Characterization and Modeling of Packet Loss of a VoIP Communication
|
|
|
- Lorin Bailey
- 9 years ago
- Views:
Transcription
1 Characterization and Modeling of Packet Loss of a VoIP Communication L. Estrada, D. Torres, H. Toral Abstract In this work, a characterization and modeling of packet loss of a Voice over Internet Protocol (VoIP) communication is developed. The distributions of the number of consecutive received and lost packets (namely gap and burst) are modeled from the transition probabilities of two-state and four-state model. Measurements show that both models describe adequately the burst distribution, but the decay of gap distribution for non-homogeneous losses is better fit by the four-state model. The respective probabilities of transition between states for each model were estimated with a proposed algorithm from a set of monitored VoIP calls in order to obtain representative minimum, maximum and average values for both models. Keywords Packet loss, gap and burst distribution, Markov chain, VoIP measurements. I I. INTRODUCTION N this work, modeling of a Voice over Internet Protocol (VoIP) communication through a wide area network (WAN) is developed and simulation based on this model is performed. The effects of correlated delay and loss in the sequence of packets on a voice communication are studied. And parameters of the proposed models are obtained from measurements of these VoIP calls. Consecutive packet receipts and losses are named gaps and bursts, respectively[]. Due to the time-correlated occupancy of the network, packet losses commonly occur in bursts. At small time scales, i.e., a few seconds or minutes, bursts occur with approximately the same distribution, and a two-state Markov chain can reproduce this phenomenon. Nonhomogeneous bursty behavior becomes noticeable at larger scales and in this case the two-state Markov chain is insufficient, thus a more general model is necessary. The fourstate Markov chain is applied then in order to capture (or simulate) the widely known bursty, non-homogeneous behavior of the characteristics of network traffic. This approach allows us to represent and simulate those periods with low and high loss rate that alternate in sequence according to certain probability. The knowledge of the packet loss rate (PLR) and burst length distribution is useful to quantify the quality of the communication in the sense of certain metrics, e.g., mean opinion score (MOS). Statistical description of the four-state Markov chain, assuming time-homogeneity, is presented. Theoretical packet receipt and loss rates are quantified. Respective gap length and burst length (measured in number of packets lost/received) distributions are also described and a comparison, by means of the square root of the mean squared error (SMSE) of gap and burst length distributions, of two-state and four-state models is also performed. II. MARKOV CHAINS Let,,, be the states of an m-state Markov chain and let be the probability of the chain to pass from the state to the state, i.e.,. Having the Markov property means that, given the present state, future states are independent of the past states, i.e.,,,. The Markov chains used in this work also are time-homogeneous, which means that the probabilities of transition between states are constant over time,i.e.,. All states communicate (are reachable from) each other, which makes the chain irreducible. Also, the chain is aperiodic, i.e., state can be reached from itself in any number of steps (,2,3, ). The probabilities of transitions between states can be represented by a transition matrix. The elements of the onestep transition matrix are. To obtain the - step transition matrix it is necessary to multiply the matrix itself times[2], i.e.,. () As the number of steps ( ) increases, the probability of transition to the state depends less of the initial state. i.e., as tends to, the matrix converges to a matrix with the next form: lim (2) L. Estrada, D. Torres and H. Toral are with the Center of Research and Advanced Studies, Zapopan, Jalisco, 4505, Mexico; phone: ; fax: ; {lestrada,dtorres,htoral}@ gdl.cinvestav.mx. such that (3) 970
2 In (3), represents the named steady probability of state. The steady-state transition matrix can be obtained then by solving (3) and (4) Error! Reference source not found.]: low losses high losses (4) p 32 Assuming that the chain is irreducible and aperiodic, the Matrix is defined and unique. S 2 p 23 S 3 III. TWO- AND FOUR-STATE MODELS The two-state Markov chain is shown in Fig.. State represents packet loss and, packet receipt. Two substitutions ( and ) are made in order to represent the chain with the lowest number of parameters. The steady-state probability of the chain to be in the state, namely the packet loss rate, is given by (5) Error! Reference source not found.]: and clearly. -p 2 (5) p 2 S S 2 p 2 -p 2 Fig. : Two-state Markov chain. White and shady circles represent correct and erroneous states, respectively. The burst length and gap length distributions ( and, respectively) can be expressed in terms of and, as expressed by (6) and (7): (6) (7) which have also respective averages / and /. It is easy to proof (6), as and ; and similarly for (7). The four-state Markov chain is shown in Fig. 2. Missing arrows indicate zero probability. States and (shady circles) represent packet losses (erroneous); and (white circles), packet receipt (correct). Six parameters (,,,,, 0, ) are necessary to define all these probabilities. Without loss of generality, probabilities of transitions between correct states, as well as transitions between erroneous ones, have been assigned to zero. Fig. 2: Four-state Markov chain. White and shady circles represent correct and erroneous states, respectively. The four steady-state probabilities of this chain are: p 2 (8) (9) (0) () The packet loss rate, i.e., the probability of the chain to be either in or in, is then: (2) The average burst length ( ) is calculated as the quotient of the probability of loss and the probability of transition from a lossless state to a loss state or vice versa (3). Let and be the respective number of transitions from correct states to error states and from error states to correct states. Their absolute difference ( ) is at most and it can be considered 0 as tends to, i.e., the transitions from error state to correct state and vice versa have equal probability ( ) and then the average burst length ( ) is: -p 2 p 2 -p 2 -p 23 -p 34 -p 32 p 34 p 43 S S 4 Similarly, the average gap length is: -p 43 (3) 97
3 (4) The authors of Error! Reference source not found.] derived the gap length distribution for a two-state model, in which, as opposite to the two-state of Fig., losses and receipts are allowed in the two states. The distribution of burst length of the four-state Markov chain of Fig. 2 is obtained, similarly as in Error! Reference source not found.], as follows: Let denote the probability that the burst length is ;, the probability that the burst length is or greater and the transmission is from state and, the probability that the burst length is or greater and transmission is from state and, the probability that the burst length is or greater such that and. Clearly. Also, as transitions between states and have zero probability, and. Then to calculate it is necessary to obtain and, whose respective values are / and / As the minimum burst length is,. Then, the distribution of the burst length is: (5) where and. As expressed by (5), is the sum of two geometric series with respective rates and ; this implies that is a decreasing function of, i.e., greater bursts have lower probabilities than shorter ones. A similar procedure can be followed to obtain the gap length distribution ( ), which is: (6) Where /, /, and. Also note that. IV. NUMERICAL APPROXIMATION OF THE MATRIX OF PROBABILITIES Obtaining analytical expressions for the elements of (i.e.,, ) can be difficult when the number of states is large. In this case, a numerical approximation is more suitable, which is described as follows: Let be a transition matrix, which has a unique steady-state solution, and let, ;,, be its pairs of eigenvalues and eigenvectors (i.e., ), such that for. This matrix can be decomposed into the special form (7) where is a matrix composed of the eigenvectors of, is the diagonal matrix constructed from the corresponding eigenvalues and is the inverse of. Then can be calculated easily as (8) As all elements of the diagonal of the matrix are lower than except,, then (9) where the only non-zero element of is,. This method is also useful when obtaining short-term approximations, i.e., for small. V. MODELING LOSS SEQUENCES The traces studied in this work are those corresponding to Sets 3 and 4, described in Error! Reference source not found.] and Error! Reference source not found.]. There are 48 traces in total. Each one represents the packet receipt and loss of an -hour VoIP call. An empirical algorithm is used to estimate the parameters of the Markov chain. For the two state Markov model let be the sequence that represent packet receipts and losses, i.e., 0 if packet was received and if it was lost. Packets are sent with a constant rate, e.g., a packet is sent each 20. A. Two-state Case In this case the values of and are estimated as follows: / and /. Where and are the respective number of transitions from correct states to error states and from error states to correct states, and and are the respective number of received and lost packets. B. Four-state Case: In this case the values of the sequence are divided into regions of two types: the first with lower loss rate (whose first and last values are zeros) and the second with higher loss rate (whose first and last values are ones) than certain threshold, e.g., %. Then, from the first region, and are estimated the same way than in a two-state model. Similarly, and are estimated from the second region. Finally, let be the number of transitions from the first region to the second;, the number of transitions from the second to the first;, the number of received packets in the first region (zeros) and, the number of lost packets in the 972
4 second region (ones), then / and /. Also, the burst and gap histograms can be obtained from the sequence. f b (k) Fig. 3: Burst length distribution of a VoIP communication. Two-state and four-state models represent it adequately f g (k) Fig. 4: Gap length distribution of a VoIP communication. Four-state model fits better this distribution than two-state model VI. COMPARISON OF TWO- AND FOUR-STATE MODELS An example with one of the traces measured, obtained from a VoIP communication with codec G.7 and sampling time of 20, is shown in Fig. 3 and Fig. 4. Burst CDF Fig. 5: PP-plot of the respective two-state and four-state burst histograms In the traces under study it is found that, although the twostate model is adequate for the burst length distribution (see Fig. 5), the four-state model performs better when modeling the gap length distribution, as shown in Fig. 6. This is because the burst length distribution approaches rapidly to very low k k Burst CDF (reference) values (near zero), but in the case of the gap length distribution, which presents slower decay, the two-state model does not fit the measured distribution due to its non-flexible one-parameter formula (see (7)). For each trace that represents a loss sequence, the parameters of both two-state and four-state models are obtained. The estimated statistics of the two-state and four-state transition probabilities are shown, respectively, in Table I and Table II. Gap CDF Gap CDF (reference) Fig. 6: PP-plot of the respective two-state and four-state gap histograms TABLE I STATISTICS FOR TWO-STATE MODEL p 2 p 2 MIN MAX MEAN STD. DEV TABLE II STATISTICS FOR FOUR-STATE MODEL p 2 p 2 p 43 p 34 p 23 p 32 MIN MAX MEAN STD. DEV Fig. 7 and Fig. 8 show the SMSE between the burst length and gap length distributions and their respective two-state and four-state models. The four-state model fits the distribution better than two-state model for most traces. In cases where SMSE is large (e.g., greater than for the four-state gap length distribution of Fig. 8) the packet loss is low (e.g., lower than 0.23%), then the gap length distribution cannot be adequately sampled, a larger number of samples is necessary in these cases. Note that each one of these traces represents an -hour call. In shorter periods, where non-bursty losses are present, these can be modeled adequately by two-state model. VII. CONCLUSION In this work, packet receipt and loss are modeled by discrete finite-state Markov chains. The packet loss rate, packet receipt rate and the distributions of burst length and gap length are described in terms of the Markov chain parameters, i.e., the 973
5 probabilities of transition between states. Algorithms for estimating the probabilities of transition for both two-state and four-state models, which are shown in Fig. and Fig. 2, are presented. SMSE two-state Trace four-state Fig. 7: SMSE of two-state and four-state burst histogram for all traces SMSE two-state Trace four-state Fig. 8: SMSE of two-state and four-state gap histogram for all traces For modeling bursts and gaps of short communications, e.g. calls with a duration of a few minutes, the two-state model is sufficient; but for longer periods, the four-states model fits better. The performance of both models was evaluated by means of the SMSE of the burst length and gap length distributions, showing that although the two-state model fits adequately the burst length distribution, it cannot follow the slow decay of the gap length distribution of measurements. The traces for which the SMSE of the four-state model was higher (e.g., greater than ) had very low loss rates (less than 0.23%), so the gap length distribution was not adequately sampled. REFERENCES [] T. Tao, J. Lu, K. Gong, J. Gu. A four-states Markov model for burst error analysis in satellite communications. International Conference on Communication Technology.Vol., pp , August [2] Wai-Ki Ching, Michael K. Ng. Markov Chains: Models, Algorithms and Applications. Springer, [3] G. George Yin, Qing Zhang. Discrete-Time Markov Models, Two- Time-Scale Methods and Applications, pp , Springer, [4] Hyungkeun. Lee, Hyukjoon. Lee. A packet loss recovery scheme based on the gap statistics. C. Kim (Ed.): ICOIN 2005, LNCS 339, pp , Springer-Verlag Berlin Heidelberg, [5] J. R. Yee, E. J. Weldon. Evaluation of the performance of error correcting codes on a Gilbert channel. IEEE transactions on Communications, Vol. 43 No. 8, 995. [6] H. Toral, D. Torres, C. Hernandez, L. Estrada. Self-similarity, packet loss, jitter, and packet size: empirical relationships for VoIP. 8th International Conference on Electronics, Communications and Computers. CONIELECOMP, March [7] L. Estrada, D. Torres, H.Toral, Analytical Investigation of the Performance of Packet-level FEC Techniques in VoIP Communications, WSEAS Transactions on Communications, issue 9, Vol. 8,
Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks
Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks Enrique Stevens-Navarro and Vincent W.S. Wong Department of Electrical and Computer Engineering The University
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
Troubleshooting Common Issues in VoIP
Troubleshooting Common Issues in VoIP 2014, SolarWinds Worldwide, LLC. All rights reserved. Voice over Internet Protocol (VoIP) Introduction Voice over IP, or VoIP, refers to the delivery of voice and
QoE based Resource Management in Wireless Networks
Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia QoE based Resource Management in Wireless Networks University of Würzburg Chair of Distributed Systems www3.informatik.uni-wuerzburg.de
The Analysis and Simulation of VoIP
ENSC 427 Communication Networks Spring 2013 Final Project The Analysis and Simulation of VoIP http://www.sfu.ca/~cjw11/427project.html Group #3 Demet Dilekci [email protected] Conrad Wang [email protected] Jiang
Basic principles of Voice over IP
Basic principles of Voice over IP Dr. Peter Počta {[email protected]} Department of Telecommunications and Multimedia Faculty of Electrical Engineering University of Žilina, Slovakia Outline VoIP Transmission
Packet Loss Distributions and Packet Loss Models ABSTRACT
UIT - Secteur de la normalisation des télécommunications ITU - Telecommunication Standardization Sector UIT - Sector de Normalización de las Telecomunicaciones Study Period 2001-2004 Study Group 12 Lannion,
Performance Analysis of Interleaving Scheme in Wideband VoIP System under Different Strategic Conditions
Performance Analysis of Scheme in Wideband VoIP System under Different Strategic Conditions Harjit Pal Singh 1, Sarabjeet Singh 1 and Jasvir Singh 2 1 Dept. of Physics, Dr. B.R. Ambedkar National Institute
Fundamentals of VoIP Call Quality Monitoring & Troubleshooting. 2014, SolarWinds Worldwide, LLC. All rights reserved. Follow SolarWinds:
Fundamentals of VoIP Call Quality Monitoring & Troubleshooting 2014, SolarWinds Worldwide, LLC. All rights reserved. Introduction Voice over IP, or VoIP, refers to the delivery of voice and multimedia
How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3
Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is
On Correlating Performance Metrics
On Correlating Performance Metrics Yiping Ding and Chris Thornley BMC Software, Inc. Kenneth Newman BMC Software, Inc. University of Massachusetts, Boston Performance metrics and their measurements are
Oscillations of the Sending Window in Compound TCP
Oscillations of the Sending Window in Compound TCP Alberto Blanc 1, Denis Collange 1, and Konstantin Avrachenkov 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France 2 I.N.R.I.A. 2004
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
VoIP Testing IxChariot
TEST PLAN VoIP Testing IxChariot www.ixiacom.com 915-6680-01, 2005 Contents 1. VoIP Testing with IxChariot... 1 1.1 Key Facts... 1 2. Determine Voice Quality Deterioration with Increasing Application
Network Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA [email protected] Electrical and Computer Engineering Department University
The Analytic Hierarchy Process. Danny Hahn
The Analytic Hierarchy Process Danny Hahn The Analytic Hierarchy Process (AHP) A Decision Support Tool developed in the 1970s by Thomas L. Saaty, an American mathematician, currently University Chair,
A study of Skype over IEEE 802.16 networks: voice quality and bandwidth usage
Iowa State University Digital Repository @ Iowa State University Graduate Theses and Dissertations Graduate College 2011 A study of Skype over IEEE 802.16 networks: voice quality and bandwidth usage Kuan-yu
Service resiliency and reliability Quality of Experience Modelling requirements A PlanetLab proposal. PDCAT'08 - Dunedin December 1-4, 2008
PlaNetLab Options from Massey University Richard Harris Presentation Outline Service resiliency and reliability Quality of Experience Modelling requirements A PlanetLab proposal PDCAT'2008 Dunedin 2 (c)
Business case for VoIP Readiness Network Assessment
Business case for VoIP Readiness Network Assessment Table of contents Overview... 2 Different approaches to pre-deployment assessment:.......... 2 Other considerations for VoIP pre-deployment... 3 The
Modeling and Performance Analysis of Telephony Gateway REgistration Protocol
Modeling and Performance Analysis of Telephony Gateway REgistration Protocol Kushal Kumaran and Anirudha Sahoo Kanwal Rekhi School of Information Technology Indian Institute of Technology, Bombay, Powai,
Burst (of packets) and Burstiness
66th IETF - Montreal, Quebec, Canada Burst (of packets) and Burstiness R. Krzanowski Ver 1.0 7/10/2006 1 Outline Objectives Definition of a phenomena Definition of Burst and burstiness Future research
Voice Service Support over Cognitive Radio Networks
Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,
Algebra I Credit Recovery
Algebra I Credit Recovery COURSE DESCRIPTION: The purpose of this course is to allow the student to gain mastery in working with and evaluating mathematical expressions, equations, graphs, and other topics,
Simulative Investigation of QoS parameters for VoIP over WiMAX networks
www.ijcsi.org 288 Simulative Investigation of QoS parameters for VoIP over WiMAX networks Priyanka 1, Jyoteesh Malhotra 2, Kuldeep Sharma 3 1,3 Department of Electronics, Ramgarhia Institue of Engineering
VoIP QoS on low speed links
Ivana Pezelj Croatian Academic and Research Network - CARNet J. Marohni a bb 0 Zagreb, Croatia [email protected] QoS on low speed links Julije Ožegovi Faculty of Electrical Engineering, Mechanical
How To Understand And Solve Algebraic Equations
College Algebra Course Text Barnett, Raymond A., Michael R. Ziegler, and Karl E. Byleen. College Algebra, 8th edition, McGraw-Hill, 2008, ISBN: 978-0-07-286738-1 Course Description This course provides
MULTI-STREAM VOICE OVER IP USING PACKET PATH DIVERSITY
MULTI-STREAM VOICE OVER IP USING PACKET PATH DIVERSITY Yi J. Liang, Eckehard G. Steinbach, and Bernd Girod Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,
Analysis of a Production/Inventory System with Multiple Retailers
Analysis of a Production/Inventory System with Multiple Retailers Ann M. Noblesse 1, Robert N. Boute 1,2, Marc R. Lambrecht 1, Benny Van Houdt 3 1 Research Center for Operations Management, University
Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective
Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective Yang Song, Starsky H.Y. Wong, and Kang-Won Lee Wireless Networking Research Group IBM T. J. Watson Research Center
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
Basic Multiplexing models. Computer Networks - Vassilis Tsaoussidis
Basic Multiplexing models? Supermarket?? Computer Networks - Vassilis Tsaoussidis Schedule Where does statistical multiplexing differ from TDM and FDM Why are buffers necessary - what is their tradeoff,
A Statistical Estimation of Average IP Packet Delay in Cellular Data Networks
A Statistical Estimation of Average IP Packet Delay in Cellular Data Networks Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, Computer Science Department,University College
Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008
Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008 John Bartlett NetForecast, Inc. [email protected] www.netforecast.com VoIP Deployment Realities VoIP is not just another application
Observingtheeffectof TCP congestion controlon networktraffic
Observingtheeffectof TCP congestion controlon networktraffic YongminChoi 1 andjohna.silvester ElectricalEngineering-SystemsDept. UniversityofSouthernCalifornia LosAngeles,CA90089-2565 {yongminc,silvester}@usc.edu
THREE DIMENSIONAL REPRESENTATION OF AMINO ACID CHARAC- TERISTICS
THREE DIMENSIONAL REPRESENTATION OF AMINO ACID CHARAC- TERISTICS O.U. Sezerman 1, R. Islamaj 2, E. Alpaydin 2 1 Laborotory of Computational Biology, Sabancı University, Istanbul, Turkey. 2 Computer Engineering
THE ANALYSIS AND SIMULATION OF VOIP
ENSC 427 Communication Networks Spring 2013 Final Project Presentation THE ANALYSIS AND SIMULATION OF VOIP Presented by Team #3: Demet Dilekci Conrad Wang Jiang Feng Xu [email protected] [email protected] [email protected]
Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
Methods for Mitigating IP Network Packet Loss in Real Time Audio Streaming Applications
Methods for Mitigating IP Network Packet Loss in Real Time Audio Streaming Applications Keyur Parikh and Junius Kim Harris Broadcast Mason Ohio Abstract Increasingly, IP based networks are being used for
Empirix OneSight for VoIP: Avaya Aura Communication Manager
Datasheet Empirix OneSight for VoIP: Avaya Aura Communication Manager Perform. Increase visibility and ensure the availability and quality of critical communications systems. Benefits Speed the deployment
SECRET sharing schemes were introduced by Blakley [5]
206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has
Examining Self-Similarity Network Traffic intervals
Examining Self-Similarity Network Traffic intervals Hengky Susanto Byung-Guk Kim Computer Science Department University of Massachusetts at Lowell {hsusanto, kim}@cs.uml.edu Abstract Many studies have
Effective Bandwidth of Multiclass Markovian Traffic Sources and Admission Control With Dynamic Buffer Partitioning
1524 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 51, NO. 9, SEPTEMBER 2003 Effective Bandwidth of Multiclass Markovian Traffic Sources and Admission Control With Dynamic Buffer Partitioning Yu Cheng, Student
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
A Regime-Switching Model for Electricity Spot Prices. Gero Schindlmayr EnBW Trading GmbH [email protected]
A Regime-Switching Model for Electricity Spot Prices Gero Schindlmayr EnBW Trading GmbH [email protected] May 31, 25 A Regime-Switching Model for Electricity Spot Prices Abstract Electricity markets
A Novel Semi-Markov Smooth Mobility Model for Mobile Ad Hoc Networks.
A Novel Semi-Markov Smooth Mobility Model for Mobile Ad Hoc Networks. Ming Zhao Wenye Wang Department of Electrical and Computer Engineering North Carolina State University Raleigh, North Carolina 7695
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Monitoring VoIP Call Quality Using Improved Simplified E-model
Monitoring VoIP Call Quality Using Improved Simplified E-model Haytham Assem, David Malone Hamilton Institute, National University of Ireland, Maynooth Hitham.Salama.2012, [email protected] Jonathan
Performance Analysis of VoIP Codecs over BE WiMAX Network
Performance Analysis of VoIP Codecs over BE WiMAX Network Muhammad Imran Tariq, Muhammad Ajmal Azad, Razvan Beuran, Yoichi Shinoda Japan Advanced Institute of Science and Technology, Ishikawa, Japan National
Priority-Coupling A Semi-Persistent MAC Scheduling Scheme for VoIP Traffic on 3G LTE
Priority-Coupling A Semi-Persistent MAC Scheduling Scheme for VoIP Traffic on 3G LTE S. Saha * and R. Quazi ** * Helsinki University of Technology, Helsinki, Finland ** University of Dhaka, Dhaka, Bangladesh
Monitoring and Managing Voice over Internet Protocol (VoIP)
Network Instruments White Paper Monitoring and Managing Voice over Internet Protocol (VoIP) As with most new technologies, Voice over Internet Protocol (VoIP) brings new challenges along with the benefits.
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
On the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
Performance Monitoring and Control in Contention- Based Wireless Sensor Networks
Performance Monitoring and Control in Contention- Based Wireless Sensor Networks Thomas Lindh #1, Ibrahim Orhan #2 # School of Technology and Health, KTH Royal Institute of Technology Marinens vag 30,
Credibility and Pooling Applications to Group Life and Group Disability Insurance
Credibility and Pooling Applications to Group Life and Group Disability Insurance Presented by Paul L. Correia Consulting Actuary [email protected] (207) 771-1204 May 20, 2014 What I plan to cover
CURRENT wireless personal communication systems are
Efficient Radio Resource Allocation in a GSM and GPRS Cellular Network David E Vannucci & Peter J Chitamu Centre for Telecommunications Access and Services School of Electrical and Information Engineering
IN THIS PAPER, we study the delay and capacity trade-offs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness
Quality of Service Testing in the VoIP Environment
Whitepaper Quality of Service Testing in the VoIP Environment Carrying voice traffic over the Internet rather than the traditional public telephone network has revolutionized communications. Initially,
Cooperative Virtual Machine Management for Multi-Organization Cloud Computing Environment
Cooperative Virtual Machine Management for Multi-Organization Cloud Computing Environment Dusit Niyato, Zhu Kun, and Ping Wang School of Computer Engineering, Nanyang Technological University (NTU), Singapore
Numerical Analysis Lecture Notes
Numerical Analysis Lecture Notes Peter J. Olver 5. Inner Products and Norms The norm of a vector is a measure of its size. Besides the familiar Euclidean norm based on the dot product, there are a number
OneSight Voice Quality Assurance
OneSight Voice Quality Assurance Benefits Proactively determine voice quality issues as well as other service impacting issues before users complain Comprehensively monitor communications systems with
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone
The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010 343 Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone Mohd Ismail Department
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover
1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate
A New Adaptive FEC Loss Control Algorithm for Voice Over IP Applications
A New Adaptive FEC Loss Control Algorithm for Voice Over IP Applications Chinmay Padhye and Kenneth J. Christensen Computer Science and Engineering University of South Florida Tampa, FL 336 {padhye, christen}@csee.usf.edu
A Hidden Markov Model Approach to Available Bandwidth Estimation and Monitoring
A Hidden Markov Model Approach to Available Bandwidth Estimation and Monitoring Cesar D Guerrero 1 and Miguel A Labrador University of South Florida Department of Computer Science and Engineering Tampa,
400B.2.1 CH2827-4/90/0000-0350 $1.OO 0 1990 IEEE
Performance Characterizations of Traffic Monitoring, and Associated Control, Mechanisms for Broadband "Packet" Networks A.W. Berger A.E. Eckberg Room 3R-601 Room 35-611 Holmde1,NJ 07733 USA Holmde1,NJ
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Abdalla Gheryani, And Mladen Veinović Abstract This paper studies and measures the outcome of different security
DATA ANALYSIS II. Matrix Algorithms
DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where
MOS Technology Brief Mean Opinion Score Algorithms for Speech Quality Evaluation
MOS Technology Brief Mean Opinion Score Algorithms for Speech Quality Evaluation Mean Opinion Score (MOS) is commonly used to rate phone service speech quality, expressed on a scale from 1 to 5, where
Traffic Characterization and Perceptual Quality Assessment for VoIP at Pakistan Internet Exchange-PIE. M. Amir Mehmood
Traffic Characterization and Perceptual Quality Assessment for VoIP at Pakistan Internet Exchange-PIE M. Amir Mehmood Outline Background Pakistan Internet Exchange - PIE Motivation Preliminaries Our Work
A Performance Study of VoIP Applications: MSN vs. Skype
This full text paper was peer reviewed by subject matter experts for publication in the MULTICOMM 2006 proceedings. A Performance Study of VoIP Applications: MSN vs. Skype Wen-Hui Chiang, Wei-Cheng Xiao,
ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes
ZyXEL V100 (V100 Softphone 1 Runtime License) Support Notes Version 1.00 April 2009 1 Contents Overview 1. Overview of V100 Softphone...3 2. Setting up the V100 Softphone.....4 3. V100 Basic Phone Usage.....7
Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN
ENSC 427 Communication Networks Final Project Report Spring 2014 Analysis and Simulation of VoIP Team #: 2 Kadkhodayan Anita ([email protected], 301129632) Majdi Yalda ([email protected], 301137361) Namvar Darya
General Framework for an Iterative Solution of Ax b. Jacobi s Method
2.6 Iterative Solutions of Linear Systems 143 2.6 Iterative Solutions of Linear Systems Consistent linear systems in real life are solved in one of two ways: by direct calculation (using a matrix factorization,
Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper
> A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information
Analysis of Mean-Square Error and Transient Speed of the LMS Adaptive Algorithm
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 7, JULY 2002 1873 Analysis of Mean-Square Error Transient Speed of the LMS Adaptive Algorithm Onkar Dabeer, Student Member, IEEE, Elias Masry, Fellow,
Proceedings of the International MultiConference of Engineers and Computer Scientists 2013 Vol I, IMECS 2013, March 13-15, 2013, Hong Kong
, March 13-15, 2013, Hong Kong Risk Assessment for Relational Database Schema-based Constraint Using Machine Diagram Kanjana Eiamsaard 1, Nakornthip Prompoon 2 Abstract Information is a critical asset
A Risk Management System Framework for New Product Development (NPD)
2011 International Conference on Economics and Finance Research IPEDR vol.4 (2011) (2011) IACSIT Press, Singapore A Risk Management System Framework for New Product Development (NPD) Seonmuk Park, Jongseong
Spectrum handoff reduction for cognitive radio ad hoc networks
Published Research in Conference: International Symposium on Wireless Communication Systems - ISWCS, pp. 1036-1040, 2010 Spectrum handoff reduction for cognitive radio ad hoc networks Mohamed A. Kalil,
Notes on Determinant
ENGG2012B Advanced Engineering Mathematics Notes on Determinant Lecturer: Kenneth Shum Lecture 9-18/02/2013 The determinant of a system of linear equations determines whether the solution is unique, without
Ultrasonic Detection Algorithm Research on the Damage Depth of Concrete after Fire Jiangtao Yu 1,a, Yuan Liu 1,b, Zhoudao Lu 1,c, Peng Zhao 2,d
Advanced Materials Research Vols. 368-373 (2012) pp 2229-2234 Online available since 2011/Oct/24 at www.scientific.net (2012) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.368-373.2229
WIRELESS communication channels have the characteristic
512 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 54, NO. 3, MARCH 2009 Energy-Efficient Decentralized Cooperative Routing in Wireless Networks Ritesh Madan, Member, IEEE, Neelesh B. Mehta, Senior Member,
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Real Time Analysis of VoIP System under Pervasive Environment through Spectral Parameters
Real Time Analysis of VoIP System under Pervasive Environment through Spectral Parameters Harjit Pal Singh Department of Physics Dr.B.R.Ambedkar National Institute of Technology Jalandhar, India Sarabjeet
15.062 Data Mining: Algorithms and Applications Matrix Math Review
.6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop
PERFORMANCE OF THE GPRS RLC/MAC PROTOCOLS WITH VOIP TRAFFIC
PERFORMANCE OF THE GPRS RLC/MAC PROTOCOLS WITH VOIP TRAFFIC Boris Bellalta 1, Miquel Oliver 1, David Rincón 2 1 Universitat Pompeu Fabra, Psg. Circumval lació 8, 83 - Barcelona, Spain, boris.bellalta,
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
Load Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
Chapter 1. Introduction
Chapter 1 Introduction 1.1. Motivation Network performance analysis, and the underlying queueing theory, was born at the beginning of the 20th Century when two Scandinavian engineers, Erlang 1 and Engset
