SlideShare a Scribd company logo
International Journal of Computer Networks and Communications Security 
VOL. 1, NO. 3, AUGUST 2013, 68–74 
C 
C 
Available online at: www.ijcncs.org 
N 
ISSN 2308-9830 
S 
Performance Enhancement of VNSIP approach, using MCAC 
algorithm 
I. MOURTAJI1, M. BOUHORMA2, M. BENAHMED3, A. BOUHDIR4 
1234LIST laboratory, FST of Tangier 
E-mail: 1imourtaji@gmail.com, 2bouhorma@gmail.com, 3med.benahmed@gmail.com, 
4hakim.anouar@gmail.com 
ABSTRACT 
Ad Hoc Networks provide a real opportunity to design flexible networks, very simple to deploy. However 
they remain a particular computation environment, characterized by the deficiency of pre-existed and 
centralized infrastructure. In the other hand, SIP protocol, which knows a huge booming in internet 
networks, requires centralized entities, like proxy server, registrar server and location service; consequently 
SIP is not adapted to Ad Hoc networks. We have presented in a new technique VNSIP (Virtual Network for 
Session Initiation Protocol) to fix the problem related to constraints of SIP deployment in MANET (Mobile 
Ad Hoc Networks). In this paper we use a new algorithm which we have called MCAC (MANET Call 
Admission Control) to improve VNSIP Performances. 
Keywords: Ad hoc, SIP, MCAC, Evaluation of performance. 
1 INTRODUCTION 
VNSIP [13] allows decentralization of SIP 
proxies, specially registrar, proxy and location 
servers [1, 2, 10], by integrating those server 
functionalities in each MANET node. VNSIP node 
contains a supervisor module VNA (Virtual 
Network Algorithm), it is responsible of activating 
and deactivating server functionalities according to 
the position of the node in the MANET [3][7]. To 
achieve evaluation of performances of VNSIP, we 
have compared our solution to the TCA approach 
[9], which is consider as a solution giving a very 
interesting result to fix the problem of SIP 
adaptation to Ad Hoc Networks. Simulations of 
both approaches has shown that our solution 
guarantees better results than TCA in terms of 
setting time and failure rates of SIP sessions. These 
good results were obtained thanks to VNA, the 
algorithm used to construct the VNSIP topology, 
and thanks to the mechanism of replication of SIP 
messages. On the other side, this mechanism has its 
own disadvantage, which involves that our solution 
proposes lower results than TCA in term of 
bandwidth consumption. to improve those results 
we propose a new technique, MCAC (MANET Call 
Admission Control) , deployed on service level, this 
application will guarantee that a limited number of 
calls is controlled in the MANET and QoS is 
ensured. When the threshold of calls is reached, 
MANET proceeds interdiction of new calls. 
This paper is organized as follows. In the first 
section we’ll give an overview of VNSIP solution. 
In the second section we’ll present MCAC 
algorithm. Afterward in the next section, we'll 
present implementation of MCAC to VNSIP 
approach, and in the last section we'll evaluate new 
performances of VNSIP. In the end, we'll achieve 
this paper with a conclusion, with future works and 
perspectives. 
2 VNSIP OVERVIEW 
VNSIP solution [13] tries to define a dynamic 
virtual network inside the MANET, to be exploited 
by nodes, to adequately choose which one will be 
in charge to execute SIP server tasks. VNA (Virtual 
Network Algorithm) will be the entity in charge to 
activate or deactivate SIP server functionalities in 
each MANET node. A VNSIP node (see figure 1) 
consists of several entities, when interacting 
between them; they allow communication in 
MANET using SIP protocol.
69 
I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 
Fig. 1. VNSIP Node Architecture 
2.1 Virtual Network Algorithm (VNA) 
VNA starts by the construction of neighbor 
tables. VNA defines a flag “VN_membership_flag” 
which shows if a node belongs to the VN (Virtual 
Nework) or not. When executing VNA, the VN will 
include all nodes having VN_membership_flag=1. 
VNA is characterized by two conditions: 
 Condition1: if a node doesn’t belong to the 
VN and the number of its neighbors which 
belong to the VN is lower than the number of 
its neighbors which don’t belong to the VN 
then the VN_membership_flag of this node is 
set to 1. 
 Condition 2: if a node belongs to the VN and 
the number of its neighbors which belong to 
the VN is higher than the number of its 
neighbors which don’t belong to the VN then 
the VN_membership_flag of this node is set to 
0. 
To complete the construction of a connected VN, 
we define Gateway nodes to ensure connections 
between all nodes belonging to the VN. When 
finishing the selection of gateway nodes the 
construction of the VN is completed (see figure 2). 
Fig. 2. VN construction 
2.2 Interaction between VNA and SIP 
entities 
As it shown in figure 2, when finishing 
construction of the VN, three kinds of nodes are 
defined: 
 If a node belongs to the VN, then it plays SIP 
User Agent role and all its SIP server’s 
functionalities (Proxy server (PS), Registrar 
(RG) and location service (LS)) [6] are 
activated, 
 If a node is a gateway, then it plays SIP User 
Agent role and PS role. RG and LS are 
deactivated. 
 If a node doesn’t belong to the VN, then it 
plays only SIP User Agent role and its SIP 
server’s functionalities are deactivated. 
3 MCAC: MANET CALL ADMISSION 
CONTROL 
The purpose of this chapter is to describe our 
solution, MCAC (MANET Call Admission 
Control), This feature allows to limit VoIP calls in 
ad hoc networks. The need of MCAC for VoIP
70 
I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 
communications is mainly because the bandwidth 
of the access network of a MANET is not sufficient 
to accept all communications simultaneously. The 
purpose of the MCAC solution is to allow the 
establishment of a number of communications in 
line with the available bandwidth on the network 
access of a MANET. Its vocation is to reject the 
establishment of communications when the 
bandwidth is no longer sufficient and thus not 
disrupt communications already established. 
The MANET is related to a set of Getaways 
which are responsible to provide connectivity of 
MANET with the internet network (figure3). On 
each Getaway we integrate MCAC Application 
Server, which contains MCAC process and MCAC 
database. Each Getaway, via its Application Server, 
defines an MCAC group, and associates this 
MCAC group to a list of MANET nodes and a 
number of simultaneous calls [4][5]. When a part of 
the MANET, subscribes to a MCAC group, a call 
between two nodes of this group will be recognized 
by the MCAC process. 
To create MCAC groups, Getaways (Application 
Server) determines MANET nodes with which it is 
directly linked, and automatically associates them 
to MCAC group. 
Fig. 3. Architecture of MANET connectivity to internet 
Each node can be associated with one and only 
one MCAC group (Figure 4). When a network node 
is associated with a MCAC group, all calls, 
incoming or outgoing, concerning this node are 
supervised by the MCAC algorithm. If the 
threshold of the MCAC group associated with this 
line is reached, MCAC algorithm rejects any new 
calls, by sending the specific SIP error code « 503 
service unavailable », when receiving this error, the 
node is assumed to play a congestion tone.
71 
I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 
Fig. 4. MCAC data model 
When a Node A decides to communicate with a 
node B, several scenarios to increment and 
decrement the MCAC counter are defined, 
according to if A and B belong to an MCAC group 
or not. The table 1 shows different possible use 
cases of increasing and decreasing the MCAC 
counter. 
Table 1: MCAC use cases 
If a node of the MANET, associated to a MCAC 
group, decides to perform a call to another node of 
the MANET, the MANET routing protocol must 
ask authorization from MCAC algorithm, before 
routing the call to destination node. The figure 5 
shows an example of Scenario, in this case A and B 
are belonging to the same MCAC group. 
Fig. 5. Example of scenario of communication between 
two Nodes controlled by MCAC process 
4 APPLICATION OF MCAC 
ALGORITHM TO VNSIP APPROACH 
As we have mentioned in the introduction, 
VNSIP approach [13], comparing to TCA approach 
performs good results concerning time of session 
establishment and failure rates, but in the other side 
it's suffering from a high consumption of bandwidth 
because of the mechanism of replication of SIP 
messages. To resolve this problem we deploy 
MCAC algorithm on VNSIP architecture (see 
figure 6). MCAC will control SIP communication 
established by VNSIP, which involves controlling 
bandwidth consumption to be in line with the 
MANET capacity.
72 
I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 
Fig. 6. Deployment of MCAC on VNSIP architecture 
When a VNSIP node, which belongs to the 
MCAC group, decides to initiate a call with another 
VNSIP node, the VNA (Virtual Network Algorit-hm) 
of this node contacts the MCAC algorithm (see 
figure 6), before redirecting the call to the PS 
(Proxy server) of the destination node, to ask if it’s 
authorized to perform the call. If the counter of 
simultaneous calls is still lower than the threshold 
defined in MCAC database, then the call will be 
correctly redirected to destination and the counter 
will be incremented. If not, then the MCAC 
algorithm will send a specific SIP error. 
When the destination receives the call request, 
two cases are treated. Firstly, if the destination 
doesn’t belong to the MCAC group then the MCAC 
algorithm will not be invoked and the call will be 
normally treated. Secondly, if the destination 
belongs to the MCAC group, then its VNA will 
also ask authorization from MCAC algorithm to 
treat the call. If the threshold is not yet reached then 
the call will be correctly treated. If not, the MCAC 
algorithm will send the SIP error. The figure 7 
illustrates an example of a call establishment 
scenario between two VNSIP nodes which belong 
to the MCAC group. 
Figure 7 call flow between two nodes under MCAC 
control
73 
I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 
5 SIMULATIONS AND EVALUATION 
OF PERFORMANCES 
Simulations scenarios were achieved using the 
network simulator NS2 [8]. The simulation area 
was 1000m by 1000m. The node number was 
between 10 and 50 nodes. The movement speed of 
nodes was between 0 and 18 m/s, and times of 
simulations were 180 seconds. 
To define difference between VNSIP behavior 
using MCAC and VNSIP behavior without using 
MCAC, we achieved many types of simulations, 
and we analyzed behaviors when node speeds and 
node numbers are increased. 
Figures 8 and 9 illustrate bandwidth consum-ption 
when establishing SIP communications accor-ding 
respectively to number and mobility of nodes. 
Fig. 8. Bandwidth consumption by number of nodes 
Fig. 9. Bandwidth consumption by mobility of nodes 
When we compare both figures, we note that 
using MCAC process to supervise calls inside the 
MANET have considerably reduced the consump-tion 
of MANET bandwidth; which directly involves 
improvement of QoS. In fact even if the number of 
call attempts increases, the MCAC process keeps 
the number of simultaneous calls in line with the 
available bandwidth inside the MANET, which 
guarantees a good QoS for current calls. 
6 CONCLUSION 
This paper proposes a new algorithm to improve 
the QoS of calls in MANET. We have named this 
technique, MCAC (MANET Call Admission 
Control). It aims to ensure QoS by rejecting 
simultaneous calls in a MANET, when their 
number reaches a predefined threshold. 
We have used this technique to enhance 
performances of VNSIP approach which suffers 
from high bandwidth consumption. Simulations 
has shown that MCAC have considerably reduces 
bandwidth consumption in MANET, thanks to 
controlling number of simultaneous calls, which 
enables to adapt this number to the MANET , 
which involves to guarantee a good QoS of SIP 
calls. 
7 REFERENCES 
[1] J. Westcott et G. Lauer, ‘Hierarchical routing 
for very large networks’, Proc. IEEE MILCOM 
’84, pp 214-218, 21-24 October 1984. 
[2] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. 
Johnston, J. Peterson, R. Sparks, M. Handeley 
et E. Schooler, “SIP: Session Initiation 
Protocol”, RFC 3261, Juin 2002. 
[3] S. Corson, J. Macker, ‘Mobile Ad hoc 
Networking (MANET): Routing Protocol 
Performance Issues and Evaluation 
Considerations’, REC 2501, Janvier 1999. 
[4] M. Jiang, J. Li and Y. C. Tay, “Cluster Based 
Routing Protocol (CBRP),” IETF Internet 
Draft draft-ietf-manet-cbrp-spec-01.txt, August 
1999. 
[5] C. R. Lin and M. Gerla, “Adaptive clustering 
for mobile, wireless networks,” Journal on 
Selected Areas of Communication, Vol. 15, 
No. 7, 1997. 
[6] J. Rosenberg and H. Schulzrinne, “SIP: 
Locating SIP Servers”, IETF RFC 3263, June 
2002. 
[7] C. Perkins, E. Belding-Royer, and S. Das “ Ad 
hoc On-Demand Distance Vector (AODV) 
Routing ”, IETF RFC 3561, July 2003.
74 
I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 
[8] “The network simulator”, available at 
http://www.isi.edu/nsnam/ns 
[9] N. Banerjee, A. Acharya and S.K. Das, 
“Enabling SIP-Based Sessions in Ad Hoc 
Networks “, Winet, April 2006. 
[10] A.B. Roach, “Session Initiation Protocol (SIP) 
– Specific Event Notification”, RFC 3265, Juin 
2002. 
[11] P. Stuedi, M. Bihr, A. Remund et G. Alonso, « 
Siphoc : Efficient sip middleware for ad hoc 
networks » studi2007siphoc, LECTURE 
NOTES IN COMPUTER SCIENCE, 2007, 
Springer 
[12] S. Leggio, J. Manner, A. Hulkkonen, et K. 
Raatikainen, “Session initiation protocol 
deployment in ad hoc networks: a 
decentralized approach”, In 2nd International 
Workshop on Wireless Ad-hoc Networks 
(IWWAN), London, May, 2005. 
[13] I. Mourtaji, M Bouhorma, M. Benahmen, A 
Bouhdir “A new technique for adapting SIP 
protocol to Ad hoc Networks: VNSIP (Virtual 
Network for SIP) Illustration and Evaluation of 
performance” IJCNCS Volume 1, Issue 1, June 
2013.

