Sunteți pe pagina 1din 18

Conclusion

In this complete research different queuing technique is analyzed

successfully over MANET in VoIP scenario. First researcher contributes DBPQ

queue technique has been implemented using RSSI algorithm. The performance

evolution has been prepared with respect to QoS performance metrics such as

delay, throughput packet loss, and jitter conducted comparing with FIFO, PQ, and

WFQ. According to simulation result DBPQ gives better result in case of

throughput, jitter, and packet loss. The performance analyses were conducted

comparing with Priority queue According to simulation result DBPQ gives better

result in case of throughput, jitter, and Delay.As a feature work the node energy

level should be tired and increased to avoid delay performance. In the result

scenario Improvisation of QoS using DBPQ for queuing technique in Vo-MAN

network has been simulated in network simulator.Second researcher proposed a

new analytical model to estimate the energy Intelligent Adaptive Energy

Efficiency & Effective signal buffer management algorithm for VoIP (QoS) over

Manet for energy consumption in queuing buffer management to allocate a

bandwidth as per energy consumption we validate in this model using simulation

transitions between distance and energy in VoIP over queue buffer in manet

environment. The result of analytical model is suitable for energy consumption in

our proposed modelEnergy consumption in queuing buffer management to allocate

a bandwidth as per energy consumption, we validate in this model using

simulation transitions between distance and energy in VoIP over queue buffer in
manet environment. The result of analytical model is suitable for energy

consumption in our proposed model. The third researcher work result belongs to

explains about the calculation of the average time consumed by each and every

node for time. At each time nodes get the data packet messages from the Cluster

Head (CH) which makes the node to change the current state from the sleep to

wake up mode. The bandwidth between the Cluster Head (CH) and destination

node is calculated intelligently. The set up was tested for smaller number of nodes

and the same could be replicated for number of nodes. Thus the reduced traffic in

VoIP time consumption of wireless sensor node increases the network life time

since the traffic is not been used for the whole time instead it is used for the

particular time reduced in the new proposed algorithm Class Based Cluster Round

Trip Queue (CBCRTQ) for VoIP (QoS) over MANET. Since the traffic is not been

used for the whole time instead it is used for the particular time, so it reduced the

overall traffic generation in the queue. Final contribute result research evaluate the

appearance and performance of VoIP over MANET by applying AMQD

mechanism under various voice codec schemes in Network simulation tool. A

comparison has been conducted between two of voice codec scheme. This contrast

meant to recognize which codec offer more acceptable presentation actions for

request like VOIP. A choice which codec offers more acceptable presentation

gauge results is only made depending on varying the number of users the result

shows a selection of G.711 and G723 codec in a simulation. And the configuration

of Random waypoint model respectively algorithms performs better, achieving a


lower discards rate and lower overall delay. This dissertation work minimizes end-

to-end data transmission delay & average packet waiting time and increase overall

throughput Experimental results show that the proposed random packet scheduling

scheme has better performance than the existing queuing. The configuration of

AMQD with Random waypoint model algorithms respectively performs better,

achieving a lower discards rate and lower overall delay.

Scope of the Future work

The proposed work may be extended in feature to analyses and evaluate the

performance of QoS factors by restructure with using Gauss Markov Mobility

Model.

This model also can be Adapted for Voice Transmission with better bandwidth

utilization.

The proposed AMOD model may be restructured with using Reference Point Group

Model to analyses the performance of difference Codec's for QoS factors.


REFERENCES

1. VijayakumarM, karthikeyani V . Intelligent adaptive energy efficient &effective signal buffer

management algorithm for voip (qos) over manet International journal of future generation

communication and networking 2016, 9(1), pp. 47-60.

2. Vijayakumar M, karthikeyani V. An Enhanced Perceptive Queuing Technique (CBCRTQ) for

Traffic Management in VoIP Over MANET International journal of future generation

communication and networking2016, 9(5), pp. 99-112.

3. VijayakumarM, karthikeyani V. Performance Analysis of Mobility Models with Adaptive

Multiple Queuing Disciplines (AMQD) using different CODEC for VoIP Routing over

MANET scenario International Journal of Engineering Science and Research Technology

IJESRT, 2016, 5(6), - pp.445-54.

