MODELLING VOICE COMMUNICATIONS USING OPNET
|
|
- Blaze Johnson
- 5 years ago
- Views:
Transcription
1 MODELLING VOICE COMMUNICATIONS USING OPNET Uma Jain, Mustafa Kocaturk, and Arvind Kumar Ericsson, Inc. 655 N. Glennville Dr., Mailstop J 04, Richardson, TX, U. S. A. {Uma.Jain,Mustafa.Kocaturk,Arvind.Kumar}@Ericsson.com ABSTRACT Voice over IP and Voice over ATM networks are the rage in telephony discussions these days. Traditional suppliers of telephony equipment are adapting/changing their product lines as fast as possible to compete in the new telecom world dominated by integrated voice/data networks. There has been a concurrent proportional increase in the research activity to find ways to model the new products/networks, with an aim to devise easy to use engineering guidelines for configuring these products/networks. This paper outlines the different criteria that characterize voice transmission carried over the traditional wireline or wireless circuit switched networks and the emerging integrated packet networks. We then describe our experiences in using OPNET to model the emerging communications scenarios. INTRODUCTION Up to the present time, human speech has been transmitted on a real time conversational basis, primarily using circuit switched networks, where a circuit or connection is dedicated to each conversation for the duration of the conversation. Voice communication systems have been around for more than a century and have been evolving toward integration with data networks through a variety of technological, economic and user requirement factors via modem technologies, Integrated Services Digital Network (ISDN), digital carriers and more recently via integrated services Asynchronous Transfer Mode (ATM) and Frame Relay (FR) backbones on the one hand, and the Internet and corporate intranets on the other. Traditional suppliers of telecom equipment for the public and the private/enterprise networks are naturally endeavouring to keep up with the changes taking place by supplying to their clients both a newer/changed set of products as well as the associated guidelines/explanations on how to evolve their respective networks. With the generally accepted predictions of the voice traffic becoming an insignificant fraction of the data traffic over the next few years, it goes without saying that voice traffic will be increasingly carried over data networks. These may be based on FR or ATM (for enterprise networks), or packetized voice over IP (VoIP) carried over a local area netwok (LAN), wide area network (WAN), or Internet. In this paper we outline some of the results of our recent attempts to model packetized VoIP using OPNET. It should be pointed out at the outset that even though we are discussing primarily VoIP (because that is what we have studied using OPNET thus far), there is in fact a need to generalize this discussion to all "Real Time Services over IP", including packetized audio/video, electronic commerce, teleconferencing, Web searching, multi media Internet Collaboration/Whiteboard Sharing etc. Much if not all of the topics covered in this paper apply in fact to all such "real time services over IP". PARAMETERS OF VOICE TRANSMISSION Parameters and criteria that characterize voice transmission have been defined in standards bodies by the telephone industry and administrations, keeping in mind the needs of a telephone subscriber (the customer) wishing to place a call and carry on a conversation. For the purposes of this discussion, these parameters will be called quality of service (QoS) parameters. One major QoS parameter is the probability that a call attempt will succeed. Alternatively, blocking probability can be used, which is one s complement of the former. Another important parameter is the quality of the telephone conversation, expressed using a standard metric such as the perceived speech quality (PSQM), or the mean opinion score (MOS) that indicates the intelligibility of speech. PSQM is obtained by objective measurements and evaluated according to ITU T Recommendation P.860. MOS is obtained by subjective listening tests, where a group of listeners with different linguistic backgrounds evaluate a series of speech samples by a score from 1 (unintelligible) to 5 (perfect). While both of the above QoS parameters are mentioned together, their values depend on relatively disjoint set of processes, hence there is little, if any, correlation between them. The boundary between unacceptable speech quality and a lost call is quite subjective and arbitrary, and depends on many factors, including the cost per minute of the call, level of interactivity, and status of the caller, among others [1]. Furthermore, a mapping between lost calls and lost subscribers is also possible, as described in the outage index methodology [2] developed by ANSI Working Group T1A1.2, which specializes on the Survivability Performance of 1
2 telecommunications networks. Blocking probability is usually calculated based on the assumption that calls are lost when all resources (lines) leading to the destination are busy and that they do not return. The number of callers is assumed to be infinite, but the total offered traffic intensity is finite. This is known as Erlang s Loss model. Other models can be better approximations to reality, where lost calls return, are held (as are talkspurts in time assignment speech interpolation TASI), or the number of sources is finite, but they lead to more complicated math. In a typical landline telephone service, one blocked call in 1000 (within an exchange) is considered acceptable and exchanges are dimensioned (engineered) accordingly. In mobile telephony, the allowed blocking probability at the air interface can be as high as 0.01 (1 percent). Traffic engineering or dimensioning are terms used to describe the processes and methods for