Submit Search
Upload
Analytical Model on Secure Transmission for SIP-Video Call Setup for WiMax Heterogeneous Networks
•
0 likes
•
72 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i9/IRJET-V4I996.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
wp233
wp233
Nick Possley
El camino hacia la 5G - Isidro Nieto from Ericsson at VI Jornadas Cátedras Te...
El camino hacia la 5G - Isidro Nieto from Ericsson at VI Jornadas Cátedras Te...
Ericsson España
latencyin fiber optic networks
latencyin fiber optic networks
MapYourTech
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Living Online
Dwdm12
Dwdm12
Kuldeep Rawat
ETE405-lec4.pptx
ETE405-lec4.pptx
mashiur
2002023
2002023
pglehn
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentation
Waldir R. Pires Jr
Recommended
wp233
wp233
Nick Possley
El camino hacia la 5G - Isidro Nieto from Ericsson at VI Jornadas Cátedras Te...
El camino hacia la 5G - Isidro Nieto from Ericsson at VI Jornadas Cátedras Te...
Ericsson España
latencyin fiber optic networks
latencyin fiber optic networks
MapYourTech
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Living Online
Dwdm12
Dwdm12
Kuldeep Rawat
ETE405-lec4.pptx
ETE405-lec4.pptx
mashiur
2002023
2002023
pglehn
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentation
Waldir R. Pires Jr
Accelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assurance
ADVA
Span Design considerations in TAT-14 US Backhaul across G.652 Fiber
Span Design considerations in TAT-14 US Backhaul across G.652 Fiber
Roderick Dottin
Iccbn Presentation - optical
Iccbn Presentation - optical
roysoumya
Grant free iot
Grant free iot
amin azari
6TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 2015
Pascal Thubert
PhD proposal in KTH, By Amin Azari
PhD proposal in KTH, By Amin Azari
amin azari
Lte Presentation.Ppt
Lte Presentation.Ppt
vaimalik
Gailtel
Gailtel
Palak Johri
VR and AR are Pushing Connectivity Limits
VR and AR are Pushing Connectivity Limits
Qualcomm Research
URLLC: Recent Research and Road Ahead
URLLC: Recent Research and Road Ahead
Mehdi Bennis
URLLC keynote
URLLC keynote
Mehdi Bennis
5G live virtual classroom - trainig program
5G live virtual classroom - trainig program
NordinRamli
Research portfolio
Research portfolio
Mehdi Bennis
HSTR Seminar
HSTR Seminar
Ronald Bartels
MPLS in Mobile Backhaul
MPLS in Mobile Backhaul
Scott Foster
Enabling 5G with NFV: New Joint White Paper Outlining Network Operator Perspe...
Enabling 5G with NFV: New Joint White Paper Outlining Network Operator Perspe...
Open Networking Summit
SHARP: In-Network Scalable Hierarchical Aggregation and Reduction Protocol
SHARP: In-Network Scalable Hierarchical Aggregation and Reduction Protocol
inside-BigData.com
4G (LTE) Business Case for 2.6 GHz
4G (LTE) Business Case for 2.6 GHz
Andrea Calcagno
VoWLAN: Call Quality
VoWLAN: Call Quality
3G4G
InfiniBand In-Network Computing Technology and Roadmap
InfiniBand In-Network Computing Technology and Roadmap
inside-BigData.com
Shahnshah Sarker 072802556
Shahnshah Sarker 072802556
mashiur
Comparisons of QoS in VoIP over WIMAX by Varying the Voice codes and Buffer size
Comparisons of QoS in VoIP over WIMAX by Varying the Voice codes and Buffer size
Editor IJCATR
More Related Content
What's hot
Accelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assurance
ADVA
Span Design considerations in TAT-14 US Backhaul across G.652 Fiber
Span Design considerations in TAT-14 US Backhaul across G.652 Fiber
Roderick Dottin
Iccbn Presentation - optical
Iccbn Presentation - optical
roysoumya
Grant free iot
Grant free iot
amin azari
6TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 2015
Pascal Thubert
PhD proposal in KTH, By Amin Azari
PhD proposal in KTH, By Amin Azari
amin azari
Lte Presentation.Ppt
Lte Presentation.Ppt
vaimalik
Gailtel
Gailtel
Palak Johri
VR and AR are Pushing Connectivity Limits
VR and AR are Pushing Connectivity Limits
Qualcomm Research
URLLC: Recent Research and Road Ahead
URLLC: Recent Research and Road Ahead
Mehdi Bennis
URLLC keynote
URLLC keynote
Mehdi Bennis
5G live virtual classroom - trainig program
5G live virtual classroom - trainig program
NordinRamli
Research portfolio
Research portfolio
Mehdi Bennis
HSTR Seminar
HSTR Seminar
Ronald Bartels
MPLS in Mobile Backhaul
MPLS in Mobile Backhaul
Scott Foster
Enabling 5G with NFV: New Joint White Paper Outlining Network Operator Perspe...
