A Comparison of Techniques for Reducing Unicast Traffic in HSR Networks
Abstract
:1. Introduction
2. Existing Redundancy Protocols
3. Background
3.1. HSR Concepts
- Doubly attached node for HSR (DANH): A DANH node is an HSR-capable switching end node that has two HSR ports sharing the same medium access control (MAC). These two ports form a single interface. The source DANH inserts the HSR tag into the frame received from upper layers, duplicates the frame into two frame copies and sends the two copies over both ports. The destination DANH receives—in the case of failure-free—two copies of the same frame, one from each port.
- Redundancy Box (RedBox): Singly attached nodes (SAN), such as servers, maintenance laptops or printers cannot be directly connected to an HSR ring since they have no the HSR forwarding capability and do not support the HSR tag. A RedBox is used to connect SANs to the HSR ring. RedBoxes forward the frames over the ring like DANH nodes and act as proxies for all SANs that access them.
- Quadruple port device (QuadBox): QuadBox nodes are used to connect HSR rings together. A QuadBox has four HSR ports that are divided into two pairs connected by an interlink; each pair shares the same MAC. QuadBoxes operate as HSR nodes towards both rings simultaneously.
3.1.1. Single-Ring Networks
3.1.2. Connected-Ring Networks
3.2. HSR Issues
- (1)
- Forwarding frames into all DANH rings, except the destination DANH ring.
- (2)
- Forwarding frames into all QuadBox rings.
- (3)
- Doubling and circulating frames in all the rings.
4. Traffic Filtering-Based Techniques
- Quick removing (QR): QR removes duplicated and circulated traffic from rings.
- Traffic control (TC): TC also removes duplicated and circulated traffic from rings, like QR.
- Port locking (PL): PL prunes unicast traffic for DANH rings.
- Enhanced port locking (EPL): EPL is an enhanced version of the PL approach. The EPL approach prunes unicast traffic for both DANH and QuadBox rings.
- Filtering HSR traffic (FHT): FHT filters unicast traffic for both DANH and QuadBox rings and removes duplicated and circulated traffic in the rings.
Traffic Filtering Features | QR | TC | PL | EPL | FHT |
---|---|---|---|---|---|
Filtering traffic for DANH rings | No | No | Yes | Yes | Yes |
Filtering traffic for QuadBox rings | No | No | No | Yes | Yes |
Removing duplicated and circulated traffic | Yes | Yes | No | No | Yes |
4.1. Quick Removing (QR)
4.1.1. QR Concepts
4.1.2. QR Operations
- (a)
- If both frame copies are error-free: Nodes 5 and 6 have already received a copy of the frame. Node 5 has received copy B from the right side and then received copy A from the left side. The same is true for node 6; it has received copy A from the left side and then received copy B from the right side. In that case, nodes 1, 7 and 6 have received copy A and there is no need for copy B. The same is true for nodes 3, 4 and 5; they have received copy B and do not need to receive copy A. Therefore, node 6 will remove copy B from the ring and node 5 will remove copy A from the ring.
- (b)
- If a frame copy is corrupted as soon as it leaves the source node: We assume that copy A was corrupted when it left the source node 2, moving towards node 1. In this case, node 1 will remove copy A from the ring as soon as it receives copy A, and all the nodes in the rings, except the source node, will wait for copy B. Therefore, each node will receive a copy and forward it to the next node until it reaches the source node.
- (c)
- If a frame copy is corrupted during transmission: We assume that copy A was corrupted during transmission between nodes 1 and 7. In that case, node 7 will remove copy A from the ring, and node 6 will not receive copy A. Therefore, node 6 will forward copy B as soon as it receives copy B from the right side. Node 7 will also forward copy B to node 1, but node 1 has already received copy A, so it will remove copy B from the ring.
4.1.3. Advantages and Disadvantages
4.2. Traffic Control (TC)
4.2.1. TC Concepts
4.2.2. TC Operations
4.2.3. Advantages and Disadvantages
4.3. Port Locking (PL)
4.3.1. PL Concepts
4.3.2. PL Operations
- (a)
- Learning stage: In the learning stage, QuadBoxes check location of the destination node and perform port locking if needed. When the source node sends the first frame to the destination node, copies of the first frame are flooded into the entire network, as under the standard HSR protocol. QuadBoxes will check location of the destination of the frame, and then lock their DANH side’s ports if DANH rings connecting to those ports do not contain the destination of the frame.