More Related Content

What's hot (20)

PDF
Cloud computing challenges and solutions
IJCNCJournal
 
PDF
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
mlaij
 
PDF
A challenge for security and service level agreement in cloud computinge
eSAT Journals
 
PDF
A challenge for security and service level agreement in cloud computinge
eSAT Publishing House
 
PDF
[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...
IJET - International Journal of Engineering and Techniques
 
PDF
Trusted computing for infrastructure
Ericsson
 
PDF
SAFETY: A Framework for Secure IaaS Clouds
Eswar Publications
 
PDF
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
ijccsa
 
PDF
Paper id 27201433
IJRAT
 
PDF
C43021014
IJERA Editor
 
PDF
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
IJNSA Journal
 
PDF
Toward Cloud Computing: Security and Performance
ijccsa
 
PDF
SVAC Firewall Restriction with Security in Cloud over Virtual Environment
IJTET Journal
 
PDF
Fs2510501055
IJERA Editor
 
PDF
improve cloud security
Balkees Shereek
 
PDF
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
PDF
Cloud computing security through symmetric cipher model
ijcsit
 
PDF
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
 
PDF
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET Journal
 
PDF
Analyzing and Surveying Trust In Cloud Computing Environment
iosrjce
 
Cloud computing challenges and solutions
IJCNCJournal
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
mlaij
 
A challenge for security and service level agreement in cloud computinge
eSAT Journals
 
A challenge for security and service level agreement in cloud computinge
eSAT Publishing House
 
[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...
IJET - International Journal of Engineering and Techniques
 
Trusted computing for infrastructure
Ericsson
 
SAFETY: A Framework for Secure IaaS Clouds
Eswar Publications
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
ijccsa
 
Paper id 27201433
IJRAT
 
C43021014
IJERA Editor
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
IJNSA Journal
 
Toward Cloud Computing: Security and Performance
ijccsa
 
SVAC Firewall Restriction with Security in Cloud over Virtual Environment
IJTET Journal
 
Fs2510501055
IJERA Editor
 
improve cloud security
Balkees Shereek
 
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Cloud computing security through symmetric cipher model
ijcsit
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
 
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET Journal
 
Analyzing and Surveying Trust In Cloud Computing Environment
iosrjce
 

Viewers also liked (20)

PDF
Cryptosystem An Implementation of RSA Using Verilog
ijcncs
 
PPTX
PMP and CCR updates in 2015
IE Private Consulting in PM & ITSM
 
PPTX
Implementing e learning and combined training methods for lifelong learning
IE Private Consulting in PM & ITSM
 
PPTX
Virtual learning in 15 minutes
IE Private Consulting in PM & ITSM
 
PDF
Call Center World 2016: Petralex Speech communications software for call centers
IE Private Consulting in PM & ITSM
 
PDF
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
ijcncs
 
PPTX
Walt Disney
mlmabry
 
PDF
A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual ...
ijcncs
 
PDF
Design of Robust Speed Controller by Optimization Techniques for DTC IM Drive
ijcncs
 
PPTX
Dolly Parton
mlmabry
 
PDF
State of the ART in Boolean Functions Cryptographic Assessment
ijcncs
 
PDF
Gini in A Bottle: A Case Study of Pareto’s Principle in the Wild
ijcncs
 
PPTX
Implementing e learning and combined training methods
IE Private Consulting in PM & ITSM
 
