Time Split - Token Based Contention Resolution ( TS - TBCR

نویسندگان

  • Dhadesugoor R. Vaman
  • Sharad Kumar
چکیده

Time Split-Token Based Contention Resolution (TS-TBCR) Protocol for Integrated Voice and Data Service over Wireless LAN's Dhadesugoor R. Vaman & Sharad Kumar Dept. of EE/CS Stevens Institute of Technology Hoboken, NJ 07030 Tel: (201) 216 5057 Fax: (201) 2168246 Email: bis _ d [email protected] This paper proposes a time split channel access with token based contention resolution (TSTBCR) protocol for integrated voice and data applications on wirelesss LAN's. This protocol provides perfect scheduling of information by reserving a small bandwidth for contention resolution. This guarantees contention resolution before the start of an information slot thus preventing collisions and conserving bandwidth. For contention resolution a token based scheme requiring little centralized control from the base station is suggested. This protocol provides statistical multiplexing of voice and data traffic. Performance of the protocol for voice traffic was evaluated using a computer simulation. The results show that a large number of information sources could be multiplexed on the wireless channel keeping the voice packet loss probability within acceptable limits. The protocol provides bounded packet delay for voice sources and thus can be utilized for provision of integrated services. November 1991 Doc: IEEE P802.11-91/112

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Token enabled multiple access (TEMA) for packet transmission in high bit rate wireless local area networks

In this paper we illustrate a novel Wireless Local Area Network Multiple Access Control (WLAN MAC) protocol whose allocation policy adopts a strategy similar to the token ring: the mobile stations access the channel upon receiving the token and release the channel by passing the token to the next user. The traffic is divided in two classes: Guaranteed Bandwidth (GB) and Best Effort (BE). The ba...

متن کامل

Token Enabled Multiple Access ( TEMA ) for Packet Transmission in High Bit Rate Wireless Local Area Networks Saeid Akhavan

In this paper we illustrate a novel Wireless Local Area Network Multiple Access Control (WLAN MAC) protocol whose allocation policy adopts a strategy similar to the token ring: the mobile stations access the channel upon receiving the token and release the channel by passing the token to the next user. The traffic is divided in two classes: Guaranteed Bandwidth (GB) and Best Effort (BE). The ba...

متن کامل

Decentralized token-CSMA/CD protocol for integrated voice/data LANs

ticularly in office automation. The characteristics and In this paper we propose a decentralized protocol for requirements for their traffic is different I' 2. Data traffic integrated voice and data local area networks. This requires reliable delivery because one bit error may protocol is based on a hybrid token-CSMA/CD protocol destroy the whole message. However, voice traffic is which combine...

متن کامل

Performance Analysis of a Centralized Resource Allocation Mechanism for Time-Slotted OBS Networks

Time-Slotted Optical Burst Switching (TS-OBS) is one of the most promising next-generation transport network technologies. This paper proposes a time-slot assignment procedure using centralized control for TS-OBS networks. Our scheme attempts to improve burst contention resolution and optical channel utilization. Analysis and simulation results show that the channel utilization of the TS-OBS ne...

متن کامل

A load awareness medium access control protocol for wireless ad hoc network

A contention-based wireless ad hoc medium access control (MAC) protocol, such as carrier sense multiple access with collision avoidance (CSMA/CA), has the excellence of simple and efficient when the system is light-loaded. The main drawback of such protocols is their inefficiency and unbounded delay when system load is heavy. On the other hand, a contention-free MAC protocol, such as token pass...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015