM m
*541 13 C (4, 0md PH- ME4 E-4 054= @
*041 13 54scn Ntc a600 0 o 0 -
OMA *041n 00- W- 13 U t* H "a134-[4
W=1"3L a 0r 45 1 1 0 41411 * )4 H- E-3 544 N
Nam34 E43 2 0 aa d* &0 Pa 0 41*04* 4 m * 1.4 HWS. Ci Q =*1.41 44 m 0 V~m as. U) L-44
*0* 1 0 Ol L4=004 0 b" H 4QMO* 01.2 2* mC4 w1 0 4 L 04 204
* 41 ((200 5 U 14 4 ( Im541 41PQtC (90 .. 1'
44 41 41 2 (4.. 04W bHU4 1021 4 4'9400
E-
* *3E- *-%* *w WM
* *1* *4
In E*
0* En 04
E-* 0E44 -
**= EAW -4U n E4C* *n In r a (12o
a*l M *4 -4 0A E*H* 14 -0141-4)_n E41tnH 114 w r ~ En d En
*w *~ 04 q mw ; s94c 4g
E- U U 0 E- G U 0 L64 F 44M IA Ad MO (12 E- - 0t-E4E18 -0 0
H *~ .PQ PL 4wW OWWW
*14 as4 04 E-4 E- -0- -204 0 0rWC
*22 W 4 2 b4 P4 W1 s-4.4
cis) .ra 1. ~ ) 10 4410 0 .
4 *4 O 42 141) OU) 1~ (1 011
*4 E644 cl1z4 (l 14 . ~ 1
* 441 k 4 04 4 1 1 1 41-~ * * ~ b4 h40~4 ) ~ ~4 SNSJiW
15.6
I-4
1b;
a -c
IQ IrI V)
o a 14 l I
4-04 1 H
-'XI H -0 %
4w
C-4U 14C 0 0 -
13 4 6 D * 04)% =4 -.. 144=s lb %wU F= 4 90A4 H =w*nW3C~ U)w ad- CD 4 )
*04b3,Jl0 ON@= $404 9-4 H
AiE14"H&OID4 U101 %us E4U (LW 14141-4 D :6C H~ a-4 f a* 4 E4 CCE4 (n 04 so 4
1-40Ds14moot) EM= 0 m= t
a ON *UD,1A01sJIC 00 00 00 040 0l4
a 0 MO Nb30000bl40 AA,. AA *404oW o NI c COWAo14 04144 E44 ad
NE~-ON * E'~)U))UU)H) 64C- 4 -144 -41-4 U) 4N H14"N0WO..1J..3s.U400 00 000 4 0
t4&@&4 91J 4 M 4 4 k 1 4 4 L-4 114 = 4 LAE- 14 1r454H *MW=MW1HIME34b4b4"44Ma
1-414.10D40000D 41 11 1414084 M 4
!1 "04041 O4104 1b144Jb alc IsJb 1 2 lzJP,
6"1441111444flf U 157
6'I.
(12 E-4
9.~c E4 4in. E- *0 U26
*Q M 2 0 IM a2v -
*a E- IN64 400 -4* * H A 4 h 3 V)c
*~~ ~ in(1 n.
*1-* alH~ n pq4 EA m E4 0*-4* b . 2 = E-4 0 0 =. 0 E
114 E 04 E-4 m*0* 0 ('4 E4 bc H1* d* 11 4 E- 4 0nt IfA 2 00
Il M .so EM HIM.4b 64 64 04*1-6 641-4.. W 1 1114 %C U 1v1f OwO n. 0*m C4 0 so 0 11 100411400 00 0 14.-4 (12
*CD* H of so =5 d= E-24 (n = 11f0 044 **4* Ow(I M64 4 ''0 1-0w 11 t2 (12 E646
* . .. -1104 E-4 64 = E4011 Q. 4 00-4Q " 0%~ 4 1:412- 04 0 =.-PPU E-404 ". 6~
G; 0% pi 4u oipawom *.-mt4m*44 woc.
z l 0 U Ot.aa w0 MM40a40 6464d I
* * m oft pa E-4 CA 1 A 4 H A n pa CA (120 =* * ol pa0a11 Hj H O2 E- I M z C 4444-c r -
*o S" 14 1 IQ M0
*q &10 02
se 0 E2 A
m A 04 P4 t
158
insa
cn *
* Or* * * 5m
04* paumbb* E-44 -4**
* * 02mmo* 0400
* * mix Q
um * * 04
* * 0 H"MH*2* asamID
HU~ E-40
018 04 4 -
w lM-4 E-
g4 loc U
mma
.E- -4$
*~1.4
* * 43 cb
c QO* 0M 0* 0 O -* * t* * 4E-* um* mm
* *o 04a
*O *446 0
* * 1-4 E4ad 01" p 0DA*mx 141HM ua 1. H N4
* 4 4 - 0 040
04 *.-I uI4 _9MO
*W4 M40*1-4 PWow X -
% ~ ~ ~ 0 aw00 u PioL0* 00 oc m
444 14* a .4a1
u160
4*4
ad W
- * * L -
to* E- 0
0* * n* * 04c Vp
t* 04 0O*H* alb 04
* * ma C0
E-. * 4 *c~
* * H4C0 .
* ( w-
E-4* bwNV
HUiI4 CflHm
Ea *041*641 41
0 m 4141 0 -4 0 a%
00 W4 04 Im 4 IQ414 04V 06
E-4 4U4 U4~
*4,4 U 4
41 41 4 OW4 I162
* * cn
* * 0
94* 2
* MA*
* 4aON
*M* 102
* * C4 as*~~~~- 4 .HL 4b
* n* 04: 22do* 04 Nj"P
*- * M H DO 1w
*~~ * 04
*~~~ *4 a$~4.4* ~ c *on=14 2
* 4 -4 U -00
* p *0 QMOO
04 UH H 1t.3
*7-*
*q ***%0
* 0* * 0a* * S-r -
P * tnm
* * 41* 41 HI=
PA *- 044
* * 0i 4 j
N 0*n NGI
04 tn-
a% E-1 D-4cr,4 0 1114111
anP 4 U=pUa*mmE441oa
* %0 H4 P411w
V) P44 04 e4W CE-on.4 WJ W4 auW
E-1 4 -4.
41464
M *n
4 0
4r4L* * L
* *4*- *
dig* U' 0I
* * aE 04* * (J 0 N
* * m
* * 0
mm * PL CD
pa tnE44
*4 "40-00
* no = 0
MM E-E=00
* ;f) wow O-4
* -*4 in4 13.
* a-b* Q U
-- C. .. c--. , '9 .-..- 9-.. n ~ 9~*
*4a
Au
'as
-* *
* * 0n
* * 0s
* * WC4 0A* *m 0 ~* *H uvb
** 4n*a *n E-4 w414 4 i a
b44- 1* 04
M04S U040L
as 0 014=
41 * E-4 Q M0
* O* H" -JulW*h.4 w wc 41
E-44 00 au)calE-40
*01 00 O
414* 14166
ad a I Ha I0.4 M * as mo I I
*GQ = QC L-4 I) I E-1 CS E- -no u I~3 Ins I moas
U = M 94E-4= so 9
as H 04 41 ad H. E I*~~ E* ai1~ PQ Is=4 )
C4 M H~ I 1 0 E- q E4 1
* * pa uH IZZ I 19.4 nC. *.as * 0 101 H 0 1 = H.. ..E-4* U)c 0 to 03 4 E-.4 4 * * .- I HUD4 = 1 0 4 I I* ~ c ix IhI 11 I E-4 - w in t*-
CA 1 El C) pa5~* * H 2 H1E4, I =Mtn U4 E-4 I M(*t* A2b so 0Jg IpHa =1 p4 do 04 0a*g pa 4QI i tn0.. i i 1Oct20E-4I *4 C-4 C) za I4h gornip * 1
3 C3 Pap I =IIU) f *Q4m p1614 I Um * wo viw I0IhM A 1 ~ (fC so 0I~a m* Q * 4 adE- m I P4 PU2*I E-)44- 0
H P4EI-22 I V v a I H pqmp 1*2* EA1 Hm mi 0 14 Htn tU 0 -t i5#=N94* Hcn 0c., I 6mM I 0 1414414*H* U)..4 C) HU2Z Ia HU C 2 04am t-*24 C)4 1~ 0d "WOO I U U I w 1U) mO41aU)* 41 H4 44 211 12 I ini "H I o U..114*Ana i mmiV0. as U.H ) %, aS 10424 0 0 1 EI2 4MU14 ) DM4 0 WO- Ia. MI4 I tn , I2 O2..1 0 12
* M 14 Q 01~' H 1 1~ E-142 I P14 *.H -4E -41(&I4 cD wD 2(1)2 8n 00 11 t,(1 rmrO.. x 11 00)
2 u 02l Q - nM 41a D 441 =901C)4 H ms*2*c 2b41 2 QPQ E4H 11-44-1 40M DeM E-09= I I0 Od Q30w12 0 eg mw2 *.-2m. 0111*1-4 u~a' M) = 0I LA I "9-12= I woH214m 2 g IPQe4 H HH H4cm I .140 V VV 4 H Pc *@121414 P4040 14 "L4 4 MCM mH1 "wws 21.4 1O HIpoo 1 ~ f HJ I' 0* - MOO 0.4 0)44 H W I IIg 2 64 Ha (4g.I.~
w 4 so Go, so~,*'efll C C ~ ) 4 14~
41 41 * U) 2 02 1 67 ) 11 H H 1 4 fl e . l f h . I 2
* 4 1 2 m~4 U) H 12 4.4 0 0 I 14~.. ..4I~%
,6- -" 7
7.
--, a
S IS S I
- = I I 0 I SE-4 1 60
,== , b I , I 1 =ISMO. I I
14,":I~ o,1 - 5 I.- ): S = I- I I S'
0 toIII- gI , 04) 041 O04 ID I n a log IN S
1-:' 10 4 1 clm %Ir I I C) I1
I M1, I us%1 11 a
14 ION M! $of I 'I
0 1, I-l I,-1- S Oilr,.
C I N I I WsI I
O 1 , 114 1 N 0 z, IIo I E-4 Ias I OW I UO M!. I.1H lop= I H , u I S I
" I I0
I 31-0 Ia-E I S IIII %E I U* NQ 1-4 I I E0I
N 1 o I E-4 E4* E- I w I I
-U IUiI)i, '4W I I m-IS S I
I 1 uS I m 441 0 I a 3I
I 1 010 camsI a 1 of I
U I I ,I I 1-4 0 0 I O
la-lo11S NISH '*~0 5- 1-4 1 co
I 0 0 *N U 13I1
M!- "168E44 a E-
N l O I D *E N11-429 5 a:= a lwUq w o I Zo pa HH f I I A I
H INPaUt I H 0311 0 E0 w lost I aI
o 1 a% w1 :11 '40 H HeH 14 1 US)fm INNaa I 4 0W "4-4 64aW 40 I I owZUUi I U) I b-011 am 14 4.-I 0*n I I m : W
14 14 I 1-1 $ad Ix 0 14f0 1 =I 14IN amO. UC0 CDPaskI 1 0 1 5 05 4
* 1140:1 G, 1-420,.. e 0 dig n I u oU0.I1-002I 1 U 0, - I l It 0, 1O I I )
-r-"I rU) NO 5'wi H to - Q N " " I to" '' "
I o Wo4 ( 0W1" 4 w ' , '; .0 - 1 41 IQIA , 1 ",N14 10041 1* Ofto"01 Nq 3H64 H- 114 N I pq I w =
0 HIWa I ft f bUCD04 CD H E4 14 11 1I %w I co m 1O.I$4014 1 I14 1 04164 11 g (l so E-4 oI I4 1' 9- 1 H 4AmI I I U) 1I tU)OD U) eta CA NL lof 04 OU(I5EA04HOIIH I ANO IND E-4 CD QA-IINHD0 1 4 1 AIU SNH I ad6"mSU s1 534141 + QI,4Eim 4: I IJ I W "l IO*) I 5 54(fl1 I cpocn tn"L,4 E-4 t-4Uc WI&OID () I I04 41-4= I ~E.40 I H I od04 4dP0 0 NH bea-IODU 21 INP4oI Im E4 I a-
04t~ I 1401al OVU)* 4 0H 14 1 4 1 wO.511
0140H0Ul tn m-5004 E- m I
