An End-to-End Measurement-Based Admission Control Policy for VoIP over Wireless Networks



Similar documents
A Policy-Based Admission Control Scheme for Voice over IP Networks

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks

Packetized Telephony Networks

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf (Team Lead) Imran Bashir Khadija Akram

Adapting WLAN MAC Parameters to Enhance VoIP Call Capacity

Requirements of Voice in an IP Internetwork

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Quality Estimation for Streamed VoIP Services

Simulation of SIP-Based VoIP for Mosul University Communication Network

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

VoIP QoS. Version 1.0. September 4, AdvancedVoIP.com. Phone:

Adaptive DCF of MAC for VoIP services using IEEE networks

Fast Retransmission Mechanism for VoIP in IEEE e wireless LANs

Wireless LAN Services for Hot-Spot

An Introduction to VoIP Protocols

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

Clearing the Way for VoIP

Analysis of Performance of VoIP

VoIP telephony over internet

Functional Specifications Document

Voice over IP Basics for IT Technicians

Course 4: IP Telephony and VoIP

CHAPTER 1 INTRODUCTION

Modeling and Simulation of Quality of Service in VoIP Wireless LAN

Real-Time Communication in IEEE Wireless Mesh Networks: A Prospective Study

QoS issues in Voice over IP

Computer Networks Homework 1

All Rights Reserved - Library of University of Jordan - Center of Thesis Deposit

Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation

TECHNICAL CHALLENGES OF VoIP BYPASS

1. Public Switched Telephone Networks vs. Internet Protocol Networks

Optimization of VoIP over e EDCA based on synchronized time

IP Telephony (Voice over IP)

Goal We want to know. Introduction. What is VoIP? Carrier Grade VoIP. What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP?

VoIP in Mika Nupponen. S Postgraduate Course in Radio Communications 06/04/2004 1

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

AC : A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS

VoIP / SIP Planning and Disclosure

How To Deliver High Quality Telephony Over A Network

INVESTIGATING THE PERFORMANCE OF VOIP OVER ETHERNET LAN IN CAMPUS NETWORK

Comparative Study of VoIP over WiMax and WiFi

Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN

VOICE OVER IP AND NETWORK CONVERGENCE

Mixer/Translator VOIP/SIP. Translator. Mixer

Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol

Encapsulating Voice in IP Packets

PROVIDING STATISTICAL QOS GUARANTEE FOR VOICE OVER IP IN THE IEEE WIRELESS LANS

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2

5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.

A Software Architecture for Simulating IEEE e HCCA

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Voice over IP (VoIP) Basics for IT Technicians

Analysis of IP Network for different Quality of Service

Current Challenges and Opportunities in VoIP over Wireless Networks

Indepth Voice over IP and SIP Networking Course

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

Admission Control for VoIP Traffic in IEEE Networks

ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers.

Introduction VOIP in an Network VOIP 3

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Combining Voice over IP with Policy-Based Quality of Service

Experimental Analysis of VoIP over Wireless Local Area Networks

Advanced Wireless LAN VoIP Technology

SIP Trunking and Voice over IP

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP

Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network

Authors Mário Serafim Nunes IST / INESC-ID Lisbon, Portugal mario.nunes@inesc-id.pt

This chapter covers four comprehensive scenarios that draw on several design topics covered in this book:

How To Understand The Concept Of Circuit Switching

Methods for Lawful Interception in IP Telephony Networks Based on H.323

OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME

Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance

Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/ ; Suresh.Leroy@alcatel.be +32/3/ ; Guy.Reyniers@alcatel.

