SlideShare a Scribd company logo
Security   in   VoIP   Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Security   in   VoIP   Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],FAQs
Security   in   VoIP   Systems Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security   in   VoIP   Systems Test Bed
Security   in   VoIP   Systems Security threats QoS/QoE parms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security   in   VoIP   Systems QoE vs QoS VoIP PSTN QoE QoE QoS
The Voice Quality Blanket Struggle Security   in   VoIP   Systems All these factors are related each other and determine the user experience QoE Delay/Jitter
Security   in   VoIP   Systems Measurements Results and Considerations ,[object Object],[object Object],[object Object],[object Object],QoS MEASUREMENTS QoE MEASUREMENTS TEST # Average jitter [ms] Average RTT dealy [ms] PLR [%] R-FACTOR MOS JB= JB= JB= JB= JB= JB= 20 ms 60 ms 100 ms 20 ms 60 ms 100 ms 1 0.9 0 2.1 74 75 75 3.61 3.65 3.65 2 3.2 252 0.9 63 77 75 3.11 3.73 3.65 3 5.79 128 1.2 41 71 79 2.02 3.48 3.81
Security   in   VoIP   Systems Conclusions and Credits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Goal
Security   in   VoIP   Systems Conclusions and Credits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Team ,[object Object],[object Object],[object Object],[object Object],[object Object],Instruments
Security   in   VoIP   Systems Any Questions?
Security   in   VoIP   Systems Thanks for your attention and  enjoy your stay in Capri

More Related Content

What's hot

Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
FRSecure
 
Proving the Security of Low-Level Software Components & TEEs
Proving the Security of Low-Level Software Components & TEEsProving the Security of Low-Level Software Components & TEEs
Proving the Security of Low-Level Software Components & TEEs
Ashley Zupkus
 
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
Slide Deck Class Session 10 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 10 – FRSecure CISSP Mentor Program
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
FRSecure
 
IRJET- A Defense System Against Application Layer Ddos Attacks with Data Secu...
IRJET- A Defense System Against Application Layer Ddos Attacks with Data Secu...IRJET- A Defense System Against Application Layer Ddos Attacks with Data Secu...
IRJET- A Defense System Against Application Layer Ddos Attacks with Data Secu...
IRJET Journal
 
Voicespector_datasheet_homenet
Voicespector_datasheet_homenetVoicespector_datasheet_homenet
Voicespector_datasheet_homenetFrederic Bard
 
Sasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionSasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protection
Dejan Jeremic
 
IRJET- Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET-  	  Sky Shield: A Sketch-Based Defense System against Application Laye...IRJET-  	  Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET- Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET Journal
 
Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacksdkaya
 
REMOTE365_Community Presentation
REMOTE365_Community PresentationREMOTE365_Community Presentation
REMOTE365_Community PresentationJUBR
 
What's in a Jailbreak? - BSides 2019 keynote
What's in a Jailbreak? - BSides 2019 keynoteWhat's in a Jailbreak? - BSides 2019 keynote
What's in a Jailbreak? - BSides 2019 keynote
MarkDowd13
 
Security Technology Arms Race - Hack in the Box 2021 keynote
Security Technology Arms Race - Hack in the Box 2021 keynoteSecurity Technology Arms Race - Hack in the Box 2021 keynote
Security Technology Arms Race - Hack in the Box 2021 keynote
MarkDowd13
 
Router CPU Load in Home Networks
Router CPU Load in Home NetworksRouter CPU Load in Home Networks
Router CPU Load in Home Networks
Silicon Labs
 

What's hot (12)

Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
 
Proving the Security of Low-Level Software Components & TEEs
Proving the Security of Low-Level Software Components & TEEsProving the Security of Low-Level Software Components & TEEs
Proving the Security of Low-Level Software Components & TEEs
 
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
Slide Deck Class Session 10 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 10 – FRSecure CISSP Mentor Program
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
 
IRJET- A Defense System Against Application Layer Ddos Attacks with Data Secu...
IRJET- A Defense System Against Application Layer Ddos Attacks with Data Secu...IRJET- A Defense System Against Application Layer Ddos Attacks with Data Secu...
IRJET- A Defense System Against Application Layer Ddos Attacks with Data Secu...
 
