英文文獻(xiàn)科技類(lèi)原文及翻譯(電子電氣自動(dòng)化通信)1_第1頁(yè)
英文文獻(xiàn)科技類(lèi)原文及翻譯(電子電氣自動(dòng)化通信)1_第2頁(yè)
英文文獻(xiàn)科技類(lèi)原文及翻譯(電子電氣自動(dòng)化通信)1_第3頁(yè)
英文文獻(xiàn)科技類(lèi)原文及翻譯(電子電氣自動(dòng)化通信)1_第4頁(yè)
英文文獻(xiàn)科技類(lèi)原文及翻譯(電子電氣自動(dòng)化通信)1_第5頁(yè)
已閱讀5頁(yè),還剩28頁(yè)未讀 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、外文文獻(xiàn)原文on the deployment of voip in ethernet networks: methodology and case studykhaled salah, department of information and computer science, king fahd university of petroleum and minerals, p.o. box 5066, dhahran 31261, saudi arabia received 25 may 2004;  revised 3 june 2005;  accepted 3 j

2、une 2005.  available online 1 july 2005. abstractdeploying ip telephony or voice over ip (voip) is a major and challenging task for data network researchers and designers. this paper outlines guidelines and a step-by-step methodology on how voip can be deployed successfully. the methodology can

3、 be used to assess the support and readiness of an existing network. prior to the purchase and deployment of voip equipment, the methodology predicts the number of voip calls that can be sustained by an existing network while satisfying qos requirements of all network services and leaving adequate c

4、apacity for future growth. as a case study, we apply the methodology steps on a typical network of a small enterprise. we utilize both analysis and simulation to investigate throughput and delay bounds. our analysis is based on queuing theory, and opnet is used for simulation. results obtained from

5、analysis and simulation are in line and give a close match. in addition, the paper discusses many design and engineering issues. these issues include characteristics of voip traffic and qos requirements, voip flow and call distribution, defining future growth capacity, and measurement and impact of

6、background traffic. keywords: network design,network management,voip,performance evaluation,analysis,simulation,opnet 1 introductionthese days a massive deployment of voip is taking place over data networks. most of these networks are ethernet based and running ip protocol. many network managers are

7、 finding it very attractive and cost effective to merge and unify voice and data networks into one. it is easier to run, manage, and maintain. however, one has to keep in mind that ip networks are best-effort networks that were designed for non-real time applications. on the other hand, voip require

8、s timely packet delivery with low latency, jitter, packet loss, and sufficient bandwidth. to achieve this goal, an efficient deployment of voip must ensure these real-time traffic requirements can be guaranteed over new or existing ip networks. when deploying a new network service such as voip over

9、existing network, many network architects, managers, planners, designers, and engineers are faced with common strategic, and sometimes challenging, questions. what are the qos requirements for voip? how will the new voip load impact the qos for currently running network services and applications? wi

10、ll my existing network support voip and satisfy the standardized qos requirements? if so, how many voip calls can the network support before upgrading prematurely any part of the existing network hardware? these challenging questions have led to the development of some commercial tools for testing t

11、he performance of multimedia applications in data networks. a list of the available commercial tools that support voip is listed in 1,2. for the most part, these tools use two common approaches in assessing the deployment of voip into the existing network. one approach is based on first performing n

12、etwork measurements and then predicting the network readiness for supporting voip. the prediction of the network readiness is based on assessing the health of network elements. the second approach is based on injecting real voip traffic into existing network and measuring the resulting delay, jitter

13、, and loss. other than the cost associated with the commercial tools, none of the commercial tools offer a comprehensive approach for successful voip deployment. in particular, none gives any prediction for the total number of calls that can be supported by the network taking into account important

14、design and engineering factors. these factors include voip flow and call distribution, future growth capacity, performance thresholds, impact of voip on existing network services and applications, and impact background traffic on voip. this paper attempts to address those important factors and layou

15、t a comprehensive methodology for a successful deployment of any multimedia application such as voip and video conferencing. however, the paper focuses on voip as the new service of interest to be deployed. the paper also contains many useful engineering and design guidelines, and discusses many pra

16、ctical issues pertaining to the deployment of voip. these issues include characteristics of voip traffic and qos requirements, voip flow and call distribution, defining future growth capacity, and measurement and impact of background traffic. as a case study, we illustrate how our approach and guide

17、lines can be applied to a typical network of a small enterprise. the rest of the paper is organized as follows. section 2 presents a typical network topology of a small enterprise to be used as a case study for deploying voip. section 3 outlines practical eight-step methodology to deploy successfull

18、y voip in data networks. each step is described in considerable detail. section 4 describes important design and engineering decisions to be made based on the analytic and simulation studies. section 5 concludes the study and identifies future work.2 existing networkfig. 1 illustrates a typical netw

19、ork topology for a small enterprise residing in a high-rise building. the network shown is realistic and used as a case study only; however, our work presented in this paper can be adopted easily for larger and general networks by following the same principles, guidelines, and concepts laid out in t

