SlideShare a Scribd company logo
1 of 2
Download to read offline
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN : 2278-800X, www.ijerd.com
Volume 5, Issue 1 (November 2012), PP. 58-59

                     Survey of Voice over Internet Protocol
                                Ms. V.YagnaPrabha1, Ms.R.Amsaveni2
           1
           (ComputerScience Department,PSGR Krishnammal College for Women/Bharathiyar University, India)
       2
       (InformationTechnology Department, PSGR Krishnammal College for Women/Bharathiyar University, India)


    Abstract:- VoIP is a technology that digitizes voice packets and enables telephony communication by using
    internet as a backbone. The broad development of Internet had witnessed the concept of VoIP and the technology is
    evolving to replace the Public Switched Telephone Network. VoIP is composed of Signalling and Media. The use
    of Signalling is for controlling communication and it does the call set up, locate users, and tear down sessions.
    Media is used for transporting the voice packets. A Comparative study can be done for analysing the performance
    of VoIP over wireless networks. In earlier days VoIP merges over devices like IP Telephony, Palms, PDAs, etc
    over IP network for communication. Though there are major factors affecting VoIP quality such as delay, jitter and
    loss it plays a vital role in day-day- life.
    Keywords:- PDA, PSTN, RTP, Telephony, VoIP.

                                             I.       INTRODUCTION
          VoIP is a technology that digitizes voice packets and enables telephony communication by using internet as a
backbone. The paper focuses on providing voice over ad hoc wireless networks. When transmitting voice data, continuous
delivery with limited packet loss rate is of primary importance. The voice and data networks are existing separately, along
their separate paths. One of the main reasons is the technology used for voice and data communication. To overcome this
problem, voice over wireless networks can be applied.
          Many protocols were invented to overcome the network traffics. Protocols like Session Initiation Protocol, Real
Time Transport Protocol, H.323 standards, etc., were also developed.

I-A Experimental Setup
          VoIP implementation follows H.323 standard. It consists of gateways, terminals, gatekeepers, etc. It is also known
as IP Telephony. The protocols used are Session Initiation Protocol discovered by IETF and H.323 by ITU. The data and
voice gets encoded which is packetized in the sender side and in the receiver side it gets decoded and depacketized.




                                              Fig1. Network Communication

          Once when a voice is transmitted it is encrypted by the sender with the help of keys and decrypted by the receiver
with the same key. Hence a secured communication can be provided. The users can use the techniques like Forward Error
Correction techniques, Multiple Description, Layered Coding along with their algorithms.

                                      II.    INCREASED USAGE OF VOIP
          Lower Cost.
          Optimized Functionality.

II-A Lower Cost
           People pay lot for monthly fee for local telephone calls and by using VoIP the price can be reduced. ISD and STD
calls get charged to the maximum. But by using VoIP the rate can be minimized. It can be used from computers through
Microphones and Speakers.




                                                   Fig2. VoIP Network
                                                            58
Survey of Voice over Internet Protocol

II-B Optimized Functionality
         Calls can be connected anywhere on the Internet. Outsources like BPO, KPO can make their job simple by having
VoIP. Network Conference can be at low cost. Both the video and audio chats are at low cost. VoIP works either in single or
on multiple environments.

                                          III.         ROUTING IN VOIP
                    Router determines whether the packets from source node are affordable to reach the destination node. It
can be analysed in two ways.

III-A Performance
          Many tools have been invented for network administration but they fail to provide security for both voice and data.
In case of VoIP it provides the following features.

        Poor Quality of speech can be detected.
        RTP associated with voice protocol monitors the call.
        Good QoS can be provided.
        Provides the solution for both voice and data application.
        It finds how call is being hacked / traced by various domains on the network.

III-B Stability in VoIP
The vital role play in VoIP is the bandwidth and the Quality of Service required for each call.
          To ensure stability the nodes or the links must be connected well without any failures.
          The links must be maintained throughout the entire call.
          A Standard Protocol must be used for transmitting the packet over network.
          Hence high speed connection with low packet loss, poor jitter and retransmission must be made.

