SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 564
Analytical Model on Secure Transmission for SIP-Video Call Setup for
WiMaxHeterogeneous Networks
S. Jacily Jemila1, S. Chitra2
1,2 Asst. Prof, Department of ECE, Prince Dr.K.Vasudevan college of engineering & Technology, Chennai,
Tamil Nadu, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
ABSTRACT: In LTE networks can provide IP based media
streaming connectivity storage and control solution where
voice, data, video streamed multimedia can be provided to
users on an “Anytime, Anywhere” in the world. The aim of the
work is to estimate quality of metric values with fixed and
mobile WiMAX standards utilized for SIP (Session initialized
protocol) video call setup procedure over wireless link
scenario directed to mobile devices. We used two video call
modes of operationoverheterogeneous WiMAXstandards. The
proposed model application layers in SIP protocol based on
multicast mobile agents used in two different modes of video
call established. Initiate services through CBR used forSession
control overhead packets. Our analytical model provides that
the video call set-up performance, jitter and delay in peer to
peer networks. Moreover, the call setup performance can be
improved significantly using the robust in application link
layer such as SIP with a comparison of WiMAX heterogeneous
network standards proposed in ourpaperandalsotoestablish
and maintain secure transmission via IP based security
services such as ISAKMP protocol in the network layered
protocol. The analytical results were validated by our
experimental measurement.
General Terms
Your general terms must be any term which can be used for
general classification of the submitted material such as
Pattern Recognition, Security, Algorithms et. al.
Keywords: IEEE 802.16. e, ISAKAMP, SIP, Streaming, CBR
INTRODUCTION
In the modern communications world of today, 4G (fourth
generation) mobile wireless standards' goal is to provide
high-speed mobile phone transmissions, which can support
high-quality streaming video and other critical services.
Realizing Video streaming over-LTE Viewing live and
prerecorded video carried over mobile networks are
exploding in popularity with the sharp growth in
Smartphones and the advent of Long Term Evolution (LTE)
next-generation mobile networks. As a result, LTE carriers
and service providers are presented with a compelling
revenue generating opportunity – provided they build LTE
networks optimized for large-scale video streaming. At first
glance LTE, with its far higher bit-rates and IP packet-based
architecture, looks ideally suitedfordeliveringmobilevideo,
including High Definition. But wireless network technology
alone is insufficient. To meet the overwhelming demand for
live and prerecorded mobile video, the transmission
capabilities of LTE networks must be matched by equivalent
increases in video server output. LTE networks will need to
be integrated with server infrastructures with the scaling
capacity, transmission efficiency and wireless network
smarts to handle millions of concurrent requests for High
Definition mobile video streams. This needwill beespecially
acute when large numbers of users request the same video
content at the same time as is increasinglycommon withlive
video streaming of popular events. LTE's increasing use of
unicast networking where a unique streamistransmitted to
every user, even if the content is identical compounds the
requirement for next-generation server infrastructure
Streamonix as a pioneer in streaming High Definition video
over 4th Generation and LTE networks, is uniquely qualified
to assist clients in assessing, designing and building next-
generation video server technologies matched to their LTE
networks.
Challenges for Implementing IEEE 802.16.e
In the data transmission from point to multi point
transmission need for priority based scheduling algorithm
design for the equal importance of transmission of bits then
end of transmission in order to improved high throughput/
traffic modelling and also reduces the loss of transmission
between wireless links. Herestreamingtransmissionvoiceis
more important than video so requirement of issues
continuity of arrival of bitters in collection to archive
significant reductancy at the same time acceptable value of
tolerable.
Security Securing the voice communication is also a big
challenge for VoIP over WiMAX as care has tobetakenthatit
can be eavesdropped with key management IP based
protocol used as two phase process. The Double encryption
process - X.509 for Authentication and 152-bit AES, 3DES or
56-bit DES for data flow ensure the transmission is secure
and eavesdropping is very difficult on the traffic modelling.
Delay Voice transmission over wireless brings along with it
a big problem of packet delay or latency.Thefactorsthatadd
to the delay are the Propagation delay, the serialization
delay, channel coding delay at the physical layer and the
Medium access delay at the MAC layer. Similarly at the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 565
Network layer the Forwarding and the Queuing delays are
encountered, and at the application layer Packetization /
depacketization, delay, Algorithmic delay and look-ahead
delay, decoding delay are inherently caused.
Packet Loss/ Dropped Packets : Packetlossdoesexcessive
damage to the voice signal, as retransmission cannot be
considered as an option while transmitting voice. Loss of
voice framesatunvoiced/voicedtransitioncausessignificant
degradation of the signal. Advanced error detection and
correction algorithms are used to fill the gaps created by the
dropped packets. A sample of the speaker's voice is stored
and is used to create a new sound from an algorithm which
tries to approximate the contents of the dropped packets or
lost packets.
Jitter: When the transmission times of the arriving packets
vary as a result of different queuing times or differentroutes
