Solved

how to calculate delay jitter given delay.

Posted on 2007-04-10
1
3,921 Views
Last Modified: 2008-01-09
Hi experts,

I understand that delay jitter is the variation of delay in network packet measurement.
So given delay, how do I calculate delay jitter?
If delay jitter is the variance, can I use the usual statistic variance formula var(X)=E(X^2)-E(x)^2?
If my delay is given in millisecond, what is the unit of delay jitter?
0
Comment
Question by:help-me
1 Comment
 
LVL 3

Accepted Solution

by:
jimmyd072298 earned 50 total points
ID: 18994624
Not really the actual function is a simple example of a class of estimators called "recursive prediction error" or "stochastic gradient algorithms".  .Think about as a recursive running average.  To calculate you have to remember that nothing is known about absolute transit times, the differences in packet transit times are independent of absolute clock values. If packets i and j are time stamped with timestamps Si and Sj when they are sent and are received at times Ri and Rj, respectively, then Dij = (Rj-Sj) - (Ri-Si) = (Rj-Ri)-(Sj-Si) is the difference in transit times in time stamp units. Knowing that then jitter is a smoothed function of |Di-1,i|:Ji = Ji-1 + ( |Di-1,i| - Ji-1 )/16 = 15/16 * Ji-1 + 1/16 * |Di-1,i|
Thus, jitter is a sort of running average of all |Di-1,i| from the beginning of the measurement up to the current packet. Recent packets have a larger weight than older packets. The jitter curve needs about 100 packets to stabilize.
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

SSL is a very common protocol used these days when browsing the web.  The purpose is to provide security to communication, but how does it do it?  There are several pieces at work that have to be setup before SSL will even work and it requires both …
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now