SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
International Journal of Computer Networks and Communications Security 
VOL. 1, NO. 3, AUGUST 2013, 68–74 
C 
C 
Available online at: www.ijcncs.org 
N 
ISSN 2308-9830 
S 
Performance Enhancement of VNSIP approach, using MCAC 
algorithm 
I. MOURTAJI1, M. BOUHORMA2, M. BENAHMED3, A. BOUHDIR4 
1234LIST laboratory, FST of Tangier 
E-mail: 1imourtaji@gmail.com, 2bouhorma@gmail.com, 3med.benahmed@gmail.com, 
4hakim.anouar@gmail.com 
ABSTRACT 
Ad Hoc Networks provide a real opportunity to design flexible networks, very simple to deploy. However 
they remain a particular computation environment, characterized by the deficiency of pre-existed and 
centralized infrastructure. In the other hand, SIP protocol, which knows a huge booming in internet 
networks, requires centralized entities, like proxy server, registrar server and location service; consequently 
SIP is not adapted to Ad Hoc networks. We have presented in a new technique VNSIP (Virtual Network for 
Session Initiation Protocol) to fix the problem related to constraints of SIP deployment in MANET (Mobile 
Ad Hoc Networks). In this paper we use a new algorithm which we have called MCAC (MANET Call 
Admission Control) to improve VNSIP Performances. 
Keywords: Ad hoc, SIP, MCAC, Evaluation of performance. 
1 INTRODUCTION 
VNSIP [13] allows decentralization of SIP 
proxies, specially registrar, proxy and location 
servers [1, 2, 10], by integrating those server 
functionalities in each MANET node. VNSIP node 
contains a supervisor module VNA (Virtual 
Network Algorithm), it is responsible of activating 
and deactivating server functionalities according to 
the position of the node in the MANET [3][7]. To 
achieve evaluation of performances of VNSIP, we 
have compared our solution to the TCA approach 
[9], which is consider as a solution giving a very 
interesting result to fix the problem of SIP 
adaptation to Ad Hoc Networks. Simulations of 
both approaches has shown that our solution 
guarantees better results than TCA in terms of 
setting time and failure rates of SIP sessions. These 
good results were obtained thanks to VNA, the 
algorithm used to construct the VNSIP topology, 
and thanks to the mechanism of replication of SIP 
messages. On the other side, this mechanism has its 
own disadvantage, which involves that our solution 
proposes lower results than TCA in term of 
bandwidth consumption. to improve those results 
we propose a new technique, MCAC (MANET Call 
Admission Control) , deployed on service level, this 
application will guarantee that a limited number of 
calls is controlled in the MANET and QoS is 
ensured. When the threshold of calls is reached, 
MANET proceeds interdiction of new calls. 
This paper is organized as follows. In the first 
section we’ll give an overview of VNSIP solution. 
In the second section we’ll present MCAC 
algorithm. Afterward in the next section, we'll 
present implementation of MCAC to VNSIP 
approach, and in the last section we'll evaluate new 
performances of VNSIP. In the end, we'll achieve 
this paper with a conclusion, with future works and 
perspectives. 
2 VNSIP OVERVIEW 
VNSIP solution [13] tries to define a dynamic 
virtual network inside the MANET, to be exploited 
by nodes, to adequately choose which one will be 
in charge to execute SIP server tasks. VNA (Virtual 
Network Algorithm) will be the entity in charge to 
activate or deactivate SIP server functionalities in 
each MANET node. A VNSIP node (see figure 1) 
consists of several entities, when interacting 
between them; they allow communication in 
MANET using SIP protocol.
69 
I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 
Fig. 1. VNSIP Node Architecture 
2.1 Virtual Network Algorithm (VNA) 
VNA starts by the construction of neighbor 
tables. VNA defines a flag “VN_membership_flag” 
which shows if a node belongs to the VN (Virtual 
Nework) or not. When executing VNA, the VN will 
include all nodes having VN_membership_flag=1. 
VNA is characterized by two conditions: 
 Condition1: if a node doesn’t belong to the 
VN and the number of its neighbors which 
belong to the VN is lower than the number of 
its neighbors which don’t belong to the VN 
then the VN_membership_flag of this node is 
set to 1. 
 Condition 2: if a node belongs to the VN and 
the number of its neighbors which belong to 
the VN is higher than the number of its 
neighbors which don’t belong to the VN then 
the VN_membership_flag of this node is set to 
0. 
To complete the construction of a connected VN, 
we define Gateway nodes to ensure connections 
between all nodes belonging to the VN. When 
finishing the selection of gateway nodes the 