Agilent Technologies Performing Pre-VoIP Network Assessments. Application Note 1402

White Paper. D-Link International Tel: (65) , Fax: (65) Web:

How to Configure the NEC SV8100 for use with Integra Telecom SIP Solutions

VoIP codec adaptation algorithm in multirate WLANs : distributed vs centralized performance comparison

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov

Performance Evaluation for VOIP over IP and MPLS

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

1. Introduction. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 11

(Refer Slide Time: 6:17)

Requirements and Service Scenarios for QoS enabled Mobile VoIP Service

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

Software Engineering 4C03 VoIP: The Next Telecommunication Frontier

Implementing VoIP support in a VSAT network based on SoftSwitch integration

Voice over IP Probe! for Network Operators and! Internet Service Providers

Enhancement of VoIP over IEEE WLANs by Adapting Transmitting Interval

VOIP Security Essentials. Jeff Waldron

Measuring the Performance of VoIP over Wireless LAN

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

Introduction to VoIP Technology

IP-PBX for Small to Large Enterprises

SIP, Session Initiation Protocol used in VoIP

Capacity Evaluation of VoIP in IEEE e WLAN Environment

Transcription:

An End-to-End Measurement-Based Admission Control Policy for VoIP over Wireless Networks Ala Khalifeh Department of EECS University of California, Irvine [akhalife]@uci.edu Abstract in this paper, we present a new policy for admitting Voice over IP (VoIP) sessions over wireless networks. Our proposed policy receives the admission information advertised by the VoIP gateway on the wired network, and uses it to decide whether a new VoIP session can be admitted or not. The proposed policy can be easily integrated with the current Call Admission Control algorithms used in wireless networks. We show that implementing the proposed policy increases the number of successful VoIP sessions admitted to the access point polling list, thus improving the wireless network utilization. I. INTRODUCTION The emergence of wireless networks and the evolution of 802.11e standard, have created a promising infrastructure for delivering real-time Internet applications such as Voice over IP (VoIP) over wireless networks. To provide QoS support for real-time traffic over wireless networks, various mechanisms have been proposed that lead to the current 802.11e standard. Call Admission Control (CAC) is one of these mechanisms that determines whether a new VoIP session can be admitted into the network or not. The Quality of Service Enabled Access Point (QAP) admits calls only if their QoS constraints can be met, without jeopardizing the QoS constraints of the existing calls in the network. Once the QAP admits a VoIP session, the VoIP terminal issues a call setup request to the VoIP softswitch which uses another call admission control policy to ultimately determine whether or not this VoIP call can meet its end-to-end quality of service constraints. Accordingly, the final admission decision is issued by the VoIP softswitch, and the call is either torn down or successfully conducted. The current CAC algorithms used in the QAP does not take into account whether the end-to-end QoS constraints of the admitted VoIP sessions can be met or not. The proposed policy ensures that the QAP admits the VoIP sessions only if its end-to-end QoS constraints can be achieved. As a result, implementing the proposed policy improves the utilization of the wireless networks, and increases the number of successful VoIP sessions conducted within certain period of time. In literature, the cited call admission control algorithms suggested for wireless networks use the local wireless available resources such as: bandwidth, collisions, and the number of admitted VoIP sessions as a threshold parameters in the admission process, and do not take into account the end-toend QoS constraints. An extensive survey of the recent call admission control algorithms for 802.11e networks can be found in [5]. A brief description of the algorithms mostly related to This work is supported by the Fulbright Fellowship our work is summarized. In [10], [13] the authors proposed a Distributed Admission Control algorithm (DAC). In DAC the QAP announces a transmission budget for each Access Category (AC), the stations receive this information and send their traffic. The QAP measures the total amount of time occupied by the transmitted traffic of each AC, and subtracts it from the transmission budget of that category. If the transmission budget of that AC is vanished, the new flow will not be admitted, and the admitted flows will not be allowed to increase their transmission time either. The authors also suggested a Two Level Guarantee and Protection Mechanism, in which the first-level protects the existing voice and video traffic from the new QoS traffic, while the second level protects the QoS traffic from the best-effort traffic. A Threshold-Based Admission Control algorithm is suggested in [6]. In this algorithm, each station measures the traffic load conditions of the wireless network. If the measured traffic conditions were above certain upper level threshold, the network is considered highly loaded, so the wireless station will stop transmitting the lower priority AC traffic, so more priority is given to the higher priority AC traffic. If the traffic conditions become around medium threshold or below lower level threshold, the network is considered inefficiently utilized, and the station will resume transmitting the lower priority AC traffic. The most related work to our proposed policy can be found in [11], the authors proposed a scheme based on the Endpoint Admission Control (EAC) paradigm, According to their scheme, the caller probes the path to the VoIP server, and determines whether the originating path is good or not, if it is good, the callee will receive a call setup request from the VoIP server, so the callee will probes the path to the VoIP server, to make sure that the terminating path is in good conditions. If the path is good, the call is admitted. The proposed scheme works well if the caller and callee are within the same local area network as they assumed. While our proposed scheme works well for all cases, whether calls are issued within local area networks or within the Internet. Also according to their suggested scheme, the same procedure is repeated for different calls that target the same callee network, while in our proposed scheme, the caller will take advantage of the call admission caching functionality exits in the VoIP softswitch and the QAP, which will reduce the call setup time. In addition, our proposed scheme is more realistic and practical since it resembles the current deployed VoIP networks in which call admission control and probing is done in the VoIP softswitch and VoIP gateways, not on the end systems. Besides, the proposed scheme takes advantage of the upcoming QAP which has more advanced fea-

