Admission Control of VoIP calls in EDCA WLANs: Analysis and Experimentation Filippo Cacace, Giulio Iannello, Massimo Vellucci, and Luca Vollero Università Campus Bio-Medico di Roma Abstract— The Enhanced Distributed Channel Access (EDCA) is a component of the new IEEE 802.11e standard [2], which introduces Quality of Service (QoS) support in Wireless LANs (WLANs). This paper proposes a model for the VoIP capacity of an EDCA WLAN. The proposed solution decouples the problem of estimating stations performance and that of evaluating channel congestion. Moreover, it models the dynamics of the sending queues. This translates in a model working under generic load conditions (i.e. VoIP traffic at different bit rates) that captures the impact of all the parameters introduced by EDCA. To validate the model, we derived a simple Admission Control algorithm for VoIP and generic real-time symmetric applications. Experimental analysis and simulations have been used to validate the model and to establish its limitations. A comparison of our proposal with other approaches is provided in Section III. To validate our model we used experimentation with a real testbed and simulations. Results are reported in Section VI. Specifically, we verified our model first with experiments and, when experiments were not possible for the limited number of stations in the testbed, we used simulations. We also used simulations to explain differences between experiments and analysis due to the physical characteristics of the Wireless Medium that the analysis does not consider. The results proves the ability of the model to capture the network behavior and suggest how to increase the number of admissible VoIP flows by adapting the packet size generated by VoIP applications. I. I NTRODUCTION Real time and multimedia communications with Quality of Service (QoS) support are increasingly important in wireless networks of any nature, due to the growing demand of services like VoIP, streaming and videoconferencing and to the network’s limited capacity. They are especially challenging for WLANs based on the IEEE 802.11b [1] protocol due to the distributed and contention-based nature of the channel access mechanism. The introduction in the IEEE 802.11e standard [2] of a new contention access scheme called Enhanced Distributed Channel Access (EDCA) has provided mechanisms for QoS support which were previously unavailable with the Distributed Coordination Function (DCF) used in the widely deployed 802.11 WLANs. The EDCA is however only a basic mechanism which should be used in the context of a comprehensive approach to implement QoS support. Such an approach should also include a method for allocating resources among distinct classes of traffic, like real time (RT), streaming, best effort, (BE), as well as algorithms for the admission control of higher priority flows and for EDCA parameters setting. In this paper we propose a new model to evaluate the VoIP capacity of an EDCA WLAN. We focus on this problem because VoIP call admission control (CAC) is of relevant practical interest in WLANs. Even if our model considers only VoIP traffic, admitted VoIP flows can be easily protected from interfering BE traffic by using the AIFS parameter [11], thus yielding an effective CAC method. From a theoretical point of view, our model provides the basis for an extension that includes BE traffic, even though it is questionable that an analytical approach is the best way to deal with the RT-BE traffic interaction. 978-1-4244-1845-9/08/$25.00 © 2008 IEEE 60 II. BACKGROUND Quality of Services support in WiFi network is provided by the IEEE 802.11e standard [2]. IEEE 802.11e defines the Hybrid Coordination Function (HCF), which includes the HCF Controlled Channel Access (HCCA) and the HCF contentionbased channel access, also known as Enhanced Distributed Channel Access (EDCA). HCCA and EDCA are interoperable channel access mechanisms. HCCA is based on polling, while EDCA is based on a slotted and highly parametric CSMA/CA protocol. Both HCCA and EDCA distribute Transmission Opportunities (TXOPs), in which stations (STAs) are allowed to transmit one or more data frames. The EDCA mechanism defines the concept of Access Category (AC). Each STA may use up to four ACs, each AC implementing a slotted CSMA/CA algorithm with its own parameter. All the ACs compete independently to obtain TXOPs. The four ACs within a station represent four priority