cross-layer optimization of voice over ip in wireless mesh networks

45
Faculty of Economic Sciences, Communication and IT Computer Science Karlstad University Studies 2010:25 Peter Dely Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

Upload: others

Post on 03-Feb-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

Faculty of Economic Sciences, Communication and ITComputer Science

Karlstad University Studies2010:25

Peter Dely

Cross-Layer Optimization of Voice over IP in Wireless

Mesh Networks

Page 2: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

Karlstad University Studies2010:25

Peter Dely

Cross-Layer Optimization of Voice over IP in Wireless

Mesh Networks

Page 3: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

Peter Dely. Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

Licentiate thesis

Karlstad University Studies 2010:25ISSN 1403-8099 ISBN 978-91-7063-309-6

© The author

Distribution:

Karlstad University

Faculty of Economic Sciences, Communication and IT

Computer Science651 88 KarlstadSweden+46 54 700 10 00

www.kau.se

Printed at: Universitetstryckeriet, Karlstad 2010

Page 4: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

Wireless Mesh Networks (WMNs) have emerged as a promising networktechnology, which combines the benefits of cellular networks and Wireless Lo-cal Area Networks (WLANs). In a WMN mesh routers wirelessly relay trafficon behalf of other mesh routers or clients and thereby provide coverage areascomparable to cellular networks, while having the low complexity and low costsof WLANs.

As Voice over IP (VoIP) is a very important Internet service, it is critical forthe success of WMNs to support high quality VoIP. However, current WMNs arenot adapted well for VoIP. The capacity and scalability of single-radio WMNs islow, especially for small packet transmissions of VoIP calls, because the MACand PHY layer overhead for small packets is high. The scalability of multi-radio/multi-channel WMNs is usually higher, since fewer nodes contend for achannel. However channel scheduling might be required, which can lead toexcessive delay and jitter and result in poor VoIP quality. In this thesis weinvestigate how to deliver high quality VoIP in single radio and multi-radionetworks by using cross-layer optimization.

For single radio WMNs, we consider the use of IP packet aggregation andIEEE 802.11e transmission opportunities. We conclude that IP packet aggre-gation greatly improves the capacity and thereby the scalability of WMNs. Weshow that the key for providing good quality is to artificially delay packetsprior to aggregation. We propose a distributed cross-layer optimization sys-tem, which, based on Fuzzy Logic Inference, derives an aggregation delay thatenhances the capacity and quality.

For multi-radio/multi-channel WMNs, we demonstrate the importance ofquality-of-service-aware channel scheduling. We develop a quality-of-service-aware channel scheduler that compared to a basic round-robin scheme signif-icantly reduces jitter and in that way increases VoIP quality. Our analysisshows that there is a trade-off between the jitter of high priority VoIP trafficand the throughput of background TCP traffic.

The proposed optimizations significantly increase the capacity of single-radio and multi-radio WMNs. This allows network operators to serve moreusers with an existing mesh infrastructure or provide better service delivery toexisting users.

ii

Page 5: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

AcknowledgmentsFirst of all, I would like to take this opportunity thank my advisor AndreasKassler who, like a good sports coach, helped to improve my work through hisadvice, challenging questions and inspirational ideas. Without his continuoussupport all this would have not been possible. Thank you.

Furthermore, I would like to express my gratitude to my colleagues andfriends from the Computer Science department at Karlstad University, in par-ticular the Distributed Systems and Communications Research (DISCO) group,for their support and the enlightening (and sometimes funny or even absurd)discussions at the coffee table. Also, I am grateful to Dirk Staehle (Universityof Wuerzburg, Germany), for reviewing my Licentiate proposal and acceptingthe role of opponent in my Licentiate thesis defense.

I would like to thank the European Commission (well, the European taxpayers) for their financial support through the Interreg IVB North See Re-gion project E-CLIC, the FP7 project NEWCOM++ and COST Action for Traf-fic Monitoring and Analysis. Furthermore, I am grateful for the financial andtechnical support from Deutsche Telekom Research Labs, in particular HansEinsiedler and his group.

Huge thanks go to my parents and my family for their support and en-couragement throughout all the long years of study. Last but not least, I amindebted to my sweet girlfriend Yao Qin, whose love and understanding keepsme motivated from morning to evening.

iii

Page 6: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

List of Appended PapersThis thesis is comprised of the following four peer-reviewed papers. Referencesto the papers will be made using the Roman numbers associated with the pa-pers such as Paper I. The paper reprints are subject to small editorial changes.

I. Peter Dely, Andreas Kassler and Dmitry Sivchenko. Theoretical andExperimental Analysis of the Channel Busy Fraction in IEEE 802.11. InProceedings of Future Network & Mobile Summit 2010, Florence, Italy,June 2010.

II. Peter Dely, Andreas Kassler, Nico Bayer and Dmitry Sivchenko. An Ex-perimental Comparison of Burst Packet Transmission Schemes in IEEE802.11-based Wireless Mesh Networks. In Proceedings of IEEE GlobalTelecommunications Conference (GLOBECOM) 2010, Miami, Florida, De-cember 2010.

III. Peter Dely, Andreas Kassler, Nico Bayer, Hans-Joachim Einsiedler andDmitry Sivchenko. FUZPAG: A Fuzzy-Controlled Packet AggregationScheme for Wireless Mesh Networks. In Proceedings of th InternationalConference on Fuzzy Systems and Knowledge Discovery (FSKD’10), Yan-tai, China, August 2010.

IV. Marcel C. Castro, Peter Dely, Andreas J. Kassler, Nitin H. Vaidya. QoS-Aware Channel Scheduling for Multi-Radio/Multi-Channel Wireless MeshNetworks. In Proceedings of the Fourth ACM International Workshop onWireless Network Testbeds, Experimental evaluation and CHaracteriza-tion (WiNTECH 09), Beijing, China, September 2009.

Comments on my ParticipationFor Papers I-III, I am responsible for carrying out the experimental evaluation,and for most of the written material and ideas. For Paper IV, I am resonsiblefor implementing the scheduler and parts of the experiments and the writtenmaterial.

Other PapersApart from the papers included in the thesis, I have co-authored the followingpapers:

1. Peter Dely and Andreas J. Kassler. On Packet Aggregation for VoIP inWireless Meshed Networks. In Proceedings of 7th Scandinavian Work-shop on Wireless Ad-hoc & Sensor Networks, Stockholm, Sweden, May2007.

iv

Page 7: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

2. Andreas Kassler, Marcel Castro, and Peter Dely. VoIP Packet Aggre-gation based on Link Quality Metric for Multihop Wireless Mesh Net-works. In Proceedings of the Future Telecommunications Conference, Bei-jing, China, October 2007.

3. Marcel C. Castro, Peter Dely, Jonas Karlsson, and Andreas Kassler. Ca-pacity Increase for Voice over IP through Packet Aggregation in WirelessMultihop Mesh Networks. In Proceedings of WAMSNET InternationalWorkshop on Wireless Ad Hoc, Mesh and Sensor Networks, Jeju Island,South Korea, December 2007.

4. Peter Dely and Andreas Kassler. Adaptive Aggregierung von VoIP Paketenin Wireless Mesh Networks. In Proceedings of WMAN FG 2008 (UlmerInformatik Bericht), Ulm, Germany, February 2008.

5. Nico Bayer, Marcel Cavalcanti de Castro, Peter Dely, Andreas Kassler,Yevgeni Koucheryavy, Piotr Mitoraj and Dirk Staehle. VoIP service per-formance optimization in pre-IEEE 802.11s Wireless Mesh Networks (In-vited Paper). In Proceedings of the IEEE ICCSC 2008 Shanghai, China,May 26-28 2008.

6. Jonas Brolin, Peter Dely, Mikael Hedegren, and Andreas Kassler. Im-plementing Packet Aggregation in the Linux Kernel. In Proceedings of8th Scandinavian Workshop on Wireless Ad-hoc & Sensor Networks, Stock-holm, Sweden, May 2008.

7. Peter Dely and Andreas Kassler. KAUMesh Demo. In Proceedings of 9thScandinavian Workshop on Wireless Ad-hoc & Sensor Networks, Uppsala,Sweden, May 2009.

8. Marcel C. Castro, Peter Dely, Andreas J. Kassler, Francesco Paolo D’elia,and Stefano Avallone. OLSR and Net-X as a Framework for Channel As-signment Experiments - Poster Presentation. In Proceedings of the FourthACM International Workshop on Wireless Network Testbeds, Experimentalevaluation and CHaracterization (WiNTECH 09), Beijing, China, Septem-ber 2009.

9. Barbara Staehle, Dirk Staehle, Rastin Pries, Matthias Hirth, Peter Dely,and Andreas Kassler. Measuring One-Way Delay in Wireless Mesh Net-works - An Experimental Investigation. In Proceedings of the 4th ACMPM2HW2N Workshop, Tenerife, Spain, October 2009.

10. Peter Dely, Andreas Kassler, Nico Bayer, Hans-Joachim Einsiedler andDmitry Sivchenko. Method and system for deriving an aggregation delayfor packet aggregation in a wireless network. In European Patent Appli-cation Nr. EP10167525.4, 28. Jun 2010.

v

Page 8: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

11. Peter Dely, Marcel C. Castro, Sina Soukhakian, Arild Moldsvor, AndreasKassler. Practical Considerations for Channel Assignment in WirelessMesh Networks. In Proceedings of IEEE Globecom 2010 Workshop onBroadband Wireless Access (BWA 2010), Miami, Florida, December 2010.