4. G. Suseendran, A. Sasikumar,Secure Intrusion-Detection System in Mobile

AdhocNetworks,Indian Journal of Science and Technology,2016 May, 9(19), Doi

no:10.17485/ijst/2016/v9i19/93829

5. G. Jisha, Philip Samuel, Varghese Paul, Role of Gateways in MANET Integration Scenarios

,Indian Journal of Science and Technology,2016 Jan, 9(3), Doi

no:10.17485/ijst/2016/v9i3/84263

6. Y. Haripriya, K. V. BinduPavani, S. Lavanya, V. MadhuViswanatham,A Framework for

Detecting Malicious Nodes in Mobile AdhocNetwork,Indian Journal of Science and

Technology,2015 Jan, 8(S2), Doi no: 10.17485/ijst/2015/v8iS2/60285


7. K. Rajkumar,Efficient Resource Allocation in Multicasting over Mobile

AdhocNetworks,Indian Journal of Science and Technology,2014 June, 7(S5), Doi

no:10.17485/ijst/2014/v7iS5/50711

8. S. Muthuramalingam, T. SubaNachiar, Enhancing the Security for Manet by Identifying

Untrusted Nodes using Uncertainity Rules , Indian Journal of Science and Technology,2016 Jan,

9(4), Doi no:10.17485/ijst/2016/v9i4/87043

9.D. Maheshwari, R. Nedunchezhian ,An Optimized Approach on Link Stability with Load

Balancing in MANET using Balanced Reliable Shortest Route AOMDV (BRSR_AOMDV)

,Indian Journal of Science and Technology,2016 Jan, 9(4), Doi

no:10.17485/ijst/2016/v9i4/70487

10. K. Vijayakumar, K. Somasundaram,Study on Reliable and Secure Routing Protocols on

Manet,Indian Journal of Science and Technology,2016 Apr, 9(14), Doi

no:10.17485/ijst/2016/v9i14/84433

11. Tibor MIUTH , Ivan BAROK PACKET LOSS PROBABILITY ESTIMATION USING

ERLANG B AND M/G/1/K MODELS IN MODERN VOIP NETWORKS Journal of Electrical

and Electronics Engineering T. Miuth and I. Barok/ IU-JEEE Vol. 12(2), (2012), 1483-1491

12. KazemitabarH , Ahmed S , KashifNisar K , Said A B , Hasbullah H B . A Survey on Voice

over IP over Wireless LAN ,Paper in World Academy of Science, Department of Computer

andInformation Sciences, University Technology, Malaysia , 2010 , 4(11), pp. 1-7.


13. Greg S, Tucker T. Voice over Internet Protocol (VoIP) and Security, Paper in SANS

Institute, 2004.

14. Gouda I, Salama M, ElemamShehab A, Hafez A, Zaki M. Performance Analysis of

Transmitting Voice over Communication Links Implementing IPSec , Paper in 13th

International Conference on Aerospace Sciences and Aviation Technology (ASAT), Military

Technical College, Cairo, Egypt , 2009, pp. 1-12.

15. Qinxia Q. He "Analyzing the Characteristics of VoIP Traffic, Thesis Msc, Department of

Computer Science, University of Saskatchewan, Canada, J2007.

16. Tawfeeq F N. Network Congestion and Quality of Service Analysis Using OPNET, Thesis,

Department of Information Engineering, Al-Nahrain University, March 2009, pp.346-99.

17. J Gupta J D . Performance Issues for VoIP in Access Networks, Thesis Msc, Department

of Mathematics and Computing Faculty of Sciences, University of Southern Queensland, 2005.

18. AboelelaE . Networks Simulation Experiments Manual ,Book, 3rd Edition ,2003 .

19. Svensson T, Alex Popescu A . Development of Laboratory Exercises Based on OPNET

Modeler, Thesis, Department of Electrical Engineering, Blekinge Institute of Technology,

2003,1(1),pp. 1-10.

20. S.Dhanalakshmi, M. Sathiya and R.Gowthami INVESTIGATING THE PERFORMANCE

OF VOIP OVER ETHERNET LAN IN CAMPUS NETWORK International Journal of Recent

Scientific Research Vol. 6, Issue, 6, pp.4389-4394, June, 2015.

21. Dr. Abdul-Bary R. Sulaiman1 and Omar Kh. Salih Alhafidh2 Performance Analysis of

Multimedia Traffic over MPLS Communication Networks with Traffic Engineering International
Journal of Computer Networks and Communications Security VOL. 2, NO. 3, MARCH 2014,

93101 Available online at: www.ijcncs.org ISSN 2308-9830.

22. Schoenmakers B. A simple publicly verifiable secret sharing scheme and its application to

electronic voting, CRYPTO of lecture notes in Computer science, Springer-verlag, 1999, 1666,

pp. 148 - 64.

23. J.Faritha Banu1 and V.Ramachandran2 Study of QoS Management Techniques for Voice

Applications International Journal of Computer Science and Electronics Engineering (IJCSEE)

Volume 1, Issue 1 (2013) ISSN 23204028 (Online)

24. Hong Li and Lorne Mason Multipath routing with adaptive playback scheduling for voice

over IP in service overlay networks.2008, pp. 1-5.

