ieee/acm transactions on networking, vol. 15, no. 2, april 2007 323 …lila/m2r/8.pdf · 2010. 10....

11
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 Feedback-Based Control for Providing Real-Time Services With the 802.11e MAC Gennaro Boggia, Member, IEEE, Pietro Camarda, Luigi Alfredo Grieco, Member, IEEE, and Saverio Mascolo, Senior Member, IEEE Abstract—The 802.11e working group has recently proposed the hybrid coordination function (HCF) to provide service differenti- ation for supporting real-time transmissions over 802.11 WLANs. The HCF is made of a contention-based channel access, known as enhanced distributed coordination access, and of a HCF controlled channel access (HCCA), which requires a Hybrid Coordinator for bandwidth allocation to nodes hosting applications with QoS requirements. The 802.11e proposal includes a simple scheduler providing a Constant Bit Rate service, which is not well suited for bursty media flows. This paper proposes two feedback-based bandwidth allocation algorithms to be used within the HCCA, which have been referred to as feedback based dynamic scheduler (FBDS) and proportional-integral (PI)-FBDS. These algorithms have been designed with the objective of providing services with bounded delays. Given that the 802.11e standard allows queue lengths to be fed back, a control theoretic approach has been em- ployed to design the FBDS, which exploits a simple proportional controller, and the PI-FBDS, which implements a proportional-in- tegral controller. Proposed algorithms can be easily implemented since their computational complexities scale linearly with the number of traffic streams. Moreover, a call admission control scheme has been proposed as an extension of the one described in the 802.11e draft. Performance of the proposed algorithms have been theoretically analyzed and computer simulations, using the ns-2 simulator, have been carried out to compare their behaviors in realistic scenarios where video, voice, and FTP flows, coexist at various network loads. Simulation results have shown that, unlike the simple scheduler of the 802.11e draft, both FBDS and PI-FBDS are able to provide services with real-time constraints. However, while the FBDS ad- mits a smaller quota of traffic streams than the simple scheduler, PI-FBDS allows the same quota of traffic that would be admitted using the simple scheduler, but still providing delay bound guaran- tees. Index Terms—Real-time applications, QoS, wireless networks. I. INTRODUCTION I EEE 802.11 WLANs are widely employed for ensuring ubiquitous networking due to their easy installation, flexi- bility and robustness against failures [1]. At the present, they allow data rates up to 54 Mb/s, using orthogonal frequency division multiplexing techniques [2], [3]. Despite of its very broad diffusion, 802.11 medium access control (MAC) cannot support real time applications, character- ized by strict constraints on packet delay and jitter [4]–[6]. Re- Manuscript received December 30, 2003; revised December 22, 2005; ap- proved by IEEE/ACM TRANSACTIONS ON NETWORKING Editor M. Buddhikot. The authors are with the Dipartimento di Elettrotecnica ed Elettronica, Politecnico di Bari, 4-70125 Bari, Italy (e-mail: [email protected]; ca- [email protected]; [email protected]; [email protected]). Digital Object Identifier 10.1109/TNET.2007.892881 TABLE I EDCA CONTENTION PARAMETERS cently, to overcome this limitation, the 802.11e working group has proposed: 1) the hybrid coordination function (HCF) as an enhanced access method; 2) a call admission control (CAC) al- gorithm; 3) specific signaling messages for service request and quality of service (QoS) level negotiation; and 4) four access categories (ACs) with different priorities to map the behavior of traffic flows with users’ QoS requirements [7]. The HCF is made of a contention-based channel access, known as enhanced distributed coordination access (EDCA), and of a HCF controlled channel access (HCCA), which re- quires a centralized controller, called hybrid coordinator (HC), generally located at the access point. EDCA operates as the basic DCF access method [1], but using different contention parameters per AC (see Table I). In this way, a service differen- tiation among traffic streams is statistically pursued [8]. Tuning EDCA parameters to provide prioritization of ACs is a current research topic [9]. A method for setting EDCA parameters has been described in [10]. Regarding the goal of providing delay guarantees, several papers have pointed out that the EDCA can provide a real-time service to highest priority flows, at the price of starving flows with lower priority, especially at high network load [11]–[13]. Moreover, EDCA can provide only a relative differentiation among service classes, but not absolute guarantees on throughput/delay performance [8], [14]. To overcome those limitations, adaptive algorithms that dy- namically tune EDCA parameters have been recently proposed in [15] and [16]; however, the effectiveness of these schemes have been proved only using simulations and no theoretical bounds on their performance in a general scenario have been derived. With the HCCA, the HC is responsible for assigning the right to transmit at nodes hosting applications with QoS require- ments, i.e., to perform dynamic bandwidth allocation within the WLAN. However, the 802.11e draft does not specify an effec- tive bandwidth allocation algorithm; it only suggests a simple scheduler that uses static values declared by data sources for providing a constant bit rate (CBR) service. As a consequence, this scheduler is not well suited for bursty media flows [17]. An improved bandwidth allocation algorithm has been proposed 1063-6692/$25.00 © 2007 IEEE

Upload: others

Post on 24-Aug-2021

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 …lila/M2R/8.pdf · 2010. 10. 24. · IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 Feedback-Based

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323

Feedback-Based Control for Providing Real-TimeServices With the 802.11e MAC

Gennaro Boggia, Member, IEEE, Pietro Camarda, Luigi Alfredo Grieco, Member, IEEE, andSaverio Mascolo, Senior Member, IEEE

Abstract—The 802.11e working group has recently proposed thehybrid coordination function (HCF) to provide service differenti-ation for supporting real-time transmissions over 802.11 WLANs.The HCF is made of a contention-based channel access, known asenhanced distributed coordination access, and of a HCF controlledchannel access (HCCA), which requires a Hybrid Coordinatorfor bandwidth allocation to nodes hosting applications with QoSrequirements. The 802.11e proposal includes a simple schedulerproviding a Constant Bit Rate service, which is not well suitedfor bursty media flows. This paper proposes two feedback-basedbandwidth allocation algorithms to be used within the HCCA,which have been referred to as feedback based dynamic scheduler(FBDS) and proportional-integral (PI)-FBDS. These algorithmshave been designed with the objective of providing services withbounded delays. Given that the 802.11e standard allows queuelengths to be fed back, a control theoretic approach has been em-ployed to design the FBDS, which exploits a simple proportionalcontroller, and the PI-FBDS, which implements a proportional-in-tegral controller. Proposed algorithms can be easily implementedsince their computational complexities scale linearly with thenumber of traffic streams. Moreover, a call admission controlscheme has been proposed as an extension of the one described inthe 802.11e draft. Performance of the proposed algorithms havebeen theoretically analyzed and computer simulations, using thens-2 simulator, have been carried out to compare their behaviorsin realistic scenarios where video, voice, and FTP flows, coexist atvarious network loads.

