2012 IEEE Vehicular Technology Conference (VTC Fall) 2012
DOI: 10.1109/vtcfall.2012.6399249
View full text | Cite
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…In [12], a 1-D Markov model was used to model the backoff instance of highest precedence, AC[0], and a 2-D Markov model for lower precedence, AC [1]-AC [3]. Authors in [13][14][15] built a 2-D Markov model for the backoff procedure of an AC queue and a 1-D Markov model for the contention period of an AC queue. In addition to the above works, Gallardo et al [16] proposed different models for each of the access categories AC [1] through AC [3], and Zhao et al [17] employed a scalable analytical model to capture the IEEE 802.11p EDCA performance.…”
Section: State Of the Artmentioning
confidence: 99%
“…In [12], a 1-D Markov model was used to model the backoff instance of highest precedence, AC[0], and a 2-D Markov model for lower precedence, AC [1]-AC [3]. Authors in [13][14][15] built a 2-D Markov model for the backoff procedure of an AC queue and a 1-D Markov model for the contention period of an AC queue. In addition to the above works, Gallardo et al [16] proposed different models for each of the access categories AC [1] through AC [3], and Zhao et al [17] employed a scalable analytical model to capture the IEEE 802.11p EDCA performance.…”
Section: State Of the Artmentioning
confidence: 99%
“…Despite the significant effort devoted to modelling the performance of 802.11 DCF (see e.g. [1][2][3][4]), the capture effect is largely ignored in these studies, as well as in recent publications that investigate the behaviour of the EDCA protocol enhancement [15][16][17]. To date few analytical models of the capture probability in Rayleigh fading channels have been proposed and used to predict the impact of this effect on the capacity of 802.11 networks, e.g.…”
Section: Related Workmentioning
confidence: 99%
“…AIFS [9] is a method of prioritizing TC over the other, such as giving instant message or voice or video priority over file transfers or email (as shown in Table 1). A wireless node has to wait for certain time period before it is allowed to access the medium and this waiting time is assigned by the AIFS depending on the applications.…”
Section: Enhanced Dcf (Edcf) Priority Schemementioning
confidence: 99%
“…To control transmissions and limit collisions of nodes adopt the binary exponential back-off algorithm [9,10,13]. Rather than transmitting a packet immediately a node waits until its back-off timer expires even when the channel is idle.…”
Section: Markov Chain Model For the Performance Analysis Of Proposed mentioning
confidence: 99%