SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
International Journal of Computer Networks and Communications Security

C

VOL. 1, NO. 1, JUNE 2013, 23–29
Available online at: www.ijcncs.org
ISSN 2308-9830

N

C

S

A New Technique for Adapting SIP Protocol to Ad Hoc Networks:
VNSIP (Virtual Network for SIP) Illustration and Evaluation of
Performance
I. Mourtaji1, M. Bouhorma2, M. Benahmed3, A. Bouhdir4
1234
LIST laboratory, FST of Tangier, Morroco
E-mail: 1imourtaji@gmail.com, 2bouhorma@gmail.com, 3med.benahmed@gmail.com,
4
hakim.anouar@gmail.com

ABSTRACT
Ad Hoc Networks provide a real opportunity to design flexible networks, very simple to deploy. However
they remain a particular computation environment, characterized by the deficiency of pre-existed and
centralized infrastructure. In the other hand, SIP protocol, which knows a huge booming in internet
networks, requires centralized entities, like proxy server, registrar server and location service; consequently
SIP is not adapted to Ad Hoc networks. In this paper, we present and evaluate a new technique, which we
have called Virtual Network for SIP (VNSIP) to fix the problem related to the constraints of SIP
deployment in Ad Hoc network. The main idea of this technique is to create a virtual infrastructure,
enabling SIP to proceed in a distributed architecture inside the Ad hoc Network.
Keywords: Ad hoc, SIP, Evaluation of performance
1

INTRODUCTION

Using this technique, we will be able to design a
virtual sub-network, which will be used by SIP [1,
2, 10] in a high mobility Ad Hoc network.
VNSIP allows decentralization of SIP proxies,
specially registrar, proxy and location servers, by
integrating those server functionalities in each
MANET node. VNSIP node contains a supervisor
module which we called Virtual Network
Algorithm (VNA), and which is responsible of
activating and deactivating server functionalities
depending on the position of the node in the
MANET [3].
This paper is organized as follows. In the first
section we’ll introduce VNSIP solution. In the
second section we’ll illustrate VNSIP design.
Afterward in the next section, we’ll present TCA
solution. In the last section we will evaluate VNSIP
performance using comparison with TCA approach.
In the end, we will achieve this paper with a
conclusion, with future works and perspectives.

2

VNSIP SOLUTION PRESENTATION

The presence of Proxy Server, Registrar Server
and Location Service is a prerequisite for SIP
operations. Thus it’s necessary to decentralize those
servers to enabling SIP integration in Ad Hoc netw
The most evident solution, to fix this problem, is to
include all SIP servers’ functionalities in each node
of the ad hoc network [4, 5]. However this solution
consumes a lot of energy when broadcasting
messages to find a node location [6], and generates
many failure connections because of message
collisions. Making this solution not optimal.
VNSIP solution tries to define a dynamic virtual
network inside the MANET, to be exploited by
nodes, to adequately choose which one will be in
charge to execute SIP server tasks. VNA (Virtual
Network Algorithm) will be the entity in charge to
activate or deactivate SIP server functionalities in
each MANET node. A VNSIP node (see Figure 1)
consists of several entities, when interacting
between them; they allow communication in
MANET using SIP protocol.
24
I Mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (1), JUNE 2013

Fig. 2. Generation of nodes belonging to the VN

Fig. 1. VNSIP Node Architecture

3

VNSIP DESIGN

The first step is the construction of the Virtual
Network (VN), which will be used by VNSIP to
affect SIP server functionalities to the different
nodes.

To complete the construction of a connected VN,
we define Gateway nodes to ensure connections
between all nodes belonging to the VN. Gateways
are generated using the execution of the two rules
below:


3.1

Rule 1: if two nodes belonging to the VN,
and don’t have a connection between them,
and have a same neighbor node which
doesn’t belong to the VN, then this node is
considered as a Gateway.



Rule 2: if two neighbor nodes, which don't
belong to the VN, and there neighbors are
respectively belonging to the VN, then
those two nodes are considered as
Gateways.
When finishing the selection of gateway
nodes the construction of the VN is
completed (see Figure 3).

