<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Analytical Modeling of the IEEE 802.11e EDCA Network with Contention Free Burst</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mohand Yazid</string-name>
          <email>yazid.mohand@gmail.Com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nassim Sahki</string-name>
          <email>nass mi@yahoo.fr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Louiza Medjkoune-Bouallouche</string-name>
          <email>louiza medjkoune@yahoo.fr</email>
          <email>medjkoune@yahoo.fr</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Djamil A¨ıssani</string-name>
          <email>lamos bejaia@hotmail.com</email>
          <email>mi@yahoo.fr</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Operations Research, University of Bejaia</institution>
          ,
          <addr-line>06000 Bejaia</addr-line>
          ,
          <country country="DZ">Algeria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>LAMOS Laboratory, University of Bejaia</institution>
          ,
          <addr-line>06000 Bejaia</addr-line>
          ,
          <country country="DZ">Algeria</country>
        </aff>
      </contrib-group>
      <fpage>69</fpage>
      <lpage>75</lpage>
      <abstract>
        <p>Contention Free Burst (CFB) is a promising burst transmission scheme defined in the IEEE 802.11e Medium Access Control (MAC) protocol to achieve differentiated Quality of Service (QoS) and improve the utilization of the wireless scarce bandwidth. Although modeling and performance analysis of the IEEE 802.11e network have attracted tremendous research efforts from both the academia and industry, most existing analytical models do not give attention to the CFB QoS parameter. In this paper, we aim to propose a simple analytical model of the IEEE 802.11e Enhanced Distributed Channel Access (EDCA) function including mainly the CFB, in order to study its effect on the improvement of the achievable throughput of Video and Voice Access Categories (ACs). Therefore, we propose a new two-dimensional Markov chain model of the IEEE 802.11e EDCA function with CFB. Then, we develop a mathematical model to derive the saturation throughput. Finally, performance analysis has allowed us to estimate the maximum sustainable throughput with CFB in an IEEE 802.11e-EDCA network under infinite load conditions.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. INTRODUCTION</title>
      <p>
        The IEEE 802.11 standard is currently one of
the most popular wireless access technologies. It
allows for quick and simple configuration of local,
broadband networks at home, in offices, or in public
places and greatly facilitates Internet access
(KosekSzott et al. (2011)). With the increasing demand of
Wireless Local Area Networks (WLANs), especially
of the IEEE 802.11 (IEEE 802.11 Standard (1999)),
the support of differentiated Quality of Service (QoS)
has become one of the recent critical challenges
for the success of IEEE 802.11 Medium Access
Control (MAC) protocols for the future wireless
communications. It is important to develop a new
medium access scheme that can support the
differentiated QoS requirements over IEEE 802.11
WLANs, which is specified by the IEEE 802.11e
(IEEE 802.11e Standard (2005)). The IEEE 802.11e
standard specifies differentiated service classes in
the MAC layer to enable different kind of packet
priorities and have drawn tremendous interest
from both industry and academia. IEEE 802.11e
defines the Hybrid Coordination Function (HCF)
access mechanism, which uses two mechanisms
for the support of QoS differentiation. They are
Enhanced Distributed Channel Access (EDCA) and
HCF Controlled Channel Access (HCCA) (
        <xref ref-type="bibr" rid="ref7">Lee et al.
(2007)</xref>
        ).
      </p>
      <p>
        The EDCA function defines several QoS
enhancements to the legacy IEEE 802.11 Distributed
Coordination Function (DCF). EDCA operation is based
on different priority levels through the definition of
Access Categories (ACs). There are four ACs (Voice
– VO, Video – VI, Best Effort – BE, and Background
– BK), each with a separate queue. To provide traffic
differentiation, the following medium access
parameters are defined for each AC: the Contention Window
minimum (CWmin) and maximum (CWmax) size, the
Arbitration Inter-Frame Space Number (AIF SN ),
and the Contention Free Burst (CFB). The functions
of the access parameters are as follows: CWmin and
CWmax determine the initial size of the contention
window and the maximum possible backoff value,
respectively. AIF SN determines the minimum
number of idle slots before a frame transmission may
begin. The CFB allows consecutive frame
transmissions after gaining channel access (
        <xref ref-type="bibr" rid="ref10">Kosek-Szott et
al. (2011)</xref>
        ). A comprehensive description of EDCA
function can be found in (IEEE 802.11e Standard
(2005)).
