=Paper=
{{Paper
|id=Vol-1256/paper7
|storemode=property
|title=Analytical Modeling of the IEEE 802.11e EDCA Network
|pdfUrl=https://ceur-ws.org/Vol-1256/paper7.pdf
|volume=Vol-1256
|dblpUrl=https://dblp.org/rec/conf/vecos/MohandNBA14
}}
==Analytical Modeling of the IEEE 802.11e EDCA Network==
69
Analytical Modeling of the IEEE 802.11e
EDCA Network with Contention Free Burst
Mohand Yazid Nassim Sahki Louiza Medjkoune-Bouallouche
LAMOS Laboratory Department of Operations Research LAMOS Laboratory
University of Bejaia University of Bejaia University of Bejaia
06000 Bejaia, Algeria 06000 Bejaia, Algeria 06000 Bejaia, Algeria
yazid.mohand@gmail.Com nass mi@yahoo.fr louiza medjkoune@yahoo.fr
Djamil Aı̈ssani
LAMOS Laboratory
University of Bejaia
06000 Bejaia, Algeria
lamos bejaia@hotmail.com
Contention Free Burst (CFB) is a promising burst transmission scheme defined in the IEEE 802.11e Medium
Access Control (MAC) protocol to achieve differentiated Quality of Service (QoS) and improve the utilization
of the wireless scarce bandwidth. Although modeling and performance analysis of the IEEE 802.11e network
have attracted tremendous research efforts from both the academia and industry, most existing analytical
models do not give attention to the CFB QoS parameter. In this paper, we aim to propose a simple analytical
model of the IEEE 802.11e Enhanced Distributed Channel Access (EDCA) function including mainly the CFB,
in order to study its effect on the improvement of the achievable throughput of Video and Voice Access
Categories (ACs). Therefore, we propose a new two-dimensional Markov chain model of the IEEE 802.11e
EDCA function with CFB. Then, we develop a mathematical model to derive the saturation throughput. Finally,
performance analysis has allowed us to estimate the maximum sustainable throughput with CFB in an IEEE
802.11e-EDCA network under infinite load conditions.
IEEE 802.11e EDCA Function, CFB, Markov Chains, Modeling, Throughput Analysis
1. INTRODUCTION defines the Hybrid Coordination Function (HCF)
access mechanism, which uses two mechanisms
The IEEE 802.11 standard is currently one of for the support of QoS differentiation. They are
the most popular wireless access technologies. It Enhanced Distributed Channel Access (EDCA) and
allows for quick and simple configuration of local, HCF Controlled Channel Access (HCCA) (Lee et al.
broadband networks at home, in offices, or in public (2007)).
places and greatly facilitates Internet access (Kosek-
Szott et al. (2011)). With the increasing demand of The EDCA function defines several QoS enhance-
Wireless Local Area Networks (WLANs), especially ments to the legacy IEEE 802.11 Distributed Coor-
of the IEEE 802.11 (IEEE 802.11 Standard (1999)), dination Function (DCF). EDCA operation is based
the support of differentiated Quality of Service (QoS) on different priority levels through the definition of
has become one of the recent critical challenges Access Categories (ACs). There are four ACs (Voice
for the success of IEEE 802.11 Medium Access – VO, Video – VI, Best Effort – BE, and Background
Control (MAC) protocols for the future wireless – BK), each with a separate queue. To provide traffic
communications. It is important to develop a new differentiation, the following medium access parame-
medium access scheme that can support the ters are defined for each AC: the Contention Window
differentiated QoS requirements over IEEE 802.11 minimum (CWmin ) and maximum (CWmax ) size, the
WLANs, which is specified by the IEEE 802.11e Arbitration Inter-Frame Space Number (AIF SN ),
(IEEE 802.11e Standard (2005)). The IEEE 802.11e and the Contention Free Burst (CFB). The functions
standard specifies differentiated service classes in of the access parameters are as follows: CWmin and
the MAC layer to enable different kind of packet CWmax determine the initial size of the contention
priorities and have drawn tremendous interest window and the maximum possible backoff value,
from both industry and academia. IEEE 802.11e
70
respectively. AIF SN determines the minimum num- of throughput, delay, delay jitter, and frame loss
ber of idle slots before a frame transmission may probability are derived.
begin. The CFB allows consecutive frame transmis-
sions after gaining channel access (Kosek-Szott et In this paper, we propose a simple analytical model
al. (2011)). A comprehensive description of EDCA of the IEEE 802.11e EDCA function with Contention
function can be found in (IEEE 802.11e Standard Free Burst. Therefore, we use a two-dimensional
(2005)). Markov chain to model the behavior of a single
access category. Then, we develop a mathematical
After the new EDCA function was defined, the model to derive the saturation throughput of a given
previously proposed analytical models of the IEEE access category.
