Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Size: px
Start display at page:

Download "Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)"

Transcription

1 Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic flows onto an exiting physical topology [7,62,67]. A goal of Internet Traffic Engineering (TE) is how to use the network resources effectively i.e. using intelligent routing or/and Load-balancing algorithm for avoiding congested path [27,62,69]. This results in providing a better throughput and service quality. Additionally, one major challenge in designing of Internet TE is the realization of automated control capabilities that adapt quickly to significant changes in a network status, while still maintaining stability [1]. By the proposed approach, Internet TE methodology can be divided into two major parts [27,62,69]: a routing metric which is used to calculate a route cost; a load-balancing which is used to distribute traffic load over multi-path. Typically most TE methodologies are effective in a network under a single administrative domain (intra-domain routing) such as Internet Service Provider (ISP) since information of the link characteristics and input traffic matrix can be obtained to calculate the route cost [62]. In other words, most of proposed metric for route calculation is not appropriate over the Internet where the inter-domain routing is. In additional, most of route calculating criterions are designed using common network characteristics (e.g. bandwidth, delay, hops count) without considering the network characteristic which is specific to the application such as VoIP application [4,5,8,20,42,68]. This chapter presents VoIP metric based Traffic Engineering (VMTE) which is based on a novel VoIP metric for path calculation and load balancing for improving VoIP performance over multiple end-to-end paths on the Internet in order to exploit the availability of network resources in the Internet. The proposed method focuses on VoIP application and introduces the number of Qualified Packets: Qpkt as the VoIP metric to evaluate the end-to-end path capability for VoIP application. The packet whose end-to-end delay is less than 150 msec is the Qpkt. The adaptive packet generator is used to probe the Qpkt of each available end-to-end path. The additional traffic load causing by the probing pseudo packets will not given much impact to the current VoIP call session since it will be triggered only when changes in traffic pattern is appeared. The VoIP flows will be distributed over several end-to-end paths based on their path capabilities. Some adaptive controls are used to minimize the possible alternating of the specific VoIP flow over several paths in order to reduce the packet reorder at the destination as much as possible. Based on simulation results, the proposed VMTE can increase VoIP call sessions up to 58% and 33 % when compared to traditional per-packet and per-flow [63,65,66], respectively. The rest of this chapter is organized as follows. In section 2, we explain the details of the proposed model. In section 3, we present simulation model. Section 4 provides simulation result. Section 5 provides conclusions and future work. 35

2 4.2 VoIP Metric based Traffic Engineering (VMTE) VoIP characteristic Recently, the usage of VoIP (Voice over IP) exponentially increases within inter-domain IP network like the Internet. While the VoIP is expected to be the replacement of Public Switching Telephone Network (PSTN) for voice-call services, the voice quality of VoIP is still a concern especially within the public IP network. The following 2 conditions should be met in order to provide the acceptable voice quality VoIP call/session - One-way packet delays between two end points should be less than 150 msec which is recommended by ITUT [35] - Packet loss should be less than 5 % of total packets [51]. It should be note that one-way packet delay whose delay less than 150 msec is an excellent sound quality [35,45]. The maximum tolerable value with annoying for the one-way packet delay is 400 ms [67,45] Qualified Packet (Qpkt) / Unqualified Packet (UQpkt) The proposed VMTE must evaluate several possible route/paths between 2 end points and distribute VoIP call over them in the most efficient manner. In order to estimate an accurate path capability for VoIP, the appropriate measure which reflects to the performance of VoIP call should be used. This chapter defines two notions as follows: a) Qualified packets (Qpkt) is defined as packets end-to-end delay 150 msec b) Unqualified packets (UQpkt) is defined as packets end-to-end delay > 150 msec including the packet loss. Since the packet loss is a packet whose delay takes to infinite. Note that a packet whose delay more than 150 msec e.g. 500 or 1500 msec gives the same effect to the VoIP performance as packet loss. The best route for VoIP application is a route which can transmits maximum No.Qpkt. On the other hand, the worst route is a route which can transmits minimum No.Qpkt. Fig. 4.1 shows the relationship between the effective delay (ED) and the number of transmitted packets over a specific end-to-end path. The number of packets whose delay less than 150 msec is Qpkt. The other is UQpkt. Since VoIP can tolerate up to 5 % of Qpkt according to the VoIP characteristic, the route capability (RC) for the specific end-to-end path is defined as the number of packets at the point where the number of UQpkt is equal to 5 % of the number of Qpkt as in point RC in Fig 4.1. Fig 4.1: the delay response function over a specific end-to-end path 36

3 4.2.3 Route Capability Estimation In the proposed VMTE, the delay response function, f(x), of each possible end-to-end paths is maintained by the sender node. Multiple rounds of probing pseudo packets (Ppkt) are used to create such function. The sender node will generate probing packets and send them to the receiver via the considering end-to-end path. The volume of the first round of probing packets will start at 50 % of the current available bandwidth as in Fig 4.2. Fig.4.2: the number of probing packets starts at 50 % of the rest bandwidth with their TOS equal to 0 in order to minimize the additional packets and the effect with the existing voice packets The Type of Service (TOS) filed [67] of probing packet is set to 0 in order to minimize their effects to current traffic. The receiver measures packet delay of the probing packets and calculate the Effective Delay for this round of the probing as Eq (4.1) ED n = D n + δj n (4.1) D n : the mean of delay of all probing packets in the n th round in the unit of msec. J n : the mean of delay variation (jitter) [20] of all probing packets in the n th round in the unit of msec. ED n : the effective delay of probing in the n th round in the unit of msec. δ: the penalty factor of the jitter to the delay. Since the path with more jitter gives the worse performance to VoIP call, δ is a parameter, which reflects this fact. Note that 400 msec is used as the cut-off delay of all probing packets which do not reach at the receiver within the time. The value of 400 msec is the possible maximum delay which may occur in the VoIP call according to [35,45,67]. Fig.4.3: the probing packets generated from the source to the destination. Then, a reply packet is sent back from destination to source in order to inform the source that No. Probing packets (Ppkt) generated should be increased, decreased or stop. 37

4 The receiver will send back the reply containing the ED of this probing round as in Fig 4.3. The sender will record a pair of (No.probing packet, ED) in this probing round. Then the sender will increase or decrease volume of probing packets by 10 % at the second probing round, the third probing round according to their delay. The sender will increase number of probing packet if the previous delay is less than 150 msec. At least 3 rounds should be done in order to create the delay response function f(x) for the specific end-to-end path. The detail of Route Capability Estimation can be found in appendix D. The response function can be represented by the polynomial regressive function [47] as Eq (4.2). f(x) = a 0 + a 1 x +..a N x N (4.2) a n : the coefficients which can be calculated directly from the observed data (data sets) N: the order of regressive function. It should be noted that regressive programming can be found in Appendix E In the simulation, the linear (N=1), the quadratic (N=2) and the cubic (N=3) are used. Based on the regressive function f i (x), the route capability of the specific end-to-end path i th (RC i ) can be calculated by Eq (4.3) RC i = 1.05 f i (x=150 msec) (4.3) It should be noted that the above Eq. (4.3) is based on assumption that packet loss should be less than 5 % of total packets [51]. If there is a requirement of higher voice quality, the Eq.(4.3) can be adjusted according to the packet loss constraint Route Capability Change Detection Since route capability of a specific end-to-end path can be changed according to the real traffic flow over the path, there is a need for a mechanism to detect such changes. In VTME, the receiver will periodically calculate the ED of the real VoIP packets and send it back to the sender. The sender will try to compare the current ED and the value calculated from the delay response function f i (x). If the different is more than the pre-defined, number of packet threshold (P i ) for the pre-defined change threshold (C i ) time in row, the sender will trigger to generate the probing packets for rebuilding the new delay response time f i (x) again. The parameter P i and C i are used to minimize probing packets and filters the surge in traffic pattern VoIP call (flow) Distribution Based on the route capability estimation in the previous section, the sender keeps the route capability of each specific end-to-end path (i), i.e. RC i. In VMTE method, the sender will distribute all VoIP traffic over these several paths by per-flow concept. The flow defined as the traffic in the same VoIP call or session. The sender will use the RC i as a reference weight for the VoIP flow distribution process as in Fig

5 Fig.4.4: a distributor balances the number of VoIP flows over multiple paths according to a value RC of each path based on per-flow concept. Table 4.1 shows the distribution table for balancing the number of VoIP flows over multiple paths in some case. The expected of flow on a specific path (i) is calculated as Eq (4.4) V i = TVpkt RC i TRC (4.4) V i : the number of flow on a specific path i RC i : the route capability of the path i TVpkt : the total of VoIP flows between sender and receiver TRC : the sum of all route capabilities. The current distribution weight for a specific path i (D i ) cab be calculated as Eq (4.5) D i = V i - C i (4.5) C i : the current number of flows for a specific path i in the distribution table. When a voice packet needs to be distributed, the sender will lookup in the distribution table. If the flow id of that packet is in the distribution table, its corresponding path will be selected for the packet. Otherwise, the path with maximum D i will be selected. As a result, packets within the same flow will be kept sending on the same path as much as possible. This will minimize packet reordering at the receiver node. 39

6 4.3 Simulation Model Network Configuration Every VoIP call sessions between 2 end points will be distributed over multiple available ISPs as in Fig 5. The background traffics described in subsection 3.2 are feeded into each ISP network in order to emulate several scenario of ISPs traffic load. The generated VoIP traffic for each VoIP call sessions (VoIP flow) is as follows: 50 packets per second (pps) are generated for each flow with the voice packet size 66 bytes and packet interval 20 msec [15,18]. The life-time for each call is 1.5 minutes [15,18]. The value of δ in Eq (1) is given as 1. More detail of network parameter can be found in appendix F Background Traffic Fig.4.5: network configuration in the simulation. In the simulation, the following background traffic models are used A) Background traffic was produced based on the traffics measured at the Bellcore Morristown research and Engineering facility on October 10 and Auguest 9, 1987 [33]. These traces include one million packets with the sizes from 64 bytes to 1518 bytes. Packet interval of background traffic is an exponential distribution. The mean value of packet interval of background traffic with an exponential distribution was 3.8 msec. IP packet length distribution can be found in [33]. The mean frame length of pseudo-traffic was 254 bytes. Traffic simulation can be found in appendix F.2.3 B) The background traffic has the same distribution function as A) with additional fluctuation factor over 2 parameters. The µ f is the fluctuation factor of mean packet interval randomized in range of (1, f max ) while the T f is the fluctuation factor of time period randomized in range of (0, T max ). The mean value of packet interval µ int will be 3.8µ f over the period of T f in this background traffic as in Fig 4.6. Fig. 4.6 shows the number of remaining constant in value of packet interval. 40

7 C) The background traffic was based on the characteristics of the Internet pattern over time ranges 24 hours in MCI s backbone [63] and the average packet per second (pps) for each mean packet interval (ms) in table 2. The average packet volumes (pps) for 24 hours on domestic and international link are roughly shown in Fig 4.7. Table 4.2 shows the load of background traffic (kbps), No. packet per second (pps) for each mean packet interval (ms). Fig. 4.7 shows values of mean packet interval (ms), the packet volume (pps) for 24 hours on domestic and international link based on traffic characteristic in [63] and average packet per second (pps) in table Simulation Cases The following four simulation cases have been conducted. Four million tests have been done for each case. Case , there are 4 available ISP paths for connecting between 2 sites with a) Bandwidth parameter: 1 Mbps for each ISP. b) Background traffic: as mentioned in subsection 3.2 type A). c) VoIP flow (session): 1-80 flows 41

8 d) Number of intermediate routers between 2 sites: randomized in range of 2-4 nodes with uniform distribution. e) Delay parameters: o CODEC delay: 25 msec o Internet delay: 3 msec o Link propagation delay: msec with uniform distribution o Node delay for VoIP packets: 0.5 msec o Jitter buffer at VoIP receiver: 40 msec Case , the same as subsection 3.3.1, except that the background traffic type B) has been used. Case , the same as subsection 3.3.1, except that the background traffic type C) has been used. Case , similar to the subsection with available ISP paths from 2 up to 10. The number of VoIP flows (session) at full load tests is 40, 80, 120, 160 and 200 flows in case of 2, 4, 6, 8 and 10 ISP paths, respectively. 4.4 Performance Evaluation Performance evaluation on throughput in experiment 1 without the fluctuate factor Fig.4.8: Comparison of VoIP throughput among per-packet, per-flow, VMTElinear, VMTE-quadratic, and VMTE-cubic method. Fig 4.8 shows the number of qualified packet (No.Qpkt) of the proposed method (VMTElinear, VMTE quadratic and VMTE cubic) and the exiting methods (per-flow and perpacket [63,65,66]) in the simulation case One hundred percent of No.Qpkt means that all VoIP packets reach at the end point with in 150 msec recording to VoIP specification. This happens when only injected to the system. When the number of VoIP flows increases, the No.Qpkt of all methods decreases More VoIP flows will result more rate of decrease. When the No.Qpkt begins lower then 95%, the sound quality of VoIP flows (session) begins setting worse. Note that 95% of packet loss is acceptable for good sound quality of VoIP according to the specification. For the VoIP flows of existing per- 42

9 packet and per-flow are only 38 and 45, respectively make No.Qpkt lower then 95%. However, the proposed VMTE can maintain VoIP sound quality until the number of flow reaches 60. This reflects the fact that VMTE can dynamically change ISP path according to the measure which maps directly to the VoIP performance the VoIP throughput gain of VMTE over the per-packet and the per-flow are about 58% and 33 %, respectively Performance evaluation on throughput in experiment 2 with the fluctuate factor Fig.4.9: Comparison of the number of accepted VoIP flows among VMTElinear, VMTE-quadratic, and VMTE-cubic after the fluctuation factors are implemented by using the µ f in range of 1 to 0.5 and T f in range of 0 to 4. Fig 4.9 shows the performance of the proposed VMTE when background traffic becomes more fluctuated as in simulation case The No.flows is the No.VoIP flows which make the No.Qpkt as 95%. When the value of VoIP flows of µ f and T f are 1 and 0 respectively, the number of VoIP flows of VMTE-quadratic is 60. This is the result as of Fig 4.8. As expected, more flows can be achieved when background traffic become more periodic (less fluctuated, i.e. more T f ). Less flow can be achieved when background traffic become more fluctuated, i.e. less µ f Performance evaluation on throughput in experiment 3 The performance of the proposed VMTE in the real background traffic as in simulation case has show in Fig The result has the same trend as of Fig 4.8, even though the VMTE achieves less throughput gain over the existing per-packet and per-flow. However, that gain is still significant. 43

10 Fig.4.10: Comparison of VoIP throughput among per-packet, per-flow, VMTElinear, VMTE-quadratic, and VMTE-cubic Performance evaluation on additional packets Table 4.3 and Fig 4.11 try to compare the volume of the probing packet used to collect the path capability information and the volume of VoIP packet. Only 3.5% of the probing packet is generated when the number of VoIP flow is 10. The volume of the probing packet decreases when the number of VoIP flows increases. This is because the VMTE tries to use the sending packets to collect the path information and only generates probing packet when the change of traffic pattern reaches to the specified threshold (Pi & Ci). Anyway, these thresholds can be change to be appropriate to the real network environment. Fig.4.11: Comparison of the number of Ppkt and Vpkt when the number of VoIP flows is equal to 50 flows within 90 sec. Table 4.3: shows No. VoIP flows, No. actual voice packets (Vpkt), and No. probing packets (Ppkt) 44

11 4.4.5 Performance evaluation on throughput in experiment 4 Fig.4.12: Comparison of VoIP throughput at nearly full load among perpacket, per-flow, VMTE-linear, VMTE-quadratic, and VMTE-cubic. The Fig 4.12 shows that, in the case simulation , the proposed VMTE still function properly when the number of ISP paths increases. This Fig shows only the point whose VoIP flows are at the full load, compared to the total available bandwidth in each case. The performance of VMTE becomes more significant, compared to the existing per-flow and per-packet when number of ISP paths increase. This can be seen from this Fig where there is more difference in No.Qpkt of these methods, when ISP paths increase Performance evaluation on throughput in experiment 5 In this experiment, we apply the VMTE approach on the intra-domain IP network in order to compare the performance between the GDSA and VMTE approach in the simulation case There are two comparisons: the network throughput and average of VoIP packet delay. 45

12 Average delay of VoIP packet Fig.4.13: shows performance evaluation on average VoIP packets delay (msec) Overall, it can been seen that the GDSA (first approach) gives better average delay of VoIP compared with VMTE (second approach). Fig shows average VoIP packet delay of GDSA, VMTE, and Per-flow compared with Per-packet decreased to 31 %, 24 %, and 16 %, respectively. This is because the load balancing of GDSA is based on per-application which classifies application as belong one of two classes and provides the best path for first class while the balancing of VMTE is based on the traditional per-flow without concept of separating VoIP from other application. In other words, VMTE is no attempt to minimize the problem of serialization delay for VoIP with classification. However, the VMTE gives better average delay compared with traditional per-flow load balancing and per-packet. This is because the traditional per-flow tries to balancing traffic based on only resource usage while VMTE has a concept of forwarding VoIP flow according to the VoIP capability of each path. 46

13 Network Throughput Fig.4.14: Comparison of VoIP throughput among per-packet, per-flow, VMTE, GDSA. Overall, it can been seen that the VMTE (second approach) gives better network throughput compared with GDSA (first approach). Fig shows network throughput of GDSA, VMTE, and Per-flow compared with Per-packet decreased to 6.4 %, 3.2 %, and 2.8 %, respectively. This is because load balancing of VMTE is based on the traditional perflow while load balancing of GDSA is based on per-application. Additionally, network throughput of the VMTE approach and traditional per-flow are nearly the same. It should be noted that with VTME approach, only VoIP flow is distributed according to VoIP capability of each path while other applications are distributed by the traditional per-flow which uses the resource usage of each path as the distribution criteria. 4.5 Conclusion This chapter presents a novel VoIP metric criterion for estimating the end-to-end path capability for VoIP in order to avoid the congestion path and balance the voice packets over multiple ISP paths. Since the metric criterion of VMTE is based on the VoIP characteristic requirement, balancing the voice packets over multi-path can be done more efficiently. Based on experiment results, the proposed VMTE offers better throughput and service quality for VoIP when compared with the existing load-balancing tools. In addition, the proposed VMTE can keep its good performance even in the environment where there is high fluctuation in traffic and several paths have been used for the load balancing. 47

Chapter 2. Literature Review

Chapter 2. Literature Review Chapter 2 Literature Review This chapter presents a literature review on Load balancing based Traffic Engineering, VoIP application, Hybrid Neuro-Fuzzy System, and Intra & Inter Domain Networks. 2.1 Load

More information

EQ-BGP: an efficient inter-domain QoS routing protocol

EQ-BGP: an efficient inter-domain QoS routing protocol EQ-BGP: an efficient inter-domain QoS routing protocol Andrzej Beben Institute of Telecommunications Warsaw University of Technology Nowowiejska 15/19, 00-665 Warsaw, Poland abeben@tele.pw.edu.pl Abstract

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

The Impact of QoS Changes towards Network Performance

The Impact of QoS Changes towards Network Performance International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 48 53 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) The Impact

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

QoS Strategy in DiffServ aware MPLS environment

QoS Strategy in DiffServ aware MPLS environment QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute of Technology P.O.Box 4, Klong Luang, Pathumthani,

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

Balasubramanian Ramachandran

Balasubramanian Ramachandran Implementation and evaluation of OSPF Optimized Multipath Routing Balasubramanian Ramachandran M.S. Thesis defense Committee: Dr. Joseph B. Evans (chair) Dr. David W. Petr Dr. Susan Gauch Organization

More information

VoIP versus VoMPLS Performance Evaluation

VoIP versus VoMPLS Performance Evaluation www.ijcsi.org 194 VoIP versus VoMPLS Performance Evaluation M. Abdel-Azim 1, M.M.Awad 2 and H.A.Sakr 3 1 ' ECE Department, Mansoura University, Mansoura, Egypt 2 ' SCADA and Telecom General Manager, GASCO,

More information

Figure 1: Network Topology

Figure 1: Network Topology Improving NGN with QoS Strategies Marcel C. Castro, Tatiana B. Pereira, Thiago L. Resende CPqD Telecom & IT Solutions Campinas, S.P., Brazil E-mail: {mcastro; tatibp; tresende}@cpqd.com.br Abstract Voice,

More information

On real-time delay monitoring in software-defined networks

On real-time delay monitoring in software-defined networks On real-time delay monitoring in software-defined networks Victor S. Altukhov Lomonosov Moscow State University Moscow, Russia victoralt@lvk.cs.msu.su Eugene V. Chemeritskiy Applied Research Center for

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits. Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi (faa6@sfu.ca) Ehsan Arman (eaa14@sfu.ca) http://www.sfu.ca/~faa6

More information

APPLICATION NOTE 209 QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS. Quality of Service Drivers. Why Test Quality of Service?

APPLICATION NOTE 209 QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS. Quality of Service Drivers. Why Test Quality of Service? QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS By Thierno Diallo, Product Specialist With the increasing demand for advanced voice and video services, the traditional best-effort delivery model is

More information

Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and.

Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and. Master s Thesis Title A Study on Active Queue Management Mechanisms for Internet Routers: Design, Performance Analysis, and Parameter Tuning Supervisor Prof. Masayuki Murata Author Tomoya Eguchi February

More information

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

ALTHOUGH subscribers are accustomed to the consistent

ALTHOUGH subscribers are accustomed to the consistent An Overlay Architecture for High Quality VoIP Streams Yair Amir, Member, IEEE, ACM, Claudiu Danilov, Stuart Goose, David Hedqvist, and Andreas Terzis, Member, IEEE, ACM Abstract The cost savings and novel

More information

Secured Secret Sharing over Single Path in VoIP with Consistent Data Transfer

Secured Secret Sharing over Single Path in VoIP with Consistent Data Transfer International Journal of Computer Science and Telecommunications [Volume 3, Issue 1, January 2012] 23 ISSN 2047-3338 Secured Secret Sharing over Single Path in VoIP with Consistent Data Transfer K. Maheswari

More information

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of

More information

Analyzing Mission Critical Voice over IP Networks. Michael Todd Gardner

Analyzing Mission Critical Voice over IP Networks. Michael Todd Gardner Analyzing Mission Critical Voice over IP Networks Michael Todd Gardner Organization What is Mission Critical Voice? Why Study Mission Critical Voice over IP? Approach to Analyze Mission Critical Voice

More information

Proposing a Load Balancing Algorithm with the Help of an Endpoint Admission Control Algorithm to Improve Traffic Engineering

Proposing a Load Balancing Algorithm with the Help of an Endpoint Admission Control Algorithm to Improve Traffic Engineering Proposing a Load Balancing Algorithm with the Help of an Endpoint Admission Control Algorithm to Improve Traffic Engineering * 1 Zahra Vali, 2 Massoud Reza Hashemi, + 3 Neda Moghim 1, Isfahan University

More information

Performance Analysis Proposal

Performance Analysis Proposal 1. Title Performance Analysis Proposal Performance Analysis of P2P VoIP Applications 2. Objective To evaluate the dynamic behavior (i.e., CODEC usage) of VoIP P2P applications (e.g. Skype, Google Talk)

More information

OPNET simulation of voice over MPLS With Considering Traffic Engineering

OPNET simulation of voice over MPLS With Considering Traffic Engineering Master Thesis Electrical Engineering Thesis no: MEE 10:51 June 2010 OPNET simulation of voice over MPLS With Considering Traffic Engineering KeerthiPramukh Jannu Radhakrishna Deekonda School of Computing

More information

Path Selection Analysis in MPLS Network Based on QoS

Path Selection Analysis in MPLS Network Based on QoS Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

Performance Evaluation of VoIP Codecs over Network Coding in Wireless Mesh Networks

Performance Evaluation of VoIP Codecs over Network Coding in Wireless Mesh Networks Proceedings of the 213 International Conference on Electronics and Communication Systems Performance Evaluation of VoIP Codecs over Network Coding in Wireless Mesh Networks Erik Pertovt, Kemal Alič, Aleš

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems

CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems CSE3214 Computer Network Protocols and Applications Chapter 1 Examples and Homework Problems Example 1 (review question 18) (1) How long does it take a packet of length 1000 bytes to propagate over a link

More information

Call Admission Control and Traffic Engineering of VoIP

Call Admission Control and Traffic Engineering of VoIP Call Admission Control and Traffic Engineering of VoIP James Yu and Imad Al-Ajarmeh jyu@cs.depaul.edu iajarmeh@gmail.com DePaul University Chicago, Illinois, USA ABSTRACT. This paper presents an extension

More information

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL

More information

Lecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements

Lecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements Outline Lecture 8 Performance Measurements and Metrics Performance Metrics Performance Measurements Kurose-Ross: 1.2-1.4 (Hassan-Jain: Chapter 3 Performance Measurement of TCP/IP Networks ) 2010-02-17

More information

Introduction. Impact of Link Failures on VoIP Performance. Outline. Introduction. Related Work. Outline

Introduction. Impact of Link Failures on VoIP Performance. Outline. Introduction. Related Work. Outline Impact of Link Failures on VoIP Performance International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV) C. Boutremans, G. Iannaccone and C. Diot Sprint ATL May

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Measuring and Understanding IPTV Networks

Measuring and Understanding IPTV Networks Measuring and Understanding IPTV Networks Colin Perkins http://csperkins.org/ Martin Ellis http://www.dcs.gla.ac.uk/~ellis/ Talk Outline Research goals Measuring and monitoring IPTV systems Measurement

More information

Computer Networks Homework 1

Computer Networks Homework 1 Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.

More information

Performance Evaluation for VOIP over IP and MPLS

Performance Evaluation for VOIP over IP and MPLS World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 3, 110-114, 2012 Performance Evaluation for VOIP over IP and MPLS Dr. Reyadh Shaker Naoum Computer Information

More information

Planning Networks for VOIP. An Introduction

Planning Networks for VOIP. An Introduction Planning Networks for VOIP An Introduction Planning Networks for VOIP Page 2/10 Contents 1 Introduction...3 2 Voice Quality Requirements...3 3 Codecs...4 4 Network Layout...5 5 Planning Capacity...6 5.1

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

H.323 Traffic Characterization Test Plan Draft Paul Schopis, pschopis@itecohio.org

H.323 Traffic Characterization Test Plan Draft Paul Schopis, pschopis@itecohio.org H.323 Traffic Characterization Test Plan Draft Paul Schopis, pschopis@itecohio.org I. Introduction Recent attempts at providing Quality of Service in the Internet2 community have focused primarily on Expedited

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency

More information

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University

More information

5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.

5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Disjoint Path Algorithm for Load Balancing in MPLS network

Disjoint Path Algorithm for Load Balancing in MPLS network International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/

More information

ΤΕΙ Κρήτης, Παράρτηµα Χανίων

ΤΕΙ Κρήτης, Παράρτηµα Χανίων ΤΕΙ Κρήτης, Παράρτηµα Χανίων ΠΣΕ, Τµήµα Τηλεπικοινωνιών & ικτύων Η/Υ Εργαστήριο ιαδίκτυα & Ενδοδίκτυα Η/Υ Modeling Wide Area Networks (WANs) ρ Θεοδώρου Παύλος Χανιά 2003 8. Modeling Wide Area Networks

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

ENSC 427: COMMUNICATION NETWORKS ANALYSIS ON VOIP USING OPNET

ENSC 427: COMMUNICATION NETWORKS ANALYSIS ON VOIP USING OPNET ENSC 427: COMMUNICATION NETWORKS ANALYSIS ON VOIP USING OPNET FINAL PROJECT Benson Lam 301005441 btl2@sfu.ca Winfield Zhao 200138485 wzhao@sfu.ca Mincong Luo 301039612 mla22@sfu.ca Data: April 05, 2009

More information

Distributed monitoring of IP-availability

Distributed monitoring of IP-availability IPLU-II Seminar 08.02.2008 1 Distributed monitoring of IP-availability Jorma Kilpi, VTT February 8, 2008 IPLU-II Seminar 08.02.2008 2 Availability vs. IP-Availability In this presentation Availability

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

Access the Test Here http://myspeed.visualware.com/index.php

Access the Test Here http://myspeed.visualware.com/index.php VoIP Speed Test Why run the test? Running a VoIP speed test is an effective way to gauge whether your Internet connection is suitable to run a hosted telephone system using VoIP technology. A number of

More information

Requirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005

Requirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005 Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005 Outline for talk: Requested topic: the requirements for simulation and modeling tools that allow one to study, design,

More information

IP-Telephony Quality of Service (QoS)

IP-Telephony Quality of Service (QoS) IP-Telephony Quality of Service (QoS) Bernard Hammer Siemens AG, Munich Siemens AG 2001 1 Presentation Outline End-to-end OoS of VoIP services Quality of speech codecs Network-QoS IntServ RSVP DiffServ

More information

Application Notes. Introduction. Sources of delay. Contents. Impact of Delay in Voice over IP Services VoIP Performance Management.

Application Notes. Introduction. Sources of delay. Contents. Impact of Delay in Voice over IP Services VoIP Performance Management. Application Notes Title Series Impact of Delay in Voice over IP Services VoIP Performance Management Date January 2006 Overview This application note describes the sources of delay in Voice over IP services,

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

VoIP QoS on low speed links

VoIP QoS on low speed links Ivana Pezelj Croatian Academic and Research Network - CARNet J. Marohni a bb 0 Zagreb, Croatia Ivana.Pezelj@CARNet.hr QoS on low speed links Julije Ožegovi Faculty of Electrical Engineering, Mechanical

More information

Achieving High Quality Voiceover-IP Across WANs With Talari Networks APN Technology

Achieving High Quality Voiceover-IP Across WANs With Talari Networks APN Technology Achieving High Quality Voiceover-IP Across WANs With Talari Networks APN Technology A Talari Networks Application Note 2012 Talari Networks / www.talari.com Enterprise-class Voice-over-IP Challenges In

More information

Load Balancing Mechanisms in Data Center Networks

Load Balancing Mechanisms in Data Center Networks Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider

More information

Project Report on Traffic Engineering and QoS with MPLS and its applications

Project Report on Traffic Engineering and QoS with MPLS and its applications Project Report on Traffic Engineering and QoS with MPLS and its applications Brief Overview Multiprotocol Label Switching (MPLS) is an Internet based technology that uses short, fixed-length labels to

More information

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332

More information

EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP

EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Scientific Bulletin of the Electrical Engineering Faculty Year 11 No. 2 (16) ISSN 1843-6188 EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Emil DIACONU 1, Gabriel PREDUŞCĂ 2, Denisa CÎRCIUMĂRESCU

More information

Performance improvement of active queue management with per-flow scheduling

Performance improvement of active queue management with per-flow scheduling Performance improvement of active queue management with per-flow scheduling Masayoshi Nabeshima, Kouji Yata NTT Cyber Solutions Laboratories, NTT Corporation 1-1 Hikari-no-oka Yokosuka-shi Kanagawa 239

More information

A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN)

A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN) A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN) Adeyinka A. Adewale, Samuel N. John, and Charles Ndujiuba 1 Department of Electrical and Information Engineering, Covenant

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

A Policy-Based Admission Control Scheme for Voice over IP Networks

A Policy-Based Admission Control Scheme for Voice over IP Networks Journal of Computer Science 5 (11): 817-821, 2009 ISSN 1549-3636 2009 Science Publications A Policy-Based Admission Control Scheme for Voice over IP Networks Sami Alwakeel and Agung Prasetijo Department

More information

Link-State Routing Can Achieve Optimal Traffic Engineering: From Entropy To IP

Link-State Routing Can Achieve Optimal Traffic Engineering: From Entropy To IP Link-State Routing Can Achieve Optimal Traffic Engineering: From Entropy To IP Dahai Xu, Ph.D. Florham Park AT&T Labs - Research Joint work with Mung Chiang and Jennifer Rexford (Princeton University)

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

Network Services from Iformata Communications

Network Services from Iformata Communications Network Services from Iformata Communications Marshall Eubanks marshall.eubanks@iformata.com November, 2007 What is TelePresence? And Why Should an ISP Care? Telepresence in this context is very high quality

More information

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS?

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS? 18-345: Introduction to Telecommunication Networks Lectures 20: Quality of Service Peter Steenkiste Spring 2015 www.cs.cmu.edu/~prs/nets-ece Overview What is QoS? Queuing discipline and scheduling Traffic

More information

A Quality of Experience based Approach for Wireless Mesh Networks*

A Quality of Experience based Approach for Wireless Mesh Networks* A Quality of Experience based Approach for Wireless Mesh Networks* Anderson Morais, and Ana Cavalli Télécom SudParis, France {anderson.morais, ana.cavalli}@it-sudparis.eu Abstract. Wireless Mesh Network

More information

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements The Quality of Internet Service: AT&T s Global IP Network Performance Measurements In today's economy, corporations need to make the most of opportunities made possible by the Internet, while managing

More information

Application Note How To Determine Bandwidth Requirements

Application Note How To Determine Bandwidth Requirements Application Note How To Determine Bandwidth Requirements 08 July 2008 Bandwidth Table of Contents 1 BANDWIDTH REQUIREMENTS... 1 1.1 VOICE REQUIREMENTS... 1 1.1.1 Calculating VoIP Bandwidth... 2 2 VOIP

More information

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing TRUFFLE Broadband Bonding Network Appliance BBNA6401 A Frequently Asked Question on Link Bonding vs. Load Balancing LBRvsBBNAFeb15_08b 1 Question: What's the difference between a Truffle Broadband Bonding

More information

IJMIE Volume 2, Issue 7 ISSN: 2249-0558

IJMIE Volume 2, Issue 7 ISSN: 2249-0558 Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)

More information

IMPLEMENTING VOICE OVER IP

IMPLEMENTING VOICE OVER IP 51-20-78 DATA COMMUNICATIONS MANAGEMENT IMPLEMENTING VOICE OVER IP Gilbert Held INSIDE Latency is the Key; Compression; Interprocessing Delay; Network Access at Origin; Network Transmission Delay; Network

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Estimation of available bandwidth and measurement infrastructure for. Russian segment of Internet

Estimation of available bandwidth and measurement infrastructure for. Russian segment of Internet 1 Estimation of available bandwidth and measurement infrastructure for Abstracts Russian segment of Internet Platonov A.P. 1), Sidelnikov D.I. 2), Strizhov M.V. 3), Sukhov A.M. 4) 1) Russian Institute

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

Robust Router Congestion Control Using Acceptance and Departure Rate Measures

Robust Router Congestion Control Using Acceptance and Departure Rate Measures Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {ganeshg@microsoft.com}, Microsoft Corporation,

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1

More information

Technote. SmartNode Quality of Service for VoIP on the Internet Access Link

Technote. SmartNode Quality of Service for VoIP on the Internet Access Link Technote SmartNode Quality of Service for VoIP on the Internet Access Link Applies to the following products SmartNode 1000 Series SmartNode 2000 Series SmartNode 4520 Series Overview Initially designed

More information

CS 268: Lecture 13. QoS: DiffServ and IntServ

CS 268: Lecture 13. QoS: DiffServ and IntServ CS 268: Lecture 13 QoS: DiffServ and IntServ Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776 1

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

Real-time apps and Quality of Service

Real-time apps and Quality of Service Real-time apps and Quality of Service Focus What transports do applications need? What network mechanisms provide which kinds of quality assurances? Topics Real-time versus Elastic applications Adapting

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)

More information

VOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet

VOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet VOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet 1 Outlines 1. Introduction 2. QoS in VoIP 3. H323 4. Signalling in VoIP 5. Conclusions 2 1. Introduction to VoIP Voice

More information