• 沒有找到結果。

Integrating SIP and IEEE 802.11e to support handoff and multi-grade QoS for VoIP-over-WLAN applications

N/A
N/A
Protected

Academic year: 2021

Share "Integrating SIP and IEEE 802.11e to support handoff and multi-grade QoS for VoIP-over-WLAN applications"

Copied!
16
0
0

加載中.... (立即查看全文)

全文

(1)

Integrating SIP and IEEE 802.11e to support handoff and multi-grade

QoS for VoIP-over-WLAN applications

Jen-Jee Chen

a,⇑

, Ling Lee

b

, Yu-Chee Tseng

b a

Department of Electrical Engineering, National University of Tainan, Tainan 70005, Taiwan b

Department of Computer Science, National Chiao-Tung University, Hsin-Chu 30010, Taiwan

a r t i c l e

i n f o

Article history: Received 5 July 2009

Received in revised form 2 May 2010 Accepted 6 January 2011

Available online 11 January 2011 Responsible Editor: X.S. Shen

Keywords: IEEE 802.11e Quality of Service (QoS) Call admission control (CAC) Voice-over-IP (VoIP) Rate adaptation Handoff Wireless network

Session Initiation Protocol (SIP)

a b s t r a c t

With the increasing popularity of WLANs and the growing demand for VoIP services, there is a need to guarantee QoS for VoIP calls while support as many calls as possible. Prior efforts focus on call admission control (CAC), but did not address the important handoff and physical rate adaptation issues caused by mobility and wireless channel variation. Assuming that VoIP calls can be supported by multi-grade QoS levels and that handoff and rate adaptation are possible, we show how to conduct CAC and resource management by integrating SIP and the QoS mechanisms of IEEE 802.11e together. When wireless resource is stringent, our resource management can dynamically adjust the resource distri-bution among existing calls by controlling their supporting codecs and packetization inter-vals. This not only takes care of calls in bad channel conditions, but also can accept more calls. Thus multi-grade QoS is achieved with decreased blocking rate for new calls and less dropping rate for handoff calls. In addition, we also show how to achieve early resumption of resources for handoff calls. Both analytical and simulation results are presented to eval-uate the performance of the proposed schemes.

Crown Copyright Ó 2011 Published by Elsevier B.V. All rights reserved.

1. Introduction

A lot of research efforts have been dedicated to Voice-over-IP (VoIP) techniques. In particular, VoIP-over-WLAN (wireless local area network) is believed to be one of the most important Internet applications to offer a viable alter-native to traditional phone services. Before this happens, the critical QoS (Quality of Service) issues on WLAN have to be addressed. The IEEE 802.11e[1]has been defined to expand the 802.11 MAC protocol to support applications with QoS requirements. However, neither call admission control (CAC) nor resource management algorithm is spec-ified for VoIP applications.

User mobility and rate adaptation are two important factors concerning VoIP-over-WLAN services. With user

mobility, handoff between access points (APs) is inevitable. Failure to reserve sufficient bandwidths for handoff calls may force them being dropped. Dropping on-going calls has a very negative impact from users’ perspective. While resource reservation for handoff calls is necessary, main-taining fairness among handoff calls and existing calls within a WLAN is also important. On the other hand, IEEE 802.11 supports multiple transmission rates to adapt to physical channel conditions. However, to keep the same le-vel of QoS, using a lower transmission rate means that more communication time has to be allocated to that mo-bile station. It is a challenge to guarantee the QoS of VoIP calls over a multi-rate WLAN concerning user mobility and rate adaptation.

Recently, there have been increasing interests in sup-porting QoS for running VoIP-over-WLAN. In [2–4], the number of concurrent homogeneous VoIP sessions that can be supported in a WLAN is evaluated. Without consid-ering that calls in a WLAN may use different codecs and packetization intervals (PIs) and connections may have 1389-1286/$ - see front matter Crown Copyright Ó 2011 Published by Elsevier B.V. All rights reserved.

doi:10.1016/j.comnet.2011.01.005

⇑Corresponding author.

E-mail addresses:jjchen@mail.nutn.edu.tw(J.-J. Chen),liling@cs.nctu. edu.tw(L. Lee),yctseng@cs.nctu.edu.tw(Y.-C. Tseng).

Contents lists available atScienceDirect

Computer Networks

(2)

variable rates, these CAC schemes are not generic enough. Ref.[5]proposes to admit streams when the total demand does not exceed the achievable bandwidth in the WLAN, where the achievable bandwidth is evaluated from the payload size per packet and physical rates. References

[6–8]propose to replace achievable bandwidth by indexes

such as channel utilization and collision rates to determine whether a new call can be admitted or not. In[9], a CAC scheme based on collision probability is proposed, where the collision probability is calculated from the measured channel busy probability. Reference[10]manipulates the CWmin size to accept as many calls as possible and reject calls when there is no applicable CWmin for stations. In

[11], it claims that when the collision probability is very small, the channel busy ratio is almost the same as the channel utilization. Moreover, it is shown that the optimal achievable channel utilization is about 0.9 (without RTS/CTS) or 0.95 (with RTS/CTS), which is independent of the number of active nodes and packet sizes. After the optimal point, adding more calls will increase both packet delays and collision rates dramatically and drop network throughput quickly. On the other hand, several works

[12–14] have exploited the point coordination function

(PCF) to enhance the voice capacity over WLANs. However, PCF is not supported by most available equipments in the market. There are also some model-based admission con-trol schemes[15–17]proposed for CAC. But they all con-sider a saturated condition, which is not always true since we often experience non-saturated conditions. As we can see, all these works do not consider the issues of handoff and physical rate adaptation in WLANs.

Rate adaptation and call handoff can both vary the required resource in a WLAN. However, existing works as reviewed above all reserve fixed resource for a call based

on the initial physical rate when it first joined the WLAN. How to conduct resource management to support VoIP over multi-rate WLANs is a challenge. Typical multimedia applications can tolerate some degree of temporary band-width fluctuation with no or little perceived degradation in quality by using a rate-adaptive codec or hierarchical encoding[18–20]. Although this is also applicable to VoIP applications, the range of required resources that can be adapted is somewhat limited. In this work, we propose CAC and resource management mechanisms to support handoff and multi-grade QoS for VoIP over multi-rate WLANs. When handoff calls are accepted to a QAP (Quality of Service Access Point) or when physical transmission rates of calls drop, we will see increasing competition among QSTAs (Quality of Service Stations) and thus decreasing bandwidth shares of existing calls. Our main idea is to change the codecs and/or PIs of some existing calls to de-grade their QoS levels when resources are too stringent. We show that the new call blocking rate and the handoff call dropping rate can both benefit from such adaptations. In particular, we will show that changing the PIs of calls is quite effective to ‘‘squeeze’’ some QSTAs’ medium time so as to serve those QSTAs increasing their required medium time due to mobility. Our scheme will adopt the cross-layer architecture in [21] to integrate SIP and IEEE 802.11e together to conduct CAC to facilitate VoIP traffics over IEEE 802.11e multi-rate WLANs with possible handoff among WLAN. Note that SIP is the most promising signal-ing protocol for VoIP over the Internet. We will also adopt the ITU-T-recommended 150 ms as the bound for one-way end-to-end delay [22]. To summarize, our work contrib-utes in proposing a systematical method for changing PIs and codecs of VoIP calls to improve the overall capacity of a WLAN. Element ID (12) Length (18) QoS Info Reserved AC_BE Parameters Record AC_BK Parameters Record AC_VI Parameters Record AC_VO Parameters Record 1 1 1 1 4 4 4 4

ACI / AIFSNECWmin/ECWmax TXOPLimit 1 1 2 Octets:

Octets:

AIFSN ACM ACI Reserved 4 1 2 1

ECWmin 4 4

ECWmax

Bits: Bits:

Fig. 1. Structure of the IEEE 802.11e EDCA_Parameter_Set information element.