levels for data transmission. The standard names these levels as background (BK), best effort (BE), video (VI) and voice (VO). In infrastructure configurations, APs announce the configuration of ACs in selected beacon frames. The EDCA access protocol extends the access mechanism of IEEE 802.11: the Distributed Coordination Function (DCF). When an AC obtains a TXOP, it can transfer at least the first frame waiting in its queue. Moreover the AC can transmit more frames whether allowed by the AP. Specifically, each AC has a maximum channel occupancy time, called TXOPlimit . This limit is advertised by the AP with all the other QoS parameters. If its TXOPlimit is equal to zero, the AC is allowed to transmit only the first frame waiting in its queue for each TXOP it gains. When the TXOPlimit is greater than zero, the AC is IT-NEWS 2008 allowed to transmit as long as the total channel occupancy time is less or equal than the TXOPlimit . An idle AC starts competing for a TXOP upon the arrival of a new frame in its queue. If the frame arrives and no more ACs are active in the same STA, the AC senses the WM to assess if it is idle or busy. If the channel is idle, the AC ensures that it remains idle for a fixed interval of time: the Arbitration Inter-Frame Space (AIFS). The AIFS is another QoS parameter advertised by the AP and it can vary from AC to AC. After the AIFS has expired, the AC is allowed to transmit. The transmission can be successful or unsuccessful. If the transmission is successful, the receiving STA transmits back to the transmitting STA a special frame, the ACK frame, acknowledging for the success in the transmission. The AC that has obtained the TXOP handles the transmission of all the frames waiting in its queue until its TXOPlimit has been consumed. If the transmission is unsuccessful, the AC enters the Backoff process. The Backoff process is also used when the channel is sensed busy during the first AIFS, when another AC in the same STA is busy or the last TXOPlimit of the AC is too close in time. As soon as the Backoff process is started, the AC updates an internal variable, called Backoff Timer (BT). When updating, the value of the BT is extracted randomly in the AC AC AC − 1 . CWmin , 2k CWmin and set 0, 1, . . . , min CWmax AC are called minimum and the maximum Contention CWmax Window and are advertised by the AP in the set of QoS parameters. k is the number of collisions occurred to the current frame. An AC with BT equal to zero is allowed to attempt a transmission in the first slot time following an idle AIFS or an empty slot time. The BT is decremented in each slot time following an AIFS or an empty slot time. III. R ELATED W ORK EDCA provides less predictable performance than a reservation-based method and it also suffers form network congestion. When the traffic load increases, EDCA cannot provide any QoS guarantees. Low reliability of QoS guarantees, starvation of low priority traffic and unbalanced uplink/downlink access opportunities are the most serious issues to be tackled for the wide deployment of distributed access mechanisms like EDCA in realistic scenarios. For these reasons, it can be argued that support for service differentiation in WLANs cannot be achieved without solving the relevant issue of admission control [14]. The IEEE 802.11e standard itself suggests a distributed admission control algorithm in which the AP can control the traffic load from each AC as well as any STA by periodically announcing the available bandwidth for each AC. This algorithm, however, is rather complex, difficult to implement and it has received scarce attention from both the research and the industrial communities. An alternative to a rigid mechanism of admission control and bandwidth allocation among ACs is the adaptation at run-time of 802.11e parameters, with the aim of optimizing the channel performance depending on network load and applications. In 61 any case, admission control must be performed for traffic flows explicitely requesting QoS guarantees. Much work has already been devoted to characterize the real time applications support of IEEE 802.11b/g networks. The peculiarity of analytical models for the voice capacity is that the stations competing for the wireless channel are not necessarily saturated (with the possible exception of the AP). This feature makes necessary to extend classical models for saturated sources [6]. The voice quality and