determining the number of resources allocated for each component in the telephone network, based on the models mentioned above and the allowed probabilities of loss or delay in serving (setting up) calls. Typical requirements towards a circuit switched telephone network impose limits on call blocking probability at various network/node components and dial tone delay. There are also reliability requirements limiting down time for a node, a link, or the entire network. Speech quality is affected by impairments such as errors resulting in loss of speech samples, end to end or round trip delay, presence/delay/strength of echo, and clipping (due to TASI or silence suppression). The effect of delay on speech quality deserves attention: In an echo free highly interactive conversation, round trip delays exceeding ms can be acceptable, whereas 600 ms or more becomes annoying for those unaccustomed to it [1]. CIRCUIT SWITCHING VS. PACKET SWITCHING The two QoS domains mentioned above (blocking probability and speech quality), which are distinct in traditional (circuit switched) telephony, merge into a continuum of capacity and voice quality trade offs in packetized voice telephony. Traditionally, telephone network engineering has been based on circuit switching concepts, where a constant stream of bits is allocated to a call for the entire duration of the conversation. Economy is obtained by sharing pooled resources among randomly timed bids. Not all pools have a queue, and a certain amount of blocking (loss) of bids is considered normal. Occasional loss of small segments of speech can also be tolerated. Delays of even a fraction of a second, however, become a problem, to the extent that human interaction is involved. Data transmission, on the other hand, is more tolerable towards delay, and less tolerable towards error. Machines can wait and retry until an error free unit (packet) of data is transferred. Economy is achieved by spreading the load across the least loaded routes on a per packet basis, without worrying about the delay, as in the Internet Protocol (IP). When transmitting voice (or any other real time traffic) over IP, the strong error control mechanisms developed for data transmission become a hindrance for voice transmission. Errors can be tolerated in digitally coded voice communication, and any error recovery mechanism introduces intolerable delays. For instance, the automatic retransmission queue (ARQ) that is a part of the transmission control protocol (TCP) makes it unsuitable for voice communication. Instead, user datagram protocol (UDP), augmented by a mechanism that ensures an adequate, but continuous and timely flow of packets is preferable. Such a protocol is designed to meet maximum delay requirements for the speech payload, and is allowed to discard late packets as having been lost. Thus, it is preferable to play speech back within a given delay constraint, even though this may be at the cost of losing some speech packets. The lost speech can be interpolated, thus mostly eliminating the effect of loss. Subjective evaluation, by the authors, of recorded, GSM full rate encoded speech with simulated random frame loss patterns has shown that up to 10% of frames can be lost without significant loss of intelligibility. This observation is in agreement with the QoS mapping for unidirectional delay and loss depicted in [9], and the mean opinion score degradation of similar codecs operating under packet loss [10]. The work described in this paper uses the QoS parameters mentioned above, to answer questions such as: How many subscribers can be supported by a typical operator s VoIP network? How many routers, switches, or hubs should be used? What bandwidth should be used on each link? What is the processing power required at the nodes? MOBILE VS. LANDLINE TELEPHONY In landline circuit switched telephony, the delays introduced into a voice connection by links and network elements are small. Delay is typically not a problem by itself, but is a contributing factor to effects of echo impairments. Propagation delay would dominate in landline, especially in long distance terrestrial or satellite links. Delays in switching equipment can be 2
3 made as small as 125 microseconds (duration of one speech sample in PCM). In mobile telephony, mobility and additional impairments introduced by the air interface need to be considered. For analogue mobile telephones, the delay introduced by the air interface is comparable to a local land line. Digital mobile telephones, which are increasingly being used to add capacity and reliability to existing systems, however, add two major delay components: low bit rate voice encoding, which introduces a ms delay, and interleaving to combat air interface impairments such as fading, which introduces a comparable amount of delay. Therefore, added delays must be taken into account. A delay comparable to the voice encoding delay is also introduced when PCM voice is packetized. When both voice encoding and packetization are used within the same node, these processes can overlap (be pipelined) to avoid additional delays. MODEL DESCRIPTION AND RESULTS A large number of packetized speech traffic models exist in literature [3 6]. The accuracy of these models is determined by their ability to predict the ten following events which are relevant to speech patterns: talkspurt, pause, doubletalk, mutual silence, alternative silence, pause in isolation, solitary talkspurt, interruption, speech after interruption, and speech before interruption. The six state Markov Chain model, known as Brady model [6], is well known for its excellent predictive ability of the ten events mentioned. However, simpler models exist, which are easier to represent and even though they can not predict all the ten events, they still yield accurate talkspurt and silence lengths. In our work, we have represented the voice source by a two state process a talk spurt, averaging 1 sec in length, and a silence interval, averaging 1.5 sec in length. The voice activity factor, which is the probability that the speaker is active, is therefore 0.4. The two states are assumed to be exponentially distributed in length. As mentioned before, additional states have been proposed in the literature, but this complicates the representation. During the talk spurt, a periodic stream of packets will be generated. The arrival rate of the packets and the number of bits per packet will be determined by the encoding scheme. For GSM full rate, the payload is 40 bytes (260 bits + 60 bits padding inserted by the transcoder, since only four FR channels can be multiplexed into one DS0) generated every 20 ms. In our earlier works, we built a voice source using OPNET modeler. At the same time, MIL3 was working on designing a voice application to be released with their version 6.0. We were part of the VoIP committee, which provided MIL3 with the feedback on what features we would like to incorporate in the voice application, features that were relevant for GSM, for example. The results presented here are all obtained using the version 6.0. As mentioned before, the end to end delay experienced by the voice packets will affect the speech quality. The delay consists of two parts: a fixed part arising out of encoding, packetization, and processing speeds and a variable part arising out of the interaction with the data traffic. It is in estimating this variable part that the simulations are most useful. We realize that, with the nature of Internet traffic being so unpredictable, it is not possible to run simulations for every possible scenario. However, we have tried to formulate guidelines and rules of thumb, wherever possible, based on our simulation results. Recently, there have been some papers published [4] on the impact of data traffic on voice but most of them assume the voice traffic to be prioritized. We investigated what would happen if the voice traffic were not prioritized, particularly on a LAN and on point to point links between two LANs. Fig. 1. Probability that voice packet end to end delay is less than value seconds, for varying data traffic on a LAN. Data traffic modeling is complex, consisting of several types of services, such as telnet, ftp, web browsing etc., each with its own characteristics. Bursty sources have been used as models for data traffic file transfers and image transmission. Also, statistical measurements on 3
4 both LAN and WAN traffic indicate that it is self similar or fractal like in nature [7,8]. However the age old Poisson model is still useful in that it provides us with powerful insights into the performance of networks and lends itself easily to mathematical analysis [3]. In the results presented here, Poisson data arrival is assumed, for the sake of simplicity. In our future work, we intend to use sampled real traffic data. Fig. 1 plots the cumulative probability distributions of the voice packet end to end delay with varying data traffic on a 10 Mbps Ethernet shared LAN. Forty nodes were considered in a star shaped configuration with a hub in the center, with the voice traffic load kept constant at 0.7 Mbps (7%). Data arrival was assumed to be Poisson, with the size kept constant at 1400 bytes (since the maximum transmission unit for ethernet is 1500 bytes). voice packet end to end delay for two different voice data proportions, although the total traffic load is kept constant at 72%. Fig. 2. Probability that voice packet end to end delay is less than value seconds for varying voice and data load proportions keeping the total LAN load constant. Similar figures for different voice loads (not shown here) are generated and these figures can be used to directly engineer new installation of VoIP products. For example, Fig. 1 tells us that if we desire that not less than 90% of the packets arrive within 8 ms, the load conditions must be such that the voice traffic does not exceed 0.7 Mbps and the data traffic does not exceed 7.4 Mbps. Even if the total traffic load is kept constant, the delay experienced by the voice packets increases as the proportion of data traffic increases. This is illustrated in Fig. 2 which plots the cumulative distributions of the Fig. 3. Probability that voice packet end to end delay on E1 link is less than value seconds, with varying data traffic. Fig. 3 illustrates the effect of data traffic on voice on an E1 link. All curves are for a total load of 62.5% link utilization. The leftmost curve is for traffic consisting of voice traffic alone without any data. At 62.5% load, there is very little waiting delay at the queue, and the end to end delay is mostly the transmission time of one packet plus the processing delay at the nodes. The waiting delay observed agrees with the theoretical estimate obtained using M/D/1 queue analysis. The two curves on the right of Fig. 3 are for when the voice and data are present in equal proportion. Here the effect of data packet size is evident. The rightmost curve with larger delay is for 1000 byte packets whereas the middle curve with the smaller delay is for 500 byte packets. This emphasizes the fact that applications with smaller data packet sizes are more suitable for mixing with voice traffic than applications with large packets such as ftp and web browsing. The delay figures for continuous data streams are significantly lower than those for bursty data streams, even though the average utilizations may be the same in both cases or may even be lower for the bursty data, as is illustrated in the figs. 4 and 5. Two cases are considered. The voice traffic consists of just two sources, thus forming a negligible part of the 4
5 total traffic. Fig. 4 compares the link utilizations for the two cases. In the first, a continuous data stream with 50% link (E1) utilization is assumed, and in the second, a bursty data stream with 20% activity factor is assumed, with the momentary utilization during the burst reaching 100%. Thus the average utilization for the bursty data is only 20%, less than that for the first case, but the delays are much larger as shown in Fig. 5. Almost all the voice packets that arrive during the burst are heavily delayed, some by more than 100 ms. One solution for this is to shape the data traffic, using a leaky bucket [3], for example, before it is mixed with the voice traffic. cause longer delay. Thus, applications with smaller sized packets are more suitable for mixing with voice packets. c. The burstiness of the data packets. This is in fact related to the size of the packets. A large file transfer, say of 20 Kbytes, will make the traffic bursty. Since the burstiness of the data traffic is hard to predict, one solution to this could be to shape the data traffic using an algorithm such as leaky bucket. Fig. 4. The E1 link utilization for two cases; continuous data stream and bursty data stream. Our conclusions, based on the simulation results, can be summarized as follows. 1. On point to point links, if the voice packets are prioritized, the average delay and the percentile delayed beyond a certain value can be analytically estimated from a knowledge of the voice traffic load and the link speed. 2. On a LAN, or on point to point links between two LANS, where the voice packets are not prioritized, the delay, apart from depending on voice load and the link speed, is also sensitive to: a. The data traffic load. Even when the total data plus voice traffic load remains constant, the delay increases as the proportion of data to the total load increases. b. The size of the data packets. Bigger size packets Fig. 5. Comparison of the probability that voice packet end to end delay is less than value seconds, for two types of data streams, continuous and bursty. FUTURE WORK AND RECOMMENDATIONS The work we have outlined in this paper can serve as the basis for a general network design methodology for packetized voice. This involves setting up topology, link parameters and system parameters to evaluate system performance and costs using simulation and analytical tools. Changes are made systematically in topology as well as parameters and various iterations run, in order to select a configuration that satisfies all design criteria while minimizing costs. The following suggestions are being made to enhance OPNET as a tool of choice in this work. OPNET has a comprehensive set of primitives that support packet switched network simulation. A similar framework would be desirable for simulating circuit switched networks, taking into account the probability of blocking at every stage, up to the destination 5
6 OPNET has a very rich library of contributed models for packet switched data transmission. There is a need for models that can also help detect the bottlenecks in a circuit switched network based on criteria developed using an Erlang loss model CONCLUSIONS In this paper we have presented our approach to modeling packetized voice using OPNET. Packetized voice differs from other packetized data traffic (such as e mail and telnet) in several fundamental aspects including regularity of input traffic, more complex performance criteria (smoothness and error tolerance), performance criteria imposed on a worst case and end to end basis, and a different set of protocols. OPNET simulation results like those presented here can be used to create traffic engineering tables and a network design methodology allowing the network administrators to decide on the network topology (number and location of various types of nodes), processing power required at each node, bandwidth required on each link in the network, and the maximum number of VoIP subscribers that can be allowed in a given network. Some suggestions to enhance OPNET have also been included. REFERENCES 1. Telecommunications Research Associates, Understanding IP and Voice over IP TM, Coursebook, 2. T1A1.2 Working Group, Report No. 24A, A Technical Report on Network Survivability Performance (Supplement to Technical Report No. 24), ftp://ftp.t1.org/pub/techrpts/tr.0/tr_24a.pdf 3. Schwartz, M., Broadband Integrated Networks, Prentice Hall, Minoli, D. and Minoli, M., Delivering Voice over IP Networks, John Wiley and Sons, Stern, T. E., Proc. IEEE Globecom 83, (Dec 1983) Brady, P. T., Bell System tech. J., 48 ( Sept. 1969) pp Paxson, V., and Floyd, S., Proc. SIGCOMM 94, (Aug. 1994) pp Leland, W. E., et.al., IEEE/ACM Trans. On Networking, 2, (Feb. 1994) pp Kostas, T. J., et.al., "Real Time Voice over Packet Switched Networks", IEEE/ACM Trans. On Networking, Jan./Feb. 1998, pp Thorpe, L., "Subjective Evaluation of Frame Erasure Concealment (FEC) Techniques", Contribution T1A1.7/ to ANSI Working Group T1A1.7 ftp://ftp.t1.org/pub/t1a1/t1a1.7/9a17026.pdf 6
Introduction to Quality of Service
Introduction to Quality of Service The use of IP as a foundation for converged networks has raised several issues for both enterprise IT departments and ISPs. IP and Ethernet are connectionless technologies
More informationWeek 7: Traffic Models and QoS
Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,
More informationImpact of Voice Coding in Performance of VoIP
Impact of Voice Coding in Performance of VoIP Batoul Alia Baker Koko 1, Dr. Mohammed Abaker 2 1, 2 Department of Communication Engineering, Al-Neelain University Abstract: Voice over Internet Protocol
More informationVoice Analysis for Mobile Networks
White Paper VIAVI Solutions Voice Analysis for Mobile Networks Audio Quality Scoring Principals for Voice Quality of experience analysis for voice... 3 Correlating MOS ratings to network quality of service...