12. Shuqiao Zhou, Peter Dely, Ruixi Yuan, Andreas Kassler. MitigatingControl Channel Saturation in the Dynamic Channel Assignment Pro-tocol. Submitted for publication.

vi

Page 9: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

CONTENTS

ContentsAcknowledgements iii

List of Appended Papers iv

Introductory Summary 1

1 Introduction 3

2 Background 42.1 Wireless Mesh Networks . . . . . . . . . . . . . . . . . . . . . . . . 42.2 Voice over IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102.3 Cross-Layer Design and Optimization . . . . . . . . . . . . . . . . 13

3 Challenges, Solutions and Research Questions 163.1 Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163.2 Solutions and Research Questions . . . . . . . . . . . . . . . . . . 17

4 Research Method 19

5 Summary of Papers and Contributions 215.1 Paper I - Theoretical and Experimental Analysis of the Channel

Busy Fraction in IEEE 802.11 . . . . . . . . . . . . . . . . . . . . . 215.2 Paper II - An Experimental Comparison of Burst Packet Trans-

mission Schemes in IEEE 802.11-based Wireless Mesh Networks 235.3 Paper III - FUZPAG: A Fuzzy-Controlled Packet Aggregation Scheme

for Wireless Mesh Networks . . . . . . . . . . . . . . . . . . . . . . 245.4 Paper IV - QoS-Aware Channel Scheduling for Multi-Radio/Multi-

Channel Wireless Mesh Networks . . . . . . . . . . . . . . . . . . 25

6 Conclusions and Outlook 27

Paper I: Theoretical and Experimental Analysis of the Channel BusyFraction in IEEE 802.11 35

1 Introduction 37

2 Analytical Model 392.1 IEEE 802.11 DCF under Saturation Conditions . . . . . . . . . . 392.2 IEEE 802.11 DCF under Non-Saturation Conditions . . . . . . . . 402.3 Modeling the Channel Busy Fraction . . . . . . . . . . . . . . . . . 412.4 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422.5 Limitations of the Model . . . . . . . . . . . . . . . . . . . . . . . . 42

vii

Page 10: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

CONTENTS

3 Validation of the Model 443.1 Experimental Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . 443.2 Channel Busy Fraction and Traffic Injection Rate . . . . . . . . . 45

4 Application: Available Bandwidth Estimation 46

5 Summary and Conclusion 48

Paper II: An Experimental Comparison of Burst Packet Transmis-sion Schemes in IEEE 802.11-based Wireless Mesh Networks 51

1 Introduction 54

2 Background 552.1 IEEE 802.11, RTS/CTS and Transmission Opportunities . . . . . 552.2 IEEE 802.11 A-MSDU/A-MPDU . . . . . . . . . . . . . . . . . . . 572.3 IP Packet Aggregation . . . . . . . . . . . . . . . . . . . . . . . . . 57

3 Performance Evaluation 583.1 Experimental Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . 583.2 Single-Hop Performance . . . . . . . . . . . . . . . . . . . . . . . . 593.3 Multi-Hop Performance . . . . . . . . . . . . . . . . . . . . . . . . . 62

4 Conclusions 66

Paper III: FUZPAG: A Fuzzy-Controlled Packet Aggregation Schemefor Wireless Mesh Networks 69

1 Introduction 71

2 System Description 732.1 Performance Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 742.2 Impact of Packet Aggregation . . . . . . . . . . . . . . . . . . . . . 74

3 Fuzzy Controlled Packet Aggregation 763.1 Input Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763.2 Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763.3 Fuzzy Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

4 Implementation and Evaluation 794.1 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 794.2 Evaluation Environment . . . . . . . . . . . . . . . . . . . . . . . . 804.3 Controller Stability and Settling Time . . . . . . . . . . . . . . . . 804.4 Single-Hop Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . 82

viii

Page 11: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

CONTENTS

4.5 Multi-Hop Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

5 Conclusions 84

Paper IV: QoS-Aware Channel Scheduling for Multi-Radio/Multi-Channel Wireless Mesh Networks 87

1 Introduction 89

2 Background and Related Work 912.1 Multi-Channel Mesh Networks . . . . . . . . . . . . . . . . . . . . 912.2 IEEE 802.11e EDCA . . . . . . . . . . . . . . . . . . . . . . . . . . 92

3 QoS-Aware Channel Scheduler 923.1 Design Goals and Motivation . . . . . . . . . . . . . . . . . . . . . 923.2 Scheduling Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . 923.3 Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 933.4 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

4 Performance Evaluation 984.1 Evaluation Environment . . . . . . . . . . . . . . . . . . . . . . . . 984.2 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

5 Conclusion 105

ix

Page 12: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

Introductory Summary

Page 13: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks
Page 14: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

1. Introduction 3

1 Introduction

Wireless Mesh Networks (WMNs) have gained notable attention by the re-search community and industry in recent years. WMNs are wireless multi-hopnetworks, which are typically based on cheap Wireless Local Area Network(WLAN) technology, but exceed the coverage area of WLANs by using multi-hop transmissions. Thereby WMNs have emerged as an alternative to othertypes of wireless networks, as they share the low costs, good performance andease of deployment known from classical WLANs, while potentially providinglarge network access coverage for whole cities comparable to cellular networks.

The combination of low cost, high speeds and large coverage made WMNspopular for application scenarios where WLANs or cellular networks could notbe deployed for economic or technical reasons, for example in rural areas ofdeveloping countries. Despite first commercial successes, WMNs remain a veryactive research area. As user numbers grow and new services are introduced,it gets more and more clear that current WMNs cannot fulfill the requirementsof future networks in terms of scalability and performance [1]. In particularmulti-media services such as Voice over IP (VoIP), i.e. telephony over IP-basednetworks, or video conferencing put a high burden on networks, since theydemand low packet loss rates and delay.

VoIP is an integral service of today’s Internet and is likely to be the basis formany future Internet services such as E-learning or E-health. Thus it is crucialfor the further success of WMNs to efficiently support high quality VoIP. How-ever, today’s WMNs lack the scalability required to provide high quality VoIPto large user groups. Increasing the scalability would be advantageous bothfor network operators and end-users. Network operators can achieve higherrevenues if their networks support more users. End-users benefit, since loweroperational expenditures might lead to lower prices and more ubiquitous avail-ability.

The main theme of this thesis is the question of how to advance currentWMNs to support high quality VoIP. The thesis contains an introductory sum-mary, followed by re-prints of four peer-reviewed papers on this topic (subjectto small editorial changes), which were co-authored by the author of this the-sis. To facilitate a better understanding of the questions related to the paperre-prints, Section 2 briefly introduces important background material. In Sec-tion 3 specific research questions are posed and their relevance to the researchcommunity and industry is elaborated. Section 4 discusses the used researchmethod. In Section 5 we summarize the included papers and comment on theirmain contributions. Section 6 concludes the introductory summary and pro-vides an outlook to future work.

Page 15: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

4 Introductory Summary

2 Background

In this section we first explain in detail what WMNs are and how they areused. Then, we proceed with describing the operation and requirements of atypical VoIP system. Finally, we present different approaches for cross-layerperformance optimization and relate them to the ideas used in this thesis.

2.1 Wireless Mesh Networks

Following, we introduce some basic terminology related to wireless mesh net-works, present typical usage scenarios, discuss different types of WMNs andlist characteristics of WMNs and challenges arising from them.

2.1.1 Terminology

According to the IEEE 802.11s draft standard [2], a WMN can comprise fourtypes of nodes: Mesh Stations, Mesh Access Points, Mesh Portals and Sta-tions. A Mesh Station (MSTA) is a node, which supports mesh services i.e.it implements the protocols for the management and operation of a WMN. Inparticular, MSTAs can wirelessly forward traffic. If a node in addition providesaccess services to legacy client stations (STA), it is called Mesh Access Point(MAP). Since the association procedure is identical to the association with anormal access point, accessing the mesh via a MAP is transparent for STAs.A Mesh Portal (MPP) is a mesh node, which is connected to the mesh and asecond network, for example the Internet. It serves as an entry point for MACService Data Units (MSDUs).

As not all WMNs are based on IEEE 802.11s, other terms can be found inliterature (an in this thesis) as well. For example, mesh stations or mesh accesspoints are sometimes called mesh routers or mesh relay nodes [3].

2.1.2 Usage Scenarios

Due to their flexible structure WMNs have a wide range of application scenar-ios, which include:

• Community networks: Local authorities, such as cities or communities,operate mesh networks to provide Internet access to their citizens ortourists. Access to community networks can be free of charge or at verylow costs. Well known examples of mesh community networks are Frei-Funk [4] in Germany or AirJaldi in the Himalaya region [5].

Page 16: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

2. Background 5

Mesh Access Point

Mesh Access Point

Mesh Access Point

Mesh Access Point

Mesh Access Point

Mesh Access Point

Mesh Portal

Wired LAN

Legacy STA

Legacy STA

Legacy STA

Legacy STA

Legacy STA

(a) Backbone/Infrastructure WMN

MeshStation

Mesh Station Mesh

Station

Mesn Station

Mesh Station

Mesh Station

Mesh Portal

Wired LAN

(b) Client WMN

Figure 1: Types of wireless mesh networks

• Hot-spot extension: Hot-spot operators can extend existing hot-spot in-frastructures e.g. on airports or train stations to increase coverage andcapacity (see [6]).