capacity of WLANs in the presence of background data traffic has been measured in [3] using a test bed consisting of commercially available components. Because experimental results cannot fully reveal the relationship between voice capacity and system parameters when new wireless technologies or voice codecs are employed, the voice capacity of IEEE 802.11b WLANs has been theoretically estimated in [13], [17]. The voice capacity estimated in these works may be overly optimistic due to these simplified assumptions. A more precise analytical model is presented in [7] for 802.11a/b WLANs. [18] presents one of the first proposals of an admission control mechanism for 802.11e with RT and BE traffic. This proposal has limited applicability due to the use of saturated transmission probability and some simplified assumptions on the use of the TXOPlimit parameter. Measurement-based approaches (see [15], [20], [21]) use estimates of the available utilization time on the wireless channel to take decisions about the admission of new flows. A common limit of these approaches is that the increase in the collision time due to the admission of a new flow is not linear with the number of flows and it is difficult to estimate without an analytical model. Analyical models for EDCA in saturated conditions (see [4], [16], [19]) are not useful for VoIP CAC. EDCA models for non-saturated conditions have been recently proposed in [5], [9], [12]. The last two approaches are computationally heavy and do not model the sending queue dynamics, thus they cannot take into account the impact of the TXOPlimit parameter on the VoIP capacity of the EDCA network, that can be relevant. [5] considers both BE traffic and queue dynamics, thus it can be used for VoIP CAC; however, we present a simpler approach. Indeed, the proposed approach separates the problem of predicting the behavior of each station and the problem of evaluating the congestion of the wireless channel. This translates in a general model working under all load conditions and whose complexity grows linearly with the number of distinct real-time flows. IV. A M ODEL FOR THE A DMISSION C ONTROL OF VO IP CALLS In this section we present a model to predict the behavior of a WLAN and to establish whether or not a given configuration of VoIP calls can be admitted without quality degradation. An interesting aspect of the proposed model is that it decouples the problems of estimating the channel and stations status. This simplifies its applicability in realistic scenarios, where sources may differ completely in terms of offered load, packet rates and packet size characteristics. λout = λs 1 − Pdrop − pR+1 (1) λout = nt τ (1 − p) (2) and A. Model Description Consider a WLAN composed of Nsta VoIP stations, each station requesting a symmetric VoIP communication with nearly constant packet sizes at λt packets-per-second (pps). Let assume to know Tslot , the average duration of a Time Slot, and P e,the probability that a given Time Slot is empty. Knowing those parameters we can determine independently for each station its working point. From an user point of view, each transmitting station can be modeled using a time domain queue model, having its own TXOPs’ service rate, µt . Since the slot progressing nature of EDCA, we prefer to model the queue evolution in a different time scale: the Time Slot domain. In that time domain, λs = λt Tslot is the arrival rate expressed in packets per Time Slot, while 1/µs is the average number of Time Slots spent for each successful TXOP and for each frame discarded for too many retransmission attempts. The queue evolution can be easily determined using the model of Fig. 1, where l is the maximum number of frames sent in each successful TXOP. l can be computed as TXOPlimit /Tps , where Tps is the average time spent to send a single frame. Assuming to know the probability of collision that the queue experiences when attempting a transmission, the service delay can be approximated1 as Eq.s 1 and 2 can be used to express τ , the probability of attempting a transmission as a function of p: λs (1 − Pdrop ) − pR+1 nt (1 − p) Eventually, that value of τ can be used to compute back p using P e: Pe P e = (1 − p) (1 − τ ) → p = 1 − 1−τ Hence, fixed Tslot and P e we can solve for each station the above implicit system, determining p, τ and Pdrop . Moreover, from the values obtained for each station, we can compute back P e and Tslot , using