<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CSSE</journal-id>
<journal-id journal-id-type="nlm-ta">CSSE</journal-id>
<journal-id journal-id-type="publisher-id">CSSE</journal-id>
<journal-title-group>
<journal-title>Computer Systems Science &#x0026; Engineering</journal-title>
</journal-title-group>
<issn pub-type="ppub">0267-6192</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">24338</article-id>
<article-id pub-id-type="doi">10.32604/csse.2023.024338</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Enhancing Bandwidth Utilization of IP Telephony Over IPv6 Networks</article-title><alt-title alt-title-type="left-running-head">Enhancing Bandwidth Utilization of IP Telephony Over IPv6 Networks</alt-title><alt-title alt-title-type="right-running-head">Enhancing Bandwidth Utilization of IP Telephony Over IPv6 Networks</alt-title>
</title-group>
<contrib-group content-type="authors">
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Al-Mimi</surname><given-names>Hani</given-names></name>
<xref ref-type="aff" rid="aff-1">1</xref><email>hani.mimi@zuj.edu.jo</email>
</contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Alrabanah</surname><given-names>Yousef</given-names></name>
<xref ref-type="aff" rid="aff-2">2</xref>
</contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Abualhaj</surname><given-names>Mosleh M.</given-names></name>
<xref ref-type="aff" rid="aff-3">3</xref>
</contrib>
<contrib id="author-4" contrib-type="author">
<name name-style="western"><surname>Al-khatib</surname><given-names>Sumaya N.</given-names></name>
<xref ref-type="aff" rid="aff-3">3</xref>
</contrib>
<aff id="aff-1"><label>1</label><institution>Al-Zaytooanh University of Jordan, Faculty of Science and Information Technology, Department of Cybersecurity</institution>, <addr-line>Amman, 11733</addr-line>, <country>Jordan</country></aff>
<aff id="aff-2"><label>2</label><institution>Al-Ahliyya Amman University, Faculty of Information Technology, Department of Software Engineering</institution>, <addr-line>Amman, 19328</addr-line>, <country>Jordan</country></aff>
<aff id="aff-3"><label>3</label><institution>Al-Ahliyya Amman University, Faculty of Information Technology, Department of Networks and Information Security</institution>, <addr-line>Amman, 19328</addr-line>, <country>Jordan</country></aff>
</contrib-group><author-notes><corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Hani Al-Mimi. Email: <email>hani.mimi@zuj.edu.jo</email></corresp></author-notes>
<pub-date pub-type="epub" date-type="pub" iso-8601-date="2022-06-07"><day>07</day>
<month>06</month>
<year>2022</year></pub-date>
<volume>44</volume>
<issue>2</issue>
<fpage>1039</fpage>
<lpage>1049</lpage>
<history>
<date date-type="received"><day>13</day><month>10</month><year>2021</year></date>
<date date-type="accepted"><day>13</day><month>1</month><year>2022</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2023 Al-Mimi et al.</copyright-statement>
<copyright-year>2023</copyright-year>
<copyright-holder>Al-Mimi et al.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CSSE_24338.pdf"></self-uri>
<abstract>
<p>The demand for the telecommunication services, such as IP telephony, has increased dramatically during the COVID-19 pandemic lockdown. IP telephony should be enhanced to provide the expected quality. One of the issues that should be investigated in IP telephony is bandwidth utilization. IP telephony produces very small speech samples attached to a large packet header. The header of the IP telephony consumes a considerable share of the bandwidth allotted to the IP telephony. This wastes the network&#x0027;s bandwidth and influences the IP telephony quality. This paper proposes a mechanism (called Smallerize) that reduces the bandwidth consumed by both the speech sample and the header. This is achieved by assembling numerous IP telephony packets in one header and use the header&#x0027;s fields to carry the speech sample. Several metrics have been used to measure the achievement Smallerize mechanism. The number of calls has been increased by 245.1&#x0025; compared to the typical mechanism. The bandwidth saving has also reached 68&#x0025; with the G.28 codec. Therefore, Smallerize is a possible mechanism to enhance bandwidth utilization of the IP telephony.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>&#x2013;IP telephony</kwd>
<kwd>codec</kwd>
<kwd>bandwidth utilization</kwd>
<kwd>IPv6</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>IPv6 protocol is the future of IP-based networks, including the Internet. The main feature of IPv6 over IPv4 is the ample IP address space, whereas it provides 128-bit (16-byte) address space compared to 32-bit (4-byte) in IPv4. This large 16-byte IP address is the reason for the significant 40-byte IPv6 protocol compared 20-byte IPv4 protocol [<xref ref-type="bibr" rid="ref-1">1</xref>]. Meanwhile, many small-packet flows run over the networks, including online games and IP telephony (i.e., VoIP). The payload size of the small packets is mostly within 100-byte [<xref ref-type="bibr" rid="ref-2">2</xref>]. Therefore, attaching the IPv6 header to these small payloads is a severe problem that wastes the network&#x0027;s bandwidth.</p>
