A Trace-based Feasibility Study of Infrastructure-less VoIP

نویسندگان

  • Kun-Chan Lan
  • Tsung-hsung Wu
چکیده

Voice over IP (VoIP) is one of the most popular Internet applications. Many VoIP protocols (e.g. SIP) are based on a central-server scheme in which a caller needs to query the central server first for the callee’s information (e.g. IP address) before it can connect to them. However, such a centralized architecture has some drawbacks, such as an unbalanced load and a single point of the failure. As a result, some researchers have proposed the use of peer-to-peer (P2P) techniques for VoIP communication. However, compared to a centralized approach, setting up a VoIP connection over multiple hops could potentially take a longer time and might discourage users from utilizing this service. In this paper, we set out to study the performance of existing P2P protocols for VoIP applications in a realistic setting based on traces collected from the Skype network. The Skype traces are used as an input to model the VoIP network topology. We evaluated the performance of three types of DHT protocols, namely, flat DHT, hierarchical DHT and proximity DHT, in terms of their lookup latency for the connection setup phase of VoIP applications. In addition, to understand the feasibility of using infrastructure-less VoIP in the real world, we adopted pair comparison techniques to evaluate the quality of the user experience. Finally, we proposed a new hybrid protocol for the infrastructure-less VoIP communication. We concluded that current P2P protocols for VoIP are not satisfactory as compared to the traditional centralized approach and there is still a lot of room for improvement.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis and Modeling of VoIP Servers: A Linear Programming Approach

The SIP protocol was standardized by the IETF at the application layer for initiating, managing, and terminating multimedia sessions and has been widely used as the main signaling protocol on both the Internet and VoIP networks. Most challenges in this protocol are overload and lack of proper state distribution. These challenges cause a wide range of next-generation network users to face a shar...

متن کامل

Feasibility of Voice over IP on the Internet

VoIP (Voice over IP) services are using the Internet infrastructure to enable new forms of communication and collaboration. A growing number of VoIP service providers such as Skype, Vonage, Broadvoice, as well as many cable services are using the Internet to offer telephone services at much lower costs. However, VoIP services rely on the user’s Internet connection, and this can often translate ...

متن کامل

Secure Voice-over-IP

Voice-over-IP (VoIP) is one of the main applications or services, which dramatically increased the spread and usage of the Internet. VoIP describes the transmission and reception of voice and video data over networks that use the “internet protocol” (IP) as transport protocol. With the use of VoIP within company networks (intranet) investors hope to reduce the expenses for infrastructure and ma...

متن کامل

Feasibility Assessment of Implementing Blended Learning in Health and Treatment Network Based on ISO 10015 Requirements

Introduction: Blended learning is a combination of systemic and contingency approaches to learning which means that besides paying attention to the relationships between all components as a whole, the conditions of utilizing these tools to achieve the best results are especially taken into account too. The aim of this study was to explore the perspectives of Sarab health and treatment network s...

متن کامل

Towards Public Key Infrastructure less authentication in Session Initiation Protocol

The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from preshared secret based solutions to Public Key Infrastructure (PKI) based solution. Howe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Inf. Sci. Eng.

دوره 28  شماره 

صفحات  -

تاریخ انتشار 2012