Upload
khangminh22
View
0
Download
0
Embed Size (px)
Citation preview
I
بسم هللا الرحمن الرحيم
AL NEELAIN UNIVERSITY
Faculty of Engineering
Department of Electrical &Electronic Engineering
A thesis submitted as partial fulfillment for the
requirement of the M.Sc in Data and Communication
Networks
Performance analysis of voice over IP over
WLAN
Prepared By:
Ahmed EltyebMohmed Ahmed
Supervised By:
Prof.Khalid Hamid Bilal
August 2017
II
االيه
وأخفض لهما ":تعالي هللا قال
الرحمة جناح الذل من
وُقل ربي أرحمهما كما
( 24ربياني صغيرا")
اإلسراء
III
الهداءا
إلــى والدتي العزيزة ... وإلى والدي العزير أطـــال هللا
’’’’والعافية صحهــي ُعمـــركما وأمــدكم بالفـ
يه والصحهفإلــى اخواتي واخوتي امدكم بالعا
الي زمالئـــــي...
إلـــى األيادي المخلصة التـي ساعدتني .......... أساتذتي
الكــرام
فلكم مني الود في زمن يصعب فيه الود ويندر فيه الوفاء
الشكر والعرفان الشكر أوله هلل سبحانه وتعالي
رحاب
IV
إلـــــــى الذين مهدوا لنا طريق العلم والمعرفة
...
بجامعه النيلين إلــــــى جميع أساتذتنا األفاضل
...
الي جميع اساتذتنا بكليه الهندسه جامعة
النيلين.....
الي كل العاملين بكليه الهندسه جامعة النيلين
.....
خالد حامد بالل وأخص بالتقدير والشكرالبروفيسور/
على ما بذله من جهد متواصل ودءوب ، وما قدمه عبدهللا
ن صبر من توجيهات وإرشادات سديدة ،وما أبداه م
وتفهم كبيرين في سبيل إعداد هذا البحث فله مني
عظيم الشكر ووافر اإلمتنان.
وكذلك أشكر كل من ساعد على إتمام هذا البحث وقدم
لي العون ومد لي يد المساعدة وزودني بالمعلومات
/المهندسالالزمة ألتمام هذا البحث وخاصة
زمالئنا وأخواننا ورفاق ،وكلمحمد الطاهرالطاهر
.الدرب
سائالً المولى عز وجل أن يجزي
.الجميع عني خير الجزاء
V
المستخلص
المشروع هو دراسة وتحليل وتخطيط وتصميم ومحاكاة نقل الصوت عبر هذه الهدف من
برتكول اإلنترنت خالل الشبكة المحلية الالسلكية بإستخدام برنامج األوبنيت ثم تقييم جودة الخدمة
( في الشبكة. معدل التاخيرر،اإلنتاجية، )التأخي
معدل اإلرسال، عدد األجهزة المتصلة بالشبكة و لتقيم االداء هى العوامل التى اخذت فى االعتبار
زمن المحاكاة وذلك لتقييم جودة الشبكة.
ارسال المحاكاةأنالزيادةفيمعدالنتايج وأظهرت
ومعدل التاخير .تؤديإلىانخفاضفيالتأخيرفيحينتنخفضاإلنتاجيةالبيانات
Abstract
The objectives of this project is to study, analyze, plan, design and
simulate voice over internet protocol over WLAN network using OPNET
simulation software program, to evaluate the Quality Of Service
VI
performance (delay, throughput, and jitter ) of the network. The
parameters which were taken into consideration of the evaluation were data
rate, number of nodes and simulation time.
The results of the simulated network indicated that as in data rate increase
delay decrease while the throughput and jitter decrease.
List Contents:
Page Title Index
VII
I 1 االية
II 2 االهداء
III 3 الشكر والعرفان
IV 4 المستخلص
V Abstract 5
IV Abbreviation 6
VI List Content 7
VIII List Figure 8
IX List Tables 9
X Abbreviations 10
Chapter One: Introduction
1 Background 1-1
2 Problem Definition 1-2
2 Motivations 1-3
2 Objective 1-4
2 Methodology 1-5
3 Thesis layout 1-6
Chapter two: Literature Review
4 ConceptWireless LAN 2-1
4 Types of network according to Geographic scale 2-2
5 Wireless Local Area Networks 2-3
5 IEEE Wireless Networking Specifications 2-4
8 Types of Wireless LAN 2-5
9 WLAN Applications 2-6
9 Wireless LAN architectures 2-7
11 Hardware 2-8
12 Software requirements 2-9
13 Advantages and Disadvantages of WLAN 2-10
14 Concept of voice over IP 2-11
14 Voice over IP architecture 2-12
16 VoIP System 2-13
17 VOIP components 2-14
18 Protocols 2-15
20 Quality of serves 2-16
21 Factors that affect quality of service 2-17
23 Advantages of VoIP 2-18
25 Disadvantages of VoIP 2-18
VIII
Chapter three :System Model & Simulation
27 Descriptive Analysis. 3-1
27 Mathematical Model. 3-2
28 Delay 3-2-1
28 Throughput 3-2-2
28 Packet Delay variance (Jitter): 3-2-3
29 Computer Model. 3-3
32 Simulation Environment. 3-4
32 Simulation 3-5
Chapter four : Results & Discussion
32 Delay result vs. number of node 4-1
34 Throughput result vs. number of node 4.2
35 Jitter result vs. number of node 4.3
36 delay result vs. Data rate: 4.4
37 Throughput result vs. Data rate 4.5
38 jitter result vs. Data rate: 4.6
39 Delay result vs. Simulation time 4.7
40 Throughput result vs. simulation time 4.8
41 Jitter result vs. simulation time 4.9
Chapter five : Conclusions & Recommendation
43 Conclusions. 5-1
44 Recommendation. 5-2
45 References.
IX
List figures:
Index Title Number Of Page
2-1 WLAN architecture 10
2-2 A typical VoIP Network Topology. 17
2-3 H.323 Architecture 18
2-4 SIP Architecture 20
3-1 computer model for No of nodes 29
3-2 computer model for data rate 30
3-3 computer model for simulation time 31
3-4 WLAN network 32
4-1 A plot of Delay VS No of nodes 33
4-2 A plot of throughput VS No of nodes 35
4-3 A plot of Jitter VS No of Node 36
4-4 A plot of Delay VS data rate 37
4-5 Aplot of throughput VS Data rate 38
4-6 Jitter VS Data Rate 39
4-7 A plot of Delay VS simulation time 40
4-8 Aplot of throughput VS simulation time 41
4-9 Aplot of jitter VS simulation time 42
X
List Tables:
Index Title Page
3-1 simulation environments 32
4-1 No of nodes VS delay 33
4-2 No of node VS Throughput 35
4-3 No of node VS Jitter 36
4-4 Data rate VS Delay 37
4-5 Data Rate VS Throughput 38
4-6 Data Rate VS jitter 39
4-7 Simulation Time VS Delay 40
4-8 Simulation Time VS Throughput 41
4-9 Simulation Time VS jitter 42
XI
Abbreviations:
AP Access Point
BSA Basic Service Area
BSS Basic Service Set
BSSID Basic service set identification
CCK Complementary code keying
CSMA/CA Carrier Sense Multiple Access with Collision Avoidance
DSL Digital subscriber line
IBSS Independent basic service set
ID Identification
IEEE Institute of Electrical and Electronic Engineers
IP Internet Protocol
ITU International Telecommunication Union
LAN Local area network
MAC Media access control
MAN Metropolitan area network
MGCP Media Gateway Control Protocol
NICs Network interface cards
OFDM The orthogonal frequency division multiplexing
PBX Private branch exchange
RTP Real-time Transport Protocol
SIP Session Initiation Protocol
TDM Time-division multiplexing
UDP User datagram protocol
XII
VoBB Voice over broadband
VoIP Voice over Internet protocol
WAN Wide area network
WNICs Wireless network interface controllers
1
Chapter one
Introduction
1.1Background:
Voice over Internet Protocol (VoIP) is a form of voice communication
that uses audio data to transmit voice signals to the end user. VoIP is one
of the most important technologies in the World of communication.