<p>The packet payload of IP telephony is composed of speech samples produced by a codec. The codec converts the analog waveform to digital speech samples in short periods to avoid unacceptable delay. The digital speech samples are typically between 10-byte to 30-byte, as shown in <xref ref-type="table" rid="table-1">Tab. 1</xref> [<xref ref-type="bibr" rid="ref-3">3</xref>,<xref ref-type="bibr" rid="ref-4">4</xref>]. In certain cases, the VoIP packet payload consists of more than one voice frame. The speech sample is first encapsulated in the 12-byte of Real-time Transport Protocol (RTP) protocol at the application layer. The resulted application layer protocol data unit (PDU) is then encapsulated by 8-byte UDP and 20/40-byte IPv4/IPv6 protocols in order. In IPv6, these three protocols are imposed a 60-byte header to each of the IP telephony packets [<xref ref-type="bibr" rid="ref-5">5</xref>,<xref ref-type="bibr" rid="ref-6">6</xref>]. Therefore, the ratio of the consumed bandwidth by the header is between 66.7&#x0025; and 85.71&#x0025;, based on the length of the digital speech sample. The bandwidth consumed by the large header can be lightened by assembling several PDUs of the transport layer (Speech sample &#x002B; RTP &#x002B; UDP) in one IPv6 header, known as packet multiplexing [<xref ref-type="bibr" rid="ref-5">5</xref>,<xref ref-type="bibr" rid="ref-7">7</xref>]. The resulted packet is called multiplexed packet (P-Mux). The ratio of the rescued bandwidth from the large IPv6 header is based on the number of assembled transport layer PDUs in the IPv6 header.</p>
<table-wrap id="table-1"><label>Table 1</label>
<caption>
<title>Common speech codecs</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">Codec</th>
<th align="left">G.729</th>
<th align="left">G.728</th>
<th align="left">G.723.1</th>
<th align="left">G.726</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">Sample length (byte)</td>
<td align="left">10</td>
<td align="left">10</td>
<td align="left">24</td>
<td align="left">20</td>
</tr>
<tr>
<td align="left">Mean opinion score</td>
<td align="left">4.1</td>
<td align="left">3.61</td>
<td align="left">3.9</td>
<td align="left">3.85</td>
</tr>
<tr>
<td align="left">Bitrate (Kbps)</td>
<td align="left"><bold>8</bold></td>
<td align="left"><bold>16</bold></td>
<td align="left"><bold>5.3</bold></td>
<td align="left"><bold>24</bold></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Many of the IP telephony calls are point-to-point (P2P), between only two ends. For such calls, much of the information in the RTP and UDP headers are not needed. The information in the RTP header is used to transfer all the real-time multimedia data such as video teleconferencing over the Internet and Internet audio/video streaming. On the other hand, the information in the UDP protocol is used to transfer all types of unreliable data over IP networks [<xref ref-type="bibr" rid="ref-8">8</xref>&#x2013;<xref ref-type="bibr" rid="ref-12">12</xref>]. Therefore, this paper uses the fields in the RTP and UDP headers that are unneeded for P2P calls to carry the speech samples of the IP telephony packets besides packet multiplexing. Thus, more of the consumed bandwidth by the header can be rescued, particularly with P2P calls.</p>
<p>The organization of this paper is as follows: Section 2 presents a brief review of the current work of packet multiplexing mechanism. Section 3 gives a profound explanation of the proposed mechanism. Section 4 presents the performance analysis of the proposed mechanism. Section 5 is the conclusion.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Related Works</title>
<p>Several packet multiplexing mechanisms have been created to reduce the severity of the large header for small packets flows. One of the first IP telephony multiplexing mechanisms was created by Hoshi et al. [<xref ref-type="bibr" rid="ref-13">13</xref>]. Hoshi proposed to assemble several PDUs of the application layer (Speech sample &#x002B; RTP) in one UDP/IP header. The packets are assembled in one P-Mux at the sender IP telephony gateways (IP-GW) and dissembled at the receiver IP-GW. Hoshi&#x0027;s mechanism relies on the Synchronization Source (SSRC) identifier field in the RTP header to identify the speech stream. The proposed mechanism is implemented and evaluated against the typical mechanism (no multiplexing) using G.723.l. The result showed that the bandwidth is enhanced by 40&#x0025; and the number of the packets is reduced to by 87.5&#x0025; in the tested cases.</p>
<p>Sze et al. proposed another multiplexing mechanism to promote bandwidth utilization of IP telephony networks [<xref ref-type="bibr" rid="ref-14">14</xref>]. Similar to Hoshi&#x0027;s mechanism, the multiplexing occurs at the transport layer of the OSI stack, in which multiple application layer PDUs are piggybacked into one UDP/IP header. Besides the multiplexing, the proposed mechanism adopted a simplified header compression mechanism [<xref ref-type="bibr" rid="ref-15">15</xref>]. The basic idea of this simplified version of header compression is to remove the UDP/IP header fields that are unnecessary to transport the IP telephony packet to the intended destination. The proposed mechanism is designed to be compatible with H.323 signaling environment. In addition, the P-Mux packet size is limited by the size of the network maximum transmission unit (MTU), or a period equals a speech sample construction duration. Combining multiplexing and a simplified version of the header compression promoted the bandwidth utilization of IP telephony networks by 300&#x0025;.</p>
<p>More recently, one of the top multiplexing mechanisms was created and patented by Roay and sponsored by Cisco establishment [<xref ref-type="bibr" rid="ref-16">16</xref>]. Several transport layer PDUs (RTP, UDP header, and speech sample) are assembled in P-Mux. The first PDU within the P-Mux packet contains information to tag the P-Mux packet. This tag is utilized by the receiver IP-GW to distinguish the P-Mux packet from the normal packet. The capability of the receiving IP-GW to handle the P-Mux packet is exchanged during the P2P call formation using SIP/H.323 protocols. If not, the transmitted packet ought to be a normal packet (Not P-Mux packets). To keep away from any extra latency, the proposed mechanism assembles the packets available in the buffer and does not wait for any packets to come. In addition, the P-Mux is transmitted as soon as the size reaches the MTU. Clearly, Roy&#x0027;s mechanism rescues the bandwidth by removing a 20-byte IPv4 header from each PDU within the P-Mux or 40-byte in the case of IPv6.</p>
<p>The mechanisms above are using the concept of packet multiplexing to save the bandwidth. Besides packet multiplexing, this paper uses the packet header&#x0027;s fields that are unnecessary for P2P calls to carry the speech sample. This smallerizes the packet payload and reduces the consumed bandwidth by IP telephony systems. The proposed mechanism, called Smallerize, is designed for P2P IP telephony calls over IPv6 networks.</p>
</sec>
<sec id="s3">
<label>3</label>
<title>Smallerize Mechanism</title>
<p>The Smallerize mechanism is created to lighten the bandwidth needed by IPv6 telephony, based on two main algorithms. First, the Smallerize mechanism multiplexes the packets to the same IP-GW in one P-Mux. The P-Mux packet contains several application layer PDUs in one UDP/IPv6 header. Henceforth, the term PDU refers to the application layer PDU, which contains the RTP header and a speech sample. The packet multiplexing process is performed at the sender IP-GW (IP-GWs). The P-Mux packet is dissembled at the receiver IP-GW (IP-GWr) to build the standard IP telephony packet (S-Pkt). <xref ref-type="fig" rid="fig-1">Fig. 1</xref> clarifies the packet multiplexing concept along with the P-Mux packet and S-Pkt packet. Second, part of the voice sample of the packet will be carried in the RTP header of each PDU within the P-Mux, as discussed below.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Packets multiplexing elements</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_24338-fig-1.png"/>
</fig>
<sec id="s3_1">
<label>3.1</label>
<title>RTP Header of the PDU</title>
<p>The Smallerize mechanism assembles several PDUs in one P-Mux packet. As stated, these PDUs consist of RTP header and speech sample. Some of the fields in the RTP header are unnecessary to transfer the speech data of the P2P calls. The 4-byte SSRC field is usually utilized to fix the conflict if the sequence number is the same for two sources, identify the call source in multicast IP telephony sessions, or use a translator or mixer with IP telephony. However, none of these cases are in the P2P calls of the IP telephony [<xref ref-type="bibr" rid="ref-10">10</xref>,<xref ref-type="bibr" rid="ref-12">12</xref>]. Therefore, the Smallerize mechanism can utilize the SSRC field to carry part of the speech sample data.</p>
<p>The 4-byte Timestamp field of the first packet produced is chosen randomly. Then, it is increased by the same value for each of the following packets. The 2-byte Sequence Number field is also chosen randomly and increased by the same value for each of the following packets. Therefore, the Timestamp can be derived from the Sequence Number based on the harmonic increment between them [<xref ref-type="bibr" rid="ref-10">10</xref>,<xref ref-type="bibr" rid="ref-12">12</xref>]. For illustration, assume the Timestamp of the first packet is 100 and the increment value is 50. Then, the Timestamp of the first five packets is 100, 150, 200, 250, and 300, respectively. In addition, assume the Sequence Number of the first packet is 50 and the increment value is 10. Then, the Sequence Number of the first five packets is 50, 60, 70, 80, and 90, respectively. Clearly, the Timestamp can be derived from the Sequence Number using basic math. The delta (D) between the Sequence Number and Timestamp is calculated for each call. The D value is stored in the Socket Table (<xref ref-type="table" rid="table-2">Tab. 2</xref>), which is discussed in Subsection 3.4. The IP-GWr uses the D value to calculate the original value of the Timestamp by adding the D value to the Sequence Number in the PDU header. Therefore, the Smallerize mechanism can utilize the Timestamp field to carry part of the speech sample data. Accordingly, carrying an 8-byte speech sample in the SSRC and Timestamp shortens each of the PDU in the P-Mux and, thus, save the bandwidth.</p>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Smallerize Mechanism&#x2013;Sender Side</title>
<p>The Smallerize mechanism implements several steps to shorten the speech sample and assemble the S-Pkt packets in one P-Mux. First, the PDU is extracted from the S-Pkt. Then, 8-byte of the speech sample of every PDU is placed in the SSRC and the Timestamp fields of the PDU header (RTP). This produces PDU with a smaller speech sample. After that, the produced PDUs destined to the same IP-GW are assembled in one UDP/IPv6 header. <xref ref-type="fig" rid="fig-2">Fig. 2</xref> shows the format of the P-Mux packet. The destination socket of each call is kept in a specific table (called Socket table) on IP-GWs and IP-GWr. The purpose of the Socket table (<xref ref-type="table" rid="table-2">Tab. 2</xref>) is discussed in Subsection 3.4. <xref ref-type="fig" rid="fig-3">Fig. 3</xref> demonstrates the flowchart of the Smallerize mechanism at the sender side.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>P-Mux packet format</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_24338-fig-2.png"/>
</fig>
<table-wrap id="table-2"><label>Table 2</label>
