2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM) 2017
DOI: 10.23919/softcom.2017.8115576
|View full text |Cite
|
Sign up to set email alerts
|

Quality-aware network dimensioning for the VoIP service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…To apply the IPSec safety protocol is one of the solutions to execute protection on community traffic, which provides verification and encryption to community packets, with the help of which community programs are secured. A crucial query that arises is that how the overhead of IPSec operations have an effect on the performance of community programs in the context of time-sensitive software, such as VoIP and comparable real-time packages [5]. In this research author describes that IPSec digital personal networks are drastically used to establish secure network connections between a pair of hosts, amongst a safety gateway or among a pair of protection gateways.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To apply the IPSec safety protocol is one of the solutions to execute protection on community traffic, which provides verification and encryption to community packets, with the help of which community programs are secured. A crucial query that arises is that how the overhead of IPSec operations have an effect on the performance of community programs in the context of time-sensitive software, such as VoIP and comparable real-time packages [5]. In this research author describes that IPSec digital personal networks are drastically used to establish secure network connections between a pair of hosts, amongst a safety gateway or among a pair of protection gateways.…”
Section: Literature Reviewmentioning
confidence: 99%
“…2 The Erlang's formulas, aimed at the beginning to be used for performance calculation in public telephone networks, over the years have been applied in systems where the resources are limited, such as in mobile communication systems, VoIP (Voice over Internet Protocol) systems, computer networks, call centers, and electric vehicle power systems. [3][4][5][6][7][8][9][10][11][12] During planning and design of trunking and queuing systems and evaluating their performance, in addition to determining the probability of blocking and the probability of call waiting, which are the basis for estimating the quality of the service, it is also necessary to solve the inverse problem, that is, to determine the traffic intensity or the number of required channels (resources) for a given probability that corresponds to the desired GOS (Grade of Service) value. Given the nature of Erlang formulas, there is no inverse function of these formulas in a closed form.…”
Section: Introductionmentioning
confidence: 99%
“…The Erlang B formula determines the probability of blocking for a given offered traffic in the system with the given number of channels, while the Erlang C formula determines the probability that a call request will be on hold for the considered value of the offered traffic 2 . The Erlang's formulas, aimed at the beginning to be used for performance calculation in public telephone networks, over the years have been applied in systems where the resources are limited, such as in mobile communication systems, VoIP (Voice over Internet Protocol) systems, computer networks, call centers, and electric vehicle power systems 3–12 …”
Section: Introductionmentioning
confidence: 99%