802.11 DCF became unsatisfactory because they
lacked traffic differentiation. However, they were The remainder of this paper is organized as
a solid starting point for further research. Most following: an overview of the CFB scheme is given
of all, they resolved the complicated problem in section 2. In section 3, we describe the proposed
of representing multiple states of the channel analytical model of the IEEE 802.11e ECDA function
access procedure by using Markov chains (Kosek- with CFB. The obtained analytical results about the
Szott et al. (2011)). In this area, Kong et al. sustainable overall throughput in an IEEE 802.11e-
(2004) presented an analytical model of the IEEE EDCA network, are presented in section 4. In section
802.11e EDCA taking into account AIFS and CW. 5, we conclude the paper.
The authors analyzed the throughput performance
of differentiated service traffic and proposed a
2. OVERVIEW OF THE CFB SCHEME
recursive method enable to provide the mean access
delay. Vassis and Kormentzas (2005) presented In DCF, the system efficiency is considerably
an analytical model for the performance evaluation affected by various overheads referred to as Physical
of IEEE 802.11e EDCA scheme under finite load (PHY) layer headers, control frames, backoff, and
conditions on the basis of various instances of delay inter-frame space. The overhead problem becomes
metric (access delay, queuing delay and total delay). more serious as the data rate increases. To mitigate
Banchs and Vollero (2006) presented an analytical the impact of the overheads and improve the system
model to analyze the throughput performance of efficiency, the TXOP scheme has been proposed in
an EDCA WLAN as a function of its parameters the IEEE 802.11e protocol (Min et al. (2011)).
(AIF S, CWmin , CWmax and TXOPLimit). The
authors searched for the optimal EDCA configuration SIFS SIFS SIFS
which maximizes the throughput performance of the DATA DATA DATA CW
WLAN. Serrano et al. (2007) presented a model ACK ACK ACK
to analyze the throughput and delay performance SIFS SIFS AIFS
of the EDCA mechanism under non-saturation CFB
conditions. The proposed model can be used to
Figure 1: Contention Free Burst scheme.
analyze generic source models, as it neither makes
any assumption on the source’s arrival process
nor requires all packets be of the same length. Different from DCF where a station can transmit
Varposhti and Movahhedinia (2009) analyzed the only one frame after winning the channel, the
effect of loss and delay caused by fading channel TXOP scheme allows a station gaining the
on EDCA performance. Then, they proposed a channel to transmit the frames available in its
modification to the media access scheme, called buffer successively provided that the duration of
Collision Avoidance with Fading Detection (CAFD) transmission does not exceed a certain threshold,
to enhance performance in wireless environments namely the CFB. As shown in Figure 1, each
subject to failure. Hu et al. (2011) proposed an frame is acknowledged by an ACKnowledgement
analytical model for the TXOP service differentiation (ACK) after a Short Inter-Frame Space (SIFS) upon
scheme in single-hop ad hoc networks in the receiving this ACK. If the transmission of any
presence of unbalanced stations with different traffic frame fails, the burst is terminated and the station
loads. The QoS metrics including throughput, end- contends again for the channel to retransmit the
to-end delay, frame dropping probability, and energy failed frame. The TXOP scheme is an efficient
consumption are derived. Hu et al. (2012) proposed way to improve the channel utilization because the
an analytical model to accommodate the integration contention overhead is shared among all the frames
of the three QoS schemes including AIFS, CW and transmitted in a burst. Moreover, it enables service
TXOPLimit in an IEEE 802.11e-EDCA network with differentiation between multiple traffic classes by
finite buffer capacity under unsaturated traffic loads. virtue of various CFBs. Another advantage of using
The important QoS performance metrics in terms the TXOP scheme is that the channel occupation
time in multi-rate WLANs can be fairly distributed by
71
allocating the larger CFB to faster stations. The slow the packets available in its queue consecu-
stations, therefore, no longer severely degrade the tively, provided that the duration of transmis-
performance of those with the higher rate (Min et al. sion does not exceeds the specific CFB.
(2011)).
2. We assume a fixed number of wireless
stations, where each access category h always
3. MODELING 802.11E EDCA WITH CFB having a packet available for transmission.
In other words, we operate in saturation
In this section, we describe a new two-dimensional conditions.
discrete time Markov chain model for the IEEE
802.11e EDCA function including the CFB. The 3. The collision probability of a packet of
resolution of stationary probabilities equations of any access category h is constant and is
this Markov chain model allows us to compute the independent of the number of retransmissions.
packet transmission probability τ [h] of each access
category h (AC[h]), where h ∈ {V O, V I, BE, BK}. 3.2. Packet Transmission Probability
This probability will be used to develop a mathe-
We study the behavior of a single access category
matical model to derive the overall throughput of a
h with a Markov chain model, and we obtain the
given access category h in an IEEE 802.11e-EDCA
stationary probability τ [h] that the AC[h] transmits a
network.
packet in a generic slot time. This probability will be
3.1. Assumptions of 802.11e ECDA Analytical used to determine the saturation throughput of the
Model IEEE 802.11e-EDCA network.
1/W0 [h]
The following is a list of assumptions of our
analytical model for the IEEE 802.11e EDCA 0, - TL[h]+1 ... 0, -1 0, 0 0, 1 .... 0, W0 [h]- 1
function. Table 1 (resp. Table 2) includes Parameters 1 1 1-P[h] 1 1
(resp. Probabilities) of the 802.11e analytical model. P[h]
1/W1 [h]
Table 1: Parameters of the 802.11e analytical model.
1, - TL[h]+1 ... 1, -1 1, 0 1, 1 .... 1, W1 [h]- 1
1 1 1-P[h] 1 1
Parameter Description
P[h]
n Number of stations in the network. 1/W2 [h]
m[h] Maximum backoff stage of the AC[h].
W0 [h] Minimum contention window of the AC[h].
Wm [h] Maximum contention window of the AC[h].
Wi [h] Contention window size of the AC[h] at
ith transmission attempt. i, - TL[h]+1 ... i, -1 i, 0
1
i, 1 ....
1
i, Wi [h]- 1
1 1 1-P[h]
T L[h] Maximum number of packets can be
P[h]
transmitted in burst during the 1/Wi+1 [h]
CF B[h] of the AC[h].
P Packet payload length.
TP Time of a packet payload transmission.
TM AC Time of a MAC layer header transmission.
TP HY Time of a PHY layer header transmission. m[h],-TL[h]+1 ... m[h], -1 m[h], 0 m[h], 1 .... m[h],Wm[h]- 1
1 1 1-P[h] 1 1
ACK Time of an acknowledgment transmission.
AIF S[h] Time interval of AIFS of the AC[h]. P[h]
1/Wm [h]
SIF S Time interval of SIFS.
δ Time of a signal propagation. Figure 2: Markov chain model of an access category h
σ An empty slot time. running the 802.11e EDCA function.
Table 2: Probabilities of the 802.11e analytical model. Let S[h] (t) be the stochastic process representing the
backoff stage i (i = 0, 1, . . . , m[h]) of the AC[h] at the
Probability Definition
time t.
τ Packet transmission probability
of a wireless station.
Let B[h] (t) be the stochastic process representing ei-
τ [h] Packet transmission probability of a AC[h].
P [h] Packet collision probability of a AC[h]. ther the backoff time counter j (j = 0, 1, . . . , Wi [h]) or
the k th transmitted packet (k = 0, −1, . . . , −T L[h]+1)
during the CF B[h] for a given AC[h].
1. All packets are of the same length. Each sta-
tion that gains the channel access transmits For a given AC[h], the Wi [h] and the T L[h] are given
by the Equations 1 and 2, respectively.
72
Wi [h] = 2i · W0 [h]. (1)
∑ ∑
m[h] Wi [h]−1
∑ ∑
m[h] T L[h]−1
1 = πi,k + πi,−k ,
i=0 k=0 i=0 k=1
[ ]
λ1 + λ2
= π0,0 · + (T L[h] − 1) . (5)
CF B[h] λ3
T L[h] = .