VoIP Enabled Mobile phones Domain 2 Domain 1 VoIP Enabled Mobile phones Laptops with VoIP soft phones WLAN User B Softswitch Softswitch User A WLAN Laptops with VoIP soft phones Access Point VoIP Gateway VoIP Gateway Access Point IP Phones switch IP Phones switch PSTN PBX PSTN Network PSTN PBX PSTN Network The Internet PSTN phones PSTN phones Fig. 1. Network Architecture for VoIP over Wireless Networks. tures than the traditional access points; such as QoS, layer 2/3 and roaming support [1] [2]. The remainder of the paper is organized as follows: General description of VoIP network architecture is presented in Section II. The proposed end-to-end measurement-based admission control policy is presented in Section III, Simulation setup and results are presented in Section IV. Finally, Section V concludes the paper and suggests future work. usually the IP address of the destination gateway or the destination softswitch, and measures the end-to-end delay, packet loss, and jitter delay of these probes to determine the quality of the network path [3], which will be reported to the softswitch. The softswitch uses these information to determine whether the call can be admitted or not, if the call is not admitted, the connection is rejected, and a busy signal will be sent to the VoIP terminal. The process is repeated till the call is successfully established. II. VOICE OVER IP NETWORK ARCHITECTURE Fig. 1 depicts the network architecture for a VoIP enabled network, including both wired and wireless VoIP terminals. Here we assume that the Session Initiating Protocol (SIP) is the protocol used for signaling purposes and for call set up. For more details a bout network components and architecture, the reader is encouraged to look at [12][8]. The following scenario shows how a VoIP call over wireless network is established. Let us suppose that user A in Domain1 would like to call user B in Domain2. When user A accesses the wireless network, the QAP uses Call Admission Control algorithm to determine whether or not the wireless network can safely admit the new VoIP call. If the call is admitted, user A will send a call setup request to the VoIP softswitch (SIP INVITE message), Fig. 2. The softswitch called (Proxy server in case SIP protocol is used or Gatekeeper in case H.323 protocol is used) [8], will perform some operations; such as authorization, authentication, and accounting. After that, the softswitch will lookup the IP address of the domain of the destination VoIP gateway (Domain2). Notice that in some networks, address lookup can be done in the local Domain Name Server (DNS) of the network. So once the destination IP address is determined; the VoIP gateway checks the links status by using an appropriate Call Admission Control mechanism. End-to-End Measurement-Based Admission Control is one of the widely used admission control in VoIP gateways [3]. The VoIP gateway gauges the quality of the network path, by sending probes to the destination IP address, which is Fig. 2. INVITE SIP: USER A @ Domanin1.com SIP/ 2.0 Via:SIP/2.0/UDP From: sip: USER A @ Domain1.com To: sip: USER B@ Domain2.com.. SIP invite message format. III. THE PROPOSED END-TO-END MEASUREMENT-BASED ADMISSION CONTROL POLICY In this Section, we will describe our proposed scheme, and show how it improves the network utilization and the number of successful VoIP calls conducted within specific period of time. As mentioned in Section II, probing the path is done in the VoIP gateway and the end-to-end link status is reported to the VoIP softswitch to be used in the admission process. We have proposed to report this information to the QAP too, so it can be used as a policy in the call admission process in the wireless domain, so this way and after the QAP performs the call admission algorithm, this policy is checked to see whether this call will be admitted by the VoIP gateway or not, if the information reported about the end-to-end path link of this call indicates that the destination path is congested and this call can not be admitted, the QAP rejects the call and does not register it in the Hybrid Coordination Controlled Channel Access (HCCA) polling list[9], consequently, the wireless resources will not be

