Wireless channel access control method based on virtual token

An access control and wireless channel technology, applied in wireless communication, electrical components, etc., can solve the problems of wireless token ring network performance degradation, poor wireless channel transmission quality, increased token maintenance overhead, etc., to reduce difficulty and loss risk, reduce the number and number of times wireless data frames are sent and received, and improve the effect of token passing failures

Inactive Publication Date: 2014-01-22
CHINA SHIP DEV & DESIGN CENT
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, token maintenance is complicated and expensive; on the other hand, the transmission quality of the wireless channel is poor, which further increases the overhead of token maintenance, resulting in a decrease in the performance of the wireless token ring network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless channel access control method based on virtual token

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0040] The wireless channel access control method based on virtual token of the present invention comprises the following steps:

[0041] A. Select several nodes in a certain area, specify the node with the smallest address as the central node (the token is always generated by the central node), and other nodes are called wireless nodes. The addresses of each wireless node are uniformly assigned by the central node in order and Keep the addresses of each wireless node and the central node continuous;

[0042] B. Set the address of the central node to 0, the central node first generates a token, and then broadcasts a data frame to designate a certain wireless node to hold the token and monitor the network;

[0043] C. Within a certain period of time, if the central node can monitor that the wireless node at a certain address is using the token, it mea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A wireless channel access control method based on a virtual token comprises the following steps of: A, a plurality of nodes are selected, one node is designated as a center node, the other nodes are called as wireless nodes, B, the center node generates a token, some wireless node is designated to hold the token, C, if the center node can monitor that the wireless node of some address uses the token, token passing succeeds, D, if monitoring fails, the token is re-passed for designated times or a data frame is broadcast, another node is designated to hold the token, E, the number of the nodes is updated, F, when the token is lost, the center node generates a token again, G, the nodes are monitored, the token is abandoned, the center node generates a token again, and H, Steps A-G are repeated. The method has the benefits that a secondary competitive mechanism is introduced, with the adoption of a node priority strategy, transmission requirements of emergency messages are met, the high reliability and timeliness of a network are guaranteed, and the effective utilization rate of the network is increased by data frame fusion.

Description

technical field [0001] The invention relates to the field of wireless network communication, in particular to a virtual token-based wireless channel access control method. Background technique [0002] In a wireless network, CSMA / CA (Carrier Sense Multiple Access / Collision Detection) is generally used to control the access to the wireless channel by monitoring the wireless channel and backing off for a random period of time. Due to this random backoff method, there is a certain uncertainty in the wireless channel access delay, and the maximum network delay cannot be guaranteed. The greater the network load, the greater the randomness of the transmission delay, so it is only suitable for real-time requirements. Not high application fields. [0003] In the token ring network, the access control to the transmission medium is realized through the token. A token is a special data frame, and only nodes that receive the token can send data. Since the tokens are passed sequential...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W74/06
Inventor 任平陈亮吴楠黄琛张崎
Owner CHINA SHIP DEV & DESIGN CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products