Performance evaluation of Voice over Internet Protocol
MetadataShow full item record
Voice over Internet Protocol (VoIP) was developed to emulate toll services with lower communication cost. In VoIP applications, voices are digitized and packetized into small blocks. These voice blocks are encapsulated in a sequence of voice packets using the Real-time Transport Protocol (RTP) and delivered by the User Datagram Protocol (UDP). To help VoIP applications deal with unpredictable network performance, the Real-time Transport Control Protocol (RTCP) is developed to monitor the performance of RTP packets and provide feedback to the VoIP applications. The feedback on packet delay, jitter, and loss rate enables the applications to adapt to network conditions to maintain a certain level of voice quality. With this architecture, the quality of service of VoIP relies on the effectiveness of the RTCP network performance report mechanism. This research collects RTCP performance reports from live traffic over real networks and compares their values with the statistics derived from direct measurements of RTP packets to evaluate the effectiveness of RTCP. The live experiments were conducted on networks resembling respectively, Local Area Network (LAN), Wide Area Network (WAN), campus network, and encrypted wireless LAN. Results from these experiments show that RTCP is effective for low delay networks but RTCP performance reports can be inaccurate for networks with large, volatile delays.
Approved for public release, distribution unlimited
Showing items related by title, author, creator and subject.
Rumelioglu, Sertac. (Monterey, California. Naval Postgraduate School, 2005-03);The performance aspect and security capabilities of the Embedded Firewall (EFW) system are studied in this thesis. EFW is a host-based, centrally controlled firewall system consisting of network interface cards and the ...
Wong, Eric Gregory Wen Wie (Monterey, California. Naval Postgraduate School, 2006-12);The security of a network depends on how its design fulfills the organization's security policy. One aspect of security is reachability: whether two hosts can communicate. Network designers and operators face a very ...
Shing, Leslie (Monterey, California: Naval Postgraduate School, 2016-03);Networks are constantly bombarded with malicious or suspicious network traffic by attackers attempting to execute their attack operations. One of the most prevalent types of traffic observed on the network is scanning ...