25. Rajesh Sharma, Seema Sabharwal Dynamic Source Routing Protocol (DSR) International

Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue

7, July 2013 ISSN: 2277 128X

26. K. Maheswari1, M. Punithavalli an Assessment of Security in Voip Using Secret Sharing

International Journal of Networks and Communications: 2011; 1(1): 1-5 DOI:

10.5923/j.ijnc.20110101.01

27. Kevork R, PiloyanP, VaheNerguizian V. Novel Architecture for Routing Packetized Voice

over Existing Internet Infrastructure without Using the Internet Protocol, IJCSNS-International

Journal of Computer Science and Network Security, 2006, 6(7), pp.1-7.


28. Su-Kit Tang, and Dongyang Long Multiple Disjoint Paths Routing Using Implicit Source

Routes in Wireless Ad Hoc Networks Proceedings of the International Multi Conference of

Engineers and Computer Scientists 2008 Vol II IMECS 2008, 19-21 March, 2008, Hong Kong

29. MehaswariM, Punithavalli K. Design and Implementation of multipath routing approach

for secured and reliable data delivery over VoIP INTERNATIONAL JOURNAL OF

APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 2, No 2, 2011 ISSN - 0976-

4259.

30 Hesham N. Elmahdy, Mohamed H. N. Taha, The Impact of Packet Size and Packet

Dropping Probability on Bit Loss of VoIP Networks, Paperin ICGST-CNIR Journal,

Volume 8, Issue 2, January (2009)

31 Haniyeh Kazemitabar, Sameha Ahmed, Kashif Nisar, Abas B Said, Halabi B Hasbullah ,

A Survey on Voice over IP over Wireless LAN ,Paper in World Academy of Science,

Department of Computer and Information Sciences, University Technology, Malaysia ,

(2010).

32 Greg S. Tucker, Voice over Internet Protocol (VoIP) and Security, Paper in SANS

Institute, October (2004).

33 Gouda I. Salama, M. ElemamShehab, A. A. Hafez, M. Zaki,Performance Analysis of

Transmitting Voice over Communication Links Implementing IPSec , Paper in 13th

International Conference on Aerospace Sciences and Aviation Technology (ASAT),

Military Technical College, Cairo, Egypt , May (2009).


34 E.Gustafsson,G.Karlsson Apr(1997), A literature survey on traffic dispersion, IEEE

networks.

35 Hanoch, Levy, Haim, Zlatokrilov, the effect of packet dispersion on voice applications in

IP networks, IEEE / ACM transactions on networking.

36 HousamAlAllouni,AlaaEldinRohiem,MohammedHashemAbd El-Aziz ahmed,Ali El-

Moghazy March (2009), VoIP Denial of Service Attacks Classification and

Implementation, 26th National radio science conference.

37 Abbasi, M. Younis, A survey on clustering algorithms for wireless sensor networks,

(2007)

38 Anne Aaron, and JieWeng, Performance Comparison of Ad-hoc Routing Protocols for

Networks with Node Energy Constraints, International Journal of engineering and

technology, EE 360 Class Project Spring 2000-2001.

39. M. Feeney, An Energy Consumption Model for Performance Analysis of Routing Protocols

for Mobile Ad Hoc Networks, Mobile Networks and Applications, 6(3), (2001)

40 Garcia J.E., Cano J.C., P. Manzon, A Novel DSR based Energy Efficient Routing

Algorithm for mobile Ad hoc Networks, In: the Proc of IEEE 58th Vehicular
TechnologyConference, 5(3), 2003 849-854 M. Cardei, M.T. Thai, Y. Li, and W. Wu,

Energy-efficient target coverage in wireless sensor networks, In Proc.of IEEE Infocom,

(2005).

41 E. M. Royer and C.-K. Toh, (1999) A review of current routing protocols for ad hoc

mobile wireless networks, IEEE Personal Communications.

42 Benjie Chen, Kyle Jamieson, Hari Balakrishnan and Robert Morris, Span: An Energy-

Efficient Coordination Algorithm for Topology Maintenance in Ad hoc Wireless

Networks, Wireless Networks, Vol. 8, No. 5, pp. 481-494, (2002).

43 S.J.Lee and M.Gerla (2001), Split Multipath routing with maximally disjoint paths in ad

hoc networks, Proceedings of International Conference on Communications, 10, pp 3201-

3205

44 Dr. Hussein A Mohammed, Dr.Adnan Hussein Ali (2013), The Affects of Different

Queuing Algorithms within the Router on QoS VoIP application using OPNET. Published

in (IJCNC Vol : 5 January 2013)

45 Design and Implementation of multipath routing approach for secured and reliable data

delivery over VoIP. Publication in (IJAER- Vol:2 / 2011).


