IPTV (Internet Protocol Television) includes several video components. The IMS (IP Multimedia Subsystem) cannot differentiate between them what causes their treatment similarly. These sub-components must have different priorities because they have distinct QoS constraints. In this paper, we suggest the implementation of IPTV in a heterogeneous network that improved QoS by providing the capability to prioritize the sub traffic according to the system administrator policy. A new IPv6 flow label field definition was proposed that is ready for standardization. OPNET Modeler software is used to design our approached architecture. The results show that IPTV users receive different amounts of video data based on the stream's priority.
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
Worldwide Interoperability for Microwave Access (WiMAX) is currently one of the
hottest technologies in wireless communication. It is a standard based on the IEEE 802.16 wireless
technology that provides a very high throughput broadband connections over long distances. In
parallel, Voice Over Internet Protocol (VoIP) is a new technology which provides access to voice
communication over internet protocol and hence it is becomes an alternative to public switched
telephone networks (PSTN) due to its capability of transmission of voice as packets over IP
networks. A lot of research has been done in analyzing the performances of VoIP traffic over
WiMAX network. In this paper we review the analysis carried out by several authors for the most
common VoIP codec’s which are G.711, G.723.1 and G.729 over a WiMAX network using various
service classes. The objective is to compare the results for different types of service classes with
respect to the QoS parameters such as throughput, average delay and average jitter.
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
The quality of service is a need in recent computer network developments. The present paper evaluates some characteristics in a proposed network topology such as dropped packets and bandwidth use, using two traffic sources, firstly a VoIP source over an UDP agent, then a CBR traffic source over an UDP agent as well as the previous one. Two possible configurations are proposed, implementing both of them in the Network Simulator, and implementing in one of them differentiated services to compare the results. Statistics results are shown, in both cases showing the accumulative dropped packet number and the throughput in the link, obtaining a reducer number of dropped packets in the stage with differentiated services, and an improvement in the bandwidth use.
Multicasting Of Adaptively-Encoded MPEG4 Over Qos-Cognizant IP NetworksEditor IJMTER
we propose a novel architectural planning for multicasting of adaptively-encoded
layered MPEG4 over a QoS-aware IP network. We re-quire a QoS-aware IP network in this case to
(1) Support priority dropping of packets in time of congestion. (2) Provide congestion notification to
the multicast sender. For the first requirement, we use RED's extension for service differentiation. It
recognizes the priority of packets when they need to be dropped and drops lower priority packets
first. We couple RED with our proposal for the second requirement which is the adoption of
Backward Explicit Congestion Notification (BECN) for use with IP multicast. BECN will provide
early congestion notification at the IP layer level to the video sender. BECN detects upcoming
congestion based on size of the RED queue in the routers. The MPEG4 adaptive-encoder can change
the sending rate and also can divide the video packets into lower priority packets and high priority
packets. Based on BECN messages from the routers, a simple flow controller at the sender sets the
rate for the adaptive MPEG4 encoder and also sets the ratio between the high priority and low
priority packets within the video stream. We use a TES model for generating the MPEG4 traffic that
is based on real video traces. Simulation results show that combining priority dropping, MPEG4
adaptive encoding, and multicast BECN: (1) Improves bandwidth utilization (2) Reduces time to
react to congestion and hence improves the received video quality (3) Maintains graceful degradation
in quality with congestion and provides minimum quality even if congestion persists.
Video contents prior storing server forIJCNCJournal
One of the most important multimedia applications is Internet protocol TV (IPTV) for next-generation
networks. IPTV provides triple-play services that require high-speed access networks with the functions of
multicasting and quality of service (QoS) guarantees. Among optical access networks, Ethernet passive
optical networks (EPONs) are regarded as among the best solutions to meet higher bandwidth demands. In
this paper, we propose a new architecture for multicasting live IPTV traffic in optical access network. The
proposed mechanism involves assigning a unique logical link identifier to each IPTV channel. To manage
multicasting, a prior storing server in the optical line terminal (OLT) and in each optical network unit
(ONU) is constructed. In this work, we propose a partial prior storing strategy that considers the changes
in the popularity of the video content segments over time and the access patterns of the users to compute
the utility of the objects in the prior storage. We also propose to partition the prior storage to avoid the
eviction of the popular objects (those not accessed frequently) by the unpopular ones which are accessed
with higher frequency. The popularity distribution and ageing of popularity are measured from two online
datasets and use the parameters in simulations. Simulation results show that our proposed architecture can
improve the system performance and QoS parameters in terms of packet delay, jitter and packet loss.
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...IJERA Editor
Transmission video over ad hoc networks has become one of the most important and interesting subjects of study for researchers and programmers because of the strong relationship between video applications and frequent users of various mobile devices, such as laptops, PDAs, and mobile phones in all aspects of life. However, many challenges, such as packet loss, congestion (i.e., impairments at the network layer), multipath fading (i.e., impairments at the physical layer) [1], and link failure, exist in transferring video over ad hoc networks; these challenges negatively affect the quality of the perceived video [2].This study has investigated video transfer over ad hoc networks. The main challenges of transferring video over ad hoc networks as well as types of errors that may occur during video transmission, various types of video mechanisms, error correction methods, and different Quality of Service (QoS) parameters that affect the quality of the received video are also investigated.
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
Worldwide Interoperability for Microwave Access (WiMAX) is currently one of the
hottest technologies in wireless communication. It is a standard based on the IEEE 802.16 wireless
technology that provides a very high throughput broadband connections over long distances. In
parallel, Voice Over Internet Protocol (VoIP) is a new technology which provides access to voice
communication over internet protocol and hence it is becomes an alternative to public switched
telephone networks (PSTN) due to its capability of transmission of voice as packets over IP
networks. A lot of research has been done in analyzing the performances of VoIP traffic over
WiMAX network. In this paper we review the analysis carried out by several authors for the most
common VoIP codec’s which are G.711, G.723.1 and G.729 over a WiMAX network using various
service classes. The objective is to compare the results for different types of service classes with
respect to the QoS parameters such as throughput, average delay and average jitter.
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
The quality of service is a need in recent computer network developments. The present paper evaluates some characteristics in a proposed network topology such as dropped packets and bandwidth use, using two traffic sources, firstly a VoIP source over an UDP agent, then a CBR traffic source over an UDP agent as well as the previous one. Two possible configurations are proposed, implementing both of them in the Network Simulator, and implementing in one of them differentiated services to compare the results. Statistics results are shown, in both cases showing the accumulative dropped packet number and the throughput in the link, obtaining a reducer number of dropped packets in the stage with differentiated services, and an improvement in the bandwidth use.
Multicasting Of Adaptively-Encoded MPEG4 Over Qos-Cognizant IP NetworksEditor IJMTER
we propose a novel architectural planning for multicasting of adaptively-encoded
layered MPEG4 over a QoS-aware IP network. We re-quire a QoS-aware IP network in this case to
(1) Support priority dropping of packets in time of congestion. (2) Provide congestion notification to
the multicast sender. For the first requirement, we use RED's extension for service differentiation. It
recognizes the priority of packets when they need to be dropped and drops lower priority packets
first. We couple RED with our proposal for the second requirement which is the adoption of
Backward Explicit Congestion Notification (BECN) for use with IP multicast. BECN will provide
early congestion notification at the IP layer level to the video sender. BECN detects upcoming
congestion based on size of the RED queue in the routers. The MPEG4 adaptive-encoder can change
the sending rate and also can divide the video packets into lower priority packets and high priority
packets. Based on BECN messages from the routers, a simple flow controller at the sender sets the
rate for the adaptive MPEG4 encoder and also sets the ratio between the high priority and low
priority packets within the video stream. We use a TES model for generating the MPEG4 traffic that
is based on real video traces. Simulation results show that combining priority dropping, MPEG4
adaptive encoding, and multicast BECN: (1) Improves bandwidth utilization (2) Reduces time to
react to congestion and hence improves the received video quality (3) Maintains graceful degradation
in quality with congestion and provides minimum quality even if congestion persists.
Video contents prior storing server forIJCNCJournal
One of the most important multimedia applications is Internet protocol TV (IPTV) for next-generation
networks. IPTV provides triple-play services that require high-speed access networks with the functions of
multicasting and quality of service (QoS) guarantees. Among optical access networks, Ethernet passive
optical networks (EPONs) are regarded as among the best solutions to meet higher bandwidth demands. In
this paper, we propose a new architecture for multicasting live IPTV traffic in optical access network. The
proposed mechanism involves assigning a unique logical link identifier to each IPTV channel. To manage
multicasting, a prior storing server in the optical line terminal (OLT) and in each optical network unit
(ONU) is constructed. In this work, we propose a partial prior storing strategy that considers the changes
in the popularity of the video content segments over time and the access patterns of the users to compute
the utility of the objects in the prior storage. We also propose to partition the prior storage to avoid the
eviction of the popular objects (those not accessed frequently) by the unpopular ones which are accessed
with higher frequency. The popularity distribution and ageing of popularity are measured from two online
datasets and use the parameters in simulations. Simulation results show that our proposed architecture can
improve the system performance and QoS parameters in terms of packet delay, jitter and packet loss.
