Advanced
Pareto Optimized EDCA Parameter Control for Wireless Local Area Networks
Pareto Optimized EDCA Parameter Control for Wireless Local Area Networks
KSII Transactions on Internet and Information Systems (TIIS). 2014. Oct, 8(10): 3458-3474
Copyright © 2014, Korean Society For Internet Information
  • Received : May 08, 2014
  • Accepted : October 02, 2014
  • Published : October 28, 2014
Download
PDF
e-PUB
PubReader
PPT
Export by style
Share
Article
Author
Metrics
Cited by
TagCloud
About the Authors
Minseok Kim
School of Electrical & Electronic Engineering, Yonsei University, Seoul, Republic of Korea
Wui Hwan Oh
School of Electrical & Electronic Engineering, Yonsei University, Seoul, Republic of Korea
Jong-Moon Chung
School of Electrical & Electronic Engineering, Yonsei University, Seoul, Republic of Korea
Bong Gyou Lee
Graduate School of Information, Yonsei University, Seoul, Republic of Korea
Myunghwan Seo
Samsung Thales Co., LTD., Seongnam-si, Gyeonggi-do, Republic of Korea
Jung-sik Kim
Samsung Thales Co., LTD., Seongnam-si, Gyeonggi-do, Republic of Korea
Hyung-Weon Cho
Samsung Thales Co., LTD., Seongnam-si, Gyeonggi-do, Republic of Korea

Abstract
The performance of IEEE 802.11e enhanced distributed channel access (EDCA) is influenced by several interactive parameters that make quality of service (QoS) control complex and difficult. In EDCA, the most critical performance influencing parameters are the arbitration interframe space (AIFS) and contention window size (CW) of each access category (AC). The objective of this paper is to provide a scheme for parameter control such that the throughput per station as well as the overall system throughput of the network is maximized and controllable. For this purpose, a simple and accurate analytical model describing the throughput behavior of EDCA networks is presented in this paper. Based on this model, the paper further provides a scheme in which a Pareto optimal system configuration is obtained via an appropriate CW control for a given AIFS value, which is a different approach compared to relevant papers in the literature that deal with CW control only. The simulation results confirm the effectiveness of the proposed method which shows significant performance improvements compared to other existing algorithms.
Keywords
1. Introduction
W ireless local area networks (WLANs) are extensively deployed at various locations serving a wide variety of services and applications. The IEEE 802.11e standard provides enhancements in supporting service differentiations and Quality of Service (QoS) for WLANS [1] . The core scheme for service differentiation in IEEE 802.11e is the enhanced distributed channel access (EDCA). EDCA introduces four kinds of access categories (ACs) in which service differentiation is accomplished by applying different QoS parameters to each AC. These parameters include the contention window (CW) size and arbitration interframe space (AIFS) of each AC. ACs with higher priority are assigned smaller CW and AIFS values to result in a higher probability of channel access. However, the default parameter recommendations in [1] do not enable an optimal performance. In addition, there is no QoS provisioning mechanism that can be used as a reference to control the throughput of the individual ACs while maximizing the overall throughput of the WLAN.
Considering EDCA parameter control, a closed form solution for CW control to achieve weighted max-min fairness is proposed in [2] . The proposed scheme of [2] does not provide user controllability to allocate resources per AC. Similarly, [3] proposed CW adaptation methods based on the estimated network conditions, while [4] extended this model to consider delay requirements. On the other hand, user controllability on a throughput ratio allocated to each AC is provided in [5 - 6] , but these papers do not consider maximization of system throughput simultaneously. These two issues are jointly considered in [7] .
All of the relevant papers mentioned above deal with CW control only, and assume all of the stations operate with the same AIFS values. A reason for this is because of its simplicity and in [2] , it is proven that for a single-hop network, the best average performance (in terms of overall system throughput) is obtained when all AIFSs are set the same. However, AIFS is a critical performance influencing parameter as shown in [8 - 12] and neighboring devices using EDCA commonly do not coordinate all ACs to have the same AIFSs among different devices. Therefore, naturally, devices with different AIFS settings will exist in the same region. In addition, for multi-hop networks, there exists a severe starvation problem even for very simple network topologies [13] . In these cases, not only the CW but the AIFS can be very useful in enhancing and controlling the performance of a network.
From the above-mentioned observations, in this paper, we focus on a mechanism that provides an optimal system performance while maintaining the desired ratio of throughput allocated to each AC, and thus, to enable user controllability. For this purpose, a simple and accurate analytical model describing the throughput behavior of EDCA networks is presented, and based on this a scheme that provides Pareto optimal system configuration is introduced, in which the CW of each station is appropriately adjusted for a given AIFS. The throughput performance of a station is in conflict of interest with the other stations, and therefore, a slight change in system parameters of one station to enhance its performance will eventually result in degradations on the performance of the other stations. Due to these parameters being highly interactive and correlated, multi-objective Pareto optimization is applied. In addition, the proposed scheme enables user controllability of the essential QoS parameters.
The remainder of the paper is organized as follows. Section II describes the saturation throughput model and also presents the problem statement that will be optimized. Section III introduces the proposed QoS provisioning algorithm, followed by the simulation results in section IV and the conclusion in section V.
2. System Model
Several models have been proposed for performance evaluation of EDCA networks [2] , [5 - 6] , [9 - 12] . Based on the Markov chain ( M 1 ) modeling of the behavior of EDCA backoff procedures, the conditional collision probability ( pi ) and the probability that a station of AC[ i ] transmits ( τi ) are computed and used to obtain the throughput performance. To compute the conditional collision probability pi , most of the relevant works rely on a zone-based approach which require an additional Markov chain ( M 2 ) [10 - 12] . In this model, the total influences that a station experiences in a specific contention zone are computed. The overall collision probability is averaged after computing all of the zone-specific probabilities. As a result, the complexity of the model increases significantly when there are multiple ACs and multiple contention-zones (almost impossible to be expressed in closed-forms). For this reason, the models in [10 - 12] can capture only two ACs with the same number of stations per AC.
Considering the above observations, the model introduced in this paper does not rely on contention-zones. Instead, the influences of various AIFS differences are incorporated in the Markov chain M 1 and does not require M 2 , which reduces the complexity of the model significantly (any number of ACs can be supported with a different number of stations per AC). In addition, a unified view of channel states is incorporated instead of the individual zone-specific view of channel states. A comparison between the previous models and the model introduced in this paper is depicted in Fig. 1 .
PPT Slide
Lager Image
Comparison between models.
The following assumptions and notations are used to set up the model. First, the saturation condition is assumed, meaning that each station always have packets to transmit. Secondly, any station that occupies the channel will transmit within a fixed size duration. These assumptions are widely adopted by most of the relevant papers in the literature [2 - 14] . It is assumed that there are M number of ACs in the network and Xi is the set of all stations that belongs to AC[ i ]. The number of stations in AC[ i ] is denoted as Ni (i.e., Ni = | Xi |). In addition, the set of all stations in the network is denoted as X and the total number of stations in the network is denoted as N (i.e., N = | X |). The AIFS of station i is denoted as AIFS i = DIFS + αiσ , where σ is the slot-time and αi represents the number of additional slot-times that station i should differ. The notation Wl,i represents the contention window size at the l -th backoff stage of station i and R is the maximum retry limit.
- 2.1 The Markov Chain Model
The Markov chain M 1 used in this paper is shown in Fig. 2 . The states in M 1 are defined as { s ( t ), b ( t ), a ( t )}, where s ( t ) represents the backoff stage that is processed according to the binary exponential rules, while b ( t ) is the stochastic process representing the backoff counter decremented at the end of every idle time-slot. If the channel is idle, then a station decrements its backoff counter (i.e., b ( t )) by 1. When the backoff counter reaches zero, a station transmits. If the transmission encounters a collision with probability pi , the backoff process proceeds to the next backoff stage (i.e., increased s ( t )). In addition, a ( t ) is introduced to model the influences of AIFS differences. In Fig. 2 , the states with αi ≠ 0 are introduced to model the awaiting counter based on the AIFS value of AC[ i ] (or equivalently, station i ). Different ACs (stations) can have different values of αi , and thus, corresponds to the additional awaiting time-slots before the actual backoff countdown takes place. When αi = 0, the Markov chain M 1 reduces to the seminal model presented in [14] .
PPT Slide
Lager Image
Markov chain model for the backoff procedures (M1).
The steady-state probability of M 1 in Fig. 2 is b l,m,n = lim t→∞ Pr { s ( t ) = l , b ( t ) = m , a ( t ) = n }, l ∈[0, R ], m ∈[0, W l,i -1], and n ∈[0, αi ]. The channel busy probability seen by any station in the network is denoted as Pb and can be obtained as follows.
PPT Slide
Lager Image
As mentioned earlier, the model relies on the unified view of the channel over all stations in the network, compared to other models in [2 - 14] , where the channel states (busy or idle) seen by each station (AC) are individually computed. This approach, along with the Markov chain M 1 in Fig. 2 where the AIFS countdowns are incorporated, significantly simplifies the analysis.
To compute the probability that station i will attempt to transmit ( τi ), the relationships between transmission stages, backoff states, and AIFS awaiting states can be represented as follows. From the Markov M 1 in Fig. 2 , the following relations are obvious.
PPT Slide
Lager Image
PPT Slide
Lager Image
Considering the situation where l = 0, αi = 0, and l = 0, αi = 1, the following relations can be easily derived based on the balance conditions of the Markov chain M 1 .
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
Inserting (7) into (4) and (5), the probabilities of states with l = 0, m ∈[1, W l,i -1], and n = 0 can be expressed as in (8). The probability of states with other l values (i.e., when 0< l < R , and when l = R ) can be obtained by a similar approach, and are shown in (9) and (10), respectively.
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
Using relations (2) and (3), the overall probabilities of state with l ∈[0, R ], m ∈[1, W l,i -1], and n = 0 can be generalized as in (11) below. Therefore, based on (2), (3), and (11), the probability of states with a shaded circle in Fig. 2 are now expressed in terms of b l,0,0 .
PPT Slide
Lager Image
For the states with l ∈[0, R ], m = 0, and n = [1, αi ], b l,0,n = (1- Pb ) α-n · b l,0,α for n ∈ [1, αi ]. Using the rules of geometric series, the following can be obtained.
PPT Slide
Lager Image
Using (12), the probability of states with l ∈[0, R ], m = 0, and n = [1, αi ] (dashed circles in Fig. 2 ) can be derived as in (13).
PPT Slide
Lager Image
In a similar way, the probability of states with l ∈[0, R ], m ∈[1, W l,i -1], and n = [1, αi ] (white circles in Fig. 2 ) can be obtained as follows.
PPT Slide
Lager Image
Based on (2), (3), (11), (13), and (14) being expressed as a function of b l,0,0 (i.e., b 0,0,0 since b l,0,0 = p l b 0,0,0 for 0 < l < R and b R,0,0 = p R b 0,0,0 /(1- p )), the steady-state probability of all states in the Markov chain M 1 are established. Applying the normalization condition, the following expression for b 0,0,0 can be obtained.
PPT Slide
Lager Image
Since a transmission occurs when the backoff counter reaches zero, the transmission probability of station i ( τi ) can be obtained as in (16), based on (15). Therefore, the throughput of EDCA stations can be expressed as a system of N nonlinear equations on the τi ’s, which can be solved by using numerical techniques together with (17).
PPT Slide
Lager Image
PPT Slide
Lager Image
- 2.2 Throughput Expressions
The normalized throughput can be defined as the amount of average information transmitted during the transmission period. Based on this definition, the normalized throughput of station i can be expressed as follows.
PPT Slide
Lager Image
In (18), Di is the average frame payload size of station i and σ is the slot-time. Ps ( i ) is the probability of successful transmission of station i and Ps is the overall successful transmission probability (i.e., probability that a randomly chosen slot-time contains a successful transmission). In addition, Pe and Pc is the probability that a slot-time is empty (i.e., idle) and the probability that a slot-time contains a collision, respectively. The expressions for Ps ( i ), Ps , Pc , and Pe are shown below.
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
The corresponding successful transmission and collision time of station i (i.e., Ts ( i ) and Tc ( i )) are shown below for the basic access mode,
PPT Slide
Lager Image
PPT Slide
Lager Image
where T PLCP is the PLCP (Physical Layer Convergence Protocol) header duration, H is the MAC header size, and δ is the propagation delay. For the case of request-to-send/clear-to-send (RTS/CTS) mode, these times can be expressed as follows.
PPT Slide
Lager Image
PPT Slide
Lager Image
To validate the accuracy of the model presented in the previous subsection, the results are compared with the model proposed in [2] and NS-2 simulation results in Fig. 3 where the throughput performance of two ACs are plotted (number of stations per AC is fixed to 2 and 10, respectively). In addition, the results of 4 ACs are compared based on NS-2 simulations results in Fig. 4 . Other system parameters are the same as Table 1 of [2] , except the payload length was set to 1000 bytes. From Fig. 3 , it can be observed that the model provides more accurate results than [2] . In addition, it is confirmed in Fig. 4 that the model can track more than two ACs at the same time with reasonable accuracy at a significantly reduced computational complexity (since it does not rely on contention-zones).
PPT Slide
Lager Image
Results of two ACs (2 and 10 stations per AC, respectively)
PPT Slide
Lager Image
Results of four ACs (2 stations per AC)
- 2.3 Optimization Statements
Since the objective is to maximize the throughput of each station, the problem can be formulated as a multi-objective optimization problem as shown in (26), where W 0,i and Ci represents the minimum CW size and the capacity of station i , respectively. The objective functions (i.e., Si ( W 0 )) represents the throughput of each station obtained from (18), which are in conflict of interest with each other since an effort to increase the performance of one objective function will commonly result in degradations of the other objectives.
PPT Slide
Lager Image
Fig. 5 represents the Pareto optimal front of an EDCA WLAN with 2 ACs (i.e., AC[1] and AC[2]) when N 1 = N 2 = 5 and α 1 = α 2 = 0. It can be observed that the throughput achieved by the stations of different ACs are in conflict with each other, and as a result, increasing the allocated ratio of one AC results in degradation in the other AC.
PPT Slide
Lager Image
Pareto optimal front for problem in (26) and saturation throughput of AC[1] and AC[2].
As stated in the previous section, packet transmissions of stations of one AC are cross-related with that of the stations of other ACs. The reason for this phenomenon is based upon the fact that transmissions are governed by the random backoff procedures and differences in QoS parameters. Although the ACs are separated with different priorities, we cannot predict the exact order of sequence of transmissions, since the transmission times of both ACs show random behavior. This can be verified from Fig. 5 , where W 0,2 is set to 7, W 0,1 varies from 7 to 55, α 1 = 0, α 2 = 1, and N 1 = N 2 = 5. Fig. 5 represents the saturation throughput of AC[1] and AC[2]. As can be seen from Fig. 5 , since the two ACs are closely correlated with each other, if one AC tries to increase its throughput by lowering its CW value, the stations of the other ACs will suffer degradation in throughput performance.
Since the nature of the backoff process creates a conflict, and considering the interactive behavior of different stations of different ACs, the objective of maximizing per station throughput as well as the overall system throughput cannot be easily modeled into a single objective optimization problem, but is better to be dealt with in a multi-objective Pareto optimization form. The analytical derivations of the throughput model in the previous section includes these cross effects of conflicting probabilities due to different system parameters (CWs and AIFSs), where the proposed algorithm introduced in the following sections provide a Pareto optimized system throughput performance.
A more precise problem statement compared to (26) is provided in (27), where it is assumed that the priority of the stations are ordered in an ascending order (i.e., Pi > Pj , if i < j for all i , j X ). Therefore, station 1 is the highest priority station and the required relative throughput proportion of station i ( Ri ) is normalized based on S1 (i.e., Ri = Si / S 1 and R 1 = 1).
PPT Slide
Lager Image
In (27), it can be seen that the throughput S 1 is upper-bounded by the desired ratio R 1 . In addition, the throughput S 2 is constrained by the higher priority throughput allocation ( S 1 ) and by the desired ratio of its own ( R 2 ). The same pattern of upper-bounds and throughput allocation constraints apply to the lower priority stations as well.
3. QoS Provisioning Parameter Control
- 3.1 Finding a Near-Optimal Configuration
A simple and straightforward way to find the optimal solution would be to perform a brute force search for all of parameter configurations. However, finding the optimal configuration in this fashion would definitely be impractical. To reduce the computational complexity, the initial starting points have to be programmed to begin at a near-optimal point before applying the proposed algorithm described in the following subsection.
Assuming TS ( i ) = TS , TC ( i ) = TC , Di = D for ∀ i X , and using (19)~(21), the throughput expression in (18) can be rewritten as follows, where yi = τi /(1- τi ).
PPT Slide
Lager Image
When τi << 1, then 1- τi ≈ 1 and τi Ri τ 1 , therefore resulting in yi Ri τ 1 . The initial starting point will be selected such that it maximizes ST = Σ iX Si , as shown below.
PPT Slide
Lager Image
From (29), it is obvious that maximizing ST is equivalent to minimizing the function Z ( τ 1 ) = [( σ / TC -1)+Π kX (1+ Ri τ 1 )]/ τ 1 . By denoting f ( τ 1 ) = Π kX (1+ Ri τ 1 ), f ( τ 1 ) can be approximated as follows using Taylor series expansion.
PPT Slide
Lager Image
Where f (0) = 1, f ʹ(0) and f ʹʹ(0) can be written as follows.
PPT Slide
Lager Image
PPT Slide
Lager Image
Therefore, Z ( τ 1 ) = [( σ / Tc - 1) + f (0) + f ʹ(0) τ 1 + f ʹʹ(0) τ 1 2 ]/ τ 1 . Differentiating Z ( τ 1 ) with respect to τ 1 and by setting it to zero, the following optimal point for τi and pi can be obtained.
PPT Slide
Lager Image
PPT Slide
Lager Image
The initial CW configuration can be represented as follows based on (16), (33), and (34), where yi *= (1- τ 1 *)/ τ 1 *.
PPT Slide
Lager Image
The results obtained from (35) will be used as an initial starting point of the proposed algorithm in the following subsection. The approximated W 0,i * are shown in Fig. 5 for various relative throughput ratios allocated (2 ACs only for spatial limitations).
PPT Slide
Lager Image
Approximated CW for various relative throughput ratios and AIFS differentiation.
- 3.2 Parameter Control Algorithm
The proposed QoS provisioning parameter control algorithm is based on two input variables: the desired relative throughput ratio of station i ( Ri ) and the number of competing stations ( N ) in the network. For the output, it provides the minimum contention window size values for all stations in the network, which eventually enables the stations to operate in Pareto optimal system configurations. The pseudo code of the proposed algorithm is provided in Table 1 , and explanations based on the line numbers are presented below. In Table 1 , R = { R 1 ,…, RN } is a n -dimensional vector whose elements are the desired relative throughput ratios. In addition, W * = { W 1 *, W 2 *,…, WN *} is the candidate CW vector and P * = { P 1 *, P 2 *,…, PN *} is the set of candidate Pareto optimal configurations.
QoS Provisioning Parameter Control Algorithm
PPT Slide
Lager Image
QoS Provisioning Parameter Control Algorithm
  • Lines 1~2:ReconfigureW* every UPDATETIME. This is operated by the AP every beacon interval. Then, the newly obtained configuration is distributed to stations.
  • Lines 3~6:The AP detects the number of stations that are involved in transmission competition (N) and the desired resource allocation ratios of stations (R). In addition, create candidate CW set (W*) and the Pareto solution set (P*), which is a set of the non-dominating values.
  • Lines 7~12:UpdateW* and check the domination/non-domination properties of each elements. The approximated initialW* is obtained from (35). The approximation results in a near optimalW*, whereeriis the user-defined expected error range of stationi(set to 10% in the simulations).
  • Lines 13~23:Determine if the point is a non-dominated point or not (Pareto optimality). The objects of comparison include all elements of the candidateW* set obtained earlier. The candidates are classified under one of the following three solution casesA,B, orC. In caseA, where a candidate solutionx(an element of the candidateW* set) is dominated by a candidate solution, then the set of existing Pareto solutionsP* are not changed. For caseB, if a candidate solutionxdominates at least one other candidate solution, then the dominated solution(s) are deleted from the Pareto solution set, and the new solutionxis added to the set of Pareto solutionsP*. For caseC, ifxdoes not dominate any of the existing candidates, thenxis added as a new Pareto solutionP*.
  • Line 24:The CW of the Pareto optimal frontP* are distributed to stations and applied until the next UPDATETIME.
The proposed algorithm is different from [6] and [7] as it configures the optimal CW that results in a maximum saturation throughput by using the prediction method described in the previous section and then additionally applying the proposed algorithm based on a local-value adjustment method to the parameter settings such that similar configurations of pre-identified Pareto optimal points can be checked for domination/non-domination in order to efficiently obtain other non-dominated values near that point. In the following section, a performance comparison between the proposed algorithm and the scheme of [6] is presented.
4. Simulation Results
Fig. 7 and Fig. 8 presents the results obtained from extensive simulations conducted on Network Simulator 2 (NS-2) [15] . The simulation results presented in Fig. 7 were conducted with two ACs (i.e., AC[1] and AC[2]), where α 1 = α 2 = 0, N 1 = N 1 = 5, and one packet transmission per TXOP. The channel capacity was set to 1 Mbps and the payload size was set to 1000 bytes per packet. For the model in [6] , the default CW of the highest priority AC (i.e., AC[1]) was set to 7, same as in the standards, and the window size of the lower priority AC (i.e., AC[2]) was set according to the algorithm described in [6] . For the proposed model, the window sizes were configured using the QoS provisioning parameter control algorithm presented in section 3.2. To obtain Fig. 8 , for throughput ratio 6:4, W 0,3 was set to 26 and W 0,2 was set to 38. For throughput 7:3, W 0,3 = 23 and W 0,2 = 51 was applied, and for ratio 8:2, W 0,3 = 20 and W 0,2 = 72 was applied. Finally, for throughput ratio 9:1, W 0,3 was set to 17 and W 0,2 was set to 140. All other system parameters were configured according to [10] .
PPT Slide
Lager Image
Throughput allocation control and the total system throughput performance
PPT Slide
Lager Image
Per-Class throughput performance for various allocation ratio.
In Fig. 7 , the desired throughput ratio was changed from 8:2 to 6:4, 9:2, and 7:3. In Fig. 7 , it can be seen that both the proposed algorithm and the algorithm proposed in [6] are capable of controlling the ratio of resources allocated. However, the total system throughput fluctuates when there is a change in the desired throughput ratio when using the algorithm of [6] . In general, the algorithm of [6] cannot maximize the channel utilization and therefore cannot provide an optimized performance. In contrast, the proposed algorithm maintains almost a constant total system throughput (about 0.827 Mbits/s on average) in every situation. In other words, the proposed algorithm is able to fully utilize the channel in near-Pareto optimized network configurations. This is possible because the proposed algorithm approximates a Pareto optimal system performance by selecting control parameters that form the Pareto optimal front. This result is also confirmed by the per-class saturation throughput performance presented in Fig. 8 , which was obtained by extending the results of Fig. 7 by varying the number of stations. The results confirm that the proposed algorithm improves the overall system performance of WLANs regardless of the number of stations and the required (desired) throughput ratios.
5. Conclusion
In this paper, a simple and accurate model to analyze the saturation throughput of EDCA networks is provided. Based on this, a QoS provisioning parameter control algorithm is proposed. The proposed algorithm can provide an enhanced system throughput performance, while maintaining the desired proportion of per-station resource allocation. Furthermore, the proposed algorithm can provide user controllability to stations that are participating in the network. Although the proposed scheme requires additional computational overhead, the simulation results confirm the efficiency of the proposed algorithm and demonstrate that the proposed scheme significantly outperforms the default parameter settings and also outperforms the other EDCA control methods that have been discussed in the introduction.
For future works, the model introduced in section II should be extended so that it can provide adaptive control not only for throughput, but also for the delay performance. Based on this, the parameter control scheme should also be extended, considering both the throughput and delay requirements of each AC. Since there are strict time requiremnts for some ACs, the extentions mentioned above will make the proposed scheme more practical and feasible.
BIO
Minseok Kim received his B.S. and Ph.D. degrees from the School of Electrical and Electronic Engineering, Yonsei University, Seoul, Republic of Korea, in 2009 and 2014, respectively. Since 2014, he has been with Samsung Electronics Co. Ltd., where he is focusing on software engineering for wearable devices and internet-of-things (IOT) environments. His research focuses on mobile and ad hoc wireless networks, device-to-device (D2D) communications, scheduling, MAC protocols, software engineering, and vehicular communications.
Wui Hwan Oh received his B.S. degree from the Department of Ceramic Engineering, Hanyang University, Seoul, Republic of Korea, in 2005. In 2011, he received his M.S. degree from the School of Electrical and Electronic Engineering, Yonsei University. Since 2005, he has been with Republic of Korea Army. His research focuses on future combat systems, military communications, common datalink, mobile ad-hoc network, and MAC protocols for wireless networks.
Jong-Moon Chung received B.S. and M.S. degrees from Yonsei University, and Ph.D. degree from the Pennsylvania State University. He has been a professor in the School of Electrical and Electronic Engineering, Yonsei University, since 2005. He served as an assistant professor in the Department of Electrical Engineering at the Pennsylvania State University, and has served as Director of OCLNB and ACSEL labs and served as a tenured associate professor at the Oklahoma State University. His research is in the area of smartphone design, network scheduler design, LTE/5G, IoT, M2M, Mobile-CDN, AR, CR, SDN, NFV, SDN, MANET, VANET, ITS, satellite communications, military communications, and broadband QoS networking. He is an Editor of the IEEE Trans. on Vehicular Technology and Co-Editor-in-Chief of the KSII TIIS.
Bong Gyou Lee is a Professor at the Graduate School of Information and has served as a Director of the Communications Policy Research Center (CPRC) in Yonsei University since 2009. Dr. Lee received a B.A. from the Department of Economics at Yonsei University and M.S. and Ph.D. from Cornell University. During 2007 and 2008 he served as Commissioner of the Korea Communications Commission.
Myunghwan Seo received his B.S. degree in Information and Communication Engineering from Chungnam National University, Daejeon, Korea in 2002, and earned his M.S. and Ph.D. degrees in information and Communication Engineering from the Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea in 2004 and 2009, respectively. Since 2009, he has been worked with Samsung Thales Col Ltd., where he is focusing on developing wireless communication protocols for military wireless communication systems. His research interests are mobile ad-hoc networks, wireless mesh networks, wireless MAC protocols, cognitive radio, and military wireless communications.
Jung-sik Kim received his B.S. and M.S. degrees in Computer Engineering, Kyungpook National University, Daegu, Korea, in 2005 and 2007, respectively. From 2007 to 2011, he worked as a researcher in the Electronics and Telecommunications Research Institute (ETRI), Daejeon, Korea. Since 2011, he has been with Samsung Thales Co. Ltd., where he is focusing on software engineering for military wireless communication systems. His research interests include mobile ad-hoc network, wireless sensor network, network synchronization, and military wireless communications.
Hyung-Weon Cho has been with Samsung Thales Co. Ltd. since 1997, where he is focusing on system engineering for tactical mobile communication systems, software defined radio and cognitive radio. He received Ph.D. degrees from the School of Electrical and Electronic Engineering, Yonsei University, Seoul, Republic of Korea, in 2012.
References
2005 “IEEE 802.11e, Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Quality of Service Enhancements” IEEE Std. 802.11e-2005 Article (CrossRef Link)
Banchs A. , Vollero L 2006 “Throughput analysis and optimal configuration of 802.11e EDCA” Computer Networks Article (CrossRef Link) 50 (11) 1749 - 1768    DOI : 10.1016/j.comnet.2005.07.008
Patras P. , Banchs A. , Serrano P. 2009 “A control theoretic approach for throughput optimization in IEEE 802.11e EDCA WLANs” Mobile Networks and Applications Article (CrossRef Link) 14 (6) 697 - 708    DOI : 10.1007/s11036-008-0121-x
Serrano P. , Banchs A. , Patras P. , Azcorra A. 2010 “Optimal configuration of 802.11e EDCA for real-time and data traffic” IEEE Transactions on Vehicular Technology Article (CrossRef Link) 59 (5) 2511 - 2528    DOI : 10.1109/TVT.2010.2043274
Lee J. Y. , Lee H. S. 2009 “A performance analysis model for IEEE 802.11e EDCA under saturation condition” IEEE Transactions on Communications Article (CrossRef Link) 57 (1) 56 - 63    DOI : 10.1109/TCOMM.2009.0901.060395
Lee J. Y. , Lee H. S. , Ma J. S. 2009 “Model-based QoS parameter control for IEEE 802.11e EDCA” IEEE Transactions on Communications Article (CrossRef Link) 57 (7) 1914 - 1918    DOI : 10.1109/TCOMM.2009.07.070147
Fan Z. 2007 “Throughput and QoS optimization for EDCA-based IEEE 802.11 WLANs” Wireless Personal Communications Article (CrossRef Link) 43 (4) 1279 - 1290    DOI : 10.1007/s11277-007-9301-4
Bianchi G. , Tinnirello I. , Scalia L. 2005 “Understanding 802.11e contention-based prioritization mechanism and their coexistence with legacy 802.11 stations” IEEE Network Article (CrossRef Link) 19 (4) 28 - 34    DOI : 10.1109/MNET.2005.1470680
Inan I. , Keceli F. , Ayanoglu E. 2009 “Analysis of the 802.11e enhanced distributed channel access function” IEEE Transactions on Communications Article (CrossRef Link) 57 (6) 1753 - 1764    DOI : 10.1109/TCOMM.2009.06.0701132
Robinson J. W. , Randhawa T. S. 2004 “Saturation throughput analysis of IEEE 802.11e enhanced distributed coordination function” IEEE Journal on Selected Areas in Communications Article (CrossRef Link) 22 (5) 917 - 928    DOI : 10.1109/JSAC.2004.826929
Fallah Y. P. , El-Housseini S. , Alnuweiri H. 2008 “A generalized saturation throughput analysis for IEEE 802.11e contention-based MAC” Wireless Personal Communications Article (CrossRef Link) 47 (2) 235 - 245    DOI : 10.1007/s11277-008-9457-6
Peng F. , Peng B. , Qian D. 2010 “Performance analysis of IEEE 802.11e enhanced distributed channel access” IET Communications Article (CrossRef Link) 4 (6) 728 - 738    DOI : 10.1049/iet-com.2009.0035
Garreto M. , Salonidis T. , Knightly E. W. 2008 “Modeling per-flow throughput and capturing starvation in CSMA multi-hop wireless networks” IEEE/ACM Transactions on Networking Article (CrossRef Link) 16 (4) 864 - 877    DOI : 10.1109/TNET.2007.902687
Bianchi G. 2000 “Performance analysis of the IEEE 802.11 distributed coordination function” IEEE Journal on Selected Areas in Communications Article (CrossRef Link) 18 (3) 535 - 547    DOI : 10.1109/49.840210
The Network Simulator, NS2. Article (CrossRef Link)