Dissertations / Theses on the topic 'Voice over IP'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Voice over IP.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Derakhshanno, Homayoun. "Voice over IP over GPRS." Thesis, KTH, Kommunikationssystem, CoS, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91856.
Full textVoIP tekniken har blivit en rådande teknik numera på grund av dess lägre kostnader och mervärdestjänster som erbjuds jämfört med traditional telefoni. Samtidigt som tendensen mot mer tillgänglig trådlöst internet har underlättat och därmed driver mera studier inom dessa områden. Den allt mer utbredda användningen av avancerade mobiltelefoner och handdatorer numera har lett till ökat behov av att använda VoIP tekniken för dessa mobila utrustningar är alltmer kännbar. För att möjliggöra användadet av VoIP tekniken så behöver vi först och främst utvärdera dagens existerande teknologier för att stödja iden och för det andra måste vi kunna implementera en mjukvara vilket kan erbjuda olika typer av tjänster för slutanvändaren. För att kunna använda en IP-baserad tjänst på GSM teknologin så måste vi använda oss utan GPRS tjänster som tillhandahålls av GSM opratörer. I detta examens arbete kommer vi att utvärdera VoIP tjänster på GPRS när det gäller kvalitet och möjligheter. Därefter kommer vi att Portning en VoIP mjukvara till en handdator (utrustad med GSM sim-kort) vilket har windows Mobile operativsystemet som erbjuder en rad olika tjänster.
Brännström, Nils. "Voice-over-IP over Enhanced Uplink." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8479.
Full textThe traditional voice service in mobile networks is an important service that mobile users expect high quality from. With the convergence of mobile networks towards an all-IP network, an IP-based speech service becomes important which is referred to as Voice-over-IP (VoIP). The traditional voice service is highly optimized and a VoIP service must therefore fulfil strict quality requirements to provide the same speech service quality. The air interface technology, WCDMA, which is used in third generation communication systems in Europe is constantly developed. An improved concept for the mobile-to-network transmission, called the Enhanced Uplink (EUL) provides for higher uplink capacity for packet data services. It also includes features that may provide a sufficient VoIP service quality in mobile networks, when considering the uplink transmission.
The purpose of this thesis is to evaluate the VoIP capacity over EUL and identify crucial aspects of radio resource management in order to increase the capacity. This is done through dynamic system simulations, using a realistic VoIP traffic model. The VoIP capacity is also estimated by a derived theoretical framework.\newline
It is shown by simulation results and theoretical estimations, that power control is a vital mechanism in order to increase the capacity. Simulation results indicate that a VoIP over EUL capacity of 65\% of the traditional voice service capacity may be reached. The results also indicate that to improve the capacity for larger cells, the allowed VoIP packet delay must be increased.
Fey, Marcus. "Voice over IP - Eine Einführung." Universitätsbibliothek Chemnitz, 2006. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200600094.
Full textAbad, Caballero Israel Manuel. "Secure Mobile Voice over IP." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93113.
Full textVoice over IP (VoIP) kan defineras som förmågan att göra ett telefonsamtal och att skicka fax (eller att göraallting som man idag kan göra över det publika telefonnätet) över ett IP−baserat nätverk med en passande kvalitet och till lägre kostnad, alternativt större nytta. VoIP måste tillhandahållas med nödvändiga säkerhetstjänster utan att teknikens prestanta påverkas. Detta blir allt viktigare när VoIP används över trådlösa länktekniker (såsom trådlösa lokala nätverk, WLAN), givet dessa länkars begränsade bandbredd och den bearbetningkraft som krävs för att exekvera säkerhetsmekanismerna. Vi måste tänka på VoIPs säkerhet likt en kedja där inte någon länk, från säker uppkoppling till säker nedkoppling, får fallera för att erhålla en säker process. I detta dokument presenteras en lösning på detta problem och innefattar en säker modell för Mobile VoIP som minimerar bearbetningskostnaderna och bandbreddsutnyttjandet. Detta erhålls huvudsakligen genom utnyttjande av säkerhetsprotokoll med hög genomströmning och låg paketexpansion, såsom "Secure Real− time Protocol" (SRTP), och av krypteringsprotokoll med hög hastighet, såsom "Advanced Encryption Standard" (AES). I detta dokument beskriver jag problemet och dess alternativa lösningar. Jag beskriver också den valda lösningen och dess protokoll och mekanismer mer detaljerat, till exempel "Transport Layer Security" (TLS) för att säkra "Session Initiation Protocol" (SIP), SRTP för att skydda transporten av data och "Multimedia Internet KEYing" (MIKEY) för nyckelhantering. En implementation av SRTP, kallad MINIsrtp, finns också beskriven. Beträffande praktiskt arbete och tester av lösningsmodellen har detta projekt fokuserats på skyddandet av datatransporten (SRTP), dess implementation och prestanda. Emellertid har en grundlig teoretisk undersökning genomförts, vilken innefattar andra aspekter såsom telefonsamtalets uppkoppling och nedkoppling (med hjälp av SIP) och valet av passande nyckelhanteringsprotokoll (MIKEY) för att stödja SRTP.