wasted in admitting unsuccessful VoIP call that will be ultimately rejected by the VoIP gateway. At the beginning, neither the softswitch nor the QAP has entries in their link status table, so the QAP will admit all the calls, and the softswitch will start building the link status table for these calls, so once this table is populated, it will be sent to the QAP to be used for the new incoming calls. The link information for the destination networks is stored in a lookup table that contains the destination addresses, and its paths status. So once the VoIP call is received by the QAP, its destination address is checked using that table, and the call is admitted only if its end-to-end path conditions are satisfactory. Caching concept is also used in our proposed scheme, so the links status information for the destination networks is kept in cache memory for certain time-out period, the VoIP gateway keeps updating the softswitch and the QAP with the status of the destination networks attempted so far. After certain time-out period, the link status information related to certain network destination is removed from the table, if no one accesses that network. Fig. 3 depicts how our policy can be integrated with the QAP call admission algorithm. To further shows the benefits and the justifications of implementing this policy. Let us look at a scenario in which the caller is trying to establish a VoIP call to a congested network. As discussed above, after the caller terminal device establishes a connection with the access point, and registers itself as one of the admitted stations in the polling list, the caller will contact the softswitch, and go through billing, authentication, authorization, IP address look up stages, and finally checks whether the call can be admitted or not [7][3]. In this case, the call is rejected and a busy signal is sent back to the caller terminal, which will try again to establish a connection and go through the previous process, until the destination link becomes less congested, so the call can be admitted, or until the caller gives up and stops from setting up the call. As we can notice that during the failed call setup attempts, the caller terminal utilizes the wireless channel, and registers itself in the polling list for the whole period of time used in attempting to conduct the call. This time might be significant, for the following reasons: I. Contacting the softswitch might take some time due to the fact that in real networks, the softswitch is usually hosted in the Internet Service Provider (ISP) network, not in the local wireless network. II. Some time will be wasted for doing authentication and other functions mentioned earlier, which is considered useless as far as the call will be rejected. III. The softswitch might be loaded or its links might be congested, which might increase the process and access time. IV. Usually, once the VoIP is rejected by the VoIP gateway, the caller station will still be registered in the QAP polling list, so the caller will keep trying many times to establish a call, and according to the network congestion statistics, the successive trials most likely will fail, since usually the congestion in network path lasts for a period of time [4]. While according to our policy, rejecting the call from the first time will give the opportunity for other stations to access the network, which might conduct VoIP calls with different destination networks that do not have congestion, thus improving the utilization of the wireless network, and increases the number of successful VoIP calls. Rejected Call Received QAP Admission Control Algorithm Rejected Admitted End-to -End- Measurement Based Policy Admitted Call is registered in the HCCA polling list Fig. 3. Integrating the suggested policy with the current QAP Call Admission algorithms. IV. SIMULATION SETUP AND RESULTS To evaluate the performance of the proposed policy, we simulate the proposed policy using the network diagrams shown on Fig. 1. We supposed that both the caller and the callee have similar network infrastructure to the one depicted on Fig. 1, and the users on Domain 1 is trying to conduct a VoIP call to other wireless users on different networks. We assume that the wireless network always in a saturation level, i.e., the number of the wireless stations trying to make a VoIP call is very large, and exceeds the maximum number of VoIP calls that can be admitted. So this assumption shows the effectiveness of applying the proposed policy in terms of increasing the network utilization, and increasing the blocking/admission probability for the unsuccessful/successful VoIP calls. We define the network utilization as the ratio between the time used in conducting successful VoIP calls (the calling time) and the sum of the wireless network access time, the time spent on trying to conduct unsuccessful VoIP calls, and the the time spent on trying to conduct successful VoIP calls (the calling time). The call is considered successful if its end-to-end delay is below 150 ms at the time of establishing the call, while the call request is teared down and rejected if its end-to-end delay exceeds 150 ms. As shown in Fig. 1, when stations in Domain 1 access the wireless channel to conduct a VoIP call with one of stations on the other destination networks, the VoIP calls follow certain path in the Internet. To simulate the major Internet backbone paths, we have modeled the Internet backbone networks using six major paths Fig. 4,, and Fig. 5,, show the delay characteristics of these paths as described in [4]. So the VoIP calls eventually will go through one of these paths before reaching the final destination network. The first path is assumed to have high delay variability with random delay pattern, the delay in this pattern is considered below 150 ms most of the time, and follows a random pattern, Fig. 4. The second path is assumed to have high delay variability with very high delay spikes, the delay in this pattern reaches very high values (in the range of 400 700 ms ) every 10 20 ms, followed by low spikes of values below 150 ms, Fig. 4. The third path is assumed to have high delay variability with blocking pattern, it consists of cluster of spikes of 250 ms that lasts for 1 second, followed by low spikes below 150 ms. The cluster is repeated every 2 3 seconds Fig. 4. The fourth path is assumed to have very low delay variability, corresponds to very high provisioned network, the delay is below 50 ms most of the time with 80 ms spikes occurs every 10 minutes, Fig. 5

