CA2508545C - Rapid fault detection and recovery for internet protocol telephony - Google Patents

Rapid fault detection and recovery for internet protocol telephony Download PDF

Info

Publication number
CA2508545C
CA2508545C CA2508545A CA2508545A CA2508545C CA 2508545 C CA2508545 C CA 2508545C CA 2508545 A CA2508545 A CA 2508545A CA 2508545 A CA2508545 A CA 2508545A CA 2508545 C CA2508545 C CA 2508545C
Authority
CA
Canada
Prior art keywords
node
packets
keep
paths
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CA2508545A
Other languages
French (fr)
Other versions
CA2508545A1 (en
Inventor
Mark John Karol
P. Krishnan
Juan Jenny Li
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Avaya Inc
Original Assignee
Avaya Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Avaya Inc filed Critical Avaya Inc
Publication of CA2508545A1 publication Critical patent/CA2508545A1/en
Application granted granted Critical
Publication of CA2508545C publication Critical patent/CA2508545C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/80Responding to QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/40Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route

Abstract

Techniques for performing rapid fault detection and recovery in communication networks are disclosed. For example, in one aspect of the invention, a technique for detecting one or more conditions in a communication network comprises the following steps/operations. One or more keep-alive packets are transmitted from a source node in the communication network to a destination node in the communication network over two or more paths between the source node and the destination node, wherein the two or more paths are at least partially disjoint.
Upon receipt of the one or more keep-alive packets at the destination node via the two or more paths, at least one quality measure is computed at the destination node for each of the two or more paths, the at least one quality measure being indicative of one or more conditions in the communication network. While not limited thereto, the invention is particularly well-suited to Internet Protocol (IP) telephony networks, particularly those that provide Voice over IP (VoIP) applications.

Description

504072-A-11-CA (Karol) 1 RAPID FAULT DETECTION AND RECOVERY
FOR INTERNET PROTOCOL TELEPHONY

Field of the Invention The present invention generally relates to communication networks such as Internet Protocol (IP) telephony-based networks and, more particularly, to techniques for performing rapid fault detection and recovery in such networks.
Background of the Invention There is increasing interest in IP telephony to help lower costs and enable new services. Many enterprises and call centers are adopting IP telephony over their converged IP infrastructure and many multi-site corporations are using Voice over IP (VoIP) for their intra- and inter-site communication.
With the use of VoIP for mission-critical business applications, it is important to evaluate and improve the reliability and quality of VoIP calls.
Ideally, a VoIP call should be as reliable as a traditional circuit-switched phone call.
However, when monitoring and evaluating the quality of a VoIP call (especially over wide area links), it is necessary to deal with the inherent packet losses, delays, and jitter associated with IP networks, which are not encountered in traditional circuit-switched networks. Even though IP networks are largely self-healing for network faults, and many enterprise networks are engineered to have redundant links or paths between sites, today's IP networks are not engineered to react to performance degradations at the timescales needed for voice. For example, recent studies show that while there is acceptable performance within some service provider networks, many backbone paths still have poor VoIP performance and network faults cause problems.

504072-A-11-CA (Karol) 2 To provide a robust VoIP infrastructure, it is important to rapidly detect performance degradations and faults. This detection is complicated by several factors. On a per-connection basis, for example, there are natural silence periods in VoIP calls during which packets are not transmitted by a source (e.g., when a participant in a call is listening rather than speaking). Consequently, while monitoring a VoIP call (e.g., on the receiving side) it is necessary to distinguish between gaps that occur due to natural speech silences and perhaps speech compression, and the gaps that occur due to packet loss, delay, and jitter in the IP
network. Furthermore, although detecting problems can certainly help to alert a network manager, it would be particularly useful if the network could react to a detected problem and route around it.
Accordingly, there is a need for techniques for performing rapid fault detection and recovery in communication networks such as IP telephony networks, particularly those that provide VoIP applications..

Summary of the Invention The present invention provides techniques for performing rapid fault detection and recovery in communication networks. While not limited thereto, the invention is particularly well-suited to IP telephony networks, particularly those that provide VoIP applications.
For example, in one aspect of the invention, a technique for detecting one or more conditions in a communication network comprises the following steps/operations. One or more keep-alive packets are transmitted from a source node in the communication network to a destination node in the communication network over two or more paths between the source node and the destination node, wherein the two or more paths are at least partially disjoint. Upon receipt of the one or more keep-alive packets at the destination node via the two or more paths, at least one quality measure is computed at the destination node for each of the two or more paths, the at least one quality measure being indicative of one or more conditions in the communication network.
Further, the quality measures may be compared for each of the two or more paths. Results of the comparisons may be transmitted from the destination node to 504072-A-11-CA (Karol) 3 the source node. One or more communication packets may be transmitted from the source node based on at least a portion of the received results.
Thus, by way of example and in accordance with an illustrative embodiment, short, low-bandwidth keep-alive packets can be injected into VoIP packet streams to rapidly detect faults and deteriorating network conditions (e.g., increasing delay, jitter, or loss). The keep-alive packets can be duplicated and also used to continuously monitor and compare the delay and loss characteristics of primary and alternate network paths, and thereby help control the rapid switchover of calls (in-progress and future) to alternate routing paths (or the circuit-switched PSTN) when faults or deteriorating QoS conditions are detected. By simultaneously transmitting copies of keep-alive packets over multiple paths to make the differential delay measurements and comparisons, the techniques avoid many common synchronization and timing errors.
These and other objects, features and advantages of the present invention will become apparent from the following detailed description of illustrative embodiments thereof, which is to be read in connection with the accompanying drawings.

Brief Description of the Drawings FIG. 1 is a block diagram of a simple model for use in illustrating multiple paths between sender and receiver sites in an IP telephony-based network, in accordance with which an illustrative embodiment of the present invention may be employed;
FIG. 2 is a block diagram of an exemplary IP telephony-based network associated with a multi-site enterprise, in accordance with which an illustrative embodiment of the present invention may be employed;
FIG. 3 is a block diagram of an overlay VoIP PMR graph for use in illustrating a fault detection and recovery methodology, in accordance with an illustrative embodiment of the present invention; and FIG. 4 is a block diagram of a computer system architecture for use in implementing a fault detection and recovery methodology, in accordance with an illustrative embodiment of the present invention.