construction of the VN is completed (see figure 2). 
Fig. 2. VN construction 
2.2 Interaction between VNA and SIP 
entities 
As it shown in figure 2, when finishing 
construction of the VN, three kinds of nodes are 
defined: 
 If a node belongs to the VN, then it plays SIP 
User Agent role and all its SIP server’s 
functionalities (Proxy server (PS), Registrar 
(RG) and location service (LS)) [6] are 
activated, 
 If a node is a gateway, then it plays SIP User 
Agent role and PS role. RG and LS are 
deactivated. 
 If a node doesn’t belong to the VN, then it 
plays only SIP User Agent role and its SIP 
server’s functionalities are deactivated. 
3 MCAC: MANET CALL ADMISSION 
CONTROL 
The purpose of this chapter is to describe our 
solution, MCAC (MANET Call Admission 
Control), This feature allows to limit VoIP calls in 
ad hoc networks. The need of MCAC for VoIP
70 
I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 
communications is mainly because the bandwidth 
of the access network of a MANET is not sufficient 
to accept all communications simultaneously. The 
purpose of the MCAC solution is to allow the 
establishment of a number of communications in 
line with the available bandwidth on the network 
access of a MANET. Its vocation is to reject the 
establishment of communications when the 
bandwidth is no longer sufficient and thus not 
disrupt communications already established. 
The MANET is related to a set of Getaways 
which are responsible to provide connectivity of 
MANET with the internet network (figure3). On 
each Getaway we integrate MCAC Application 
Server, which contains MCAC process and MCAC 
database. Each Getaway, via its Application Server, 
defines an MCAC group, and associates this 
MCAC group to a list of MANET nodes and a 
number of simultaneous calls [4][5]. When a part of 
the MANET, subscribes to a MCAC group, a call 
between two nodes of this group will be recognized 
by the MCAC process. 
To create MCAC groups, Getaways (Application 
Server) determines MANET nodes with which it is 
directly linked, and automatically associates them 
to MCAC group. 
Fig. 3. Architecture of MANET connectivity to internet 
Each node can be associated with one and only 
one MCAC group (Figure 4). When a network node 
is associated with a MCAC group, all calls, 
incoming or outgoing, concerning this node are 
supervised by the MCAC algorithm. If the 
threshold of the MCAC group associated with this 
line is reached, MCAC algorithm rejects any new 
calls, by sending the specific SIP error code « 503 
service unavailable », when receiving this error, the 
node is assumed to play a congestion tone.
71 
I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 
Fig. 4. MCAC data model 
When a Node A decides to communicate with a 
node B, several scenarios to increment and 
decrement the MCAC counter are defined, 
according to if A and B belong to an MCAC group 
or not. The table 1 shows different possible use 
cases of increasing and decreasing the MCAC 
counter. 
Table 1: MCAC use cases 
If a node of the MANET, associated to a MCAC 
group, decides to perform a call to another node of 
the MANET, the MANET routing protocol must 
ask authorization from MCAC algorithm, before 
routing the call to destination node. The figure 5 
shows an example of Scenario, in this case A and B 
are belonging to the same MCAC group. 
Fig. 5. Example of scenario of communication between 
two Nodes controlled by MCAC process 
4 APPLICATION OF MCAC 
ALGORITHM TO VNSIP APPROACH 
As we have mentioned in the introduction, 
VNSIP approach [13], comparing to TCA approach 
performs good results concerning time of session 
establishment and failure rates, but in the other side 
it's suffering from a high consumption of bandwidth 
because of the mechanism of replication of SIP 
messages. To resolve this problem we deploy 
MCAC algorithm on VNSIP architecture (see 
figure 6). MCAC will control SIP communication 
established by VNSIP, which involves controlling 
bandwidth consumption to be in line with the 
MANET capacity.
72 
I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 
Fig. 6. Deployment of MCAC on VNSIP architecture 
When a VNSIP node, which belongs to the 
MCAC group, decides to initiate a call with another 
VNSIP node, the VNA (Virtual Network Algorit-hm) 
of this node contacts the MCAC algorithm (see 
figure 6), before redirecting the call to the PS 
(Proxy server) of the destination node, to ask if it’s 
authorized to perform the call. If the counter of 
simultaneous calls is still lower than the threshold 
defined in MCAC database, then the call will be 
correctly redirected to destination and the counter 