the following relations: τ= P enew = and Tslot, new = P enew σ + N sta T ci P ci i=2 N sta (1 − τj ) j=1, j=i where w (k) is the average number of Time Slots spent in the Backoff process for serving a TXOP experiencing k collisions, while R is the maximum number of retransmission attempts. w (k) can be computed as k min 2j CWmin , CWmax − 1 w (k) = 2 j=0 Knowing λs and µs , the model of Fig. 1 can be easily solved assuming an exponential behavior of service times and assuming Poisson sources. From this model we can obtain, hence, the average number of frame sent in each successful TXOP as Pk T si P si + where P si = τi k=0 k=1 N sta i=1 R Nq (1 − τi ) i=1 1 = (1 − p)pk (1 + k + w (k)) + pR+1 (1 + k + w (k)) µs 1 nt = Nq N sta min {k, l} Pk and P ci = τi 1 − j<i (1 − τj ) (1 − τj ) j>i In the expression of Tslot we assume that the stations are ordered such that i > j if Tps, i ≥ Tps, j . The values of Ts, i , the average duration of a successful Time Slot of station i, and Tc, i , the average duration of a collision Time Slot involving station i and not involving station j with j < i, can be computed using the expressions defined in Table I. Tdata is the time needed to transmit the MAC payload over the wireless channel. Hence, starting from the parameters [Tslot , P e] we can compute back the same parameters, defining the function: [T snew , P enew ] = F ([Tslot , P e]) k=1 where, Pi is the probability of having i packets waiting for transmission in the queue. Moreover the model allows us to determine the probability that a packet is dropped for queue overflow as Pdrop = PN , where N is the maximum queue depth. Knowing Pdrop and nt we can write the following expressions for λout , the rate of successfully served frames: 1 We assume that the station always uses the post-Backoff. This is obviously a worst case approximation. 62 The working points of the system are all the pairs [Tslot , P e] that are solutions of the following equation: [Tslot , P e] − F ([Tslot , P e]) = 0 This equation may have one or multiple stable solutions. We have only one solution when each station has only a physically valid working point, i.e. each station is saturated or non-saturated. When the channel starts becoming congested for a subset or for all the stations, we have multi-stability, which translates into multiple solutions to the problem above. λs λs 0 1 λs 2 µs µs λs λs 3 l µs µs Fig. 1. λs l+1 µs Nq µs VO AC Queue Model. TABLE I C HANNEL PARAMETERS Parameter σ Tsif s Tc T sap Value 20µs 10µs Taif s + Tsif s + Tdata + Tsif s + TackT imeout Taif s + nt,ap Tsif s + Tdata + Tsif s + Tack T ssta Taif s Tdata Tack Taif s + nt,sta Tsif s + Tdata + Tsif s + Tack AIF S · σ Tplcp + ThdrM AC + TpayloadM AC Tplcp + TackM AC λs B. Admission Control The model defined above has been used to derive a simple admission control rule for deciding whether to admit or not a given number of VoIP sources in a network. Alg. 1 bases its choice on the status of the AP, which is the bottleneck of the system. If the AP is saturated or is not saturated but experiences high packet losses, the configuration is assumed overloading the network and the particular number of stations can not be admitted. Algorithm 1 Admission Control Check ap 1: decision AcceptNewConfiguration(λt , λsta t ) 2: compute [Tslot , P e] = F ([Tslot , P e]) 3: if AP([Tslot , P e]) is congested then 4: RETURN do not accept 5: else 6: RETURN accept 7: end if as a router between the wireless and wired portion of the testbed, to keep separate the two networks at the IP layer. Real time traffic that we consider is symmetric, i.e. is composed by two identical flows, one from the mobile station to a host on the wired portion of the network and the other one in the opposite direction. All the flows are generated through a traffic generator. We used mgen for higher bit rates. Since mgen has a packet size limit of 24 bytes at the application level, we wrote a simple RTP traffic generator for codec with smaller payload sizes. The admission limit for VoIP sessions is obtained by comparing the loss ratio and total end-to-end delay with some thresholds. The loss ratio can be easily deduced from the sequence number contained in the RTP header. A precise evaluation of the total delay is more difficult, as it requires a synchronization of the clocks between the two endpoints. To overcome this difficulty, we have devised a schema, where the endpoints of each