SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013


  The Affects of Different Queuing Algorithms
within the Router on QoS VoIP application Using
                    OPNET

                Dr. Hussein A. Mohammed*, Dr. Adnan Hussein Ali**,
                            Hawraa Jassim Mohammed*
             * Iraqi Commission for Computers and Informatics/Informatics Institute
                                          for Postgraduate Studies.
                      ** Electrical & Electronics Techniques College – Baghdad
                                     (adnan_h_ali@yahoo.com)


Abstract:
      Voice over Internet Protocol (VoIP) is a service from the internet services that allows users to
communicate with each other. Quality of Service (QoS) is very sensitive to delay so that VOIP needs it.
The objective of this research is study the effect of different queuing algorithms within the router on VoIP
QoS.
     In this work, simulation tool “OPNET Modeler version 14.0” is used to implement the proposed
network (VoIP Network). The proposed network is a private network for a company that has two
locations located at two different countries around the world in order to simulate the communications
within the same location as a local and the communications between two locations as a long distance
and analyze VoIP QoS through measuring the major factors that affect the QoS for VoIP according to
international telecommunication union (ITU) standards such as: delay, jitter and packet loss.
     In this research , a comparison was carried out between different queue algorithms like First in
First out (FIFO), Priority queue (PQ) and Weight Fair Queuing (WFQ) and it was found that PQ and
WFQ algorithms are the most appropriate to improve VoIP QoS .

Keywords: OPNET, FIFO Queue, Priority Queue, Weighted-Fair Queue, QoS, ToS.

1. INTRODUCTION
     Voice over IP (VoIP) uses the Internet Protocol (IP) to transmit voice as packets over an
IP network, rather than the traditional telephone landline system which called Public Switched
Telephone Network (PSTN). VoIP can be achieved on any data network that uses IP, for
example Internet and Local Area Networks (LAN). By VOIP the voice signal firstly digitized,
compressed and converted to IP packets and after that it will be transmitted over the IP
network. With this technology, the potential for very low-cost or free voice can be achieved.
The increase in capacity of the Internet in addition to popularity gives an increasing need to
provide real-time voice and video services to the network [1].

2. VoIP Quality of Service (QoS)
    QoS can be defined as the ability of the network to support good services in order to
accept good customers. In other words, QoS measures to the degree of user satisfactions and
network performance. Applications like FTP, HTTP, video conferencing and e-mail are not
DOI : 10.5121/ijcnc.2013.5108                                                                           117
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013
sensitive to delay of transmitted information assess QoS in important problems, while other
applications like voice and video are more sensitive to loss, delay and jitter of the information.
Therefore, QoS of VoIP is an import interest to ensure that voice packets are not delayed or lost
while be transmitted over the network [2].
      VoIP QoS is measured according ITU recommendations based on different parameters
like (delay, jitter, and packet loss), these parameters can be changed and controlled within the
acceptable range to improved VoIP QoS. Factors affecting QoS are briefly described in the
following sections [2]:
     1. Latency: As a delay sensitive application, voice cannot tolerate too much delay.
Latency is the average time it takes for a packet to travel from its source to its destination. A
person whose speaking into the phone called the source and the destination is the listener at the
other end. This is one-way latency [3]. Ideally, must keeping on the delay as low as possible but
if there is too much traffic on the line (congestion), or if a voice packet gets stuck behind a
bunch of data packets (such as an email attachment), the voice packet will be delayed to the
point that the quality of the call is compromised [4]. The Maximum amount of latency that a
voice call can tolerate one way is 150 Milliseconds (0.15 sec) but is preferred be 100
Milliseconds (0.10 sec) [5].
    Equation (1) shows the calculation of delay where Average delay (D) is expressed as the
sum of all delays (di), divided by the total number of all measurements (N) [6].
                                            N
                             D      =     ∑i = 1
                                                   di     / N
                                                                                … (1)
    2. Jitter (Variation of Delay): In order for voice to be intelligible, voice packets must
arrive at regular Intervals. Jitter describes the degree of fluctuation in packet access, which can
be caused by too much traffic on the line [4]. Voice packets can tolerate only about 75
Milliseconds (0.075 sec) but is preferred be 40 Milliseconds (0.040 sec) of jitter delay [5].
      Equation (2) shows the calculation of jitter (j). Both average delay and jitter are measured
in seconds. Obviously, if all (di) delay values are equal, then D = di and J = 0 (i.e., there is no
jitter) [6].