will be incremented. If not, then the MCAC 
algorithm will send a specific SIP error. 
When the destination receives the call request, 
two cases are treated. Firstly, if the destination 
doesn’t belong to the MCAC group then the MCAC 
algorithm will not be invoked and the call will be 
normally treated. Secondly, if the destination 
belongs to the MCAC group, then its VNA will 
also ask authorization from MCAC algorithm to 
treat the call. If the threshold is not yet reached then 
the call will be correctly treated. If not, the MCAC 
algorithm will send the SIP error. The figure 7 
illustrates an example of a call establishment 
scenario between two VNSIP nodes which belong 
to the MCAC group. 
Figure 7 call flow between two nodes under MCAC 
control
73 
I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 
5 SIMULATIONS AND EVALUATION 
OF PERFORMANCES 
Simulations scenarios were achieved using the 
network simulator NS2 [8]. The simulation area 
was 1000m by 1000m. The node number was 
between 10 and 50 nodes. The movement speed of 
nodes was between 0 and 18 m/s, and times of 
simulations were 180 seconds. 
To define difference between VNSIP behavior 
using MCAC and VNSIP behavior without using 
MCAC, we achieved many types of simulations, 
and we analyzed behaviors when node speeds and 
node numbers are increased. 
Figures 8 and 9 illustrate bandwidth consum-ption 
when establishing SIP communications accor-ding 
respectively to number and mobility of nodes. 
Fig. 8. Bandwidth consumption by number of nodes 
Fig. 9. Bandwidth consumption by mobility of nodes 
When we compare both figures, we note that 
using MCAC process to supervise calls inside the 
MANET have considerably reduced the consump-tion 
of MANET bandwidth; which directly involves 
improvement of QoS. In fact even if the number of 
call attempts increases, the MCAC process keeps 
the number of simultaneous calls in line with the 
available bandwidth inside the MANET, which 
guarantees a good QoS for current calls. 
6 CONCLUSION 
This paper proposes a new algorithm to improve 
the QoS of calls in MANET. We have named this 
technique, MCAC (MANET Call Admission 
Control). It aims to ensure QoS by rejecting 
simultaneous calls in a MANET, when their 
number reaches a predefined threshold. 
We have used this technique to enhance 
performances of VNSIP approach which suffers 
from high bandwidth consumption. Simulations 
has shown that MCAC have considerably reduces 
bandwidth consumption in MANET, thanks to 
controlling number of simultaneous calls, which 
enables to adapt this number to the MANET , 
which involves to guarantee a good QoS of SIP 
calls. 
7 REFERENCES 
[1] J. Westcott et G. Lauer, ‘Hierarchical routing 
for very large networks’, Proc. IEEE MILCOM 
’84, pp 214-218, 21-24 October 1984. 
[2] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. 
Johnston, J. Peterson, R. Sparks, M. Handeley 
et E. Schooler, “SIP: Session Initiation 
Protocol”, RFC 3261, Juin 2002. 
[3] S. Corson, J. Macker, ‘Mobile Ad hoc 
Networking (MANET): Routing Protocol 
Performance Issues and Evaluation 
Considerations’, REC 2501, Janvier 1999. 
[4] M. Jiang, J. Li and Y. C. Tay, “Cluster Based 
Routing Protocol (CBRP),” IETF Internet 
Draft draft-ietf-manet-cbrp-spec-01.txt, August 
1999. 
[5] C. R. Lin and M. Gerla, “Adaptive clustering 
for mobile, wireless networks,” Journal on 
Selected Areas of Communication, Vol. 15, 
No. 7, 1997. 
[6] J. Rosenberg and H. Schulzrinne, “SIP: 
Locating SIP Servers”, IETF RFC 3263, June 
2002. 
[7] C. Perkins, E. Belding-Royer, and S. Das “ Ad 
hoc On-Demand Distance Vector (AODV) 
Routing ”, IETF RFC 3561, July 2003.
74 
I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 
[8] “The network simulator”, available at 
http://www.isi.edu/nsnam/ns 
[9] N. Banerjee, A. Acharya and S.K. Das, 
“Enabling SIP-Based Sessions in Ad Hoc 
Networks “, Winet, April 2006. 
[10] A.B. Roach, “Session Initiation Protocol (SIP) 
– Specific Event Notification”, RFC 3265, Juin 
2002. 
[11] P. Stuedi, M. Bihr, A. Remund et G. Alonso, « 
Siphoc : Efficient sip middleware for ad hoc 
networks » studi2007siphoc, LECTURE 
NOTES IN COMPUTER SCIENCE, 2007, 
Springer 
[12] S. Leggio, J. Manner, A. Hulkkonen, et K. 
Raatikainen, “Session initiation protocol 
deployment in ad hoc networks: a 
decentralized approach”, In 2nd International 
Workshop on Wireless Ad-hoc Networks 
(IWWAN), London, May, 2005. 
[13] I. Mourtaji, M Bouhorma, M. Benahmen, A 
Bouhdir “A new technique for adapting SIP 
protocol to Ad hoc Networks: VNSIP (Virtual 
Network for SIP) Illustration and Evaluation of 
performance” IJCNCS Volume 1, Issue 1, June 
2013.