504072-A-11-CA (Karol) 4 Detailed Description of Preferred Embodiments It is to be appreciated that while the present invention will be described below in the context of an IP telephony-based network having VoIP capability, the invention is not so limited. That is, the present invention is more generally applicable to any communication network in which it would be desirable to provide detection of one or more conditions in the communication network.
Before providing illustrative details of an implementation of the techniques of the invention in the context of an IP telephony-based network with VoIP
capabilities, principles of the invention will be described from a more general communication network perspective.
Assume that there is a network of communication nodes. This may be an IP
telephony-based network with VoIP capabilities. However, this may also include the special case of a signalling network. Further assume that there is an underlying routing algorithm that routes communication packets from source communication nodes to destination communication nodes (any particular communication node might both be a source and a destination for different communication sessions). For example, the communication packets might be VoIP packets. Still further, the communication packets might be signalling packets. Examples of signalling packets may include error messages, call requests and interrupt requests.
In accordance with principles of the invention, some of the communication nodes also are equipped to serve as pacemaker/measurement/routing (PMR) nodes, as will be explained in detail below. Such PMR functions, for example, could be implemented in a gateway. In addition, there can be some standalone PMR nodes.
Further, in accordance with principles of the present invention, a source PMR node injects or transmits keep-alive PMR packets to a destination PMR node along two or more paths that differ in at least one node or link (i.e., the two or more paths are at least partially disjoint). Keep-alive packets are additional, short packets transmitted on a regular basis in order to "keep alive" (i.e., eliminate long idle gaps in) the communications between the source node and the destination node. The keep-alive PMR packets receive the same type of quality-of-service (QoS) within the network as the communication packets that are delivered in the network.
The keep-alive PMR packets might be simultaneously injected along the two or more 504072-A-11-CA (Karol) 5 paths. The keep-alive PMR packets may be transmitted on a regular basis (regular intervals) - all the time (i.e., with or without calls between a source PMR
node and a destination PMR node), continuously with calls, only during silence periods within calls, or only during idle periods between calls. The rate at which keep-alive PMR
packets are transmitted can be different for different pairs of source PMR
nodes and destination PMR nodes. The transmission along two or more paths may be via tunnelling through one or more intermediate PMR nodes (i.e., PMR nodes between the source PMR node and the destination PMR node). The transmission along two or more paths may be by appropriately setting header address bits (which influence the routing of packets). The transmission along two or more paths may be via a sequence of overlay PMR nodes.
Still further, in accordance with principles of the present invention, QoS
measures (e.g., delay, jitter, loss) of the two or more paths may be compared at the destination PMR node. The QoS comparison may be via relative receive times, thereby avoiding the need to synchronize clocks at the source PMR node and destination PMR node. The QoS comparison takes into account various delay, jitter, and loss measures appropriate for the associated types of communication packets (e.g., delay and jitter might be more important for VoIP packets, whereas loss might be more important for signalling packets).
Yet further, in accordance with principles of the present invention, information from the QoS comparison at the destination PMR node may be communicated back to the source PMR node and may be used to influence the paths of future communication packets from the source communication node to the destination communication node. The paths of communication packets could be changed for future calls set up or, if desired, even for ongoing, existing sessions of communication packets. The paths could be changed via tunnelling through one or more intermediate PMR nodes, via overlay PMR networks, or via changing routing tables in the underlying routing algorithm. For reliability, the QoS
comparison information could be communicated from the destination PMR node back to the source PMR node over multiple paths.
We turn now to an illustrative VoIP implementation of the above principles of the present invention.

504072-A-1l-CA (Karol) 6 1. Introduction Principles of the present invention provide techniques for using short, low-bandwidth keep-alive packets that can be injected into Vol? packet streams to rapidly detect conditions such as faults and deteriorating network conditions such increasing delay, jitter, or loss. While the terms "short" and "low-bandwidth"
will depend on the particular network application, and the invention is not limited to any particular packet length or bandwidth value, one example of short, low-bandwidth keep-alive packets may include 32 bit SDES RTCP (Source Description Real-time Transmission Control Protocol) packets with an overhead of less than 0.2 percent.
We describe how the keep-alive packets can be duplicated and also used to continuously monitor and compare the delay and loss characteristics of primary and alternate network paths, and thereby help control the rapid switchover of calls to alternate routing paths when faults or deteriorating QoS conditions are detected.
Specifically, by rapidly switching/sending calls to better alternate paths (with lower delay, loss, or jitter characteristics), the inventive techniques can help:
(i) improve the QoS of in-progress calls; (ii) failover route in-progress calls around a detected fault; and (iii) failover route future calls around faults. Based on the detected conditions in the IP network, the techniques can even be used to switch calls over to the traditional circuit-switched PSTN when desired or necessary.
Before VoIP traffic is added to a network, it is important to first determine if the desired QoS is in fact attainable (for an anticipated traffic mix). For example, an initial network assessment can help determine if a network is properly configured.
In this illustrative implementation, we assume that the bandwidth, configurations, and settings of the network are in fact sufficient and correct to provide the desired QoS for the anticipated traffic. The inventive techniques are then used to monitor and control the ongoing connections using low-bandwidth keep-alive packets that are sent over primary network paths and, for comparison, alternate network paths.
Essentially, the packets monitor and detect deviations from the norm caused by faults and unanticipated (even if temporary) traffic conditions. The inventive techniques not only detect network problems, they also help determine appropriate control responses (e.g., to route around congestion and faults).

504072-A-11-CA (Karol) 7 In Section II, we illustratively describe the inventive detection, monitoring, and control techniques. In Section III, we illustratively present some generalizations and architectural and implementation issues. In Section IV, we provide greater mathematical detail and present some analytical results to validate the inventive concepts. In Section V, we provide an illustrative hardware implementation. In Section VI, we present an illustrative summary and discuss some extensions.

II. Detection and Monitoring for Control In this section, we introduce a low-bandwidth technique for detecting network faults and QoS problems. One key concept in the architecture/technique provided in accordance with the invention is the concept of detection and monitoring for control.
In contrast, some network monitoring techniques detect network conditions and problems but they provide little or no guidance in the appropriate control responses to the faults. After presenting a low-bandwidth rapid detection method, we will describe a method for rapid control responses to deteriorating network conditions and faults. Our control method will, in turn, motivate a monitoring scheme that avoids many of the common issues in path QoS monitoring for VoIP.

A. Low-Bandwidth Detection For rapid detection of network faults and QoS impairments at a receiver, the invention provides for transmitting by the sender a low-bandwidth keep-alive signal along with VoIP streams. For instance, along with the VoIP (e.g., RTP or Real-time Transmission Protocol) packets, short keep-alive packets can be sent at regular, "fixed" intervals (e.g., every 500 milliseconds). For detecting network faults alone, these packets need be transmitted only during silent periods in VoIP calls; at other times the RTP packets themselves can be used for fault detection purposes. The sender increases the number of keep-alive packets when the number of RTP
packet decreases (during silent periods), making sure that at least one RTP or keep-alive packet is sent every T seconds. Specifically, additional (short) keep-alive packets are injected at rate R = 1/T during silent periods in the RTP stream.

504072-A-11-CA (Karol) 8 At the receiver, a failure is declared if neither RTP nor keep-alive packets are received within a window of kT seconds (k = 2, 3, ...). The receiver then notifies the users who are involved in the sessions, plus, perhaps, other users that might be affected if they were to attempt to set up a new call. Since the RTP and keep-alive packets experience network jitter and loss, there is a chance that a failure will be wrongly declared (i.e., a "false alarm"). However, as soon as either an RTP or a keep-alive packet is once again received, the receiver cancels its "failure announcement." This serves to either: (i) correct a false alarm; or (ii) announce restoration after an actual failure. In other words, (i) states that false alarms automatically self-correct as soon as the next successful RTP or keep-alive packet is received.