20、his paper. the network is ethernet-based and has two layer-2 ethernet switches connected by a router. the router is cisco 2621, and the switches are 3com superstack 3300. switch 1 connects floors 1 and 2 and two servers; while switch 2 connects floor 3 and four servers. each floor lan is basically a

21、 shared ethernet connecting employee pcs with workgroup and printer servers. the network makes use of vlans in order to isolate broadcast and multicast traffic. a total of five lans exist. all vlans are port based. switch 1 is configured such that it has three vlans. vlan1 includes the database and

22、file servers. vlan2 includes floor 1. vlan3 includes floor2. on the other hand, switch 2 is configured to have two vlans. vlan4 includes the servers for e-mail, http, web and cache proxy, and firewall. vlan5 includes floor 3. all the links are switched ethernet 100 mbps full duplex except for the li

23、nks for floors 13 which are shared ethernet 100 mbps half duplex.3 step-by-step methodologyfig. 2 shows a flowchart of a methodology of eight steps for a successful voip deployment. the first four steps are independent and can be performed in parallel. before embarking on the analysis and simulation

24、 study, in steps 6 and 7, step 5 must be carried out which requires any early and necessary redimensioning or modifications to the existing network. as shown, both steps 6 and 7 can be done in parallel. the final step is pilot deployment.3.1. voip traffic characteristics, requirements, and assumptio

25、ns for introducing a new network service such as voip, one has to characterize first the nature of its traffic, qos requirements, and any additional components or devices. for simplicity, we assume a point-to-point conversation for all voip calls with no call conferencing. for deploying voip, a gate

26、keeper or call manager node has to be added to the network 3,4,5. the gatekeeper node handles signaling for establishing, terminating, and authorizing connections of all voip calls. also a voip gateway is required to handle external calls. a voip gateway is responsible for converting voip calls to/f

27、rom the public switched telephone network (pstn). as an engineering and design issue, the placement of these nodes in the network becomes crucial. we will tackle this issue in design step 5. other hardware requirements include a voip client terminal, which can be a separate voip device, i.e. ip phon

28、es, or a typical pc or workstation that is voip-enabled. a voip-enabled workstation runs voip software such as ip soft phones .fig. 3 identifies the end-to-end voip components from sender to receiver 9. the first component is the encoder which periodically samples the original voice signal and assig

29、ns a fixed number of bits to each sample, creating a constant bit rate stream. the traditional sample-based encoder g.711 uses pulse code modulation (pcm) to generate 8-bit samples every 0.125 ms, leading to a data rate of 64 kbps . the packetizer follows the encoder and encapsulates a certain numbe

30、r of speech samples into packets and adds the rtp, udp, ip, and ethernet headers. the voice packets travel through the data network. an important component at the receiving end, is the playback buffer whose purpose is to absorb variations or jitter in delay and provide a smooth playout. then packets

31、 are delivered to the depacketizer and eventually to the decoder which reconstructs the original voice signal. we will follow the widely adopted recommendations of h.323, g.711, and g.714 standards for voip qos requirements. table 1 compares some commonly used itu-t standard codecs and the amount of

32、 one-way delay that they impose. to account for upper limits and to meet desirable quality requirement according to itu recommendation p.800, we will adopt g.711u codec standards for the required delay and bandwidth. g.711u yields around 4.4 mos rating. mos, mean opinion score, is a commonly used vo

33、ip performance metric given in a scale of 15, with 5 is the best. however, with little compromise to quality, it is possible to implement different itu-t codecs that yield much less required bandwidth per call and relatively a bit higher, but acceptable, end-to-end delay. this can be accomplished by

34、 applying compression, silence suppression, packet loss concealment, queue management techniques, and encapsulating more than one voice packet into a single ethernet frame.3.1.1. end-to-end delay for a single voice packet fig. 3 illustrates the sources of delay for a typical voice packet. the end-to

35、-end delay is sometimes referred to by m2e or mouth-to-ear delay. g.714 imposes a maximum total one-way packet delay of 150 ms end-to-end for voip applications . in 22, a delay of up to 200 ms was considered to be acceptable. we can break this delay down into at least three different contributing co

36、mponents, which are as follows (i) encoding, compression, and packetization delay at the sender (ii) propagation, transmission and queuing delay in the network and (iii) buffering, decompression, depacketization, decoding, and playback delay at the receiver. 3.1.2. bandwidth for a single callthe req

37、uired bandwidth for a single call, one direction, is 64 kbps. g.711 codec samples 20 ms of voice per packet. therefore, 50 such packets need to be transmitted per second. each packet contains 160 voice samples in order to give 8000 samples per second. each packet is sent in one ethernet frame. with

38、every packet of size 160 bytes, headers of additional protocol layers are added. these headers include rtp+udp+ip+ethernet with preamble of sizes 12+8+20+26, respectively. therefore, a total of 226 bytes, or 1808 bits, needs to be transmitted 50 times per second, or 90.4 kbps, in one direction. for

39、both directions, the required bandwidth for a single call is 100 pps or 180.8 kbps assuming a symmetric flow.3.1.3. other assumptionsthroughout our analysis and work, we assume voice calls are symmetric and no voice conferencing is implemented. we also ignore the signaling traffic generated by the g

40、atekeeper. we base our analysis and design on the worst-case scenario for voip call traffic. the signaling traffic involving the gatekeeper is mostly generated prior to the establishment of the voice call and when the call is finished. this traffic is relatively small compared to the actual voice ca

41、ll traffic. in general, the gatekeeper generates no or very limited signaling traffic throughout the duration of the voip call for an already established on-going call. in this paper, we will implement no qos mechanisms that can enhance the quality of packet delivery in ip networks. a myriad of qos

42、standards are available and can be enabled for network elements. qos standards may include ieee 802.1p/q, the ietfs rsvp, and diffserv. analysis of implementation cost, complexity, management, and benefit must be weighed carefully before adopting such qos standards. these standards can be recommende

43、d when the cost for upgrading some network elements is high and the network resources are scarce and heavily loaded.3.2. voip traffic flow and call distributionknowing the current telephone call usage or volume of the enterprise is an important step for a successful voip deployment. before embarking

44、 on further analysis or planning phases for a voip deployment, collecting statistics about of the present call volume and profiles is essential. sources of such information are organizations pbx, telephone records and bills. key characteristics of existing calls can include the number of calls, numb

45、er of concurrent calls, time, duration, etc. it is important to determine the locations of the call endpoints, i.e. the sources and destinations, as well as their corresponding path or flow. this will aid in identifying the call distribution and the calls made internally or externally. call distribu

46、tion must include percentage of calls within and outside of a floor, building, department, or organization. as a good capacity planning measure, it is recommended to base the voip call distribution on the busy hour traffic of phone calls for the busiest day of a week or a month. this will ensure sup

47、port of the calls at all times with high qos for all voip calls. when such current statistics are combined with the projected extra calls, we can predict the worst-case voip traffic load to be introduced to the existing network. fig. 4 describes the call distribution for the enterprise under study b

48、ased on the worst busy hour and the projected future growth of voip calls. in the figure, the call distribution is described as a probability tree. it is also possible to describe it as a probability matrix. some important observations can be made about the voice traffic flow for inter-floor and ext

49、ernal calls. for all these type of calls, the voice traffic has to be always routed through the router. this is so because switchs 1 and 2 are layer 2 switches with vlans configuration. one can observe that the traffic flow for inter-floor calls between floors 1 and 2 imposes twice the load on switc

50、h 1, as the traffic has to pass through the switch to the router and back to the switch again. similarly, switch 2 experiences twice the load for external calls from/to floor 3.3.3. define performance thresholds and growth capacity in this step, we define the network performance thresholds or operat

51、ional points for a number of important key network elements. these thresholds are to be considered when deploying the new service. the benefit is twofold. first, the requirements of the new service to be deployed are satisfied. second, adding the new service leaves the network healthy and susceptibl

52、e to future growth. two important performance criteria are to be taken into account. first is the maximum tolerable end-to-end delay; and second is the utilization bounds or thresholds of network resources. the maximum tolerable end-to-end delay is determined by the most sensitive application to run

53、 on the network. in our case, it is 150 ms end-to-end for voip. it is imperative to note that if the network has certain delay sensitive applications, the delay for these applications should be monitored, when introducing voip traffic, such that they do not exceed their required maximum values. as f

54、or the utilization bounds for network resources, such bounds or thresholds are determined by factors such as current utilization, future plans, and foreseen growth of the network. proper resource and capacity planning is crucial. savvy network engineers must deploy new services with scalability in m

55、ind, and ascertain that the network will yield acceptable performance under heavy and peak loads, with no packet loss. voip requires almost no packet loss. in literature, 0.15% packet loss was generally asserted. however, in 24 the required voip packet loss was conservatively suggested to be less th

56、an 10. a more practical packet loss, based on experimentation, of below 1% was required in 22. hence, it is extremely important not to utilize fully the network resources. as rule-of-thumb guideline for switched fast full-duplex ethernet, the average utilization limit of links should be 190%, and fo

57、r switched shared fast ethernet, the average limit of links should be 85% 25. the projected growth in users, network services, business, etc. must be all taken into consideration to extrapolate the required growth capacity or the future growth factor. in our study, we will ascertain that 25% of the

58、available network capacity is reserved for future growth and expansion. for simplicity, we will apply this evenly to all network resources of the router, switches, and switched-ethernet links. however, keep in mind this percentage in practice can be variable for each network resource and may depend

59、on the current utilization and the required growth capacity. in our methodology, the reservation of this utilization of network resources is done upfront, before deploying the new service, and only the left-over capacity is used for investigating the network support of the new service to be deployed.3.4. perform network measurementsin order to characterize the existing network traffic load, utilization, and flow, network measurements have to be performed

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論