Más contenido relacionado

La actualidad más candente

Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutionsIJCNCJournal
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environmentsmlaij
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Journals
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Publishing House
 
Trusted computing for infrastructure
Trusted computing for infrastructureTrusted computing for infrastructure
Trusted computing for infrastructureEricsson
 
SAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsSAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsEswar Publications
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...ijccsa
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
 
Toward Cloud Computing: Security and Performance
Toward Cloud Computing: Security and PerformanceToward Cloud Computing: Security and Performance
Toward Cloud Computing: Security and Performanceijccsa
 
SVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual EnvironmentSVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual EnvironmentIJTET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital ForensicIRJET Journal
 
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET Journal
 
Analyzing and Surveying Trust In Cloud Computing Environment
Analyzing and Surveying Trust In Cloud Computing EnvironmentAnalyzing and Surveying Trust In Cloud Computing Environment
Analyzing and Surveying Trust In Cloud Computing Environmentiosrjce
 

La actualidad más candente (20)

Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...
[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...
[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...
 
Trusted computing for infrastructure
Trusted computing for infrastructureTrusted computing for infrastructure
Trusted computing for infrastructure
 
SAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsSAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS Clouds
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
C43021014
C43021014C43021014
C43021014
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
 
Toward Cloud Computing: Security and Performance
Toward Cloud Computing: Security and PerformanceToward Cloud Computing: Security and Performance
Toward Cloud Computing: Security and Performance
 
SVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual EnvironmentSVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual Environment
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security Mechanism
 
Analyzing and Surveying Trust In Cloud Computing Environment
Analyzing and Surveying Trust In Cloud Computing EnvironmentAnalyzing and Surveying Trust In Cloud Computing Environment
Analyzing and Surveying Trust In Cloud Computing Environment
 

Destacado

Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilogijcncs
 
Implementing e learning and combined training methods for lifelong learning
Implementing e learning and combined training methods for lifelong learningImplementing e learning and combined training methods for lifelong learning
Implementing e learning and combined training methods for lifelong learningIE Private Consulting in PM & ITSM
 
Call Center World 2016: Petralex Speech communications software for call centers
Call Center World 2016: Petralex Speech communications software for call centersCall Center World 2016: Petralex Speech communications software for call centers
Call Center World 2016: Petralex Speech communications software for call centersIE Private Consulting in PM & ITSM
 
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...ijcncs
 
Walt Disney
Walt DisneyWalt Disney
Walt Disneymlmabry
 
A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual ...
A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual ...A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual ...
A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual ...ijcncs
 
Design of Robust Speed Controller by Optimization Techniques for DTC IM Drive
Design of Robust Speed Controller by Optimization Techniques for DTC IM DriveDesign of Robust Speed Controller by Optimization Techniques for DTC IM Drive
Design of Robust Speed Controller by Optimization Techniques for DTC IM Driveijcncs
 
Dolly Parton
Dolly PartonDolly Parton
Dolly Partonmlmabry
 
State of the ART in Boolean Functions Cryptographic Assessment
State of the ART in Boolean Functions Cryptographic AssessmentState of the ART in Boolean Functions Cryptographic Assessment
State of the ART in Boolean Functions Cryptographic Assessmentijcncs
 
Gini in A Bottle: A Case Study of Pareto’s Principle in the Wild
Gini in A Bottle: A Case Study of Pareto’s Principle in the WildGini in A Bottle: A Case Study of Pareto’s Principle in the Wild
Gini in A Bottle: A Case Study of Pareto’s Principle in the Wildijcncs
 
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole AttackPerformance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attackijcncs
 
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)ijcncs
 
Ray Charles
Ray CharlesRay Charles
Ray Charlesmlmabry
 
Brief compare of PMBOK and ISO21500 project management approaches
Brief compare of PMBOK and ISO21500 project management approachesBrief compare of PMBOK and ISO21500 project management approaches
Brief compare of PMBOK and ISO21500 project management approachesIE Private Consulting in PM & ITSM
 
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETCross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETijcncs
 

Destacado (20)

Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
PMP and CCR updates in 2015
PMP and CCR updates in 2015PMP and CCR updates in 2015
PMP and CCR updates in 2015
 
