TRAFFIC CONTROL MECHANISM FOR VOIP GATEWAY

被引:0
作者
Amin, Amany S. [1 ]
El-Sheikh, Hanem M. [1 ]
机构
[1] NTI, Switching Dept, Cairo, Egypt
来源
ICSPC: 2007 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1-3, PROCEEDINGS | 2007年
关键词
VoIP; Multiplexing; H.323; Voice Coders;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Bandwidth utilization is one of the main problems faced when transferring the voice traffic from PSTN to Internet. Due to the application of point-to-point technique in serving the VoIP calls over Internet, the ratio between the payload and its related header is very small for the applied protocol (TCP/IP). The Internet has been calibrated to use relatively large packets. If a substantial amount of Internet traffic becomes voice traffic, it will require a concomitant increase in Internet capacity, because the smaller voice packets will consume significantly more of the overall bandwidth. For optimum consuming of the Internet bandwidth without increasing in Internet capacity, an efficient mechanism is proposed for controlling the transmitted bitrate of voice packet according to the status of the Internet. It uses the buffering technique for reducing the transmitted bitrate. It ensures an accepted end-to-end delay, and increases the bandwidth utilization of the current voice packet.
引用
收藏
页码:1235 / 1238
页数:4
相关论文
共 50 条
[31]   Influence of the QoS Measures for VoIP Traffic in a Congested Network [J].
Luca, R. L. ;
Ciotirnae, P. ;
Popescu, F. .
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2016, 11 (03) :405-413
[32]   Impact of hybrid queuing disciplines on the VoIP traffic delay [J].
Klampfer, Sasa ;
Mohorko, Joze ;
Cucej, Zarko .
ELEKTROTEHNISKI VESTNIK-ELECTROCHEMICAL REVIEW, 2009, 76 (03) :133-138
[33]   Fingerprints in the spectrum: Spectral analysis and detection of VoIP traffic [J].
Chen Ling ;
Zheng Kai ;
Liu Fang ;
Lei Zhenming ;
Yangjie .
ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, 2009, :448-+
[34]   Prepaid mechanism of VoIP and messaging services [J].
Son, SI ;
Wu, Q ;
Lin, YB ;
Yeh, CH .
ITRE 2005: 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, PROCEEDINGS, 2005, :255-259
[35]   Simulation and Modeling of Packet Loss on α-Stable VoIP Traffic [J].
Toral, Homero ;
Torres, Deni ;
Estrada, Leopoldo .
PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON SIGNALS, SPEECH AND IMAGE PROCESSING/9TH WSEAS INTERNATIONAL CONFERENCE ON MULTIMEDIA, INTERNET & VIDEO TECHNOLOGIES, 2009, :198-203
[36]   LB-VoIP: Enhancing Access Control of VoIP for Secure Networks [J].
Han, Bingjie ;
Guan, Jianfeng ;
Quan, Wei ;
Xu, Changqiao .
25TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC 2015), 2015, :269-273
[37]   The Effect of Background Traffic Packet Size to VoIP Speech Quality [J].
Triyason, Tuul ;
Kanthamanon, Prasert ;
Warasup, Kittipong ;
Yamsaengsung, Siam ;
Supattatham, Montri .
ADVANCES IN INFORMATION TECHNOLOGY, 2010, 114 :175-182
[38]   Traffic Engineering for VoIP Network based on PSTN Statistical Models [J].
Stojanovic, Zvezdan ;
Babic, Djordje .
TELSIKS 2009, VOLS 1 AND 2, 2009, :564-567
[39]   An empirical approach towards characterization of encrypted and unencrypted VoIP traffic [J].
Paromita Choudhury ;
K. R. Prasanna Kumar ;
Sukumar Nandi ;
G. Athithan .
Multimedia Tools and Applications, 2020, 79 :603-631
[40]   AN IMPROVED DOWNLINK SCHEDULING ALGORITHM FOR VOIP TRAFFIC IN IEEE 802.16 [J].
Liao, Qing ;
Zhao, Jingling ;
Yang, Weihua .
PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND APPLICATIONS, 2009, :366-370