E-Book, Englisch, 130 Seiten
Wang Voice over IP Networks
1. Auflage 2011
ISBN: 978-3-642-14330-4
Verlag: Springer
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Quality of Service, Pricing and Security
E-Book, Englisch, 130 Seiten
ISBN: 978-3-642-14330-4
Verlag: Springer
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
This book addresses three important issues in VoIP networks: Quality of Service, pricing and security. In addressing Quality of Service (QoS), it introduces the notion of delay not exceeding an upper limit, termed the bounded delay, to measure the Quality of Service in VoIP networks. Queuing models are introduced to measure performance in terms of bounded delays. Closed form solutions relating the impact of bounding delays on throughput of VoIP traffic are provided. Traffic that exceeds the delay threshold is treated as lost throughput. The results addressed can be used in scaling resources in a VoIP network for different thresholds of acceptable delays. Both single and multiple switching points are addressed. The same notion and analysis are also applied on jitter, another important indicator of the VoIP QoS This book also develops a pricing model based on the Quality of Service provided in VoIP networks. It presents the impact of quality of VoIP service demanded by the customer on the transmission resources required by the network using an analytical approach. In addition, it extends and applies the delay throughput analysis developed for VoIP networks in assessing the impact of risks constituted by a number of transportation channels, where the risk associated with each channel can be quantified by a known distribution. Finally, the book explores areas for future research that can be built on the foundation of research presented.
Autoren/Hrsg.
Weitere Infos & Material
1;Preface;5
2;Contents;7
3;Introduction;11
3.1;1.1 Motivation for VoIP Networks;11
3.2;1.2 Comparison of PSTN and VoIP Networks;14
3.3;1.3 Major Challenges in VoIP Networks ;15
3.4;1.4 Scope of this Book;17
3.5;1.5 Organization of the Book;17
4;Voice over Internet Protocol;19
4.1;2.1 VoIP Architecture ;19
4.2;2.2 Quality of Service;22
4.3;2.3 VoIP Implementation;24
4.4;2.4 Session Initiation Protocol;26
4.5;2.5 Summary;33
5;Traffic Characterization;34
5.1;3.1 Packet-switched Network Model;35
5.2;3.2 Queuing Model;35
5.3;3.3 Analysis of the Delay Bound;38
5.4;3.4 Summary;42
6;Impact of Bounded Delays on Resource Consumption in Packet- Switched Networks with M/ M/ 1 Traffic;43
6.1;4.1 Introduction;43
6.2;4.2 The SIP-based VoIP Network Model;44
6.3;4.3 A Single-Hop VoIP Network;45
6.4;4.4 Two-Hop Tandem Network;48
6.5;4.5 Multiple-Hop Network;50
6.6;4.6 Simulation Results;52
6.7;4.7 Conclusion;54
7;Impact of Bounded Delay on Resource Consumption- M/ D/ 1 Model;56
7.1;5.1 Introduction;56
7.2;5.2 Network Model;57
7.3;5.3 A Single-Hop Network;58
7.4;5.4 Two-Hop Tandem Network;60
7.5;5.5 Multi-Hop Network;62
7.6;5.6 Simulation Results;63
7.7;5.7 Conclusion;69
8;Impact of Bounded Jitter on Resource Consumption in Multi- Hop Networks;70
8.1;6.1 Introduction;70
8.2;6.2 Jitter Analysis ;71
8.3;6.3 Impact of the Number of Hops on Jitter;72
8.4;6.4 Conclusions;76
9;Cost and Quality in Packet Switched Networks;77
9.1;7.1 Introduction;77
9.2;7.2 A QoS Based Pricing Model;79
9.3;7.3 Mathematical Model of a VoIP Network;79
9.4;7.4 Analysis of the Single-Hop VoIP Network;80
9.5;7.5 Analysis of Two-Hop VoIP Network ;85
9.6;7.6 Analysis of Multi-Hop VoIP Network;89
9.7;7.7 Conclusion;91
10;Cumulative Impact of Inhomogeneous Channels on Risk;92
10.1;8.1 Introduction;92
10.2;8.2 The Single Channel Model;93
10.3;8.3 The Two-channel Model;94
10.4;8.4 The n-Channel Model;98
10.5;8.5 Conclusion;99
10.6;8.6 Further Extensions of the Technique;99
11;The Economics of VoIP Systems;100
11.1;9.1 Introduction;100
11.2;9.2 Economy of Scale of Communication Networks;101
11.3;9.3 Economic Characteristics of an Information Network;103
11.4;9.4 Major Components of a Telecommunications Network;105
11.5;9.5 The Integrated Local Loop;107
11.6;9.6 Architectural Dissimilarities Between the Internet and the Legacy Network;108
11.7;9.7 Access Network as the Bottleneck;109
11.8;9.8 Pricing of Internet Services;110
11.9;9.9 The Overall Impact on VoIP Pricing;111
11.10;9.10 The Likely Evolution Toward a Single Network;112
11.11;9.11 Conclusions;114
12;A Network Based Authentication Scheme for VoIP;115
12.1;10.1 Introduction;115
12.2;10.2 Authentication;117
12.3;10.3 Comparative Analysis of Existing Authentication Schemes;118
12.4;10.4 Proposed Requirements of Authentication;119
12.5;10.5 Proposed Schemes for Authentication ;119
12.6;10.6 Conclusion;122
13;Conclusions and Future Work;123
14;Index;131