Implementing e learning and combined training methods for lifelong learning
Implementing e learning and combined training methods for lifelong learningImplementing e learning and combined training methods for lifelong learning
Implementing e learning and combined training methods for lifelong learning
 
Virtual learning in 15 minutes
Virtual learning in 15 minutesVirtual learning in 15 minutes
Virtual learning in 15 minutes
 
Call Center World 2016: Petralex Speech communications software for call centers
Call Center World 2016: Petralex Speech communications software for call centersCall Center World 2016: Petralex Speech communications software for call centers
Call Center World 2016: Petralex Speech communications software for call centers
 
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
 
Walt Disney
Walt DisneyWalt Disney
Walt Disney
 
A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual ...
A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual ...A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual ...
A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual ...
 
Design of Robust Speed Controller by Optimization Techniques for DTC IM Drive
Design of Robust Speed Controller by Optimization Techniques for DTC IM DriveDesign of Robust Speed Controller by Optimization Techniques for DTC IM Drive
Design of Robust Speed Controller by Optimization Techniques for DTC IM Drive
 
Dolly Parton
Dolly PartonDolly Parton
Dolly Parton
 
State of the ART in Boolean Functions Cryptographic Assessment
State of the ART in Boolean Functions Cryptographic AssessmentState of the ART in Boolean Functions Cryptographic Assessment
State of the ART in Boolean Functions Cryptographic Assessment
 
Gini in A Bottle: A Case Study of Pareto’s Principle in the Wild
Gini in A Bottle: A Case Study of Pareto’s Principle in the WildGini in A Bottle: A Case Study of Pareto’s Principle in the Wild
Gini in A Bottle: A Case Study of Pareto’s Principle in the Wild
 
Implementing e learning and combined training methods
Implementing e learning and combined training methodsImplementing e learning and combined training methods
Implementing e learning and combined training methods
 
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole AttackPerformance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
 
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
 
Ray Charles
Ray CharlesRay Charles
Ray Charles
 
Brief compare of PMBOK and ISO21500 project management approaches
Brief compare of PMBOK and ISO21500 project management approachesBrief compare of PMBOK and ISO21500 project management approaches
Brief compare of PMBOK and ISO21500 project management approaches
 
Combining Waterfall and Adaptive practice in IT projects
Combining Waterfall and Adaptive practice in IT projectsCombining Waterfall and Adaptive practice in IT projects
Combining Waterfall and Adaptive practice in IT projects
 
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETCross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
 
Microsoft Abbreviations Dictionary
Microsoft Abbreviations DictionaryMicrosoft Abbreviations Dictionary
Microsoft Abbreviations Dictionary
 

Similar a Performance Enhancement of VNSIP approach, using MCAC algorithm

Medium Access Control with Scheduled Group Contention for Massive M2M Devices
Medium Access Control with Scheduled Group Contention for Massive M2M Devices Medium Access Control with Scheduled Group Contention for Massive M2M Devices
Medium Access Control with Scheduled Group Contention for Massive M2M Devices csandit
 
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICESMEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICEScscpconf
 
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...ijasuc
 
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSEDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSijcsit
 
Edge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor NetworksEdge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor NetworksAIRCC Publishing Corporation
 
Novel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi NetworkNovel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi NetworkIRJET Journal
 
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...IJCNCJournal
 
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...IJCNCJournal
 
Secure & fault tolerance handoff in vanet using special mobile agent
Secure & fault tolerance handoff in vanet using special mobile agentSecure & fault tolerance handoff in vanet using special mobile agent
Secure & fault tolerance handoff in vanet using special mobile agentcsandit
 
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENT
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENTSECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENT
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENTcscpconf
 
Securing cloud computing environment against d do s attacks
Securing cloud computing environment against d do s attacksSecuring cloud computing environment against d do s attacks
Securing cloud computing environment against d do s attacksSampatkumar Satyamurti
 
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...ijceronline
 
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...IJCNCJournal
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
 
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...cscpconf
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsIOSR Journals
 
Switching and multicast schemes in asynchronous transfer mode networks
Switching and multicast schemes in asynchronous transfer mode networksSwitching and multicast schemes in asynchronous transfer mode networks
Switching and multicast schemes in asynchronous transfer mode networksEditor Jacotech
 
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...Eswar Publications
 

Similar a Performance Enhancement of VNSIP approach, using MCAC algorithm (20)

Medium Access Control with Scheduled Group Contention for Massive M2M Devices
Medium Access Control with Scheduled Group Contention for Massive M2M Devices Medium Access Control with Scheduled Group Contention for Massive M2M Devices
Medium Access Control with Scheduled Group Contention for Massive M2M Devices
 
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICESMEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES
 
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...
 