- (b)
- Working stage: After the learning stage, all rings that do not contain the destination node are pruned. The working stage starts from the second frame. In the stage, frames are sent and received on paths through unlocked ports.
4.3.3. Advantages and Disadvantages
4.4. Enhanced Port Locking (EPL)
4.4.1. EPL Concepts
4.4.2. EPL Operations
- The first learning stage: DANH rings locking stage.
- The second learning stage: QuadBox rings locking stage.
- The working stage.
4.4.3. Advantages and Disadvantages
4.5. Filtering HSR Traffic (FHT)
4.5.1. FHT Concepts
- Filtering rule 1: Filtering inbound traffic for DANH rings. Access QuadBoxes are used to filter inbound traffic for DANH rings based on their MAC1 table. An access QuadBox node forwards a unicast frame into its DANH ring if and only if its MAC1 table contains the destination MAC address of the frame.
- Filtering rule 2: Filtering outbound traffic for QuadBox rings. Trunk QuadBox nodes are used to filter outbound traffic for QuadBox rings based on their MAC2 table. A trunk QuadBox node forwards a unicast frame from its first QuadBox ring to its second QuadBox ring if and only if the first QuadBox ring’s MAC2 table does not contain the destination MAC address.
- Forwarding rule: QuadBoxes forward a unicast frame once, at most. When a QuadBox receives a unicast frame, it checks if the frame has previously been received and forwarded. If not, it forwards the frame. If so, it discards the frame. This new forwarding rule allows FHT to remove circulated traffic in rings.
4.5.2. FHT Operations
- (a)
- Learning phase: In this phase, the FHT learns and builds MAC tables using control messages.
- Building MAC1 table: The MAC1 table is built at access QuadBoxes. Each QuadBox periodically sends a Hello message over all its ports. When a DANH node receives a Hello message, it replies by sending an ACK message, and forwards the Hello message to other DANH nodes. Each access QuadBox builds its MAC1 table based on ACK messages received from DANH nodes in its DANH ring. Based on the MAC1 table, an access QuadBox will not forward frames into its DANH ring if its MAC1 table does not contain the destination MAC address.
- Building MAC2 table: The MAC2 table is built at trunk QuadBoxes. Once access QuadBoxes have built their MAC1 tables, they send MAC messages that contain all the MAC addresses of their MAC1 table to their QuadBox ring. Trunk QuadBoxes connected to the QuadBox ring receive the MAC messages and update their MAC2 tables. Based on the MAC2 table, a trunk QuadBox will not forward a unicast frame from its first QuadBox ring to its second QuadBox ring if the first QuadBox ring’s MAC2 table contains the destination MAC address.
- (b)
- Forwarding phase: In the phase, QuadBoxes forward unicast frames based on MAC tables. The MAC1 table is used to prune the unicast frames for unused DANH rings, whereas the MAC2 table is used to filter the traffic for unused QuadBox rings. Additionally, based on the new traffic forwarding rule, the unicast frames are not doubled and circulated in the active rings.
4.5.3. Advantages and Disadvantages
4.6. Comparison
Traffic Filtering Features | QR | TC | PL | EPL | FHT |
---|---|---|---|---|---|
Filtering traffic for DANH rings | No | No | Yes | Yes | Yes |
Filtering traffic for QuadBox rings | No | No | No | Yes | Yes |
Removing duplicated and circulated traffic | Yes | Yes | No | No | Yes |
Learning MAC addresses | No | No | Yes | Yes | Yes |
Using control messages | No | No | No | No | Yes |
Filtered traffic | Any | Any | Unicast | Unicast | Unicast |
Network topology | Ring | Ring | Ring | Ring | Ring |
Number of Sent Frames | HSR | QR | TC | PL | EPL | FHT | ODP | DVP | RDP |
---|---|---|---|---|---|---|---|---|---|
10 | 1390 | 820 | 960 | 732 | 620 | 220 | 220 | 220 | 220 |
20 | 2780 | 1640 | 1920 | 1392 | 1120 | 440 | 440 | 440 | 440 |
30 | 4170 | 2460 | 2880 | 2052 | 1620 | 660 | 660 | 660 | 660 |
40 | 5560 | 3280 | 3840 | 2712 | 2120 | 880 | 880 | 880 | 880 |
50 | 6950 | 4100 | 4800 | 3372 | 2620 | 1100 | 1100 | 1100 | 1100 |
60 | 8340 | 4920 | 5760 | 4032 | 3120 | 1320 | 1320 | 1320 | 1320 |
70 | 9730 | 5740 | 6720 | 4692 | 3620 | 1540 | 1540 | 1540 | 1540 |
80 | 11,120 | 6560 | 7680 | 5352 | 4120 | 1760 | 1760 | 1760 | 1760 |
90 | 12,510 | 7380 | 8640 | 6012 | 4620 | 1980 | 1980 | 1980 | 1980 |
5. Predefined Path-Based Techniques
- Optimal Dual Paths (ODP): ODPs establish dual paths that have optimal link metrics and no common nodes based on network link information.
