ArticlePDF Available

ITTP: A new transport protocol for VoIP applications

Authors:

Abstract and Figures

Over the past few years, the telecommunications sector has started moving toward the use of Voice over Internet Protocol (VoIP) technology. VoIP technology employs Internet infrastructure and protocols to transfer VoIP data between call parties. Unfortunately, none of the existing Internet transport layer protocols address VoIP application requirements. Typically, the Real-time Transport Protocol (RTP) application layer protocol and the User Datagram Protocol (UDP) transport layer protocol are bound together to address VoIP application requirements. However, a combination of RTP and UDP reduces the quality of VoIP applications and causes inefficient bandwidth utilization. In the present work, a dedicated transport protocol named Internet Telephony Transport Protocol (ITTP) was designed to carry VoIP application data. ITTP is designed to address key VoIP requirements and handle the problems resulting from RTP/UDP. A simple mathematical model was used to evaluate ITTP bandwidth efficiency and compare it with RTP/UDP. ITTP was found to improve bandwidth usage substantially. In addition, ITTP was simulated using Network Simulation 2. The results showed that ITTP had better performance compared with RTP/UDP in terms of packet loss, delay and bandwidth usage.
No caption available
… 
No caption available
… 
No caption available
… 
No caption available
… 
No caption available
… 
Content may be subject to copyright.
   
   
 
  





ÔÔº

      
  
½
 
½

½
 
½
¾
  
½
   
½
½
  !  " #$
¾
 " % &
'& & (&
)  (&
&* +* &&* * 
,!-)* .,&-&-(
     

          
            
           
!    "       
 # $   % $  %$ 
    ! &  !&    
     # '    %$ 
!&   #     Æ  (
   )     $ $
 $$        $$   
 )  #         %$*!& +
       $$  Æ  
   %$*!& $$         
 $$    ,) - . $   
$$      %$*!&    )  
  

//  0/  1( )) %&


         !
"# $   % !  %   
  % &   ' (&')    % &'
*  !     %  
  ' + , $ ('+,$)   % 
 -./0 1 &' %     ! 
  
,   %    &'  -/20 , 3 % .
  %%        %  
  -20 ,   %%  ! &'  4//
  +  ' (+') 4//   3 &' %%  .
   , 5 (,5)  +' 
   6%% , 1 (6,1) 7 +'  4//
   &'   -890   : 6;%
' (:<)      %%  5+'  4//
 :<     -20
,  %    !  ,  !
   !  ;% !       

         
   , . , '  (,')   *  !%
  ! .   % &' :< 3 :< .! 
! .     * % ! &'  4 
!    ,'  :< .!  !   .
 1    !       
,     5 % ' (5')     
 !  ! &'   -2=.>0
&' %   % '+,$ %  &'  
% !   3 -0 ,  % ! &'  
             !
!     '+,$   + &'  
!       %  ; %%  
?  ;   %! , &' 
% % !   '+,$ 1 ; &'   
    .!.    %  
1  '+,$     &'  !   
   &' ;   !   
:   &'    %   !  -=0
$      ,'@5'   .
  % &' A % !    Æ 
% -=0
4 &'      !    
     '+,$ %    &'  
  B   &'   ! ; % 
%  ! &' %  C     B   
  % !       ,, 
' (,,')     % &'  
,    %*  ! + /    
       % !  ,,'    +
2   ,,'      !   3  &'
 + 8  ,,' ! %   
    + 9  ,,'    %
  ! 1 + =   


        &' 
     %  ,'  :<   $
: , ($:,)


,'       6,1  >>9   
   .        '    D:$
 C:$ E !% '    %  ; !
 % ,' 4 ,'    ! 1   ,'
             . 
7   ,'        
  !     4 ,'      
  F            .
      + ,'    !  
     
  .  
      -/0
     

  !
, :<    %    
! :<  %    &'     
%%   !  !    %%    .
!  , :< %       ! ,
   ! !  :<  !    !  
, :< .!    ! !       ! 
 , % % !  :< .!   *   
   -280
/

$:,   ! %  '    ' 
,   ! % $:,   !'2 ,   ! $:, 
   , 3     $:,     '
    ,     . $:,   
 '      %    : . $:, 
      '   %% 
  , . $:,  !      
  '  ,!          ,
        -9=0
/
 "!# "$!#
,      % ! ,,'  
   *  % &'  
         