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSEDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
 
Edge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor NetworksEdge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor Networks
 
Novel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi NetworkNovel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi Network
 
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
 
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
 
Secure & fault tolerance handoff in vanet using special mobile agent
Secure & fault tolerance handoff in vanet using special mobile agentSecure & fault tolerance handoff in vanet using special mobile agent
Secure & fault tolerance handoff in vanet using special mobile agent
 
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENT
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENTSECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENT
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENT
 
Securing cloud computing environment against d do s attacks
Securing cloud computing environment against d do s attacksSecuring cloud computing environment against d do s attacks
Securing cloud computing environment against d do s attacks
 
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
 
L017548287
L017548287L017548287
L017548287
 
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
Switching and multicast schemes in asynchronous transfer mode networks
Switching and multicast schemes in asynchronous transfer mode networksSwitching and multicast schemes in asynchronous transfer mode networks
Switching and multicast schemes in asynchronous transfer mode networks
 
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
 

Último

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 

Último (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 

Performance Enhancement of VNSIP approach, using MCAC algorithm

  • 1. International Journal of Computer Networks and Communications Security VOL. 1, NO. 3, AUGUST 2013, 68–74 C C Available online at: www.ijcncs.org N ISSN 2308-9830 S Performance Enhancement of VNSIP approach, using MCAC algorithm I. MOURTAJI1, M. BOUHORMA2, M. BENAHMED3, A. BOUHDIR4 1234LIST laboratory, FST of Tangier E-mail: 1imourtaji@gmail.com, 2bouhorma@gmail.com, 3med.benahmed@gmail.com, 4hakim.anouar@gmail.com ABSTRACT Ad Hoc Networks provide a real opportunity to design flexible networks, very simple to deploy. However they remain a particular computation environment, characterized by the deficiency of pre-existed and centralized infrastructure. In the other hand, SIP protocol, which knows a huge booming in internet networks, requires centralized entities, like proxy server, registrar server and location service; consequently SIP is not adapted to Ad Hoc networks. We have presented in a new technique VNSIP (Virtual Network for Session Initiation Protocol) to fix the problem related to constraints of SIP deployment in MANET (Mobile Ad Hoc Networks). In this paper we use a new algorithm which we have called MCAC (MANET Call Admission Control) to improve VNSIP Performances. Keywords: Ad hoc, SIP, MCAC, Evaluation of performance. 1 INTRODUCTION VNSIP [13] allows decentralization of SIP proxies, specially registrar, proxy and location servers [1, 2, 10], by integrating those server functionalities in each MANET node. VNSIP node contains a supervisor module VNA (Virtual Network Algorithm), it is responsible of activating and deactivating server functionalities according to the position of the node in the MANET [3][7]. To achieve evaluation of performances of VNSIP, we have compared our solution to the TCA approach [9], which is consider as a solution giving a very interesting result to fix the problem of SIP adaptation to Ad Hoc Networks. Simulations of both approaches has shown that our solution guarantees better results than TCA in terms of setting time and failure rates of SIP sessions. These good results were obtained thanks to VNA, the algorithm used to construct the VNSIP topology, and thanks to the mechanism of replication of SIP messages. On the other side, this mechanism has its own disadvantage, which involves that our solution proposes lower results than TCA in term of bandwidth consumption. to improve those results we propose a new technique, MCAC (MANET Call Admission Control) , deployed on service level, this application will guarantee that a limited number of calls is controlled in the MANET and QoS is ensured. When the threshold of calls is reached, MANET proceeds interdiction of new calls. This paper is organized as follows. In the first section we’ll give an overview of VNSIP solution. In the second section we’ll present MCAC algorithm. Afterward in the next section, we'll present implementation of MCAC to VNSIP approach, and in the last section we'll evaluate new performances of VNSIP. In the end, we'll achieve this paper with a conclusion, with future works and perspectives. 2 VNSIP OVERVIEW VNSIP solution [13] tries to define a dynamic virtual network inside the MANET, to be exploited by nodes, to adequately choose which one will be in charge to execute SIP server tasks. VNA (Virtual Network Algorithm) will be the entity in charge to activate or deactivate SIP server functionalities in each MANET node. A VNSIP node (see figure 1) consists of several entities, when interacting between them; they allow communication in MANET using SIP protocol.