Om, I.I 04 64041 w O A wu N I ,, U) L3 11,1wI I w UA I c0. H A-I v4I iDnih a- 1 NoI
I0 (U I HOI I NI4114 1 4
I 02la1 in wI( INACpaS
*1161101141 HN u I HID Ec I
Q01 310.1 1 w94
1UW41WPL IH 04
I WooI!IIIHS
168
II E-
1 4 EA CAW I a I thago* I ccI 4t 4M
I W E-H I I ca I
*a *go I PQ Ad 14dd 2 1C I* *04 1 c M I 1 4 I
*o WOW 141 0I0 IQ E00 I I0 9* paIE4 E- 4 as E- Q
* 0404 1h1 iz t .4no I E- M11. II
* - * d 0400 H U) Od 14 * W=0 I
* I* 0 0 gO 404=0 Iq 0 atn 1 1 .4 I* * E- .I 4~aom a I0 P46 AE4 dd 0 14 WO I* * Ic 0 )0.U 0490 14O M 0 1 "ego* * .400asa 1-4 A 4 0 I 0 3 lkw 4 1 E*-ap0044 *d E-4 Io -4H I E- 100 I
I *n 044C. g U0230 0 M 0EU 1- Ia
Cd M0 P6 HIU m d O I Ma I= pa*0* 0 w..I4owa I U M U PWQ 1 .4 1 0 Q0
*o* =W. OgHD w g I o F4 = z 1 1p o o Ia* * lb 0 E4 004H 1 04 od 8 i 540n E I tn P 1 E- E5 4IQ* M 404.4 5.4 I I O O p I =4 ra I5ia I -0 Wf * o b.4crmso ocoa IU)na E4U I E-s E-4 I 1 .0 4E4 A
E-4* E-4 3CM % W 4M 0- ) 1 3~ Ocn p0o 1 0 04 1 400104 4*0* U) 54054.4H. I 0 i E-I 04 41 M.'~ 02 1Iw 00**0 EM 0U)hIMMI eUPb. 64 E-i as04 I 01 04
* E1* 4 VIj540.4H era I 014W wU)I.0 E- 1I14 =4** * U) %4=04 9 E-0 10E40 MP OI l 0c - I 03CO I 0-P -
-. * * .4045 I= 003111.4 1 U04 OHIOJ I 54 54 %W E4 W 1- i E4 .4
*-4* u) Z bnun=E4 m I0U) cn m I. U) * 4 .QI )ow 4405. =5I~ Pa1 0~ t-4 IOiaU I E-0 11E-
64: E-4 04 64 00 : M U04 40 1 n Pam I t0 U -*1H Ud b.0.4 M 1HL-1 0 U)5 IO. I4 501
*4*~0 Mp4n..1 EU) b 4 H . I w0tu)m Ifl.UI54 M)UMU()5E-0 U)-4 4 0- 1 *o 4p I~ WON .
* 404 ). 505.40.0 et I 0aw mm Ib 3 a aIwan anE~ 41154up* HP46 04 *bd 1I" =ad M 4 I A 0 4 EH HC-4 1 C-H a3 r- PamU)O. IU U)--p 4 U) 1 Mal 0 4 hOw)(fl I E-.-DQE-
* * 0 H4oa .. HI 1 0 nE I C1 9411 154 z54=m4I* U)"J046)..140 I b.-4 M E-4 t I 0l4 Q P4 W 0 04 E-4OU) au I E4 QE -0
ON* PIO * 44F4In 4 1 mHu 04Q" E- 0I. 0 0 14 54 1 40
a$ *M MM M 0I 2 Bu pa01 va= 4l I u" M WAawI = 4HIW * 54 Hm"-IHHH 141 u "4h " S kgla (. " Q I HU.-4Q-4I12 * 0 wpp0AIAQ I Ou 04=0oI HO i . I W404 dg= 9QQMP41al I5454 EAo~n MWa SP3'IMIV00 J0 1I -40HI
* - * Q j~ijQ I 00~ipa e4 I PLUO I= I an E-H* *d9 LM 3OJ 4 U)BI LA.E-4 0 S 0 41
4, I *WU 0 I I I tad
170
I of4
I E-g-
IU) M - 10 161 ad 13 1~~1
0~s 1 coa 0 = I iU3 1 ) W4 64 INN I nE4 1
04 1 as 0 S.1H I E-C-44 '4 6 1 = m U
r3 E-4 .I 0 E-4 6l 14cn I14 Wm6 N I PQ g=) M S -4 1
w4 a0 HomnI= = E4IsoIxo1 o4ow14 0 Vg g) N w4lv
M g E4 .4b H 14 gzU gd = N -
Pa gE4 j I. N g- m H) U) g1 4 g N04 gM g-g HANIg 0 E- '4 g mi gI
in I 4 HI W'W4 4 W4 11 0. 61 Hg
0 gE.4 as co)NN.Ig I = Ad3U gIm I oo4= I HZ of~ (3 IM 0Im
Amb w o Q0P4g N N3 14 14 in # I NF
64% gEM-I I a4 E- As C4 ICg-41 4 g10s~ 1O g.~ '4 wg gm = rdw = WE4Im
-4 * 4 0E4H 1 0 H 0 0 4 LI 4 g I
640 N l3 E-4 0 9 1 '4 4 04 E4 -4 E1)-4 U 0 1 cI== 4 g-4 AQ o'41414 I 1W H '414 )I4O 6= I01 sc a E4 I 014-.414M o6L 0 1 PQ ma61~ 6 E-4
E-0 dII gO0.0 40*t 1 04 W 1 61 hd @a Q I U) 414 I 42'4 11P 4=06 = In CD E -4 W 't- l 460 1
In6 n 3 mr4asce E -4 W 0 =E-4 N I U) I op
E-C3= t E- N Q4W 14O 4 H E-40 O.61IJ I HMacC241 g 0fl 014061 14 0 E-4 3r.4 16) al E- m=A ~ ~ U 1 z m alld IZ C 220)4 110 m J) zn 1 0 1
am1 IN 1 '- 4 mIm 60 0E40 6 C-4 I-I I1 E-'442 H 0N 111 - 04. 1WP61 I '40 14) 661OW 4 OH ")11 0E41 .
