(3.235.11.178) 您好!臺灣時間:2021/03/07 07:55
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:宋雅琴
研究生(外文):Sung, Ya-Chin
論文名稱:無線網路環境下網際網路電話之效能分析
論文名稱(外文):VoIP Performance Analysis in the Wireless Environment
指導教授:林一平林一平引用關係
指導教授(外文):Lin, Yi-Bing
學位類別:博士
校院名稱:國立交通大學
系所名稱:資訊科學與工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2010
畢業學年度:98
語文別:英文
論文頁數:79
中文關鍵詞:網際網路電話服務品質效能量測平均意見分數基於區域網路的延伸認證通訊協定IEEE 802.1X第三代行動合作通訊計畫無線接取閘道器/封包資料閘道器網際網路通訊協安全性全球互通微波存取網路寬頻無線通訊電信服務行動通訊
外文關鍵詞:Voice over IPQuality of ServicePerformance MeasurementMean Opinion ScoreEAPOLIEEE 802.1XUMTSWAG/PDGIPsecWiMAXBroadband Wireless CommunicationsTelecommunication ServicesMobile Communications
相關次數:
  • 被引用被引用:0
  • 點閱點閱:248
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:26
  • 收藏至我的研究室書目清單書目收藏:1
網際網路電話(VoIP)為目前IP網路上最具發展性的通訊方式之一。在無線行動環境下,頻寬資源有限,並且傳送之可靠性較有線環境為差。為了在無線行動網路中提供令人滿意的網際網路電話服務,必須保證網路的服務品質(QoS)。
隨著電波射頻技術的演進,頻寬大幅提升,各種無線網路下都可以提供網際網路電話服務。為達到電信等級的安全度,我們提出整合第三代行動網路與無線網路的認證方法,在無線網路環境下重複利用全球行動通訊系統(UMTS)的認證金鑰,並且針對IEEE 802.1X參數作效能分析以獲得較好的認證延遲效能。
此外,我們研究無線網路下網際網路電話封包的傳送效能。第三代行動合作通訊計畫(3GPP)標準文件允許被認證的無線網路透過無線接取閘道器/封包資料閘道器(WAG/PDG)接取第三代行動網路;然而,為確保電信等級的安全度,在行動終端設備(MS)和無線接取閘道器/封包資料閘道器間的網際網路電話封包必須以網際網路通訊協定安全性(IPsec)保護。我們分析在無線網路下以網際網路通訊協定安全性加密後的網際網路電話效能,檢視網際網路通訊協定安全性的額外負擔,包括:封包處理效能,封包遺失率,封包傳送延遲,以及傳送時間抖動。
最後,我們評估車用環境下網際網路電話的效能。基於M台灣計畫,我們在台北佈建全球互通微波存取(WiMAX)網路以支援高速行動寬頻服務,並在該網路環境中整合網際網路電話服務。我們研究在上述環境下網際網路電話的效能,其研究成果可作為未來其他先進的網路環境下分析網際網路效能時的參考。

Voice over Internet Protocol (VoIP) is a promising low-cost voice communication over IP networks. In a mobile/wireless environment, the radio resource is restricted and the reliability of the wireless transmission is much poor than that of the wired environment. To provide satisfactory VoIP services in the mobile/wireless network, the Quality of Service (QoS) of the network should be guaranteed.
Due to the advances of various wireless technologies, the VoIP service is provisioned in different wireless networks. To achieve telecom grade security, we propose a WLAN-3G integrated security approach that reuses the UMTS authentication key in the WLAN environment and conduct a modeling study to tune the IEEE 802.1X parameters to yield better authentication delay performance.
Furthermore, we investigate the VoIP packet delivery efficiency in the wireless environment (i.e., WLAN network). In 3GPP specifications, the authenticated WLAN MS is allowed to access the 3G network through the WAG/PDG. However, to ensure telecom grade security, the VoIP traffic between the MS and the WAG/PDG must be protected with IPsec. We analyze the performance of IPsec-based VoIP service in a IEEE 802.11b WLAN environment. The IPsec overheads in terms of throughput, packet loss rate, latency, and jitter are investigated.