Octets: Element ID (13) Length (55) TS Info Nominal MSDU Size Maximum MSDU Size Minimum Service Interval Maximum Service Interval Inactivity Interval 1 1 3 2 2 4 4 4 Suspension Interval 4 Minimum Data Rate Mean Data Rate Maximum Burst Size Minimum PHY Rate Surplus Bandwidth Allowance 4 4 2 Medium Time 2 Service Start Time 4 Peak Data Rate 4 4 4 4 Delay Bound

(3)

The rest of this paper is organized as follows. Some pre-liminaries are given in Section2. The proposed QoS handoff mechanisms are introduced in Section3. Sections4 and 5

present our analysis and simulation results, respectively. Finally, conclusions are drawn in Section6.

2. Preliminaries

2.1. IEEE 802.11e MAC protocol

The IEEE 802.11e Working Group defines a supplement to the existing legacy 802.11 MAC sublayer to support QoS. It introduces a new HCF (Hybrid Coordination Function), which includes two access mechanisms, EDCA (Enhanced Distributed Channel Access) and HCCA (HCF Controlled Chan-nel Access), corresponding to the existing DCF and PCF, respectively, in 802.11. Two new features, AC (Access Cate-gory) and TXOP (Transmission Opportunity), are introduced in HCF. A TXOP is a bounded time interval during which a QSTA (Quality of Service Station) can hold the medium and transmit multiple frames consecutively separated by SIFS (short inter-frame spacing). A station can obtain a TXOP by either contention or scheduled access assigned by polling messages.

2.1.1. EDCA of IEEE 802.11e

To differentiate services, the eight user priorities in 802.1D are mapped to four IEEE 802.11e ACs. Each AC has its own transmit queue with an independent EDCA function to contend the medium. These four ACs are

back-Caller Callee George@station1.nctu.edu.tw Mary@station2.nctu.edu.tw INVITE Ringing OK ACK Communication BYE OK

Fig. 3. An example of SIP call setup and tear-down.

(a)

(b)

(4)

ground (AC_BK), best effort (AC_BE), video (AC_VI), and voice (AC_VO), and are prioritized by different AIFS (Arbitration Inter-Frame Space) and contention window sizes. If a collision occurs among ACs within a QSTA, the highest priority AC wins the contention and the other AC(s) will backoff. The EDCA_Parameter_Set information elements (Fig. 1), which are sent in beacon frames, specify the parameters of ACs.

2.1.2. Admission control in EDCA

IEEE 802.11e allows a QSTA to request to add a new traffic stream by sending an ADDTS Request to its QAP. The information carried in an ADDTS Request includes the direction of the stream and a TSPEC (Traffic Specification) information element (Fig. 2). Admission control is con-ducted by the QAP by calculating the needed MT (Medium Time) as opposed to its remaining MT. Then, an ADDTS Re-sponse can be replied.

2.2. SIP and SDP

SIP (Session Initiation Protocol) is a protocol for estab-lishing an IP multimedia session. It is an application-layer control protocol to setup, modify, and terminate multi-media sessions. While SIP is not used to transport multi-media traffic, it often chooses RTP (Real-time Transport Protocol) as its transportation protocol and uses SDP (Session Description Protocol)[23]to specify its session characteris-tics.Fig. 3shows an example of call setup and tear-down in SIP. When a caller wants to make a VoIP call with a callee, it sends an INVITE including the codecs that the caller sup-ports in an SDP message body.Fig. 4(a) shows an example, where G.726 (format 2), and G.723 (format 4) are the of-fered codecs, with 4400 as its receiving port. If the callee decides to accept the request, it replies a Ringing and an OK signal with the selected codec. InFig. 4(b), the selected codec is G.723, and the receiving port is 888. If the port number is 0, it means a rejection.

3. The proposed QoS mechanisms

We consider an IEEE 802.11e wireless network operat-ing in the infrastructure mode to support VoIP applica-tions. Although IEEE 802.11e supports QoS, the resource reservation and handoff handling issues for particular applications are left open to designers. In this work, we consider using SIP signaling to support VoIP over IEEE 802.11e networks.

We propose two mechanisms to solve the problems caused by handoff and rate adaptation. The first mecha-nism is a CAC algorithm, which is performed whenever a new call or a handoff call arrives at a QAP. The CAC algorithm accepts or rejects an arriving call according to the amount of available resources versus the QoS require-ments of the call. The second mechanism is a resource adjustment (RA) algorithm, whose purpose is to dynami-cally change bandwidth allocation among on-going calls in a QAP for better resource utilization and fairness. This is feasible because multimedia services can typically oper-ate under different bandwidths.

In order to dynamically adjust resource allocation, we assume that VoIP calls can be supported by multiple levels of QoS. Each QoS level corresponds to a voice codec and a PI, where PI is the period that voice data is encapsulated into packets for transmission. For most current systems, the default PI is 20 ms. Larger PIs would introduce less header overhead, but may suffer from higher delays and are more sensitive to packet loss. Given a PI and a data generation rate of k, the amount of data to be transmitted per PI is (k  PI + h), where h is the header overhead. Therefore, the bandwidth required per time unit is (k  PI + h)/PI = k + h/PI. Clearly, a larger PI will incur less traffic.

Suppose that for each codec there are k QoS levels and each QoS level corresponds to a PI. Note when a call changes from a PI to another PI0, the difference of resource

usage is (k + h/PI0)  (k + h/PI) = h(1/PI0 1/PI). This value is

only dependent of PI and PI0, but is independent of k (and

thus independent of which codec is used). Therefore, the system state of a QAP can be denoted as s ¼ ðs1;s2;

s3; . . . ;skÞ, where si is the number of calls served at the

ith level (these calls may use different codecs). The follow-ing terminologies will be used in our CAC and RA algorithms.

 Btotal: the total bandwidth of a QAP.

 Bth: the threshold of occupied bandwidth (below which

new calls can be accepted).

 Bfree: the current free bandwidth of the QAP.

 Bdeg: the maximum available free bandwidth of the QAP

after degrading all existing calls to the lowest QoS level.  PIdef: the default PI for all new calls.

 Walloc: the bandwidth allocated to the request call.

3.1. The call admission control algorithm

The CAC algorithm is to determine whether a new call or a handoff call can be accepted depending on the avail-able bandwidth in the network.Fig. 5shows the proposed CAC procedure. The caller under QAP1 first establishes a VoIP call with the callee by a SIP INVITE signal containing necessary codec and PI information. QAP1, on receiving this INVITE signal, will measure its current available re-source and the required rere-source to support this call (re-fer to box A inFig. 5). We will use the required medium time for the measurement. If the callee can successfully choose a codec, QAP1 will reserve sufficient resources for the call (refer to boxes C, D, and E in Fig. 5). Then, the voice communication can be started. When the caller moves out of the coverage of QAP1, the caller will actively look for the next serving QAP by sending IEEE 802.11 Probe Requests. When a QAP receives a Probe Request, it will measure its available bandwidth and reply an IEEE 802.11 Probe Response accordingly (refer to box A in

Fig. 5). The caller will collect all Probe Responses and

se-lect a new QAP (refer to box B in Fig. 5). Suppose that the caller selects QAP3. It will send QAP3 an IEEE 802.11 Re-Association Request to trigger QAP3 to execute resource reservation (refer to box C in Fig. 5). In the meanwhile, QAP3 and QAP1 will exchange the caller’s context by Inter Access Point Protocol (IAPP[24]). Via IAPP,

(5)

QAP1 is informed of the departure of the caller and may execute the RA algorithm. Finally, the caller will exchange IEEE 802.11e ADDTS Request and Response with QAP3

(refer to boxes D and E inFig. 5) to actually reserve the bandwidth. If these steps go through successfully, the caller and the callee can resume their voice communica-tion. In the following, we will explain the detail actions to be taken in boxes A, B, C, D, and E.

