Actas de congresos
Evaluation Of Quality In Encrypted Voip Calls
Registro en:
9781467347921
Proceedings Of The 2012 4th International Conference On Computational Aspects Of Social Networks, Cason 2012. , v. , n. , p. 175 - 180, 2012.
10.1109/CASoN.2012.6412398
2-s2.0-84874080596
Autor
Barison D.
Miani R.S.
Zarpelao B.B.
Davis Breda G.
De Souza Mendes L.
Institución
Resumen
The purpose of this work is to evaluate the quality of encrypted VoIP calls with different encryption algorithms through OpenVPN software, in order to identify differences in results between encryption algorithms and also differences between non-encrypted and encrypted calls. This evaluation will take into account the MOS (Mean Opinion Score), a method to indicate user satisfaction of voice communication quality. The encrypted VoIP calls will occur in different network scenarios that present different network bandwidths and different problems, like packet loss, out-of-order packets, and delay. © 2012 IEEE.
175 180 MIR Labs Unuth, N., (2010) Reasons for Choosing Voice over IP-VoIP Advantages, , http://voip.about.com/od/voipbasics/a/ReasonsForVoIP.htm, Accessed in 07/24/2012 (2012) Wireshark, , http://www.wireshark.org/, Accessed in 07/24 (2012), http://openvpn.net/, Accessed in 07/24Brown, M.A., Traffic control HOWTO (2006) The Linux Documentation Project, , http://tldp.org/HOWTO/Traffic-Control-HOWTO/index.html, October. Accessed in 07/24/2012 (2012), http://www.ixchariot.com/, Accessed in 07/24Markopoulou, A.P., Tobagi, F.A., Karam, M.J., Assessing the quality of voice communications over Internet backbones (2003) IEEE/ACM Transactions on Networking, 11, pp. 747-760. , Oct., doi: 10.1109/TNET.2003.818179 Snyder, J., (2006) Test Shows Voip Call Quality Can Improve with SSL VPN Links, , http://www.networkworld.com/reviews/2006/022006-ssl-voiptest.html, September. Accessed in 07/24/2012 Bergstra, J.A., Middelburg, C.A., (2003) ITU-T Recommendation G.107: The E-Model, A Computational Model for Use in Transmission Planning, , Technical report, ITU-T Barbosa, R., Callado, A., Kamienski, C.A., Fernandes, S., Mariz, D., Kelner, J., Sadok, D., Avaliação do desempenho de aplicações VoIP P2P (2006) XXIV Simpósio Brasileiro de Redes de Computadores, , http://www.lbd.dcc.ufmg.br:8080/colecoes/sbrc/2006/st8_3.pdf, June. Accessed in 07/24/2012 Carson, M., Santay, D., Nist net: A Linux-based network emulation tool (2003) ACM SIGCOMM Computer Communication Review, 33, pp. 111-126. , July, doi: 10.1145/956993. 957007 Voznák, M., (2008) Impact of Network Security on Speech Quality, , http://www.cesnet.cz/doc/techzpravy/2008/impact-of-networksecurity-on- speech-quality/impact-of-network-security-on-speechquality.pdf, Technical report, CESNET. Accessed in 07/24/2012 Nappa, A., Bruschi, D., Rozza, A., Voznak, M., (2007) Analysis and Implementation of Secure and Unsecure Voice over IP Environment and Performance Comparison Using OpenSER, p. 84. , Technical report, published at Universita degli studi di Milano, December (2012) Iperf - The TCP/UDP Bandwidth Measurement Tool, , http://iperf.sourceforge.net/, NLANR/DAST. Accessed in 07/24 Hemminger, S., Network emulation with netEm (2005) Proceedings of the 6th Australia's National Linux Conference (LCA'05), , April