Smith, Paxton J. "Voice conferencing over IP networks." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=29574.
Full textKnappe, Sebastian. "Marktabgrenzung im Bereich Voice over IP." Hamburg Kovač, 2009. http://d-nb.info/1001547381/04.
Full textSundstrom, Karin Heather. "Voice over IP, an engineering analysis." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0024/MQ51804.pdf.
Full textFranci, Alessandro. "Voice over IP e Web Conferencing." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4464/.
Full textMoodie, Myron L., Todd A. Newton, Thomas B. Grace, and William A. Malatesta. "Performance of Voice-over-IP over iNET Telemetric Networks." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595774.
Full textBidirectional networked radio frequency (RF) communications between the ground and test articles are quickly becoming a normal mode of operation. Not only can devices be remotely controlled, but other networking technologies are emerging into flight test. Voice over IP (VoIP) is ubiquitous in the workplace and in homes, but it presents unique challenges when used to communicate between test articles. This paper presents some issues to be considered and test results to help aid deployment of VoIP systems in network-based test systems such as iNET's Telemetry Network System (TmNS).
Ram, Abhishek. "Assessment of Voice Over IP as a solution for Voice over ADSL." Thesis, Virginia Tech, 2002. http://hdl.handle.net/10919/33135.
Full textMaster of Science
Yang, Xu. "On the development of Voice over IP." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2389.
Full textYensen, Trevor. "Structures and interfaces for voice over IP." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape17/PQDD_0010/MQ36903.pdf.
Full textGong, Qi Peng. "Playout buffering for conversational voice over IP." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=114224.
Full textDans le domaine de la voix sur IP (VOIP), la qualité de conversation interactive est importante pour les utilisateurs. Les principaux facteurs qui affectent la qualité à la réception sont le retard, la désynchronisation et les pertes de paquets. Lors d'une conversation par voix sur IP, le retard joue un rôle important pour la qualité à la réception. Les délais prolongés de conversation peuvent provoquer de la double parole, de l'écho ou encore la fin de la conversation. En pratique, un jeu de buffers (ou mémoirer tampon) est introduit du coté du récepteur pour supprimer les délais indésirables. Ainsi, l'information de la voix contenue dans les paquets peut être disponible à des intervalles de temps réguliers pour le décodage. Un buffer plus grand réduit la possibilité de perdre des paquets en retard aux dépens de voir augmenter les délais de conversation. Comme la capacité du jeu de buffers est une somme de retards de conversations, pour garder l'interactivité de la conversation, il est préférable de concevoir un jeu qui soit court mais également capable de protéger les paquets contre les pertes dues aux retards.Dans cette thèse, nous explorons les algorithmes de jeux de buffers améliorant la qualité de conversation. Nous proposons un algorithme adaptatif en termes de qualité et qui a pour but d'augmenter la qualité de la voix et de réduire les retards dans la conversation. Nous utilisons le facteur R du modèle-E comme indice de coût pour obtenir les délais du jeu qui s'adaptent à chaque "talkspurt" (segment continu de parole inséré entre les temps de silence). Des étapes spécifiques sont entreprises pour réduire le retard de conversation : (1) traiter immédiatement la parole étirée qui est contenue dans le premier paquet lors de la réception d'un "talkspurt" (l'étirement fournit des délais de buffers supplémentaires pour suivre les paquets); (2) compresser le segment de parole contenu dans les paquets au niveau du jeu de buffers à la fin du "talkspurt" (la compression réduit les délais du jeu pour les paquets).Comme les autres algorithmes portant sur la qualité, notre montage est sujet aux pertes de signaux en rafale (burst loss). Pour améliorer encore plus la qualité à la réception, nous utilisons des algorithmes de réparation par émetteur. L'émetteur envoie de l'information redondante pour atténuer l'impact des paquets manquants causés par le réseau (pertes de paquets) et par le manque de capacité des buffers (paquets retardés), tout ceci sans augmenter les délais de buffer. Dans cette thèse, nous développons un nouveau schéma adaptatif de correction d'erreurs sans voie de retour (FEC) pour fournir de la redondance sans ajouter de délais. Nous appliquons ce dispositif de correction à notre algorithme adaptatif de jeu de buffers pour améliorer la qualité perçue. En tant que technique alternative d'envoie d'information de redondance, un schéma fournissant de la diversité de trajet utilise plusieurs chemins (nous en considérons deux ici). L'information de redondance est envoyée vers le deuxième chemin. Nous considérons quatre schémas de diversité de trajet (deux d'entre eux sont proposés par rapport au modèle-E utilisé dans ce travail). Nous concevons également des algorithmes de jeu de buffers avec comme critères de qualité de conversation : la qualité d'appel et l'interactivité.