Voicespector_datasheet_homenet
Voicespector_datasheet_homenetVoicespector_datasheet_homenet
Voicespector_datasheet_homenet
 
Sasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionSasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protection
 
IRJET- Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET-  	  Sky Shield: A Sketch-Based Defense System against Application Laye...IRJET-  	  Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET- Sky Shield: A Sketch-Based Defense System against Application Laye...
 
Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacks
 
REMOTE365_Community Presentation
REMOTE365_Community PresentationREMOTE365_Community Presentation
REMOTE365_Community Presentation
 
What's in a Jailbreak? - BSides 2019 keynote
What's in a Jailbreak? - BSides 2019 keynoteWhat's in a Jailbreak? - BSides 2019 keynote
What's in a Jailbreak? - BSides 2019 keynote
 
Security Technology Arms Race - Hack in the Box 2021 keynote
Security Technology Arms Race - Hack in the Box 2021 keynoteSecurity Technology Arms Race - Hack in the Box 2021 keynote
Security Technology Arms Race - Hack in the Box 2021 keynote
 
Router CPU Load in Home Networks
Router CPU Load in Home NetworksRouter CPU Load in Home Networks
Router CPU Load in Home Networks
 

Viewers also liked

Django Bogotá. CBV
Django Bogotá. CBVDjango Bogotá. CBV
Django Bogotá. CBV
ctrl-alt-delete
 
Questionnaire Presentation
Questionnaire PresentationQuestionnaire Presentation
Questionnaire Presentationabisola-oke
 
Questionnaire Results
Questionnaire ResultsQuestionnaire Results
Questionnaire Resultsabisola-oke
 
Media question 2
Media question 2Media question 2
Media question 2abisola-oke
 
Bourne supremacy
Bourne supremacyBourne supremacy
Bourne supremacykavanagh123
 
Maiadia Company Profile In Brief V03
Maiadia Company Profile In Brief V03Maiadia Company Profile In Brief V03
Maiadia Company Profile In Brief V03MAIADIA
 
The agar wood industry yet to utilize in bangladesh
The agar wood industry yet to utilize in bangladeshThe agar wood industry yet to utilize in bangladesh
The agar wood industry yet to utilize in bangladesh
Md. Joynal Abdin
 
An Analysis of SAFTA in the Context of Bangladesh
An Analysis of SAFTA in the Context of BangladeshAn Analysis of SAFTA in the Context of Bangladesh
An Analysis of SAFTA in the Context of Bangladesh
Md. Joynal Abdin
 
The Bangladeshi Agarwood Industry: Development Barriers and a Potential Way...
The Bangladeshi Agarwood Industry:   Development Barriers and a Potential Way...The Bangladeshi Agarwood Industry:   Development Barriers and a Potential Way...
The Bangladeshi Agarwood Industry: Development Barriers and a Potential Way...
Md. Joynal Abdin
 
How to critique articles
How to critique articlesHow to critique articles
Contoh Daftar riwayat hidup Akhyadi
Contoh Daftar riwayat hidup AkhyadiContoh Daftar riwayat hidup Akhyadi
Contoh Daftar riwayat hidup AkhyadiAditiga Serang
 

Viewers also liked (19)

Django Bogotá. CBV
Django Bogotá. CBVDjango Bogotá. CBV
Django Bogotá. CBV
 
Public final
Public finalPublic final
Public final
 
Questionnaire Presentation
Questionnaire PresentationQuestionnaire Presentation
Questionnaire Presentation
 
Distribution
DistributionDistribution
Distribution
 
Questionnaire Results
Questionnaire ResultsQuestionnaire Results
Questionnaire Results
 
Media question 2
Media question 2Media question 2
Media question 2
 
Powsys may2008
Powsys may2008Powsys may2008
Powsys may2008
 
Bourne supremacy
Bourne supremacyBourne supremacy
Bourne supremacy
 
Maiadia Company Profile In Brief V03
Maiadia Company Profile In Brief V03Maiadia Company Profile In Brief V03
Maiadia Company Profile In Brief V03
 