Virtual Network Algorithm (VNA)

VNA starts by the construction of neighbor tables.
Thus each node of the MANET broadcasts a
HELLO message [7]. When receiving this message
for the first time, each node can populate its own
neighbors table with its 1-hop neighbor’s number
information.
HELLO message is then sent for a second time,
including
the
1-hop
neighbor’s
number
information. When receiving the second HELLO
message, each node upgrades its neighbors table
with its 1-hop neighbor’s number and 2-hop
neighbors number information.
VNA defines a flag “VN_membership_flag”
which shows if a node belongs to the VN or not.
When executing VNA, the VN will include all
nodes having VN_membership_flag=1. VNA is
characteri-zed by two conditions (see Figure 2):


Condition1: if a node doesn’t belong to the
VN and the number of its neighbors which
belong to the VN is lower than the number
of its neighbors which don’t belong to the
VN then the VN_membership_flag of this
node is set to 1.

 Condition 2: if a node belongs to the VN
and the number of its neighbors which
belong to the VN is higher than the number
of its neighbors which don’t belong to the
VN then the VN_membership_flag of this
node is set to 0.

Fig. 3. VN construction
25
I Mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (1), JUNE 2013

3.2

Interaction between VNA and SIP
entities

As it shown in Figure 3, when finishing the
construction of the VN, three kinds of nodes are
defined:
- If a node belongs to the VN, then it plays SIP
User Agent role and all its SIP server’s
functionalities (Proxy server (PS), Registrar (RG)
and location service (LS)) are activated,
- If a node is a gateway, then it plays SIP User
Agent role and PS role. RG and LS are deactivated.
- If a node doesn’t belong to the VN, then it plays
only SIP User Agent role and its SIP server’s
functionalities are deactivated.
3.3

Implementation of SIP Operations

Fig. 5. Registration for a node don't belonging to the
VN

Registration:
When a node of the ad hoc network decides to
registrar to the SIP network generated by VNSIP,
two possibilities are treated:


The node belongs to the VN: in this case,
SIP servers for this node are activated.
Thus its User Agent sends a Registrar
message to its own RG, making a local
registration (see Figure 4).

Session Initiation:
When a node A decides to initiate a session with
a node B. if SIP servers of A are activated then it
sends INVITE message directly to its own PS (see
Figure 6). Or if its SIP servers are deactivated, in
this case, it broadcasts the INVITE to its 1-hop
neighbors (see Figure 7).
When a PS receives the INVITE, it sends a
request to its LS to verify in the data base if he
knows the route to B. if it does then the PS redirects
the INVITE directly to B (see Figure 6). If not, it
broadcast the INVITE to its 1-hop neighbors (see
Figure 7).
When the User Agent of B receives the INVITE,
its answers by a 200 OK message, which will
follow the reverse path of the INVITE.

Fig. 4. Registration for a node belonging to the VN

The node doesn’t belong to the VN: in this case,
the User Agent of this node broadcasts a Register
message to all its 1-hop neighbors, each neighbor
register this node to its own RS if it belong to the
VN (see Figure 5).
Fig. 6. PS of Node A knows location of Node B
26
I Mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (1), JUNE 2013

Fig. 8. TCA Node architecture

SIP UA module: realizes UAC and UAS
functions, it initiates and responses to SIP requests.
SIP Servers module: represents the different SIP
servers (LS, RG and PS).
Fig. 7. PS of Node C doesn't know location of Node B

4

TCA APPROACH

In this chapter we will describe the design of
TCA solution [9], to be compared with our solution
VNSIP. TCA approach has been chosen because of
its good results and because of its similarity with
VNSIP.
4.1

SIP terminal presentation in TCA

Topo module: constructs a cluster topology to be
used by the different SIP modules.
4.2

TCA Operating System

TCA solution is essentially based on topology
construction module, which is inspired by
clustering approach. In fact, the topology
construction algorithm chooses nodes to ensure
cluster-head role. Nodes which not considered as
cluster-heads will be considered as cluster
members. Clusters will be related between them
using gateway nodes (see Figure 9).

For TCA approach, each node of the ad hoc
network should be able to guarantee the
functionalities below:







SIP User Agent Client (UAC),
SIP User Agent Server (UAS),
SIP Proxy Server (PS),
SIP Registrar (RG),
SIP Location Server (LS),
Topology construction

To achieve those functions, many models have
been integrated in the same terminal; Figure 8
illustrates SIP node composition and interaction
between those nodes.
Fig. 9. Cluster construction
27
I Mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (1), JUNE 2013

When topology construction is achieved, the topo
module assigns to each SIP module its role in the
network. Each node is considered as a simple User
Agent and according to its position in the network;
additional tasks may be attributed to this node:


A node which is considered as clusterhead will guarantee, in addition to UA
role, PS, RG and LS role.



A node which is cluster member and
gateway node will guarantee, in addition
to UA role, PS role.