Bilien, Johan. "Key Agreement for Secure Voice over IP." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93069.
Full textIranmanesh, Seyed Amir. "Security Enhancements in Voice Over Ip Networks." W&M ScholarWorks, 2017. https://scholarworks.wm.edu/etd/1530192357.
Full textTheander, Petter, and Thomas Hultgren. "Voice over IP for Sony Ericsson Cellular Phones." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2623.
Full textNesh-Nash, Ali. "Voice over IP in a resource constrained environment." Thesis, KTH, Kommunikationssystem, CoS, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92257.
Full textDagens telekommunikationssystem fokuserar på mobilitet. Detta har blivit populärt under 90-talet då mobilitet blev naturligt integrerad i människans vardagliga liv i form av exempelvis mobiltelefoner. Voice over IP (VoIP) har blivit en stor del av dagen teknik där trådlösa system Wireless LANs (WLANs) har blivit en större del av mobilkommunikation. Målet med denna rapport är att förstå hur strömförbrukningen kan minimeras genom att utföra vissa operationer med hjälp av en VoIP-klient. För att åstadkomma detta porterade vi minisip, en SIP agent som är baserad på öppen källkod och körs på Linux och Windows, till en HP iPAQ 5500, en så kallad Personal Digital Assistant (PDA). Vi valde PDAn för att kunna utforska de begränsningar den medför i form av lagringsutrymme, processorkapacitet, och batteri. Denna rapport bygger vidare på tidigare rapporter som visar att minisip kan erbjuda en säker kommunikationsplattform med de senaste funktionerna som önskas i mobila VoIPsystem. De flesta av dessa tidigare rapporter baseras på system med få begränsningar rörande resurser såsom stationära- eller bärbara datorer samt serverbaserade system. Denna rapports fokus är att utforska detta fall i en miljö med större begränsningar på resurser som till exempel en iPAQ.
Elliott, Colm. "Stream synchronization for voice over IP conference bridges." Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=82484.
Full textThis work presents a design and evaluation of a Synchronized conference bridge that maps N input voice streams to M output voice streams representing selected speakers. A conference simulator, designed for this thesis, is used to characterize the performance of this bridge in terms of delay and packet loss, speaker selection accuracy and conference audio quality.
Zue, Cory L. "Modeling and assessing secure Voice over IP performance." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33377.
Full textIncludes bibliographical references (p. 102-106).
Voice over Internet Protocol (VoIP) systems enable efficient communications over data networks, but security of VoIP and the impact of that security on communications quality has not been quantitatively modeled. A conversational model is adapted for VoIP and a computational model of communication quality - the Z-Model - is developed. VolIP conversations are simulated for networks with a range of performance characteristics including differing bandwidth, latency and bit error rates to evaluate the impact of security on communication quality. Results show that improving conficlentiality via encryption of conversation data packets does not introduce significant delays, but does increase bandwidth. In certain restricted-bandwidth environments this results in dramatic reductions of perceived conversation quality.
by Cory L. Zue.
M.Eng.
Meinberg, Ralf. "Voice over IP : IP-basierter Sprachdienst vor dem Hintergrund des novellierten TKG /." Münster : LIT-Verl, 2008. http://deposit.d-nb.de/cgi-bin/dokserv?id=3168567&prov=M&dok_var=1&dok_ext=htm.
Full textEbstein, Sammy-Franklin. "Voice over IP Szenarien über die Diffusion von VoIP /." St. Gallen, 2005. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/00641852001/$FILE/00641852001.pdf.
Full textLloyd, Patrick. "An exploration of covert channels within voice over IP /." Online version of thesis, 2010. http://hdl.handle.net/1850/12241.
Full textNakkhongkham, Saiyoot. "Measuring the quality of service of voice over IP." Thesis, University of Hawaii at Manoa, 2003. http://hdl.handle.net/10125/7007.
Full textxii, 110 leaves
Mahfuz, Ejaz. "Packet loss concealment for voice transmission over IP networks." Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32965.
Full textThe goal of this work is to develop an improved PLC algorithm, using the subsequent packet information when available. For this, we use the Time-Scale Modification (TSM) technique based on Waveform Similarity Over-Lap Add (WSOLA) to reconstruct the dropped or lost packets. The algorithm looks ahead for subsequent packets. If these packets are not available for reconstruction, algorithm uses information from past packets. Subjective tests show that the proposed method improves the reconstructed speech quality significantly.
SANTOS, ALEXANDRE FERREIRA DOS. "ASSESSMENT OF QOS PARAMETERS IN VOICE OVER IP TRANSMISSION." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2004. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=5243@1.
