Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network

Enhanced Distributed Channel Access (EDCA) protocol is used to support quality of service (QoS). However, using the default parameter values for EDCA protocol leads to increasing the collisions in the wireless network and decreasing the capacity. This is due to the default EDCA protocol gives the ac...

Full description

Saved in:
Bibliographic Details
Main Author: Abu-Khadrah, Ahmed Ismail Mohammad
Format: Thesis
Language:English
English
Published: 2017
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/20487/1/Performance%20Evaluation%20And%20Enhancement%20Of%20EDCA%20Protocol%20To%20Improve%20The%20Voice%20Capacity%20In%20Wireless%20Network.pdf
http://eprints.utem.edu.my/id/eprint/20487/2/Performance%20evaluation%20and%20enhancement%20of%20EDCA%20protocol%20to%20improve%20the%20voice%20capacity%20in%20wireless%20network.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utem-ep.20487
record_format uketd_dc
institution Universiti Teknikal Malaysia Melaka
collection UTeM Repository
language English
English
advisor Zakaria, Zahriladha

topic T Technology (General)
T Technology (General)
spellingShingle T Technology (General)
T Technology (General)
Abu-Khadrah, Ahmed Ismail Mohammad
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
description Enhanced Distributed Channel Access (EDCA) protocol is used to support quality of service (QoS). However, using the default parameter values for EDCA protocol leads to increasing the collisions in the wireless network and decreasing the capacity. This is due to the default EDCA protocol gives the access point and wireless stations the same priority to access the medium, in spite of the access point has high load traffic compared with normal wireless stations. Therefore, in this research work a new algorithm was proposed to enhance the capacity of the EDCA protocol and increase the number of the active voice users. The idea of the algorithm was based on creating different contention window ranges between access point and wireless workstations, and changing the technique of increasing the contention window value when the collision happened. Through the proposed algorithm, the Minimum Contention Window (CWmin) and Arbitration Inter Frame Space (AIFS) parameters were adapted based on the percentage of the collision in the network. By applying the proposed algorithm, the throughput of EDCA protocol was increased by 42.9% and it can support 14 voice users rather than 11 in the default EDCA protocol. The QoS requirements were achieved when the network contained 14 voice users. The end to end delay became 86.44 ms and the packet loss percentage was 0.06 %. In addition to that the uplink and downlink voice throughputs covered the data rate requirements. Moreover, a new mathematical model was designed based on the Markov chain mechanism in order to evaluate the performance of the EDCA protocol under saturation and non saturation conditions, which aimed to separate between the uplink and downlink throughputs with different data types. The separation between uplink and downlink throughputs is based on separating the model equations between the access point and the stations. This separation contributes in determining the effect of access point on the network performance as well as it allows in evaluating the algorithms that based on the differentiation between the access point and stations. The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. Therefore, by applying the proposed algorithm, the collisions in network will be decreased and leading to the enhancement of the network capacity. It is believed that this study is useful to cover more voice users in the public wireless network that deployed in bus stations, restaurants, parks, airports and etc.
format Thesis
qualification_name Doctor of Philosophy (PhD.)
qualification_level Doctorate
author Abu-Khadrah, Ahmed Ismail Mohammad
author_facet Abu-Khadrah, Ahmed Ismail Mohammad
author_sort Abu-Khadrah, Ahmed Ismail Mohammad
title Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
title_short Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
title_full Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
title_fullStr Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
title_full_unstemmed Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
title_sort performance evaluation and enhancement of edca protocol to improve the voice capacity in wireless network
