• List of Articles SIP

      • Open Access Article

        1 - Evaluation of SIP signaling implementation using QoS parameters
        mojtaba jahanbakhsh azharivs azharivs maryam homayooni Ahmad akbari
        Normal 0 false false false EN-US X-NONE AR-SA MicrosoftInternetExplorer4 More
        Normal 0 false false false EN-US X-NONE AR-SA MicrosoftInternetExplorer4 !mso]> st1:*{behavior:url(#ieooui) } /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal" mso-tstyle-rowband-size:0 mso-tstyle-colband-size:0 mso-style-noshow:yes mso-style-priority:99 mso-style-qformat:yes mso-style-parent:"" mso-padding-alt:0cm 5.4pt 0cm 5.4pt mso-para-margin:0cm mso-para-margin-bottom:.0001pt mso-pagination:widow-orphan font-size:11.0pt font-family:"Calibri","sans-serif" mso-ascii-font-family:Calibri mso-ascii-theme-font:minor-latin mso-fareast-font-family:"Times New Roman" mso-fareast-theme-font:minor-fareast mso-hansi-font-family:Calibri mso-hansi-theme-font:minor-latin mso-bidi-font-family:Arial mso-bidi-theme-font:minor-bidi} Abstract The variety of services on IP networks and the need for network technology convergence have resulted in many access networks to adopt the IP technology. The Session Initiation Protocol (SIP) is an end to end application level protocol for establishing, terminating and modifying sessions and has experienced widespread use in IP networks due to its distinguished features such as being text based, independence from the underlying network, and more importantly supporting various types of mobility. In fact these features have lead SIP to be used as the core signaling protocol in the IP Multimedia Subsystem, which is the control plane proposed for next generation networks by the 3GPP community. Nevertheless, the performance of SIP servers when used by the millions of users of the next generation networks is not well established. In this paper we evaluate the performance of SIP servers using a test bed developed at the Iran University of Science & Technology. We consider eight different configurations for SIP server and also study the effect of using TCP and UDP as the transport protocol for SIP packets. We measure several parameters including call setup delay, call failure rate and SIP server throughput. Our results suggest that using SIP in large networks require using special techniques for balancing the load of SIP servers as well as mitigating temporary overloads.  Manuscript profile
      • Open Access Article

        2 - Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip
        bahareh asadi midia reshadi Ahmad khademzade mostafa karbasi
        Large number of processing cores integrated into a single chip have high growth rates. Networks on an optical chip are one of the simplest ways to solve the addressing problem between bulk interconnected networks. That's why high-performance, high-bandwidth multi-proces More
        Large number of processing cores integrated into a single chip have high growth rates. Networks on an optical chip are one of the simplest ways to solve the addressing problem between bulk interconnected networks. That's why high-performance, high-bandwidth multi-processor chips will be needed in the future. Optical chip networks were introduced as a new generation of on-chip networks that overcome all the limitations of this type of network and have many advantages such as high communication bandwidth, low transmission delay. And power consumption is low. On the other hand, networks on optical chips have challenges, one of the most important of which is the routing of optical data in the optical layer, because how the path is selected affects the optical loss factor. In this paper, routing algorithms free from the impasse of adaptive rotational models, circuit switching and various traffic patterns to reduce light loss in the optical layer by considering a 5-port unobstructed router and two-dimensional grid or Mesh will be provided. Finally, we compare the simulation results with similar methods such as the XY-based algorithm and examine the improvements obtained. Manuscript profile
      • Open Access Article