Pos daya
Pos dayaPos daya
Pos daya
 
The agar wood industry yet to utilize in bangladesh
The agar wood industry yet to utilize in bangladeshThe agar wood industry yet to utilize in bangladesh
The agar wood industry yet to utilize in bangladesh
 
Burton's theory
Burton's theoryBurton's theory
Burton's theory
 
An Analysis of SAFTA in the Context of Bangladesh
An Analysis of SAFTA in the Context of BangladeshAn Analysis of SAFTA in the Context of Bangladesh
An Analysis of SAFTA in the Context of Bangladesh
 
The Bangladeshi Agarwood Industry: Development Barriers and a Potential Way...
The Bangladeshi Agarwood Industry:   Development Barriers and a Potential Way...The Bangladeshi Agarwood Industry:   Development Barriers and a Potential Way...
The Bangladeshi Agarwood Industry: Development Barriers and a Potential Way...
 
Javascript by geetanjali
Javascript by geetanjaliJavascript by geetanjali
Javascript by geetanjali
 
Ecommerce final
Ecommerce finalEcommerce final
Ecommerce final
 
How to critique articles
How to critique articlesHow to critique articles
How to critique articles
 
Contoh Daftar riwayat hidup Akhyadi
Contoh Daftar riwayat hidup AkhyadiContoh Daftar riwayat hidup Akhyadi
Contoh Daftar riwayat hidup Akhyadi
 
Primary versus Secondary Sources for Evidence-Based Medicine
Primary versus Secondary Sources for Evidence-Based MedicinePrimary versus Secondary Sources for Evidence-Based Medicine
Primary versus Secondary Sources for Evidence-Based Medicine
 

Similar to Ieee Meeting Anacapri

Cisco Phy Sec Overview Netversant
Cisco Phy Sec Overview   NetversantCisco Phy Sec Overview   Netversant
Cisco Phy Sec Overview NetversantJayCase
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
JM code group
 
Network Configuration and Audit Simplified
Network Configuration and Audit SimplifiedNetwork Configuration and Audit Simplified
Network Configuration and Audit Simplified
Christopher Willard
 
VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51
martinvoelk
 
Signaling security essentials. Ready, steady, 5G!
 Signaling security essentials. Ready, steady, 5G! Signaling security essentials. Ready, steady, 5G!
Signaling security essentials. Ready, steady, 5G!
PositiveTechnologies
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
dma1965
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
Michele Vecchione
 
Gathering of State Networks
Gathering of State NetworksGathering of State Networks
Gathering of State NetworksVideoguy
 
Feng_Gao_Presentation.pdf
Feng_Gao_Presentation.pdfFeng_Gao_Presentation.pdf
Feng_Gao_Presentation.pdf
FabianToh2
 
Thesis arpan pal_gisfi
Thesis arpan pal_gisfiThesis arpan pal_gisfi
Thesis arpan pal_gisfiArpan Pal
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMS
cscpconf
 
LAS16-300K2: Geoff Thorpe - IoT Zephyr
LAS16-300K2: Geoff Thorpe - IoT ZephyrLAS16-300K2: Geoff Thorpe - IoT Zephyr
LAS16-300K2: Geoff Thorpe - IoT Zephyr
Shovan Sargunam
 
Rebaca Technologies Corporate Overview
Rebaca Technologies Corporate OverviewRebaca Technologies Corporate Overview
Rebaca Technologies Corporate Overview
Avishek Gupta
 
Rebaca Technologies Corporate Overview
Rebaca Technologies Corporate OverviewRebaca Technologies Corporate Overview
Rebaca Technologies Corporate Overview
Avishek Gupta
 
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
Erol TOKALACOGLU
 
Solving the BYOD Problem with Open Standards
Solving the BYOD Problem with Open StandardsSolving the BYOD Problem with Open Standards
Solving the BYOD Problem with Open StandardsChristina Inge
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
Microsoft Tech Community
 
R43019698
R43019698R43019698
R43019698
IJERA Editor
 
Matrix
MatrixMatrix
Matrix
Sashank Dara
 

Similar to Ieee Meeting Anacapri (20)

