CFP last date
20 December 2024
Reseach Article

Trajectory Management of Mobile VoIP over WiMAX

by Salma Rattal, Abdelmajid Badri, Mohammed Moughit
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 29
Year of Publication: 2019
Authors: Salma Rattal, Abdelmajid Badri, Mohammed Moughit
10.5120/ijca2019919181

Salma Rattal, Abdelmajid Badri, Mohammed Moughit . Trajectory Management of Mobile VoIP over WiMAX. International Journal of Computer Applications. 178, 29 ( Jul 2019), 38-44. DOI=10.5120/ijca2019919181

@article{ 10.5120/ijca2019919181,
author = { Salma Rattal, Abdelmajid Badri, Mohammed Moughit },
title = { Trajectory Management of Mobile VoIP over WiMAX },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2019 },
volume = { 178 },
number = { 29 },
month = { Jul },
year = { 2019 },
issn = { 0975-8887 },
pages = { 38-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number29/30723-2019919181/ },
doi = { 10.5120/ijca2019919181 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:51:47.789634+05:30
%A Salma Rattal
%A Abdelmajid Badri
%A Mohammed Moughit
%T Trajectory Management of Mobile VoIP over WiMAX
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 29
%P 38-44
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In order to optimize and make network resources more useful, many studies are conducted. However, WiMAX technology researches don’t take enough consideration regarding mobility user management. This paper tackles mobility management of VoIP users over WiMaX. In another way, we propose a new idea to decide the best location of base stations in an enterprise domain according to a daily approximate trajectory of VoIP users.Our research is than organized as follows:Firstly, we watch the users’ trajectories on a daily basis then we consider an approximation of users’ trajectories. Secondly, this fictive trajectory is subdivided into small segments. The perpendicular bisectors of the latter segments are used to give a cloud of intersecting points. The same procedure is applied to the obtained cloud until we find a set of points where distances between these points are small enough to be considered as negligible. Finally, the base station location will be where the points are concentrated.

References
  1. WIMAX TECHNOLOGY AND ITS APPLICATIONS Gyan Prakash, Sadhana Pal /International Journal of Engineering Research and Applications (IJERA) ISS : 2248-9622 www.ijera.com Vol. 1, Issue 2, pp.327-336
  2. IEEE 802.16: WiMAX Overview, WiMAX Architecture Mojtaba Seyedzadegan and MohamedOthman International Journal of Computer Theory and Engineering, Vol. 5, No. 5, October 2013
  3. https://en.wikipedia.org/wiki/WiMAX#cite_note-Carl_Wei nschenk-1
  4. Salma RATTAL, Abdelmajid BADRI and Mohammed MOUGHIT, Performance Analysis of Hybrid Codecs G.711 and G.729 over Signaling Protocols H.323 and SIP. International Journal of Computer Applications 72(3):30-33, ISSN 0975-8887 Published by Foundation of Computer Science, New York, USA. June 2013.
  5. Amit Chhabra Dr. Gurpal Singh “Performance Evaluation and Delay Modelling of VoIP Traffic over 802.11 Wireless Mesh Network” International Journal of Computer Applications (0975 – 8887) Volume 21– No.9, May 2011
  6. Quality of Service Design Overview, Enterprise QoS Solution Reference Network Design Guide CHAPITER 1.
  7. Devarajan Gopal Taye Abdulkadir “Self-Similarity and Internet Performance” Journal of Research and Practice in Information Technology, Vol. 38, No. 2, May 2006.
  8. Twenty-third Annual Joint Conferences of the IEEE Computer and Communications Societies, Volume 2, 7- 11 March2004 Page(s):1191 - 1199 vol.2RFC 3393
Index Terms

Computer Science
Information Sciences

Keywords

VoIP WiMAX Mobility localization.