Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Evaluating overflow probability for voice over internet protocol buffer dimensioning

Evaluating overflow probability for voice over internet protocol buffer dimensioning

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Communications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The provision of quality of service to different service types in broadband packet networks requires techniques for the evaluation of the probabilities of packet delays and loss. The authors analyse the multiplexing of independent and homogeneous Markovian ON–OFF traffic sources into a single buffer, extending earlier work. The resulting closed-form equation provides a virtually zero-complexity approach to the calculation of the buffer overflow probability via the burst-scale decay rate of the buffer state probabilities. Graphical results are provided, comparing our expression with the results from simulations and the ‘standard’ formula of Anick, Mitra and Sondhi. These show that our new formula provides excellent accuracy for medium to high loads, i.e. those load values at which queuing becomes important. This makes it ideal for quick calculations, with practical utility when dimensioning checks are required in many networking situations involving the accurate estimation of loss probabilities in e.g. buffer multiplexing VoIP traffic sources.

References

    1. 1)
      • ‘G.729: Coding of speech at 8 kbit/s using conjugate-structure algebraic-code-excited linear prediction’. G.729 (01/07), ITU, 2007.
    2. 2)
      • Pitts, J.M., Schormans, J.A.: `End to end QoS bounds for TRP based service sub-networks', Int. Soc. Opt. Eng. Proc. SPIE, 1999, Boston, USA, 3842.
    3. 3)
      • T. Timotijevic , J. Schormans . Bandwidth overhead of probe technology guaranteeing QoS in packet networks. Electron. Lett. , 816 - 818
    4. 4)
      • S. Dravida , J. Hong , M. Kodialam , B. Samadi , W. Yufei . Narrowband and broadband infrastructure design for wireless networks. IEEE Commun. Mag. , 72 - 78
    5. 5)
      • J.M. Pitts , J.A. Schormans , E.M. Scharf , A.J. Pearmain . Tight bounds for the tail of the packet waiting time distribution in buffered networks. Int. J. Commun. Syst. , 715 - 723
    6. 6)
      • M. Hasib , J. Schormans , T. Timotijevic . Accuracy of packet loss monitoring over networked CPE. IET Commun. , 507 - 513
    7. 7)
      • J. Roberts , U. Mocci , J. Virtamo . (1999) Broadband network traffic: performance evaluation and design of broadband multiservice networks: final report of action cost 242.
    8. 8)
      • Xianhai, T., Yuanhui, H., Weidong, J.: `Modeling and performance analysis of self-similar traffic based on FBM', IFIP Int. Conf. Network Parallel Computing Workshops, 2007, p. 543–548, NPC Workshops. 2007.
    9. 9)
      • R.A. Stewart , J.A. Schormans , J.M. Pitts , E.M. Scharf , A.J. Pearmain , C.I. Phillips . Analysis of local internet/enterprise networking multiplexer. Electron. Lett. , 1825 - 1826
    10. 10)
      • H. Fathi , R. Prasad , S. Chakraborty . Mobility management for VoIP in 3G systems: evaluation of low-latency handoff schemes. IEEE Wireless Commun. , 96 - 104
    11. 11)
      • A. Ma , J. Schormans , L. Cuthbert . Aggregation technique for networks with power law traffic and application to accelerated simulation. IEE Proc. Commun. , 177 - 183
    12. 12)
      • J.M. Pitts , J.A. Schormans . (2000) Introduction to IP and ATM design and performance: with applications analysis software.
    13. 13)
      • T. Timotijevic , C.M. Leung , J. Schormans . Accuracy of measurement techniques supporting QoS in packet-based intranet and extranet VPNs. IEE Proc. Commun. , 89 - 94
    14. 14)
      • H. Michiel , K. Laevens . Teletraffic engineering in a broad-band era. Proc. IEEE , 2007 - 2033
    15. 15)
      • Jin, J., Pang, J., Shan, Z., Zhao, R.: `Queuing network performance model for evaluation of CMP-based VoIP SPS', 7thIEEE/ACIS Int. Conf. Computer and Information Science, ICIS 08, 2008, p. 589–594.
    16. 16)
      • Wautier, A., Antoine, J., Husson, L., Brouet, J.: `Capacity analysis of voice over IP over GERAN with statistical multiplexing', Multiaccess, Mobility Teletraffic Wireless Commun., 2002, Rennes, France.
    17. 17)
      • J. Schormans , E. Liu , R. Stewart , L. Cuthbert . Analytical technique for accelerating the simulation of packet networks. IEE Proc. Commun. , 341 - 346
    18. 18)
      • T. Szigeti , C. Hattingh . (2004) Quality of service design overview, End-to-End QoS Network Design: Quality Service LANs, WANs, VPNs.
    19. 19)
      • D. Minoli , E. Minoli . (1998) Delivering voice over IP networks.
    20. 20)
      • H. Hagirahim . Expression for the probability of packet loss owing to buffer overflow for multiplexing packetised voice. IEE Proc. Commun. , 238 - 244
    21. 21)
      • S.C. Borst , O.J. Boxma , J.A. Morrison , R.N. Queija . The equivalence between processor sharing and service in random order. Oper. Res. Lett. , 254 - 262
    22. 22)
      • A.G. Valko , A. Racz , G. Fodor . Voice QoS in third-generation mobile systems. IEEE J. Select. Areas Commun. , 109 - 123
    23. 23)
      • Karmeshu , S. Sharma . Queue length distribution of network packet traffic: Tsallis entropy maximization with fractional moments. IEEE Commun. Lett. , 34 - 36
    24. 24)
      • D. Anick , D. Mitra , M.M. Sondhi . Stochastic theory of a data handling system with multiplesources. Bell Syst. Tech. J. , 1871 - 1894
    25. 25)
      • K. Sriram , T.G. Lyons , W. Yung-Terng . Anomalies due to delay and loss in AAL2 packet voice systems: performance models and methods of mitigation. IEEE J. Select. Areas Commun. , 4 - 17
    26. 26)
      • Roberts, J.: `Performance evaluation and design of multiservice networks: final report of action cost 224', Commission of the European Communities, 1992, Brussels.
    27. 27)
      • J. Schormans , C.M. Leung . (2005) Measurement for guaranteeing QoS in broadband multiservice networks, Mobile and wireless systems beyond 3G: managing new business opportunities.
    28. 28)
      • K. Mase . Toward scalable admission control for VoIP networks. IEEE Commun. Mag. , 42 - 47
    29. 29)
      • Jelenkovic, P.R., Lazar, A.A.: `Evaluating the queue distribution of an ATM multiplexer with multiple time scale arrivals', 15thAnn. Joint Conf. IEEE Comput. Soc. Networking Next Generation. Proc. IEEE, INFOCOM ‘96, 1996, 2, p. 521–528.
    30. 30)
      • J.H. James , C. Bing , L. Garrison . Implementing VoIP: a voice transmission performance progress report. IEEE Commun. Mag. , 36 - 41
    31. 31)
      • J.A. Schormans , J.M. Pitts , E.M. Scharf , A.J. Pearmain , C.I. Phillips . Buffer overflow probability for multiplexed on-off VoIP sources. Electron. Lett. , 523 - 524
    32. 32)
      • J. Roberts . Traffic theory and the Internet. IEEE Commun. Mag. , 94 - 99
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2008.0213
Loading

Related content

content/journals/10.1049/iet-com.2008.0213
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address