3.1.1. Resource estimation at the QAP (box A)

When a new call or a handoff call arrives at a QAP, the QAP will evaluate its available resource and the required resource of the call. In the new call event, the INVITE signal from the caller will carry all codec and PI information to the callee. In the handoff call event, we propose that the caller utilizes its Probe Requests to convey the codec and PI information with two new IEEE 802.11 information ele-ments: codec and PI.Fig. 6shows the proposed orders of

Caller QAP1 QAP3

INVITE INVITE Callee QAP4 Ringing OK Ringing OK ADDTS Request ADDTS Response ACK ACK Communication B Probe Response Probe Request A Probe Request A Probe Response Communication Authentication ADDTS Request D ADDTS Response E Re-Association Request C Security Block IAPP Move-Notify IAPP Move-Response Re-Association Response C D E A

Fig. 5. The proposed message flows of the CAC procedure in IEEE 802.11e networks.

1 2 SSID Supported Rates 8 Codec 9 Packetization Interval Information Elements Order 1 2 Timestamp Beacon Interval 3 Capability Information ... Information Elements Order ... 23 24 QBSS Load EDCA Parameter Set 26 27 Codec Packetization Interval

(a)

(b)

Fig. 6. The orders of information elements in (a) Probe Request and (b) Probe Response.

Table 1

The Packet Size Table, which contains the packet sizes (in bytes) when different codecs and packetization intervals are used.

Codec Data rate (kbps) Packetization interval (ms) 5 10 20 30 40 G.711 64 113 154 234 314 394 G.726 16 84 94 114 134 154 32 94 114 154 194 234 G.728 16 84 94 114 134 154 G.723.1 5.3 94 6.3 98

(6)

the information elements in Probe Request and Probe Response.

With these information, the QAP can estimate if it has sufficient resource to serve this call. To compute the re-quired resource, we propose that each QAP keeps a Packet Size Table (PST) as inTable 1. For example, using G.726 with a sampling rate of 32 kbps and PI = 20 ms, each packet is of size 154 bytes (80 bytes of voice payload, 40 bytes of IPv4/ UDP/RTP/error-checking overhead, and 34 bytes of MAC/ error-checking overhead). Using the beacon interval (BI) as the time unit, given a call’s codec, PI, and current physical rate r, we can compute the required Medium Time (MT) that should be reserved for the call per BI:

MTðcodec; PI; rÞ ¼ ðtotal time needed per BIÞ

¼ ðtime to send one packetÞ  ðBI=PIÞ  ðsurplus bandwidth allowanceÞ ¼ f½ðHRTPþ HUDPþ HIPþ HMACÞ þ Lðc; pÞ=r

þ ðDIFS þ a

v

erageCW þ PHY headerÞ þ ðSIFS þ ACKÞg  ðBI=PIÞ

 ðsurplus bandwidth allowanceÞ; ð1Þ where L(c, p) is the payload per packet when codec c and PI p are used, averageCW is the average contention window size seen by the QAP, and HRTP, HUDP, HIP, and HMAC are

header sizes of RTP, UDP, IP, and MAC packets, respectively. The value of averageCW may be estimated from recent sta-tistics of the QAP. The basic operation of 802.11e is shown

inFig. 7. Relevant parameters of 802.11e EDCA are listed in

Table 2. The surplus_bandwidth_allowance is to take the

extra medium access overhead (contention, collision, etc.) into account; in this work, we assume its value to be 1.1. This is consistent with the optimal channel utilization 0.9 found in[11]when RTS/CTS is disabled. For example, when BI is 1 s and min_PHY_rate is 11 Mbps, if we use G.726 with rate of 32 kbps and PI of 20 ms, then MT = [154/ 11 (bytes/Mbps) + (50 + 70 + 192) + (10 + 248)]  (1000/ 20)  1.1 = 37.51 ms.

Each QAP will keep its maximum available free band-width Bdeg, which is equal to Bfreeplus the releasable

re-source after moving all existing calls to the lowest QoS level. If a codec’s required MT is larger than the QAP’s Bdeg,

the QAP will drop the INVITE or the Probe Request silently or reply a SIP response to the caller with a status code of 480, which means ‘‘temporarily not available’’.

3.1.2. QAP selection at the caller (box B)

After scanning all channels, the caller will choose a tar-get QAP based on various criteria, such as signal strength, codec, PI, etc. For example, we may prefer a lighter loaded QAP. Alternatively, we may choose the one with better sig-nal quality. This is outside the scope of this work.

3.1.3. Resource reservation at QAP (box C)

First, we will determine the codec c, PI p, and physical rate r to be used by the call. The value of r can be measured from signal quality. In the new call event, the OK signal will contain the value of c, and we will assume p = PIdef. In the

handoff event, the Re-association Request will contain the current c and p used by the caller. Then the QAP will decide to accept or reject the call based on the following rules:

 If this is a handoff call, it will be accepted if the requested MT is no more than Bdeg; otherwise, the call

is rejected.

 If this is a new call, there are two cases:

– If MT(c, PImax, r) 6 Bdegand Bdeg> (Btotal Bth), the call

is accepted directly.

– If MT(c, PImax, r) 6 Bdegbut Bdeg6(Btotal Bth), the call

is accepted with a probability Pr.

Note that the selection of Prcan be based on the DCRS

(Dynamic Channel Reservation Scheme) proposed in [25]. In this work, we will only consider adjusting PI for handoff calls, although adjusting codec is also possible. In the above rules, we do not try to degrade a handoff call’s PI be-cause a handoff call is more vulnerable to packet loss, so keeping its original PI is essential.

If the call cannot be accepted, the QAP will drop the OK silently (for new call) or reply the Re-Association Response to the caller with a status code of 37, which means ‘‘The re-quest has been declined.’’ (for handoff call). If the call can be accepted, we will check if MT(c, p, r) 6 Bfree. If so, the

se-lected codec and PI will be relayed to the caller via an OK (for new call) or a Re-association Response (for handoff call). Otherwise, the current available resource is not able to support the request and we will call function degrade (c, p, r) in Fig. 8. The function will repeatedly select an Channel Busy

Sender Receiver

DIFS

Backoff DATA

PHY MAC PAYLOAD DIFS

SIFS

ACK

Backoff

Next Frame

Fig. 7. Basic operations of 802.11e EDCF.

Table 2

Parameters of IEEE 802.11e EDCA. RTP + UDP + IP header 40 bytes MAC header for DATA 34 bytes

PHY header 192ls

ACK 248ls

DIFS 50ls

SIFS 10ls

Slot time 20ls

CWmin (for voice) 7

(7)

existing call to reduce its QoS level. The call with the best QoS level will be degraded first. If there are multiple candi-dates, the one with the lowest physical rate will be de-graded first. Function next () will return the next QoS level. This is repeated until sufficient resources are re-leased. Note that for a new call, we do allow degrading its requested PI, as reflected in line 9 of the algorithm.

Fig. 9shows an example. Suppose that there are k = 4

QoS levels, and there are 3, 2, 0, and 2 calls with QoS levels 1, 2, 3, and 4, respectively, currently in the system, repre-sented by system state of (3, 2, 0, 2). Also suppose that the required resources for these QoS levels are (6.5, 7, 7.5, 8), (4.5, 5, 5.5, 6), (2.5, 3, 3.5, 4), and (0.5, 1, 1.5, 2), respectively (the four numbers map to four physical rates in an descending order). Assuming a total capacity of 35 for the QAP, it has no resource remaining. Now, suppose that

an incoming call requests a QoS level of 2 (physical rate = 1 Mbps). As the resource required is 6, we need to degrade three calls from QoS level 1 to level 2. The next incoming call also requests a QoS level of 2 (physical rate = 1 Mbps). The resource required is 6, too. We need to degrade three of level-2 calls. The calls with lower trans-mission rates should be degraded first, so we move two calls with 1 Mbps and one with 2 Mbps to level 3. Then the system state will change to (0, 4, 3, 2). The last incoming call requests a QoS level of 2 (physical rate = 5.5 Mbps). According to the algorithm, we move three level-2 calls to level 3. The final system state is (0, 2, 6, 2).