Full textThis work presents a study aiming at to establish a methodology for sizing a VoIP system, focusing, in particular, the sizing of a statistical multiplexer. We apply existing models and results for the general problem of the statistical multiplexer to the specific case of a VoIP system, taking in account the characteristics of the traffic, the requirements of QoS and the principles of the architectures Intserv and Diffserv. For this, we present a summary of the VoIP technology, including its requirements of quality and the protocols appropriate to carry this type of media in the Internet. We discourse on the usual mechanisms of traffic control in packet networks with QoS, as well as on the Architectures of QoS defined by the IETF. A revision of traffic models and applicable models to the analysis of statistical multiplexers, with prominence for the fluid model applied to the description of the traffic generated for a homogeneous aggregate of voice sources, is presented. Besisdes, a comparative study of behavior gotten analytically with those gotten by means of simulation is made. The influence of the coder and parameters as so packet size is investigated, revealing the difficulty in finding an analytical model capable to take in account, with precision, the different formats of the VoIP system. Finally, we establish a scenario for application of the models to a VoIP system.
Kannan, Steven (Steven K. ). "Secure Voice over IP conferencing with decentralized group encryption." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/45979.
Full textIncludes bibliographical references (p. 107-109).
This thesis addresses the development of an end-to-end secure Voice over IP (VoIP) conference system. We are particularly interested in challenges associated with deploying such a system in ad-hoc networks containing low bandwidth and/or high latency data links. End-to-end security is handled by the decentralized Public Key Group Encryption library (PKGE) developed at Lincoln Laboratory; PKGE allows real-time keying of conference users without an on-line central keying authority.We present a system design and its prototype implementation in accordance with a set of appropriate design goals. The final product demonstrates the feasibility of using PKGE in the demanding conditions of VoIP conferencing. The system development sheds light on a number of issues and engineering challenges that ultimately affect call quality, functionality, security, and usability, motivating our recommendations for the next generation system.
by Steven Kannan.
M.Eng.
Guerra, Carlos Humberto Martins Chagas. "Gateway SIP - Asterisk." Master's thesis, Universidade de Évora, 2012. http://hdl.handle.net/10174/15430.
Full textDely, Peter. "Adaptive Aggregation of Voice over IP in Wireless Mesh Networks." Thesis, Karlstad University, Faculty of Economic Sciences, Communication and IT, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-938.
Full textWhen using Voice over IP (VoIP) in Wireless Mesh Networks the overhead induced by the IEEE 802.11 PHY and MAC layer accounts for more than 80% of the channel utilization time, while the actual payload only uses 20% of the time. As a consequence, the Voice over IP capacity is very low. To increase the channel utilization efficiency and the capacity several IP packets can be aggregated in one large packet and transmitted at once. This paper presents a new hop-by-hop IP packet aggregation scheme for Wireless Mesh Networks.
The size of the aggregation packets is a very important performance factor. Too small packets yield poor aggregation efficiency; too large packets are likely to get dropped when the channel quality is poor. Two novel distributed protocols for calculation of the optimum respectively maximum packet size are described. The first protocol assesses network load by counting the arrival rate of routing protocol probe messages and constantly measuring the signal-to-noise ratio of the channel. Thereby the optimum packet size of the current channel condition can be calculated. The second protocol, which is a simplified version of the first one, measures the signal-to-noise ratio and calculates the maximum packet size.
The latter method is implemented in the ns-2 network simulator. Performance measurements with no aggregation, a fixed maximum packet size and an adaptive maximum packet size are conducted in two different topologies. Simulation results show that packet aggregation can more than double the number of supported VoIP calls in a Wireless Mesh Network. Adaptively determining the maximum packet size is especially useful when the nodes have different distances or the channel quality is very poor. In that case, adaptive aggregation supports twice as many VoIP calls as fixed maximum packet size aggregation.
Morshed, Muhammad. "Voice over IP and Lawful Intercept : Good cop/Bad cop." Thesis, KTH, School of Information and Communication Technology (ICT), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-24260.
Full textLawful interception is a common practice for monitoring a telecommunication network by law enforcement agencies all over the world. It plays a vital role to ensure national security and to control crimes by providing authorized monitoring of communicating parties in a communication network. However, there are some important issues that need to be addressed, such as the privacy of individuals, malicious use of lawful interception by a “bad” cop, vulnerability of a lawful interception system to misuse by others, cost, legal liability, etc. These issues have lead to opposition to lawful interception. Many researchers have been looking for a secure and acceptable lawful interception system that would eliminate or minimize the undesirable aspects of lawful interception. One of the approaches that gained a lot of attention is a key escrow encryption system. For lawful interception a key recovery key is escrowed with a trusted third party. This key can subsequently be used for decryption by the law enforcement agency. The trusted third party might be a government agency or a private company. The process for recovering keys should be based on a predefined securitypolicy. The trusted third party’s responsibility is to store the key and to protect it from malicious use. This malicious use could be by a competitor, a telecommunication operator, Internet Service Provider (ISP), a law enforcement agency, or other party. If the trusted third party itself utilizes the key or improperly discloses the key to another party, then the data that was protected by encryption could be compromised Unfortunately, there is no easy means to detect if the data has been tampered with or not. This thesis focuses on therefore in the case of voice over IP, where there is a need for a means to determine if a recorded conversation is authentic or not. Hence the objective of the overall thesis project is to design, implement, and evaluate a security mechanism that can be used with a trusted third party -based key escrow encryption system that will prevent or reduce the risk of forgery by (a bad cop within) a lawenforcement agency using the escrowed key.