Many specific implementation issues are addressed in M. Karol, P. Krishnan, and J.J. Li, "VoIP Network Failure Detection and User Notification", Proc. 2003 Int. Conf. on Computer Communications and Networks, October 2003. In particular, it is shown that if SDES RTCP packets are used as the keep-alive packets, then the overhead in such an implementation is less than 0.2 percent. Other options exist including the use of proprietary keep-alive signals (e.g., between vendor-specific gateway devices). In actual implementations, the keep-alive packets can be injected by the endpoints (e.g., by IP softphones) or perhaps at VoIP Gateways (for a collection of VoIP
calls). However, in implementing these techniques, we want to make sure the IP
network treats the keep-alive packets identical to the VoIP (e.g., RTP) packets -using the same routing paths, priorities, etc. - so that the loss and delay experienced by the keep-alive packets will accurately reflect the loss and delay experienced by the VoIP calls. Thus, RTP or RTCP packets can be used as keep-alive packets.

B. Extending to QoS Monitoring We now turn our attention to low-bandwidth QoS monitoring techniques. We already mentioned that keep-alive packets are injected at a fixed rate R = 1 IT during RTP silent periods. To monitor the QoS (and rapidly respond to it) during RTP
talkspurts, there are two options. First, the low-bandwidth keep-alive packets can be injected even during the talkspurts - at the expense of slightly more bandwidth.

504072-A-11-CA (Karol) 9 That is, the keep-alive packets can be injected at rate R = 1/T all the time.
Second, if we know that the RTP packets are injected with a high degree of accuracy (for example, every 20 milliseconds), then the RTP packets themselves can be used for the monitoring. In both cases, the receiver is designed to exploit the fact that the sender injects some packets nominally at fixed intervals during both RTP
silent periods and RTP talkspurts.

The voice QoS (e.g., MOS score/R-value) depends on the packet loss, jitter, and one-way delay. MOS stands for "Mean Opinion Score." It is one conventional measure used to rate the quality of VoIP. It is a scale that rates the relative quality of voice conversations as subjectively perceived by human users. The R-value is a second commonly used metric.

At the receiver, the packet loss probability is measured by simply counting the number of missing, dropped keep-alive and RTP packets. One-way delay and jitter, however, are more challenging to measure. If the keep-alive (and RTP) packets are transmitted at regularly spaced intervals (and with high priority) on each path, then the spacing between successive packets at the receiver gives an approximate measure of the jitter on each path. To monitor the delay, one can add global "time stamps" to packets when they are transmitted and compare them with a clock when received. This, though, requires accurate timing and synchronization of the sending and receiving nodes. Alternatively, the delay measurement is a lot simpler if we exploit the existence of multiple paths between the sending and receiving nodes; we do this below in Section C.

C. Monitoring for Control A focus of the inventive techniques is on the rapid switchover to alternate network paths (or the PSTN) and related performance issues. To motivate the discussion of our control methodology and our analysis, let us assume that in a portion of an exemplary network 100 there are two sites: a sending site 102 and a receiving site 104, as shown in FIG. 1. It should be understood that a "sending site"
may also be a "receiving site" for communications in the reverse direction, and a "receiving site" may also be a "sending site" for other traffic.

504072-A-11-CA (Karol) 10 Suppose the enterprise site connects to multiple Service Providers (SPs) or has multiple wide area network (WAN) links (i.e., a multi-homed architecture) and the enterprise does not have any control of, or information about, the routes/performance in the SPs/WANs, other than perhaps some limited information from service level agreements (SLAs).

Also assume that there is a special (hardware/software) device 106 each at the sending and receiving sides that can monitor the quality of a VoIP stream as received by it, and that can exchange information between them. We refer to such special devices as PMR devices, since they perform three activities: (i) send keep-alive messages (much like a Pacemaker), (ii) Monitor/Measure QoS based on these messages, and (iii) Relay/Route VoIP packets between each other. The PMR
devices 106 could be alongside or in the media gateways, in the routers of the network, or alternatively, a signalling server may direct all traffic to and from remote PMR devices.

Now suppose the keep-alive packet (e.g., RTCP) is duplicated at the PMR
device 106 on the sending side and simultaneously transmitted over multiple SP/WAN paths (e.g., two paths in a dual-homed architecture, i.e., SP/WAN 1 108-and SP/WAN 2 108-2). The duplicates are tagged with an identifier indicating the SP/WAN path along which they have been sent. After traversing the SP/WAN
links, the duplicate keep-alive packets 110 reach, for example, an edge router/PMR
device at the remote end. Then, various delay, jitter, and loss comparisons are made from reception of the multiple copies. This information can be used to help identify "best" entry/exit points to/from the SPs/WANs and switch VoIP packets to the current "best" path.

A key point here is that, since we are now primarily interested in QoS
comparisons for controlling rapid switchover, we simply need to determine, for example, the differential delay and jitter between primary and alternate paths. We avoid synchronization and timing errors because we simultaneously transmit copies of keep-alive packets over multiple paths to make the differential delay measurements and comparisons.

504072-A-11-CA (Karol) 11 Specifically, the order in which the keep-alive copies arrive indicates the relative magnitude of the delays. The spacing between successive packets at the receiver gives an approximate measure of the jitter on each path, which can be used to determine jitter differences between the two paths. These measurements, averaged over, for example, several seconds, can be used to compare the current QoS characteristics of the various paths. The receiving device sends feedback messages (perhaps copies along multiple paths - for protection) to tell the sender which path to use. Then, for example, calls can be switched over to a (better) IP
route (or circuit-switched PSTN) if the jitter, delay, and loss cause the voice quality to drop below acceptable levels. The result is a system that can behave like a simple "smart router," automatically and continually making use of the best (lowest-delay) service provider.

Thus, unlike existing approaches, the inventive approach provides for control/measurement packets to be duplicated for QoS comparison to decide and rapidly switch the path taken by VoIP packets.

D. Improving QoS Comparisons We now elaborate on more detailed issues associated with making QoS
comparisons. For example, with jitter, while packet inter-spacing will give a reasonable idea of path jitter, in reality, there will be some slight variations in the injection times of the keep-alive and RTP packets. However, if this source jitter is less than the amount of network jitter that concerns and interests us, then the above jitter measurements might be sufficient. More important, the inventive techniques (as will be further described below) include other ways to deal with the jitter and delay measurements.

First, as mentioned previously, we are primarily interested in QoS
comparisons between multiple paths. The source jitter component is automatically eliminated in our differential delay measurements because the multiple copies of keep-alive packets are simultaneously transmitted. Second, suppose we do want to measure the absolute jitter on a path (e.g., to see if calls should be switched over to the circuit-switched PSTN). Then, we can cancel out many effects of source jitter.

504072-A-11-CA (Karol) 12 Specifically, the sender simply has to measure the amount of source jitter (as it injects its packets over a certain time period) and periodically inform the receiver.
The receiver then subtracts this component from its measured (total) jitter to yield an estimate of the network jitter.

Similarly, timing errors (e.g., due to drifting clocks) can also be filtered out using knowledge that the keep-alive packets were nominally injected at fixed intervals simultaneously over the multiple paths.

Finally, if desired, the inventive techniques can be supplemented with occasional measurements of the absolute one-way delays (as done, for example, during an initial network assessment). Starting with knowledge of this initial acceptable state, the inventive techniques can be used to measure the deviations.
This information can then be, for example, communicated to a signalling server. If certain delay/jitter/loss thresholds are exceeded and there is only one path between the sender and receiver, then the call could be switched to the PSTN, for example, and/or the set of terminals impacted can be notified that a problem exists.
Note that there is no need to make the precise performance measurements all the time; it is sufficient to simply monitor the deviations.

III. Architectural and Implementation Issues In this section, we extend the basic model in FIG. 1 to show how multi-site enterprises can be modelled and how they can use the inventive techniques.

Typical enterprise networks have multiple geographically distributed sites connected via leased WAN lines or tunnels. Each site can be thought of as a node of a graph G with the WAN links connecting two nodes being the edges of G. The graph G can be a multi-graph, having multiple edges between two nodes. In this graph, for example, as shown in graph/network 200 of FIG. 2, between nodes 202 there are multiple paths, comprised of one or more links 204, accounting for path redundancy, which is exploited to provide protection. The graph described above forms an overlay network for VoIP. In each node of this graph, in accordance with principles of the present invention, one or more PMR devices are functionally 504072-A-11-CA (Karol) 13 embedded. We refer to the resulting graph/network (with embedded PMRs) as an overlay VoIP PMR graph/network. Such a graph/network 300 is shown in FIG. 3, wherein PMR devices are denoted by reference numeral 302 and edges by reference numeral 304.

Problems in VoIP quality can happen within a node (due to problems within a site), but more commonly due to problems in the edges of G (i.e., due to WAN
link problems). The PMRs know the overlay VoIP PMR network and send keep-alive signals along multiple paths. Natural restrictions placed by VoIP (e.g., bounded delay, jitter, etc.) would dictate and limit possible paths that need to be considered for probing; such paths would usually be found, for example, in the assessment phase of VoIP deployment. The PMRs can use techniques from overlay networks and/or tunnelling/address rewriting techniques to divert packets along the "best"
VoIP path.

While there are interesting routing issues in overlay VoIP PMR graphs, we note that a focus here is not on overlay networks and the building of the overlay networks. The emphasis here lies in employing low-bandwidth techniques for assessing the health of a VoIP connection, using a method of selective duplication of "detection for control" packets to choose between paths, and using a limited version of overlay network techniques for executing on the decision.

IV. False Alarm Probabilities and Delay Reductions In this section, we provide some mathematical details to examine some aspects of the inventive system. First, we compute the probability that a failure will be wrongly declared (referred 'to as a false alarm). The analysis incorporates some aspects of a VoIP talkspurt-silence model to yield a tighter upper bound than in M. Karol, P. Krishnan, and J.J. Li, "VoIP Network Failure Detection and User Notification", Proc. 2003 Int. Conf. on Computer Communications and Networks, October 2003. The analytic results agree well with experimental measurements of the detection times and the false-alarm rates in a prototype implementation. Here, we show how the 504072-A-11-CA (Karol) 14 parameters in the talkspurt-silence model influence the false-alarm probabilities, and we discuss some tradeoffs between the false-alarm probability, the fault detection time (kT), and the rate (R = l/T) at which keep-alive packets are injected.
Finally, we evaluate the reduced delay that can be attained using duplicated keep-alive packets to control the rapid switchover to alternate lower-delay paths.

A false alarm occurs if an end-to-end connection is still operational and yet no RTP packets and no keep-alive packets are received (due to packet loss or jitter) during a time interval U. Since the RTP packets are typically sent (during talkspurts) at a much faster rate (e.g., once every 20 milliseconds) than the keep-alive packets (e.g., once every T = 500 milliseconds), it is safe to assume that false alarms will not occur during RTP talkspurts (for typical packet loss probabilities). If all the RTP packets are lost or delayed during, for example, a talkspurt interval of length two seconds (e.g., k = 4 and T = 500 milliseconds), then a failure has (almost) certainly occurred (otherwise the packet loss rate in the network is too high to provide acceptable VoIP QoS even under normal conditions). Consequently, we just focus on the loss of keep-alive packets in the calculation of a false-alarm probability.
We also will neglect the effects of jitter on the keep-alive packets since the spacing T between keep-alive packets is sufficiently larger than the network jitter (which needs to be small enough to provide acceptable VoIP QoS).

Let fõ denote the probability that during transmission of n keep-alive packets, k (or more) successive packets are dropped (which causes a false alarm if the k packets are transmitted during a single silent period in the RTP stream). Due to the relatively large spacing between successive keep-alive packets, we will assume that each packet is independently dropped with probability p. Then f, is given by the recursion:

Jn=fn-]+(1-fn-k-1)(1-p)Pk, n>k (1) with initial conditions fk = Pk and f, = 0 if n < k. Since fn-k-1 >_ 0 , we obtain:

fn < fn-1 + (1- P)Pk n> k. (2) 504072-A-11-CA (Karol) 15 Solving (2) for fõ yields:

fõ<pk[(n-k+1)-(n-k)p], n>k. (3) Thus, we have obtained an upper bound on fõ that can be used to compute an upper bound on the false-alarm probability during a call of duration L. Since we assume that at least one RTP packet will be successfully transmitted during each talkspurt, k successive keep-alive packet losses will not trigger a false alarm if the losses occur during different RTP silent periods. Consequently, to compute the overall false-alarm probability, we first compute the false-alarm probability independently for each RTP silent period of duration longer than kT (i.e., computing the probability that k or more successive keep-alive packets are dropped in a particular length silent period). Then, we obtain an overall false-alarm probability by averaging according to the lengths of the various silent periods throughout the call duration.

Before computing the overall false-alarm probability, we first note that the false-alarm probability depends heavily on the specific probabilistic distribution of the RTP talkspurt and silent periods. For instance, if all the RTP silent periods have duration less than kT, then no false alarms will occur (under the assumptions of this section); since fn = 0 whenever n is less than k, the upper bound correctly shows that the false-alarm probability equals zero (when all the silent durations n are less than k). Likewise, the lengths of the talkspurts also impact the overall false-alarm probability (in particular, by influencing the number of silent periods that occur within a call of duration L).