it is referred to as Jitter. Jitter can be taken care of by using
an adaptive jitter buffer which adapts itself according to the
delay encountered over the networks, to provide a smooth
voice stream at the output.
Strict Priority Scheduler:
The real-time traffic occupies a significant percentage of the
available bandwidth and Internetmustevolvetosupportthe
new applications. Such as VoD (Video on Demand), VoIP
(Voice over IP), VTC (Video-Teleconferencing), interactive
games, distributed virtual collaboration,remoteclassrooms,
grid computing, etc.,The best effort delivery is unacceptable,
since in case of a congestion the Quality of Service (QoS) and
Quality of Experience (QoE) declines to an unsatisfactory
level. The main contribution of this paper is the strict
priority scheduler designed to provide the minimum
guaranteed transmission rate for all active flows with the
respect to their priorities and to provide a fair share of the
additional bandwidth. The scheduler also rejects flows, for
which the minimum rate requirements exceed the available
bandwidth. The proposed solution is applicable for the WiFi
wireless network, to accomplish QoS along the path. The
Strict Priority Scheduler is the default scheduling discipline
in QualNet. It service the highest priority queue until it is
empty, and then moves to the next highest priority queue,
and so on. It is possible that if there is enough high priority
traffic, the lower priorities could be completely frozen out.
We can configure only one node atthefirstschedulerlevel as
strict priority. If any node or queue above the strict-priority
node has packets, it is scheduled next. If multiple queues
above the strict-priority node have packets, the HRR
algorithm (Hierarchical Round Robin) selects which strict-
priority queue is scheduled next. One strict priority traffic-
class group is called the auto-strict-priority group. The
scheduler nodes and queues in theauto-strict-prioritygroup
receives strict-priority scheduling.
ISAKMP Protocol
The ISAKMP is used by AH (Authentication header) and
ESP (encapsulated security payload) to establish the
security associations needed to accomplish the protocols.
However ISAKMP advantages can be exploited by any other
security protocol, and in this way it will be possible to
avoid the duplicity of single purpose negotiations of
security parameters. Current security protocols negotiate
its parameters by the exchanging messages. The ISAKMP
protocol is divided into two phases. In the first phase the
parties establish a ciphering key by a key establishment
protocol. Once the key is established, they authenticate
one each other and negotiate how to protect the second
phase. In the second phase, this is made the negotiation of
the security parameters on behalf of any security service.
This second phase is protected using the parameters.
RELATED WORKS
There are many papers proposed in VOIP based video
streaming technologywithH.323/SIPprotocols.Theauthors
are mainly concerned with routing protocol based
transmission in order to achieve high robustness and
capacity of voice transmission over IP networks various
methodologies have been implemented and verified they
proceed.
[1] Ehsan Haghani et al estimatesthequality ofmetricvalues
for MPEG standard video transmission and anaysised cross
layer solution over Wimax scenario [2] Jae-Woo So et al
investigated the OFDM (Orthogonal Frequency division
multiplexing) system VoIP based up/down link signalling
overhead information streaming over IEEE 802.16. e
networks. [3] Castro, M.A.V et al investigated video
streaming under temperate and tropical propagation
conditions based on DVB-S2/RCS and WiMax standards. [4]
Shyam Parekh et al examined mobile user provide high
speed network connectivity and satisfies different quality of
metric values while optimizing resourceallocationproblem.
[5] Xiangyang Li et al proposed the concerns and
requirements of VoIP security and it is review of security
issues and the defence mechanismsandalsofocusonattacks
and countermeasures unique to VoIP systems [6] Jae-Hyun
Kim et al investigate the maximum number of supportable
VoIP users for the resource request schemes in terms of the
packet-generation-interval in the silent-period,theduration
of the silent-period, and the major VoIP speech codes. [7]
Oktay, M. Et al examined Earliest deadline first scheduling
algorithm commonly used in the VoIP and VoD in wire and
wireless application in order toimprovethequalityofmetric
values. [8] Gordon –Ross et al analysed two novel
interworking architectures to integrate WiMax and third-
generation (3G) networks. And also analyse the SIP-
based IMS registration and session setupsignallingdelayfor
3G and WiMax networks with specific reference to their
interworking architectures. [9] Nilanjan Banerjee et al
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 566
examined in the undesirable delayandpacketlosscoexisting
with heterogeneous IP based network and also achieved
good quality of services in application layered SIP protocol.
[10] M. Atif Qureshi comparative analysis voice traffic
pattern of the MAC and transport layer (TCP/UDP) in the
Wimax and Wifi architecture
SIMULATION RESULTS:
We use a Qualnet simulator as our performance analysis
platforms various evaluation parameters include the time
between 1st and last packet, no of packets, Average packet
size, and throughput of the simulated scenario. The
simulation parameters are summarized in table1. We
designed the infrastructure networksSetupcontaining12no
of nodes. We are compiling the all nodes with video trafficin
VoIP transmission between the source and destination
nodes. Our work is investigating voice quality of metric
values of a fixed WiMax and mobility WiMax providers in
different coverage area, enterprise warehouse and wireless
security surveillance under the mobility nodes scenario.
Table 1. Parameters for Simulation Evaluation