. The fifth path has low-frequency delay components, the delay pattern in this path is below than 150 ms for the first 300 seconds, after that, a low-frequency delay component is super imposed to make the over all delay pattern over 150 ms for the other 300 seconds, Fig. 5. Finally, the sixth path is considered to have periodic delay pattern. In this pattern, clusters of spikes 250 300 ms high, lasts for 3 seconds and occurs every 60 70 seconds, Fig. 5. In the simulation, we assume that the maximum number of voice calls (bi-directional) that can be admitted into the system is 65, for G.711 VoIP codec with constant bit rate of 64 Kbps, using 802.11a/e wireless network with zero packet error rate [13]. This result assumes that a Transmission Opportunity (TXOP) on one way of each station of 0.546 ms, assuming five packets are generated by the VoIP source in 100 seconds Service Interval (SI). The HCCA period is 75 ms, and the Enhanced Distributed Coordination Function (EDCA) period is 25 ms [13]. In order to give VoIP more priority, we assume that the HCCA mode works on both, the contention and contention free periods, so voice calls can be registered in the polling lists in anytime, and have the highest priority. Also, we consider an averaging calling time of two and half to three minutes [10]. Finally, we assume that the cache values reflects the real status of the destination networks, which can be guaranteed practically using small cache update and probing periods. Fig. 6 shows the simulation results when implementing the proposed CAC policy. After running the simulation for different period of times (10, 20, 30, 40, 50 minutes), the percentage of the admitted voice calls that are able to successfully conduct a VoIP call is around 64%, while 36% of the calls are rejected by the access point, since these calls do not satisfy their end-to-end QoS constraints. Notice that in case of not implementing the proposed policy, all of the 36% sessions will utilize the wireless network for an average period of T seconds, which represents the time needed to contact the softswitch, do authentication, authorization, billing, and the time needed by the user while trying to re-establish the call if the call get rejected from the first time, this time might be significant especially if the softswitch links are congested and have a very high load. While in case implementing the proposed policy, these failed calls attempts will be rejected at the access point, so only successful calls are admitted thus the network utilization is significantly improved. Fig. 6 compares the utilization of the wireless network with and without the proposed policy, as we can see, when the policy is implemented, the network utilization was very high (around 99 98%), with less than 1 2% of the time used for establishing the calls and accessing the wireless network, notice that in our simulation, we did not consider any other non real-time traffic that might affect the VoIP traffic and we assume the wireless channel is an error free channel, so no delay is incurred due to re-transmission, and that justifies the low overhead delay in the simulation and the very high network utilization. While when we do not impalement the proposed policy, the time overhead increases as described above, which significantly reduces the network utilization. V. CONCLUSION In this paper, we have proposed a policy to be used with the current QoS Call Admission Control algorithms for admitting Fig. 4. Delay characteristics patterns of the major Internet backbones used in the simulation Backbone links with average delay less than 150 ms, Backbone links with high delay spikes followed by low delay spikes Backbone links with cluster of high delay spikes followed by a cluster of low delay spikes. VoIP calls. The proposed policy uses the admission information obtained from the VoIP gateway on the wired network, and provides this information to the access point to be used as a policy in the call admission process in the wireless domain. We show that implementing the proposed policy improves the network utilization, and increases the number of successful VoIP sessions admitted to the access point polling list, thus increasing the number of successful VoIP calls conducted within certain time period. As a future work, we are looking toward studying the performance of the proposed policy with different Call Admission Control algorithms, and with different traffic conditions. Also we are investigating on how the QAP communicates efficiently with the softswitch to obtain the network link status of the destination networks.