Enabling 5G with NFV: New Joint White Paper Outlining Network Operator Perspe...
Open Networking Summit
SHARP: In-Network Scalable Hierarchical Aggregation and Reduction Protocol
SHARP: In-Network Scalable Hierarchical Aggregation and Reduction Protocol
inside-BigData.com
4G (LTE) Business Case for 2.6 GHz
4G (LTE) Business Case for 2.6 GHz
Andrea Calcagno
VoWLAN: Call Quality
VoWLAN: Call Quality
3G4G
InfiniBand In-Network Computing Technology and Roadmap
InfiniBand In-Network Computing Technology and Roadmap
inside-BigData.com
What's hot
(20)
Accelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assurance
Span Design considerations in TAT-14 US Backhaul across G.652 Fiber
Span Design considerations in TAT-14 US Backhaul across G.652 Fiber
Iccbn Presentation - optical
Iccbn Presentation - optical
Grant free iot
Grant free iot
6TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 2015
PhD proposal in KTH, By Amin Azari
PhD proposal in KTH, By Amin Azari
Lte Presentation.Ppt
Lte Presentation.Ppt
Gailtel
Gailtel
VR and AR are Pushing Connectivity Limits
VR and AR are Pushing Connectivity Limits
URLLC: Recent Research and Road Ahead
URLLC: Recent Research and Road Ahead
URLLC keynote
URLLC keynote
5G live virtual classroom - trainig program
5G live virtual classroom - trainig program
Research portfolio
Research portfolio
HSTR Seminar
HSTR Seminar
MPLS in Mobile Backhaul
MPLS in Mobile Backhaul
Enabling 5G with NFV: New Joint White Paper Outlining Network Operator Perspe...
Enabling 5G with NFV: New Joint White Paper Outlining Network Operator Perspe...
SHARP: In-Network Scalable Hierarchical Aggregation and Reduction Protocol
SHARP: In-Network Scalable Hierarchical Aggregation and Reduction Protocol
4G (LTE) Business Case for 2.6 GHz
4G (LTE) Business Case for 2.6 GHz
VoWLAN: Call Quality
VoWLAN: Call Quality
InfiniBand In-Network Computing Technology and Roadmap
InfiniBand In-Network Computing Technology and Roadmap
Similar to Analytical Model on Secure Transmission for SIP-Video Call Setup for WiMax Heterogeneous Networks
Shahnshah Sarker 072802556
Shahnshah Sarker 072802556
mashiur
Comparisons of QoS in VoIP over WIMAX by Varying the Voice codes and Buffer size
Comparisons of QoS in VoIP over WIMAX by Varying the Voice codes and Buffer size
Editor IJCATR
[32]
[32]
Videoguy
ETE405-lec4.pdf
ETE405-lec4.pdf
mashiur
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
IRJET Journal
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
Editor IJMTER
Diameter Penetration Test Lab
Diameter Penetration Test Lab
frcarlson
CTIA 2010 Corporate Overview
CTIA 2010 Corporate Overview
Continuous Computing
R43019698
R43019698
IJERA Editor
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
IJCNCJournal
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
IJCNCJournal
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
IRJET Journal
Vo ip on 3gpp lte network a survey
Vo ip on 3gpp lte network a survey
Alexander Decker
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
IJERA Editor
CES 2010 FemtoZone
CES 2010 FemtoZone
Continuous Computing
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...
