WiCTP: A Token-based Access Control Mechanism for Wireless Networks

نویسنده

  • Raal Goff
چکیده

The introduction and growth of large, metropolitan-sized wireless networks has identified a significant problem within the current 802.11 protocol specification; Hidden Nodes. A wireless network may have 2 nodes, A and B, connected to a central Access Point (AP). Node A is within the transmission radius of the AP, but outside the transmission radius of B, and vice versa. Nodes A and B are then said to be hidden from each other. Ordinarily, this does not pose a significant problem, since most nodes on a wireless network are within the transmission radius of each other, but in scenarios where all nodes are hidden it creates a significant decrease in network performance. 802.11 wireless networks use Carrier Sense Multiple Access with Collision Avoidance to determine whether they are able to send collision-free transmissions. They sense the medium to determine if any other nodes are transferring data, and if it is free, they begin their transfer. However, when nodes are hidden from each other, nodes cannot determine if the hidden nodes are transferring. Thus, a hidden node A may start a transfer to a common node C while the hidden node B is also transferring to C. This scenario results in the packets colliding at C and nodes A and B have to retransmit. A and B never know if the other is transferring, so this scenario repeats itself for the life of the network. The standard way of dealing with this problem is to use the Request to Send/Clear to Send (RTS/CTS) protocol. RTS/CTS secures the medium for a node first, then transfer data, reducing the risk of collisions. A node using RTS/CTS will send a RTS packet with a preset duration and destination contained within. Any node hearing this will cease transmission for the duration contained in the packet. The destination will receive the RTS packet and reply to the sender with a CTS packet, which also contains a duration. Any nodes hearing the CTS will cease transmission for the duration in the CTS packet. Thus, the sender node is reasonably sure the medium is free for them to transfer data. Unfortunately RTS/CTS suffers from many problems in scenarios where many nodes are hidden. RTS and CTS packets often collide and require transmission, falling victim to the same problem they are attempting to solve. To combat the hidden node problem, this study proposes a new protocol called Wireless Cyclic Token Protocol (WiCTP). Based on current token-passing access control mechanisms such as Frottle and WiCCP, it uses a token packet to control access to the medium. A master node will pass a token to each node on

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Adaptive Congestion Alleviating Protocol for Healthcare Applications in Wireless Body Sensor Networks: Learning Automata Approach

Wireless Body Sensor Networks (WBSNs) involve a convergence of biosensors, wireless communication and networks technologies. WBSN enables real-time healthcare services to users. Wireless sensors can be used to monitor patients’ physical conditions and transfer real time vital signs to the emergency center or individual doctors. Wireless networks are subject to more packet loss and congestion. T...

متن کامل

A new SDN-based framework for wireless local area networks

Nowadays wireless networks are becoming important in personal and public communication andgrowing very rapidly. Similarly, Software Dened Network (SDN) is an emerging approach to over-come challenges of traditional networks. In this paper, a new SDN-based framework is proposedto ne-grained control of 802.11 Wireless LANs. This work describes the benets of programmableAcc...

متن کامل

Multi-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey

Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...

متن کامل

Multi-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey

Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...

متن کامل

The Role of Regulatory in Price Control and Spectrum Allocation to Competing Wireless Access Networks

With the rapid growth of wireless access networks, various providers offer their services using different technologies such as Wi-Fi, Wimax, 3G, 4G and so on. These networks compete for the scarce wireless spectrum. The spectrum is considered to be a scarce resource moderated by the spectrum allocation regulatory (“regulatory” for short) which is the governance body aiming to maximize the socia...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004