      </p>
      <p>
        After the new EDCA function was defined, the
previously proposed analytical models of the IEEE
802.11 DCF became unsatisfactory because they
lacked traffic differentiation. However, they were
a solid starting point for further research. Most
of all, they resolved the complicated problem
of representing multiple states of the channel
access procedure by using Markov chains
(KosekSzott et al. (2011)). In this area,
        <xref ref-type="bibr" rid="ref9">Kong et al.
(2004)</xref>
        presented an analytical model of the IEEE
802.11e EDCA taking into account AIFS and CW.
The authors analyzed the throughput performance
of differentiated service traffic and proposed a
recursive method enable to provide the mean access
delay.
        <xref ref-type="bibr" rid="ref13">Vassis and Kormentzas (2005)</xref>
        presented
an analytical model for the performance evaluation
of IEEE 802.11e EDCA scheme under finite load
conditions on the basis of various instances of delay
metric (access delay, queuing delay and total delay).
        <xref ref-type="bibr" rid="ref1">Banchs and Vollero (2006)</xref>
        presented an analytical
model to analyze the throughput performance of
an EDCA WLAN as a function of its parameters
(AIF S, CWmin, CWmax and TXOPLimit). The
authors searched for the optimal EDCA configuration
which maximizes the throughput performance of the
WLAN.
        <xref ref-type="bibr" rid="ref11">Serrano et al. (2007)</xref>
        presented a model
to analyze the throughput and delay performance
of the EDCA mechanism under non-saturation
conditions. The proposed model can be used to
analyze generic source models, as it neither makes
any assumption on the source’s arrival process
nor requires all packets be of the same length.
        <xref ref-type="bibr" rid="ref12">Varposhti and Movahhedinia (2009)</xref>
        analyzed the
effect of loss and delay caused by fading channel
on EDCA performance. Then, they proposed a
modification to the media access scheme, called
Collision Avoidance with Fading Detection (CAFD)
to enhance performance in wireless environments
subject to failure.
        <xref ref-type="bibr" rid="ref3">Hu et al. (2011)</xref>
        proposed an
analytical model for the TXOP service differentiation
scheme in single-hop ad hoc networks in the
presence of unbalanced stations with different traffic
loads. The QoS metrics including throughput,
endto-end delay, frame dropping probability, and energy
consumption are derived.
        <xref ref-type="bibr" rid="ref4">Hu et al. (2012)</xref>
        proposed
an analytical model to accommodate the integration
of the three QoS schemes including AIFS, CW and
TXOPLimit in an IEEE 802.11e-EDCA network with
finite buffer capacity under unsaturated traffic loads.
The important QoS performance metrics in terms
of throughput, delay, delay jitter, and frame loss
probability are derived.
      </p>
      <p>In this paper, we propose a simple analytical model
of the IEEE 802.11e EDCA function with Contention
Free Burst. Therefore, we use a two-dimensional
Markov chain to model the behavior of a single
access category. Then, we develop a mathematical
model to derive the saturation throughput of a given
access category.</p>
      <p>
        The remainder of this paper is organized as
following: an overview of the CFB scheme is given
in section 2. In section 3, we describe the proposed
analytical model of the IEEE 802.11e ECDA function
with CFB. The obtained analytical results about the
sustainable overall throughput in an IEEE
802.11eEDCA network, are presented in section 4. In section
5, we conclude the paper.
2. OVERVIEW OF THE CFB SCHEME
In DCF, the system efficiency is considerably
affected by various overheads referred to as Physical
(PHY) layer headers, control frames, backoff, and
inter-frame space. The overhead problem becomes
more serious as the data rate increases. To mitigate
the impact of the overheads and improve the system
efficiency, the TXOP scheme has been proposed in
the IEEE 802.11e protocol (
        <xref ref-type="bibr" rid="ref8">Min et al. (2011)</xref>
        ).