This thesis describes how a key escrow encryption system would be improved by the proposed mechanism – with a focus on the actions of a party that has access to the escrowed key. We do not examine how the party got access to this key, but for the purposes of this thesis we assumed that this party is either a good cop or a bad cop. We have defined the meaning of these terms and examine what operations a bad cop might attempt to perform – given the access to the master key. For example, this party could capture the data packets of a Voice over IP session, and then decrypt the packets using the key provided by the escrow agent. After decryption we examined the ability of a bad cop to modify or forge data packets, then encrypt these forged packets with the key – in order to fabricate evidence. We then examined how to detect such modifications or forgery. The proposed system is able to detect this forgery, based upon the inability of the forger to generate the correctly signed hashed message authentication coded. We also examine additional extensions to the user agent and the escrow agent to be able to identify which packets (or groups of packets) were not generated by the original participant in the conversation. The goal is to understand if the proposed mechanism could make lawful interception more secure, while increasing the protection of the communicating parties’ conversation from undetected manipulation and making the digital record of a conversion easier to authenticate.
Zhang, Hongqi. "Performance of voice over IP in mobile ad hoc networks." Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27943.
Full textMontminy, Christian. "A study of speech compression algorithms for Voice over IP." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0017/MQ57147.pdf.
Full textKamat, Narasinha. "A delay-efficient rerouting scheme for voice over ip traffic." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000548.
Full textNocito, Carlos Daniel. "A Network Conditions Estimator for Voice Over IP Objective Quality Assessment." Scholarly Repository, 2011. http://scholarlyrepository.miami.edu/oa_theses/292.
Full textAl-Najjar, Camelia. "An approach for improving performance of aggregate voice-over-IP traffic." Texas A&M University, 2005. http://hdl.handle.net/1969.1/4216.
Full textDely, Peter. "Cross-Layer Optimization of Voice over IP in Wireless Mesh Networks." Licentiate thesis, Karlstads universitet, Avdelningen för datavetenskap, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-6280.
Full textStenman, Peter, and Mikael Janson. "Talöverföring för trygghetslarm över internet : Voice over IP for personal alarms." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205349.
Full textDe senaste åren pågår det ett teknikskifte inom den svenska äldreomsorgen där de analoga trygghetslarmen ersätts av larm som använder internet för att kommunicera. Denna övergång sker på grund av att tillgång till internet ökar hos äldre personer samt att hushåll med analoga anslutningarna blir allt färre. Denna rapport beskriver arbetet med att ta fram ett system som ska fungera som en prototyp för ett trygghetslarm. Detta system använder sig av Voice Over IP och protokollet Session Initiation Protocol. Det slutliga systemet består av en Raspberry Pi som använder sig av SIP protokollet, en knappsats samt ett ljudkort som är byggt runt ett PCM3060 chip.
Parperis, Marios S. "Delay estimation and its QoS implications in voice over IP networks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0024/MQ52394.pdf.
Full textParperis, Marios S. (Marios Stavrou) Carleton University Dissertation Engineering Systems and Computer. "Delay estimation and its QoS implications in voice over IP networks." Ottawa, 2000.
Find full textAraujo, Maria S., and Ben A. Abbott. "PCM vs. Networking: Spectral Efficiency Wars - A Pragmatic View." International Foundation for Telemetering, 2012. http://hdl.handle.net/10150/581747.
Full textThe expected efficiency of network-based telemetry systems vs. the tried and true PCM-based approaches is a debated topic. This paper chooses to use a lighthearted voice to pull the two sides of the "war" to a table of negotiation based on metrics. Ultimately, focusing on metrics that truly define efficiency is the key to understanding the varying points of view. A table of these metrics along with the "why and when" criteria for their use is presented based on historic mathematical information theory, true flight test data requirements, and lab analysis. With these metrics, the negotiation and reasonable compromises in the war may become clear. In other words, this paper attempts to provide a methodology that can be used by the community to aid in choosing the appropriate (or good enough) technologies for current and future telemetry testing demands.
Johnsson, Sven. "Hardware and software development of a uClinux Voice over IP telephone platform." Thesis, Linköping University, Department of Science and Technology, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9455.
