2009 International Conference on Computer Engineering and Technology

Internet Call Delay on Peer to Peer and Phone to Phone VoIP Network Kashif Nisar

Halabi Hasbullah, Abas Md Said

Department of Computer & Information Sciences, Universiti Teknologi PETRONAS, Bandar Seri Iskandar, 31750 Tronoh, Perak, Malaysia. [email protected]

Department of Computer & Information Sciences, Universiti Teknologi PETRONAS, Bandar Seri Iskandar, 31750 Tronoh, Perak, Malaysia. {halabi, abass}@petronas.com.my

Figure 1 represents the start point VoIP working process. The simple cases of two users are wishing to communicate using VoIP. Each user has a multimedia-capable personal computer with an appropriate client software application running on it [3]. Each is connected to a common IP network to provide simple data packet communications.

Abstract— VoIP (Voice over Internet Protocol) is a technology that enables the routing of voice conversations over any IPbased network such as the public Internet. Separate and distinct client, gateway and call control functions that ability to support Peer-to-Peer, PC-to-telephone, telephone-to-PC and telephone-to-telephone scenarios. During transmission, the traffic loading and other factors in the IP (Internet Protocol) network may cause packets to be lost. Three parameters emerge as the primary factors affecting voice quality within networks that offer VoIP technologies: clarity, end-to-end delay and echo delayed. The objective of this research is to check internet call delay over VoIP on Peer-to-Peer and telephone-to-telephone communication. The methodology used Sources of echo for test different type of call over VoIP. We used IPv4 (Internet Protocol Version 4), CISCO 3700 Series Router and telephone sets for experimentation. We checked QoS (Quality of Service) development on various sample signals. The tests were used templates varied in loudness, speech continuity, background noise and delay. We analyzed both male and female voices for results. Keywords: Delay, IPv4, Routing, VoIP

I.

Figure 1. VoIP Working Process [3]

This paper is structured as follows, first we present problem statement. Secondly, we present related work in calculation the delay utility of VoIP Applications. Thirdly, then we present research methodology secure of echo. Lastly we concluded our results.

INTRODUCTION

VoIP applications is source voice signal that first pocketsize then transmitted over an IP network. The network inevitably introduces some variation in the delay for each transmitted packet. That variation in delay is traditionally called jitter. NGN (Next Generation Networking) is a common term used for emerging computer network architectures and technologies. NGN can be thought of as a packet-based network where the packet switching and transport elements (e.g., routers, switches, and gateways) are logically and physically separated from the service/call control intelligence likewise VoIP.

A. Problem Statement There is Packet Loss, echo and jitter, during transmission in peer to peer and phone to phone VoIP network. The traffic loading and other factors in the IP network may cause packets to be lost, delayed.

It encompasses data, voice and video. It allows the continuation of existing network as well as inter-operability with the same network, it provides mobility. There are three elements such as clarity, end-to-end delay, and echo emerges as the primary factors affecting voice quality, particularly in the case of VoIP over internet [1]. VoIP systems for field communications need to be deployed quickly to minimize response time [2].

978-0-7695-3521-0/09 $25.00 © 2009 IEEE DOI 10.1109/ICCET.2009.258

As mobile terminals become more sophisticated, the (mobile) transitioning between networks owned by different provider’s mid-session (and the corresponding charging issue) has to be solved. Applications may demand certain levels of QoS from the network or, alternatively, may be capable of adapting to the prevailing conditions. The same service used on a different terminal, or transmitted over a different access network, will require different QoS values.

517

II.

control architecture is intended for use in systems which allow only one connection to an output port at any given time.

RELATED WORK

A. Measuring delay

A variety of connection styles, e.g. broadcast, multicast and conferencing, might be demanded by various users. Li et al. note that for configuring some of these services, a centralized system is preferable, whereas for other services, a distributed arrangement may be more clients. Their proposed scheme, using a commit-like protocol, is an attempt to get the best of both worlds. The role of the protocol is to keep the port allocation status information consistent in the various controllers.