After analyzing the graph above, we can note that
our approach guarantees a better time, than TCA
solution, to establish sessions between nodes. We
can justify this behavior by the fact that our
solution VNSIP uses, to forward SIP messages, a
higher number of nodes than TCA. And we can add
that, replication mechanism used by VNSIP, allows
performing many research on different SIP proxies
on the same time, which helps to receive responses
on shortest time.
The figure 11 illustrates session setting time, from
TCA and VNSIP, according to the number of nodes

A node which is only considered as cluster
member will guarantee a simple UA role
.
SIMULATIONS AND EVALUATION
OF PERFORMANCES

5

5.1

Configuration

Simulations scenarios were achieved using the
network simulator NS2 [8]. The simulation area
was 1000m by 1000m. The node number was
between 10 and 50 nodes. The movement speed of
nodes was between 0 and 18 m/s, and times of
simulations were 180 seconds.
5.2

Scenarios of simulations

To define the difference between VNSIP behavior
and TCA behavior, we achieved many types of
simulations, and we analyzed the behaviors when
node speeds and node numbers are increased.
5.2.1

Session setting time

The figure 10 illustrates session setting time, from
TCA and VNSI, according to nodes mobility.

Fig. 11. Session setting time according to number of
nodes

Comparing curves above, we observe that VNSIP
gives better performance than TCA. In fact when
the number of nodes, which are in charge to
forward SIP messages, is increasing, it directly
involves that session setting time decreased. Unlike
TCA mechanism, which uses only one cluster-head
to manage cluster members by forwarding SIP
messages,
generating
largest
queue
and
consequently the session setting time is increased.
5.2.2

Failure rates

The figure 12 illustrates the failure rates of session
setting according to nodes mobility for TCA and
VNSIP methods.

Fig. 10. Session setting time according to mobility
28
I Mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (1), JUNE 2013

When we compare both graphs, we note that
VNSIP gives lower results than TCA; in fact
consumption of bandwidth is higher and increases
when number of nodes is rising. This behaviour can
be warranted by the high number of message sent
when applying our replication mechanism, which
consists of achieving several registration and
localization in the same time for the same node.
6.

Fig. 12. Failure rates by mobility of nodes

When we compare failure rates to establish SIP
sessions between both methods, we observe that
VNSIP performs better results in terms of
successful sessions setting. This result can be easily
justified by the difference between VNSIP and
TCA architectures. VNSIP uses replication
mechanism, which allows forwarding SIP messages
by several nodes, unlike TCA which uses only
cluster-heads to forward SIP messages, this
involves that there is only one registration for each
node. Therefore TCA mechanism is very sensitive
and vulnerable to cluster-heads moves.
5.2.3

Bandwidth consumption

The figure 13 illustrates bandwidth consumption
when establishing SIP sessions according to
number of nodes.

Fig. 13. Bandwidth consumption by number of nodes

CONCLUSION

In this paper we have analyzed and evaluated the
performance of a new approach for adapting SIP
protocol to Ad Hoc Networks. To achieve this
evaluation of performance, we have compared our
solution to the TCA approach, which is consider as
a solution giving a very interesting result to fix the
problem of SIP adaptation to Ad Hoc Networks.
The simulation of both approaches has shown
that our solution guarantees better results than
TCA in terms of setting time and failure rates of
SIP sessions. These good results were obtained
thanks to VNA, the algorithm used to construct the
VNSIP topology, and thanks to the mechanism of
replication of SIP messages. On the other side, this
mechanism has its own disadvantage, which
involve that our solution proposes lower results
than TCA in term of bandwidth consumption.
For our future works, we’ll try to improve our
solution to reduce the consumption of bandwidth.
Actually we are designing a new algorithm, to
guarantee a good MANET QoS.
7.

REFERENCES

[1] J. Westcott et G. Lauer, ‘Hierarchical routing
for very large networks’, Proc. IEEE MILCOM
’84, pp 214-218, 21-24 October 1984.
[2] J. Rosenberg, H. Schulzrinne, G. Camarillo, A.
Johnston, J. Peterson, R. Sparks, M. Handeley
et E. Schooler, “SIP: Session Initiation
Protocol”, RFC 3261, Juin 2002.
[3] S. Corson, J. Macker, ‘Mobile Ad hoc
Networking (MANET): Routing Protocol
Performance
Issues
and
Evaluation
Considerations’, REC 2501, Janvier 1999.
[4] M. Jiang, J. Li and Y. C. Tay, “Cluster Based
Routing Protocol (CBRP),” IETF Internet
Draft draft-ietf-manet-cbrp-spec-01.txt, August
1999.
[5] C. R. Lin and M. Gerla, “Adaptive clustering
for mobile, wireless networks,” Journal on
Selected Areas of Communication, Vol. 15,
No. 7, 1997.
29
I Mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (1), JUNE 2013

[6] J. Rosenberg and H. Schulzrinne, “SIP:
Locating SIP Servers”, IETF RFC 3263, June
2002.
[7] C. Perkins, E. Belding-Royer, and S. Das “ Ad
hoc On-Demand Distance Vector (AODV)
Routing ”, IETF RFC 3561, July 2003.
[8] “The network simulator”, available at
http://www.isi.edu/nsnam/ns
[9] N. Banerjee, A. Acharya and S.K. Das,
“Enabling SIP-Based Sessions in Ad Hoc
Networks “, Winet, April 2006.
[10] A.B. Roach, “Session Initiation Protocol (SIP)
– Specific Event Notification”, RFC 3265, Juin
2002.
[11] P. Stuedi, M. Bihr, A. Remund et G. Alonso, «
Siphoc : Efficient sip middleware for ad hoc
networks » studi2007siphoc, LECTURE
NOTES IN COMPUTER SCIENCE, 2007,
Springer
[12] S. Leggio, J. Manner, A. Hulkkonen, et K.
Raatikainen, “Session initiation protocol
deployment in ad hoc networks: a
decentralized approach”, In 2nd International
Workshop on Wireless Ad-hoc Networks
(IWWAN), London, May, 2005.

Contenu connexe

Tendances

Cisco routingtable2 lookup
Cisco routingtable2 lookupCisco routingtable2 lookup
Cisco routingtable2 lookup
Makram Ghazzaoui
 

Tendances (19)

As03402620266
As03402620266As03402620266
As03402620266
 
E04402030037
E04402030037E04402030037
E04402030037
 
Presentation of computer network on data link layer
Presentation of computer network on data link layerPresentation of computer network on data link layer
Presentation of computer network on data link layer
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Secure Routing using Detection Method in Wireless Ad Hoc network
 Secure Routing using Detection Method in Wireless Ad Hoc network Secure Routing using Detection Method in Wireless Ad Hoc network
Secure Routing using Detection Method in Wireless Ad Hoc network
 
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
 
Cisco routingtable2 lookup
Cisco routingtable2 lookupCisco routingtable2 lookup
Cisco routingtable2 lookup
 
Network layer
Network layerNetwork layer
Network layer
 
Vmware vsan-layer2-and-layer3-network-topologies
Vmware vsan-layer2-and-layer3-network-topologiesVmware vsan-layer2-and-layer3-network-topologies
Vmware vsan-layer2-and-layer3-network-topologies
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
4d routing
4d routing4d routing
4d routing
 
G0544650
G0544650G0544650
G0544650
 
data link layer - Chapter 3
data link layer - Chapter 3data link layer - Chapter 3
data link layer - Chapter 3
 
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
Lab Seminar 2009 12 01  Message Drop Reduction And MovementLab Seminar 2009 12 01  Message Drop Reduction And Movement
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
SIMULATION PROCESS FOR MOBILE NODES INFORMATION USING LOCATION-AIDED ROUTING ...
SIMULATION PROCESS FOR MOBILE NODES INFORMATION USING LOCATION-AIDED ROUTING ...SIMULATION PROCESS FOR MOBILE NODES INFORMATION USING LOCATION-AIDED ROUTING ...
SIMULATION PROCESS FOR MOBILE NODES INFORMATION USING LOCATION-AIDED ROUTING ...
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
Safe Trust Alert Routing in MANET
Safe Trust Alert Routing in MANETSafe Trust Alert Routing in MANET
Safe Trust Alert Routing in MANET
 

En vedette

Dolly Parton
Dolly PartonDolly Parton
Dolly Parton
mlmabry
 
Ray Charles
Ray CharlesRay Charles
Ray Charles
mlmabry
 

En vedette (20)

Implementing e learning and combined training methods for lifelong learning
Implementing e learning and combined training methods for lifelong learningImplementing e learning and combined training methods for lifelong learning
Implementing e learning and combined training methods for lifelong learning
 
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
 
Performance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmPerformance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithm
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
Virtual learning in 15 minutes
Virtual learning in 15 minutesVirtual learning in 15 minutes
Virtual learning in 15 minutes
 