- Dual Virtual Paths (DVPs): DVP establish dual paths for each connection pair of terminal nodes by sending and receiving control messages.
- Ring-based Dual Paths (RDP): RDP establish dual paths by sending and receiving control messages for each connection pair of terminal rings (DANH rings) instead of terminal nodes.
5.1. Optimal Dual Paths (ODP)
5.1.1. ODP Concepts
- The dual paths have optimal link metrics.
- The dual paths have no common nodes.
5.1.2. ODP Operations
- (a)
- Exchanging link metrics: In this phase, nodes exchange their link metrics so that each node knows link metrics of the entire network. This is accomplished by broadcasting a link metric (Met) message. However, to reduce the size and total number of exchanged Met messages, the node with the lowest node identifier (ID) broadcasts its link metrics to the other nodes, and the adjacent nodes that connect directly to it and have a higher ID do not broadcast the metrics of the shared links. However, these nodes will broadcast for other links they have.
- (b)
- Building link metric table: Based on received Met messages, each terminal node builds a link metric table that contains the metrics of all links of the network. Ideally, all of the terminal nodes will have the same link metric table.
- (c)
- Establishing dual paths: Based on the link metric table, each terminal node establishes dual paths with each corresponding terminal node. To do so, the following procedure is performed.
- Searching all available paths: The ODP approach searches the link metric table of a terminal node for all the available paths from that node to all the other terminal nodes in the network. The available paths are then added to a list called the available paths list. The paths list also has the metrics for each path.
- Sorting the searched paths list: The available paths are sorted in ascending order of the path metrics. The path with the lowest metrics is at the beginning of the list, next are the paths with higher metrics values, and the path with the highest metrics is at the end of the list.
- Selecting dual optimal paths: Based on the sorted paths list, the ODP approach determines dual paths for each connection pair of terminal nodes. The paths determination process depends on selecting paths with optimal links metrics that have no common nodes between them, except for the source and the destination nodes. To establish dual paths for a connection pair, the ODP approach first sets the first path in the sorted paths list as the first candidate path. Then, it compares the first candidate path with the other paths listed after it in the sorted paths list. If there is a path that has no common node with the first candidate path, then the optimal dual paths are found. If no available path is found, the algorithm selects and sets the next path of the current first candidate path as the new first candidate path and conducts a comparison. The iteration ends once a path that has no common node with the first candidate path is found.
- Confirming the selection: After selecting the dual paths for each connection pair, the terminal nodes send messages to inform the selected paths. QuadBoxes build their forwarding table based on the messages.
5.1.3. Advantages and Disadvantages
5.2. Dual Virtual Paths (DVP)
5.2.1. DVP Concepts
5.2.2. DVP Operations
5.2.3. Advantages and Disadvantages
5.3. Ring-Based Dual Paths (RDP)
5.3.1. RDP Concepts
5.3.2. RDP Operations
- (a)
- Building the MAC table: Each access QuadBox periodically sends a Hello message into its DANH ring. When a DANH node in the ring receives a Hello message, it replies with an Acknowledgment (ACK) message, and then forwards the received Hello message to other DANH nodes in the DANH ring. Each access QuadBox builds its MAC table based on received ACK messages from DANH nodes in its DANH ring. When an access QuadBox receives an ACK message, it checks if its MAC table contains the source MAC address of the ACK message. If not, the QuadBox adds the source MAC address into its MAC table. If so, the ACK message is discarded. By learning the MAC addresses of DANH nodes, each access QuadBox learns the MAC addresses of all the DANH nodes connected to its DANH ring. Based on the MAC table, an access QuadBox will not forward a unicast frame into its DANH ring if its MAC table does not contain the destination MAC address of the frame.
- (b)
- Establishing ring-based dual paths: The functions of discovering and establishing dual paths between DANH rings are performed at access QuadBox nodes through a two-way handshake process: path request and path reply.
- Path request: To discover and establish ring-based dual paths for each connection pair of DANH rings, each access QuadBox sends a path request to all of the other access QuadBoxes by broadcasting a path request (PREQ) message. The PREQ message contains information of a sequence number, the source ring ID, the MAC table of the access QuadBox, and a node list that contains ID of QuadBoxes through which the PREQ message has been passed. When a trunk QuadBox receives a PREQ message, it updates its ring table based on the MAC table of the PREQ message. Each entry of the ring table consists of a MAC address of a DANH node and a ring ID of a DANH ring to which the DANH node is being connected. After updating the ring table, the trunk QuadBox adds itself to the node list of the PREQ message and then sends the updated PREQ messages over all of its ports, except the received port. When an access QuadBox node receives a PREQ message, it replies to the path request by sending a path reply (PREP) message, and then adds itself to the node list of the PREQ message and forwards the updated PREQ messages to QuadBox nodes.
- Path reply: When an access QuadBox has received a PREQ message sent by another access QuadBox, it builds a path between the sending and receiving access QuadBox nodes based on the node list of the PREQ message. The path is also a ring-based path between the source ring to which the sending QuadBox is connecting and the destination ring to which the receiving QuadBox is connecting. The receiving QuadBox then responds to the path request by sending a PREP message to the sending QuadBox. The PREP message is generated based on information in the received PREQ message. The PREP message contains information of a sequence number, the source ring ID, the destination ring ID, and a ring-based path between the source and destination rings built based on the node list of the received PREQ message. To reduce path setup overhead for each connection pair of DANH rings, only the access QuadBox that connects to the DANH ring with the lower ring ID sends the PREP message.
- (c)
- Building the forwarding table: Based on received PREQ and PREP messages, trunk QuadBoxes in between ring-based paths build their forwarding table. Each entry of the forwarding table consists of a source ring ID, a destination ring ID, and an output port. When a trunk QuadBox receives a PREQ of an access QuadBox node, it notes the received port associated with the source ring ID of the PREQ message. When the trunk QuadBox receives a PREP message, it adds two route entries of the connection pair, one for each direction, to its forwarding table. Since RDP uses two paired QuadBox nodes to connect rings in order to avoid a single point of failure, there are two ring-based paths discovered and established for each connection pair of DANH rings.
5.3.3. Advantages and Disadvantages
5.4. Comparison
Characteristics | ODP | DVP | RDP |
---|---|---|---|
Type of connection pair to setup dual paths | Node | Node | Ring |
Using network topology database | Yes | No | No |
Using control messages to setup dual paths | No | Yes | Yes |
Pruning traffic for unused rings | Yes | Yes | Yes |
Removing traffic circulation | Yes | Yes | Yes |
Type of filtered traffic | Unicast | Unicast | Unicast |
Network topology | Any | Any | Ring |
6. Conclusions
Acknowledgments
Author Contributions
Conflicts of Interest
References
- Industrial Communication Networks—High-Availability Automation Networks, Part 3: Parallel Redundancy Protocol (PRP) and High-Availability Seamless Redundancy (HSR); IEC 62439–3; International Electrotechnical Commission (IEC): Geneva, Switzerland, 2012.
- Network Engineering Guidelines for Communication Networks and Systems in Substations; IEC 61850–90–4; International Electrotechnical Commission (IEC): Geneva, Switzerland, 2013.
- Industrial Communication Networks—High-Availability Automation Networks, Part 1: General Concepts and Calculation Methods; IEC 62439–1; International Electrotechnical Commission (IEC): Geneva, Switzerland, 2010.
- Kirrmann, H.; Kleineberg, O. HSR: Zero Recovery time and low-cost redundancy for industrial Ethernet (High availability Seamless Redundancy, IEC 62439–3). In Proceedings of the IEEE Conference on Emerging Technologies and Factory Automation (ETFA), Mallorca, Spain, 22–25 September 2009.
- Kirrmann, H.; Kleineberg, O. Seamless and low-cost redundancy for substation automation systems (High availability Seamless Redundancy, HSR). In Proceedings of the Power and Energy Society General Meeting, Detroit, MI, USA, 24–29 July 2011.