More informationDigital Speech Interpolation Advantage of Statistical Time Division Multiplexer
PJETS Volume 1, No 1, 2011, 9-13 ISSN: 2222-9930 print Digital Speech Interpolation Advantage of Statistical Time Division Multiplexer Asadullah Shah *, Krishan Lal Khatri ** Abstract This paper discusses
More informationAlcatel OmniPCX Enterprise
Alcatel OmniPCX Enterprise QoS for VoIP Overview 1 OBJECTIVE: Describe the essential parameters for QoS The QoS parameters regarding the data network IP Packet Transfer Delay (IPTD): Time for the packet
More informationCOPYRIGHTED MATERIAL INTRODUCTION AND OVERVIEW
1 INTRODUCTION AND OVERVIEW The past few decades have seen the merging of computer and communication technologies Wide-area and local-area computer networks have been deployed to interconnect computers
More informationABSTRACT. that it avoids the tolls charged by ordinary telephone service
ABSTRACT VoIP (voice over IP - that is, voice delivered using the Internet Protocol) is a term used in IP telephony for a set of facilities for managing the delivery of voice information using the Internet
More informationPfR Voice Traffic Optimization Using Active Probes
PfR Voice Traffic Optimization Using Active Probes This module documents a Performance Routing (PfR) solution that supports outbound optimization of voice traffic based on the voice metrics, jitter and
More informationPerformance of UMTS Radio Link Control
Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication
More informationQuality of Service in Telecommunication Networks
Quality of Service in Telecommunication Networks Åke Arvidsson, Ph.D. Ericsson Core Network Development, Sweden Main Message Traffic theory: QoS is (partly) about congestion. Congestion is partly caused
More informationIP Telephony - Quality-of-Service Aspects. Bruce Pettitt
IP Telephony - Quality-of-Service Aspects Bruce Pettitt Overview - QoS for IP Telephony Background QoS Concepts Impact of Packet Loss and Delay The QoS Challenge for IP Telephony Technology Solutions supporting
More informationCS 457 Multimedia Applications. Fall 2014
CS 457 Multimedia Applications Fall 2014 Topics Digital audio and video Sampling, quantizing, and compressing Multimedia applications Streaming audio and video for playback Live, interactive audio and
More informationDoes your Voice Quality Monitoring Measure Up?
Does your Voice Quality Monitoring Measure Up? Measure voice quality in real time Today s voice quality monitoring tools can give misleading results. This means that service providers are not getting a
More informationTeletraffic theory (for beginners)
Teletraffic theory (for beginners) samuli.aalto@hut.fi teletraf.ppt S-38.8 - The Principles of Telecommunications Technology - Fall 000 Contents Purpose of Teletraffic Theory Network level: switching principles
More informationAi-Chun Pang, Office Number: 417. Homework x 3 30% One mid-term exam (5/14) 40% One term project (proposal: 5/7) 30%
IP Telephony Instructor Ai-Chun Pang, acpang@csie.ntu.edu.tw Office Number: 417 Textbook Carrier Grade Voice over IP, D. Collins, McGraw-Hill, Second Edition, 2003. Requirements Homework x 3 30% One mid-term
More informationENSC 427 Communication Networks Spring 2010
ENSC 427 Communication Networks Spring 2010 Exploration of VoIP Using Ethernet and Wi-Fi Networks Under Different Scenarios Jeffrey Tam Luke Dang Jason Tsai http://www.sfu.ca/~kta2 Table of Contents List
More informationSIMULATION OF PACKET DATA NETWORKS USING OPNET
SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada
More informationAssessing Call Quality of VoIP and Data Traffic over Wireless LAN
Assessing Call Quality of VoIP and Data Traffic over Wireless LAN Wen-Tzu Chen and Chih-Yuan Lee Institute of Telecommunications Management, National Cheng Kung University, No. 1 University Road, Tainan
More informationData Networks. Lecture 1: Introduction. September 4, 2008
Data Networks Lecture 1: Introduction September 4, 2008 Slide 1 Learning Objectives Fundamental aspects of network Design and Analysis: Architecture: layering, topology design, switching mechanisms Protocols:
More informationAn Efficient Scheme to Increase the Throughput of VoIP Traffic over Satellite while Reducing Bandwidth Utilization
An Efficient Scheme to Increase the Throughput of VoIP Traffic over Satellite while Reducing Bandwidth Utilization Sayid Mohamed Abdule 1, Wan Tat Chee 1, Ahmed Mustafa 2 & Aisha Hassan 2 1 Network Research
More informationTraffic Behaviour of VoIP in a Simulated Access Network
Complete Citation: Das Gupta, Jishu and Howard, Srecko and Howard, Angela (2006). Traffic behaviour of VoIP in a simulated access network. International Transactions on Engineering, Computing and Technology,
More informationNext Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points
Next Steps Have: digital point-to-point We ve worked on link signaling, reliability, sharing Want: many interconnected points 6.02 Spring 2011 Lecture #18 multi-hop networks: design criteria network topologies
More informationCOMPUTER NETWORK Model Test Paper
Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.
More informationPerformance Analysis of Cell Switching Management Scheme in Wireless Packet Communications
Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical
More informationIP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
More informationProgress Report No. 3. A Case Study on Simulation Scenario
NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 3 A Case Study on Simulation Scenario The University of Canterbury Team 21 December 2005 Progress Report This report
More informationDigital Communication Networks
Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus
More informationA Real-Time Network Simulation Application for Multimedia over IP
A Real-Time Simulation Application for Multimedia over IP ABSTRACT This paper details a Secure Voice over IP (SVoIP) development tool, the Simulation Application (Netsim), which provides real-time network
More informationCommunications and Networking 1
Communications and Networking 1 ET4254 CS4225 CS5222 Lecturer: Dr. Kevin Murphy kevin.murphy@ul.ie Electronic & Computer Engineering Department, University of Limerick, Limerick 1 ET4254 - Communications
More informationChapter 1 Introduction
Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks
More informationENSC 427 COMMUNICATION NETWORKS
ENSC 427 COMMUNICATION NETWORKS Implementation of VoIP over a Campus Wide Network Spring 2010 FINAL PROJECT Xuan Lu Kevan Thompson Zhiyu Zhou http://www.sfu.ca/~zzhou/project.html xla9@sfu.ca kjthomps@sfu.ca
More informationOptical networking technology
1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the
More informationWhat Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control
Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit
More informationTransport Performance Evaluation of an ATM-based UMTS Access Network
Transport Performance Evaluation of an -based US Access Network Nikos H. Loukas, Christos K. Xenakis, Lazaros Merakos University of Athens, Department of Informatics, Communication Networks Laboratory
More informationChapter 5 VoIP. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March Multmedia Networking
Chapter 5 VoIP Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Multmedia Networking audio signal amplitude Multimedia: audio analog audio signal sampled
More informationIntroduction: Two motivating examples for the analytical approach
Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline
More informationIntroduction to Wireless Networking ECE 401WN Spring 2008
Introduction to Wireless Networking ECE 401WN Spring 2008 Lecture 2: Communication Networks The first major topic we will study will be WLANs. But before that, we need to consider a few basics of networking.
More informationInvestigation of Algorithms for VoIP Signaling
Journal of Electrical Engineering 4 (2016) 203-207 doi: 10.17265/2328-2223/2016.04.007 D DAVID PUBLISHING Todorka Georgieva 1, Ekaterina Dimitrova 2 and Slava Yordanova 3 1. Telecommunication Department,
More informationCSE3213 Computer Network I
CSE3213 Computer Network I Introduction Course page: http://www.cse.yorku.ca/course/3213 1 Course Contents 3 general areas: data communications, networking, and protocols 1. Data communications: basic
More informationNetwork Systems for Emerging WAN Applications
Network Systems for Emerging WAN Applications Hitachi Review Vol. 48 (1999), No. 4 169 Akihiko Takase, D.Sc. OVERVIEW: This paper describes wide-area-network architecture from the viewpoints of networking
More informationKey words: IP router, Differentiated services, QoS, Custom Queuing, Priority Queuing. 1. INTRODUCTION
OPNET Modeling of an IP Router with Scheduling Algorithms to Implement Differentiated Services Hiroshi Yamada NTT Service Integration Laboratories, Communication Traffic Project, Traffic Solution Group
More informationSIMULATION FRAMEWORK MODELING
CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion
More informationRead Chapter 4 of Kurose-Ross
CSE 422 Notes, Set 4 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures
More informationAgilent Technologies IP Telephony Reporter J5422A
Established 1981 Advanced Test Equipment Rentals www.atecorp.com 800-404-ATEC (2832) Agilent Technologies IP Telephony Reporter J5422A Product Overview Voice Quality 255 Interations 135.0 250 200 Clarity
More informationDiffServ Architecture: Impact of scheduling on QoS
DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics
More informationEliminating the Last Mile Bottleneck
Eliminating the Last Mile Bottleneck P. Michael Henderson michael.henderson@cox.net 1 Agenda Technology and Market Drivers Performance Requirements VoDSL System Architecture Closed Form Analysis Non-Closed
More informationMultimedia Networking
Multimedia Networking 1 Multimedia, Quality of Service (QoS): What is it? Multimedia applications: Network audio and video ( continuous media ) QoS Network provides application with level of performance
More informationMultimedia Networking
CE443 Computer Networks Multimedia Networking Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by
More informationReal-Time Protocol (RTP)
Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure
More informationCongestion control in TCP
Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed
More informationSupporting VBR VoIP Traffic in IEEE WLAN in PCF Mode
Supporting VBR VoIP Traffic in IEEE 802.11 WLAN in PCF Mode Dongyan Chen*, Sachin Garg**, Martin Kappes** and Kishor S. Trivedi* * Center for Advanced Computing and Communications, ECE Department Duke
More informationVoIP Dictionary, Glossary and Terminology
VoIP Dictionary, Glossary and Terminology The following provides a glossary of terms and definitions that are commonly used in VoIP Solutions. We hope this will provide a good reference for you during
More informationMultimedia Networking
CMPT765/408 08-1 Multimedia Networking 1 Overview Multimedia Networking The note is mainly based on Chapter 7, Computer Networking, A Top-Down Approach Featuring the Internet (4th edition), by J.F. Kurose
More informationAsynchronous Transfer Mode (ATM) ATM concepts
Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode (ATM) is a switching technique for telecommunication networks. It uses asynchronous time-division multiplexing,[1][2] and it encodes data into
More informationLecture 1 Overview - Data Communications, Data Networks, and the Internet
DATA AND COMPUTER COMMUNICATIONS Lecture 1 Overview - Data Communications, Data Networks, and the Internet Mei Yang Based on Lecture slides by William Stallings 1 OUTLINE Data Communications and Networking
More informationdifferent problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management
Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion
More informationThe difference between TTC JT-Y1221 and ITU-T Y.1221
The difference between TTC JT-Y1221 and ITU-T Y.1221 Traffic control and congestion control in IP based networks (The English Edition) Version 1.0 Published on March 27, 2013 THE TELECOMMUNICATION TECHNOLOGY
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationH.323. Definition. Overview. Topics
H.323 Definition H.323 is a standard that specifies the components, protocols and procedures that provide multimedia communication services real-time audio, video, and data communications over packet networks,
More informationData & Computer Communication
Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects
More informationComputer Networking. Queue Management and Quality of Service (QOS)
Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you
More informationSwitched Multimegabit Data Service
CHAPTER 14 Chapter Goals Tell how SMDS works, and describe its components. Describe the operational elements of the SMDS environment, and outline its underlying protocol. Discuss related technologies.
More informationSynopsis of Basic VoIP Concepts
APPENDIX B The Catalyst 4224 Access Gateway Switch (Catalyst 4224) provides Voice over IP (VoIP) gateway applications for a micro branch office. This chapter introduces some basic VoIP concepts. This chapter
More informationTHE TCP specification that specifies the first original
1 Median Filtering Simulation of Bursty Traffic Auc Fai Chan, John Leis Faculty of Engineering and Surveying University of Southern Queensland Toowoomba Queensland 4350 Abstract The estimation of Retransmission
More informationBLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS
BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Prof. Dr. Hasan Hüseyin BALIK (1 st Week) Outline Course Information and Policies Course Syllabus 1. Data Communications, Data Networks, and the Internet
More informationEnd-to-end UMTS Network Performance Modeling. 1. Introduction
End-to-end UMTS Network Performance Modeling Authors: David Houck*, Bong Ho Kim, Jae-Hyun Kim Lucent Technologies 101 Crawfords Corner Rd., Room 4L431 Holmdel, NJ 07733, USA Phone: +1 732 949 1290 Fax:
More informationVisualization of Internet Traffic Features
Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,
More informationBuffer Management for Self-Similar Network Traffic
Buffer Management for Self-Similar Network Traffic Faranz Amin Electrical Engineering and computer science Department Yazd University Yazd, Iran farnaz.amin@stu.yazd.ac.ir Kiarash Mizanian Electrical Engineering
More informationNetwork Management & Monitoring
Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end
More informationUNIT IV TRANSPORT LAYER
Transport Layer UNIT IV TRANSPORT LAYER Congestion Control and Quality of Service Ref: Data Communication & Networking, 4 th edition, Forouzan IV-1 DATA TRAFFIC The main focus of congestion control and
More informationMPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE
MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE Jamil Y. Khan 1, Pratik Das 2 School of Electrical Engineering and Computer Science, University of Newcastle, Callaghan, NSW 238,
More informationA Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,
More informationChapter 24 Congestion Control and Quality of Service 24.1
Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control
More informationVoice Quality Assessment for Mobile to SIP Call over Live 3G Network
Abstract 132 Voice Quality Assessment for Mobile to SIP Call over Live 3G Network G.Venkatakrishnan, I-H.Mkwawa and L.Sun Signal Processing and Multimedia Communications, University of Plymouth, Plymouth,
More informationSimulation-Based Performance Comparison of Queueing Disciplines for Differentiated Services Using OPNET
Simulation-Based Performance Comparison of Queueing Disciplines for Differentiated Services Using OPNET Hafiz M. Asif and El-Sayed M. El-Alfy College of Computer Science and Engineering King Fahd University
More informationResource Sharing for QoS in Agile All Photonic Networks