granting_institution Universiti Teknikal Malaysia Melaka
granting_department Faculty Of Electronic And Computer Engineering
publishDate 2017
url http://eprints.utem.edu.my/id/eprint/20487/1/Performance%20Evaluation%20And%20Enhancement%20Of%20EDCA%20Protocol%20To%20Improve%20The%20Voice%20Capacity%20In%20Wireless%20Network.pdf
http://eprints.utem.edu.my/id/eprint/20487/2/Performance%20evaluation%20and%20enhancement%20of%20EDCA%20protocol%20to%20improve%20the%20voice%20capacity%20in%20wireless%20network.pdf
_version_ 1747833969138728960
spelling my-utem-ep.204872022-05-17T11:30:49Z Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network 2017 Abu-Khadrah, Ahmed Ismail Mohammad T Technology (General) TK Electrical engineering. Electronics Nuclear engineering Enhanced Distributed Channel Access (EDCA) protocol is used to support quality of service (QoS). However, using the default parameter values for EDCA protocol leads to increasing the collisions in the wireless network and decreasing the capacity. This is due to the default EDCA protocol gives the access point and wireless stations the same priority to access the medium, in spite of the access point has high load traffic compared with normal wireless stations. Therefore, in this research work a new algorithm was proposed to enhance the capacity of the EDCA protocol and increase the number of the active voice users. The idea of the algorithm was based on creating different contention window ranges between access point and wireless workstations, and changing the technique of increasing the contention window value when the collision happened. Through the proposed algorithm, the Minimum Contention Window (CWmin) and Arbitration Inter Frame Space (AIFS) parameters were adapted based on the percentage of the collision in the network. By applying the proposed algorithm, the throughput of EDCA protocol was increased by 42.9% and it can support 14 voice users rather than 11 in the default EDCA protocol. The QoS requirements were achieved when the network contained 14 voice users. The end to end delay became 86.44 ms and the packet loss percentage was 0.06 %. In addition to that the uplink and downlink voice throughputs covered the data rate requirements. Moreover, a new mathematical model was designed based on the Markov chain mechanism in order to evaluate the performance of the EDCA protocol under saturation and non saturation conditions, which aimed to separate between the uplink and downlink throughputs with different data types. The separation between uplink and downlink throughputs is based on separating the model equations between the access point and the stations. This separation contributes in determining the effect of access point on the network performance as well as it allows in evaluating the algorithms that based on the differentiation between the access point and stations. The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. Therefore, by applying the proposed algorithm, the collisions in network will be decreased and leading to the enhancement of the network capacity. It is believed that this study is useful to cover more voice users in the public wireless network that deployed in bus stations, restaurants, parks, airports and etc. 2017 Thesis http://eprints.utem.edu.my/id/eprint/20487/ http://eprints.utem.edu.my/id/eprint/20487/1/Performance%20Evaluation%20And%20Enhancement%20Of%20EDCA%20Protocol%20To%20Improve%20The%20Voice%20Capacity%20In%20Wireless%20Network.pdf text en public http://eprints.utem.edu.my/id/eprint/20487/2/Performance%20evaluation%20and%20enhancement%20of%20EDCA%20protocol%20to%20improve%20the%20voice%20capacity%20in%20wireless%20network.pdf text en validuser https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=106108 phd doctoral Universiti Teknikal Malaysia Melaka Faculty Of Electronic And Computer Engineering Zakaria, Zahriladha 1. Abbas, A. and Mubeen, T., 2008. Capacity analysis for voice and queue management differences in IEEE 802.11 and 802.11 e WLAN standards. IEEE Second International Conference on Electrical Engineering (ICEE 2008), pp.1–5. 2. Achary, R., Vaithiyanathan, V., Raj, P. and Nagarajan, S., 2014. Performance Enhancement of IEEE 802 . 11e WLAN by Dynamic Adaptive Contention Window. IEEE conference on Advanced Communication Technology (ICACT), pp.447–452. 