Monday, April 1, 2019

Analysis of Quality Services in VoIP

Analysis of tincture work in VoIPChapter 1INTRODUCTION dry land to ResearchDue to the Innovative changes in phone devices and related technologies human race wide, the meter has come to analysis the shade in headphone devices and take into account improved versions of communication channels. Lo rallyy the mechanismation of telephony renovation is s likewiselting summationd umpteen new organizations be setting up their resources to wangle this system and its facilities useable to the users. The query in the ring industries is in pass on since last umteen years shown a great improvement in all all over the world. Previously this telephony good employ PSTN 3 which uses 54 kbps channel forthwith after the improvement and change in the technology this telephonic swear out shifted to internet protocol. As cyberspace is a wide use medium for information receiving and transfer. Now this new technology becomes verbalise over IP.The concept of VoIP ( vitrine over meshing communications protocol) 4 originated in just just about 1994, when hobbyists began to sleep together the potential of s barricadeing region info computer softwargons over the entanglement kind of than communicating by pattern telephone service. This allows PC users to avoid want distance charges, and it was in 1994 that the first Internet Phone Softw atomic number 18 appe ard. eyepatch contemporary VoIP uses a magazineworn telephone hooked up to an Internet radio link. Previous efforts in the history of VoIP need both callers to curb a calculating machine equipped with the same software, as well as a choke card and microphone. These early natural coverings of VoIP were marked by low-down sound quality and connectivity, but it was a sign that VoIP technology was useful and promising. The phylogeny of VoIP go byred in close a close to(prenominal) years, gradually reaching the point where few small companies were able to offer PC to phone service in about 1998. Phone to phone service soon followed, although it was oftentimes needed to use a reckoner to establish the connection. Like many Internet exercises in the late 1990s, early VoIP service relied on advertising sponsorship to fill outsidise costs, rather than by charging customers for calls. The gradual introduction of wideband Ethernet service allowed for greater call clarity and annuld latency, although calls were still often marred by static or difficulty making connections amid the Internet and PSTN ( everyday telephone net change by reversals). as yet, startup VoIP companies were able to offer free calling service to customers from extra localisation principles.The break by authority of in VoIP history 9 came when hardware manufacturers such(prenominal)(prenominal) as cisco Systems and Nortel started producing VoIP equipment that was capable of switching which means that functions that previously had been handled by a telephony service now implement in c omputers CPU and ordain work as switching a role data software program into whatsoeverthing that could be read by the PSTN (and vice versa) could now be done by another device, thus making VoIP hard ware little computer dependent. Once hardware started becoming much affordable, larger companies were able to implement VoIP on their internal IP ne dickensrks, and long distance housers even began routing some of the calls on their cyberspaces over the Internet. Usage of VoIP has expanded from the year 2000, dramatically. Different technical foul standards for VoIP data packet transfer and switching and each is supported by at least one major manufacturer no lick winner has yet emerged to adopt the role of a universal standard. Whereas companies often switch to VoIP to save on both long distance and floor costs, VoIP service has overly been extended to residential users. In the Span of few years, VoIP has gone from be a fringe development to a mainstream selection to stand ard telephone service.At present in that respect are cardinal standards that are in use for VoIP switching and gateways imbibe and H.323. SIP 7 in the first place relates to end-user IP Telephony applications, while H.323 is a new ITU standard for routing between the circuit-switched and packet-switched worlds apply for termination of an IP originated call on the PSTN, but the talk about is overly becoming parking lot at a very fast rate. As the technology getting advanced and many improvements have been employ in making sure to maintain the quality of go and data over the internet should be maintained. The main purpose of this dissertation is to hash out the techniques to maintain the quality of VoIP and the role of protocols in VoIP which are H.323 and SIP landing field of ResearchThe area of research focuses on Study and Analysis of Quality servicings in VoIP and the discussion of Role of H.323 and SIP 7 Protocols. Many techniques and numeric models have been devel oped and implemented. As a matter of fact this thesis is not intended to turn in any new model or strategy for improving Quality services in VoIP but to get the picture base on the standard matrix of heartbeatment of QoS of VoIP alike MOS 10.Analysis of Quality wait ons of VoIPDue to the emerging and advancements in the telecommunication making All-IP integrated communicating basis capable to support applications and services with diverse needs and requirements. During the last few years a manage of attention is given to delivering vocalise dealings over both the public internet and corporate Intranets. IP Telephony, or VoIP, does not only append more advanced services ( warning personalized call forwarding, instant pass etc) than PSTN, but it also aims to get to the same level of QoS and reliability 1,2. As opposed to PSTN, VoIP utilizes one common net profit for signaling and voice manoeuvre and thus enjoys several advantages with respect to the telephony services t hat are through All-IP communicates infrastructures. The approximately important factors that influence the adoption of VoIP allow improved intercommunicate utilization by use advanced voice CODECS that compress the voice samples below 54 Kbps, possibilities to offer value added services(i.e. instant message, personalized call forwarding etc.) just to mention a few. In VoIP world many Quality impairments 34 introduced today by the Internet, it is important to add mechanism in hostel to measure the level of quality that is actually provided today in the internet to interactive multimedia system applications. That is, to measure how extensive are the issue, the withstand and deferral jitter impairments and how bad their concern on the perceived QoS, 3 is. There are a large subjugate of methods proposed and some of them standardized which monitor the falsify signal and provide a rating that correlates well with voice quality. The intimately important parameters that affe ct the VoIP Quality are the side by side(p)CODECS profit piece of land blemishJitterLatencyDemonstration Methodology SimulationThe OPNET Simulation is use during aforesaid research work 12 and is a very powerful communicate simulator. Main purposes are to optimize cost, surgical process and availability. The following tasks are considered hold and analyze models.Configure the object palette with the needed models.Set up application and profile configurations.Model a LAN as a single customer.Specify background service utilization that changes over a time on a link.Simulate dual scenarios simultaneously.Apply tense to graphs of results and analyze the results.Role and Analysis of H.323 SIP ProtocolsBased on the research works that has been done so far, this part of the thesis will discuss and elaborate the H.323 and SIP 7 protocols and a comparative analysis of these ii protocols based on their specification will discuss in detail in the next chaptersResults and ConclusionsT he final conclusion of the simulation results will be shown and a comparative analysis of different CODECS with their writ of executions from the simulated results and Role of H.323 and SIP protocols will be discussed.Chapter 2VoIP and Quality of go accounting entryIn bygone traditional technology, telephone calls are carried through Public Switched anticipate net profits (PSTN), which provides high-quality voice expresstance between two or more parties. Whereas the lawsuit of data such as email, web browsing etc. are carried over packet-based data communicates like IP, ATM and Frame Relay. In the last few years, there has been a rapid shift towards use data net profits to turn back both the telephone calls and the data together. This so called convergence of voice and data networks is very appealing due to many considerations. VoIP systems digitize and impart latitude voice signals as a stream of packets over a digital data network.VoIP technology insures proper recon struction of voice signals, compensating for echoes due to the end-to-end encumber, for jitter and for dropped packets and for signaling required for making telephone calls. The IP network used to support IP telephony arse be a standard LAN, a network of leased facilities or the Internet. VoIP calls brush aside be do or received using standard analog, digital and IP phones. VoIP gateways dress as a bridge between the PSTN and the IP network 9. A call can be placed over the local anaesthetic PSTN network to the closest gateway server, which moves it onto the Internet for transport to a gateway at the receiving end. With the use of VoIP gateways, computer-to-telephone calls, telephone-to-computer calls and telephone-to-telephone calls can be made with ease.Access to a local VoIP gateway for originating calls can also be supported in a variety of ways. For example, a corporate PBX (Private Branch Exchange) can be tack so that all international direct dialed calls are transpar ently routed to the nearest gateway. High-cost calls are automatically supported by VoIP to obtain the lowest cost. To look into interoperability between different VoIP manufacturers, VoIP equipment must follow agreed upon procedures for setting up and incorporateling the telephone calls. H.323 is one such family of standards that define various options for voice (and video) compression and call control for VoIP. Other calls setup and control protocols being utilized, and or being standardized acknowledge SIP, MGCP 27, and Megaco. IP Telephony goes beyond VoIP transport and defines several value added business and consumer applications for converged voice and data networks. Examples include Unified Messaging, Internet Call Center, Presence Management, Location Based Services etc.During the last few years, the voice over data network services have gained increased popularity. Quick growth of the Internet Protocol (IP) based networks, especially the Internet, has directed a lot of interest towards juncture over IP (VoIP). The VoIP technology has been used in some cases, to supersede traditional long-distance telephone technology, for reduced costs for the end-user. Naturally to bemuse VoIP infrastructure and services commercially viable, the Quality of Service (QoS) needs to be at least close to the one provided by the Public Switched Telephone vane (PSTN). On the other side, VoIP associated technology will bring to the end user value added services that are currently not available in PSTN.VoIP and QoSIn the networks of packet switching, the trade engineering term is shorten as (QoS) or Quality of Service 3, 4, which refers to resource reservation control mechanisms instead of it, is to be understood as achieved service quality. Quality of Service (QoS). This Quality of services guarantees are important for the contain cogency network, for example in cellular data communication, especially for real-time streaming multimedia applications, for example vo ice over IP and IP-TV 4. Quality of Service whitethorn or may not be agreed by web or protocols and software and reserve capacity in the network inspissations, for example during a academic term establishment phase. But in the entire the achieved level of exercise, for example the data rate and rest, and priorities in the network nodes. The reserved capacity might be released during a tear down phase. Quality of Service does not supported by the Best Effort network Service. The ITU standard X.902 as defined the QoS quality requirements on the collective behavior.The Quality of Service on all the aspects of a connection, such as guaranteed time to provide service, voice quality 3, echo, loss, reliability and so on. Grade of Service term, with many alternative definitions, rather than referring to the ability to reserve resources.The convergence of communications and computer networks has led to a rapid growth in real-time applications, such as Internet Telephony or Voice over I P (VoIP). However, IP networks are not designed to support real-time applications and factors such as network slow up, jitter and packet loss lead to deterioration in the perceived voice quality. In this chapter, abbreviated background information about VoIP networks which is relevant to the thesis is summarized. The VoIP network, protocol and system structure along with the brief over view of the QoS of VoIP 4 are described in this chapter. Voice steganography technology and main Codecs also discussed in the thesis (i.e. G.729, G.723.1)8 are discussed. Network capital punishment characteristics (e.g. packet loss and delay/delay variation) are also presented in next sections.ProblemIn past years when the Internet was first deployed, it lacked the ability to provide Quality of Service guarantees due to limits in router computing power. It is therefore run at default QoS level, or beat effort. The Technical Factors includes reliability, scalability, pictureiveness, maintainabili ty, Grade of Service, etc.Dropped packetsDelayJitterOut-of-order deliveryErrorQoS implementQuality of Service (QoS) 8 can be provided by generously over-provisioning a network so that interior links are considerably speedy than entryway links. This ascend is relatively simple, and may be economically workable for broadband networks with predictable and light trade loads. The performance is reasonable for many applications, particularly those capable of tolerating high jitter, such as deeply-buffered video downloads.commercially involved VoIP services are often competitive with traditional telephone service in terms of call quality even though QoS mechanisms are usually not in use on the users connection to his ISP and the VoIP providers connection to a different ISP. In high load conditions, however, VoIP quality degrades to cell-phone quality or worse. The mathematics of packet traffic indicates that a network with QoS can handle four times as many calls with pissed jitter re quirements as one without QoS. The standard of over-provisioning in interior links required to replace QoS depends on the number of users and their traffic demands. As the Internet now services close to a billion users, there is little misadventure that over-provisioning can eliminate the need for QoS when VoIP 8 becomes more commonplace. For narrowband networks more typical of enterprises and local governments, however, the costs of bandwidth can be substantial and over provisioning is hard to justify. In these situations, two distinctly different philosophies were developed to engineer preferential manipulation for packets which require it.Early work used the IntServ philosophy of reserving network resources. In this model, applications used the Resource reservation protocol (RSVP) to request and reserve resources through a network. While IntServ mechanisms do work, it was realized that in a broadband network typical of a larger service provider, Core routers would be required to accept, maintain, and tear down thousands or possibly tens of thousands of reservations. It was believed that this blast would not scale with the growth of the Internet, and in any event was antithetical to the model of designing networks so that Core routers do little more than obviously switch packets at the highest possible rates.The second and currently accepted cuddle is DiffServ or differentiated services. In the DiffServ model, packets are marked according to the type of service they need. In response to these markings, routers and switches use various queuing strategies to tailor performance to requirements. (At the IP layer, differentiated services code point (DSCP) markings use the 5 bits in the IP packet header. At the MAC layer, VLAN IEEE 802.1Q and IEEE 802.1D can be used to carry essentially the same information). Routers supporting DiffServ use multiple waiting lines for packets awaiting transmission from bandwidth constrained (e.g., wide area) interfaces. Rou ter vendors provide different capabilities for configuring this behavior, to include the number of queues supported, the relative priorities of queues, and bandwidth reserved for each queue.VoIP NetworksVoIP Networks ConnectionsCommon VoIP network connections normally include the connection from phone to phone, phone to PC (IP Terminal or H.323/SIP Terminal 25) or PC to PC, as shown in Figure 2.1. The Switched discourse Network (SCN) can be a wired or radio set network, such as PSTN, ISDN or GSM.Perceived QoS or User-perceived QoS is defined as end-to-end or mouth to ear, as the Quality perceived by the end user. It depends on the quality of the gateway (G/W) or H.323/SIP end point and IP network performance. The latter is normally referred to as Network QoS, as illustrated in Figure 2.1. As IP network is based on the best effort principle which means that the network makes no guarantees about packet loss rates, delays and jitter, the perceived voice quality will beat from these impairments (e.g. loss, jitter and delay).There are currently two approaches to enhance QoS for VoIP applications. The first approach relies on application-level QoS mechanisms as discussed previously to improve perceived QoS without making changes to the network infrastructure. For example, different compensation strategies for packet loss (e.g. Forward Error study (FEC)) and jitter have been proposed to improve row quality even under poor network conditions. The second approach relies on the network-level QoS mechanism and the emphasis is on how to guarantee IP Network performance in order to achieve the required Network QoS. For example, IETF is working on two QoS frameworks, namely DiffServ (the secern Services) and IntServ (the Integrated Services) to support QoS in the Internet. IntServ uses the per-flow approach to provide guarantees to individual streams and is assort as a flow-based resource reservation mechanism where packets are categorize and scheduled according to their flow affiliation. DiffServ provides aggregate assurances for a group of applications and is sort as a packet-oriented classification mechanism for different QoS classes. Each packet is classified individually based on its precession.VoIP Protocol architectureVoice over IP (VoIP) is the transmission of voice over network using the Internet Protocol. Here, we introduce briefly the VoIP protocol architecture, which is illustrated in Figure 2.2. The Protocols that provide basic transport (RTP 3), call-setup signaling (H.323 7, SIP 8) and QoS feedback (Rtransmission control protocol 4) are shown.VoIP System ArchitectureFigure 2.3 shows a basic VoIP system (signaling part is not included), which consists of troika parts the sender, the IP networks and the receiver 13. At the sender, the voice stream from the voice source is first digitized and compressed by the encoder. Then, several coded speech frames are packetized to form the payload part of a packet (e.g. RTP packet). The headers (e.g. IP/UDP/RTP) are added to the payload and form a packet which is sent to IP networks. The packet may suffer different network impairments (e.g. packet loss, delay and jitter) in IP networks. At the receiver, the packet headers are stripped off and speech frames are extracted from the payload by depacketizer. Play out buffer is used to adjust for network jitter at the cost of further delay (buffer delay) and loss (late arrival loss). The de-jittered speech frames are decoded to recover speech with lost frames obscure (e.g. using interpolation) from previous received speech frames.Chapter 3Analysis of QoS ParametersIntroductionA Number of QoS 11 of parameters can be mensural and monitored to determine whether a service level offered or received is being achieved. These parameters consist of the followingNetwork availabilityBandwidthDelayJitterLossNetwork AvailabilityNetwork availability can have a significant effect on QoS. Simply put, if the network is unavailable, ev en during brief periods of time, the user or application may achieve unpredictable or undesirable performance (QoS) 11. Network availability is the summation of the availability of many items that are used to earn a network. These include network device redundancy, e.g. redundant interfaces, processor card game or power supplies in routers and switches, resilient networking protocols, multiple natural connections, e.g. graphic symbol or copper, backup power sources etc. Network operators can increase their networks availability by implementing varying degrees of each item.BandwidthBandwidth is probably the second to the highest degree significant parameters that affect QoS. Its allocation can be subdivided in two typesAvailable bandwidthGuaranteed bandwidthAvailable bandwidthMany Networks operators oversubscribe the bandwidth on their network to maximize the flow on investment of their network infrastructure or leased bandwidth. Oversubscribing bandwidth means the BW a user is s ubscribed to be no continuously available to them. This allows users to compete for available BW. They get more or less BW depending upon the amount of traffic form other users on the network at any given time. Available bandwidth is a technique commonly used over consumer ADSL networks, e.g., a customer signs up for a 384-kbps service that provides no QoS (BW) guarantee in the SLA. The SLA points out that the 384-kbps is typical but does not make any guarantees. Under lightly loaded conditions, the user may achieve 384-kbps but upon network loading, this BW will not be achieved consistently. This is most noticeable during certain times of the day when more users access the network.Guaranteed bandwidthNetwork operators offer a service that provides minimum BW and destroy BW in the SLA. Because the BW is guaranteed the service is prices higher(prenominal) than the available BW service. The network operator must ensure that those who subscribe to this guaranteed BW service get pref erential treatment (QoS BW guarantee) 2425 over the available BW endorsers. In some cases, the network operator separates the subscribers by different visible or logical networks, e.g., VLANs, Virtual Circuits, etc. In some cases, the guaranteed BW service traffic may share the same network infrastructure with available BW service traffic. This is often the case at location where network connections are expensive or the bandwidth is leased from another service provider. When subscribers share the same network infrastructure, the network operators must prioritize the guaranteed the BW subscribers traffic over the available BW subscribers traffic so that in times of networks congestion the guaranteed BW subscribers SLAs are met. Burst BW can be specified in terms of amount and duration of supernumerary BW (burst) above the guaranteed minimum. QoS mechanism may be activated to convulse traffic that use consistently above the guaranteed minimum BW that the subscriber agreed to in th e SLA.DelayNetwork delay is the transit time an application experiences from the ingress point to the egress point of the network. Delay can cause significant QoS issues with application such as SNA and fax transmission that simply time-out and final under excessive delay conditions. somewhat applications can compensate for small amounts of delay but once a certain amount is exceeded, the QoS becomes compromised.For example some networking equipment can spoof an SNA session on a host by providing local acknowledgements when the network delay would cause the SNA session to time out. Similarly, VoIP gateways and phones provide some local buffering to compensate for network delay. Finally delay can be both better and variables. Examples of stiff delay areApplication based delay, e.g., voice codec touch time and IP packet creation time by the transmission control protocol/IP software stack 32 38.Data transmission (queuing delay) over the fleshly network media at each network hop. P ropagation delay across the network based on transmission distanceExamples of variable delays areIngress queuing delay for traffic entering a network nodeContention with other traffic at each network nodeEgress queuing delay for traffic exiting a network nodeJitterJitter is the measure of delay variation between consecutive packets for a given traffic flow. Jitter has a pronounced effect on real time delay elegant applications such as voice and video. These real time applications conceptualize to receive packets at a fairly constant rate with fixed delay between consecutive packets. As the arrival rates increases, the jitter impacts the applications performance 22 27. A minimal amount of jitter may be acceptable, but as jitter increases the application may become unusable. some applications, such as voice gateways and IP phones, 35 can compensate for small amounts of jitter. Since a voice application requires the audio to play out at constant rate, in the next packet time, the a pplication will replay the previous voice packets until the next voice packet arrives. However if the next packet is delayed too long it is simply toss out when it arrives resulting in a small amount of distorted audio. All networks introduce some jitter because of variability in delay introduced by each network node as packets are queues. However as long as the jitter is bounded, QoS can be maintained.LossLoss can occur due to errors introduced by the physical transmission medium. For example, most landline connections have very low loss as measured in the Bit Error Rate. However, wireless connections such as satellite, mobiles or fixed wireless networks have a high BER that varies due to surround or geographical conditions such as fog, rain, and RF interference, cell handoff during roaming and physical obstacles such as trees, building and mountain 2425. Wireless technologies often transmit redundant information since packets will inherently get dropped some of the time due to th e nature of the transmission medium.Loss can also occur when congested network nodes drop packets. Some networking protocols such as transmission control protocol (Transmission Control Protocol) offer packets loss protection by retransmitting packets that may have been dropped or corrupted by the network. When a network becomes increasingly congested, more packets are dropped and hence more TCP transmission. If congestion continues the network performance will significantly decrease because much of the BW is being used to retransmit dropped packets. TCP will eventually reduce its transmission windowpane size, resulting in smaller packets being transmitted this eventually will reduce congestion, resulting in fewer packets being dropped. Because congestion has a direct impact on packet loss, congestion avoidance mechanism is often deployed. genius such mechanism is called Random EARLY Discard ( trigger-happy). RED algorithms haphazardly and intentionally drop packets once the traffi c reaches one or more piece threshold. RED takes advantage of the TCP protocols window size cumber feature and provides more efficient congestion management for TCP-based flows. Note that RED only provides effective congestion control for application or protocols with TCP like throttling mechanismEmission prioritiesDetermine the order in which traffic is forwarded as it exits a network node. Traffic with higher venting precedence is forwarded a head of traffic with a scorn emanation priority. Emission priorities also determine the amount of latency introduced to the traffic by the network nodes queuing mechanism. For example, delay-tolerant application such as email would be configured to have a lower emission priority than delay sensitive real time applications such as voice or video. These delay tolerant applications may be buffered while the delay sensitive applications are being transmitted.In its simplest of forms, emission priorities use a simple transmit priority scheme whereby higher emission priority traffic is eer forwarded ahead of lower emission priority traffic. This is typically accomplished using strict priority scheduling (queuing) the downside of this approach is that low emission priority queues may never get services (starved) it there is always higher emission priority traffic with no BW rate limiting.A more elaborate scheme provides a weighted scheduling approach to the transmission of the traffic to improve fairness, i.e., the lower emission priority traffic is transmitted. Finally, some emission priority schemes provide a mixture of both priority and weighted schedulers.Discarded prioritiesAre used to determine the order in which traffic gets ostraciseed. The traffic may get dropped due to network node congestion or when the traffic is out of profile, i.e., the traffic exceeds its plus amount of BW for some period of time. Under congestion, traffic with a higher discard priority gets dropped before traffic with a lower discard p riority. Traffic with similar QoS performance can be sub divided using discard priorities. This allows the traffic to receive the same performance when the network node is not congested. However, when the network node is congested, the discard priority is used to drop the more eligible traffic first. Discard priorities also allow traffic with the same emission priority to be discarded when the traffic is out of profile. With out discard priorities traffic would need to be separated into different queues in a network node to provide service differentiation. This can be expensive since only a limited number of hardware queues (typically eight or less) are available on networking devices. Some devices may have software based queues but as these are increasingly used, network node performance is typically reduced.With discard priorities, traffic can be placed in the same queue but in effect the queue is sub divided into realistic queues, each with a different discard priority. For exam ple if a mathematical product supports three discard priorities, then one hardware queues in effect provides three QoS Levels.Table 3.1 illustrates the QoS performance dimensions required by some common applications. Applications can have very different QoS requirements. As these are complicated over a common IP transport network, without applying QoS the network traffic will experience unpredictable behavior 2225.Categorizing ApplicationsNetworked applications can be reason based on end user expectations or application requirements. Some applications are between people while other applications are a person and a networked device application, e.g., a PC and web server. Finally, some networking devices, e.g., router-to-router. Table 3.2 categorizes applications into four different traffic categoriesInteractiveResponsive well-timed(a)Network ControlInteractive applicationsSome applications are interactive whereby two or more people actively participate. The participants expect the networked applications to respond in real time. In this context real time means that there is minimal delay (latency) and delay variations (jitter) between the sender an

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.