Wireless channel access control method based on virtual token
暂无分享,去创建一个
A wireless channel access control method based on a virtual token comprises the following steps of: A, a plurality of nodes are selected, one node is designated as a center node, the other nodes are called as wireless nodes, B, the center node generates a token, some wireless node is designated to hold the token, C, if the center node can monitor that the wireless node of some address uses the token, token passing succeeds, D, if monitoring fails, the token is re-passed for designated times or a data frame is broadcast, another node is designated to hold the token, E, the number of the nodes is updated, F, when the token is lost, the center node generates a token again, G, the nodes are monitored, the token is abandoned, the center node generates a token again, and H, Steps A-G are repeated. The method has the benefits that a secondary competitive mechanism is introduced, with the adoption of a node priority strategy, transmission requirements of emergency messages are met, the high reliability and timeliness of a network are guaranteed, and the effective utilization rate of the network is increased by data frame fusion.