TRAFFIC CONTROL MECHANISM FOR VOIP GATEWAY

被引:0
作者
Amin, Amany S. [1 ]
El-Sheikh, Hanem M. [1 ]
机构
[1] NTI, Switching Dept, Cairo, Egypt
来源
ICSPC: 2007 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1-3, PROCEEDINGS | 2007年
关键词
VoIP; Multiplexing; H.323; Voice Coders;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Bandwidth utilization is one of the main problems faced when transferring the voice traffic from PSTN to Internet. Due to the application of point-to-point technique in serving the VoIP calls over Internet, the ratio between the payload and its related header is very small for the applied protocol (TCP/IP). The Internet has been calibrated to use relatively large packets. If a substantial amount of Internet traffic becomes voice traffic, it will require a concomitant increase in Internet capacity, because the smaller voice packets will consume significantly more of the overall bandwidth. For optimum consuming of the Internet bandwidth without increasing in Internet capacity, an efficient mechanism is proposed for controlling the transmitted bitrate of voice packet according to the status of the Internet. It uses the buffering technique for reducing the transmitted bitrate. It ensures an accepted end-to-end delay, and increases the bandwidth utilization of the current voice packet.
引用
收藏
页码:1235 / 1238
页数:4
相关论文
共 50 条
[41]   Performance Evaluation of QoE in VoIP Traffic under Fading Channels [J].
Sanchez-Iborra, Ramon ;
Cano, Maria-Dolores ;
Garcia-Haro, Joan .
WORLD CONGRESS ON COMPUTER & INFORMATION TECHNOLOGY (WCCIT 2013), 2013,
[42]   Modeling QoS Parameters of VoIP Traffic with Multifractal and Markov Models [J].
Toral-Cruz, Homero ;
Pathan, Al-Sakib Khan ;
Ramirez-Pacheco, Julio C. .
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PT II, 2011, 7017 :255-265
[43]   Security of VoIP traffic over low or limited bandwidth networks [J].
Alouneh, Sahel ;
Abed, Sa'ed ;
Ghinea, George .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) :5591-5599
[44]   An empirical approach towards characterization of encrypted and unencrypted VoIP traffic [J].
Choudhury, Paromita ;
Kumar, K. R. Prasanna ;
Nandi, Sukumar ;
Athithan, G. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (1-2) :603-631
[45]   An algorithm to improve VoIP data traffic rate over internet [J].
Misbahuddin, Syed ;
Al-Holou, Nizar ;
Boulejfen, Noureddine .
PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON INTERNET AND MULTIMEDIA SYSTEMS AND APPLICATIONS, 2006, :172-+
[46]   VoIP Traffic Identification Based on Host and Flow Behavior Analysis [J].
Li, Bing ;
Jin, Zhigang ;
Ma, Maode .
2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
[47]   VoIP Call Admission Control Scheme Considering VoIP on-off patterns [J].
Jung, Ji-Young ;
Seo, Dong-Yoon ;
Lee, Jung-Ryun .
2013 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2013,
[48]   VOIPINTEGRATION VoIP Control and Processing System [J].
Serrano, F. J. ;
Talavan, G. G. ;
Curto, B. ;
Moreno, V. ;
Rodriguez Aragon, J. F. ;
Moreno, A. .
WEBIST 2010: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGY, VOL 1, 2010, :195-198
[49]   A redundancy method of AS traffic in Signaling Gateway using loadsharing scheme [J].
Lee, H ;
Lee, B .
6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS: BROADBAND CONVERGENCE NETWORK INFRASTRUCTURE, 2004, :833-837
[50]   Analysis of on-off patterns in VoIP and their effect on voice traffic aggregation [J].
Jiang, WY ;
Schulzrinne, H .
NINTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2000, :82-87