Solved

VoIP end-to-end delay

Posted on 2014-02-17
3
232 Views
Last Modified: 2014-04-09
The processing, queuing, serialization, and propagation delays are types of delay that make up end-to-end delay. My question is how do I measure each of those delays? My users are experiencing performance issue with VoIP and I'd like to break it down so that I can see which delay may be the cause of the poor performance.

My environment is all Cisco switches and routers. We have site-to-site VPN connections.

Thanks
0
Comment
Question by:leblanc
3 Comments
 
LVL 24

Accepted Solution

by:
aadih earned 250 total points
ID: 39864944
The Cisco article , "Measuring Delay, Jitter, and Packet Loss with Cisco IOS SAA and RTTMON" may be of direct help or provide you with ideas. It's available at:

http://www.cisco.com/c/en/us/support/docs/availability/high-availability/24121-saa.html >
0
 
LVL 12

Assisted Solution

by:Infamus
Infamus earned 250 total points
ID: 39865010
0
 
LVL 1

Author Comment

by:leblanc
ID: 39866351
Cisco IOS SAA and RTTMON sounds interesting. I've never used it before. So I'd like to get some inputs from you the experts.

Also, my equipment does not have IOS 12.05T or higher.

Thanks
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Radius Debug Error 16 89
2 Gateways (bandwidth) - One domain 7 73
Point to point connection slow in one direction only 15 45
spanning tree loop even though stp is enabled 10 32
Let’s list some of the technologies that enable smooth teleworking. 
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question