Increasing the efficiency of VoIP quality assurance parameters through the improvement of MANET routing protocols

Number of pages: 94 File Format: word File Code: 31030
Year: 2014 University Degree: Master's degree Category: Computer Engineering
  • Part of the Content
  • Contents & Resources
  • Summary of Increasing the efficiency of VoIP quality assurance parameters through the improvement of MANET routing protocols

    Dissertation

    To get Master degree

    Computer networks

    Chapter 1

    1 Introduction

    1-1 What is a mobile ad hoc network?

    A mobile ad hoc network [1] is a network formed by wireless hosts [2] that can also be mobile. In these networks, no prefabricated infrastructure is necessarily used. This means that there is no infrastructure such as a central station, router[3], switch[4] or anything else that is used in other networks to help structure the network. Rather, there are only a number of wireless nodes [5] that connect to non-neighboring nodes through communication with neighboring nodes.

    Figure 1-1 shows the structure of a mobile ad hoc network as an example. Small circles represent wireless nodes and each large circle represents the useful range of a node. This means that any other node located in this distance can receive the data sent by this node and distinguish them from environmental noise. For convenience, this network is represented by a corresponding graph, and the edges of the graph mean that its two vertices are at a distance from each other that can receive each other's messages. In fact, the nodes that are within the useful range of each other are connected to it with an edge in the graph representation.

    In case networks, the mobility of the nodes may change the path between two nodes This is what distinguishes these networks from other wireless networks. Despite all these problems, ad hoc networks are used in many cases. The reason for this is the speed and ease of implementing this network, as well as its lack of dependence on pre-built structures. Among the uses of ad hoc networks, we can mention personal applications such as connecting laptops to each other, public applications such as connecting vehicles and taxis, military applications such as the army and battle fleet communication, and emergency applications such as rescue operations. 1-1-1 Features of mobile ad hoc networks This network, like other types of networks, has characteristics such as the following [1]:

    (pictures in The original file is available)

    Autonomous terminal[6]: In this network, each terminal is an independent node that may act as a host or router. In other words, it acts as a host during processing and also acts as a router when routing operations are needed.

    Distributed operations [7]: Since there is no structure to control operations centrally in the network, the control and management of the network between terminals is done in a distributed manner. The nodes in this network must cooperate with each other and each node acts as an amplifier.

    Dynamic network topology[8]: Since the nodes are mobile, the network topology may change rapidly and unpredictably, and the connections between terminals may change at the same time.

    Change of connection capacity[9]: The bit error rate in this network is high. An end-to-end path can be shared by multiple sessions. The channel that connects the terminals is subject to noise, fading and interference and has less bandwidth than a wired network. In a number of designs, the path between each pair of users can travel multiple wireless connections.

    Lightweight terminals: In some cases, the nodes of this network are mobile devices with low processing capacity, small memory size, and low energy storage capability. These devices need optimized algorithms and methods that optimize computing and communication operations.

    Multi-step: Due to the lack of routers and central gateways, hosts perform routing tasks themselves. Therefore, packets follow "multi-hop" routes and pass through different mobile nodes before reaching their destination. Due to the lack of trust in such nodes, this feature presents a serious vulnerability. Amorphism [10]: The mobility and wireless connectivity of nodes allows nodes to enter or leave the network at will, thus allowing a node to intentionally form or break connections. Therefore, the network topology will not have any fixed form neither in terms of size nor in terms of configuration.Any security solution should also consider this feature.

    1-1-2 advantages

    The advantages of mobile ad hoc network are [1]:

    Its development speed is high.

    It can be implemented simply and with low cost.

    It does not require any infrastructure.

    It has automatic configuration.

    Each of the stations as a The router also plays a role.

    It is flexible. For example, it is possible to access the Internet from different points in the area covered by the network.

    Two stations in the network can communicate with each other and transfer information independently of other stations.

    1-1-3 Disadvantages

    Regardless of the attractive applications, the characteristics of this network have caused limitations in the use of these networks, which should be investigated. One of the most important challenges in this type of network is the lack of a fixed infrastructure. Among the main problems in this type of network, the following can be mentioned: Routing: Since the topology of the network is constantly changing, the operation of routing packets between each pair of nodes is very difficult. Most protocols should be based on reactive rather than proactive routing. Paths between nodes may involve multiple steps, which are more complicated than single-step communication.

    (Images are available in the main file)

    Security and Reliability: In addition to the common functionality of wireless communication, this type of network has specific security issues. The nature of distributed operations requires different plans for management. In addition, wireless connections produce many reliability problems due to the limited range of wireless transmissions, the public nature (broadcast) of wireless media (hidden terminal problem), packet loss and data transmission errors.

    Quality of service [11]: Providing different levels of service quality in a network that is constantly changing is a big challenge. The characteristic of change actually makes the quality of communication in this type of network difficult.

