Wireless Token Ring Protocol-Performance Comparison with IEEE 802.11
نویسندگان
چکیده
The paper presents the performance advantage of Wireless Token Ring Protocol (WTRP) versus IEEE 802.11 in DCF mode. WTRP is a medium access control (MAC) protocol and is designed to provide quality of service in WLANs. WTRP supports guaranteed QoS in terms of bounded latency and reserved bandwidth which are crucial constraints of the real time applications and unapplicable in a IEEE 802.11 network. WTRP is a distributed MAC protocol and partial connection is enough for full connectivity. The stations take turn to transmit and are forced to suspend the transmission after having the medium for a specified amount of time. WTRP is robust against wireless medium imperfections. The DCF mode of IEEE 802.11, also a distributed MAC protocol, is based on contention among stations and is not homogeneous due to the existence of hidden terminals and random behavior. Consequently, QoS is not provided.
منابع مشابه
Performance Evaluation of Wireless Controller Area Network (WCAN) Using Token Frame Scheme
In this paper, a proposed new wireless protocol so-called wireless controller area network is introduced. WCAN is an adaptation of its wired cousin, controller area network protocol. The proposed WCAN uses token frame scheme in providing channel access to nodes in the system. This token frame method follows the example used in wireless token ring protocol which is a wireless network protocol th...
متن کاملA Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks
Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...
متن کاملCertificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN)
Several Extensible Authentication Protocol (EAP) [EAP] authentication methods employ X.509 public key certificates. For example, EAP-TLS [EAP-TLS] can be used with PPP [PPP] as well as IEEE 802.1X [802.1X]. PPP is used for dial-up and VPN environments. IEEE 802.1X defines port-based, network access control, and it is used to provide authenticated network access for Ethernet, Token Ring, and Wir...
متن کاملPPP and WLAN May
Several Extensible Authentication Protocol (EAP) [EAP] authentication methods employ X.509 public key certificates. For example, EAP-TLS [EAP-TLS] can be used with PPP [PPP] as well as IEEE 802.1X [802.1X]. PPP is used for dial-up and VPN environments. IEEE 802.1X defines port-based, network access control, and it is used to provide authenticated network access for Ethernet, Token Ring, and Wir...
متن کاملQoS provided by the IEEE 802.11 wireless LAN to advanced data applications: a simulation analysis
IEEE 802.11 is a Media Access Control (MAC) protocol which has been standardized by IEEE for Wireless Local Area Networks (WLAN). The IEEE 802.11 MAC protocol offers two types of services to its users: synchronous and asynchronous. This paper thoroughly analyzes, by simulation, the asynchronous part alone, when each station feeds the MAC protocol with data traffic patterns (in the following ref...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003