SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013
DOI : 10.5121/ijdps.2013.4402 13
MODELLING TRAFFIC IN IMS
NETWORK NODES
BA Alassane1
, OUYA Samuel2
and FARSSI Sidi Mohamed3
1,2
Laboratory of Computer, Network and Telecommunications, Cheikh Anta Diop
University of Dakar, Dakar, Senegal
alassane.mail@gmail.com, samuel.ouya@gmail.com
3
Laboratory of Medical, Imaging and Bioinformatics Cheikh Anta Diop
University of Dakar, Senegal
farsism@yahoo.com
ABSTRACT
IMS is well integrated with existing voice and data networks, while adopting many of their key
characteristics.
The Call Session Control Functions (CSCFs) servers are the key part of the IMS structure. They are the
main components responsible for processing and routing signalling messages.
When CSCFs servers (P-CSCF, I-CSCF, S-CSCF) are running on the same host, the SIP message can be
internally passed between SIP servers using a single operating system mechanism like a queue. It increases
the reliability of the network [5], [6]. We have proposed in a last work for each type of service (between I-
CSCF and S-CSCF (call, data, multimedia.))[23], to use less than two servers well dimensioned and
running on the same operating system.
Instead dimensioning servers, in order to increase performance, we try to model traffic on IMS nodes,
particularly on entries nodes; it will provide results on separation of incoming flows, and then offer more
satisfactory service.
KEYWORDS
IMS, NODE, CSCF, SIP, QoS
1 .INTRODUCTION
The interconnection between different telecommunication networks with different access
technologies has evolved to a heterogeneous environment with many challenges for real time
applications.
In converging towards an All-IP network and new technologies, the introduction of multimedia
with services strict requirements implies QoS guarantees.
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013
14
One of main aspect of the study of the quality of service (QoS) is revisiting the traffic behavior at
the nodes of the network. There will be a need for modelling IMS nodes network and multimedia
traffic.
Relation between queue load and output rate in the core network nodes will be studied.Also, we
study the probability distribution of the number of messages in each queue and the distribution of
the delay of a message through nodes and discipline services associated.
Modelling traffic on IMS nodes, particularly on CSCFs and core services nodes will
provide results on separation of incoming flows, and then reduce SIP overload and
latency.
This paper is organized as follows: section 2 gives the node traffic equations. In section 3, three
cases messages models distributions are studied. The paper concludes in Section 4.
2. THE NODE TRAFFIC EQUATIONS
Figure 1
Nodes are modelled as D(t)/D/1/N queues [1],[18],[14],[22].
D(t) arrivals are considered when we model the exact evolution of TCP/IP not its stochastic
behaviour. Figure 1 depicts the queue and the different parameters associated with it: D(t)/D/1/N
D(t) means transient deterministic arrival
( ) = ∑ is the total rate entering the node at date
X(t) is the queue load at date t
∗( ) the output rate of the queue at date
dt the integration step (infinitesimal variation time).
The following fundamental relation must always be verified (at any time t )[18].
( + ) = ( ) − ∗( ) . + ( ) (1)
If X(t+dt) is bigger than buffer size, we start the loss processing mode. An overflow has
occurred while the source doesn’t know about it yet.
Suppose that the network is composed of N nodes, each containing an independent exponential
server and an infinite buffer . The external arrival process to each node is Poisson with average
rate λ i = 1,2,… . . N. Messages are routed probabilistically.
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013
15
The total flow into each node of the network A i = 1,2,… . . N. , is composed of external arrivals
plus flows of each of the other nodes in the network. This relationship is represented as:
A = λ + ∑ q A i = 1,2, … . . N [20],[22] (2)
where q is the probability that a message is routed from node j to node i
the associated matrix version is :
A = + AQ , where (3)
= q is an × routing matrix i, j = 1,2,… . . N
A= [A , A , … … ., A ]
= [ , , … … ., ]
When the inputs and the routing matrix are known, the total input traffic into each node is
A = [ − Q] , (4)
where I is the × identity matrix
From equation (1)
( ) =
( + ) − ( )
+ ∗( )
From equation (3) = −
Hence
( ) ( )
+ ∗( ) = − (5)
Δ + ∗
= −
∗
= ( − ) − Δ (6)
For example:
Define A as the total flow into node i , i = 1,2,3,4 . In terms of the external arrivals, suppose the
following set of equations for the total flow into each node:
=
= + 0.25
= + 0.75
= + 0.2 + 0,6
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013
16
The routing matrix is:
0 0,25 0,75 0
0 0 0 0,2
0 0 0 0,6
0 0 0 0
If the external flow is represented by the vector = [ , , … … . , ] = [2,1,0.5,3]
We solve (4) and find A= [A , A ,… … . , A ] = [2,1.5,2,4.5]
Relation between queue load and output rate is:
∗
= 2 −
∗
= 1 −
∗
= 0.5 −
∗
= 3 −
(7)
The CSCFs servers (P-CSCF, I-CSCF, S-CSCF) ,the HSS (database containing all subscribers
data, the services allowed, the granted network and location information) and the Presence Server
(PS) (inform about reachability, availability, and willingness of users) are the main components
responsible for processing and routing messages on IMS network [5],[6],[7],[8].
Consider, Proxy-CSCF(entry node of IMS network) and it externals flows , , ,
respectively to I-CSCF,S-CSCF,HSS,PS;
Relation between queue load and output rate in this core entity is:
∗
= −
∗
= −
∗
= −
∗
= −
(8)
3. MESSAGE DISTRIBUTION
Figure2
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013
17
Messages enter the node from the external lines and are fed into an input buffer, where they are
held for processing. The processor performs such operations as correcting and detecting errors,
sending positive and negative acknowledgments and routing. After processing, the message is
placed into an output queue for transmission over an output line. In this model the input buffer
and processor form a single queue as does each output buffer and line.
Let we interest to the probability distribution of the number of messages in each queue and the
distribution of the delay of a message through the node.
We study distribution associated to three discipline service: the processor sharing, the infinite
server model and the preemptive arbitrary service.
3.1 THE PROCESSOR SHARING MODEL
In a processor sharing (PS) queuing system, the server capacity is shared equally among all the
customers that are present in the system. This model is applicable to a time-shared computer
system where a central processor serves all the jobs present in the system simultaneously at an
equal service rate, suppose the Proxy-CSCF server. It is the entry node and can host traffic
engineering intelligence of the system.
Another important application of PS is for a multiplicity of TCP connections that share a
common bottleneck. The Internet router at the bottleneck simultaneously switches the flows
generated by the users, while TCP congestion control mechanism guarantees that the service rate
obtained by the different flows are equal [13], [14], [22].
Service regime is assumed to be processor sharing. In particular, we assume that the process of
the number of customers in the system is a continuous time Markov-chain, where customers
arrive according to a Poisson process with parameter λ and that the service time required by an
arriving customer is exponentially distributed with parameter μ. We also assume the stability
condition of λ < μ.
The average arrival rate =
Model D(t)/D/1/N applied to sharing processor is statistically the same as the continuous-time
Markov chain that describes the M/M/1 (FCFS) queue [22].
The mean queue-size E[Q] is given by:
[ ] = (9)
The delay distribution is:
[ ] =
( )
= (10)
The mean delay of a customer that requires amount of service x is E[D(x)]
The variable x here represents the time that the customer spends in the system to complete its
service assuming that there are no other customers being served and all the server capacity can be
dedicated to it.
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013
18
[ ( )] = (11)
[ ], [ ] and the mean delay of a customer with service requirement are insensitive to
the shape of the distribution of the service-time requirements of the customers.
In other words, these results apply also to model characterized by Poisson arrivals, generally
distributed service-time requirements, and a processor sharing service policy.
For example:
Consider packets arriving at a multiplexer where the service discipline is based on processor
sharing. Assume that the service rate of the multiplexer is 2.5 Gb/s. The mean packet size is 1250
bytes. The packet arrival process is assumed to follow a Poisson process with rate of 200,000
[packet/sec] and the packet size is exponentially distributed.
1. Find the mean number of packets in the multiplexer.
2. Find the mean delay of a packet.
3. Find the mean delay of a packet of size 5 kbytes.
Solution
Find the mean number of packets in the multiplexer.
mean packet size = 1250 x 8 = 10 000 bits
μ= = 250 000 paquets/s
ρ = = 0,8
E[Q] =
,
,
= 4
Find the mean delay of a packet.
By Little's formula E[D] =
[ ]
= = 0,00002s = 20μs
Find the mean delay of a packet of size 5 kbytes.
Let x be the time that the 5 kbytes packet is delayed if it is the only one in the system
x =
,
= 16 μs
Now we will use the time units to be microseconds.
E[D(x)] =
,
= 80 μs
A packet four times larger than the average sized packet will be delayed four times longer
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013
19
3.2 THE INFINITE SERVER MODEL
The infinite-server model is a model in which a message is immediately assigned a server as it
enters the system.
Notice that, for both processor sharing and the infinite-server case, all messages are
simultaneously in service.
There is no dependence between the probability distribution and the service time.
These results can be extended in an analogous fashion to nodes serving several different classes
of messages, each with its own arrival rate and service time distribution.
: number messages of class
: probability distribution of message
= μ and λ are the arrival and service rates
JEREMIAH F. HAYES and THIMMA V. J. GANESH BABU shown that the probability
distribution is [14]:
( , , … … ) = (1 − ) ! ∏
!
[14], (12)
Where = ∑ , = ∑
3.3 THE PREEMPTIVE ARBITRARY SERVICE
For the last case, we turn to the preemptive resume last come first served (LCFS) discipline.
For the LCFS queue discipline, a message at the head of the line having reached a certain stage in
the service process may be displaced by a new arrival. This message may be displaced in turn by
a new message, and so on it goes.
In our treatment of individual nodes we consider multiple classes of messages in a LCFS node
and the probability distribution is given by [14]:
( , , … … ) = (1 − ) ! ∏
!
, (13)
where parameters are the same defined in previously.
In general, a network can be viewed as consisting of a number of closed chains, one for each
source–destination pair or node. The flow can be viewed as number of messages circulating
between nodes. Suppose in an N-node network there is a single class of traffic (more in general)
between each pair. The number of such chains or nodes is J=N(N-1).
With the three CSCFs, HSS and PS points J=5x4=20
( , , … . . , ) = (1 − )20! ∏
!
, (14)
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013
20
4. CONCLUSION
The mean number of packet and the mean delay of a customer with service requirement are
insensitive to the shape of the distribution of the service-time requirements of the customers.