      </p>
      <p>SIFS</p>
      <p>CFB</p>
      <p>SIFS
DATA</p>
      <p>DATA
ACK</p>
      <p>SIFS</p>
      <p>DATA</p>
      <p>SIFS
ACK</p>
      <p>SIFS</p>
      <p>ACK</p>
      <p>AIFS</p>
      <p>CW</p>
      <p>Different from DCF where a station can transmit
only one frame after winning the channel, the
TXOP scheme allows a station gaining the
channel to transmit the frames available in its
buffer successively provided that the duration of
transmission does not exceed a certain threshold,
namely the CFB. As shown in Figure 1, each
frame is acknowledged by an ACKnowledgement
(ACK) after a Short Inter-Frame Space (SIFS) upon
receiving this ACK. If the transmission of any
frame fails, the burst is terminated and the station
contends again for the channel to retransmit the
failed frame. The TXOP scheme is an efficient
way to improve the channel utilization because the
contention overhead is shared among all the frames
transmitted in a burst. Moreover, it enables service
differentiation between multiple traffic classes by
virtue of various CFBs. Another advantage of using
the TXOP scheme is that the channel occupation
time in multi-rate WLANs can be fairly distributed by
the packets available in its queue
consecutively, provided that the duration of
transmission does not exceeds the specific CFB.
2. We assume a fixed number of wireless
stations, where each access category h always
having a packet available for transmission.
In other words, we operate in saturation
conditions.
3. The collision probability of a packet of
any access category h is constant and is
independent of the number of retransmissions.
3.2. Packet Transmission Probability
We study the behavior of a single access category
h with a Markov chain model, and we obtain the
stationary probability [h] that the AC[h] transmits a
packet in a generic slot time. This probability will be
used to determine the saturation throughput of the
IEEE 802.11e-EDCA network.</p>
      <p>1
1
1
0, - TL[h]+1 ...</p>
      <p>1
1, - TL[h]+1 ...</p>
      <p>
        1
allocating the larger CFB to faster stations. The slow
stations, therefore, no longer severely degrade the
performance of those with the higher rate (
        <xref ref-type="bibr" rid="ref8">Min et al.
(2011)</xref>
        ).
3. MODELING 802.11E EDCA WITH CFB
In this section, we describe a new two-dimensional
discrete time Markov chain model for the IEEE
802.11e EDCA function including the CFB. The
resolution of stationary probabilities equations of
this Markov chain model allows us to compute the
packet transmission probability [h] of each access
category h (AC[h]), where h 2 fV O; V I; BE; BKg.
This probability will be used to develop a
mathematical model to derive the overall throughput of a
given access category h in an IEEE 802.11e-EDCA
network.
3.1. Assumptions of 802.11e ECDA Analytical
Model
The following is a list of assumptions of our
analytical model for the IEEE 802.11e EDCA
function. Table 1 (resp. Table 2) includes Parameters
(resp. Probabilities) of the 802.11e analytical model.
      </p>
      <sec id="sec-1-1">
        <title>Description</title>
        <p>Number of stations in the network.</p>
        <p>Maximum backoff stage of the AC[h].</p>
        <p>Minimum contention window of the AC[h].</p>
        <p>Maximum contention window of the AC[h].</p>
        <p>Contention window size of the AC[h] at
ith transmission attempt.</p>
        <p>Maximum number of packets can be
transmitted in burst during the
CF B[h] of the AC[h].</p>
        <p>Packet payload length.</p>
        <p>Time of a packet payload transmission.</p>
        <p>Time of a MAC layer header transmission.</p>
        <p>Time of a PHY layer header transmission.</p>
        <p>Time of an acknowledgment transmission.</p>
        <p>Time interval of AIFS of the AC[h].</p>
        <p>Time interval of SIFS.</p>
        <p>Time of a signal propagation.</p>
        <p>An empty slot time.