Finally, we present the VoIP performance in the vehicle environment. We conduct trials in the real WiMAX network which supports high-speed mobile broadband services and investigate the WiMAX-based VoIP of a Mobile Taiwan (M-Taiwan) funded program conducted during 2007-08 in the Taipei area. We investigate the VoIP performance in the wireless environment. These research results presented in this dissertation can be viewed as a useful foundation for further VoIP performance study in various advanced wireless environments.

摘要 I
ABSTRACT II
ACKNOWLEDGEMENT III
CONTENTS IV
LISTS OF TABLES VI
LIST OF FIGURES VII
NOTATIONS IX
CHAPTER 1 INTRODUCTION 1
1.1 WIRELESS ACCESS NETWORK 4
1.2 CORE NETWORK 5
1.3 APPLICATION AND SERVICE NETWORK 6
1.4 DISSERTATION ORGANIZATION 7
CHAPTER 2 EFFECTS OF THE EAPOL TIMERS IN IEEE 802.1X AUTHENTICATION 10
2.1 INTRODUCTION 10
2.2 SIM-BASED IEEE 802.1X AUTHENTICATION 13
2.3 EAPOL TIMERS 16
2.4 PERFORMANCE MODELING 18
2.5 NUMERICAL EXAMPLES 23
2.6 SUMMARY 28
CHAPTER 3 IPSEC-BASED VOIP PERFORMANCE IN WLAN ENVIRONMENTS 29
3.1 INTRODUCTION 29
3.2 RELATED WORKS 30
3.3 IPSEC-BASED VOIP EXPERIMENTAL ENVIRONMENT 32
3.4 PERFORMANCE MEASUREMENT 33
3.4.1 Throughput and Packet Loss Rate 33
3.4.2 Latency 36
3.4.3 Jitters 38
3.5 CONCLUSIONS 40
CHAPTER 4 M-TAIWAN EXPERIENCE IN VOIP-WIMAX TRIAL 42
4.1 INTRODUCTION 42
4.2 VOIP OVERVIEW 43
4.2.1 Session Initiation Protocol and Real-Time Transport Protocol 44
4.2.2 E-Model 44
4.3 WIMAX OVERVIEW 47
4.3.1 The Media Access Control Layer 49
4.3.2 The Physical Layer 50
4.4 VOIP EXPERIMENTAL ENVIRONMENT 51
4.5 VOIP EXPERIMENTAL SETUP FOR OUTPUT MEASUREMENT 56
4.6 WIRELESS-TO-WIRELESS VOIP MEASUREMENT RESULTS 59
4.6.1 Mean Opinion Score (MOS) 60
4.6.2 Packet Loss 62
4.6.3 One-way Packet Delay 64
4.6.4 Jitters 66
4.7 CONCLUSIONS 69
CHAPTER 5 CONCLUSIONS AND FUTURE WORK 70
5.1 CONCLUDING REMARKS 70
5.2 FUTURE WORK 71
BIBLIOGRAPHY 74
CURRICULUM VITAE 78
PUBLICATION LIST 79


[1] 3GPP. 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Feasibility study on 3GPP system to Wireless Local Area Network (WLAN) interworking. Technical Specification 3GPP TR 22.934 version 9.0.0 (2009-12), 2009.
[2] 3GPP. 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Technical realization of Short Message Service (SMS). Technical Specification 3GPP TR 23.040 version 9.1.0 (2009-9), 2009.
[3] 3GPP. 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Multimedia Messaging Service (MMS); Functional description; Stage 2. Technical Specification 3GPP TR 23.140 version 6.16.0 (2009-3), 2009.
[4] 3GPP. 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; IP Multimedia Subsystem (IMS); Stage 2. Technical Specification 3GPP TR 23.228 version 9.2.0 (2009-12), 2009.