PDF
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
ijcncs
 
PDF
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
ijcncs
 
PPTX
Ray Charles
mlmabry
 
PPTX
Brief compare of PMBOK and ISO21500 project management approaches
IE Private Consulting in PM & ITSM
 
PPTX
Combining Waterfall and Adaptive practice in IT projects
IE Private Consulting in PM & ITSM
 
PDF
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
ijcncs
 
PDF
Microsoft Abbreviations Dictionary
IE Private Consulting in PM & ITSM
 
Cryptosystem An Implementation of RSA Using Verilog
ijcncs
 
PMP and CCR updates in 2015
IE Private Consulting in PM & ITSM
 
Implementing e learning and combined training methods for lifelong learning
IE Private Consulting in PM & ITSM
 
Virtual learning in 15 minutes
IE Private Consulting in PM & ITSM
 
Call Center World 2016: Petralex Speech communications software for call centers
IE Private Consulting in PM & ITSM
 
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
ijcncs
 
Walt Disney
mlmabry
 
A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual ...
ijcncs
 
Design of Robust Speed Controller by Optimization Techniques for DTC IM Drive
ijcncs
 
Dolly Parton
mlmabry
 
State of the ART in Boolean Functions Cryptographic Assessment
ijcncs
 
Gini in A Bottle: A Case Study of Pareto’s Principle in the Wild
ijcncs
 
Implementing e learning and combined training methods
IE Private Consulting in PM & ITSM
 
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
ijcncs
 
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
ijcncs
 
Ray Charles
mlmabry
 
Brief compare of PMBOK and ISO21500 project management approaches
IE Private Consulting in PM & ITSM
 
Combining Waterfall and Adaptive practice in IT projects
IE Private Consulting in PM & ITSM
 
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
ijcncs
 
Microsoft Abbreviations Dictionary
IE Private Consulting in PM & ITSM
 
Ad

Similar to Performance Enhancement of VNSIP approach, using MCAC algorithm (20)

PDF
A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Net...
IDES Editor
 
PDF
Unit 3
vamsitricks
 
PDF
EFFECTIVE VOICE CALLS ADMISSION FOR AUTHORIZED USER IN INTER VOIP NETWORK
IJNSA Journal
 
PDF
Recomended ip telephony architecture
Feras Ajjawi
 
PDF
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
acijjournal
 
PDF
385 voice over ip
jacinthsara
 
PDF
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
IJCNCJournal
 
PDF
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
cscpconf
 
PDF
Speed adaptive mobile ip over wireless lan
iaemedu
 
PDF
Speed adaptive mobile ip over wireless
iaemedu
 
PPT
Business models based on RTU class 5
ALOE Systems, Inc.
 
PDF
A Survey On IP Address Assignment In A Mobile Ad Hoc
Kristen Flores
 
PDF
Konferans Server
guestae06a5
 
PDF
Mobile computing Unit III MANET Notes
Ramco Institute of Technology, Rajapalayam, Tamilnadu, India
 
PDF
MANCAFChat - An Application to Evaluate MANCAF Framework
iosrjce
 
PDF
L01764102107
IOSR Journals
 
PDF
Effects of SIP in Interoperable LMR/Cellular Heterogeneous Mobile Wireless N...
IOSR Journals
 
A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Net...
IDES Editor
 
Unit 3
vamsitricks
 
EFFECTIVE VOICE CALLS ADMISSION FOR AUTHORIZED USER IN INTER VOIP NETWORK
IJNSA Journal
 
Recomended ip telephony architecture
Feras Ajjawi
 
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
acijjournal
 
385 voice over ip
jacinthsara
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
IJCNCJournal
 
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
cscpconf
 
Speed adaptive mobile ip over wireless lan
iaemedu
 
Speed adaptive mobile ip over wireless
iaemedu
 
Business models based on RTU class 5
ALOE Systems, Inc.
 