These results apply also to model characterized by Poisson arrivals with a processor sharing
service policy.
Notice that, for both processor sharing and the infinite-server case, all messages are
simultaneously in service. The final service type for which the product form holds is preemptive
resume last-come first-served (LCFS), in which newly arrived messages are served immediately.
Displaced messages are queued and resume where they were left off when the server is available
again.
When the service times of messages vary widely, these alternatives to the FCFS discipline may
offer more satisfactory service. For example, when most messages are short, with only the
occasional long message, processor sharing has the effect of giving priority to short messages.
This model can be deployed in Proxy-CSCF in this case, and priority given to voice and short
messages.
Future work: Future research needs to work on limited storage case, blocking case when buffer
overflow and at last managing priorities.
REFERENCES
[1] Hassan HASSAN, Jean-Marie GARCIA and Olivier BRUN LAAS-CNRS, Toulouse, France,
Bandwidth Allocation and Session Scheduling using SIP, JOURNAL OF COMMUNICATIONS,
VOL. 1, NO. 5, AUGUST 2006,
[2] Ward Whitt, Tail probabilities with statistical multiplexing and effective bandwidths in multiclass
queues, AT&T Bell Laboratories, Murray Hills, NJ 07974-0636, USA, August 1993
[3] Daizo Ikeda, Toshihiro Suzuki and Akira Miura, Performance Analysis of a Mobile Network for API-
Oriented Traffic, Research Laboratories, NTT DOCOMO, Inc. 3-5 Hikarino-oka, Yokosuka-shi,
Kanagawa 239-8536, Japan Prefectural University of Kumamoto 3-1-100, Tsukide, Kumamoto, 862-
8502, Japan , International Journal of Control and Automation Vol. 4, No. 4, December, 2011
[4] Tomáš Mácha, Luboš Nagy, Zdeněk Martinásek , Vít Novotný, IMS Mapping of QoS Requirements
on the Network Level, Fakulta elektrotechniky a komunikačních technologií VUT v Brně , JUNE
2010
[5] C. Chi Bell Laboratories, Alcatel-Lucent chic, Hao Bell Laboratories, Alcatel-Lucent D.Wang Bell
Laboratories, Alcatel-Lucent Z. Cao Institute of Information Science Beijing Jiaotong University,
Modelling IMS Presence Server: Traffic Analysis &Performance, 2008 IEEE
[6] Mesud Hadžialić, Mirko Škrbić, Nerma Šečić, Mirza Varatanović, Elvedina Zulić, Nedim Bijedić
University of Sarajevo , Problem of IMS modelling – Solving Approaches, CTRQ 2012
[7] Mlindi Mashologu, Performance optimization of IP Multimedia Subsystem, Dissertation.com, Boca
Raton, Florida 2010
[8] V.S. Abhayawardhana, R. Babbage, A Traffic Model for the IP Multimedia Subsystem
(IMS), 2007 IEEE
[9] Michael T. Hunter Russell J. Clark Frank S. Park Security Issues with the IP Multimedia Subsystem
(IMS): A White Paper College of Computing Georgia Institute of Technology
{frank,mhunter,russ.clark}@gatech.edu Version 1.0 September 1, 2007
[10] Pierre COATANEA, IMS: IP Multimedia Subsystem, EFORT
[11] Nils Berglund, Chaînes de Markov, Université d’Orléans Décembre 2007
[12] Alexander Klemm, Christoph Lindemann, and Marco Lohmann Modeling IP Traffic Using the Batch
Markovian Arrival Process, Modeling IP Traffic Using the Batch Markovian Arrival Process
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013
21
University of Dortmund Department of Computer Science August-Schmidt-Str. 12 44227 Dortmund,
Germany
[13] Modelling Markovian Queues and Similar Processes Winfried Grassmann Department of Computer
Science University of Saskatchewan, CORS - SCRO 2000 ANNUAL CONFERENCE Energy,
Natural Resources, and the Environment MAY 29-31, 2000 EDMONTON, ALBERTA
[14] JEREMIAH F. HAYES THIMMA V. J. GANESH BABU Modeling and Analysis of
telecommunications network 2004 by John Wiley & Sons, Inc. All rights reserved
[15] Jeffrey P. Buzen Harvard University and Honeywell Information Systems, Computational Algorithms
for Closed Queueing Networks with Exponential Servers Communications September 1973 of
Volume 16 the ACM Number 9
[16] Muhammad T. Alam, Graduate Student Member IEEE, Zheng Da Wu, Member IEEE Admission
Control Approaches in the IMS, Presence Service,international journal of computer science volume 1
number 1 2006
[17] Henning Schulzrinne, Personal Mobility for Multimedia Services in the Internet, IDMS’96 (European
Workshop on Interactive Distributed Multimedia Systems and Services), Berlin, Germany, March 4-
6, 1996
[18] Hassan HASSAN Modélisation et analyse de performances du trafic multimedia dans les réseaux
hétérogènes, mémoire Doctorat de l’Université Paul Sabatier–Toulouse III 2007
[19] PETTER LINDGREN, Diameter service creation investigation and HSS, Evaluation, Master’s Thesis
Supervisor: Stefan Östergaard, Kajsa Goffrich Examiner: Prof. Gerald Q. Maguire Jr, 2010-02-23
[20] Balaji Prabhakar Stanford University, Network Processor Algorithms: Design and Analysis,
Stochastic Networks Conference Montreal July 22, 2004
[21] Vern Paxson and Sally Floyd, Wide-Area Traffic: The Failure of Poisson Modelling, Lawrence
Berkeley Laboratory and, EECS Division, University of California, Berkeley1Cyclotron Road,
Berkeley CA 94720, July 18, 1995
[22] Moshe Zukerman, Introduction to Queuing Theory and Stochastic Teletraffic Models, 2000-1012
[23] Improving traffic performance on IMS network, BA Alassane, OUYA Samuel, FARSSI Sidi
Mohamed, may 2013
Authors
BA Alassane is a PhD student in telecommunications holder of a DEA in Mathematics
Dr OUYA Samuel is the head of the Laboratory of Computer, Network and
Telecommunications, Cheikh Anta Diop University of Dakar, Senegal. Doctor OUYA is
a mathematician IT specialist having a long experience in teaching and search. He
participates in several IT meets.
Dr FARSSI Sidi Mohamed is the head of the Laboratory of Medical, Imaging and
Bioinformatics, Cheikh Anta Diop University of Dakar, Senegal. Doctor FARSSI is a IT
specialist who participate in several IT and medical meetings

More Related Content

What's hot

Towards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol EnvironmentsTowards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol EnvironmentsIDES Editor
 
An Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet DelayAn Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet DelayCSCJournals
 
Kkbnet 2010-a compa
Kkbnet 2010-a  compaKkbnet 2010-a  compa
Kkbnet 2010-a compahanums1
 
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...IOSR Journals
 
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETSQUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETScseij
 
ESTIMATION OF MEDIUM ACCESS CONTROL LAYER PACKET DELAY DISTRIBUTION FOR IEEE ...
ESTIMATION OF MEDIUM ACCESS CONTROL LAYER PACKET DELAY DISTRIBUTION FOR IEEE ...ESTIMATION OF MEDIUM ACCESS CONTROL LAYER PACKET DELAY DISTRIBUTION FOR IEEE ...
ESTIMATION OF MEDIUM ACCESS CONTROL LAYER PACKET DELAY DISTRIBUTION FOR IEEE ...ijwmn
 
(Paper Presentation) ZIGZAG: An Efficient Peer-to-Peer Scheme for Media Strea...
(Paper Presentation)ZIGZAG: An Efficient Peer-to-Peer Scheme forMedia Strea...(Paper Presentation)ZIGZAG: An Efficient Peer-to-Peer Scheme forMedia Strea...
(Paper Presentation) ZIGZAG: An Efficient Peer-to-Peer Scheme for Media Strea...Rajesh Piryani
 
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...IDES Editor
 
Wireless memory: Eliminating communication redundancy in Wi-Fi networks
Wireless memory: Eliminating communication redundancy in Wi-Fi networksWireless memory: Eliminating communication redundancy in Wi-Fi networks
Wireless memory: Eliminating communication redundancy in Wi-Fi networksZhenyun Zhuang
 
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...ijmnct
 
Pbcbt an improvement of ntbcbt algorithm
Pbcbt an improvement of ntbcbt algorithmPbcbt an improvement of ntbcbt algorithm
Pbcbt an improvement of ntbcbt algorithmijp2p
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...IJCNCJournal
 

What's hot (15)

Solution(1)
Solution(1)Solution(1)
Solution(1)
 
Towards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol EnvironmentsTowards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol Environments
 
Chapter 4 pc
Chapter 4 pcChapter 4 pc
Chapter 4 pc
 
06775257
0677525706775257
06775257
 
An Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet DelayAn Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet Delay
 
Kkbnet 2010-a compa
Kkbnet 2010-a  compaKkbnet 2010-a  compa
Kkbnet 2010-a compa
 
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
 
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETSQUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
 
ESTIMATION OF MEDIUM ACCESS CONTROL LAYER PACKET DELAY DISTRIBUTION FOR IEEE ...
ESTIMATION OF MEDIUM ACCESS CONTROL LAYER PACKET DELAY DISTRIBUTION FOR IEEE ...ESTIMATION OF MEDIUM ACCESS CONTROL LAYER PACKET DELAY DISTRIBUTION FOR IEEE ...
ESTIMATION OF MEDIUM ACCESS CONTROL LAYER PACKET DELAY DISTRIBUTION FOR IEEE ...
 
(Paper Presentation) ZIGZAG: An Efficient Peer-to-Peer Scheme for Media Strea...
(Paper Presentation)ZIGZAG: An Efficient Peer-to-Peer Scheme forMedia Strea...(Paper Presentation)ZIGZAG: An Efficient Peer-to-Peer Scheme forMedia Strea...
(Paper Presentation) ZIGZAG: An Efficient Peer-to-Peer Scheme for Media Strea...
 
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
 
Wireless memory: Eliminating communication redundancy in Wi-Fi networks
Wireless memory: Eliminating communication redundancy in Wi-Fi networksWireless memory: Eliminating communication redundancy in Wi-Fi networks
Wireless memory: Eliminating communication redundancy in Wi-Fi networks
 
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
 
Pbcbt an improvement of ntbcbt algorithm
Pbcbt an improvement of ntbcbt algorithmPbcbt an improvement of ntbcbt algorithm
Pbcbt an improvement of ntbcbt algorithm
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...
 

Viewers also liked

Permission based group mutual exclusion
Permission based group mutual exclusionPermission based group mutual exclusion
Permission based group mutual exclusionijdpsjournal
 
Scalable frequent itemset mining using heterogeneous computing par apriori a...
Scalable frequent itemset mining using heterogeneous computing  par apriori a...Scalable frequent itemset mining using heterogeneous computing  par apriori a...
Scalable frequent itemset mining using heterogeneous computing par apriori a...ijdpsjournal
 
KALMAN FILTER BASED CONGESTION CONTROLLER
KALMAN FILTER BASED CONGESTION CONTROLLERKALMAN FILTER BASED CONGESTION CONTROLLER
KALMAN FILTER BASED CONGESTION CONTROLLERijdpsjournal
 
AN EFFICIENT PARALLEL ALGORITHM FOR COMPUTING DETERMINANT OF NON-SQUARE MATRI...
AN EFFICIENT PARALLEL ALGORITHM FOR COMPUTING DETERMINANT OF NON-SQUARE MATRI...AN EFFICIENT PARALLEL ALGORITHM FOR COMPUTING DETERMINANT OF NON-SQUARE MATRI...
AN EFFICIENT PARALLEL ALGORITHM FOR COMPUTING DETERMINANT OF NON-SQUARE MATRI...ijdpsjournal
 
A secure service provisioning framework for cyber physical cloud computing sy...
A secure service provisioning framework for cyber physical cloud computing sy...A secure service provisioning framework for cyber physical cloud computing sy...
A secure service provisioning framework for cyber physical cloud computing sy...ijdpsjournal
 
BARRIERS TO CALL PRACTICES IN AN EFL CONTEXT: A CASE STUDY OF PREPARATORY YEA...
BARRIERS TO CALL PRACTICES IN AN EFL CONTEXT: A CASE STUDY OF PREPARATORY YEA...BARRIERS TO CALL PRACTICES IN AN EFL CONTEXT: A CASE STUDY OF PREPARATORY YEA...
BARRIERS TO CALL PRACTICES IN AN EFL CONTEXT: A CASE STUDY OF PREPARATORY YEA...ijdpsjournal
 
PERFORMANCE AND ENERGY-EFFICIENCY ASPECTS OF CLUSTERS OF SINGLE BOARD COMPUTERS
PERFORMANCE AND ENERGY-EFFICIENCY ASPECTS OF CLUSTERS OF SINGLE BOARD COMPUTERSPERFORMANCE AND ENERGY-EFFICIENCY ASPECTS OF CLUSTERS OF SINGLE BOARD COMPUTERS
PERFORMANCE AND ENERGY-EFFICIENCY ASPECTS OF CLUSTERS OF SINGLE BOARD COMPUTERSijdpsjournal
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniquesijdpsjournal
 
An effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentAn effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentijdpsjournal
 
Risky Reading: images and the vision of African education
Risky Reading: images and the vision of African educationRisky Reading: images and the vision of African education
Risky Reading: images and the vision of African educationkioglobal
 
Before we shake hands: representation and the global future of education
Before we shake hands: representation and the global future of education Before we shake hands: representation and the global future of education
Before we shake hands: representation and the global future of education kioglobal
 
Risky Reading: images and the vision of African education
Risky Reading: images and the vision of African educationRisky Reading: images and the vision of African education
Risky Reading: images and the vision of African educationkioglobal
 
A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...ijdpsjournal
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...ijdpsjournal
 
Less a LessPHP
Less a LessPHPLess a LessPHP
Less a LessPHPcubaguest
 
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Editor IJARCET
 
Promotion Group universal media
Promotion Group universal mediaPromotion Group universal media
Promotion Group universal mediaPavel Sidorenco
 

Viewers also liked (20)

Permission based group mutual exclusion
Permission based group mutual exclusionPermission based group mutual exclusion
Permission based group mutual exclusion
 
Scalable frequent itemset mining using heterogeneous computing par apriori a...
Scalable frequent itemset mining using heterogeneous computing  par apriori a...Scalable frequent itemset mining using heterogeneous computing  par apriori a...
Scalable frequent itemset mining using heterogeneous computing par apriori a...
 
KALMAN FILTER BASED CONGESTION CONTROLLER
KALMAN FILTER BASED CONGESTION CONTROLLERKALMAN FILTER BASED CONGESTION CONTROLLER
KALMAN FILTER BASED CONGESTION CONTROLLER
 
AN EFFICIENT PARALLEL ALGORITHM FOR COMPUTING DETERMINANT OF NON-SQUARE MATRI...
AN EFFICIENT PARALLEL ALGORITHM FOR COMPUTING DETERMINANT OF NON-SQUARE MATRI...AN EFFICIENT PARALLEL ALGORITHM FOR COMPUTING DETERMINANT OF NON-SQUARE MATRI...
AN EFFICIENT PARALLEL ALGORITHM FOR COMPUTING DETERMINANT OF NON-SQUARE MATRI...
 
A secure service provisioning framework for cyber physical cloud computing sy...
A secure service provisioning framework for cyber physical cloud computing sy...A secure service provisioning framework for cyber physical cloud computing sy...
A secure service provisioning framework for cyber physical cloud computing sy...
 
BARRIERS TO CALL PRACTICES IN AN EFL CONTEXT: A CASE STUDY OF PREPARATORY YEA...
BARRIERS TO CALL PRACTICES IN AN EFL CONTEXT: A CASE STUDY OF PREPARATORY YEA...BARRIERS TO CALL PRACTICES IN AN EFL CONTEXT: A CASE STUDY OF PREPARATORY YEA...
BARRIERS TO CALL PRACTICES IN AN EFL CONTEXT: A CASE STUDY OF PREPARATORY YEA...
 
PERFORMANCE AND ENERGY-EFFICIENCY ASPECTS OF CLUSTERS OF SINGLE BOARD COMPUTERS
PERFORMANCE AND ENERGY-EFFICIENCY ASPECTS OF CLUSTERS OF SINGLE BOARD COMPUTERSPERFORMANCE AND ENERGY-EFFICIENCY ASPECTS OF CLUSTERS OF SINGLE BOARD COMPUTERS
PERFORMANCE AND ENERGY-EFFICIENCY ASPECTS OF CLUSTERS OF SINGLE BOARD COMPUTERS
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
 
An effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentAn effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded content
 
Risky Reading: images and the vision of African education
Risky Reading: images and the vision of African educationRisky Reading: images and the vision of African education
Risky Reading: images and the vision of African education
 
Before we shake hands: representation and the global future of education
Before we shake hands: representation and the global future of education Before we shake hands: representation and the global future of education
Before we shake hands: representation and the global future of education
 
Risky Reading: images and the vision of African education
Risky Reading: images and the vision of African educationRisky Reading: images and the vision of African education
Risky Reading: images and the vision of African education
 
A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...
 
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
A Cluster based Technique for Securing Routing Protocol AODV against Black-ho...
 
Less a LessPHP
Less a LessPHPLess a LessPHP
Less a LessPHP
 
E080104650
E080104650E080104650
E080104650
 
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029
 
Small business financing options workshop
Small business financing options workshopSmall business financing options workshop
Small business financing options workshop
 
[CV] - Fitriyani - OK
[CV] - Fitriyani - OK[CV] - Fitriyani - OK
[CV] - Fitriyani - OK
 
Promotion Group universal media
Promotion Group universal mediaPromotion Group universal media
Promotion Group universal media
 

Similar to MODELLING TRAFFIC IN IMS NETWORK NODES

A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGijasuc
 
Broadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshBroadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshIJCNCJournal
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcastIJCNCJournal
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
Comparative analysis of congestion
Comparative analysis of congestionComparative analysis of congestion
Comparative analysis of congestionijwmn
 
A novel architecture of rns based
A novel architecture of rns basedA novel architecture of rns based
A novel architecture of rns basedVLSICS Design
 
A Deterministic Model Of Time For Distributed Systems
A Deterministic Model Of Time For Distributed SystemsA Deterministic Model Of Time For Distributed Systems
A Deterministic Model Of Time For Distributed SystemsJim Webb
 