Cisco Phy Sec Overview Netversant
Cisco Phy Sec Overview   NetversantCisco Phy Sec Overview   Netversant
Cisco Phy Sec Overview Netversant
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
 
Network Configuration and Audit Simplified
Network Configuration and Audit SimplifiedNetwork Configuration and Audit Simplified
Network Configuration and Audit Simplified
 
VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51
 
Signaling security essentials. Ready, steady, 5G!
 Signaling security essentials. Ready, steady, 5G! Signaling security essentials. Ready, steady, 5G!
Signaling security essentials. Ready, steady, 5G!
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
 
Gathering of State Networks
Gathering of State NetworksGathering of State Networks
Gathering of State Networks
 
Feng_Gao_Presentation.pdf
Feng_Gao_Presentation.pdfFeng_Gao_Presentation.pdf
Feng_Gao_Presentation.pdf
 
Thesis arpan pal_gisfi
Thesis arpan pal_gisfiThesis arpan pal_gisfi
Thesis arpan pal_gisfi
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMS
 
LAS16-300K2: Geoff Thorpe - IoT Zephyr
LAS16-300K2: Geoff Thorpe - IoT ZephyrLAS16-300K2: Geoff Thorpe - IoT Zephyr
LAS16-300K2: Geoff Thorpe - IoT Zephyr
 
Rebaca Technologies Corporate Overview
Rebaca Technologies Corporate OverviewRebaca Technologies Corporate Overview
Rebaca Technologies Corporate Overview
 
Rebaca Technologies Corporate Overview
Rebaca Technologies Corporate OverviewRebaca Technologies Corporate Overview
Rebaca Technologies Corporate Overview
 
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
 
Solving the BYOD Problem with Open Standards
Solving the BYOD Problem with Open StandardsSolving the BYOD Problem with Open Standards
Solving the BYOD Problem with Open Standards
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
R43019698
R43019698R43019698
R43019698
 
CCTV Surveillance
CCTV SurveillanceCCTV Surveillance
CCTV Surveillance
 
Matrix
MatrixMatrix
Matrix
 

Ieee Meeting Anacapri

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. Security in VoIP Systems Test Bed
  • 6.
  • 7. Security in VoIP Systems QoE vs QoS VoIP PSTN QoE QoE QoS
  • 8. The Voice Quality Blanket Struggle Security in VoIP Systems All these factors are related each other and determine the user experience QoE Delay/Jitter
  • 9.
  • 10.
  • 11.
  • 12. Security in VoIP Systems Any Questions?
  • 13. Security in VoIP Systems Thanks for your attention and enjoy your stay in Capri

Editor's Notes

  1. PROPOSED METHODOLOGY This methodology has to provide the Telecommunication Engineer with means to plan the necessary changes in the network/VoIP platform, eventually reaching a higher level of security. The SUT has to be simulated accordingly to the procedure, to test the changes effects before doing their actual implementation. This methodology will take in account the right balance between security instruments and the required QoS/QoE for real time operations. To do that both QoS (core network objective point of view) and QoE (End User subjective point of view) have to be considered in a way that should lead to a good balance between network security-efficiency and customer service-satisfaction.
  2. The idea behind this implementation was to reproduce , on a small scale , most of the issues a VoIP user could expe rience during the life-cicle of the multimedia service he’s getting from the Telco (QoE), and for the carrier the main problems the Management and Engineering team are facing in their day by day work (QoS). We measure, under different WAN connection situations (i.e. Jitter, Delay, Echo, Packet Loss are some of the buttons we modify in order to see how the VoIP infrastructure behaves), VoIP application level parameters. We built an experimental table reporting the test results in terms of QoE and QoS, for the whole set of different WAN/LAN situation simulated in the test bed.
  3. Service Availability. An attack able to compromise service availability is the most significant VoIP security threats to VoIP networks. It has the potential to quickly impact customers, resulting in lost revenues, system downtime, lost productivity and unplanned maintenance costs. It’s a major concern for service providers providing public services such Emergency call. DoS, viruses and worms DoS, virus and worm-based threats will also use VoIP specific protocols and VoIP application vulnerabilities. Attacks will usually target critical VoIP applications/devices such as end-user phones and soft-clients, call managers, authentication servers and billing applications. Service Integrity . Service integrity threats are focused on compromising VoIP services through toll fraud , identity theft and other fraudulent actions IP TV could record the content of the broadcast and then sell it illegally. A toll fraud can be committed via a VoIP phone that is registered using a stolen or guessed user account and password. Spit has become a major concern in the data security world as millions of unwanted messages are sent around the world. On the contrary of e-mail SPAM, combating SPIT is much more difficult due to the real-time nature of voice services. Eavesdropping on signaling and media paths enables attackers to obtain sensitive business or personal information . Various man-in-the-middle attacks altering the content of the conversation could be launched. Examples of these attacks are insertion and disruption, masquerading, registration hijacking, impersonation and replay. Computational time is the link between the two groups
  4. Test Cases : Let us consider the Test Case #01 , which is really self-explicative in terms of results. Fixing the Delay of the WAN Network to 0 ms, we could find a theoretical limit for the Packet Loss Ratio (PLR) on an IP Network supporting VoIP services (the validity of which can be took as general for G.711A codec): if the value of PLR goes beyond 2% , it is likely to have troubles with the QoE, as perceived by the End User. In fact, despite no jitter and delay are present during the test, the QoE goes down to the limits of acceptability (MOS=3.1-3.2) for a phone call. This is taking us to one simple but important conclusion: if the IP vector is not able to grant a PLR lower than about 1.2 % , then it cannot bear real time services such as VoIP. We take now a brief look at the results of Test Cases #2 and #3 , in which we tried to simulate a “real life” situation for a general-use IP Network. The measured values of the QoS parameters are in accordance with the experience in real network implementation (i.e. carrier networks). Focusing the attention on QoS, with specific reference to jitter, we notice that a slight increase in the value of jitter causes a significant decrease of QoE , which results in an unacceptable quality when the jitter buffer of the receiver is 20 ms , being just at the bottom boundary for a jitter buffer equal to 60 ms . Example: Take as an example an x-DSL/ATM connection, with a VoIP communication using a G.711A kind of codec: if this is the case then the bandwidth consupmtion, for a sampling time of 20ms , is about 100 kbps ; if you wanna spare bandwidth (50 kbps) you’re gonna use G.729 codec but the drawback is the following: as soon as you loose packets , you’re losing roughly the double of information contents (semantyc wise) you should lose in the case of G.711A Considerations: When the IP vector has enough room in terms of bandwidth the VoIP infrastructure using such a network is able to compensate efficiently for impairements which show up within the network. On the other hand, when the residual available bandwith is <= 10% of the total, then every impairement event becomes highly disruptive in terms of QoE , for the whole set of calls being active on this very line. I.e. a small amount of Jitter can take down the MOS to an unacceptable value (this problem could be partially recovered by an increment of the Jitter buffer, but this intervention is limited to a total maximum of 100 ms; the same should happen for a small value of PLR [ PLR = (lost packtes+late packets)/sent packets ]. Exactly the same result should the RTT Delay increase a little bit (this is very much related to devices’ computational time). When using an IPSec tunnel you have to take in account the additional overhead due to the security encryption, so the bandwidth consumption will be greater of about 30% with respect to an uncrypetd transmission. Limits: Taking in account one parameter at time , the limits being figured out by experimental approach are the following: PLR = 2% (this value refers to G.711A; if you deal with G.729 it has to be significantly lower: < 1 % ) RTT avarage Delay = 400 ms Avarage Jitter = 7 ms (JB = 20ms) | 12 ms (JB = 60ms) | 17 ms (JB = 100ms) If you go beyond one of the above values your QoE will result unacceptable .
  5. LANForge Ice (by Candela Technologies): Wan impairement simulator Hammer Call Analyzer (by Empirix): MOS-Rfactor & troubleshooting Jperf (by SourceForge): Measure throughput and latency as number of threads grow Can be used to measure performance of any Java code Perfect for measuring the impact of performance optimizations Shows average duration and throughput (invocations per second) IP-Ping SIP Info: The purpose of the INFO message is to carry mid-session information between SIP user agents