Parameters IEEE 802.16 IEEE 802.16.e
Data rate 52 Mbps 52 Mbps
No of Nodes 12 12
Application SIP SIP
Routing
Protocol
Bellmen ford DSR
Traffic Type CBR (video) CBR (video)
Running Time 300s 320s
File Name
Terminal alias
address file
(.endpoint)
Terminal alias
address file
(.endpoint)
Simulation area 900×900 m2 1000×1000 m2
The qualities of metrics are analyzedinthevideoestablished
between two different VoIP users in fixed and mobile
WiMAX standards. Videotraffic applies between2/3and 5/6
respectively. The two applications layered protocols are SIP
and H.323 protocol respectively. The transport layer is
generating traffic in RTP/RTCP protocol services. We
analyzed average jitter, average delay, CBR in client and
server nodes are taken into SIP application layered
protocols.
Fig 1: Snapshot of IEEE 802.116 for SIP Protocol for
VoIP transmission in Qualnet simulator
Fig 2: Snapshot of IEEE 802.116. e for SIP Protocol for
VoIP transmission in Qualnet simulator
Fig 3: Number of mobility nodes corresponding with
throughput in client and server nodes
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 567
Fig 4: Number of mobility nodes corresponding with
an average delay in the mobile nodes
Fig 5: Number of mobility nodes corresponding with
an average Jitter in the mobile nodes
The above figure 3-5 show the video transmission packets
occurred in mobile nodes in order to archived better quality
of metric values (QOM) than fixed wimax scenario. The QoM
value can be following parameters as Voice traffic
establishment in the source nodes 2 and 5 respectively,
similarly VoIP receiver in the destination nodes 3 and 6
respectively. The above two scenarios are comparing the
performance analyse in the Voice transition time period
(established in source and destination nodes),averagejitter,
the average delay in between thetraffic pathbetweensource
and destination nodes.
Fig 6: Number of mobility nodes corresponding with
quene packets (Strict Priority Scheduler)
Fig 7: Number of mobility nodes corresponding with
de-queue packets (Strict Priority Scheduler)
Fig 8: Number of nodes corresponding to IP Delivers
TTL sum of packets sent in ISAKMP protocol
In the above two figure 6-7 represented as the real time
packet transmission over the scheduling round robin
algorithm. The video information is converted into packets
the then they will arrive the probability of queuing theory.It
depends on the total no of establishments of packets and
arrival of packets between client and server nodes. In order
to obtain maximum guaranteed transmission rates for all
active flows with the respect to their priorities and to
provide a fair share of the additional bandwidth.
In the above figure 8 shows the number of mobile nodes
represented as initialized cipher key phase factor with user
specified delay after phase one completed. It is also possible
to start phase two in authentication when some data packet
comes at ISAKMP server and it doesn’t find any IPSec SA for
that packet's source and destination networks. The ISAKMP
protocol for creating cookies, generating keys and nonce is
being simulated by some simple stub functions. The severs
nodes established Security Associations (SA) in the wireless
links are bidirectional, that is same SA is used for both
inbound and outbound packets.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 568
CONCLUSION
We experimentally investigated application layered
protocols to the quality of metric valuesofSIPprotocol video
streaming transmission over peer to peer link in wireless
scenario. Video transmission through CBR from source to
destination node in the overall scenario investigate
throughput, average delay, jitter, SIP analyzed video traffic
from source to destination node. The SIP protocol issued
new method should be an efficient, fair, high throughput,
bandwidth guarantee and that will enhance performance of
video transmission over mobile WiMAX.
REFERENCES
[1] Ehsan Haghani, Shyam Parekh, Doru Calin “A Quality-
Driven Cross-Layer Solution forMPEGVideoStreaming Over
WiMAX Networks” IEEE Transactions On Multimedia,
October 2009, Vol. 11, NO. 6, PP 1140-1148.
[2] Jae-Woo So, “Performance Analysis of VoIP Services in
the IEEE 802.16e OFDMA System With In band signaling”
IEEE Transactions On Vehicular Technology, May 2008,Vol.
57, No. 3, PP 1876 -1886.
[3] Castro,M.A.V , Fernandez.D.P “VoIP Cross Layer load
Control for Hybrid Satellite WiMAX Networks” June 2008,
Issue 3,PP 32-39.
[4] Shyam Parekh doru calim, Eunyoung Kim ; Ansari, N “A
Quality driven crosslayersolutionforMPEGvideostreaming
over WiMAX networks” 2009,Vol 11, issue 6 IEEE
transaction on multimedia communication PP1140-1147.
[5] Xiangyang Li, Jinhua Guo “Seurity challenge and defense
in VoIP infrastructures” 2007, IEEE transaction on systems
management and cybernetics part-C application & reviews,
Vol 37, Issue 6 PP 1152-1162.
[6] Jae-Hyun Kim “Application aware design to enhance
system efficiency for VoIP services in BWA Networks”
2011,IEEE transaction on multimedia Vol 13,Issue1PP143-
154.
[7] Oktay, Mantar, H.A. “A real time scheduling architecture
for IEEE 802.16 –Wimax systems ” Jan 2011, IEEE
international conferences, PP 189-194.
[8]Gordon –Ross, Munir A “SIP based IMSsignallingAnalysis
for WiMAX -3 G internetworking architecture” May 2010,
IEEE transaction on mobile computing, Vol 9 issues 5 PP
733-750.
[9] Nilanjan Banerjee, Arup Acharya, Sajal K. Das “Seamless
SIP-Based Mobility for Multimedia Applications” IEEE
Transaction networks March 2006, Vol 20,Issue 2,PP 6-13.
[10] M. Atif Qureshi , Arjumand Younus,Muhammad Saeed,
Farhan Ahmed Sidiqui,Nasir Touheed“ComparativeStudyof
VoIP over WiMAX and WiFi” International Journal of
Computer Science Issues, May 2011,Vol. 8, Issue 3, PP 433-
437.
[11] Chatterjee, M, Ganguly, S. “Improving quality of VoIP
streams over WiMAX” IEEE Transaction On Computers,
2008,Vol 57 ,Issue 2,PP 145-156.

More Related Content

What's hot

Accelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceAccelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceADVA
 
Span Design considerations in TAT-14 US Backhaul across G.652 Fiber
Span Design considerations in TAT-14 US Backhaul across G.652 FiberSpan Design considerations in TAT-14 US Backhaul across G.652 Fiber
Span Design considerations in TAT-14 US Backhaul across G.652 FiberRoderick Dottin
 
Iccbn Presentation - optical
Iccbn Presentation - opticalIccbn Presentation - optical
Iccbn Presentation - opticalroysoumya
 
Grant free iot
Grant free iotGrant free iot
Grant free iotamin azari
 
6TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 20156TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 2015Pascal Thubert
 
PhD proposal in KTH, By Amin Azari
PhD proposal in KTH, By Amin AzariPhD proposal in KTH, By Amin Azari
PhD proposal in KTH, By Amin Azariamin azari
 
Lte Presentation.Ppt
Lte Presentation.PptLte Presentation.Ppt
Lte Presentation.Pptvaimalik
 
VR and AR are Pushing Connectivity Limits
VR and AR are Pushing Connectivity LimitsVR and AR are Pushing Connectivity Limits
VR and AR are Pushing Connectivity LimitsQualcomm Research
 
URLLC: Recent Research and Road Ahead
URLLC: Recent Research and Road AheadURLLC: Recent Research and Road Ahead
URLLC: Recent Research and Road AheadMehdi Bennis
 
5G live virtual classroom - trainig program
5G live virtual classroom - trainig program5G live virtual classroom - trainig program
5G live virtual classroom - trainig programNordinRamli
 
Research portfolio
Research portfolio Research portfolio
Research portfolio Mehdi Bennis
 
MPLS in Mobile Backhaul
MPLS in Mobile BackhaulMPLS in Mobile Backhaul
MPLS in Mobile BackhaulScott Foster
 
Enabling 5G with NFV: New Joint White Paper Outlining Network Operator Perspe...
Enabling 5G with NFV: New Joint White Paper Outlining Network Operator Perspe...Enabling 5G with NFV: New Joint White Paper Outlining Network Operator Perspe...
Enabling 5G with NFV: New Joint White Paper Outlining Network Operator Perspe...Open Networking Summit
 
SHARP: In-Network Scalable Hierarchical Aggregation and Reduction Protocol
SHARP: In-Network Scalable Hierarchical Aggregation and Reduction ProtocolSHARP: In-Network Scalable Hierarchical Aggregation and Reduction Protocol
SHARP: In-Network Scalable Hierarchical Aggregation and Reduction Protocolinside-BigData.com
 
4G (LTE) Business Case for 2.6 GHz
4G (LTE) Business Case for 2.6 GHz4G (LTE) Business Case for 2.6 GHz
4G (LTE) Business Case for 2.6 GHzAndrea Calcagno
 
VoWLAN: Call Quality
VoWLAN: Call QualityVoWLAN: Call Quality
VoWLAN: Call Quality3G4G
 
InfiniBand In-Network Computing Technology and Roadmap
InfiniBand In-Network Computing Technology and RoadmapInfiniBand In-Network Computing Technology and Roadmap
InfiniBand In-Network Computing Technology and Roadmapinside-BigData.com
 

What's hot (20)

Accelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceAccelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assurance
 
Span Design considerations in TAT-14 US Backhaul across G.652 Fiber
Span Design considerations in TAT-14 US Backhaul across G.652 FiberSpan Design considerations in TAT-14 US Backhaul across G.652 Fiber
Span Design considerations in TAT-14 US Backhaul across G.652 Fiber
 
Iccbn Presentation - optical
Iccbn Presentation - opticalIccbn Presentation - optical
Iccbn Presentation - optical
 
Grant free iot
Grant free iotGrant free iot
Grant free iot
 
6TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 20156TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 2015
 
PhD proposal in KTH, By Amin Azari
PhD proposal in KTH, By Amin AzariPhD proposal in KTH, By Amin Azari
PhD proposal in KTH, By Amin Azari
 
Lte Presentation.Ppt
Lte Presentation.PptLte Presentation.Ppt
Lte Presentation.Ppt
 
Gailtel
GailtelGailtel
Gailtel
 
VR and AR are Pushing Connectivity Limits
VR and AR are Pushing Connectivity LimitsVR and AR are Pushing Connectivity Limits
VR and AR are Pushing Connectivity Limits
 
URLLC: Recent Research and Road Ahead
URLLC: Recent Research and Road AheadURLLC: Recent Research and Road Ahead
URLLC: Recent Research and Road Ahead
 
URLLC keynote
URLLC keynoteURLLC keynote
URLLC keynote
 
5G live virtual classroom - trainig program
5G live virtual classroom - trainig program5G live virtual classroom - trainig program
5G live virtual classroom - trainig program
 
Research portfolio
Research portfolio Research portfolio
Research portfolio
 
HSTR Seminar
HSTR SeminarHSTR Seminar
HSTR Seminar
 
MPLS in Mobile Backhaul
MPLS in Mobile BackhaulMPLS in Mobile Backhaul
MPLS in Mobile Backhaul
 
Enabling 5G with NFV: New Joint White Paper Outlining Network Operator Perspe...
Enabling 5G with NFV: New Joint White Paper Outlining Network Operator Perspe...Enabling 5G with NFV: New Joint White Paper Outlining Network Operator Perspe...
Enabling 5G with NFV: New Joint White Paper Outlining Network Operator Perspe...
 
SHARP: In-Network Scalable Hierarchical Aggregation and Reduction Protocol
SHARP: In-Network Scalable Hierarchical Aggregation and Reduction ProtocolSHARP: In-Network Scalable Hierarchical Aggregation and Reduction Protocol
SHARP: In-Network Scalable Hierarchical Aggregation and Reduction Protocol
 
4G (LTE) Business Case for 2.6 GHz
4G (LTE) Business Case for 2.6 GHz4G (LTE) Business Case for 2.6 GHz
4G (LTE) Business Case for 2.6 GHz
 
VoWLAN: Call Quality
VoWLAN: Call QualityVoWLAN: Call Quality
VoWLAN: Call Quality
 
InfiniBand In-Network Computing Technology and Roadmap
InfiniBand In-Network Computing Technology and RoadmapInfiniBand In-Network Computing Technology and Roadmap
InfiniBand In-Network Computing Technology and Roadmap
 

Similar to Analytical Model on Secure Transmission for SIP-Video Call Setup for WiMax Heterogeneous Networks

Shahnshah Sarker 072802556
Shahnshah Sarker  072802556Shahnshah Sarker  072802556
Shahnshah Sarker 072802556mashiur
 
Comparisons of QoS in VoIP over WIMAX by Varying the Voice codes and Buffer size
Comparisons of QoS in VoIP over WIMAX by Varying the Voice codes and Buffer sizeComparisons of QoS in VoIP over WIMAX by Varying the Voice codes and Buffer size
Comparisons of QoS in VoIP over WIMAX by Varying the Voice codes and Buffer sizeEditor IJCATR
 
ETE405-lec4.pdf
ETE405-lec4.pdfETE405-lec4.pdf
ETE405-lec4.pdfmashiur
 
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTEPerformance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTEIRJET Journal
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
 
Diameter Penetration Test Lab
Diameter Penetration Test LabDiameter Penetration Test Lab
Diameter Penetration Test Labfrcarlson
 
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...IJCNCJournal
 
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...IJCNCJournal
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...IRJET Journal
 
Vo ip on 3gpp lte network a survey
Vo ip on 3gpp lte network a surveyVo ip on 3gpp lte network a survey
Vo ip on 3gpp lte network a surveyAlexander Decker
 
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...IJERA Editor
 
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...ijwmn
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...csandit
 
Voip
VoipVoip
VoipPTCL
 
Mohammad Faisal Kairm(073714556) Assignment 2
Mohammad Faisal Kairm(073714556) Assignment 2Mohammad Faisal Kairm(073714556) Assignment 2
Mohammad Faisal Kairm(073714556) Assignment 2mashiur
 

Similar to Analytical Model on Secure Transmission for SIP-Video Call Setup for WiMax Heterogeneous Networks (20)

Shahnshah Sarker 072802556
Shahnshah Sarker  072802556Shahnshah Sarker  072802556
Shahnshah Sarker 072802556
 
Comparisons of QoS in VoIP over WIMAX by Varying the Voice codes and Buffer size
Comparisons of QoS in VoIP over WIMAX by Varying the Voice codes and Buffer sizeComparisons of QoS in VoIP over WIMAX by Varying the Voice codes and Buffer size
Comparisons of QoS in VoIP over WIMAX by Varying the Voice codes and Buffer size
 
[32]
[32][32]
[32]
 
ETE405-lec4.pdf
ETE405-lec4.pdfETE405-lec4.pdf
ETE405-lec4.pdf
 
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTEPerformance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
Diameter Penetration Test Lab
Diameter Penetration Test LabDiameter Penetration Test Lab
Diameter Penetration Test Lab
 
CTIA 2010 Corporate Overview
CTIA 2010 Corporate OverviewCTIA 2010 Corporate Overview
CTIA 2010 Corporate Overview
 
R43019698
R43019698R43019698
R43019698
 
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
 
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 ...
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
 
Vo ip on 3gpp lte network a survey
Vo ip on 3gpp lte network a surveyVo ip on 3gpp lte network a survey
Vo ip on 3gpp lte network a survey
 
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
 
CES 2010 FemtoZone
CES 2010 FemtoZoneCES 2010 FemtoZone
CES 2010 FemtoZone
 
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...
 
Ip virtual leased line
Ip virtual leased lineIp virtual leased line
Ip virtual leased line
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
 
Voip
VoipVoip
Voip
 
Mohammad Faisal Kairm(073714556) Assignment 2
Mohammad Faisal Kairm(073714556) Assignment 2Mohammad Faisal Kairm(073714556) Assignment 2
Mohammad Faisal Kairm(073714556) Assignment 2
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257subhasishdas79
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)ChandrakantDivate1
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 

Recently uploaded (20)

Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 

Analytical Model on Secure Transmission for SIP-Video Call Setup for WiMax Heterogeneous Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 564 Analytical Model on Secure Transmission for SIP-Video Call Setup for WiMaxHeterogeneous Networks S. Jacily Jemila1, S. Chitra2 1,2 Asst. Prof, Department of ECE, Prince Dr.K.Vasudevan college of engineering & Technology, Chennai, Tamil Nadu, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- ABSTRACT: In LTE networks can provide IP based media streaming connectivity storage and control solution where voice, data, video streamed multimedia can be provided to users on an “Anytime, Anywhere” in the world. The aim of the work is to estimate quality of metric values with fixed and mobile WiMAX standards utilized for SIP (Session initialized protocol) video call setup procedure over wireless link scenario directed to mobile devices. We used two video call modes of operationoverheterogeneous WiMAXstandards. The proposed model application layers in SIP protocol based on multicast mobile agents used in two different modes of video call established. Initiate services through CBR used forSession control overhead packets. Our analytical model provides that the video call set-up performance, jitter and delay in peer to peer networks. Moreover, the call setup performance can be improved significantly using the robust in application link layer such as SIP with a comparison of WiMAX heterogeneous network standards proposed in ourpaperandalsotoestablish and maintain secure transmission via IP based security services such as ISAKMP protocol in the network layered protocol. The analytical results were validated by our experimental measurement. General Terms Your general terms must be any term which can be used for general classification of the submitted material such as Pattern Recognition, Security, Algorithms et. al. Keywords: IEEE 802.16. e, ISAKAMP, SIP, Streaming, CBR INTRODUCTION In the modern communications world of today, 4G (fourth generation) mobile wireless standards' goal is to provide high-speed mobile phone transmissions, which can support high-quality streaming video and other critical services. Realizing Video streaming over-LTE Viewing live and prerecorded video carried over mobile networks are exploding in popularity with the sharp growth in Smartphones and the advent of Long Term Evolution (LTE) next-generation mobile networks. As a result, LTE carriers and service providers are presented with a compelling revenue generating opportunity – provided they build LTE networks optimized for large-scale video streaming. At first glance LTE, with its far higher bit-rates and IP packet-based architecture, looks ideally suitedfordeliveringmobilevideo, including High Definition. But wireless network technology alone is insufficient. To meet the overwhelming demand for live and prerecorded mobile video, the transmission capabilities of LTE networks must be matched by equivalent increases in video server output. LTE networks will need to be integrated with server infrastructures with the scaling capacity, transmission efficiency and wireless network smarts to handle millions of concurrent requests for High Definition mobile video streams. This needwill beespecially acute when large numbers of users request the same video content at the same time as is increasinglycommon withlive video streaming of popular events. LTE's increasing use of unicast networking where a unique streamistransmitted to every user, even if the content is identical compounds the requirement for next-generation server infrastructure Streamonix as a pioneer in streaming High Definition video over 4th Generation and LTE networks, is uniquely qualified to assist clients in assessing, designing and building next- generation video server technologies matched to their LTE networks. Challenges for Implementing IEEE 802.16.e In the data transmission from point to multi point transmission need for priority based scheduling algorithm design for the equal importance of transmission of bits then end of transmission in order to improved high throughput/ traffic modelling and also reduces the loss of transmission between wireless links. Herestreamingtransmissionvoiceis more important than video so requirement of issues continuity of arrival of bitters in collection to archive significant reductancy at the same time acceptable value of tolerable. Security Securing the voice communication is also a big challenge for VoIP over WiMAX as care has tobetakenthatit can be eavesdropped with key management IP based protocol used as two phase process. The Double encryption process - X.509 for Authentication and 152-bit AES, 3DES or 56-bit DES for data flow ensure the transmission is secure and eavesdropping is very difficult on the traffic modelling. Delay Voice transmission over wireless brings along with it a big problem of packet delay or latency.Thefactorsthatadd to the delay are the Propagation delay, the serialization delay, channel coding delay at the physical layer and the Medium access delay at the MAC layer. Similarly at the