• Home networks: WMNs are used in private homes for the distributionof Internet access and multi-media content. This is in particular usefulwhen Internet access has to be distributed over several rooms or floorsor garden areas [7], as it can solve the access point positioning problemeasily.

• Public security: Closed-circuit television (CCTV) systems are connectedto control rooms via a WMN. Because of the ease of deployment, tempo-rary installations are possible too, for example to monitor large eventssuch as football championships or Olympic Games (e.g. [8]).

• Building automation: WMNs are a suitable technology for connectingsensors and actuators for building automation, especially for buildingswhere no cable infrastructure is present or deploying cables is impossibledue to a preservation order (e.g. [9]).

• Disaster recovery: After natural disasters such as earthquakes or flood-ing, wireless mesh networks can be quickly deployed to replace damagedvoice or data networks and to help coordinating rescue teams (e.g. [10]).

Page 17: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

6 Introductory Summary

2.1.3 Classification of Wireless Mesh Networks

Two types of WMNs are common (depicted in Figure 1) [3]:

• Infrastructure/Backbone WMN: MSTAs and MAPs form a meshed wire-less network that serves as a backbone for legacy clients. The clientsconnect to the MAPs via some other standard, such as IEEE 802.11, butdo not implement any mesh services. Mesh portals can act as gatewaysto wired networks and other wireless technologies such as IEEE 802.16or LTE.

• Client WMN: MSTAs form a mesh network and no MAPs are involved.In such a scenario, MSTA are typically mobile and subject to energy con-straints, which is normally not the case for MAPs in a backbone WMN.Therefore, the requirements of client WMNs are different from infras-tructure WMNs, for example to handle node mobility.

Several other types of wireless networks exist, which have some commonal-ities with WMNs. Mobile Ad-hoc Networks (MANETs) are wireless multi-hopnetworks, which are typically formed by mobile clients. They can be seen as akind of client WMN. The term ad-hoc network is sometimes also used for legacyIEEE 802.11 ad-hoc networks, in which STAs do not forward traffic wirelesslyover multiple hops. Wireless Sensor Networks (WSNs) might also use multi-hop transmissions similar to WMNs, but are usually much more restricted interms of power consumption and processing power. They are therefore consid-ered to be a seperate class of networks.

In this thesis WMNs based on IEEE 802.11 are considered. It should how-ever be noted, that other radio technologies are also used to build mesh net-works. For example, IEEE 802.16 [11] also provides mesh functionality.

WMNs can also be classified by the number of radios and channels used, asdepicted in Figure 2. Radio refers to the wireless network interface card andchannel refers to the wireless communication channel. In WMNs of the firstgeneration nodes only have one radio (single-radio mesh). Second generationWMNs use one dedicated wireless radio for client access and one for forwardingdata and third generation WMNs forward data on multiple radios (multi-radiomesh).

Using multiple radios instead of only one requires different protocols formedium access, channel scheduling and channel assignment. For both single-radio and multi-radio WMNs, we present a few protocols in detail, which areused in Papers I-IV.

Page 18: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

2. Background 7

Figure 2: WMNs of the first, second and third generation (top to bottom)

2.1.4 Single-Radio Mesh Networks

Current WMNs predominately use Media Access Control (MAC) protocols basedon Carrier Sense Multiple Access Collision Avoidance (CSMA/CA). Althoughthere are a few examples of single-radio/multi-channel MAC protocols (e.g. [12]or [13]), they by far less popular than CSMA/CA single-radio/single-channelMAC protocols. Therefore we focus our discussion on CSMA/CA-based proto-cols. CSMA/CA belongs to the class of listen-before-talking protocols. Beforea node transmits a packet, it listens to the wireless channel (carrier sense) todetect ongoing transmissions. Only if the medium is idle, a node transmits.

A prominent example of a CSMA/CA-based protocol is the Distributed Coor-dination Function (DCF), which is the default MAC protocol for IEEE 802.11.DCF implements two modes of operation: In the basic mode, a station trans-mits after a backoff. If the transmission is successful, the receiver waits forShort Interframe Space (SIFS) and answers with an acknowledgement (ACK).If the frame (or the ACK) has not been received correctly, a timer expiris atthe sender and triggers a retry after a backoff procedure. In the other mode,each transmission starts with a request-to-send (RTS) and clear-to-send (CTS)handshake to virtually reserve the medium. Such control packets can improvethe performance in the single-hop case as the data packets are usually largercompared to RTS-CTS control packets and more affected by collisions [14].

The backoff procedure is identical for both modes of operation and works asfollows: Initially, a station chooses a backoff counter randomly and uniformlyfrom [0, W0 − 1], where W0 = CWmin. After the channel was idle during a slot oflength σ, the backoff counter is decremented by 1. When the channel is busy,

Page 19: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

8 Introductory Summary

the countdown is frozen, until the channel becomes idle again for a period ofDCF Interframe Space (DIFS). When the countdown reaches 0, the stationattempts to transmit. Each time a transmission fails, the station selects anew counter value, this time from [0, min(Wi − 1,CWmax)], where i denotes thetransmission attempt counter and Wi = 2iW0.

CWmin, CWmax and DIFS are configurable parameters. The EnhancedDistributed Channel Access (EDCA) is an improved variant of DCF that al-lows different CWmin, CWmax and DIFS values, depending on the traffic type.Thereby the channel access of one traffic class (a so-called access class) can beprioritized over a second class. In addition, the EDCA introduces the conceptof Transmission Opportunities (TXOPs). A TXOP is a time interval (speci-fied by its length TXOPlimit), in which a node might transmit several packetsseparated only by SIFS, without contending for the medium. TXOPs can alsobe configured for each access class individually. EDCA is mandatory in IEEE802.11s compliant devices. Optionally, the Mesh Coordinated Channel Access(MCCA) can be used in IEEE 802.11s [15].

CSMA/CA-based protocols like EDCA suffer from the hidden and the ex-posed node problem. A hidden node is a node which cannot sense the transmis-sion of a neighbor and therefore transmits, which results in a collision with theneighbor’s transmission. A node is called exposed, when it does not transmitbecause of an ongoing neighboring transmission, although it could transmitwithout causing a collision. Both hidden and exposed nodes reduce the per-formance. Multi-radio mesh networks can alleviate the problem to a certainextend, since fewer nodes contend for a channel and therefore the probabilityof a hidden or exposed nodes is lower.

In Papers I and III DCF is used, Paper II also uses features from EDCA.

2.1.5 Multi-Radio Mesh Networks

Multi-radio mesh networks naturally create the possibility of concurrent use ofmultiple channels to increase performance. This inherently poses the questionof how to assign and schedule channels. According to [16], the classificationof channel assignment protocols can be based on how frequently the chan-nel assignments are performed, therefore the protocols and architectures formulti-radio/multi-channel networks can be classified as static, dynamic, semi-dynamic and hybrid.

In the static approach channels are assigned to radios for permanent use.With a dynamic channel assignment scheme, a node switches from one to an-other channel between two consecutive data transmissions. In contrast, semi-dynamic approaches assign or reassign channels at a larger time scale, for

Page 20: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

2. Background 9

Fixed Radio (ch=1) Fixed Radio (ch=2) Fixed Radio (ch=3)

Switchable Radio (ch=1)Switchable Radio (ch=2) Switchable Radio (ch=3)

Figure 3: Example transmission from Node A to C (via B) using Net-X

example minutes or hours. Hybrid schemes are a combination between staticor semi-dynamic and dynamic channel assignment. Typically, one channel isassigned statically or semi-dynamically to one radio, whereas a second radioswitches from channel to channel in a dynamic way.

The aim of channel assignment algorithms is to maximize one or severalperformance metrics such as throughput, while ensuring the connectednessof the network [17]. A network is called connected, if any node can reach anyother node (possibly over multiple hops). A pair of nodes can only communicateif both have one radio tuned to the same channel. To achieve connectedness,a channel assignment algorithm either needs to synchronize channel switches(for dynamic schemes), or assign channels fixed over a longer period of time(static, semi-dynamic or hybrid). With static schemes, a node can at maximumuse as many channels has it has radios. With dynamic or hybrid schemes itis possible to efficiently utilize a large number of channels, even though eachnode is equipped with only two radios.

The Net-X system [18], which is used in Paper IV, is an example of a hybridapproach, as it applies a semi-dynamic assignment to the fixed radio (usedprimarily for receiving data from neighbors) and a dynamic assignment to theswitchable radio (used to transmit data to its neighbors). The semi-dynamicreassignments of the fixed radios are based on the current number of nodesusing the same fixed channel. Therefore, if a node notices that the number ofnodes using the same fixed channel as itself is larger, it can reassign its radioto a less used channel and inform its neighbors.

The channel used by the switchable radio may be changed at any time,without having to inform the neighbors. Thus, the switchable radio can beused to transmit to neighbors whose fixed radios may potentially be on differentchannels. This is illustrated in Figure 3. Node A tunes its switchable radio toChannel 2 to communicate with node B. Similarly, Node B, uses its switchableradio at Channel 3 to transmit data to Node C.

Page 21: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

10 Introductory Summary

2.1.6 Characteristics, Challenges and Solutions

WMNs differ from normal LANs or WLANs in many aspects. This brings alongnew challenges for the design of protocols and requires new solutions, of whichwe discuss a few in this subsection.

