2010
DOI: 10.1016/j.adhoc.2009.03.003
|View full text |Cite
|
Sign up to set email alerts
|

Service differentiation mechanisms for WLANs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…Therefore, any fairness algorithms must differentiate nodes and provide proportional fairness based on network nodes weight. In Reference [24], we show that by assigning different contention window size, we can provide different weight in wireless LANs. When we apply this concept to the MFA, it provides different weight by (1) assigning the contention window size based on their weight, and (2) when a node become active, it transmits multiple packets based on its weight before becoming passive while its children become active after detecting multiple packet transmissions of the their parent.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Therefore, any fairness algorithms must differentiate nodes and provide proportional fairness based on network nodes weight. In Reference [24], we show that by assigning different contention window size, we can provide different weight in wireless LANs. When we apply this concept to the MFA, it provides different weight by (1) assigning the contention window size based on their weight, and (2) when a node become active, it transmits multiple packets based on its weight before becoming passive while its children become active after detecting multiple packet transmissions of the their parent.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…This medium access control technique works perfectly well for best effort service but is unable to support multimedia applications with strict QoS requirements [1][2][3]. A number of simple priority schemes can be easily implemented with minor modifications on DCF and the outcomes seem encouraging [6][7][8][9]. However, such enhancements on the MAC protocol imply the need to replace the access points (APs) and hence incurring additional cost and time.…”
Section: Introductionmentioning
confidence: 99%
“…• It provides ease of control and management by means of having a centralized access control at the gateway/router side. • In contrast to [6][7][8][9][10][11][12][13][14][15] which only offer simulation studies, L3-ACAS can be easily implemented using COTS hardware. This will be further discussed in the later section.…”
Section: Introductionmentioning
confidence: 99%
“…The performance analysis of IEEE 802.11e-EDCA network can be achieved by either simulation and experiment (see Al-Karaki and Chang, 2004;Hamidian and Korner, 2006;Fan, 2007;Gallardo et al, 2007;Lee et al, 2007b;Ge et al, 2007;Lin and Wu, 2007;Hamidian and Korner, 2008;Yu et al, 2009;Varposhti and Movahhedinia, 2009;Thangaraj et al, 2010;Cetinkaya, 2010;Lagkas et al, 2013;Korner et al, 2011;Camps-Mur et al, 2012) or by mathematical modelling (see Jeong et al, 2004;Kong et al, 2004;Vassis and Kormentzas, 2005;Xiao, 2005;Banchs and Vollero, 2006;Tao and Panwar, 2006;Banchs and Serrano, 2007;Serrano et al, 2007;Xiong and Mao, 2007;Patras et al, 2009;Pan and Wu, 2009;Hu et al, 2011;Kosek-Szott et al, 2011;Min et al, 2011;Liu and Saadawi, 2011;Hu et al, 2012;Yao et al, 2013;Yazid et al, 2015a). Mathematical modelling is an abstract representation of the system behaviour, frequently in steady state (Puigjaner, 2003).…”
Section: Introductionmentioning
confidence: 99%