Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

VoIP end-to-end delay

Posted on 2014-02-17
3
Medium Priority
?
250 Views
Last Modified: 2014-04-09
The processing, queuing, serialization, and propagation delays are types of delay that make up end-to-end delay. My question is how do I measure each of those delays? My users are experiencing performance issue with VoIP and I'd like to break it down so that I can see which delay may be the cause of the poor performance.

My environment is all Cisco switches and routers. We have site-to-site VPN connections.

Thanks
0
Comment
Question by:leblanc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 24

Accepted Solution

by:
aadih earned 1000 total points
ID: 39864944
The Cisco article , "Measuring Delay, Jitter, and Packet Loss with Cisco IOS SAA and RTTMON" may be of direct help or provide you with ideas. It's available at:

http://www.cisco.com/c/en/us/support/docs/availability/high-availability/24121-saa.html >
0
 
LVL 12

Assisted Solution

by:Infamus
Infamus earned 1000 total points
ID: 39865010
0
 
LVL 1

Author Comment

by:leblanc
ID: 39866351
Cisco IOS SAA and RTTMON sounds interesting. I've never used it before. So I'd like to get some inputs from you the experts.

Also, my equipment does not have IOS 12.05T or higher.

Thanks
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
In this article, we’ll look at how to deploy ProxySQL.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
Suggested Courses

704 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question