                                                 IV.       SERVICES
There are three types of services provided in VoIP.
PC to PC: Service from VoIP client to another client.
PC to Phone: Service from Client to Voice.
Phone to Phone: Service from Phone to another Phone through IP network.

                                                 V.      DRAWBACKS
        Network Connection is must for communication.
        VoIP can be subjected to vulnerable attacks easily.
        Network Traffic may occur.
        If there is no power then VoIP calls cannot be connected.

                                                      REFERENCES
[1].     ITU-T Recommendation, G.114, One Way Transmission Time, Feb. 1996.
[2].     J.D. Gibson, A. Servetti, H. Dong, A. Gersho, T. Lookabaugh, and J.C. De Martin, “Selective Encryption and
         Scalable Speech Coding for Voice Communications over Multihop Wireless Links,” Proc. IEEE Military Comm.
         Conf. (MILCOM ’04), vol. 2, pp. 792-798, Nov. 2004.
[3].     C.-h. Lin, H. Dong, U. Madhow, and A. Gersho, “Supporting Real-Time Speech on Wireless Ad Hoc Networks:
         Inter-packet Redundancy, Path Diversity, and Multiple Description Coding,” Proc. Second ACM Int’l Workshop
         Wireless Mobile Applications and Services on WLAN Hotspots (WMASH ’04), pp. 11-20, Oct. 2004.
[4].     X. Yu, J.W. Modestino, and I.V. Bajic, “Modeling and Analysis of Multipath Video Transport over Lossy
         Networks,” Proc. 11th Int’l Conf. Distributed Multimedia Systems (DMS ’05), pp. 265-270, Sept. 2005.
[5].     L. Munoz, M. Garcia, J. Choque, R. Aguero, and P. Mahonen, “Optimizing Internet Flows over IEEE 802.11b
         Wireless Local Area Networks: A Performance-Enhancing Proxy Based on Forward Error Correction,” IEEE
         Comm. Magazine, vol. 39, no. 12, pp. 60-67, Dec. 2001.
[6].     S. Aramvith, C.-W. Lin, So. Roy, and M.-T. Sun, “Wireless Video Transport Using Conditional Retransmission
         and Low-Delay Interleaving,” IEEE Trans. Circuits and Systems for Video Technology (CSVT ’02), vol. 12, no. 6,
         pp. 558-565, June 2002.
[7].     G. Rubino and M. Varela, “Evaluating the Utility of Media- Dependent FEC in VoIP Flows,” Proc. Fifth Int’l
         Workshop Quality of Future Internet Services (QofIS ’04), pp. 31-43, Sept. 2004.




                                                             59

More Related Content

What's hot

Bluetooth Wireless Technology
Bluetooth Wireless TechnologyBluetooth Wireless Technology
Bluetooth Wireless TechnologyAman Kumar Dutt
 
10.1.1.64.2504
10.1.1.64.250410.1.1.64.2504
10.1.1.64.2504Dan Drumm
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentationankit680
 
Internet telephony
Internet telephonyInternet telephony
Internet telephonySajan Sahu
 
Voice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel ApplicationsVoice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel Applicationsirjes
 
Voice over Internet Protocol
Voice over Internet ProtocolVoice over Internet Protocol
Voice over Internet ProtocolCourse Hero
 
Voip Voice over IP IP telephony
Voip Voice over IP IP telephony Voip Voice over IP IP telephony
Voip Voice over IP IP telephony Premchand92
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...csandit
 
WIRELESS TECHNOLOGY-Bluetooth
WIRELESS TECHNOLOGY-Bluetooth WIRELESS TECHNOLOGY-Bluetooth
WIRELESS TECHNOLOGY-Bluetooth Sana Alvi
 
Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)mashiur
 
VOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLVOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLRajan Kumar
 

What's hot (20)

Bluetooth Wireless Technology
Bluetooth Wireless TechnologyBluetooth Wireless Technology
Bluetooth Wireless Technology
 
10.1.1.64.2504
10.1.1.64.250410.1.1.64.2504
10.1.1.64.2504
 
VoIP Research Paper
VoIP Research PaperVoIP Research Paper
VoIP Research Paper
 
Voip on Wimax
Voip on WimaxVoip on Wimax
Voip on Wimax
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
4G vs 3G
4G vs 3G4G vs 3G
4G vs 3G
 
Internet telephony
Internet telephonyInternet telephony
Internet telephony
 
Voice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel ApplicationsVoice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel Applications
 
Voice over Internet Protocol
Voice over Internet ProtocolVoice over Internet Protocol
Voice over Internet Protocol
 
Voip Ppt
Voip PptVoip Ppt
Voip Ppt
 
Voip Voice over IP IP telephony
Voip Voice over IP IP telephony Voip Voice over IP IP telephony
Voip Voice over IP IP telephony
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
 
VOIP Technology
VOIP TechnologyVOIP Technology
VOIP Technology
 
WIRELESS TECHNOLOGY-Bluetooth
WIRELESS TECHNOLOGY-Bluetooth WIRELESS TECHNOLOGY-Bluetooth
WIRELESS TECHNOLOGY-Bluetooth
 
Voice over IP
Voice over IPVoice over IP
Voice over IP
 
Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)
 
VOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLVOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOL
 
VOIP Presentation
VOIP PresentationVOIP Presentation
VOIP Presentation
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
4G vs 3G
4G vs 3G4G vs 3G
4G vs 3G
 

Viewers also liked (10)

Presentasjon4
Presentasjon4Presentasjon4
Presentasjon4
 
Print Design – NuTeak Decking
Print Design – NuTeak DeckingPrint Design – NuTeak Decking
Print Design – NuTeak Decking
 
Conclusión final
Conclusión finalConclusión final
Conclusión final
 
Nuevo documento
Nuevo documentoNuevo documento
Nuevo documento
 
Maktabah babulislam
Maktabah babulislamMaktabah babulislam
Maktabah babulislam
 
F.C. Cambridge University
F.C. Cambridge UniversityF.C. Cambridge University
F.C. Cambridge University
 
GREEN BELT TRAINING RESULTS
GREEN BELT TRAINING RESULTSGREEN BELT TRAINING RESULTS
GREEN BELT TRAINING RESULTS
 
Taalkwestie
TaalkwestieTaalkwestie
Taalkwestie
 
INVESTING REAL ESTATE
INVESTING REAL ESTATEINVESTING REAL ESTATE
INVESTING REAL ESTATE
 
YF_MB_MW_RZ_poster
YF_MB_MW_RZ_posterYF_MB_MW_RZ_poster
YF_MB_MW_RZ_poster
 

Similar to Welcome to International Journal of Engineering Research and Development (IJERD)

A Low-Cost Telephony System For Small Medium Scale Businesses In Nigeria An ...
A Low-Cost Telephony System For Small Medium Scale Businesses In Nigeria  An ...A Low-Cost Telephony System For Small Medium Scale Businesses In Nigeria  An ...
A Low-Cost Telephony System For Small Medium Scale Businesses In Nigeria An ...Michele Thomas
 
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Zac Darcy
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
 
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Zac Darcy
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
 
Investigating the performance of voip over wlan in campus network
Investigating the performance of voip over wlan in campus networkInvestigating the performance of voip over wlan in campus network
Investigating the performance of voip over wlan in campus networkAlexander Decker
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansLiving Online
 
QoS of VOIP Over Broadband Network
QoS of VOIP Over Broadband NetworkQoS of VOIP Over Broadband Network
QoS of VOIP Over Broadband NetworkDr. Amarjeet Singh
 
385 voice over ip
385 voice over ip385 voice over ip
385 voice over ipjacinthsara
 
IJSRED-V2I3P59
IJSRED-V2I3P59IJSRED-V2I3P59
IJSRED-V2I3P59IJSRED
 
How to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsHow to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsAshik Jibon
 
Sk M Rezaul Karim 072899056
Sk M Rezaul Karim  072899056Sk M Rezaul Karim  072899056
Sk M Rezaul Karim 072899056mashiur
 