Around, 10 years of research on VoIP, some problems of VoIP are still
remaining. During the pastdecade and with growing of wireless. VoIP over
Wireless LAN (WLAN) faces many challenges due to the loose nature of
wireless network. Issues like providing Quality of Service (QoS) at a good
level, dedicating capacity for calls and having secure calls is more difficult
rather than wired LAN. Therefore VoIP over WLAN (Vo IP WLAN)
remains a challenging research topic. The Voice over IP (VoIP)
technology has become prevalent today due to its lower cost than
increasing availability of wireless internet access has led to research
studies examining the combination of wireless network access with voice
over IP. With the widespread availability of advanced mobile phones and
Pocket PCs, the need for VoIP applications on these mobile[1].
1.2 Problem definition:
The Voice transmitted to the receiver through the channel over WLAN
over IP network is impaired by noise, fading, and multiple access
interference which degrade the QoS performance such as delay, jitter and
throughput.
1.3 Motivation:
The significance of VoIP reduce the cost and increase the capacity and
wider the coverage.
2
1.4 Objectives:
To study WLAN network comprehensively
To analyze hardware and software requirement of VoIPover WLAN
network.
To simulate voice over IP over WLAN network
To evaluate the performance of VOIP over WLAN in terms of
delay, jitter and throughput
1.5 Methodology:
Consists of two phases:
Phase one: Buildmathematical and computer model to describe QoS
parameter of WLAN over IP.
Phase two: Simulation model using OPNET and MATLAB software
program.
1.6 Thesis layouts:
Chapter two: Present the detailed study of the WLAN and the
hardware and soft requirement for VOIP and QoS parameter
Chapter three: apply the methodology and setup experiment
which includes the descriptive analysis, mathematical and computer
model and simulation software program.
Chapter four:provides results and the discussion for the QoSsuch
asdelay, jitter and throughput in the WLAN network.
Chapter five:introduce the conclusion and suggests some
recommendations for future work.
3
Chapter Two
Literature Review
2.1ConceptWireless LAN:
A computer network or data network is a telecommunications network that allows
computers to exchange data. In computer networks, networked computing devices
pass data to each other along data connections. Data is transferred in the form of
packets. The connections (network links) between nodes are established using
either cable media or wireless media. The best-known computer network is the
Internet. [2]
Network computer devices that originate, route and terminate the data are called
network nodes. Nodes can include hosts such as personal computers, phones,
servers as well as networking hardware. Two such devices are said to be
networked together when one device is able to exchange information with the other
device, whether or not they have a direct connection to each other.[3]
2.2 Types of Networks:
A network can be characterized by its physical capacity or its organizational
purpose. Use of the network, including user authorization and access rights, differ
accordingly:
Local area network:
A local area network (LAN) is a network that connects computers and devices in a
limited geographical area such as a home, school, office building, or closely
positioned group of buildings. Each computer or device on the network is a node.
Metropolitan area network:
A Metropolitan area network (MAN) is a large computer network that usually
spans a city or a large campus.
4
Wide area network:
A wide area network (WAN) is a computer network that covers a large
geographic area such as a city, country, or spans even intercontinental
distances.
2.3 Wireless Local Area Networks:
A Wireless Local Area Network (WLAN) links two or more devices using a
wireless communication method. It usually provides a connection through an
Access Point (AP) to the wider internet [4].
This gives users the ability to move around within a local coverage area and still be
connected to the network. Just as the cordless telephone frees people to make a
phone call from anywhere in their home, a WLAN permits people to use their
computers anywhere in the network area, such as an office building or corporate
campus. Due to their ease of installation and the increasing popularity of laptop
computers, WLANs have been widely deployed in the past two decades.
2.4 IEEE Wireless Networking Specifications:
The IEEE (Institute of Electrical and Electronic Engineers) released the 802.11
specifications in June 1999. The initial specification, known as 802.11, used the
2.4 GHz frequency and supported a maximum data rate of 1 to 2 Mbps. In late
1999, two new addenda were released .The 802.11b specification increased the
performance to 11 Mbps in the 2.4 GHz range while the 802.11a specification
utilized the5 GHz range and supported up to 54 Mbps .Unfortunately, the two new
specifications were incompatible because they used different frequencies. This
means that 802.11a network interface cards (NICs) and access points cannot
communicate with 802.11b NICs and access points. This incompatibility forced
thecreation of the new draft standard known as802.11g. 802.11g supports up to 54
Mbps and is interoperable with 802.11b products on the market today. The concern
5
is that the 802.11g specification is currently in development and products will not
be available until a later date[5].D[4]5Dج
Specifications
The 802.11 specifications were developed specifically for Wireless Local
Area Networks (WLANs) by the IEEE and include four subsets of Ethernet-based
protocol standards: 802.11, 802.11a, 802.11b, and 802.11g.
802.11
802.11 operated in the 2.4 GHz range and was the original specification of the
802.11 IEEE standards. This specification delivered 1 to 2 Mbps using a
technology known as phase-shift keying (PSK) modulation. This specification is
no longer used and has largely been replaced by other forms of the 802.11
standard.
802.11a
802.11a operates in the 5 - 6 GHz range with data rates commonly in the 6 Mbps,
12 Mbps, or 24 Mbps range. Because 802.11a uses the orthogonal frequency
division multiplexing (OFDM) standard, data transfer rates can be as high as 54
Mbps. OFDM breaks up fast serial information signals into several slower sub-
signals that are transferred at the same time via different frequencies, providing
more resistance to radio frequency interference. The 802.11a specification is also
known as Wi-Fi5, and though regionally deployed, it is not a global standard like
802.11b.
802.11b
The 802.11b standard (also known as Wi-Fi) operates in the 2.4 GHz range
with up to 11 Mbps data rates and is backward compatible with the 802.11
standard. 802.11b uses a technology known as complementary code keying (CCK)
6
modulation, which allows for higher data rates with less chance of multi-path
propagation interference (duplicate signals bouncing off walls).
802.11g
802.11g is the most recent IEEE 802.11 draft standard and operates in the
2.4 GHz range with data rates as high as 54 Mbps over a limited distance. It is also
backward compatible with 802.11b and will work with both 11 and 22 Mbps
802.11g offers the best features of both 802.11a and 802.11b, but as of the
publication date of this document, this standard has not yet beenAll four standards
are based on the CSMA/CA (Carrier Sense Multiple Access with Collision
Avoidance) Ethernet protocol for path sharing.