Simulation results have shown that, unlike the simple schedulerof the 802.11e draft, both FBDS and PI-FBDS are able to provideservices with real-time constraints. However, while the FBDS ad-mits a smaller quota of traffic streams than the simple scheduler,PI-FBDS allows the same quota of traffic that would be admittedusing the simple scheduler, but still providing delay bound guaran-tees.

Index Terms—Real-time applications, QoS, wireless networks.

I. INTRODUCTION

I EEE 802.11 WLANs are widely employed for ensuringubiquitous networking due to their easy installation, flexi-

bility and robustness against failures [1]. At the present, theyallow data rates up to 54 Mb/s, using orthogonal frequencydivision multiplexing techniques [2], [3].

Despite of its very broad diffusion, 802.11 medium accesscontrol (MAC) cannot support real time applications, character-ized by strict constraints on packet delay and jitter [4]–[6]. Re-

Manuscript received December 30, 2003; revised December 22, 2005; ap-proved by IEEE/ACM TRANSACTIONS ON NETWORKING Editor M. Buddhikot.

The authors are with the Dipartimento di Elettrotecnica ed Elettronica,Politecnico di Bari, 4-70125 Bari, Italy (e-mail: [email protected]; [email protected]; [email protected]; [email protected]).

Digital Object Identifier 10.1109/TNET.2007.892881

TABLE IEDCA CONTENTION PARAMETERS

cently, to overcome this limitation, the 802.11e working grouphas proposed: 1) the hybrid coordination function (HCF) as anenhanced access method; 2) a call admission control (CAC) al-gorithm; 3) specific signaling messages for service request andquality of service (QoS) level negotiation; and 4) four accesscategories (ACs) with different priorities to map the behavior oftraffic flows with users’ QoS requirements [7].

The HCF is made of a contention-based channel access,known as enhanced distributed coordination access (EDCA),and of a HCF controlled channel access (HCCA), which re-quires a centralized controller, called hybrid coordinator (HC),generally located at the access point. EDCA operates as thebasic DCF access method [1], but using different contentionparameters per AC (see Table I). In this way, a service differen-tiation among traffic streams is statistically pursued [8]. TuningEDCA parameters to provide prioritization of ACs is a currentresearch topic [9]. A method for setting EDCA parameters hasbeen described in [10]. Regarding the goal of providing delayguarantees, several papers have pointed out that the EDCAcan provide a real-time service to highest priority flows, at theprice of starving flows with lower priority, especially at highnetwork load [11]–[13]. Moreover, EDCA can provide only arelative differentiation among service classes, but not absoluteguarantees on throughput/delay performance [8], [14].

To overcome those limitations, adaptive algorithms that dy-namically tune EDCA parameters have been recently proposedin [15] and [16]; however, the effectiveness of these schemeshave been proved only using simulations and no theoreticalbounds on their performance in a general scenario have beenderived.

With the HCCA, the HC is responsible for assigning the rightto transmit at nodes hosting applications with QoS require-ments, i.e., to perform dynamic bandwidth allocation within theWLAN. However, the 802.11e draft does not specify an effec-tive bandwidth allocation algorithm; it only suggests a simplescheduler that uses static values declared by data sources forproviding a constant bit rate (CBR) service. As a consequence,this scheduler is not well suited for bursty media flows [17]. Animproved bandwidth allocation algorithm has been proposed

1063-6692/$25.00 © 2007 IEEE

Page 2: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 …lila/M2R/8.pdf · 2010. 10. 24. · IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 Feedback-Based

324 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007

in [18], which schedules transmission by taking into accountboth the average and the maximum declared source rates. Anadaptive version of the simple scheduler, which is based onthe delay-earliest due-date algorithm, has been proposed in[17]. However, this scheduler does not exploit any feedbackinformation from mobile stations, but implements a trial anderror procedure for discovering the optimal amount of resourcesto assign to each AC. The Fair Scheduling scheme proposedin [19] allocates the WLAN channel bandwidth to wirelessnodes in order to fully deplete transmission queues, which areestimated by taking into account the delayed feedbacks fromthe wireless nodes.

This paper proposes two feedback-based bandwidth alloca-tion algorithms exploiting HCCA to provide service with guar-anteed bounded delays: 1) the feedback based dynamic sched-uler (FBDS) and 2) the proportional integral (PI)-FBDS. Theyhave been designed using classic discrete-time feedback controltheory. Proposed algorithms have low computational costs andcan be easily implemented in wireless network interface cards.Theoretical results have been exploited to properly select theparameters of the FBDS and PI-FBDS bandwidth allocation al-gorithms in order to provide both system stability and real-timeservice. In particular, they have shown that using PI-FBDS thereare more degrees of freedom in the choice of the parameter setsof the bandwidth allocation algorithm with respect to the caseof FBDS, so that the parameter set can be properly selected inorder to optimize system performace. Simulation results, ob-tained using the ns-2 simulator [20], have shown that, unlike thesimple scheduler proposed by the 802.11e working group, bothFBDS and PI-FBDS provide a real-time service with QoS guar-antees in terms of delay, regardless of the network load. More-over, when the PI-FBDS is used, the best tradeoff between theone-way packet delay and the network utilization is achieved.

The rest of the paper is organized as follows. Section II givesan overview of the HCCA method. In Section III, FBDS andPI-FBDS algorithms are proposed. Section IV shows simulationresults. Finally, the Section V draws the conclusions.

II. OVERVIEW OF THE HCCA METHOD

The core of the 802.11e proposal is the HCF, which is incharge of assigning Transmission Opportunities (TXOPs) toeach AC in order to satisfy its QoS needs. TXOP is definedas the time interval during which a station has the right totransmit and is characterized by a starting time and a maximumduration. Contiguous time during which TXOPs are grantedto the same station with QoS capabilities (i.e., a QoS station,QSTA) are called service period (SP). The interval betweentwo successive SPs is called service interval [4], [7].