us=5 1 .40 En Eqm 14 P4 ~ 44 '4 6140)4 3C 0 (=CGI t"C-4 E-4 1 92 =1 4 C4~ 1 0 66 E-40 HHl .4 as II 6 3 0 1 I '
U13C In 1 3 .094 W I H U)Mq-N 1-4o0 W M C4 1 1-4.s
Op ~ n*bd o4E4Ib g-4 E-41 014 E-il 0 04M O S MO U(Sowu 1 MNON 1 1 W 1M 144 140 ONO% =0I Z
142 on I =2i-0 06 0 =9o OHm E-4 M4'0C24 UgN owED0 CI CMNH OW.E-004 KvE- 4 L4g -4 W L-4E4I W -M I E-0IP4 1O4 0mMW%1 0 = W* AW 3P I= H I w N
14 s I P40114 W 0L-I.. 1 C 94 L1 04 W* U 04 HIA b4E41 X %C4I 1 4W
0~ 60 0EU-u O= I E- 000.4N og Am.A dHg MI
o~Q l UPf0l42) IG )IUZ
In- WHISWOMIUM 0 0 21-INLw
IU 1 E40 E-4 16 04 A 04 1U-4
17.1
&4 .V
go I m I
aUA Ol 14)E4 1 1SO 04 041O 1 DO
E-4 ~ ~ I- X 10
%c4 11 ODU*3
-c .do C4UH IHo 04* 40. Q -
4- A Cl MI 0b4p I014)01 4 ) = =
E4 -4 10 10 m
-0 142 0d CO m40 4 IcD 4 0 HE-O2 0 EA I
WadU4)I- P4 E- D I
14OCI F- 94 WF4 In I
4b P Q 04 asM p
H .. Q i - ft Hf Il -4 I PQQ I
4141.1rd% c14 If 04 Ia E4
04f w E04 14 I
A C 94 I C11 10 44 ad =- H 12 I-ACCIM b-4=E4 4 .- C3 IA P SO 1u I
bdo-41114HOeW m 4=0 401 1 Q- Iino ( nL-E4" " =4=c.0U hi I = I
alJimmal4ap Do pap ae440 100 I I11141 PQ 1141 1N
in m 4= 64 E-4U I FlU) I b00 W D "4 4 O3Q Ila m2 eI
min H 101 P4 aa 4 t o I Ad I-
.4111 W14 =H~ 1.0 IH Q I W4 2 E-4 1 1014
*~~~~~ MU4 L-4Cl44II4 ~ U ~ U(
(1172
-9E.4
E-4
444* * 0 0* * H h
* E-*=* u 4 E* * paw
* A 4 R
* * b 0 0-0.,* *i w N04-,* 44 pq Cp~
*" 4- = -0
* * % e%- -
C4 as tn o tot
E- 4M E- .. ,4M
O*O* 02 .4Oc M -L4L-44 14 M 2 p 4L- 3
4E4 4 0 04E4 0 =do -W0
* O* U E-4 0 - 0 - 1 =-404 w C4 NIE- = E0UE- -*E401 14 04 E-4 A*. * 1-4- U = 0
a.. E-4 011 P4 0. usco L0. nO aE9FE-44 Od4M al U) V)d"$M icn -lu E-0 0 E-4 H Q .O 44 Q MMQj 9qv9 4 x0 4 10M P0Jo Q~. A PW 1) on1 1 4 M "No4 04 0 4 U)a " u m Q Q W4r&E
M. *W (a CD W4 0 " 4
* 4 a o 4w PQ *-..-= 0 W
* 4 ' ''~ 0 ~ ~ 1734
.4-
*v w
* * E-4
* * E-4 an4
* *aPI'. * =*
* *j0 90*044* Ad=* -
*0* AdEACodE
m HQ U E-5 1 .. M
*0* -9 H4 Ei24*M* 14 A44 M = .
E* * H ODD t E-4 b-I
* b4 E44 -414 "WQ
* H4 HcN 4oMOnP WNP*0* ' . ~14
o0 tn 044 m '4 CD
*l *1 24 HN P41QP 0.- .2 Q=04 0.4000=
*N* 4 m4 ~U0 14 " E-4.-u MI-I
* *L 0 CD4
* * I4Cfl eM~u) ~ E-4
* * 1- . ~ =POWI ..
* ~ * woH)M 0E4
4. 0I 174
C-4 E4 C)
.44 co*
* * H
*a *n * 14
M E- 3 0 0 0in *, (AU)0
Cg E-1.
F4 C as 0 0ad E-* %) +- + mra
* *n E-~4 - 0% 0 -
0* *- H~
* * F ca um; )14 -
* %wE4 0M14 124E m
*Q* C-a H~ =QPL414 bC EA0 $4 4 HAQ V
4141 cp 0 &4p rH11~ 104 p-I tn N 04O
*-4 cb o a H 1-4 H 0 C 0 2pa4 04 w u A L
*bC4 %b.1 01M 14OD"-44 t. m = =
E141-40 Ht H W 2C le 104 -
*04 Ma (f m H HO
Do4 a = *CC 3C = 2A 2 2U41*4 c0 H0 3CU2
* 41 u1 2 0 II EtIt-4 W54141 U) 1- C0 O
*4 140EU H W L 61 2 m )14V*41 r HSU1 Q 1. 4 M14 64 14
414 H0 4 0 in 0~ np 03 MQPUW411 Win 0P LM E- LA~-
e1 41 an mm 0 HaOUPQ Mo C44) k
41=4 514 E-4 Ubf4D H O 0 m~4 ~ 14 k4
41 0 %Pe4 0 ()n
175
.4
E-
4F
wi 0
J"E-4= H
*C *-4- *
*0 *f * 0* * *W
* * -W
* 4* 3 H4 * od 40 m
*A* U W -sEp* * 00 04C%- -* * i H04Pl
*H* 041 - n caas* * l ad 9 5 0H D
* * mY N- 4 UL 09 s* * NE- U lp0 .43 +
* * M P4 % -E0 0 A4w 4 -( O N H - 1MP'" M4C
44 " tO 4 =4iiu bm M -4iI
1.*4 EN "J Sg dwcl C41 w
$q V4 .CflN4-%Ww asmiE- *C bM *- bd- m0 - 4m aa 1 sm
0 4p41*d-4-w4E4 (42H NN 54
w9 -L 4* OC 3N in E- =NM" C - df
L* 44 E444 i (C~'E4014 n C 440,44(24 = 4 MI .'54 H.414.)-4D4 54C %DPI E-41 N00" oO54- lC CDN64
* *4O0=0C SN"= Q as D Na110 ON
* 44MW- . .r .i .. !4""~b~S r48""" " O'4 -4 4 5 4Q000 sL 19g~~f4 PaPQ 4 P14PEEIIW 014
1 4 4 4 mn1 0o44inU50''D 4 4 4 ma M
* w * W pt LI 54Pkn-w4) P4 5.-EU
.4 ** 0t t44 tA eOC5QECU) f4~S176l
aa
= E- 1.4 w
* -*a 04 E-U. **0 d 944
CA *q C-4 U*40 40 0Ae N
* *-4 M C 4 0 W -
* m~ I= 94 0a 64 C4 L)
* O* m me 0. Am-O- %* * 0 OW E-4 94ra aq%* * E-C- m0 o E-4 W+ VW.l* * 00 M ) goP b* * E-4 0r Z9 94N nH - c
* * .4 mro 040 Ad 0m 4 '4(N4* 0 OWcl)0 (A toE444 940& a*9* 04HPO .t2 0 04-4 0*$* co U 94 30 3c E4=o tt
W* ) 0sqff0 OH H Hcn
4.'* * E-4 M~ 12 pNU 9()A * Ca; m H4 '4 *U) O.