Full textVoice over IP technology (VoIP) has recently gained popularity among consumers. Many popular VoIP services exist only as software for PCs. The need of taking such services out of the PC, into a stand-alone device has been discovered, and this thesis work deals with the development of such a device. The thesis work is done for Häger Scandinavia AB, a Swedish telephone manufacturer. This thesis work covers the design of a complete prototype of a table-top VoIP telephone running an embedded Linux Operating system. Design areas include product development, hardware design and software design.The result is a working prototype with hardware and corresponding Linux device drivers. The prototype can host a Linux application adapted to it. Conclusions are that the first hardware version has worked well and that using an open-source operating system is very useful. Further work consists of implementing a complete telephony software application in the system, evaluation of system requirements and adapting the prototype for a commercial design.
Li, Hong. "Quality-of-service routing for Voice-over-IP in service overlay networks." Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=86808.
Full textInternet end-to-end delay is one of the most important impairments on VoIP quality. We therefore analyze, model and simulate it to better understand it and thus to discover potential advantages of routing in service overlay networks. Based on the investigation of the Internet end-to-end delay, we find that VoIP quality on a pair of diverse paths is better and more stable than that on a single path. We therefore propose a novel centralized data fusion approach to search for the best pair of diverse paths. This method jointly optimizes source routing with adaptive play-out scheduling at the receiver. It requires transmitting the delay distributions of all the overlay links for estimating the delay distributions of diverse paths. We propose to transmit only the model parameters of the link delay distributions to reduce the communication overhead. It is shown that the best pair of diverse paths can be estimated with a small error.
Nonetheless, the centralized approach is computationally expensive. We therefore propose an online diverse routing method, which uses distributed learning automata to actively probe path delays and to determine the best pair of diverse paths for VoIP based on the state of the learning automata. We have demonstrated the scalability and the optimality of the approach by simulations, and proven the optimality of the approach using Kushner's weak convergence method. VoIP quality has been shown to improve from unsatisfactory levels to satisfactory levels. In addition, we propose a method to detect and recover from link failures based on the state of the learning automata. Considerable improvement in link failure recovery time has been achieved.
In sum, this work demonstrates that the proposed centralized diverse routing approach is effective to improve VoIP quality in terms of R-factor for small overlay networks, and that the proposed distributive diverse routing approach together with the link failure detection scheme provides a scalable, effective and robust solution to VoIP routing for large overlay networks.
Voix sur IP (VoIP) est un service dont la popularité crôıt avec le développement de la convergence entre les services dans les réseaux dits de nouvelle génération. Dans cette thèse, nous nous appliquons à améliorer la qualité des services de VoIP grâce au routage au niveau la couche application en utilisant des réseaux dédiés. Dans cette thèse, nous procédons à l'étude des délais de bout en bout du réseau Internet, qui sont le facteur impactant le plus sur la qualité de la VoIP. Nous analysons, modelons et synthétisons des traces de délais de bout en bout, afin de découvrir un potentiel intérêt relatif à leur utilisation dans le cadre du routage au niveau le la couche application utilisant des réseaux dédiés.
En nous appuyant sur l'étude des traces de délais de bout en bout, nous montrons que la qualité de la VoIP peut être améliorée et stable en utilisant un couple de routes diverses, au lieu d'une seule route. Nous donc proposon un centre de fusion de données qui utilise notre approche pour trouver le meilleur couple de routes diverses. Cette méthode optimise le routage source conjointement avec adaptation play-out au niveau du récepteur. Il faut transmettre des délais des-dites distributions de tous les liens au niveau le la couche application pour estimer des distributions de tous les couples de routes possibles. Nous proposons de transmettre uniquement les paramètres du modèle de la distribution des délais, afin de réduire des côuts de communication. Nous prouvons que cette méthode peut trouver le meilleur couple de routes à une faible erreur.
Comme la technique centralisée requiert une grande puissance de calcul, nous proposons une solution de routage divers extensible en ligne, qui utilise l'apprentissage distribué au- tomata activement sonde des délais de bout en bout et détermine la meilleure paire de diverses voies de VoIP basé sur l'état de l'apprentissage d'automates. Nous avons dé- montré l'extensibilité et l'optimalité de cette approche par les simulations, et démontré l'optimalité de l'approche par l'utilisation de la méthode de convergence faible de Kushner. Nous montrons que la qualité de la VoIP est ameliorée, passant d'une qualité inacceptable à une qualité acceptable. De plus, nous proposons une méthode pour détecter les défaillances du lien et de sa récupération sur la base de paramètres de l'apprentissage d'automates, qui permettent une réduction considérable du temps de récupération à la suite de la défaillance d'un lien.
En somme, cette thèse démontre que la proposition de la diversité de routage centralisé approche est efficace pour améliorer la qualité de la VoIP en termes de R-facteur pour les petits réseaux de la couche application, et que l'apprentissage de un couple de routes diverses avec des méthodes de détection de défaillance offre un extensible, efficace et robuste solution pour services de VoIP grâce au grands réseaux de la couche application.