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...IJERA Editor
Transmission video over ad hoc networks has become one of the most important and interesting subjects of study for researchers and programmers because of the strong relationship between video applications and frequent users of various mobile devices, such as laptops, PDAs, and mobile phones in all aspects of life. However, many challenges, such as packet loss, congestion (i.e., impairments at the network layer), multipath fading (i.e., impairments at the physical layer) [1], and link failure, exist in transferring video over ad hoc networks; these challenges negatively affect the quality of the perceived video [2].This study has investigated video transfer over ad hoc networks. The main challenges of transferring video over ad hoc networks as well as types of errors that may occur during video transmission, various types of video mechanisms, error correction methods, and different Quality of Service (QoS) parameters that affect the quality of the received video are also investigated.
Comparative Analysis of Quality of Service for Various Service Classes in WiM...Editor IJCATR
Broadband access is an important requirement to satisfy user demands and support a new set of real time services and
applications. WiMAX, as a Broadband Wireless Access solution for Wireless Metropolitan Area Networks, covering large distances
with high throughput and is a promising technology for Next Generation Networks. Nevertheless, for the successful deployment of
WiMAX based solutions, Quality of Service (QoS) is a mandatory feature that must be supported. Quality of Service (QoS) is an
important consideration for supporting variety of applications that utilize the network resources. These applications include voice over
IP, multimedia services, like, video streaming, video conferencing etc. In this paper the performances of the MPEG-4 High quality
video traffic over a WiMAX network using various service classes has been investigated. To analyze the QoS parameters, the WiMAX
module developed based on popular network simulator NS-3 is used. Various parameters that determine QoS of real life usage
scenarios and traffic flows of applications is analyzed. The objective is to compare different types of service classes with respect to the
QoS parameters, such as, throughput, packet loss, average delay and average jitter.
Investigate the Effect of Different Mobility Trajectory on VOD over WIMAXiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...ijcnac
The key QoS parameters for VoIP are delay, jitter and loss. In the Internet, VoIP requires
the underlying packet switched network to minimize the impact of these parameters. A
major contributing factor in this regard is traffic engineering carried out by scheduling
algorithms. This paper studies the behavior of different types of scheduling algorithms on
the delay, jitter and loss QoS parameters. The performance evaluation involves
identifying the scheduling algorithms which are most suitable for VoIP communications.
The result from the analysis also shows the impact of the QoS parameters on VoIP over
the Internet.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
NGN Technologies is one of India’s Best Consulting Company, providing comprehensive, sophisticated, and yet intuitive range of Staffing Solutions, Software Training, Software Solutions for Telecom and IT Domains, Website Design and Development not only in INDIA but worldwide.
As Telecommunications specialists, we have an unrivalled ability to deliver a unique syllabus, focused on Telecommunications, Voice, Data, Systems Support and key emerging technologies. Our World-leading curriculum includes different TELECOM TRAINING ROADMAPS, unique courses and seminars, and Bespoke training. Our Course Curriculum and TRAINING ROADMAPS provide authoritative training in:
1. LTE / 4G, UMTS / 3G, GSM, GPRS, EDGE
2. Telecommunications, Convergence, Billing, IPv6, IPv4, Mobile IP, Voice over IP (SIP, IMS, H.323, Megaco, MGCP)
3. Specialized courses on C/C++/Java/C#, .NET and Telecom software Development on Linux and Windows
4. OSS / BSS, Cloud Computing (SAAS, IAAS, PAAS), SOA, SDP
Practical active network services within content-aware gatewaysTal Lavian Ph.D.
The Internet has seen an increase in complexity due to the introduction of new types of networking devices and services, particularly at points of discontinuity known as network edges. As the networking industry continues to add revenue generating services at network edges, there is an increasing need to provide a systematic method for dynamically introducing and providing these new services in lieu of the ad-hoc approach that is in use today. To this end we support a phased approach to "activating" the Internet and suggest that there exists an immediate need for realizing Active Networks concepts at the network edges. In this context, we present our efforts towards the development of a Content-aware Active Gateway (CAG) architecture. With the help of two practical services running on our initial prototype, built from commercial networking devices, we give a qualitative and quantitative view of the CAG potential.
Quality of Service at the Internet Engineering Task ForceJohn Loughney
"Quality of Service at the Internet Engineering Task Force" Workshop on "End-to-End Quality of Service. What is it? How do we get it?" Geneva, 1-3 October 2003.
Enhancing qo s and qoe in ims enabled next generation networksgraphhoc
Managing network complexity, accommodating greater numbers of subscribers, improving coverage to support data services (e.g. email, video, and music downloads), keeping up to speed with fast-changing technology, and driving maximum value from existing networks – all while reducing CapEX and OpEX and ensuring Quality of Service (QoS) for the network and Quality of Experience (QoE) for the user. These are just some of the pressing business issues faced by mobileservice providers, summarized by the demand to “achieve more, for less.” The ultimate goal of optimization techniques at the network and application layer is to ensure End-user perceived QoS. The next generation networks (NGN), a composite environment of proven telecommunications and Internet-oriented mechanisms have become generally recognized as the telecommunications environment of the future. However, the nature of the NGN environment presents several complex issues regarding quality assurance that have not existed in the legacy environments (e.g., multi-network, multi-vendor, and multi-operator IP-based telecommunications environment, distributed intelligence, third-party provisioning, fixed-wireless and mobile access, etc.). In this Research Paper, a service aware policy-based approach to NGN quality assurance is presented, taking into account both perceptual quality of experience and technologydependant quality of service issues. The respective procedures, entities, mechanisms, and profiles are discussed. The purpose of the presented approach is in research, development, and discussion of pursuing the end-to-end controllability of the quality of the multimedia NGN-based communications in an environment that is best effort in its nature and promotes end user’s access agnosticism, service agility, and global mobility
Performance Evaluation of Interactive Video Streaming over WiMAX Network IJECEIAES
Nowadays, the desire of internet access and the need of digital encodings have influenced quite a large number of users to access high quality video application. Offering multimedia services not only to the wired but to wireless mobile client is becoming more viable. In wireless medium, videostreaming still has high resource requirements, for example, bandwidth, traffic priority, smooth play-backs. Therefore, bandwidth demands of these applications are far exceeding the capacity of 3G and Wireless Local Area Networks (LANs). The current research demonstrates the introductory understanding of the Worldwide Interoperability for Microwave Access (WiMax) network, applications, the mechanisms, its potential features, and techniques used to provide QoS in WiMAX, and lastly the network is simulated to report the diverse requirements of streamed video conferencing traffic and its specifications. For this purpose two input parameters of video traffic are selected, i.e, refresh rate, which is monitored in terms of frames per second and pixel resolutions which basically counts the number of pixels in digital imaging. The network model is developed in OPNET. Different outcomes from simulation based models are analyzed and appropriate reasons are also discussed. Apart from this, the second aim of the current research is to address whether WiMAX access technology for streaming video applications could provide comparable network performance to Asymmetric Digital Subscriber Line (ADSL). For this purpose network metrices such as End to End delay and throughput is taken into consideration for optimization.
NGN definition, its architecture and benefit in low ARPU market.
Shahriar Rashid, one of the pioneer telecommunication professionals in Bangladesh, delivered the speech on NGN, its starts in Bangladesh, Architecture, benefits in low ARPU market like Bangladesh on 20th August 2013 at 10th Asia Pacific Telecommunication and ICT Development Forum held at Sonargoan Hotel Dhaka
Comparisons of QoS in VoIP over WIMAX by Varying the Voice codes and Buffer sizeEditor IJCATR
Voice over Internet Protocol (VoIP) is developed for voice communications system based on voice packets transmitted over
IP network with real-time communications of voice across networks using the Internet protocols. Quality of Service (QoS) mechanism
is applied to guarantee successful voice packets transmitted over IP network with reduced delay or drop according to assigned priority
of voice packets. In this paper, the goal of simulation models is present to investigate the performance of VoIP codecs and buffer size
for improving quality of service (QoS) with the simulation results by using OPNET modeler version 14.5. The performance of the
proposed algorithm is analyzed and compared the quality of service for VoIP. The final simulated result shows that the VoIP service
performance best under G.729 voice encoder scheme and buffer size 256 Kb over WiMAX network.
The Optimization of IPTV Service Through SDN In A MEC Architecture, Respectiv...CSCJournals
The aim of this paper is to present the ‘Power’ of SDN Technology and MEC Technic in improving the delivering of IPTV Service. Those days, the IPTV end –users are tremendous increased all over the world , but in the same time also the complains for receiving these prepaid real time multimedial services like; high latency, high bandwidth, low performance and low QoE/QoS. On the other end, IPTV Distributors need a new system, technics, network solutions to distribute content continuesly and simultaneously to all active end-users with high-quality, lowlatency and high Performance, thus monitoring and re-configuring this ‘Big Data’ require high Bandwidth by causing difficult problems by offering it affecting in the same time the price and QoE/QoSperformance of delivered service.