Resource Sharing for QoS in Agile All Photonic Networks Anton Vinokurov, Xiao Liu, Lorne G Mason Department of Electrical and Computer Engineering, McGill University, Montreal, Canada, H3A 2A7 E-mail:
More informationResource Guide Implementing QoS for WX/WXC Application Acceleration Platforms
Resource Guide Implementing QoS for WX/WXC Application Acceleration Platforms Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net Table
More informationJOURNAL OF HUMANITIE COLLEGE No ISSN:
JOURNAL OF HUMANITIE COLLEGE No. 7 2017 ISSN: 2226-0714 1 Journal of University College of Humanity Studies A Refereed Scientiefic Journal Pubilshed by The University College of Humanity Studies Republic
More informationPERFORMANCE ANALYSIS FOR GPRS WITH PRIORITIZED AND NON-PRIORITIZED MOBILITY MANAGEMENT PROCEDURES
PERFORMANCE ANALYSIS FOR GPRS WITH PRIORITIZED AND NON-PRIORITIZED MOBILITY MANAGEMENT PROCEDURES Karann Chew, Rahim Tafazolli University of Surrey, United Kingdom Abstract - GPRS is part of the evolution
More informationPerformance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks
Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,
More informationIntroduction to ATM Traffic Management on the Cisco 7200 Series Routers
CHAPTER 1 Introduction to ATM Traffic Management on the Cisco 7200 Series Routers In the latest generation of IP networks, with the growing implementation of Voice over IP (VoIP) and multimedia applications,
More informationMOS x and Voice Outage Rate in Wireless
MOS x and Voice Outage Rate in Wireless Communications Sayantan Choudhury, Niranjan Shetty, and Jerry D. Gibson Department of Electrical and Computer Engineering University of California, Santa Barbara
More informationQoS metrics and requirements
QoS metrics and requirements Lectured by Alexander Pyattaev Department of Communications Engineering Tampere University of Technology alexander.pyattaev@tut.fi March 5, 2012 Outline 1 Introduction 2 Performance
More informationData and Computer Communications
Data and Computer Communications CHAPTER 1 Tenth Edition by William Stallings Data Communications, Data Networks, and the Internet Data and Computer Communications, Tenth Edition by William Stallings,
More informationOn TCP friendliness of VOIP traffic
On TCP friendliness of VOIP traffic By Rashmi Parthasarathy WSU ID # 10975537 A report submitted in partial fulfillment of the requirements of CptS 555 Electrical Engineering and Computer Science Department
More information2. Modelling of telecommunication systems (part 1)
2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks
More informationTCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS
TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,
More informationIMPACT OF NON-VOICE APPLICATIONS ON THE TELEPHONE NETWORK
INTERNATIONAL TELECOMMUNICATION UNION CCITT E.301 THE INTERNATIONAL TELEGRAPH AND TELEPHONE CONSULTATIVE COMMITTEE (11/1988) SERIES E: OVERALL NETWORK OPERATION, TELEPHONE SERVICE, SERVICE OPERATION AND
More informationSwitched Multimegabit Data Service (SMDS)
CHAPTER 14 Switched Multimegabit Data Service (SMDS) Background Switched Multimegabit Data Service (SMDS) is a high-speed, packet-switched, datagram-based WAN networking technology used for communication
More informationPerformance Analysis of Voice Call using Skype
Abstract Performance Analysis of Voice Call using Skype L. Liu and L. Sun Centre for Security, Communications and Network Research Plymouth University, United Kingdom e-mail: info@cscan.org The purpose
More informationLatency on a Switched Ethernet Network
FAQ 07/2014 Latency on a Switched Ethernet Network RUGGEDCOM Ethernet Switches & Routers http://support.automation.siemens.com/ww/view/en/94772587 This entry is from the Siemens Industry Online Support.
More informationIntroduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15
Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay
More informationIP Network Emulation
Developing and Testing IP Products Under www.packetstorm.com 2017 PacketStorm Communications, Inc. PacketStorm is a trademark of PacketStorm Communications. Other brand and product names mentioned in this
More informationAssessing the Quality of Voice Communications Over Internet Backbones
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 5, OCTOBER 2003 747 Assessing the Quality of Voice Communications Over Internet Backbones Athina P. Markopoulou, Member, IEEE, Fouad A. Tobagi, Fellow,
More informationChapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP
Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY The transport
More informationCommunication Networks - 3 general areas: data communications, networking, protocols
Communication Networks - Overview CSE 3213 Fall 2011 1 7 September 2011 Course Content 3 general areas: data communications, networking, protocols 1. Data communications: basic concepts of digital communications
More informationPerformance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks
Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks P. Rajan Dr. K.L.Shanmuganathan Research Scholar Prof.
More informationZyXEL V120 Support Notes. ZyXEL V120. (V120 IP Attendant 1 Runtime License) Support Notes
ZyXEL V120 (V120 IP Attendant 1 Runtime License) Support Notes Version 1.00 April 2009 1 Contents Overview 1. Overview of V120 IP Attendant...3 2. Setting up the V120...4 3. Auto Provision...7 4. V120
More information