Usually, WMNs operate in unlicensed bands, for example the ISM bandat 2.4 GHz or the U-NII band at 5 GHz. In those frequency bands strongfluctuations in link quality due to external interference are common [19]. Inaddition fading causes variation of the channel quality. This necessitates spe-cialized channel assignment protocols such as [20], which take into accountself-inflicted and external interference.

Another feature of WMNs, which requires special attention, is the multi-hop communication paradigm. To enable it, efficient routing protocols have tobe deployed. Compared to wired networks, links in mesh networks are char-acterized through a higher dynamicity and heterogeneity. Protocols like Opti-mized Link State Routing (OLSR) [21] and routing metrics like the ExpectedTransmission Count (ETX) [22] are tailored to multi-hop wireless networks andtherefore achieve better performance than protocols from the wired domain.

An important requirement for WMN protocols is scalability, such that theyoperate efficiently in networks of a few nodes as well as in networks of hun-dreds of nodes. Distributed algorithms usually have better scaling propertiesthan centralized ones and thus are preferable used in WMNs. Distributed pro-tocols further improve resilience, since they do not have a single point of failure.

An important challenge in the design of WMNs is to ensure interoperability.A WMN can comprise different radio technologies, hardware platforms, proto-cols etc. This challenge can be met with architectures as for example proposedin the CARMEN project [23]. This architecture specifies technology indepen-dent interfaces, which enable interoperability.

Compared to wired networks, the throughput of WMNs is typically lower.Providing multi-media services such as streaming video or VoIP, which havestrict Quality of Service (QoS) requirements, is hard [1]. Using admission con-trol schemes like [24] or dynamic bandwidth control like [25], it is possible toimprove the quality of service. Another approach is to increase the efficiency ofmulti-media service transmissions, which is one main theme of this thesis.

2.2 Voice over IP

The International Telecom Union (ITU) defines Voice over IP (VoIP) as thetransmission of voice, fax and related services over packet-switched IP-basednetworks [26]. Services that were previously provided by Public Switched Tele-

Page 22: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

2. Background 11

Packet loss

Speech codingVoice activity detection IP stackPacketization

Network Transmission

De-PacketizationDe-Jitter BufferPacket Loss

Concealment Decoding

Sender

Receiver

VoiceFrame

VoiceFrame

VoiceFrameRTP

VoiceFrame

VoiceFrame

IP/UDP/RTP

VoiceFrame

VoiceFrame

IP/UDP/RTP

Figure 4: Processing chain of a VoIP system

phone Networks systems (PSTN) are run over IP-based networks such as LANsor the Internet. The terminals, i.e. the phones, are IP-enabled devices such aspersonal computers, smart phones or fixed IP phones.

In the following, an overview on the processing of audio signals in a VoIPsystem is provided, relevant standards for transport, coding and signalling areintroduced and a description of the quality evaluation of VoIP is given.

2.2.1 Transmission of Audio Signals with Voice over IP

The processing chain of a VoIP system consists of several steps, which are illus-trated in Figure 4. At the sender, the analog voice is recorded by a microphoneand converted into a digital stream of data. The digital voice is encoded bya speech encoder, which outputs speech frames, each containing the encodedspeech for a small time interval (e.g. 10 ms). One or more speech frames arethen packed together and encapsulated in transport protocol headers. Finally,an IP header is added and the packet can be sent through an IP-based net-work. Optionally, the Voice Activity Detection (VAD) recognizes silent periodsand suppresses the generation of packets to save bandwidth.

At the receiver side, the incoming packets are depacketized. Since the pack-ets might not arrive in a constant flow, they are collected in a de-jitter buffer,that adjusts arrival time differences and the arrival order. If a packet is loste.g. due to errors in the network transmission or excessive jitter, it can be sub-stituted for by example duplicating the packet prior to it or by interpolationof received packets. This can conceal the loss to a certain extent. Finally, thereceiver decodes the packets and outputs them via the sound card.

Page 23: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

12 Introductory Summary

2.2.2 Relevant Standards

A VoIP system comprises components for audio processing, signalling and datatransport. We briefly introduce standards for those tasks now. The systemconverting analogue speech to a digital format and back to an analogue wave-form is called codec. The most important characteristics of a codec are the bitrate, the coding delay, the computational complexity and the perceptual qual-ity. Prominent examples of audio codecs are Speex [27], G.711 [28], G.726 [29],G.729 [30].

Transport protocols for VoIP provide packet sequence numbers and timestamps to allow the detection of packet re-ordering and the synchronization ofstreams. Furthermore, they can give feedback from the network, for exampleabout congestion events or buffer states, to the VoIP application. Commonly,no congestion control and packet retransmissions are done in VoIP transportprotocols. Packet retransmissions are normally not useful for VoIP, becausepacket retransmissions would result in too high delay. By far the most usedVoIP transport protocol is the Real Time Protocol (RTP) [31], which is oftenused along with the Real Time Control Protocol (RTCP). RTCP provides theapplication feedback about the network status. Both protocols are mostly en-capsulated in the User Datagram Protocol (UDP), sometimes also the StreamControl Transmission Protocol (SCTP). Some applications, such as Skype im-plement proprietary transport protocols, which also include features such asencryption and firewall traversal [32].

A VoIP call consists of two uni-directional streams of compressed audio overan IP network. Signalling protocols are used to determine how the caller andthe callee communicate with each other and how to setup those streams. Be-sides that, signalling protocols carry out a number of other tasks, such as ter-minating calls or registering a terminal at a central address register. In thecurrently most popular signalling protocols, H.323 and Session Initiation Pro-tocol (SIP) [33], signalling is independent from the media flow (out-of-bandsignalling).

Coding, signalling and transport protocols are largely interchangeable: forexample, one can use RTP as transport protocol for G.711 or G.723 and set upthe session with SIP or H.323. This modularization makes VoIP flexible andnew protocols can be easily deployed when new requirements and applicationsemerge.

2.2.3 Measuring Voice over IP Quality

Many components influence the quality of a VoIP transmission. In order tooptimize the quality it is essential to have a precise definition of what quality is

Page 24: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

2. Background 13

and to define how to measure it. Quality measurement refers to the process ofobtaining a quality measure or quality metric. A quality metric is a numericalvalue describing the perceived quality of a VoIP call or speech sample. Themeasurement process is called active or intrusive, when additional probe trafficis inserted into the system. In contrast passive or non-intrusive measurementsdo not use probe traffic.

There are two major approaches for measuring speech quality: subjectiveand objective methods. Subjective methods require humans to listen to audiosamples and to judge their quality. The Mean Opinion Score (MOS) is themost widely used subjective quality metric. It is obtained as follows: A groupof human testers listens to a set of speech samples. Each person puts eachsample into a category according to her/his quality perception. The categoriesrange from bad to excellent, or 1 to 5. The MOS of a sample is the averageof all scores for this sample. ITU P.800 [34] describes in detail how a test forobtaining an MOS has to be set up. A clear advantage of subjective methodsis that the judgment of test persons will reflect how real people perceive thequality. On the downside, subjective methods do not allow real-time operation,they are expensive and the test team needs to be large enough and skilled toprovide reliable results.

In contrast, objective measurement methods infer how the quality will beperceived by humans through algorithmic means. The benefits of these meth-ods are that no human interaction is necessary, real-time operation is possible,the operation is cheap and the results are reproducible. However, the out-come of the algorithms might not correlate with the human perception. Themost popular objective quality model is the E-model, which is defined in ITUG.107 [35]. As it does not require a reference signal but only impairment pa-rameters such delay, packet loss and codec distortion it is also called a paramet-ric model. The E-model calculates the R-factor and does not require intrusivemeasurements. The core assumption of the E-model is that the impairmentsare independent and additive. Models were proposed (e.g. [36] or [37]) to con-vert an R-factor into a MOS. Thereby it is possible to predict the quality expe-rienced by humans using a parametric model.

In Paper II, the quality of G.711 VoIP calls is analized using the E-Modelunder consideration of a de-jitter buffer. The R-factor values are converted intoMOS values using [37].

2.3 Cross-Layer Design and Optimization

In a classical layered architecture, such as the Open Systems Interconnectionmodel (OSI model) shown in Figure 5a, a protocol layer just makes use of the

Page 25: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

14 Introductory Summary

Shared Database

a.) Layered reference architecture

b.) Direct communication between layers

d.) Completely new abstractions

c.) Vertical calibration architecture

Figure 5: Layered reference architecture and cross-layer proposals

services of adjacent layers. According to [38], cross-layer design is a method ofdesigning network protocols by deliberately violating the rules of a layered ref-erence architecture. Cross-layer design is interesting in particular for wirelessnetworks, since many higher layer protocols have initially been designed forwired networks and typically only the MAC layer and the Physical Layer (PHYlayer) are designed for wireless networks. As wireless networks commonlyhave different packet loss probabilities or other medium access delay charac-teristics than wired networks, higher level protocols might perform poorly onwireless networks (e.g. TCP). Tuning higher layer protocols, so that they arebetter suited for wireless networks, or tuning wireless networks so that theybetter support specific higher layer protocols can yield high performance gains.For example, in [39], a distributed power control algorithm is presented thatjointly optimizes the throughput of existing TCP protocols and the energy effi-ciency of a wireless multi-hop network.