PMP and CCR updates in 2015
PMP and CCR updates in 2015PMP and CCR updates in 2015
PMP and CCR updates in 2015
 
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
 
Walt Disney
Walt DisneyWalt Disney
Walt Disney
 
Implementing e learning and combined training methods
Implementing e learning and combined training methodsImplementing e learning and combined training methods
Implementing e learning and combined training methods
 
Dolly Parton
Dolly PartonDolly Parton
Dolly Parton
 
Gini in A Bottle: A Case Study of Pareto’s Principle in the Wild
Gini in A Bottle: A Case Study of Pareto’s Principle in the WildGini in A Bottle: A Case Study of Pareto’s Principle in the Wild
Gini in A Bottle: A Case Study of Pareto’s Principle in the Wild
 
State of the ART in Boolean Functions Cryptographic Assessment
State of the ART in Boolean Functions Cryptographic AssessmentState of the ART in Boolean Functions Cryptographic Assessment
State of the ART in Boolean Functions Cryptographic Assessment
 
Call Center World 2016: Petralex Speech communications software for call centers
Call Center World 2016: Petralex Speech communications software for call centersCall Center World 2016: Petralex Speech communications software for call centers
Call Center World 2016: Petralex Speech communications software for call centers
 
Design of Robust Speed Controller by Optimization Techniques for DTC IM Drive
Design of Robust Speed Controller by Optimization Techniques for DTC IM DriveDesign of Robust Speed Controller by Optimization Techniques for DTC IM Drive
Design of Robust Speed Controller by Optimization Techniques for DTC IM Drive
 
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole AttackPerformance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
 
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
 
Ray Charles
Ray CharlesRay Charles
Ray Charles
 
Brief compare of PMBOK and ISO21500 project management approaches
Brief compare of PMBOK and ISO21500 project management approachesBrief compare of PMBOK and ISO21500 project management approaches
Brief compare of PMBOK and ISO21500 project management approaches
 
Combining Waterfall and Adaptive practice in IT projects
Combining Waterfall and Adaptive practice in IT projectsCombining Waterfall and Adaptive practice in IT projects
Combining Waterfall and Adaptive practice in IT projects
 

Similaire à A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual Network for SIP) Illustration and Evaluation of Performance

Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...
ijmnct
 

Similaire à A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual Network for SIP) Illustration and Evaluation of Performance (20)

IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
 
Internet service provider mobile
Internet service provider mobileInternet service provider mobile
Internet service provider mobile
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
MininetasSDNPlatform.pdf
MininetasSDNPlatform.pdfMininetasSDNPlatform.pdf
MininetasSDNPlatform.pdf
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
 
Key management in information centric networking
Key management in information centric networkingKey management in information centric networking
Key management in information centric networking
 
Cisco Activity
Cisco ActivityCisco Activity
Cisco Activity
 
Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...
Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...
Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...
 
Novel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi NetworkNovel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi Network
 
Smart agriculture based on data acquisition and monitoring systems
Smart agriculture based on data acquisition and monitoring systemsSmart agriculture based on data acquisition and monitoring systems
Smart agriculture based on data acquisition and monitoring systems
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
IRJET- Raspberry Pi and NodeMCU based Home Automation System
IRJET- Raspberry Pi and NodeMCU based Home Automation SystemIRJET- Raspberry Pi and NodeMCU based Home Automation System
IRJET- Raspberry Pi and NodeMCU based Home Automation System
 
Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...
 
A01230105
A01230105A01230105
A01230105
 
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
 
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
 
IRJET- Vanet Connection Performance Analysis using GPSR Protocol
IRJET- Vanet Connection Performance Analysis using GPSR ProtocolIRJET- Vanet Connection Performance Analysis using GPSR Protocol
IRJET- Vanet Connection Performance Analysis using GPSR Protocol
 

Dernier

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Dernier (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual Network for SIP) Illustration and Evaluation of Performance