real-time flow coincide. In the experimental set-up, each STA has two interfaces, one connected to the wired network and the other to the wireless network through the AP. A VoIP session is composed by two flows, one outgoing from the wireless interface to the AP, then on the wired link end eventually to the Ethernet card of the same STA. The second flow follows the reverse path. This setup eliminates the need for cumbersome synchronization procedures and makes it possible a very precise measurement of the total endto-end delay. The wired network is composed by 100 Mbit Ethernet links connected through switches. Its contribution to the total delay is negligible, thus we obtain a good estimate of the delay generated by the access network, both in the downlink direction (from the AP to the STA) and in uplink (from the STA to the AP). VI. M ODEL VALIDATION V. E XPERIMENTAL S ETUP To validate our model we implemented an integrated wireless/wireline IP network, where the access network is a IEEE 802.11e infrastructure WLAN that serves wireless hosts (STAs). IEEE 802.11b is used at the physical layer. Both AP and STAs have been realized using laptops. The AP was a Compaq EvoN800v and the STAs were HP tc4200, both running Linux Ubuntu 2.6.15-26-386, equipped with NetGear WG511T wireless NICs and using the MadWifi v.0.9.2.1 driver. In the test-bed, each active STA sends its traffic through the IEEE 802.11e VO access category. The AP is configured 63 In this section we compare the admission boundaries generated by the analytical model described previously with simulation and experimental results. This comparison is not straightforward, for reasons that we explain below. Interestingly, there are discrepancies between simulation and experimental results, whose cause can be traced back to physical diversity issues. We have considered a few codecs and we report results about four, namely two VoIP codecs (ITU G.711 with a fixed bit rate of 64 kbps, and G.729 with a bit rate of 8 kbps), and two videoconferencing codecs at higher bit rates (200 and 300 kbps). For VoIP codecs we consider packetization intervals in TABLE II MAC PARAMETERS PHYSICAL AND Parameter CWmin CWmax AIF S TXOPlimit Value 8 16 2 3264µs Parameter R Tplcp ThdrM AC TackM AC Value 7 120µs 58.18µs 56µs the range of 10-50 ms (corresponding to 100-20 packets per second, pps). For videoconference the packetization range is restricted to 10-25 ms (100-40 pps) so that the MTU is not exceeded. Simulation has been restricted to the behavior of the wireless part of the access network. We used ns2 , with standard extensions for 802.11e 2 , and IEEE 802.11b link parameters set as in Table II. In ns2 we used sources with constant deterministic packet inter-departure intervals. Notice that the analytical model uses instead an exponential process for the arrival of the packets at the queues. The duration of each flow was set at 180 s, both in the simulations and in the experiments. The admission boundary was determined (again for both simulations and experiments) by requiring a loss rate less than 1% and an end-to-end delay of less than 50 ms. Notice that in our setting losses and delays are essentially due to the queue on the AP. The trade-off between losses and delay is controlled by the AP queue size. We used a queue size of 50 and with this value the admissibility is always decided by the loss rate, i.e. by packets discarded at the AP queue. The admission results shown in Fig. 2 were obtained by increasing the number of STAs for a given codec and pps value. Due to the limitation in the number of available machines we were not able to perform experiments with more than 16 STAs. Experiments were repeated 3 times when the number of STAs was non critical, and 5 times at the boundary of the admission region. There were four cases (one for G.729 and three for G.711) in which the admission conditions were met in about half of the experiments. In these cases we decided to classify these configurations as non admissible, thus the data in the plots met the admission criteria along all the repetitions. 