                                                                                        … (2)


      Packet loss: is the term used to describe the packets that do not arrive at the intended
destination that happened when a device (router, switch, and link) is overloaded and cannot
accept any incoming data at a given moment [7]. Packets will be dropped during periods of
network congestion. Voice traffic can tolerate less than a 3% loss of packets (1% is optimum)
before callers feel at gaps in conversation [5].
     Equation (3) shows the calculation of packet loss ratio defined as a ratio of the number of
lost packets to the total number of transmitted packets Where N equals the total number of
packets transmitted during a specific time period, and NL equals the number of packets lost
during the same time period [6].

                 Loss packets ratio = (NL / N) × 100%                                    … (3)

                                                                                                118
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013

3. Queuing Disciplines
     When the network is designed to service widely varying types of traffic, there is a way to
treat contention for network resources by queuing , and manages the available resources
according to conditions outlined by the network administrator. Each router, as part of the
resource allocation mechanisms, must implement some queuing (algorithm) discipline that
governs how packets are buffered while wait to be transmitted. Various queuing disciplines can
be used to control the transmitted packets. The queuing disciplines also affects to the packet
latency by decreasing the time that packets wait to be transmitted. There are three common
queuing disciplines that can be analyses, they are first-in-first-out (FIFO) queuing, priority
queuing (PQ) and weighted-fair queuing (WFQ) [8].

      The basic principle of FIFO queuing is that the first packet that arrives at a router is the
first packet to be transmitted. An exception here happened if a packet arrives and the queue is
full, then the router ignores that packet at any conditions . [8]. As shown in the Figure 1.




                                   Figure 1: FIFO queue [11]


 The principle idea of PQ queuing depends on the priority of the packets, a highest priority are
transmitted on the output port first and then the packets with lower priority and so on. When
congestion occurs, packets with lower-priority queues will be dropped . The only problem with
these packets is that has lower-priority in queue [9]. As shown in the figure2.




                                 Figure 2: Priority queuing [11]

                                                                                              119
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013
 The Weighted-fair queuing discipline provides QoS by provides fair (dedicated) bandwidth to
all network traffic for control on jitter, latency and packet loss. The packets are classified and
placed into queues according to information ToS field in IP header is use to identify weight
(bandwidth). The Weighted-fair queuing discipline weights traffic therefore a low-bandwidth
traffic gets a high level of priority. A unique feature of this queuing discipline is the real-time
interactive traffic will be moved to the front of queues and fairly the other bandwidth shares
among other flows [9]. As shown in the Figure3.




                                  Figure 3: WFQ queuing [11]


4. OPNET Simulator
     The simulation tool adopted in this research is Optimized Network Engineering Tools
(OPNET) version 14.0. OPNET is an object-orientated simulation tool for making network
modeling and QoS analysis of simulation of network communication, network devices and
protocols. OPNET Modeler has a vast number of models for network elements, and it has many
different real-life network configuration capabilities. These make real-life network environment
simulations in OPNET very close to reality and provide full phases of a study. OPNET also
includes features such as comprehensive library of network protocols and models, user friendly
GUI (Graphical User Interface), Web report is feature allows you to organize and distribute the
results of your simulations in form graphical results and statistics [10]. OPNET doesn’t have
any programming knowledge so that its easy to use and to deal with for any person [11].
Automatic simulation generation OPNET models can be compiled into executable code [7].


5. Simulation work:
Implementing the Proposed Network with OPNET
     The network model for simulation consists from two companies that are located in
two different countries around the world. The local area network (LAN) structure for
both companies is the same (as shown in Figure 4).




                                                                                               120
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013




                           Figure 4: The Simulation Network Model.

     In each LAN (three floors and in each floor are 15 Ethernet workstations, three Ethernet
switch , one main switch called (Bay Networks Centilion100 Switch) and one router called
(Cisco C4000 Router) connecting to IP cloud by bi-directional PPP_DS1 link. The workstations
are connected to the switches by bi-directional 10Base_T links. The proposed network carries
applications FTP, Video simultaneously along with VoIP.

     There are some important objects in OPNET that are used to simplify and facilitate the
work with it. In this research, some of these objects that are used are Application Configuration,
Profile Configuration and QoS Attribute Configuration as show in Fig.4:

1. Application Configuration Object: is an object used to define and configure all
Applications in the network according to the user requirements. OPNET has most common
applications like: HTTP, E-mail, video, File transfer, Voice, database. In this research, there is
one application in the network model is a Voice.

2. Profile Configuration Object: is an object that can be used to create users profiles, profile
can contains one or more applications and each application can be configured by the starting
time and ending time. In this research, there is only one profile to all users called VoIP_ profile.