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONSCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONijdms
 
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONSCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONijdms
 
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONSCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONijdms
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Recital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkRecital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
 

Similar to MODELLING TRAFFIC IN IMS NETWORK NODES (20)

A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
 
Broadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshBroadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d mesh
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcast
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Comparative analysis of congestion
Comparative analysis of congestionComparative analysis of congestion
Comparative analysis of congestion
 
A novel architecture of rns based
A novel architecture of rns basedA novel architecture of rns based
A novel architecture of rns based
 
A Deterministic Model Of Time For Distributed Systems
A Deterministic Model Of Time For Distributed SystemsA Deterministic Model Of Time For Distributed Systems
A Deterministic Model Of Time For Distributed Systems
 
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONSCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
 
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONSCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
 
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONSCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Queue
QueueQueue
Queue
 
Recital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkRecital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless network
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

MODELLING TRAFFIC IN IMS NETWORK NODES

  • 1. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013 DOI : 10.5121/ijdps.2013.4402 13 MODELLING TRAFFIC IN IMS NETWORK NODES BA Alassane1 , OUYA Samuel2 and FARSSI Sidi Mohamed3 1,2 Laboratory of Computer, Network and Telecommunications, Cheikh Anta Diop University of Dakar, Dakar, Senegal alassane.mail@gmail.com, samuel.ouya@gmail.com 3 Laboratory of Medical, Imaging and Bioinformatics Cheikh Anta Diop University of Dakar, Senegal farsism@yahoo.com ABSTRACT IMS is well integrated with existing voice and data networks, while adopting many of their key characteristics. The Call Session Control Functions (CSCFs) servers are the key part of the IMS structure. They are the main components responsible for processing and routing signalling messages. When CSCFs servers (P-CSCF, I-CSCF, S-CSCF) are running on the same host, the SIP message can be internally passed between SIP servers using a single operating system mechanism like a queue. It increases the reliability of the network [5], [6]. We have proposed in a last work for each type of service (between I- CSCF and S-CSCF (call, data, multimedia.))[23], to use less than two servers well dimensioned and running on the same operating system. Instead dimensioning servers, in order to increase performance, we try to model traffic on IMS nodes, particularly on entries nodes; it will provide results on separation of incoming flows, and then offer more satisfactory service. KEYWORDS IMS, NODE, CSCF, SIP, QoS 1 .INTRODUCTION The interconnection between different telecommunication networks with different access technologies has evolved to a heterogeneous environment with many challenges for real time applications. In converging towards an All-IP network and new technologies, the introduction of multimedia with services strict requirements implies QoS guarantees.
  • 2. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013 14 One of main aspect of the study of the quality of service (QoS) is revisiting the traffic behavior at the nodes of the network. There will be a need for modelling IMS nodes network and multimedia traffic. Relation between queue load and output rate in the core network nodes will be studied.Also, we study the probability distribution of the number of messages in each queue and the distribution of the delay of a message through nodes and discipline services associated. Modelling traffic on IMS nodes, particularly on CSCFs and core services nodes will provide results on separation of incoming flows, and then reduce SIP overload and latency. This paper is organized as follows: section 2 gives the node traffic equations. In section 3, three cases messages models distributions are studied. The paper concludes in Section 4. 2. THE NODE TRAFFIC EQUATIONS Figure 1 Nodes are modelled as D(t)/D/1/N queues [1],[18],[14],[22]. D(t) arrivals are considered when we model the exact evolution of TCP/IP not its stochastic behaviour. Figure 1 depicts the queue and the different parameters associated with it: D(t)/D/1/N D(t) means transient deterministic arrival ( ) = ∑ is the total rate entering the node at date X(t) is the queue load at date t ∗( ) the output rate of the queue at date dt the integration step (infinitesimal variation time). The following fundamental relation must always be verified (at any time t )[18]. ( + ) = ( ) − ∗( ) . + ( ) (1) If X(t+dt) is bigger than buffer size, we start the loss processing mode. An overflow has occurred while the source doesn’t know about it yet. Suppose that the network is composed of N nodes, each containing an independent exponential server and an infinite buffer . The external arrival process to each node is Poisson with average rate λ i = 1,2,… . . N. Messages are routed probabilistically.
  • 3. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013 15 The total flow into each node of the network A i = 1,2,… . . N. , is composed of external arrivals plus flows of each of the other nodes in the network. This relationship is represented as: A = λ + ∑ q A i = 1,2, … . . N [20],[22] (2) where q is the probability that a message is routed from node j to node i the associated matrix version is : A = + AQ , where (3) = q is an × routing matrix i, j = 1,2,… . . N A= [A , A , … … ., A ] = [ , , … … ., ] When the inputs and the routing matrix are known, the total input traffic into each node is A = [ − Q] , (4) where I is the × identity matrix From equation (1) ( ) = ( + ) − ( ) + ∗( ) From equation (3) = − Hence ( ) ( ) + ∗( ) = − (5) Δ + ∗ = − ∗ = ( − ) − Δ (6) For example: Define A as the total flow into node i , i = 1,2,3,4 . In terms of the external arrivals, suppose the following set of equations for the total flow into each node: = = + 0.25 = + 0.75 = + 0.2 + 0,6