ijwmn
Ip virtual leased line
Ip virtual leased line
Zahraddeen Muhammadnafiu
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
csandit
Voip
Voip
PTCL
Mohammad Faisal Kairm(073714556) Assignment 2
Mohammad Faisal Kairm(073714556) Assignment 2
mashiur
Similar to Analytical Model on Secure Transmission for SIP-Video Call Setup for WiMax Heterogeneous Networks
(20)
Shahnshah Sarker 072802556
Shahnshah Sarker 072802556
Comparisons of QoS in VoIP over WIMAX by Varying the Voice codes and Buffer size
Comparisons of QoS in VoIP over WIMAX by Varying the Voice codes and Buffer size
[32]
[32]
ETE405-lec4.pdf
ETE405-lec4.pdf
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
Diameter Penetration Test Lab
Diameter Penetration Test Lab
CTIA 2010 Corporate Overview
CTIA 2010 Corporate Overview
R43019698
R43019698
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
Vo ip on 3gpp lte network a survey
Vo ip on 3gpp lte network a survey
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
CES 2010 FemtoZone
CES 2010 FemtoZone
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...
Ip virtual leased line
Ip virtual leased line
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
Voip
Voip
Mohammad Faisal Kairm(073714556) Assignment 2
Mohammad Faisal Kairm(073714556) Assignment 2
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Quintin Balsdon
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
Dr. Deepak Mudgal
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
KOUSTAV SARKAR
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
AfnanAhmad53
Computer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
ChandrakantDivate1
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Omar Fathy
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
Ramkumar k
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
Mustafa Ahmed
Hospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
Hostel management system project report..pdf
Hostel management system project report..pdf
Kamal Acharya
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
subhasishdas79
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
ChandrakantDivate1
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
sarkmank1
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
NANDHAKUMARA10
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
ronahami
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
ppkakm
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
kalpana413121
Recently uploaded
(20)
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
Computer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
Hospital management system project report.pdf
Hospital management system project report.pdf
Hostel management system project report..pdf
Hostel management system project report..pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
Analytical Model on Secure Transmission for SIP-Video Call Setup for WiMax Heterogeneous Networks
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 564 Analytical Model on Secure Transmission for SIP-Video Call Setup for WiMaxHeterogeneous Networks S. Jacily Jemila1, S. Chitra2 1,2 Asst. Prof, Department of ECE, Prince Dr.K.Vasudevan college of engineering & Technology, Chennai, Tamil Nadu, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- ABSTRACT: In LTE networks can provide IP based media streaming connectivity storage and control solution where voice, data, video streamed multimedia can be provided to users on an “Anytime, Anywhere” in the world. The aim of the work is to estimate quality of metric values with fixed and mobile WiMAX standards utilized for SIP (Session initialized protocol) video call setup procedure over wireless link scenario directed to mobile devices. We used two video call modes of operationoverheterogeneous WiMAXstandards. The proposed model application layers in SIP protocol based on multicast mobile agents used in two different modes of video call established. Initiate services through CBR used forSession control overhead packets. Our analytical model provides that the video call set-up performance, jitter and delay in peer to peer networks. Moreover, the call setup performance can be improved significantly using the robust in application link layer such as SIP with a comparison of WiMAX heterogeneous network standards proposed in ourpaperandalsotoestablish and maintain secure transmission via IP based security services such as ISAKMP protocol in the network layered protocol. The analytical results were validated by our experimental measurement. General Terms Your general terms must be any term which can be used for general classification of the submitted material such as Pattern Recognition, Security, Algorithms et. al. Keywords: IEEE 802.16. e, ISAKAMP, SIP, Streaming, CBR INTRODUCTION In the modern communications world of today, 4G (fourth generation) mobile wireless standards' goal is to provide high-speed mobile phone transmissions, which can support high-quality streaming video and other critical services. Realizing Video streaming over-LTE Viewing live and prerecorded video carried over mobile networks are exploding in popularity with the sharp growth in