27 research outputs found

    QoS Evaluation of SIP Signalled VoIP Network Routed using MANET Routing Protocols

    Get PDF
    A Mobile ad hoc network MANET is a type of network which consists of group of mobile nodes which are wireless and do not have fixed architecture The nodes act as a router and depict the nature of dynamism The three different classification of protocols in MANETS supports different applications But to support real time applications like voice signalling and video signalling we require the most efficient protocol that gives the QoS mechanism Voice and video signalling demand to know the performance of different metrics in the network such as end-to-end delay overall throughput of network and jitter of the network This paper works on identifying and analyzing the performance of various protocols like AODV DSR OLSR and TORA which would help in fulfilling the mentioned need Voice over Internet Protocol VoIP also known as IP telephony is a class of technologies used to deliver voice and multimedia sessions over internet protocol network

    Evaluation of SIP Signalling and QoS for VoIP over OLSR MANET Routing Protocol

    Get PDF
    Abstract: This paper evaluates the SIP based VoIP applications over the Optimized Link State Routing protocol (OLSR) as a proactive routing protocol for Mobile Ad Hoc Networks (MANET) using Static, Uniform, and Random mobility models. The evaluation considered PCM, LQS, IPTelephony, and GSM voice codecs to study the SIP signaling performance and the voice Quality of Service (QoS) for VoIP calls over OLSR MANET. The simulation efforts performed in OPNET Modeler 17.1. The results show that VoIP over OLSR MANET has good performance over Static and Uniform mobility models while it has variable performance with Random models. SIP signaling has large delays compared with the voice signaling which reduce the VoIP performance and increases the call's duration. In addition, GSM and LQS based VoIP calls have an acceptable level of QoS while PCM and IP-Telephony based VoIP calls have a low level of QoS over different types of mobility models. Furthermore, the location and the mobility of SIP server affect the number of hops and the SIP signaling performance between the different parties of the VoIP call

    SecMon: End-to-End Quality and Security Monitoring System

    Get PDF
    The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype). Even the existing standards of VoIP provide an assurance of security and Quality of Service (QoS), however, these features are usually optional and supported by limited number of implementations. As a result, the lack of mandatory and widely applicable QoS and security guaranties makes the contemporary VoIP systems vulnerable to attacks and network disturbances. In this paper we are facing these issues and propose the SecMon system, which simultaneously provides a lightweight security mechanism and improves quality parameters of the call. SecMon is intended specially for VoIP service over P2P networks and its main advantage is that it provides authentication, data integrity services, adaptive QoS and (D)DoS attack detection. Moreover, the SecMon approach represents a low-bandwidth consumption solution that is transparent to the users and possesses a self-organizing capability. The above-mentioned features are accomplished mainly by utilizing two information hiding techniques: digital audio watermarking and network steganography. These techniques are used to create covert channels that serve as transport channels for lightweight QoS measurement's results. Furthermore, these metrics are aggregated in a reputation system that enables best route path selection in the P2P network. The reputation system helps also to mitigate (D)DoS attacks, maximize performance and increase transmission efficiency in the network.Comment: Paper was presented at 7th international conference IBIZA 2008: On Computer Science - Research And Applications, Poland, Kazimierz Dolny 31.01-2.02 2008; 14 pages, 5 figure

    Low-cost wireless mesh communications based on openWRT and voice over internet protocol

    Get PDF
    Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-line-of-sight (NLOS) condition, they are limited to reception distances up to 55 meters

    SecMon: end-to-end quality and security monitoring system

    Get PDF
    The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communication for the Internet users. This also applies to the Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype). Even the existing standards of VoIP provide an assurance of security and Quality of Service (QoS), however, these features are usually optional and supported by a limited number of implementations. As a result, the lack of mandatory and widely applicable QoS and security guarantee makes the contemporary VoIP systems vulnerable to attacks and network disturbances. In this paper we are facing these issues and propose the SecMon system, which simultaneously provides a lightweight security mechanism and improves quality parameters of the call. SecMon is intended specially for VoIP service over P2P networks and its main advantage is that it provides authentication, data integrity services, adaptive QoS and (D)DoS attack detection. Moreover, the SecMon approach represents a lowbandwidth consumption solution that is transparent to the users and possesses a self-organizing capability. The above-mentioned features are accomplished mainly by utilizing two information hiding techniques: digital audio watermarking and network steganography. These techniques are used to create covert channels that serve as transport channels for lightweight QoS measurement results. Furthermore, these metrics are aggregated in a reputation system that enables best route path selection in the P2P network. The reputation system helps also to mitigate (D)DoS attacks, maximize performance and increase transmission efficiency in the network

    Adaptive Voice Applications over Delay Tolerant Networks

    Get PDF
    Internet is predominantly based on best effort packet transmission. Performance of applications over internet suffers due to disconnections, delays, losses and dynamic nature of elements in the network. Voice communications, such as Voice over Internet Protocols (VoIP), over mobile networks has to deal with technical barriers such as delays and temporary disconnections. Delay tolerant networks provides communication based on asynchronous messaging that deals with delays and disconnections; which provides a mechanism to deliver the messages irrespective of instantaneous end-to-end path connectivity. In the thesis, delay tolerant adaptive media is proposed to allow DTN-based communication as a fall-back if real time end-to-end voice communication fails. We designed a system which adapts to delays and losses by switching between RTP/UDP and RTP/DTN-based voice packets transmission. The real time communication works fine as long as continuous end-to-end path exists. The continuous path might not exist when there are changes in the network topology of mobile users. So in the case of non-availability of end-to-end path, we swiftly adapt to RTP/DTN-based voice with variable length messaging mechanism. To assess the call quality in different modes of operation, we used R values of E model specified by ITU-T. The results show that the proposed delay tolerant adaptive media for adaptive voice over delay tolerant networks achieves better utility for the users when end-to-end connectivity is not available or when delays are higher