3.1.4. ADDTS request by the caller (box D)

After determining the codec and PI, the caller will send a bidirectional ADDTS Request to the QAP by including a Fig. 8. The bandwidth degrade algorithm.

Level 4 (0.5, 1, 1.5, 2)

(3,2,0,2) Bfree=0

Degradation

(Highest QoS Quality)

(Lowest QoS Quality)

R1 arrives (Rate = 1Mbps) (0,6,0,2) Bfree=0 (0,4,3,2) Bfree=0 (0,2,6,2) Bfree=1 time Total Capacity = 35 11 5.5 2 2 1 1 11 5.5 2 1 11 5.5 5.5 2 2 1 1 1 11 5.5 2 2 1 2 1 1 5.5 2 5.5 2 5.5 2 5.5 2 Level 3 (2.5, 3, 3.5, 4) Level 2 (4.5, 5, 5.5, 6) Level 1 (6.5, 7, 7.5, 8) R2 arrives (Rate = 1Mbps) R3 arrives (Rate = 5.5 Mbps)

(8)

TSPEC element to request for resources. We suggest to con-vey VoIP service requirements by the following fields in TSPEC:

 Minimum_Data_Rate = the acceptable longest PI of the corresponding codec.

 Mean_Data_Rate = the PI selected by the callee.  Maximum_Data_Rate = the acceptable shortest PI.  Medium_Time = the codec selected by the callee.

3.1.5. ADDTS response by the QAP (box E)

According to the caller’s ADDTS Request and the Packet Size Table, QAP can compute the required MT following Eq.(1). Each QAP keeps the following variables:

 TXOPBudget[ACi] = the remaining bandwidth that can be

allocated to ACi, i = 0, . . . , 3.

 TxAdDn[ACi][TSID] = the admitted MT for stream TSID of

ACiin the downlink direction.

 TxAdUp[ACi][TSID] = the admitted MT for stream TSID of

ACiin the uplink direction.

 TxAdDn[ACi] = this is set toP8TSIDTxAdDn½ACi

-½TSID, to record the overall resource allocated to ACiin

the downlink direction.

 TxUsedDn[ACi] = the summation of used MT of all

down-link streams of ACi.

Initially, TXOPBudget[ACi] contains all the bandwidth (in

terms of MT) that is reserved for ACi. Whenever a new

stream is added, the corresponding resource is subtract from TXOPBudget[ACi], and the resource is assigned to

TxAdDn[ACi][TSID] and/or TxAdUp[ACi][TSID]. Also, each

QSTA should keep the following variables:

 TxAdUp[ACi][TSID] = the admitted MT for stream TSID of

ACiin the uplink direction in this QSTA per BI.

 TxAdUp[ACi] = this is set toP8TSIDTxAdUp½ACi

-½TSID, to record the overall resource allocated to ACi in the uplink direction.

 TxUsedUp[ACi] = the summation of used MT of all uplink

streams of ACi.

Resource reservation at QAP is done as follows. First, we compute the value of TXOPBudget[ACi]  2  MT(c, p, r). If

the value is non-negative, there is sufficient resource to support this call and we can set variables as follows:

TXOPBudget½ACi ¼ TXOPBudget½ACi  2  MTðc; p; rÞ; TxAdDn½ACi½TSID ¼ MTðc; p; rÞ;

TxAdUp½ACi½TSID ¼ MTðc; p; rÞ;

TxAdDn½ACi ¼ TxAdDn½ACi þ TxAdDn½ACi½TSID:

Up to this point, the admitted resources have been guaranteed. The QAP will reply an ADDTS Response to the caller with the Mean_Data_Rate = p and Medium_Time = MT(c, p, r) in TSPEC. If there is no sufficient resource, then an ADDTS Response is replied with Medium_Time = 0.

At the caller’s side, if an ADDTS response with a positive Medium_Time is received, the QSTA will set its TxA-dUp[ACi][TSID] = Medium_Time, retrieves the PI in the

Mean_Data_Rate field, and passes it to the upper layer VoIP application program. Otherwise, the call is considered re-jected. In both cases, the caller should reply a response sig-nal with the proper status code to the callee.

3.2. The resource adjustment algorithm

Fairness among existing users and handoff users is an important issue. The goal of resource adjustment is to re-allocate bandwidth to calls for fairness. The RA algorithm may be triggered by the following two events: departure of calls and transmission rate change of existing calls (refer toFig. 10). On events that a call moves to a lower rate, the function degrade (c, p, r) will be called if there is no suffi-cient resource. On events that a call departs or moves to a higher rate, the value of Bfreewill be updated, and then

the function upgrade () inFig. 11will be invoked. This func-tion will repeatedly select an existing call to upgrade its QoS level. The call with the worst QoS level will be up-graded first. If there are multiple candidates, the one with the highest physical rate will be upgraded first. Function prev () will return the previous QoS level. This is repeated until Bfreeis not enough to upgrade any existing call.

(9)

Fig. 12shows an example. Suppose that there are k = 4 QoS levels, and the current system state is (4, 1, 1, 3). The resource requirement is the same as the example in

Fig. 9. Let the total capacity be 41. Suppose that a level 4

call leaves the network (physical rate = 1 Mbps), releasing a bandwidth of 2. The released bandwidth can upgrade the call at QoS level 4 with rate 11 Mbps to level 3. The sys-tem state after upgrade is (4, 1, 2, 1). Next, a level-2 call with rate 2 Mbps leaves, releasing a bandwidth of 5.5. This can upgrade the only call at level 4 to level 3 and the call at QoS level 3 with rate 11 Mbps to level 2, resulting a system state of (4, 1, 2, 0).

4. Analysis

In this section, we derive an analytical model to evalu-ate the performance of our QoS mechanisms. Our goal is to analyze the blocking probability of new calls, the dropping

probability of handoff calls, and the call dropping probabil-ity due to change of transmission rates. Without loss of generality, we assume all calls use the same G.726 codec at the default rate 32 kbps. Thus, during a degrade or up-grade process, calls will only change their PIs, but not co-dec. Suppose that there are m PIs, PI1, PI2, . . . , PIm (in an

ascending order), and y transmission rates, R1, R2, . . . , Ry

(in a descending order).

Due to mobility, the rate change of a QSTA is modeled by the state diagram inFig. 13. From each state, a QSTA can transit to a higher or a lower rate with a rate

m

follow-ing a Poisson distribution. In each QAP, new and handoff calls arrive by Poisson distributions with rates y  kn and

y  kh, respectively. These rates are evenly distributed to

calls of all physical rates R1, R2, . . . , Ry. Call holding time

(duration of a call) and cell residence time (duration of staying in a QAP) are exponentially distributed with means of 1/

l

hand 1/

l

r, respectively. Thus, the channel occupancy

Fig. 11. The bandwidth upgrade algorithm.

(4,1,1,3)

(Highest QoS Quality)

(Lowest QoS Quality) (Rate = 1Mbps)One departs

Bfree=2 Upgrade One departs (Rate = 2Mbps) Bfree=5.5 (4,1,2,0) (4,1,2,1)

time

Total Capacity = 41

11 5.5 1 11 5.5 5.5 5.5 5.5 5.5 11 2 2 11 5.5 2 1 11 5.5 2 1 11 5.5 2 1 Level 4 (0.5, 1, 1.5, 2) Level 3 (2.5, 3, 3.5, 4) Level 2 (4.5, 5, 5.5, 6) Level 1 (6.5, 7, 7.5, 8)

Bfree=0 Bfree=0 Bfree=1.5

(10)

time of a call is exponentially distributed with mean 1/

l

= 1/(

l

h+

l

r). The required bandwidth of a call with PImax

at the transmission rate Riis denoted byUi.

According to our CAC algorithm (refer to the while loop in degrade), a QAP will reject an incoming call when all existing calls cannot be further degraded (i.e., their PIs have reached PImax). Therefore, to obtain blocking and

dropping probabilities, we can assume that all calls use PImax. For simplicity, we assume that a QAP can support

y = 4 physical rates, 11, 5.5, 2 and 1 Mbps. For a bi-direc-tion voice stream, assuming BI = 1 s, surplus = 1.1, and PImax= 40 ms, the required MT per BI of a call under each

rate is listed inTable 3.