For this reason, we have achieved to optimize the IPTV service by applying SDN solution in a MEC Architecture (Multiple-Access Edge Computing). In this way , through MEC Technology and SDN, it is possible to receive an IPTV service with Low Latency, High Performance and Low Bandwidth by solving successfully all the problems faced by the actual IPTV Operators. These improvements of delivering IPTV service through MEC will be demonstrated by using the OMNet +++ simulator in an LTE-A mobile network. The results show clearly that by applying the MEC technique in the LTE-A network for receiving IPTV Service through SDN Network, the service was delivered with latency decreased by >90% (compared to the cases when the MEC technique is not applied), with PacketLoss of almost 0 and with high performance QoE. In addition these strong Contributions, the ‘Big’ innovation achieved in this work through simulations is that the quality of delivered IPTV Service did not change according to the increasing of the end-users.This latency of delivering the video streaming services did not change. This means that the IPTV Service providers will increase their benefits by ensuring in the same time also the delivering of service with high quality and performance toward innumerous end users. Consequently, MEC Technology and SDN solution will be the two right and "smart" network choices that will boost the development of the 5th Mobile generation and will significantly improve the benefit of Video Streaming services offered by current providers worldwide (Netflix, HULU, Amazon Prime, YouTube, etc).
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
An SDN Based Approach To Measuring And Optimizing ABR Video Quality Of Experi...Cisco Service Provider
Reprinted with permission of NCTA, from the 2014 Cable Connection Spring Technical Forum Conference Proceedings. For more information on Cisco video solutions, visit: http://www.cisco.com/c/en/us/products/video/index.html
Triple Play service is a marketing term for provisioning of two bandwidth-intensive services, high-speed Internet access and television, and a less bandwidth-demanding (but more latency-sensitive) telephone service, over a single broadband connection.
In this thesis, the effect of mobility of mobile WiMAX subscribers on video on demand (VOD) over WiMAX is analyzed by considering the scalable video coding (SVC) codes for video streaming. This experiment has been carried out using OPNET modeller 14.5. To compare the performance of Internet Protocol television (IPTV) over WiMAX, the packet delay variation, packet end to end delay, delay and load matrices are used. The result shows that after certain speed, the load increases, the delay again decreases and there is no change in the packet delay variation and packet end to end delay.
Key words: WiMAX, OPNET, scalable video coding (SVC), wireless networks, IEEE 802.16, internet protocol television (IPTV).
Comparative Analysis of Quality of Service for Various Service Classes in WiM...Editor IJCATR
Broadband access is an important requirement to satisfy user demands and support a new set of real time services and
applications. WiMAX, as a Broadband Wireless Access solution for Wireless Metropolitan Area Networks, covering large distances
with high throughput and is a promising technology for Next Generation Networks. Nevertheless, for the successful deployment of
WiMAX based solutions, Quality of Service (QoS) is a mandatory feature that must be supported. Quality of Service (QoS) is an
important consideration for supporting variety of applications that utilize the network resources. These applications include voice over
IP, multimedia services, like, video streaming, video conferencing etc. In this paper the performances of the MPEG-4 High quality
video traffic over a WiMAX network using various service classes has been investigated. To analyze the QoS parameters, the WiMAX
module developed based on popular network simulator NS-3 is used. Various parameters that determine QoS of real life usage
scenarios and traffic flows of applications is analyzed. The objective is to compare different types of service classes with respect to the
QoS parameters, such as, throughput, packet loss, average delay and average jitter.
Investigate the Effect of Different Mobility Trajectory on VOD over WIMAXiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...ijcnac
The key QoS parameters for VoIP are delay, jitter and loss. In the Internet, VoIP requires
the underlying packet switched network to minimize the impact of these parameters. A
major contributing factor in this regard is traffic engineering carried out by scheduling
algorithms. This paper studies the behavior of different types of scheduling algorithms on
the delay, jitter and loss QoS parameters. The performance evaluation involves
identifying the scheduling algorithms which are most suitable for VoIP communications.
The result from the analysis also shows the impact of the QoS parameters on VoIP over
the Internet.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
NGN Technologies is one of India’s Best Consulting Company, providing comprehensive, sophisticated, and yet intuitive range of Staffing Solutions, Software Training, Software Solutions for Telecom and IT Domains, Website Design and Development not only in INDIA but worldwide.
As Telecommunications specialists, we have an unrivalled ability to deliver a unique syllabus, focused on Telecommunications, Voice, Data, Systems Support and key emerging technologies. Our World-leading curriculum includes different TELECOM TRAINING ROADMAPS, unique courses and seminars, and Bespoke training. Our Course Curriculum and TRAINING ROADMAPS provide authoritative training in:
1. LTE / 4G, UMTS / 3G, GSM, GPRS, EDGE
2. Telecommunications, Convergence, Billing, IPv6, IPv4, Mobile IP, Voice over IP (SIP, IMS, H.323, Megaco, MGCP)
3. Specialized courses on C/C++/Java/C#, .NET and Telecom software Development on Linux and Windows
4. OSS / BSS, Cloud Computing (SAAS, IAAS, PAAS), SOA, SDP
Practical active network services within content-aware gatewaysTal Lavian Ph.D.
The Internet has seen an increase in complexity due to the introduction of new types of networking devices and services, particularly at points of discontinuity known as network edges. As the networking industry continues to add revenue generating services at network edges, there is an increasing need to provide a systematic method for dynamically introducing and providing these new services in lieu of the ad-hoc approach that is in use today. To this end we support a phased approach to "activating" the Internet and suggest that there exists an immediate need for realizing Active Networks concepts at the network edges. In this context, we present our efforts towards the development of a Content-aware Active Gateway (CAG) architecture. With the help of two practical services running on our initial prototype, built from commercial networking devices, we give a qualitative and quantitative view of the CAG potential.
Quality of Service at the Internet Engineering Task ForceJohn Loughney
"Quality of Service at the Internet Engineering Task Force" Workshop on "End-to-End Quality of Service. What is it? How do we get it?" Geneva, 1-3 October 2003.
Enhancing qo s and qoe in ims enabled next generation networksgraphhoc
Managing network complexity, accommodating greater numbers of subscribers, improving coverage to support data services (e.g. email, video, and music downloads), keeping up to speed with fast-changing technology, and driving maximum value from existing networks – all while reducing CapEX and OpEX and ensuring Quality of Service (QoS) for the network and Quality of Experience (QoE) for the user. These are just some of the pressing business issues faced by mobileservice providers, summarized by the demand to “achieve more, for less.” The ultimate goal of optimization techniques at the network and application layer is to ensure End-user perceived QoS. The next generation networks (NGN), a composite environment of proven telecommunications and Internet-oriented mechanisms have become generally recognized as the telecommunications environment of the future. However, the nature of the NGN environment presents several complex issues regarding quality assurance that have not existed in the legacy environments (e.g., multi-network, multi-vendor, and multi-operator IP-based telecommunications environment, distributed intelligence, third-party provisioning, fixed-wireless and mobile access, etc.). In this Research Paper, a service aware policy-based approach to NGN quality assurance is presented, taking into account both perceptual quality of experience and technologydependant quality of service issues. The respective procedures, entities, mechanisms, and profiles are discussed. The purpose of the presented approach is in research, development, and discussion of pursuing the end-to-end controllability of the quality of the multimedia NGN-based communications in an environment that is best effort in its nature and promotes end user’s access agnosticism, service agility, and global mobility
Performance Evaluation of Interactive Video Streaming over WiMAX Network IJECEIAES
Nowadays, the desire of internet access and the need of digital encodings have influenced quite a large number of users to access high quality video application. Offering multimedia services not only to the wired but to wireless mobile client is becoming more viable. In wireless medium, videostreaming still has high resource requirements, for example, bandwidth, traffic priority, smooth play-backs. Therefore, bandwidth demands of these applications are far exceeding the capacity of 3G and Wireless Local Area Networks (LANs). The current research demonstrates the introductory understanding of the Worldwide Interoperability for Microwave Access (WiMax) network, applications, the mechanisms, its potential features, and techniques used to provide QoS in WiMAX, and lastly the network is simulated to report the diverse requirements of streamed video conferencing traffic and its specifications. For this purpose two input parameters of video traffic are selected, i.e, refresh rate, which is monitored in terms of frames per second and pixel resolutions which basically counts the number of pixels in digital imaging. The network model is developed in OPNET. Different outcomes from simulation based models are analyzed and appropriate reasons are also discussed. Apart from this, the second aim of the current research is to address whether WiMAX access technology for streaming video applications could provide comparable network performance to Asymmetric Digital Subscriber Line (ADSL). For this purpose network metrices such as End to End delay and throughput is taken into consideration for optimization.
NGN definition, its architecture and benefit in low ARPU market.