  • 1. International Journal of Computer Networks and Communications Security C VOL. 1, NO. 1, JUNE 2013, 23–29 Available online at: www.ijcncs.org ISSN 2308-9830 N C S A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual Network for SIP) Illustration and Evaluation of Performance I. Mourtaji1, M. Bouhorma2, M. Benahmed3, A. Bouhdir4 1234 LIST laboratory, FST of Tangier, Morroco E-mail: 1imourtaji@gmail.com, 2bouhorma@gmail.com, 3med.benahmed@gmail.com, 4 hakim.anouar@gmail.com ABSTRACT Ad Hoc Networks provide a real opportunity to design flexible networks, very simple to deploy. However they remain a particular computation environment, characterized by the deficiency of pre-existed and centralized infrastructure. In the other hand, SIP protocol, which knows a huge booming in internet networks, requires centralized entities, like proxy server, registrar server and location service; consequently SIP is not adapted to Ad Hoc networks. In this paper, we present and evaluate a new technique, which we have called Virtual Network for SIP (VNSIP) to fix the problem related to the constraints of SIP deployment in Ad Hoc network. The main idea of this technique is to create a virtual infrastructure, enabling SIP to proceed in a distributed architecture inside the Ad hoc Network. Keywords: Ad hoc, SIP, Evaluation of performance 1 INTRODUCTION Using this technique, we will be able to design a virtual sub-network, which will be used by SIP [1, 2, 10] in a high mobility Ad Hoc network. VNSIP allows decentralization of SIP proxies, specially registrar, proxy and location servers, by integrating those server functionalities in each MANET node. VNSIP node contains a supervisor module which we called Virtual Network Algorithm (VNA), and which is responsible of activating and deactivating server functionalities depending on the position of the node in the MANET [3]. This paper is organized as follows. In the first section we’ll introduce VNSIP solution. In the second section we’ll illustrate VNSIP design. Afterward in the next section, we’ll present TCA solution. In the last section we will evaluate VNSIP performance using comparison with TCA approach. In the end, we will achieve this paper with a conclusion, with future works and perspectives. 2 VNSIP SOLUTION PRESENTATION The presence of Proxy Server, Registrar Server and Location Service is a prerequisite for SIP operations. Thus it’s necessary to decentralize those servers to enabling SIP integration in Ad Hoc netw The most evident solution, to fix this problem, is to include all SIP servers’ functionalities in each node of the ad hoc network [4, 5]. However this solution consumes a lot of energy when broadcasting messages to find a node location [6], and generates many failure connections because of message collisions. Making this solution not optimal. VNSIP solution tries to define a dynamic virtual network inside the MANET, to be exploited by nodes, to adequately choose which one will be in charge to execute SIP server tasks. VNA (Virtual Network Algorithm) will be the entity in charge to activate or deactivate SIP server functionalities in each MANET node. A VNSIP node (see Figure 1) consists of several entities, when interacting between them; they allow communication in MANET using SIP protocol.
  • 2. 24 I Mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (1), JUNE 2013 Fig. 2. Generation of nodes belonging to the VN Fig. 1. VNSIP Node Architecture 3 VNSIP DESIGN The first step is the construction of the Virtual Network (VN), which will be used by VNSIP to affect SIP server functionalities to the different nodes. To complete the construction of a connected VN, we define Gateway nodes to ensure connections between all nodes belonging to the VN. Gateways are generated using the execution of the two rules below:  3.1 Rule 1: if two nodes belonging to the VN, and don’t have a connection between them, and have a same neighbor node which doesn’t belong to the VN, then this node is considered as a Gateway.  Rule 2: if two neighbor nodes, which don't belong to the VN, and there neighbors are respectively belonging to the VN, then those two nodes are considered as Gateways. When finishing the selection of gateway nodes the construction of the VN is completed (see Figure 3). Virtual Network Algorithm (VNA) VNA starts by the construction of neighbor tables. Thus each node of the MANET broadcasts a HELLO message [7]. When receiving this message for the first time, each node can populate its own neighbors table with its 1-hop neighbor’s number information. HELLO message is then sent for a second time, including the 1-hop neighbor’s number information. When receiving the second HELLO message, each node upgrades its neighbors table with its 1-hop neighbor’s number and 2-hop neighbors number information. VNA defines a flag “VN_membership_flag” which shows if a node belongs to the VN or not. When executing VNA, the VN will include all nodes having VN_membership_flag=1. VNA is characteri-zed by two conditions (see Figure 2):  Condition1: if a node doesn’t belong to the VN and the number of its neighbors which belong to the VN is lower than the number of its neighbors which don’t belong to the VN then the VN_membership_flag of this node is set to 1.  Condition 2: if a node belongs to the VN and the number of its neighbors which belong to the VN is higher than the number of its neighbors which don’t belong to the VN then the VN_membership_flag of this node is set to 0. Fig. 3. VN construction