HCCA method combines some EDCA characteristics withsome features of the point coordination function (PCF) scheme,which is an optional contention-free access method defined bythe basic 802.11 standard [1], [4]. The time is divided into re-peated periods, called superframes (SFs). Each SF starts witha beacon frame after which, for legacy purpose, there could bea contention free period (CFP) for PCF access. The remainingpart of the SF forms the contention period (CP), during whichQSTAs contend for the access to the radio channel using theEDCA mechanism (see Fig. 1). At least one CP interval, long

Fig. 1. Scheme of a SF using the HCF controlled access method.

enough to transmit a data frame with the maximum size at theminimum rate, must be contained in each SF; the CP intervalcan be also used for management tasks, such as associations ofnew stations, new traffic stream negotiations, and so on.

During the CP, the HC can start a contention access phase(CAP),1 during which only QSTAs that are polled and grantedwith the QoS CF-Poll frame are allowed to transmit duringthe assigned TXOPs. Thus, the HC implements a prioritizedmedium access control.

The number of CAPs and their locations in each SF arechosen by the HC in order to satisfy QoS needs of each station.CAP length cannot exceed the value of the system variabledot11CAPLimit, which is advertised by the HC in the beaconframe when SFs start [7].

The simple scheduler proposed in the draft [7] states that theassigned to the th traffic queue in the WLAN should

be computed as follows:

(1)

where refers to the th queue, is the nominal size of MACservice data units (MSDUs), is the rate at which the data aretransmitted over the wireless channel, is the protocol over-head, is the maximum MSDU size, and ,where is the mean data rate associated with the queue and

is the service interval.According to IEEE 802.11e specifications, each QSTA can

feed back queue length of each AC to the HC in the frames’headers. As will be shown in this paper, this information can befruitfully exploited to design novel dynamic bandwidth alloca-tion algorithms based on HCCA, using feedback control theory[21].

A. QoS Signalling

In the 802.11e proposal [7] each traffic stream, i.e., a dataflow with QoS needs, is described by a Traffic SPECification(TSPEC), which indicates the main characteristics of the stream(e.g., nominal/maximum size of MAC frames, maximum burstsize, delay bound, and so on) [7]. The TSPEC is similar to theone introduced in [22] for IP FlowSPecs definition and adoptedin IntServ [23] and DiffServ [24] architectures. Specific sig-nalling has been introduced to manage new traffic stream re-quests and QoS provisioning. In particular, to start a new stream,the QSTA issues a setup phase by generating a message, knownas Mac Layer Management Entity (MLME)-ADDTS request,

1HCCA can be also enabled during the CFP with a procedure similar to theone described in this section.

Page 3: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 …lila/M2R/8.pdf · 2010. 10. 24. · IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 Feedback-Based

BOGGIA et al.: FEEDBACK-BASED CONTROL FOR PROVIDING REAL-TIME SERVICES WITH THE 802.11E MAC 325

containing the TSPEC of the stream [7]. This request message issent to the HC which decides whether or not to admit the streamwith the specified TSPEC, or to suggest an alternative TSPEC.The decision of the HC is transmitted with the ADDTS responsemessage. After the reception of this response, the QSTA sendsa message specifying whether the HC response meets its needsor not; if not, the whole process can be repeated [7].

B. Call Admission Control

In IEEE 802.11e networks, the HC is used as an admissioncontrol unit. There are two distinct admission control schemes:one for the contention-based access and the other for the con-trolled-access. Herein, we will focus on the latter mechanism.Details regarding the contention-based admission control canbe found in [7].

Let be the number of admitted flows. In the presence of anew admission request for a traffic stream, the admission con-trol unit calculates the TXOP duration needed by the stream

as imposed by the simple scheduler [see (1)]. Thestream is admitted if the following inequality is satisfied:

(2)

where is the SF duration, and is the time during whichEDCA is used for frame transmissions in the SF. It is worthnoting that the terms used in the CAC test (2), are com-puted using the (1). This implies that the CAC does not take intoaccount the actual network load but only an estimation based onstatic values declared by data sources in their TSPECs when de-ciding wheter to admit or not a new stream.

III. FBDS AND PI-FBDS ALGORITHMS

In this section, FBDS and PI-FBDS algorithms will be de-signed using feedback control theory. We will assume that bothalgorithms, running at the HC, allocate the WLAN channelbandwidth to wireless stations hosting real-time applications,using HCCA functionalities. This allows the HC to assignTXOPs to ACs by taking into account their specific time con-straints and transmission queue levels [13]. We will refer to aWLAN system made of an access point and a set of quality ofservice enabled mobile stations (QSTAs). Each QSTA has upto four queues, one for each AC in the 802.11e proposal. Let

be the time interval between the starting of two successiveCAPs (see Fig. 1). Every time interval , which is assumedto be constant, the HC must allocate the bandwidth that willdrain each queue during the next CAP. We assume that at thebeginning of each CAP, the HC is aware of all the queue levels

at the beginning of the previous CAP, whereis the total number of traffic queues in the WLAN.2

2This is a worst case assumption. In fact, queue levels are fed back using frameheaders as described in Section II; as a consequence, if the ith queue length hasbeen fed at the beginning of the previous CAP, then the feedback signal mightbe delayed up to T seconds.

Fig. 2. Closed-loop control scheme based on HCCA.

The following discrete time linear model describes the dy-namics of the th queue:

(3)

where is the queue level at the beginning of the thCAP; is the average depletion rate (i.e., its absolutevalue represents the bandwidth assigned to drain the queue);

is the difference between ,which is the average input rate at the queue during the thinterval, and , which is the average output rate atthe queue during the th interval using the EDCA.

The input is unpredictable since it depends on the be-havior of the source that feeds the th queue and on the numberof packets transmitted using EDCA. Thus, from a control theo-retic perspective, can be modelled as a disturbance [25].Without loss of generality, the following piece-wise constantmodel for the disturbance can be assumed:

(4)

where is the unitary step function, , and is atime lag [25].