Hung, Shirley Kon-Jean. "Managing uncertainty : foresight and flexibility in cryptography and voice over IP policy." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/49679.
Full text"February 2008."
Includes bibliographical references (p. 235-248).
This main question in this dissertation is under what conditions government agencies show foresight in formulating strategies for managing emerging technologies. A secondary question is when they are capable of adaptation. Conventional wisdom and most organization theory literature suggest that organizations are reactive rather than proactive, reluctant to change, and responsive only to threats to their core mission or autonomy. The technological, economic, social, political, and sometimes security uncertainties that often accompany emerging technologies further complicate decision-making. More generally, organizations must often make decisions under conditions of limited information while guarding against lock-in effects that can constrain future choices. The two cases examined in this dissertation suggest that contrary to conventional wisdom, organizations can show foresight and flexibility in the management of emerging technologies. Key factors that promote foresight are: an organizational focus on technology, with the emerging technology in question being highly relevant to the organization's mission; technical expertise and a recognition of the limits of that knowledge; and experience dealing with other emerging technologies. The NSA recognized the inevitability of mass market encryption early on and adopted a sophisticated strategy of weakening the strength of, reducing the use of, and slowing down the deployment of mass market encryption in order to preserve its ability to easily monitor communications. The Agency showed considerable tactical adaptation in pursuit of this goal. The FCC adopted a rather unusual policy of forbearance toward VoIP. The Commission deliberately refrained from regulating VoIP in order to allow the technology to mature, innovation to occur, uncertainties to resolve, and to avoid potential market distortions due to too early or suboptimally formulated regulation. Eventually, however, pressure from outside interests such as law enforcement forced the Commission to act.
by Shirley K. Hung.
Ph.D.
Majed, Najmeddine. "Measuring and improving the quality of experience of mobile voice over IP." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0099/document.
Full textFourth-generation mobile networks, based on the Long Term Evolution (LTE) standard, are all- IP networks. Thus, mobile telephony providers are facing new types of quality degradations related to the voice packet transport over IP network such as delay, jitter and packet loss. These factors can heavily degrade voice communications quality. The real-time constraint of such services makes them highly sensitive to delay and loss. Network providers have implemented several network optimizations for voice transport to enhance perceived quality. However, the proprietary quality management algorithms implemented in terminals are left unspecified in the standards. In this context, we are interested in media adaptation mechanisms integrated in terminals to enhance the overall Quality of Experience (QoE). In particular, we experimentally evaluate Voice over LTE (VoLTE) QoE metrics such as delay and Mean Opinion Score (MOS) sing a standardized test method. We propose some enhancements to the actual test method and discuss how this method can be extended to evaluate de-jitter buffer performance. We also experimentally evaluate WebRTC voice quality in different radio conditions using a realLTE test network. We evaluate the impact of jitter buffer and bit rate variations on the measured quality. To enhance voice codec robustness against packet loss, we propose a simple application layer redundancy. We implemented it for the Enhanced Voice Service (EVS) codec and evaluate it. Finally, we propose a signaling protocol that allows sending redundancy requests during a call to dynamically activate or deactivate the redundancy mechanism
Bassil, Carole. "SVSP (Secure Voice over IP Simple Protocol) une solution pour la sécurisation de la voix sur IP." Phd thesis, Télécom ParisTech, 2005. http://pastel.archives-ouvertes.fr/pastel-00001577.
Full textBassil, Carole. "SVSP (Secure Voice over IP Simple Protocole) : une solution pour la sécurisation de la voix sur IP." Paris, ENST, 2005. http://www.theses.fr/2005ENST0045.
Full textSince the invention of the first telephone by Alexander Graham Bell in 1869, network telephony technology did not stop evolving: from circuit switching to packet switching, from fixed network to wireless network. Several new architectures were created which combines the transport of voice, data and image in the same data network. The nature of these open networks has an impact on the voice in terms of security. This yields to the imminent need to secure voice communications while insuring a good quality of service to the voice as well in fixed, wireless and IP networks. Different security solutions are proposed for the data. But partial even incomplete solutions are proposed for the voice. First, we define the needs for securing the telephony and the security services required. Thus, we analyze the security offered by the different telephone networks, namely the security in the traditional telephone network (PSTN and ISDN), in the mobile networks (GSM and UMTS), and in the IP network based on the H. 323 and SIP architectures. This will allow us to compare the security solutions offered by these telephony architectures and to be able to present their advantages and limitations and the security requirements that they cannot satisfy. This analysis drives us to an eloquent result that is the absence of a complete end to end security solution that complies with the security requirements of telephony. Secondly, we propose security architecture for a unified telephony architecture. This security architecture proposes a service layer that is inserted between N and N + 1 layers of the OSI reference model. This choice provides a transparency and an independence of the underlying network but requires reviewing the interfaces and therefore the needs to define an API between the security application and the underlying network that insures transparency. This architecture provides the security services and defines necessary security policies to secure voice communications. Following the security architecture, we defined a security protocol that we named SVSP for Simple Voice Security Protocol. SVSP satisfies the security services defined by this architecture that provides a secure end-to-end phone call. Studies were carried out to integrate it in different telephony infrastructures, namely with the traditional telephone network, GSM the mobile network and with the H. 323 standard for voice over IP communications. A prototype of SVSP was implemented followed by integrating it with SIP the IETF voip standard
Bassil, Carole. "SVSP, Secure voice over IP simple protocole, une solution pour la sécurisation de la voix sur IP /." Paris : École nationale supérieure des télécommunications, 2006. http://catalogue.bnf.fr/ark:/12148/cb40208342h.