As stated in [40], two optimization approaches can be found: loosely ortightly coupled. In a loosely coupled optimization, one layer knows the param-eters of an other layer and optimizes its operation according to it. In the tightlycoupled approach, the parameters of two or more layers are jointly optimized.

2.3.1 Cross-Layer Design and Architectures

Cross-layer design can result in different cross-layer architectures [38]. InFigure 5b new interfaces are defined to exchange information between non-adjacent layers in a uni-directional or bi-directional way. This architecture iswell suited for a loosely coupled cross-layer optimization. Figure 5c illustrates

Page 26: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

2. Background 15

a vertical calibration architecture, which uses a shared database for informa-tion exchange. This architecture is in particular suitable for a tightly coupledoptimization that spans across layers. Another approach in cross-layer designis the creation of completely new abstractions, which is shown in Figure 5d.Here, a new protocol layering is defined, for example by optimization decompo-sition. If the decomposition is done successfully, the maximum overall networkutility can be achieved [40].

Each architecture has its strong and weak points. Direct communicationbetween layers is a lightweight approach, which does not require many modifi-cations to the existing layered reference architecture. However, its extensibil-ity is limited. A shared database for the vertical calibration of layers providesa clean structure for extensions, but is slightly more complex than direct com-munication between layers. Creating completely new abstractions certainlybrings along the highest degree of freedom, but also requires a completely newway of thinking. This design paradigm has gained popularity in the researchcommunity as part of the clean-slate design movement [41] in recent years.

In this thesis, two different cross-layer architectures are used to increasethe quality of voice traffic over mesh networks. Paper III implements theshared database approach, while in Paper IV the application layer and themedium access layer directly communicate with each other.

2.3.2 Challenges and Solutions

Cross-layer design has been a very active research area in the past few yearsand has been applied successfully to different problems (e.g. [42], [43] and [44]).Nevertheless, major challenges remain:

First, the coexistence of different cross-layer solutions needs to be stud-ied. If several cross-layer solutions are deployed simultaneously, they mightunintentionally have negative effects on the overall system performance [45].Second, when the principles of the standardized layered architectures are vio-lated, it is then desirable to have new rules and standards for how to violatethe reference architecture. Third, most cross-layer proposals are designed forspecific network conditions. If the network does not run under those conditions,the optimizations will not perform well.

Deploying the solutions presented in Papers III and IV can hence lead toconflicts with other, already installed cross-layer solutions or deliver low per-formance, if the network is operated under conditions, which where not antici-pated in the design of the solutions.

One promising concept to address those issues are so-called cognitive net-works. Cognitive networks have the ability to learn from past experiences and

Page 27: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

16 Introductory Summary

take into account end-to-end goals [46], while cross-layer optimizations are typ-ically just local, memory-less adaptations, that perform the same optimizationagain even is result was poor in the past. We leave it as future work to performthe cross-layer optimizations of Papers III and IV in a cognitive way.

3 Challenges, Solutions and Research Questions

3.1 Challenges

VoIP is an integral service of today’s and the future Internet. Hence, it is criti-cal for the success of WMNs to support VoIP. However, using current technologyposes the following problem: The capacity and scalability of VoIP over WMNsis low because of the low transmission efficiency of small VoIP packets and thehigh requirements VoIP has on the network in terms of delay, packet loss andjitter.

To emphasize the low efficiency of small packet transmissions, Figure 6depicts the various time periods spent in a packet transmission using the IEEE802.11 DCF by comparing 160 and 2304 byte packets. A transmission consistsof a backoff, followed by waiting DIFS, the transmission of PHY, MAC and IPheaders and the data payload. The receiver waits for SIFS and answers withACK, which also requires a PHY header.

For large packets (2304 bytes), the fraction of time spent for transmittingthe payload in relation to the whole transmission time (= efficiency) is higherthan for small packets. Also, the efficiency decreases when the PHY rate isincreased (Figure 7), since several protocol overheads (such as SIFS and DIFS)have a fixed length that does not shrink with a higher PHY rate. This high-lights the importance of transmitting large packets to achieve high efficiency,in particular in the wake of ever increasing PHY speeds.

Furthermore, VoIP only tolerates a small amount of packet loss and low one-way delay. As shown in Figure 8, one-way delays exceeding 200 ms result in asevere quality degradation. In addition, packet loss has a great impact on theperceived quality. For G.729, a packet loss of only 4% leads to a large numberof dissatisfied users. While the delay requirements between different codecsonly differ slightly, the packet loss requirements largely depend on the codecdesign. Theoretically it is possible to design a codec which tolerate as largeloss fraction. However, this comes at the cost of high bandwidth requirements,which would render such a codec ill-suited for WMNs.

Page 28: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

3. Challenges, Solutions and Research Questions 17

DIFS; 34.0µs; 21%

ACK; 2.1µs; 1%

PLCP Preamble and Header; 5.4µs;

3%

SIFS; 16.0µs; 10%

Data Payload; 23.7µs; 15%

IP Header; 3.0µs; 2%

Average Channel Access Delay; 67.5µs; 42%

MAC Header + CRC; 5.0µs; 3%

PLCP Preamble + Header; 5.4µs; 3%

DIFS; 34.0µs; 7%ACK; 2.1µs; 0.2%

PLCP Preamble and Header; 5.4µs;

1%

SIFS; 16.0µs; 3%

Data Payload; 341.3µs; 72%

IP Header; 3.0µs; 1%

Average Channel Access Delay; 67.5µs; 14%

MAC Header + CRC; 5.0µs; 1%

PLCP Preamble + Header; 5.4µs; 1%

Figure 6: Transmission times (in µs) for packet length 160 bytes (left) and 2304bytes (right) at 54 Mbit/s PHY rate

3.2 Solutions and Research Questions

Two possibilities to increase the VoIP capacity of WMNs are to enhance thetransmission efficiency of small packets or use WMNs of the third generation,which allow multiple concurrent transmissions and thereby have higher ca-pacities. Either approach needs to take into account the packet loss and delayrequirements of VoIP to achieve high quality.

Solving those problems would have benefits for network operators and users.Network operators gain from a higher scalability of their networks, since it al-lows them to serve more users and thereby achieving higher revenues. End-users benefit from a better VoIP quality. In addition, an increased scalabil-ity makes mesh networks economically more viable, thereby giving benefits toboth operators and users.

This thesis addresses those problems by investigating the following ques-tions:

• Question 1: How to increase the transmission efficiency for small pack-ets in IEEE 802.11-based WMNs?Due to the high MAC and PHY overhead, the transmission of small pack-ets in IEEE 802.11 is inefficient and thus the capacity is low. In Paper Iwe formulate an analytical model to investigate the relationship betweenthe wireless channel utilization and the mean packet size and arrival ratein a single-cell wireless network. In Paper II we experimentally comparetwo burst transmission schemes, IEEE 802.11e TXOPs and IP packet ag-gregation. We show that both schemes can improve the transmission ef-ficiency of small packets in IEEE 802.11-based WMNs.

• Question 2: How to use cross-layer optimization and IP packet aggre-

Page 29: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

18 Introductory Summary

0%

10%

20%

30%

40%

50%

60%

6 8 9 12 18 24 36 48 54PHY Data Rate (Mbit/s)

Effi

cien

cy

Figure 7: Transmission efficiency of a 160 byte packet

50

60

70

80

90

100

0 100 200 300 400 500

One-way Delay (ms)

R

G.711 @ PL = 0%

G.729A @ PL = 0%

G.729A @ PL = 1%

G.729A @ PL = 2%

G.729A @ PL = 3%

G.729A @ PL = 4%Exceptional limiting case

Very satisfactory

Satisfactory

Some usersdissatisf ied

Many usersdissatisfied

User Satisfaction

PL = Packet Loss

G.729A G.711 Reference

Figure 8: R-factor as a function of packet loss and one-way delay for G.711 andG.729. Source: [47]

Page 30: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

4. Research Method 19

gation to increase the VoIP capacity of WMNs under consideration of thecall quality?

From Paper I we know the relation between packet size and capacity ina single cell and that the channel busy fraction is a good indicator formedium congestion. Also, Paper II shows that IP packet aggregation canimprove the VoIP capacity of WMNs. However, the VoIP quality dependson the aggregation delay and the best value for this parameter varieswith the network load and topology. In Paper III we propose a cross-layer optimization architecture and algorithm for adaptively tuning theaggregation delay. The algorithm is based on fuzzy logic inference anduses the channel busy fraction as input parameter. We experimentallyevaluate the algorithm on the KAUMesh testbed and conclude that anadaptive aggregation delay has positive effects on the end-to-end delay ofVoIP flows and thereby on the perceived user quality.

• Question 3: How to schedule channel switching in third generation ofWMNs while taking into account quality-of-service aspects?

One method of assigning channels and radios in WMNs of the 3rd genera-tion is implemented in the Net-X system [48]. With this approach, a nodeneeds to tune its wireless radio to the channel of the receiving node beforetransmitting the packet. In Paper IV we propose a scheduler that takesinto account QoS considerations, when scheduling the channel switches.We discuss the trade-off between throughput and delay and experimen-tally compare the proposed scheduler with a QoS-unaware scheduler. Weshow that taking into account QoS requirements in the scheduler consid-erable improves VoIP quality.

The methods used for answering the questions are discussed in the followingsection, a summary of the results is given in Section 5 and future questions areposed in Section 6.