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 565 Network layer the Forwarding and the Queuing delays are encountered, and at the application layer Packetization / depacketization, delay, Algorithmic delay and look-ahead delay, decoding delay are inherently caused. Packet Loss/ Dropped Packets : Packetlossdoesexcessive damage to the voice signal, as retransmission cannot be considered as an option while transmitting voice. Loss of voice framesatunvoiced/voicedtransitioncausessignificant degradation of the signal. Advanced error detection and correction algorithms are used to fill the gaps created by the dropped packets. A sample of the speaker's voice is stored and is used to create a new sound from an algorithm which tries to approximate the contents of the dropped packets or lost packets. Jitter: When the transmission times of the arriving packets vary as a result of different queuing times or differentroutes it is referred to as Jitter. Jitter can be taken care of by using an adaptive jitter buffer which adapts itself according to the delay encountered over the networks, to provide a smooth voice stream at the output. Strict Priority Scheduler: The real-time traffic occupies a significant percentage of the available bandwidth and Internetmustevolvetosupportthe new applications. Such as VoD (Video on Demand), VoIP (Voice over IP), VTC (Video-Teleconferencing), interactive games, distributed virtual collaboration,remoteclassrooms, grid computing, etc.,The best effort delivery is unacceptable, since in case of a congestion the Quality of Service (QoS) and Quality of Experience (QoE) declines to an unsatisfactory level. The main contribution of this paper is the strict priority scheduler designed to provide the minimum guaranteed transmission rate for all active flows with the respect to their priorities and to provide a fair share of the additional bandwidth. The scheduler also rejects flows, for which the minimum rate requirements exceed the available bandwidth. The proposed solution is applicable for the WiFi wireless network, to accomplish QoS along the path. The Strict Priority Scheduler is the default scheduling discipline in QualNet. It service the highest priority queue until it is empty, and then moves to the next highest priority queue, and so on. It is possible that if there is enough high priority traffic, the lower priorities could be completely frozen out. We can configure only one node atthefirstschedulerlevel as strict priority. If any node or queue above the strict-priority node has packets, it is scheduled next. If multiple queues above the strict-priority node have packets, the HRR algorithm (Hierarchical Round Robin) selects which strict- priority queue is scheduled next. One strict priority traffic- class group is called the auto-strict-priority group. The scheduler nodes and queues in theauto-strict-prioritygroup receives strict-priority scheduling. ISAKMP Protocol The ISAKMP is used by AH (Authentication header) and ESP (encapsulated security payload) to establish the security associations needed to accomplish the protocols. However ISAKMP advantages can be exploited by any other security protocol, and in this way it will be possible to avoid the duplicity of single purpose negotiations of security parameters. Current security protocols negotiate its parameters by the exchanging messages. The ISAKMP protocol is divided into two phases. In the first phase the parties establish a ciphering key by a key establishment protocol. Once the key is established, they authenticate one each other and negotiate how to protect the second phase. In the second phase, this is made the negotiation of the security parameters on behalf of any security service. This second phase is protected using the parameters. RELATED WORKS There are many papers proposed in VOIP based video streaming technologywithH.323/SIPprotocols.Theauthors are mainly concerned with routing protocol based transmission in order to achieve high robustness and capacity of voice transmission over IP networks various methodologies have been implemented and verified they proceed. [1] Ehsan Haghani et al estimatesthequality ofmetricvalues for MPEG standard video transmission and anaysised cross layer solution over Wimax scenario [2] Jae-Woo So et al investigated the OFDM (Orthogonal Frequency division multiplexing) system VoIP based up/down link signalling overhead information streaming over IEEE 802.16. e networks. [3] Castro, M.A.V et al investigated video streaming under temperate and tropical propagation conditions based on DVB-S2/RCS and WiMax standards. [4] Shyam Parekh et al examined mobile user provide high speed network connectivity and satisfies different quality of metric values while optimizing resourceallocationproblem. [5] Xiangyang Li et al proposed the concerns and requirements of VoIP security and it is review of security issues and the defence mechanismsandalsofocusonattacks and countermeasures unique to VoIP systems [6] Jae-Hyun Kim et al investigate the maximum number of supportable VoIP users for the resource request schemes in terms of the packet-generation-interval in the silent-period,theduration of the silent-period, and the major VoIP speech codes. [7] Oktay, M. Et al examined Earliest deadline first scheduling algorithm commonly used in the VoIP and VoD in wire and wireless application in order toimprovethequalityofmetric values. [8] Gordon –Ross et al analysed two novel interworking architectures to integrate WiMax and third- generation (3G) networks. And also analyse the SIP- based IMS registration and session setupsignallingdelayfor 3G and WiMax networks with specific reference to their interworking architectures. [9] Nilanjan Banerjee et al
