IMPLEMENTING VOICE OVER IP
|
|
- Stephany Booker
- 8 years ago
- Views:
Transcription
1 DATA COMMUNICATIONS MANAGEMENT IMPLEMENTING VOICE OVER IP Gilbert Held INSIDE Latency is the Key; Compression; Interprocessing Delay; Network Access at Origin; Network Transmission Delay; Network Egress at Destination; Buffer; Decompression LATENCY IS THE KEY The ability to implement a voice-over-ip solution depends on the oneway latency or delay between the originator and recipient of the call. This delay is variable and depends on several parameters, some of which are under one s control and others that, when using a public network, may be beyond one s control. Exhibit 1 lists the major components associated with the end-to-end analog-to-digital coding, transmission, and conversion back to voice of a packet carrying a digitized portion of a conversation. Note that the fixed and variable delays associated with the end-to-end transmission of a packet can generally range between approximately 60 and 289 ms. To put this time in perspective, a typical human ear can accept up to 250 ms of delay every once in awhile prior to the conversation becoming annoying. While full-duplex transmission is desirable for most data applications, it is not useful and in fact creates problems when voice is carried over a network. This is because rational humans do not have a conversation by both talking at the same time. Instead, rational humans wait for one party to finish talking before the other party to the conversation begins a response. If the latency or delay begins to exceed a quarter of a second for significant portions of a conversation, the conversation will begin to PAYOFF IDEA Unlike the weather that people like to talk about but over which they have a minimum of control, there are many tools and techniques to ensure that a voice-over-ip application has good potential for success. The reason this author uses the term good results from the fact that a public IP network, such as the Internet, is currently incapable of reserving bandwidth. This fact means that the random process of packet flow can turn a viable solution today into an impractical one tomorrow. However, by using some well-known TCP/IP application tools and a handful of logical networking techniques, one can literally stack the deck in one s favor and enhance the chance of a successful voice-over-ip implementation which is the focus of this article.
2 EXHIBIT 1 Packet Network Delays Fixed and variable delays (ms) Minimum Maximum Compression (voice coding) Inter-process (origin) Network access at origin Network transmission delay Network egress at destination Buffer (configurable) Decompression Total fixed and variable delays resemble a CB-radio conversation, with each party having to say over to inform the other party it is OK to talk. Otherwise, the delay will result in one party periodically thinking the other has finished talking when they have not, resulting in a full-duplex conversation that requires one party to stop and the other party to begin anew. In fact, the International Telecommunications Union (ITU) standard for one-way delay for a voice call requires a maximum latency of 150 ms, which ensures that the call will not turn into a full-duplex conversation. For most organizations, a maximum latency of 200 ms and a mean latency approaching or under 150 ms should be sufficient to provide good quality of reconstructed voice. For those curious about the latency associated with the use of the public switched telephone network (PSTN), it can be considered almost negligible. That is, telephone company switches introduce delay measured in microseconds (ms), one thousandth of a millisecond (ms). Similarly, pulse code modulation (PCM) and adaptive differential pulse code modulation (ADPCM) have a coding delay of a few microseconds, which represents a thousandth of the delay associated with the use of low-bit voice encoding methods. With an appreciation for the amount of oneway delay a voice-over-ip application can tolerate, examine the component of delay listed in Exhibit 1. In doing so, there are several techniques one can use to modify or adjust certain delays. COMPRESSION There are numerous low-bit rate compression or coding methods one can select. In fact, most equipment vendors typically support between four and six voice coding methods. Most of these methods are members of the code excited linear prediction (CELP) family of voice coders. The original CELP voice coder was a hybrid, incorporating both waveform coding similar to PCM and ADPCM and linear predictive coding. Although the first CELP voice coder operated at a relatively low bit rate in comparison to PCM and ADPCM, its coding delay was relatively high, ap-
3 proaching 60 ms. Since the first CELP voice coder was introduced, numerous variations have been developed, with approximately half a dozen now standardized by the ITU. Two of the more popular members of the CELP family are the low-delay (LD) CELP (G.723) that operates at 16 Kbps but has a delay of 10 ms, and the G multicoder that operates at both 5.3 and 6.3 Kbps and has a coding delay of approximately 30 ms. Other coders have delays up to 45 ms. By carefully examining the specification sheets associated with different voice coding techniques, one will note that there is normally a direct relationship between the coder bit rate and its mean optimum score (MOS), the latter a measurement of voice quality; that is, the higher the bit rate, the higher the MOS. There is also an inverse relationship between the coder s bit rate and its coding delay; that is, the higher the resulting bit rate produced by the coder, the lower the coding delay. Thus, one technique to consider when making a voice-over-ip application work when there is too much latency is to consider changing the voice coding method. In general, changing the coder from one that operates at 5.3/6.3 Kbps to 8 Kbps will reduce the coding delay by approximately 10 ms. If one changes the coder to an LD-CELP coder, one can remove an additional 10 ms of delay. While 20 ms is not earth shattering, it may be enough to ensure that the quality of reconstructed voice is acceptable for one s voice-over-ip application. In addition, if one saves a few milliseconds here and a few milliseconds with other techniques, the cumulative effect of these savings will really add up. The effect of changing these settings may be sufficient to provide an acceptable level of reconstructed voice that might otherwise preclude one s organization from implementing a voice-over-ip application. INTERPROCESSING DELAY The interprocessing delay represents the time required to form an IP datagram from each segment of digitized voice produced by a voice coder and route the resulting datagram to a router connected to the IP network. The total interprocessing delay is approximately 10 ms and represents a series of delays that can be variable due to the fact that the level of utilization of the LAN that connects the voice gateway to the router governs the gateway-to-router delay. In addition to the gateway-to-router delay, the gateway itself has some processing delay as it forms an IP datagram. Similarly, the router must process each datagram prior to sending it on its way toward its destination. Although this author used 10 ms for the total interprocess delay at the origin, it is possible to slightly reduce this time. To do so, consider obtaining a faster processor for the voice gateway. Most voice gateways are modular devices, with voice processing boards that are inserted into a PC. Although each voice processing board contains its own processor, which enables support for different voice
4 coding methods and actually performs the analog-to-digital conversion, the formation and movement of datagrams through the gateway is a function of its main processor. This means that the use of a Pentium III 700 MHz system will have less delay and support the faster movement of datagrams through the gateway and onto the LAN than a Pentium III 500 MHz-based system. From tests performed by this author, the replacement of the gateway system with a faster processor can be expected to shave 1 ms per extra 100 MHz of processor power. A second method one can consider using to reduce the interprocess delay is to upgrade the LAN if it is operating at a level of utilization beyond 50 percent. Based on this author s experience, the replacement of an Ethernet LAN operating at slightly over a 50 percent level of utilization by a Fast Ethernet network reduced delay by approximately 1 ms. Thus, by upgrading the gateway process from a 500 MHz system to a 700 MHz system and the Ethernet network that connects the gateway to the router by a Fast Ethernet network, one may be able to shave approximately 3 ms off the end-to-end delay. NETWORK ACCESS AT ORIGIN A digitized voice conversation consists of a stream of very small datagrams to reduce the impact of one or more being lost. If the router is connected to the Internet at 56 Kbps and the average datagram length is 49 bytes, then the network access delay at the origin becomes (49 bytes 8 bits/byte)/56 Kbps, or 7.0 ms. Of the 49 bytes in a typical datagram, 20 represent the IP header and 8 represent the UDP header, resulting in 21 actual bytes transporting digitized voice. Although one may encounter references to the use of TCP and UDP for transporting voice, in actuality TCP is used for the connection setup while UDP is used for the actual transport of digitized voice. Because one cannot retransmit lost or erroneous datagrams, UDP is used to transport digitized voice because it is a connectionless, besteffort protocol. Because it is extremely important to ensure that call setup information such as the number dialed is received correctly, TCP, which is a connection-oriented error-free protocol, is used to transport call setup information. If the access line is upgraded to a T1 line operating at Mbps, then the network access delay becomes (49 bytes 8 bits/byte) (1.536 Mbps), or 0.25 ms. Note that a divisor of Mbps was used instead of Mbps for the T1 line because 8 Kbps is used for framing and is not available for data transfer. In examining the network access delay at the origin, it becomes possible to reduce the latency associated with moving datagrams from the local network into the Internet by upgrading the access line. As shown by the previous computations, moving from a 56 Kbps access line to a
5 T1 access line can reduce latency by almost 7 ms. If the cost of a T1 is prohibitive, one can consider different types of fractional T1 (FT1) access lines that operate between 56 Kbps and Mbps and could be used to reduce network access delays. NETWORK TRANSMISSION DELAY Because it is very rare to use voice-over-ip for intra-city communications, assume that the IP network will route data between dissimilar geographical areas. Because there will then be at least two backbone routers involved in the routing process, one can expect a minimum delay of 20 ms. Because most network transmission delays are under 200 ms, the range of delays is listed in Exhibit 1 as 20 to 200 ms. One of the key tools that can be used ahead of time to determine the viability of a voice-over-ip application is the Ping utility program. Exhibit 2 illustrates the basic format of Ping implemented under different versions of Microsoft Windows. Note that one can simply enter Ping with a host name or IP address, or one can enter one or more of the options listed in Exhibit 2. Although the primary use of Ping is to determine the operational status of the target host or address, it will also provide the round-trip delay from originator to destination. Exhibit 3 illustrates the use of the Ping utility to determine the roundtrip delay time between the author s computer and the Web server operated by Yale University. In examining Exhibit 3, note that the Microsoft implementation of Ping results in the transmission of a sequence of four echo-request packets to the target. The target will respond with an echoreply to each echo-request, with the originating station computing the round-trip delay. If a response is not received within 250 ms, which is the default timeout value, the originating station will consider its request to have timed out and will generate its next echo-request. In Exhibit 3, note that the initial round-trip delay was 156 ms, while the second and fourth round-trip delays were computed to be 125 ms and 110 ms, respectively. One of the most common mistakes many persons make when using Ping is to use the first round-trip delay time. In actuality, if one enters a host name that was not previously resolved, the resolution of the host name into an IP address will result in the first round-trip delay being longer than subsequent delays. The only exception to this is when traffic or processing at a router reaches the point where it results in significant delays that cause Ping to timeout. This is illustrated by the third line after the Pinging message in Exhibit 3. Thus, when using Ping to determine the round-trip delay through a network, one should always discard the first delay as it can include time for a host-to-ip address resolution. In addition, one should consider running Ping throughout the day to determine if there are one or more periods of time when delays escalate. One can either write a script to run
6 EXHIBIT 2 Displaying the Format of Ping by Entering the Command Without Any Options
7 EXHIBIT 3 Pinging the Web Server at Yale University
8 Ping at different times, or use the -t option to run it continuously during the day. If one pipes the results to a file, one can then read the file into a spreadsheet and easily determine the mean, peak, and average values, as well as other statistics about round-trip delay. For example, the following DOS command would run Ping on the target continuously and pipe its output to the file test: Ping -t >test If the response to a series of Pings issued over a period of time indicates the network delay is too great to allow a voice-over-ip application to have an overall delay under 200 ms, many people would be tempted to give up on the application. Instead, one should consider the use of a second TCP/IP application tool built into Windows and other operating systems. That tool is the traceroute application, which is named tracert under Windows. Tracert operates by initially transmitting a series of packets with the time-to-live (TTL) field value set to 1. Routers automatically decrement the TTL field value. If its value then equals zero, the packet is discarded and the router returns an error message to the originator, along with the IP address of the router and many times textual information about the router and its network connection. The originator then transmits a new series of packets with the TTL field value incremented by 1 to 2. The packets flow through the first router on the path to the destination, where the TTL field value in each packet is decremented by 1 to 1. Thus, the second router in the packet to the destination discards the series of packets and returns error messages to the originator. This process continues until a sequence of packets either reaches its destination or the maximum default TTL value is reached. Under Windows, the default maximum TTL value is 30 hops. Exhibit 4 illustrates the format of the Microsoft Widows version of traceroute called tracert. Note that one can change the maximum number of hops in one s search for the route to a target via the use of the -h option. Because Ping was used to determine the round-trip delay to the Web server at Yale University, now use tracert to trace the path to the Web server. Exhibit 5 illustrates the resulting display from the use of tracert. Note that a total of 15 hops were required to reach the destination. Also note that the Microsoft version of traceroute issues a sequence of three packets for each TTL value used, resulting in three round-trip delay computations. On the 12th hop, the second packet had a response time that exceeded 250 ms, resulting in an asterisk (*) being displayed to indicate a timeout condition. If the use of Ping indicates a periodic delay that exceeds the amount of latency required for a voice-over-ip application to work, one can use tracert to determine if there are one or more routers abnormally contrib-
9 EXHIBIT 4 The Format of the Microsoft Windows Version of Traceroute, Called Tracert
10 EXHIBIT 5 Tracing the Route to the Yale University Web Server
11 uting to the delay. If so, it may be possible to request one s Internet service provider (ISP) to reroute the path packets must take, or perhaps the ISP would be willing to upgrade or replace a router that acts as a bottleneck. In carefully examining Exhibit 5, one notes that the routers at hops 11, 12, and 13 represent bottlenecks. If planning a voice-over-ip application to the Yale campus, this author would certainly bring this to the attention of his ISP. NETWORK EGRESS AT DESTINATION Returning to Exhibit 1, note that the latency or delay for datagrams flowing from the Internet is shown to be between 0.25 ms and 7 ms. Once again, this range represents the variance in delay resulting from the use of a T1 access line (0.25 ms) and a 56 Kbps access line (7 ms). Thus, by upgrading one or both access lines, it becomes possible to reduce endto-end delay. BUFFER As a person talks, a voice coder produces a series of datagrams with a uniform time delay between each datagram. As the datagrams flow through the Internet, they experience random delays at each node in the network based on the flow of traffic to the router as well as the state of its queues. By the time the datagrams exit the Internet and flow toward the destination gateway, the gaps between datagrams have random delays. If these datagrams were directly used to reconstruct voice, the result would be awkward-sounding gaps between each small segment of voice. Thus, instead of being directly converted back to analog voice, the datagrams are first moved into a jitter buffer. Then they are removed in order with a uniform time delay between extractions, resulting in natural sounding voice when the contents of the datagrams are converted back into analog voice. Most jitter buffers can be set from 0 (disabled) to a maximum of 255 ms. Because one needs to reduce the random delays between received datagrams, the jitter buffer should never be set to a value of 0. Similarly, because the human ear can only tolerate 200 ms of delay and there are many other delays that must be considered, the jitter buffer should never be configured anywhere near its maximum value. Instead, a good rule of thumb is to initially set its value to a delay of 10 ms. If the total delay to include the jitter buffer delay is well under 200 ms, one can then experiment and gradually increase the jitter buffer delay to determine if doing so makes reconstructed voice sound better. DECOMPRESSION Unlike voice coding delays that can significantly vary based upon the coding technique, decompression is relatively fixed at approximately
12 10 ms, regardless of method used. Thus, while there are minor differences in decompression time between voice coding methods, a good rule of thumb is to use a 10 ms delay for compression. RECOMMENDED COURSE OF ACTION As indicated in this article, there are seven major components associated with the end-to-end delay or latency of datagrams transporting voice. While some components are relatively fixed and there is little to be gained by altering their parameters, other delay components are quite variable and there are several techniques for altering their contribution to overall delay. In addition, through the use of Ping and tracert, one obtains the tools to examine the major contributing factor to end-to-end delay network transmission delay. By carefully examining each component of delay and using applicable tools, it becomes possible to successfully implement voice-over-ip applications that otherwise might never become a reality. Gilbert Held is an award-winning author and lecturer. Gil is the author of over 40 books and 250 technical articles. Some of Gil s recent publications include Internetworking Voice and Data, 2nd edition, and Cisco Security Architecture (co-authored with Kent Hundley) published by McGraw-Hill, and Managing TCP/IP and Frame Relay Networking published by John Wiley & Sons. Gil can be reached via at gil_held@yahoo.com.
INTRODUCTION TO VOICE OVER IP
52-30-20 DATA COMMUNICATIONS MANAGEMENT INTRODUCTION TO VOICE OVER IP Gilbert Held INSIDE Equipment Utilization; VoIP Gateway; Router with Voice Modules; IP Gateway; Latency; Delay Components; Encoding;
More informationUPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
More informationNetwork administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.
Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic
More informationAn Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
More informationRequirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
More informationCombining Voice over IP with Policy-Based Quality of Service
TechBrief Extreme Networks Introduction Combining Voice over IP with Policy-Based Quality of Service Businesses have traditionally maintained separate voice and data networks. A key reason for this is
More informationClearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
More information51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE
51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationVoice over IP. Better answers
This white paper provides an overview of voice and data convergence. It discusses enabling business drivers and technical factors, such as compression techniques and QOS parameters, that have complemented
More informationBroadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
More informationQoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
More informationSage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
More informationSage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
More informationVoice Over IP Per Call Bandwidth Consumption
Over IP Per Call Bandwidth Consumption Interactive: This document offers customized voice bandwidth calculations with the TAC Bandwidth Calculator ( registered customers only) tool. Introduction Before
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationNETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
More informationUsing IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
More informationGoal We want to know. Introduction. What is VoIP? Carrier Grade VoIP. What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP?
Goal We want to know Introduction What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP? VoIP Challenges 2 Carrier Grade VoIP Carrier grade Extremely high availability 99.999% reliability (high
More informationAvaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
More informationVoice over IP. Abdus Salam ICTP, February 2004 School on Digital Radio Communications for Research and Training in Developing Countries
Voice over IP Abdus Salam ICTP, February 2004 School on Digital Radio Communications for Research and Training in Developing Countries Ermanno Pietrosemoli Latin American Networking School (Fundación EsLaRed)
More informationSimple Voice over IP (VoIP) Implementation
Simple Voice over IP (VoIP) Implementation ECE Department, University of Florida Abstract Voice over IP (VoIP) technology has many advantages over the traditional Public Switched Telephone Networks. In
More informationUnderstanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
More informationPer-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
More informationVoIP Bandwidth Calculation
VoIP Bandwidth Calculation AI0106A VoIP Bandwidth Calculation Executive Summary Calculating how much bandwidth a Voice over IP call occupies can feel a bit like trying to answer the question; How elastic
More information1-800-CALL-H.E.P. - Experiences on a Voice-over-IP Test Bed.
SLAC-PUB-8384 February 2000 1-800-CALL-H.E.P. - Experiences on a Voice-over-IP Test Bed. W. Matthews, L. Cottrell, R. Nitzan Presented at International Conference On Computing In High Energy Physics And
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationIndepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
More informationFrequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
More informationEvaluating Data Networks for Voice Readiness
Evaluating Data Networks for Voice Readiness by John Q. Walker and Jeff Hicks NetIQ Corporation Contents Introduction... 2 Determining Readiness... 2 Follow-on Steps... 7 Summary... 7 Our focus is on organizations
More informationTroubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
More information5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,
More informationTCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
More informationVoIP Bandwidth Considerations - design decisions
VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or
More information12 Quality of Service (QoS)
Burapha University ก Department of Computer Science 12 Quality of Service (QoS) Quality of Service Best Effort, Integrated Service, Differentiated Service Factors that affect the QoS Ver. 0.1 :, prajaks@buu.ac.th
More informationChallenges and Solutions in VoIP
Challenges and Solutions in VoIP Challenges in VoIP The traditional telephony network strives to provide 99.99 percent uptime to the user. This corresponds to 5.25 minutes per year of down time. Many data
More informationIP videoconferencing solution with ProCurve switches and Tandberg terminals
An HP ProCurve Networking Application Note IP videoconferencing solution with ProCurve switches and Tandberg terminals Contents 1. Introduction... 3 2. Architecture... 3 3. Videoconferencing traffic and
More informationSIP Trunking and Voice over IP
SIP Trunking and Voice over IP Agenda What is SIP Trunking? SIP Signaling How is Voice encoded and transported? What are the Voice over IP Impairments? How is Voice Quality measured? VoIP Technology Confidential
More informationVoice over IP Protocols And Compression Algorithms
University of Tehran Electrical and Computer Engineering School SI Lab. Weekly Presentations Voice over IP Protocols And Compression Algorithms Presented by: Neda Kazemian Amiri Agenda Introduction to
More informationANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)
More informationEncapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
More informationDeploying in a Distributed Environment
Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each
More informationChapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
More informationUnderstanding Latency in IP Telephony
Understanding Latency in IP Telephony By Alan Percy, Senior Sales Engineer Brooktrout Technology, Inc. 410 First Avenue Needham, MA 02494 Phone: (781) 449-4100 Fax: (781) 449-9009 Internet: www.brooktrout.com
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More informationMeasure wireless network performance using testing tool iperf
Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,
More informationAgilent Technologies Performing Pre-VoIP Network Assessments. Application Note 1402
Agilent Technologies Performing Pre-VoIP Network Assessments Application Note 1402 Issues with VoIP Network Performance Voice is more than just an IP network application. It is a fundamental business and
More informationCommunications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
More informationApplication Note How To Determine Bandwidth Requirements
Application Note How To Determine Bandwidth Requirements 08 July 2008 Bandwidth Table of Contents 1 BANDWIDTH REQUIREMENTS... 1 1.1 VOICE REQUIREMENTS... 1 1.1.1 Calculating VoIP Bandwidth... 2 2 VOIP
More information51-30-21 Selecting a Web Server Connection Rate Gilbert Held
51-30-21 Selecting a Web Server Connection Rate Gilbert Held Payoff Determining the best operating rate for a WAN connection to the Internet is a common problem for organizations wishing to obtain a presence
More informationASIST Administração de Sistemas
ASIST Administração de Sistemas Aula 1 9 de Outubro de 2006 Alexandre Bragança Bibliografia: IBM Redbook: TCP/IP Tutorial and Technical Overview, Adolfo Rodriguez, John Gatrell, John Karas, Roland Peschke
More informationIP Telephony Design Guide AN ALCATEL WHITE PAPER
AN ALCATEL WHITE PAPER April, 2003 Overview........................................................................3 IP Telephony vs. VoIP................................................................3
More informationEECS 489 Winter 2010 Midterm Exam
EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if
More informationINTRODUCING PRACTICAL IP TELEPHONY INTO CORPORATE INTRANETS
52-30-10 DATA COMMUNICATIONS MANAGEMENT INTRODUCING PRACTICAL IP TELEPHONY INTO CORPORATE INTRANETS John Fiske INSIDE Internet Voice Technology Basics, Gateways, Open versus Proprietary Systems, Architecture,
More informationNetwork Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
More informationVoice over IP Basics for IT Technicians
Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationPerformance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au
More informationVOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
More informationChapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
More informationVoIP network planning guide
VoIP network planning guide Document Reference: Volker Schüppel 08.12.2009 1 CONTENT 1 CONTENT... 2 2 SCOPE... 3 3 BANDWIDTH... 4 3.1 Control data 4 3.2 Audio codec 5 3.3 Packet size and protocol overhead
More informationInternetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
More informationIP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
More informationPerformance of Various Codecs Related to Jitter Buffer Variation in VoIP Using SIP
Performance of Various Related to Jitter Buffer Variation in VoIP Using SIP Iwan Handoyo Putro Electrical Engineering Department, Faculty of Industrial Technology Petra Christian University Siwalankerto
More informationTECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
More informationComparison of Voice over IP with circuit switching techniques
Comparison of Voice over IP with circuit switching techniques Author Richard Sinden Richard Sinden 1 of 9 Abstract Voice-over-IP is a growing technology. Companies are beginning to consider commercial
More informationVoice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationHands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction
Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice
More informationHow To Understand The Differences Between A Fax And A Fax On A G3 Network
The Fax on IP Networks White Paper February 2011 2 The Fax on IP Networks Contents Overview... 3 Group 3 Fax Technology... 4 G.711 Fax Pass-Through... 5 T.38 IP Fax Relay... 6 Network Design Considerations...
More informationGlossary of Terms and Acronyms for Videoconferencing
Glossary of Terms and Acronyms for Videoconferencing Compiled by Irene L. Ferro, CSA III Education Technology Services Conferencing Services Algorithm an algorithm is a specified, usually mathematical
More informationVoice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP
Voice over IP Andreas Mettis University of Cyprus November 23, 2004 Overview What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP 1 VoIP VoIP (voice over IP - that is,
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationIT-5302-3 Internet Architecture and Protocols. Lecture 02 Overview of Internet Architecture
IT-5302-3 Internet Architecture and Protocols Punjab University College of Information Technology, University of the Punjab, Pakistan. Lecture 02 Overview of Internet Architecture Lecture 02 - Roadmap
More informationWAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services
WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most
More informationOptimizing Converged Cisco Networks (ONT)
Optimizing Converged Cisco Networks (ONT) Module 2: Cisco VoIP Implementations (Deploy) Calculating Bandwidth Requirements for VoIP Objectives Describe factors influencing encapsulation overhead and bandwidth
More informationLESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP
Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with
More informationPERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
More informationNetwork Connection Considerations for Microsoft Response Point 1.0 Service Pack 2
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and
More informationInternet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
More informationITL Lab 5 - Performance Measurements and SNMP Monitoring 1. Purpose
Lab 5 - Performance Measurements and SNMP Monitoring 1 Purpose Before the Lab Measure the performance (throughput) of TCP connections Measure the performance of UDP connections; observe an RTP flow Examine
More informationKnowledge Is Power: Do what s best for the client.
Knowledge Is Power: Do what s best for the client. 1. Understanding Voice and Data Differences Even when they are carried on the same network, voice traffic and data traffic cannot be handled the same
More informationEffect of Windows XP Firewall on Network Simulation and Testing
Issues in Informing Science and Information Technology Volume 4, 2007 Effect of Windows XP Firewall on Network Simulation and Testing Akram Al-Rawi College of CS & IT, King Faisal University, Al-Hassa,
More informationBasic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
More informationSIP (Session Initiation Protocol) Technical Overview. Presentation by: Kevin M. Johnson VP Engineering & Ops
SIP (Session Initiation Protocol) Technical Overview Presentation by: Kevin M. Johnson VP Engineering & Ops Page 1 Who are we? Page 2 Who are we? Workforce Automation Software Developer Page 3 Who are
More informationLatency on a Switched Ethernet Network
Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency
More informationVoice over IP (VoIP) Basics for IT Technicians
Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides
More informationWhat is Network Latency and Why Does It Matter?
What is Network Latency and Why Does It Matter? by O3b Networks This paper is presented by O3b Networks to provide clarity and understanding of a commonly misunderstood facet of data communications known
More informationWAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com
WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
More informationVoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1
VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11
More informationApplication Performance Analysis and Troubleshooting
Exam : 1T6-520 Title : Application Performance Analysis and Troubleshooting Version : DEMO 1 / 6 1. When optimizing application efficiency, an improvement in efficiency from the current 90% to an efficiency
More informationReceiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream
Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More informationIntroduction to Packet Voice Technologies and VoIP
Introduction to Packet Voice Technologies and VoIP Cisco Networking Academy Program Halmstad University Olga Torstensson 035-167575 olga.torstensson@ide.hh.se IP Telephony 1 Traditional Telephony 2 Basic
More informationConfiguring an efficient QoS Map
Configuring an efficient QoS Map This document assumes the reader has experience configuring quality of service (QoS) maps and working with traffic prioritization. Before reading this document, it is advisable
More informationCurso de Telefonía IP para el MTC. Sesión 2 Requerimientos principales. Mg. Antonio Ocampo Zúñiga
Curso de Telefonía IP para el MTC Sesión 2 Requerimientos principales Mg. Antonio Ocampo Zúñiga Factors Affecting Audio Clarity Fidelity: Audio accuracy or quality Echo: Usually due to impedance mismatch
More informationEITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
More informationRegion 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
More informationVoIP Analysis Fundamentals with Wireshark. Phill Shade (Forensic Engineer Merlion s Keep Consulting)
VoIP Analysis Fundamentals with Wireshark Phill Shade (Forensic Engineer Merlion s Keep Consulting) 1 Phillip D. Shade (Phill) phill.shade@gmail.com Phillip D. Shade is the founder of Merlion s Keep Consulting,
More informationProCurve and Wired and Wireless Voice-over-IP Applications
ProCurve and Wired and Wireless Voice-over-IP Applications Andy Rawll Global Product Manager Avaya HP ProCurve & Avaya IP Telephony Appliances 2 Overview Benefits to Business of ProCurve for VoIP Applications!
More information