  • 3. 25 I Mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (1), JUNE 2013 3.2 Interaction between VNA and SIP entities As it shown in Figure 3, when finishing the construction of the VN, three kinds of nodes are defined: - If a node belongs to the VN, then it plays SIP User Agent role and all its SIP server’s functionalities (Proxy server (PS), Registrar (RG) and location service (LS)) are activated, - If a node is a gateway, then it plays SIP User Agent role and PS role. RG and LS are deactivated. - If a node doesn’t belong to the VN, then it plays only SIP User Agent role and its SIP server’s functionalities are deactivated. 3.3 Implementation of SIP Operations Fig. 5. Registration for a node don't belonging to the VN Registration: When a node of the ad hoc network decides to registrar to the SIP network generated by VNSIP, two possibilities are treated:  The node belongs to the VN: in this case, SIP servers for this node are activated. Thus its User Agent sends a Registrar message to its own RG, making a local registration (see Figure 4). Session Initiation: When a node A decides to initiate a session with a node B. if SIP servers of A are activated then it sends INVITE message directly to its own PS (see Figure 6). Or if its SIP servers are deactivated, in this case, it broadcasts the INVITE to its 1-hop neighbors (see Figure 7). When a PS receives the INVITE, it sends a request to its LS to verify in the data base if he knows the route to B. if it does then the PS redirects the INVITE directly to B (see Figure 6). If not, it broadcast the INVITE to its 1-hop neighbors (see Figure 7). When the User Agent of B receives the INVITE, its answers by a 200 OK message, which will follow the reverse path of the INVITE. Fig. 4. Registration for a node belonging to the VN The node doesn’t belong to the VN: in this case, the User Agent of this node broadcasts a Register message to all its 1-hop neighbors, each neighbor register this node to its own RS if it belong to the VN (see Figure 5). Fig. 6. PS of Node A knows location of Node B
  • 4. 26 I Mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (1), JUNE 2013 Fig. 8. TCA Node architecture SIP UA module: realizes UAC and UAS functions, it initiates and responses to SIP requests. SIP Servers module: represents the different SIP servers (LS, RG and PS). Fig. 7. PS of Node C doesn't know location of Node B 4 TCA APPROACH In this chapter we will describe the design of TCA solution [9], to be compared with our solution VNSIP. TCA approach has been chosen because of its good results and because of its similarity with VNSIP. 4.1 SIP terminal presentation in TCA Topo module: constructs a cluster topology to be used by the different SIP modules. 4.2 TCA Operating System TCA solution is essentially based on topology construction module, which is inspired by clustering approach. In fact, the topology construction algorithm chooses nodes to ensure cluster-head role. Nodes which not considered as cluster-heads will be considered as cluster members. Clusters will be related between them using gateway nodes (see Figure 9). For TCA approach, each node of the ad hoc network should be able to guarantee the functionalities below:       SIP User Agent Client (UAC), SIP User Agent Server (UAS), SIP Proxy Server (PS), SIP Registrar (RG), SIP Location Server (LS), Topology construction To achieve those functions, many models have been integrated in the same terminal; Figure 8 illustrates SIP node composition and interaction between those nodes. Fig. 9. Cluster construction
  • 5. 27 I Mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (1), JUNE 2013 When topology construction is achieved, the topo module assigns to each SIP module its role in the network. Each node is considered as a simple User Agent and according to its position in the network; additional tasks may be attributed to this node:  A node which is considered as clusterhead will guarantee, in addition to UA role, PS, RG and LS role.  A node which is cluster member and gateway node will guarantee, in addition to UA role, PS role.  After analyzing the graph above, we can note that our approach guarantees a better time, than TCA solution, to establish sessions between nodes. We can justify this behavior by the fact that our solution VNSIP uses, to forward SIP messages, a higher number of nodes than TCA. And we can add that, replication mechanism used by VNSIP, allows performing many research on different SIP proxies on the same time, which helps to receive responses on shortest time. The figure 11 illustrates session setting time, from TCA and VNSIP, according to the number of nodes A node which is only considered as cluster member will guarantee a simple UA role . SIMULATIONS AND EVALUATION OF PERFORMANCES 5 5.1 Configuration Simulations scenarios were achieved using the network simulator NS2 [8]. The simulation area was 1000m by 1000m. The node number was between 10 and 50 nodes. The movement speed of nodes was between 0 and 18 m/s, and times of simulations were 180 seconds. 