Neha Jain Shashwat Yadav

Slides:



Advertisements
Similar presentations
Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 2: Cisco VoIP Implementations.
29.1 Chapter 29 Multimedia Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
Review of a research paper on Skype
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
Measurements of Congestion Responsiveness of Windows Streaming Media (WSM) Presented By:- Ashish Gupta.
Introduction Future wireless systems will be characterized by their heterogeneity - availability of multiple access systems in the same physical space.
1 Solutions to Performance Problems in VOIP over Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi.
© 2006 Cisco Systems, Inc. All rights reserved. 2.3: Encapsulating Voice Packets for Transport.
1 689 Lecture 2 Review of Last Lecture Networking basics TCP/UDP review.
1 TCP Transport Control Protocol Reliable In-order delivery Flow control Responds to congestion “Nice” Protocol.
Medium Start in TCP-Friendly Rate Control Protocol CS 217 Class Project Spring 04 Peter Leong & Michael Welch.
Reduced TCP Window Size for VoIP in Legacy LAN Environments Nikolaus Färber, Bernd Girod, Balaji Prabhakar.
K. Salah 1 Chapter 28 VoIP or IP Telephony. K. Salah 2 VoIP Architecture and Protocols Uses one of the two multimedia protocols SIP (Session Initiation.
Junxian Huang 1 Feng Qian 2 Yihua Guo 1 Yuanyuan Zhou 1 Qiang Xu 1 Z. Morley Mao 1 Subhabrata Sen 2 Oliver Spatscheck 2 1 University of Michigan 2 AT&T.
Ch. 28 Q and A IS 333 Spring Q1 Q: What is network latency? 1.Changes in delay and duration of the changes 2.time required to transfer data across.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Public IP Telephony Introduction to VoIP Cisco Networking Academy Program.
1 mmdump Reference: “mmdump: A Tool for Monitoring Internet Multimedia Traffic” J. van der Merwe, R. Cceres, Y-H. Chu, C. Sreenan. ACM SIGCOMM Computer.
Computer Networks: Multimedia Applications Ivan Marsic Rutgers University Chapter 3 – Multimedia & Real-time Applications.
TCP/IP Protocol Suite 1 Chapter 25 Upon completion you will be able to: Multimedia Know the characteristics of the 3 types of services Understand the methods.
Understanding the Performance of TCP Pacing Amit Aggarwal, Stefan Savage, Thomas Anderson Department of Computer Science and Engineering University of.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
03/11/2015 Michael Chai; Behrouz Forouzan Staffordshire University School of Computing Streaming 1.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
TCP/IP Protocol Suite 1 Chapter 25 Upon completion you will be able to: Multimedia Know the characteristics of the 3 types of services Understand the methods.
Protocols and layering Network protocols and software Layered protocol suites The OSI 7 layer model Common network design issues and solutions.
Quality and Value for the Exam 100% Guarantee to Pass Your Exam Based on Real Exams Scenarios Verified Answers Researched by Industry.
iperf a gnu tool for IP networks
Voice Performance Measurement and related technologies
Cisco Networking Academy Program
Chapter 7: Transport Layer
Accelerating Peer-to-Peer Networks for Video Streaming
Window Control Adjust transmission rate by changing Window Size
UDP TCP.
Chapter 29 Multimedia Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Team: Aaron Sproul Patrick Hamilton
NET 536 Network Security Firewalls and VPN
VoIP over Wireless Networks
VoIP over Wireless Networks
The Transport Layer (TCP)
Group 5 ECE 4605 Neha Jain Shashwat Yadav
Empirically Characterizing the Buffer Behaviour of Real Devices
3 | Analyzing Server, Network, and Client Health
Understand the OSI Model Part 2
Transport Protocols over Circuits/VCs
Net 221D : Computer Networks Fundamentals
Multipath QUIC: Design and Evaluation
RTP: A Transport Protocol for Real-Time Applications
Introduction to Networking
Khiem Lam Jimmy Vuong Andrew Yang
SCTP v/s TCP – A Comparison of Transport Protocols for Web Traffic
TCP-LP Distributed Algorithm for Low-Priority Data Transfer
A Framework for Automatic Resource and Accuracy Management in A Cloud Environment Smita Vijayakumar.
Cisco Networking Academy Program
Transport Layer Unit 5.
Cisco Networking Academy Program
RTP and RTSP Realtime Transport Protocol
[Preliminary Simulation Results on Power Saving]
Goal Control the amount of traffic in the network
[Preliminary Simulation Results on Power Saving]
Congestion Control, Internet Transport Protocols: UDP
Beyond FTP & hard drives: Accelerating LAN file transfers
Network Performance Definitions
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Investigation of Voice Traffic in Wi-Fi Environment
Modeling and Evaluating Variable Bit rate Video Steaming for ax
Review of Internet Protocols Transport Layer
Transport Layer 9/22/2019.
Presentation transcript:

Neha Jain Shashwat Yadav VoIP Encryption Neha Jain Shashwat Yadav ECE 4605 Advanced Internetworking

Context for the Problem VoIP  Voice over Internet Protocol Real time transmission of voice signals as packetized data over an IP based network Results from preliminary work indicated Encryption incurs delays Delay not significant enough to affect voice quality What causes encryption delays to worsen. ECE 4605 Advanced Internetworking

ECE 4605 Advanced Internetworking Problem Statement To measure one way delays in a VoIP session, incurred before and after Encryption. Evaluating the effect on VoIP quality under varying conditions which cause increasing delays Increasing bandwidth contention Increasing CPU usage Increasing the application transmission rate ECE 4605 Advanced Internetworking

ECE 4605 Advanced Internetworking Delay Budget Packetization Delay Overhead vs. Delay Codec Delay Bandwidth vs. Quality Jitter buffer delay Collects packets and passes it in a regulated, sequenced order Propagation, Transmission, Queuing delays } Delay Budget 0 – 150 ms: Acceptable 150 – 250 ms: Perceptible, but OK 250 – 400 ms: Low quality >400 ms: Unacceptable Degradation in voice quality if encryption delay exceeds delay budget ECE 4605 Advanced Internetworking

Crypto-engine Bottleneck Scenario - I Scenario - II App. Layer Generates every 50 ms App. Layer Generates every 50 ms Network Layer (IPsec) Network Layer (IPsec) Requires 20ms for encryption algorithm Requires 70ms for encryption algorithm 20 ms additional fixed delay No longer fixed to 20 ms Crypto-engine bottleneck depends upon transmission rate of application layer and on time required for encryption. ECE 4605 Advanced Internetworking

ECE 4605 Advanced Internetworking Work Outline Factors affecting voice quality Delay Budget Crypto-Engine Bottleneck 1) One way delay measurement using Ethereal time-stamp 2) Presence of contending flows in the network 3) Increasing C.P.U utilization 4) Different application transmission rate to network layer ECE 4605 Advanced Internetworking

Work done :One Way Delay Used Ethereal captures to find absolute times  Used IP sequence numbers to synchronize the two flows  Use of absolute time scales - No synchronizing of clocks required - But it provides only the increase in delay due to encryption. ECE 4605 Advanced Internetworking

ECE 4605 Advanced Internetworking One Way Delay : Result Delay induced after encryption DES = 3.67 ms 3DES = 4.54 ms ECE 4605 Advanced Internetworking

Contending Flows : Result Delay induced after encryption DES= 4.58 ms 3DES = 7.92 ms But, there was a high perceivable delay in voice transmission Change in absolute delay 3DES= 13.42 ms DES= 10.94 ms No= 10.04 ms ECE 4605 Advanced Internetworking

ECE 4605 Advanced Internetworking Delay Analysis Application processing delay Application Layer (VoIP) Application Layer (VoIP) Ideal Measurement Processing Power Transport Layer Transport Layer Network Layer (IPSec) Network Layer (IPSec) Encryption/ Decryption delay MAC Layer (Ethereal) MAC Layer (Ethereal) Measured Delay Explains the discrepancy between measured delay and perceived quality. We only measure network delays ECE 4605 Advanced Internetworking

ECE 4605 Advanced Internetworking Increasing CPU usage CPU usage was kept constant at 100% by running multiple applications First – VoIP call monitored, observed packet loss and significant delays. No Jitter. Used ITG (Internet Traffic Generator) Client – Server traffic generator application for Windows!!! Allows RTT calculation, different bit rates DEMO Second – TCP flow was generated and RTT measured without VoIP (avoid UDP interference). ECE 4605 Advanced Internetworking

ECE 4605 Advanced Internetworking Increasing CPU usage Significant degrade in Voice quality for all 3 cases. DES: 4.947 ms 3DES: 10.775 ms Increase can be attributed to encryption delay, increased by reduced CPU processing power. Still doesn’t take into account delay due to application layer processing. ECE 4605 Advanced Internetworking

Application transmission rate Second test to look into crypto-engine bottleneck As transmission rate increases, it creates a bottleneck at network layer Generated TCP flows at varying rates. Measured Rtt. Rtt increased as sending rate increased. Anomaly in lower sending rates. ECE 4605 Advanced Internetworking

ECE 4605 Advanced Internetworking Implication Delay incurred by turning on encryption doesn’t seem to have an effect. Decreasing the amount of CPU processing power definitely affects voice quality. So when using VoIP phones of a limited capability, this is a problem. IPSec encrypts all traffic, making it a serious bottleneck in event of limited CPU processing power. In future, encrypting only the VoIP application would cut down the delay. ECE 4605 Advanced Internetworking

Spam Over Internet Telephony (SPIT) Encryption prevents eavesdropping. However, no safeguarding against spam. In one of our test runs, we faced one such issue. ECE 4605 Advanced Internetworking

Problems Faced/Future Work Lack of a software that would only encrypt a particular application with varying key size. No way of measuring one-way delays, due to unsynchronized clocks of the two computers. Windows and Linux incompatibility. Future work: Measuring application to application delays. Using gradually increasing CPU processing rates. Using higher encryption key sizes and different algorithms. ECE 4605 Advanced Internetworking