    Energy consumption: For mobile terminals, communication operations must be optimized in terms of energy consumption.

    Other problems and limitations in this type of network can be mentioned as follows:

    Errors caused by transmission and as a result of high number of packet deletion

    Continuous disconnections and connections

    Limited bandwidth

    The universal nature of communication

    Variable and dynamic routes and topologies

    Battery charging

    Limited capacity and capabilities of nodes

    Need for new applications

    Congestion control

    Bandwidth limitation

    Security provision

    Delay in sending information in larger networks

    1-1-4 Applications of mobile ad hoc network

    The applications of this type of network are:

    Military applications

    Rescue

    Performing distributed computing operations

    Vehicle network

    Environmental protection

    1-2 Voice on the Internet[12]

    Voice on the Internet, a program It is a real-time application [13] that has perhaps made the most progress in today's networks. An audio input device, such as a microphone, is required on the transmitter side. The audio signal is converted into digital form by an analog-to-digital converter [14]. Due to the packet-switched nature of computer networks, audio data must be coded and packaged [15] before transmission. Encoding[16] and decoding[17] are performed by codecs[18] that convert and return audio data samples to a specific network layer that can be presented. Most codecs are defined by ITU-T [19] standards. Each of them presents different characteristics regarding the amount of bandwidth required.

    After the information is coded and packaged at the sender side, the encapsulated audio data packets [20] can be transmitted in the network. Voice packets on the network interact with packets from other applications that are routed to their destination according to shared connections. The packets are decoded and decapsulated on the receiver side. The digital data stream is then converted back to analog form and presented to an output device, usually a speaker.

  • Contents & References of Increasing the efficiency of VoIP quality assurance parameters through the improvement of MANET routing protocols

    List:

    1 Introduction 2

    1-1 What is mobile ad hoc network? 2

    1-1-1 Features of mobile ad hoc networks. 3

    1-1-2 Advantages 5

    1-1-3 Disadvantages 5

    1-1-4 Mobile ad hoc network applications. 7

    1-2 Audio on the Internet. 7

    1-2-1 Advantages of voice over the Internet. 8

    1-2-2 Voice problems on the Internet 9

    2 Tasks done 11

    2-1 Classification of routing protocols. 11

    2-1-1 table-based routing protocols. 12

    2-1-2 reactive routing protocols. 15

    2-2 Evaluation and comparison of two table-based and reactive routing protocols. 18

    2-3 VoWLAN service quality. 19

    3 Research method 30

    3-1 Audio on the Internet. 30

    3-2 Quality of Service for VoIP. 32

    3-3 Network engineering to achieve productivity and quality of service. 34

    3-3-1 network traffic engineering. 34

    3=3-2 network implementation engineering. 35

    3-4 Mobile case network. 35

    3-5 Table-based routing protocols. 36

    3-6 Demand-based routing protocols 37

    3-7 Hybrid routing protocols. 37

    3-8 Data collection methods and tools 38

    3-9 Research method. 38

    3-10 chapter summary. 38

    4 Data analysis 40

    4-1 Introduction. 40

    4-2 Review of methods of providing service quality in OLSR. 41

    4-2-1 Description of OLSR. 41

    4-2-2 Existing methods of providing quality of service in this protocol. 43

    4-3 NS2 simulation results and its evaluation. 45

    4-3-1 Introduction of the simulation environment. 45

    4-3-2 simulation results. 46

     

    5     Results and future works 63

    6 References and sources.. 71

     

     

    Source:

     

    1 – k Toh Chai, “Ad Hoc Mobile Wireless Networks: Protocols and Systems”, pp. 1-302 (2001).

    2 - Kevin Wallace, "The First Step of Voice over IP Internet", 1391, Ali Mokhtarpour, Chapter 5: 172-189

    3 - S.Mahajan, V.Chopra, "Performance Evaluation of MANET Routing Protocols with Scalability using QoS Metrics of VOIP Applications" International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, Issue 2, February 2013.

    4 - Yih-ChunHu, DavidB.Johnson, AdrianPerrig, "SEAD: secure e?cient distance vector routing for mobile wireless ad hoc networks", Elsevier, PP 175-192, 2003.

    5 - Nicola Milanovic et al, "Routing and Security in Mobile Ad Hoc Networks", IEEE Computer, Vol. 37, No. 2, pp. 61-65, 2004.