3. Aggarwal, V. and Shankaranarayanan, N.K., 2013. Performance of a random-access wireless network with a mix of full-and half-duplex stations. IEEE Communications Letters, 17(11), pp.2200–2203. 4. Ahemd, F.U. and Sarma, S.K., 2013. QoS and Admission Controller in IEEE 802.11e WLAN. 2013 4th IEEE International Conference on Intelligent Systems, Modelling and Simulation, pp.468–471. 5. Ahmed, E.S.A. and Saeed, R.A., 2014. Review of Gateway Selection Schemes for MANET to Internet Connectivity. International Journal of Computer Science and Telecommunications, 5(11), pp.17–23. 6. Banerji, S. and Chowdhury, R.S., 2013. On IEEE 802.11: Wireless Lan Technology. International Journal of Mobile Network Communications and Telematics, 3(4), pp.45–64.152 7. Bhaya, W.S. and Alasadi, S.A., 2011. Security against Spoofing Attack in Mobile Ad Hoc Networks. European Journal of Scientific Research, 64(4), pp.634–643. 8. Bianchi, G., 2000. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications, 18(3), pp.535–547. 9. Bradai, N., Fourati, L.C. and Kamoun, L., 2015. WBAN data scheduling and aggregation under WBAN/WLAN healthcare network. Ad Hoc Networks, 25(2015), pp.251–262. 10. Cai, J. and Jia, B., 2009. Network Simulation Based on OPNTE and Application. IEEE First International Workshop on Education Technology and Computer Science, pp.199– 202. 11. Cai, L.X., Shen, X., Mark, J., Cai, L. and Xiao, Y., 2006. Voice capacity analysis of WLAN with unbalanced traffic. IEEE Transactions on Vehicular Technology, 55(3), pp.752–761. 12. Campolo, C., Molinaro, A., Scopigno, R., Ozturk, S., Mišic, J. and Mišic, V.B., 2015. The MAC Layer of VANETs. In Vehicular ad hoc networks Standards, Solutions, and Research (Campolo, C., Molinaro, A. and Scopigno, R., 1st ed.), pp. 83-122. New York: Springer International Publishing. 13. Cano, C., Bellalta, B., Sfairopoulou, a. and Barceló, J., 2010. Tuning the EDCA parameters in WLANs with heterogeneous traffic: A flow-level analysis. Computer Networks, 54(13), pp.2199–2214.153 14. Cao, J. and Gregory, M., 2008. Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network. IEEE Australasian Telecommunication Networks and Applications Conference (ATNAC 2008), pp.67–71. 15. Caviglione, L., 2010. A simple neural framework for bandwidth reservation of VoIP communications in cost-effective devices. IEEE Transactions on Consumer Electronics, 56(3), pp.1252–1257. 16. Cena, G., Seno, L., Valenzano, A. and Zunino, C., 2010. On the Performance of IEEE 802 11e Wireless Infrastructures for Soft-Real-Time Industrial Applications. IEEE Transactions on Industrial Informatics, 6(3), pp.425–437. 17. Chandra, P. and Lide, D., 2007. Wi-Fi Telephony: Challenges and solutions for voice over WLANs, Oxford: Elsevier. 18. Charfi, E., Chaari, L. and Kamoun, L., 2013. PHY/MAC enhancements and QoS mechanisms for very high throughput WLANs: a survey. IEEE Communications Surveys & Tutorials, 15(4), pp.1714–1735. 19. Chehregosha, N. and Pourmina, M.A., 2015. Designing a jitter buffer for QoS improvement in VoIP networks. International Journal of Computer Science and Information Security, 13(4), pp.78–83. 20. Chen, W.T., 2007. An effective medium contention method to improve the performance of IEEE 802.11. Wireless Networks, 14(6), pp.769–776.154 21. Chen, Y., Zeng, Q.-A. and Agrawal, D.P., 2008. Analytical modeling of MAC protocol in ad hoc networks. Wireless Communications and Mobile Computing, 8(1), pp.45–59. 22. Chern, H., Kuo, H. and Chou, S., 2012. Enhanced distribution chnnel access - Modification of the intial & thereafter CW (EDCA-MITCW). IEEE International Conference on Systems and Informatics (ICSAI), pp.1397–1401. 23. Chieochan, S., Hossain, E. and Diamond, J., 2010. Channel assignment schemes for infrastructure-based 802.11 WLANs: A survey. IEEE Communications Surveys & Tutorials, 12(1), pp.124–136. 24. Choi, J.-Y. and Shin, J., 2007. Cross-layer error-control with low-overhead ARQ for H.264 video transmission over wireless LANs. Computer Communications, 30(7), pp.1476–1486. 25. Choi, S. and Yu, J., 2006. QoS Provisioning in IEEE 802.11 WLAN. In Mobile, wireless, and sensor networks technology, applications, and future directions (Shorey, R., Ananda, A., Chan, M.C. and Ooi, W.T., 1st ed.), pp. 45-72. New Jersey: John Wiley & Sons 26. Chowdhury, N.S.K., Hussain, M.S. and Ahmed, F., 2010. Finding the Performance Bottleneck of the IEEE802 . 