Our system can be modeled by a y = 4 dimensional Mar-kov process. Each system state is written as (n1, n2, n3, n4),

where niis the number of calls at rate Ri, i = 1, . . . , 4. For

each state (n1, n2, n3, n4), there are 14 possible state

transi-tions, as shown as Fig. 14, where n1= a, n2= b, n3= c,

n4= d. Horizontal transitions are caused by call arrival or

departure events. The arrival rates are all modeled by

kh+ Prkn. The departure rate for rate Riis ni

l

. For ease of

presentation, we let Pr= 1 when n1U1+ n2U2+ n3U3+

-n4U4< Bth; otherwise, new calls are accepted with a

prob-ability Pras defined in Section3.1. Vertical transitions are

caused by transmission rate change.

A simplified two-dimension Markov process is shown in

Fig. 15for the case of y = 2. The states marked by gray are

those with Pr= 1, where all new calls can be accepted.

Un-der other states, a new call will be dropped with a fixed probability (1  Pr).

Based on above state transition diagram, we can derive the steady-state probability Pn1;n2;...;ny of each state. There

are four cases:

Case I: For the state such that n1= n2=    = ny= 0,

yðkhþ knÞPn1;n2;...;ny¼

l

Xy i¼1

Pn1;n2;...;niþ1;...;ny: ð2Þ

Case II: For states such thatPyi¼1ðniUiÞ < Bth,

yðkhþ knÞ þ Xy i¼1 ni !

l

þ X y1 i¼1 niþ Xy i¼2 ni !

m

" # Pn1;n2;...;ny ¼X y i¼1 ðniþ 1Þ

l

Pn1;n2;...;niþ1;...;nyþ ðkhþ knÞPn1;n2;...;ni1;...;ny   þX y i¼2 ðniþ 1Þ

m

Pn1;n2;...;ni11;niþ1;...;ny   þX y1 i¼1 ðniþ 1Þ

m

Pn1;n2;...;niþ1;niþ11;...;ny   : ð3Þ Case III: For states such that Py

i¼1ðniUiÞ P Bth and Py i¼1ðniUiÞ þUy<Btotal, y kð hþ PrknÞ þ Xy i¼1 ni !

l

þ X y1 i¼1 niþ Xy i¼2 ni !

m

" # Pn1;n2;...;ny ¼X y i¼1 ðniþ 1Þ

l

Pn1;n2;...;niþ1;...;ny   þX y i¼1 khþ Iiþ IiPr   kn   Pn1;n2;...;ni1;...;ny   þX y i¼2 ðniþ 1Þ

m

Pn1;n2;...;ni11;niþ1;...;ny   þX y1 i¼1 ðniþ 1Þ

m

Pn1;n2;...;niþ1;niþ11;...;ny   ; ð4Þ where for z 2 1; . . . ; yf g, Iz¼ 1; P y i¼1 ðni

U

iÞ 

U

z<Bth; 0; otherwise: 8 < : Fig. 13. The state transition diagram of a QSTA’s rate change.

Table 3

The required MT of a bi-directional voice call under different physical rates under our analytical model.

Transmission rate (Mbps) 11 5.5 2 1

Occupied MT (s)/per session 0.041 0.050 0.083 0.134

(11)

Case IV: For states such that Pyi¼1ðniUiÞ 6 Btotal and Py i¼1ðniUiÞ UyPBth, Xy i¼1 Ii ! ðkhþ PrknÞ þ Xy i¼1 ni ! lþ X y1 i¼1 niþ Xy i¼2 ni ! m " # Pn1;n2;...;ny ¼X y1 i¼1 Iiðniþ 1Þlþ Iiþ1m   Pn1;n2;...;niþ1;...;ny   þ Iynyþ 1lPn1;n2;...;ny1;nyþ1þ ðkhþ PrknÞ X y i¼1 Pn1;n2;...;ni1;...;ny þX y i¼2 Ii1;iðniþ 1ÞmPn1;n2;...;ni11;niþ1;...;ny   þX y1 i¼1 ðniþ 1ÞmPn1;n2;...;niþ1;niþ11;...;ny   ; ð5Þ where for z 2 1; . . . ; yf g, Iz¼ 1; P y i¼1 ðni

U

iÞ þ

U

z6Btotal; 0; otherwise 8 < :

and for ðm; nÞ 2 ð1; 2Þ; ð2; 3Þ; . . . ; ðy  1; yÞf g,

Im;n¼ 1; P y i¼1 ðni

U

iÞ 

U

U

n6Btotal; 0; otherwise: 8 < :

Let Pbbe the blocking probability of new calls, Pdbe the

dropping probability of handoff calls, and Ptdbe the call

dropping probability due to change of transmission rates. Given any system state n ¼ ðn1;n2; . . . ;nyÞ, let the

band-width requirement

s

ðnÞ ¼Pyi¼1ðniUiÞ. We can derive:

Pb¼ X sðnÞPBth Pn1;n2;...;ny; ð6Þ Pd¼ 1 y Xy i¼1 X sðnÞþUi>Btotal Pn1;n2;...;ny ! ; ð7Þ Ptd¼ Xy1 i¼1 X sðnÞUiþUiþ1>Btotal

ni Py1 i¼1niþPyi¼2ni Pn1;n2;...;ny ! 2 4 3 5:ð8Þ To compute Pb, Pd, and Ptd, we have to solve the

steady-state probabilities Pn1;n2;...;ny. This can be done by the

recur-sive technique proposed by Herzog et al.[26], which states that there exists a subset of the state probabilities, called boundaries, such that all other states can be expressed as linear combinations of the boundary states. Therefore, we can determine the boundaries first and then derive the expressions for all remaining state probabilities as func-tions of the boundary values. This can significantly reduce the complexity of solving of Pn1;n2;...;nyas compared to

tradi-tional matrix inversion techniques. It has been shown to be suitable to solve a wide class of queuing problems. Fig. 15. A state transition example with y = 2(q1and q2are the maximum numbers of calls that can be accommodated with PImaxat rates R1and R2, respectively).

(12)

First, we choose all states (n1, n2, . . . , ny) such that ny= 0

as boundaries. According to[26], we can rewrite the state probabilities as: Pn1;n2;...;ny¼ X Btotal Uy1 j k ay1¼0    X Btotal U2 j k a2¼0 X Btotal U1 j k a1¼0 Ca1;a2;...;ay1 n1;n2;...;ny Pa1;a2;...;ay1;ay¼0; ð9Þ Ca1;a2;...;ay1 n1;n2;...;ny1;ny¼0¼

1; n1¼

a

1;n2¼

a

2; . . . ; and ny1¼

a

y1;

0; otherwise: 

The coefficients Ca1;a2;...;ay1

n1;n2;...;ny for ny–0 can be solved

recur-sively. With these state probabilities, we expand(2)–(5)

as follows: Bn1;n2;...;nyPn1;n2;...;ny¼ Xy i¼1 Ari n1;n2;...;nyPn1;n2;...;niþ1;...;ny þX y i¼1 Ali n1;n2;...;nyPn1;n2;...;ni1;...;ny þX y i¼2 Aui n1;n2;...;nyPn1;n2;...;ni11;niþ1;...;ny þX y1 i¼1 Adi n1;n2;...;nyPn1;n2;...;niþ1;niþ11;...;ny; ð10Þ where the coefficients Ari

n1;n2;...;ny, A li n1;n2;...;ny;A ui n1;n2;...;ny, Adi

n1;n2;...;ny, and Bn1;n2;...;ny are abbreviations of those in Eqs.