Smartphones and the advent of Long Term Evolution (LTE) next-generation mobile networks. As a result, LTE carriers and service providers are presented with a compelling revenue generating opportunity – provided they build LTE networks optimized for large-scale video streaming. At first glance LTE, with its far higher bit-rates and IP packet-based architecture, looks ideally suitedfordeliveringmobilevideo, including High Definition. But wireless network technology alone is insufficient. To meet the overwhelming demand for live and prerecorded mobile video, the transmission capabilities of LTE networks must be matched by equivalent increases in video server output. LTE networks will need to be integrated with server infrastructures with the scaling capacity, transmission efficiency and wireless network smarts to handle millions of concurrent requests for High Definition mobile video streams. This needwill beespecially acute when large numbers of users request the same video content at the same time as is increasinglycommon withlive video streaming of popular events. LTE's increasing use of unicast networking where a unique streamistransmitted to every user, even if the content is identical compounds the requirement for next-generation server infrastructure Streamonix as a pioneer in streaming High Definition video over 4th Generation and LTE networks, is uniquely qualified to assist clients in assessing, designing and building next- generation video server technologies matched to their LTE networks. Challenges for Implementing IEEE 802.16.e In the data transmission from point to multi point transmission need for priority based scheduling algorithm design for the equal importance of transmission of bits then end of transmission in order to improved high throughput/ traffic modelling and also reduces the loss of transmission between wireless links. Herestreamingtransmissionvoiceis more important than video so requirement of issues continuity of arrival of bitters in collection to archive significant reductancy at the same time acceptable value of tolerable. Security Securing the voice communication is also a big challenge for VoIP over WiMAX as care has tobetakenthatit can be eavesdropped with key management IP based protocol used as two phase process. The Double encryption process - X.509 for Authentication and 152-bit AES, 3DES or 56-bit DES for data flow ensure the transmission is secure and eavesdropping is very difficult on the traffic modelling. Delay Voice transmission over wireless brings along with it a big problem of packet delay or latency.Thefactorsthatadd to the delay are the Propagation delay, the serialization delay, channel coding delay at the physical layer and the Medium access delay at the MAC layer. Similarly at the
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 565 Network layer the Forwarding and the Queuing delays are encountered, and at the application layer Packetization / depacketization, delay, Algorithmic delay and look-ahead delay, decoding delay are inherently caused. Packet Loss/ Dropped Packets : Packetlossdoesexcessive damage to the voice signal, as retransmission cannot be considered as an option while transmitting voice. Loss of voice framesatunvoiced/voicedtransitioncausessignificant degradation of the signal. Advanced error detection and correction algorithms are used to fill the gaps created by the dropped packets. A sample of the speaker's voice is stored and is used to create a new sound from an algorithm which tries to approximate the contents of the dropped packets or lost packets. Jitter: When the transmission times of the arriving packets vary as a result of different queuing times or differentroutes it is referred to as Jitter. Jitter can be taken care of by using an adaptive jitter buffer which adapts itself according to the delay encountered over the networks, to provide a smooth voice stream at the output. Strict Priority Scheduler: The real-time traffic occupies a significant percentage of the available bandwidth and Internetmustevolvetosupportthe new applications. Such as VoD (Video on Demand), VoIP (Voice over IP), VTC (Video-Teleconferencing), interactive games, distributed virtual collaboration,remoteclassrooms, grid computing, etc.,The best effort delivery is unacceptable, since in case of a congestion the Quality of Service (QoS) and Quality of Experience (QoE) declines to an unsatisfactory level. The main contribution of this paper is the strict priority scheduler designed to provide the minimum guaranteed transmission rate for all active flows with the respect to their priorities and to provide a fair share of the additional bandwidth. The scheduler also rejects flows, for which the minimum rate requirements exceed the available bandwidth. The proposed solution is applicable for the WiFi wireless network, to accomplish QoS along the path. The Strict Priority Scheduler is the default scheduling discipline in QualNet. It service the highest priority queue until it is empty, and then moves to the next highest priority queue, and so on. It is possible that if there is enough high priority traffic, the lower priorities could be completely frozen