Professional Documents
Culture Documents
10 www.ijeart.com
Performance Analysis Of Voip Using Udp And Tcp Protocol
by a wired Ethernet support.Moreover, to simulate the ADSL cumulative number that describes the total number of lost
technology which is designed to combine voice, and other packets during the simulation.
data (video), we will associate the other background traffic in The event type "d" in the trace is the main element for the
parallel to the voice (background traffic). These cross traffic determination of this second type of performance parameter.
is exchanged between the nodes: 1, 2.3, 5, 6, and 7 with a
constant bit rate. VI. PERIOD-END (END TO END DELAY)
At t = 0, the simulation begins with the launch of VoIP
This performance parameter is the time it takes a packet to
flows between node 0 and the node 4. In parallel, the nodes 1
travel the path between node A and node B. It is measured
and 5 create a constant bit rate of background traffic (CBR) at
according to the following. To get its value, it should follow
a rate of 5.89 Mb / s each (the other nodes are idle).
the steps below.
This traffic will provide a load close to that supported the
To obtain the time when the packet is created or
duplex link between the two routers (8 and 9). We expect then
transmitted.
to see that queue of each of the two routers is full.
Get the time when the same packet arrives at destination.
Then, between 2 seconds and 4 seconds (simulation scale),
Take the time difference between the two events.
nodes 2 and 6 began their exchange of packets (previously
To implement this procedure, at first we seek the time when
connected nodes 1 and 5 are off) with a background traffic
the packet is created by checking the trace file, the type of
rate 5.91 Mb / s each. This value is chosen to create a router
event "+" on the relevant node. Then, the unique identifier
overload, creating a first network congestion.
specified in column 12 must be saved and a new search of the
Then, at time t = 4 s, nodes 3 and 7 begin their
same identifier coupled with type of event "r" is made. The
communication with background traffic rate of 5.92 Mb / s
time to look is then obtained by taking the difference of the
each, which far exceeds the bandwidth of the network. At this
times found.
stage, it is expected that the queue in the two routers is full,
which will result in a large number of lost packets.
In this simulation, UDP and TCP agents are attached to the VII. JITTER:
nodes 0 and 4. For cross-traffic, we use UDP-based constant Jitter is also known as IP Packet Delay Variation name
bit rates. (IPDV) which means packet delay variation is defined as the
By applying this algorithm in a terminal linux (Ubuntu). We difference of time it takes to travel between the two ends of
will have a new log file that is much more optimal capacity. the communication. Specifically, there are several ways to
calculate this parameter. The simplest is shown by the
III. PROCESSING WITH MATLAB. following formula.
imageimageMatlabCurveControl awkimageFile tracefile
out.tr A. Figures and Tables
11 www.ijeart.com
International Journal of Engineering and Advanced Research Technology (IJEART)
ISSN: 2454-9290, Volume-2, Issue-2, February 2016
B. Parameter Rating: period-end
For UDP, the time on both sides are around 90 ms. That is to
say, well below the value of the recommended limit is 150 ms.
This delay is unacceptable for VoIP communication. We also
note that this period varies depending on background traffic
that occurs.
12 www.ijeart.com
Performance Analysis Of Voip Using Udp And Tcp Protocol
13 www.ijeart.com
International Journal of Engineering and Advanced Research Technology (IJEART)
ISSN: 2454-9290, Volume-2, Issue-2, February 2016
automatically lowered. This performance is gained through the flow control and error
control. Then, after 4 seconds, we begin to lose the voice data
since not only the background traffic sent to a similar rate to
the rate link is 5.92 Mb / s, but also because the previous
packet background traffic are not all sent. Therefore,
congestion will be provided on the side of two routers, which
reject many packages
14 www.ijeart.com
Performance Analysis Of Voip Using Udp And Tcp Protocol
ACKNOWLEDGMENT
We would like to thank CNTEMAD(Centre Nationale de
Tl-Enseignement de Madagascar) for it financial support
to publish this document
REFERENCES
[1] Samonoi. "Tlinformatique" CITI, INSA Lyon, 2003.
[2] Gilles Lamiral. "Linux-France" Architecture TCP / IP, 2010.
[3] phane Cateloin St Antoine Gallais, Stella Marcus Zwecker, JulienT
Montavont. "Networks", CNAM Lille 1999.
[4] Roberto Arcomano Jerome Blondel, Alain Boule, Jean-Philippe
Guerard., "Practical Guide to Voice over IP (VoIP)" ENSEIR 2007.
[5] Ouakil Laurent, Guy Pujolle. "IP Telephony", 2009.
[6] J Durand rme, Gwenaelle Houssay, Medjo Brice. "Transport
protocols and multimedia designation" 200-2007.
[7] MV Rico, Armor., "Evaluation of Pseudo-Subjective Quality of
Multimedia and its flow control applications," Department R &
T-Module TR-c7, IUT Nice Cte d'Azur 2005
[8] H. Sanneck, G. Carle, R. Koodl., Coupechoux M., "A Framework for
Model Metrics Based on Packet Loss Loss Runlengths", In
Proceedings of the SPIA / ACM Multimedia SIGMM, San Jose, CA,
January 2000.
[9] B. Ahlgren, A. Andersson, Hagsand O., I. Marsh. "Dimensioning
Links for IP Tele-phony" Technical Report T2000-09, Swedish
Institute of Computer Science (SICS)2000.
[10] Mr. Yajnik, S. Moon, JF Kurose, DF Towsley., "Measurement and
Modeling of the Temporal Dependence in Packet Loss, Telecom
Courses Section, dep Genie Electrique "In Proccedings of IEEE
INFOCOM '99, pages 345-352, 1999.
[11] Alex Corenthin, ITU. "Voice and IP Telephony", Springer, Paris, 2006.
[12] NMV Ravonimanantsoa, Randriamitantsoa P.Auguste "Comparison
of the Consumption of Resources entre HTTP and SIP"
ESPA-Madagascar, in 2011.
[13] NMV Ravonimanantsoa, "Comparison of the use of memory entre SIP
and SSH" ECAI Vol4 No. 7, 2011 / ISSN 1843-2115 p35-38.
15 www.ijeart.com