1. All packets are of the same length. Each
station that gains the channel access transmits
1
m[h],-TL[h]+1 ...</p>
        <p>1
m[h], -1
m[h], 0
m[h], 1</p>
        <p>Let S[h](t) be the stochastic process representing the
backoff stage i (i = 0; 1; : : : ; m[h]) of the AC[h] at the
time t.</p>
        <p>Let B[h](t) be the stochastic process representing
either the backoff time counter j (j = 0; 1; : : : ; Wi[h]) or
the kth transmitted packet (k = 0; 1; : : : ; T L[h]+1)
during the CF B[h] for a given AC[h].</p>
        <p>For a given AC[h], the Wi[h] and the T L[h] are given
by the Equations 1 and 2, respectively.
P[h]
P[h]</p>
        <p>i, 0</p>
        <p>P[h]</p>
        <p>P[h]
..1.. 0, W0[h]- 1
.... 1, W1 [h]- 1
1
....
1</p>
        <p>
          i, Wi[h]- 1
..1.. m[h],Wm[h]- 1
We can now express the probability [h] that an
AC[h] transmits in a random chosen slot time. It is
the sum of all the steady-state probabilities of states
i;k, i = 0; 1; m[h], and k = 0; 1; T L[h] + 1.
In these states, an AC[h] attempts to transmit its
packets. Thus:
(1)
(5)
(6)
(7)
Once the key approximation in Bianchi’s Markov
chain model (
          <xref ref-type="bibr" rid="ref2">Bianchi (2000)</xref>
          ) is assumed (which
means that, at each transmission attempt, and
regardless of the number of retransmissions
suffered, each packet collides with constant and
independent probability P [h]) it is possible to model
the bi-dimensional process fS[h](t); B[h](t)g with the
discrete-time Markov chain depicted in Figure 2.
In this Markov chain, the only non null one-step
transition probabilities are:
 i




i;k =  i





        </p>
        <p>Thus, by the relation (4), all the values i;k are
expressed as a function of the value 0;0 and packet
collision probability P [h]. 0;0 is finally determined
by imposing the normalization condition, that can be
simplified as follows:
 P fi; k=i; k + 1g = 1; i 2 (0; m[h]); k 2 ( T L[h] + 1; 2):

 P fi; k=i; k + 1g = 1; i 2 (0; m[h]); k 2 (0; Wi[h] 2):



 P fi; 1=i; 0g = 1



 P f0; k=i; T L[h] + 1g =</p>
        <p>P [h]; i 2 (0; m[h]):</p>
        <p>1</p>
        <p>W0[h]


 P fi; k=i 1; 0g =





 P fm[h]; k=m[h]; 0g =</p>
        <p>P [h] ; i 2 (1; m[h]); k 2 (0; Wi[h] 1):
Wi[h]</p>
        <p>P [h]
Wm[h] ; k 2 (0; Wm[h] 1):
; i 2 (0; m[h]); k 2 (0; W0[h] 1):
Let i;k = limt→∞P fS[h](t) = i; B[h](t) = kg, i 2
(0; m[h]), k 2 ( T L[h]+1; Wi[h] 1) be the stationary
distribution of the chain. The closed-form solution for
this Markov chain is:
0;0;
0;0;
0;0; i 2 (0; m[h] 1); k 2 (0; Wi[h] 1);</p>
        <p>i = m[h]; k 2 (0; Wi[h] 1);
0;0; i 2 (0; m[h] 1); k 2 ( 1; T L[h] + 1);
i = m[h]; k 2 ( 1; T L[h] + 1):
(4)</p>
        <p>From the viewpoint of a wireless station, the
probability that the wireless station accesses the
channel is given by the Equation 8, where the access
categories VO, VI, BE and BK are represented by the
priorities 3, 2, 1 and 0, respectively.
(3a)</p>
        <p>[h] =
Where,
4 = 2 (1
=
=
m[h] T L[h]−1
∑ ∑
i=0 k=1
T L[h] (1
1
m[h]
∑
i;−k +</p>
        <p>i=0
P [h]) + P [h]
P [h]</p>
        <p>i;0;
4
1 + 2 + 3 (T L[h]
1)
:
0;0;
2P [h]) (T L[h] (1</p>
        <p>P [h]) + P [h])
The probability P [h] that a transmitted packet of a
given AC[h] encounters a collision, is the probability
that, in a time slot, at least one of n 1 remaining
wireless stations transmits, or at least one of AC[i]
(i &gt; h) of the same wireless station transmits. i &gt; h
means that, AC[i] has higher priority than AC[h].
Hence, we have:
i&gt;h
Equations 7, 8 and 9 form a set of nonlinear
equations. It can be solved by means of numerical
methods. All the transition probabilities and
steadystate probabilities can be obtained.
3.3. Saturation Throughput (T H[h])
We study the events that can occur within a generic
slot time, and we express the saturation throughput
of a given AC[h] in an IEEE 802.11e-EDCA network,
as a function of the computed value [h].</p>
        <p>The average length of a slot time E[ ], is obtained
by considering that:</p>
        <p>With the probability (1</p>
        <sec id="sec-1-1-1">
          <title>Ptr), the slot time is empty;</title>
          <p>3
∑Ps[h]), the slot time
h=0</p>
        </sec>
        <sec id="sec-1-1-2">
          <title>With the probability Ptr(1</title>
          <p>contains a collision;
3
With the probability Ptr ∑Ps[h], the slot time
h=0
contains T L[h] packets successfully transmitted.
We express the elementary parameters of T H[h]:</p>
          <p>Let Tc be the time that the channel is sensed busy
by a collided transmission of the first packet of any
AC[h]:
Tc = minfAIF S[h]g + TMAC + TP HY + TP +
(12)</p>
        </sec>
        <sec id="sec-1-1-3">
          <title>Where,</title>
          <p>AIF S[h] = AIF SN [h]
+ SIF S:
(13)</p>
          <p>Let Ts[h] be the time that the channel is sensed
busy by a successful transmission of all the packets
of the AC[h]:</p>
          <p>Ts[h] =AIF S[h] + T L[h] [TMAC + TP HY + TP +
2SIF S + 2 + ACK]</p>
          <p>SIF S:
(14)
We define EI [h], as the average amount of useful
information successfully transmitted by the AC[h] in
a slot time. It is given as follows:
Now, we are able to express the saturation
throughput (T H[h]) of a given AC[h], as the
ratio of the average amount of useful information
successfully transmitted EI [h] to the average length
of a slot time E[ ]:</p>
          <p>T H[h] =
4. SATURATION THROUGHPUT ANALYSIS
In this section, we present and analyze the obtained
analytical results about the overall throughput of
the IEEE 802.11e-EDCA network. These results
are obtained after solving and programming the
analytical model described in section 3 under Matlab
software. The numerical values of parameters used
to get the below figures, are listed in Tables 3 and 4.
The throughput analysis of the IEEE 802.11e-EDCA
network provided in this section, is done with
different BER values, packet lengths and network
sizes, in cases of aggregated and non-aggregated
packets. This analysis is original and leads to new
conclusions that could not be intrusively expected.
In Figure 3, we compare the overall throughput of
AC[VO] and AC[VI] obtained with and without CFB
according to the number of stations in the network.
We observe that, the overall throughput of both
AC[VO] and AC[VI] is decreasing with the increase
of the network size. This due to the number of
collisions which increases with the increase of the
number of stations in the network. We note on Figure
3 that, the use of CFB allows significant channel
utilization improvement of both AC[VO] and AC[VI].</p>
        </sec>
      </sec>
      <sec id="sec-1-2">
        <title>Parameter</title>
        <p>We also note that, when CFB is used, the overall
throughput obtained with AC[VI] is greater than the
one obtained with AC[VO]. This is due to the number
of consecutive MPDUs sent by the AC[VI] which is
greater than the one sent by the AC[VO].</p>
        <p>In Figure 5, we analyze the overall throughput of
AC[VO] and AC[VI] according to the number of
MPDUs in cases of middle and maximum packet
length (1500 bytes and 2312 bytes, respectively).