5.2 Scenarios of simulations To define the difference between VNSIP behavior and TCA behavior, we achieved many types of simulations, and we analyzed the behaviors when node speeds and node numbers are increased. 5.2.1 Session setting time The figure 10 illustrates session setting time, from TCA and VNSI, according to nodes mobility. Fig. 11. Session setting time according to number of nodes Comparing curves above, we observe that VNSIP gives better performance than TCA. In fact when the number of nodes, which are in charge to forward SIP messages, is increasing, it directly involves that session setting time decreased. Unlike TCA mechanism, which uses only one cluster-head to manage cluster members by forwarding SIP messages, generating largest queue and consequently the session setting time is increased. 5.2.2 Failure rates The figure 12 illustrates the failure rates of session setting according to nodes mobility for TCA and VNSIP methods. Fig. 10. Session setting time according to mobility
  • 6. 28 I Mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (1), JUNE 2013 When we compare both graphs, we note that VNSIP gives lower results than TCA; in fact consumption of bandwidth is higher and increases when number of nodes is rising. This behaviour can be warranted by the high number of message sent when applying our replication mechanism, which consists of achieving several registration and localization in the same time for the same node. 6. Fig. 12. Failure rates by mobility of nodes When we compare failure rates to establish SIP sessions between both methods, we observe that VNSIP performs better results in terms of successful sessions setting. This result can be easily justified by the difference between VNSIP and TCA architectures. VNSIP uses replication mechanism, which allows forwarding SIP messages by several nodes, unlike TCA which uses only cluster-heads to forward SIP messages, this involves that there is only one registration for each node. Therefore TCA mechanism is very sensitive and vulnerable to cluster-heads moves. 5.2.3 Bandwidth consumption The figure 13 illustrates bandwidth consumption when establishing SIP sessions according to number of nodes. Fig. 13. Bandwidth consumption by number of nodes CONCLUSION In this paper we have analyzed and evaluated the performance of a new approach for adapting SIP protocol to Ad Hoc Networks. To achieve this evaluation of performance, we have compared our solution to the TCA approach, which is consider as a solution giving a very interesting result to fix the problem of SIP adaptation to Ad Hoc Networks. The simulation of both approaches has shown that our solution guarantees better results than TCA in terms of setting time and failure rates of SIP sessions. These good results were obtained thanks to VNA, the algorithm used to construct the VNSIP topology, and thanks to the mechanism of replication of SIP messages. On the other side, this mechanism has its own disadvantage, which involve that our solution proposes lower results than TCA in term of bandwidth consumption. For our future works, we’ll try to improve our solution to reduce the consumption of bandwidth. Actually we are designing a new algorithm, to guarantee a good MANET QoS. 7. REFERENCES [1] J. Westcott et G. Lauer, ‘Hierarchical routing for very large networks’, Proc. IEEE MILCOM ’84, pp 214-218, 21-24 October 1984. [2] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handeley et E. Schooler, “SIP: Session Initiation Protocol”, RFC 3261, Juin 2002. [3] S. Corson, J. Macker, ‘Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations’, REC 2501, Janvier 1999. [4] M. Jiang, J. Li and Y. C. Tay, “Cluster Based Routing Protocol (CBRP),” IETF Internet Draft draft-ietf-manet-cbrp-spec-01.txt, August 1999. [5] C. R. Lin and M. Gerla, “Adaptive clustering for mobile, wireless networks,” Journal on Selected Areas of Communication, Vol. 15, No. 7, 1997.
  • 7. 29 I Mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (1), JUNE 2013 [6] J. Rosenberg and H. Schulzrinne, “SIP: Locating SIP Servers”, IETF RFC 3263, June 2002. [7] C. Perkins, E. Belding-Royer, and S. Das “ Ad hoc On-Demand Distance Vector (AODV) Routing ”, IETF RFC 3561, July 2003. [8] “The network simulator”, available at http://www.isi.edu/nsnam/ns [9] N. Banerjee, A. Acharya and S.K. Das, “Enabling SIP-Based Sessions in Ad Hoc Networks “, Winet, April 2006. [10] A.B. Roach, “Session Initiation Protocol (SIP) – Specific Event Notification”, RFC 3265, Juin 2002. [11] P. Stuedi, M. Bihr, A. Remund et G. Alonso, « Siphoc : Efficient sip middleware for ad hoc networks » studi2007siphoc, LECTURE NOTES IN COMPUTER SCIENCE, 2007, Springer [12] S. Leggio, J. Manner, A. Hulkkonen, et K. Raatikainen, “Session initiation protocol deployment in ad hoc networks: a decentralized approach”, In 2nd International Workshop on Wireless Ad-hoc Networks (IWWAN), London, May, 2005.