Let dõ denote the probability that a silent period has a duration between nT
and (n+l)T (i.e., such that n keep-alive packets are transmitted during the silent period). The probabilities dõ can be computed, for example, directly from a given on-off VoIP talkspurt-silence model. Then, the probability h that a false alarm occurs during a (random) silent period is given by:

h= E d.f1n (4) n> _k 504072-A-11-CA (Karol) 16 Finally, the overall false-alarm probability gn, in a call with m (statistically independent) silent periods is given by:

g. = l- (1- h)", (5) Since [ ( n - k + 1 ) - ( n - k ) p ] < n, from (3) we see that fn < npk .
Therefore, from (4), we obtain:

h<Pk *Indn<_pk*LYIT], (6) n>:k where Y is the expected length of an RTP silent period and LY/TJ is the largest integer less than or equal to YIT. Note that LY/TJ is the number of keep-alive packets transmitted during a silent period of length Y. Therefore, from (5) and (6) we get:

gm<1-(1-Pk*L)IT]}m. (7) The probability that there are m silent periods during a call duration L can be obtained from the specific VoIP talkspurt-silence model. Here, however, for illustration (and simplicity) we just compute the false-alarm probability g when the number of silent periods m equals its expected value Ll(Y+X), where X denotes the expected length of an RTP talkspurt. In (7), setting m = L/(Y+X) yields:

g< 1- (1- Pk *I ~Tj)LI(r+x) (8) Using (8), we can examine many tradeoffs between the false-alarm probability g, the fault detection time (kT), and the extra bandwidth needed for the keep-alive packets (which is proportional to the rate R = 1/7). The specific comparisons depend on the length of the call L, the packet loss rate p, and the expected lengths of the RTP talkspurts and silent periods. For illustration, setting Y
= X= 10 seconds (i.e., a symmetric call with similar talkspurt and silence durations), Tables 1 and 2 show some representative results for 10-minute calls, a 5%
packet loss rate (p = 0.05), and fault detection times (kT) of 1 second and 500 milliseconds, respectively. Note that the false-alarm probability g drops very rapidly with increasing k. In contrast, the extra "keep-alive bandwidth" increases linearly with k (if the detection time is held constant).

504072-A-11-CA (Karol) 17 "Extra Bandwidth" False-Alarm K T
Factor (1/T) Prob. g 3 333 ms 3 0.11 4 250 ms 4 0.0075 200 ms 5 4.7e-04 Table 1 - Upper Bound on the False-Alarm Probability for 10-minute calls with a 5% packet loss rate (p = 0.05) and a fault detection time (kT) of 1 second.

"Extra Bandwidth" False-Alarm k T
Factor (1/T) Prob. g 3 167 ms 6 0.20 4 125 ms 8 0.015 5 100 ms 10 9.4e-04 Table 2 - Upper Bound on the False-Alarm Probability for 10-minute calls with a 5% packet loss rate (p = 0.05) and a fault detection time (k7-) of 500 milliseconds.

Finally, we analyze some performance aspects associated with using duplicated keep-alive packets to compare the QoS of alternate paths, and thereby help control the rapid switchover of VoIP calls to best paths. The specific performance gains depend on the rate at which alternate better paths are discovered and the switchover speed. To see what types of performance gains might be possible, here we consider the limiting case of "instantaneous" detection and switchover (i.e., every packet is sent along the current best, lowest delay, path).
Such a system is approximated by duplicating the VoIP packets themselves, at the penalty of higher bandwidth, so that one copy of each packet always take the current best path.

Let Xi represent the delay a packet experiences traversing path i. Then, ideally each and every packet is routed along the current minimum delay path and 504072-A-11-CA (Karol) 18 the resultant packet delay X equals the minimum of the Xi. That is, in a dual-homed configuration, X = min {X1 , X2}. For various delay models (or real network delay measurements), we can determine (analytically or numerically) the distribution of X.
Although realistic network and traffic models are analytically quite complex, simple delay models provide valuable insights and illustrate some important performance features and tradeoffs.

For illustration, consider a dual-homed architecture in which the delay on each path is modelled as the waiting time in a simple M/M/l queue. Real networks (of queues) are more complex than a simple M/M/1 model; however, the conclusions are qualitatively the same. For path i, 1/A; is the mean interarrival time, 1/ , is the mean service time, and the total path load p, = A; / j. Then, Prob{X; 5 t}
=1-p,*e-";('-Pd'for(t>0) and Prob{X; =0}=1-p;.

Next, suppose q, denotes the packet loss probability on path i. Then, assuming the two delay distributions are statistically independent (perhaps because the two paths are in different Service Provider networks), we obtain:

Prob{X<_ t} = 1 - Prob{Xl > t}*Prob{X2 > t} = 1 - { (1 - ql)(1 - q2) P1 P2 * e -ELI (I -p1 I e -P2 ('-P2 )') - { (1 - ql ) q2 P1 * e -!sl (1 - P1 ) r } - {
gi(1-g2)P2*e 12(1-P2)'}-q,q2 fort>0 (9) and Prob{X=0}1-(1-ql)(1-g2)PIP2-(l-gl)q2PI-ql(1-q2) p2-gIg2. (10) 504072-A-ii-CA (Karol) 19 Total Load on Total Load on Path 2: P2 Path 1: pl 10% 20% 40% 60% 80% 90%
10% 0.6 1.2 2.5 4.6 10.4 22.0 20% 0.9 1.5 2.7 4.6 10.4 22.0 40% 1.2 1.9 3.1 5.0 10.6 22.0 60% 1.6 2.4 3.7 5.7 10.8 22.0 80% 2.0 2.9 4.6 7.1 12.7 22.8 90% 2.3 3.3 5.4 8.3 15.5 26.5 Without 2.6 3.8 6.2 10.3 22.0 45.0 Switchover Table 3 - 99% of the packets have a delay less than or equal to the value in table (normalized to average packet length); 10% packet loss on Path 1 and 0%
packet loss on Path 2.

Using (9) and (10), Table 3 shows some representative delay tradeoffs when Path 1 with a 10% packet loss rate (i.e., qi = 0.1) is combined with a loss-free Path 2 (i.e., q2 = 0). Table 3 lists the 99 percentile of the delay X (i.e., 99% of the packets experience a delay less than the value indicated in Table 3) for various loads (p1 and p2). For comparison, the last row of Table 3 lists the 99 percentile of the Path 2 delay (X2) without any switchover to Path 1. This comparison shows the delay reduction possible with rapid QoS detection and switchover to alternate paths.
For instance, if the total load on Path 2 is 40%, then the 99-percentile of the delay is 6.2 (packet lengths) without rapid switchover, whereas it can be reduced to values ranging (in Table 3) from 2.5 to 5.4 with rapid switchover. The amount of delay reduction is obviously dependent on the total load (and corresponding delay) of the alternate Path 1: the higher the load (delay) of Path 1, the smaller the amount of improvement possible with rapidly switching packets from Path 2 over to Path 1.
Even though Path 2 is better than Path 1 in terms of packet loss, it still is advantageous to switch some packets over to Path 1 (when its delay is lower).

504072-A-11-CA (Karol) 20 V. Illustrative Hardware Implementation Referring now to FIG. 4, a block diagram illustrates a generalized hardware architecture of a computer system suitable for implementing techniques described herein, according to an embodiment of the present invention. That is, computer system 400 may represent a server, a router, an edge device, and/or a gateway at a sender site (102 of FIG. 1) or a receiver site (104 of FIG. 1), a PMR device (106 in FIG. 1, 302 in FIG. 3) embedded in one or more of such site components or standalone at a remote location, or any system or device suitable for implementing principles of the invention. Of course, it is to be understood that the invention is not limited to any particular computing system implementation.