Due to the assumption (4), the linearity of the system de-scribed by (3), and the superposition principle that holds forlinear systems, we will design the feedback control law by con-sidering only a step disturbance: [25].

A. Closed-Loop Control Scheme

Our goal is to design a control law that drives the queueingdelay , experienced by each frame going through the thqueue, to a desired target value that represents the QoSrequirement of the AC associated to the queue.

We will consider the closed loop control system shown inFig. 2, where the set point has been set equal to zero, whichmeans that we would ideally target empty queues. Regardingthe transfer function of the controller, we will focuson two very simple controllers: a proportional (P) controller

, and a proportional-integral (PI) controller. The corresponding bandwidth

allocation algorithms will be referred to as feedback baseddynamic scheduler (FBDS), and PI-FBDS.

Page 4: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 …lila/M2R/8.pdf · 2010. 10. 24. · IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 Feedback-Based

326 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007

1) Case of a Proportional Controller:Proposition 1: The system reported in Fig. 2, where, is asymptomatically stable if and only if the following in-

equality holds:

(5)

Proof: By considering the control scheme in Fig. 2 with, it is straightforward to compute the -transforms

of and

(6)

where .From (6) it results that the system poles are

; thus, the system is asymptotically stableif and only if , that is:

Proposition 2: By considering the system reported in Fig. 2,where and , the following in-equality has to be satisfied in order to achieve a steady-statedelay smaller than the target delay :

(7)

Proof: By considering that the -transform of the stepfunction is , if we apply thefinal value theorem [21] to (6), it results

which implies that the steady-state queueing delay is

The proof can now be easily derived by imposing

Remark 1: It is worth noting that even if ,which means that the proportional controller is not able to fullyreject the step disturbance .

Remark 2: From (5) and (7), the parameter must satisfythe constraint

(8)

Remark 3: From Propositions 1 and 2 it turns out that thegain can vary in the range . We will set at its

lowest admissible value , allocating the lowest bandwidththat guarantees the target delay. In this way a cautious usage ofthe WLAN channel is achieved.

2) Case of a PI Controller:Proposition 3: The system reported in Fig. 2, where

, is asymptomatically stable if and only if thefollowing inequalities hold:

(9)

Proof: By considering the control scheme in Fig. 2 with, it is straightforward to compute

the -transforms of and

(10)

(11)

where , and.

The proof follows by applying the Jury criterion [21] to-transforms (10) and (11).Proposition 4: By considering the system reported in Fig. 2,

where and , thesteady-state delay is zero.

Proof: By applying the final value theorem to (10), where, it turns out

which implies that the steady-state queueing delay is zero. .Remark 4: A steady-state queueing delay equal to zero is due

to the integral action of the controller, which is able to fullyreject the step disturbance at steady state.

Remark 5: It is worth noting that parameters of the PI regu-lator are subject only to the stability constraints (9). As a con-sequence, there are more degrees of freedom when chosingand with respect to the case of the proportional controller.3

Remark 6: When the PI controller is used, it might happenthat the depletion rate computed by the controlledis larger than , which is the amount of bandwidth re-quired to fully deplete the th queue during the th CAP. Thisassignement would obviously waste WLAN resources. To over-come this drawback, we will employ the following shortcut:

(12)

where the term is the depletion rate needed to fullyempty the queue.

B. TXOP Assignment

We have seen in Section II that, every time interval , theHC allocates TXOPs to mobile stations in order to meet the QoSconstraints. Herein, we shows how to transform the bandwidth

3We will show in the last section the impact of k and T in a realisticscenario involving video, voice, and FTP flows.

Page 5: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 …lila/M2R/8.pdf · 2010. 10. 24. · IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 Feedback-Based

BOGGIA et al.: FEEDBACK-BASED CONTROL FOR PROVIDING REAL-TIME SERVICES WITH THE 802.11E MAC 327

into a assignment. In particular, if the th queue isdrained at rate , the following relation holds:

(13)

where is the TXOP assigned to the th queue duringthe th CAP, and is the time overhead due to ACK packetsand interframe spaces (see Fig. 1).

The extra quota of TXOP due to the overhead dependson the number of MSDUs corresponding to the amount of data

to be transmitted. could be estimated byassuming that all MSDUs have the same nominal size speci-fied into the TSPEC. Moreover, when does notcorrespond to a multiple of MSDUs, the TXOP assignment isrounded in excess in order to guarantee a queueing delay equalor smaller than the target value .

C. Call Admission Control and Channel Saturation

The above bandwidth allocation algorithm is based on theimplicit assumption that the sum of the TXOPs assigned toeach traffic stream is smaller than the maximum CAP dura-tion, which is defined by the system variable dot11CAPLimit;this value can be violated when the network is saturated. Inorder to avoid heavy channel saturations, we propose a CACscheme which is an improved version of the one proposed by the802.11e working group. However, since transient network over-loads cannot be avoided due to the burstiness of the multimediaflows, when for a given we have that:dot11CAPLimit, each computed is decreased byan amount , so that the following capacity con-straints is satisfied:

dot11CAPLimit

(14)

In particular, the generic amount is evaluatedas a fraction of the total amountdot11CAPLimit , as follows:

(15)

Notice that (15) provides a , which is propor-tional to ; in this way, connections transmittingat low rates are not too much penalized.

When the number of multimedia flows sharing the WLAN in-creases, the channel saturates and delay bounds cannot be guar-anteed [16]. In order to avoid heavy channel saturations, we pro-pose a new CAC scheme, which exploits the 802.11e CAC pro-posal (see Section II).

In particular, starting from the TXOPs allocated to the activetraffic streams in each CAP, a new flow request is admitted if

(16)

where is the number of admitted flows, is the SF duration,and is the time used by EDCA during the SF.

Notice that the proposed CAC scheme given by (16) has beenobtained from the CAC suggested in the 802.11e draft [7] (seeSection II-B), by replacing the constant TXOPs used by thesimple scheduler with the time-varying ones allocated by theproposed bandwidth allocation algorithms. For the same reason,the term in (2) has been replaced by the term in (16). Inthis way, our proposed CAC takes into account the bandwidthactually used by the flows and not the sum of the average sourcerates declared in the TSPECs. In other terms, the proposed CACis a measurement-based CAC [26], providing a better protectionagainst network overloads with respect to the CAC test (2) pro-posed in [7].