3. The QoS Attribute node: is a mean of attribute configuration details that assess protocols
at the IP layer. It deals with the three queuing profiles: FIFO, Priority queuing and Weighted-
fair queuing.




                                                                                                121
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013

6.    Network Simulation Results and Discussions
     In this research, a Comparison between the effects of different queuing duplicates such as
FIFO, PQ and WFQ on VoIP QoS. To measure the QoS of the VoIP application during
collected statistics (parameters) such as: Voice delay (sec), Voice jitter (sec), Voice traffic
sends (packet/sec) and Voice traffic received (packet/sec). The duration of simulation is 8
minutes and the results are obtained as shown in figure5.

    The blue line represent FIFO algorithm; whereas the red line represent PQ algorithm;
whereas the green line represent WFQ algorithm.

Figure (a) shows the (Jitter = 0) using PQ and WFQ algorithms; whereas jitter using FIFO
algorithm = 0.0038 sec but did not exceed the time constraint (0.075 sec).

Figure (b) shows the end to end delay using PQ and WFQ algorithms acceptable value but
using FIFO algorithm did exceed the time constraint (0.15 sec).

Figure (c) shows the voice traffic received using FIFO algorithm = 380 (Packets/sec), the voice
traffic received using PQ and WFQ = 400 (Packets/sec).

Figure (d) shows the voice traffic sent in all three cases = 400 Packets/sec.

      Figure (5) shows that in FIFO queue, the delay does exceed the time constraint 150 ms
and more packet loss. According to OPENT, packet loss ratio is the ratio of packets dropped to
the total packets transferred to this cloud multiplied by 100%.

Packet loss ratio = 20/400×100% =5%.

      In PQ and WFQ algorithms have no packet loss and end to end delay with acceptable
ratio. Jitter in FIFO, PQ, WFQ has acceptable ratio.




              (a) Voice Jitter                          b) Voice Packet end to end Delay

                                                                                             122
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013




        (c) Voice Traffic Received (packet/sec)      (d) Voice Traffic Send (packet/sec)
    Figure 5: Comparison between Different Queuing Disciplines and Effect on VoIP QoS.

     Different parameters captured to different queuing disciplines (FIFO, PQ and WFQ) are
summarized in Table 1. From the result summarized in Table 1, The PQ and WFQ are the most
appropriate scheduling schemes for improve QoS of voice traffic.


           Table 1: Results of Different Queuing Disciplines on VoIP Quality.
                     Parameters                  FIFO          PQ         WFQ
     Voice Jitter (sec)                        0.00383       0.00003     0.00003
     Voice Packet End-to-End Delay (sec)          2.15        0.076       0.076
     Voice Traffic Received (packets/sec)         380          400         400
     Voice Traffic Sent (packets/sec)                 400           400           400
     Packet loss                                       20            0.0           0.0


7. Conclusions
The presented research regards with the affects of different queuing disciplines on the
performance of VoIP using OPNET. Simulations results allow us to conclude that; Improving
the QoS of voice traffic based on the Priority and Weighted-fair queues are the most
appropriate scheduling schemes because the values of the parameters are within the acceptable
range such as delay, jitter, packet loss.




                                                                                             123
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013


References
1. Hesham N. Elmahdy , Mohamed H. N. Taha , “ The Impact of Packet Size and Packet Dropping
   Probability on Bit Loss of VoIP Networks ”, Paper in ICGST-CNIR Journal, Volume 8, Issue 2,
   January 2009 , Faculty of Computers and Information , Cairo University, Giza, Egypt .
2. Haniyeh Kazemitabar, Sameha Ahmed, Kashif Nisar, Abas B Said, Halabi B Hasbullah , “A Survey
   on Voice over IP over Wireless LAN” , Paper in World Academy of Science, Department of
   Computer and Information Sciences, University Technology, Malaysia , 2010 .
3. Greg S. Tucker, “Voice over Internet Protocol (VoIP) and Security”, Paper in SANS Institute, October
    2004.
4. Gouda I. Salama, M. Elemam Shehab, A. A. Hafez, M. Zaki, “Performance Analysis of Transmitting
    Voice over Communication Links Implementing IPSec ” , Paper in 13th International Conference on
    Aerospace Sciences and Aviation Technology (ASAT), Military Technical College, Cairo, Egypt ,
    May 2009.
5. Qinxia (Alice) He "Analyzing the Characteristics of VoIP Traffic”, Thesis Msc, Department of
   Computer Science, University of Saskatchewan, Canada, July 2007.
6. Furat Nidhal Tawfeeq,“Network Congestion and Quality of Service Analysis Using OPNET”, Thesis,
    Department of Information Engineering, Al-Nahrain University, March 2009.
7. Jishu Das Gupta, “Performance Issues for VoIP in Access Networks”, Thesis Msc, Department of
    Mathematics and Computing Faculty of Sciences, University of Southern Queensland, 2005.
8. Emad Aboelela , “Networks Simulation Experiments Manual” , Book, 3rd Edition , April ,2003 .
9. Tommy Svensson, Alex Popescu, “Development of Laboratory Exercises Based on OPNET Modeler”,
    Thesis, Department of Electrical Engineering, Blekinge Institute of Technology, June 2003.
10. Di Wu, “Performance Studies of VoIP over Ethernet LANs”, Thesis, Department of Computer and
    Information, Auckland University of Technology, 2008.
11. KeerthiPramukh Jannu , Radhakrishna Deekonda , “OPNET Simulation of Voice over MPLS with
    Considering Traffic Engineering “ Thesis , Department of Electrical Engineering , Blekinge Institute
    of Technology , Sweden ,June 2010 .