out. We can configure only one node atthefirstschedulerlevel as strict priority. If any node or queue above the strict-priority node has packets, it is scheduled next. If multiple queues above the strict-priority node have packets, the HRR algorithm (Hierarchical Round Robin) selects which strict- priority queue is scheduled next. One strict priority traffic- class group is called the auto-strict-priority group. The scheduler nodes and queues in theauto-strict-prioritygroup receives strict-priority scheduling. ISAKMP Protocol The ISAKMP is used by AH (Authentication header) and ESP (encapsulated security payload) to establish the security associations needed to accomplish the protocols. However ISAKMP advantages can be exploited by any other security protocol, and in this way it will be possible to avoid the duplicity of single purpose negotiations of security parameters. Current security protocols negotiate its parameters by the exchanging messages. The ISAKMP protocol is divided into two phases. In the first phase the parties establish a ciphering key by a key establishment protocol. Once the key is established, they authenticate one each other and negotiate how to protect the second phase. In the second phase, this is made the negotiation of the security parameters on behalf of any security service. This second phase is protected using the parameters. RELATED WORKS There are many papers proposed in VOIP based video streaming technologywithH.323/SIPprotocols.Theauthors are mainly concerned with routing protocol based transmission in order to achieve high robustness and capacity of voice transmission over IP networks various methodologies have been implemented and verified they proceed. [1] Ehsan Haghani et al estimatesthequality ofmetricvalues for MPEG standard video transmission and anaysised cross layer solution over Wimax scenario [2] Jae-Woo So et al investigated the OFDM (Orthogonal Frequency division multiplexing) system VoIP based up/down link signalling overhead information streaming over IEEE 802.16. e networks. [3] Castro, M.A.V et al investigated video streaming under temperate and tropical propagation conditions based on DVB-S2/RCS and WiMax standards. [4] Shyam Parekh et al examined mobile user provide high speed network connectivity and satisfies different quality of metric values while optimizing resourceallocationproblem. [5] Xiangyang Li et al proposed the concerns and requirements of VoIP security and it is review of security issues and the defence mechanismsandalsofocusonattacks and countermeasures unique to VoIP systems [6] Jae-Hyun Kim et al investigate the maximum number of supportable VoIP users for the resource request schemes in terms of the packet-generation-interval in the silent-period,theduration of the silent-period, and the major VoIP speech codes. [7] Oktay, M. Et al examined Earliest deadline first scheduling algorithm commonly used in the VoIP and VoD in wire and wireless application in order toimprovethequalityofmetric values. [8] Gordon –Ross et al analysed two novel interworking architectures to integrate WiMax and third- generation (3G) networks. And also analyse the SIP- based IMS registration and session setupsignallingdelayfor 3G and WiMax networks with specific reference to their interworking architectures. [9] Nilanjan Banerjee et al
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 566 examined in the undesirable delayandpacketlosscoexisting with heterogeneous IP based network and also achieved good quality of services in application layered SIP protocol. [10] M. Atif Qureshi comparative analysis voice traffic pattern of the MAC and transport layer (TCP/UDP) in the Wimax and Wifi architecture SIMULATION RESULTS: We use a Qualnet simulator as our performance analysis platforms various evaluation parameters include the time between 1st and last packet, no of packets, Average packet size, and throughput of the simulated scenario. The simulation parameters are summarized in table1. We designed the infrastructure networksSetupcontaining12no of nodes. We are compiling the all nodes with video trafficin VoIP transmission between the source and destination nodes. Our work is investigating voice quality of metric values of a fixed WiMax and mobility WiMax providers in different coverage area, enterprise warehouse and wireless security surveillance under the mobility nodes scenario. Table 1. Parameters for Simulation Evaluation Parameters IEEE 802.16 IEEE 802.16.e Data rate 52 Mbps 52 Mbps No of Nodes 12 12 Application SIP SIP Routing Protocol Bellmen ford DSR Traffic Type CBR (video) CBR (video) Running Time 300s 320s File Name Terminal alias address file (.endpoint) Terminal alias address file (.endpoint) Simulation area 900×900 m2 1000×1000 m2 The qualities of metrics are analyzedinthevideoestablished between two different VoIP users in fixed and mobile WiMAX standards. Videotraffic applies between2/3and 5/6 respectively. The two applications layered protocols are SIP and H.323 protocol respectively. The transport layer is generating traffic in RTP/RTCP protocol services. We analyzed average jitter, average delay, CBR in client and server nodes are taken into SIP application layered protocols. Fig 1: Snapshot of IEEE 802.116 for SIP Protocol for VoIP transmission in Qualnet simulator Fig 2: Snapshot of IEEE 802.116. e for SIP Protocol for VoIP transmission in Qualnet simulator Fig 3: Number of mobility nodes corresponding with throughput in client and server nodes