<caption>
<title>Socket Table</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left" colspan="3">IP-GWs</th>
<th align="center" colspan="4">IP-GWr</th>
</tr>
<tr>
<th align="left">New PT value</th>
<th align="left">Destination socket</th>
<th align="left">Actual PT value</th>
<th align="left">New PT value</th>
<th align="left">Destination socket</th>
<th align="left">Actual PT value</th>
<th align="left">D value</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">1</td>
<td align="left">2001:4321::2b22:5050</td>
<td align="left">7</td>
<td align="left">1</td>
<td align="left">2001:4321::2b22:5050</td>
<td align="left">7</td>
<td align="left">5045273232</td>
</tr>
<tr>
<td align="left">2</td>
<td align="left">2001:4321::2b27:5050</td>
<td align="left">15</td>
<td align="left">2</td>
<td align="left">2001:4321::2b27: 5050</td>
<td align="left">15</td>
<td align="left">6055327216</td>
</tr>
<tr>
<td align="left">5</td>
<td align="left">2001:4321::2b29:5051</td>
<td align="left">15</td>
<td align="left">5</td>
<td align="left">2001:4321::2b29: 5051</td>
<td align="left">15</td>
<td align="left">5145253455</td>
</tr>
<tr>
<td align="left">7</td>
<td align="left">2001:4321::2b26:5050</td>
<td align="left">7</td>
<td align="left">7</td>
<td align="left">2001:4321::2b26: 5050</td>
<td align="left">7</td>
<td align="left">6145223451</td>
</tr>
<tr>
<td align="left">13</td>
<td align="left">2001:4321::2b25: 5051</td>
<td align="left">15</td>
<td align="left">13</td>
<td align="left">2001:4321::2b25: 5051</td>
<td align="left">15</td>
<td align="left">6145243459</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>The smallerize mechanism-sender side</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_24338-fig-3.png"/>
</fig>
</sec>
<sec id="s3_3">
<label>3.3</label>
<title>Smallerize Mechanism-Receiver Side</title>
<p>The Smallerize mechanism implements several steps to disassemble the P-Mux and retrieve the S-Pkt. First, take off the UDP/IPv6 header from the P-Mux packet. Then, disassemble the PDUs within the P-Mux payload. Next, pull the speech sample inside the SSRC and the Timestamp fields and place it at the end of the speech sample of the PDU. This produces the PDU with the original full-length speech sample. Both SSRC and the Source Port fields are disabled to avoid misinterpreting them by the callee client. Following, derive the value of the Timestamp as explained in Subsections 3.1 and 3.4. Finally, add the UDP/IPv6 header to the PDU to build the standard S-Pkt packet. The destination socket of each S-Pkt packet is retrieved from the Socket table (<xref ref-type="table" rid="table-2">Tab. 2</xref>), as explained in Subsection 3.4. The resulted original S-Pkt packet is sent to the final destination. <xref ref-type="fig" rid="fig-4">Fig. 4</xref> demonstrates the Smallerize mechanism at the receiver side.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>The smallerize mechanism-receiver side</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_24338-fig-4.png"/>
</fig>
</sec>
<sec id="s3_4">
<label>3.4</label>
<title>Socket Table</title>
<p>The Smallerize mechanism adds the UDP/IPv6 header to the PDU, including the destination socket address, to build the S-Pkt packet. The socket information is stored in the Socket table at the IP-GWs and IP-GWr. A value is needed to identify the destination socket address of the packets belonging to the same call. The Smallerize mechanism utilizes the Payload Type (PT) field in the RTP header for this purpose. The 7-bit PT field contains the type of the used codec [<xref ref-type="bibr" rid="ref-10">10</xref>]. However, the codec type is exchanged by the signaling protocol at the call establishment phase. Therefore, the value of the PT can be saved in the Socket table, and no need to send it in the RTP header of each PDU. Therefore, the Smallerize mechanism uses PT to distinguish the destination socket of the packets inside the Socket table. Besides, as stated, the D value is stored in the Socket table to retrieve the Timestamp value. The D value is calculated from the first packet of each call and sent to the IP-GWr. <xref ref-type="table" rid="table-2">Tab. 2</xref> exhibits the Socket table at IP-GWs and IP-GWr gateways.</p>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Smallerize Mechanism Analysis</title>
<p>The Smallerize mechanism was analyzed and compared to the traditional IPv6 mechanism (without multiplexing or payload shortening) and Roay mechanism. These mechanisms were compared based on three metrics: the number of calls (No. of calls), bandwidth saving, and speech sample reduction. The Smallerize mechanism was implemented at the IP-GWs and IP-GWr gateways. The processes occur at IP-GWs and IP-GWr gateways have been explained in Section 3. The scheme of simulated network is similar to the one in <xref ref-type="fig" rid="fig-1">Fig. 1</xref>. In which, each gateway was simulated as a node that is connected to several IP Telephony clients. The channel between the two gateways is represented as a queue of 15 packets. The number of calls has been calculated just before the channel is saturated and the packet loss started. The G.728 and G.726 codecs were used in the experiments for more realistic analysis.</p>
<sec id="s4_1">
<label>4.1</label>
<title>No. of Calls</title>
<p><xref ref-type="fig" rid="fig-5">Figs. 5</xref> and <xref ref-type="fig" rid="fig-6">6</xref> show the Smallerize mechanism&#x0027;s number of calls <italic>vs.</italic> the IPv6 mechanism and Roay mechanism, using G.26 and G.28 codecs, respectively. The Smallerize mechanism revealed more calls with the two codecs versus the IPv6 mechanism and Roay mechanism. Furthermore, the number of calls with G.28 codec has been increased over G.26 codec. For example, the number of calls with the G.28 codec at 1000&#x2005;kb bandwidth is 111, 81, and 35 when running the Smallerize mechanism, Roay mechanism, and IPv6 mechanism, respectively. Therefore, the calls are increased by up to 317&#x0025; and 231&#x0025; over the conventional IPv6 mechanism when using the Smallerize mechanism and Roay mechanism, respectively. On the other hand, the number of calls with the G.26 codec at 1000&#x2005;kb bandwidth is 76, 61, and 31 when running the mechanism, Roay mechanism, and IPv6 mechanism, respectively. Therefore, the number of calls is increased by up to 245.1&#x0025; and 197&#x0025; over the typical IPv6 mechanism when using the Smallerize mechanism and Roay mechanism, respectively. This result is attributed to assembling multiple S-Pkt packets in a single P-Mux packet with a single UDP/IPv6 header instead of a single UDP/IPv6 header to each S-Pkt. However, the G.28 codec outperforms G.26 codec because the speech sample of the G.26 codec is 20-bytes while the speech sample of the G.28 codec is 10-bytes. Therefore, placing an 8-byte of speech payload in the SSRC and Timestamp fields influences the 10-byte G.28 codec over the 20-byte G.26 codec. Thus, the shorter the speech sample of a codec, the more the number of calls is increased when using the Smallerize mechanism.</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>No. of calls (G.26 codec)</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_24338-fig-5.png"/>
</fig>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>No. of calls (G.28 codec)</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_24338-fig-6.png"/>
</fig>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Bandwidth Saving</title>
<p><xref ref-type="fig" rid="fig-7">Figs. 7</xref> and <xref ref-type="fig" rid="fig-8">8</xref> present the bandwidth saving of the Smallerize mechanism and Roay Smallerize mechanism matched to the conventional IPv6 mechanism, using G.26 and G.28 codecs, respectively. Again, with the two codecs, the Smallerize mechanism presented more bandwidth saving than Roay mechanism. Furthermore, the bandwidth saving with G.28 codec has increased over G.26 codec. For example, the bandwidth saving with the G.28 codec at 100 calls is 68&#x0025; and 57&#x0025; when running the Smallerize mechanism and Roay mechanism matched to the IPv6 mechanism, respectively. Thus, the Smallerize mechanism presented more bandwidth saving by up to 10&#x0025; than the Roay mechanism. On the other hand, the Smallerize mechanism gave bandwidth saving with the G.26 codec equals 60&#x0025; at 100 calls which is less than the G.28 codec. This result is attributed to the exact reasons for increasing the capacity of the call.</p>
<fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>Bandwidth saving (G.26 codec)</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_24338-fig-7.png"/>
</fig>
<fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>Bandwidth saving (G.28 codec)</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_24338-fig-8.png"/>
</fig>
</sec>
<sec id="s4_3">
<label>4.3</label>
<title>Speech Sample Reduction</title>
<p><xref ref-type="fig" rid="fig-9">Fig. 9</xref> displays the speech sample reduction ratio when utilizing the Smallerize mechanism. The reduction ratio is 40&#x0025; and 80&#x0025; when using the G.26 codec and G.28 codec, respectively. The resulting reduction is due to moving a portion of the speech sample in the 8-byte SSRC and Timestamp fields. Furthermore, the reduction ratio is higher when using the G.28 codec versus the G.26 codec. This is because the speech sample of the G.28 codec is shorter than the speech sample of the G.26 codec. Thus, the shorter the speech sample of a codec, the more the reduction ratio.</p>
<fig id="fig-9">
<label>Figure 9</label>
<caption>
<title>Speech sample reduction ratio</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_24338-fig-9.png"/>
</fig>
</sec>
<sec id="s4_4">
<label>4.4</label>
<title>Impact of Smallerize on Network Performance</title>
<p>The No. of calls, bandwidth saving, and speech sample reduction metrics reflect the bandwidth utilization. The Smallerize mechanism outperforms the similar mechanisms with the three metrics. Thus, it accomplishes the main objective of increasing the bandwidth utilization when running IP telephony over IPv6 networks. Besides, the Smallerize mechanism minimized the number of IPv6 packets injected into the network due to assembling multiple S-Pkt packets in a single P-Mux packet. This will highly influence the IPv6 network performance elements, as shown in <xref ref-type="table" rid="table-3">Tab. 3</xref> [<xref ref-type="bibr" rid="ref-16">16</xref>&#x2013;<xref ref-type="bibr" rid="ref-25">25</xref>].</p>
<table-wrap id="table-3"><label>Table 3</label>
<caption>
<title>Smallerize network performance</title></caption>
<table><colgroup><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">Element</th>
<th align="left">Effect</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">Header size</td>
<td align="left">The large UDP/IPv6 header&#x0027;s wasted bandwidth has become negligible because multiple S-Pkt packets are assembled in one P-Mux packet with a single UDP/IPv6 header, rather than a dedicated UDP/IPv6 header to each S-Pkt.</td>
</tr>
<tr>
<td align="left">Speech frame</td>
<td align="left">The speech sample becomes shorter due to carry 8-bytes in the SSRC and timestamp fields.</td>
</tr>
<tr>
