2003
DOI: 10.1109/mwc.2003.1265851
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of IEEE 802.11e for QoS support in wireless LANs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

3
173
0
6

Year Published

2005
2005
2015
2015

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 366 publications
(182 citation statements)
references
References 2 publications
3
173
0
6
Order By: Relevance
“…Our experimental results confirm earlier analytical and simulation-based findings that the AIFSN parameter more effectively protects voice calls against background data traffic than the CWmin [15] [16][17] [18]. The AIFSN differentiation is a superior mechanism to CWmin differentiation because of the existence of discrete instants of times (protected slots represented by the AIFSN difference) where a lower number of stations may compete and access the channel.…”
Section: Discussionsupporting
confidence: 84%
“…Our experimental results confirm earlier analytical and simulation-based findings that the AIFSN parameter more effectively protects voice calls against background data traffic than the CWmin [15] [16][17] [18]. The AIFSN differentiation is a superior mechanism to CWmin differentiation because of the existence of discrete instants of times (protected slots represented by the AIFSN difference) where a lower number of stations may compete and access the channel.…”
Section: Discussionsupporting
confidence: 84%
“…Ongoing work is investigating the use of priority mechanisms supported by standards such as IEEE 802.11e [14], to control the sharing of the handover gains among the involved access points; such control can also increase the number of beneficial scenarios. We plan to study the details of the implementation of the proposed procedure.…”
Section: Discussionmentioning
confidence: 99%
“…The duration used for receiving the segments is activated during the first try. If the time limit is exceeded, the remain fragments that are not received will also be eliminated (Mangold et al, 2003).…”
Section: Fragmentation Methodsmentioning
confidence: 99%