0.7 0.6 VoIP Calls Admission Probability 0.5 0.4 0.3 0.2 0.1 0 0.45 10 20 30 40 50 0.4 VoIP Calls Blocking Probability 0.35 0.3 0.25 0.2 0.15 0.1 0.05 0 10 20 30 40 50 1 0.95 CAC with end to end admission policy CAC with no end to end admission policy Network utilization 0.9 0.85 0.8 Fig. 5. Delay characteristics patterns of the major Internet backbones used in the simulation (continued) Backbones with a very low delay spikes corresponds to very high provisioned links Backbone links with blocking pattern Backbone links with high delay spikes with a periodic pattern. REFERENCES 0.75 10 15 20 25 30 35 40 45 50 Fig. 6. Performance evaluation of the proposed policy The admission probability of the successful VoIP calls The blocking probability of the failed VoIP calls The utilization of the wireless network with and without implementing the proposed policy. [1] http://www.gridtoday.com/03/0915/101948.html. [2] http://cio.cisco.com/univercd/cc/td/doc/product /wireless/airo1200/accsspts/b12215xr/b15xr.htm. [3] http://www.cisco.com/univercd/cc/td/doc/cisintwk/intsolns/voipsol/cac.pdf. [4] A.Markopoulou, F.Tobagi, and M.Karam. Loss and Delay Measurements of Internet Backbones. Elsevier Computer Communications, (Special Issue on Measurements and Monitoring of IP networks), pages 1590 1604 Vol.29, 2006. [5] G. Deyun, C. Jianfei, and K. Ngan. Admission control in IEEE 802.11e wireless LANs. In Proc. IEEE Network, pages 2 13 Vol. 19, July-Aug. 2005. [6] D. Gu and J. Zhang. A new measurement-based admission control method for IEEE 802.11 wireless local area networks. In Proc. IEEE PIMRC, pages 2009 2013 Vol.3, 2003. [7] D. Houck, K. Eunyoung, H. Uzunalioglu, and A. Wehr. A measurementbased admission control algorithm for VoIP. Bell Labs Technical Journal, pages 97 110 Vol. 8, 2003. [8] J. Kurose and K. Ross. Computer Networking: A Top-Down Approach Featuring the Internet. Addison-Wesley, third edition, 2004. [9] S. Mangold, C. Sunghyun, G.R. Hiertz, O. Klein, and B. Walke. Analysis of IEEE 802.11e for QoS support in wireless LANs. In Proc. IEEE Wireless Communication, pages 40 50 Vol. 10, Dec. 2003. [10] K. Mase, Y. Toyama, A. Bilhaj, and Y. Suda. QoS management for VoIP networks with edge-to-edge admission control. Global Telecommunications Conference(GLOBECOM), Nov. 2001. [11] P. McGovern, S. Chung, S. Murphy, and L. Murphy. Endpoint Admission Control for VoIPoWLAN. In Proc. International Conference of Telecommunications (ICT), May 2006. [12] F. Ohrtman. Voice over 802.11. Artech house, 2004. [13] S. Shankar, J. Pavon, and P. Wienert. Optimal packing of VoIP calls in an IEEE 802.11 a/e WLAN in the presence of QoS constraints and channel errors. Global Telecommunications Conference(GLOBECOM), pages 2974 2980 Vol.5, Nov. 2004.