Topic
IEEE 802.11e-2005
About: IEEE 802.11e-2005 is a research topic. Over the lifetime, 3260 publications have been published within this topic receiving 83018 citations. The topic is also known as: 802.11e-2005 & UAPSD.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: The performance investigation reveals that an IEEE 802.11 network may be able to carry traffic with time-bounded requirements using the point coordination function, however, the findings suggest that packetized voice traffic must be handled in conjunction with an echo canceler.
Abstract: The draft IEEE 802.11 wireless local area network (WLAN) specification is approaching completion. In this article, the IEEE 802.11 protocol is explained, with particular emphasis on the medium access control sublayer. Performance results are provided for packetized data and a combination of packetized data and voice over the WLAN. Our performance investigation reveals that an IEEE 802.11 network may be able to carry traffic with time-bounded requirements using the point coordination function. However, our findings suggest that packetized voice traffic must be handled in conjunction with an echo canceler.
1,080 citations
••
TL;DR: The technical medium access control and physical layer features of the IEEE standard 802.16, with its WirelessMAN/sup TM/ air interface, sets the stage for widespread and effective deployments worldwide.
Abstract: The broadband wireless access industry, which provides high-rate network connections to stationary sites, has matured to the point at which it now has a standard for second-generation wireless metropolitan area networks. The IEEE standard 802.16, with its WirelessMAN/sup TM/ air interface, sets the stage for widespread and effective deployments worldwide. This article overviews the technical medium access control and physical layer features of this new standard.
983 citations
••
07 Nov 2002
TL;DR: This paper proposes a scheme named DCF+, which is compatible with DCF, to enhance the performance of reliable transport protocol over WLAN and introduces an analytical model to compute the saturated throughput of WLAN.
Abstract: IEEE 802.11 medium access control (MAC) is proposed to support asynchronous and time bounded delivery of radio data packets in infrastructure and ad hoc networks. The basis of the IEEE 802.11 WLAN MAC protocol is a distributed coordination function (DCF), which is a carrier sense multiple access with collision avoidance (CSMA/CA) with a binary slotted exponential back-off scheme. Since IEEE 802.11 MAC has its own characteristics that are different from other wireless MAC protocols, the performance of reliable transport protocol over 802.11 needs further study. This paper proposes a scheme named DCF+, which is compatible with DCF, to enhance the performance of reliable transport protocol over WLAN. To analyze the performance of DCF and DCF+, this paper also introduces an analytical model to compute the saturated throughput of WLAN. Compared with other models, this model is shown to be able to predict the behavior of 802.11 more accurately. Moreover, DCF+ is able to improve the performance of TCP over WLAN, which is verified by modeling and elaborate simulation results.
864 citations
••
22 Apr 2001TL;DR: This work presents three service differentiation schemes for IEEE 802.11 based on scaling the contention window according to the priority of each flow or user, and simulates and analyzes the performance of each scheme with TCP and UDP flows.
Abstract: The IETF is currently working on service differentiation in the Internet. However, in wireless environments where bandwidth is scarce and channel conditions are variable, IP differentiated services are sub-optimal without lower layers' support. We present three service differentiation schemes for IEEE 802.11. The first one is based on scaling the contention window according to the priority of each flow or user. The second one assigns different inter-frame spacings to different users. Finally, the last one uses different maximum frame lengths for different users. We simulate and analyze the performance of each scheme with TCP and UDP flows.
629 citations
01 Jan 1999
628 citations