11e EDCA Mechanism on Single Access Point ( AP ) Based WLAN Systems. IEEE International Conference on Electrical and Computer Engineering (ICECE), pp.666–669.155 27. Cil, A., Akar, M. and Anarim, E., 2012. Adaptive optimization of EDCA parameters for improved QoS in multimedia applications. Turkish Journal of Electrical Engineering & Computer Sciences, 20(2), pp.1369–1388. 28. Collins, D., 2001. Carrier grade voice over IP, New York: McGraw-Hill. 29. Cruz, N., Miranda, H. and Ribeiro, P., 2014. The evolution of user mobility on the eduroam network. IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS), pp.249–253. 30. Dao, N.T. and Malaney, R.A., 2010. On the Capacity of Location Tracking Systems for Wireless VoIP. IEEE RIVF International Conference on Computing & Communication Technologies, Research, Innovation, and Vision for the Future (RIVF), pp.1–4. 31. Deng, X., He, L., Gui, J., Peng, Q. and He, T., 2015. Modeling and Analysis MAC Layer Performance for IEEE 802.11s Wireless Mesh Network in Smart Grid. IEEE International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI), pp.280–283. 32. Dhenakaran, S.S. and Parvathavarthini, A., 2013. An overview of routing protocols in mobile ad-hoc network. International Journal of Advanced Research in Computer Science and Software Engineering Research, 3(2), pp.251–259.156 33. Dogman, A., Saatchi, R. and Al-Khayatt, S., 2012. Improving Quality of Service in IEEE 802 . 11e Enhanced Distributed Channel Access Protocol. IEEE 8th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP 2012), pp.1–6. 34. Dong, P., Wang, J., Wang, H. and Pan, Y., 2015. Boosting VoIP capacity via service differentiation in IEEE 802.11 e EDCA networks. International Journal of Distributed Sensor Networks, 2015(4), pp.1–11. 35. Duarte, M., Sabharwal, A., Aggarwal, V., Jana, R., Ramakrishnan, K.K., Rice, C.W. and Shankaranarayanan, N.K., 2014. Design and characterization of a full-duplex multiantenna system for WiFi networks. IEEE Transactions on Vehicular Technology, 63(3), pp.1160– 1177. 36. Durrett, R., 2012. Essentials of stochastic processes 2nd ed., New York: Springer Science & Business Media. 37. Dym, C.L., 2004. Principles of mathematical modeling 2nd ed., Burlington: Elsevier Academic Press. Engelstad, P.E. and Østerbø, O.N., 2005. Non-saturation and saturation analysis of IEEE 802.11 e EDCA with starvation prediction. Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems, pp.224– 233.157 38. Epiphaniou, G., Maple, C., Sant, P. and Norrington, P., 2010. The effects of encryption on VoIP streams under the code-excited linear prediction coder G. 729. IEEE International Conference for Internet Technology and Secured Transactions (ICITST), pp.1–6. 39. Fitzpatrick, J., Murphy, S., Atiquzzaman, M. and Murphy, J., 2007. Evaluation of VoIP in a Mobile Environment using an end-to-end Handoff Mechanism. IEEE 16th IST Mobile and Wireless Communications Summit, pp.1–5. 40. Freitag, J., Fonseca, N.L.S. da and Rezende, J.F. de, 2006. Tuning of 802 . 11e Network Parameters. IEEE Communications Letters, 10(8), pp.611–613. 41. Frikha, L., Trabelsi, Z. and El-Hajj, W., 2008. Implementation of a Covert Channel in the 802.11 Header. IEEE International Wireless Communications and Mobile Computing Conference, pp.594–599. 42. Gangrade, K., Patidar, P. and Tiwari, A., 2013. Performance Evaluation of IEEE 802.11 MAC DCF Using Various Schemes Towards: Throughput, Delay and Reliability. International Journal of Advanced Research in Computer and Communication Engineering, 2(7), pp.2731–2737. 43. Gani, A., Li, X., Yang, L. and Zakaria, O., 2008. Radio Frequency Combination for TCP / IP Suite Protocol Improvement in 4G Mobile Internet Networks. International Journal of Communications, 2(1), pp.27–36.158 44. Gao, D., Cai, J., Foh, C.H., Lau, C.-T. and Ngan, K.N., 2008. Improving WLAN VoIP capacity through service differentiation. IEEE Transactions on Vehicular Technology, 57(1), pp.465–474. 45. Gao, D., Cai, J. and Chen, C.W., 2006. Capacity analysis of supporting VoIP in IEEE 802.11 e EDCA WLANs. IEEE Global Telecommunications Conference (GLOBECOM 2006), pp.1–5. 46. Gao, Y. and Dai, L., 2013. Optimal downlink/uplink throughput allocation for IEEE 802.11 DCF networks. IEEE Wireless Communications Letters, 2(6), pp.627–630. 47. Gu, W., Yang, Z., Xuan, D., Jia, W. and Que, C., 2010. Null data frame: A double-edged sword in IEEE 802.11 WLANs. IEEE Transactions on Parallel and Distributed Systems, 21(7), pp.897–910. 