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...IRJET Journal
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...cscpconf
 
VoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdfVoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdfOkan YILDIZ
 

Similar to Welcome to International Journal of Engineering Research and Development (IJERD) (20)

A Low-Cost Telephony System For Small Medium Scale Businesses In Nigeria An ...
A Low-Cost Telephony System For Small Medium Scale Businesses In Nigeria  An ...A Low-Cost Telephony System For Small Medium Scale Businesses In Nigeria  An ...
A Low-Cost Telephony System For Small Medium Scale Businesses In Nigeria An ...
 
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
 
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
 
VoIP
VoIPVoIP
VoIP
 
How does VOIP work diagram
How does VOIP work diagramHow does VOIP work diagram
How does VOIP work diagram
 
Investigating the performance of voip over wlan in campus network
Investigating the performance of voip over wlan in campus networkInvestigating the performance of voip over wlan in campus network
Investigating the performance of voip over wlan in campus network
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
 
QoS of VOIP Over Broadband Network
QoS of VOIP Over Broadband NetworkQoS of VOIP Over Broadband Network
QoS of VOIP Over Broadband Network
 
385 voice over ip
385 voice over ip385 voice over ip
385 voice over ip
 
VOIP
VOIPVOIP
VOIP
 
IJSRED-V2I3P59
IJSRED-V2I3P59IJSRED-V2I3P59
IJSRED-V2I3P59
 
How to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsHow to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling Environments
 
Sk M Rezaul Karim 072899056
Sk M Rezaul Karim  072899056Sk M Rezaul Karim  072899056
Sk M Rezaul Karim 072899056
 
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
 
VoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdfVoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdf
 
ccna project
ccna projectccna project
ccna project
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Welcome to International Journal of Engineering Research and Development (IJERD)

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN : 2278-800X, www.ijerd.com Volume 5, Issue 1 (November 2012), PP. 58-59 Survey of Voice over Internet Protocol Ms. V.YagnaPrabha1, Ms.R.Amsaveni2 1 (ComputerScience Department,PSGR Krishnammal College for Women/Bharathiyar University, India) 2 (InformationTechnology Department, PSGR Krishnammal College for Women/Bharathiyar University, India) Abstract:- VoIP is a technology that digitizes voice packets and enables telephony communication by using internet as a backbone. The broad development of Internet had witnessed the concept of VoIP and the technology is evolving to replace the Public Switched Telephone Network. VoIP is composed of Signalling and Media. The use of Signalling is for controlling communication and it does the call set up, locate users, and tear down sessions. Media is used for transporting the voice packets. A Comparative study can be done for analysing the performance of VoIP over wireless networks. In earlier days VoIP merges over devices like IP Telephony, Palms, PDAs, etc over IP network for communication. Though there are major factors affecting VoIP quality such as delay, jitter and loss it plays a vital role in day-day- life. Keywords:- PDA, PSTN, RTP, Telephony, VoIP. I. INTRODUCTION VoIP is a technology that digitizes voice packets and enables telephony communication by using internet as a backbone. The paper focuses on providing voice over ad hoc wireless networks. When transmitting voice data, continuous delivery with limited packet loss rate is of primary importance. The voice and data networks are existing separately, along their separate paths. One of the main reasons is the technology used for voice and data communication. To overcome this problem, voice over wireless networks can be applied. Many protocols were invented to overcome the network traffics. Protocols like Session Initiation Protocol, Real Time Transport Protocol, H.323 standards, etc., were also developed. I-A Experimental Setup VoIP implementation follows H.323 standard. It consists of gateways, terminals, gatekeepers, etc. It is also known as IP Telephony. The protocols used are Session Initiation Protocol discovered by IETF and H.323 by ITU. The data and voice gets encoded which is packetized in the sender side and in the receiver side it gets decoded and depacketized. Fig1. Network Communication Once when a voice is transmitted it is encrypted by the sender with the help of keys and decrypted by the receiver with the same key. Hence a secured communication can be provided. The users can use the techniques like Forward Error Correction techniques, Multiple Description, Layered Coding along with their algorithms. II. INCREASED USAGE OF VOIP  Lower Cost.  Optimized Functionality. II-A Lower Cost People pay lot for monthly fee for local telephone calls and by using VoIP the price can be reduced. ISD and STD calls get charged to the maximum. But by using VoIP the rate can be minimized. It can be used from computers through Microphones and Speakers. Fig2. VoIP Network 58
  • 2. Survey of Voice over Internet Protocol II-B Optimized Functionality Calls can be connected anywhere on the Internet. Outsources like BPO, KPO can make their job simple by having VoIP. Network Conference can be at low cost. Both the video and audio chats are at low cost. VoIP works either in single or on multiple environments. III. ROUTING IN VOIP Router determines whether the packets from source node are affordable to reach the destination node. It can be analysed in two ways. III-A Performance Many tools have been invented for network administration but they fail to provide security for both voice and data. In case of VoIP it provides the following features.  Poor Quality of speech can be detected.  RTP associated with voice protocol monitors the call.  Good QoS can be provided.  Provides the solution for both voice and data application.  It finds how call is being hacked / traced by various domains on the network. III-B Stability in VoIP The vital role play in VoIP is the bandwidth and the Quality of Service required for each call.  To ensure stability the nodes or the links must be connected well without any failures.  The links must be maintained throughout the entire call.  A Standard Protocol must be used for transmitting the packet over network.  Hence high speed connection with low packet loss, poor jitter and retransmission must be made. IV. SERVICES There are three types of services provided in VoIP. PC to PC: Service from VoIP client to another client. PC to Phone: Service from Client to Voice. Phone to Phone: Service from Phone to another Phone through IP network. V. DRAWBACKS  Network Connection is must for communication.  VoIP can be subjected to vulnerable attacks easily.  Network Traffic may occur.  If there is no power then VoIP calls cannot be connected. REFERENCES [1]. ITU-T Recommendation, G.114, One Way Transmission Time, Feb. 1996. [2]. J.D. Gibson, A. Servetti, H. Dong, A. Gersho, T. Lookabaugh, and J.C. De Martin, “Selective Encryption and Scalable Speech Coding for Voice Communications over Multihop Wireless Links,” Proc. IEEE Military Comm. Conf. (MILCOM ’04), vol. 2, pp. 792-798, Nov. 2004. [3]. C.-h. Lin, H. Dong, U. Madhow, and A. Gersho, “Supporting Real-Time Speech on Wireless Ad Hoc Networks: Inter-packet Redundancy, Path Diversity, and Multiple Description Coding,” Proc. Second ACM Int’l Workshop Wireless Mobile Applications and Services on WLAN Hotspots (WMASH ’04), pp. 11-20, Oct. 2004. [4]. X. Yu, J.W. Modestino, and I.V. Bajic, “Modeling and Analysis of Multipath Video Transport over Lossy Networks,” Proc. 11th Int’l Conf. Distributed Multimedia Systems (DMS ’05), pp. 265-270, Sept. 2005. [5]. L. Munoz, M. Garcia, J. Choque, R. Aguero, and P. Mahonen, “Optimizing Internet Flows over IEEE 802.11b Wireless Local Area Networks: A Performance-Enhancing Proxy Based on Forward Error Correction,” IEEE Comm. Magazine, vol. 39, no. 12, pp. 60-67, Dec. 2001. [6]. S. Aramvith, C.-W. Lin, So. Roy, and M.-T. Sun, “Wireless Video Transport Using Conditional Retransmission and Low-Delay Interleaving,” IEEE Trans. Circuits and Systems for Video Technology (CSVT ’02), vol. 12, no. 6, pp. 558-565, June 2002. [7]. G. Rubino and M. Varela, “Evaluating the Utility of Media- Dependent FEC in VoIP Flows,” Proc. Fifth Int’l Workshop Quality of Future Internet Services (QofIS ’04), pp. 31-43, Sept. 2004. 59