Do you want to publish a course? Click here

Study the impact of changing the number of users on the performance of the protocols of voice over the Internet H.323 and SIP

دراسة تأثير تغير عدد المستخدمين على أداء بروتوكولي إرسال الصوت عبر الانترنت SIP و H.323

1778   0   7   0 ( 0 )
 Publication date 2017
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

In this paper, we assess the Voice Over Internet Protocol performance by comparing the performance of two protocols used in VOIP such as SIP and H.323. Moreover, we evaluate the quality indicators such as delay and packets loss. For this purpose OPNET simulator is used as suitable simulation technology.


Artificial intelligence review:
Research summary
تتناول هذه الدراسة تأثير تغير عدد المستخدمين على أداء بروتوكولي إرسال الصوت عبر الإنترنت SIP و H.323. يتمحور البحث حول تقنية VOIP التي تتيح إجراء المكالمات الهاتفية عبر الإنترنت باستخدام إشارات رقمية بدلاً من الإشارات التماثلية المستخدمة في شبكات الهاتف التقليدية. تم استخدام برنامج OPNET لمحاكاة الشبكة ودراسة محددات الجودة مثل التأخير الزمني ونسبة ضياع الرزم وعدد المكالمات الفعالة. أظهرت النتائج أن بروتوكول H.323 يتفوق على SIP من حيث تقليل التأخير وضياع الرزم، بينما يتفوق SIP في عدد المكالمات الفعالة. توصي الدراسة باستخدام H.323 في التطبيقات التي تتطلب جودة عالية وزمن تأخير منخفض مثل المحاضرات عن بعد والتطبيقات الطبية، بينما يمكن استخدام SIP في التطبيقات التي تتطلب عدد مكالمات أكبر مثل التواصل الاجتماعي والدردشة.
Critical review
دراسة نقدية: تقدم هذه الدراسة فهماً عميقاً لأداء بروتوكولي SIP و H.323 في بيئات مختلفة، مما يساهم في اتخاذ قرارات مستنيرة حول استخدام كل منهما. ومع ذلك، يمكن تحسين الدراسة من خلال تضمين المزيد من السيناريوهات الواقعية التي تعكس تنوع التطبيقات الحديثة. كما أن استخدام بروتوكولات أخرى مثل WebRTC يمكن أن يضيف قيمة إضافية للبحث. من المهم أيضاً النظر في العوامل الاقتصادية والتكلفة التشغيلية لكل بروتوكول، حيث أن هذه العوامل تلعب دوراً كبيراً في اختيار البروتوكول المناسب.
Questions related to the research
  1. ما هو الهدف الرئيسي من تقنية VOIP؟

    الهدف الرئيسي من تقنية VOIP هو إجراء المكالمات الهاتفية عبر الإنترنت باستخدام إشارات رقمية بدلاً من الإشارات التماثلية المستخدمة في شبكات الهاتف التقليدية.

  2. ما هي الأدوات المستخدمة في محاكاة الشبكة في هذه الدراسة؟

    تم استخدام برنامج OPNET لمحاكاة الشبكة ودراسة محددات الجودة مثل التأخير الزمني ونسبة ضياع الرزم وعدد المكالمات الفعالة.

  3. ما هي النتائج الرئيسية التي توصلت إليها الدراسة بشأن بروتوكولي SIP و H.323؟

    أظهرت النتائج أن بروتوكول H.323 يتفوق على SIP من حيث تقليل التأخير وضياع الرزم، بينما يتفوق SIP في عدد المكالمات الفعالة.

  4. ما هي التوصيات التي تقدمها الدراسة لاستخدام كل من البروتوكولين؟

    توصي الدراسة باستخدام H.323 في التطبيقات التي تتطلب جودة عالية وزمن تأخير منخفض مثل المحاضرات عن بعد والتطبيقات الطبية، بينما يمكن استخدام SIP في التطبيقات التي تتطلب عدد مكالمات أكبر مثل التواصل الاجتماعي والدردشة.