48. Gupta, A., Min, J. and Rhee, I., 2012. WiFox: Scaling WiFi performance for large audience environments. Proceedings of the 8th international conference on Emerging networking experiments and technologies. ACM, pp.217–228. 49. Gurbani, V.K. and Kolesnikov, V., 2011. A survey and analysis of media keying techniques in the session initiation protocol (SIP). IEEE Communications Surveys & Tutorials, 13(2), pp.183–198.159 50. Hajlaoui, N., Jabri, I. and Jemaa, M. Ben, 2013. Experimental performance evaluation and frame aggregation enhancement in IEEE 802.11 n WLANs. International Journal of Communication Networks and Information Security, 5(1), pp.48–58. 51. Hamidian, A. and Körner, U., 2006. An enhancement to the IEEE 802.11e EDCA providing QoS guarantees. Telecommunication Systems, 31(2), pp.195–212. 52. Han, H., Pei, Z., Zhu, W. and Li, N., 2012. Saturation Throughput Analysis of IEEE 802 . 11b DCF Considering Capture Effects. IEEE 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), pp.1–4. 53. Harsha, S., Anand, S.V.R., Kumar, A. and Sharma, V., 2006. An analytical model for capacity evaluation of VoIP on HCCA and TCP file transfers over EDCA in an IEEE 802.11 e WLAN. International Conference on Distributed Computing and Networking., pp.245–256. 54. Hasan, M.K., Ahsan, A.H.M.A. and Hossain, M.J., 2012. IEEE 802.11 b ad hoc network: Performance analysis is a primary issue. IEEE International Conference on Informatics, Electronics & Vision (ICIEV), pp.469–475. 55. Held, G., 2013. Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security, Boca Raton: Taylor & Francis Group. 56. Hong, Y., Huang, C. and Yan, J., 2013. Applying control theoretic approach to mitigate SIP overload. Telecommunication Systems, 54(4), pp.387–404.160 57. Hopkinson, K., Roberts, G., Wang, X. and Thorp, J., 2009. Quality-of-service considerations in utility communication networks. IEEE Transactions on Power Delivery, 24(3), pp.1465–1474. 58. Huang, C. and Liao, W., 2007. Throughput and Delay Performance of IEEE 802 . 11e Enhanced Distributed Channel Access ( EDCA ) Under Saturation Condition. IEEE Transaction on Wireless Communications, 6(1), pp.136–145. 59. Huibin Wang, Hu, Y., Zhang, L. and Xia, W., 2010. A New Adaptive EDCA Approach to QoS of Wireless Communications. Wireless Engineering and Technology, 1(1), pp.1–9. 60. Hunt, C., 2002. TCP/IP network administration 3rd ed., Sebastopol: O’Reilly Media. 61. Ibrahim, H. and Mohamed, M.A., 2015. QoS Optimization for Multimedia Streaming Using Hybrid RRM and DASs Over LTE Networks. In Intelligent Data Analysis and Applications (Abraham, A., Jiang, X.H., Snášel, V. and Pan, 1st ed.), pp. 305-318. New York: Springer International Publishing. IETF, 2011. Security assessment of the internet protocol version 4, Internet Engineering Task Force, California. 62. Igartua, M.A., Frías, V.C., Llopis, L.J. de la C. and Gargallo, E.S., 2010. Dynamic framework with adaptive contention window and multipath routing for video-streaming services over mobile ad hoc networks. Telecommunication Systems, 49(4), pp.379–390.161 63. Indu, I. and Manu, T.S., 2012. Cyclic Redundancy Check Generation Using Multiple Lookup Table Algorithms. International Journal of Modern Engineering Research, 2(4), pp.2445–2451. Internet Engineering Task Force, 2003. RFC 3550 RTP: A transport protocol for real-time applications, California: IETF. 64. Jennings, C., Hardie, T. and Westerlund, M., 2013. Real-time communications for the web. IEEE Communications Magazine, 51(4), pp.20–26. 65. Kang, K., 2012. Performance anomaly of the IEEE 802.11 DCF in different frame error rate conditions. Journal of Information Processing Systems, 8(4), pp.739–748. 66. Karapantazis, S. and Pavlidou, F.-N., 2009. VoIP: A comprehensive survey on a promising technology. Computer Networks, 53(12), pp.2050–2090. 67. Kaur, D. and Arora, V., 2013. Research Agenda for Vertical Handover between WiMAX and Wi-Fi Networks. International Journal of Emerging Research in Management &Technology, 2(1), pp.62–66. 68. Kazemitabar, H., Ahmed, S., Nisar, K., Said, A.B. and Hasbullah, H.B., 2010. A survey on voice over ip over wireless lans. International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, 4(11), pp.1617–1623.162 69. Kilinc, H.H. and Yanik, T., 2014. A survey of SIP authentication and key agreement schemes. IEEE Communications Surveys & Tutorials, 16(2), pp.1005–1023. 70. Kosek-Szott, K., Natkaniec, M. and Pach, A.R., 2011. A simple but accurate throughput model for IEEE 802.11 EDCA in saturation and non-saturation conditions. Computer Networks, 55(3), pp.622–635. 