Wireless Token Ring Protocol-Performance Comparison with IEEE 802.11

نویسندگان

  • Mustafa Ergen
  • Duke Lee
  • Raja Sengupta
  • Pravin Varaiya
چکیده

The paper presents the performance advantage of Wireless Token Ring Protocol (WTRP) versus IEEE 802.11 in DCF mode. WTRP is a medium access control (MAC) protocol and is designed to provide quality of service in WLANs. WTRP supports guaranteed QoS in terms of bounded latency and reserved bandwidth which are crucial constraints of the real time applications and unapplicable in a IEEE 802.11 network. WTRP is a distributed MAC protocol and partial connection is enough for full connectivity. The stations take turn to transmit and are forced to suspend the transmission after having the medium for a specified amount of time. WTRP is robust against wireless medium imperfections. The DCF mode of IEEE 802.11, also a distributed MAC protocol, is based on contention among stations and is not homogeneous due to the existence of hidden terminals and random behavior. Consequently, QoS is not provided.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Evaluation of Wireless Controller Area Network (WCAN) Using Token Frame Scheme

In this paper, a proposed new wireless protocol so-called wireless controller area network is introduced. WCAN is an adaptation of its wired cousin, controller area network protocol. The proposed WCAN uses token frame scheme in providing channel access to nodes in the system. This token frame method follows the example used in wireless token ring protocol which is a wireless network protocol th...

متن کامل

A Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks

Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...

متن کامل

Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN)

Several Extensible Authentication Protocol (EAP) [EAP] authentication methods employ X.509 public key certificates. For example, EAP-TLS [EAP-TLS] can be used with PPP [PPP] as well as IEEE 802.1X [802.1X]. PPP is used for dial-up and VPN environments. IEEE 802.1X defines port-based, network access control, and it is used to provide authenticated network access for Ethernet, Token Ring, and Wir...

متن کامل

PPP and WLAN May

Several Extensible Authentication Protocol (EAP) [EAP] authentication methods employ X.509 public key certificates. For example, EAP-TLS [EAP-TLS] can be used with PPP [PPP] as well as IEEE 802.1X [802.1X]. PPP is used for dial-up and VPN environments. IEEE 802.1X defines port-based, network access control, and it is used to provide authenticated network access for Ethernet, Token Ring, and Wir...

متن کامل

QoS provided by the IEEE 802.11 wireless LAN to advanced data applications: a simulation analysis

IEEE 802.11 is a Media Access Control (MAC) protocol which has been standardized by IEEE for Wireless Local Area Networks (WLAN). The IEEE 802.11 MAC protocol offers two types of services to its users: synchronous and asynchronous. This paper thoroughly analyzes, by simulation, the asynchronous part alone, when each station feeds the MAC protocol with data traffic patterns (in the following ref...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003