2007
DOI: 10.1109/tii.2007.903224
|View full text |Cite
|
Sign up to set email alerts
|

VTP-CSMA: A Virtual Token Passing Approach for Real-Time Communication in IEEE 802.11 Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0
2

Year Published

2008
2008
2022
2022

Publication Types

Select...
6
2
2

Relationship

2
8

Authors

Journals

citations
Cited by 55 publications
(23 citation statements)
references
References 23 publications
0
21
0
2
Order By: Relevance
“…The IEEE 802.11 family of wireless LAN (WLAN) standards is certainly predominant in the realm of WLAN technologies, and it has also been considered extensively in the context of wireless industrial communications, see for example [31]- [38]. In this paper we focus on aspects of the current standard that have gained increased importance since publication of [1] and which at the same time are especially interesting for industrial applications, namely the QoS support that is now part of the 2007 version of the standard [39] and which was formerly specified in a separate amendment [40].…”
Section: Ieee 80211ementioning
confidence: 99%
“…The IEEE 802.11 family of wireless LAN (WLAN) standards is certainly predominant in the realm of WLAN technologies, and it has also been considered extensively in the context of wireless industrial communications, see for example [31]- [38]. In this paper we focus on aspects of the current standard that have gained increased importance since publication of [1] and which at the same time are especially interesting for industrial applications, namely the QoS support that is now part of the 2007 version of the standard [39] and which was formerly specified in a separate amendment [40].…”
Section: Ieee 80211ementioning
confidence: 99%
“…Like connected tokens, virtual tokens are a physical device connected to the authenticating server, however, the connected device is the client computer or mobile device [9] [10] , not a traditional hardware token. No hardware or software must be distributed to the end user.…”
Section: H) Virtual Tokensmentioning
confidence: 99%
“…In [59], a RT-communication approach (VTP-CSMA) has been proposed based on a traffic separation mechanism. Such mechanisms are able to prioritize RT-traffic over other traffic, without directly controlling the latter.…”
Section: Deterministic Collision Resolutionmentioning
confidence: 99%