46 N. Enneya, K. Oudidi and M. Elkoutbi Network Mobility in Ad hoc Networks,

Computer and Communication Engineering, 2008. ICCCE 2008. International Conference

on, 13-15 May 2008, Kuala Lumpur, Malaysia.

47 Joongmankim, seokungyoon, yoojae won, jaeil lee (2007), VoIP secure communication

protocol satisfying backward compatibility, second International conference on systems

and networks communications, IEEE.

48 R. Shah and J. Rabaey, (2002) Energy aware routing for low energy ad hoc sensor

networks, in Wireless Communications and Networking Conference, 2002. WCNC2002.

2002 IEEE, vol. 1 pp. 350355 vol.1.

49 P. Hosein, Capacity of Packetized Voice Services over Time-Shared Wireless Packet Data

Channels, IEEE INFOCOM, March (2005).

50 P. J. A. Gutierrez, Packet Scheduling and Quality of Service in HSDPA,Ph.D.

dissertation, Aalborg University, October (2003).

51 M. Aamir, M. Zaidi, and H. Mansoor, Performance analysis of Diffserv based quality of

service in a multimedia wired network and VPN effect using OPNET, International Journal

of Computer Science Issues, vol. 9, no. 3, pp. 368-376, 2012.


52 Design and Analysis of Load Balancing Clusters in wireless Adhoc Network IJCEM

International Journal of Computational Engineering & Management, Vol. 12, April 2011

ISSN (Online): 2230-7893

53 Class-Based Weighted Fair Queuing Scheduling on Quad-Priority Delta Networks D. C.

Vasiliadisa,b, G. E. Rizosa,b, C. VassilakisaaDepartment of Computer Science

54 F. Buiati, R. S. Puttini, and R. T. de Sousa Jr., A Secure Autoconfiguration Protocol for

MANET Nodes. Lecture Notes in Computer Science, v. 3158, pp. 108-121, 2004.

55 Ana Cavalli, Jean-Marie Orset, Secure hosts autoconfiguration in mobile ad hoc

networks, ICDCSW.2004, pp. 809-814.

56 Pan Wang, Douglas S. Reeves, PengNing, Secure Address Autoconfiguration for Mobile

Ad Hoc Networks, MOBIQUITOUS 2005. pp. 519-522.

57 ShenglanHu, Chris J. Mitchell, Improving IP address autoconfiguration security in

MANETs using trust modelling, Mobile Ad-hoc and Sensor Networks - First International

Conference, MSN 2005, pp. 83-92

58 Andr Langer and Tom Khnert, Security issues in Address Autoconfiguration Protocols:

An improved version of the Optimized Dynamic Address Configuration Protocol.

archiv.tuchemnitz. de, 2007.

59 S. Nesargi and R. Prakash, MANETconf: Configuration of Hosts in a Mobile Ad Hoc

Network, IEEE INFOCOM 2002, June 2002


60 J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing Robust and Ubiquitous

Security Support for MANET. In IEEE International Conference on Network Protocols,

pages 251.260, Nov. 2001.

61 Di Crescenzo, G. Arce and R. Ge. Threshold Cryptography in Mobile Ad Hoc

Networks. In Springer Berlin / Heidelberg editor, Security in Communication Networks,

volume 3352 of Lecture Notes in Computer Science, Springer 2005.

62 T. Pedersen, A threshold Cryptosystem without a Trusted Party, in Proc. of Eurocrypt 91.

63 A. Shamir. How to Share a Secret. Communications of the ACM, 22(11):612613, 1979

64 M. Hwang and T. Chang. Threshold Signatures: Current Status and Key Issues.

International Journal of Network Security, Vol.1, No.3, PP.123137, Nov. 2005

65 A. Abdelmalek, M. Feham and A. Taleb-Ahmed. On Recent Security Enhancements to

Autoconfiguration Protocols for MANETs: Real Threats and Requirements. International

Journal of Computer Science and Network Security, Vol.9, No.4, PP.401407, April 2009.

66 The Network Simulator manual, The NS2 homepage ttp://www.isi.edu/nsnam/ns

67 Speed Comparisons of Popular Crypto Algorithms,

68 C. Crpeau and C.R. Davis. A Certificate Revocation Scheme for Wireless Ad Hoc

Networks.Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks

(SASN '03), pp.54- 61, 2003.