- Heine, H.; Kleineberg, O. The high-availability seamless redundancy protocol (HSR): Robust fault-tolerant networking and loop prevention through duplicate discard. In Proceedings of the 9th IEEE International Workshop on Factory Communication Systems (WFCS), Lemgo, Germany, 21–24 May 2012.
- Araujo, J.A.; Lazaro, J.; Astarloa, A.; Zuloaga, A.; Garcia, A. High availability automation networks: PRP and HSR ring implementations. In Proceedings of the IEEE International Symposium on Industrial Electronics (ISIE), Hangzhou, China, 28–31 May 2012.
- Nsaif, S.A.; Rhee, J.M. Improvement of high-availability seamless redundancy (HSR) traffic performance. In Proceedings of the 14th International Conference on Advanced Communication Technology (ICACT), Gangwon, Korea, 7–10 February 2012.
- Nsaif, S.A.; Rhee, J.M. Improvement of High-Availability Seamless Redundancy HSR Traffic Performance for Smart Grid Communications. J. Commun. Netw. 2012, 14, 653–661. [Google Scholar] [CrossRef]
- Rhee, J.M.; Nsaif, S.A. Quick Removing (QR) Approach. In Traffic Reduction Algorithms for High-Availability Seamless Redundancy (HSR) Protocol; Myongji Research Institute: Yongin, Korea, 2014; pp. 21–32. [Google Scholar]
- Rhee, J.M.; Nsaif, S.A. High-Availability Seamless Redundancy (HSR) Protocol for Smart Grid communications. In Smart Grids Technologies, Applications and Management Systems; Nova Science Publishers: New York, NY, USA, 2014; pp. 185–234. [Google Scholar]
- Shin, M.; Joe, I. Performance improvement for the HSR ring protocol with traffic control in smart grid. In Proceedings of the Future Generation Information Technology (FGIT) 2012, Gangwon, Korea, 16–19 December 2012.
- Abdulsalam, I.R.; Rhee, J.M. Improvement of high-availability seamless redundancy (HSR) unicast traffic performance using port locking. In Proceedings of the Fourth World Congress on Software Engineering, Hong Kong, China, 3–4 December 2013.
- Rhee, J.M.; Nsaif, S.A. Port Locking (PL) Approach. In Traffic Reduction Algorithms for High-Availability Seamless Redundancy (HSR) Protocol; Myongji Research Institute: Yongin, Korea, 2014; pp. 131–140. [Google Scholar]
- Altaha, I.R.; Rhee, J.M.; Pham, H.A. Improvement of high-availability seamless redundancy (HSR) unicast traffic performance using enhanced port locking (EPL) approach. IEICE Trans. Inform. Syst. 2015, 98, 1646–1656. [Google Scholar]
- Tien, N.X.; Rhee, J.M. FHT: A Novel approach for filtering high-availability seamless redundancy (HSR) traffic. Energies 2015, 8, 6249–6274. [Google Scholar] [CrossRef]
- Tien, N.X.; Nsaif, S.A.; Rhee, J.M. High-availability seamless redundancy (HSR) traffic reduction using optimal dual paths (ODP). In Proceedings of the International Conference on Green and Human Information Technology (ICGHIT), Da Nang, Vietnam, 4–6 February 2015.
- Nsaif, S.A.; Rhee, J.M. DVP: A novel high-availability seamless redundancy (HSR) protocol traffic-reduction algorithm for a substation automation system network. Energies 2014, 7, 1792–1810. [Google Scholar] [CrossRef]
- Rhee, J.M.; Nsaif, S.A. Dual Virtual Paths (DVP) Algorithm. In Traffic Reduction Algorithms for High-Availability Seamless Redundancy (HSR) Protocol; Myongji Research Institute: Yongin, Korea, 2014; pp. 49–110. [Google Scholar]
- Tien, N.X.; Rhee, J.M. Reducing high-availability seamless redundancy (HSR) unicast traffic using ring-based dual paths (RDP). J. Commun. Netw. 2015. under review. [Google Scholar]
- IEEE 802.3—IEEE Standards for Ethernet. Available online: http://www.ieee802.org/3/ (accessed on 30 June 2015).