Authors
Dr Adnan H. Ali is currently a Ph D. degree in Laser and Opto-electronic
Engineering from university of Technology-Baghdad, He is now with Computer
Techniques Engineering Department at Electrical & Electronics Techniques
College - Baghdad. ( adnan_h_ali@yahoo.com).




                                                                                                    124

Mais conteúdo relacionado

Mais procurados

SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETSIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETijfcstjournal
 
Throughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systemsThroughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systemsPei-Che Chang
 
Tti bundling in fdd and tdd
Tti bundling in fdd and tddTti bundling in fdd and tdd
Tti bundling in fdd and tddLaxman Mewari
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2hanums1
 
Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)Faheema Monica
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSKathirvel Ayyaswamy
 
A novel algorithm for tcp timeout
A novel algorithm for tcp timeoutA novel algorithm for tcp timeout
A novel algorithm for tcp timeoutIJCNCJournal
 
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsAGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsIDES Editor
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSKathirvel Ayyaswamy
 

Mais procurados (20)

SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETSIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
 
Zigbee1
Zigbee1Zigbee1
Zigbee1
 
Throughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systemsThroughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systems
 
DTN
DTNDTN
DTN
 
Tti bundling in fdd and tdd
Tti bundling in fdd and tddTti bundling in fdd and tdd
Tti bundling in fdd and tdd
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Jc3615871591
Jc3615871591Jc3615871591
Jc3615871591
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IP NETWORKS
IP NETWORKSIP NETWORKS
IP NETWORKS
 
47 50
47 5047 50
47 50
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2
 
Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)
 
50 55
50 5550 55
50 55
 
Cd31527532
Cd31527532Cd31527532
Cd31527532
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKS
 
A novel algorithm for tcp timeout
A novel algorithm for tcp timeoutA novel algorithm for tcp timeout
A novel algorithm for tcp timeout
 
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsAGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKS
 
Unit_I - 3
Unit_I - 3Unit_I - 3
Unit_I - 3
 
Unit_I - 2
Unit_I - 2Unit_I - 2
Unit_I - 2
 

Semelhante a Affects of Queuing Algorithms on VoIP QoS

Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Zac Darcy
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
 
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Zac Darcy
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.pptmashiur
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdfmashiur
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptxmashiur
 
Throughput Performance Analysis VOIP over LTE
Throughput Performance Analysis VOIP over LTEThroughput Performance Analysis VOIP over LTE
Throughput Performance Analysis VOIP over LTEiosrjce
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...IJCNCJournal
 
Two-level scheduling scheme for integrated 4G-WLAN network
Two-level scheduling scheme for integrated 4G-WLAN network Two-level scheduling scheme for integrated 4G-WLAN network
Two-level scheduling scheme for integrated 4G-WLAN network IJECEIAES
 
Network Performance Enhancement for 1G-EPON by DBA Algorithms
Network Performance Enhancement for 1G-EPON by DBA AlgorithmsNetwork Performance Enhancement for 1G-EPON by DBA Algorithms
Network Performance Enhancement for 1G-EPON by DBA AlgorithmsIJERA Editor
 
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...IOSR Journals
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)IISRT
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos TechniquesKatie Gulley
 
Optimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernetOptimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernetIAEME Publication
 
Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2IJERA Editor
 

Semelhante a Affects of Queuing Algorithms on VoIP QoS (20)

Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
 
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.ppt
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
 
C011111523
C011111523C011111523
C011111523
 
Throughput Performance Analysis VOIP over LTE
Throughput Performance Analysis VOIP over LTEThroughput Performance Analysis VOIP over LTE
Throughput Performance Analysis VOIP over LTE
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
 
