[1]姜绍君,王颖. 基于CSMA/CA协议的隐藏终端问题的改进[J].计算机技术与发展,2015,25(01):33-36.
 JIANG Shao-jun,WANG Ying. Improvement of Hidden Terminal Problem Based on CSMA/CA Protocol[J].,2015,25(01):33-36.
点击复制

 基于CSMA/CA协议的隐藏终端问题的改进()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年01期
页码:
33-36
栏目:
智能、算法、系统工程
出版日期:
2015-01-10

文章信息/Info

Title:
 Improvement of Hidden Terminal Problem Based on CSMA/CA Protocol
文章编号:
1673-629X(2015)01-0033-04
作者:
 姜绍君王颖
 大连理工大学
Author(s):
 JIANG Shao-junWANG Ying
关键词:
 无线局域网CSMA/CA隐藏终端CC2530NS-2仿真
Keywords:
 WLANCSMA/CAhidden terminalCC2530NS-2 simulation
分类号:
TN915.01
文献标志码:
A
摘要:
在无线局域网中,当节点采用竞争方式访问信道时,隐藏终端和其他节点可能同时利用信道发送数据,引起数据碰撞。在CSMA/CA协议中,增加数据收发的控制分组,正确表示数据收发开始和停止的时间,代替网络分配矢量(NAV),使得隐藏终端和其他节点按照先后顺序发送数据,实现可靠的数据传输。在CC2530芯片设计的方法中,实验结果表明降低了隐藏终端干扰造成的误码率;在NS-2仿真器评估的方法中,仿真结果表明控制分组对于网络其他性能影响小。通过两种方法验证了改进MAC协议的有效性。
Abstract:
 When the node contends channel in wireless local area networks,it will occur data collision because the hidden terminal and other node may access channel concurrently. In the CSMA/CA protocol,the control packets is used for representing starting or stopping of data transmission time instead of Network Allocation Vector ( NAV) ,thus the data is send in sequence for the hidden terminal and other node,realizing reliable data transmission. Experiments on the CC2530 chip show that the error rate of hidden terminal interference is re-duced. Simulations on the NS-2 show that the control packets had less impact on other network performances. The effectiveness of im-proved MAC protocol is proved by two methods.

相似文献/References:

[1]刘晓莹 王一 王新安.应用于无线局域网的高速维特比译码器电路[J].计算机技术与发展,2008,(01):11.
 LIU Xiao-ying,WANG Yi,WANG Xin-an.A High Speed Viterbi Circuit Implementation for WLAN System[J].,2008,(01):11.
[2]刘可 徐昌彪 杨士中.无线局域网中的认证机制[J].计算机技术与发展,2008,(01):164.
 LIU Ke,XU Chang-biao,YANG Shi-zhong.Authentication Mechanisms in WLAN[J].,2008,(01):164.
[3]周炜 褚伟.基于Linux的无线局域网协议解析器的设计[J].计算机技术与发展,2008,(03):217.
 ZHOU Wei,CHU Wei.Design of WLAN Protocol Parser Based on Linux[J].,2008,(01):217.
[4]姜永 郑明春 李国强.IEEE802.16中的无线Mesh网络研究[J].计算机技术与发展,2008,(05):234.
 JIANG Yong,ZHENG Ming-chun,LI Guo-qiang.Research on Wireless Mesh Network in IEEE802.16[J].,2008,(01):234.
[5]刘晓明 邓锋 谢李蓉.基于μC/OS-II的IEEE802.11 MAC协议的实现[J].计算机技术与发展,2008,(08):26.
 LIU Xiao-ming,DENG Feng,XIE Li-rong.Realization of IEEE802.11 MAC Protocol Based on μC/OS-II[J].,2008,(01):26.
[6]陈群 周健.无线局域网安全认证的EAP策略[J].计算机技术与发展,2008,(09):123.
 CHEN Qun,ZHOU Jian.EAP Strategy of WLAN's Security Authentication[J].,2008,(01):123.
[7]司纪锋 王美琴 曹宝香.无线局域网MAC地址欺骗攻击的检测[J].计算机技术与发展,2006,(02):232.
 SI Ji-feng,WANG Mei-qin,CAO Bao-xiang.Detecting Wireless LAN MAC Address Spoofing Attack[J].,2006,(01):232.
[8]王莉 刘志愚 刘一兰[].无线局域网WEP协议安全隐患分析[J].计算机技术与发展,2006,(08):55.
 WANG Li,LIU Zhi-yu,LIU Yi-lan.Analysis on Secure Hidden Troubles of Wireless Local Area Network's WEP[J].,2006,(01):55.
[9]邢长明 刘方爱 杨林.无线局域网中非法设备检测方案的设计与实现[J].计算机技术与发展,2006,(10):128.
 XING Chang-ming,LIU Fang-ai,YANG Lin.A Design and Realization of a Rogue - Device Detecting Project in WLAN[J].,2006,(01):128.
[10]殷安生.基于802.11i的WLAN安全认证机制研究与实现[J].计算机技术与发展,2010,(09):127.
 YIN An-sheng.Research and Implementation on Secure Authentication Mechanism of WLAN Based on 802.11i Protocol[J].,2010,(01):127.
[11]张冬梅,张有根. 无线局域网组播优化分组算法[J].计算机技术与发展,2014,24(11):65.
 ZHANG Dong-mei,ZHANG You-gen. Wireless LAN Multicast Optimization Grouping Algorithm[J].,2014,24(01):65.
[12]夏国卿,李长远,苏子松,等. 基于设备指纹的无线钓鱼接入点识别方法研究[J].计算机技术与发展,2015,25(01):143.
 XIA Guo-qing,LI Chang-yuan,SU Zi-song,et al. Research on Wireless Rogue AP Recognition Method Based on Device Fingerprinting[J].,2015,25(01):143.
[13]陶峥[] ],王洪玉[]. 基于卡方距离改进的WLAN室内定位算法[J].计算机技术与发展,2016,26(09):50.
 TAO Zheng[][],WANG Hong-yu[]. Improved WLAN Localization Algorithm Based on Chi-square Distance[J].,2016,26(01):50.

更新日期/Last Update: 2015-04-17