We show clearly that, the overall throughput of both
AC[VO] and AC[VI] increases with the increase of the
number of MPDUs allowed to be transmitted during a
CFB. We also note that, increasing the packet length
allows to increase the efficiency of CFB. Through the
presented analytical results, we can affirm that, the
CFB is a promising burst transmission scheme which
allows to enhance the utilization of the bandwidth
and to achieve QoS differentiation.</p>
        <p>In Figure 4, we compare the overall throughput
of both AC[VO] and AC[VI] obtained with and
without CFB according to the packet length. We
show on this figure that, on one hand, the use of
CFB permits considerably to improve the channel
utilization compared to the case without CFB. On
other hand, with CFB the overall throughput of
AC[VO] and AC[VI] increases considerably with the
increase of packet length. When the CFB is used,
the collision can occur only on the first packet in
burst and the other packets are spared from collision
related losses. This is why the throughput in case of
CFB increases significantly with the increase of the
packet length.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>5. CONCLUSION</title>
      <p>In this paper, we have proposed a simple analytical
model of the IEEE 802.11e-EDCA network taking
into account the CFB. So, we have proposed a
new two dimensional discrete time Markov chain
model. Then, we have developed a mathematical
model to compute the saturation throughput with
CFB of a given AC[h]. The obtained analytical
results have allowed us to estimate the maximum
throughput of the IEEE 802.11e-EDCA network with
CFB. Particularly, the presented analytical results
show how the Contention Free Burst permits to
increase significantly the throughput of video and
voice access categories.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>Banchs A.</given-names>
            and
            <surname>Vollero</surname>
          </string-name>
          <string-name>
            <surname>L.</surname>
          </string-name>
          (
          <year>2006</year>
          )
          <article-title>Throughput Analysis</article-title>
          and
          <source>Optimal Configuration of 802.11e EDCA. Computer Networks</source>
          ,
          <volume>50</volume>
          ,
          <fpage>1749</fpage>
          -
          <lpage>1768</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Bianchi G.</surname>
          </string-name>
          (
          <year>2000</year>
          )
          <article-title>Performance Analysis of the IEEE 802.11 Districuted Coordination Function</article-title>
          .
          <source>IEEE Journal on Selected Areas in Communications</source>
          ,
          <volume>18</volume>
          ,
          <fpage>535</fpage>
          -
          <lpage>547</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>Hu J.</given-names>
            ,
            <surname>Min</surname>
          </string-name>
          <string-name>
            <given-names>G.</given-names>
            and
            <surname>Woodward</surname>
          </string-name>
          <string-name>
            <surname>M. E.</surname>
          </string-name>
          (
          <year>2011</year>
          )
          <article-title>Performance Analysis of the TXOP Burst Transmission Scheme in Single-Hop Ad Hoc Networks with Unbalanced Stations</article-title>
          .
          <source>Computer Communications</source>
          ,
          <volume>34</volume>
          ,
          <fpage>1593</fpage>
          -
          <lpage>1603</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>Hu J.</given-names>
            ,
            <surname>Min</surname>
          </string-name>
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Jia</surname>
          </string-name>
          <string-name>
            <given-names>W.</given-names>
            and
            <surname>Woodward</surname>
          </string-name>
          <string-name>
            <surname>M. E.</surname>
          </string-name>
          (
          <year>2012</year>
          )
          <article-title>Comprehensive QoS Analysis of Enhanced Distributed Channel Access in Wireless Local Area Networks</article-title>
          .
          <source>Information Sciences</source>
          ,
          <volume>214</volume>
          ,
          <fpage>20</fpage>
          -
          <lpage>34</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          <year>802</year>
          .11 Standard
          <string-name>
            <surname>Part</surname>
            <given-names>II</given-names>
          </string-name>
          (
          <year>1999</year>
          )
          <article-title>Wireless LAN Medium Access Control (MAC) and Physical (PHY) Specifications</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          <year>802</year>
          .