In this illustrative implementation, a processor 402 for implementing at least a portion of the methodologies of the invention is operatively coupled to a memory 404, input/output (I/O) devices 406 and a network interface 408 via a bus 410, or an alternative connection arrangement. It is to be appreciated that the term "processor"
as used herein is intended to include any processing device, such as, for example, one that includes a central processing unit (CPU) and/or other processing circuitry (e.g., digital signal processor (DSP), microprocessor, etc.). Additionally, it is to be understood that the term "processor" may refer to more than one processing device, and that various elements associated with a processing device may be shared by other processing devices.

The term "memory" as used herein is intended to include memory and other computer-readable media associated with a processor or CPU, such as, for example, random access memory (RAM), read only memory (ROM), fixed storage media (e.g., hard drive), removable storage media (e.g., diskette), flash memory, etc.

In addition, the phrase "I/O devices" as used herein is intended to include one or more input devices (e.g., keyboard, mouse, etc.) for inputting data to the processing unit, as well as one or more output devices (e.g., CRT display, etc.) for providing results associated with the processing unit.

Still further, the phrase "network interface" as used herein is intended to include, for example, one or more devices capable of allowing the computing system 504072-A-11-CA (Karol) 21 400 to communicate with other computing systems. Thus, the network interface may comprise a transceiver configured to communicate with a transceiver of another computer system via a suitable communications protocol. It is to be understood that the invention is not limited to any particular communications protocol.

It is to be appreciated that while the present invention has been described herein in the context of fault detection and recovery systems, the methodologies of the present invention may be capable of being distributed in the form of computer readable media, and that the present invention may be implemented, and its advantages realized, regardless of the particular type of signal-bearing media actually used for distribution. The term "computer readable media" as used herein is intended to include recordable-type media, such as, for example, a floppy disk, a hard disk drive, RAM, compact disk (CD) ROM, etc., and transmission-type media, such as digital or analog communication links, wired or wireless communication links using transmission forms, such as, for example, radio frequency and optical transmissions, etc. The computer readable media may take the form of coded formats that are decoded for use in a particular data processing system.

Accordingly, one or more computer programs, or software components thereof, including instructions or code for performing the methodologies of the invention, as described herein, may be stored in one or more of the associated storage media (e.g., ROM, fixed or removable storage) and, when ready to be utilized, loaded in whole or in part (e.g., into RAM) and executed by the processor 402.

In any case, it is to be appreciated that the techniques of the invention, described herein and shown in the appended figures, may be implemented in various forms of hardware, software, or combinations thereof, e.g., one or more operatively programmed general purpose digital computers with associated memory, implementation-specific integrated circuit(s), functional circuitry, etc.
Given the techniques of the invention provided herein, one of ordinary skill in the art will be able to contemplate other implementations of the techniques of the invention.

504072-A-11-CA (Karol) 22 VI. Illustrative Summary and Extensions Accordingly, as has been illustratively described herein, the present invention provides techniques for improving resiliency and QoS of VoIP
networks by using inherent redundancy in the network. We presented a new monitoring technique that uses short, low-bandwidth keep-alive packets injected into VoIP
streams to rapidly detect faults and network QoS conditions. By emphasizing the notion of monitoring and detection for control, we have presented a scheme that duplicates keep-alive packets strategically to compare primary and secondary network paths and presented methods that more easily compute the differential QoS
between two paths avoiding the complexities of timing and synchronization.
Errors are also eliminated. We have analytically studied both the goodness of our detection methods by computing false alarm probabilities, and the benefit of our control schemes, by studying the potential performance benefits of switching between paths.
Our proposed solution can be encapsulated into a device (we have called PMR) that can be co-located or built into media gateways, enterprise routers or edge devices.

It is to be appreciated that principles of the invention may be used to monitor (and compare) the performance of other traffic types. For instance, if nodes inject "high priority" and "low priority" (indicated in their headers) keep-alive packets, then the jitter of high-priority and low-priority services can be measured.

Although illustrative embodiments of the present invention have been described herein with reference to the accompanying drawings, it is to be understood that the invention is not limited to those precise embodiments, and that various other changes and modifications may be made by one skilled in the art without departing from the scope or spirit of the invention.

Claims (6)

1. A method comprising:
transmitting a first packet from a first node to a second node via a path in a telecommunications network, wherein:
i. a connection is established between the first node and the second node over the path in the telecommunications network, ii. the connection is characterized by the transmission of data traffic, wherein the data traffic is transmitted over the path in the telecommunications network iii. the first packet does not form part of the data traffic, and iv. the data traffic is characterized by at least one silent period being present in it;
when the first packet is transmitted during a silent period and lost, calculating, at a node in the telecommunications network, a probability measure, wherein:
i. the probability measure reflects the probability that the connection between the first node and the second node is still operational despite the loss of the first packet, and ii. the probability measure depends on:
A. the expected duration d of the silent period, B. the size n of a set of lost packets, wherein:
(1) the packets from the set are sent by the first node during the silent period and (2) the first packet is a member of the set, and C. an estimate of the probability that during the transmission of k consecutive packets by the first node, n packets will be lost; and when the probability measure is below a threshold, changing a path over which packets are routed in the telecommunications network.
2. The method of claim 1 wherein the changing operation comprises changing, the path via which packets that are part of the data traffic are routed from the first node to the second node.
3. The method of claim 1 wherein the method of claim 1 wherein the changing operation comprises changing the content of a routing table that is used by a node in the telecommunications network.
4. The method of claim 1 comprising:
transmitting an indication of the probability measure from the second node to the first node; and wherein the probability measure is calculated at the second node.
5. The method of claim 1 wherein the probability measure is calculated at the first node.
6. The method of claim 1 wherein the probability measure is calculated at the second node.
CA2508545A 2004-06-18 2005-05-27 Rapid fault detection and recovery for internet protocol telephony Expired - Fee Related CA2508545C (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US58132904P 2004-06-18 2004-06-18
US60/581,329 2004-06-18
US10/953,024 US7782787B2 (en) 2004-06-18 2004-09-29 Rapid fault detection and recovery for internet protocol telephony
US10/953,024 2004-09-29

Publications (2)

Publication Number Publication Date
CA2508545A1 CA2508545A1 (en) 2005-12-18
CA2508545C true CA2508545C (en) 2011-03-29

Family

ID=35071112

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2508545A Expired - Fee Related CA2508545C (en) 2004-06-18 2005-05-27 Rapid fault detection and recovery for internet protocol telephony

Country Status (5)

Country Link
US (1) US7782787B2 (en)
EP (1) EP1610496B1 (en)
JP (1) JP4625377B2 (en)
CA (1) CA2508545C (en)
DE (1) DE602005010940D1 (en)