<td align="left">Bandwidth saving</td>
<td align="left">The wasted bandwidth is saved by: i) assembling multiple S-Pkt packets in one P-Mux packet with a single UDP/IPv6 header and ii) store part of the speech sample in the SSRC and Timestamp fields.</td>
</tr>
<tr>
<td align="left">Number of calls</td>
<td align="left">The IPv6 network number of calls has increased for the same reasons in the bandwidth saving.</td>
</tr>
<tr>
<td align="left">Number of packets</td>
<td align="left">The number of IPv6 packets injected into the network has been minimized due to assembling multiple S-Pkt packets in a single P-Mux packet.</td>
</tr>
<tr>
<td align="left">Routers performance</td>
<td align="left">The layer 3 routers are processing one P-Mux packet rather than many S-Pkt packets. This speeds up the routing process and saves the router resources.</td>
</tr>
<tr>
<td align="left">Packet loss</td>
<td align="left">The router buffer can accommodate more packets because the header size is reduced and the speech sample is reduced. Thus, this will impact (reduce) the ratio of packet loss. In addition, speeding up the routing process reduces the possibility of overwhelming the router buffer, reducing packet loss.</td>
</tr>
<tr>
<td align="left">Latency</td>
<td align="left">The latency has decreased due to speeding up the routing process. However, the processing overhead compensates for this latency. Therefore, the latency will almost neither have impacted positively nor negatively.</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Conclusion</title>
<p>IP telephony systems waste a significant share of the bandwidth in IPv6 networks. This paper created the Smallerize mechanism to minimize this wasted bandwidth, particularly for P2P IP telephony calls. The Smallerize mechanism saved the bandwidth by i) assembling numerous IP telephony packets in one P-Mux with a single UDP/IPv6 header and ii) use the SSRC and Timestamp fields in each PDU header to carry the speech sample of the packet and, thus shorten the payload. The Smallerize mechanism performs the assembling and shortening operations at the IP-GWs at the sender side. It reverses the operations at the IP-GWr at the receiver side to restore the S-Pkt. The Smallerize mechanism was analyzed and compared to the traditional IPv6 mechanism and Roay mechanism. The number of calls has been increased by 245.1&#x0025; compared to the typical IPv6 mechanism. In addition, the bandwidth saving has reached 68&#x0025; with the G.28 codec. Finally, the speech sample reduction has reached 40&#x0025; and 80&#x0025; when utilizing the G.26 codec and G.28 codec, respectively. Thses metrics are reflecting the the bandwidth utilization. The Smallerize mechanism outperforms the similar mechanisms with the three metrics. Thus, it accomplishes the main objective of increasing the bandwidth utilization when running IP telephony over IPv6 networks. Besides, the Smallerize mechanism minimized the number of IPv6 packets injected into the network due to assembling multiple S-Pkt packets in a single P-Mux packet. This will highly influence the IPv6 network performance elements. Therefore, Smallerize mechanism achieved the goal of enhancing the performance of IP telephony systems. As future works, the impact of changing the original value of the SSRC and the Timestamp fields on the security issues and SDN-based networks will be discussed. In addition, a mathematical model for the proposed mechanism will be considered. Finally, a real implementation of the proposed method will be considered.</p>
</sec>
</body>
<back><fn-group>
<fn fn-type="other">
<p><bold>Funding Statement:</bold> The authors received no specific funding for this study.</p>
</fn>
<fn fn-type="conflict">
<p><bold>Conflicts of Interest:</bold> The authors declare that they have no conflicts of interest to report regarding the present study.</p>
</fn>
</fn-group>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>T.</given-names> <surname>Lammle</surname></string-name></person-group>, &#x201C;<source>CCNA Routing and Switching Complete Deluxe Study Guide: Exam 100&#x2013;105, Exam 200&#x2013;105, Exam 200&#x2013;125</source>,&#x201D; <edition>2nd edition</edition>, <publisher-loc>Hoboken, NJ, USA</publisher-loc>: <publisher-name>John Wiley &#x0026; Sons</publisher-name>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Jose</surname></string-name>, <string-name><given-names>H.</given-names> <surname>David</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Julian</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Jos&#x00E9;</surname></string-name> and <string-name><given-names>P.</given-names> <surname>Fernando</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>Small-packet flows in software defined networks: Traffic profile optimization</article-title>,&#x201D; <source>Networks</source>, vol. <volume>10</volume>, no. <issue>4</issue>, pp. <fpage>176</fpage>&#x2013;<lpage>187</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Hussein</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Al-Zyoud</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Nairoukh</surname></string-name> and <string-name><given-names>S. N.