          <article-title>11e Standard Part II (</article-title>
          <year>2005</year>
          )
          <article-title>Wireless LAN Medium Access Control (MAC) and Physical (PHY) Specifications</article-title>
          . Amendement 8:
          <string-name>
            <given-names>Medium</given-names>
            <surname>Access</surname>
          </string-name>
          <article-title>Control (MAC) Quality of Service Enhancements</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>Lee Y.</given-names>
            ,
            <surname>Lee</surname>
          </string-name>
          <string-name>
            <given-names>K. S.</given-names>
            and
            <surname>Jang</surname>
          </string-name>
          <string-name>
            <surname>J. M.</surname>
          </string-name>
          (
          <year>2007</year>
          ) Saturation
          <source>Throughput Analysis of IEEE 802.11e EDCA</source>
          . Springer-Verlag, Berlin Heidelberg,
          <fpage>1223</fpage>
          -
          <lpage>1232</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>Min G.</given-names>
            ,
            <surname>Hu</surname>
          </string-name>
          <string-name>
            <given-names>J.</given-names>
            and
            <surname>Woodward</surname>
          </string-name>
          <string-name>
            <surname>M. E.</surname>
          </string-name>
          (
          <year>2011</year>
          )
          <article-title>Modeling and Analysis of TXOP Differentiation in Infrastructure-Based WLANs</article-title>
          .
          <source>Computer Networks</source>
          ,
          <volume>55</volume>
          ,
          <fpage>2545</fpage>
          -
          <lpage>2557</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>Kong Z. N.</given-names>
            ,
            <surname>Tsang</surname>
          </string-name>
          <string-name>
            <given-names>D. H. K.</given-names>
            ,
            <surname>Bensaou</surname>
          </string-name>
          <string-name>
            <given-names>B.</given-names>
            and
            <surname>Gao</surname>
          </string-name>
          <string-name>
            <surname>D.</surname>
          </string-name>
          (
          <year>2004</year>
          )
          <article-title>Performance Analysis of IEEE 802.11e Contention-Based Channel Access</article-title>
          .
          <source>IEEE Journal on Selected Areas in Communications</source>
          ,
          <volume>22</volume>
          (
          <issue>10</issue>
          ),
          <fpage>2095</fpage>
          -
          <lpage>2106</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Kosek-Szott</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Natkaniec</surname>
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Pach</surname>
            <given-names>A. R.</given-names>
          </string-name>
          (
          <year>2011</year>
          )
          <article-title>A Simple but Accurate Throughput Model for IEEE 802.11 EDCA in Saturation and Non-Saturation Conditions</article-title>
          .
          <source>Computer Networks</source>
          ,
          <volume>55</volume>
          :
          <fpage>622</fpage>
          -
          <lpage>635</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <given-names>Serrano P.</given-names>
            ,
            <surname>Banchs</surname>
          </string-name>
          <string-name>
            <given-names>A.</given-names>
            and
            <surname>Azcorra</surname>
          </string-name>
          <string-name>
            <surname>A.</surname>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>A Throughput and Delay Model for IEEE 802.11e EDCA under Non Saturation</article-title>
          .
          <source>Wireless Personal Communications</source>
          ,
          <volume>43</volume>
          ,
          <fpage>467</fpage>
          -
          <lpage>479</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Varposhti</surname>
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Movahhedinia</surname>
            <given-names>N.</given-names>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>Supporting QoS in IEEE 802.11e Wireless LANs over Fading Channel</article-title>
          .
          <source>Computer Communications</source>
          ,
          <volume>32</volume>
          ,
          <fpage>985</fpage>
          -
          <lpage>991</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <given-names>Vassis D.</given-names>
            and
            <surname>Kormentzas</surname>
          </string-name>
          <string-name>
            <surname>G.</surname>
          </string-name>
          (
          <year>2005</year>
          )
          <article-title>Delay Performance Analysis and Evaluation of IEEE 802.11e EDCA in Finite Load Conditions</article-title>
          .
          <source>Wireless Personal Communications</source>
          ,
          <volume>34</volume>
          ,
          <fpage>29</fpage>
          -
          <lpage>43</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>