Families Citing this family (67)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7664043B1 (en) 2004-07-01 2010-02-16 At&T Corp. Method and apparatus for performing reachability testing within the context of customer virtual private networks
US7768997B2 (en) * 2004-08-20 2010-08-03 At&T Intellectual Property I, L.P. Systems and methods for automatic public switched telephone network backup of voice over internet protocol services
US7466656B2 (en) * 2004-10-26 2008-12-16 International Business Machines Corporation Method, apparatus and program storage device for efficient construction of network overlays through interconnection topology embedding
US7440393B2 (en) * 2004-12-09 2008-10-21 Scalent Systems, Inc. Method and system for managing communication in a data network
US8462637B1 (en) * 2005-01-04 2013-06-11 Sheridan Ross P.C. Dial plan routing for fragmented networks
US7978682B2 (en) * 2005-05-09 2011-07-12 At&T Intellectual Property I, Lp Methods, systems, and computer-readable media for optimizing the communication of data packets in a data network
US7590756B2 (en) * 2005-05-13 2009-09-15 Itt Manufacturing Enterprises, Inc. Method and system for transferring data in a communications network using redundant communication paths
US20060268848A1 (en) * 2005-05-25 2006-11-30 Telefonaktiebolaget Lm Ericsson (Publ) Connection type handover of voice over internet protocol call based low-quality detection
US8107385B2 (en) 2005-09-29 2012-01-31 Avaya Inc. Evaluating quality of service in an IP network with cooperating relays
CN100403734C (en) * 2005-11-02 2008-07-16 华为技术有限公司 Business flor protection method
US7596092B2 (en) * 2006-02-02 2009-09-29 Cisco Technology, Inc. VoIP verifier
US8072879B2 (en) * 2006-02-03 2011-12-06 Cisco Technology, Inc. Technique for determining whether to reestablish fast rerouted primary tunnels based on backup tunnel path quality feedback
US8693308B2 (en) * 2006-02-10 2014-04-08 Aviat U.S., Inc. System and method for resilient wireless packet communications
JP4545109B2 (en) * 2006-03-28 2010-09-15 京セラ株式会社 Communication path control device
JP4356705B2 (en) * 2006-03-31 2009-11-04 日本電気株式会社 Computer system and earthquake response system
US7813736B2 (en) * 2006-06-28 2010-10-12 At&T Intellectual Property I, L.P. Method and apparatus for improving network performance in a communication system
US8630190B2 (en) 2006-08-22 2014-01-14 Cisco Technology, Inc. Method and system to identify a network device associated with poor QoS
US8055759B2 (en) * 2006-09-18 2011-11-08 Tropos Networks, Inc. Determination of link qualities between an access point and a plurality of clients
US7697460B2 (en) * 2006-09-28 2010-04-13 Avaya Inc. Evaluating feasible transmission paths in a packet network
US8391154B2 (en) 2006-09-28 2013-03-05 Avaya Inc. Probationary admission control in relay networks
JP4675305B2 (en) * 2006-09-29 2011-04-20 富士通株式会社 Network optimal route selection method and apparatus
US9374263B2 (en) * 2006-09-29 2016-06-21 Avaya Ecs Ltd. Latency differential mitigation for real time data streams
US7787450B1 (en) * 2006-10-11 2010-08-31 Itt Manufacturing Enterprises, Inc Method and system for efficient network formation and maintenance of node routing databases in a mobile ad-hoc network
US8576833B2 (en) * 2006-12-15 2013-11-05 At&T Intellectual Property I, L.P. Fault tolerant voice over Internet protocol (VoIP) systems and methods to operate the same
KR101290275B1 (en) * 2007-01-16 2013-08-07 삼성전자주식회사 Apparatus and method for transporting and receiving graphic data
JP2008211682A (en) * 2007-02-27 2008-09-11 Fujitsu Ltd Reception program, transmission program, transmission/reception system, and transmission/reception method
CN100512154C (en) * 2007-03-29 2009-07-08 华为技术有限公司 A method and device for improving the multi-layer network service recovery performance
US7756029B2 (en) 2007-05-24 2010-07-13 Harris Stratex Networks Operating Corporation Dynamic load balancing for layer-2 link aggregation
US9455896B2 (en) * 2007-07-23 2016-09-27 Verint Americas Inc. Dedicated network interface
US8264953B2 (en) * 2007-09-06 2012-09-11 Harris Stratex Networks, Inc. Resilient data communications with physical layer link aggregation, extended failure detection and load balancing
US8233402B2 (en) * 2007-09-20 2012-07-31 At&T Intellectual Property Ii, L.P. Multicast-based inference of temporal loss characteristics in packet data networks
US20090086642A1 (en) * 2007-09-28 2009-04-02 Cisco Technology, Inc. High availability path audit
US8099637B2 (en) * 2007-10-30 2012-01-17 Hewlett-Packard Development Company, L.P. Software fault detection using progress tracker
US7768947B2 (en) * 2007-12-31 2010-08-03 International Business Machines Corporation Maintaining communication continuity
US7886014B2 (en) * 2007-12-31 2011-02-08 International Business Machines Corporation Maintaining communication continuity
US7821923B2 (en) 2008-02-06 2010-10-26 Cellco Partnership Optimized SIP routing architecture using an integrated network and systems approach
US20090296703A1 (en) * 2008-05-30 2009-12-03 Ruby Tech Corp. Method and system for dynamic roaming across wireless networks
US8125907B2 (en) * 2008-06-12 2012-02-28 Talari Networks Incorporated Flow-based adaptive private network with multiple WAN-paths
US8130752B2 (en) * 2008-06-13 2012-03-06 Telco Acquisition I, Inc. Real-time network measurement
US7903579B2 (en) * 2008-08-26 2011-03-08 International Business Machines Corporation Self-optimization and self-healing of voice quality problems utilizing service oriented architecture
US20100124211A1 (en) * 2008-11-17 2010-05-20 Qualcomm Incorporated Reducing an occurrence of a voip call on hold from being dropped in ev-do systems
JP4937235B2 (en) * 2008-11-21 2012-05-23 株式会社東芝 Remote monitoring system and fault isolation method
US10320635B2 (en) 2009-06-11 2019-06-11 Talari Networks Incorported Methods and apparatus for providing adaptive private network centralized management system timestamp correlation processes
EP2302845B1 (en) 2009-09-23 2012-06-20 Google, Inc. Method and device for determining a jitter buffer level
JP5352502B2 (en) * 2010-03-05 2013-11-27 株式会社日立製作所 Packet communication system and packet communication apparatus control method
US8339970B2 (en) * 2010-04-02 2012-12-25 Clearwire IP Holdings System and method for network optimization
CA2796431C (en) * 2010-04-15 2018-04-10 Vonage Network, Llc Systems and methods of improving the quality of voip communications
US8630412B2 (en) 2010-08-25 2014-01-14 Motorola Mobility Llc Transport of partially encrypted media
US8477050B1 (en) 2010-09-16 2013-07-02 Google Inc. Apparatus and method for encoding using signal fragments for redundant transmission of data
FR2966674A1 (en) * 2010-10-22 2012-04-27 France Telecom Method for transmission of data flow between e.g. radio emitter/receiver and radio access controller, involves detecting absence of transmission of information relative to operating state of managing equipment, and transmitting data stream
US8751565B1 (en) 2011-02-08 2014-06-10 Google Inc. Components for web-based configurable pipeline media processing
EP2611075B1 (en) * 2011-04-21 2018-01-24 Huawei Technologies Co., Ltd. Fault detection method and system
GB2494385B (en) 2011-08-31 2018-06-06 Metaswitch Networks Ltd Transmitting and forwarding data
US9806835B2 (en) * 2012-02-09 2017-10-31 Marvell International Ltd. Clock synchronization using multiple network paths
US8854954B2 (en) * 2012-04-24 2014-10-07 International Businesss Machines Corporation Quality of service prediction and call failover
US20150046558A1 (en) * 2013-03-15 2015-02-12 Google Inc. System and method for choosing lowest latency path
US9769058B2 (en) 2013-05-17 2017-09-19 Ciena Corporation Resilient dual-homed data network hand-off
US9203936B2 (en) * 2013-10-07 2015-12-01 At&T Intellectual Property I, Lp Method and apparatus for initiating communication sessions
KR102109610B1 (en) * 2013-10-29 2020-05-12 에스케이플래닛 주식회사 Terminal Equipment and Call service system based Internet Protocol
JP6299768B2 (en) * 2013-11-21 2018-03-28 富士通株式会社 Information processing system, information processing apparatus, and data communication method
GB2532072B (en) * 2014-11-07 2017-04-19 Canon Kk Feedback management in a multipath communication network
US10439908B2 (en) 2014-12-23 2019-10-08 Talari Networks Incorporated Methods and apparatus for providing adaptive private network centralized management system time correlated playback of network traffic
JP6443173B2 (en) 2015-03-27 2018-12-26 富士通株式会社 Video data processing apparatus, video data processing system, video data processing method, and video data processing program
US10200435B2 (en) * 2015-09-22 2019-02-05 Pathsolutions, Inc. Network communications service quality monitor
US10812601B2 (en) * 2017-03-07 2020-10-20 Flash Networks Ltd. Method and system for signaling and radio connection optimization over a cellular network
US11736406B2 (en) * 2017-11-30 2023-08-22 Comcast Cable Communications, Llc Assured related packet transmission, delivery and processing
JP7121845B1 (en) 2021-09-29 2022-08-18 Kddi株式会社 Terminal device and display method