  • 4. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013 16 The routing matrix is: 0 0,25 0,75 0 0 0 0 0,2 0 0 0 0,6 0 0 0 0 If the external flow is represented by the vector = [ , , … … . , ] = [2,1,0.5,3] We solve (4) and find A= [A , A ,… … . , A ] = [2,1.5,2,4.5] Relation between queue load and output rate is: ∗ = 2 − ∗ = 1 − ∗ = 0.5 − ∗ = 3 − (7) The CSCFs servers (P-CSCF, I-CSCF, S-CSCF) ,the HSS (database containing all subscribers data, the services allowed, the granted network and location information) and the Presence Server (PS) (inform about reachability, availability, and willingness of users) are the main components responsible for processing and routing messages on IMS network [5],[6],[7],[8]. Consider, Proxy-CSCF(entry node of IMS network) and it externals flows , , , respectively to I-CSCF,S-CSCF,HSS,PS; Relation between queue load and output rate in this core entity is: ∗ = − ∗ = − ∗ = − ∗ = − (8) 3. MESSAGE DISTRIBUTION Figure2
  • 5. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013 17 Messages enter the node from the external lines and are fed into an input buffer, where they are held for processing. The processor performs such operations as correcting and detecting errors, sending positive and negative acknowledgments and routing. After processing, the message is placed into an output queue for transmission over an output line. In this model the input buffer and processor form a single queue as does each output buffer and line. Let we interest to the probability distribution of the number of messages in each queue and the distribution of the delay of a message through the node. We study distribution associated to three discipline service: the processor sharing, the infinite server model and the preemptive arbitrary service. 3.1 THE PROCESSOR SHARING MODEL In a processor sharing (PS) queuing system, the server capacity is shared equally among all the customers that are present in the system. This model is applicable to a time-shared computer system where a central processor serves all the jobs present in the system simultaneously at an equal service rate, suppose the Proxy-CSCF server. It is the entry node and can host traffic engineering intelligence of the system. Another important application of PS is for a multiplicity of TCP connections that share a common bottleneck. The Internet router at the bottleneck simultaneously switches the flows generated by the users, while TCP congestion control mechanism guarantees that the service rate obtained by the different flows are equal [13], [14], [22]. Service regime is assumed to be processor sharing. In particular, we assume that the process of the number of customers in the system is a continuous time Markov-chain, where customers arrive according to a Poisson process with parameter λ and that the service time required by an arriving customer is exponentially distributed with parameter μ. We also assume the stability condition of λ < μ. The average arrival rate = Model D(t)/D/1/N applied to sharing processor is statistically the same as the continuous-time Markov chain that describes the M/M/1 (FCFS) queue [22]. The mean queue-size E[Q] is given by: [ ] = (9) The delay distribution is: [ ] = ( ) = (10) The mean delay of a customer that requires amount of service x is E[D(x)] The variable x here represents the time that the customer spends in the system to complete its service assuming that there are no other customers being served and all the server capacity can be dedicated to it.
  • 6. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013 18 [ ( )] = (11) [ ], [ ] and the mean delay of a customer with service requirement are insensitive to the shape of the distribution of the service-time requirements of the customers. In other words, these results apply also to model characterized by Poisson arrivals, generally distributed service-time requirements, and a processor sharing service policy. For example: Consider packets arriving at a multiplexer where the service discipline is based on processor sharing. Assume that the service rate of the multiplexer is 2.5 Gb/s. The mean packet size is 1250 bytes. The packet arrival process is assumed to follow a Poisson process with rate of 200,000 [packet/sec] and the packet size is exponentially distributed. 1. Find the mean number of packets in the multiplexer. 2. Find the mean delay of a packet. 3. Find the mean delay of a packet of size 5 kbytes. Solution Find the mean number of packets in the multiplexer. mean packet size = 1250 x 8 = 10 000 bits μ= = 250 000 paquets/s ρ = = 0,8 E[Q] = , , = 4 Find the mean delay of a packet. By Little's formula E[D] = [ ] = = 0,00002s = 20μs Find the mean delay of a packet of size 5 kbytes. Let x be the time that the 5 kbytes packet is delayed if it is the only one in the system x = , = 16 μs Now we will use the time units to be microseconds. E[D(x)] = , = 80 μs A packet four times larger than the average sized packet will be delayed four times longer
  • 7. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013 19 3.2 THE INFINITE SERVER MODEL The infinite-server model is a model in which a message is immediately assigned a server as it enters the system. Notice that, for both processor sharing and the infinite-server case, all messages are simultaneously in service. There is no dependence between the probability distribution and the service time. These results can be extended in an analogous fashion to nodes serving several different classes of messages, each with its own arrival rate and service time distribution. : number messages of class : probability distribution of message = μ and λ are the arrival and service rates JEREMIAH F. HAYES and THIMMA V. J. GANESH BABU shown that the probability distribution is [14]: ( , , … … ) = (1 − ) ! ∏ ! [14], (12) Where = ∑ , = ∑ 3.3 THE PREEMPTIVE ARBITRARY SERVICE For the last case, we turn to the preemptive resume last come first served (LCFS) discipline. For the LCFS queue discipline, a message at the head of the line having reached a certain stage in the service process may be displaced by a new arrival. This message may be displaced in turn by a new message, and so on it goes. In our treatment of individual nodes we consider multiple classes of messages in a LCFS node and the probability distribution is given by [14]: ( , , … … ) = (1 − ) ! ∏ ! , (13) where parameters are the same defined in previously. In general, a network can be viewed as consisting of a number of closed chains, one for each source–destination pair or node. The flow can be viewed as number of messages circulating between nodes. Suppose in an N-node network there is a single class of traffic (more in general) between each pair. The number of such chains or nodes is J=N(N-1). With the three CSCFs, HSS and PS points J=5x4=20 ( , , … . . , ) = (1 − )20! ∏ ! , (14)
