{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T14:59:42Z","timestamp":1770908382471,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,1,22]],"date-time":"2018-01-22T00:00:00Z","timestamp":1516579200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61701197"],"award-info":[{"award-number":["61701197"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571108"],"award-info":[{"award-number":["61571108"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61701284"],"award-info":[{"award-number":["61701284"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61761030"],"award-info":[{"award-number":["61761030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Foundation of State Key Laboratory of Networking and Switching Technology","award":["SKLNST-2016-2-14"],"award-info":[{"award-number":["SKLNST-2016-2-14"]}]},{"name":"Open Foundation of Key Laboratory of Wireless Communication","award":["2017WICOM01"],"award-info":[{"award-number":["2017WICOM01"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["JUSRP11742"],"award-info":[{"award-number":["JUSRP11742"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["JUSRP11738"],"award-info":[{"award-number":["JUSRP11738"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Open Research Fund of National Mobile Communications Research Laboratory","award":["2018D15"],"award-info":[{"award-number":["2018D15"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2017M622233"],"award-info":[{"award-number":["2017M622233"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2017M622103"],"award-info":[{"award-number":["2017M622103"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13638-018-1025-5","type":"journal-article","created":{"date-parts":[[2018,1,22]],"date-time":"2018-01-22T11:30:54Z","timestamp":1516620654000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Performance evaluation of the V2I fair access with a finite retry limit"],"prefix":"10.1186","volume":"2018","author":[{"given":"Qiong","family":"Wu","sequence":"first","affiliation":[]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhengquan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Cui","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,22]]},"reference":[{"issue":"12","key":"1025_CR1","doi-asserted-by":"publisher","first-page":"2898","DOI":"10.1016\/j.comcom.2008.01.030","volume":"31","author":"E Karamad","year":"2008","unstructured":"E Karamad, F Ashtiani, A modified 802.11-based MAC scheme to assure fair access for vehicle-to-vehicle communications. Comput. Commun. 31(12), 2898\u20132906 (2008)","journal-title":"Comput. Commun."},{"key":"1025_CR2","volume-title":"Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications","author":"IEEE 802.11","year":"1997","unstructured":"IEEE 802.11. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 1997."},{"issue":"1","key":"1025_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11276-014-0766-2","volume":"21","author":"Q Wu","year":"2015","unstructured":"Q Wu, J Zheng, Performance modeling and analysis of IEEE 802.11 DCF based fair channel access for vehicle-to-roadside communication in a non-saturated state. Wirel. Netw 21(1), 1\u201311 (2015)","journal-title":"Wirel. Netw"},{"key":"1025_CR4","first-page":"2575","volume-title":"Performance Modeling of IEEE 802.11 DCF Based Fair Channel Access for Vehicular-to-Roadside Communication in a Non-saturated State","author":"Q Wu","year":"2014","unstructured":"Q Wu, J Zheng, Performance Modeling of IEEE 802.11 DCF Based Fair Channel Access for Vehicular-to-Roadside Communication in a Non-saturated State (Proc. of IEEE International Conference on Communications(ICC), Sydney, 2014), pp. 2575\u20132580"},{"issue":"3","key":"1025_CR5","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1109\/49.840210","volume":"18","author":"G Bianchi","year":"2000","unstructured":"G Bianchi, Performance analysis of 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications 18(3), 535\u2013547 (2000)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"8","key":"1025_CR6","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/LCOMM.2005.1496592","volume":"9","author":"K Duffy","year":"2005","unstructured":"K