{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T04:22:18Z","timestamp":1748406138970,"version":"3.41.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319188010"},{"type":"electronic","value":"9783319188027"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18802-7_5","type":"book-chapter","created":{"date-parts":[[2015,5,20]],"date-time":"2015-05-20T01:41:04Z","timestamp":1432086064000},"page":"26-38","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Revisiting IEEE 802.11 Backoff Process Modeling Through Information Entropy Estimation"],"prefix":"10.1007","author":[{"given":"Faisal","family":"Iradat","sequence":"first","affiliation":[]},{"given":"Sayeed","family":"Ghani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,21]]},"reference":[{"key":"5_CR1","unstructured":"IEEE 802.11-2012: IEEE Standard for Information technology\u2013Telecommunications and information exchange between systems Local and metropolitan area networks\u2013Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE, 802.11-2012 (2012)"},{"key":"5_CR2","unstructured":"IEEE 802.11-1999: IEEE Standard for Information Technology- Telecommunications and Information Exchange Between Systems- Local and Metropolitan Area Networks- Specific Requirements- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. ANSI IEEE Std 80211 1999 Ed. R2003, pp. 1\u2013513 (2003)"},{"key":"5_CR3","unstructured":"Bordenave, C., McDonald, D., Prouti\u00e8re, A.: Random multi-access algorithms - a mean field analysis. In: Proceedings of ACCCC 2005, Monticello, IL, USA (2005)"},{"issue":"3","key":"5_CR4","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1109\/49.840210","volume":"18","author":"G Bianchi","year":"2000","unstructured":"Bianchi, G.: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas. Commun. 18(3), 535\u2013547 (2000)","journal-title":"IEEE J. Sel. Areas. Commun."},{"issue":"2","key":"5_CR5","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1023\/A:1016637622896","volume":"7","author":"YC Tay","year":"2001","unstructured":"Tay, Y.C., Chua, K.C.: A capacity analysis for the IEEE 802.11 MAC protocol. Wirel. Netw. 7(2), 159\u2013171 (2001)","journal-title":"Wirel. Netw."},{"issue":"6","key":"5_CR6","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1109\/90.893874","volume":"8","author":"F Cali","year":"2000","unstructured":"Cali, F., Conti, M., Gregori, E.: Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit. IEEE ACM Trans. Netw. 8(6), 785\u2013799 (2000)","journal-title":"IEEE ACM Trans. Netw."},{"issue":"4","key":"5_CR7","doi-asserted-by":"publisher","first-page":"878","DOI":"10.1109\/TNET.2007.904010","volume":"16","author":"O Tickoo","year":"2008","unstructured":"Tickoo, O., Sikdar, B.: Modeling queueing and channel access delay in unsaturated IEEE 802.11 random access MAC based wireless networks. IEEE ACM Trans. Netw. 16(4), 878\u2013891 (2008)","journal-title":"IEEE ACM Trans. Netw."},{"issue":"3","key":"5_CR8","doi-asserted-by":"publisher","first-page":"1665","DOI":"10.1109\/TIT.2008.2009608","volume":"55","author":"G Sharma","year":"2009","unstructured":"Sharma, G., Ganesh, A., Key, P.: Performance analysis of contention based medium access control protocols. IEEE Trans. Inf. Theory 55(3), 1665\u20131682 (2009)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"5_CR9","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/1870178.1870191","volume":"38","author":"J Cho","year":"2010","unstructured":"Cho, J., Le Boudec, J.Y., Jiang, Y.: On the validity of the fixed point equation and decoupling assumption for analyzing the 802.11 MAC protocol. SIGMETRICS Perform. Eval. Rev. 38(2), 36\u201338 (2010)","journal-title":"SIGMETRICS Perform. Eval. Rev."},{"issue":"3","key":"5_CR10","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1109\/TVT.2009.2029118","volume":"59","author":"I Tinnirello","year":"2010","unstructured":"Tinnirello, I., Bianchi, G., Xiao, Y.: Refinements on IEEE 802.11 distributed coordination function modeling approaches. IEEE Trans. Veh. Technol. 59(3), 1055\u20131067 (2010)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"5_CR11","first-page":"1","volume":"99","author":"L Dai","year":"2012","unstructured":"Dai, L., Sun, X.: A unified analysis of IEEE 802.11 DCF networks: stability, throughput and delay. IEEE Trans. Mob. Comput. 99, 1 (2012)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"8","key":"5_CR12","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1109\/LCOMM.2005.1496592","volume":"9","author":"K Duffy","year":"2005","unstructured":"Duffy, K., Malone, D., Leith, D.J.: Modeling the 802.11 distributed coordination function in non-saturated conditions. IEEE Commun. Lett. 9(8), 715\u2013717 (2005)","journal-title":"IEEE Commun. Lett."},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Pham, P.P., Perreau, S., Jayasuriya, A.: Performance analysis of the IEEE 802.11 DCF. In: Proceedings of APCC 2005, Perth, Australia, pp. 764-768 (2005)","DOI":"10.1109\/APCC.2005.1554165"},{"issue":"6","key":"5_CR14","doi-asserted-by":"publisher","first-page":"924","DOI":"10.1093\/comjnl\/bxs172","volume":"57","author":"F Iradat","year":"2014","unstructured":"Iradat, F., Andreev, S., Ghani, S., Nabi, S.I., Arain, W.: Revisiting assumptions in backoff process modeling and queueing analysis of wireless local area networks (WLANs). Comput. J. 57(6), 924\u2013938 (2014)","journal-title":"Comput. J."},{"key":"5_CR15","unstructured":"Iradat, F., Andreev, S., Ghani, S.: Load based approach for backoff process modeling and queueing analysis of IEEE 802.11 based wireless LANs. In: Proceedings of NZCSRSC 2012. University of Otago, Otago (2012)"},{"issue":"3","key":"5_CR16","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1016\/S0140-3664(01)00369-3","volume":"25","author":"E Ziouva","year":"2002","unstructured":"Ziouva, E., Antonakopoulos, T.: CSMA\/CA performance under high traffic conditions: throughput and delay analysis. Comput. Commun. 25(3), 313\u2013321 (2002)","journal-title":"Comput. Commun."},{"issue":"2","key":"5_CR17","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/LCOMM.2005.02008","volume":"9","author":"CH Foh","year":"2005","unstructured":"Foh, C.H., Tantra, J.W.: Comments on IEEE 802.11 saturation throughput analysis with freezing of backoff counters. IEEE Commun. Lett. 9(2), 130\u2013132 (2005)","journal-title":"IEEE Commun. Lett."},{"issue":"1","key":"5_CR18","first-page":"67","volume":"2005","author":"P Chatzimisios","year":"2005","unstructured":"Chatzimisios, P., Boucouvalas, A.C., Vitsas, V.: IEEE 802.11 wireless LANs: performance analysis and protocol refinement. EURASIP J. Wirel. Commun. 2005(1), 67\u201378 (2005)","journal-title":"EURASIP J. Wirel. Commun."},{"issue":"10","key":"5_CR19","doi-asserted-by":"publisher","first-page":"3256","DOI":"10.1109\/TWC.2011.072511.101227","volume":"10","author":"E Felemban","year":"2011","unstructured":"Felemban, E., Ekici, E.: Single hop IEEE 802.11 DCF analysis revisited: accurate modeling of channel access delay and throughput for saturated and unsaturated traffic cases. IEEE Trans. Wirel. Commun. 10(10), 3256\u20133266 (2011)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"4","key":"5_CR20","doi-asserted-by":"publisher","first-page":"288","DOI":"10.7326\/0003-4819-128-4-199802150-00007","volume":"128","author":"JM Keynes","year":"1998","unstructured":"Keynes, J.M.: A treatise on probability. Ann. Intern. Med. 128(4), 288 (1998)","journal-title":"Ann. Intern. Med."},{"key":"5_CR21","unstructured":"The Network Simulator - ns-2. http:\/\/www.isi.edu\/nsnam\/ns\/"},{"key":"5_CR22","volume-title":"Queueing Systems","author":"L Kleinrock","year":"1975","unstructured":"Kleinrock, L.: Queueing Systems, vol. 1. Wiley-Interscience, New York (1975)"},{"key":"5_CR23","volume-title":"Telecommunication Networks: Protocols, Modeling and Analysis","author":"M Schwartz","year":"1986","unstructured":"Schwartz, M.: Telecommunication Networks: Protocols, Modeling and Analysis. Addison-Wesley Longman Publishing Co., Inc., Boston (1986)"},{"issue":"3","key":"5_CR24","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1504\/IJWMC.2009.028901","volume":"3","author":"X Wang","year":"2009","unstructured":"Wang, X., Min, G., Guan, L.: Performance modelling of IEEE 802.11 DCF using equilibrium point analysis. Int. J. Wirel. Mob. Comput. 3(3), 201\u2013209 (2009)","journal-title":"Int. J. Wirel. Mob. Comput."},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Rathod, P., Dabeer, O., Karandikar, A., Sahoo, A.: Characterizing the exit process of a non-saturated IEEE 802.11 wireless network. In: Proceedings of MobiHoc, New Orleans, Louisiana, USA, pp. 249\u2013258 (2009)","DOI":"10.1145\/1530748.1530783"},{"key":"5_CR26","volume-title":"The Human Use of Human Beings: Cybernetics and Society","author":"N Wiener","year":"1954","unstructured":"Wiener, N.: The Human Use of Human Beings: Cybernetics and Society. Doubleday, New York (1954)"},{"issue":"1","key":"5_CR27","first-page":"379","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. ATT Tech. J. 27(1), 379\u2013423 (1948)","journal-title":"ATT Tech. J."},{"key":"5_CR28","doi-asserted-by":"crossref","DOI":"10.4324\/9780203814505","volume-title":"Perspectives on Information","author":"M Ramage","year":"2011","unstructured":"Ramage, M., Chapman, D.: Perspectives on Information. Routledge, New York (2011)"},{"issue":"3","key":"5_CR29","first-page":"535","volume":"7","author":"R Hartley","year":"1928","unstructured":"Hartley, R.: Transmission of Information. ATT Tech. J. 7(3), 535\u2013563 (1928)","journal-title":"ATT Tech. J."},{"issue":"9","key":"5_CR30","doi-asserted-by":"publisher","first-page":"1248","DOI":"10.1109\/TMC.2010.258","volume":"10","author":"Q Zhao","year":"2011","unstructured":"Zhao, Q., Tsang, D.H.K., Sakurai, T.: Modeling nonsaturated IEEE 80211 DCF networks utilizing an arbitrary buffer size. IEEE Trans. Mob. Comput. 10(9), 1248\u20131263 (2011)","journal-title":"IEEE Trans. Mob. Comput."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Wireless Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18802-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T01:18:00Z","timestamp":1748395080000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18802-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319188010","9783319188027"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18802-7_5","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}