A Survey On IP Address Assignment In A Mobile Ad Hoc
Kristen Flores
 
Konferans Server
guestae06a5
 
MANCAFChat - An Application to Evaluate MANCAF Framework
iosrjce
 
L01764102107
IOSR Journals
 
Effects of SIP in Interoperable LMR/Cellular Heterogeneous Mobile Wireless N...
IOSR Journals
 
Ad

Recently uploaded (20)

PDF
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
PDF
Biomechanics of Gait: Engineering Solutions for Rehabilitation (www.kiu.ac.ug)
publication11
 
PDF
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
PPTX
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
PPTX
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
PDF
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
PPTX
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
PPTX
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
PPTX
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
PPTX
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
PPTX
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
PPTX
Day2 B2 Best.pptx
helenjenefa1
 
PPTX
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
PPTX
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
PDF
GTU Civil Engineering All Semester Syllabus.pdf
Vimal Bhojani
 
PDF
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PPTX
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
PDF
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
Biomechanics of Gait: Engineering Solutions for Rehabilitation (www.kiu.ac.ug)
publication11
 
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
Day2 B2 Best.pptx
helenjenefa1
 
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
GTU Civil Engineering All Semester Syllabus.pdf
Vimal Bhojani
 
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 

Performance Enhancement of VNSIP approach, using MCAC algorithm

  • 1. International Journal of Computer Networks and Communications Security VOL. 1, NO. 3, AUGUST 2013, 68–74 C C Available online at: www.ijcncs.org N ISSN 2308-9830 S Performance Enhancement of VNSIP approach, using MCAC algorithm I. MOURTAJI1, M. BOUHORMA2, M. BENAHMED3, A. BOUHDIR4 1234LIST laboratory, FST of Tangier E-mail: [email protected], [email protected], [email protected], [email protected] ABSTRACT Ad Hoc Networks provide a real opportunity to design flexible networks, very simple to deploy. However they remain a particular computation environment, characterized by the deficiency of pre-existed and centralized infrastructure. In the other hand, SIP protocol, which knows a huge booming in internet networks, requires centralized entities, like proxy server, registrar server and location service; consequently SIP is not adapted to Ad Hoc networks. We have presented in a new technique VNSIP (Virtual Network for Session Initiation Protocol) to fix the problem related to constraints of SIP deployment in MANET (Mobile Ad Hoc Networks). In this paper we use a new algorithm which we have called MCAC (MANET Call Admission Control) to improve VNSIP Performances. Keywords: Ad hoc, SIP, MCAC, Evaluation of performance. 1 INTRODUCTION VNSIP [13] allows decentralization of SIP proxies, specially registrar, proxy and location servers [1, 2, 10], by integrating those server functionalities in each MANET node. VNSIP node contains a supervisor module VNA (Virtual Network Algorithm), it is responsible of activating and deactivating server functionalities according to the position of the node in the MANET [3][7]. To achieve evaluation of performances of VNSIP, we have compared our solution to the TCA approach [9], which is consider as a solution giving a very interesting result to fix the problem of SIP adaptation to Ad Hoc Networks. Simulations of both approaches has shown that our solution guarantees better results than TCA in terms of setting time and failure rates of SIP sessions. These good results were obtained thanks to VNA, the algorithm used to construct the VNSIP topology, and thanks to the mechanism of replication of SIP messages. On the other side, this mechanism has its own disadvantage, which involves that our solution proposes lower results than TCA in term of bandwidth consumption. to improve those results we propose a new technique, MCAC (MANET Call Admission Control) , deployed on service level, this application will guarantee that a limited number of calls is controlled in the MANET and QoS is ensured. When the threshold of calls is reached, MANET proceeds interdiction of new calls. This paper is organized as follows. In the first section we’ll give an overview of VNSIP solution. In the second section we’ll present MCAC algorithm. Afterward in the next section, we'll present implementation of MCAC to VNSIP approach, and in the last section we'll evaluate new performances of VNSIP. In the end, we'll achieve this paper with a conclusion, with future works and perspectives. 2 VNSIP OVERVIEW VNSIP solution [13] tries to define a dynamic virtual network inside the MANET, to be exploited by nodes, to adequately choose which one will be in charge to execute SIP server tasks. VNA (Virtual Network Algorithm) will be the entity in charge to activate or deactivate SIP server functionalities in each MANET node. A VNSIP node (see figure 1) consists of several entities, when interacting between them; they allow communication in MANET using SIP protocol.