VoIP systems can exhibit variable delay in fact the delay experienced by a user could vary considerably during a call. A single measurement is inadequate and it is therefore essential to perform a number of measurements of delay during each call and consider both the average delay and its range. A method of assessing delay for VoIP systems, defined in TIPHON [4], is the mean delay from at least 10 measurements or 90% of the largest delay measured, whichever is greatest. This delay measurement requires a test signal as shown in Figure 2.

III.

METHODOLOGY

This section presents a system model of echo delay, discusses two mathematical models of echo delay, and develops experimental set up for evaluating the effect of echo delay on voice quality. A. Sources of echo in VoIP There is no debate, due to echo increment with there level and delay in VoIP. This method has introduced by Richard Reynolds in the year 2001.Large amount of work has been conducted to determine the combined effects of talker echo with delay. Recommendations on its control are summarized in ITU-T G.131 [7].

Figure 2. Delay measurement test signal composition.

B. Atomic Broadcast

Echo cancellation is therefore likely to be needed in most VoIP systems. This is in contrast to the PSTN where echo cancellation is only necessary on long-haul connections. Short-delay echoes are rarely distinguished from sidetone unless either the round-trip delay exceeds 30 ms or the echo level is extremely high. For this reason echo cancellation is not required on short-haul PSTN connections, where roundtrip delays do not exceed 30 ms. However, round-trip delays of VoIP systems are unlikely to be less than 30 ms, ensuring that some form of echo cancellation is invariably required. If a VoIP system connects to a local PSTN, echo cancellation is probably needed to cancel the local hybrid reflections. If the system does not connect to a local PSTN, echo cancellation should still be included to remove any acoustic echo.

Atomic broadcast algorithm [5] has each site (end point nodes) accumulating received broadcast messages in a queue. When an application at one of the sites wants to consume a prefix of these messages, it initiates a threephase commit protocol in which the other sites vote according to whether they have received all messages up to and including that prefix. Message sequences are only consumed by the application if a quorum of sites confirms that message up to and including that sequence have been received. The advantage of this algorithm is that it controls the flow of protocol messages that request progress in the consumption of broadcast message streams. The protocol is designed to detect the situation where two or more sites have con- currently initiated the protocol. It can then combine the voting of the hitherto separate protocol executions. C. Network Control for Mixed Traffic Li et al. have proposed the deployment of a commit style protocol in network management in order to facilitate connection setup in switching systems supporting mixed circuit and packet connections for broadband service [6]. This is part of a control architecture that provides client connection setup in a switching system that supports mixed circuit and packet connections for broadband services. Their

Figure 3. Secure of echo [7]

518

IV.

The delay introduced by packetising the speech and removing network jitter, result in delays long enough to make the system susceptible to echo problems.

RESULTS

Figure 4 shows the results of the test. We used Micro Soft NetMeeting for PC-to-Phone calls. We used two analog phones for analyzed delay in VoIP. We found there was delay in both communication PC-to-PC and Phone-to-Phone conversation over VoIP network.

B. E-Model E-model is a parameter based algorithm based on 20 parameters related to terminal factor, environment factor, Network factor and so on and result is calculated to Rating Value [8]. The most common model for mapping network conditions to user-perceived utility for voice applications is the E- model [9]. The E-model [10] predicts the subjective quality of al telephone call based on its characterizing transmission parameters.

Figure 4. Net Meeting Peer to Phone.

Figure 5 shown the result of IP configuration of PC-to-PC and Phone-to-Phone setup over CISCO routers. We used IPv4: 10.20.20.1 and 199.6.13.1 for session target and destination – pattern (Local Phone Number) 5561002 on NetMeeting that support for the H.323 audio and video conferencing standard. By examining results of our experiments we have found that delay in VoIP effect on voice quality.

Figure 4. E- model [10]

The quality of a telephone call cannot be judged by the speech quality alone. The ITU E-Model [11] additionally considers end-to-end delay, echoes, side-tones and other factoers to calculate the so called R-factor. A higher R=factor quality of telephone calls. Table 1 shows the abbreviation of E-Model. Table 1. E-Model Details

Small Form RLR: STMR: TELR: WEPL: T: Ta: Tr:

Abbreviation Receive Loudness Rating Side tone Masking Rating Talker Echo Loudness Rating Weight Echo Path Loss Mean one-way delay of the echo path Absolute delay in echo free connections Absolute delay in a 4-wire loop

This paper concentrates on VoIP device and delay performance while reflecting on the impact of network performance parameters such as echo and jitter.

Figure 5. CRT used phone to phone Call on internet

519

V.

CONCLUSION

This paper we have proposed internet call delay over VoIP Network in different scenarios. We investigated end-to-end delay in VoIP over internet. The primary goal of this work is to study the effect of delay on VoIP performance while the benefits of VoIP technologies may be apparent, there are currently a number of fundamental. The tests were used templates varied in speech continuity, background noise and delay. We analyzed both male and female voices for result. We have found that delay in VoIP over internet communication. Technical challenges that remain to be solved within the industry, specially delay in VoIP. These mainly centre upon the provision of applications in anything other than a purely best effort environment. VI.

REFERENCES

[1] S. Na and S. Yoo, “Allowable Propagation Delay for VoIP Calls of Acceptable Quality” pp. 47-55, 2002 [2] E. Stehle, M. Shevertalov, P. De, S. Mancoridis, and M. Kam “Task Dependency of User Perceived Utility in Autonomic VoIP Systems” pp. 248-254, 2008 [3]. Guerin, R., Ahmadi, H., Naghshineh, M.”Equivalent capacity and its application to bandwidth allocation in high-speed networks”. IEEE JSAC., vol. 9, no. 7, pp. 968-981, Sep. 1991. [4] ETSI TIPHON: ‘Technology compliance specification; part 5: quality 28 service (QoS) measurement methodologies’, TS 101-329-5 November 2000. [5] S. Luan and V.D. Gligor. A fault-tolerant protocol for atomic broadcast. IEEE Transactions on Parallel and Distributed Systems, 1(3):271 285, July 1990. [6] C.-S. Li, C.J. Georgiou, and K.W. Lee. A hybrid multilevel control scheme for supporting mixed tra_c in broadband networks. IEEE Journal on Selected Areas in Communications, 14(2):306 316, February 1996. [7] ITU-T Recommendation G.131: ‘Control of talker echo’, August 1996 [8]

ITU-T, Recommendation G. 107 “The E-model, a computational model for use in transmission Planning” Mar. 2005

[9] N.O. Johannession “The ETSI Computation Model: A Tool for Transmission Planning of Telephone Networks” Communication magazine, IEEE, vol.35, no.lpp.70-79, Jan 1997 [10] J. Janssen, D. De, G. Pett, R. Windey and J. Marie “ Delay Bounds for Voice over IP Calls Transported over Satellite Access Networks” Mobile Network and Application 7, pp. 79-89, 2002 [11]

Hoene, S. Wietholter, and A. Wolisz “Predicting the Perceptual Service Quality Using a Trace of VoIP Packets” pp. 21-30, 2004

520

Internet Call Delay on Peer to Peer and Phone to Phone VoIP ...

Internet Call Delay on Peer to Peer and Phone to Phone VoIP Network.pdf. Internet Call Delay on Peer to Peer and Phone to Phone VoIP Network.pdf. Open.

251KB Sizes 1 Downloads 198 Views

Recommend Documents

Network Forensic on Encrypted Peer-to-Peer VoIP ...
(VoIP) application evolving quickly since its launch in 2003. However, the ability to traverse ..... Open source voip traffic monitoring. In SANE 2006,. May 2006.

Peer-to-Peer Internet Telephony using SIP
the users in the domain register their IP addresses with the server so that the other users .... Skype [12] is a free P2P application based on Kazaa [9] architecture that ..... node then computes the key on Alice's name and sends a SIP REGISTER ...

Peer-to-Peer Internet Telephony using SIP - Semantic Scholar
SIP architecture supports basic user registration and call setup as well as advanced .... recommendation H.323 [3] typically employ a registration server for every domain. .... In a way, the Skype architecture is no different from the classical SIP .

Cheap Linksys Pap2T-Na Sip Voip Phone Adapter Voip Phone ...
Cheap Linksys Pap2T-Na Sip Voip Phone Adapter Voip ... hout Retail Box Free Shipping & Wholesale Price.pdf. Cheap Linksys Pap2T-Na Sip Voip Phone ...

An Experimental Study of the Skype Peer-to-Peer VoIP ... - IPTPS'06
1. #1. ▷ NAT Traversal in Skype: ▻ Level 0: Initiator NAT'ed. ▻ Level 1: .... 1. #2. ▷ Rough estimate: (just network, not CPU). ▻ ~1–2 GBps median relay-traffic.

From Peer-to-Peer Networks to Cloud.pdf
Follow this and additional works at: http://digitalcommons.pace.edu/lawfaculty. Part of the Computer Law Commons, Criminal Law Commons, Internet Law ...

Method and apparatus for facilitating peer-to-peer application ...
Dec 9, 2005 - microprocessor and memory for storing the code that deter mines what services and ..... identi?er such as an email address. The person making the ..... responsive to the service request from the ?rst application received by the ...

Leeching Bataille: peer-to-peer potlatch and the ...
with conceptualising the actual practice of gifting and how it can best be understood in relation to ... These effects can no longer be restricted to their online aspect. ..... This is a description of a noble and valuable social practice: “filesha

Method and apparatus for facilitating peer-to-peer application ...
Dec 9, 2005 - view.html on Nov. 23, 2005. ...... to add additional or more complex translation rules to those used in the ..... identi?er such as an email address.

Identifying Known and Unknown Peer-to-Peer Traffic
of many hosts acting both as servers and clients. ... The idea is that in some P2P networks each host chooses ... network diameter by measuring the host's level.

Ant-inspired Query Routing Performance in Dynamic Peer-to-Peer ...
Faculty of Computer and Information Science,. Tržaška 25, Ljubljana 1000, ... metrics in Section 3. Further,. Section 4 presents the course of simulations in a range of .... more, the query is flooded and thus finds the new best path. 3.2. Metrics.

Towards Yet Another Peer-to-Peer Simulator
The cost of implementation is less than that of a large-scale ..... steep, rigid simulation architecture that made extension difficult and software or hardware system ... for the simulation life cycle, the underlying topology and the routing of ...

A Blueprint Discovery of Hybrid Peer To Peer Systems - IJRIT
unstructured peer to peer system in which peers are connected by a illogical ... new hybrid peer to peer system for distributed data sharing which joins the benefits ..... [2] Haiying (Helen) Shen, “IRM: Integrated File Replication and Consistency 

ID SERVER STREAMING USING PEER TO PEER ... - Semantic Scholar
Also, by caching the requests at the clients, better content distribution of data is possible. For example, let us ... a smooth delivery of data. Different .... server partition will not have strict real time requirements and can be updated depending

Building Low-Diameter Peer-to-Peer Networks
build P2P networks in a distributed fashion, and prove that it results in ...... A Measurement. Study of Peer-to-Peer File Sharing Systems, in Proceedings.

Viability of Microsoft Peer-to-Peer Framework for ...
One example of this is Windows Mobile Smartphone devices support an email channel to allow them to communicate using the simple data services provided ...

June 2014 Peer-to-Peer Webinars.pdf
... level emergency pre- paredness site reviewer, has co-authored a hospital evacuation course for the Federal Emergency Management Agency (FEMA), and is.

Simple Efficient Load Balancing Algorithms for Peer-to-Peer Systems
A core problem in peer to peer systems is the distribu- tion of items to be stored or computations to be car- ried out to the nodes that make up the system. A par-.