802.11n
Bandwidth up to 300 Mbps supported by utilizing multiple wireless signals and
antennas (MIMO technology) Compatible with 802.11b/g.
Advantage
Fastest maximum speed and best signal range; more resistant to signal interference
from outside sources
Disadvantage
Costs more than 802.11g; the use of multiple signals may greatly interfere with
nearby 802.11b/g based networks.[6]
7
2.5 Types of Wireless LAN:
The Project 802.11 committee distinguished between two types of wireless LAN
"ad-hoc" and "infrastructure" networks.
Ad-hoc Networks
This network can be set up by a number mobile users meeting in a small
room. It does not need any support from a wired/wireless backbone. There are two
ways to implement this network.
Broadcasting/Flooding
Suppose that a mobile user A wants to send data to another user B in the
same area. When the packets containing the data are ready, user A
broadcasts the packets. On receiving the packets, the receiver checks the
identification on the packet. If that receiver was not the correct
destination, then it rebroadcasts the packets. This process is repeated until
user B gets the data.
TemporaryInfrastructure
In this method, the mobile users set up a temporary infrastructure. But
this method is complicated and it introduces overheads. It is useful only
when there is a small number of a mobile user.
Infrastructure Networks
This type of network allows users to move in a building while they are connected
to computer resources. The IEEE Project 802.11 specified the components in a
wireless LAN architecture. In an infrastructure network, a cell is also known as a
Basic Service Area (BSA). It contains a number of wireless stations. The size of a
BSA depends on the power of the transmitter and receiver units; it also depends on
the environment. A number of BSAs are connected to each other and to a
8
distribution system by Access Points (APs). A group of stations belonging to an
AP is called a Basic Service Set (BSS). [7]
2.6 WLAN Applications:
Home Usage: Wireless networks save time and money.
Small business: entrepreneurs focus on growing their businesses, the WLAN can
grow with them.
Services industry: Wireless internet access for customers
Urban access: Wireless hotspots create a public space.
LAN to LAN Bridging: WLAN are a quick and reliable solution to link a
campus WAN.
2.7Wireless LAN architectures:
Stations:
All components that can connect into a wireless medium in a network are referred
to as stations. All stations are equipped with wireless network interface controllers
(WNICs). Wireless stations fall into one of two categories: wireless access points,
and clients. Access points (APs), normally wireless routers, are base stations for
the wireless network. They transmit and receive radio frequencies for wireless
enabled devices to communicate with. Wireless clients can be mobile devices such
as laptops, personal digital assistants, IP phones and other smart phones, or fixed
devices such as desktops and workstations that are equipped with a wireless
network interface.
9
Basic service set:
The basic service set (BSS) is a set of all stations that can communicate with
each other. Every BSS has an identification (ID) called the BSSID, which is the
MAC address of the access point servicing the BSS.
There are two types of BSS: Independent BSS (also referred to as IBSS), and
infrastructure BSS. An independent BSS (IBSS) is an ad hoc network that contains
no access points, which means they can't connect to any other basic service set.
Extended service set:
An extended service set (ESS) is a set of connected BSSs. Access points in
an ESS are connected by a distribution system. Each ESS has an ID called the
SSID which is a 32-byte (maximum) character string.
Distribution system:
A distribution system (DS) connects access points in an extended service set.
The concept of a DS can be used to increase network coverage through roaming
between cells [8] .
Fig (2.1) WLAN architecture
10
2.8 Hardware:
Hardware requirement:
Adapters:
Wireless network adapters (also known as wireless NICs or wireless network
cards) are required for each device on a wireless network. All newer laptop
computers incorporate wireless adapters as a built-in feature of the system.
Separate add-on adapters must be purchased for older laptop PCs; these exist in
either PCMCIA "credit card" or USB form factors.
No wireless hardware other than adapters is required to build a small local
network. However, to increase the performance of network connections,
accommodate more computers, and increase the network's range, additional types
of hardware can be deployed.
Wireless Routers:
Wireless routers function comparably to traditional routers for wired
Ethernet networks. One generally deploys wireless routers when building an all-
wireless network from the ground up.
Similar to routers, access points allow wireless networks to join an existing wired
network. One typically deploys access points when growing a network that already
has routers installed. In home networking, a single access point (or router)
possesses sufficient range to span most residential buildings. Businesses in office
buildings often must deploy multiple access points and/or routers.
Wireless Antennas:
Access points and routers often utilize a Wi-Fi wireless antenna that significantly
increases the communication range of the wireless radio signal. These antennas are
optional and removable on most equipment. It's also possible to mount aftermarket
add-on antennas on wireless clients to increase the range of wireless adapters. Add-
11
ons antennas are usually not required on typical wireless networks, although it's
common practice for war drivers to use them.
Wireless Repeaters:
A wireless repeater connects to a router or access point. Often called signal
boosters or range expanders, repeaters serve as a two-way relay station for wireless
radio signals, helping clients otherwise unable to receive a network's wireless
signal to join.
The key hardware components of a wireless computer network include adapters,
routers and access points, antennas and repeaters. [9]
2.9 Software requirements:-
Medium Access Control Protocols for WLANs
As mentioned before WLAN is like any other LAN categorized by the MAC
protocol used for sharing the medium. One of the most used protocols is the so
called Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). This
protocol is adopted in many products in the market and is the one chosen for the
IEEE 802.11 standards.
CSMA / CA is trying to prevent a collision, and so that each computer sends a
signal indicating his intention to send data, and that before he actually sending
data, and it does so by sending a signal Reservation Burst data before transmission,
the signal that tells the rest of the devices that are sending data to not about to
happen to the other device to send data at the same time and this reduces the
likelihood of a collision, but it does not prevent him fully.
12
2.10 Advantages and Disadvantages of WLAN:
Advantages of WLAN:
Mobility: Wireless LANs allow users real-time access to information from
anywhere in their organization, without having to find a place to connect to
the network via an Ethernet connection, thereby increasing productivity.
Reliability: fewer wires and connectors translate to fewer Problems for
users and network administrators.
Ease of Installation: Wireless LANs do not require expensive and time-
consuming cable installation of particular benefit in difficult to-wire areas.
Affordability: Wireless LAN installation and costs over the life of
The product can be significantly lower than those incurred with wired
Networks, especially in environments that require frequent moves
And modifications.
Scalability:Wireless LAN systems are easy to configure and
Rearrange to accommodate a wide variety of office settings and
Number of users.
Disadvantages of WLAN:
Wireless channel losses: The loss probability experienced by packet
transmission is in general higher on the wireless medium rather than on
wired links: while Bit Error Rate (BER) varies from 10-8
to 10-6
for wired
channels, it varies from 10-3
up to 10-1
for wireless channels [10]. Such error
rates are unacceptable for the TCP [11], designed for wired networks.
As the number of computers using the network increases, the data transfer
rate to each computer will decrease accordingly.
As standards change, it may be necessary to replace wireless cards and/or
access points.
13
Lower wireless bandwidth means some applications such as video streaming
will be more effective on a wired LAN.
Security is more difficult to guarantee and requires configuration.