        3 - SIP Vulnerability Scan Framework
        Mitra Alidoosti Hassan Asgharian Ahmad akbari
        The purpose of this paper is to provide a framework for detecting vulnerabilities in SIP (Session Initiation Protocol) networks. We try to find weaknesses in SIP enabled entities that an attacker by exploiting them is able to attack the system and affect it. This framew More
        The purpose of this paper is to provide a framework for detecting vulnerabilities in SIP (Session Initiation Protocol) networks. We try to find weaknesses in SIP enabled entities that an attacker by exploiting them is able to attack the system and affect it. This framework is provided by the concept of penetration testing and is designed to be flexible and extensible, and has the capability to customize for other similar session based protocols. To satisfy the above objectives, the framework is designed with five main modules for discovery, information modeling, operation, evaluation and report. After setting up a test-bed as a typical VoIP system to show the validity of the proposed framework, this system has been implemented as a SIP vulnerability scanner. We also defined appropriate metrics for gathering the performance statistics of SIP components. Our test bed is deployed by open-source applications and used for validation and also evaluation of the proposed framework. Manuscript profile
      • Open Access Article

        4 - ARASP: An ASIP Processor for Automated Reversible Logic Synthesis
        Zeinab Kalantari Marzieh Gerami Mohammad eshghi
        Reversible logic has been emerged as a promising computing paradigm to design low power circuits in recent years. The synthesis of reversible circuits is very different from that of non-reversible circuits. Many researchers are studying methods for synthesizing reversib More
        Reversible logic has been emerged as a promising computing paradigm to design low power circuits in recent years. The synthesis of reversible circuits is very different from that of non-reversible circuits. Many researchers are studying methods for synthesizing reversible combinational logic. Some automated reversible logic synthesis methods use optimization algorithms Optimization algorithms are used in some automated reversible logic synthesis techniques. In these methods, the process of finding a circuit for a given function is a very time-consuming task, so it’s better to design a processor which speeds up the process of synthesis. Application specific instruction set processors (ASIP) can benefit the advantages of both custom ASIC chips and general DSP chips. In this paper, a new architecture for automatic reversible logic synthesis based on an Application Specific Instruction set Processors is presented. The essential purpose of the design was to provide the programmability with the specific necessary instructions for automated synthesis reversible. Our proposed processor that we referred to as ARASP is a 16-bit processor with a total of 47 instructions, which some specific instruction has been set for automated synthesis reversible circuits. ARASP is specialized for automated synthesis of reversible circuits using Genetic optimization algorithms. All major components of the design are comprehensively discussed within the processor core. The set of instructions is provided in the Register Transform Language completely. Afterward, the VHDL code is used to test the proposed architecture. Manuscript profile
      • Open Access Article

        5 - The Effects of SIP Register Flood Attack and Detection by Using Kullback–Leibler Distance
        S. R. Chogan M. Fathy M. Ramezani
        Voice communications through internet uses VOIP which includes several protocols while its secrecy is very important issue. SIP is the most important signaling protocol whose attack detection may help system immunization. This paper is dedicated to the issue of SIP regi More
        Voice communications through internet uses VOIP which includes several protocols while its secrecy is very important issue. SIP is the most important signaling protocol whose attack detection may help system immunization. This paper is dedicated to the issue of SIP registration flood attacks. Attackers can send registration signals which have several dangers for registration server. In this paper, SIP register flood attacks is investigated by details and the effects of attack over registration server is illustrated. Finally, the effects of attack, regarding the ratios compared with a regular situation of the network, are evaluated in experiments done in a real network. Moreover, instead of Hellinger distance, Kullback–Leibler distance is used for register flood attacks detection and corresponding ROC curves show this approach has better performance. Manuscript profile
      • Open Access Article

        6 - EBONC: A New Energy-Aware Clustering Approach Based on Optimum Number of Clusters for Mobile Wireless Sensor Networks
        N. Norouzy N. Norouzy M. Fazlali
        The energy constraint is one of the key challenges in wireless sensor networks that directly affects the network lifetime. Clustering the sensor nodes is one of the possible approaches to improving the energy efficiency by uniformly distributing the energy consumption a More
        The energy constraint is one of the key challenges in wireless sensor networks that directly affects the network lifetime. Clustering the sensor nodes is one of the possible approaches to improving the energy efficiency by uniformly distributing the energy consumption among the nodes. The number of appropriate clusters plays an important role in the network throughput. A Large number of clusters imply that packets pass more hops to reach the destination, which results in higher energy consumption. In this paper, we devise an energy and location aware clustering scheme that tries to optimize the number of required clusters. Moreover, the cluster heads are chosen according to their energy levels. The devised scheme partitions the network into concentric circles and calculates the appropriate number of clusters to provide an energy efficient network. A gossiping approach is used to provide information exchange mechanism. The performance of the devised approach is compared with ASH scheme. The simulation results show the network lifetime is improved from 25% to 40% in difference network scenarios. Manuscript profile
      • Open Access Article