TP HY + TM AC + TP + 2 × SIF S + ACK + 2δ
(2)
Where,
•λ1 = (W0 [h] + 1) · (1
[ − 2P [h]). ]
Once the key approximation in Bianchi’s Markov m[h]
chain model (Bianchi (2000)) is assumed (which •λ2 = P [h] · W0 [h] · 1 − (2P [h]) .
means that, at each transmission attempt, and •λ3 = 2 · (1 − 2P [h]) · (1 − P [h]).
regardless of the number of retransmissions
suffered, each packet collides with constant and Hence, we have:
independent probability P [h]) it is possible to model
the bi-dimensional process {S[h] (t), B[h] (t)} with the λ3
discrete-time Markov chain depicted in Figure 2. π0,0 = . (6)
λ1 + λ2 + λ3 · (T L[h] − 1)
In this Markov chain, the only non null one-step
transition probabilities are: We can now express the probability τ [h] that an
AC[h] transmits in a random chosen slot time. It is
the sum of all the steady-state probabilities of states
P {i, k/i, k + 1} = 1, i ∈ (0, m[h]), k ∈ (−T L[h] + 1, −2). πi,k , i = 0, 1, · · · m[h], and k = 0, −1, · · · − T L[h] + 1.
P {i, k/i, k + 1} = 1, i ∈ (0, m[h]), k ∈ (0, Wi [h] − 2). In these states, an AC[h] attempts to transmit its
packets. Thus:
P {i, −1/i, 0} = 1 − P [h], i ∈ (0, m[h]).
1
P {0, k/i, −T L[h] + 1} = , i ∈ (0, m[h]), k ∈ (0, W0 [h] − 1).
W0 [h]
P [h]
P {i, k/i − 1, 0} = , i ∈ (1, m[h]), k ∈ (0, Wi [h] − 1). (3a) ∑ ∑
m[h] T L[h]−1
∑
m[h]
W i [h] τ [h] = πi,−k + πi,0 ,
P [h] i=0 k=1 i=0
P {m[h], k/m[h], 0} = , k ∈ (0, Wm [h] − 1).
Wm [h] T L[h] · (1 − P [h]) + P [h]
= · π0,0 ,
1 − P [h]
Let πi,k = limt→∞ P {S[h] (t) = i, B[h] (t) = k}, i ∈ λ4
= . (7)
(0, m[h]), k ∈ (−T L[h]+1, Wi [h]−1) be the stationary λ1 + λ2 + λ3 · (T L[h] − 1)
distribution of the chain. The closed-form solution for
this Markov chain is: Where,
•λ4 = 2 · (1 − 2P [h]) · (T L[h] · (1 − P [h]) + P [h])
i
α · γ · π0,0 , i ∈ (0, m[h] − 1), k ∈ (0, Wi [h] − 1); From the viewpoint of a wireless station, the
θ · γ · π0,0 , i = m[h], k ∈ (0, Wi [h] − 1); probability τ that the wireless station accesses the
πi,k =
αi · β · π0,0 , i ∈ (0, m[h] − 1), k ∈ (−1, −T L[h] + 1); channel is given by the Equation 8, where the access
categories VO, VI, BE and BK are represented by the
θ · β · π0,0 , i = m[h], k ∈ (−1, −T L[h] + 1).
(4) priorities 3, 2, 1 and 0, respectively.
∏
3
Where, τ =1− (1 − τ [h]) (8)
•α = P [h]. h=0
•β = 1 − P [h].
•γ = WWi [h]−k
i [h]
. The probability P [h] that a transmitted packet of a
[h]m[h] given AC[h] encounters a collision, is the probability
•θ = P1−P [h] .
that, in a time slot, at least one of n − 1 remaining
Thus, by the relation (4), all the values πi,k are wireless stations transmits, or at least one of AC[i]
expressed as a function of the value π0,0 and packet (i > h) of the same wireless station transmits. i > h
collision probability P [h]. π0,0 is finally determined means that, AC[i] has higher priority than AC[h].
by imposing the normalization condition, that can be Hence, we have:
simplified as follows:
73
∏
P [h] = 1 − (1 − τ )n−1 · (1 − τ [i]). (9) EI [h] = Ps [h] · P · T L[h]. (15)
i>h
The average length of a slot time E[σ], is obtained
Equations 7, 8 and 9 form a set of nonlinear by considering that:
equations. It can be solved by means of numerical • With the probability (1−Ptr ), the slot time is empty;
methods. All the transition probabilities and steady- ∑3
state probabilities can be obtained. • With the probability Ptr (1 − Ps [h]), the slot time
h=0
contains a collision;
3.3. Saturation Throughput (T H[h]) ∑
3
• With the probability Ptr Ps [h], the slot time
We study the events that can occur within a generic h=0
slot time, and we express the saturation throughput contains T L[h] packets successfully transmitted.
of a given AC[h] in an IEEE 802.11e-EDCA network,
as a function of the computed value τ [h]. ( )
∑
3
We express the elementary parameters of T H[h]: E[σ] =(1 − Ptr ) · σ + Ptr 1− Ps [h] · T c+
h=0
• Let Ptr be the probability that there is at least a ( 3 )
∑
transmission in the considered slot time: Ptr Ps [h] · Ts [h]. (16)
h=0
Ptr = 1 − (1 − τ )n . (10)
Now, we are able to express the saturation
throughput (T H[h]) of a given AC[h], as the
• Let Ps [h] be the probability that the AC[h] gets ratio of the average amount of useful information
the channel access. It is given by the probability that successfully transmitted EI [h] to the average length
exactly one AC[h] transmits on the channel: of a slot time E[σ]:
EI [h]
∏
3
T H[h] = . (17)
Ps [h] = nτ [h](1 − τ [h])n−1 · (1 − τ [i])n . (11) E[σ]
i=0,i̸=h
4. SATURATION THROUGHPUT ANALYSIS
• Let Tc be the time that the channel is sensed busy
by a collided transmission of the first packet of any In this section, we present and analyze the obtained
AC[h]: analytical results about the overall throughput of
the IEEE 802.11e-EDCA network. These results
are obtained after solving and programming the
analytical model described in section 3 under Matlab
Tc = min{AIF S[h]} + TM AC + TP HY + TP + δ (12) software. The numerical values of parameters used
to get the below figures, are listed in Tables 3 and 4.
Where,
The throughput analysis of the IEEE 802.11e-EDCA
network provided in this section, is done with
AIF S[h] = AIF SN [h] × σ + SIF S. (13) different BER values, packet lengths and network
sizes, in cases of aggregated and non-aggregated
packets. This analysis is original and leads to new
• Let Ts [h] be the time that the channel is sensed
conclusions that could not be intrusively expected.
busy by a successful transmission of all the packets
of the AC[h]: In Figure 3, we compare the overall throughput of
AC[VO] and AC[VI] obtained with and without CFB
according to the number of stations in the network.
Ts [h] =AIF S[h] + T L[h] · [TM AC + TP HY + TP + We observe that, the overall throughput of both
AC[VO] and AC[VI] is decreasing with the increase
2SIF S + 2δ + ACK] − SIF S. (14)
of the network size. This due to the number of
collisions which increases with the increase of the
We define EI [h], as the average amount of useful number of stations in the network. We note on Figure
information successfully transmitted by the AC[h] in 3 that, the use of CFB allows significant channel
a slot time. It is given as follows: utilization improvement of both AC[VO] and AC[VI].
74
Table 3: 802.11b PHY and MAC parameters.
Parameter Numerical value
δ 1 µs
σ 20 µs
SIF S 10 µs
Basic rate (PHY header) 1 Mbits/s
Basic rate (MAC header) 2 Mbits/s
Data rate 11 Mbits/s
PHY header length 192 bits
MAC header length 34 bytes
ACK length 14 bytes
Maximum payload length 2304 bytes Figure 4: Overall throughput variation according to the
packet length.
Table 4: 802.11e-EDCA default parameters.
AC[h] m AIFSN W0 Wm CFB In Figure 5, we analyze the overall throughput of
AC[BK] 5 7 32 1024 0 AC[VO] and AC[VI] according to the number of
AC[BE] 5 3 32 1024 0 MPDUs in cases of middle and maximum packet
AC[VI] 1 2 16 32 6016 s length (1500 bytes and 2312 bytes, respectively).
AC[VO] 1 2 8 16 3264 s We show clearly that, the overall throughput of both
AC[VO] and AC[VI] increases with the increase of the
number of MPDUs allowed to be transmitted during a
We also note that, when CFB is used, the overall CFB. We also note that, increasing the packet length
throughput obtained with AC[VI] is greater than the allows to increase the efficiency of CFB. Through the
one obtained with AC[VO]. This is due to the number presented analytical results, we can affirm that, the
of consecutive MPDUs sent by the AC[VI] which is CFB is a promising burst transmission scheme which
greater than the one sent by the AC[VO]. allows to enhance the utilization of the bandwidth
and to achieve QoS differentiation.
Figure 3: Overall throughput variation according to the
network size. Figure 5: Overall throughput variation according to the
CFB.
In Figure 4, we compare the overall throughput
of both AC[VO] and AC[VI] obtained with and
without CFB according to the packet length. We 5. CONCLUSION
show on this figure that, on one hand, the use of
CFB permits considerably to improve the channel In this paper, we have proposed a simple analytical
utilization compared to the case without CFB. On model of the IEEE 802.11e-EDCA network taking
other hand, with CFB the overall throughput of into account the CFB. So, we have proposed a
AC[VO] and AC[VI] increases considerably with the new two dimensional discrete time Markov chain
increase of packet length. When the CFB is used, model. Then, we have developed a mathematical
the collision can occur only on the first packet in model to compute the saturation throughput with
burst and the other packets are spared from collision CFB of a given AC[h]. The obtained analytical
related losses. This is why the throughput in case of results have allowed us to estimate the maximum
CFB increases significantly with the increase of the throughput of the IEEE 802.11e-EDCA network with
packet length. CFB. Particularly, the presented analytical results
show how the Contention Free Burst permits to
75
increase significantly the throughput of video and Varposhti M. and Movahhedinia N. (2009) Support-
voice access categories. ing QoS in IEEE 802.11e Wireless LANs over
Fading Channel. Computer Communications, 32,
985–991.
REFERENCES
Vassis D. and Kormentzas G. (2005) Delay
Banchs A. and Vollero L. (2006) Throughput Analysis Performance Analysis and Evaluation of IEEE
and Optimal Configuration of 802.11e EDCA. 802.11e EDCA in Finite Load Conditions. Wireless
Computer Networks, 50, 1749–1768. Personal Communications, 34, 29–43.
Bianchi G. (2000) Performance Analysis of the IEEE
802.11 Districuted Coordination Function. IEEE
Journal on Selected Areas in Communications,
18, 535–547.
Hu J., Min G. and Woodward M. E. (2011) Perfor-
mance Analysis of the TXOP Burst Transmission
Scheme in Single-Hop Ad Hoc Networks with
Unbalanced Stations. Computer Communications,
34, 1593–1603.
Hu J., Min G., Jia W. and Woodward M. E.
(2012) Comprehensive QoS Analysis of Enhanced
Distributed Channel Access in Wireless Local
Area Networks. Information Sciences, 214, 20–34.
IEEE 802.11 Standard Part II (1999) Wireless
LAN Medium Access Control (MAC) and Physical
(PHY) Specifications.
IEEE 802.11e Standard Part II (2005) Wireless
LAN Medium Access Control (MAC) and Physi-
cal (PHY) Specifications. Amendement 8: Medium
Access Control (MAC) Quality of Service En-
hancements.
Lee Y., Lee K. S. and Jang J. M. (2007) Saturation
Throughput Analysis of IEEE 802.11e EDCA.
Springer-Verlag, Berlin Heidelberg, 1223–1232.
Min G., Hu J. and Woodward M. E. (2011)
Modeling and Analysis of TXOP Differentiation
in Infrastructure-Based WLANs. Computer Net-
works, 55, 2545–2557.
Kong Z. N., Tsang D. H. K., Bensaou B. and Gao
D. (2004) Performance Analysis of IEEE 802.11e
Contention-Based Channel Access. IEEE Journal
on Selected Areas in Communications, 22(10),
2095–2106.
Kosek-Szott K., Natkaniec M. and Pach A. R. (2011)
A Simple but Accurate Throughput Model for IEEE
802.11 EDCA in Saturation and Non-Saturation
Conditions. Computer Networks, 55:622–635.
Serrano P., Banchs A. and Azcorra A. (2007) A
Throughput and Delay Model for IEEE 802.11e
EDCA under Non Saturation. Wireless Personal
Communications, 43, 467–479.