A Linear Programming Model for Determining Distribution of User Sessions in a Voice Over Internet Protocol Network

被引:1
|
作者
Lemberg, Vyacheslav [1 ]
Irizarry, Michael S. [2 ]
Taglienti, Claudio [3 ]
机构
[1] US Cellular, Adv Syst Engn & Planning, Chicago, IL 60631 USA
[2] US Cellular, Engn & Informat Serv, Chicago, IL USA
[3] US Cellular, Adv Technol & Syst Engn, Chicago, IL USA
关键词
Delays; Wide area networks; Linear programming; Logic gates; Floors; IP networks; Internet telephony;
D O I
10.1109/MITP.2019.2953905
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Telecommunications service providers build highly available networks using equipment redundancy and overload protection mechanisms. However, because of network equipment misconfiguration or a natural disaster, the network equipment failover could be unsuccessful. This article proposes a linear programming model for determining the optimal distribution of user sessions in a commercial network such that the impact of an unsuccessful network equipment failover is minimal. The model has been applied successfully during the design of a commercial network that supports approximately 5 million customers. The proposed model will be useful for managing the telecommunication networks in a way that is more robust to catastrophic failure, providing greater security and better service to users. The article also presents quantitative results that show a modest increase in end-to-end one-way speech transmission delay ranging from 3.5 to 8.1 ms. This delay is also known as mouth-to-ear delay. The article proposes improvements to the linear programming model by putting an upper limit on the potential increase in the mouth-to-ear delay.
引用
收藏
页码:97 / 103
页数:7
相关论文
共 50 条
  • [1] A Linear Programming Model for Determining Distribution of User Sessions in a Voice Over Internet Protocol Network (vol 22, pg 97, 2020)
    Lemberg, Vyacheslav
    Irizarry, Michael
    Taglienti, Claudio
    [J]. IT PROFESSIONAL, 2021, 23 (03) : 111 - 111
  • [2] QoS Enhancement of Voice over Internet Protocol Based On Neural Network Model
    Ghaidan, Khaldoon
    [J]. MESM '2006: 9TH MIDDLE EASTERN SIMULATION MULTICONFERENCE, 2008, : 95 - 98
  • [3] Dynamic voice spammers detection using Hidden Markov Model for Voice over Internet Protocol network
    Vennila, Ganesan
    Manikandan, M. S. K.
    Suresh, M. N.
    [J]. COMPUTERS & SECURITY, 2018, 73 : 1 - 16
  • [4] Detection of Human and Computer Voice Spammers Using Hidden Markov Model in Voice over Internet Protocol Network
    Vennila, G.
    Manikandan, M. S. K.
    [J]. 7TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATIONS (ICACC-2017), 2017, 115 : 588 - 595
  • [5] A dynamic traffic allocation model of voice over internet protocol and public switched telephone network
    Lau, William
    Pandya, Pramod
    Sherif, Joseph S.
    [J]. KYBERNETES, 2012, 41 (3-4) : 404 - 413
  • [6] Secure Voice Over Internet Protocol(VoIP) Network with Biometric Key
    Bhuvaneshwari, S.
    Arul, P.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 1431 - 1435
  • [7] Enhancing Low Speed Network Performance for Voice over Internet Protocol
    Bandung, Yoanes
    Machbub, Carmadi
    Langi, Armein Z. R.
    Supangkat, Suhono H.
    [J]. INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS: COGNITIVE INFORMATICS: BRIDGING NATURAL AND ARTIFICIAL KNOWLEDGE, 2008, : 2891 - 2896
  • [8] VoIP (Voice over Internet Protocol)
    Davies, Dan
    [J]. Canadian Mining Journal, 2005, 126 (06):
  • [9] Securing Voice over Internet Protocol
    Ghafarian, Ahmad
    Draughorne, Randolph
    Hargraves, Shelley
    Grainger, Steven
    High, Stacy
    Jackson, Crystal
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (03): : 200 - 204
  • [10] VoIP (Voice over Internet protocol)
    Davies, D
    [J]. CANADIAN MINING JOURNAL, 2005, 126 (06) : 9 - 9