71. Krempels, K.-H. and Krebs, M., 2008. Directory-less indoor positioning for WLAN infrastructures extended abstract. IEEE International Symposium on Consumer Electronics, pp.1–2. 72. Lee, B.G. and Choi, S., 2008. Broadband wireless access and local networks: mobile WiMAX and WiFi, Boston: Artech House. 73. Lee, H. and Kim, C., 2010. Streaming high definition multimedia over the incompatible wireless home network. IEEE Transactions on Consumer Electronics, 56(3), pp.1473– 1479. 74. Lee, I.-G., Lee, S.-K. and Cho, J.-P., 2010. Robust wireless transmission utilizing PPDUbased aggregation technique for next generation wireless LANs. IEEE Communications Letters, 14(3), pp.205–207. 75. Lee, J.Y. and Lee, H.S., 2009. A performance analysis model for IEEE 802.11 e EDCA under saturation condition. IEEE Transactions on Communications, 57(1), pp.56–63.163 76. Lee, Y., 2013. Throughput analysis model for IEEE 802.11e EDCA with multiple access categories. Journal of Applied Research and Technology, 11(4), pp.612–621. 77. Lei, L., Zhang, T., Song, X., Cai, S., Chen, X. and Zhou, J., 2015. Achieving weighted fairness in WLAN mesh networks: An analytical model. Ad Hoc Networks, 25(2015), pp.117–129. 78. Liu, J., Tian, H. and Zhou, K., 2014. Frame-bitrate-change based steganography for voiceover-IP. Journal of Central South University, 21(12), pp.4544–4552. 79. Liu, X. and Saadawi, T.N., 2011. IEEE 802.11e (EDCA) analysis in the presence of hidden stations. Journal of Advanced Research, 2(3), pp.219–225. 80. Lu, Z. and Yang, H., 2012. Unlocking the power of OPNET modeler, NewYork: Cambridge University Press. 81. Ma, M. and Yang, Y., 2008. A novel contention-based MAC protocol with channel reservation for wireless LANs. IEEE Transactions on Wireless Communications, 7(10), pp.3748–3758. 82. Mahajan, S., Choudhari, H., Kolte, S. and Chothe, P., 2014. Inhibition to Software Piracy Using Challenging Response Protocol. International Journal of Innovative Research and Development, 3(4), pp.204–208.164 83. Mahmood, A., Saleem, M.F., Latif, D.A. and Ahmad, M., 2013. Key Features and Optimum Performance of Network Simulators: A Brief Study. Journal of Computer Trends and Technology, 4(9), pp.3207–3213. 84. Makki, A., Siddig, A., Saad, M. and Bleakley, C., 2015. Survey of WiFi positioning using time-based techniques. Computer Networks, 88(2015), pp.218–233. 85. Marina, M.K., Das, S.R. and Subramanian, A.P., 2010. A topology control approach for utilizing multiple channels in multi-radio wireless mesh networks. Computer Networks, 54(2), pp.241–256. 86. Mayer, F., 2006. Adding NTP and RTCP to a SIP user agent, Stockholm: KTH Information and Communication Technology. 87. Mishra, M. and Sahoo, A., 2006. A contention window based differentiation mechanism for providing qos in wireless lans. IEEE 9th International Conference on Information Technology(ICIT’06), pp.7–11. 88. Mittal, I. and Anand, A., 2014. WLan Architecture. International Journal of Computer Trends and Technology (IJCTT), 8(3), pp.148–151. 89. Mohd, A. and Loon, O.L., 2012. Performance of voice over ip (voip) over a wireless lan (wlan) for different audio/voice codecs. Jurnal Teknologi, 47(1), pp.39–59. 90. Nagireddi, S., 2008. VoIP Voice and Fax Signal Processing, New Jersey: Wiley & Sons.165 Nasrallah, Y.Y., Al-Anbagi, I. and Mouftah, H.T., 2016. Adaptive Backoff Algorithm for EDCA in the IEEE 802.11p protocol. IEEE International Wireless Communications and Mobile Computing Conference, IWCMC, pp.800–805. 91. Nazar, A., 2009. Evaluation of VoIP Codecs over 802.11 Wireless Networks, Halmstad: Halmstad University. 92. Nilsson, T. and Farooq, J., 2008. A Novel MAC Scheme for Solving the QoS Parameter Adjustment Problem in IEEE 802 . 11e EDCA. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks ( WoWMoM), pp.1–9. 93. Ogunfunmi, T. and Narasimha, M.J., 2012. Speech over VoIP networks: Advanced signal processing and system implementation. IEEE Circuits and Systems Magazine, 12(2), pp.35–55. 94. Ohrtman, F., 2004. Voice Over 802.11, Boston: Artech House. 95. Paul, T.K. and Ogunfunmi, T., 2009. Evolution, insights and challenges of the PHY layer for the emerging ieee 802.11 n amendment. IEEE Communications Surveys & Tutorials, 11(4), pp.131–150. 