Shahriar Rashid, one of the pioneer telecommunication professionals in Bangladesh, delivered the speech on NGN, its starts in Bangladesh, Architecture, benefits in low ARPU market like Bangladesh on 20th August 2013 at 10th Asia Pacific Telecommunication and ICT Development Forum held at Sonargoan Hotel Dhaka
Comparisons of QoS in VoIP over WIMAX by Varying the Voice codes and Buffer sizeEditor IJCATR
Voice over Internet Protocol (VoIP) is developed for voice communications system based on voice packets transmitted over
IP network with real-time communications of voice across networks using the Internet protocols. Quality of Service (QoS) mechanism
is applied to guarantee successful voice packets transmitted over IP network with reduced delay or drop according to assigned priority
of voice packets. In this paper, the goal of simulation models is present to investigate the performance of VoIP codecs and buffer size
for improving quality of service (QoS) with the simulation results by using OPNET modeler version 14.5. The performance of the
proposed algorithm is analyzed and compared the quality of service for VoIP. The final simulated result shows that the VoIP service
performance best under G.729 voice encoder scheme and buffer size 256 Kb over WiMAX network.
The Optimization of IPTV Service Through SDN In A MEC Architecture, Respectiv...CSCJournals
The aim of this paper is to present the ‘Power’ of SDN Technology and MEC Technic in improving the delivering of IPTV Service. Those days, the IPTV end –users are tremendous increased all over the world , but in the same time also the complains for receiving these prepaid real time multimedial services like; high latency, high bandwidth, low performance and low QoE/QoS. On the other end, IPTV Distributors need a new system, technics, network solutions to distribute content continuesly and simultaneously to all active end-users with high-quality, lowlatency and high Performance, thus monitoring and re-configuring this ‘Big Data’ require high Bandwidth by causing difficult problems by offering it affecting in the same time the price and QoE/QoSperformance of delivered service.
For this reason, we have achieved to optimize the IPTV service by applying SDN solution in a MEC Architecture (Multiple-Access Edge Computing). In this way , through MEC Technology and SDN, it is possible to receive an IPTV service with Low Latency, High Performance and Low Bandwidth by solving successfully all the problems faced by the actual IPTV Operators. These improvements of delivering IPTV service through MEC will be demonstrated by using the OMNet +++ simulator in an LTE-A mobile network. The results show clearly that by applying the MEC technique in the LTE-A network for receiving IPTV Service through SDN Network, the service was delivered with latency decreased by >90% (compared to the cases when the MEC technique is not applied), with PacketLoss of almost 0 and with high performance QoE. In addition these strong Contributions, the ‘Big’ innovation achieved in this work through simulations is that the quality of delivered IPTV Service did not change according to the increasing of the end-users.This latency of delivering the video streaming services did not change. This means that the IPTV Service providers will increase their benefits by ensuring in the same time also the delivering of service with high quality and performance toward innumerous end users. Consequently, MEC Technology and SDN solution will be the two right and "smart" network choices that will boost the development of the 5th Mobile generation and will significantly improve the benefit of Video Streaming services offered by current providers worldwide (Netflix, HULU, Amazon Prime, YouTube, etc).
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
An SDN Based Approach To Measuring And Optimizing ABR Video Quality Of Experi...Cisco Service Provider
Reprinted with permission of NCTA, from the 2014 Cable Connection Spring Technical Forum Conference Proceedings. For more information on Cisco video solutions, visit: http://www.cisco.com/c/en/us/products/video/index.html
Triple Play service is a marketing term for provisioning of two bandwidth-intensive services, high-speed Internet access and television, and a less bandwidth-demanding (but more latency-sensitive) telephone service, over a single broadband connection.
In this thesis, the effect of mobility of mobile WiMAX subscribers on video on demand (VOD) over WiMAX is analyzed by considering the scalable video coding (SVC) codes for video streaming. This experiment has been carried out using OPNET modeller 14.5. To compare the performance of Internet Protocol television (IPTV) over WiMAX, the packet delay variation, packet end to end delay, delay and load matrices are used. The result shows that after certain speed, the load increases, the delay again decreases and there is no change in the packet delay variation and packet end to end delay.
Key words: WiMAX, OPNET, scalable video coding (SVC), wireless networks, IEEE 802.16, internet protocol television (IPTV).
Our approach in this thesis is that, we have designed and built a National Carrier based core and edge network to simulate a real live scenario that spans the kingdom of Saudi Arabia. Some of the results in the thesis are presented against simulation time and some against network load.how to implement mpls on network
Choosing the best quality of service algorithm using OPNET simulationIJECEIAES
The concept of quality of service (QoS) is a new computer technology. Previously, there was a slow internet connection to access the sites and it was slow to send information. But now, it requires speeding up the traffic and increasing the efficiency for audio and video. In this study, we discuss the concepts of QoS provided over the network to achieve these goals. This study aims to compare six algorithms to control the QoS, then, the best algorithm will be selected to improve the traffic. These algorithms are named first in first out (FIFO), priority queuing (PQ), custom queuing (CQ), CQ with low latency queuing (LLQ), weighted fair queuing (WFQ), WFQ with low latency queuing (LLQ), so the behavior of these algorithms can be measured. The results obtained by comparing between them using OPNET simulation show that the best algorithm is the priority queuing algorithm, followed by CQ, then CQ with LLQ, then WFQ, then WFQ with LLQ and finally FIFO. All these results are plotted in the form of graphs to show the paths of these algorithms for the single state with an operation time of 5 minutes for each algorithm.
Qo s management for mobile satellite communicationeSAT Journals
Abstract In this paper, a cross-layer architecture (QoSatAr) is developed to provide end-to-end quality of service (QoS) guarantees for Internet protocol (IP) traffic over the Digital Video Broadcasting-Second generation (DVB-S2) satellite systems. The architecture design is based on a cross-layer optimization between the physical layer and the network layer to provide QoS provisioning based on the bandwidth availability present in the DVB-S2 satellite channel. One of the most important aspects of the architecture design is that QoSatAr is able to guarantee the QoS requirements for specific traffic flows considering a single parameter: the bandwidth availability which is set at the physical layer (considering adaptive code and modulation adaptation) and sent to the network layer by means of a cross-layer optimization. The architecture has been evaluated using the NS-2 simulator. Keywords: QoSatAr, DVB-S2, ACM, RQM, DiffServ
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
WiMAX is based on the standard IEEE 802.16e-2009 for wireless access in Metropolitan Area Networks. It
is one of the solutions for 4G IP based wireless technology. WiMAX utilizes Orthogonal Frequency
Division Multiple Access which also supports Multicast and Broadcast Service with appropriate
Modulation and Coding Scheme. Presently, Scheduling and Resource allocation algorithm in Opportunistic
Layered Multicasting provides multicasting of layered video over mobile WiMAX to ensure better QoS.
Initially, the knowledge based allocation of subcarriers is used for scheduling. In addition, to reduce the
burst overhead, delay and jitter, SWIM (Swapping Min-Max) algorithm is utilized. Another promising
technology that can greatly improve the system performance by exploring the broadcasting nature of
wireless channels and the cooperation among multiple users is the Cooperative Multicast Scheduling
(CMS) technique. The simulation results show, Swapping Min-Max performs better with lesser number of
bursts, Zero jitter and with optimal throughput. The results with Cooperative Multicast Scheduling show
the enhanced throughput for each member in the Multicasting Scenario.
Delay Efficient Method for Delivering IPTV ServicesIJERA Editor
Internet Protocol Television (IPTV) is a system through which Internet television services are delivered using
the architecture and networking methods of the Internet Protocol Suite over a packet-switched network
infrastructure, e.g., the Internet and broadband Internet access networks, instead of being delivered through
traditional radio frequency broadcast, satellite signal, and cable television (CATV) formats. IPTV provides
mainly three services: live TV, catch up TV, and video on demand (VoD).This paper focuses on delivering the
live TV services by exploiting the virtualised cloud architecture of the IPTV and statistical multiplexing. The
VoD tasks are prescheduled so that there will be less Instant Channel Change (ICC) delay. We select a proper
scheduling algorithm for rescheduling the VoD tasks. We then implement the scheduling algorithm for preshifting
the VoD tasks.
PERFORMANCE COMPARISON OF PACKET SCHEDULING ALGORITHMS FOR VIDEO TRAFFIC IN L...ijmnct
In this paper we have studied downlink packet scheduling algorithms proposed for LTE cellular networks.
The study emphasize on three most promising scheduling algorithms such as: FLS, EXP rule and LOG rule.
The performance of these three algorithms is conducted over video traffic in a vehicular environment using
LTE-Sim simulator. The simulation was setup with varying number of users from 10 - 60 in fixed bounded
regions of 1 km radius. The main goal this study is to provide results that will help in the design process of
packet scheduler for LTE cellular networks, aiming to get better overall performance users. Simulation
results show that, the FLS scheme outperforms in terms of average system throughput, average packet
delay, PLR; and with a satisfactory level of fairness index.
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...IJCNCJournal
This work investigates the QoS provisioning of various traffic classes on an SDN-enabled network. We
propose and implement the class-based adaptive QoS control scheme on SDN-enabled network for various
traffic classes, namely VoIP, Video Streaming and File Transfer. The effectiveness of our proposed scheme
is validated by simulation using Mininet and Ryu controller. The procedure to create the simulation
platform and all details relevant to all software used are described step-by-step in detail. The main
performance evaluation metric is the Maximum Number of Traffic Flows admittable with QoS while
Average Throughput, Latency, Jitter, and Packet Loss Rate are maintained at the comparable level of the
existing work in the literature called JMABC [11]. Our simulation results are illustrated with 95%
confidence interval. According to the simulation results, it is obvious that our proposed class-based
adaptive QoS control scheme adopting the optimization technique significantly outperforms the existing
similar QoS provision scheme in terms of the maximum number of the high priority traffic flows (VoIP)
admittable with QoS while the other evaluation metrics are maintained at the same level.
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...IJCNCJournal
This work investigates the QoS provisioning of various traffic classes on an SDN-enabled network. We propose and implement the class-based adaptive QoS control scheme on SDN-enabled network for various traffic classes, namely VoIP, Video Streaming and File Transfer. The effectiveness of our proposed scheme is validated by simulation using Mininet and Ryu controller. The procedure to create the simulation platform and all details relevant to all software used are described step-by-step in detail. The main performance evaluation metric is the Maximum Number of Traffic Flows admittable with QoS while Average Throughput, Latency, Jitter, and Packet Loss Rate are maintained at the comparable level of the existing work in the literature called JMABC [11]. Our simulation results are illustrated with 95% confidence interval. According to the simulation results, it is obvious that our proposed class-based adaptive QoS control scheme adopting the optimization technique significantly outperforms the existing similar QoS provision scheme in terms of the maximum number of the high priority traffic flows (VoIP) admittable with QoS while the other evaluation metrics are maintained at the same level.
Interworking qos management subsystem into ims based architecture multi provi...IJCNCJournal
The third-generation partnership project 3GPP and 3GPP2 have standardized the IP multimedia subsystem
(IMS) to provide ubiquitous and access network-independent IP-based services for next-generation
networks via merging cellular networks and the Internet. The IP Multimedia Subsystem (IMS) seems to be
the technology that will prevail in Next Generation Networks (NGNs). The users wish to communicate
through collections of networks using different protocols; rendering service mapping from one network to
another with the similar QoS is a complex issue thereby. The heterogeneous networks are collections of
communication platforms using different protocols. This heterogeneity implies the need to offer many
different services on the market within short time. In this paper we propose a heterogeneous network model
based on the IMS that provides guaranteed QoS. Our method presents, in the first, an informational
solution. Decisional information is added to the HSS basis to enrich the knowledge base, which is
expressed under the form of "profile of QoSR", where the new information informs directly the decisions to
be taken according to the user’s profile (preferences QoS and pricing, bandwidth, location ...). In the
second, a solution for multi provider’s context which can allow a subscriber to register with one or more
operator(s) according to QoS offered. Thirdly, a mechanism which can be deployed in heterogeneous
networks to preserve the original QoS values of the user session and thus eliminate the cumulative effect of
QoS rounding across the entire communication path. And it is feasible via the “Interworking QoS
Management Sub-network” while adding the new interworking management components, namely: SICs,
DIC, QPA AS and HSS-PQoSR.
A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...IJTET Journal
Abstract— WiMAX relay networks make resource allocation decisions once per frame. An IEEE 802.16j frame consists of a downlink sub frame and an uplink sub frame. This study focuses on the downlink multicast problems. The downlink sub frame can be divided into an access zone and a relay zone. In the access zone, the BS transmits the video data to its served RSs and SSs. In the relay zone, the RSs further relay the video data to their served SSs. To determine the data transmissions within each frame, the BS should make a scheduling decision at the beginning of each frame using an appropriate resource allocation scheme. WiMAX is generally used to reduce the delays and packet loss. It a wireless standard designed to provide data transfer. In this paper mainly focuses on implementing BGWA based algorithm in order to avoid unwanted intrusion occurrences in handoff time. The Mobile Motion Prediction algorithm generally keeps track of the positions of the mobile stations and their relevant connections. The task of motion prediction is to track the motion of the mobile station in different gateways. Then different prediction methods are applied according to the sensitivity of the range to gain high precision. CAC Approach can be used to the worldwide interoperability for microwave access (WiMAX) is a promising technology for last-mile Internet access, particularly in the areas where wired infrastructures are not available. Mainly this approach is used to transmitting the video/Audio sending from base station to relay station with transmitting or secretes code.
Decision Making Analysis of Video Streaming Algorithm for Private Cloud Compu...IJECEIAES
The issue on how to effectively deliver video streaming contents over cloud computing infrastructures is tackled in this study. Basically, quality of service of video streaming is strongly influenced by bandwidth, jitter and data loss problems. A number of intelligent video streaming algorithms are proposed by using different techniques to deal with such issues. This study aims to propose and demonstrate a novel decision making analysis which combines ISO 9126 (international standard for software engineering) and Analytic Hierarchy Process to help experts selecting the best video streaming algorithm for the case of private cloud computing infrastructure. The given case study concluded that Scalable Streaming algorithm is the best algorithm to be implemented for delivering high quality of service of video streaming over the private cloud computing infrastructure.
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...IJCNCJournal
Network Mobility Basic Support (NEMO BS) protocol (RFC 3963) is an extension of Mobile IPv6. The NEMO BS embraced by IETF working group to permit any node in the portable network to be accessible to the Internet despite the fact the network itself is roaming. This protocol likewise Mobile IPv6 doesn’t deliver any kind of Quality of Service (QoS) guarantees to its clients. It can barely offer the same level of services (i.e. Best-Effort) to all the users without obligation to the application’s needs. This propositions a challenge to real-time applications that demand a precise level of QoS pledge. The Differentiated Services has recently come to be the most widely used QoS support technology in IP networks due to its relative simplicity and scalability benefits. This paper proposes a new scheme to provide QoS to mobile network nodes within NEMO context. The proposed scheme intends to reduce handover latency for the users of MNN as well as alleviates packet losses. The feasibility of the proposed enhancement is assessed by measuring its performance against the native NEMO BS standard protocol using NS-2 simulator. The obtained results in the simulation study have demonstrated that the proposed scheme outperforms the standard NEMO BS protocol.
Similar to IPTV Improvement Approach over LTE-WLAN Heterogeneous Networks (20)
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
IPTV Improvement Approach over LTE-WLAN Heterogeneous Networks
1. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
DOI: 10.5121/ijcnc.2021.13103 33
IPTV IMPROVEMENT APPROACH OVER LTE-
WLAN HETEROGENEOUS NETWORKS
Mohamed Matoui, Noureddine Moumkine and Abdellah Adib
Research Team: Networks, Telecommunications and Multimedia, Department of
Computer Sciences, Faculty of Science and Technology Mohammedia, Morocco
ABSTRACT
IPTV (Internet Protocol Television) includes several video components. The IMS (IP Multimedia
Subsystem) cannot differentiate between them what causes their treatment similarly. These sub-components
must have different priorities because they have distinct QoS constraints. In this paper, we suggest the
implementation of IPTV in a heterogeneous network that improved QoS by providing the capability to
prioritize the sub traffic according to the system administrator policy. A new IPv6 flow label field
definition was proposed that is ready for standardization. OPNET Modeler software is used to design our
approached architecture. The results show that IPTV users receive different amounts of video data based
on the stream's priority.
KEYWORD
IPv6, Flow Label, Heterogeneous Networks, LTE, WLAN, QoS, Diffserv, IPTV, IMS & MIPv6
1. INTRODUCTION
1.1. Motivation & Contribution
The design of new, more open telecommunication architectures has become a necessity in a
convergent environment, characterized by the emergence of "triple play". Such an opening will
prevent all aspects of fixed / mobile heterogeneity. The NGN (Next-Generation Network)
architecture will be based on IP because it is a simple and powerful protocol providing end-to-
end connectivity to different underlying networks. However, the actual realization of an NGN
architecture experiences the various IP technology adoption problem resolution. Indeed, among
the main shortcomings of IP has to be overcome is its inability to provide end-to-end quality of
service. Mitigating the various security vulnerabilities by protecting the data transmitted on the
NGN networks as well as the communicating systems is also necessary. Also, solving problems
relating to user mobility by enabling handover (horizontal between several domains and vertical
between several technologies) while preserving the continuity of service becomes a must. In an
NGN environment, service providers must furnish their clientele with QoS and security
guarantees while ensuring their mobility. The end customer IPTV traffic reception quality varies
depending on the device acquisition resources and network performance. The negotiation of QoS,
as well as the actual reception state of the multimedia product with the entity providing service,
will be a trump to the operator to furnish traffic with an acceptable QoS. IMS (IP Multimedia
Subsystem) is an IP and SIP (Session Initiation Protocol) standardized architectural framework. It
interconnects mobile, wireless, and fixed networks when transmitting multimedia services. IMS
assumes that the operator must control the media utilization through multimedia sessions using
SIP to ensure the required QoS and enable inter convergence services. The latest experiences
exhibit that IMS technology still suffers from some problems, which comprise the non-
2. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
34
differentiation between different IPTV video components. The existing IMS-based IPTV
infrastructure does not take account that the IPTV traffic consists of three sub-components and
the sensitivity of broadcasting traffic latency. 3GPP approach (3rd Generation Partnership
Project) [23], IETF (Internet Engineering Task Force) approach [18], and SLM&M (Service
Level Monitoring & Management) approach [19] have emerged to guarantee IMS infrastructure
QoS. All these three proposals use the DiffServ (Differentiated Services) model for QoS
management. An in-depth study shows that the traffic classification adopted by these approaches
causes various problems. Traffic classification uses three classes: data, voice, and video. In
connection with IPTV, we state that traffic can be separated into three sub-traffics:
BC (BroadCast) that licenses the transfer of real-time video.