Full textJunghänel, Jens. "VOCAL-Einsatz an der TU Chemnitz." Universitätsbibliothek Chemnitz, 2003. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200301347.
Full textSCHEINER, LEONARDO NAHMIAS. "PERFOMANCE ANALISYS OF SIP PROTOCOL ON THE SIGNALING OF VOICE OVER IP CALLS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=7065@1.
Full textImpulsionada pelo grande crescimento da Internet, a telefonia IP conquistou a atenção do mercado e dos grandes fabricantes com promessas de redução de custo na operacão, gerência, provisionamento, manutenção e tarifação. Diversos protocolos foram desenvolvidos de modo a prover VoIP como o H.323, MGCP, Megaco e SIP. O SIP tem se destacado por ser um protocolo baseado em texto, estensível, independente do protocolo de transporte, e portanto mais flexível e simples que seu concorrente direto, o H.323. O SIP (Session Initiation Protocol) é um protocolo de sinalização utilizado para iniciar, modificar e terminar sessões, podendo ser usado para chamadas de voz sobre IP (VoIP) ou para troca de mensagens instantâneas, entre outras aplicações. Ele foi desenvolvido originalmente em 1996 e foi padronizado pela IETF em 1999. Neste trabalho, o desempenho do protocolo SIP para estabelecimento de chamadas VoIP será avaliado, já que há uma grande quantidade de trabalhos focando a qualidade da voz e poucos têm avaliado a sinalização [3]. Serão montados ambientes experimentais a fim de variar parâmetros como retardo, perda de pacotes, jitter, largura de banda e protocolo de transporte, permitindo verificar como esses parâmetros afetam isoladamente os tempos de post-dial delay, post-pickup delay e call release delay.
Pushed by the growth of the Internet, the IP Telephony conquered a great attention of the market and big suppliers, with promises of cost reductions on operation, management, provisioning, maintenance and billing. Different protocols were developed for providing VoIP such as H.323, MGCP, Megaco and SIP. SIP has been highlighted for being a text based protocol, extensible, independent of the transport protocol, therefore more flexible and simpler than your competitor, the H.323. SIP (Session Initiation Protocol) is a signaling protocol used for establish, modify and terminate sessions. It can be used for voice calls over IP (VoIP) or to exchange instant messaging, among other applications. It has been developed originally in 1996 and has been standardized by IETF in 1999. In this work, the performance of SIP protocol for establishing VoIP calls will be estimated, since there are a lot of papers focalizing in the voice quality and few treated the signaling [3]. Experimental environments will be used for varying parameters like delay, packet loss, jitter, bandwidth and transport protocol, allowing to verify how there parameters affect separately the post-dial delay, post-pickup delay and call release delay.
Escobedo, Gonzalez Maiz Marco Antonio 1976. "Convivo communicator : an interface-adaptive voice over IP system for poor quality networks." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/61126.
Full textIncludes bibliographical references (leaves 100-102).
This thesis presents Convivo, a VoIP system designed to provide reliable voice communication for poor quality networks, especially those found in rural areas of the developing world. Convivo introduces an original approach to maintain voice communication interaction in presence of poor network performance: an Interface-Adaptation mechanism that suggests adjusting the application user interface to conform to one of three voice communication modalities (full duplex, half duplex, and voice messaging). The thesis proposes that changes in communication modality are an option to sustain voice communication interaction despite poor network performance. The goals of the changes in communication modality are to reduce the impact of high latency and low bandwidth on voice communication interaction, to facilitate turn taking for a high latency connection, and to sustain voice communication for extremely low bandwidth or high error links. The system was tested via a user study in Bohechio, a small village in the Dominican Republic. The study found that Interface-Adaptation helped users to maintain voice communication interaction when network performance degrades. Transitions from full duplex to voice messaging were found particularly valuable. Initial results suggest that as users get more experience with the application they would like to manually control transitions based on feedback provided by the application and their own perceived voice quality.
by Marco Antonio Escobedo Gonzalez Maiz.
S.M.
Shaikh, A. D. "Modelling data and voice traffic over IP networks using continuous-time Markov models." Thesis, Aston University, 2009. http://publications.aston.ac.uk/15385/.
Full text