  • 2. 69 I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 Fig. 1. VNSIP Node Architecture 2.1 Virtual Network Algorithm (VNA) VNA starts by the construction of neighbor tables. VNA defines a flag “VN_membership_flag” which shows if a node belongs to the VN (Virtual Nework) or not. When executing VNA, the VN will include all nodes having VN_membership_flag=1. VNA is characterized by two conditions:  Condition1: if a node doesn’t belong to the VN and the number of its neighbors which belong to the VN is lower than the number of its neighbors which don’t belong to the VN then the VN_membership_flag of this node is set to 1.  Condition 2: if a node belongs to the VN and the number of its neighbors which belong to the VN is higher than the number of its neighbors which don’t belong to the VN then the VN_membership_flag of this node is set to 0. To complete the construction of a connected VN, we define Gateway nodes to ensure connections between all nodes belonging to the VN. When finishing the selection of gateway nodes the construction of the VN is completed (see figure 2). Fig. 2. VN construction 2.2 Interaction between VNA and SIP entities As it shown in figure 2, when finishing construction of the VN, three kinds of nodes are defined:  If a node belongs to the VN, then it plays SIP User Agent role and all its SIP server’s functionalities (Proxy server (PS), Registrar (RG) and location service (LS)) [6] are activated,  If a node is a gateway, then it plays SIP User Agent role and PS role. RG and LS are deactivated.  If a node doesn’t belong to the VN, then it plays only SIP User Agent role and its SIP server’s functionalities are deactivated. 3 MCAC: MANET CALL ADMISSION CONTROL The purpose of this chapter is to describe our solution, MCAC (MANET Call Admission Control), This feature allows to limit VoIP calls in ad hoc networks. The need of MCAC for VoIP
  • 3. 70 I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 communications is mainly because the bandwidth of the access network of a MANET is not sufficient to accept all communications simultaneously. The purpose of the MCAC solution is to allow the establishment of a number of communications in line with the available bandwidth on the network access of a MANET. Its vocation is to reject the establishment of communications when the bandwidth is no longer sufficient and thus not disrupt communications already established. The MANET is related to a set of Getaways which are responsible to provide connectivity of MANET with the internet network (figure3). On each Getaway we integrate MCAC Application Server, which contains MCAC process and MCAC database. Each Getaway, via its Application Server, defines an MCAC group, and associates this MCAC group to a list of MANET nodes and a number of simultaneous calls [4][5]. When a part of the MANET, subscribes to a MCAC group, a call between two nodes of this group will be recognized by the MCAC process. To create MCAC groups, Getaways (Application Server) determines MANET nodes with which it is directly linked, and automatically associates them to MCAC group. Fig. 3. Architecture of MANET connectivity to internet Each node can be associated with one and only one MCAC group (Figure 4). When a network node is associated with a MCAC group, all calls, incoming or outgoing, concerning this node are supervised by the MCAC algorithm. If the threshold of the MCAC group associated with this line is reached, MCAC algorithm rejects any new calls, by sending the specific SIP error code « 503 service unavailable », when receiving this error, the node is assumed to play a congestion tone.
  • 4. 71 I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 Fig. 4. MCAC data model When a Node A decides to communicate with a node B, several scenarios to increment and decrement the MCAC counter are defined, according to if A and B belong to an MCAC group or not. The table 1 shows different possible use cases of increasing and decreasing the MCAC counter. Table 1: MCAC use cases If a node of the MANET, associated to a MCAC group, decides to perform a call to another node of the MANET, the MANET routing protocol must ask authorization from MCAC algorithm, before routing the call to destination node. The figure 5 shows an example of Scenario, in this case A and B are belonging to the same MCAC group. Fig. 5. Example of scenario of communication between two Nodes controlled by MCAC process 4 APPLICATION OF MCAC ALGORITHM TO VNSIP APPROACH As we have mentioned in the introduction, VNSIP approach [13], comparing to TCA approach performs good results concerning time of session establishment and failure rates, but in the other side it's suffering from a high consumption of bandwidth because of the mechanism of replication of SIP messages. To resolve this problem we deploy MCAC algorithm on VNSIP architecture (see figure 6). MCAC will control SIP communication established by VNSIP, which involves controlling bandwidth consumption to be in line with the MANET capacity.