69 G. Anastasi, M. Conti, and M. Di Francesco, Extending the lifetime of wireless sensor

networks through adaptive sleep, IEEE Trans. Industrial Informatics, vol. 5, no. 3, pp. 351365,

2009.
70 G. Bergmann, M. Molnar, L. Gonczy, and B. Cousin, Optimal period length for the CQS

sensor network scheduling algorithm, in Proc. 2010 International Conf. Netw. Services, pp.

192199.

71E. Bulut and I. Korpeoglu, DSSP: a dynamic sleep scheduling protocol for prolonging the

lifetime of wireless sensor networks, in Proc. 2007 International Conf. Advanced Inf.

Networking Appl., vol. 2, pp.

725 730.

72 S. Chachra and M. Marefat, Distributed algorithms for sleep scheduling in wireless sensor

networks, in Proc. 2006 IEEE International Conf. Robot. Autom., pp. 31013107.

73 P. Guo, T. Jiang, Q. Zhang, and K. Zhang, Sleep scheduling for critical event monitoring in

wireless sensor networks, IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 2, pp. 345352, Feb.

2012.

74 On the Evaluation of the Active Queue Management Mechanisms, Lukasz Chrost and

AndrzejChydzinski

75 Improving Quality of VoIP Streams over WiMaxShamikSengupta, Student Member, IEEE,

MainakChatterjee, and SamratGanguly IEEE TRANSACTIONS ON COMPUTERS, VOL. 57,

NO. 2, FEBRUARY 2008.


76 Performance Studies of VoIP over Ethernet LANs Di Wu School of Computing and

Mathematical Sciences, 2008.

77 D. Rizzetto, & C. Catania (1999). A Voice over IP Service Architecture for Integrated

Communications. IEEE Internet Computing, Volume 3, Issue 3, Pages: 53 62.

78 PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS

LAN AND WAN USING DIFFERENT CODECS, Ali M. Alsahlany.

79 Floyd S., and Jacobson V. Random Early Detection Gateways For Congestion Avoidance,

IEEE/ACM Transactions on Networking, volume 1, issue 4, 1(4): pp. 397-413, August 1993.

80 Dow C R, Dow C R, Lin P J, et al, A study of recent research trends and experimental

guidelines in mobilead-hoc network, Advanced Information Networking and Applications, P72-

771, 2005.

81 T. Clausen, P. Jacquet, "Optimized Link State Routing Protocol", IETF RFC 3626, October

2003.

82 R Ogier, P. Spagnolo, "MANET Extension of OSPF using CDS Flooding, draft-ogier-manet-

ospf-extension-06.txt, December 2005.

83 Perkins, C., Belding, E., Das, S., Ad hoc On-Demand Distance Vector (AODV) Routing -

RFC 3561, 2003.


84 Bjorn Wiberg, "Porting AODV-UU Implementation to ns-2 and Enabling Trace-based

Simulation", Master's Thesis, Dept. of Computer System, Uppsala University, Sweden, 18

Decber 2002

85 W. Ahn, Gathering-based routing protocol in mobile ad hoc networks, Computer

Communications 30 (2006) 202-206.

86 C. Tschudin, P. Gunningberg, H. Lundgren, and E. Nordstrom, "Lessons from Experimental

MANET Research," Elsevier Ad Hoc Networks Journal, Vol. 3,Issue 3, March 2005.

87 Sanchez M, Manzoni P. A java-based ad hoc networks simulator. In Proceedings of the SCS

Western Multi conference Web-based Simulation Track, January 1999.

88 Christian Bettstetter and Christian Wagner. The Spatial Node Distribution of the Random

Waypoint Mobility Model. Proceeding Mobile Ad-Hoc Netwerke,2002.

89 T. Camp, J. Boleng, and V. Davies A Survey of Mobility Models for Ad Hoc Network

Research. Wireless Communication and Mobile Computing (WCMC): Special Issue on Mobile

Ad Hoc Networking: Research, Trends, and Applications, vol. 2, no. 5, pp. 483-502, 2001.

90 C. Bettstetter, Smooth is better than sharp: a random mobility model for simulation of

wireless networks, in: Proceedings of the ACM Workshop on Modeling, Analysis and Simulation

of Wireless and Mobile Systems, 2001, pp. 1927.


91 C. Bisdikian, An overview of the Bluetooth wireless technology, IEEE Communication

Magazine, December 2001.

92 C. Bettstetter, O. Krause, On border effects in modeling and simulation of wireless ad hoc

networks, in: Proceedings of the 3rd IEEE International Conference on Mobile and Wireless

Communication Networks (MWCMN), 2001.

S-ar putea să vă placă și