  • 8. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013 20 4. CONCLUSION The mean number of packet and the mean delay of a customer with service requirement are insensitive to the shape of the distribution of the service-time requirements of the customers. These results apply also to model characterized by Poisson arrivals with a processor sharing service policy. Notice that, for both processor sharing and the infinite-server case, all messages are simultaneously in service. The final service type for which the product form holds is preemptive resume last-come first-served (LCFS), in which newly arrived messages are served immediately. Displaced messages are queued and resume where they were left off when the server is available again. When the service times of messages vary widely, these alternatives to the FCFS discipline may offer more satisfactory service. For example, when most messages are short, with only the occasional long message, processor sharing has the effect of giving priority to short messages. This model can be deployed in Proxy-CSCF in this case, and priority given to voice and short messages. Future work: Future research needs to work on limited storage case, blocking case when buffer overflow and at last managing priorities. REFERENCES [1] Hassan HASSAN, Jean-Marie GARCIA and Olivier BRUN LAAS-CNRS, Toulouse, France, Bandwidth Allocation and Session Scheduling using SIP, JOURNAL OF COMMUNICATIONS, VOL. 1, NO. 5, AUGUST 2006, [2] Ward Whitt, Tail probabilities with statistical multiplexing and effective bandwidths in multiclass queues, AT&T Bell Laboratories, Murray Hills, NJ 07974-0636, USA, August 1993 [3] Daizo Ikeda, Toshihiro Suzuki and Akira Miura, Performance Analysis of a Mobile Network for API- Oriented Traffic, Research Laboratories, NTT DOCOMO, Inc. 3-5 Hikarino-oka, Yokosuka-shi, Kanagawa 239-8536, Japan Prefectural University of Kumamoto 3-1-100, Tsukide, Kumamoto, 862- 8502, Japan , International Journal of Control and Automation Vol. 4, No. 4, December, 2011 [4] Tomáš Mácha, Luboš Nagy, Zdeněk Martinásek , Vít Novotný, IMS Mapping of QoS Requirements on the Network Level, Fakulta elektrotechniky a komunikačních technologií VUT v Brně , JUNE 2010 [5] C. Chi Bell Laboratories, Alcatel-Lucent chic, Hao Bell Laboratories, Alcatel-Lucent D.Wang Bell Laboratories, Alcatel-Lucent Z. Cao Institute of Information Science Beijing Jiaotong University, Modelling IMS Presence Server: Traffic Analysis &Performance, 2008 IEEE [6] Mesud Hadžialić, Mirko Škrbić, Nerma Šečić, Mirza Varatanović, Elvedina Zulić, Nedim Bijedić University of Sarajevo , Problem of IMS modelling – Solving Approaches, CTRQ 2012 [7] Mlindi Mashologu, Performance optimization of IP Multimedia Subsystem, Dissertation.com, Boca Raton, Florida 2010 [8] V.S. Abhayawardhana, R. Babbage, A Traffic Model for the IP Multimedia Subsystem (IMS), 2007 IEEE [9] Michael T. Hunter Russell J. Clark Frank S. Park Security Issues with the IP Multimedia Subsystem (IMS): A White Paper College of Computing Georgia Institute of Technology {frank,mhunter,russ.clark}@gatech.edu Version 1.0 September 1, 2007 [10] Pierre COATANEA, IMS: IP Multimedia Subsystem, EFORT [11] Nils Berglund, Chaînes de Markov, Université d’Orléans Décembre 2007 [12] Alexander Klemm, Christoph Lindemann, and Marco Lohmann Modeling IP Traffic Using the Batch Markovian Arrival Process, Modeling IP Traffic Using the Batch Markovian Arrival Process
  • 9. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.4, July 2013 21 University of Dortmund Department of Computer Science August-Schmidt-Str. 12 44227 Dortmund, Germany [13] Modelling Markovian Queues and Similar Processes Winfried Grassmann Department of Computer Science University of Saskatchewan, CORS - SCRO 2000 ANNUAL CONFERENCE Energy, Natural Resources, and the Environment MAY 29-31, 2000 EDMONTON, ALBERTA [14] JEREMIAH F. HAYES THIMMA V. J. GANESH BABU Modeling and Analysis of telecommunications network 2004 by John Wiley & Sons, Inc. All rights reserved [15] Jeffrey P. Buzen Harvard University and Honeywell Information Systems, Computational Algorithms for Closed Queueing Networks with Exponential Servers Communications September 1973 of Volume 16 the ACM Number 9 [16] Muhammad T. Alam, Graduate Student Member IEEE, Zheng Da Wu, Member IEEE Admission Control Approaches in the IMS, Presence Service,international journal of computer science volume 1 number 1 2006 [17] Henning Schulzrinne, Personal Mobility for Multimedia Services in the Internet, IDMS’96 (European Workshop on Interactive Distributed Multimedia Systems and Services), Berlin, Germany, March 4- 6, 1996 [18] Hassan HASSAN Modélisation et analyse de performances du trafic multimedia dans les réseaux hétérogènes, mémoire Doctorat de l’Université Paul Sabatier–Toulouse III 2007 [19] PETTER LINDGREN, Diameter service creation investigation and HSS, Evaluation, Master’s Thesis Supervisor: Stefan Östergaard, Kajsa Goffrich Examiner: Prof. Gerald Q. Maguire Jr, 2010-02-23 [20] Balaji Prabhakar Stanford University, Network Processor Algorithms: Design and Analysis, Stochastic Networks Conference Montreal July 22, 2004 [21] Vern Paxson and Sally Floyd, Wide-Area Traffic: The Failure of Poisson Modelling, Lawrence Berkeley Laboratory and, EECS Division, University of California, Berkeley1Cyclotron Road, Berkeley CA 94720, July 18, 1995 [22] Moshe Zukerman, Introduction to Queuing Theory and Stochastic Teletraffic Models, 2000-1012 [23] Improving traffic performance on IMS network, BA Alassane, OUYA Samuel, FARSSI Sidi Mohamed, may 2013 Authors BA Alassane is a PhD student in telecommunications holder of a DEA in Mathematics Dr OUYA Samuel is the head of the Laboratory of Computer, Network and Telecommunications, Cheikh Anta Diop University of Dakar, Senegal. Doctor OUYA is a mathematician IT specialist having a long experience in teaching and search. He participates in several IT meets. Dr FARSSI Sidi Mohamed is the head of the Laboratory of Medical, Imaging and Bioinformatics, Cheikh Anta Diop University of Dakar, Senegal. Doctor FARSSI is a IT specialist who participate in several IT and medical meetings