  • 5. 72 I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 Fig. 6. Deployment of MCAC on VNSIP architecture When a VNSIP node, which belongs to the MCAC group, decides to initiate a call with another VNSIP node, the VNA (Virtual Network Algorit-hm) of this node contacts the MCAC algorithm (see figure 6), before redirecting the call to the PS (Proxy server) of the destination node, to ask if it’s authorized to perform the call. If the counter of simultaneous calls is still lower than the threshold defined in MCAC database, then the call will be correctly redirected to destination and the counter will be incremented. If not, then the MCAC algorithm will send a specific SIP error. When the destination receives the call request, two cases are treated. Firstly, if the destination doesn’t belong to the MCAC group then the MCAC algorithm will not be invoked and the call will be normally treated. Secondly, if the destination belongs to the MCAC group, then its VNA will also ask authorization from MCAC algorithm to treat the call. If the threshold is not yet reached then the call will be correctly treated. If not, the MCAC algorithm will send the SIP error. The figure 7 illustrates an example of a call establishment scenario between two VNSIP nodes which belong to the MCAC group. Figure 7 call flow between two nodes under MCAC control
  • 6. 73 I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 5 SIMULATIONS AND EVALUATION OF PERFORMANCES Simulations scenarios were achieved using the network simulator NS2 [8]. The simulation area was 1000m by 1000m. The node number was between 10 and 50 nodes. The movement speed of nodes was between 0 and 18 m/s, and times of simulations were 180 seconds. To define difference between VNSIP behavior using MCAC and VNSIP behavior without using MCAC, we achieved many types of simulations, and we analyzed behaviors when node speeds and node numbers are increased. Figures 8 and 9 illustrate bandwidth consum-ption when establishing SIP communications accor-ding respectively to number and mobility of nodes. Fig. 8. Bandwidth consumption by number of nodes Fig. 9. Bandwidth consumption by mobility of nodes When we compare both figures, we note that using MCAC process to supervise calls inside the MANET have considerably reduced the consump-tion of MANET bandwidth; which directly involves improvement of QoS. In fact even if the number of call attempts increases, the MCAC process keeps the number of simultaneous calls in line with the available bandwidth inside the MANET, which guarantees a good QoS for current calls. 6 CONCLUSION This paper proposes a new algorithm to improve the QoS of calls in MANET. We have named this technique, MCAC (MANET Call Admission Control). It aims to ensure QoS by rejecting simultaneous calls in a MANET, when their number reaches a predefined threshold. We have used this technique to enhance performances of VNSIP approach which suffers from high bandwidth consumption. Simulations has shown that MCAC have considerably reduces bandwidth consumption in MANET, thanks to controlling number of simultaneous calls, which enables to adapt this number to the MANET , which involves to guarantee a good QoS of SIP calls. 7 REFERENCES [1] J. Westcott et G. Lauer, ‘Hierarchical routing for very large networks’, Proc. IEEE MILCOM ’84, pp 214-218, 21-24 October 1984. [2] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handeley et E. Schooler, “SIP: Session Initiation Protocol”, RFC 3261, Juin 2002. [3] S. Corson, J. Macker, ‘Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations’, REC 2501, Janvier 1999. [4] M. Jiang, J. Li and Y. C. Tay, “Cluster Based Routing Protocol (CBRP),” IETF Internet Draft draft-ietf-manet-cbrp-spec-01.txt, August 1999. [5] C. R. Lin and M. Gerla, “Adaptive clustering for mobile, wireless networks,” Journal on Selected Areas of Communication, Vol. 15, No. 7, 1997. [6] J. Rosenberg and H. Schulzrinne, “SIP: Locating SIP Servers”, IETF RFC 3263, June 2002. [7] C. Perkins, E. Belding-Royer, and S. Das “ Ad hoc On-Demand Distance Vector (AODV) Routing ”, IETF RFC 3561, July 2003.
  • 7. 74 I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 [8] “The network simulator”, available at http://www.isi.edu/nsnam/ns [9] N. Banerjee, A. Acharya and S.K. Das, “Enabling SIP-Based Sessions in Ad Hoc Networks “, Winet, April 2006. [10] A.B. Roach, “Session Initiation Protocol (SIP) – Specific Event Notification”, RFC 3265, Juin 2002. [11] P. Stuedi, M. Bihr, A. Remund et G. Alonso, « Siphoc : Efficient sip middleware for ad hoc networks » studi2007siphoc, LECTURE NOTES IN COMPUTER SCIENCE, 2007, Springer [12] S. Leggio, J. Manner, A. Hulkkonen, et K. Raatikainen, “Session initiation protocol deployment in ad hoc networks: a decentralized approach”, In 2nd International Workshop on Wireless Ad-hoc Networks (IWWAN), London, May, 2005. [13] I. Mourtaji, M Bouhorma, M. Benahmen, A Bouhdir “A new technique for adapting SIP protocol to Ad hoc Networks: VNSIP (Virtual Network for SIP) Illustration and Evaluation of performance” IJCNCS Volume 1, Issue 1, June 2013.