VoD (Video on Demand) that allows the user to watch a selected video from a
given library.
PVR (Personal Video Recorder) that allows users to record the received
stream.
DiffServ model makes the handling of these three types of flows similar. These flows have a
difference in sensitivity to QoS parameters, so they must be treated differently. Our contribution
aims to remedy this problem.
A new mechanism that adapts QoS parameters and control systems is proposed in this paper.
Knowing that the one implemented in IMS-based IPTV is based on DiffServ, our approach is in
the form of a new PHB (Per-Hop Behavior). A new IPV6 Flow label field mechanism has been
suggested to classify IPTV sub-traffic. It is used to avoid dealing with the same video traffic with
the same effort and distinguish between IPTV packets consequently. We applied our approach to
a heterogeneous LTE-WLAN network by using the Riverbed Modeler simulator. The obtained
results show that the delay, jitter and packet loss of the BC flow have been minimized which has
improved the quality of service of linear TV transmission.
1.2. Related Work
For sending live TV services, a new cost-efficient various wireless architecture is proposed in [3].
In [4], the development testbed is used to evaluate the 3D video streaming QoE over LTE.
Various network conditions, in the testbed, are configured by setting parameters of network
emulator rested on the outcomes reaped by a system-level LTE simulator. A plethora of types of
research has been working on enhancing IPTV services QoS. To support IPTV mobile services,
Li and Chen proposed spectrum allocation algorithms [5]. So, preferable IPTV services are
presented when maintaining good voice service quality. In [6], IPTV data troubles such as
dropping, blocking and bandwidth usage have been, to a larger extent, resolved using a new
queue model that regards adaptive modulation and coding. In [7], the authors supply a thorough
guide to standardized and cutting-edge quality assessment models and determine QoE to evaluate
IPTV user experience in a data-driven approach from scratch and establish a personal QoE model
bottomed on an Artificial Neural Network (ANN) [8]. In [9], a new technique is suggested to
decrease tunneling overhead. Authors allow multimedia content to be transport from many
various Micro data centers as well as Mega data centers. So, the content multimedia data is
transferred using their special addresses through tunneling. IPTV seamless handover [13] has
been accomplished using Physical Constraint and Load-Aware in wireless LAN. The congestion
level of each access point can be estimated using this new method. So, the user can choose to
access the next wireless LAN based on its strength and bit error rate. In our previous work [10],
we presented in detail the new PHB (Per-Hop Behavior) that reclassifies and differentiates IPTV
sub traffics by using the IPv6 Flow Label field. The sub traffics will be prioritized easily using
the proposed PHB according to the QoS network policy. Our approach has been tested on both
3. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
35
fixed networks [10] and mobile cells (moving users in one cell [11] and stable and moving users
in three different cells [1] [2]).
In this paper, we introduced a presentation of the IMS network and IPTV. The proposed
algorithm improves the IPTV sub traffics QoS. We also increase the transmitted data by
implementing it in the LTE network. Our new QoS optimization mechanism has been explained
in section 2. That demonstration is dependent on how to prioritize IPTV sub-traffic utilizing the
IPv6 Flow Label field and how to produce new classes of services. In Section 3, we discuss our
implementation network and the scenario studied of the heterogeneous LTE-WLAN-IMS-Based
IPTV by using Riverbed Modeler. Section 4 reveals the analysis of the output of the suggested
scenario of the network’s methods. Finally, the conclusion and our outlook on upgrading that
field are presented in section 5.
2. ENHANCING QOS UTILIZING A NEW DEFINITION OF IPV6 FLOW LABEL
The network's capacity to supply the user needs upon using IPTV service putting into account the
principal parameters such as delay, traffic losses, video jitter, and quality is the core of the
definition of QoS in our network. The IETF (Internet Engineering Task Force) offers two
significant quality of service models: IntServ (Integrated Services) and DiffServ [17] [22] [14].
The distinction between these models is illustrated further [16]. To upgrade QoS for IPTV
services, throughout transmission, IPv6 FL (Flow Label) has been adopted along with the IMS
system.
2.1. IPv6 Flow Label & Quality of Service
IPv6 FL is a new IPv6 header field coded on 20 bits. This field can be applied to label packets of
another similar packet flow or an accumulation of flows [12]. Several propositions have been
suggested to the IETF to adopt this field to improve QoS on the internet [20]. Some researchers
have proposed its use to deliver the bandwidth, delay, and buffer requirements. Unlike in [24],
the authors suggested sending the transport protocol and the used port number using this field.
Other approaches have been introduced [26], but none of them have been standardized. However,
a hybrid approach takes into account advanced techniques while remaining compatible with the
DiffServ model [20]. This model has registered the first 3 bits of the IPv6 FL field to show the
methods adopted and kept the remaining 17-bits parameter connecting to each particular
approach. This hybrid approach is collected in Table 1.
Table 1. The representation of the first 3 bits of flow label value type of the used approach
Value Type of The Used Approach
000 Default
001 An arbitrary number is used to define the Flow Label.
010 Integrated Services
011 Differentiated Services
100 Port number and flow label used protocol
101 A new definition explained in [25].
110 Reserved for future use.
111 Reserved for future use
4. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
36
2.2. Optimization of IPTV Broadcasting Traffic
To enhance QoS for IPTV services throughout transmission, IPv6 FL has been utilized with the
IMS system. The IMS-Based IPTV expands the provision of essential IPTV services to others
such as 'quadruple play' services and more sophisticated ones like Flow Label to enable the user
to ask for a single process for its real-time traffic flow [22]. Also, when serving significant traffic
with a high priority of EF (Expedited Forwarding) PHB (Per-Hop Behavior), DiffServ core
routers face saturation problems. Because of real-time data traffic growth, waiting for a delay in
the narrow queues affected to EF PHB technique causes the slow filtering of video packets
leading to drop them. At the level of the dropping process, the edge EF packets of the DiffServ
domain will be processed according to their significance in the GOP (Groupe of Picture) video
[21]. The denial priority for PHBs in AF (Assured Forwarding) is frequently executed based on
WRED (Weighted Random Early Detection). Using eTOM (Enhanced Telecom Operation Map),
the user's fidelity classification has been integrated with IMS-Based IPTV [19], allowing the
network administrator to distinguish between packets based on the recipient. So if the “GOLD”
user is sending, another scoring inter factor is generated with the same classification to a for
example, if a user class is scoring inter users generate another factor to affirm the transmission
credibility. But in case of congestion, routers will use the DiffServ standard returning to the
removal process. As mentioned before, three main traffic compose IPTV video data streams: BC,
VoD, and PVR. So their treatment will be the same in best effort especially in case of traffic
congestion [15] leading to latency for sensitive video traffic to delay and loss rate. So, it is
necessary to use IPTV flows reclassification mechanism to decrease BC user’s delay and packet
losses.
To upgrade QoS for IPTV services throughout transmission, IPv6 FL has been adopted along
with the IMS system. To achieve that demand, we propose new priority suppression PHBs for
IPTV traffic that differentiates between user data depend on their priority [10]. This technique
consists of mapping DSCP (Differentiated Services Code Point) values in the IPv6 flow label as
the ToS (Type of Service) field of the IPv4 header is restricted to one byte. So we can distinguish
between different IPTV traffic using more bits with the ability to be appropriate with the DiffServ
approach. The IPv6 flow label field will thus have the values shown in Table 2.
Table 2. New IPv6 Flow Label Values
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9
0 1 1 DSCP x y Reserved for future use
Since the DSCP field of the EF class equal to 101110, Table 3 shows the IPv6 flow label field
values.