96. Peng, F., Peng, B. and Qian, D., 2010. Performance analysis of IEEE 802.11e enhanced distributed channel access. IET Communications, 4(6), pp.728–738.166 97. Perić, Z. and Nikolić, J., 2012. An adaptive waveform coding algorithm and its application in speech coding. Digital Signal Processing, 22(1), pp.199–209. 98. Pirovano, A. and Garcia, F., 2013. A New Survey on Improving TCP Performances over Geostationary Satellite Link. Network and Communication Technologies, 2(1), pp.1–18. 99. Pourqasem, J., Karimi, S. and Edalatpanah, S., 2012. A Survey of Voice Over Internet Protocol (VOIP) Technology. International Computer Mathematical Science and Applications, 6(3–4), pp.53–62. 100. Rademacher, M., 2015. Performance estimation and optimization of the IEEE802. 11 MAC layer for long distance point-to-point links, Sankt Augustin: University of Applied Sciences Bonn-Rhein-Sieg. 101. Raj M. R., C., Chacko, N. marium, Major, J. and D, S., 2013. A Comprehensive Overview on Different Network Simulators. International Journal of Engineering Science and Technology, 5(1), pp.325–332. 102. Reynolds, R. and Rix, A., 2001. Quality VoIP—an engineering challenge. BT Technology Journal, 19(2), pp.23–32. 103. Sadiwala, R. and Saxena, M., 2015. Performance Evaluation of Next Generation Networks using OPNET Simulator. Communications on Applied Electronics (CAE), 2(4), pp.32–37.167 104. Sarma, A., Chakraborty, S., Nandi, S. and Choubey, A., 2014. Context Aware Inter-BSS Handoff in IEEE 802.11 Networks: Efficient Resource Utilization and Performance Improvement. Wireless Personal Communications, 77(4), pp.2587–2614. 105. Serrano, P., Banchs, A. and Azcorra, A., 2007. A Throughput and Delay Model for IEEE 802 . 11e EDCA Under Non Saturation. Wireless Personal Communications, 43(2), pp.467–479. 106. Sfairopoulou, A., 2008. A cross-layer mechanism for QoS improvements in VoIP over multi-rate WLAN networks, Barcelona: Universitat Pompeu Fabra. 107. Sharma, A., Negi, G., Dhiman, P.K. and Kapoor, K., 2015. A Review on various Voices over IP codecs for WMN. International Journal of Engineering Trends and Technology (IJETT), 25(3), pp.114–119. 108. Sharma, G., Ganesh, A. and Key, P., 2009. Performance analysis of contention based medium access control protocols. IEEE Transactions on Information Theory, 55(4), pp.1665–1682. 109. Siddique, A.R., Kamruzzaman, J. and Hossain, M.J., 2014. An analytical approach for voice capacity estimation over WiFi network using ITU-T E-model. IEEE Transactions on Multimedia, 16(2), pp.360–372.168 110. Singh, C.P., Vyas, O.P. and Tiwari, M.K., 2008. A Survey of Simulation in Sensor Networks. IEEE International Conference on Computational Intelligence for Modelling Control & Automation, pp.867–872. 111. Singh, H.P., Singh, S., Singh, J. and Khan, S.A., 2014. VoIP: State of art for global connectivity—A critical review. Journal of Network and Computer Applications, 37(2014), pp.365–379. 112. Singh, S.K., Kumar, A., Gupta, S. and Madan, R., 2011. Architectural performance of WiMAX over WiFi with reliable QoS over wireless communication. International Journal of Advanced Networking and Applications, 3(1), pp.1017–1024. 113. Sivanandam, S.N., Sumathi, S. and Deepa, S.N., 2007. Introduction to fuzzy logic using MATLAB, Berlin: Springer-Verlag. 114. Skordoulis, D., NI, Q., Chen, H.-H., Stephens, A.P., Liu, C. and Jamalipour, A., 2008. IEEE 802.11 n MAC frame aggregation mechanisms for next-generation high-throughput WLANs. IEEE Wireless Communications, 15(1), pp.40–47. 115. Sun, L., Mkwawa, I.-H., Jammeh, E. and Ifeachor, E., 2013. Guide to voice and video over IP: for fixed and mobile networks, London: Springer-Verlag. 116. Swain, P., Chakraborty, S., Nandi, S. and Bhaduri, P., 2014. Performance modeling and evaluation of IEEE 802.11 IBSS power save mode. Ad Hoc Networks, 13(2014), pp.336– 350.169 117. Tang, J., Cheng, Y. and Zhuang, W., 2014. Real-time misbehavior detection in IEEE 802.11-based wireless networks: An analytical approach. IEEE Transactions on Mobile Computing, 13(1), pp.146–158. 118. Tantra, J.W., Foh, C.H. and Bianchi, G., 2006. Analysis of the IEEE 802 . 11e EDCA Under Statistical Traffic. IEEE International Conference on Communications, pp.546–551. 119. Tao, Z. and Panwar, S., 2006. Throughput and delay analysis for the IEEE 802.11e enhanced distributed channel access. IEEE Transactions on Communications, 54(4), pp.596–603. 120. Tariq, A.S.M. and Perveen, K., 2010. Contention Window Analysis and Proposed Algorithm for Collision Minimization of IEEE 802 . 