Two-level scheduling scheme for integrated 4G-WLAN network
Two-level scheduling scheme for integrated 4G-WLAN network Two-level scheduling scheme for integrated 4G-WLAN network
Two-level scheduling scheme for integrated 4G-WLAN network
 
Network Performance Enhancement for 1G-EPON by DBA Algorithms
Network Performance Enhancement for 1G-EPON by DBA AlgorithmsNetwork Performance Enhancement for 1G-EPON by DBA Algorithms
Network Performance Enhancement for 1G-EPON by DBA Algorithms
 
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos Techniques
 
Optimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernetOptimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernet
 
Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 

Mais de IJCNC

A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTUREA USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTUREIJCNC
 
AUTOCONFIGURATION ALGORITHM FOR A MULTIPLE INTERFACES ADHOC NETWORK RUNNING...
AUTOCONFIGURATION ALGORITHM FOR A  MULTIPLE INTERFACES ADHOC NETWORK  RUNNING...AUTOCONFIGURATION ALGORITHM FOR A  MULTIPLE INTERFACES ADHOC NETWORK  RUNNING...
AUTOCONFIGURATION ALGORITHM FOR A MULTIPLE INTERFACES ADHOC NETWORK RUNNING...IJCNC
 
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
PREDICTING COMMUNICATION DELAY AND  ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...PREDICTING COMMUNICATION DELAY AND  ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...IJCNC
 
EFFECT OF DUTY CYCLE ON ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS
EFFECT OF DUTY CYCLE ON ENERGY  CONSUMPTION IN WIRELESS SENSOR NETWORKSEFFECT OF DUTY CYCLE ON ENERGY  CONSUMPTION IN WIRELESS SENSOR NETWORKS
EFFECT OF DUTY CYCLE ON ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKSIJCNC
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
 
A New Improved Storage Model of Wireless Devices using the Cloud
A New Improved Storage Model of  Wireless  Devices using the CloudA New Improved Storage Model of  Wireless  Devices using the Cloud
A New Improved Storage Model of Wireless Devices using the CloudIJCNC
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONSIJCNC
 
Improving Quality of Service and Reducing Power Consumption with WAN accele...
Improving Quality of  Service and Reducing  Power Consumption with WAN accele...Improving Quality of  Service and Reducing  Power Consumption with WAN accele...
Improving Quality of Service and Reducing Power Consumption with WAN accele...IJCNC
 
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...IJCNC
 
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...IJCNC
 

Mais de IJCNC (11)

A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTUREA USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
 
AUTOCONFIGURATION ALGORITHM FOR A MULTIPLE INTERFACES ADHOC NETWORK RUNNING...
AUTOCONFIGURATION ALGORITHM FOR A  MULTIPLE INTERFACES ADHOC NETWORK  RUNNING...AUTOCONFIGURATION ALGORITHM FOR A  MULTIPLE INTERFACES ADHOC NETWORK  RUNNING...
AUTOCONFIGURATION ALGORITHM FOR A MULTIPLE INTERFACES ADHOC NETWORK RUNNING...
 
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
PREDICTING COMMUNICATION DELAY AND  ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...PREDICTING COMMUNICATION DELAY AND  ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
 
EFFECT OF DUTY CYCLE ON ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS
EFFECT OF DUTY CYCLE ON ENERGY  CONSUMPTION IN WIRELESS SENSOR NETWORKSEFFECT OF DUTY CYCLE ON ENERGY  CONSUMPTION IN WIRELESS SENSOR NETWORKS
EFFECT OF DUTY CYCLE ON ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 
A New Improved Storage Model of Wireless Devices using the Cloud
A New Improved Storage Model of  Wireless  Devices using the CloudA New Improved Storage Model of  Wireless  Devices using the Cloud
A New Improved Storage Model of Wireless Devices using the Cloud
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
 
Improving Quality of Service and Reducing Power Consumption with WAN accele...
Improving Quality of  Service and Reducing  Power Consumption with WAN accele...Improving Quality of  Service and Reducing  Power Consumption with WAN accele...
Improving Quality of Service and Reducing Power Consumption with WAN accele...
 
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
 
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
 

Último

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Último (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Affects of Queuing Algorithms on VoIP QoS

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013 The Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET Dr. Hussein A. Mohammed*, Dr. Adnan Hussein Ali**, Hawraa Jassim Mohammed* * Iraqi Commission for Computers and Informatics/Informatics Institute for Postgraduate Studies. ** Electrical & Electronics Techniques College – Baghdad (adnan_h_ali@yahoo.com) Abstract: Voice over Internet Protocol (VoIP) is a service from the internet services that allows users to communicate with each other. Quality of Service (QoS) is very sensitive to delay so that VOIP needs it. The objective of this research is study the effect of different queuing algorithms within the router on VoIP QoS. In this work, simulation tool “OPNET Modeler version 14.0” is used to implement the proposed network (VoIP Network). The proposed network is a private network for a company that has two locations located at two different countries around the world in order to simulate the communications within the same location as a local and the communications between two locations as a long distance and analyze VoIP QoS through measuring the major factors that affect the QoS for VoIP according to international telecommunication union (ITU) standards such as: delay, jitter and packet loss. In this research , a comparison was carried out between different queue algorithms like First in First out (FIFO), Priority queue (PQ) and Weight Fair Queuing (WFQ) and it was found that PQ and WFQ algorithms are the most appropriate to improve VoIP QoS . Keywords: OPNET, FIFO Queue, Priority Queue, Weighted-Fair Queue, QoS, ToS. 1. INTRODUCTION Voice over IP (VoIP) uses the Internet Protocol (IP) to transmit voice as packets over an IP network, rather than the traditional telephone landline system which called Public Switched Telephone Network (PSTN). VoIP can be achieved on any data network that uses IP, for example Internet and Local Area Networks (LAN). By VOIP the voice signal firstly digitized, compressed and converted to IP packets and after that it will be transmitted over the IP network. With this technology, the potential for very low-cost or free voice can be achieved. The increase in capacity of the Internet in addition to popularity gives an increasing need to provide real-time voice and video services to the network [1]. 2. VoIP Quality of Service (QoS) QoS can be defined as the ability of the network to support good services in order to accept good customers. In other words, QoS measures to the degree of user satisfactions and network performance. Applications like FTP, HTTP, video conferencing and e-mail are not DOI : 10.5121/ijcnc.2013.5108 117
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013 sensitive to delay of transmitted information assess QoS in important problems, while other applications like voice and video are more sensitive to loss, delay and jitter of the information. Therefore, QoS of VoIP is an import interest to ensure that voice packets are not delayed or lost while be transmitted over the network [2]. VoIP QoS is measured according ITU recommendations based on different parameters like (delay, jitter, and packet loss), these parameters can be changed and controlled within the acceptable range to improved VoIP QoS. Factors affecting QoS are briefly described in the following sections [2]: 1. Latency: As a delay sensitive application, voice cannot tolerate too much delay. Latency is the average time it takes for a packet to travel from its source to its destination. A person whose speaking into the phone called the source and the destination is the listener at the other end. This is one-way latency [3]. Ideally, must keeping on the delay as low as possible but if there is too much traffic on the line (congestion), or if a voice packet gets stuck behind a bunch of data packets (such as an email attachment), the voice packet will be delayed to the point that the quality of the call is compromised [4]. The Maximum amount of latency that a voice call can tolerate one way is 150 Milliseconds (0.15 sec) but is preferred be 100 Milliseconds (0.10 sec) [5]. Equation (1) shows the calculation of delay where Average delay (D) is expressed as the sum of all delays (di), divided by the total number of all measurements (N) [6]. N D = ∑i = 1 di / N … (1) 2. Jitter (Variation of Delay): In order for voice to be intelligible, voice packets must arrive at regular Intervals. Jitter describes the degree of fluctuation in packet access, which can be caused by too much traffic on the line [4]. Voice packets can tolerate only about 75 Milliseconds (0.075 sec) but is preferred be 40 Milliseconds (0.040 sec) of jitter delay [5]. Equation (2) shows the calculation of jitter (j). Both average delay and jitter are measured in seconds. Obviously, if all (di) delay values are equal, then D = di and J = 0 (i.e., there is no jitter) [6]. … (2) Packet loss: is the term used to describe the packets that do not arrive at the intended destination that happened when a device (router, switch, and link) is overloaded and cannot accept any incoming data at a given moment [7]. Packets will be dropped during periods of network congestion. Voice traffic can tolerate less than a 3% loss of packets (1% is optimum) before callers feel at gaps in conversation [5]. Equation (3) shows the calculation of packet loss ratio defined as a ratio of the number of lost packets to the total number of transmitted packets Where N equals the total number of packets transmitted during a specific time period, and NL equals the number of packets lost during the same time period [6]. Loss packets ratio = (NL / N) × 100% … (3) 118
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013 3. Queuing Disciplines When the network is designed to service widely varying types of traffic, there is a way to treat contention for network resources by queuing , and manages the available resources according to conditions outlined by the network administrator. Each router, as part of the resource allocation mechanisms, must implement some queuing (algorithm) discipline that governs how packets are buffered while wait to be transmitted. Various queuing disciplines can be used to control the transmitted packets. The queuing disciplines also affects to the packet latency by decreasing the time that packets wait to be transmitted. There are three common queuing disciplines that can be analyses, they are first-in-first-out (FIFO) queuing, priority queuing (PQ) and weighted-fair queuing (WFQ) [8]. The basic principle of FIFO queuing is that the first packet that arrives at a router is the first packet to be transmitted. An exception here happened if a packet arrives and the queue is full, then the router ignores that packet at any conditions . [8]. As shown in the Figure 1. Figure 1: FIFO queue [11] The principle idea of PQ queuing depends on the priority of the packets, a highest priority are transmitted on the output port first and then the packets with lower priority and so on. When congestion occurs, packets with lower-priority queues will be dropped . The only problem with these packets is that has lower-priority in queue [9]. As shown in the figure2. Figure 2: Priority queuing [11] 119
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013 The Weighted-fair queuing discipline provides QoS by provides fair (dedicated) bandwidth to all network traffic for control on jitter, latency and packet loss. The packets are classified and placed into queues according to information ToS field in IP header is use to identify weight (bandwidth). The Weighted-fair queuing discipline weights traffic therefore a low-bandwidth traffic gets a high level of priority. A unique feature of this queuing discipline is the real-time interactive traffic will be moved to the front of queues and fairly the other bandwidth shares among other flows [9]. As shown in the Figure3. Figure 3: WFQ queuing [11] 4. OPNET Simulator The simulation tool adopted in this research is Optimized Network Engineering Tools (OPNET) version 14.0. OPNET is an object-orientated simulation tool for making network modeling and QoS analysis of simulation of network communication, network devices and protocols. OPNET Modeler has a vast number of models for network elements, and it has many different real-life network configuration capabilities. These make real-life network environment simulations in OPNET very close to reality and provide full phases of a study. OPNET also includes features such as comprehensive library of network protocols and models, user friendly GUI (Graphical User Interface), Web report is feature allows you to organize and distribute the results of your simulations in form graphical results and statistics [10]. OPNET doesn’t have any programming knowledge so that its easy to use and to deal with for any person [11]. Automatic simulation generation OPNET models can be compiled into executable code [7]. 5. Simulation work: Implementing the Proposed Network with OPNET The network model for simulation consists from two companies that are located in two different countries around the world. The local area network (LAN) structure for both companies is the same (as shown in Figure 4). 120
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013 Figure 4: The Simulation Network Model. In each LAN (three floors and in each floor are 15 Ethernet workstations, three Ethernet switch , one main switch called (Bay Networks Centilion100 Switch) and one router called (Cisco C4000 Router) connecting to IP cloud by bi-directional PPP_DS1 link. The workstations are connected to the switches by bi-directional 10Base_T links. The proposed network carries applications FTP, Video simultaneously along with VoIP. There are some important objects in OPNET that are used to simplify and facilitate the work with it. In this research, some of these objects that are used are Application Configuration, Profile Configuration and QoS Attribute Configuration as show in Fig.4: 1. Application Configuration Object: is an object used to define and configure all Applications in the network according to the user requirements. OPNET has most common applications like: HTTP, E-mail, video, File transfer, Voice, database. In this research, there is one application in the network model is a Voice. 2. Profile Configuration Object: is an object that can be used to create users profiles, profile can contains one or more applications and each application can be configured by the starting time and ending time. In this research, there is only one profile to all users called VoIP_ profile. 3. The QoS Attribute node: is a mean of attribute configuration details that assess protocols at the IP layer. It deals with the three queuing profiles: FIFO, Priority queuing and Weighted- fair queuing. 121
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013 6. Network Simulation Results and Discussions In this research, a Comparison between the effects of different queuing duplicates such as FIFO, PQ and WFQ on VoIP QoS. To measure the QoS of the VoIP application during collected statistics (parameters) such as: Voice delay (sec), Voice jitter (sec), Voice traffic sends (packet/sec) and Voice traffic received (packet/sec). The duration of simulation is 8 minutes and the results are obtained as shown in figure5. The blue line represent FIFO algorithm; whereas the red line represent PQ algorithm; whereas the green line represent WFQ algorithm. Figure (a) shows the (Jitter = 0) using PQ and WFQ algorithms; whereas jitter using FIFO algorithm = 0.0038 sec but did not exceed the time constraint (0.075 sec). Figure (b) shows the end to end delay using PQ and WFQ algorithms acceptable value but using FIFO algorithm did exceed the time constraint (0.15 sec). Figure (c) shows the voice traffic received using FIFO algorithm = 380 (Packets/sec), the voice traffic received using PQ and WFQ = 400 (Packets/sec). Figure (d) shows the voice traffic sent in all three cases = 400 Packets/sec. Figure (5) shows that in FIFO queue, the delay does exceed the time constraint 150 ms and more packet loss. According to OPENT, packet loss ratio is the ratio of packets dropped to the total packets transferred to this cloud multiplied by 100%. Packet loss ratio = 20/400×100% =5%. In PQ and WFQ algorithms have no packet loss and end to end delay with acceptable ratio. Jitter in FIFO, PQ, WFQ has acceptable ratio. (a) Voice Jitter b) Voice Packet end to end Delay 122
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013 (c) Voice Traffic Received (packet/sec) (d) Voice Traffic Send (packet/sec) Figure 5: Comparison between Different Queuing Disciplines and Effect on VoIP QoS. Different parameters captured to different queuing disciplines (FIFO, PQ and WFQ) are summarized in Table 1. From the result summarized in Table 1, The PQ and WFQ are the most appropriate scheduling schemes for improve QoS of voice traffic. Table 1: Results of Different Queuing Disciplines on VoIP Quality. Parameters FIFO PQ WFQ Voice Jitter (sec) 0.00383 0.00003 0.00003 Voice Packet End-to-End Delay (sec) 2.15 0.076 0.076 Voice Traffic Received (packets/sec) 380 400 400 Voice Traffic Sent (packets/sec) 400 400 400 Packet loss 20 0.0 0.0 7. Conclusions The presented research regards with the affects of different queuing disciplines on the performance of VoIP using OPNET. Simulations results allow us to conclude that; Improving the QoS of voice traffic based on the Priority and Weighted-fair queues are the most appropriate scheduling schemes because the values of the parameters are within the acceptable range such as delay, jitter, packet loss. 123
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013 References 1. Hesham N. Elmahdy , Mohamed H. N. Taha , “ The Impact of Packet Size and Packet Dropping Probability on Bit Loss of VoIP Networks ”, Paper in ICGST-CNIR Journal, Volume 8, Issue 2, January 2009 , Faculty of Computers and Information , Cairo University, Giza, Egypt . 2. Haniyeh Kazemitabar, Sameha Ahmed, Kashif Nisar, Abas B Said, Halabi B Hasbullah , “A Survey on Voice over IP over Wireless LAN” , Paper in World Academy of Science, Department of Computer and Information Sciences, University Technology, Malaysia , 2010 . 3. Greg S. Tucker, “Voice over Internet Protocol (VoIP) and Security”, Paper in SANS Institute, October 2004. 4. Gouda I. Salama, M. Elemam Shehab, A. A. Hafez, M. Zaki, “Performance Analysis of Transmitting Voice over Communication Links Implementing IPSec ” , Paper in 13th International Conference on Aerospace Sciences and Aviation Technology (ASAT), Military Technical College, Cairo, Egypt , May 2009. 5. Qinxia (Alice) He "Analyzing the Characteristics of VoIP Traffic”, Thesis Msc, Department of Computer Science, University of Saskatchewan, Canada, July 2007. 6. Furat Nidhal Tawfeeq,“Network Congestion and Quality of Service Analysis Using OPNET”, Thesis, Department of Information Engineering, Al-Nahrain University, March 2009. 7. Jishu Das Gupta, “Performance Issues for VoIP in Access Networks”, Thesis Msc, Department of Mathematics and Computing Faculty of Sciences, University of Southern Queensland, 2005. 8. Emad Aboelela , “Networks Simulation Experiments Manual” , Book, 3rd Edition , April ,2003 . 9. Tommy Svensson, Alex Popescu, “Development of Laboratory Exercises Based on OPNET Modeler”, Thesis, Department of Electrical Engineering, Blekinge Institute of Technology, June 2003. 10. Di Wu, “Performance Studies of VoIP over Ethernet LANs”, Thesis, Department of Computer and Information, Auckland University of Technology, 2008. 11. KeerthiPramukh Jannu , Radhakrishna Deekonda , “OPNET Simulation of Voice over MPLS with Considering Traffic Engineering “ Thesis , Department of Electrical Engineering , Blekinge Institute of Technology , Sweden ,June 2010 . Authors Dr Adnan H. Ali is currently a Ph D. degree in Laser and Opto-electronic Engineering from university of Technology-Baghdad, He is now with Computer Techniques Engineering Department at Electrical & Electronics Techniques College - Baghdad. ( adnan_h_ali@yahoo.com). 124