D. Computational Complexity of the Bandwith AllocationAlgorithms

Herein, we estimate the computational complexity of the pro-posed allocation algorithms.

Channel saturation episodes will be neglected because we as-sume they are sporadic due to the effectiveness of the admissioncontrol scheme.

Proposition 5: In a WLAN system with active trafficstreams, the computational complexity of the FBDS algorithmis .

Proof: Every time interval , the HC computes thebandwidth assignment for each one of the active trafficstreams, using (13). With FBDS, from Fig. 2, the control law is

(17)

Thus, (13) becomes

(18)

where .As a consequence a single bandwidth assignment consists of

two multiplications and one sum. The first multiplication takesinto account the term , the second one estimates the pro-tocol overhead, which is proportional to . Thus, we need

multiplication plus sums for each interval, i.e., thecomputational complexity is

Proposition 6: In a WLAN system with active trafficstreams, the computational complexity of the PI-FBDS algo-rithm is .

Proof: For each active stream, the HC computes the band-width by using (13). When PI-FBDS is used, the control law is

(19)

which can be also written as

(20)

Page 6: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 …lila/M2R/8.pdf · 2010. 10. 24. · IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 Feedback-Based

328 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007

Thus, (13) becomes

(21)

where .Now, considering that the overhead is estimated using 1

multiplication, a single bandwidth assignment consists of 4multiplications and 3 sums. As a consequence, we needmultiplication plus a sums for each interval. Thus, thecomputational complexity is .

From the above propositions, we can conclude that the com-putational complexities of both FBDS and PI-FBDS scale lin-early with the number of active streams. Thus, such schemes canbe easily implemented in real wireless network interface cards.

IV. PERFORMANCE EVALUATION

In order to assert the validity of FBDS and PI-FBDS in real-istic scenarios, computer simulations involving voice, video andFTP data transfers have been run using ns-2 [20]. We have con-sidered a scenario where a 802.11a wireless channel at 54 Mb/sis shared by a mix of voice flows encoded with the G.729standard [27], MPEG-4 encoded video flows [28], H.263video flows [29], and FTP best effort flows. Therefore, in sucha scenario the traffic load is proportional to the parameter .

For video flows, we have used traffic traces available fromthe video trace library [30]. G.729 sources are modeled usingMarkov ON/OFF sources [31]. The ON period is exponentiallydistributed with mean 3 s; the OFF period has a truncated expo-nential pdf with an average value of 2.23 s and an upper limitof 6.9 s. During the ON period, the voice source sends packetsof 20 bytes every 20 ms (i.e., the source data rate is 8 kb/s; alsowe are considering two G.729 frames combined into one packet[32]). By taking into account the overheads of the RTP/UDP/IPprotocol stack the total rate over the wireless channel is 24 kb/s,during the ON periods. During the OFF period the rate is set tozero since we assume the presence of a voice activity detector(VAD).

During CAPs, stations access the channel using the HCCAmethod, otherwise they use EDCA. In simulations, EDCA pa-rameters have been set as suggested in [7].

The target delay has been set equal to 30 ms for voiceflows and 40 ms for video flows. According to 802.11 stan-dard, in our ns-2 implementation is expressed in time units(TUs), each one equal to 1024 s [1]; we assume a of 29TUs in order to satisfy inequality (8). The value of system vari-able dot11CAPlimit has been set in order to allow the transmis-sion of at least 10 MSDUs of maximum size using EDCA, be-tween the starting of two successive CAPs.

When FBDS is used, the proportional gain is set equalto (see Section II). When PI-FBDS is used, we have sim-ulated the scenario using many parameter sets (results will bereported in Section IV-B) and we have selected the set

, which provide a good tradeoff between theratio of admitted flows and the one-way packet delay.

The main characteristics of the considered multimedia flowsare summarized in Table II.

TABLE IIMAIN FEATURES OF THE CONSIDERED MULTIMEDIA FLOWS

TABLE IIIRATIOS OF ADMITTED FLOWS

Before starting data transmission, a multimedia source has toset up a new traffic stream as specified in Section II-A. If thereply to the stream admission message is not received within a

timeout interval, the request is repeated up to a maximumnumber of times; in our simulations, we have chosen

and s. If after admission triesno reply is received back, then the request is considered lost anda new admission procedure is initiated after an exponential dis-tributed random time with average value equal to 1 min.The duration of video flows is deterministic and equal to 10 min,whereas voice flows durations are exponentially distributed withaverage value of 120 s. When a multimedia flow terminates, anew stream of the same type is generated after an exponentiallydistributed random time, with an average value equal to 1 min.Each terminated flow is withdrawn from the polling list by theHC after that no more packets from that flow are received for atime equal to the Inactivity Interval reported in Table II. Eachsimulation lasts 1 h.

A. Performance Comparison of PI-FBDS, FBDS, and theSimple Scheduler

Table III reports the ratio of admitted flows for various valuesof the network load parameter when PI-FBDS or FBDS or thesimple scheduler are used.

By looking at this table, it is straightforward to note thatFBDS admits the smallest ratio of flows. On the other hand, al-most all the flows are admitted when either the PI-FBDS or thesimple scheduler are used. The reason is that the simple sched-uler allocates TXOPs by taking into account the declared av-erage source rates, which can be much smaller than the actualsource rates; as a consequence, the CAC test realized with (2)is always satisfied. When FBDS or PI-FBDS are used, the CACtest given by (16) takes into account the actual load. The sub-stantial difference between FBDS and PI-FBDS is that the PIregulator gives the opportunity to choice its parameter set in abroader space of values with respect to the case of a propor-tional controller. In particular, we can select the parameter setof the PI regulator to filter out high frequency components ofthe traffic load better than in the case of the P regulator. In other

Page 7: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 …lila/M2R/8.pdf · 2010. 10. 24. · IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 Feedback-Based

BOGGIA et al.: FEEDBACK-BASED CONTROL FOR PROVIDING REAL-TIME SERVICES WITH THE 802.11E MAC 329

Fig. 3. Average one-way packet delay of real-time flows.

words, the PI-FBDS algorithm allows CAC test of (16) to con-sider only low frequency components of network load, with theconsequence that a larger number of flows are admitted.