</given-names> <surname>Al-Khatib</surname></string-name></person-group>, &#x201C;<article-title>Enhancing VoIP BW utilization over ITTP protocol</article-title>,&#x201D; <source>International Journal of Advanced Computer Science and Applications</source>, vol. <volume>11</volume>, no. <issue>10</issue>, pp. <fpage>505</fpage>&#x2013;<lpage>510</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Gupta</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Kumar</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Kumar</surname></string-name></person-group>, &#x201C;<article-title>Comparative analysis of voice codecs over different environment scenarios in VoIP</article-title>,&#x201D; in <conf-name>Proc. of the 2018 Second Int. Conf. on Intelligent Computing and Control Systems (ICICCS)</conf-name>, <conf-loc>Madurai, India</conf-loc>, pp. <fpage>540</fpage>&#x2013;<lpage>544</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. M.</given-names> <surname>Abualhaj</surname></string-name>, <string-name><given-names>Q. Y.</given-names> <surname>Shambour</surname></string-name> and <string-name><given-names>A. H.</given-names> <surname>Hussein</surname></string-name></person-group>, &#x201C;<article-title>Effective packet multiplexing method to improve bandwidth utilization</article-title>,&#x201D; <source>International Journal of Computer Applications in Technology</source>, vol. <volume>63</volume>, no. <issue>4</issue>, pp. <fpage>327</fpage>&#x2013;<lpage>336</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Hagen</surname></string-name></person-group>, &#x201C;<source>IPv6 Essentials: Integrating IPv6 into Your IPv4 Network</source>,&#x201D; <edition>3rd edition</edition>, <publisher-loc>Sebastopol, California, USA</publisher-loc>: <publisher-name>O&#x0027;Reilly Media</publisher-name>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Hassine</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Frikha</surname></string-name></person-group>, &#x201C;<article-title>A VoIP focused frame aggregation in wireless local area networks: Features and performance characteristics</article-title>,&#x201D; in <conf-name>Proc. of the 2017 13th Int. Wireless Communications and Mobile Computing Conf. (IWCMC)</conf-name>, <conf-loc>Valencia, Spain</conf-loc>, pp. <fpage>1375</fpage>&#x2013;<lpage>1382</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>Tomsho</surname></string-name></person-group>, &#x201C;<source>Guide to Networking Essentials</source>,&#x201D; <edition>8th edition</edition>, <publisher-loc>Boston, MA, USA</publisher-loc>: <publisher-name>Cengage Learning</publisher-name>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Kolhar</surname></string-name></person-group>, &#x201C;<article-title>Zeroize: A new method to improve the utilization of 5G networks when running VoIP over IPv6</article-title>,&#x201D; <source>Applied System Innovation</source>, vol. <volume>4</volume>, no. <issue>4</issue>, no. <issue>72</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>11</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>H. W.</given-names> <surname>Barz</surname></string-name> and <string-name><given-names>G. A.</given-names> <surname>Bassett</surname></string-name></person-group>, &#x201C;<source>Multimedia Networks: Protocols, Design and Applications</source>,&#x201D; 1st edition, Hoboken, NJ, USA: Wiley, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="book"><person-group person-group-type="author">A. A. Alkhatib, A. A. Hnaif and T. G. Kanan</person-group>, &#x201C;<comment>Proposed simple system for Road Traffic Counting</comment>,&#x201D; <source>International Journal of Sensors, Wireless Communications and Control</source>, vol. <volume>8</volume>, no. <issue>3</issue>, pp. <fpage>334</fpage>&#x2013;<lpage>345</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Gao</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Jiang</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Liu</surname></string-name> and <string-name><given-names>X.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>An RTP extension for reliable user-data transmission over VoIP traffic</article-title>,&#x201D; in <conf-name>Proc. of the Int. Symp. on Security and Privacy in Social Networks and Big Data</conf-name>, <conf-loc>Copenhagen, Denmark</conf-loc>, pp. <fpage>74</fpage>&#x2013;<lpage>86</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>T.</given-names> <surname>Hoshi</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Tanigawa</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Tsukada</surname></string-name></person-group>, &#x201C;<article-title>Proposal of a method of voice stream multiplexing for IP telephony systems</article-title>,&#x201D; in <conf-name>Proc. of the 1999 Internet Workshop. IWS99</conf-name>. (Cat. No. 99EX385), <conf-loc>Osaka, Japan</conf-loc>, pp. <fpage>182</fpage>&#x2013;<lpage>188</lpage>, <year>1999</year>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H. P.</given-names> <surname>Sze</surname></string-name>, <string-name><given-names>S. C.</given-names> <surname>Liew</surname></string-name>, <string-name><given-names>J. Y.</given-names> <surname>Lee</surname></string-name> and <string-name><given-names>D. C.</given-names> <surname>Yip</surname></string-name></person-group>, &#x201C;<article-title>A multiplexing scheme for H. 323 voice-over-IP applications</article-title>,&#x201D; <source>IEEE Journal on Selected Areas in Communications</source>, vol. <volume>20</volume>, no. <issue>7</issue>, pp. <fpage>1360</fpage>&#x2013;<lpage>1368</lpage>, <year>2002</year>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Casner</surname></string-name> and <string-name><given-names>V.</given-names> <surname>Jacobson</surname></string-name></person-group>, &#x201C;<article-title>Compressing IP/UDP/RTP headers for lowspeed serial links</article-title>,&#x201D; <publisher-loc>USA</publisher-loc>: <publisher-name>RFC Editor</publisher-name>, <conf-name>IETF RFC 2508</conf-name>, <year>1999</year>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="patent"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Roay</surname></string-name></person-group>, &#x201C;<article-title>Generic UDP multiplexing for voice over internet protocol (VOIP)</article-title>,&#x201D; U.S. Patent No. 8,553,692. 