Vega VoIP Traffic Analysis and Selfsimilarity
|
|
- Bryce Terry
- 3 years ago
- Views:
Transcription
1 A Traffic Analysis per Application in a real IP/MPLS Service Provider Network Paulo H. P. de Carvalho 1, Priscila Solís Barreto 1,2, Bruno G. Queiroz 1, Breno N. Carneiro 1, Marcio A. de Deus 1 1 Electrical Engineering Department, 2 Computer Science Department University of Brasilia, Campus Asa Norte, , Brasilia-DF, Brazil paulo@ene.unb.br, pris@cic.unb.br, marcio.deus@ieee.org Abstract. In this work, real traffic of a wide telecommunications service provider IP/MPLS network is analyzed. A classification per application using a traffic characterization procedure based on self-similarity is done on real traffic series, collected on several days in different time periods. The results show that the real traffic confirms high values of self-similarity, which appears with a relevant Hurst parameter. These results are used for the proposal of a method of network capacity planning which will allow a more efficient bandwidth use in function of each applications needs. Keywords: Traffic characterization, network analysis, self similarity, IMS, IP, MPLS. 1 Introduction One of the valuable contributions to the telecommunication industry in the next few years will be new methods to help capacity planning in a real service provider backbone considering the service convergence of the last years. The converged networks are expected to deliver audio and video transmissions with quality as good as that of a circuit switching network. In order to make it possible, the network must offer a guarantee when it comes to bandwidth provisioning, delay, jitter and packet loss. The provider backbones are the main mean of transport for all kind of applications with different behaviors which are aggregated in different links. The capacity planning becomes a hard task considering the multiple heterogeneous traffic sources such as video, voice, peer-to-peer applications, data file exchange, all with different QoS needs. One role of thumb applied in the fields is to overprovision the capacity link in function of a mean traffic value due to systematic traffic observations. The processes of traffic characterization and modeling are preponderant points of a
2 feasible network project. A precise traffic modeling may allow the understanding of a physical network problem under a mathematical view whose solution may not be simpler but may be more accurate and thereby result in a better relation of cost and benefit. One kind of traffic that is often present in wideband networks is the burst traffic. A traffic source that appears to have this behavior is formed from applications such as compressed video services and file transfers. This traffic is characterized by periods with activity (on periods) and periods without activity (off periods). To model this kind of traffic, one has configure the distribution of the on and off periods, in addition to the type of traffic sent during the on period. There are several mathematical models which intend to describe the behavior of traffic sources. Traditionally, the Poisson traffic model was originally applied in the switching networks. But, since 1994, motivated by [1], the Poisson model for Internet traffic started to be questioned. This study verified that the behavior of traffic on Ethernet networks was considerably different from a Poisson source and that it presented self-similar process characteristics as well as long-range dependence. A stochastic process Y(t) is said to be self-similar with Hurst parameter ½ < H < 1 when Y(t) = a -H Y(at) with a > 0, where the equality has probabilistic sense. The aforementioned Hurst parameter plays a major role on the measurement of the selfsimilarity degree of the traffic. The closer it is of the unity, the greatest the self-similarity degree is. The Hurst parameter may be view as a degree of burstiness of the traffic. One of the most popular self-similar processes is the fractional Brownian motion (fbm), which is the only self-similar Gaussian process with stationary increments. The increments process of the fbm is the fractional Gaussian noise (fgn). It is possible to generate self-similar traffic by aggregation of many sources of burst traffics that presents a heavy-tailed distribution for the on period [2]. This procedure may be valuable use to simulate the behavior of a real network before the introduction of new applications. In this article a self-similar traffic characterization of real traces in a wide geographic service provider company for network planning purposes is done. In section 2, the testbed for the traffic measurement is presented as well as the different traffic categories of real traffic, classified per application, collected in different time periods. In section 3, the traffic is characterized using four different methods of calculus for the Hurst parameter. Also a comparison of the Hurst parameter value for different applications and in different time scales is done. In section 4 is discussed the use of these information together with some proposed tools for the network planning task. In section 5 are presented the conclusions and future steps related to this work
3 2 Traffic Measurement Testbed The network under evaluation is a service provider in Brazil, with more than ten million PSTN (Public Switched Telephone Network) subscribers and more than one million ADSL as well. The IP network is formed by an Access, Distribution, Core and Internet Edge levels as shown figure 1. Each access layer is a PPPoX (Point to Point Protocol) router capable called BRAS (Broadband Router Access Server), and is connected to two distribution routers at least, the Distribution router is a Router with 200Gbps aggregate traffic and 40Mpps forwarding rate at least. The Core and Internet Edge are 200Gbps aggregate traffic and 200Mpps forwarding rate, including 200 BGP routes at least. The connections to other regions are done via core connections. All IP interfaces are Gigabit or 10Gigabit Ethernet. In some cases the bearer for theses interfaces is the SDH transport network over a DWDM network. The MPLS protocol is use in the backbone from the Access to the Core Level. There are others MPLS interconnections with several service providers which will not be analyzed in this paper. The network uses Diffserv and the Intserv structure can be deployed to give alternative paths between routing centers that needs resilient and backup path transition at less than 50ms(fifty milliseconds). Internet Internet Edge Layer To others Core routers Core Layer To others 10GEt Core routers Distribuition Layer BRAS BRAS BRAS BRAS Access Layer ADSL Subscribers DSLAMs Fig. 1. Testbed Network Architecture
4 The data collection point was a distribution Gigabit Ethernet interface with more than ADSL broadband subscribers. The scales of traffic collected were: five minutes, one minute and one millisecond, classified by application using Cisco Netflow[4] and the Ethereal open source application[5]. The applications of the network may be divided in two main categories: residential and corporate. The main difference between both is the time period of higher use, in the case of the corporate category this is from Monday to Friday, 08:30 to 19:00 with peaks at 11:00 and 15:00 during the day, as seen Fig. 2 for downstream traffic. The traffic traces in Mbps units are normalized in a sampled period of 31 days. In Fig.3 is showed a more detailed figure of these samples in a seven day period from Monday to Sunday. In Fig. 4 a more detailed analysis of the applications is done in a 24 hour period. In Fig. 5 is shown a classification per application for downstream traffic during a day. As can be seen in the above figures, the most important source of traffic is the HTTP(Browsing) followed by peer-to-peer applications. Also, the VoIP applications are still not a big concern in terms of traffic volume. In fact, the use of new CODECS (compression/decompression) types and with the low traffic volume, the bandwidth used does not present congestion problems. In fact, Skype s[13] CODECS ilbc [14] or isac [15] can uses rates as low as 13,33kbps in the same way that others VoIP applications. Traditionally, the capacity planning at service providers for IP Networks was done using the same premises for PSTN, mainly considering that the traffic was of a Poisson nature. Also, the over provisioning of links is a common task in the field. Both methods invoke some concern about the perspective of the evolution of these networks to achieve the service convergent requirements in the near future, since there is an expectation that the VoIP application users will increase in the next few years. The interconnection of the four Brazilian Tier-1 IP service providers to US and Europe the OPEX costs are around US$250 million per year. The over provisioning planning method appears as a non optimizing option. The business model for IP in emergent markets such as Brazil, Argentina, Chile, Venezuela, Peru and other South American countries have to consider both interconnection costs and transport costs. The complexity of this problem relies in how to increase quality of service without new charges to subscribers.
5 BANDWIDTH SUM Mbps / n SERVICE VoIP National VoIP International Skype P2P Browsing 50 0 (n = integer) 01-21:00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00:0 Day - Time TIMESLOT Fig.2. Downstream traffic on peak and off peak, 31 days sampled 300 BANDWIDTH SUM 250 Mbps / n SERVICE VoIP National VoIP International Skype P2P Browsing :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00:00 Day - Time TIMESLOT Fig.3. Downstream traffic on peak and off peak, 7 days sampled
6 300 BANDWIDTH SUM 250 Mbps / n SERVICE VoIP National VoIP International Skype P2P Browsing 50 (n = integer) :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00:00 Day - Time TIMESLOT Fig.4. Downstream traffic on peak and off peak, 24 hours sampled 100% BANDWIDTH SUM 90% 80% 70% 60% 50% 40% 30% SERVICE VoIP National VoIP International Skype P2P Browsing 20% 10% (n = integer) 0% 01-21:00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00: :00:00 Day - Time TIMESLOT Fig.5. Downstream traffic percent per Service
7 3 The Traffic Characterization The analysis considers a per application separation of traffic [4][6]. The statistical analysis was done using a self-similarity approach, calculating the Hurst parameter estimation using 4 model types. For real time traffic, the Hurst parameter calculation demands attention because in some cases if statistical process does not have a representative long range dependence characteristic the parameter may be wrongly interpreted. Another issue is the trend present in the periodic traffic. For a more accurate estimation, the trends that appeared in the samples were deleted by removing the cycle regularity. The estimation of the Hurst parameter was made using four different methods: the Whittle Hurst Method, the Variance-Time Plot Method, the Kettani-Gubner Method [9] and the Periodogram Method. Also a Chi-squared analysis was made as a non-parametric test of significance [12] due to the fact that it is necessary to verify the distribution similarity. The statistical significance test allows, with a certain degree of confidence, the acceptance or rejection of an hypothesis. The sampled links of the test bed show a load in the worst case of 70%, so we can consider that the routers are not congested most of the time. In Table 1 appears the Hurst parameter estimation for 5 minutes scale of traffic measurements using the Variance Time Plot and the Kettani-Gubner method. As can be seen, the Hurst parameter is always higher than 0.9, which shows a high degree of burstiness in the samples. The third column which shows the chi-square variable for the Gaussian distribution, infers that these were not acceptable for other distributions. Table 1. Total traffic Hurst parameter estimation for 5 minutes average. Day Hurst Hurst Chi-Square (Variance-Time Plot ) (Kettani-Gubner) (Gaussian Distribution) 1 0,928 0,965 47, ,951 0,976 70, ,944 0,967 51, ,916 0,943 37, ,91 0,943 16, ,911 0,941 26, ,955 0,974 42, ,945 0,973 31, ,955 0,979 46, ,939 0,964 48, ,887 0,944 21, ,916 0,947 52, ,954 0,978 35, ,947 0,97 51, ,948 0,973 45, ,951 0,975 23, ,938 0,966 38,146
8 Table 2. HTTP application traffic Hurst parameter estimation for 5 minutes average. Day Hurst Hurst Chi-Square (Variance-Time Plot ) (Kettani-Gubner) (Gaussian Distribution) 1 0,843 0,895 31, ,812 0,878 71, ,901 0,926 38, ,9 0,934 52, ,815 0,879 32, ,816 0,904 62, ,865 0,906 17,91 8 0,87 0,916 39, ,907 0,935 28, ,867 0,919 21, ,869 0,906 27, ,671 0,861 35, ,878 0,909 36, ,839 0,894 44, ,874 0,907 30, ,753 0,85 23, ,851 0,914 40,299 In Table 2 is shown the estimation of the H parameter for the HTTP (Hyper Text Transfer Protocol) applications. As can be seen, the H relies value between 0.67 and 0.93, which also shows a higher degree of self-similarity, considering that the lower value appears just in day 12. In Table 3, which shows the P2P applications, the H parameter relies between 0.86 and In Table 4 the results for the traffic traces in a 1 ms scale are shown. As can be seen, the VoIP applications have an H parameter value between 0.79 and In Table 4, the four applications are compared in a time scale of 1ms. Once again, the total traffic as well as the individual traffic traces is self similar. The number of xdsl access in all cases are 50,000 at least, with 40% of simultaneous connections. We verified that at this level of traffic aggregation, the self similar model can be used as good way to characterize the behavior of the traffic. The results shown in this section verify the existence of a high degree of the self-similarity in the real traffic for most of the applications. 4 Network Planning In Fig. 6 is shown the proposal of a network forecast tool. First, in the network the samples are collected. Then the traffic is classified per application. The estimation and characterization of the parameters of collected samples are made. These parameters are used as input to a traffic forecast tool based on a mathematical traffic model which intends
9 to find the sub-optimal capacity of the link for that traffic load, considering the selfsimilarity nature. The configuration tool does not consider the network element, since the hardware elements of the routers are not the focus of this work. A real backbone must have full time availability, so it cannot be affected by changes due the normal operation. But also, the physical links are not modified in an automatic way. Since the physical links are today over provisioned, the capacity planning procedure will act in a first phase in dimensioning the logical links of the network, so we intend to focus in the tunnels capacity specification in the very first moment. This procedure will be done by using the parameters that describe the traffic, the parameters that describe the network topology and the tunnel capacities as inputs of a simulation tool which is based in a self similar model of QoS measures. The tool will offer the sub-optimal capacities to achieve the QoS requirements and will be used as a feedback in for the network traffic engineering tasks. In figure 7 we describe one example of application of the feedback process using the auto configuration tool to change the tunnel characteristics for an egress traffic marked with Diffserv. In a second phase, the tool will work in the physical links considering the different tunnels and their capacities. Currently, this tool is in development and will be the focus of a future article, considering also multifractal traffic analysis. Table 3. P2P application traffic Hurst parameter estimation for 5 minutes average Day Hurst Hurst Chi-Square (Variance-Time Plot ) (Kettani-Gubner) (Gaussian Distribution) 1 0,915 0,948 63, ,942 0,962 49, ,937 0,963 45,25 4 0,902 0,935 28, ,902 0,928 20, ,901 0,942 30, ,939 0,964 43, ,932 0,964 52, ,937 0,968 39, ,922 0,948 38, ,86 0,926 37,5 12 0,904 0,942 33, ,937 0,965 55, ,922 0,958 46, ,935 0,963 46, ,935 0,967 49, ,933 0,964 37,285
10 Table 4. Hurst parameter estimation for 1ms sample average Application Variance Time-Plot Kettani Total Traffic 0,927 0,945 HTTP 0,916 0,924 P2P 0,89 0,871 VoIP 0,839 0,799 IP/MPLS Network Network Samples Collect Configuration Tool Abstraction of Network Element Packets classification α Estimation and σ Characterization Tool Parameter generation H Traffic forecast tool Auto-configuration Network Decision Fig. 6. The proposal to network real-time forecast. Aggregated Traffic Diffserv Tunnel Selection Interface Aggregated Traffic Intserv RSVP Tunnels Auto Configuration Tool Tunnel Selection Fig. 7. Tunnel selection between two routers
11 5 Conclusion and future works The management and the sizing of a telecom network is a challenging task in the actual scenario of convergence. This allows the operator to guarantee the satisfaction of the users since they are able to achieve a level of quality of the service that is expected and, in the other hand, to diminish the percentage of capital invested without immediate return. The capacity planning procedure with optimizing goals relies in accurate traffic models which describe the real traffic behavior of applications. The first step to begin this procedure is to characterize the traffic and classify the most important applications of a service provider, in terms to identify which are the most significant applications as well as the mathematical model that may describe them. In this work we showed this first step and its potential use for a service provider company which has one of the higher volumes of traffic and users in the South American Region. The traffic analysis showed a high Hurst parameter in almost of the verified applications. This result shows the importance of the development of adequate strategies to treat the traffic in wide range networks. This work proposed a new approach to aid the network planning task based on the applications and the characteristics of the traffic. We expect that this proposal will allow to increase the QoS per application in the network. In future works we will show the influence of the Hölder exponent to characterize the multifractal behavior of the traffic and use this result to produce more accurate models for a network planning tool. References 1. Cerf, Vinton G.: On the Evolution of Internet Technologies Proceedings of the IEEE, vol. 92, No. 9, SEPTEMBER 2004Bruce, K.B., 2. W. Leland, M. Taqqu, W. Willinger, and D. Wilson, On the self-similar nature of ethernet traffic (extended version), IEEE/ACM Trans. on Networking, vol. 2, no. 1, pp , 1994, 3. M. S. Taqqu, W. Willnger and B. Sherman, Proof of a fundamental result in self-similar traffic modeling. Computer Communication Review, vol. 27, p. 5-23, Netfow application and technologies from Cisco Systems accessed 10/15/2006 and available at: 5. Several authors Ethereal application,, accessed on 10/17/2006 and available at: 6. S. Zander, T. Nguyen, G. Armitage, Self-learning IP Traffic Classification based on Statistical Flow Characteristics on Passive & Active Measurement Workshop, Boston, USA, March, 2005 Springer 7. Clegg, R. A Practical Guide to Measuring the Hurst Parameter, Proceedings of 21st UK Performance Engineering Workshop, School of Computing Science, Andersen, A. T. e Newlsen, B. F. A Markovian Approach for Modeling Packet Traffic with Long-Range Dependence, IEEE Journal on Selected Areas in Communications, v.16, n.5, p , Junho 1998.
12 9. Kettani, H. e Gubner, J.A. A Novel Approach the Estimation of the Hurst Parameter in Selfsimilar Traffic, Proceedings of IEEE Conference on Local Computer Networks, Tampa, Flórida, Novembro Leland, W. et. al. On the self-similar nature of ethernet traffic (extended version), IEEE/ACM Trans. on Networking, vol. 2, no. 1, pp , Law, A.M. e Kelton, W. D. Simulation Modeling and Analysis, 2nd ed. Nova Iorque: McGraw- Hill, Connor-Linton, Jeff. Chi Square Tutorial accessed 10/18/2006 and available at: Skype FAQ ILBC codec isac codec.
Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003
Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Self-similarity and its evolution in Computer Network Measurements Prior models used Poisson-like models Origins
More informationEXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP
Scientific Bulletin of the Electrical Engineering Faculty Year 11 No. 2 (16) ISSN 1843-6188 EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Emil DIACONU 1, Gabriel PREDUŞCĂ 2, Denisa CÎRCIUMĂRESCU
More informationAnalysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
More informationICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
More information1.1. Abstract. 1.2. VPN Overview
1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making
More informationExamining Self-Similarity Network Traffic intervals
Examining Self-Similarity Network Traffic intervals Hengky Susanto Byung-Guk Kim Computer Science Department University of Massachusetts at Lowell {hsusanto, kim}@cs.uml.edu Abstract Many studies have
More informationVoIP versus VoMPLS Performance Evaluation
www.ijcsi.org 194 VoIP versus VoMPLS Performance Evaluation M. Abdel-Azim 1, M.M.Awad 2 and H.A.Sakr 3 1 ' ECE Department, Mansoura University, Mansoura, Egypt 2 ' SCADA and Telecom General Manager, GASCO,
More informationAnalysis of Performance of VoIP
ENSC 427 Communication Networks Analysis of Performance of VoIP Over various scenarios OPNET 14.0 Spring 2012 Final Report Group 11 Yue Pan Jeffery Chung ZiYue Zhang Website : http://www.sfu.ca/~ypa11/ensc%20427/427.html
More informationVoIP Bandwidth Considerations - design decisions
VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or
More informationPERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
More informationObservingtheeffectof TCP congestion controlon networktraffic
Observingtheeffectof TCP congestion controlon networktraffic YongminChoi 1 andjohna.silvester ElectricalEngineering-SystemsDept. UniversityofSouthernCalifornia LosAngeles,CA90089-2565 {yongminc,silvester}@usc.edu
More informationAnalysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN
ENSC 427 Communication Networks Final Project Report Spring 2014 Analysis and Simulation of VoIP Team #: 2 Kadkhodayan Anita (akadkhod@sfu.ca, 301129632) Majdi Yalda (ymajdi@sfu.ca, 301137361) Namvar Darya
More informationPreparing Your IP Network for High Definition Video Conferencing
WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available
More informationwww.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
2007 Cisco Systems, Inc. All rights reserved. DESGN v2.0 3-11 Enterprise Campus and Data Center Design Review Analyze organizational requirements: Type of applications, traffic volume, and traffic pattern
More informationPreparing Your IP network for High Definition Video Conferencing
White Paper Global Services April 2007 Table of Contents 1.0 OVERVIEW...3 2.0 VIDEO CONFERENCING BANDWIDTH DEMAND...3 3.0 AVAILABLE BANDWIDTH...5 3.1 Converged Network Links... 6 3.2 Dedicated Network
More informationBusiness Case for the Brocade Carrier Ethernet IP Solution in a Metro Network
Business Case for the Brocade Carrier Ethernet IP Solution in a Metro Network Executive Summary The dramatic rise of multimedia applications in residential, mobile, and business networks is continuing
More informationPerformance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au
More informationBlue 102. IP Service Architecture Futures. Geoff Huston May 2000
Blue 102 IP Service Architecture Futures Geoff Huston May 2000 Next Wave IP Services Service Requirements Connectivity service for customer-operated routers Service payload is IP packet High peak carriage
More informationNovember 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
More information4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
More informationENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks
ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi (faa6@sfu.ca) Ehsan Arman (eaa14@sfu.ca) http://www.sfu.ca/~faa6
More informationMPLS Quality of Service What Is It? Carsten Rossenhövel EANTC (European Advanced Networking Test Center)
MPLS Quality of Service What Is It? Carsten Rossenhövel EANTC (European Advanced Networking Test Center) About EANTC EANTC offers vendor independent network quality assurance since 1991 EANTC Berlin -
More informationWHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream
More informationICTTEN4215A Install and configure internet protocol TV in a service provider network
ICTTEN4215A Install and configure internet protocol TV in a service provider network Release: 1 ICTTEN4215A Install and configure internet protocol TV in a service provider network Modification History
More informationA Talari Networks White Paper. Transforming Enterprise WANs with Adaptive Private Networking. A Talari White Paper
ATalariNetworksWhitePaper TransformingEnterpriseWANswith AdaptivePrivateNetworking ATalariWhitePaper 2 TransformingEnterpriseWANwithAdaptivePrivateNetworking Introduction IT departments face pressures
More informationVOIP QOS. Thomas Mangin. ITSPA - Autumn Seminar 11th October 2012 LEEDS. Technical Director IXLeeds AND THE IXP THE CORE THE EDGE
VOIP QOS ITSPA - Autumn Seminar 11th October 2012 LEEDS THE EDGE THE CORE AND THE IXP Thomas Mangin Technical Director IXLeeds AGENDA NO AGENDA Agenda are good to let you known when to doze off There is
More informationMPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
More information5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,
More informationRe-establishing and improving the experimental VoIP link with the University of Namibia: A Case Study
Re-establishing and improving the experimental VoIP link with the University of Namibia: A Case Study R. M. Ngandu, A. Terzoli & M. Tsietsi Department of Computer Science, Rhodes University September,
More informationQuality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008
Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008 John Bartlett NetForecast, Inc. john@netforecast.com www.netforecast.com VoIP Deployment Realities VoIP is not just another application
More informationICTNPL5071A Develop planning strategies for core network design
ICTNPL5071A Develop planning strategies for core network design Release: 1 ICTNPL5071A Develop planning strategies for core network design Modification History Not Applicable Approved Page 2 of 15 Unit
More informationNGN Network Architecture
ITU/BDT Regional Seminar on Costs and Tariffs for Member Countries of the Tariff Group for Africa (TAF) Midrand,, South Africa, June 2005 NGN Network Architecture Oscar González Soto ITU Consultant Expert
More informationVoice over IP Networks: Ensuring quality through proactive link management
White Paper Voice over IP Networks: Ensuring quality through proactive link management Build Smarter Networks Table of Contents 1. Executive summary... 3 2. Overview of the problem... 3 3. Connectivity
More informationImproving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
More informationVoIP QoS on low speed links
Ivana Pezelj Croatian Academic and Research Network - CARNet J. Marohni a bb 0 Zagreb, Croatia Ivana.Pezelj@CARNet.hr QoS on low speed links Julije Ožegovi Faculty of Electrical Engineering, Mechanical
More informationCourse 4: IP Telephony and VoIP
Course 4: IP Telephony and VoIP Telecommunications Technical Curriculum Program 3: Voice Knowledge 6/9/2009 1 Telecommunications Technical Curriculum Program 1: General Industry Knowledge Course 1: General
More informationMeasurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone
The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010 343 Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone Mohd Ismail Department
More informationConnection-level Analysis and Modeling of Network Traffic
ACM SIGCOMM INTERNET MEASUREMENT WORKSHOP Connection-level Analysis and Modeling of Network Traffic Shriram Sarvotham, Rudolf Riedi, Richard Baraniuk Abstract Most network traffic analysis and modeling
More informationImplementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led
Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led Course Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements,
More informationTraffic Characterization and Perceptual Quality Assessment for VoIP at Pakistan Internet Exchange-PIE. M. Amir Mehmood
Traffic Characterization and Perceptual Quality Assessment for VoIP at Pakistan Internet Exchange-PIE M. Amir Mehmood Outline Background Pakistan Internet Exchange - PIE Motivation Preliminaries Our Work
More informationJive Core: Platform, Infrastructure, and Installation
Jive Core: Platform, Infrastructure, and Installation Jive Communications, Inc. 888-850-3009 www.getjive.com 1 Overview Jive hosted services are run on Jive Core, a proprietary, cloud-based platform. Jive
More informationAn Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
More informationMPLS@NLBd.d. Janko Jager. * MPLS Multi Protocol Label Switching ** NLBd.d. Nova Ljubljanska banka d.d.
MPLS@NLBd.d. Janko Jager * MPLS Multi Protocol Label Switching ** NLBd.d. Nova Ljubljanska banka d.d. Telecommunications, Portorož, 04.10.2008 NLB d.d. 1 Foreword This presentation is about NLB d.d. experience
More informationQoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationIP Network Monitoring and Measurements: Techniques and Experiences
IP Network Monitoring and Measurements: Techniques and Experiences Philippe Owezarski LAAS-CNRS Toulouse, France Owe@laas.fr 1 Outline 4 Introduction 4 Monitoring problematic 8Only based on network administration
More informationDOCSIS 1.1 Cable Modem Termination Systems
DOCSIS 1.1 Cable Modem Termination Systems Chris Bridge cbridge@motorola.com DOCSIS 1.1 Features QoS management Dynamic QoS management Dynamic QoS addition Dynamic QoS change Dynamic QoS deletion Policy-based
More informationCARRIER MPLS VPN September 2014
CARRIER MPLS VPN September 2014 SERVICE OVERVIEW The International MPLS IP-VPN service provides a full range of VPN connectivity solutions, including: Carrier MPLS IP VPN: dedicated to operators looking
More informationIntroduction to Quality of Service. Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.
Introduction to Quality of Service Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ QoS Issues in Telecommunication Networks - 1 Quality of service
More informationCourse Description. Students Will Learn
Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user
More informationTransport for Enterprise VoIP Services
Transport for Enterprise VoIP Services Introduction Many carriers are looking to advanced packet services as an opportunity to generate new revenue or lower costs. These services, which include VoIP, IP
More informationVoice over IP Basics for IT Technicians
Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements
More informationBuilding Next Generation DSL Networks with the Redback Service Gateway
Building Next Generation DSL Networks with the Redback Service Gateway Providers must respond to the growing adoption of DSL by building an advanced architecture that supports a diversity of services,
More informationANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)
More informationVoIP / SIP Planning and Disclosure
VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings
More informationVoice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and
1.1 Background Voice over Internet Protocol (VoIP) is a technology that allows users to make telephone calls using a broadband Internet connection instead of an analog phone line. VoIP holds great promise
More informationAC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS
AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS Kati Wilson, Texas A&M University Kati is a student in the Electronics Engineering
More information"Charting the Course... ... to Your Success!" QOS - Implementing Cisco Quality of Service 2.5 Course Summary
Course Summary Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such as best effort, IntServ, and DiffServ,
More informationPriority Queuing of Network Game Traffic over a DOCSIS Cable Modem Link
Priority Queuing of Network Game Traffic over a DOCSIS Cable Modem Link Jason But, Shaun Burriss and Grenville Armitage Centre for Advanced Internet Architectures Swinburne University of Technology Melbourne,
More informationVoice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone.
Anritsu Network Solutions Voice Over IP Application Note MultiFlow 5048 CALL Manager Serv # 10.100.27 255.255.2 IP address 10.100.27.4 OC-48 Link 255 255 25 IP add Introduction Voice communications over
More informationAuthors Mário Serafim Nunes IST / INESC-ID Lisbon, Portugal mario.nunes@inesc-id.pt
Adaptive Quality of Service of Voice over IP Communications Nelson Costa Instituto Superior Técnico (IST) Lisbon, Portugal eng.ncosta@gmail.com Authors Mário Serafim Nunes Lisbon, Portugal mario.nunes@inesc-id.pt
More informationPERFORMANCE OF THE GPRS RLC/MAC PROTOCOLS WITH VOIP TRAFFIC
PERFORMANCE OF THE GPRS RLC/MAC PROTOCOLS WITH VOIP TRAFFIC Boris Bellalta 1, Miquel Oliver 1, David Rincón 2 1 Universitat Pompeu Fabra, Psg. Circumval lació 8, 83 - Barcelona, Spain, boris.bellalta,
More informationIMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS)
IMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS) COURSE OVERVIEW: Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such
More informationSimulation of SIP-Based VoIP for Mosul University Communication Network
Int. J. Com. Dig. Sys. 2, No. 2, 89-94(2013) 89 International Journal of Computing and Digital Systems http://dx.doi.org/10.12785/ijcds/020205 Simulation of SIP-Based VoIP for Mosul University Communication
More informationBroadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro
Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro Copyright Virgil Dobrota 2007-2008, All rights reserved 1 Course 12 - Outline 46. NGN Next Generation
More informationAll Rights Reserved - Library of University of Jordan - Center of Thesis Deposit
iii DEDICATION To my parents, my wife, my brothers and sisters, and my son for their encouragement, and help during this thesis. iv ACKNOWLEDGEMENT I would like to thank my supervisor prof. Jameel Ayoub
More informationThe Analysis and Simulation of VoIP
ENSC 427 Communication Networks Spring 2013 Final Project The Analysis and Simulation of VoIP http://www.sfu.ca/~cjw11/427project.html Group #3 Demet Dilekci ddilekci@sfu.ca Conrad Wang cw11@sfu.ca Jiang
More information12 Quality of Service (QoS)
Burapha University ก Department of Computer Science 12 Quality of Service (QoS) Quality of Service Best Effort, Integrated Service, Differentiated Service Factors that affect the QoS Ver. 0.1 :, prajaks@buu.ac.th
More informationQuality of Service for VoIP
Quality of Service for VoIP WCS November 29, 2000 John T. Chapman Cisco Distinguished Engineer Broadband Products and Solutions Course Number Presentation_ID 1999, Cisco Systems, Inc. 1 The QoS Matrix
More informationPerformance Evaluation for VOIP over IP and MPLS
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 3, 110-114, 2012 Performance Evaluation for VOIP over IP and MPLS Dr. Reyadh Shaker Naoum Computer Information
More informationQuality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationImplementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone
International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq
More informationIP Telephony Deployment Models
CHAPTER 2 Sections in this chapter address the following topics: Single Site, page 2-1 Multisite Implementation with Distributed Call Processing, page 2-3 Design Considerations for Section 508 Conformance,
More informationVoice over IP (VoIP) and QoS/QoE
Voice over IP (VoIP) and QoS/QoE Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Understanding jitter and methods to overcome problems with jitter Quality
More informationVoice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP
Voice over IP Andreas Mettis University of Cyprus November 23, 2004 Overview What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP 1 VoIP VoIP (voice over IP - that is,
More informationCISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS
CISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS INTERNET TECHNOLOGIES DIVISION JANUARY 2005 1 Cisco IOS IP Service Level Agreements Presentation Agenda Overview
More informationClearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
More informationBest Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications
Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,
More informationTime Series Analysis of Network Traffic
Time Series Analysis of Network Traffic Cyriac James IIT MADRAS February 9, 211 Cyriac James (IIT MADRAS) February 9, 211 1 / 31 Outline of the presentation Background Motivation for the Work Network Trace
More informationTesting VoIP on MPLS Networks
Application Note Testing VoIP on MPLS Networks Why does MPLS matter for VoIP? Multi-protocol label switching (MPLS) enables a common IP-based network to be used for all network services and for multiple
More informationThe need for bandwidth management and QoS control when using public or shared networks for disaster relief work
International Telecommunication Union The need for bandwidth management and QoS control when using public or shared networks for disaster relief work Stephen Fazio Chief, Global Telecommunications Officer
More informationNetwork Management for Common Topologies How best to use LiveAction for managing WAN and campus networks
Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks April 2014 www.liveaction.com Contents 1. Introduction... 1 2. WAN Networks... 2 3. Using LiveAction
More informationAERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP
AERONAUTICAL COMMUNICATIONS PANEL (ACP) Working Group I - 7 th Meeting Móntreal, Canada 2 6 June 2008 Agenda Item x : ATN and IP Information Paper Presented by Naoki Kanada Electronic Navigation Research
More informationIntroduction. Impact of Link Failures on VoIP Performance. Outline. Introduction. Related Work. Outline
Impact of Link Failures on VoIP Performance International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV) C. Boutremans, G. Iannaccone and C. Diot Sprint ATL May
More informationVoIP Conformance Labs
VoIP acceptance, VoIP connectivity, VoIP conformance, VoIP Approval, SIP acceptance, SIP connectivity, SIP conformance, SIP Approval, IMS acceptance, IMS connectivity, IMS conformance, IMS Approval, VoIP
More informationVoice over IP (VoIP) Basics for IT Technicians
Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides
More informationHands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction
Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice
More informationIP, Ethernet and MPLS
IP, Ethernet and MPLS Networks Resource and Fault Management Andre Perez ISTE WILEY Table of Contents Preface xi Chapter 1. Network Operation 1 1.1. Basic concepts 1 1.1.1. Layered structure 1 1.1.2. LANs
More informationTruffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
More informationVerifying Metro Ethernet Quality of Service
White Paper Verifying Metro Ethernet Quality of Service Introduction Metro Ethernet is widely accepted as a cost-effective, resilient, and scalable switching and transport technology. Used for delivery
More informationNETWORK ISSUES: COSTS & OPTIONS
VIDEO CONFERENCING NETWORK ISSUES: COSTS & OPTIONS Prepared By: S. Ann Earon, Ph.D., President Telemanagement Resources International Inc. Sponsored by Vidyo By:S.AnnEaron,Ph.D. Introduction Successful
More informationCisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:
More informationAnalysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
More informationAddressing Inter Provider Connections With MPLS-ICI
Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched
More informationIP Telephony and Network Convergence
IP Telephony and Network Convergence Raimo.Kantola@hut.fi Rkantola/28.11.00/s38.118 1 Today corporations have separate data and voice networks Internet Corporate Network PSTN, ISDN Rkantola/28.11.00/s38.118
More informationInvestigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions
Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University
More informationService resiliency and reliability Quality of Experience Modelling requirements A PlanetLab proposal. PDCAT'08 - Dunedin December 1-4, 2008
PlaNetLab Options from Massey University Richard Harris Presentation Outline Service resiliency and reliability Quality of Experience Modelling requirements A PlanetLab proposal PDCAT'2008 Dunedin 2 (c)
More informationWhite paper. Reliable and Scalable TETRA networks
Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA
More informationCustomer White paper. SmartTester. Delivering SLA Activation and Performance Testing. November 2012 Author Luc-Yves Pagal-Vinette
SmartTester Delivering SLA Activation and Performance Testing November 2012 Author Luc-Yves Pagal-Vinette Customer White paper Table of Contents Executive Summary I- RFC-2544 is applicable for WAN and
More informationRequirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
More information