Duffy, D Malone, D Leith, Modeling the 802.11 distributed coordination function in non-saturated conditions. IEEE Communication Letters 9(8), 717\u2013715 (2005)","journal-title":"IEEE Communication Letters"},{"issue":"1","key":"1025_CR7","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/TNET.2006.890136","volume":"15","author":"D Malone","year":"2007","unstructured":"D Malone, K Duffy, D Leith, Modeling the 802.11 distributed coordination function in non-saturated heterogeneous conditions. IEEE\/ACM Transaction on Networking 15(1), 159\u2013172 (2007)","journal-title":"IEEE\/ACM Transaction on Networking"},{"issue":"9","key":"1025_CR8","doi-asserted-by":"publisher","first-page":"5947","DOI":"10.1109\/TWC.2016.2574715","volume":"15","author":"X Sun","year":"2016","unstructured":"X Sun, L Dai, Performance optimization of CSMA networks with a finite retry limit. IEEE Trans. Wirel. Commun. 15(9), 5947\u20135962 (2016)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"8","key":"1025_CR9","doi-asserted-by":"publisher","first-page":"3875","DOI":"10.1109\/TVT.2014.2306014","volume":"63","author":"A Banchs","year":"2014","unstructured":"A Banchs, A Qlica, L Eznarriaga, D Kowalsk, P Sereano, Performance analysis and algorithm selection for reliable multicast in IEEE 802.11aa wireless LAN. IEEE Trans. Veh. Technol. 63(8), 3875\u20133891 (2014)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1025_CR10","first-page":"10","volume-title":"Non-saturation Throughput Analysis of IEEE 802.11DCF Considering Short Retry Limit for Single Hop ad hoc Networks","author":"N Gupta","year":"2013","unstructured":"N Gupta, C Rai, Non-saturation Throughput Analysis of IEEE 802.11DCF Considering Short Retry Limit for Single Hop ad hoc Networks (Proc. of 2013 second international conference on future generation communication technology(FGCT), London, 2013), pp. 10\u201315"},{"issue":"9","key":"1025_CR11","doi-asserted-by":"publisher","first-page":"1852","DOI":"10.1109\/LCOMM.2016.2588493","volume":"20","author":"F Babich","year":"2016","unstructured":"F Babich, M Comisso, R Corrado, F Merazka, Joint voice\/video retry limit adaptation for on-demand streaming over WiFi networks. IEEE Commun. Lett. 20(9), 1852\u20131855 (2016)","journal-title":"IEEE Commun. Lett."},{"issue":"5","key":"1025_CR12","doi-asserted-by":"publisher","first-page":"1279","DOI":"10.1109\/TPDS.2015.2447528","volume":"27","author":"S Rashwand","year":"2016","unstructured":"S Rashwand, J Misic, V Misic, Analysis of CSMA\/CA mechanism of IEEE 802.15.6 under non-saturation regime. IEEE Transactions on Parallel and Distributed Systems 27(5), 1279\u20131288 (2016)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"11","key":"1025_CR13","doi-asserted-by":"publisher","first-page":"6180","DOI":"10.1109\/TWC.2014.2337315","volume":"13","author":"L Zheng","year":"2014","unstructured":"L Zheng, M Ni, L Cai, J Pan, C Ghosh, K Doppler, Performance analysis of group-synchronized DCF for dense IEEE 802.11 networks. IEEE Trans. Wirel. Commun. 13(11), 6180\u20136192 (2014)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"4","key":"1025_CR14","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1109\/LWC.2015.2417166","volume":"4","author":"R Liao","year":"2015","unstructured":"R Liao, B Bellalta, M Oliver, Modelling and enhancing full-duplex MAC for single-hop 802.11 wireless networks. IEEE Wireless Communications Letter 4(4), 349\u2013352 (2015)","journal-title":"IEEE Wireless Communications Letter"},{"issue":"8","key":"1025_CR15","doi-asserted-by":"publisher","first-page":"1536","DOI":"10.1109\/TMC.2014.2362754","volume":"14","author":"P Swain","year":"2015","unstructured":"P Swain, S Chakraboty, S Nandi, P Bhaduri, Performance modeling and analysis of IEEE 802.11 IBSS PSM in different traffic conditions. IEEE Trans. Mob. Comput. 14(8), 1536\u20131233 (2015)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"2","key":"1025_CR16","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1049\/el.2014.2113","volume":"51","author":"T Madhavi","year":"2015","unstructured":"T Madhavi, G Rao, Modelling collision alleviating DCF protocol with finite retry limits. Electron. Lett. 51(2), 185\u2013187 (2015)","journal-title":"Electron. Lett."},{"key":"1025_CR17","doi-asserted-by":"publisher","first-page":"10649","DOI":"10.1109\/ACCESS.2017.2710052","volume":"5","author":"B Li","year":"2017","unstructured":"B Li, S Chen, G Sutton, Y Shi, R Liu, MAC performance analysis for drive-thru Internet networks with Rayleigh capture. IEEE ACCESS 5, 10649\u201310661 (2017)","journal-title":"IEEE ACCESS"},{"issue":"4","key":"1025_CR18","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.1109\/TVT.2015.2425960","volume":"65","author":"J Zheng","year":"2016","unstructured":"J Zheng, Q Wu, Performance modeling and analysis of the IEEE 802.11p EDCA mechanism for VANET. IEEE Trans. Veh. Technol. 65(4), 2673\u20132687 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1025_CR19","first-page":"57","volume-title":"Performance Modeling of the IEEE 802.11p EDCA Mechanism for VANET","author":"Q Wu","year":"2014","unstructured":"Q Wu, J Zheng, Performance Modeling of the IEEE 802.11p EDCA Mechanism for VANET (proc. of IEEE Globe Communication Conference(GLOBECOM), Austin, 2014), pp. 57\u201363"},{"issue":"3","key":"1025_CR20","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1007\/s11276-015-1000-6","volume":"22","author":"Q Wu","year":"2016","unstructured":"Q Wu, J Zheng, Performance modeling and analysis of the ADHOC MAC protocol for vehicular networks. Wirel. Netw 22(3), 799\u2013812 (2016)","journal-title":"Wirel. Netw"},{"key":"1025_CR21","first-page":"3646","volume-title":"Performance Modeling and Analysis of the ADHOC MAC Protocol for VANETs","author":"Q Wu","year":"2015","unstructured":"Q Wu, J Zheng, Performance Modeling and Analysis of the ADHOC MAC Protocol for VANETs (proc. of IEEE International Conference on Communications (ICC), London, 2015), pp. 3646\u20133652"},{"issue":"6","key":"1025_CR22","doi-asserted-by":"publisher","first-page":"1819","DOI":"10.1007\/s11276-015-1066-1","volume":"22","author":"G Chen","year":"2016","unstructured":"G Chen, J Zheng, L Shen, A preset threshold based cross-tier handover algorithm for uplink co-channel interference mitigation in two-tier Femtocell networks. Wirel. Netw 22(6), 1819\u20131835 (2016)","journal-title":"Wirel. Netw"},{"key":"1025_CR23","doi-asserted-by":"crossref","unstructured":"K Xiong, B Wang, C Jiang, L Liu, A broad beamforming approach for high-mobility communications. IEEE Trans. Veh. Technol. 66(11), 10546-10550 (2017)","DOI":"10.1109\/TVT.2017.2734944"},{"key":"1025_CR24","doi-asserted-by":"crossref","unstructured":"Y Lu, K Xiong, P Fan, Z Zhong, B Ai, The effect of power adjustment on handover in high-speed railway communication networks. IEEE ACCESS 5, 26237-26250 (2017)","DOI":"10.1109\/ACCESS.2017.2775044"},{"key":"1025_CR25","doi-asserted-by":"crossref","unstructured":"K Xiong, Y Zhang, P Fan, H Yang, X Zhou, Mobile service amount based link scheduling for high-mobility cooperative vehicular networks. IEEE Trans. Veh. Technol. 66(10), 9521-9533 (2017)","DOI":"10.1109\/TVT.2017.2714863"},{"key":"1025_CR26","doi-asserted-by":"crossref","unstructured":"T Li, K Xiong, P Fan, K Letaief, Service-oriented power allocation for high-speed railway wireless communications. IEEE ACCESS 5, 8343-8356 (2017)","DOI":"10.1109\/ACCESS.2017.2702616"},{"key":"1025_CR27","doi-asserted-by":"crossref","unstructured":"K Xiong, P Fan, Y Zhang, K Letaief, Towards 5G high mobility: A fairness-adjustable time-domain power allocation approach. IEEE ACCESS 5, 11817-11831 (2017)","DOI":"10.1109\/ACCESS.2017.2712710"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-018-1025-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1025-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1025-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T22:10:21Z","timestamp":1589839821000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-018-1025-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,22]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["1025"],"URL":"https:\/\/doi.org\/10.1186\/s13638-018-1025-5","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,22]]},"assertion":[{"value":"18 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"20"}}