At this point, due to the smaller number of admitted trafficstreams, we would expect lower one-way packet delays whenFBDS is employed with respect to one-way packet delays ob-tained with the simple scheduler or PI-FBDS. This is shownin Fig. 3 where the one-way packet delays experienced by theMPEG, H.263, and G.729 flows are reported. By looking atthose figures, we can note that FBDS provides the smallest de-lays due the smallest quota of admitted flows. The surprisingresult is that, with high load (i.e., ) although the simplescheduler and PI-FBDS admit the same ratio of flows, delays ob-tained with PI-FBDS are one order of magnitude smaller thanthose obtained with the simple scheduler. The latter result high-lights that if network resources are carefully managed, a goodtradeoff between the number of admitted flows and the one-waypacket delay can be achieved, also with high load.

To look at those results from another point of view, Figs. 4–6show the CDF of the one-way packet delays obtained forMPEG4, H.263, and G.729 flows, respectively. They clearlyhighlights that as the load parameter increases differencesamong the consider bandwidth allocation algorithms becomemore evident. In particular, while for and delaysobtained with PI-FPDS, FBDS, and the simple scheduler aresimilar to each other, when the simple scheduler isno more able to provide a service with bounded delay, whilePI-FBDS and FBDS guarantees real-time packet delivery.Obviously, FBDS provides delays smaller with respect toPI-FBDS due to the smaller quota of admitted flows.

Table IV reports the average and peak SF utilization in HCCAmode, which is defined as the sum of TXOPs allocated duringCAPs over the SF duration. It shows that the simple schedulerrequires the highest average quota of WLAN resources. Thereason is that the simple scheduler does not adapt the quotaof allocated resources to the actual load because it providesa CBR service. For the same reason, the peak SF utilizationsachieved by the simple scheduler for and , i.e.,at high traffic load, are smaller than those provided by FBDSand PI-FBDS. This result clearly highlights that the proposedcontrol schemes enable a more proper usage of the bandwidth

Fig. 4. CDFs of the one-way packet delays for MPEG4 flows when� = 5; 10; 12.

Fig. 5. CDFs of the one-way packet delays for H.263 flows when� = 5; 10;12.

Fig. 6. CDFs of the one-way packet delays for G.729 flows when� = 5; 10;12.

and allows the bandwidth requirements of the real-time flows tobe tracked.

Finally, Table IV reports also the goodput achieved by theFTP flows when the PI-FBDS or the FBDS or the simple sched-uler are used. It is straightforward to note that the goodput ofthe FTP flows is strictly related to the average SF utilization. Infact, when FBDS is used, FTP flows obtain the highest goodput,

Page 8: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 …lila/M2R/8.pdf · 2010. 10. 24. · IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 Feedback-Based

330 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007

TABLE IVRESULTS IN HCCA MODE

Fig. 7. Ratio of admitted flows obtained using the PI-PBDS algorithm withvarious parameter sets when � = 5; 10; 12.

whereas a smaller goodput is achieved when the simple sched-uler or the PI-FBDS regulator are employed. The reason is thatFTP flows grab the bandwidth left unused by real-time flows.

B. Impact of the PI Parameters

To investigate the impact of and parameters on the be-havior of PI-FBDS, we have repeated the simulations reportedabove using many parameter sets, all satisfying the stability in-equalities (9). In particular, we have varied between 5 and25, and between 4 and 64.

Fig. 7 shows the ratio of admitted flows for all the consideredparameter sets and load factors. It shows that when all theconsidered parameter sets allow the admission of all flows. Thisresult is not surprising because the network load is small. Thedifferences between the considered parameter sets are evidentunder high load conditions, i.e., when .

In particular, by increasing , a smaller ratio of flows is ad-mitted: the larger is, the faster becomes the closed loop con-trol system. As a consequence, high frequency components ofallocated bandwidth are more pronounced, and the probabilitythat a new flow finds the channel busy increases. For similar rea-sons, the ratio of admitted flows diminishes as decreases.Finally, it is worth noting that for intermediate resultsbetween the cases and have been obtained.

Fig. 8 shows that the average SF utilization during CAPs fol-lows the behavior of the ratio of admitted flows reported inFig. 7. The reason is that a higher number of admitted flowsleads to a higher SF utilization. On the other hand, Fig. 9 showsthat the goodput achieved by the FTP flows, i.e., the amount of

Fig. 8. Average SF utilization, due to CAPs, using PI-PBDS scheme with var-ious parameter sets when � = 5; 10;12.

Fig. 9. Goodput achieved by FTP flows, using PI-PBDS scheme with variousparameter sets when � = 5; 10;12.

data transferred to the FTP receivers over the simulation time,has a complementary behavior with respect to the average SFutilization during CAPs. The reason is that FTP flows run overTCP, which grabs the bandwidth left unused by the real-timeflows [33].

Figs. 10–12 show the average one-way packet delays ofMPEG4, H.263, and G.729 flows, respectively. For all theconsidered cases, they are smaller than the 40 ms target delayfor video flows and the 16 ms for voice flows. Moreover, when

delays are not affected by parameter set, which confirmsthat under low loads the system is not sensitive to the parameterset. On the other hand, at high loads, i.e., for , delaysdiminishes for increasing values of , and decreasing valuesof . In fact the number of admitted flows decreases for

Page 9: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 …lila/M2R/8.pdf · 2010. 10. 24. · IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 Feedback-Based

BOGGIA et al.: FEEDBACK-BASED CONTROL FOR PROVIDING REAL-TIME SERVICES WITH THE 802.11E MAC 331

Fig. 10. Average one-way packet delays of MPEG4 flows, using PI-PBDS withvarious parameter sets when � = 5; 10; 12.

Fig. 11. Average one-way packet delays of H.263 flows, using PI-PBDS withvarious parameter sets when � = 5; 10;12.

Fig. 12. Average one-way packet delays of G.729 flows, using PI-PBDS withvarious parameter sets when � = 5; 10;12.

increasing values of , and smaller values of . Forintermediate results are obtained.

Finally, Figs. 13–15 show that the standard deviations of theone-way packet delays follow the same behavior of their averagevalues reported in Figs. 10–12.