*94*- U)0U pa zip 04 pa PQ =*0* 4b 3 c OHc C) 094= .-
4' .4 M&40 0) 00 0 01 bQ-f(PE4
0 0 0 U b 02 P 2 NA m94H o~p
* M U 0409M40 C4N H HCI),Q E-b *40O6~ 4 E-.4M 09 s 9E4 0 (D E 04 mL4tE4 9402 )
034C(l OM * ca 9 L)04= " *9== Q 2* 04 094 20 0wpptma= cu M PC.0
tw W A 4 t 2Cf 0 vabi .4 C- c E-422- L b
H 4 Cf 0o sow 092 11 * 4pHvM'40Qw%9Q4020n4*= =o E- 0 0#I 0I .40PIM mC. E-) 4.'4* * Cl)b~oE- 0 94N 2(IC11 H 11 .. 903CHHH,-4 400M* E*-4 03CA 0 32 ogC-6 N- H 0 UHHEA-4~ 001.4n 0
'Odd *ao ae0 t; e4 94(.0 0 1 vr 94 D94 (1.to9E4U2U)1*n * f.c0 02 01-4&49tlg t
* d 0 * 2- 2 2 0 IC2 s30 4HU 11 E-4U2U) O4 WE-Z40 514
* p*0a 93 "-laf = 444 UbOc4 H"4l)C) 44I OW U)*a..* "' 1244 94 Cl) M UHPW '49(1249 U0 2I
* * PQ =;q0H Q-4 0* 42 4 h4 2 44 E-
* -* CUJ m0409 ;UQ.. N10Nm opII .22HHII09 Pau Cl)a -4* * PQ 0H20 A0 o49 A9 Ao4P boP4 0HN49 W~'4 ) '
owH H )o4'.~~~~0 w *ww ~ 0 9 2 *'C)'N1E44N 1.44.4 Q4
* QA j19g 0.4 AQIj4w H9(1. H..PW(J (I) C
"49w 2 i 2' * U)~42S *.I177 .
W
dl * H
* * s
* * cn
*- * -4 0 rq
* * H9-4c* ID* * P
* n *. 'x E-4* *a 00 Sk
* * c ) H- 2U c*H* t4C4c -
* * lb H1 A mm* * E4 tU)Ioc L q
*94* 94 HA NE43 00=H
*=* -4 W4 =c=V n 0+
* N M4 E-U)a Wa 14=
*4* H " O n L4o
*4* U) 9 e 09 0-- .2 VA HUmm2a
m0 4 C- WWWOCH E4H HHtE4E-4 O4
* *. &I E4 494H0 L4uw II o 0 -4H-4. P c a'1. E- *l --in =94 ac w U)O9. 14"
* * 0 I H Cn -n 94 N Hw1114=94w*c *rum" = o" IS= MW *0)-t44IIt i3)
* *4 N- PI "-W H 4 Ut-4 E- A 0 MQ U -m.-JU j~j 4 'C
* n * ~ t0 0.45 a 6O teH* * a-4 ul 9 WL - 41 i5 -0td L-0) "L I~oo4 (' tU
* * SN 1-4 Li Wu o 04 0 p w~h 22A-4 da
* 4 OQ 04 U41))2) HH44 C~
* * P. '4ggUI4444C~ 49.(I178N
N.r
4-4
* * 0
** 64
*O W 04 -
w *4 0 ME1u -
* * 1-4 HO w649Wi*~( *4 jC4 11 04 U 4
ad *MPL *) 0. m - OU I* *q 0 4 04 0 E- o
0 *4 0- E- C n-4c
* 4I- * 0r 0 0= U114* 04A 4E4 XD tn==.0E4 E- -rc
* I* C4 CflO H- E- 1 %eO t n -*- *- W PC4 m- 64E4P mOO4i*4 MP * oal Ml tnW-4 11-I% -E1 0
* * oom~ -v paC -4 P - E-4 -*O 0 v-4%*Q
* * lb 0 0- c4 94H M = E4*WIt1 t P
*6.4 6 4 0 %Ql 312 64 pa* :0 W L 0 6 - l 4 E* bd mC 001* U E-116 -4. '4 op tn 1010 %O40 %) U 011 EWl-A
*0* 0= pa 3 va 0+ C V) 04- W.~ 22i w P4 o-40=
*0* b0a064 o..XU) E- DM6 1 U -6042 1E4C2 MPI4 E-4 *)C
E-4 ~4 33,E 0 *HO-4 NI- 040-. 40 * OMJ ll- :A4%Z1-4*64* ") 04OPL I4= ma-6-4ml qmairp "a eqE iiU)) 4
m10 ' 4 -4 00 W46 H'U '4 o1)0 4 " 1-4U 'oam t
*04 m41 as 406J4 -& -i0 0 HWD0M ow=~rc vowUP1U* ~ 0 U) itoaa n*- *&4)U)06C4.#A 4 W/l b4wZV)E4 -
* H4 odi %0 H 642 in 22'!U oc040n MM meo Ap .41 E-4 11OQ~ E4 = H-1=1 =--'4 44l* 64 &4
30* 0 IC6 11 E-4 E-1 V Wd ~ 6 =0k EA P61 an-
41 E- 4 E-04 H. S HO 0 0H WIlC4'4U)H -4U 464E4.-10H2*41 4104 64 49 N4 4 "as* 14440 F-040406I40 .2 64.1.1U
*4 wo- 2l A.w8 E- E8 4'U -4 f WAil H41 1 ol U) U 12 E-404 2C .6 SWQQ 44 0 H4~ 14OO 4
41 ~ M 41l V) U) o-4 sC Q10 U)4 46444 .~H W4 U)4
41 41 c =D W 86 140 WH E-400~-t1O6s~43*41G wr A2E-14 L-406 M '
41 41 P4 '4 paL060 1.
* 4 ~ 6. U)I U)*,~'4 ~ 011798
ca0
03
c
1.4 E
0 W0
pa *4 cU)A
E-4 94fMtn~~i PHb -
140 04 it A) pawA
q o w U) HAQ (n0E%-4 i
ME- EA 04 W4* 0 da Od
PA 004 i 04 14w -02 0 - E- * bZE4
04 ) 1:1 0 a1 - - 1 4 0 D ' W- 09-4
C- 03CP4cl04C~ ON0 9z mw ma *- 1101-0 HU 21-4 bd u U)AO2Q~ai PI
MIIIIEJh; -4 1 t - 4 P6 A 0 - 10 Zm
-- 06S H ~ p O e -Pm P v4 H -4 1-
U) U UO 2 - P6H H cI U%= u 14hH-4iz
H1U9 =E14 11 cn W A -4 0
P61* ME-lU H adu E-4 E0t9 m 0UIH MI "6au)
30 141C64 it Hmpa pi a H o4 14P IIPI04CD14HP" el 04 0hOOPM 3C"id1 "4 MIUI) -IH 4) 9 C t
14 E 24 H mm OOE* 4=40=0a 414 40M
iIE- 4mc E-4* 2H E 4 - W AO04u Ou+ 1.P 1 U=2ne~i 1 d c t4U)W02 IH 2U1411U)wlmc - U)a Old 04 4
mo o4 it -O0404" HO 044~ 1 0
M~0 P4d U3 id& 04.~l 94UU )4 4) ~ U
EAN LA 14J 1-M L4W M"" E24 c b1
H 0 120 Pit 0-4U()'2
:O0419~90 WU - 4.0
OII 0444OUN E-4 0
U) U30 U)13
4cHn 0
N 4~4180
% . ...- * *. - r .
4-in
4'.H
W %
E. E4 H 0O;Jn4 EA
%dU
.4H(4
'.P. E4a 0+ iw. a; E-CD 1-10 401 3301140
adlwW. SE.. E- U-
01 W4 W4
C-4IM 4II=l~iv 29.' E4nE4 %~A 0QW d
E-6 il i)'EE4c0 w l m v in
HH am E40 0r.
.4 CD WH ink-~b UU040-404 UUJU).4C2 *9'-dtE-410 G
uwI ;;wcIQ.44w~a4=J 9 0 9M
c-) in = Up ~ In wa U) H E
Zn W OWHIMHI"IM"II N L4 wPao MI U) 4i.Iwwu P pq N.4 lA
w 1W 04 Pad
181
U):
*Z 44 I-n *- I
poo 4 p w~ E-4
* Q * -14H 1-4 N qH * 20 E- Eld ) ELA
w ma 113 92 L- c ow (*= * HUNn 4 0 0 Claog0 C4 n we tE) n E- 020n09.E4 -
*z *W~ 0 IQ E- E4E-4 0 pa MAO ml EA4 E-4 04 0A M
4 ~ CYH. E- = 0 0 = =z..
* =: ZO04 0d E -
44U 1-402 cI -4 5p =E4 3C Cl U)4 I* M 14- V) 04 w HOC * Cl) ==0
4 * t4 =P4 - 5-4 0- - 0 C4 t a
4 4 640 E4u 0 S4 so A3&48 11:0 044 0* 0 U i WW 4b so a44 25t 4 H 54*54* Mat) 94 0 Ai E-4 3451M 4.Q= 4 HC 204
m4 tfl.. P4 &tb r 054 619 &4 4 U)N tnMN 01404 54C tn 054Wd j 4 bN 0O
6 dd aU H f Cl) pq 0& = 594 0 H f0lA 0%w-4 HO* 4 00 C- 4s 0 4 cn 54 4 W4 aw0 ~ pti t. 0 c.~ c3a,* .2 ON% E- A54 E- U) ENQ=H H E-40FU 0.4 E-4
* * E-4 0 PzHa OH Hl Pa4 0-.. 0 4==E..i eI=* U 4M U U n 54 Q42 Cl)40 5400 .Nfl1 u0 =4
*44 %WW tnu %-I ic &4 "W a P. W #W4R 040*0 ) 0 -1 *5404 H4 U 0P4 w4E4WH4 mow N5*N 4 cq tnH 54 * C p H3 'I, W-MNIM0 0 S
&I= * U)0 =l CfL0 In ~ 0a MOM0 PQhJ(ra 0*24 0 N Cc 0 04 *= - 0 WIt a = C q H 6 &U4 "4"
as *2 4 C, P4) u. 4 P4 N pq " M 0 0.)* a 4545 205 it0 M-4 oCE- 0M0 ~ o~
:w* 04= VI mw 22 04H H II 11 WI ?n1- m 44..*og 04 aW -4 N W E-4 E- & Oil E,4 1-4 ifCl
H E4 a mp- u.N oa = 04 w- "I %4= HIN5C 4 044 HIMUZ(40=NH 04 H4o tn tnt cpc 4 a U
* 4 HN2 4 %E- 0 5404 545 04 fotc un=4. 1* ~ V 4 em~r4 ago4 0 pa14402 0* 4 410 0 E-4 04 I 4~ -Ut)Cl =2- Q4N.44 " W) 2* p* 4= =30 " C,0N4 Pow 041 P4 0.L q a N04U)
*a c *0 W" W1) 054 40 ..~ . .= NI45554rk C* 4 N .4 04 1144 = NO P4 C)21NNN
E- 4 0410 -4 W W W420NI.* C- 4.- X A0 MIMIl-I
Er * 2 XH M e 0 044 l u H AW
m-O H H N m -
182
L
1 0 1
I* 40 P4
Im 1 1 __w
I*C E-4 I HW
IOpsmI .-o f4 1 W141 &A Ww)I E-4 01 W
I ma1 I crm)
1PI IWCDW0CD I14= OWE20I
pa -I v $A E0 9
I . 94= 00I r-mI E-U*ON=
I maw1 0 HCOW~f EnI02 ma I o I404 0 0
a&0 01 ad* %W4 O
I W 641b
-W) 0 - 0II'4H3.M
0 SUI 0 1 0 W 1100062-E4 5 1 W M 5 = I E- EA E4-4OW4 IL IPL 01 1 14 11 0a w U)flUgo 10.RI41 U 14.U 5IE4Ih 11 M 0 E--40012 lcalE4 w 0 L4 O 6.4O0 s tnnP= 04 E-4UI PL, ml ck4 40'm 0 9491 *o1
I4 WE- I H U) 1-0 .. @ao A=-w4
i van I 11 =4 WIM3E4a 0U E- E-4 a%.4)ME-4 ad4 I4 WU) =024 0 0 0 it1 t 0LI44
U24 I m 1 I 0 0 1 E..4 ME-) L-4M=14 ~maU) I01) =dIA O ft PH11400 0 EU)F 004E0 I=Oi
H1 I 1 1 00.4(=00 cr.O0
P0 41124 -940 W so4.40d 004 m 1 1 1 3 '- " 0P4 0AA w W1 U9414- -O
.4 As- I 010 H 0404 9 040(11to 203 511 WWQ II '4(1) i0oc 0 W LAE4 " 94 0
W 042C4 1 pa 04 U) OM 0 pap W 02OPba JA I OW I -140 o' COs4 0 .4 P4 0-lP 404 4WP
004D 1=4 UGN W 4 (n 0
w I H I .- C-0 0 0rA1H 020C1W4 1pI I 0 0S c
183
-2 1- ..
U;S.. I)
if
*E-** *n
* * EPg
a* inU
H *n
W * 4
* * pa 040 o* * E4 01U3 -
* * 0* * C4 C4 0
0 * * QC 0* * U- 00. 214 p 4W p** U)Pu p 0m m
E* * 0 , i ri H
(A* 14 CD 04E4Ha 1 4 2
@5. o41 %,. %ona tnN
414 Ow 043 PQ
0*14 SI)1C ( 3CH 3*C* OW 4~ 14 4U P E
(6-44 ag 0 - 0 0
0141 4 0'"4141 IN H 41 - -
ASON tn 4141 V) 63I W) 0 *3 "
NOW M 2.. p0h 41-41o4
*U) U)U Il u01 wU oI
414 NOW4 E4l &41-4 .QO U414 pap w papa 04 1 U)3U=
411 -)0 1414p4 0 H Ma
4141 ~U) b~ . U 184
E-4
*SO
* *b
* * -*p A
as* LOW
Do* mo f4* t 14 * 14
*q *44 *C--* E-* O -w I
* * U)0p 42E-4* * 0 2- i* * M o 4-
* tn00*
E-4 0% b~aa U) t
*na * 0 9 C-4I
*04* 0 3C 4t
AQ 0 4 0ac
* 4 I= e c -* a0co *k Hfl 4 ' om
* v HO to..I E41-4 H*a ad0 0 400..402M
*M *H Im4H I.Io~Eu)
* - =tn. *14 04IU tn Of
* *2 0 C- 1 4 2 0 140bM
*M L4R N~ 44 141
* *0 OU) 114023l 0=0 9
* * w VMM ONOWMH Q.44
*1Hm E-4 1.e44* * w 21E4*400I410 tn 2
18.5
M 04
-4 * H 5* * 0b 0
* E-Q 1- -
*U* U) 4 mWOW H*0 .4
w4*44ini*4 *- 090U
EH* 0 = 64M
*H4 040=M0QPI U E'40 c
w(4 W4U4 0 0 14H Wa = WE-=
ofJ V) m ImU ~,ijf* * 4 W4 4 E-4H 000
* * ~ 41U)UU) U)I 140.40
044 *90 = E-4 E-4 E-4iE-4 *6 *n -M~ uuMuA~
W 'I-Q E 0 19=2
* 0* Ow 04P4 '4 b4 L-400= *o P1 ov 14u~ cn1 "0
* *4 PCDpa 1-0 14141*~ ~ U) 0 3)W5U 3C
*4 *w 00 ml. 4 4
Q H pa '4 114
1.86
.4:4
* * IQO I (N*0* Q I4
'I* * 01in I
** * I IE-I*0* L5NW 1 ~ 1
A - * * 4 lo
* * mSo I b
tIC* * 4 vam I I ao'4* * to I
* * H g4. 1 W IC411* * b E I p I 0f
* * =I I m 10 iOf = ft a
*1-4* 1 1 94
*94* atH~l I 1n 40 b*D N- 1~ 04 H iH
* 10 0- tin %-Ww13 *a m I 9
*H* , H I totVIH94 tot : C-4 C v"
*.4 H4 0 IN HI UCDIN 004 * 1 H44@1o %
00* s4N I3 1 I VW JEU o u1
** H N.PJ1 11 1104 mc = l
094 t 4 I miI op O n E- m v)E-uP4 c H
.t~~A AQ** a o
* H II Cc 11- M=10%*poa P0
1 w994 O~ t 0024 CD 0W e~) Wm * I t4 tI v Wl W a 00 (N 0414 4
1 11- * E-41 ej~tm H HH .0
* 6 * NHMlo 1 1P. 110 QO s B
*0 IatS U I. mo to 02 a.4 *- * in Hb4 P0 in *4 Q 1
*~~ *Q 0W 1H194 3N 0 *O tJm
* A 10tS0 1 1111" 94 94iEEU S
*~ ~~~~~~~I 8 ~ BS w NZ
.4b
$ * I u p h
11 90 1 H0U.
I * II.. 0 g1 0
*u *N 6004 + I %W 101W
I I MI W 0- 4b 1 1 0% pa H 6-
*4 * m I 6 3 04 0 16 U 0 0 aca I H~g I m 1. 3. 114101 = w a
*u * I99'~ I0 =
I %" I(Iu w I I~ '-4-
A *) - 6..' H - H 1 m HI. E-4' H I
* * 0 4 bI I p a 0 H 0 1. E- IO~ Hil H41 * H 141 * I'. E-39 g.g'u H oP
E* UIE41 0 S 4 4 94 g1 H 4 1 94
W H 2U 1 0. 14U SHI E- 1 1H
U *o M I H OU _ E-4 1 00 '4 )1
Hm 4a 1 041 01 1V- H H~
*H* 0 H I . lI- U- m U. I 04 11T4 C4 C4
= 0 1 H~ ~I0 E =10M 0 3H s 1 64M H
*0* m I al3 104 0 H 6960 1 A 0 0.
m10 H 0 Otl-' U cI H 626H9N4Wpq *.0 oc I~ C) I64g v 0 E-HIE4 U U- 4
*0* o C 3 u H I m4 0 a64t IW _o v _.
*H* %0 1 1 1 4 H PQ I94 .4 H9 H
** 0A s-H Z 1~ 1 9 4 I9' m 0II 0 104 Q v* oi Hg g m 94 03 61 f0 31 r
*04 U m4 14 I a W 9 10P41 .0 4 u
Ha s a 1IH 2 a I I-I Pa 0 2I
004 0 0 0 4 0 4 1 94IfI= 1 13ck 4 -
* s * 2 00 U46 CD I H .H e 0m
* ~ ~ ~ O *% ~. D2(6001 ow 6 0 = -
* * H '0 H -11410- 0 v 4C ol -0 6 C0IE-0 4 + C4 aE- *A 0 ok- I9 mI I m ==4 M= 0 1 II2' 0c rw~ Cp
0* 41 =a (3 V 10 H s 0 0 0 4P 1 060 M= .0 0 .
* km *V 34. HH I l0 0 mm ( 1.. *m w I I ca H U
*o *6 boO 04H P 160 mI. II. In Q14 10 w41 * E-.4 - E-4II ft 0. IIw (2n I O6- -4 H-
1- =01 Ma 02 0W 2(3 (3 0 1" ,9m cj I~ 0 2W0. 4 20
4 4 H1 H. I=6 62 1--I OHC H 46U A I06 HOWA 0W.m '.o solo. I- I V VI
a p0 k4(J IPl4 b - v o 9440*~~~~~9 WOO H H wt14 (J- (.I 41 L64 *' *
* 4 09 -4 06142 00 ZO4.- CD6260 1IZ809
Q ...