    Routage et gestion de la mobilité dans les réseaux personnels

    Get PDF
    L'objectif de cette thèse est d'étudier des méthodes et des stratégies efficaces pour le routage et la gestion de la mobilité dans le cadre des réseaux personnels. Dans un premier temps, nous proposons le cadre de nos études: Personal Ubiquitous Environments (PUE). Un PUE est constitué d'un ensemble d'utilisateurs ayant des terminaux disposant d'interfaces réseau hétérogènes, et dont l'objectif est de mettre en oeuvre des mécanismes de coopération et de partage des ressources de manière totalement distribuée. Dans ce cadre, la thèse a proposé des solutions innovantes contribuant à améliorer la communication inter et intra réseau personnels. La première contribution porte sur le protocole PNRP (Personal Network Routing Protocol) dont le but est de développer un routage à base de politiques (policy-based routing) pour les environnements personnels. La seconde, intitulée ADD (Adaptive Distributed gateway Discovery), est un mécanisme totalement distribué pour la découverte de multiples chemins vers une passerelle vers un réseau opéré. De plus, étant donné que ces environnements sont hétérogènes par leurs compositions (réseaux d'accès, terminaux ...), une architecture de gestion de la mobilité qui permet une gestion unifiée de la localisation et de la mobilité sans coutures appliquant lénsemble des noeuds a également été traitée. Les résultats d'évaluation par simulation démontrent l'applicabilité et léfficacité des ces protocoles.The aim of this thesis is to investigate methods and strategies for efficient routing and mobility management in personal environments. The concept of Personal Ubiquitous Environments (PUE) is introduced which accommodates heterogeneous devices and access networks of different users and sustain the notion of sharing resources in a distributed manner. A prerequisite for achieving the resource (devices, networks) sharing in personal environments is the deployment of suitable communication protocols which establish efficient multi-hop routes betweens the devices of the PUE. Personal Network Routing Protocol (PNRP) has been developed to perform policy-based routing in personal environments. Moreover, in certain personal networking scenarios, the infrastructure network components (i.e. gateways) are more than one-hop distance from the user's devices; Adaptive Distributed gateway Discovery (ADD) protocol is thereby proposed to efficiently discover the multi-hop routes towards the gateway in a totally distributed manner. All the more, since the personal environments regroups heterogeneous access networks, an efficient mobility management architecture is proposed which offers unified location management and seamless handover experience to dynamic personal nodes. The proposed protocols are assessed by means of numerous communication scenarios; the simulation results demonstrate the applicability of the proposed protocols

    Design and Implement Voice Application over Ad Hoc Networks Using UPnP

    Get PDF
    The traditional voice service was based on circuit-switched network architecture. It has been deployed on the packet-switched based network since Session Initial Protocol (SIP) became the de facto standard for Voice over IP (VoIP) in 1999. Since then voice service has become simple and flexible. Another important technology driving voice service more popularity is mobile Ad Hoc networks (MANET). Most of internet applications or services such as VoIP or instant messaging (IM) are designed with client/server architecture. This design requires the initiator of communication sessions to know the address of counterpart prior to building a connection. With Ad Hoc networks, there is no such requirement at all. In this thesis, we will design an Ad Hoc architecture using Universal Plug and Play (UPnP) protocol, and implement a simple voice application over such network. By definition infrastructure is unavailable in Ad Hoc network, we will also present the solution of how to enable SIP-based session setup on Ad Hoc network. This thesis consists of two parts. The first part is the theoretical part. In this part, we will review the technologies related to our design and implementation. The second part is the system implementation and validation part. We will test our implementation with the Nokia Internet Tablet N810/N800s for various scenarios

    Ubiquitous robust communications for emergency response using multi-operator heterogeneous networks

    Get PDF
    A number of disasters in various places of the planet have caused an extensive loss of lives, severe damages to properties and the environment, as well as a tremendous shock to the survivors. For relief and mitigation operations, emergency responders are immediately dispatched to the disaster areas. Ubiquitous and robust communications during the emergency response operations are of paramount importance. Nevertheless, various reports have highlighted that after many devastating events, the current technologies used, failed to support the mission critical communications, resulting in further loss of lives. Inefficiencies of the current communications used for emergency response include lack of technology inter-operability between different jurisdictions, and high vulnerability due to their centralized infrastructure. In this article, we propose a flexible network architecture that provides a common networking platform for heterogeneous multi-operator networks, for interoperation in case of emergencies. A wireless mesh network is the main part of the proposed architecture and this provides a back-up network in case of emergencies. We first describe the shortcomings and limitations of the current technologies, and then we address issues related to the applications and functionalities a future emergency response network should support. Furthermore, we describe the necessary requirements for a flexible, secure, robust, and QoS-aware emergency response multi-operator architecture, and then we suggest several schemes that can be adopted by our proposed architecture to meet those requirements. In addition, we suggest several methods for the re-tasking of communication means owned by independent individuals to provide support during emergencies. In order to investigate the feasibility of multimedia transmission over a wireless mesh network, we measured the performance of a video streaming application in a real wireless metropolitan multi-radio mesh network, showing that the mesh network can meet the requirements for high quality video transmissions
    corecore