4 Research Method

The method used in this thesis follows the common practice [49] of the engi-neering sciences and comprises the following steps: literature review, problemstatement, hypothesis formulation, hypothesis testing and analysis. This pro-cess is iterative, meaning that after the analysis phase the hypothesis is refinedand tested again, until the hypothesis can be accepted with a high confidence.

Literature review is done in order to identify the state-of-the-art and rele-vant problems. Subsequently, a research problem is stated and how a solution

Page 31: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

20 Introductory Summary

to this problem advances the state-of-the-art. Based on the knowledge gainedfrom the literature review, a hypothesis is formulated. The hypothesis deliversa potential explanation of some aspect of the system under consideration andallows making predictions.

In the next step the hypothesis is tested. In the performance analysis ofcomputer systems the most common methods for hypothesis testing are ana-lytical modeling, computer simulation or real-world experiments. An analyticalmodel is a mathematical description of a system. In the process of formulat-ing an analytical model, one needs to find a balance between complexity ofthe model and level of detail. Usually, a higher level of detail leads to morecomplexity, but makes the model more predictive. Computer simulations caninclude more details than analytical models, but still exhibit the same problemof finding a balance between complexity of the simulator and level of abstrac-tion. Complex simulators are more likely to contain software bugs than simpleones. Thus, a higher level of complexity does not necessarily lead to more ac-curacy [50]. Also, the simulation run-time increases with the complexity of thesimulator. Real-world experiments have the lowest level of abstraction, butthe system under investigation needs to exist and environmental factors arehard to control. Also, for cost reasons real-world experiments are usually onlypossible for small number of scenarios, which makes it hard to draw generalconclusions from them.

Each of the hypothesis testing methods has its advantages and disadvan-tages, which need to be considered when selecting the method. However, it isimportant to understand, that neither of the methods should be solely used totest a hypothesis. As a best practice [50], all three methods should be usedto validate each others results. Only when one has confidence that the model,the implementation of the simulator or real system are correct, one should usethem for hypothesis testing.

In the following, we describe by the example of Paper I how the researchmethod was applied: In this paper we analyzed the use of the channel busyfraction as indicator of available bandwidth. The literature review showed thatcurrent approaches mainly are probe-based, which induces additional over-head. Therefore, the problem we stated was how to obtain the available band-width using passive measurements. Based on the study of related work, weformulated the hypothesis, that the channel busy fraction is a good indicatorof the available bandwidth. To test this hypothesis, we formulated an analyt-ical model of the channel busy fraction based on an embedded time Markovchain and implemented a measurement system for the channel busy fractionin the KAUMesh testbed. We chose not to use computer simulations here, sincethe testbed was readily availble and the implications of different experimentaldesigns were well understood. We validated the model against the implemen-

Page 32: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

5. Summary of Papers and Contributions 21

tation by comparing model predictions to the measurement results. The com-parison comprised a set of different input parameters (such as network size,traffic rate and packet size), which allowed us to investigate if the model ac-curacy is sensitive to the variation of any of the parameters. The evalutiontried to exclude effects which are not part of the model (e.g. channel bit errors),by placing the senders and receivers close to each other. Then we tested ourhypothesis, that the channel busy fraction is a good indicator for the availablebandwidth. We concluded that for the cases tested, our hypothesis is indeedvalid. However, due to the small amount of scenarios evaluated, we cannot saywith confidence, that the hypothesis will be true in all scenarios.

5 Summary of Papers and Contributions

In this section we summarize the related work and background material, high-light the most important outcomes and contributions and discuss shortcomingsof the presented papers.

5.1 Paper I - Theoretical and Experimental Analysis ofthe Channel Busy Fraction in IEEE 802.11

The congestion level on the wireless channel is an important information forthe operation and optimization of IEEE 802.11 networks, for example to per-form admission control. Traditionally, the congestion level has been estimatedwith probe packets, for example in the ETX routing metric [51]. However, probepackets create additional traffic and there is an inherent trade-off between ac-curacy and probe frequency. More recently, it has been proposed to use passivemeasurements, such as capturing all packets in RF-monitor mode (e.g. [52]) orusing the Clear Channel Assessment (CCA) (e.g [53]) instead. The CCA indi-cates whether there is an ongoing transmission. Using this information, onecan calculate the channel busy fraction, i.e. the fraction of time the channelis sensed busy. Previous research has studied the channel busy fraction incontext of a specific application only (e.g. [53] or [54]).

In Paper I we present a thorough evaluation of the relationship between thebusy fraction and other important characteristics such as the collision proba-bility and throughput. Our main contributions are:

• An analytical model, that is capable of predicting the channel busy frac-tion as a function of traffic arrival rates, packet size and network size.

• A validation of the model with measurements in the KAUMesh testbed.

Page 33: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

22 Introductory Summary

0.60

0.65

0.70

0.75

0.80

0.85

0.90

0.95

1.00

3 3.5 4 4.5 5 5.5 6

Aggregate Injection Rate (Mbit/s)

Cha

nnel

Bus

y Fr

actio

n

Experiment/4 SenderExperiment/8 SenderExperiment/12 SenderModel/4 SenderModel/8 SenderModel/12 Sender

Figure 9: Model predictions and measurements

As shown in Figure 9 the predictions from the model match measure-ments well.

• A simple, but accurate method of estimating the available bandwidth. Weshow that the channel busy fraction allows an accurate prediction of theavailable bandwidth with an error smaller than 70 kbit/s.

The main limitation of our analytical model is the focus on single cell net-works and the inability to handle hidden terminals. Our model is based on anembedded time Markov chain [55], which requires well defined slot-boundariesin the state transitions. Unfortunately, this cannot be guaranteed in the pres-ence of hidden terminals. Alternative formulations of the problem are possible,for example using the approach in [56]. However the resulting model is by farmore complex.

Estimating the available link bandwidth is useful in certain scenarios, forexample in single-cell WLANs. However, predicting the available bandwidth ofa path that traverses multiple wireless hops such as found in WMNs is morechallenging. Due to intra-path interference in multi-hop transmissions, theestimation of the available end-to-end bandwidth is more complex and requiresa different modeling approach.

Page 34: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

5. Summary of Papers and Contributions 23

0.00.10.20.30.40.50.60.70.80.91.0

1.0 1.5 2.0 2.5 3.0 3.5 4.0 4.5Mean Opinion Score (MOS)

P(M

OS

≤ x

)

IEEE 802.11IEEE 802.11 RTS/CTSIEEE 802.11e TXOPlimit=8msIEEE 802.11e TXOPlimit=8ms RTS/CTSAggregation (delay=8ms)Aggregation (delay=8ms) RTS/CTS

Figure 10: Cumulative distribution of MOS with 12 VoIP calls with TXOPs,RTS/CTS and IP packet aggregation (values from 50 different scenarios)

5.2 Paper II - An Experimental Comparison of Burst PacketTransmission Schemes in IEEE 802.11-based WirelessMesh Networks

Using the IEEE 802.11 distributed coordination function (DCF) as MAC layer,a node needs to contend for the medium each time it wants to transmit apacket. This creates high overhead in particular for small packets and leadsto poor performance for real-time applications such as Voice over IP (VoIP) oronline gaming.

Burst packet transmission can increase the efficiency. For example, with theTransmission Opportunity limit (TXOPlimit) in IEEE 802.11e, a station maytransfer several packets without contending for the channel in between. Sim-ilarly, IP packet aggregation combines several IP packets together and sendsthem as one MAC Service Data Unit. Originally, both schemes have been de-veloped for single-hop networks only. Thus the impact on WMNs is unclear ifthe packets need to contend over multiple hops.

As the main contribution of Paper II we present measurements from a 9-node WMN testbed to compare TXOPs and IP packet aggregation for VoIP interms of fairness, network capacity and quality of user experience. Our mostimportant insights are:

Page 35: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

24 Introductory Summary

• For low networks loads, both TXOPs and IP packet aggregation increasethe VoIP quality compared to IEEE 802.11 DCF.

• In multi-hop transmissions traffic is typically not backlogged. While IPpacket aggregation artificially delays packets prior to aggregation, IEEE802.11e just uses the medium access delay to buffer packets to be sentwithin one TXOP. Therefore IP packet aggregation can create larger burstsizes and yields a higher efficiency than TXOPs.

• For highly loaded networks, represented by Figure 10, the VoIP qual-ity for standard IEEE 802.11 is poor. Only a small fraction of the callsreceive an acceptable MOS (> 3.5). TXOPs and IP packet aggregationsignificantly increase the number of high quality calls. Interestingly, theuse of a RTS/CTS handshake is counterproductive when using TXOPs orIP packet aggregation, although it should help to remedy the impact ofcollisions and hidden nodes when long packets are transferred. A pon-tential explaination for this behavior is the creation of exposed nodes byRTS/CTS, which are received by far distant nodes and thereby unneces-sarily block distant transmissions.

As one of the main shortcomings of Paper II, it does not include the A-MSDUand A-MPDU schemes of IEEE 802.11n in the performance evaluation. Also,the interaction with other network functions such as routing and the impact ofhidden nodes should be studied in future work.

5.3 Paper III - FUZPAG: A Fuzzy-Controlled Packet Ag-gregation Scheme for Wireless Mesh Networks

Packet aggregation increases the capacity of IEEE 802.11-based WMNs by ag-gregating small packets into larger ones and thereby reducing overhead. Inorder to have enough packets to aggregate, packets need to be delayed in abuffer. Current aggregation mechanisms use fixed buffer delays or do not takeinto account the delay characteristics of the saturated IEEE 802.11 MAC layer.