    6- Haniyeh Kazemitabar, Sameha Ahmed, Kashif Nisar, Abas B Said, Halabi B Hasbullah,” Voice over IP over Wireless LANs”, World Academy of Science, Engineering and Technology 2010

    7- K. M. McNeill, M. Liu and J. J. Rodriguez, "An Adaptive Jitter Buffer PlayOut Scheme to Improve VoIP Quality in Wireless Networks", IEEE Conf. on BAE Systems Network Enabled Solutions, Washington, 2006

    8 - Asahidai, Nomi, Ishikawa, "VoIP over Wireless LAN Survey", Japan Advanced Institute of Science and Technology (JAIST), April 20, 2006

    9 - Guntupalli Lakshmikant, A Gaiwak, P.D. Vyavahare, "Simulation Based Comparative Performance Analysis of Adhoc Routing Protocols", in proceedings of TENCON 2008.

    10 - Yogesh Chaba, Yudhvir Singh, Manish Joon, "Simulation Based Performance Analysis of On-Demand Routing Protocols in MANETs," Second International Conference on Computer Modeling and Simulation, 2010.

    11 - Chenna Reddy, P.; ChandraSekhar Reddy, P., "Performance Analysis of Adhoc Network Routing Protocols," ISAUHC '06, International Symposium on Ad Hoc and Ubiquitous Computing, vol., no., pp.186-187, 20-23 Dec. 2006.

    12 - G. Jayakumar and G. Gopinath, "Performance comparison of two on-demand routing protocols for ad-hoc networks based on random way point mobility model," American Journal of Applied Sciences, vol. 5, no. 6, pp. 649-664, June 2008.

    13 - S.R. Birdar, Hiren H D Sarma, Kalpana Sharma, Subir Kumar Sarkar, Puttamadappa C, . Birdar, Hiren H D Sarma, Kalpana Sharma, Subir Kumar Sarkar, Puttamadappa C, Performance Comparison of Reactive Routing Protocols of MANETs using Group Mobility Model", International Conference on Signal Processing Systems, 2009.

    14 - Kapang Lego, Pranav Kumar Singh, Dipankar Sutradhar, "Comparative Study of Adhoc Routing Protocol AODV, DSR and DSDV in Mobile Adhoc NETwork", Indian Journal of Computer Science and Engineering Vol. 1 no. 4 364-371, 2011.

    15 - Vijayalaskhmi M. Avinash Patel, Linganagouda Kulkarni, “QoS Parameter Analysis on AODV and DSDV Protocols in a Wireless Network”, International Journal of Communication Network and Security, Volume-1, Issue-1, 2011.

    16 - Shaily Mittal, Prabhjot Kaur, “Performance Comparison of AODV, DSR and ZRP Routing Protocols in MANET's", International Conference on Advances in Computing, Control, and Telecommunication Technologies, 2009.

    17 - Li Layuan, Li Chunlin, Yaun Peiyan, "Performance evaluation and simulation of routing protocols in ad hoc networks", Computer Communications 30 (2007) 1890-1898.

    18 - Kavita Pandey, Abhishek Swaroop, "A Comprehensive Performance Analysis of Proactive, Reactive and Hybrid MANETs Routing Protocols" IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011.

    19 - AODV, internet draft, http://tools.ietf.org/html/draft-ietf-manet-aodv-09

    20 - Jubin and Tornow, “The DARPA Packet Radio Network Protocols”, in the Proceedings of the IEEE, Special Issue on Packet Radio Networks, Jan 1987, vol.75 pp.21-32.

    21 - Xiaoyan Hong, Kaixin Xu, and Mario Gerla, "Scalable Routing Protocols for Mobile Ad Hoc Networks", IEEE Network Magazine, July-Aug, 2002, pp.11-21.

    22 - Tomochika Ozaki, Jaime Bae Kim and Tatsuya Suda, "Bandwidth-Efficient Multicast Routing for Multihop, Ad-Hoc Wireless Networks", in Proceedings of IEEE INFOCOM 2001, Anchorage, Alaska, USA, April 2001, pp.1182-1191.

    23 - “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)”, http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-07.txt, IETF Internet draft, Feb 2002

    24 - P. Gupta and P.R. Kumar, "The Capacity of Wireless Networks", in IEEE Transactions on Information Theory, vol. IT-46, no. 2, March 2000, pp.388-404. 25 - "Ad hoc On-Demand Distance Vector (AODV) Routing", http://www.ietf.org/internet-drafts/draft-ietf-manet-aodv-10.txt, IETF Internet draft, Jan 2002 Samaneh, Moqar Rahimabadi Ali, "Evaluation of the performance of different routing protocols in special mobile networks under different conditions of network size, traffic and mobility of nodes", National Conference of the Iranian Computer Association, 2016

    27 - Jahanbakhsh Sajjad, Jamali Shahram, Vajed Khiavi Mina, "Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs", International Research Journal of Applied and Basic Sciences, vol. 3(7), 1429-1436, 2012

    28 - Akhter Md Shahid, Singh Vijay Prakash, "Modified Power Saving DSR protocol for MANET" International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol.

Increasing the efficiency of VoIP quality assurance parameters through the improvement of MANET routing protocols