  • 2. 69 I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 Fig. 1. VNSIP Node Architecture 2.1 Virtual Network Algorithm (VNA) VNA starts by the construction of neighbor tables. VNA defines a flag “VN_membership_flag” which shows if a node belongs to the VN (Virtual Nework) or not. When executing VNA, the VN will include all nodes having VN_membership_flag=1. VNA is characterized by two conditions:  Condition1: if a node doesn’t belong to the VN and the number of its neighbors which belong to the VN is lower than the number of its neighbors which don’t belong to the VN then the VN_membership_flag of this node is set to 1.  Condition 2: if a node belongs to the VN and the number of its neighbors which belong to the VN is higher than the number of its neighbors which don’t belong to the VN then the VN_membership_flag of this node is set to 0. To complete the construction of a connected VN, we define Gateway nodes to ensure connections between all nodes belonging to the VN. When finishing the selection of gateway nodes the construction of the VN is completed (see figure 2). Fig. 2. VN construction 2.2 Interaction between VNA and SIP entities As it shown in figure 2, when finishing construction of the VN, three kinds of nodes are defined:  If a node belongs to the VN, then it plays SIP User Agent role and all its SIP server’s functionalities (Proxy server (PS), Registrar (RG) and location service (LS)) [6] are activated,  If a node is a gateway, then it plays SIP User Agent role and PS role. RG and LS are deactivated.  If a node doesn’t belong to the VN, then it plays only SIP User Agent role and its SIP server’s functionalities are deactivated. 3 MCAC: MANET CALL ADMISSION CONTROL The purpose of this chapter is to describe our solution, MCAC (MANET Call Admission Control), This feature allows to limit VoIP calls in ad hoc networks. The need of MCAC for VoIP
  • 3. 70 I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 communications is mainly because the bandwidth of the access network of a MANET is not sufficient to accept all communications simultaneously. The purpose of the MCAC solution is to allow the establishment of a number of communications in line with the available bandwidth on the network access of a MANET. Its vocation is to reject the establishment of communications when the bandwidth is no longer sufficient and thus not disrupt communications already established. The MANET is related to a set of Getaways which are responsible to provide connectivity of MANET with the internet network (figure3). On each Getaway we integrate MCAC Application Server, which contains MCAC process and MCAC database. Each Getaway, via its Application Server, defines an MCAC group, and associates this MCAC group to a list of MANET nodes and a number of simultaneous calls [4][5]. When a part of the MANET, subscribes to a MCAC group, a call between two nodes of this group will be recognized by the MCAC process. To create MCAC groups, Getaways (Application Server) determines MANET nodes with which it is directly linked, and automatically associates them to MCAC group. Fig. 3. Architecture of MANET connectivity to internet Each node can be associated with one and only one MCAC group (Figure 4). When a network node is associated with a MCAC group, all calls, incoming or outgoing, concerning this node are supervised by the MCAC algorithm. If the threshold of the MCAC group associated with this line is reached, MCAC algorithm rejects any new calls, by sending the specific SIP error code « 503 service unavailable », when receiving this error, the node is assumed to play a congestion tone.
  • 4. 71 I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 Fig. 4. MCAC data model When a Node A decides to communicate with a node B, several scenarios to increment and decrement the MCAC counter are defined, according to if A and B belong to an MCAC group or not. The table 1 shows different possible use cases of increasing and decreasing the MCAC counter. Table 1: MCAC use cases If a node of the MANET, associated to a MCAC group, decides to perform a call to another node of the MANET, the MANET routing protocol must ask authorization from MCAC algorithm, before routing the call to destination node. The figure 5 shows an example of Scenario, in this case A and B are belonging to the same MCAC group. Fig. 5. Example of scenario of communication between two Nodes controlled by MCAC process 4 APPLICATION OF MCAC ALGORITHM TO VNSIP APPROACH As we have mentioned in the introduction, VNSIP approach [13], comparing to TCA approach performs good results concerning time of session establishment and failure rates, but in the other side it's suffering from a high consumption of bandwidth because of the mechanism of replication of SIP messages. To resolve this problem we deploy MCAC algorithm on VNSIP architecture (see figure 6). MCAC will control SIP communication established by VNSIP, which involves controlling bandwidth consumption to be in line with the MANET capacity.