        7 - Analyzing the Optimization Problem of Resource Allocation in SIP Proxies and Providing an Overload Control Algorithm with Max-min Fairness
        M. Jahanbakhsh S. V. Azhari V. Ghasemkhani
        Session Initiation Protocol (SIP) is an application layer protocol designed to create, manage, and terminate multimedia sessions in the IP multimedia subsystem (IMS). The widespread use of this protocol results in high traffic volume over SIP proxies, requiring delicate More
        Session Initiation Protocol (SIP) is an application layer protocol designed to create, manage, and terminate multimedia sessions in the IP multimedia subsystem (IMS). The widespread use of this protocol results in high traffic volume over SIP proxies, requiring delicate CPU allocation to flows. In this paper, we analyze the optimization problem of resource allocation in SIP proxies with two objective functions: maximizing total throughput and minimizing the least squares. Maximizing total throughput, prioritizes intra-domain flows over inter-domain ones, as the latter pass through two intermediate proxies. On the other hand, minimizing the least squares corresponds to a max-min fairness policy. Hence, we use round robin scheduling in proxies. In addition, we propose a SIP overload control algorithm that limits re-transmissions and prevents instability of proxies by controlling the length of SIP message backlog for each flow. This algorithm leads to better use of processing resources, in comparison with existing overload control algorithms. Manuscript profile
      • Open Access Article

        8 - Resource Management in Multimedia Networks Using Software-Defined Network Technology
        Ahmadreza Montazerolghaem
        Nowadays, multimedia networks on the Internet have become a low-cost and efficient alternative to PSTN. Multimedia transfer applications on the Internet are becoming more and more popular. This connection consists of two phases: signaling and media. The signaling phase More
        Nowadays, multimedia networks on the Internet have become a low-cost and efficient alternative to PSTN. Multimedia transfer applications on the Internet are becoming more and more popular. This connection consists of two phases: signaling and media. The signaling phase is performed by SIP proxies and the media phase by network switches. One of the most important challenges in multimedia networks is the overload of SIP proxies and network switches in the signaling and media phases. The existence of this challenge causes a wide range of network users to face a sharp decline in the quality of service. In this article, we model the routing problem in multimedia networks to deal with the overload. In this regard, we present a technology-based method of software-based networks and a mathematical programming model in multimedia networks. The proposed method is simulated under various scenarios and topologies. The results investigate that the throughput and resource consumption has improved. Manuscript profile
      • Open Access Article

        9 - An Intelligent Overload Controller Using in Next Generation Networks
        مهدی  خزائی
        SIP is considered as a signaling protocol for IP multimedia subsystem (IMS) and IMS is introduced as the next generation networking platform. Unlike positive features such as text-based, IP-based, data-independent, support mobility and end-to-end, SIP lacks a proper ove More
        SIP is considered as a signaling protocol for IP multimedia subsystem (IMS) and IMS is introduced as the next generation networking platform. Unlike positive features such as text-based, IP-based, data-independent, support mobility and end-to-end, SIP lacks a proper overload control mechanism. Hence, this challenge will cause the widespread users of next generation networks to loss quality of service. IMS is a complex network consisting of subsystems, interacting with each other. As a result, multi-agent systems can be a useful tool to solve the IMS overload. Therefore, each IMS server is considered as an intelligent agent with learning and negotiation ability with other agents while maintaining autonomy therefore, the overload is eliminated by communication and knowledge transferred between agents. In this paper, multi-agent system and their properties presents a hop-by-hop elimination-based method which simulation results show performance improvement compared to known methods. Manuscript profile