(2)–(5). From Eq.(10), we derive the state probability

Pn1;n2;...;ny1;nyþ1 ¼Bn1;n2;...;nyPn1;n2;...;ny Py1 i¼1A ri n1;n2;...;nyPn1;n2;...;niþ1;...;ny Ary n1;n2;...;ny  Py i¼1A li n1;n2;...;nyPn1;n2;...;ni1;...;ny Ary n1;n2;...;ny  Py i¼2A ui n1;n2;...;nyPn1;n2;...;ni11;niþ1;...;ny Ary n1;n2;...;ny  Py1 i¼1A di n1;n2;...;nyPn1;n2;...;niþ1;niþ11;...;ny Ary n1;n2;...;ny : ð11Þ

After some manipulation, Eq.(11)can be converted into the following form:

Pn1;n2;...;ny1;ny ¼Bn1;n2;...;ny1Pn1;n2;...;ny1 Py1 i¼1A ri n1;n2;...;ny1Pn1;n2;...;niþ1;...;ny1 Ary n1;n2;...;ny1  Py i¼1A li n1;n2;...;ny1Pn1;n2;...;ni1;...;ny1 Ary n1;n2;...;ny1  Py i¼2A ui n1;n2;...;ny1Pn1;n2;...;ni11;niþ1;...;ny1 Ary n1;n2;...;ny1  Py1 i¼1A di n1;n2;...;ny1Pn1;n2;...;niþ1;niþ11;...;ny1 Ary n1;n2;...;ny1 : ð12Þ

For each fixed state (

a

1,

a

2, . . . ,

a

y1, 0), if we let Pn¼ 1 and

Pn0¼ 0 for all n0– n, from Eqs.(9) and (12), we can obtain:

Ca1;a2;...;ay1 n1;n2;...;ny ¼Bn1;n2;...;ny1C a1;a2;...;ay1 n1;n2;...;ny1 Py1 i¼1A ri n1;n2;...;ny1C a1;a2;...;ay1 n1;n2;...;niþ1;...;ny1 Ary n1;n2;...;ny1  Py i¼1A li n1;n2;...;ny1C a1;a2;...;ay1 n1;n2;...;ni1;...;ny1 Ary n1;n2;...;ny1  Py i¼2A ui n1;n2;...;ny1C a1;a2;...;ay1 n1;n2;...;ni11;niþ1;...;ny1 Ary n1;n2;...;ny1  Py1 i¼1A di n1;n2;...;ny1C a1;a2;...;ay1 n1;n2;...;niþ1;niþ11;...;ny1 Ary n1;n2;...;ny1 ð13Þ

for all combinations of n1, n2, . . . , ny.

After obtaining all coefficients Ca1;a2;...;ay1

n1;n2;...;ny , the

probabili-ties of boundaries can be derived by solving the remaining unused Btotal U1 j k  Btotal U2 j k      Btotal Uy1 j k independent equations in Eq.(10)as well as the normalizing condition:

X n1 X n2   X ny Pn1;n2;...;ny¼ 1: ð14Þ

Having solved the boundaries, all steady-state probabilities Pn1;n2;...;ny can be determined from(9). Thus, Pb, Pd, and Ptd

can then be derived.

5. Simulation results

To verify the correctness and applicability of the pro-posed algorithm, an event-driven C++ simulator is devel-oped. Unless otherwise stated, the following assumptions are made in our simulation. (1) The same call arrival mod-el, call holding time, and call residence time as specified in Section4are used in the simulation. (2) Parameters of IEEE 802.11b and 802.11e are used. (3) We set TXOP limit to zero for four ACs, which means that a QSTA can only trans-mit one packet in each successful contention. (4) The com-munication channel is assumed to be error-free. (5) No RTS/CTS is used. (6) The BI = 500 ms. (7) For AC_VO traffics, we set CWmin to 7, CWmax to 15, and AIFSN[AC_VO] to 2. For AC_BE traffics, we set CWmin = 31, CWmax = 1023, and AIFSN[AC_BE]=3. (8) Since QAP is more likely to be the per-formance bottleneck, we give it a higher priority by setting its TXOP[AC_VO] to N packets where N is the expected number of voice QSTAs in the QAP. (9) In QSTAs, each AC has a queue of size 50. (10) A voice packet will be dropped when it is buffered in a queue for more than 100 ms. (11) A packet can be re-transmitted at most 3 times. (12) G.726 with 32 kbps is used as the voice source. The simulated events include call arrival/departure/handoff and rate change of QSTAs. The rate change of QSTAs follows the state transition inFig. 13. The offered network load is de-fined as

q

= (kn+ kh)/(

l

r+

l

h). To reach steady states, each

simulation case is run with one million arrivals. The perfor-mance metrics are new call blocking rate, handoff call dropping rate, channel utilization, and the average voice packet dropping rate, Pd, where the channel utilization is

defined as 1Bfree

(13)

utilization in[11]. The quality of a voice call is considered to be acceptable if its Pd< 2%; otherwise, it is considered

unacceptable.

5.1. Validation of analytical results

In this experiment, we assume that 40% of arrival calls are handoff calls. The channel occupancy time is 2 s. Pris

set to 0.8 when Bdeg6(Btotal Bth).Fig. 16shows the

block-ing rate and droppblock-ing rate of both analytical and simula-tion results. The maximal difference of blocking rate between simulation and analytical results is about 0.44%, which appears when

q

= 20. It can be seen that analytical results match well with simulation results. So, both our analytical and simulation results are correct and believable.

5.2. Influence of CAC and RA

In this experiment, we want to evaluate the impact of CAC and RA. Pris set to 0.8 when Bdeg6(Btotal Bth). We

compare our scheme against the CAC-only and ‘‘no-CAC-no-RA’’ cases. For the CAC-only case, the PIs of calls are fixed.Fig. 17(a) shows the channel utilization under

differ-ent offered loads. Clearly, our scheme has very good utili-zation because calls can always be upgraded when there are extra resources. The no-CAC-no-RA (PI = 20) case out-performs the CAC-only (PI = 20) case because it accepts every incoming request in all network situations.

Fig. 17(b) shows the medium time per session receives

(which is approximated by the total used medium time di-vided by the total number of ongoing calls). With call admission control, the medium time of our scheme is bet-ter than that of the no-CAC-no-RA case. Even when the work load is high, our scheme can still guarantee the min-imum bandwidth requirement of all calls. As

q

P32, the medium time of the no-CAC-no-RA case will drop to an unacceptable level. This shows that our scheme can well utilize network resources while guarantee the quality of calls.

Fig. 18shows the average voice packet dropping rate,

Pd, against different

q

for both CAC + RA and

no-CAC-no-RA cases. Without CAC, the no-CAC-no-no-CAC-no-RA curve rapidly exceeds the 2% threshold, which means an unacceptable voice quality. With CAC, our algorithm has a very small Pdbecause the resource usage is well under control. This

result shows that CAC is definitely necessary, or the quality of real-time services will easily become unacceptable.

Fig. 19 shows the new call blocking rate and handoff

call dropping rate versus different offered loads. The rates of the no-CAC-no-RA case are all zero because every incoming request is accepted. FromFig. 19(a), we see that our scheme is only slightly worse than the CAC-only (PI = 40) case after

q

P12 because of our call acceptance policy. However, the benefit is our lower handoff call drop-ping rate, as shown inFig. 19(b).

5.3. Influence of Pr

The value of Prreflects the possibility that a QAP

per-mits new calls to start. Clearly, a larger Pr will benefit

new calls but hurt handoff calls.Fig. 20shows the impact of Pr on call blocking and dropping probabilities. From

these curves, a suggested value of Prcould range from 0.2

to 0.6. 0 1 2 3 4 5 6 7 8 9 10 11 12 13 rate (%) 0 4 8 12 16 20 24 ρ : : : : ... ... .... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... .. ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... . ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... .... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... .... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... .. ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... . ... . ... . ... . ... . ... ... . ... . ... . ... ... .. ... .. ... . ... ... ... ... ... ... ... ... .. ... . ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... . ... . ... . ... . ... . ... . ... . ... . ... . ... . ... ... . ... . ... . ... . ... . ... . ... . ... . ... . ... ... . ... .. ... ... ... ... . ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ◦ ◦ ◦ ◦ ◦ ◦ ◦

Fig. 16. Comparison of simulation and analytical results on blocking rate and dropping rate (kh= 0.8, kn= 1.2).

0 20 40 60 80 100 32 28 24 20 16 12 8 4 Channel Utilization (%) ρ ρ CAC+RA CAC-only (PI=10) CAC only (PI=20) CAC only (PI=40) no-CAC-no-RA (PI=20) 0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 32 28 24 20 16 12 8 4 0 CAC+RA CAC-only (PI=5) CAC-only (PI=10) CAC only (PI=20) CAC only (PI=40) no-CAC-no-RA (PI=20) 0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 32 28 24 20 16 12 8 4 0

Medium time per session (sec)

CAC+RA CAC-only (PI=5) CAC-only (PI=10) CAC only (PI=20) CAC only (PI=40) no-CAC-no-RA (PI=20)

a

b

(14)

5.4. Influence of traffic characteristic

Next, we evaluate the influence of traffic characteris-tic. We change the percentage of handoff calls while keep the offered load unchanged. Fig. 21 shows this impact on call blocking and call dropping rates. We can see that our scheme is quite insensitive to this change, unless the offered load is very high. This

concludes that our scheme can provide good QoS to handoff calls.

5.5. Influence of additional BE traffics

The above experiments all assume that VoIP is the only traffic in the network. In this experiment, we add some additional static QSTAs, each generating best-effort data 0 5 10 15 20 25 2 4 6 8 10 12 14 CAC+RA (uplink) no CAC no RA (uplink) ρρ P(%d )

Fig. 18. Comparison of different schemes on their average voice packet dropping rates (Pd).

0 10 20 30 40 50 60 70 80 24 20 16 12 8 4 CAC+RA CAC-only (PI=10) CAC only (PI=20) CAC only (PI=40) no-CAC-no-RA (PI=20) 0 10 20 30 40 50 60 70 80 24 20 16 12 8 4

Call blocking rate (%)

ρ ρρ

CAC+RA CAC-only (PI=10) CAC only (PI=20) CAC only (PI=40) no-CAC-no-RA (PI=20) 0 10 20 30 40 50 60 70 80 24 20 16 12 8 4 CAC+RA CAC-only (PI=10) CAC only (PI=20) CAC only (PI=40) no-CAC-no-RA (PI=20) 0 10 20 30 40 50 60 70 80 24 20 16 12 8 4

Call dropping rate (%)

CAC+RA CAC-only (PI=10) CAC only (PI=20) CAC only (PI=40) no-CAC-no-RA (PI=20)

a

b

Fig. 19. Comparisons of: (a) call blocking rate and (b) call dropping rate.

0 5 10 15 20 25 30 1.0 0.8 0.6 0.4 0.2 ρ=24 ρ=20 ρ=16 ρ=12 ρ=8 0 5 10 15 20 25 30 1.0 0.8 0.6 0.4 0.2

Call blocking rate (%)

Pr ρ=24 ρ=20 ρ=16 ρ=12 ρ=8 0 1 2 3 4 5 6 7 8 9 1.0 0.8 0 .6 0.4 0.2 ρ=24 ρ=20 ρ=16 ρ=12 ρ=8 0 1 2 3 4 5 6 7 8 9 1.0 0.8 0 .6 0.4 0.2

Call dropping rate (%)

Pr ρ=24 ρ=20 ρ=16 ρ=12 ρ=8

a

b

(15)

(AC_BE) with a rate of 480 kbps to compete with VoIP traf-fics. As we can see inFig. 22, if AIFSN[AC_BE] is too small (such as 3), the AC_BE traffics will significantly affect the performance of VoIP traffics. When the voice load is high (such as

q

= 32), the value of Pdis much too high. Even in

the light load case (

q

= 4), we see Pd> 2% when there are

more than 20 BE streams. The effect can be reduced by enlarging the value of AIFSN[AC_BE]. As shown inFig. 22, with a slightly larger AIFSN for AC_BE, the dropping rates for voice packets are significantly reduced. When

q

= 32 and AIFSN[AC_BE] = 15, Pd= 0.50% and 0.53% for

BE_Q-STA = 2 and 8, respectively, which are improved by 89.46% and 97%, respectively, as opposed to AIFS-N[AC_BE] = 3. This also implies that AIFSN can effectively help differentiate the priorities of voice and best-effort packets.

6. Conclusions

In this paper, we have proposed a CAC and an RA mech-anisms to solve the handoff and physical rate adaptation issues over IEEE 802.11e multi-rate wireless networks. Our main approach is to dynamically upgrade/degrade the PIs of calls. Enlarging PIs helps reduce traffics of a

QAP, but does not reduce the actual payload that a station can share. We have also derived an analytical model to evaluate our system. Three performance metrics, blocking probability, dropping probability, channel utilization, have been derived. Our numerical analysis shows the impor-tance of CAC and RA mechanisms, especially when user mobility is high and fairness is important. Our simulation results also support our conclusions. Our results should be quite useful for QAPs which are designed to support WiFi phones. One possible future direction is to extend our current rate transition model, which is memoryless, to a more realistic one.

Acknowledgments

Y.-C. Tseng’s research is co-sponsored by MoE ATU Plan, by NSC grants 97-3114-E-009-001, 97-2221-E-009-142-MY3, 98-2219-E-009-019, and 98-2219-E-009-005, by ITRI, Taiwan, by III, Taiwan, by D-Link, and by Intel.

References

[1] IEEE Std 802.11e-2005, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 8: Medium Access Control (MAC) Quality of Service Enhancements, November 2005.

[2] S. Garg, M. Kappes, Can I add a VoIP Call?, in: Proceedings of the IEEE International Conference on Communications (ICC 2003), vol. 2, 2003, pp. 779–783.

[3] D.P. Hole, F.A. Tobagi, Capacity of an IEEE 802.11b wireless LAN supporting VoIP, in: Proceedings of the IEEE International Conference on Communications (ICC 2004), vol. 1, 2004, pp. 196– 201.

[4] W. Wang, S.C. Liew, V.O.K. Li, Solutions to performance problems in VoIP over 802.11 wireless LAN, IEEE Transactions on Vehicular Technology (2005).

[5] M. Li, B. Prabhakaran, S. Sathyamurthy, On flow reservation and admission control for distributed scheduling strategies in IEEE802.11 wireless LAN, in: Proceedings of the 6th ACM International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2003, pp. 108–115.

[6] S. Garg, M. Kappes, Admission control for VoIP traffic in IEEE 802.11 networks?, in: Proceedings of the IEEE GLOBECOM), vol. 6, 2003, pp. 3514–3518.

[7] Y. Xiao, H. Li, S. Choi, Protection and guarantee for voice and video traffic in IEEE 802.11e wireless LANs, in: Proceedings of the IEEE INFOCOM’04, vol. 3, 2004, pp. 2152–2162. 0 5 15 20 1.0 0.8 0.6 0.4 0.2 λh/(λn+λh) ρ=24 ρ=20 ρ=16 ρ=12 ρ=8 0 5 10 15 20 1.0 0.8 0.6 0.4 0.2

Call blocking rate (%)

λh/(λn+λh) ρ=24 ρ=20 ρ=16 ρ=12 ρ=8 0 1 2 3 4 5 1.0 0.8 0.6 0.4 0.2

Call dropping rate (%)

λh/(λn+λh) ρ=24 ρ=20 ρ=16 ρ=12 ρ=8 0 1 2 3 4 5 1.0 0.8 0.6 0.4 0.2

Call dropping rate (%)

λh/(λn+λh) ρ=24 ρ=20 ρ=16 ρ=12 ρ=8

a

b

Fig. 21. The impact of the percentage of handoff calls on: (a) call blocking rate and (b) call dropping rate.

0 2 4 6 8 10 12 14 16 18 20 3 5 7 9 11 13 15 AIFSN [AC_BE] =4, BE_QSTA=2 (uplink) =4, BE_QSTA=8 (uplink) =4, BE_QSTA=20 (uplink) =4, BE_QSTA=30 (uplink) =32, BE_QSTA=2 (uplink) =32, BE_QSTA=8 (uplink) P(%d )

Fig. 22. Impact of interference from AC_BE traffics with various AIFSNs for AC_BE traffics.

(16)

[8] D. Gu, J. Zhang, A new measurement-based admission control method for IEEE802.11 wireless local area networks, in: Proceedings of the IEEE Personal, Indoor and Mobile Radio Communications (PIMRC 2003), vol. 3, 2003, pp. 2009–2013. [9] Z. Chen, L. Wang, F. Zhang, X. Wang, W. Chen, VoIP over WLANs by

adapting transmitting interval and call admission control, in: Proceedings of the IEEE International Conference on Communications (ICC 2008), 2008, pp. 3242–3246.

[10] S. Oh, J. Shin, D. Kwak, C. Kim, A novel call admission control scheme for the IEEE 802.11e EDCA, in: Proceedings of the 10th International Conference on Advanced Communication Technology (ICACT 2008), vol. 3, 2008, pp. 1832–1835.

[11] H. Zhai, X. Chen, Y. Fang, A call admission and rate control scheme for multimedia support over IEEE 802.11 wireless LANs, Wireless Networks 12 (4) (2006) 451–463.

[12] P. Wang, H. Jiang, W. Zhuang, IEEE 802.11e enhancement for voice service, IEEE Wireless Communications 13 (1) (2006) 30–35. [13] C. Li, J. Li, X. Cai, A novel self-adaptive transmission scheme over an

IEEE 802.11 WLAN for supporting multi-service, Wireless Communications and Mobile Computing 6 (4) (2006) 467–474. [14] P. Wang, H. Jiang, W. Zhuang, Capacity improvement and analysis for

voice/data traffic over WLANs, IEEE Transactions on Wireless Communications 6 (4) (2007) 1530–1541.

[15] D. Pong, T. Moors, Call admission control for IEEE 802.11 contention access mechanism, in: Proceedings of the IEEE GLOMECOM, vol. 1, 2003, pp. 174–178.

[16] A. Banchs, X. Perez-Costa, D. Qiao, Providing throughput guarantees in IEEE 802.11e wireless LANs, in: Proceedings of the 18th International Teletraffic Conference, 2003.

[17] N. Hegde, A. Proutiere, J. Roberts, Evaluating the voice capacity of 802.11 WLAN under distributed control, in: Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks, 2005. [18] N. Nasser, Adaptability enhanced framework for provisioning

connection-level QoS in multimedia wireless networks, in: IEEE and IFIP International Conference on Wireless and Optical Communications Networks (WOCN), March 2005, pp. 275–279. [19] C.-T. Chou, K.-G. Shin, Analysis of adaptive bandwidth allocation in

wireless networks with multilevel degradable quality of service, IEEE Transactions on Mobile Computing 3 (1) (2004) 5–17. [20] D. Chen, A.K. Elhakeem, X. Wang, A novel call admission control in

multi-service wireless LANs, in: Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WIOPT 2005), 2005, pp. 119–128.

[21] P.-Y. Wu, J.-J. Chen, Y.-C. Tseng, H. Lee, Design of QoS and admission control for VoIP services over IEEE 802.11e WLANs, Journal of Information Science and Engineering 24 (4) (2008) 1003–1022. [22] G. Karlsson, Asynchronous transfer of video, IEEE Communication

Magazine 11 (Aug) (1996) 118–126.

[23] M. Handley, V. Jacobson, SDP: session description protocol, RFC2327, in: IETF, 1998.

[24] Recommended Practice for Multi-Vendor Acess Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems Supporting IEEE 802.11 Operation, IEEE Draft 802.1f/Final Version, January 2003.

[25] Y.-C. Kim, D.-E. Lee, B.-J. Lee, Y.-S. Kim, B. Mukherjee, Dynamic channel reservation based on mobility in wireless ATM, in: Proceedings of the IEEE wmATM’99, 1999, pp. 100–106.

[26] U. Herzog, L. Woo, K. Chandy, Solution of queueing problems by a recursive technique, IBM Journal of Research and Development 19 (May) (1975) 295–300.

Jen-Jee Chen received his B.S. and M.S. degrees in Computer Science and Information Engineering from the National Chiao Tung University, Taiwan, in 2001 and 2003, respectively. He was a Visiting Scholar at the University of Illinois at Urbana-Champaign during the 2007–2008 academic year. Then, he obtained his Ph.D. in Computer Science from the National Chiao Tung University, Taiwan, in October of 2009. He was a postdoctoral research fellow (2010–2011) at the Department of Electrical Engineering, National Chiao Tung University, Taiwan. He is Assistant Professor (2011-present) at the Department of Electrical Engineering, National University of Tainan, Taiwan. His research interests include wireless communications and networks, personal communications, mobile computing, cross-layer design, and Internet communication service. Dr. Chen is a member of the IEEE and the Phi Tau Phi Society.

Ling Lee received her B.S. and M.S. degrees in Computer Science and Information Engineering from the National Chiao Tung University in 2004 and 2006, respectively. Her research interests include wireless VoIP, QoS, and WiMAX. She is currently working at Yahoo!, Taiwan as a software engineer.

Yu-Chee Tseng got his Ph.D. in Computer and Information Science from the Ohio State University in January of 1994. He is/was Pro-fessor (2000-present), Chairman (2005–2009), and Associate Dean (2007-present), Depart-ment of Computer Science, National Chiao-Tung University, Taiwan, and Chair Professor, Chung Yuan Christian University (2006–2010).

Dr. Tseng received Outstanding Research Award (National Science Council, 2001, 2003, and 2009), Best Paper Award (Int’l Conf. on Parallel Processing, 2003), Elite I. T. Award (2004), and Distinguished Alumnus Award (Ohio State University, 2005), and Y. Z. Hsu Scientific Paper Award (2009). His research interests include mobile computing, wireless communication, and parallel and distributed computing.

Dr. Tseng serves/served on the editorial boards for Telecommunication Systems (2005-present), IEEE Trans. on Vehicular Technology (2005–2009), IEEE Trans. on Mobile Computing (2006-present), and IEEE Trans. on Parallel and Distributed Systems (2008-present).

數據

Fig. 1. Structure of the IEEE 802.11e EDCA_Parameter_Set information element.
Fig. 3. An example of SIP call setup and tear-down.
Fig. 5. The proposed message flows of the CAC procedure in IEEE 802.11e networks.
Table 2 . The surplus_bandwidth_allowance is to take the
+7

參考文獻

相關文件

„ &#34;Distributed Management Architecture for Multimedia Conferencing Using SIP&#34; ,Moon-Sang Jeong, Jong-Tae Park, and Wee-Hyuk Lee, International Conference on DFMA ,2005..

“Ad-Hoc On Demand Distance Vector Routing”, Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pages 90-100, 1999.. “Ad-Hoc On Demand

[23] Tiantong You, Hossam Hassanein and Chi-Hsiang Yeh, “PIDC - Towards an Ideal MAC Protocol for Multi-hop Wireless LANs,” Proceedings of the IEEE International Conference

Kyunghwi Kim and Wonjun Lee, “MBAL: A Mobile Beacon-Assisted Localization Scheme for Wireless Sensor Networks,” The 16th IEEE International Conference on Computer Communications

Selcuk Candan, ”GMP: Distributed Geographic Multicast Routing in Wireless Sensor Networks,” IEEE International Conference on Distributed Computing Systems,

D.Wilcox, “A hidden Markov model framework for video segmentation using audio and image features,” in Proceedings of the 1998 IEEE Internation Conference on Acoustics, Speech,

[16] Goto, M., “A Robust Predominant-F0 Estimation Method for Real-time Detection of Melody and Bass Lines in CD Recordings,” Proceedings of the 2000 IEEE International Conference

LAN MAN Standards Committee of the IEEE Computer Society(1999), “ Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) Specifications,” International Standard ISO/IEC