In order to give an insight into the time domain behavior ofPI-FBDS, Fig. 16 reports the SF utilization using HCCA whenthree different parameter sets are used under the load factor

. It shows that as soon as increases and dimin-ishes, high frequency components of the SF utilization grow up,

Fig. 13. Standard deviation of one-way packet delays of MPEG4 flows, usingPI-PBDS scheme with various parameter sets when � = 5; 10;12.

Fig. 14. Standard deviation of one-way packet delays of H.263 flows, usingPI-PBDS scheme with various parameter sets when � = 5; 10;12.

Fig. 15. Standard deviation of one-way packet delays of G.729 flows, usingPI-PBDS scheme with various parameter sets when � = 5; 10;12.

and its average value gets smaller. This confirms what we haveshown before, i.e., that for increasing and decreasing theratio of admitted flows diminishes due to the high frequencycomponents of the allocated bandwidth (see Fig. 7 for ),which can saturate the WLAN channel, thus causing the rejec-tion of new traffic streams.

V. CONCLUSION

In this paper, a control theoretic framework for addressing thefirst hop bandwidth allocation issue using the HCCA function of

Page 10: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 …lila/M2R/8.pdf · 2010. 10. 24. · IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 Feedback-Based

332 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007

Fig. 16. Superframe utilization using HCCA for different parameter sets whenthe load factor � = 12 : K = 5; T = 64; K = 15; T = 4; K = 25;

T = 4.

the 802.11e MAC has been proposed. Two dynamic bandwidthallocation algorithms, which have been referred to as FBDS andPI-FBDS, have been proposed along with a CAC mechanism.Simulation results obtained using the ns-2 simulator have shownthat, unlike the simple scheduler proposed by the 802.11e WG,both FBDS and PI-FBDS generate bounded delays at high net-work loads also. Moreover, when the PI-FBDS is used, the besttradeoff between one-way packet delays and network utilizationis achieved.

REFERENCES

[1] Information Technology—Telecommun and Information ExchangeBetween Systems. Local and Metropolitan Area Networks. SpecificRequirements. Part 11: Wireless LAN MAC, and PHY Specifications,ANSI/IEEE Std. 802.11, ISO/IEC 8802-11, 1999.

[2] Supplement to IEEE Standard for Information Technology. Localand Metropolitan Area Networks. Specific Requirements. Part 11:Wireless LAN MAC and PHY Specifications: Higher-Speed PhysicalLayer Extension in the 5 GHz Band, IEEE Std 802.11a, ISO/IEC8802-11:1999/Amd 1:2000(E), 1999.

[3] Supplement to IEEE Standard for Telecommunications and Infor-mation Exchange Between Systems-LAN/MAN Specific Require-ments-Part 11: Wireless LAN Medium Access Control (MAC) andPhysical Layer (PHY) Specifications: Further Higher-Speed PhysicalLayer Extension in the 2.4 GHz Band, IEEE Std 802.11g, 2003.

[4] S. Mangold, S. Choi, P. May, O. Klein, G. Hiertz, and L. Stibor, “IEEE802.11e wireless LAN for quality of service,” in Proc. Eur. WirelessConf. 2002, Florence, Italy, Feb. 2002, pp. 32–39.

[5] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed co-ordination function,” IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp.535–547, Mar. 2000.

[6] A. Koepsel, J. P. Ebert, and A. Wolisz, “A performance comparison ofpoint and distributed coordination function of an IEEE 802.11 WLANin the presence of real-time requirements,” presented at the 7th Int.Workshop Mobile Multimedia Commun., Tokyo, Japan, Oct. 2000.

[7] Draft Amendment to Standard for Information Technology. LAN/MANSpecific Requirements—Part 11: Wireless MAC and PHY Specifica-tions: MAC Quality of Service QoS Enhancements, IEEE 802.11 WG,IEEE 802.11e/D13.0, Jan. 2005.

[8] G. Bianchi and I. Tinniriello, “Analysis of priority mechanisms basedon differentiated inter frame spacing in CSMA-CA,” in Proc. IEEE58th Veh. Technol. Conf., Orlando, FL, Oct. 2003, pp. 1401–1406.

[9] W. Pattara-Atikom, P. Krishnamurty, and S. Banerjee, “Distributedmechanisms for quality of service in wireless LANs,” IEEE WirelessCommun., vol. 10, no. 3, pp. 1536–1284, Jun. 2003.

[10] A. Banchs, X. Perez-Costa, and D. Qiao, “Providing throughput guar-antees in IEEE 802.11e wireless LANs,” in Proc. ITC 2003, Berlin,Germany, Aug. 2003, pp. 1001–1010.

[11] A. Lindgren, A. Almquist, and O. Schelén, “Quality of service schemesfor IEEE 802.11 wireless LANs—An evaluation,” Mobile Netw. Ap-plicat., vol. 8, no. 3, pp. 223–235, Jun. 2003.

[12] Z. Kong, D. H. K. Tsang, B. Bensaou, and D. Gao, “Performance anal-ysis of IEEE 802.11e contention-based channel access,” IEEE J. Sel.Areas Commun., vol. 22, no. 10, pp. 2095–2106, Dec. 2004.

[13] G. Boggia, P. Camarda, L. A. Grieco, and S. Mascolo, “Feedback basedbandwidth allocation with call admission control for providing delayguarantees in IEEE 802.11e networks,” Comput. Commun., vol. 28, no.3, pp. 325–337, Feb. 2005.

[14] Q. Ni, L. Romdhani, and T. Turletti, “A survey of QoS enhancementsfor IEEE 802.11 wireless LAN,” Wireless Commun. Mobile Comput.,vol. 4, pp. 547–566, 2004.

[15] L. Romdhani, Q. Ni, and T. Turletti, “Adaptive EDCF: Enhanced ser-vice differentiation for IEEE 802.11 wireless ad hoc networks,” in Proc.IEEE Wireless Commun. Netw. Conf. (WCNC), New Orleans, LA, Mar.2003, pp. 1373–1378.

[16] Y. Xiao, H. Li, and S. Choi, “Protection and guarantee for voice andvideo traffic in IEEE 802.11e wireless LANs,” in Proc. IEEE Infocom,Hong Kong, Mar. 2004, pp. 2152–2162.

[17] A. Grilo, M. Macedo, and M. Nunes, “A scheduling algorithm for QoSsupport in IEEE 802.11e networks,” IEEE Wireless Commun., vol. 10,no. 3, pp. 36–43, Jun. 2003.

[18] S. C. Lo, G. Lee, and W. T. Chen, “An efficient multipolling mecha-nism for IEEE 802.11 wireless LANs,” IEEE Trans. Comput., vol. 52,no. 6, pp. 764–778, Jun. 2003.

[19] P. Ansel, Q. Ni, and T. Turletti, “FHCF: A simple and efficient sched-uling scheme for 802.11e WLAN,” J. Mobile Netw. Appl. (MONET),vol. 11, no. 3, pp. 391–403, Jun. 2006.

[20] Network Simulator, 2004 [Online]. Available: http://www.isi.edu/nsnam/ns

[21] K. J. Astrom and B. Wittenmark, Computer Controlled Systems:Theory and Design, 3rd ed. Englewood Cliffs, NJ: Prentice Hall,1995.

[22] C. Partridge, “A proposed flow specification,” IETF RFC 1363, Sep.1992.

[23] R. Braden, D. Clark, and S. Shenker, “Integrated services in the internetarchitecture: An overview,” IETF RFC 1633, Jun. 1994.

[24] S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss,“An architecture for differentiated service,” IETF RFC 2475, 1998.

[25] S. Mascolo, “Congestion control in high-speed communication net-works using the smith principle,” Automatica, Special Issue on ControlMethods for Communication Networks, vol. 35, pp. 1921–1935, Dec.1999.

[26] M. Grossglauser and D. N. N. Tse, “A framework for robust measure-ment-based admission control,” IEEE/ACM Trans. Netw., vol. 7, no. 3,pp. 293–309, Jun. 1999.

[27] Coding of Speech at 8 kbit/s Using Conjugate-Structure Algebraic-Code-Excited Linear Prediction (CS-ACELP), ITU-T Rec. G.729, Mar.1996.

[28] MPEG-4 Video Group, MPEG-4 Overview. Mar. 2002 [Online]. Avail-able: http://mpeg.telecomitalialab.com/

[29] Video Coding for Low Bit Rate Communication, ITU-T Rec. H.263,Feb. 1998.

[30] Video Trace Library. [Online]. Available: http://trace.eas.asu.edu/[31] C. Chuah and R. H. Katz, “Characterizing packet audio streams from

internet multimedia applications,” in Proc. Int. Commun. Conf. (ICC2002), New York, Apr. 2002, pp. 1199–1203.

[32] W. Wang, S. C. Liew, and V. O. K. Li, “Solutions to performance prob-lems in VoIP over a 802.11 wireless LAN,” IEEE Trans. Veh. Technol.,vol. 54, no. 1, pp. 366–384, Jan. 2005.

[33] M. Allman, V. Paxson, and W. R. Stevens, “TCP congestion control,”RFC 2581, Apr. 1999.

Gennaro Boggia (S’99–M’01) received the Dr.Eng.and Ph.D. degrees (hons.) in electronics engineeringfrom the Politecnico di Bari, Bari, Italy, in 1997 and2001, respectively.

Since September 2002, he has been with the De-partment of Elettrotecnica ed Elettronica, Politecnicodi Bari, Italy, where he is currently Assistant Pro-fessor. From May 1999 to December 1999, he wasVisiting Researcher at the TILab, TelecomItalia Lab(formerly CSELT, Centro Studi e Laboratori Teleco-municazioni) where he was involved in the study of

Page 11: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 …lila/M2R/8.pdf · 2010. 10. 24. · IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 323 Feedback-Based

BOGGIA et al.: FEEDBACK-BASED CONTROL FOR PROVIDING REAL-TIME SERVICES WITH THE 802.11E MAC 333

the Core Network for the next releases of UMTS. He has authored or co-au-thored more than 40 papers in international journals or conferences. His re-search interests span the fields of wireless networking, cellular communication,queueing networking, and networks performance evaluation.

Pietro Camarda received the degree in computerscience from the University of Bari, Bari, Italy, in1978.

Since 1986, he has been with the Department ofElettrotecnica ed Elettronica, Politecnico di Bari,Bari, Italy, where he is currently a Full Professor ofTelecommunications. He was Visiting Scholar fromOctober 1986 to December 1987 at the ComputerScience Department, University of California, LosAngeles, with the supervision of Prof. Mario Gerla.He has been involved in various research areas,

mainly LAN/MAN architectures and protocols, optical networks, networkreliability, cellular radio networks, telecommunication services, etc. He isthe author of more than 70 research papers on these topics. Recently, he hasfocused mainly on wireless networks (cellular networks, wireless LANs, ad hocnetworks), developing topics that include resource allocation based on neuralnetworks, header compression schemes for wireless networks, authenticationprotocols in wireless networks, bandwidth allocation and quality of service inWLANs, and congestion control schemes for TCP.

Luigi Alfredo Grieco (S’02–M’05) received theDr.Eng. degree (hons.) in electronic engineering in1999 from Politecnico di Bari, Bari, Italy, and thePh.D. degree in information engineering in 2003from Università di Lecce, Lecce, Italy.

Since January 2005, he has been an AssistantProfessor of telecommunications at DipartimentoElettrotecnica ed Elettronica (DEE), Politecnico diBari. His main research interests are congestion con-trol in packet switching networks, QoS in WLAN,energy efficient MAC protocols for wireless ad hoc

networks, and real-time video processing using cellular nonlinear networks. Hehas authored more than 50 scientific papers about these topics in internationaljournals and conference proceedings.

Saverio Mascolo (S’93–M’96–SM’06) received theLaurea degree (cum laude) in electronics engineeringand the Ph.D. degree from Politecnico di Bari, Bari,Italy, in 1991 and 1995, respectively.

Currently, he is an Associate Professor of auto-matic control at the Dipartimento Elettrotecnica edElettronica (DEE), Politecnico di Bari. He has heldVisiting Positions at the University of California, LosAngeles, and at the University of Uppsala, Sweden.He has authored or co-authored more than 90 papersin international journals, books, or conferences. His

research interests focuses on congestion control in data networks, TCP andRTP/UDP protocols for data and multimedia traffic, QoS support over the wiredand wireless Internet, and analysis and design of data network using controltheory. He has also worked on discrete-event systems, deadlock avoidance,chaotic systems, and nonlinear control.