,          
!    !   3 %  !  .
 %     D    &'
%   3       
   , &'       ! 
!            .
 &'    !      
%% &'  ! -/G>0
      
,  5'  
      ,'    ! &' 
4 ,'  5'   !   ! .   ,!
,'@5'  ; !  !  ! &'  
%  H %         3
;  ;     -/0
     !   Æ 
 "#$  $$%  &
,  &'   * 
  /  ,! %   ! ,'@5'  %
  ! ,'  G  ! 5'      %  *
     :%       
%       *    *  ! 9=I 
I  %   -=0
! "  &
&
'  %%    .
   %%  '+,$ !  &' ! 
 %    ,!   ! &'   %  
   %3  !    !   :.
%   % !   ! ,'@5'    B   
&'  !       !   
 &'  Æ  *      Æ ,
         
  % ! &'   H      
; -G/0
$ ' %  $  "  !
, :<.
!    ! .    % %  &' 
, 2. :< .!   %3    .
,'4  :< .!     5'    !
&'  , :<@5'       ! ,'@5'
%   B -280
 ' % $  $    $  #
,
 %%  4//  +'   &'  J !  &'
  4// @ +'  %%     ! .
%  :< 5! :< .! %     :< 
,!  :< .!        &'  
-280
( $ $ $  $   $  $$ ) 
  
,,'  &'      !.
    ! ! :  !     
 4    % ! ,,'      
 %           % %
   &'     !   !  3
    F    ,,'    
  %%  %       
%% 
C    ,,'     &'   Æ
,,'  %         &' .
      % !    
, !%    ,,' %  
2
  % "!#
,,'  ! . +.' 3 . .
' 3  . , 3 1%   ,,'  !

,,'  !
! &!
, .       
 !       5  .  
    ! %  4 &' 
  %      .    
 $    !      $:,  ;
  % 
"!# &!
, .     ! 
      6    
'  3  ! 
!#'
,    3  ,,' ,   
 !    3    !   1 
          % ,
     
 3  9  ,!  ;  !    988/9
 !     988/9      
  %  % !  %% 1 ;  &'
 %%       ,   
    / 2 8 9 =    
,    &'   !   . 
 A
 $       & 
, 
    !          %
% %    ,!      !  !
  .  ,  .      4 
       . !  &'    
 
 $      $ "  $ 
" 
+    .* !      
,!       B   ,  
      (!)      .
   ! 
$ $     %% &
:  .
   &'          ,!
. !             4
&'           ! %  
:% ,,'         &'  
%  &'   % 
$ $       &
 ! 
       4     
              

2
!( (!  !#
:     
   ,'  5'  !    5'   
      ,'        
  ,,'   !     
              
  ,,'    ! 
&'  
! ,! ,,'         
 ,'@5'
E ,,'      !  %%     
   %%   +'  4// , ,,'  
  &' 
,,'   %      % * ! &'  
, 9. ,,' !   !   . ,'@5' ,,' 
   ! (+ '  '  )  ! &'
 !%   !      
,  ! ,,'   &' 
  % Æ
 % !   ! ,'@5'     !% 
:    %  ,,' !   &' 
       !    .
!  !% &'  
         
8
 ! ! %)##
J *   !   
    !    -0 ,  % 
%% ,,'        % Æ  
 !   ! ,'@5'   ,,' !  *  
!  % Æ         ! 
 ,'  5' %    
8
*( #! !Æ!)
,,'  % Æ   
            ! ,'  5'
8

,   .   !%  
    !    ,  *     
     : %%  *     !%
.!    %   :    .
,'@5'    &'   % !   /   % 
   &'  5% 6 ()  ,'@5'   
   !A
 
K

+,,
I()


  (,'@5')   * 
  ! *   F 
   9. ,,' !   !  ,'@5'   
  ! 5% 6 ()  ,,'    
 !A
  
K

+,,
I()


  ,,' *   5%   6 ()  () 1%
   ! ,'@5'  ,,'  B  *
 !
F  ! ,'@5'  ,,'
:   1%      ,'@5'  I  
,,'  9I   ! *    C  ! *    
   ,'@5'  I   ,,'  /I C 
! *  /      ,'@5'  9=I  
,,'  I :  ,,'  
     
     
   ! *   ,'@5' ,      
B   *   ,'@5'  * %   
! ,,' %  9 
8

L  ;  !      
3   J %  .    
   !%   *  %  
!   3 A
  



(/)


  .     


   .
    , .     % 6
(2)A

K


K
-
.
/

K
(
.
)

0
0
+,,,
(2)


   *  

   !   
    *
  ! * 

      
C  G !         ! 
  1 6 (/)  (2)   !   %  
    ,,'     ! ,'@5' 1% /
  !,'@5'  ,,' %  G      .
.  /. !
 "
$ !  
!         
:  ! 1% /   !    % ,,' % 
  % ,'@5' !   ! *    B  
 !         ,!
 B    !     ,,'  ,'@5' 
      1 ;   ! 
  % ,,'  E !   /. ! *  9= 
  % ,'@5'      8/ ,!  B 
  !    2 F      !  
 % ,,'  8 E !   /. ! *  //8  
 % ,'@5'      9G ,!  B  
 !    9=
:       H   % Æ ,,'
!   !  ,'@5'      % Æ.

8
! 1%)
, ! !  Æ  '   %% 
4         %    
    '  ,   ! B%  
     -/0
8

,'@5'  ;    ,,'  !  !%
A
,,'   *  % !    ,'@5' 
  % %     *   
,'@5' ,     %      E 
,,'   *  % &'   ,'  5'  
3   &'  ,     % .
       ,,'   %  % !
,'@5'  ,'@5'        , 
         ,'  5' 
3  % *  %         ,,'
  ! 3   * E ,,'    
% ! ,'@5'   ,,'  *     ! ,'@5'
1 ,,'   %  % ! ,'@5'   .
 ! .       !   ,,'  
  ,'@5'       ,,'  ,.
!   ! ,'@5'      B    
! ,,'             -2.=0
:           ,,'
  ,'@5'
8
 
,'@5'  %     Æ *.
 !    B        ,,'
      Æ * !   
   B ,! ,,'     
,'@5'
E ,,'? .  %   !   ! ,'@5'  .
%     -G0
F ,,'  B %     % Æ
       ,'  5'1 ,,'
      ,'@5'       * ! &'
 , *  ! B ,,'
     

,,' !
%!! 2!
3!! $!(!
#!&%! (!!
$!(! !
')
!#!# (! &!
! %%#
  #'!4 (!%
*(
5#! Æ!)
'$! (!
&*( %6
"!%) !! (! !%)
! %## !! (! '! %##
! 1%)
'$! (! $!%%
$! 1%)
2! 5%6
'$! (!
&2! %6
9
'%!! !#%  "###
, $ + ($+)  
 *   ,,'     ! :! %
,,' B  % % $+  %    ,
 !      ,,'     %
Æ    ! ,'@5'
9
' %) + (#! %%#
, %  *   ,,'
! ! .         
 1 B ;   B     ,% 
  3 ;  ,,'    %     !
,'@5'    ; ,,'   %   
 ! ,'@5'    ;   !   ,,' 
  ,'@5'         !
;  ,,' %        ! ,'@5'
, %    !     ;    ,!
          
9
 
, %  ! 9 'L  8  : D:$ 
  'L     !  : C:$    
 ! G  6   ,  !   ; *  8
: LJ Æ %     'L ,    % ,'@5'
 ,,'  2   G2   ,    !  B
 *   ! ;     %% Æ   
    1% 2  ,% 
9
   
  ;    ! ,,'  ,'@5
'  %       G :   .
 !   1% 8      !  ,,'  ,'@5'
, ! ,'@5'     !   9   !
,,'     !   G ,    ,'@5'
    %   ,,'    ,  ,'@5' 
     ,,'  4    
  ,,'   ,'@5' 
         
 #
, %
E    ! ,,'     ! ,'@5'  
  !   1 ,'@5'  %  
 ,,' ,!  ,'@5'  *  %%   ,,'  *
:     B    ,,'   ,'@5'
 ,!        ,'@5' + 
%  ! ,,'      %  ! ,'@5' 
 %     
 $
'   ! ,,'  ,'@5'
     
9/
  
  ; B   ! ,,' 
,'@5'  %          3
      ! 2  1% 9    ! 
,,'  ,'@5' ,  ! ,,'     ! ,'@5'  
    B       ! 
1 ;   !  3 ,,'   29/    !  3
,'@5'   2G  ,!  B    G=  F  
   !   ,,'   8>>/    !   ,'@5'
  99  ,!  B   9= 
 %
  ! ,,'  ,'@5'
        ! =  1% =   
!  ,,'  ,'@5' ,  ! ,,'     ! ,'@5' 
     B       !
 1 ;   !  3 ,,'   292>    ! 
3 ,'@5'   =/99  ,!  B    ==  F
     !   ,,'   99    !  
,'@5'   >9>  ,!  B    /9 
1      ,,'      ,'@5'
,        %    %  !
,'@5'     ! ,,'  ;  + 8
,       %     3  ,  
 2     3   % !  ,'@5'  
 =        % ,!  % 
      %     3  F    
  % !  ,,'  !   ,!  % 
 ; *
92
  ! "  
  ;   ! .
            8   ;.
 1  B     !    
C         ,!   !
  !         !  ! 
   1% G    !   !  ,,' 
         
 &
  ! ,,'  ,'@5'
,'@5' ,  !    % ,,'     
!    % ,'@5'      , 
  ,'@5'       ,,'  E.
  B    !       
 
 '
$ !   ,,'  ,'@5'
98
 # $
,%    !     .
  3  %   %   
 4 %  %   ,,' !    .
      !  .!  F   
%    !       5 %.
  %   !      !  
 6 8     %A

K


0
+

(8)
     


    

     * 
 ;  %     ,,'   ,'@5' 
     /8  1% >   %  ! ,,'
 ,'@5' J  *    % ,,' 
 ,'@5' ,         !  
   % ,,'   !       !
    % ,'@5'
 (
7 ! ,,'  ,'@5'
9
' %) 7 #! %%#
, %  *   ,,'
! ! %.          
;  , B ;  B     ,% 
  3 ;  ,,'    %    
! ,'@5'   ;  ,,'  %  
  ! ,'@5', %    !     ;
 ,!         
9
 
, %  !  'L  9  : D:$ 
  'L      ! 8   C:$    
  !        ,  !   ;
*  8 : LJ Æ %     'L ,    %
,'@5'  ,,'  2  G2   ,    ! 
B
 * 1%   , % 
9
   
  ;    ! ,,'  ,'@5
'  %       8 :   .
 ! 9  'L 'L 'L/ 'L2  'L8  %   8 9
=8 /G8  2>     %    8 9
=8 /G8  2>   1%       !
 ,,'  ,'@5' ,   ! ,,'     ! ,'@5'
   ,      1 ,'@5' 
%    ,,' ,!  ,'@5'  *  %% 
 ,,'  * ,   B     ,,' .
  ,'@5'  :        
         
 )
, %
,'@5' +  %  ! ,,'      ! ,'@5'
  %     

'   ! ,,'  ,'@5'
9/
  
  ; B   ! ,,' 
,'@5'  %       8 'L 'L
'L/ 'L2  'L8  %   8 9 = G  > 
  %    9  G  /2    
3      !   1%     ! 
     
,,'  ,'@5' ,  ! ,,'     ! ,'@5'  

 !
  ! ,,'  ,'@5'
        ! 8  1% /   
!  ,,'  ,'@5' ,  ! ,,'     ! ,'@5' 
 
 "
  ! ,,'  ,'@5'
      ,,'      ,'@5'
,        %    %  !
,'@5'  %   ! ,,'  ;  + 8
,      %     3  ,   
    3   % ! 8 ,'@5'    8
        ,!  %    
   %     3  F      
% ! 8 ,,'     ,!  %  ;
*
         .
       ,,' ,      
         
      %  !   Æ 
  % !  4    %   
  % !      !   &' .
 1    !   % !   
      .!
=
%#
, % ! &' %    
Æ  %    % &' %  ;%
   5'     ,'  ! &' 
          ,,'    
% &'     % ,,'     !
! &'  ,,'       ,'@5' 
   C %  G    *  
  * ,,'  /I   ,'@5'  I 
F            
,,' *        !   
B   ,'@5' ,      % ,,'  
    % ,'@5' ,!  Æ %   
   % ,,'

23 4- - )  4- - .& % (&& "  %  
 % 5 6 &(&&
.//0 111  -  1   1

-
23 7- 8) 9- : ;-  4- <  :- ; %%() " $ " &% ) 
% )
       
-= ->
%%-== -
23 -  + - - ? - 4(1 @-   0- &. %$) 
%%&  %A& . 8< ).(&
   .//2  
 1  +
%%-> -
23 /- & - & - )  - :& % &( "    7 
%&
  1   1
=-
2=3 9-<- B)  -- B- 8  % %)  & .A&
 
     
-= - %%-!! -
2!3
)( '3.3  -4 + 
%CDD...-%AE-D%D & &%D -
2>3 - - + - - ? :- -  @-   - - & B
%$)C  1  %  . E .  ).(&
./5/ 111 5/      $
-
23 /- 4& ?- /).  ?- /&A %& "  "  & %$) "
%( &(&&
 6)
-
23 - F& - <A&  <- ?E& #$)  "( " 0/ D0/ %
  .A & 56  &%% / "( )& 
 
 - -  $
 1
-
23 - F
+) 1" +74 & -  -1  ,)
&
# 9 8( G & :- -
23 - + - - ? - 4(1 @-   0- &. $% H
.   % . E
.//2    8
,)
-
23 4- E  - &
%839954 %$ :  +     ;

0I # ' & -
23 - A&
%$4 +     
&8&( "&& -
23 - % F- % #- <( I-   ?- 
+) 7
 #
#/I 0I ==! -
     
2=3 - ? - + @-   /-- 8 0- F  - - & "
).( " )& &C 0  &.) &  &&A $) &
       
-> - %%-=!
-
2!3 ?- #))  - I&
%85<354 $  ,) + $
0I # '
& -
2>3 - - ?EA
$ $* =
 # =-
23 F- <     %  5 6
   111
- - %%-==> -
23 :-
J
- :E - B)A  - A
!& >  % $ ; +
&
-
23 - &  - 9& %&&)  D'B D0/ & " .&% & A&
%8
.9/?
-
23 4- - E - - :. 9- ;- F- :  B- - - ;% %$) & " 4- 
%%&
111  -+  
- -> %%-!! -
23 - ) - - "  - 0- 4& "  " . % &&
 )  < . % .A E
   
   
-! -> %%-!> -
23 -  /- A ?- ?  - A A &&  " &   &)
& & "
      

-! -5F6 %%->! -
23 F-  - )  9- 0 + 0/ %( %$) .  %( )
.(&
=  $ 
-
2=3 @- 4)& - &  ?- 4& &%C .( %( 
111
-
2!3
$!$ -=53  Æ  %$  $&; ) %
%CDD...-&%&%-D%D
$- -
2>3 ?- 9&  0- ?
 ,)4 +$ +
&8&( -
23 -   4- E &  (&& "   %( ### - 8:
111 $  ;  
- - %%-!=> -
... In view of that a new transport protocol capable of conveying VoIP packet by its self is introduced. This protocol is referred to as Internet Telephony Transport Protocol (ITTP) (Abu-Alhaj, et-al, 2012;Edeline, et-al, 2016). This paper presents the architecture of standalone ITTP protocol, capable of conveying VoIP packet with low latency, enhanced throughput and high bandwidth for 5G mobile applications by exploiting multipath characteristics of Heterogeneous Networks (HetNets). ...
... Although RTP and IAX can transmit media data on real time and can provide VoIP calls with much better efficiency, but suffered from inability to convey data independently by themselves. As such, they operate on top of another transport layer such as UDP to deliver their data (Abu-Alhaj, et-al, 2012). Despite IAX mini-frame precedence to VoIP data with lesser overhead as compared to RTP/UDP, the protocol still need a transport layer protocol (such as UDP) to convey their data. ...
... The simplicity of the protocol provide VoIP developers with options to augment new service(s) and technique for other use cases. Thus, for worldwide interoperability ITTP is aim at extending its functionality beyond any specific signaling protocol (Abu-Alhaj, et-al, 2012). 4.1 Source port number: The main purpose of source port number in transport layer is to recognize application at the receiver endpoint, and is also responsible for acknowledgement at the receiver endpoint. ...
Article
Full-text available
The advent of 5G technology is believed to have mutual basic requirements such as high reliability and extremely high data rates. Meeting up with such demand changes the overall fifth-generation (5G) network architecture. 5G is aimed at interconnecting all wireless Heterogeneous Network (HetNet) for seamless and reliable Quality of Experience (QoE) where every network is in control of its UE's mobility, while the network providers manage the operation at the terminal. The proliferation of Voice over IP (VoIP) applications over the years attract the attention of a number of telecommunication industries. VoIP is targeting to overtake the existing traditional Public Switch Telephone Network (PSTN), with the packet-based network, that can support multimedia services globally. In this work we proposed a new standalone Internet Telephony Transport Protocol (ITTP) architecture that unite the functionality User Datagram Protocol (UDP) and Real-time Transmission Protocol (RTP) to convey media data aim at providing better performance in terms of bandwidth, delay, and throughput based on the proposed model equations as compared to the existing inefficient protocol. The protocol provides VoIP developers with options to augment new services and techniques for other use cases and future work toward implementing the architecture is also discussed.
... Another protocol that used in the VoIP packet header, in place of the RTP/UDP, is the Internet Telephony Transfer Protocol [9]. In this case, the VoIP packet header will be constructed of 6 bytes ITTP and 20 bytes IP. ...
... In this case, the VoIP packet header will be constructed of 6 bytes ITTP and 20 bytes IP. Thus, the header overhead ratio of the 26 bytes ITTP/IP header in comparison to the VoIP packet size (36 bytes to 56 bytes) is between 46.4% and 72.2% [5,9]. Though it is smaller than RTP/UDP/IP, the overhead ratio resulting from ITTP/IP is still considerable in comparison to the small VoIP packet payload, which wastes high bandwidth as well. ...
... As we can see, the bandwidth consumed by the proposed method is less than the traditional method of ITTP. This is due to two reasons: i) the proposed method multiplexes several packets in one header, which save the consumed bandwidth resulting from adding a separate header for each packet and ii) the proposed method compresses the packet payload, thus, save more bandwidth [9,12]. ...
Conference Paper
The world witnessed a revolution of new technologies that serve humankind and make their life easier. Voice over Internet Protocol (VoIP) is one of such technologies. VoIP is a technology of making voice calls over an IP network. One of the problems that slow the spreading of VoIP is the inefficient bandwidth utilization that resulting from the big packet header. In this paper, we proposed a new method to enhance VoIP bandwidth employment over the Internet Telephony Transport Protocol (ITTP) protocol. The proposed method improves VoIP bandwidth utilization from two dimensions. The first dimension is by multiplexing several VoIP packets to the same receiving end in one header, instead of a separate header for each VoIP packet. The second dimension is by compressing the VoIP packet payload. The evaluation result of the proposed method showed a noticeable reduction of the consumed bandwidth, by up to 48.9%, in comparison to the traditional method of ITTP without VoIP packets multiplexing or VoIP packet payload compression.
... In light of this, there is a compelling case that some capabilities and preamble data (fields) included in RUI protocols are not required for VoIP technology, especially for unicast IP voice sessions (a point-to-point RTP session between two participants). This preamble data expends a lot of BW with no beneficial usage by unicast voice telephony (Perkins, 2003;Abu-Alhaj et al., 2012;Spencer et al., 2010;Sandlund et al., 2010). ...
... Thus, the preamble compression methodology profoundly decreases preamble overhead, also enhancing BW utilization (Shambour et al., 2020;Hussein et al., 2020;Seytnazarov et al., 2018;Maqhat et al., 2014). Aside from these two methodologies, a novel protocol, named Internet Telephony Transport Protocol (ITTP), has been created to convey IP voice calls (Abualhaj et al., 2019b;Abu-Alhaj et al., 2012). In the next part, the ITTP protocol, as well as packet coalescence and preamble compression algorithms, will be thoroughly detailed. ...
Article
Full-text available
Voice over IP (VoIP) is widely utilized by organizations, schools, colleges, and so on. Nevertheless, VoIP numerous challenges that hinder its spread. One of the significant challenges is the poor exploit of the VoIP technology network bandwidth (BW), caused by the huge preamble of the VoIP packet. This paper suggests a novel methodology to manage this huge preamble overhead challenge. The proposed methodology is named runt payload VoIP packet (RPV). The core principle of the RPV methodology is to reemploy and exploit the VoIP packet preamble’s data (fields) that are superfluous by VoIP technology, especially for unicast IP voice calls. Generally, those fields will be used to convey the VoIP packet payload. Consequently, diminish or zero the length of the payload and, therefore, spare the BW. The results of the investigation into the suggested RPV methodology indicated significant enhancement in the BW exploitation of VoIP technology. For instance, the saved BW in the examined environment with the LPC codec came to up to 25.9%.
... The aggregation methods can lengthen or shorten the delay. Thus, the proposed aggregation method should consider a mechanism that estimates the time to hold the frame in the buffer for aggregation and to indemnify the time [12,28,[50][51][52][53]. The jitter should be low (not more than 30 ms) to obtain good call quality. ...
... First, frame aggregation may debase the quality of VoIP conversion (increase in packet loss, jitter, and delay) if the aggregation method is not designed effectively, as discussed in Refs. [1,12,28,34,35,[50][51][52][53][54]. Second, saving the bandwidth is preferred only if the links are saturated with the VoIP calls; otherwise, only a few number of frames is aggregated. ...
... For VoIP, only a small part of the IP, UDP, and RTP protocols preamble information is necessary to convey the voice data and the remaining part is superfluous. When it comes to point-to-point VoIP calls, which is our concern in this paper, even less of the preamble information is needed (Perkins, 2003;Abu-Alhaj et al., 2012;Spencer et al., 20112;Sandlund et al., 2010). ...
Article
Full-text available
The use of Voice over Internet Protocol (VoIP) innovation is rising due to its various merits. Nevertheless, the ineffective use of bandwidth is a key dilemma that restricts the fast-rising use of VoIP innovation. The main factor behind this ineffective use of the bandwidth is the sizable VoIP packet preamble. This research creates a technique to address this dilemma of packet preamble. The created technique is known as payload elimination (PldE). The fundamental concept of the PldE technique is to exploit the information (elements) of the VoIP packet preamble that is superfluous for point-to-point calls. In general, these elements are utilized to transport the payload of VoIP packets. Consequently, the payload size of VoIP packet will be lowered or removed, preserving the available bandwidth. The performance test of the PldE technique indicated an improvement of up to 41.6% in the exploitation of IP network bandwidth. So, the PldE technique is showing signs that it could help solve the problem of the IP network's inefficient use of bandwidth.
... Accordingly, a strong argument is that RTP/UDP/IP protocols provide many features and header information (fields) unnecessary for VoIP servers, particularly for unicast IP voice calls (a point-to-point RTP session between two participants). The header information consumes a considerable amount of bandwidth without any use through unicast IP voice calls [15,[17][18][19]. The header overhead problem has been addressed through two main approaches: packet multiplexing and header compression. ...
... The ITTP-PS method will be deployed at the VoIP gateway that connected to the wide area network (WAN) connection, though it can be deployed at the client end. Several advantages can be gained by deploying the ITTP-PS method at the VoIP gateway, including i) the proposed ITTP-PS method is workable with the other bandwidth exploitation approaches, such as VoIP packet multiplexing and VoIP header compression, which are typically deployed at the VoIP gateway, ii) the flexibly of using any client application from any device because it does not need to support ITTP-PS method, iii) the ITTP-PS method need to be deployed once at the VoIP gateway instead of each client, and iv) there is, typically, a plenty of bandwidth in local area network in comparison to WAN connections, where the bandwidth is limited and expensive [14][15] [19] [20]. Fig. 2 displays the location of the ITTP-PS method in a typical VoIP network topology. ...
... SIP can be used to create, modify, and disconnect an SIP session between two or more remote parties [20]. Further, SIP has been used in various comparison tests with the Inter Asterisk protocol and ITU-based protocol, H.323 [21][22]. SIP performed better than these other protocols under various network impairments that were induced by using the NetEm tool. ...
Article
Full-text available
Compliance with the Service Level Agreement (SLA) metric is a major challenge in a Multiprotocol Label Switching Virtual Private Network (MPLS VPN) because mandatory models must be maintained on both sides of the MPLS VPN in order to achieve end-to-end service levels. The end-to-end service of an MPLS VPN can be degraded owing to various issues such as distributed denial of service (DDoS), and Random Early Detection (RED) that prevents congestion and differentiates between legitimate and illegitimate user traffic. In this study, we propose a centralized solution that uses a SLA Violation Detector (SLAVD) and intrusion detection to prevent SLA violation.
... To consider this issue, a new protocol called, Internet Telephony Transport Protocol (ITTP), was created to carry VoIP calls. The 6-byte ITTP replaces the 20-byte RTP/UDP header [7,8]. However, the 26-byte ITTP/IP is still considerable header in comparison to the 10 to 30 bytes payload. ...
... The article [4] describes options to streamline data transfer on the tactical level by header compression technique. The paper [5] provides voice capacity analysis in Voice over Wireless Wide Area Network (VoWLAN), while the authors of [6] have even suggested a new transport protocol for the transmission of VoIP services, having a significantly lower overhead. In addition, the authors of [7] have developed a VoIP codec that can be used under a very severe communication conditions. ...
Article
Full-text available
The weak point of the field network is represented by E12 low-speed relay links. The situation requires savings of the bandwidth. For this purpose, the necessary bandwidth for voice transmission up to the level of the physical layer has been analyzed. As a suitable solution of network throughput increase, we propose the change of a Voice Payload Size. After finding the optimal Voice Payload Size, tests were carried out to verify the impact of the Voice Payload Size on call quality. A packet loss rate is chosen as a parameter for modelling real traffic. To obtain the expected voice quality, the E-model according to the G.107 Recommendation is applied. The theoretical results are compared with practical measurements, when using the proprietary Cisco Packet Loss Concealment algorithm to evaluate the voice quality. The results obtained have confirmed the suitability of the solution.
Article
Full-text available
We measured the capacity for VoIP traffic in an IEEE 802.11b wireless testbed and compared it with the theoretical capacity and our simulation results. We identified factors that have been commonly overlooked in past studies but affect experiments and simulations. We found that in many papers, the capacity for VoIP traffic has been measured via simulations or experiments without considering these factors, showing different capacity in each paper. After these corrections, simulations and experiments yielded a capacity estimate of 15 calls for 64 kb/s CBR VoIP traffic with 20 ms packetization interval and 38 calls for VBR VoIP traffic with a 0.39 activity ratio. Furthermore, we measured the capacity for VoIP traffic using each access category introduced in the 802.11e standard and the effect of the TCP traffic on VoIP traffic. We found that while the 802.11e standard can protect the QoS of VoIP against TCP traffic, it does not improve the capacity due to the significant retransmissions during TXOP.
Article
Full-text available
Abstract. The InterAsterisk eXchange (IAX) protocol has been available for a few years. Meanwhile, the popularity of Real time SWitching (RSW) has increased due to its ability to easily combine voice and video services. Incidentally, these two heterogeneous clients pose considerable problems for users who have to choose between two solutions offering different advantages and disadvantages. While RSW is being used in many areas, IAX is being deployed in many VoIP products. Hence, RSW interoperability and coexistence with IAX is considered very important when maximizing the return on current investments and to support new deployments that could be RSW as an alternative packet telephony signaling protocol. We used IAX as opposed to SIP, which although started as a simple and an attractive method for VoIP, has become a complex and heavy protocol to implement. Similarly, H.323 is a very complex protocol suite that can result in the transmission of many unnecessary messages across the network.
Book
Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal, security, IPv6 support, interworking between IPv4 and IPv6, interworking with SIP and many others. The author presents the ways in which IAX can be activated so as to avoid complications such as NAT and the presence of intermediary boxes in operational architectures. This book analytically demonstrates the added values of IAX protocol compared to existing ones, while proposing viable deployment scenarios that assess the behavior of the protocol in operational networks. Key Features: Promotes a viable alternative protocol to ease deployment of multimedia services Analyses the capabilities of the IAX protocol and its ability to meet VoIP service provider requirements, and provides scenarios of introducing IAX within operational architectures Addresses the advantages and disadvantages of SIP, and Details the features of IAX that can help, in junction with SIP, to overcome various disadvantages of SIP Explores the added values of IAX protocol compared to existing protocols Discusses the compatibility of new adopted architectures and associated protocols This book will be a valuable reference for service providers, protocol designers, vendors and service implementers. Lecturers and advanced students computer science, electrical engineering and telecoms courses will also find this book of interest.
Article
Planning Internet-based applications services such as telephony, requires a variety of components to ensure the quality of services, for instances, user identification, authentication, authorization, registration, accounting, routing, gateway discovery, directory service, signaling [1], etc. Two protocols have emerged to provide these functions, H.323 series of recommendations by ITU-T, and Session Initiation Protocol (SIP) by Multi-Party Multimedia Session Control Working Group, IETF. SIP is a call processing protocol. It is used to create sessions carry session descriptions which allow participants to agree on a set of compatible media types. SIP supports user mobility by proxying and redirecting requests to the user's current location. Users can register their current location as well.
Conference Paper
In this paper we investigate several methods to estimate the signal in the lost packet of MP3 audio using side information. Our methods are based on a packet loss concealment method using sign correction proposed by Suzuki et al. Suzuki's method uses sign of lower MDCT coefficients as redundant information, and the sign information is used when estimating the MDCT coefficients of the lost packet. In this paper, we propose a new method to use the same side information as Suzuki's method. Our method is a combination of one-bit quantization and sign correction, which is proved to be better than sign correction for improving correlation between the original signal and the restored signal. The experimental result shows that the proposed method outperforms the sign correction method. Next, we investigated several methods to use two bits for correcting one coefficient. From the experimental results, the combination of two-bit correction and one-bit correction gave the best result.
Conference Paper
In this paper, we propose a new end-point admission control algorithm which helps to manage the traffic efficiently while providing end-to-end service quality. In this algorithm, users are allowed to temporarily use lower service levels in the routers that the requested service level is not currently available. This local degradation preserves the end-to-end service quality in the acceptable level. It may also degrade the end-to-end service level but only if it is acceptable by the application. This degradation may be temporary until the required quality level becomes available. In this way, we can increase the data throughput and also the percentage of admitted calls, which results in higher network utilization. The drawback of this method is the increase in end-to-end delay but this increase can be limited by using appropriate final route selection method at the destination node.
Conference Paper
This paper presents an approach to combining VoIP auditing and speech recognition, and an application of using speech recognition on VoIP voice data is described. In this paper, it deals with how to obtain VoIP voice data when audio communication: signaling protocol analysis and voice data traffic analysis. Feature extraction is a very important step in speech recognition, and this paper's result shows that the differences between the features extracted from voice recorded directly and voice captured on VoIP are so small that applying speech recognition on VoIP auditing is applicable.
Article
Voice communications such as telephony are delay sensitive. Existing voice-over-IP (VoIP) applications transmit voice data in packets of very small size to minimize packetization delay, causing very inefficient use of network bandwidth. This paper proposes a multiplexing scheme for improving the bandwidth efficiency of existing VoIP applications. By installing a multiplexer in an H.323 proxy, voice packets from multiple sources are combined into one IP packet for transmission. A demultiplexer at the receiver-end proxy restores the original voice packets before delivering them to the end-user applications. Results show that the multiplexing scheme can increase bandwidth efficiency by as much as 300%. The multiplexing scheme is fully compatible with existing H.323-compliant VoIP applications and can be readily deployed.
Article
During the Internet stock bubble, articles in the trade press frequently said that, in the near future, telephone traffic would be just another application running over the Internet. Such statements gloss over many engineering details that preclude voice from being just another Internet application. This paper deals with the technical aspects of implementing voice over Internet protocol (VoIP), without speculating on the timetable for convergence. First, the paper discusses the factors involved in making a high-quality VoIP call and the engineering tradeoffs that must be made between delay and the efficient use of bandwidth. After a discussion of codec selection and the delay budget, there is a discussion of various techniques to achieve network quality of service. Since call setup is very important, the paper next gives an overview of several VoIP call signaling protocols, including H.323, SIP, MGCP, and Megaco/H.248. There is a section on telephony routing over IP (TRIP). Finally, the paper explains some VoIP issues with network address translation and firewalls