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 567 Fig 4: Number of mobility nodes corresponding with an average delay in the mobile nodes Fig 5: Number of mobility nodes corresponding with an average Jitter in the mobile nodes The above figure 3-5 show the video transmission packets occurred in mobile nodes in order to archived better quality of metric values (QOM) than fixed wimax scenario. The QoM value can be following parameters as Voice traffic establishment in the source nodes 2 and 5 respectively, similarly VoIP receiver in the destination nodes 3 and 6 respectively. The above two scenarios are comparing the performance analyse in the Voice transition time period (established in source and destination nodes),averagejitter, the average delay in between thetraffic pathbetweensource and destination nodes. Fig 6: Number of mobility nodes corresponding with quene packets (Strict Priority Scheduler) Fig 7: Number of mobility nodes corresponding with de-queue packets (Strict Priority Scheduler) Fig 8: Number of nodes corresponding to IP Delivers TTL sum of packets sent in ISAKMP protocol In the above two figure 6-7 represented as the real time packet transmission over the scheduling round robin algorithm. The video information is converted into packets the then they will arrive the probability of queuing theory.It depends on the total no of establishments of packets and arrival of packets between client and server nodes. In order to obtain maximum guaranteed transmission rates for all active flows with the respect to their priorities and to provide a fair share of the additional bandwidth. In the above figure 8 shows the number of mobile nodes represented as initialized cipher key phase factor with user specified delay after phase one completed. It is also possible to start phase two in authentication when some data packet comes at ISAKMP server and it doesn’t find any IPSec SA for that packet's source and destination networks. The ISAKMP protocol for creating cookies, generating keys and nonce is being simulated by some simple stub functions. The severs nodes established Security Associations (SA) in the wireless links are bidirectional, that is same SA is used for both inbound and outbound packets.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 568 CONCLUSION We experimentally investigated application layered protocols to the quality of metric valuesofSIPprotocol video streaming transmission over peer to peer link in wireless scenario. Video transmission through CBR from source to destination node in the overall scenario investigate throughput, average delay, jitter, SIP analyzed video traffic from source to destination node. The SIP protocol issued new method should be an efficient, fair, high throughput, bandwidth guarantee and that will enhance performance of video transmission over mobile WiMAX. REFERENCES [1] Ehsan Haghani, Shyam Parekh, Doru Calin “A Quality- Driven Cross-Layer Solution forMPEGVideoStreaming Over WiMAX Networks” IEEE Transactions On Multimedia, October 2009, Vol. 11, NO. 6, PP 1140-1148. [2] Jae-Woo So, “Performance Analysis of VoIP Services in the IEEE 802.16e OFDMA System With In band signaling” IEEE Transactions On Vehicular Technology, May 2008,Vol. 57, No. 3, PP 1876 -1886. [3] Castro,M.A.V , Fernandez.D.P “VoIP Cross Layer load Control for Hybrid Satellite WiMAX Networks” June 2008, Issue 3,PP 32-39. [4] Shyam Parekh doru calim, Eunyoung Kim ; Ansari, N “A Quality driven crosslayersolutionforMPEGvideostreaming over WiMAX networks” 2009,Vol 11, issue 6 IEEE transaction on multimedia communication PP1140-1147. [5] Xiangyang Li, Jinhua Guo “Seurity challenge and defense in VoIP infrastructures” 2007, IEEE transaction on systems management and cybernetics part-C application & reviews, Vol 37, Issue 6 PP 1152-1162. [6] Jae-Hyun Kim “Application aware design to enhance system efficiency for VoIP services in BWA Networks” 2011,IEEE transaction on multimedia Vol 13,Issue1PP143- 154. [7] Oktay, Mantar, H.A. “A real time scheduling architecture for IEEE 802.16 –Wimax systems ” Jan 2011, IEEE international conferences, PP 189-194. [8]Gordon –Ross, Munir A “SIP based IMSsignallingAnalysis for WiMAX -3 G internetworking architecture” May 2010, IEEE transaction on mobile computing, Vol 9 issues 5 PP 733-750. [9] Nilanjan Banerjee, Arup Acharya, Sajal K. Das “Seamless SIP-Based Mobility for Multimedia Applications” IEEE Transaction networks March 2006, Vol 20,Issue 2,PP 6-13. [10] M. Atif Qureshi , Arjumand Younus,Muhammad Saeed, Farhan Ahmed Sidiqui,Nasir Touheed“ComparativeStudyof VoIP over WiMAX and WiFi” International Journal of Computer Science Issues, May 2011,Vol. 8, Issue 3, PP 433- 437. [11] Chatterjee, M, Ganguly, S. “Improving quality of VoIP streams over WiMAX” IEEE Transaction On Computers, 2008,Vol 57 ,Issue 2,PP 145-156.
Download now