References used
BRUCE H, 2013, Packet Guide to Voice over IP. O’Reilly Media, United State, 442p
JOHNSTON R, 2015- SIP: Session Initiation Protocol. Artech House, Australia, 404p
LAWRENCE H , 2006, Telecom Systems, PSTN, PBX, Datacom, IP Telephony, IPTV, Wireless and Billing. Althos, United State, 480p
rate research

Read More

The process of transfer a speech signal by high confidentially and as quickly as possible through the Internet needs to develop compression and encryption technology for a speech signal, so as, to reduce its size and make it understandable to persons not authorized to listen to. A system was designed to encrypt the voice over Internet Protocol (VoIP) and use compression technique for the purpose of reducing the size of data and send it over the network, (A_law PCM) algorithm was used the to compress audio data. Then algorithms of Triple Data Encryption Standard (TDES) and Advanced. Encryption Standard (AES) were applied. A new encryption algorithm was proposed based in its work on the block cipher encryption system called the Direct and Reverse algorithm, which based on three basic steps, firstly expand the initial key, secondly direct the encryption of each round in one direction, and finally substitute (Bytes) as used in the Compensation Box in AES algorithm by making it moving. In general compression ratio was calculated and it was (50%) and the results of the correlation coefficient for the proposed algorithm was compared with the results of (AES, TDES) algorithms.
With the rapid growth of the size of the data stored in the cloud systems, the need for effective data processing becomes critical and urgent. This research introduces a study of the most important characteristics of databases management systems: H ive, SQLMR, and MariaDB Galera. Hive is a cloud database management system. SQLMR is a hybrid system, which depends on the integration between the cloud and traditional systems capabilities. While MariaDB Galera is a traditional database management system developed to cope with the cloud characteristics. In this research, we show the most important developments that have been on those systems, and then we compare their performance in data processing based on the execution time of query operations with the change of the volume of data. That is to identify the performance of those systems practically and to know the developing requirements for access to optimized data management system, and to help users in the selection of the database system that achieves their requirements in terms of availability and scalability.
This research presents a study with the help of Finite Element Method and the use of CATIA V5 program to know the behavior of a permissible link - column used in metal structures at high temperatures (on fire). In this article we will present an an alysis using the finite element method using the CATIA V5 program for the effect of different engineering parameters (plate thickness, screw diameter, reinforcement nerves) on the behavior of joints used in metal structures on fire. We also studied the effect of the number of bolts on the stresses and transitions in the link and their comparison with the welding cases. We studied and analyzed the studied model and obtained the deformation and failure schemes at high temperatures, the flow charts and the temperatures that show the behavior of this link to the fire. We also obtained the stress and strain schemes for the link and the transport and load schemes at different temperatures and the behavior of this link at these different temperature.
A Vehicular Ad-hoc Network (VANET) is a collection of nodes forming a wireless network, but the nodes of this network are vehicles with special equipment that enable them to communicate with each other. VANET protocols have to face high challenges due to dynamically changing topologies, link breakage and low vehicular density. A suitable and effective routing protocol helps to ensure that messages are reached to their destinations and achieve the desired aim of the application. In this research, we present an analysis of the performance of two major routing protocols used in these networks, which are AODV (Ad hoc On-Demand Distance Vector) and GPSR (Greedy Perimeter Stateless Routing). This analysis is based on various parameters such as end-to-end delay and average dropped packets, in order to find the best protocol which can be used in the network with low density at the junctions. To achieve this purpose, we used a simulator OPNET_17.5. Depending on the simulation results, we have obtained and the analysis and comparison of two protocols at different low density contract. We found that GPSR protocol has better performance end-to-end delay and average dropped packets are used as the performance metrics, and is better for VANET under the low vehicular density simulation scenario at junctions.
Voice recognition includes two basic parts: speech and speaker recognition. These recognition processes consider as the most important processes of modern technologies, many systems has been developed that differ in the methods used to extract feat ures and classification ways to support recognition systems of this type. The study was conducted in this research on the previous subject, where the system is designed to recognize the speaker and his voice orders and focus on several complementary algorithms to carry out the research. we conducted an analytical study on MFCC algorithm used in the extraction of features, and it has been studying two parameters the number of filters in the filters bank and the number of features that taken from each frame and the impact of these two parameters in the recognition rate and the relationship of these two parameters on each other. It was the use of feed forwarding back propagation neural networks performance analysis as characteristics and we analyze the performance of the network to gain access to the best features and components to the process of achieving recognition. And it has been studying Endpoint algorithm that used to remove periods of silence and its impact on voice recognition rates.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا