In this paper we compared the performance of VPN using
|
|
|
- Dorothy Fisher
- 9 years ago
- Views:
Transcription
1 Study the Best Approach for Virtual Private Network Implementation: CPU and Memory Usage Performance Mohd Nazri Ismail Department of MIIT, University of Kuala Lumpur (UniKL), Malaysia Abstract In this research, we propose an architectural solution to implement Virtual Private Network (VPN) test bed in campus environment. The objective of this evaluation is to measure the quality of the audio and video streaming on client server performance over different types of VPN technology. Virtual Private Network (VPN) technology has become a discussion issue for this time being. Therefore, this study is to analyze the VPN over open source application and hardware device performance areas related to quality of service delivered by audio and video streaming activities such as CPU and memory usage. In this study, network management system (NMS), ColaSoft Capsa is used to monitor and capture the performance of CPU and memory over VPN. In addition, the most apparent of implementing VPN in campus environment is to define the best solution between open source application and hardware device that can be used in operational environment. Based on the finding result, the VPN measurement through hardware device is able to contribute low percentage of CPU and memory usage compare to open source application. Key words VPN, CPU, NMS, Memory, Audio and Video Streaming I. INTRODUCTION In this paper we compared the performance of VPN using different type of operating system and hardware base to select which technology able to provide better services. In our experiments, we will conduct a test bed and examine on CPU and memory usage over VPN as follows: i) to minimize usage of CPU and memory percentage between campus branches; ii) comparison between two different platform of VPN based on hardware (Juniper Netscreen 25) and software (Microsoft and Linux). This study is extension from previous work that has been discussed on throughput and delay performance [1]. Packet transmission can introduce new impairments, including packet loss, extra sources of delay, and the use of compressed speech coding, all of which may affect audio and video quality delivered to the user [5]. QoS of the voice is affected by delay, jitter, and packet loss [6], [7]. There are several vulnerabilities occur during audio conversation such as [8], [9]: i) circuitswitched technology vulnerabilities; and ii) audio technology vulnerabilities. Therefore, this study is to provide and measure CPU and memory usage over VPN implementation using different types of technology. III. METHODOLOGY Figure 1 shows the overall framework of test bed VPN implementation in campus environment. There are five phases development of test bed process such as: i) planning; ii) design; iii) implementation; iv) testing, v) compare, vi) compile. Figure 2 shows the implementation of VPN test bed using operating system and hardware device. In the experiment, the analysis performance will focus on CPU and memory measurement during audio and video streaming. Network management system is used to analyze activities of streaming over VPN technology. Figure 3 shows the process and criteria selection of streaming evaluation. II. RELATED WORKS Virtual private networks (VPNs) provide a secure and reliable communication between customer sites over a shared network [2]. Nowadays, VPNs (Virtual Private Networks) is considered the strongest security solutions for communications over IP networks. Most VPN solutions are implemented to tunnel data traffic while the trend toward a converged data and voice network, however, places new demands on VPNs to support real time traffic [3], [4]. The main issues on audio and video are i) security; and ii) QoS. Fig. 1: Framework of VoIP over VPN Technology in Campus Environment ISSN: ] 16
2 Table 1: Users Streaming Activities for One Movie User Movie (Audio & Video) Size 1 st User The Number MB 2 nd User Full Body Massage 699MB 3 rd User Full Body Massage 699MB Table 2: Users Streaming Activities for Multiple Movies Fig. 2: Implementation of VPN Test Bed using Different Types of Technology User Movie (Audio & Video) Size 1 st User 1. The Number The Heart Break Kid 3. Perfume The Story of a Murdered 701MB 701MB 800MB 2 nd User 1. Perfume The Story of a Murdered 2. Ratatouille 3. Full Body Massage 3 rd User 1. Tom & Jerry 2. The Heart Break Kid 3. Ratatouille 800MB 702MB 699MB 1.07MB 701MB 702MB A. CPU Utilization: Fig. 3: Process and Criteria of Audio and Video Streaming Evaluation IV. ANALYSIS AND RESULTS Several experiments will conduct and to measure the performance of audio and video over VPN such as: i) CPU Utilization; and ii) Memory Performance. All the result is capture using Colasoft Capsa. This VQ manager is suitable application to work in audio and video packet environment. Table 1 and Table 2 show streaming activities and size of movie that played by clients from streaming server via VPN such as Microsoft Server 2003, Ubuntu and Juniper Netscreen25. In our experiments, we only select three clients and test based on: i) streaming one movie only; and ii) streaming multiple movies concurrently. In this section, it will discuss on system performance (CPU utilization) between hardware and operating system after successfully implementing VPN test bed. Figure 4.4 and Figure 4.5 show the CPU utilization results during streaming activities. Figure 4.4 shows that one client streaming with one movie has provided 66.6% for Microsoft and 83% for Linux for higher usage of CPU compare to hardware basis (8%). Figure 4.5 shows multiple streaming movies with single user, the results show that VPN implementation using hardware platform does not affect and degrade CPU utilization (6%) compare to VPN implementation via operating system. The next experiments, we conducted with two clients and following with three clients streaming into the server. The results show that VPN implementation using hardware platform also does not affect the performance of CPU utilization for second and third clients (refer to Figure 6, Figure 7, Figure 8 and Figure 9). VPN implementation using hardware platform has achieved 13% (single movie) and 16% (multiple movies) for two clients. Then, third clients have achieved 12% (single movie) and 17% (multiple movies) compare to VPN implementation using operating system. It can conclude that CPU utilization performance using hardware platform is not much affected with number of movies streaming and clients. ISSN: ] 17
3 Fig. 4: Streaming Movie- Single Client with Single Movie Fig. 6: Streaming Movie- Two Clients with Single Movie Fig. 5: Streaming Movies Single Client with Multiple Movies Fig. 7: Streaming Movies Two Clients with Multiple Movies ISSN: ] 18
4 Fig. 8: Streaming Movie- Three Clients with Single Movie Fig. 10: Streaming Movie- Single Client with Single Movie (memory) Fig. 9: Streaming Movies Three Clients with Multiple Movies B. Memory Performance: In this section, it will discuss on memory performance between hardware and operating system. Figure 10 and Figure 11 show the memory utilization results during streaming activities. Figure 4 show that one client streaming with one movie has achieved approximately the same memory usage between Microsoft (43%), Linux (53%) and hardware platform (41%). Figure 4.5 shows multiple streaming movies with single user, the results show that VPN implementation using hardware platform has affected memory usage (43%) compare to VPN implementation via operating system (40%). Fig. 11: Streaming Movies Single Client with Multiple Movies (memory) The next experiments, we conducted with two clients and following with three clients streaming into the server. The results show that VPN implementation using hardware platform has approximately the same performance of memory usage for second and third clients (refer to Figure 12, Figure 13, Figure 14 and Figure 15). VPN implementation using hardware platform has achieved 44% (single movie) and 43% (multiple movies) for two clients. Then, third clients have achieved 43% (single movie) and 45% (multiple movies). The results show it is slightly higher compare to VPN implementation using operating system. ISSN: ] 19
5 Fig. 12: Streaming Movie- Two Clients with Single Movie (memory) Fig. 14: Streaming Movie- Three Clients with Single Movie (memory) Fig. 13: Streaming Movie- Two Clients with Multiple Movie (memory) V. CONCLUSION This paper discussed which VPN technology implementation is able to reduce system resources between software and hardware device in campus environment. This research was to investigate and define the performance of audio and video streaming over VPN technology. In this article, we have shown the performance of: i) CPU utilization; Fig. 15: Streaming Movie- Three Clients with Multiple Movie (memory) and ii) memory usage. We conclude that base on our findings, streaming movie over VPN using software base contribute higher CPU utilization compare to VPN hardware device (refer to Table 3). The experiment also show that memory usage achieved approximately the same result for software and hardware over VPN (refer to Table 3). ISSN: ] 20
6 CPU performance (%) Memory usage (%) Table 3: CPU and Memory Performance Window Server 2003 Ubuntu 8.01 Juniper Netscreen 25 medium high Low medium medium medium Low = 0 40; Medium = 41 70; High = It is recommended to implement streaming movie over VPN using hardware platform in order that to achieve a good quality service. It is also suggested to have a high CPU and memory performance in order to support VPN using software and hardware platform. In future work, it should consider implementing techniques to improve quality of streaming movie over VPN using mesh wireless network. REFERENCES [1]. Mohd Nazri Ismail and Mohd Taha Ismail. Analyzing of Virtual Private Network over Open Source Application and Hardware Device Performance. European Journal of Scientific Research (EJSR), Vol. 28 No.2, pp , EuroJournals Publishing, Inc [2]. Monia G., Sudhakar G., & Gholamali C. S., Resource optimization algorithms for virtual private networks using the hose model Source, Computer Networks: The International Journal of Computer and Telecommunications Networking, pp , Vol.52 (16), [3]. Wafaa B.D., Samir T. & Carole B., VPN Analysis and New Perspective for Securing Voice over VPN Networks Full text Proceedings of the Fourth International Conference on Networking and Services, pp , [4]. Sang-Jo Y., Seung-Sun Y., Chang-Yong L. & Geuk L., Development of Internet Phone (VoIP) for Voice Security on VPN Environment Full text, Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology, pp , [5]. G. Hunt & P. Arden, QoS requirements for a voice-over-ip PSTN Source, BT Technology Journal, Vol. 23 (2), pp , [6]. Kumudu S. Munasinghe, Seyed A. Shahrestani. Wireless VPNs: An Evaluation of QoS Metrics and Measures. International Conference on Mobile Business (ICMB'05), pp [7]. Thanasis G Papaioannou and George D Stamoulis. Design of a charging and accounting architecture for QoS-differentiated VPN services to mobile users. Computer Communications, Quality of Future Internet Service (2002 Workshop), Vol. 27(4), pp [8]. Ahmad Ghafarian, Randolph Draughorne, Shelley, et. al., Securing Voice over Internet Protocol, Journal of Information Assurance and Security, Vol. 2, pp , [9]. J. Arturo Perez, V?ctor Zarate, Angel Montes, Carlos Garcia, "Quality of Service Analysis of IPSec VPNs for Voice and Video Traffic,", Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT-ICIW'06), pp. 43, 2006 ISSN: ] 21
Implementation of Video Voice over IP in Local Area Network Campus Environment
Implementation of Video Voice over IP in Local Area Network Campus Environment Mohd Nazri Ismail Abstract--In this research, we propose an architectural solution to integrate the video voice over IP (V2oIP)
Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone
The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010 343 Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone Mohd Ismail Department
Department of MIIT, University of Kuala Lumpur (UniKL), Malaysia [email protected]
Analyzing of MOS and Codec Selection for Voice over IP Technology Mohd Nazri Ismail Department of MIIT, University of Kuala Lumpur (UniKL), Malaysia [email protected] ABSTRACT. In this research,
NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT
NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT 1 MOHD NAZRI ISMAIL, 2 ABDULLAH MOHD ZIN 1 Faculty of MIIT, University of Kuala Lumpur (UniKL), Malaysia 2 Faculty of FTSM, University
Contents. Specialty Answering Service. All rights reserved.
Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Course 4: IP Telephony and VoIP
Course 4: IP Telephony and VoIP Telecommunications Technical Curriculum Program 3: Voice Knowledge 6/9/2009 1 Telecommunications Technical Curriculum Program 1: General Industry Knowledge Course 1: General
2 Voice over IP Network
2 Voice over IP Network VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 8 2.1 VoIP Network Elements...3 2.2 Single-Site VoIP Location...4 2.3 Multi-Site VoIP Location...5 2.4 PBX Networking
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
Network Services Internet VPN
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order
Performance Evaluation for VOIP over IP and MPLS
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 3, 110-114, 2012 Performance Evaluation for VOIP over IP and MPLS Dr. Reyadh Shaker Naoum Computer Information
10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
JOURNAL OF TELECOMMUNICATIONS, VOLUME 2, ISSUE 2, MAY 2010 126. Simulink based VoIP Analysis. Hardeep Singh Dalhio, Jasvir Singh, M.
126 Simulink based VoIP Analysis Hardeep Singh Dalhio, Jasvir Singh, M. Mian Abstract Voice communication over internet not be possible without a reliable data network, this was first available when distributed
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
Network performance in virtual infrastructures
Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso
Evaluating the Performance and Accuracy of Network Traffic Management via Simulation Modelling in Heterogeneous Environment
30 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.3, March 2008 Evaluating the Performance and Accuracy of Network Traffic Management via Simulation Modelling in Heterogeneous
Service resiliency and reliability Quality of Experience Modelling requirements A PlanetLab proposal. PDCAT'08 - Dunedin December 1-4, 2008
PlaNetLab Options from Massey University Richard Harris Presentation Outline Service resiliency and reliability Quality of Experience Modelling requirements A PlanetLab proposal PDCAT'2008 Dunedin 2 (c)
VOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
Assessing the quality of VoIP transmission affected by playout buffer scheme and encoding scheme
Assessing the quality of VoIP transmission affected by playout buffer scheme and encoding scheme Miroslaw Narbutt, Mark Davis Communications Network Research Institute Dublin Institute of Technology Wireless
IP Voice Reseller. Deliver the VoIP services your customers demand without costly infrastructure investment or increased management complexity.
BT One for Communications IP Voice Reseller Deliver the VoIP services your customers demand without costly infrastructure investment or increased management complexity. We manage the technology to enable
Simulation of SIP-Based VoIP for Mosul University Communication Network
Int. J. Com. Dig. Sys. 2, No. 2, 89-94(2013) 89 International Journal of Computing and Digital Systems http://dx.doi.org/10.12785/ijcds/020205 Simulation of SIP-Based VoIP for Mosul University Communication
IP Telephony v1.0 Scope and Sequence. Cisco Networking Academy Program
IP Telephony v1.0 Scope and Sequence Cisco Networking Academy Program Table of Content COURSE OVERVIEW...4 Course Description...4 Course Objectives...4 Target Audience...5 Prerequisites...5 Lab Requirements...5
Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview.
Title Series Managing IP Centrex & Hosted PBX Services Date July 2004 VoIP Performance Management Contents Introduction... 1 Quality Management & IP Centrex Service... 2 The New VoIP Performance Management
Performance Monitoring of VoIP with Multiple Codecs Using IPv4 and IPv6to4 Tunnelling Mechanism on Windows and Linux
Performance Monitoring of VoIP with Multiple Codecs Using and IPv6to4 Tunnelling Mechanism on Windows and Linux Hira Sathu and Mohib A. Shah Abstract In this paper, the performance of Voice over Internet
Packetized Telephony Networks
Packetized Telephony Networks Benefits of Packet Telephony Networks Traditionally, the potential savings on long-distance costs was the driving force behind the migration to converged voice and data networks.
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform
A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform Peter Dulany, Chang Soo Kim, and James T. Yu [email protected], [email protected], [email protected] School of Computer Science,
Impact of Control Theory on QoS Adaptation in Distributed Middleware Systems
Impact of Control Theory on QoS Adaptation in Distributed Middleware Systems Baochun Li Electrical and Computer Engineering University of Toronto [email protected] Klara Nahrstedt Department of Computer
Analysis of Basic Quality of Service Mechanism for Voice over IP In Hamdard University Network Campus
Analysis of Basic Quality of Service Mechanism for Voice over IP In Hamdard University Network Campus Shahbaz Akhatar Siddiqui Student MS (Telecom) Hamdard University Karachi Junior Lecturer in National
IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses
IP Telephony Basics Part of The Technology Overview Series for Small and Medium Businesses What is IP Telephony? IP Telephony uses the Internet Protocol (IP) to transmit voice or FAX traffic over a public
920-803 - technology standards and protocol for ip telephony solutions
920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6
Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6 Ahmed A. Joha, Fathi Ben Shatwan, Majdi Ashibani The Higher Institute of Industry Misurata, Libya [email protected]
Analysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* [email protected]
Voice over IP Networks: Ensuring quality through proactive link management
White Paper Voice over IP Networks: Ensuring quality through proactive link management Build Smarter Networks Table of Contents 1. Executive summary... 3 2. Overview of the problem... 3 3. Connectivity
Firewall and VPN Investigation on Cloud Computing Performance
Firewall and VPN Investigation on Cloud Computing Performance Siddeeq Y. Ameen 1, Shayma Wail Nourildean 2 1 Department of Computer and Information Engineering, University of Mosul, Mosul, Iraq 2 Foundation
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
Cisco Networks (ONT) 2006 Cisco Systems, Inc. All rights reserved.
Optimizing Converged Cisco Networks (ONT) reserved. Lesson 2.4: Calculating Bandwidth Requirements for VoIP reserved. Objectives Describe factors influencing encapsulation overhead and bandwidth requirements
How to Measure Network Performance by Using NGNs
Speech Quality Measurement Tools for Dynamic Network Management Simon Broom, Mike Hollier Psytechnics, 23 Museum Street, Ipswich, Suffolk, UK IP1 1HN Phone +44 (0)1473 261800, Fax +44 (0)1473 261880 [email protected]
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
VoIP / SIP Planning and Disclosure
VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings
ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes
ZyXEL V100 (V100 Softphone 1 Runtime License) Support Notes Version 1.00 April 2009 1 Contents Overview 1. Overview of V100 Softphone...3 2. Setting up the V100 Softphone.....4 3. V100 Basic Phone Usage.....7
Lab Testing Summary Report
Lab Testing Summary Report May 2007 Report 070529 Product Category: Network Acceleration Vendor Tested: Cisco Systems Product Tested: Cisco Wide Area Application Services (WAAS) v4.0.7 Key findings and
UMTS VoIP Codec QoS Evaluation
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 2, Ver.1 (Mar - Apr.2015), PP 07-12 www.iosrjournals.org UMTS VoIP Codec QoS
ADVANTAGES OF AV OVER IP. EMCORE Corporation
ADVANTAGES OF AV OVER IP More organizations than ever before are looking for cost-effective ways to distribute large digital communications files. One of the best ways to achieve this is with an AV over
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
CHARACTERISTICS AND FUNCTIONALITY OF EMULATION NETWORK ANALYZER AND HARDWARE NETWORK ANALYZER
CHARACTERISTICS AND FUNCTIONALITY OF EMULATION NETWORK ANALYZER AND HARDWARE NETWORK ANALYZER 1 Mohd Nazri Ismail and 2 Abdullah Mohd Zin 1 Faculty of MIIT, University of Kuala Lumpur, Malaysia 2 Faculty
The need for bandwidth management and QoS control when using public or shared networks for disaster relief work
International Telecommunication Union The need for bandwidth management and QoS control when using public or shared networks for disaster relief work Stephen Fazio Chief, Global Telecommunications Officer
Optimizing Converged Cisco Networks (ONT)
Optimizing Converged Cisco Networks (ONT) Module 2: Cisco VoIP Implementations (Deploy) Calculating Bandwidth Requirements for VoIP Objectives Describe factors influencing encapsulation overhead and bandwidth
Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream
Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched
Multimedia Communications Voice over IP
Multimedia Communications Voice over IP Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore 560012, India Voice over IP (Real time protocols) Internet Telephony
Quality of Service. PAN-OS Administrator s Guide. Version 6.0
Quality of Service PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Secure VoIP Transmission through VPN Utilization
Secure VoIP Transmission through VPN Utilization Prashant Khobragade Department of Computer Science & Engineering RGCER Nagpur, India [email protected] Disha Gupta Department of Computer Science
Verizon Managed SD WAN with Cisco IWAN. October 28, 2015
Verizon Managed SD WAN with Cisco IWAN. October 28, 2015 Agenda Evolution of the WAN SD WAN delivers business outcomes Verizon s Managed IWAN solution Challenges for SD WAN adoption Deployment guidelines
Cost Effective Deployment of VoIP Recording
Cost Effective Deployment of VoIP Recording Purpose This white paper discusses and explains recording of Voice over IP (VoIP) telephony traffic. How can a company deploy VoIP recording with ease and at
WJEC GCSE in Computer Science Computer Science Microsoft IT Academy Mapping
WJEC GCSE in Computer Science Computer Science Microsoft IT Academy Mapping 1. Computer Systems 1.1 Identify and describe computer systems Windows Server Administration Fundamentals: Lesson 1 Server Overview
Network Performance Evaluation of Latest Windows Operating Systems
Network Performance Evaluation of Latest dows Operating Systems Josip Balen, Goran Martinovic, Zeljko Hocenski Faculty of Electrical Engineering Josip Juraj Strossmayer University of Osijek Osijek, Croatia
Level 1 Technical Firewall Traversal & Security. Level 1 Technical. Firewall Traversal & Security. V3 Page 1 of 15
Level 1 Technical Firewall Traversal & Security V3 Page 1 of 15 Contents 1 - Glossary... 3 2 - Features... 4 RealPresence Access Director... 4 SIP Management... 5 H.323 Management... 5 Media Relay... 5
Microsoft Lync and SIP trunking - Ensuring multi-vendor technology success with Prognosis
White Paper Microsoft Lync and SIP trunking - Ensuring multi-vendor technology success with Prognosis by Sue Bradshaw: Technology Writer, Integrated Research Ensuring new technology like Lync delivers
VPN Lesson 2: VPN Implementation. Summary
VPN Lesson 2: VPN Implementation Summary 1 Notations VPN client (ok) Firewall Router VPN firewall VPN router VPN server VPN concentrator 2 Basic Questions 1. VPN implementation options for remote users
How To Deliver High Quality Telephony Over A Network
Voice over Application Note Telephony Service over Satellite January 2012 Data Sells but Voice Pays In the early years of the industry, networks were deployed primarily for telephony services. As time
ATA: An Analogue Telephone Adapter is used to connect a standard telephone to a high-speed modem to facilitate VoIP and/or calls over the Internet.
KEY VOIP TERMS 1 ACD: Automatic Call Distribution is a system used to determine how incoming calls are routed. When the ACD system receives an incoming call it follows user-defined specifications as to
Application Note. Pre-Deployment and Network Readiness Assessment Is Essential. Types of VoIP Performance Problems. Contents
Title Six Steps To Getting Your Network Ready For Voice Over IP Date January 2005 Overview This provides enterprise network managers with a six step methodology, including predeployment testing and network
Voice over IP Basics for IT Technicians
Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements
WAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.
Virtual Private LAN Service (VPLS) A WAN that thinks it s a LAN. VPLS is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use Virtual Private LAN Service
Performance Evaluation of VoIP Codecs over Network Coding in Wireless Mesh Networks
Proceedings of the 213 International Conference on Electronics and Communication Systems Performance Evaluation of VoIP Codecs over Network Coding in Wireless Mesh Networks Erik Pertovt, Kemal Alič, Aleš
Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008
Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008 John Bartlett NetForecast, Inc. [email protected] www.netforecast.com VoIP Deployment Realities VoIP is not just another application
Optimizing Converged Cisco Networks (ONT)
Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS Introducing QoS Objectives Explain why converged networks require QoS. Identify the major quality issues with converged networks.
A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network
A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network Bianca Enache Communication Department Politehnica University of Timisoara Timisoara, Romania [email protected]
Creating a Client-To-Site VPN. BT Cloud Compute. The power to build your own cloud solutions to serve your specific business needs.
Creating a Client-To-Site VPN BT Cloud Compute The power to build your own cloud solutions to serve your specific business needs Issue 2 Introduction This guide is intended to demonstrate how easy it is
Research on Video Traffic Control Technology Based on SDN. Ziyan Lin
Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Research on Video Traffic Control Technology Based on SDN Ziyan Lin Communication University of China, Beijing
Combining Voice over IP with Policy-Based Quality of Service
TechBrief Extreme Networks Introduction Combining Voice over IP with Policy-Based Quality of Service Businesses have traditionally maintained separate voice and data networks. A key reason for this is
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
Subtitle. VoIP Migration Strategy. Keys to a Successful Planning and Transition. VoIP Migration Strategy Compare Business Products 2014 1
Subtitle VoIP Migration Strategy Keys to a Successful Planning and Transition VoIP Migration Strategy Compare Business Products 2014 1 Contents Introduction... 3 VoIP Defined... 3 Why Are Businesses Opting
Introduction to Packet Voice Technologies and VoIP
Introduction to Packet Voice Technologies and VoIP Cisco Networking Academy Program Halmstad University Olga Torstensson 035-167575 [email protected] IP Telephony 1 Traditional Telephony 2 Basic
Integrate VoIP with your existing network
Integrate VoIP with your existing network As organisations increasingly recognise and require the benefits voice over Internet Protocol (VoIP) offers, they stop asking "Why?" and start asking "How?". A
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
Getting Started with VoIP Reports
With ehealth VoIP, you have a powerful system for monitoring and managing your Voice over IP (VoIP) configuration. ehealth reports provide the information you need to answer these questions: Is the VoIP
MyCloud Dedicated Unified Communications (UC) Transforming Business Communications
MyCloud Dedicated Unified Communications (UC) Transforming Business Communications Businesses need communications tools that make their work easier and are available anywhere, anytime including within
Broadcom 10GbE High-Performance Adapters for Dell PowerEdge 12th Generation Servers
White Paper Broadcom 10GbE High-Performance Adapters for Dell PowerEdge 12th As the deployment of bandwidth-intensive applications such as public and private cloud computing continues to increase, IT administrators
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
ETM System SIP Trunk Support Technical Discussion
ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with
FOMA (R) /Wireless LAN Dual Terminals, Wireless LAN Technology
FOMA (R) /Wireless LAN Dual Terminals, Wireless LAN Technology SHINOHARA Masahito, ITOH Masashi, IWATA Shinichiro, NISHIMURA Yasunori, ZAITSU Makoto Abstract FOMA (R) /wireless LAN dual terminals are dual-phone
Performance Comparison of Mixed Protocols Based on EIGRP, IS-IS and OSPF for Real-time Applications
Middle-East Journal of Scientific Research 12 (11): 1502-1508, 2012 ISSN 1990-9233 IDOSI Publications, 2012 DOI: 10.5829/idosi.mejsr.2012.12.11.144 Performance Comparison of Mixed Protocols Based on EIGRP,