- Song, S.; Huang, J.; Kappler, P.; Freimark, R.; Kozlik, T. Fault-tolerant Ethernet middleware for IP-based process control networks. In Proceedings of the 25th Annual IEEE Conference on Local Computer Networks, Tampa, FL, USA, 8–12 November 2000.
- Lee, D.H.; Cho, Y.Z.; Pham, H.A.; Rhee, J.M.; Ryu, Y.S. SAFE: A scalable autonomous fault tolerant Ethernet scheme for large-scale star network. IEICE Trans. Commun. 2012, 95, 3158–3167. [Google Scholar] [CrossRef]
- Pham, H.A.; Rhee, J.M. RSAFE: A robust software-based fault-tolerant scheme for large-scale Ethernet networks. J. Inf. Sci. Eng. 2015, 31, 399–413. [Google Scholar]
- IEEE 802.1D-1998—IEEE Standard for Local Area Networks: Media Access Control (MAC) Bridges. Available online: http://www.ieee802.org/1/pages/802.1D.html (accessed on 30 June 2015).
- IEEE 802.1D-2004—IEEE Standard for Local and Metropolitan Area Networks: Media Access Control (MAC) Bridges. Available online: http://www.ieee802.org/1/pages/802.1D-2003.html (accessed on 30 June 2015).
- IEEE 802.1aq Standard—Shortest Path Bridging. Available online: http://www.ieee802.org/1/pages/802.1aq.html (accessed on 10 September 2015).
- IETF RFC 6325—Routing Bridges (RBridges): Base Protocol Specification. Available online: https://tools.ietf.org/html/rfc6325 (accessed on 10 September 2015).
- IETF RFC 6326—Transparent Interconnection of Lots of Links (TRILL) Use of IS-IS. Available online: https://tools.ietf.org/html/rfc6326 (accessed on 10 September 2015).
- IETF RFC 6327—Routing Bridges (RBridges): Adjacency. Available online: https://tools.ietf.org/html/rfc6327 (accessed on 10 September 2015).
- IETF RFC 6361—PPP Transparent Interconnection of Lots of Links (TRILL) Protocol Control Protocol. Available online: https://tools.ietf.org/html/rfc6361 (accessed on 10 September 2015).
- IETF RFC 6439—Routing Bridges (RBridges): Appointed Forwarders. Available online: https://tools.ietf.org/html/rfc6439 (accessed on 10 September 2015).
- IEEE 802.1ak Standard—Multiple Registration Protocol. Available online: http://www.ieee802.org/1/pages/802.1ak.html (accessed on 10 September 2015).
- Industrial Communication Networks: High-Availability Automation Networks, Part 2: Media Redundancy Protocol (MRP); IEC 62439–2; International Electrotechnical Commission (IEC): Geneva, Switzerland, 2010.
- Industrial Communication Networks: High-Availability Automation Networks, Part 4: Cross-Network Redundancy Protocol (CRP); IEC 62439–4; International Electrotechnical Commission (IEC): Geneva, Switzerland, 2010.
- Industrial Communication Networks: High-Availability Automation Networks, Part 5: Beacon Redundancy Protocol (BRP); IEC 62439–5; International Electrotechnical Commission (IEC): Geneva, Switzerland, 2010.
- OMNeT++ Version 4.6 Simulator. Available online: http://www.omnetpp.org/ (accessed on 15 January 2015).
© 2015 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Tien, N.X.; Nsaif, S.A.; Rhee, J.M. A Comparison of Techniques for Reducing Unicast Traffic in HSR Networks. Energies 2015, 8, 12029-12060. https://doi.org/10.3390/en81012029
Tien NX, Nsaif SA, Rhee JM. A Comparison of Techniques for Reducing Unicast Traffic in HSR Networks. Energies. 2015; 8(10):12029-12060. https://doi.org/10.3390/en81012029
Chicago/Turabian StyleTien, Nguyen Xuan, Saad Allawi Nsaif, and Jong Myung Rhee. 2015. "A Comparison of Techniques for Reducing Unicast Traffic in HSR Networks" Energies 8, no. 10: 12029-12060. https://doi.org/10.3390/en81012029
APA StyleTien, N. X., Nsaif, S. A., & Rhee, J. M. (2015). A Comparison of Techniques for Reducing Unicast Traffic in HSR Networks. Energies, 8(10), 12029-12060. https://doi.org/10.3390/en81012029