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 566 examined in the undesirable delayandpacketlosscoexisting with heterogeneous IP based network and also achieved good quality of services in application layered SIP protocol. [10] M. Atif Qureshi comparative analysis voice traffic pattern of the MAC and transport layer (TCP/UDP) in the Wimax and Wifi architecture SIMULATION RESULTS: We use a Qualnet simulator as our performance analysis platforms various evaluation parameters include the time between 1st and last packet, no of packets, Average packet size, and throughput of the simulated scenario. The simulation parameters are summarized in table1. We designed the infrastructure networksSetupcontaining12no of nodes. We are compiling the all nodes with video trafficin VoIP transmission between the source and destination nodes. Our work is investigating voice quality of metric values of a fixed WiMax and mobility WiMax providers in different coverage area, enterprise warehouse and wireless security surveillance under the mobility nodes scenario. Table 1. Parameters for Simulation Evaluation Parameters IEEE 802.16 IEEE 802.16.e Data rate 52 Mbps 52 Mbps No of Nodes 12 12 Application SIP SIP Routing Protocol Bellmen ford DSR Traffic Type CBR (video) CBR (video) Running Time 300s 320s File Name Terminal alias address file (.endpoint) Terminal alias address file (.endpoint) Simulation area 900×900 m2 1000×1000 m2 The qualities of metrics are analyzedinthevideoestablished between two different VoIP users in fixed and mobile WiMAX standards. Videotraffic applies between2/3and 5/6 respectively. The two applications layered protocols are SIP and H.323 protocol respectively. The transport layer is generating traffic in RTP/RTCP protocol services. We analyzed average jitter, average delay, CBR in client and server nodes are taken into SIP application layered protocols. Fig 1: Snapshot of IEEE 802.116 for SIP Protocol for VoIP transmission in Qualnet simulator Fig 2: Snapshot of IEEE 802.116. e for SIP Protocol for VoIP transmission in Qualnet simulator Fig 3: Number of mobility nodes corresponding with throughput in client and server nodes
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 567 Fig 4: Number of mobility nodes corresponding with an average delay in the mobile nodes Fig 5: Number of mobility nodes corresponding with an average Jitter in the mobile nodes The above figure 3-5 show the video transmission packets occurred in mobile nodes in order to archived better quality of metric values (QOM) than fixed wimax scenario. The QoM value can be following parameters as Voice traffic establishment in the source nodes 2 and 5 respectively, similarly VoIP receiver in the destination nodes 3 and 6 respectively. The above two scenarios are comparing the performance analyse in the Voice transition time period (established in source and destination nodes),averagejitter, the average delay in between thetraffic pathbetweensource and destination nodes. Fig 6: Number of mobility nodes corresponding with quene packets (Strict Priority Scheduler) Fig 7: Number of mobility nodes corresponding with de-queue packets (Strict Priority Scheduler) Fig 8: Number of nodes corresponding to IP Delivers TTL sum of packets sent in ISAKMP protocol In the above two figure 6-7 represented as the real time packet transmission over the scheduling round robin algorithm. The video information is converted into packets the then they will arrive the probability of queuing theory.It depends on the total no of establishments of packets and arrival of packets between client and server nodes. In order to obtain maximum guaranteed transmission rates for all active flows with the respect to their priorities and to provide a fair share of the additional bandwidth. In the above figure 8 shows the number of mobile nodes represented as initialized cipher key phase factor with user specified delay after phase one completed. It is also possible to start phase two in authentication when some data packet comes at ISAKMP server and it doesn’t find any IPSec SA for that packet's source and destination networks. The ISAKMP protocol for creating cookies, generating keys and nonce is being simulated by some simple stub functions. The severs nodes established Security Associations (SA) in the wireless links are bidirectional, that is same SA is used for both inbound and outbound packets.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 568 CONCLUSION We experimentally investigated application layered protocols to the quality of metric valuesofSIPprotocol video streaming transmission over peer to peer link in wireless scenario. Video transmission through CBR from source to destination node in the overall scenario investigate throughput, average delay, jitter, SIP analyzed video traffic from source to destination node. The SIP protocol issued new method should be an efficient, fair, high throughput, bandwidth guarantee and that will enhance performance of video transmission over mobile WiMAX. REFERENCES [1] Ehsan Haghani, Shyam Parekh, Doru Calin “A Quality- Driven Cross-Layer Solution forMPEGVideoStreaming Over WiMAX Networks” IEEE Transactions On Multimedia, October 2009, Vol. 11, NO. 6, PP 1140-1148. [2] Jae-Woo So, “Performance Analysis of VoIP Services in the IEEE 802.16e OFDMA System With In band signaling” IEEE Transactions On Vehicular Technology, May 2008,Vol. 57, No. 3, PP 1876 -1886. [3] Castro,M.A.V , Fernandez.D.P “VoIP Cross Layer load Control for Hybrid Satellite WiMAX Networks” June 2008, Issue 3,PP 32-39. [4] Shyam Parekh doru calim, Eunyoung Kim ; Ansari, N “A Quality driven crosslayersolutionforMPEGvideostreaming over WiMAX networks” 2009,Vol 11, issue 6 IEEE transaction on multimedia communication PP1140-1147. [5] Xiangyang Li, Jinhua Guo “Seurity challenge and defense in VoIP infrastructures” 2007, IEEE transaction on systems management and cybernetics part-C application & reviews, Vol 37, Issue 6 PP 1152-1162. [6] Jae-Hyun Kim “Application aware design to enhance system efficiency for VoIP services in BWA Networks” 2011,IEEE transaction on multimedia Vol 13,Issue1PP143- 154. [7] Oktay, Mantar, H.A. “A real time scheduling architecture for IEEE 802.16 –Wimax systems ” Jan 2011, IEEE international conferences, PP 189-194. [8]Gordon –Ross, Munir A “SIP based IMSsignallingAnalysis for WiMAX -3 G internetworking architecture” May 2010, IEEE transaction on mobile computing, Vol 9 issues 5 PP 733-750. [9] Nilanjan Banerjee, Arup Acharya, Sajal K. Das “Seamless SIP-Based Mobility for Multimedia Applications” IEEE Transaction networks March 2006, Vol 20,Issue 2,PP 6-13. [10] M. Atif Qureshi , Arjumand Younus,Muhammad Saeed, Farhan Ahmed Sidiqui,Nasir Touheed“ComparativeStudyof VoIP over WiMAX and WiFi” International Journal of Computer Science Issues, May 2011,Vol. 8, Issue 3, PP 433- 437. [11] Chatterjee, M, Ganguly, S. “Improving quality of VoIP streams over WiMAX” IEEE Transaction On Computers, 2008,Vol 57 ,Issue 2,PP 145-156.