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2723097B2 (en) * 1995-12-04 1998-03-09 日本電気株式会社 QOS routing device
ATE341903T1 (en) * 1997-03-12 2006-10-15 Alcatel Network Syst METHOD AND SYSTEM FOR DISTRIBUTED RECOVERY OF A TELECOMMUNICATION NETWORK
US20030133417A1 (en) * 1997-03-12 2003-07-17 Sig H. Badt Method and message therefor of monitoring the spare capacity of a dra network
US20020004843A1 (en) * 2000-07-05 2002-01-10 Loa Andersson System, device, and method for bypassing network changes in a routed communication network
JP2002044125A (en) 2000-07-19 2002-02-08 Nippon Telegr & Teleph Corp <Ntt> Packet network
JP2002176441A (en) 2000-12-08 2002-06-21 Fujitsu Ltd Communication unit
US6853641B2 (en) 2000-12-20 2005-02-08 Nortel Networks Limited Method of protecting traffic in a mesh network
US20020093948A1 (en) * 2001-01-16 2002-07-18 Motorola, Inc. Packet-based multimedia communications system having one or more wireless links
IL141855A0 (en) * 2001-03-07 2002-03-10 Onetiercommunications Inc A method and apparatus for providing an improved quality of service for data transfer over the internet
US6895441B1 (en) * 2001-07-30 2005-05-17 Atrica Ireland Ltd. Path rerouting mechanism utilizing multiple link bandwidth allocations
US20030061340A1 (en) 2001-09-25 2003-03-27 Mingqiu Sun Network health monitoring through real-time analysis of heartbeat patterns from distributed agents
JP2004007361A (en) 2001-10-11 2004-01-08 Nippon Telegr & Teleph Corp <Ntt> Method for controlling data transmission, program therefor, and data transmission apparatus employing the same
JP3853233B2 (en) 2002-02-28 2006-12-06 株式会社日立コミュニケーションテクノロジー Line state detection method and IP communication apparatus in IP network
US7032131B2 (en) * 2002-03-26 2006-04-18 Hewlett-Packard Development Company, L.P. System and method for ensuring merge completion in a storage area network
JP2004159146A (en) 2002-11-07 2004-06-03 Nippon Telegr & Teleph Corp <Ntt> Communication network and packet transfer device
TWI254527B (en) * 2003-02-19 2006-05-01 Nec Corp Network system, spanning tree configuration method and spanning tree configuration node
US7043250B1 (en) * 2003-04-16 2006-05-09 Verizon Corporate Services Group Inc. Systems and methods for forming and operating a communications network
KR100645428B1 (en) * 2003-05-05 2006-11-15 삼성전자주식회사 Apparatus and method for establishment of routing path in wpan

Also Published As

Publication number Publication date
EP1610496B1 (en) 2008-11-12
EP1610496A1 (en) 2005-12-28
JP4625377B2 (en) 2011-02-02
US7782787B2 (en) 2010-08-24
CA2508545A1 (en) 2005-12-18
JP2006005942A (en) 2006-01-05
DE602005010940D1 (en) 2008-12-24
US20050281204A1 (en) 2005-12-22

Similar Documents

Publication Publication Date Title
CA2508545C (en) Rapid fault detection and recovery for internet protocol telephony
Boutremans et al. Impact of link failures on VoIP performance
US7463652B2 (en) System and method for notification of internet users about faults detected on an IP network
US7606149B2 (en) Method and system for alert throttling in media quality monitoring
US20070286351A1 (en) Method and System for Adaptive Media Quality Monitoring
US8254557B2 (en) Supervisor intercept for teleagent voice over internet protocol communications
US8929382B2 (en) Method, device, and computer program product for detecting and encoding states for accurate measurement
US8165109B2 (en) Method for managing the quality of encrypted voice over IP to teleagents
US8593975B2 (en) Non-intrusive monitoring of quality levels for voice communications over a packet-based network
US7599308B2 (en) Methods and apparatus for identifying chronic performance problems on data networks
US8107385B2 (en) Evaluating quality of service in an IP network with cooperating relays
Ciavattone et al. Standardized active measurements on a tier 1 IP backbone
US8248953B2 (en) Detecting and isolating domain specific faults
ES2364475T3 (en) PROCEDURE FOR THE ANALYSIS OF THE DISTURBANCES OF A FLOW OF DATA IN REAL TIME IN A DATA NETWORK, COMMUNICATION SYSTEM AND CONTROL COMPUTER.
JP2008536346A (en) Method and apparatus for assessing quality of service of real-time applications operating across packet-based networks
Marsh et al. Wide area measurements of voice over IP quality
US9306822B2 (en) Method and system for silent trunk failure detection
EP1687935B1 (en) Methods and system for measuring the round trip time in packet switching telecommunication networks
Karol et al. Rapid fault detection and recovery for IP telephony
Rajendran et al. Performance optimization of VoIP using an overlay network
US8363555B2 (en) Monitoring internet protocol (IP) telephony signaling links
Karol et al. VoIP network failure detection and user notification
Roychoudhuri et al. Adaptive rate control for real-time packet audio based on loss prediction
Roychoudhuri et al. Autonomic qos optimization of real-time internet audio using loss prediction and stochastic control
He Analysing the characteristics of VoIP traffic

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20150527