2008
DOI: 10.1109/twc.2007.060889
|View full text |Cite
|
Sign up to set email alerts
|

A token-based scheduling scheme for WLANs supporting voice/data traffic and its performance analysis

Abstract: Abstract-Most of the existing medium access control (MAC) protocols for wireless local area networks (WLANs) provide prioritized access by adjusting the contention window sizes or interframe spaces for different traffic classes. Those MAC protocols can only provide statistical priority access and limited service differentiation. In this paper, a novel token-based scheduling scheme is proposed for a fully-connected WLAN that supports both voice and data traffic. The proposed scheme can provide guaranteed priori… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
43
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 57 publications
(43 citation statements)
references
References 19 publications
0
43
0
Order By: Relevance
“…Performance comparisons with the modified HCF scheme [11] and probabilistic token-based scheme [12] are also provided to show the efficiency of our proposed scheme. Note that a comparison between the DFMAC and the IEEE 802.11e MAC is not provided since the advantage of the modified HCF scheme over IEEE 802.11e MAC is already demonstrated in [11].…”
Section: Numerical and Simulation Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Performance comparisons with the modified HCF scheme [11] and probabilistic token-based scheme [12] are also provided to show the efficiency of our proposed scheme. Note that a comparison between the DFMAC and the IEEE 802.11e MAC is not provided since the advantage of the modified HCF scheme over IEEE 802.11e MAC is already demonstrated in [11].…”
Section: Numerical and Simulation Resultsmentioning
confidence: 99%
“…The framework of probabilistic token passing proposed in [12] is adopted for the local data phase, due to its good performance and its capability of supporting service differentiation. For a group G of nodes (or queues) contending for wireless channel access, the token passing scheme can be characterized by two parameters: p p p = { p i , 1 ≤ i ≤ |G|} and P P P = {P i, j , 1 ≤ i, j ≤ |G|}, where p i denotes the token holding probability of node i, P i, j represents the token passing probability from node i to node j, and |G| is the size of G. Without service differentiation among local data nodes, the values of p i and P i, j are given by…”
Section: Probabilistic Token Passing For Local Data Phasementioning
confidence: 99%
See 2 more Smart Citations
“…In [11], a token based control scheme is presented to emulate the window-based flow and congestion control in wireless/wired Networks. In [12], a token based scheme is presented to ensure guaranteed priority for voice traffic in single-hop networks. In [13], an overlay token ring protocol (OTRP) is proposed for IVC, and it operates in two modes.…”
Section: Related Workmentioning
confidence: 99%