4.u
4.n
lbIc v 0
Do u u HH W H H 0S
o- 4 0 0 6
I1 H H
U4 oa 0 3
0% 0 . -% H
m 0 30a %
0 N 0
M4 H H lid0 4 M 0 M0 1
w 0= Ol
4m Q. 1-4 QN t
04 m 0- aE4 E-0NJ ("4 4rm UM c
H4 0 04 1404014 ow a D
01 4D a4 W %2 Ik'
= M1090
"* LIST O REFERENCES
1. Licklide;, J.C.R., Vezza, A., "Applications ofInfcrzaton Networks", Procgedins o e IEEE, Vol.66, Nc. 11, November 1970p. ig-OW-. -
2. Roberts, L.G., essler, B.D "Computer NetwcrkDevelopment to #chieve Resource Sfiaring", AFIPS Conf.E c OS_ z~nq Joint Computer C3nec= o"u
;c..17 vigJi n feren~lWol.I77
3. COINS Project Management Office ZOINS Networkorla aNd .form ance to 1990, b-7----
4. CCINS Pr oject Management Office, Technical Prorosaligr Deeo rme nt of COIN DaaCrea71n.7 -e
5. Defense Advanced Research Projects' Agency (DARPA)RePort P-82-1002-tp, Tech ncal groposal for: Secureni -q(Zd -rn-.Ma 3 v e 2 1 1F -V T -9 1. F e D u a r y 1 9 3 2 . -
6. Informal correspondence from Mr. George f. Hicken,* CCIVS Projct Manager, July 1982.
7. Informal correspondence from Dr. R.L. Wigington,Director, Research and Development, Chemical A stractsService, March, 1983.
8. Dominick, W.E., Penneman, W.D., "Monitoring andEvaluation of On-Line Information System Usage",.igge io _Zrccess-nQ& Management, Vol. 16, No. 1.,
9. Melny k, V " Man-machine Interface: Frustration",~~ Noveuber/Decenber, 1972, pp. 392-401.
10. National Library of 0Medicine, Report No. NM 78-7,d Eva.. .oO the On-LineProcss by McDonald, D._", Santa Monica, Ca.:January 1980.
11. Baker, C.A., Eason, K.D., "An Observational Study ofMa12-Ccputer Interacto Using an Online BibliographicIn mao Rereval s lstem, 2R1111j14 1, Vol. 5,No. ,&rl 1 IS81, pp. 1 1-132.---
191
-AD-A132 989 AN INVESTIGATION INTO THE COUPLING OF INTERACTIVE AND 23BAITCH NETWORK( SERVICES IN COINS(U) NAVAL POSTGRADUATESCHOOL MONTEREY CR J B KIM JUN 83
UNCLASSIFIED F/G 9/2 NL
LEE
12. Benefrld A.R., Kugel, R. Marcus, RS. "CatalogInformation. and Text as ;ncasors ofelevance",J.. , January 1978, pp. 16-30.
13. Carlisle J.,_ Martin, T.H. Treu, S., "The UserInterfaca for Interactive Bibliographic Searching: AnAnalysis of the Attitudes of Hineteen InfcrmationScientists", J , Sarch/April, 1973, pp. 142-141.
14. Marcus, .S.," User Assistance in BiblicgraphicRetxieval Networks Through a Computer Intermediary",01.r~l~~,; s_ s -en Wn. 141 3ac r
15. Dayton, D.L., Lundeen, J.9. Pollock, J.J., "Automated- Tecbniques for Crnine Search Guidance: A Reviev" 4th.- "aneioa fieeui q, London, 9-T
16. Tedd, 1. "Intelligence in the User's Terminal: A Lookat Current C tions and Possibilities", 5th,. ern Al CalIenforz eeti, Lononn, 8
17. Latcratory fox Information and Decision Systems,.I.T. Cambridge, Ma., - Rep. LIDS-R- 1233_ .I.T. .mh 4 Casoid e, er.a.,._ . Dop . ,_...
18. Meadow, CT., Epstein, B.E., "IndividualizedInstruction for. Data Access",Ist Internaiona1_l_
1H _Aeg=q,,London# 13-TID U6C9 ~r 17;, p.
19. Durkin, K., Egeland, J., Garson, L., Terrant, "AnEx;erient to Stud the Online Use of a Full-TextPr mary journal Da abase", 4th International Online
fcetinaM London,
20. Kiviat P.3., Markovitz, H.M, Villanueva, B.,asc:P;;S;.qqm~(T Ln 1 9,ed. Russel, E.C.,L~a~..Lw*fgeles ca.,utBr 1975.
192
I .' ,', , ," .. • . .
, .-q -. . ' ,''' :.'*..*. " _:' . ...........-.............. i...... ...... .- - J.... .
rj.
INITIAL DISTRIBUTION LIST
No. Copies
1. Defense Technical Information Center 2C12 mornitatiQn.Aexandria, Virginia 22314
2. Superintendent 2ARES: Libra.ry Cede 0142Naval Postqgriuate Schoolfcnterey, Califcrnia 93940
3. SuperintendentATTN: Prof. Norman F. Schneidevind, Code 54SsNaval Fost rau ate SchoolMonterey, Califcrnia 93940
4. Suerintendent 2AT Prof. ff. G. Sovereign, Code 74laval Postraduate School
C Curr cu arnOfficer Code 39laval Pstgrade ate Scoolgonterey, Cali fcruia 93940
6. Directcrp National .Seq urity Agny2ATTN: Hr. George 8. Hc akn gcoils Project management of ficeS600 savage RoadPt. George G. Meade, Md. 20755
7. Chemical Abstract ServicqATTN: Dr. Ronald L. igingtonDirectcr, Research and DevelopmentI.O. Box 3012Columbus, Ohio 43210
8. Massachusetts Institute of Technology 1ATTN: Hr. Richard MarcusLaboratory for Information and Decision SystemsCambridge, Mass. 02139
9. Environment Protcti 1&STYI: Dr. Siney Steiegef lTS401 5 St., S.goashington, D.C. 20460
10. USS Enterprise (CVN-1) 1ATTN: L-. B. FrenchC;eraticns DepartmentIPC San Francisco 96635
11. Ccmandant of the arine CorpsCode CCAATTN: Cant. B. G ahamHead uar edrSates Earine CorpsVasbington, 6 .C. 2038
193
12. dajcz Ta lan AhnComputer nterI.e. scIGongl eul.ong iobong_Gu
13. Hellenic avyITTI: Cdr. asmas CharpantidisGeneral Naval StaffSclargc_Athens* Greece
14. Directc a1ional Security Agency 5|TI: J5B MPa 566
S980 Save Roa20755Ft. George G. Neade, Nd. 20755
ia.
a-9