[5] WiMAX Forum. WiMAX Forum Network Architecture (Stage 3: Detailed Protocols and Procedures), Release 1, V1.2, Jan. 2008.
[6] IBM. http://www-01.ibm.com/software/webservers/appserv/was/; WebSphere Application Server.
[7] LAN/MAN Standards Committee of the IEEE Computer Societ, IEEE Standard for Local and Metropolitan Area Networks – Port-Based Network Access Control. IEEE Std 802.1X-2001, 2001.
[8] Y.-B. Lin and I. Chlamtac, Wireless and Mobile Network Architectures. John Wiley & Sons, Inc., 2001.
[9] Y.-B. Lin and Y.-K. Chen, Reducing Authentication Signaling Traffic in Third Generation Mobile Network. IEEE Transactions on Wireless Communications, 2002.
[10] IETF. Extensible Authentication Protocol (EAP). IETF RFC 3748, 2004.
[11] IETF. Remote Authentication Dial In User Service (RADIUS). IETF RFC 2865, 2000.
[12] A. K. Salkintzis, C. Fors, and R. Pazhyannur, WLAN-GPRS Integration for Next-generation Mobile Data Networks. IEEE Wireless Communications, 2002.
[13] K. Ahmavaara, H. Haverinen, R. Pichna, Interworking architecture between 3GPP and WLAN systems. IEEE Communications Magazine, 2003.
[14] A. K. Salkintzis, Interworking techniques and Architectures for WLAN/3G Integration toward 4G Mobile Data Networks. IEEE Wireless Communications, 2004.
[15] Y.-B. Lin and A.-C. Pang, Wireless and Mobile All-IP Networks. John Wiley & Sons, Inc., 2005.
[16] IETF. Extensible Authentication Protocol Method for GSM Subscriber Identity Modules (EAP-SIM). IETF Internet Draft draft-haverinen-pppext-eap-sim-05, June 2002.
[17] 3GPP. 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security Architecture. 3G TS 33.102, v6.2.0, 2004.
[18] L. Klenrock, Queueing Systems; Volume I: Theory. John Wiley & Sons, Inc., 1976.
[19] J. Banks, J. S. Carson, B. L. Nelson, and D. M. Nicol. Discrete-Event System Simulation. Prentice Hall, 2001.
[20] 3GPP TS 23.234, 3GPP System to Wireless Local Area Network (WLAN) Interworking; System Description (release 7), 3rd Generation Partnership Project (3GPP), 2006; http://www.3gpp.org/ftp/Specs/archive/23_series/23.234/.
[21] S. Kent and R. Atkinson, “IP Encapsulating Security Payload (ESP)”, RFC 2406, Nov 1998.
[22] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler, “SIP: Session Initiation Protocol”, RFC 3261, Jun. 2002.
[23] S. Casner, R. Frederick, V. Jacobson, and H. Schulzrinne, “RTP: A Transport Protocol for Real-Time Applications”, RFC 3550, Jul. 2003.
[24] A. Nascimento, A. Passito, E. Mota, E. Nascimento, and L. Carvalho, “Can I Add a Secure VoIP Call?”, Proceedings of the XIII IEEE International Conference on Networks, Volume 1, Page 151– 155, Nov. 2005.
[25] R. Rajavelsamy, V. Jeedigunta, B. Holur, M. Choudhary, and O. Song, “Performance Evaluation of VoIP over 3G-WLAN Interworking System”, IEEE Wireless Communications and Networking Conference, Volume 4, Page 2312– 2317, Mar. 2005.
[26] W. Wang, S.-C. Liew, and V.O.K. Li, “Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN”, IEEE Transactions on Vehicular Technology, Volume 54, Issue 1, Page 366– 384, Jan. 2005.
[27] D.P. Hole and F.A. Tobagi, “Capacity of an IEEE 802.11b Wireless LAN Supporting VoIP”, IEEE International Conference on Communications, Volume 1, Page 196– 201, Jun. 2004.