  • 5. 72 I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 Fig. 6. Deployment of MCAC on VNSIP architecture When a VNSIP node, which belongs to the MCAC group, decides to initiate a call with another VNSIP node, the VNA (Virtual Network Algorit-hm) of this node contacts the MCAC algorithm (see figure 6), before redirecting the call to the PS (Proxy server) of the destination node, to ask if it’s authorized to perform the call. If the counter of simultaneous calls is still lower than the threshold defined in MCAC database, then the call will be correctly redirected to destination and the counter will be incremented. If not, then the MCAC algorithm will send a specific SIP error. When the destination receives the call request, two cases are treated. Firstly, if the destination doesn’t belong to the MCAC group then the MCAC algorithm will not be invoked and the call will be normally treated. Secondly, if the destination belongs to the MCAC group, then its VNA will also ask authorization from MCAC algorithm to treat the call. If the threshold is not yet reached then the call will be correctly treated. If not, the MCAC algorithm will send the SIP error. The figure 7 illustrates an example of a call establishment scenario between two VNSIP nodes which belong to the MCAC group. Figure 7 call flow between two nodes under MCAC control
  • 6. 73 I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 5 SIMULATIONS AND EVALUATION OF PERFORMANCES Simulations scenarios were achieved using the network simulator NS2 [8]. The simulation area was 1000m by 1000m. The node number was between 10 and 50 nodes. The movement speed of nodes was between 0 and 18 m/s, and times of simulations were 180 seconds. To define difference between VNSIP behavior using MCAC and VNSIP behavior without using MCAC, we achieved many types of simulations, and we analyzed behaviors when node speeds and node numbers are increased. Figures 8 and 9 illustrate bandwidth consum-ption when establishing SIP communications accor-ding respectively to number and mobility of nodes. Fig. 8. Bandwidth consumption by number of nodes Fig. 9. Bandwidth consumption by mobility of nodes When we compare both figures, we note that using MCAC process to supervise calls inside the MANET have considerably reduced the consump-tion of MANET bandwidth; which directly involves improvement of QoS. In fact even if the number of call attempts increases, the MCAC process keeps the number of simultaneous calls in line with the available bandwidth inside the MANET, which guarantees a good QoS for current calls. 6 CONCLUSION This paper proposes a new algorithm to improve the QoS of calls in MANET. We have named this technique, MCAC (MANET Call Admission Control). It aims to ensure QoS by rejecting simultaneous calls in a MANET, when their number reaches a predefined threshold. We have used this technique to enhance performances of VNSIP approach which suffers from high bandwidth consumption. Simulations has shown that MCAC have considerably reduces bandwidth consumption in MANET, thanks to controlling number of simultaneous calls, which enables to adapt this number to the MANET , which involves to guarantee a good QoS of SIP calls. 7 REFERENCES [1] J. Westcott et G. Lauer, ‘Hierarchical routing for very large networks’, Proc. IEEE MILCOM ’84, pp 214-218, 21-24 October 1984. [2] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handeley et E. Schooler, “SIP: Session Initiation Protocol”, RFC 3261, Juin 2002. [3] S. Corson, J. Macker, ‘Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations’, REC 2501, Janvier 1999. [4] M. Jiang, J. Li and Y. C. Tay, “Cluster Based Routing Protocol (CBRP),” IETF Internet Draft draft-ietf-manet-cbrp-spec-01.txt, August 1999. [5] C. R. Lin and M. Gerla, “Adaptive clustering for mobile, wireless networks,” Journal on Selected Areas of Communication, Vol. 15, No. 7, 1997. [6] J. Rosenberg and H. Schulzrinne, “SIP: Locating SIP Servers”, IETF RFC 3263, June 2002. [7] C. Perkins, E. Belding-Royer, and S. Das “ Ad hoc On-Demand Distance Vector (AODV) Routing ”, IETF RFC 3561, July 2003.
  • 7. 74 I. mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (3), August 2013 [8] “The network simulator”, available at http://www.isi.edu/nsnam/ns [9] N. Banerjee, A. Acharya and S.K. Das, “Enabling SIP-Based Sessions in Ad Hoc Networks “, Winet, April 2006. [10] A.B. Roach, “Session Initiation Protocol (SIP) – Specific Event Notification”, RFC 3265, Juin 2002. [11] P. Stuedi, M. Bihr, A. Remund et G. Alonso, « Siphoc : Efficient sip middleware for ad hoc networks » studi2007siphoc, LECTURE NOTES IN COMPUTER SCIENCE, 2007, Springer [12] S. Leggio, J. Manner, A. Hulkkonen, et K. Raatikainen, “Session initiation protocol deployment in ad hoc networks: a decentralized approach”, In 2nd International Workshop on Wireless Ad-hoc Networks (IWWAN), London, May, 2005. [13] I. Mourtaji, M Bouhorma, M. Benahmen, A Bouhdir “A new technique for adapting SIP protocol to Ad hoc Networks: VNSIP (Virtual Network for SIP) Illustration and Evaluation of performance” IJCNCS Volume 1, Issue 1, June 2013.