11e EDCA. Proceedings of the World Congress on Engineering and Computer Science, pp.20–23. 121. Tian, G., Camtepe, S. and Tian, Y.C., 2016. A Deadline-Constrained 802.11 MAC Protocol with QoS Differentiation for Soft Real-Time Control. IEEE Transactions on Industrial Informatics, 12(2), pp.544–554. 122. Tinnirello, I., Bianchi, G., Xiao, Y. and Member, S., 2010. Refinements on IEEE 802 . 11 Distributed Coordination Function Modeling Approaches. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 59(3), pp.1055–1067.170 123. Toral-Cruz, H., Pathan, A.-S.K. and Pacheco, J.C.R., 2013. Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov models. Mathematical and Computer Modelling, 57(11), pp.2832–2845. 124. Touil, H., Fakhri, Y. and Benattou, M., 2012. Energy-efficient MAC protocol based on IEEE 802.11 e for Wireless Multimedia Sensor Networks. IEEE International Conference on Multimedia Computing and Systems (ICMCS). 2012 pp. 53–58. 125. Ulseth, T. and Engelstad, P., 2006. Voice over WLAN (VoWLAN)-A wireless voice alternative. TELEKTRONIKK, 102(1), pp.82–96. 126. Verma, P.K. and Wang, L., 2011. Voice Over IP Networks: Quality of Service, Pricing and Security, Berlin: Springer-Verlag. 127. Wang, C.-H. and Liu, Y.-S., 2011. A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes. Journal of Network and Computer Applications, 34(5), pp.1545–1556. 128. Wang, H., Li, J., Zhao, C. and Ying, Z., 2013. Design of an Embedded Streaming Media Server in video monitoring. IEEE Ninth International Conference on Natural Computation (ICNC), pp.1324–1328. 129. Wang, J., S, M. and Jing, L., 2009. A random adaptive method to adjust MAC parameters in IEEE802. 11e WLAN. Journal of Central South University of Technology, 16(4), pp.629–634.171 130. Wang, Y., Gamage, T.T. and Hauser, C.H., 2016. Security Implications of Transport Layer Protocols in Power Grid Synchrophasor Data Communication. IEEE Transactions on Smart GRID, 7(2), pp.807–816. 131. Xiao, Y., 2005. Performance Analysis of Priority Schemes for IEEE 802.11 and IEEE 802.11e Wireless LANs. IEEE Transactions on Wireless Communications, 4(4), pp.1506– 1515. 132. Yadav, N. and Sachan, S., 2014. Analysis and the Performance Effectiveness of RTS / CTS mechanism in IEEE 802 . 11. International Journal of Emerging Trends and Technology in Computer Science (IJETTCS), 3(4), pp.22–26. 133. Yao, Y.-C., Wen, J.-H. and Weng, C.-E., 2012. The Performance Evaluation of IEEE 802.11e for QoS Support in Wireless LANs. Wireless Personal Communications, 69(1), pp.413–425. 134. Yao, Y., Rao, L. and Liu, X., 2013. Performance and reliability analysis of IEEE 802.11p safety communication in a highway environment. IEEE Transactions on Vehicular Technology, 62(9), pp.4198–4212. 135. Yeh, H.-L., Chen, T.-H. and Shih, W.-K., 2014. Robust smart card secured authentication scheme on SIP using Elliptic Curve Cryptography. Computer Standards & Interfaces, 36(2), pp.397–402.172 136. Yoo, K.K. and Kim, R.Y., 2014. An Expedited WiFi Connection Establishment Scheme for Railroad Wireless Communications. International Journal of Multimedia and Ubiquitous Engineering, 9(6), pp.361–366. 137. Yu, Y. and Yao, Y., 2012. Improved AODV routing protocol for wireless sensor networks and implementation using OPNET. IEEE Third International Conference on Intelligent Control and Information Processing (ICICIP), pp.709–713. 138. Zaidi, M., Bhar, J., Ouni, R. and Tourki, R., 2011. Reducing wi-fi handover delay using a new positioning process. IEEE International Conference on Communications, Computing and Control Applications (CCCA), pp.1–6. 139. Zhang, B., Gao, Z., Gao, F., Zeng, X. and Hsu, D., 2012. The Throughput Analysis of IEEE 802.11 a WLAN with Low-Rate Access Nodes. IEEE 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), pp.1–4. 140. Zhao, Q., Tsang, D.H.K. and Sakurai, T., 2013. A Scalable and Accurate Nonsaturated IEEE 802.11e EDCA Model for an Arbitrary Buffer Size. IEEE Transactions on mobile computing, 12(12), pp.2455–2469. 141. Zhu, D., Xu, L., Zhu, Y. and Tian, X., 2014. Implementing PMIPv6 Protocol Based on Extended Service Set for IEEE 802.11 Infrastructure WLAN. IEEE International Conference on Identification, Information and Knowledge in the Internet of Things, pp.266–273.173 142. Zhu, R., Shu, W., Mao, T. and Deng, T., 2013. Enhanced MAC protocol to support multimedia traffic in cognitive wireless mesh networks. Multimedia Tools and Applications, 67(1), pp.269–288.