Table 3. New detailed IPv6 Flow Label Values
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9
0 1 1 1 0 1 1 1 0 x y Reserved for future use
X and Y are the bits used to differentiate intra-IPTV video traffic. And since the IPTV packets
have the same DSCP field value using only six bits, we will then employ the following bits 10
and 11 of the IPv6 FL for an intra-IPTV reclassification. We reserve the remaining 9 bits for
future use. We give the name DSCP-FL to the first 11 bits of the IPv6 FL field. As in the present
EF PHB, new Flow Label rates are charted to PHBs with a low loss rate, high priority, jitter, and
latency features. Indeed, three IPTV packets relating successively under BC traffic, VoD and
PVR will be subjected to a treatment explained through the algorithm in Figure 1:
5. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
37
Figure 1. Intra-IPTV Traffic suggested mechanism
DiffServ will eliminate low-level priority data in saturation case. As in Table 4, the DSCP-FL
field value is equal to 01110111001 as in the demonstrated case.
Table 4. Flow Label with Highest Priority Level of Suppression
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9
0 1 1 1 0 1 1 1 0 0 1 Reserved for future use
3. IMPLEMENTATION SCENARIO
In our regarded network, we intend to raise the data received by BC, VoD, and PVR user
sequentially and diminish the delay that confronts the BC traffic particularly. Using Riverbed
Modeler, we implemented our proposed technique in a heterogeneous LTE-WLAN network. The
major idea in the suggested framework architecture is to implement the IMS-Based FL IPTV
component in the heterogeneous network.
6. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
38
Figure 2. Moving IPTV user in the LTE-WLAN Heterogeneous Network
A new modulated task application module has been developed as the IMS-SIP server does not
exist in the Riverbeds modules. MIP-SIP is used for centralized session’s control. IMS-MIP-SIP
has been used to grantee fast and continuous IPTV service during vertical handover between
WLAN and LTE networks. To grantee this task, newly developed modules have been
implemented inside Riverbed Modeler as the used server doesn’t implement in the existing
modules. We defined IMS, MIP-SIP, and IPTV servers in the OPNET library. Also, we
implement the tasks used during the authentications. After that, we compare the results of our
simulation for each user in two cases; while moving inside the LTE network and when moving in
the WLAN network.
In the proposed framework, we have built user registration in the IMS network and IPTV services
session establishment in a custom application. In this paper, we contrast between performances of
the network in two varied ways. The primary instance without applying the FL QoS based
system. The second scenario conforms to apply FL and WFQ (DSCP Based) QoS. Figure 2
introduces three main compositions of the used architecture. The first element comprises the IMS
network, the second element includes three servers that substitute the IPTV data center
responsible for delivering different types of multimedia contents (PVR, VoD, and BC). The final
one is the personal receiver that acquires data from the sender. As the IPTV users are not the only
ones in a 4G network, there are 10 FTP, and 10 HTTP users that transmit data in parallel IPTV
users. We should also note that we parallel the conclusions of our suggested scenario upon using
and disusing our proposed methods to measure the QoS parameters. The traffic delivered is the
same from the three various video servers (PVR, BC, and VoD), high-resolution video, and that
after the user performs IMS authentication steps. We apply our approach by varying the IPv6
Flow Label for both the servers and the routers inside our network. We also parameters QoS in
the used routers to guarantee high performance in our network.
7. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
39
As described before, the IMS-level registration and session initiation must be proceeded to
authenticate the user inside the IMS network before the user initiated the IPTV connection. To
proceed with vertical handover without any call drop, we choose the MIP-SIP protocol that
provides minimum handover time.
4. PERFORMANCE ANALYSIS
In this section, we gathered the collected results for our proposed scenario; then we make overall
performance analysis. End- to end packet losses and traffic dropped are collected. We contrast
the three user’s performance (BC, VoD, and PVR) in case of using and disusing FL QoS. First,
we will explain the user's results when moving inside the LTE network, then when the user made
a handover to the WLAN network and move inside the network. In each case, we compare the
three user’s performance (BC, VoD, and PVR) in case of using and disusing Flow Label QoS.
Our proposed FL QoS exhibits a high performance for BC users.
4.1. LTE moving user
BC, VOD and PVR users change their position with the same speed continuously in this scenario.
The three users BC, VoD, and PVR move internally for a fair comparison when using the
proposed mechanism. Our suggested Flow Label QoS prove the best performance for BC user.
4.1.1. Traffic dropped
It is the data missing while sending from the server to the user. This missing data is owing to
network congestion and imperfect data links.
Figure 3 exhibits that all BC, VoD, and PVR servers sent the same quantity of data, while Figure
4 shows that the amount of data received by the privileged user BC exceeds both VoD and PVR
users. Indeed, in case of congestion, routers start by removing the PVR packets first and then the
VoD packets and will leave the BC packets at the end justifying a higher loss-rate for PVR flows
and therefore a lower amount of data received than the BC and VoD users.
Figures 5 and Figure 6 show the effect of our technique on the various flows since BC and VoD
users have received more data when using the FL QoS technique favoring the BC then the VoD
flows to the detriment of the PVR flow. On the other hand, Figure 7 shows that the PVR user
received less data when applying the FL QoS approach, which is quite normal as our technique
gave its packets the lowest priority during the data transfer. Thus, when all three users request
services at the same time, the PVR will be given the lowest priority in the data transfer.
8. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
40
Figure 3 the sending Traffic (bytes/sec)
Figure 4 Traffic received in case of using Flow Label QoS (bytes/sec)
9. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
41
Figure 5 Traffic Received of BC user (bytes/sec)
Figure 6 VoD Traffic Received (bytes/s)
10. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
42
Figure 7 PVR Traffic Received (bytes/s)
Figure 8 End-to-End delay (sec)
4.1.2. End-to-End Delay
End-to-end delay is the time the packets take to move from the server to the user. Figure 8
exhibits that using FL QoS makes the BC user end-to-end delay the lowest because of the priority
applied in our proposed technique in our scenario. When applying our technique, the BC packet
delay decreases as in Figure 9. In contrast, Figure 10 and Figure 11 expresses that the delay of
VoD and PVR users raises in case of utilizing the FL QoS technique. In case of congestion, our
11. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
43
technique starts with the processing BC user and VoD user streams ahead of the PVR flows
giving a small increase in the VoD delay and a higher PVR delay.
Figure 9 End-to-End delay of BC user (sec)
Figure 10 End-to-End delay of VoD user (sec)
12. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
44
Figure 11 End-to-End delay of PVR user (sec)
4.2. WLAN moving user
4.2.1. Data Losses
Our comparison was based on all users send the same amount of data as shown in Figure. 12. As
we expected, the highest data was received by BC user as shown in Figure. 13, due to its highest
priority. Our technique assigns the highest processing priority to the BC stream as well as the
lowest deletion priority to this stream, so as explained above, in case of congestion, the routers
first delete the packets of the PVR and VoD streams and leave the packets of the BC stream last,
which justifies that the amount of data received by the BC user is higher than that of the VoD and
PVR users
Figure 12 Traffic Sent (bytes/sec)
13. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
45
Figure. 14 shows that the BC user has received more data by applying the flow label QoS
technique and Figure. 15 shows the VoD user has received lower amounts of data traffic, which
is justified as our FL QoS method favors BC traffic at the expense of both VoD and PVR flows.
Thus, the BC streams are least susceptible to being dropped by routers in case of congestion, so
the amount of traffic received by the BC user is greater than the amount of traffic received by
VoD and PVR respectively. On the other hand, the decrease with large quantity for the PVR user
is seen in Figure. 16. Taking into consideration also that as the user is moving, the distance
between him and base station varies, thus the quantity of data varies.
Figure 13 Traffic Received using Flow Label QoS
(Bytes/sec)
Figure 14 BC user Traffic Received (bytes/sec)
14. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
46
Figure 15 VoD user Traffic Received (bytes/sec)
Figure 16 PVR user Traffic Received (bytes/sec)
4.2.2. End-to-End Delay
Figure 17 exhibits that using FL QoS makes the BC user end-to-end delay the lowest because of
the priority applied in our proposed technique in our scenario. When applying our technique, the
BC packet delay decreases as in Figure 18. In contrast, Figure 19 and Figure 20 expresses that the
delay of VoD and PVR users raises in case of utilizing the FL QoS technique. In case of
congestion, our technique starts with the processing BC user and VoD user streams ahead of the
PVR flows giving a small increase in the VoD delay and a higher PVR delay.
15. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
47
Figure 17 End-to-End delay (sec)
Figure 18 BC user End-to-End delay (sec)
16. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
48
Figure 19 VoD user End-to-End delay (sec)
Figure 20 PVR user End-to-End delay (sec)
4.3. Discussion
In this scenario, we notice that in case of network congestion, the routers proceed to the different
sub-traffics delay's optimization but with the existence of our reclassification and differentiation
mechanism of the packets, the delay and jitter for PVR user are maximized. As for BC sub
traffic, it has been minimized as a result of our new classification mechanism for BC clients and
also because of this sub-traffics latency's sensitivity. Our results show that our approach has
allowed us to improve the broadcast video quality to the detriment of VoD and PVR. Such a
situation is just a demonstration of our reclassification approach’s effectiveness. In reality, the
administrator can designate the highest priority traffic according to the policy followed by the
service provider. The decomposition of IPTV traffic allowed us to set up PHBs specific to IPTV
media. The simulations results show the added value of our classification algorithm in improving
the video QoS.
17. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
49
5. CONCLUSION & PERSPECTIVES
In recent years, numerous researchers have attempted to enhance the QoS of IPTV services by
seeking to minimize primarily the loss rate and delay of real-time traffic. None of them regards
the trouble of classification of IPTV sub traffic and the distinction between the BC, VoD, and
PVR packets. To resolve this problem, we suggested a new addressing algorithm that assorts the
packets using the IPv6 FL field. This algorithm provides a reliable solution for improving the
QoS of IPTV sub traffic by prioritizing BC packets over that of VoD and PVR streams. We also
enhance the quality of IPTV services by implementing that method to an LTE-WLAN
Heterogeneous system. We project the performance of this algorithm using an empirical lab as
mentioned in section 4. The performance outcome shows that the quantity of data received by BC
user which has the highest priority is the topmost in the case of the moving user. Our outcomes
demonstrate also that the packet losses and end-to-end delay went down for BC users, but went
up for PVR which explains that our methods work well. We are working on implementing this
technique to the next interworking heterogeneous network (LTE-WLAN-WiMAX). In the future,
we will try to solve some security problems in the IMS-Based IPTV network and reduce the
channel zapping time.
CONFLICTS OF INTEREST
The authors declare that there are no conflicts of interest regarding the publication of this
paper.
AUTHOR’S CONTRIBUTIONS
Mohamed Matoui, Noureddine Moumkine and Abdellah Adib: Contributed to the design and
implementation of the research, to the analysis of the results and to the writing of the manuscript.
REFERENCES
[1] M. Matoui, N. Moumkine, and A. Adib, (2018),” IPTV Quality of Service Improvement Approach
Over LTE Network”, International Journal of Computer Information Systems and Industrial
Management Applications. ISSN 2150-7988 Volume 10(2018) pp. 272-288 c MIR Labs,
www.mirlabs.net/ijcisim/index.html.
[2] M. Matoui, N. Moumkine, and A. Adib, (2018). A New Architecture for Enhancing the QoS of
IPTV Video Components in LTE Systems.” In Advanced Communication Technologies and
Networking (CommNet), 2018 International Conference on (pp. 1-8). IEEE.
[3] R. Kumar, R. Margolies, R. Jana, Y. Liu, and S. S. Panwar, (2018)” Wilitv, Reducing Live Satellite
TV Costs Using Wireless Relays”, IEEE Journal on Selected Areas in Communications, vol. 36, no.
2, pp. 233-245.
[4] M. Solera, M. Toril, I. Palomo, G. Gomez, and J. Poncelan, (2018) “A Testbed for Evaluating Video
Streaming Services in LTE, Wireless Personal Communications”, vol. 98, no. 3, pp. 2753-2773.
[5] M. Li, and L. Chen, (2017)” Spectrum Allocation Algorithms for Wireless Cellular Networks
Supporting Mobile IPTV”, Computer Communication, Vol. 99, No. 1.
[6] M. Li, (2017) “Queueing Analysis of Unicast IPTV with Adaptive Modulation and Coding in
Wireless Cellular Networks”, IEEE Transactions on Vehicular Technology, Vol. PP, No. 99.
[7] D. Tsolkas, E. Liotou, N. Passas, and L. Merakos, (2017) “A Survey on Parametric QoE Estimation
for Popular Services”, Journal of Network and Computer Applications, vol. 77, pp. 117.
[8] R. Huang, X. Wei, Y. Gao, C. Lv, J. Mao, and Q. Bao, (2017) “Data-driven QoE Prediction for IPTV
Service”, Computer Communications.
[9] A. Alsaffar, M. Aazam, C. S. Hong, and E.-N. Huh, (2017) “An Architecture of IPTV Service Based
on pvr-micro Data Center and pmipv6 in Cloud Computing”, Multimedia Tools and Applications,
vol. 76, no. 20, pp. 21579-21612.
18. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
50
[10] M. Matoui, N. Moumkine, and A. Adib, (2017) “An IPv6 Flow Label Based Approach for IPTV
Quality of Service, Wireless Networks and Mobile Communications (WINCOM)”, 2017
International Conference on. IEEE, pp. 186-192.
[11] M. Matoui, N. Moumkine, and A. Adib, (2017) “An IPv6 Flow Label Based Approach for Mobile
IPTV Quality of Service”, In International Conference on Innovations in Bio-Inspired Computing and
Applications. Springer, pp. 6980.
[12] S. Deering and R. Hinden, (2017)” Internet Protocol, Version 6 (IPv6) Specification,” IETF Internet
Draft.
[13] H. Fard and A. Rahbar, (2016)” Physical Constraint and Load Aware Seamless Handover for IPTV in
Wireless LANs”, Computers & Electrical Engineering, Vol. 56.
[14] K. Sambath, M. Abdulrahman, and V. Suryani, (2016) “High Quality of Service Video Conferencing
over IMS”, International Journal of Information and Education Technology, Vol. 6, No. 6.
[15] E. S. Sabry, R. A. Ramadan, M. A. El-Azeem, and H. ElGouz, (2016) “ Evaluating IPTV Network
Performance Using Opnet”, Communication, Management and Information Technology, Proceedings
of the International Conference on Communication, Management and Information Technology , CRC
Press, pp. 377-384.
[16] S. Jiang: Future Wireless and Optical Networks, Networking Modes and Cross-Layer Design,
Springer Science & Business Media (2012).
[17] 3GPP (2011), 3G TS 23.107 V5.0.0: Quality of Service, Concept, and Architecture,http://
www.3gpp.org/ftp/Specs/archive/23_series/23.107/23107-a20.zip.
[18] D. C. Zamora and H. Przybysz, (2011)” Policy and Charging Control Architecture”, uS Patent App.
12/934,217.
[19] B. Raouyane, M. Bellafkih, M. Errais, and D. Ranc, (2011) “Ws-composite for Management &
Monitoring IMS Network”, International Journal of Next-Generation Computing, vol. 2, no. 3.
[20] Q. Hu and B. Carpenter, (2011)” Survey of proposed use cases for the IPv6 flow label”, drafthu-
flow-label-cases-03.
[21] D. Leghroudi, M. Belfkih, N. Moumkine, and M. Ramdani, (2011) “Differentiation Intra Traffic in
the IPTV over IMS Context”, in e-Technologies and Networks for Development. Springer, pp.
329336.
[22] P. Bhattarakosol, (2010) “Intelligent Quality of Service Technologies and Network Management”,
Models for Enhancing Communication. IGI Global.
[23] M. S. Siddiqui, R. A. Shaikh, and C. S. Hong, (2009) “Qos Control in Service Delivery in IMS,
Advanced Communication Technology”, 2009. ICACT 2009. 11th International Conference on, vol.
1. IEEE, pp. 157 160.
[24] B. Prakash, (2004) “Using the 20 bit Flow Label Field in The IPv6 Header to Indicate Desirable
Quality of Service on the Internet”, Ph.D. dissertation, University of Colorado.
[25] R. Jee, S. Malhotra, and M. Mahaveer, (2002) “A Modified Specification for Use of the IPv6 Flow
Label for Providing an Efficient Quality of Service Using a Hybrid Approach”, IPv6 Working Group
Internet Draft. Draft-banerjee-flowlabel-ipv6-qos-03.txt, Tech. Rep.
[26] A. Conta and J. Rajahalme, (2001) “A Model for Diffserv Use of the IPv6 Flow Label Specification”,
IETF Internet Draft.
19. International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.1, January 2021
51
AUTHORS
Mohamed Matoui got his engineering degree in Networks and Telecommunications from the National
School of Applied Sciences of Fez, Morocco in 2010. He currently works as an engineering trainer in new
information and communication technologies institute in Mohammedia, Morocco. He is preparing his
Ph.D. degree in the field of convergence of multiservice of heterogeneous networks. He works about IPTV
QoS in IMS.
Noureddine Moumkine received the Ph.D. degree from the Faculty of Sciences Semlalia, Marrakech,
Morocco in 2006. He is a professor at the Faculty of Sciences and Technology Mohammedia since 2007.
His research interests are in QoS in NGN and image processing.
Abdellah Adib received the Doctorat de 3rd Cycle and the Doctorat d’Etat-es-Sciences degrees in
Statistical Signal Processing from the Mohammed V-Agdal University, Rabat, Morocco, in 1996 and 2004,
respectively. From 1986 until 2008, he was with the Institut Scientifique, Mohammed V University, Rabat,
Morocco, as an associate professor. Since September 2008 he has been with the Department of Informatics,
Hassan II University, Mohammdia, Morocco, as a professor. His teaching includes informatics, statistical,
and digital signal processing. His research interests are in digital communications and statistical signal
processing, with emphasis on (blind) array processing.