By Topic

Token enabled multiple access (TEMA) for packet transmission in high bit rate wireless local area networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
S. A. Taheri ; Dept. of Electr. & Comput. Eng., New Mexico Univ., Albuquerque, NM, USA ; A. Scaglione

We illustrate a novel wireless local area network multiple access control (WLAN MAC) protocol whose allocation policy adopts a strategy similar to the token ring: the mobile stations access the channel upon receiving the token and release the channel by passing the token to the next user. The traffic is divided in two classes: guaranteed bandwidth (GB) and best effort (BE). The base station indirectly controls the traffic access by allotting the tokens and the bandwidth is shared by the same users with a decentralized contention-less protocol in the case of the GB users and on a contention basis for the BE users. The MAC protocol proposed the physical layer adopts a multicarrier code division multiple access multiplexing technique, which mitigates the linear distortions of broadband transmission and allows one to divide the frequency and time resources in elementary units that can be associated to the 'token'. The specification on the average and peak delay and rate are guaranteed by limiting the number of users passing the token and fixing a deadline to release the token. At the same time, similar to a reservation based protocol, the token strategy avoids collisions and is able to guarantee efficiently the integrity of the transmitted data.

Published in:

Communications, 2002. ICC 2002. IEEE International Conference on  (Volume:3 )

Date of Conference:

2002