2.11 Concept of voice over IP:
Voice over Internet Protocol (VoIP) is a methodology and group of technologies
for the delivery of voice communications and multimedia sessions over Internet
Protocol (IP) networks, such as the Internet. Other terms commonly associated
with VoIP are IP telephony, Internet telephony, voice over broadband (VOBB),
broadband telephony, IP communications, and broadband phone service.
The term Internet telephony specifically refers to the provisioning of
communications services (voice, fax, SMS, voice-messaging) over the public
Internet, rather than via the public switched telephone network (PSTN). The steps
and principals involved in originating VoIP telephone calls are similar to
traditional digital telephony and involve signaling, channel setup, digitization of
the analog voice signals, and encoding. Instead of being transmitted over a circuit-
switched network, however, the digital information is packetized, and transmission
occurs as Internet Protocol (IP) packets over a packet-switched network. Such
transmission entails careful considerations about resource management different
from time-division multiplexing (TDM) networks [12]
2.12 Types of VoIP:
There are several different types of VoIP service depending on the infrastructure
used for the communication: computer-to-computer based VoIP (VoIP device to
another VoIP device); computer-to-Phone based VoIP (VoIP device to a PSTN
device); and Phone-to-Phone based VoIP (PSTN device to another PSTN device)
14
[13]. Each type of them has different set of requirements. This section describes
the three broad categories of VoIP service.
Computer to Computer
Internet telephony services via computers are totally free VoIP services. This type
of VoIP services via specialized software applications (softphone software) such as
Skype, AOL Instant Messenger, and MSN Messenger etc. These services require
users to download their software and get them installed on PC, Caller and receiver
need to use same VoIP software application (For instance, Skype to Skype, MSN
to MSN etc), caller and receiver are communicated based on peer-to-peer approach
through the Internet.
The requirements for computer to computer Internet telephony include:
Softphone software,
A sound card
Internet access
Computer to Phone Because the Internet and conventional circuit switched
telephone systems use different systems. Thus, softphone software need to routes
the call through internet protocol and hands it off to a conventional telephone
network. Skype, MSN, and Google Talk also provide services to users make phone
calls from computers to typical landline phones.
Equipment requirements:
VoIP service subscription
Internet access
A modem
An Analog Terminal Adapter (ATA) that converts the analog call signal to digital
signal (and vice versa).
15
Phone to Computer Users can make phone calls from traditional landline phones
to computers with this service. A phone number will be assigned to a computer’s
IP address. A user can dial this number just like making normal phone calls.
Therefore, wherever you are, you can receive phone calls on your computer from
landline phones via the number assigned. Skype now allows users to purchase
phone to computer VoIP services [14].
Phone to Phone this is the ultimate step of VoIP services. Currently, many
telephone companies already use this service to handle long distance calls. In the
future, telephone companies will be able to use the internet to handle all the
telephone calls. Therefore, VoIP services completely do not need the traditional
PSTN for both call origination and termination.
2.13 VoIP System:
Figure 2.2 shows a typical VoIP network topology that includes following
equipment’s:
Gatekeeper: A gatekeeper or call manager node is optional for a VoIP network. In
an H.323 IP telephony environment, a gatekeeper works as a routing manager and
central manager that manage all the end nodes in a zone. A gatekeeper is useful for
handling VoIP call connections includes managing terminals, gateways and MCU's
(multipoint control units). A VoIP gatekeeper also provides address translation,
bandwidth control, access control [15]. Therefore, A VoIP gatekeeper can improve
security and Quality of Service (QoS)
16
Figure 2.2: A typical VoIP Network Topology.
VoIP Gateway: A VoIP gateway is also required to handle external calls. A VoIP
gateway functions as a converter that converting VoIP calls to/from the traditional
PSTN lines, it also provides connection between a traditional PBX (Private
Branch Exchange) / Phone system and an IP network.
VoIP Clients: Other required VoIP hardware includes a VoIP client terminal, a
VoIP device could be an IP Phone.
2.14 VOIP components:
. Servers:
For processing IP calls and manage interaction with PBX etc.
End-point devices: such as phones
Media and VoIP gateways
IP network
17
2.15VoIP Protocols:
H.323
There are two standard protocols used in VoIP network: Session Initiation Protocol
(SIP) and H.323, (Skype [14] and some others use proprietary signaling and
messaging protocols). H.323 [15] is ITU (International Telecommunication Union)
standard based on Real-time Protocol (RP) and Real-Time Control Protocol
0(RTCP); H.323 is a set of protocols for sending voice, video and data over IP
network to provide real-time multimedia communications. H.323 is reliable and
easy to maintain technology and also is the recommendation standard by ITU for
multimedia communications over LANs [16], [17]. Figure 2.3 shows the H.323
architecture.
Figure 2.3: H.323 Architecture
18
There are four basic entities in a default H.323 network [17], [18]: terminal,
gateways (GW), gatekeepers (GK) and multipoint control units (MCU): H.323
terminal also called H.323 client is the end-user device. It could be IP telephone or
a multimedia PC with another H.323 client. That provides real-time two-way
media communication. A Gateway (GW) is an optional component that provides
inter-network translation between terminals. A Gatekeeper (GK) is an optional
component provides address translations and access control services. A Multipoint
Control Unit (MCU) functions as a bridge or switch that enables three or more
terminals and gateways in a multipoint conference.
SIP :
H.323 has some limitations such as lack of flexibility, thus another protocol SIP is
getting popular in VoIP [19]. SIP (stands for Session Initiation Protocol) was
developed by the Internet Engineering Task Force (IETF) and published as RFC
3261 [20]. SIP is a signaling control protocol which is similar to http, it’s designed
to initial and terminate VoIP sessions with one or more participants [21]. It is less
weight and more flexible than H.323 that also can be used for multimedia sessions
such as audio, video and data. Figure 2.4 shows the architecture of SIP protocol.
SIP has two components: User Agents and SIP servers. User agents are peers in a
SIP. User agents could be either an agent client or an agent server. A user agent
client initiates by sending a SIP request. A user agent server can accept, terminate
or redirect the request as responses to this SIP request. There are three types of SIP
servers include SIP proxy servers, SIP registrar servers, and SIP redirect servers. A
SIP server functions as a server that handles these requests, e.g. requests
transferring, security, authentication, and call routing.
19
Figure 2.4: SIP Architecture
SIP is not only popular in VoIP applications but also widely used in applications
include instant messaging and some other commercial applications, e.g. Microsoft
MSN Messenger, Apple iChat.
2.16 Quality of serves:
When you pick up a telephone, you expect to converse in a clear and
understandable way. The ever-present public system telephone network provides
this service. A voice over IP system needs to provide the same. Anything less
would provide an excuse to avoid the technology. The public Internet is
notoriously haphazard.
Watching a Web page stall as it loads is a fine example of the pitfalls of this
complex technology. Quality of service is an issue with voice over IP and is
usually listed as one factor in the slow adoption of the technology. In the case of
VoIP, QoS means that the telephone conversation sounds as close to real life as
possible, or at least similar to a conversation over the public telephone network.
20
This chapter looks at the factors that affect quality of service for VoIP and then
examines the techniques that may be applied to a VoIP system that can give the
users a true high-quality telephone experience. Chapter 16, “Implementing QoS,”
looks at these same factors but from a technical and packet level viewpoint.
2.17 Factors that affect quality of service:
1. Bandwidth:
Bandwidth refers to the amount of data that can pass over a network in a time
frame, usually measured in bits per second (bps). If many services are using the
network, then bandwidth must be shared among them. If there is not enough
bandwidth, then “something’s gotta give.” Either packets can’t get onto the
network in a reasonable time or excess packets are discarded. Bandwidth is listed
as a contributing cause of quality of service problems because it affects the other
factors discussed here: delay, jitter, and packet loss.[22]
2. Delay:
High QoS should be assured by control delay so that one-way communication
delay should be less than 150 ms. (ITU states that one-way, end-to-end telephony
applications should have less than150 ms delay in echo-free environments to
ensure user satisfaction [23]). Delay mainly comes from three components [24]:
(1) delay caused by voice codec algorithms (2) delay caused by queuing algorithms
of communications equipment (3) variable delay caused by various factors (i.e.
network conditions, VoIP equipment’s, weathers etc.). It is very important to
minimize the voice traffic delay. Thus, a codec algorithm and queuing algorithm
needs to be carefully considered. Although traditionally think the end-to-end delay
of 150 ms was considered as acceptable for most applications. However, in
reference [25], the authors state that a delay of up to 200ms is considered as
acceptable. Moreover, a one way end-to-end delay between 150ms to 400ms is
considered as acceptable for planning purposes. In this study, 200ms will be
21
considered as the maximum acceptable one way end-to-end delay, high end-to-end
delay can cause bad voice quality perceived by the end user.
3. Jitter:
Delay variation also called Jitter. Jitter is the difference value between the delays
of two queuing packets. Root causes of jitter including network conditions and
packet loss; it is very difficult to deliver voice traffic at a constant rate. In order to
minimize jitter a jitter buffer (also known as play out buffers) is needed. A jitter
buffer is used to trade off delay and the probability of packet interruption play out.
Jitter value is considered acceptable between 0ms and 50 MS and above this is
considered as unacceptable [21].
4. Packet loss:
Packet loss is also an important factor VoIP QoS. Packet loss Occurs when more
transmitted packets on the network then causes dropped packets. VoIP packets are
very time sensitive. Therefore, packet loss can significantly affect VoIP quality.
For instance, a dropped conversation, delay between communicating clients, or
noise on a VoIP call. Acceptable packet loss rate is 1 % and it will be considered
as unacceptable if above this ratio [26]. However, an early study shows that the
tolerable packet loss rates are within 1-3% and the voice quality becomes
intolerable when voice packet loss rate is more than 3% [27].
Therefore, all these factors need to be properly controlled by QoS mechanisms.
When these factors are properly controlled, VoIP voice quality can be even better
through lower speed connections. In the meantime, data applications in the
network can be also prioritized and assured with limited and shared network
resources. The quality VoIP is the key factor of VoIP service to achieve success.
5-Echo:
Echo in a telephone circuit refers to the speaker’s voice bouncing back from
certain disjunctions of the circuit such that the speaker can hear parts of his
22
conversation. Echo occurs even in a traditional switched telephone circuit, but
since the round-trip time is less than 50 ms, the effect is masked and not
noticeable. When the round trip is longer than 50 ms, such as in a long distance
call, echo canceling techniques need to be used.[22]
2.18 Advantages of VoIP:
VoIP phone service providers offer many advantages to the residential and small
office/home office user. If you have a high speed internet connection then choosing
a VoIP phone service might be right for you.
Low Cost:
This technology leads to greater financial savings. This happens because
There exists only one network carrying the voice and data provided by only one
supplier. If you have a broadband Internet connection (DSL or cable),
You can make PC-to-PC phone calls anywhere in the world for free. If you wish to
make a PC-to-phone connection, there's usually a charge for this but probably
much cheaper than your regular phone service.
You can pay as you go or you can sign up with a VOIP service provider and pay a
monthly fee in return for unlimited calls within a certain geographic area. For
example, some VOIP services in the United States allow you to call anywhere in
North America at no extra charge.
Low Taxes:
Since the calls are being carried over the Internet, governments have not heavily
taxed VoIP phone services. Compare that to your local telephone bill (go ahead
and take a close look) and you will see you are spending quite a bit on taxes each
month. Therefore, choosing a VoIP provider could add up to significant savings for
you and your family.
23
Portability:
One important concept to understand about VoIP is that unlike it’s forefathers
(let’s call them PSTN for now), it is not distance or location dependent. As far as
VoIP is concerned, you could be calling your supplier 1,000 miles away in
Indonesia or calling your business partner on the other end of town, and it doesn’t
make any difference at all, in terms of connectivity and cost.
You can make and receive phone calls wherever there is a broadband connection
simply by signing in to your VoIP account. This makes VoIP as convenient as e-
mail – if you are traveling, simply pack a headset or Internet phone and you can
talk to your family or business associates for almost nothing.
Features:
Unlike regular phone service which usually charges more for extra features, VOIP
comes with a host of advanced communication features. For example, call
forwarding, call waiting, voicemail, caller ID and three-way calling are some of the
many services included with VOIP telephone service at no extra charge. You can
also send data such as pictures and documents at the same time you are talking on
the phone.
VoIP phones can integrate with other services available over the Internet, including
video conversation, message or data file exchange in parallel with the
conversation, audio conferencing, managing address books and passing
information about whether others (e.g. friends or colleagues) are available online to
interested parties.
Flexibility:
When you choose a VoIP phone service provider, you will be sent a converter to
allow a regular phone to use the VoIP phone service. Your phone number is
programmed into the converter. This means that you can take your phone converter
24
and phone number and use them wherever you travel in the world, just as long as
you have access to a high-speed Internet connection. Because your telephone
number is based in your converter (and not your home/office), you have the option
of choosing any area code for your phone number. Some carriers will allow you to
have more than 1 phone number in different area codes for a small additional fee
(called a virtual phone number).
2.19 Disadvantages of VoIP:
If VOIP is starting to sound really good to you, make sure you understand the
following downsides as well.
No service during a power outage:
During a blackout a regular phone is kept in service by the current supplied
through the phone line. This is not possible with IP phones, so when the power
goes out, there is no VOIP phone service. In order to use VoIP during a power
outage, an uninterruptible power supply or a generator must be installed on the
premises. It should be noted that many early adopters of VoIP are also users of
other phone equipment such as PBX and cordless phone bases that also rely on
power not provided by the telephone company.
Emergency calls:
Another major concern with VOIP involves emergency 911 calls. Traditional
phone equipment can trace your location. Emergency calls are diverted to the
nearest call center where the operator can see your location in case you can't talk.
However, because a voice-over-IP call is essentially a transfer of data between two
IP addresses, not physical addresses, with VOIP there is currently no way to
determine where your VOIP phone call is originating from.
Although many companies are making an effort to provide for emergency calls in
their service, this issue remains an important deterrent against VoIP.
25
Reliability:
Because VOIP relies on an Internet connection, your VOIP service will be affected
by the quality and reliability of your broadband Internet service and sometimes by
the limitations of your PC. Poor Internet connections and congestion can result in
garbled or distorted voice quality. If you are using your computer at the same time
as making a computer VOIP call, you may find that voice quality deteriorates
dramatically. This is more noticeable in highly congested networks and/or where
there are long distances and/or internetworking between end points. [28]
Security:
As VoIP becomes more and more popular, the security issues relate to VoIP
network systems are also increasingly arising [29]. W. Chou [30] analysis the
different aspects of VoIP security and gives some suggested strategies to these
issues. In reference [31], the authors also outline the challenges of securing VoIP,
and provide guidelines for adopting VoIP technology
26
Chapter three
System Model & Simulation
3-1 Descriptive:-
We create a virtual WLAN network by using opnet software program,The
following specifications well use two applications with profile voice it contains a
number of nodes varies between 10 to30, it covers an office with area 100x100
meter,with data rate varies between 1Mbps up to 11 Mbps, simulation time varies
between 10min to 50 min and tested the fixed nodes.
3.2 Mathematical model:
The performance metrical to evaluate voice over IP over Wi-Fi is given by:
3.2.1 Delay:
D tot= Q (D proc+D queue +D trans +D prop) ……………… (3.1)
Where:
Q: is the number of network elements (routers, switches and firewalls) between the
sender and receiver
D pro : is the processing delay at a given network element
D queue : is the queuing delay at given network element
D Trans : is the transmission time of a packet on a given link
D prop : is the propagation delay across a given network link
27
3.2.2 Throughput:
Throughput is the number of packets effectively transferred in a network, other
words, throughput is data transfer rate that are delivered to all terminals in a
network. It is measured in terms of packets per second or per time slot It is a
measure of the data rate (bits per second) generated by the application. Equation 1
shows the calculation for throughput (TP).
𝑻𝑷 = ∑𝒑𝒂𝒄𝒌𝒆𝒕𝒔𝒊𝒛𝒆𝒊
𝒑𝒂𝒄𝒌𝒆𝒕𝒂𝒓𝒓𝒊𝒗𝒂𝒍𝒏−𝒑𝒂𝒄𝒌𝒆𝒕𝒔𝒕𝒂𝒓𝒕𝟎……………… (3.2)
Where:
Packet Size I: is the packet size of the packet reaching the destination.
Packet Start o: is the time when the first packet left the source.
Packet Arrival n: is the time when the last packet arrived.
3.2.3Packet Delay variance (Jitter):
Packet Delay variance (Jitter) could be termed as the variation in delay or packet
delay variation. The value of jitter is calculated from the end to end delay.
Measuring jitter is critical element to determining the performance of network and
the QOS the network offers. It is the variation in the time between packets arriving.
Jitter is commonly used as an indicator of consistency and stability of a network.
Equation 2 shows how to calculate jitter.
AJ=∑ (𝒑𝒂𝒄𝒌𝒆𝒕 𝒂𝒓𝒓𝒊𝒗𝒂𝒍𝒊+𝟏−𝒑𝒂𝒄𝒌𝒆𝒕 𝒔𝒕𝒂𝒓𝒕𝒊+𝟏)−(𝒑𝒂𝒌𝒆𝒕 𝒂𝒓𝒓𝒊𝒗𝒂𝒍 𝒊−𝒑𝒂𝒄𝒌𝒆𝒕 𝒔𝒕𝒂𝒓𝒕𝒊)𝒊
𝒏−𝟏. (3.3)
3.3 Algorithms flowcharts :
28
Each one of the flow charts depend on a certain parameter, This parameter is
changed in order to measure the value of delay, jitter, and throughput.
No
Yes
Fig (3.1) algorithms flowcharts for number of nodes
Start
Data rate =11 Mbps
Power=0.005 W
Simulation time = 50 min
Area = 100 * 100 mm
Let profiles applications be voice over IP
𝐷𝑡𝑜𝑡 = 𝑄(𝐷𝑝𝑟𝑜𝑐 + 𝐷𝑞𝑢𝑒𝑢𝑒 + 𝐷𝑡𝑟𝑎𝑛𝑠 + 𝐷𝑝𝑟𝑜𝑝)
𝑇𝑃 = ∑𝑝𝑎𝑘𝑒𝑡 𝑠𝑖𝑧𝑒𝑖
𝑝𝑎𝑘𝑒𝑡 𝑎𝑟𝑟𝑖𝑣𝑎𝑙 𝑛 − 𝑝𝑎𝑘𝑒𝑡 𝑠𝑡𝑎𝑟0
𝐴𝐽 = ∑ [(𝑝𝑎𝑘𝑒𝑡 𝑎𝑟𝑟𝑖𝑣𝑎𝑙𝑖+1 − 𝑝𝑎𝑘𝑒𝑡 𝑠𝑡𝑎𝑟𝑡𝑖+1) − (𝑝𝑎𝑐𝑘𝑒𝑡 𝑎𝑟𝑟𝑖𝑣𝑎𝑙𝑖 − 𝑝𝑎𝑐𝑘𝑒𝑡 𝑠𝑡𝑎𝑟𝑡𝑖)]𝑖
𝑛 + 1
P=TS-Tr
No of
nodes >=
30
End
No of nodes = no of nodes + 5
Plot no of nodes vs. delay
Plot No of nodes vs. throughput
Plot No of nodes vs. Jitter
Simulator =0
No of nodes = 5
29
No
Yes
Fig (3.2) Algorithms flowcharts for data rate
Start
No of nodes =30 nodes
Power=0.005 W
Simulation time = 20min
Area = 100 * 100 m m
Let profiles applications be voice over IP
𝐷𝑡𝑜𝑡 = 𝑄(𝐷𝑝𝑟𝑜𝑐 + 𝐷𝑞𝑢𝑒𝑢𝑒 + 𝐷𝑡𝑟𝑎𝑛𝑠 + 𝐷𝑝𝑟𝑜𝑝)
𝑇𝑃 = ∑𝑝𝑎𝑘𝑒𝑡 𝑠𝑖𝑧𝑒𝑖
𝑝𝑎𝑘𝑒𝑡 𝑎𝑟𝑟𝑖𝑣𝑎𝑙 𝑛 − 𝑝𝑎𝑘𝑒𝑡 𝑠𝑡𝑎𝑟0
𝐴𝐽 = ∑ [(𝑝𝑎𝑘𝑒𝑡 𝑎𝑟𝑟𝑖𝑣𝑎𝑙𝑖+1 − 𝑝𝑎𝑘𝑒𝑡 𝑠𝑡𝑎𝑟𝑡𝑖+1) − (𝑝𝑎𝑐𝑘𝑒𝑡 𝑎𝑟𝑟𝑖𝑣𝑎𝑙𝑖 − 𝑝𝑎𝑐𝑘𝑒𝑡 𝑠𝑡𝑎𝑟𝑡𝑖)]𝑖
𝑛 + 1
P=TS-Tr
Data rate >=
11Mbps
End
Data rate = data rate 1 ,2 ,5.5 ,
11Mbps
Data rate vs. delay
Data rate vs. throughput
Data rate vs. Jitter
Simulator =0
Data rate=1Mbps
Start
30
No
Yes
Fig (3.3) algorithms flowcharts for simulation time
3.4 Simulation environments:
Data rate =11 Mbps
No of nodes = 30 nodes
Power=0.005 W
Area = 100 * 100 m
Let profiles applications be voice over IP
𝐷𝑡𝑜𝑡 = 𝑄(𝐷𝑝𝑟𝑜𝑐 + 𝐷𝑞𝑢𝑒𝑢𝑒 + 𝐷𝑡𝑟𝑎𝑛𝑠 + 𝐷𝑝𝑟𝑜𝑝)
𝑇𝑃 = ∑𝑝𝑎𝑘𝑒𝑡 𝑠𝑖𝑧𝑒𝑖
𝑝𝑎𝑘𝑒𝑡 𝑎𝑟𝑟𝑖𝑣𝑎𝑙 𝑛 − 𝑝𝑎𝑘𝑒𝑡 𝑠𝑡𝑎𝑟0
𝐴𝐽 = ∑ [(𝑝𝑎𝑘𝑒𝑡 𝑎𝑟𝑟𝑖𝑣𝑎𝑙𝑖+1 − 𝑝𝑎𝑘𝑒𝑡 𝑠𝑡𝑎𝑟𝑡𝑖+1) − (𝑝𝑎𝑐𝑘𝑒𝑡 𝑎𝑟𝑟𝑖𝑣𝑎𝑙𝑖 − 𝑝𝑎𝑐𝑘𝑒𝑡 𝑠𝑡𝑎𝑟𝑡𝑖)]𝑖
𝑛 + 1
P=TS-Tr
Sim time
>= 50
End
Simulation time = simulation time
+ 10 min
Simulation time vs. delay
Simulation time vs. throughput
Simulation time vs. Jitter
Simulator =0
Simulation = 10 min
31
Take following table showing the consider parameter
Table (3.1) simulation environments
Parameter Value
Network WLAN
Standard 802.11b
Area Office
Type Voice
No of cell 1 cell
No of nodes 10,20,....,30
Data rate 1, 2, 5.5 ,11 Mbps
Power 0.005w
Simulation time 10, 20 ,...,50 min
3.5 Simulation:
The computer was implemented using OPNET 14.5 software program as shown:
Fig (3.4) WLAN network
Chapter four
32
Results & Discussion
After simulating the following tables and charts showing the results that taken:
4.1 delay result vs.number of node:
The time of simulation con = 20 min , data rate =11 mbps
Table(4.1) no of nodes VS delay
Fig (4.1) A plot of Delay VS No of nodes
0
2
4
6
8
10
12
10 15 20 25 30 35
No of node Delay (msec)
10 2.21
15 4.79
20 6.86
25 8.71
30 9.6
Del
ay (
m s
ec)
Node
33
As the number of nodes increase delayincrease.due to increase process delay
in the network and increase thenumber of network elements (routers,
switches and firewalls) between the sender and receiver,due to increase the
transmission time of a packet on a given link,due to increase the propagation
delay across a given network link, due to increase the queuing delay at given
network element
4.2 Throughput result vs. number of node:
34
Table (4.2) No of node VS Throughput
No of node Throughput(bit /msec)
10 235,199.2
15 73,475.6
20 47,398.5
25 36,894.1
30
26,799.2
Fig (4.2) A plot of throughput VS No of nodes.
Throughputdecreaseexponential as the number of node increase
At the beginning of the simulation, the change in throughput was rapid but
as the number of devicesincrease, the change became almost stable.
As the number of nodes increase the packet arrival delayed time increase
4.3 Jitter result vs. number of node:
0.00
50,000.00
100,000.00
150,000.00
200,000.00
250,000.00
10 15 20 25 30 35
No of nodes
Th
rou
gh
(b
it /
mse
c)
909
kk
kgg
ggg
gg
fgff
gg
g90
sss(
sec)
pu
t
35
Table (4.3) No of node VS Jitter
No of nodes Jitter(sec)
10 0.00074773569286
15 0.00416508639004
20 0.0112127201649
25 0.0246758614288
30 0.0272019657545
Fig (4.3) A plot of Jitter VS No of Node
As the number of nodes increasejitter increase exponentially up to 30
nodes and then it approximately become constant stable at 0.0275msec.
4.4delay result vs.Data rate:
No of Node
Jitt
er(m
sec)
36
Table (4.4) data rate VS Delay
Data rate Delay(msce)
1 13.17971781 2 7.881249697 5.5 6.323481024 11 5.229267771
Fig (4.4) A plot of Delay VS data rate
As the data rate increase delay decrease due theincrease in data transmission
time of a packet on a given link, and decease in the queuing time at given
network element.
4.5 Throughput result vs. data rate:
0
2
4
6
8
10
12
14
1 3 5 7 9 11 13
No of Node
Del
ay(m
sec)
37
Table (4.5) Data Rate VS Throughput
Data rate throughput(bit /msec) 1 18,616.38
2 34,303.46
5.5 41,715.37 11 66,443.44
Fig (4.5) Aplot of throughput VS Data rate
As the data rate increase throughput increasedue todecrease oftime
packetloos and increases the packet arrival time.
4.6jitter result vs. data rate:
0
10000
20000
30000
40000
50000
60000
70000
1 3 5 7 9 11 13
Data rate mbp sec
Thro
ugh
pu
t (b
it /
mse
c)
38
Table (3.7) Data Rate VS jitter
Data rate Jitter(sce)
1 0.116643991
2 0.042403654
5.5 0.026814928
11 0.015397091
Fig (4.6) Jitter VS Data Rate
As data rate increase the jitter decreaseexponentially and become constant
stable after 11MHz with 0.01sec.
4.7Delay result vs.simulation time:
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
1 3 5 7 9 11 13
Data rate Mbp sce
0)
Jitt
er(s
ec)
39
Table (4.7) Simulation Time VS Delay
Simulation Time (min) Delay (msec) 10 13.1797178144
20 15.4995046282
30 16.3106162944 40 16.5719831677
50 16.7617689646
Fig (4.7) A plot of Delay VS simulation time
As increase the simulation time delay increase, increase will be stable as the
time in increase.
4.8 Throughput result vs. simulation time:
13
13.5
14
14.5
15
15.5
16
16.5
17
10 20 30 40 50 60
Simulation time (min)
Del
ay(m
sec)
40
Table (4.8) Simulation Time VS Throughput
Time of simulation Throughput (bits/msec)
10 18,616.3809635 20 24,260.7930446
30 26,626.2447057 40 27,984.1293875
50 28,870.8695715
Fig (4.8) Aplot of throughput VS simulation time
As increase the simulation time throughput increase
4.9 Jitter result vs. simulation time:
17015
19015
21015
23015
25015
27015
29015
31015
10 20 30 40 50 60
Simulation time(min)
Thro
ugh
pu
t (b
it /
sec)
41
Table (4.9) Simulation Time VS jitter
Simulation time(min) Jitter(msec)
10 0.116643991394 20 0.062934502167
30 0.0402186693565 40 0.0338126596046
50 0.0277088080152
Fig (4.9) Aplot of jitter VS simulation time
As simulation time increase jitter decrease, decrease will be stable as the
time in increase .
.
4.4 Result analysis:
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
10 20 30 40 50 60
Simulation time (min)
Jitt
er (
mse
c)
42
From the result obtained we observe the following:
As the number of nodes increase delay increase.due to increase process
delay in the network and increase the number of network elements (routers,
switches and firewalls) between the sender and receiver, due to increase the
transmission time of a packet on a given link , due to increase the
propagation delay across a given network link , due to increase the queuing
delay at given network element .
Throughput decrease exponential as the number of node increase
At the beginning of the simulation, the change in throughput was rapid but
as the number of devices increase, the change became almost stable.
As the number of nodes increase the packet arrival delayed time increase
As the number of nodes increase jitter increase exponentially up to 30
nodes and then it approximately become constant stable at 0.0275msec.
As the data rate increase delay decrease due the increase in data transmission
time of a packet on a given link, and decease in the queuing time at given
network element.
As the data rate increase throughput increase due to decrease of time packet
loos and increases the packet arrival time.
As data rate increase the jitter decrease exponentially and become constant
stable after 11MHz with 0.01sec.
As increase the simulation time delayincrease.
As increase the simulation time the throughput increase.
As the simulation time increase the jitter decrease.
Conclusion and Recommendation
43
5.1 Conclusion:
The study, analysis, plans and design of the software program to simulate and
perform performance analyzes for voice and video over WLAN Network and
evaluates the performance of the system using OPNET software program.
The parameter which was taken into consideration was: data rate, simulation time,
number of nodes, with profile VOIP.
In general concepts of wireless networks were studied. Voice over IP service that
is supported in WLAN was discussed in details. Voice traffic analyzed using a
simulation based on network simulator OPNET software program. The effect of
different service on QOS parameters like throughput, packet loss, jitter and delay
were studied. As the number of nodes increases the throughput, delay, jitter.
For maximum data rate theValuethroughput ( 66,4 bit /sec) the delay (5.22
sec) and jitter( 0.015 sec).
For maximum number of nodestheValueof throughput (26,799bits /sec) ,
delay (9.598 sec) and jitter (0.027sec )
For maximum time of simulation the value of throughput (28,870bit /sec) ,
delay (16.76sec) and jitter 0.0277(sec)
The best design to decrease the delay, packet loss and jitter and increasing the
throughput is increase the data rate with appropriate number of subscriber and long
simulation time.
5.2 Recommendation:
44
From the results obtained we suggest the following recommendation for future
work:
Using wide area like campus and other type of standers IEEE to design
WLAN Network.
Using this design in WIMAX network and then compare it with WLAN
network.
Using mobile devices and other type of data like text or text and voice in
same time.
To increase the simulation time for further inspection.
References:
45
[1]https://www.researchgate.net/publication/290076175_A_survey_on_voice_over
_IP_over_wireless_LANs, (2010).
[2] Networking courses, ipsr solutions ltd redefining excellence,(2017).
[3] Behrouz A. Forouzan. Data communications and Networking. 5nd ed.
William Stallings. Data and Computer Communications. (2012).
[4] Byron W. Putman. 802.11 WLAN Hands-On Analysis. AuthorHouse, (2005).
[5]https://www.ieee.org/index.html-(2014).
[6] Matthew S. Gast. 802.11 Wireless networks. O'Reilly, (2002).
[7] Sunghyunchoi ,sch.of Electr.Eng.,seoul Nat. Univ, south korea IEEE 802.11 e
contention-based access (EDCF) performance evaluation ,ANSI/IEEE std 802.11
Edition,(2003).
[8] waynecaswell.”HomeRFArchieves”,( November 17,2010) Retrieved July
16,2011.
[9]http/smartrouter.wordpress.com/tag/wireless-network/
[10] W. C. Y. Lee, Mobile Communication Design Fundamentals, 2nd Edition,
John Wiley and Sons, (1993)).
[11] D. Vardalis and V. Tsaoussidis, “On the Efficiency and Fair-ness of Protocol
Recovery Strategies in Networks with Wire-less Components,” in Proc. of
International Conference on Internet Computing, CSREA Press, Las Vegas, (June
2001).
[12]VOIPfundamentals,ssd-tech,(2015)https//ssd-tech.com/knowledge-
base/networking/VoIP-fundamentals
46
[13]. D. Rizzetto, & C. Catania , A Voice over IP Service Architecture for
Integrated Communications. IEEE Internet Computing, Volume 3, Issue 3, Pages:
53 – 62. (1999).
[14]. Skype official website, communication,2017: http://about.skype.com .
[15] https://developers.google.com/talk/jep_extensions/extensions. )2013(
[16]. S. K. Das, E. Lee, K. Basu, & S. K. Sen , Performance Optimization of VoIP
Calls over Wireless Links Using H.323 Protocol Computers. IEEE Transactions,
Vol. 52, No. 6 Page(s):742 – 752 (2003).
[17]. G. A. Thom ,H.323: the multimedia communications standard for local area
networks. Communications Magazine, IEEE, Volume 34, Issue 12, page(s): 52-56
(1996).
[18]. L. Hong, & P. Mouchtaris , Voice over IP signaling: H.323 and beyond.
Communications Magazine, IEEE, Volume 38, Issue 10, Page(s):142 – 148.
(2000).
[19]. B. Goode , Voice Over Internet Protocol (VOIP). Proceedings of three IEEE,
Volume 90, Issue 9, Page(s): 1495 – 1517. (2002).
[20]. J. Rosenberg, H. Schulzrinne, G. Camarillo, A.Johnston, J. Peterson, R.
Sparks, M. Handley, & E. Schooler , SIP: Session Initiation Protocol. RFC 3261,
IETF. (2002).
[21]. L. Milandinovic, & J. Stadler , Multiparty Conference Signaling using SIP.
International Network Conference, (2002) .
[22] nickwittenberg, Understanding voice over IP technology ,Vice President,
Career and Professional, Editorial: Dave Garza,Delmar, Cengage Learning.( 2009)
47
[23] L. Zheng, L. Zhang, & D. Xu , Characteristics of network delay and delay
jitter and its effect on voice over IP (VoIP). ICC 2001. IEEE International
Conference, Volume 1, Page(s):122 – 126. (2001).
[24]. Han-Chieh Chao, Y. M. Chu, & G. Tsuei ,Codec Schemes Selection for
Wireless Voice over IP (VoIP). Proceedings of the Second IEEE Pacific 63 (2001).
[25] J. H. James, C. Bing, & L. Garrison, Implementing VoIP: a voice transmission
performance progress report. Communications Magazine, IEEE, Volume 42, Issue
7, page(s): 36- 41(2004)
[26]. Net beez, impact of packet loss, jitter, and latency on VOIP ,(2017)
http://netbeez.net/2016/08/18/impact-of-packet-loss-jitter-and-latency-on-voip/
[27]. C. N. Chuah, Providing End-to-End QoS for IP based Latency sensitive
Applications”. Technical Report, Dept. of Electrical Engineering and Computer
Science, University of California at Berkeley. (2000)
[28] http//faq.programmerworld.net/voip/voip-advantages-disadvantages.html
2013.
[29] P.C.K. Hung, & M.V. Martin, Security Issues in VOIP Applications.
Electrical and Computer Engineering, CCECE '06, Page(s):2361 – 2364 (2006).
[30]. W. Chou, Strategies to Keep Your VoIP Network Secure. IT Professional
Published by IEEE Computer Society, Volume 9, Issue 5, Pages 42-46. (2007).
[31]. T.J. Walsh, & D.R. Kuhn, Challenges in securing voice over IP. IEEE
Security & Privacy, vol. 3, no. 3, pp. 44- 49. (2005).