By varying the buffer delay it is possible to increase or decrease the aggre-gation efficiency and thereby the load on the network. For a given traffic inputrate (e.g. 5 Mbit/s), larger packets are transmitted more efficienctly and thususe fewer channel resources (less overhead, fewer collisions) than smaller pack-ets. However, too large buffer delays lead to large end-to-end latency, which isdisadvantageous for VoIP. For low network loads it is not necessary at all toarticifially delay packets in the buffer. As shown in Paper I, the channel busyfraction is a good indicator for the network load and therefore helps to find agood buffer delay.

Page 36: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

5. Summary of Papers and Contributions 25

In Paper III, we present FUZPAG, a novel packet aggregation architecturefor IEEE 802.11-based wireless mesh networks. FUZPAG uses Fuzzy Controlto determine a reasonable aggregation buffer delay under the current channelutilization. FUZPAG selects the minimum buffer delay which is required totransmit packet sizes large enough to keep the network right before saturationstate. In this state the collision probability and thus medium access delay islow. By cooperation among neighboring nodes FUZPAG distributes the bufferdelay in a fair way.

We have implemented the system on Linux and evaluated it in KAUMeshtestbed. For different network topologies we show that FUZPAG outperformsstandard aggregation in terms of end-to-end latency under a wide range oftraffic. Figure 11 shows the end-to-end latency of UDP flows when no aggrega-tion is used (NOAGG), static buffer sizes are configured (AGG-bufferdelay) andFUZPAG selects the buffer delay (FUZPAG). The result show that FUZPAGchooses a buffer delay which results in a low end-to-end latency, while staticschemes might add too little or too much delay, depending on the network load.The low end-to-end latency of FUZPAG is important for VoIP.

The main contributions of Paper III are the definition and implementa-tion of a modular cross-layer optimization system that implements the shareddatabase approach and an algorithm for dynamically adapting the aggregationdelay based on the network load. As major improvement to existing works(e.g. [57]), we estimate the channel load from the clear channel assessment(CCA) data of IEEE 802.11 (as described in Paper I) and through cooperationdistribute the buffer delay among nodes in a fair way.

As potential future improvements of FUZPAG, the convergence time of thecontroller should be reduced to make it more suited when traffic rates varyfast.

5.4 Paper IV - QoS-Aware Channel Scheduling for Multi-Radio/Multi-Channel Wireless Mesh Networks

In non-static multi-radio/multi-channel wireless mesh networks architecturessuch as Net-X [18], mesh nodes need to switch channels in order to communi-cate with different neighbors. If the channel scheduler does not consider therequirements of real time traffic such as VoIP, this can lead to excessive delayor jitter and low VoIP quality.

In Paper IV we propose a channel scheduler for the Net-X platform thattakes into account the priority of the currently used channel and the priorityof all other channels, which have packets to send. The scheduler first serveschannels with high priority traffic and afterwards channels with low priority

Page 37: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

26 Introductory Summary

0

5

10

15

20

25

30

35

40

2 3.2 4.4 5.6Traffic Injection Rate (Mbit/s)

Avg

. End

-to-E

nd L

aten

cy (m

s)

NOAGG AGG-500AGG-1000 AGG-1500AGG-2000 AGG-2500AGG-3000 FUZZY

Figure 11: Average end-to-end latency with no aggregation, static aggregation(500, 1000, 1500, 2000, 2500, 3000 µs aggregation delay) and fuzzy controlledaggregation

traffic. The scheduling pattern is chosen in a way to minimize delay and jitterfor high priority traffic, but still giving good throughput to low priority traffic.A configurable parameter allows reducing jitter on cost of throughput or viceversa.

The evaluation of the algorithm in the KAUMesh testbed shows that it out-performs the standard round-robin scheduler both in terms of average delayand jitter. The 90-percentile of end-to-end packet delay is around 30 ms lowerwith the QoS-aware scheduler (Figure 12).

The main contributions of Paper IV are the definition and analysis of a QoS-aware scheduling algorithm, its implementation in the Net-X platform and itsevaluation.

The proposed algorithm schedules channels on local knowledge only. In-cluding neighbor information to coordinate channel switches could further de-crease the end-to-end delay and jitter. Also in our performance evaluation wemake use of static traffic priorities among flows. Dynamically assigning packetpriorities based on the already experienced delay or jitter promises further im-provements.

Page 38: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

6. Conclusions and Outlook 27

0

0.1

0.2

0.3

0.4

0.50.

010.

020.

030.

040.

050.

060.

070.

080.

090.

100.

110.

120.

130.

140.

150.

160.

170.

18M

ore

Packet Delay (sec)

Num

. of P

acke

ts (n

orm

aliz

ed)

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

CD

F (%

)

DefaultQoSDefault-CDFQoS-CDF

Figure 12: Histogram of voice packet delay

6 Conclusions and Outlook

In this thesis we have investigated the feasibility of voice over single-radio andmulti-radio WMNs. We have shown that through the optimizations proposedin this thesis the capacity can be significantly improved compared to currentprotocols. Yet, many questions are still open and need to be investigated. Inparticular, future work has to address two major shortcomings of this thesis:

First, this thesis uses the unrealistic assumption that all traffic originatesfrom mesh nodes. In a real WMN, most traffic originates from end-user de-vices which connect to the mesh network through some access network, suchas WLAN. This leads to different traffic arrival patterns and network loads.Also, other types of traffic found in currently popular applications, such asvideo could be used. Second, the proposed cross-layer optimizations are domainspecific and do not make use of potential benefits from learning the network be-havior. To deal with the first issue, the interaction between WLAN access to aWMN and the WMN backbone network need to be studied. The second issuecan be addressed by applying the cognitive network paradigm to the discussedcross-layer optimization problems.

On the methodological side, it is required to give more comprehensive math-ematical descriptions of the system and perform experimental evaluations thatincorporate data from real user traces and operational networks. A more so-phisticated mathematical model should lead to a deeper understanding of the

Page 39: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

28 Introductory Summary

processes affecting the performance of WMNs. Using real user data helps toavoid wrong assumptions about traffic patterns, network loads and deploymentscenarios.

References

[1] D. Niculescu, S. Ganguly, K. Kim, and R. Izmailov, “Performance of voipin a 802.11 wireless mesh network,” apr. 2006, pp. 1 –11.

[2] J. Camp and E. Knightly, “The ieee 802.11s extended service set meshnetworking standard,” Communications Magazine, IEEE, vol. 46, no. 8,pp. 120 –126, aug. 2008.

[3] I. Akyildiz and X. Wang, “A survey on wireless mesh networks,” IEEECommunications Magazine, no. September, pp. 23–30, 2005.

[4] B. Milic and M. Malek, “Analyzing Large Scale Real-World Wireless Multi-hop Network,” IEEE Communications Letters, vol. 11, no. 7, pp. 580–582,Jul. 2007.

[5] “AirJaldi Website,” 2010. [Online]. Available: http://drupal.airjaldi.com

[6] R. Bruno, M. Conti, and E. Gregori, “Mesh networks: commodity multihopad hoc networks,” Communications Magazine, IEEE, vol. 43, no. 3, pp. 123– 131, mar. 2005.

[7] K. Papagiannaki, M. Yarvis, and W. S. Conner, “Experimental charac-terization of home wireless networks and design implications,” Proc. of25TH IEEE International Conference on Computer Communications (IN-FOCOM 2006)., pp. 1–13, Apr. 2006.

[8] F. Licandro and G. Schembra, “Wireless mesh networks to supportvideo surveillance: architecture, protocol, and implementation issues,”EURASIP Journal on Wireless Communications and Networking, vol.2007, no. 1, p. 34, 2007.

[9] T. Ciardiello, “Wireless communications for industrial control and moni-toring,” Computing Control Engineering Journal, vol. 16, no. 2, pp. 12 –13, apr. 2005.

[10] M. Portmann and A. Pirzada, “Wireless mesh networks for public safetyand crisis management applications,” Internet Computing, IEEE, vol. 12,no. 1, pp. 18 –25, jan. 2008.

Page 40: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

REFERENCES 29

[11] “Ieee standard for local and metropolitan area networks part 16: Air inter-face for broadband wireless access systems amendment 1: Multiple relayspecification,” IEEE Std 802.16j-2009 (Amendment to IEEE Std 802.16-2009), pp. c1 –290, jun. 2009.

[12] J. So and N. Vaidya, “Multi-Channel MAC for Ad Hoc Networks: HandlingMulti-Channel Hidden Terminals Using a Single Transceiver,” in In Proc.of ACM MobiHoc ’04, 2004, pp. 222–233.

[13] P. Bahl, R. Chandra, and J. Dunagan, “SSCH: slotted seeded channel hop-ping for capacity improvement in IEEE 802.11 ad-hoc wireless networks,”in Proc. of the 10th annual international conference on Mobile computingand networking (MobiCom ’04), 2004, pp. 216–230.

[14] G. Bianchi, “Performance analysis of the IEEE 802. 11 distributed coor-dination function,” IEEE Journal on selected areas in communications,vol. 18, no. 3, pp. 535–547, 2000.