[28] SmartVoIPQoS User Guide, http://www.spirentcom.com/documents/438.pdf
[29] ITU-T G.711 Recommendation, “Pulse Code Modulation (PCM) of Voice Frequencies”, Nov. 1988.
[30] ITU-T G.729 Recommendation, “Coding of Speech at 8 kbit/s Using Conjugate-Structure Algebraic-Code-Excited Linear-Prediction (CS-ACELP)”, Mar. 1996.
[31] ANSI X9.52-1998, “Triple Data Encryption Algorithm Modes of Operation”, American National Standard Institute, 1998.
[32] FIPS 180-1, “Secure Hash Standard”, National Institute of Standards and Technology, US Department of Commerce, Washington DC: Springer-Verlag, April 1995.
[33] NTT Communications, http://www.ntt.com/index-e.html
[34] Y.-B. Lin, “Keynote Speech on M-Taiwan: A WiMAX Experience”, Mobility 2008 Conference, I-Lan, Taiwan, 9-12 September, 2008.
[35] MOEA, 2008 WiMAX Expo, Taipei & WiMAX Operator Summit, June 2-6, 2008. See also http://wimaxtaipei.tw/.
[36] IETF. “SDP: Session Description Protocol”, RFC 4566, Jul. 2006.
[37] ITU-T. The E-model, a Computational Model for Use in Transmission Planning, ITU-T Recommendation G.107, 2003.
[38] H. F. Rashvand, Lecture Notes for ES433 & ES9R8, Wireless Communication Systems, University of Warwick.
[39] H. F. Rashvand, Special Guest Speaker, WiMAX Cybercity & Next Generation Networks, Mobility 2008, Ilan, Taiwan, 9-12 September, 2008.
[40] Y.-C. Sung and Y.-B. Lin, IPsec-based VoIP Performance in the WLAN Environment, IEEE Internet Computing, 2008.
[41] D. P. Hol and F. A. Tobagi, Capacity of an IEEE 802.11b Wireless LAN Supporting VoIP, IEEE International Conference on Communications, Volume 1, pps.196– 201, Jun. 2004.
[42] NetIQ, Performing a VoIP Assessment with Vivinet Assessor, White Paper, NetIQ, 2007.

連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 林天送(2003)。用繪畫操練腦力。健康世界,212,13-16。
2. 呂惠富(2008)。休閒運動之參與動機與休閒效益關係之研究。休閒產業管理學刊,1
3. 林佳蓉(2000)。老人的休閒參與對休閒滿意和生活滿意之影響。大專體育,51,156-
4. 李淑玲(2007)。退休休閒生活計畫之探討。大專體育,89,75-82。
5. 尤逸歆(2004)。老化與休閒運動。大專體育,70,160-164。
6. 林逸安(2005)。中國繪畫與生活題材初探。造形藝術學刊,2005, 127-146。
7. 林樹旺(2008)。建構自行車使用者休閒涉入對休閒效益之影響。運動與遊憩研究,2
8. 尚憶薇(2001)。花蓮地區老年人休閒動機與休閒阻礙之研究。體育學報,31,183-
9. 高俊雄(1995)。休閒利益三因素模式。戶外遊憩研究,8(1),15-28。
10. 陳清惠(2004)。休閒活動對老年生活之意義。護理雜誌,51(3),15-18。
11. 陳肇男(2003)。台灣老人休閒生活與生活品質。人口學刊,26,96-136。
12. 陳繼勝(2003)。繪畫活動於精神科之臨床應用。護理雜誌,50(5),105-109。
13. 葉晉利(2008)。休閒與身心靈健康管理。工作與休閒學刊,1(1),39-47。
14. 鄭健雄(2008)。城鄉居民休閒生活型態與其健康關係之研究。運動與遊憩研究,(3)
15. 顏光良(2006)。配色調查樣本之色彩交錯搭配關係研究。設計學報,11(1),101-
 
系統版面圖檔 系統版面圖檔