8, <year>Oct. 2013</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="patent"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Vulkan</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Rakos</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Vincze</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Drozdy</surname></string-name></person-group>, &#x201C;<article-title>Reducing overhead on voice traffic</article-title>,&#x201D; U.S. Patent No. 8,553,692, <year>8 Oct. 2013</year>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F.</given-names> <surname>De Rango</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Fazio</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Scarcello</surname></string-name> and <string-name><given-names>F.</given-names> <surname>Conte</surname></string-name></person-group>, &#x201C;<article-title>A new distributed application and network layer protocol for VoIP in mobile ad hoc networks</article-title>,&#x201D; <source>IEEE Transactions on Mobile Computing</source>, vol. <volume>13</volume>, no. <issue>10</issue>, pp. <fpage>2185</fpage>&#x2013;<lpage>2198</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>Z.</given-names> <surname>Shah</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Suleman</surname></string-name>, <string-name><given-names>I.</given-names> <surname>Ullah</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Baig</surname></string-name></person-group>, &#x201C;<article-title>Effect of transmission opportunity and frame aggregation on VoIP capacity over IEEE 802.11n WLANs</article-title>,&#x201D; in <conf-name>Proc. of 8th Int. Conf. on Signal Processing and Communication Systems (ICSPCS)</conf-name>, <conf-loc>Gold Coast, QLD, Australia</conf-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>7</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Seytnazarov</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Kim</surname></string-name></person-group>, &#x201C;<article-title>QoS-aware adaptive A-MPDU aggregation scheduler for enhanced VoIP capacity over aggregation-enabled WLANs</article-title>,&#x201D; in <conf-name>Proc. of NOMS 2018&#x2013;2018 IEEE/IFIP Network Operations and Management Symposium</conf-name>, <conf-loc>Taipei, Taiwan</conf-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>7</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Cui</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Meng</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Yang</surname></string-name>, <string-name><given-names>Q.</given-names> <surname>Kang</surname></string-name> and <string-name><given-names>Z.</given-names> <surname>Zhao</surname></string-name></person-group>, &#x201C;<article-title>QoS-aware approach for maximizing rerouting traffic in IP networks</article-title>,&#x201D; <source>KSII Transactions on Internet and Information Systems</source>, vol. <volume>10</volume>, no. <issue>9</issue>, pp. <fpage>4287</fpage>&#x2013;<lpage>4306</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. M.</given-names> <surname>Abualhaj</surname></string-name>, <string-name><given-names>S. N.</given-names> <surname>Al-Khatib</surname></string-name> and <string-name><given-names>Q. Y.</given-names> <surname>Shambour</surname></string-name></person-group>, &#x201C;<article-title>PS-PC: An effective method to improve VoIP technology bandwidth utilization over ITTP protocol</article-title>,&#x201D; <source>Cybernetics and Information Technologies</source>, vol. <volume>20</volume>, no. <issue>3</issue>, pp. <fpage>147</fpage>&#x2013;<lpage>158</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>I.</given-names> <surname>Nedyalkov</surname></string-name></person-group>, &#x201C;<article-title>An original and simple method for studying the performance of a VoIP network</article-title>,&#x201D; in <conf-name>Proc. of National Conf. with Int. Participation (ELECTRONICA)</conf-name>, <conf-loc>Sofia, Bulgaria</conf-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>4</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Q.</given-names> <surname>Shambour</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Alkhatib</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Abualhaj</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Alrab&#x0027;nah</surname></string-name></person-group>, &#x201C;<article-title>Effective voice frame shrinking method to enhance VoIP bandwidth exploitation</article-title>,&#x201D; <source>International Journal of Advanced Computer Science and Applications(IJACSA)</source>, vol. <volume>11</volume>, no. <issue>7</issue>, pp. <fpage>313</fpage>&#x2013;<lpage>319</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Q.</given-names> <surname>Kharma</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Hussein</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Taweel</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Abualhaj</surname></string-name> and <string-name><given-names>Q.</given-names> <surname>Shambour</surname></string-name></person-group>, &#x201C;<article-title>Investigation of techniques for VoIP frame aggregation over A-MPDU 802.11 n</article-title>,&#x201D; <source>Intelligent Automation and Soft Computing</source>, vol. <volume>31</volume>, no. <issue>2</issue>, pp. <fpage>869</fpage>&#x2013;<lpage>883</lpage>, <year>2022</year>.</mixed-citation></ref>
</ref-list>
</back>
</article>