Ghosh, Sutanu
October 2013
International Journal of Mobile Network Communications & Telemat;Oct2013, Vol. 3 Issue 5, p29
Academic Journal
Today, Voice over Wireless Local Area Network (VOWLAN) is the most accepted Internet application. There are a large number of literatures regarding the performance of various WLAN networks. Most of them focus on simulations and modeling, but there are also some experiments with real networks. This paper explains the comparison of performance of two different VOIP (Voice over Internet Protocol) applications over the same IEEE 802.11a wireless network. Radio link standard 802.11a have maximum transmission rate of 54Mbps. First protocol is session initiation protocol (SIP) and second is H.323 protocol. First one has an agent called SIP proxy. Second have a gateway reflects the characteristics of a Switched Circuit Network (SCN). With this comparison we have required to obtain a better understanding of wireless network suitability for voice communication in IP network.


Related Articles

  • The transmission of voice messages modeling through a wireless communication channel. Konakhovych, G. F.; Chuprin, V. M.; Bezhenar, Yu. V. // Ukrainian Scientific Journal of Information Security;2013, Vol. 19 Issue 3, p151 

    Processing and transmission of voice information remains actual scientific problem. In this article, authors developed a computer model of voice messages transfer through a wireless communication channel. The major issues of the article are implemented as a computational model that can be used...

  • Energy Efficient Tracking of the Moving Object in WSN Using BFOA. Arora, Monika; Goyal, Deepak; Gupta, Pankaj // International Journal of Computer Science & Management Studies;Jun2013, Vol. 13 Issue 4, p103 

    Wireless Sensor Network has the potentiality to connect the physical world with the virtual world by forming a network of sensor nodes. Energy efficient object tracking is one of the main design issues for wireless sensor networks. Energy efficiency is required as the whole WSN is dependent on...

  • A Study of Approaches to Improve Reliability of Wireless Sensor Network. Khatri, Partibha; Bhatia, Madhu; Goyal, Deepak // International Journal of Computer Science & Management Studies;Jun2013, Vol. 13 Issue 4, p86 

    Wireless sensor networks (WSNs) have been widely used for monitoring applications. However, due to the rigorous deployment environment, reliable operation of WSNs is difficult to guarantee. Thus, the assurance of WSN reliability should be concerned in order to measure physical quantities...

  • An Efficiency Optimization Method for Mobile Application with Reconfigurable Software. Yonghua Zhu; Congqi Xia // International Journal of Hybrid Information Technology;Nov2013, Vol. 6 Issue 6, p217 

    This paper discusses the efficiency optimization for mobile application. By adopting reconfigurable software architecture, a dynamic reschedule method is proposed. Modeling the overheads of single operation, the uncertainty caused by control structure is represented with experienced data and...

  • A Cross Layer based Channel Assignment Algorithm in Multi Radio Multi Channel Wireless Mesh Networks. C., Anbu Ananth.; K., Selvakumar. // International Journal of Computer Applications;Jan2013, Vol. 61, Special section p7 

    A wireless mesh network consists of radio nodes which are organized in a mesh topology and a wireless mesh network is implemented using wireless technologies like 802.11, 802.15, 802.16, cellular technologies or combination of more than one type. The nodes in the network may have a single or...

  • PERFORMANCE ANALYSIS OF COOPERATION SCHEMES IN EAVESDROPPER ASSISTED RELAY CHANNEL. Gupta, Vaibhav Kumar; Jindal, Poonam // ICTACT Journal on Communication Technology;Jun2014, Vol. 5 Issue 2, p929 

    The prominence of the wireless communication has been urging the monotonically increasing demand of security and privacy. In wireless systems, the notion of perfect secrecy of information with respect to illegitimate nodes can be ensured via physical layer security (PLS) techniques....

  • Allocation Strategy for Wireless Communication Channel of Coal Mine Underground. Chao Zhang; Zhang, Yi J. // International Journal of Future Generation Communication & Netwo;2014, Vol. 7 Issue 4, p13 

    This paper proposes an improved wireless communication channel reservation policy to address the impact on network performance cannot be analyzed under the original model with the primary and secondary users communication channel occupancy rates, and the problem that the secondary user blocking...

  • On the Use of Wireless Technologies for Shipboard Monitoring Systems. Kdouh, Hussein; Brousseau, Christian; Zaharia, Gheorghe; Farhat, Hanna; Grunfelder, Guy; El Zein, Ghaïs // Wireless Personal Communications;Oct2013, Vol. 72 Issue 3, p1755 

    Current shipboard monitoring systems use extensive lengths of cables to connect sensors to control units. Replacing wired connections by wireless ones may be an efficient solution to reduce the ship weight and cost. Ships are characterized by a specific metallic environment which can severely...

  • Interference Co-existence Analysis of Fixed Wireless Access System. ZHAO Yan-an; LIU Yan-jie; WU Song-wei // Telecommunication Engineering;Sep2014, Vol. 54 Issue 9, p1226 

    In order to analyze the feasibility of introducing fixed wireless access system in 40. 5 ~ 2. 3 GHz and 48. 4 ~ 50. 2 GHz, the electromagnetic compatibility between the fixed wireless access system and other systems of the principal services is studied according to the Radio Frequency Allocation...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics