SlideShare a Scribd company logo
Reference:
Mohammed A. Salem, Ibrahim F. Tarrad, Mohamed I. Youssef, and Sherine M. Abd El-Kader, QoS
Categories Activeness-Aware Adaptive EDCA Algorithm for Dense IoT Networks, International Journal of
Computer Networks & Communications (IJCNC), vol. 11, No. 3, May 2019, pp. 67-83.
QoS Categories Activeness-Aware
Adaptive EDCA Algorithm for
Denese IoT Networks
International Journal of Computer Networks & Communications (IJCNC)
(Scopus, ERA Listed)
ISSN 0974 - 9322 (Online); 0975 - 2293 (Print)
http://airccse.org/journal/ijcnc.html
Outline
 Traditional IEEE 802.11 EDCA Channel Access
 QoS Categories Activeness-Aware Adaptive EDCA
Algorithm (QCAAAE)
 Determination of active ACs and number of associated
STAs per each AC
 Tuning of AIFSN values considering the absence of
any AC
 Adaptation of CW size according to number of
associated STAS per each AC
 Advertising the new values of AIFSN and CW
 Results
 Conclusions
Traditional IEEE 802.11 EDCA Channel
Access
 This mechanism provides four Access Categories (ACs):
Voice (VO), Video (VI), Best Effort (BE), and Background
(BK).
 The differentiation between ACs is provided by
configuring different EDCA parameters (AIFSN, CW)
values for each AC; lower AIFSN and CW assigned for
higher priority AC.
Traditional IEEE 802.11 EDCA Channel
Access (Cont.)
 Once STA sensed the channel idle for AIFSN slots, it
generates a random back-off time within range from zero to
CWmin).
 STA starts to decrement the back-off time until it reaches to
zero, at that time the STA starts to send its frame.
 In case of the channel becomes busy during the decrement,
the back-off time stops and wait till the channel becomes idle
to continue the decrement process.
 In case of unsuccessful transmission, the STA multiply the
CW size by 2.
AC AIFSN CWmin CWmax
VO 2 3 7
VI 2 7 15
BE 3 15 1023
BK 7 15 1023
QoS Categories Activeness-Aware
Adaptive EDCA Algorithm (QCAAAE)
 Our objective in this algorithm is to improve the efficiency of
the uplink access in 802.11 networks; therefore we proposed
an algorithm called QoS Categories Activeness-Aware
Adaptive EDCA Algorithm (QCAAAE) which adapts
Contention Window (CW) size, and Arbitration Inter-Frame
Space Number (AIFSN) values depending on the number of
associated Stations (STAs) and considering the presence of
each AC.
 QCAAAE consists of 4 phases:
1. Determination of active ACs and number of associated STAs
per each AC (NAC)
2. Tuning of AIFSN values considering the absence of any AC.
3. Adaptation of CW size according to number of associated
Determination of active ACs and
number of associated STAs per each
AC
 During association process, every STA send an association
request frame which contains QoS capability information.
 Each STA sets AC flags (B0, B1, B2, and B3) to 1 to inform
the AP of the required type(s) of QoS AC for sending and
receiving data.
 We calculated NAC for each category as follows:
 For every received association request frame, AP checks the
flags of each required AC. In case of any AC flag found 1, the
corresponding NAC increments.
 In contrast, for every disassociation request, the corresponding
NAC decrements.
Tuning of AIFSN values considering the
absence of any AC
 Lower priority ACs can improve its performance in terms
of throughput, and delay by seizing opportunistically the
resources of absent higher priority ACs.
 For example, if voice and video ACs are inactive, then
best effort AC will seize the minimum value of AIFSN
which equal 2 to decrease its media access delay.
AC Activity Status AIFSN Values
VO VI BE VO VI BE
Inactive Inactive Active - - 2
Inactive Active Inactive - 2 -
Inactive Active Active - 2 3
Active Inactive Inactive 2 - -
Active Inactive Active 2 - 3
Active Active Inactive 2 3 -
Active Active Active 2 3 4
Adaptation of CW size according to
number of associated STAS per each
AC
 The new CWmin and CWmax values are given by:
Advertising the new values of AIFSN
and CW
 The AP broadcasts out periodically a beacon frame in the
network, which contains all information about the
networkand a field for EDCA parameters setting.
 In QCAAAE; after tuning of AIFSN value and calculation
of CW size for each AC, the AP updates the EDCA
parameters setting field and advertise all associated and
connected STAs through the next scheduled beacon
frame.
Results
Global Normalized Throughput
Results (cont.)
Global Mean Average Delay
Results (cont.)
Global Retransmission Attempts
Results (cont.)
Best Effort AC Normalized Throughput
Results (cont.)
Voice AC Normalized Throughput
Results (cont.)
Voice AC Mean Average Delay
Results (cont.)
Video AC Normalized Throughput
Results (cont.)
Video AC Mean Average Delay
Conclusions
 The QCAAAE algorithm improves the performance of the
network more than the traditional EDCA for all QoS ACs
in terms of normalized throughput (increased on average
23%), retransmission attempts (decreased on average
47%) and mean average delay with considering of
acceptable delay for sensitive delay applications and
services.
 In some traffic scenarios which contain large number of
stations, the mean delay of voice and video services
slightly increased but still in the recommended
acceptable range; on the other hand, the throughput of
voice and video services greatly increased as shown in
the simulation results.
Thank You

More Related Content

What's hot

Power Quality Enhancement using Fuzzy Control Based DVR
Power Quality Enhancement using Fuzzy Control Based DVRPower Quality Enhancement using Fuzzy Control Based DVR
Power Quality Enhancement using Fuzzy Control Based DVR
IRJET Journal
 
Improved Transient Compensation using PI-SRF Control Scheme Based UHVDC for O...
Improved Transient Compensation using PI-SRF Control Scheme Based UHVDC for O...Improved Transient Compensation using PI-SRF Control Scheme Based UHVDC for O...
Improved Transient Compensation using PI-SRF Control Scheme Based UHVDC for O...
IRJET Journal
 
Wcdma kpi-analysis
Wcdma kpi-analysisWcdma kpi-analysis
Wcdma kpi-analysisa8us
 
POWER QUALITY IMPROVEMENT IN TRANSMISSION LINE USING DPFC
POWER QUALITY IMPROVEMENT IN TRANSMISSION LINE USING DPFCPOWER QUALITY IMPROVEMENT IN TRANSMISSION LINE USING DPFC
POWER QUALITY IMPROVEMENT IN TRANSMISSION LINE USING DPFC
vivatechijri
 
Chap 4. call processing and handover.eng
Chap 4. call processing and handover.engChap 4. call processing and handover.eng
Chap 4. call processing and handover.eng
sivakumar D
 
A method of signal separation based on LINC transmitter system- C&T RF Antenn...
A method of signal separation based on LINC transmitter system- C&T RF Antenn...A method of signal separation based on LINC transmitter system- C&T RF Antenn...
A method of signal separation based on LINC transmitter system- C&T RF Antenn...
Antenna Manufacturer Coco
 
Design of a 45nm TIQ Comparator for High Speed and Low Power 4-Bit Flash ADC
Design of a 45nm TIQ Comparator for High Speed and Low Power 4-Bit Flash ADCDesign of a 45nm TIQ Comparator for High Speed and Low Power 4-Bit Flash ADC
Design of a 45nm TIQ Comparator for High Speed and Low Power 4-Bit Flash ADC
IDES Editor
 
Design & implementation of 3 bit flash adc in 0.18µm cmos
Design & implementation of 3 bit flash adc in 0.18µm cmosDesign & implementation of 3 bit flash adc in 0.18µm cmos
Design & implementation of 3 bit flash adc in 0.18µm cmosIAEME Publication
 
Major Project, HVDC Thesis - Saurabh Saxena
Major Project, HVDC Thesis - Saurabh SaxenaMajor Project, HVDC Thesis - Saurabh Saxena
Major Project, HVDC Thesis - Saurabh SaxenaSaurabh Saxena
 
Using and OMA to Optimize QAM Optical Transceivers
Using and OMA to Optimize QAM Optical TransceiversUsing and OMA to Optimize QAM Optical Transceivers
Using and OMA to Optimize QAM Optical Transceivers
teledynelecroy
 
Sliding Mode Control of Three Levels Back-To-Back VSC- HVDC System Using Spac...
Sliding Mode Control of Three Levels Back-To-Back VSC- HVDC System Using Spac...Sliding Mode Control of Three Levels Back-To-Back VSC- HVDC System Using Spac...
Sliding Mode Control of Three Levels Back-To-Back VSC- HVDC System Using Spac...
IJPEDS-IAES
 
3 g huawei ran resource monitoring and management recommended
3 g huawei ran resource monitoring and management recommended3 g huawei ran resource monitoring and management recommended
3 g huawei ran resource monitoring and management recommendedMery Koto
 
Q & A for 3G Optimization
Q & A for 3G Optimization Q & A for 3G Optimization
Q & A for 3G Optimization
l3p15
 
Implementation of Linear Controller for a DC-DC Forward Converter
Implementation of Linear Controller for a DC-DC Forward ConverterImplementation of Linear Controller for a DC-DC Forward Converter
Implementation of Linear Controller for a DC-DC Forward Converter
ijceronline
 
RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUES
RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUESRF measurement and optimization Engineer EMERSON EDUARDO RODRIGUES
RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUES
EMERSON EDUARDO RODRIGUES
 
Hardware Implementation Of QPSK Modulator for Satellite Communications
Hardware Implementation Of QPSK Modulator for Satellite CommunicationsHardware Implementation Of QPSK Modulator for Satellite Communications
Hardware Implementation Of QPSK Modulator for Satellite Communications
pradeepps88
 
IRJET- Design and Simulation of 12-Bit Current Steering DAC
IRJET-  	  Design and Simulation of 12-Bit Current Steering DACIRJET-  	  Design and Simulation of 12-Bit Current Steering DAC
IRJET- Design and Simulation of 12-Bit Current Steering DAC
IRJET Journal
 
Lte kpi accessability
Lte kpi accessabilityLte kpi accessability
Lte kpi accessability
Dheeraj Yadav
 

What's hot (20)

Power Quality Enhancement using Fuzzy Control Based DVR
Power Quality Enhancement using Fuzzy Control Based DVRPower Quality Enhancement using Fuzzy Control Based DVR
Power Quality Enhancement using Fuzzy Control Based DVR
 
Improved Transient Compensation using PI-SRF Control Scheme Based UHVDC for O...
Improved Transient Compensation using PI-SRF Control Scheme Based UHVDC for O...Improved Transient Compensation using PI-SRF Control Scheme Based UHVDC for O...
Improved Transient Compensation using PI-SRF Control Scheme Based UHVDC for O...
 
Wcdma kpi-analysis
Wcdma kpi-analysisWcdma kpi-analysis
Wcdma kpi-analysis
 
POWER QUALITY IMPROVEMENT IN TRANSMISSION LINE USING DPFC
POWER QUALITY IMPROVEMENT IN TRANSMISSION LINE USING DPFCPOWER QUALITY IMPROVEMENT IN TRANSMISSION LINE USING DPFC
POWER QUALITY IMPROVEMENT IN TRANSMISSION LINE USING DPFC
 
Chap 4. call processing and handover.eng
Chap 4. call processing and handover.engChap 4. call processing and handover.eng
Chap 4. call processing and handover.eng
 
A method of signal separation based on LINC transmitter system- C&T RF Antenn...
A method of signal separation based on LINC transmitter system- C&T RF Antenn...A method of signal separation based on LINC transmitter system- C&T RF Antenn...
A method of signal separation based on LINC transmitter system- C&T RF Antenn...
 
Design of a 45nm TIQ Comparator for High Speed and Low Power 4-Bit Flash ADC
Design of a 45nm TIQ Comparator for High Speed and Low Power 4-Bit Flash ADCDesign of a 45nm TIQ Comparator for High Speed and Low Power 4-Bit Flash ADC
Design of a 45nm TIQ Comparator for High Speed and Low Power 4-Bit Flash ADC
 
Design & implementation of 3 bit flash adc in 0.18µm cmos
Design & implementation of 3 bit flash adc in 0.18µm cmosDesign & implementation of 3 bit flash adc in 0.18µm cmos
Design & implementation of 3 bit flash adc in 0.18µm cmos
 
Major Project, HVDC Thesis - Saurabh Saxena
Major Project, HVDC Thesis - Saurabh SaxenaMajor Project, HVDC Thesis - Saurabh Saxena
Major Project, HVDC Thesis - Saurabh Saxena
 
report-paper-bheesette
report-paper-bheesettereport-paper-bheesette
report-paper-bheesette
 
Using and OMA to Optimize QAM Optical Transceivers
Using and OMA to Optimize QAM Optical TransceiversUsing and OMA to Optimize QAM Optical Transceivers
Using and OMA to Optimize QAM Optical Transceivers
 
Sliding Mode Control of Three Levels Back-To-Back VSC- HVDC System Using Spac...
Sliding Mode Control of Three Levels Back-To-Back VSC- HVDC System Using Spac...Sliding Mode Control of Three Levels Back-To-Back VSC- HVDC System Using Spac...
Sliding Mode Control of Three Levels Back-To-Back VSC- HVDC System Using Spac...
 
3 g huawei ran resource monitoring and management recommended
3 g huawei ran resource monitoring and management recommended3 g huawei ran resource monitoring and management recommended
3 g huawei ran resource monitoring and management recommended
 
Multi_Vdd_IEEE_Paper
Multi_Vdd_IEEE_PaperMulti_Vdd_IEEE_Paper
Multi_Vdd_IEEE_Paper
 
Q & A for 3G Optimization
Q & A for 3G Optimization Q & A for 3G Optimization
Q & A for 3G Optimization
 
Implementation of Linear Controller for a DC-DC Forward Converter
Implementation of Linear Controller for a DC-DC Forward ConverterImplementation of Linear Controller for a DC-DC Forward Converter
Implementation of Linear Controller for a DC-DC Forward Converter
 
RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUES
RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUESRF measurement and optimization Engineer EMERSON EDUARDO RODRIGUES
RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUES
 
Hardware Implementation Of QPSK Modulator for Satellite Communications
Hardware Implementation Of QPSK Modulator for Satellite CommunicationsHardware Implementation Of QPSK Modulator for Satellite Communications
Hardware Implementation Of QPSK Modulator for Satellite Communications
 
IRJET- Design and Simulation of 12-Bit Current Steering DAC
IRJET-  	  Design and Simulation of 12-Bit Current Steering DACIRJET-  	  Design and Simulation of 12-Bit Current Steering DAC
IRJET- Design and Simulation of 12-Bit Current Steering DAC
 
Lte kpi accessability
Lte kpi accessabilityLte kpi accessability
Lte kpi accessability
 

Similar to QoS Categories Activeness-Aware Adaptive EDCA Algorithm for Dense IoT Networks

QOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKS
QOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKSQOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKS
QOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKS
IJCNCJournal
 
Quality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETQuality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANET
ijsrd.com
 
Ag34200206
Ag34200206Ag34200206
Ag34200206
IJERA Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATM
seanraz
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
10 oct00
10 oct0010 oct00
10 oct00trimba
 
IRJET- Analysis of Slotted CSMA/CA of IEEE 802.15.4
IRJET- Analysis of Slotted CSMA/CA of IEEE 802.15.4IRJET- Analysis of Slotted CSMA/CA of IEEE 802.15.4
IRJET- Analysis of Slotted CSMA/CA of IEEE 802.15.4
IRJET Journal
 
A novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessA novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessambitlick
 
Performance analysis of 802.11ac with frame aggregation using NS3
Performance analysis of 802.11ac with frame aggregation using NS3 Performance analysis of 802.11ac with frame aggregation using NS3
Performance analysis of 802.11ac with frame aggregation using NS3
IJECEIAES
 
Improved Abstraction for Clear Channel Assessment in ns-3 802.11 WLAN Model
Improved Abstraction for Clear Channel Assessment in ns-3 802.11 WLAN ModelImproved Abstraction for Clear Channel Assessment in ns-3 802.11 WLAN Model
Improved Abstraction for Clear Channel Assessment in ns-3 802.11 WLAN Model
SumitRoy384903
 
9 16 05 Karim Hassib Wi Max
9 16 05 Karim Hassib   Wi Max9 16 05 Karim Hassib   Wi Max
9 16 05 Karim Hassib Wi Maxsai srikar
 
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor NetworksQueue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
CSCJournals
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportPanth Shah
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485IJRAT
 
ATM (asynchronous transfer mode)
ATM (asynchronous transfer mode)ATM (asynchronous transfer mode)
ATM (asynchronous transfer mode)
university of Gujrat, pakistan
 

Similar to QoS Categories Activeness-Aware Adaptive EDCA Algorithm for Dense IoT Networks (20)

QOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKS
QOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKSQOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKS
QOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKS
 
40120140504014 2
40120140504014 240120140504014 2
40120140504014 2
 
Quality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETQuality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANET
 
Ag34200206
Ag34200206Ag34200206
Ag34200206
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATM
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
10 oct00
10 oct0010 oct00
10 oct00
 
IRJET- Analysis of Slotted CSMA/CA of IEEE 802.15.4
IRJET- Analysis of Slotted CSMA/CA of IEEE 802.15.4IRJET- Analysis of Slotted CSMA/CA of IEEE 802.15.4
IRJET- Analysis of Slotted CSMA/CA of IEEE 802.15.4
 
A novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessA novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel access
 
Performance analysis of 802.11ac with frame aggregation using NS3
Performance analysis of 802.11ac with frame aggregation using NS3 Performance analysis of 802.11ac with frame aggregation using NS3
Performance analysis of 802.11ac with frame aggregation using NS3
 
Improved Abstraction for Clear Channel Assessment in ns-3 802.11 WLAN Model
Improved Abstraction for Clear Channel Assessment in ns-3 802.11 WLAN ModelImproved Abstraction for Clear Channel Assessment in ns-3 802.11 WLAN Model
Improved Abstraction for Clear Channel Assessment in ns-3 802.11 WLAN Model
 
Wi Max
Wi MaxWi Max
Wi Max
 
9 16 05 Karim Hassib Wi Max
9 16 05 Karim Hassib   Wi Max9 16 05 Karim Hassib   Wi Max
9 16 05 Karim Hassib Wi Max
 
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor NetworksQueue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_Report
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485
 
ATM (asynchronous transfer mode)
ATM (asynchronous transfer mode)ATM (asynchronous transfer mode)
ATM (asynchronous transfer mode)
 

More from IJCNCJournal

Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
IJCNCJournal
 
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
IJCNCJournal
 

More from IJCNCJournal (20)

Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
 
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

QoS Categories Activeness-Aware Adaptive EDCA Algorithm for Dense IoT Networks

  • 1. Reference: Mohammed A. Salem, Ibrahim F. Tarrad, Mohamed I. Youssef, and Sherine M. Abd El-Kader, QoS Categories Activeness-Aware Adaptive EDCA Algorithm for Dense IoT Networks, International Journal of Computer Networks & Communications (IJCNC), vol. 11, No. 3, May 2019, pp. 67-83. QoS Categories Activeness-Aware Adaptive EDCA Algorithm for Denese IoT Networks International Journal of Computer Networks & Communications (IJCNC) (Scopus, ERA Listed) ISSN 0974 - 9322 (Online); 0975 - 2293 (Print) http://airccse.org/journal/ijcnc.html
  • 2. Outline  Traditional IEEE 802.11 EDCA Channel Access  QoS Categories Activeness-Aware Adaptive EDCA Algorithm (QCAAAE)  Determination of active ACs and number of associated STAs per each AC  Tuning of AIFSN values considering the absence of any AC  Adaptation of CW size according to number of associated STAS per each AC  Advertising the new values of AIFSN and CW  Results  Conclusions
  • 3. Traditional IEEE 802.11 EDCA Channel Access  This mechanism provides four Access Categories (ACs): Voice (VO), Video (VI), Best Effort (BE), and Background (BK).  The differentiation between ACs is provided by configuring different EDCA parameters (AIFSN, CW) values for each AC; lower AIFSN and CW assigned for higher priority AC.
  • 4. Traditional IEEE 802.11 EDCA Channel Access (Cont.)  Once STA sensed the channel idle for AIFSN slots, it generates a random back-off time within range from zero to CWmin).  STA starts to decrement the back-off time until it reaches to zero, at that time the STA starts to send its frame.  In case of the channel becomes busy during the decrement, the back-off time stops and wait till the channel becomes idle to continue the decrement process.  In case of unsuccessful transmission, the STA multiply the CW size by 2. AC AIFSN CWmin CWmax VO 2 3 7 VI 2 7 15 BE 3 15 1023 BK 7 15 1023
  • 5. QoS Categories Activeness-Aware Adaptive EDCA Algorithm (QCAAAE)  Our objective in this algorithm is to improve the efficiency of the uplink access in 802.11 networks; therefore we proposed an algorithm called QoS Categories Activeness-Aware Adaptive EDCA Algorithm (QCAAAE) which adapts Contention Window (CW) size, and Arbitration Inter-Frame Space Number (AIFSN) values depending on the number of associated Stations (STAs) and considering the presence of each AC.  QCAAAE consists of 4 phases: 1. Determination of active ACs and number of associated STAs per each AC (NAC) 2. Tuning of AIFSN values considering the absence of any AC. 3. Adaptation of CW size according to number of associated
  • 6. Determination of active ACs and number of associated STAs per each AC  During association process, every STA send an association request frame which contains QoS capability information.  Each STA sets AC flags (B0, B1, B2, and B3) to 1 to inform the AP of the required type(s) of QoS AC for sending and receiving data.  We calculated NAC for each category as follows:  For every received association request frame, AP checks the flags of each required AC. In case of any AC flag found 1, the corresponding NAC increments.  In contrast, for every disassociation request, the corresponding NAC decrements.
  • 7. Tuning of AIFSN values considering the absence of any AC  Lower priority ACs can improve its performance in terms of throughput, and delay by seizing opportunistically the resources of absent higher priority ACs.  For example, if voice and video ACs are inactive, then best effort AC will seize the minimum value of AIFSN which equal 2 to decrease its media access delay. AC Activity Status AIFSN Values VO VI BE VO VI BE Inactive Inactive Active - - 2 Inactive Active Inactive - 2 - Inactive Active Active - 2 3 Active Inactive Inactive 2 - - Active Inactive Active 2 - 3 Active Active Inactive 2 3 - Active Active Active 2 3 4
  • 8. Adaptation of CW size according to number of associated STAS per each AC  The new CWmin and CWmax values are given by:
  • 9. Advertising the new values of AIFSN and CW  The AP broadcasts out periodically a beacon frame in the network, which contains all information about the networkand a field for EDCA parameters setting.  In QCAAAE; after tuning of AIFSN value and calculation of CW size for each AC, the AP updates the EDCA parameters setting field and advertise all associated and connected STAs through the next scheduled beacon frame.
  • 13. Results (cont.) Best Effort AC Normalized Throughput
  • 14. Results (cont.) Voice AC Normalized Throughput
  • 15. Results (cont.) Voice AC Mean Average Delay
  • 16. Results (cont.) Video AC Normalized Throughput
  • 17. Results (cont.) Video AC Mean Average Delay
  • 18. Conclusions  The QCAAAE algorithm improves the performance of the network more than the traditional EDCA for all QoS ACs in terms of normalized throughput (increased on average 23%), retransmission attempts (decreased on average 47%) and mean average delay with considering of acceptable delay for sensitive delay applications and services.  In some traffic scenarios which contain large number of stations, the mean delay of voice and video services slightly increased but still in the recommended acceptable range; on the other hand, the throughput of voice and video services greatly increased as shown in the simulation results.