[15] J. Camp and E. Knightly, “The ieee 802.11s extended service set meshnetworking standard,” Communications Magazine, IEEE, vol. 46, no. 8,pp. 120–126, 2008.

[16] J. Crichigno, M. Wu, and W. Shu, “Protocols and architectures for chan-nel assignment in wireless mesh networks,” Ad Hoc Networks, vol. 6, pp.1051–1077, September 2008.

[17] W. Si, S. Selvakennedy, and A. Y. Zomaya, “An overview of channel assign-ment methods for multi-radio multi-channel wireless mesh networks,” J.Parallel Distrib. Comput., vol. 70, no. 5, pp. 505–524, 2010.

[18] C. Chereddi and P. Kyasanur and N. H. Vaidya, “Design and Implementa-tion of a Multi-Channel Multi-Interface Network,” in Proc. of REALMAN,2006.

[19] A. Subramanian, J. Cao, C. Sung, and S. Das, “Understanding Channeland Interface Heterogeneity in Multi-channel Multi-radio Wireless MeshNetworks,” in Passive and Active Network Measurement. Springer, 2009,pp. 89–98.

[20] K. N. Ramachandran, E. M. Belding, K. C. Almeroth, and M. M. Bud-dhikot, “Interference-aware channel assignment in multi-radio wirelessmesh networks,” Apr. 2006, pp. 1 –12.

[21] A. Tonnesen and T. Lopatic and H. Gredler and B. Petrovitschand A. Kaplan and S.O. Tuecke, “olsrd Website.” [Online]. Available:http://www.olsr.org/

Page 41: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

30 Introductory Summary

[22] D. S. J. De Couto, D. Aguayo, J. Bicket, and R. Morris, “A high-throughputpath metric for multi-hop wireless routing,” Wirel. Netw., vol. 11, no. 4, pp.419–434, 2005.

[23] A. Banchs, N. Bayer, D. Chieng, A. de La Oliva, B. Gloss, M. Kretschmer,S. Murphy, M. Natkaniec, and F. Zdarsky, “CARMEN: Delivering carriergrade services over wireless mesh networks,” in Proc. of IEEE 19th Inter-national Symposium on Personal, Indoor and Mobile Radio Communica-tions, Sep. 2008, pp. 1–6.

[24] H. yu Wei, K. Kim, A. Kashyap, and S. Ganguly, “On admission of voipcalls over wireless mesh network,” vol. 5, jun. 2006, pp. 1990 –1995.

[25] R. Pries, D. Hock, and D. Staehle, “QoE based Bandwidth ManagementSupporting Real Time Flows in IEEE 802.11 Mesh Networks,” SpecialIssue PIK on Mobile Ad-hoc Networks, vol. IV/2009, Jan. 2010.

[26] C. McTaggar and T. Kelly, “IPTEL/03,” Geneva, 2000.

[27] J. Valin, “The Speex Codec Manual.” [Online]. Available: http://www.speex.org/docs/

[28] “ITU-T Recommendation G.711: Pulse Code Modulation (PCM) of VoiceFrequencies,” International Telecommunications Union, Tech. Rep., 1971.

[29] “ITU-T Recommendation G.726: Adaptive Differential Pulse Code Mod-ulation (ADPCM),” International Telecommunications Union, Tech. Rep.,1990.

[30] “ITU-T Recommendation G.729: Coding of speech at 8 kbit/s us-ing conjugate-structure algebraic-code-excited linear prediction (CS-ACELP).” International Telecommunications Union, Tech. Rep., 2007.

[31] H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson, “STD 64: RTP: Atransport protocol for real-time applications,” Jul. 2003, see also RFC3550.Obsoletes RFC1889.

[32] S. a. Baset and H. G. Schulzrinne, “An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol,” in Proc. of 25th IEEE InternationalConference on Computer Communications (INFOCOM 2006). IEEE, Apr.2006, pp. 1–11.

[33] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson,R. Sparks, M. Handley, and E. Schooler, “SIP: Session Initiation Protocol,”RFC 3261 (Proposed Standard), Internet Engineering Task Force, June2002, updated by RFCs 3265, 3853, 4320, 4916, 5393, 5621. [Online].Available: http://www.ietf.org/rfc/rfc3261.txt

Page 42: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

REFERENCES 31

[34] International Telecommunications Union, “P.800 : Methods for subjectivedetermination of transmission quality,” 1996.

[35] ——, “G.107 : The E-model: a computational model for use in transmissionplanning,” 2009.

[36] R. Cole and J. Rosenbluth, “Voice over IP performance monitoring,” ACMSIGCOMM Computer Communication Review, vol. 31, no. 2, p. 24, 2001.

[37] “ITU-T Recommendation G.107, International Telephone Connection andCircuits - General Definitions. The E model, a Computational Modelfor Use in Transmission Planning,” International TelecommunicationsUnion, Tech. Rep., March 2005.

[38] V. Srivastava and M. Motani, “Cross-layer design: a survey and the roadahead,” IEEE Communications Magazine, vol. 43, no. 12, pp. 112–119,Dec. 2005.

[39] M. Chiang, “Balancing transport and physical layers in wireless multihopnetworks: jointly optimal congestion control and power control,” SelectedAreas in Communications, IEEE Journal on, vol. 23, no. 1, pp. 104 – 116,jan. 2005.

[40] I. F. Akyildiz and X. Wang, “Cross-Layer Design in Wireless Mesh Net-works,” IEEE Transactions on Vehicular Technology, vol. 57, no. 2, pp.1061–1076, 2008.

[41] A. Feldmann, “Internet clean-slate design: what and why?” SIGCOMMComput. Commun. Rev., vol. 37, no. 3, pp. 59–64, 2007.

[42] U. Kozat, I. Koutsopoulos, and L. Tassiulas, “A framework for cross-layerdesign of energy-efficient communication with QoS provisioning in multi-hop wireless networks,” in IEEE INFOCOM 2004, vol. 00, no. C. IEEE,2004, pp. 1446–1456.

[43] N. Baldo and M. Zorzi, “Fuzzy Logic for Cross-Layer optimization in Cog-nitive Radio Networks,” 2007 4th IEEE Consumer Communications andNetworking Conference, pp. 1128–1133, Jan. 2007.

[44] M. Chiang, “To layer or not to layer: balancing transport and physicallayers in wireless multihop networks,” in IEEE INFOCOM 2004, vol. 00,no. C. IEEE, 2004, pp. 2525–2536.

[45] V. Kawadia and P. Kumar, “A cautionary perspective on cross-layer de-sign,” IEEE Wireless Communications, vol. 12, no. 1, pp. 3–11, Feb. 2005.

Page 43: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

32 Introductory Summary

[46] R. W. Thomas, “Cognitive networks,” PhD Thesis, Virginia PolytechnicInstitute & State University, 2007.

[47] Telecommunications Industry Association, “Technical Services Bulletin116-A,” 2005.

[48] P. Kyasanur and N. Vaidya, “Routing and interface assignment in multi-channel multi-interface wireless networks,” IEEE Wireless Communica-tions and Networking Conference, 2005, pp. 2051–2056.

[49] D. Reed, A balanced introduction to computer science. Pearson PrenticeHall, 2008.

[50] R. Jain, The Art of Computer Systems Performance Analysis: Techniquesfor Experimental Design, Measurement, Simulation, and Modeling. NewYork: Wiley- Interscience, 1991.

[51] D. S. J. De Couto, D. Aguayo, J. Bicket, and R. Morris, “A high-throughputpath metric for multi-hop wireless routing,” in MobiCom ’03: Proceedingsof the 9th annual international conference on Mobile computing and net-working. New York, NY, USA: ACM, 2003, pp. 134–146.

[52] Y.-C. Cheng, J. Bellardo, P. Benko, A. C. Snoeren, G. M. Voelker, andS. Savage, “Jigsaw: solving the puzzle of enterprise 802.11 analysis,” SIG-COMM Comput. Commun. Rev., vol. 36, no. 4, pp. 39–50, 2006.

[53] T. Salonidis, M. Garetto, A. Saha, and E. Knightly, “Identifying HighThroughput Paths in 802.11 Mesh Networks: a Model-based Approach,” inProc. of IEEE International Conference on Network Protocols 2007 (ICNP2007), Oct. 2007, pp. 21–30.

[54] I. Sheriff, P. A. K. Acharya, and E. M. Belding, “Measurement-drivenadmission control on wireless backhaul networks,” Comput. Commun.,vol. 31, no. 7, pp. 1354–1371, 2008.

[55] D. Malone, K. Duffy, and D. Leith, “Modeling the 802.11 DistributedCoordination Function in Nonsaturated Heterogeneous Conditions,”IEEE/ACM Transactions on Networking, vol. 15, no. 1, pp. 159–172, Feb.2007.

[56] L. Qiu, Y. Zhang, F. Wang, M. Han, and R. Mahajan, “A general modelof wireless interference,” in Proc. of the 13th annual ACM internationalconference on Mobile computing and networking (MOBICOM 2007). NewYork, New York, USA: ACM, 2007, p. 182.

Page 44: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks

REFERENCES 33

[57] R. Riggio, F. De Pellegrini, N. Scalabrino, P. Li, Y. Fang, and I. Chlamtac,“Performance of a novel adaptive traffic aggregation scheme for wirelessmesh networks,” IEEE Military Communications Conference (MILCOM2007)., pp. 1–7, Oct. 2007.

Page 45: Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks