End-host 1. Sink CPE DSLAM. End-host 2



Similar documents
Admission control by implicit signaling in support of voice over IP over ADSL

VoIP Bandwidth Considerations - design decisions

Requirements of Voice in an IP Internetwork

Assessment of Voice over IP as a Solution for Voice over ADSL

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Bandwidth Measurement in xdsl Networks

Figure 1: Network Topology

Clearing the Way for VoIP

EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP

This topic lists the key mechanisms use to implement QoS in an IP network.

Analysis of IP Network for different Quality of Service

Implementing VoIP support in a VSAT network based on SoftSwitch integration

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.

QoS in VoIP. Rahul Singhai Parijat Garg

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.

Distributed Systems 3. Network Quality of Service (QoS)

Multiservice Access Technologies

How To Provide Qos Based Routing In The Internet

Network-based Quality of Service for Polycom IP Videoconferencing

Voice Over IP Per Call Bandwidth Consumption

Networkbased. Quality of Service. Communicate Simply. For IP Video Conferencing

Call Admission Control and Traffic Engineering of VoIP

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov

Encapsulating Voice in IP Packets

Hands on VoIP. Content. Tel +44 (0) Introduction

Implement a QoS Algorithm for Real-Time Applications in the DiffServ-aware MPLS Network

Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and

An Introduction to VoIP Protocols

Indepth Voice over IP and SIP Networking Course

Quality of Experience and Quality of Service

Introduction VOIP in an Network VOIP 3

Technote. SmartNode Quality of Service for VoIP on the Internet Access Link

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics:

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Voice Over DSL An Overview

Protocol Architecture. ATM architecture

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)

An End-to-End Measurement-Based Admission Control Policy for VoIP over Wireless Networks

Real-time apps and Quality of Service

Quality of Service on the Internet: Evaluation of the IntServ Architecture on the Linux Operative System 1

A Policy-Based Admission Control Scheme for Voice over IP Networks

Course 4: IP Telephony and VoIP

Top-Down Network Design

12 Quality of Service (QoS)

The Conversion Technology Experts. Quality of Service (QoS) in High-Priority Applications

QoS (Quality of Service)

QoS issues in Voice over IP

Chapter 3 ATM and Multimedia Traffic

Supporting End-to-End QoS in DiffServ/MPLS Networks

IAB CONCERNS ABOUT CONGESTION CONTROL. Iffat Hasnian

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

How To Share Bandwidth On A Diffserv Network

Quality of Service (QoS)) in IP networks

Optimizing Converged Cisco Networks (ONT)

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

Challenges and Solutions in VoIP

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Network Simulation Traffic, Paths and Impairment

Quality of Service Mechanisms and Challenges for IP Networks

Experiences with Class of Service (CoS) Translations in IP/MPLS Networks

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

QoS Strategy in DiffServ aware MPLS environment

IEEE Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the Air Interface Specification

Measurement of IP Transport Parameters for IP Telephony

Application Note How To Determine Bandwidth Requirements

Improving Quality of Service

How To Improve A Wireless Phone Connection On A Wireless Network

H.323 Traffic Characterization Test Plan Draft Paul Schopis,

How To Deliver High Quality Telephony Over A Network

Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led

VOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet

DOCSIS 1.1 Cable Modem Termination Systems

Chapter 2 - The TCP/IP and OSI Networking Models

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Chapter 7 outline. 7.5 providing multiple classes of service 7.6 providing QoS guarantees RTP, RTCP, SIP. 7: Multimedia Networking 7-71

VoIP Addressing QoS Beyond the Provider Network

QoS in multi-service IP networks

Quality of Service for IP Videoconferencing Engineering White Paper

VoIP in Mika Nupponen. S Postgraduate Course in Radio Communications 06/04/2004 1

DSL Forum. Working Text WT-101

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Protocols. Packets. What's in an IP packet

Network Considerations for IP Video

18: Enhanced Quality of Service

Mixer/Translator VOIP/SIP. Translator. Mixer

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

White Paper Abstract Disclaimer

"Charting the Course to Your Success!" QOS - Implementing Cisco Quality of Service 2.5 Course Summary

All Rights Reserved - Library of University of Jordan - Center of Thesis Deposit

White Paper. D-Link International Tel: (65) , Fax: (65) Web:

02-QOS-ADVANCED-DIFFSRV

Differentiated Services:

Transcription:

Assessment of Voice over IP as a Solution for Voice over ADSL Abhishek Ram, Luiz A. DaSilva and Srinidhi Varadarajan (aram@vt.edu) (ldasilva@vt.edu) (srinidhi@cs.vt.edu) Department of Computer Science Bradley Department of Electrical and Computer Engineering Virginia Polytechnic Institute and State University Blacksburg, VA Abstract This paper compares VoATM and VoIP in terms of their suitability for carrying voice traffic over DSL. ATM is currently the preferred protocol due to its built-in QoS mechanisms. Through simulations we show that IP QoS mechanisms can also be used to achieve comparable performance for voice traffic over DSL. Our performance metrics are the ETE delay of voice packets across the DSL access network and the bandwidth requirements of a voice call. We also propose an implicit signaling mechanism to provide admission control for individual voice calls over DSL. We implement a simulation model that uses our mechanism and perform simulations to verify its effectiveness. We conclude that by incorporating appropriate QoS mechanisms and implicit signaling, it is possible to achieve performance for VoIP comparable to that provided by ATM. In this case, the ubiquity of IP makes it a very attractive candidate for future deployments of VoDSL. I. INTRODUCTION Digital Subscriber Line (DSL) [1] refers to a collection of technologies used for the transmission of high-speed data over copper wires. Asymmetric Digital Subscriber Line (ADSL) is the most widely deployed DSL technology. ADSL provides higher bandwidth from the network service provider to the subscriber (downstream) than from the subscriber to the network service provider (upstream). The Customer Premises Equipment (CPE) is connected by ADSL to a DSL Access Multiplexer (DSLAM) located in the Central Office of the network service provider. The DSLAM aggregates traffic from different customers and sends it over a high-speed link towards the core of the network. In addition to data, DSL can also be used to deliver voice traffic over the same copper wires. The current trend is to use Voice over ATM (VoATM) technology for carrying voice over DSL (VoDSL) [2,3,4]. Voice and data are carried over different virtual circuits (VC) from the CPE to the DSLAM. Voice is carried directly over ATM Adaptation Layer 2 (AAL2) using Constant Bit Rate (CBR) service. Data is carried over IP over ATM Adaptation Layer 5 (AAL5) using Unspecified Bit Rate (UBR) service. At the DSLAM, AAL2 voice traffic is switched to a voice gateway and AAL5 data traffic is switched towards the core IP network. Through the use of ATM's signaling mechanism, voice flows that get admitted are guaranteed a portion of the bandwidth and hence experience low delays across the network. Another technology for carrying voice traffic over DSL is Voice over IP (VoIP) [2,5]. In this case, both voice and data packets are carried over IP from the CPE to the DSLAM, which then routes them towards the core. Voice packets are encapsulated by Real Time Protocol (RTP) and User Datagram Protocol (UDP) before being sent to the IP layer. The Layer 2 protocol may be ATM, Frame Relay or Serial Line IP (SLIP). To avoid long packetization delays and long transmission times over low-speed links, it is best to keep the payload size of voice packets small. RTP, UDP, IP and the Layer 2 protocol together impose considerable overhead on these small packets. Solutions such as header compression [5] and IP trunking [2] help alleviate the bandwidth problem. VoIP may use IP QoS mechanisms [6,7,8] to provide quality of service to voice packets [12,13,14,15]. Using VoIP in both the core and the access network paves the way for end-to-end IP telephony. Hence, if IP QoS mechanisms could be used to improve the performance of VoIP and make it comparable to that of VoATM, then VoIP would be the preferred VoDSL technology. In this paper, we make a case for using VoIP for VoDSL. We first compare the performance of VoATM and VoIP. Then, we study the improvement in VoIP performance using IP QoS mechanisms. We also propose our own admission control based on implicit signaling. Section II describes the simulation models and the metrics used for comparing VoIP and VoATM. The experiments performed for the comparison are discussed in Section III. Section IV discusses the need for admission control in providing QoS for voice flows and proposes an implicit signaling mechanism to perform admission control. Conclusions and the scope for future work are discussed in Section V. Sink II. SIMULATION MODEL DSLAM ADSL Figure 1: Simulation Model CPE End-host 1 End-host 2 The system of interest in our study ranges from the endhosts at the customer premises to a traffic sink located just beyond the DSLAM. As shown in Figure 1, the key components of this system are the end-hosts, the CPE, the

# Voice calls # Voice frames Bandwidth per call Upstream Upstream # Voice calls Mean ETE Delay ETE Delay Scenario generated per packet including header b/w resv for Interface MTU admitted for voice 95% Confidence (Kbps) voice (Kbps) (bytes) (s) Interval (s) VoATM UBR Voice 4 2 21.2-9180 4 0.663 (0.661, 0.665) VoATM CBR Voice 4 2 21.2 64 9180 3 0.0256 (0.0255, 0.0257) No QoS 2 1 42.4-9180 2 6.55 (6.47, 6.63) WFQ 2 1 42.4 89.6 9180 2 0.0777 (0.0770, 0.0783) WFQ + Frag 2 1 42.4 89.6 328 2 0.0239 (0.0238, 0.0240) WFQ + Frag 3 2 19.2 64 328 3 0.0146 (0.0145, 0.0147) Figure 2: Comparison of VoATM and VoIP ADSL link, the DSLAM and the traffic sink. The metrics used to evaluate the performance of voice traffic are the end-to-end delay of voice packets (ETE Delay) across the access network and the bandwidth required for the voice calls. The ADSL link in our simulations has an upstream bandwidth of 128Kbps and a downstream bandwidth of 1.5 Mbps. The upstream link is the bottleneck. For the VoATM scenarios, the end hosts consist of Ethernet-based clients generating data traffic and AAL2-based clients generating voice traffic. The CPE has an Ethernet interface for data traffic and AAL2 interfaces for voice traffic. The interface connecting the CPE to the DSLAM is ATM-based. The DSLAM is an ATM switch that switches voice and data packets to their respective destinations. In our model, these destinations are traffic sinks connected directly to the DSLAM. For the VoIP scenarios, the end-hosts are all Ethernet based clients that can generate both voice and data traffic. The CPE is an IP router, which has an Ethernet interface for the all the traffic originating from the end-hosts. The interface connecting the CPE to the DSLAM could be ATM, SLIP or Frame Relay. The DSLAM is another IP router that routes the voice and data packet towards the traffic sinks. We used OPNET Modeler for our simulations. OPNET Modeler supports several existing IP and ATM QoS mechanisms. However, in modeling our proposed admission control mechanism, we added additional functionality to the IP layer at the CPE and to the interface between the application layer and the transport layer at the end-hosts. The simulation time in our experiments was chosen such that the system was in steady state for more than 90% of the time. This was determined by conducting a few preliminary simulation runs. III. COMPARISON OF VOATM AND VOIP In all our experiments, voice calls use G.729 encoding. One end-host on the customer premises generates FTP traffic by uploading a 2 MB file. This FTP traffic competes with voice traffic for the upstream bandwidth. The experiments and the results are summarized in Figure 2. In the first VoATM experiment, both voice and data receive UBR service. The FTP application generates traffic that competes with the voice calls for the upstream bandwidth. ETE Delay of the voice traffic is very high as a result. The same experiment is repeated with voice traffic receiving CBR service and data traffic receiving UBR service. Since ATM's built-in signaling and admission control mechanisms ensure that the network does not overcommit the available resources, there is call blocking. The admitted voice calls experience low ETE delays and low delay variation. The next set of experiments study VoIP with ATM as the Layer 2 protocol. Again, the FTP application generates traffic that competes with the voice traffic. There is severe congestion at the CPE and the voice packets suffer considerable ETE delays when no QoS mechanisms are used. We then investigated the improvement in performance resulting from the use of IP QoS mechanisms. The Weighted Fair Queuing (WFQ) [9] algorithm is implemented at the CPE for sending packets over the bottleneck upstream link. Voice and data packets are marked with different Type of Service (TOS) values and placed in separate queues. The bandwidth allocated to the voice queue is sufficient to support the number of calls in progress during the experiment. Results show that the end-to-end delay is greatly reduced with the introduction of WFQ. However, the ETE delays of the packets are still high compared to those for VoATM. The end-hosts are all Ethernet-based, so the default MTU for their output interfaces is 1500 bytes. A 1500 byte IP packet takes approximately 94 ms to be transmitted over the 128 Kbps upstream link. Voice packets that arrive during the transmission of a data packet have to wait for an unacceptably long time in the queue. IP layer fragmentation of large data packets is a possible solution to this problem, but it also results in an increase in protocol overhead, since the IP header is replicated in each fragment.

A better solution is fragmentation and interleaving of packets at Layer 2 [5]. Multilink-PPP (MP) [10] provides one such solution. We focus on the improvement in performance achieved by fragmentation at the IP layer. The results for voice traffic would be similar if link layer fragmentation were used. We fragment large data packets by setting the MTU of the upstream interface at the CPE to 328 bytes. Packets of this size fit exactly into 7 ATM cells and need only 23 ms for transmission over the 128 Kbps upstream link. The results show that incorporating WFQ and IP layer fragmentation makes ETE delay of VoIP comparable to that of VoATM. We also studied VoIP with SLIP as the Layer 2 protocol. Due to the reduced bandwidth requirements of a voice call in this case, we generate more voice calls but reserve less bandwidth as compared to the experiment with ATM at Layer 2. The ETE delays experienced by voice packets with SLIP at Layer 2 are slightly lower than what was observed in the other experiments. In the VoATM scenario, voice packets are carried directly over AAL2 and encapsulation of voice packets by AAL2 is a complex process [11]. Apart from this, the AAL2 PDU may undergo segmentation and reassembly. The processing delay of these operations might be causing the ETE delay for VoATM to be slightly higher than that with VoIP (SLIP at Layer 2). Figure 3 summarizes the results of this section. ETE Delay (s) 0.09 0.08 0.07 0.06 0.05 0.04 0.03 0.02 0.01 0 VoATM with CBR voice VoIP + WFQ (ATM@L2) Scenario VoIP + WFQ + Frag (ATM@L2) Figure 3: Mean ETE Delays for various VoDSL scenarios VoIP + WFQ + Frag (SLIP@L2) IV. ADMISSION CONTROL The IP QoS mechanisms considered so far do not perform any form of admission control for voice flows. In a situation where too many flows belonging to a certain class compete for limited bandwidth reserved for that class, none of the flows gets a satisfactory level of service. Admission control is thus necessary to provide guaranteed service. End-point admission control [16,17,18,19] is an approach where the end-hosts themselves make admission decisions. The end-hosts first send probe packets into the network to measure the quality of service that these packets receive. Based on these measurements, they decide whether or not to admit the flow. Another approach is to have the network make the admission control decisions [20, 21, 22, 23]. This is typically done by means of a signaling mechanism to carry the reservation request from the end-host to the network. The network checks the resources requested against the resource availability and the flow is admitted if there are sufficient resources. In this paper, we propose an implicit signaling mechanism by means of which the CPE can admit individual voice calls originating from the end-hosts and provide a guaranteed level of service to those calls. We classify voice calls into two categories - regular voice calls and premium voice calls. Our admission control mechanism does not reject any voice calls as such. Instead, it admits only a limited number of voice calls as premium voice calls and admits the rest as regular voice calls. Thus, we do not allow the arrival rate to exceed the service rate for premium voice calls. This guarantees low ETE delays for these calls. On the other hand, there is no limit to the number of voice calls that can be admitted as regular calls. Hence, these calls may receive satisfactory service at light loads, but the quality degrades as the load increases. The CPE needs to store some information for each voice call admitted in the premium category. It uses a hash table for this purpose, with the flow ID of the voice call as the hashing function. If we assume that each end-host runs not more than one voice call, then the flow ID would comprise just the source and destination IP addresses. The number of simultaneous voice calls at each subscriber is # Voice calls Upstream b/w # Voice calls Mean ETE Delay ETE Delay Mean ETE Delay ETE Delay Scenario generated resv for premium admitted as for regular voice 95% Conf Interval for premium voice 95% Conf Interval voice (Kbps) premium (s) Regular Voice (s) (s) Premium Voice (s) No Admission Ctrl 4 - - 0.0509 (0.0483, 0.0535) - - With Admission Ctrl 4 35 2 0.0658 (0.0600, 0.0717) 0.01355 (0.0135, 0.0136) Figure 4: Performance of the Admission Control Algorithm

expected to be low enough that the maintenance of state information at the CPE will not pose undue processing or storage requirements. Our mechanism takes advantage of signaling done at the application layer of the end-hosts to establish a voice call. Application layer signaling is done using protocols such as the Session Initiation Protocol (SIP) [24]. When an endhost wishes to establish a VoIP call, it marks the "Invite" message, used by SIP to establish the session, with a special code in the Type of Service (TOS) field. The TOS octet encodes the following pieces of information: (i) whether the packet is an application layer signaling message, and if so, what kind of message it is; (ii) the voice encoding scheme; and (iii) the number of voice frames included in a packet. These TOS codes allow the CPE to distinguish between packets that carry application layer signaling messages and those that carry voice payload. The CPE can also figure out the bandwidth requirement for a voice call using items (ii) and (iii) above. Even if silence suppression were used, the CPE would at least get an upper bound of the bandwidth requirement. Upon receiving this message, the CPE checks the bandwidth requirements for this call against its bandwidth availability. If sufficient bandwidth is available, it adds this call to the list of premium voice calls and updates its bandwidth availability to reflect the admission of the new call. In the hash table entry for this call, it sets a flag to indicate that the call has been admitted as premium. It then remarks the TOS field to indicate that this packet belongs to the premium category. If sufficient bandwidth is not available, the CPE simply remarks it as belonging to a regular voice call and forwards it. After the end-host has established a session, it starts sending voice packets. The end-host does not know whether its session has been classified as premium or regular, since the admission control procedure is transparent to the end-hosts. For each voice packet received, the CPE checks the hash table to verify if the packet belongs to a premium call. If so, the voice packet is remarked to reflect this and then forwarded towards the DSLAM. Otherwise, the voice packet is remarked as belonging to the regular category. When the end-host wishes to end the voice call, it marks the "Bye" message, used by SIP to close the session, with a special code in the TOS field. This code also carries the same pieces of information as the code used for the Invite messages. When the CPE receives this message, it checks the hash table to see whether the packet belongs to a premium call. If so, then the bandwidth availability is increased to reflect the closing of this session. The flag in the hash table is reset to indicate that the call has been removed from the list of premium calls. The packet is remarked to indicate that it belongs to a premium call and forwarded. If the call to which the "Bye" message belongs is not a premium call, then the CPE simply remarks the packet as one belonging to a regular voice call and forwards it. This also takes care of duplicate "Bye" messages that might have been sent by the same call. In such cases, the CPE would not mistakenly update its bandwidth availability twice, since the second time the call would no longer be in the list of premium calls. It is possible for a premium voice application running on the end-host to crash without sending the "Bye" message indicating the end of the session. To de-allocate the bandwidth that had been reserved by the premium call, our mechanism uses the following implementation of soft state. For each premium call, the CPE keeps track of the time when a packet from the call last arrived. There is a maximum silence period defined for premium calls. If a particular premium call has not sent a packet for a period longer than the maximum silence period, then the call can be preempted from the list of premium calls. An additional feature of our resource management scheme is the upgrade of existing voice calls from the regular to the premium category if resources become available during a call. If there is more than one regular call in progress and there are enough resources for only one, then our scheme selects one of the regular calls at random and upgrades it to a premium service. The upgrade feature requires that the end-hosts use the TOS field to encode the bandwidth requirements of the call in not just the "Invite" and "Bye" packets, but in each packet carrying voice payload. We incorporated our resource management scheme in the VoIP scenario (SLIP at Layer 2) with WFQ and IP Fragmentation and studied the resulting improvement in performance. The results are shown in Figure 4. In the scenario with no admission control, there is no concept of premium and regular calls - all calls are treated the identically (we call them regular calls in Figure 4). 50% of the upstream bandwidth is reserved for voice traffic. There are four voice calls in progress. With G.729 encoding and 2 voice frames per packet, each voice call requires 19.2 Kbps. Hence the voice traffic load exceeds the bandwidth reserved for voice. As a result, we see that all voice calls experience high ETE delays. In the scenario with admission control, 35% of the upstream bandwidth is reserved for premium calls and 15% for regular calls. The bandwidth reservation allows up to two voice calls to be admitted as premium calls. The other two voice calls are admitted as regular calls. Note that the load offered by premium calls does not exceed the reserved bandwidth whereas the load offered by regular calls is allowed to do so. The packets belonging to the premium voice calls experience ETE delays much lower than those belonging to the regular voice calls. Thus our admission control

mechanism is able to protect premium calls. Figure 5 illustrates the effectiveness of our mechanism. ETE Delay (s) 0.07 0.06 0.05 0.04 0.03 0.02 0.01 0 No Admission Control Adm Ctrl - Premium Call Scenario and Call Type Figure 5: Effect of Admission Control V. CONCLUSIONS AND FUTURE WORK Adm Ctrl - Regular Call In this paper, we compared the suitability of VoATM and VoIP for carrying voice over DSL. We found that when appropriate QoS mechanisms are used, their performance - in terms of ETE delay and bandwidth requirements - is comparable. Given the predominance of IP networks, this result clearly shows the suitability of VoIP for VoDSL, which enables end-to-end IP telephony. We recommend the use of a lightweight protocol such as SLIP, PPP or Frame Relay at Layer 2 of the VoIP protocol stack. Our results show that the use of ATM at Layer 2 does not result in any gain, and only causes poor bandwidth due to increased overhead. In this paper, we also proposed a simple admission control mechanism to limit VoIP calls, avoiding inter-call interference. Our mechanism consists of an implicit signaling protocol between the end-hosts and the CPE. Results in the paper show significant reduction in ETE delays due to the admission control mechanism. More detailed results of the use of implicit signaling for admission control combined with IP QoS for VoDSL, including different traffic mixes, are described in [23]. Future research plans include investigating the performance of data traffic over DSL in the presence of competing voice flows, to determine how TCP utilizes to the residual bandwidth of the link. We recognize that our implicit signaling mechanism is specifically suited to our needs, i.e. admission control for voice calls over DSL. A possibility for future work is to make the mechanism more general and to devise an end-to-end solution based on it. The coexistence of voice, video and data traffic over DSL is another issue that could be investigated further. REFERENCES [1] DSL Forum Web Site: www.adsl.com [2] M. Taylor, Mastering Voice Over DSL: Network Architecture, A CopperCom Technology White Paper. [3] M. Taylor, Seven Essentials of a Local Exchange Softswitch System, Part 4: Packet Voice over Broadband, A CopperCom Technology White Paper. [4] Transforming Copper to Gold, High Revenue Voice-over-DSL Services, Lucent Technologies White Paper. [5] R. Caputo, Cisco Packetized Voice and Data Integration, McGraw Hill 1999, pp. 63-109. [6] S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, W. Weiss, An Architecture for Differentiated Services, RFC2475, December 1998. [7] V. Jacobson, K. Nichols, K. Poduri, An Expedited Forwarding PHB, RFC2598, June 1999. [8] J. Heinanen, F. Baker, W. Weiss, J. Wroclawski, An Assured Forwarding PHB Group, RFC2597, June 1999. [9] G. Armitage, Quality of Service in IP Networks, MacMillan 2000, pp. 91-98 [10] G. Armitage, Quality of Service in IP Networks, MacMillan 2000, pp. 169-182 [11] U. Black, ATM: Foundation for Broadband Networks, Prentice Hall 1995, pp. 149-161. [12] K. Tajima, M. Hashmani, M. Yoshida, A Resource Management Architecture over Differentiated Services Domains for Guarantee of Bandwidth, Delay and Jitter, EUROCOMM 2000. Information Systems for Enhanced Public Safety and Security. IEEE/AFCEA, pp. 242-249, 2000. [13] A. Tyagi, J.K. Muppala, H. De Meer, VoIP support on Differentiated Services using Expedited Forwarding, Performance, Computing, and Communications Conference, 2000. IPCCC '00. Conference Proceeding of the IEEE International, pp. 574-580, 2000. [14] M. Büchli, D. De Vleeschauwer, J. Janssen, A. Van Moffaert, G. H. Petit, Resource Allocation and Management in Diffserv Networks for IP Telephony, 11th International workshop on on Network and Operating Systems support for digital audio and video, pp. 33-39, January 2001. [15] B. Klepec, A. Kos, Performance of VoIP Applications in a Simple Differentiates Service Network, EUROCON'2001, Trends in Communications, International Conference on, pp. 241-217 Volume: 1, 2001. [16] L. Breslau, E. W. Knightly, S. Shenker, I. Stoica, H. Zhang, Endpoint Admission Control: Architectural Issues and Performance, ACM SIGCOMM Computer Communication Review, Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication August 2000 pp. 57-69 Volume 30 Issue 4. [17] G. Bianchi, A. Capone, C. Petrioli, Throughput Analysis of End-to- End Measurement-Based Admission Control in IP, INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, pp. 1461-1470, Volume: 3, 2000. [18] K. Mase, Y. Toyama, A. A. Bilhaj, Y. Suda, QoS Management for VoIP Networks with Edge-to-Edge Admission Control, Global Telecommunications Conference, 2001. GLOBECOM '01. IEEE, pp. 2556-2560, Volume: 4, 2001. [19] V. Elek, G. Karlsson, R. Ronngren, Admission Control Based on End-to-End Measurements, INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, pp. 623-630, Volume: 2, 2000. [20] R. Braden, L. Zhang, S. Berson, S. Herzog, S. Jamin, Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification, RFC 2205, September 1997. [21] T. Ferrari, W. Almesberger, J.L. Boudec, SRP: a Scalable, Resource Reservation Protocol for the Internet, In Proceedings of IWQoS 98, pp. 107-116, Napa, CA, May 1998. [22] I. Stoica, H. Zhang, Providing Guaranteed Services Without Per Flow Management, In Proceedings of ACM SIGCOMM 99, Cambridge, Massachusetts, pp. 81-94, September 1999. [23] A. Ram, Assessment of Voice over IP as a Solution for Voice over ADSL, M.S. Thesis, Virginia Polytechnic Institute and State University, May 2002.