1) Impact of the TXOPlimit parameter: The first remark is that 802.11e outperforms 802.11b with respect to the number of admissible STAs. A comparison with the admission limits of 802.11 VoIP traffic reported in [7] (obtained through simulations and analytical model), shows for G.711 an improvement of 4 and 10 STAs at, respectively, 100 and 20 pps. This marked improvement is essentially due to the TXOPlimit parameter, whose impact has been often underestimated in previous works about 802.11e performance. In the case of symmetric traffic, TXOPlimit has an intrinsic prioritization effect since a station with more packets in its sending queue (the AP in our case) can transmit for period longer than stations that have only one 2 [Online]. Available: ieee80211e-ns2/ http://sourceforge.net/projects/ 64 packet waiting. Therefore, although the number of accesses to the wireless channel is evenly distributed, the AP gains a larger goodput. Notice that this happens when the TXOPlimit is the same on the AP and the STAs. The first paper to propose the use of the TXOPlimit parameter to mitigate the AP bottleneck problem is, to our knowledge, [10]. Unfortunately, their analytical model does not capture the dynamic of the sending queue, which ultimately decides how many packets can be actually sent during the TXOPlimit . More work is however needed to determine whether setting a TXOPlimit on the AP larger than that of STAs can improve the voice capacity of a 802.11e cell. 2) Impact of physical diversity: Experimental results reported in Fig. 2 show that actual voice capacity of the 802.11e wireless cell is sometimes higher than predicted by both simulation and model. Predictions based on theory and simulation understimate by one or even 2 STAs the actual admission limit. Our conclusion is that this effect is due to physical layer diversity, that, as highlighted in [8], plays a significant role in mitigating EDCA thhroughput degradation under heavy contention. EDCA exploits this physical layer channel diversity when the collision between two frames of different strength results in a successful decoding of the dominant frame due to signal strength differential. This has two effects, namely: (i) the actual collision probability is lower than expected, and (ii) stations with the weaker signal attemp to transmit less frequently due to exponential backoff. When the wireless channel is in the critical boundary zone, even a slight improvement in the collision probability can affect the performance of the cell. 3) Validity of the model: Since it is difficult to eliminate physical diversity, experimental results must be interpreted with caution. Fig. 2 shows that the simulation limit on STAs does not exceed the boundary determined experimentally. The model slightly understimates the admission limit at higher pps, whereas for lower pps and low bit rates the model admission limit is one or two STAs more than simulations. In only one case the model exceeds the experimental limit (300 kbps, 40 pps). This allows us to conclude that the model capture the essence of the cell behavior for non saturated symmetric traffic, and it is therefore useful for practical purposes. However, the model accuracy can be improved in two respects: (i) introducing a post-Backoff probability for packets that arrive when the sending queue is empty (the current model approximation is that this probability is 1); (ii) using non Poisson sources. For example, deterministic sources are more appropriate in the test bed setting, due to the low jitter on the wired part of the path. 4) Increasing the number of VoIP flows: The admission region for VoIP flows shows a strong dependence on the number of the packets per second generated by the source. For codecs with low bit rate the number of VoIP flows that can be admitted is more than doubled when the packetization interval is doubled (halving the pps number). Since the additional VoIP capacity is relevant, this property can be exploited in practice by using adaptive approaches on the packetization Fig. 2. Admission boundaries for VoIP and videconferencing interval or on the packet size that can be implemented both at the application or at the network layer. Additional studies are required to characterize the increase in the end-to-end delay generated in this case, but the reduction in the channel contention would probably have a positive impact on the overall performance of the WLAN. VII. C ONCLUSION In this paper we propose an analytical model for EDCA WLANs. The proposed analysis models the main characteristics of VoIP scenarios, including both parameters configuration and unbalanced uplink/downlink traffic flows. Moreover, while other models make simplistic assumptions on the use of the TXOPlimit parameter, our analysis models its real dynamic impact. Another advantage of our analysis is the decoupling of channel and stations analysis, leading to a more modular and tractable analysis in the case of complex configurations. Using the model we defined a simple Admission Control algorithm that has been used to validate our model contrasting the results it provides with those obtained using simulations and experiments. In this comparison, the model shows its ability to provide meaningful results, defining a lower bound for the Admission Control. ACKNOWLEDGMENT This work is partly funded by the 6th Framework Program, Information Society Technologies, under Contracts no. FP6IST-038423 (CONTENT), no. FP6-IST-034819 (ONELAB) and no. FP6-IST-033516 (NETQOS). R EFERENCES [1] I. S. 802.11b 1999. IEEE 802.11 WG Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, pages i–90. IEEE, 1999. [2] I. S. 802.11e 2005. IEEE 802.11 WG Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 8, pages 1–189. IEEE, 2005. [3] F. Anjum, M. Elaoud, D. Famolari, A. Ghosh, R. Vaidyanathan, A. Dutta, P. Agrawal, T. Kodama, and Y. Katsube. Voice Performance in WLAN Networks - An Experimental Study. In Proc. of GLOBECOM 2003, volume 6, pages 3503–3508, December 2003. [4] A. Banchs and L. Vollero. Throughput analysis and optimal configuration of 802.11e EDCA. Computer Networks, 50(11):1749–1768, August 2006. 65 [5] B. Bellalta, M. Meo, and M. Oliver. A BEB-Based Admission Control for VoIP Calls in WLAN with Coexisting Elastic TCP Flows. In Proc. of NEW2AN, pages 130–141, 2006. [6] G. Bianchi. Performance Analysis of the IEEE 802.11 Distributed Coordination Function. IEEE Journal on Selected Areas in Communications, 18(3):535–547, March 2000. [7] L. X. Cai, S. Xuemin, J. Mark, L. Cai, and Y. Xiao. Voice capacity analysis of WLAN with unbalanced traffic. IEEE Transactions on Vehicular Technology,, 55(3):752–761, May 2006. [8] S. Choi, K. Park, and C. Kim. Performance Impact of Interlayer Dependence in Infrastructure WLANs. IEEE Transactions on Mobile Computing, 5(7):829–845, July 2006. [9] P. Clifford, K. Duffy, J. Foy, D. J. Leith, and D. Malone. Modeling 802.11e for data traffic parameter design. In Proc. of WiOpt 2006, pages 28–37, Boston, Massachusetts, USA, April 2006. [10] P. Clifford, K. Duffy, D. J. Leith, and D. Malone. On improving Voice Capacity in 802.11 Infrastructure Networks. In Proc. of WIRELESSCOM 2005, volume 1, pages 214–219, June 2005. [11] I. Dangerfield, D. Malone, and D. J. Leith. Experimental Evaluation of 802.11e EDCA for Enhanced Voice over WLAN Performance. In Proc. of WiOpt 2006, pages 1–7, April 2006. [12] P. E. Engelstad and O. N. Østerbø. An analytical model of the virtual collision handler of 802.11e. In Proc. of MSWiM 2005, pages 255–259, 2005. [13] S. Garg and M. Kappes. Can I add a VoIP call? In Proc. of ICC 2003, volume 2, pages 779–783, May 2003. [14] R. G. Garroppo, S. Giordano, S. Lucetti, and L. Tavanti. Admission Region of Multimedia Services for EDCA in IEEE 802.11e Access Networks. In Springer, editor, EuroNGI Workshop, volume 3427 of Lecture Notes in Computer Science, pages 105–120, 2004. [15] D. Gu and J. Zhang. A new measurement-based admission control method for IEEE802.11 wireless local area networks. In Proc. of PIMRC 2003, volume 3, pages 2009–2013, September 2003. [16] S. Harsha, A. Kumar, and V. Sharma. An Analytical Model for the Capacity Estimation of Combined VoIP and TCP File Transfers over EDCA in an IEEE 802.11e WLAN. In Proc of. IWQoS 2006, pages 178–187, 2006. [17] D. P. Hole and F. A. Tobagi. Capacity of an IEEE 802.11b wireless LAN supporting VoIP. In Proc. of ICC 2004, volume 1, pages 196–201, June 2004. [18] D. Pong and T. Moors. Call admission control for IEEE 802.11 contention access mechanism. In Proc. of GLOBECOM 2003, volume 1, pages 174–178, December 2003. [19] J. W. Robinson and T. S. Randhawa. Saturation throughput analysis of IEEE 802.11e enhanced distributed coordination function. IEEE Journal on Selected Areas in Communications, 22(5):917–928, June 2004. [20] Y. Xiao and H. Li. Voice and video transmssions with global data parameter control for the IEEE 802.11e enhance distributed channel access. IEEE Transactions on Parallel and Distributed Systems, 15(11):1041– 1053, November 2004. [21] H. Zhai, X. Chen, and Y. Fang. A call admission and rate control scheme for multimedia support over IEEE 802.11 wireless LANs. Wireless Networks, 12(4):451–463, July 2006.