Improve Performance of RTP Relaying Sessions in IMS Transport Layer With LREProxy

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

10th International Conference on Computer and Knowledge Engineering (ICCKE2020) October 29-30, 2020 – Ferdowsi University of Mashhad - Iran

Improve Performance of RTP Relaying Sessions in


IMS Transport Layer With LREProxy
Mojtaba Esfandiari.S
1st 2nd
Seyed Mojtaba Najafi 3rd
Morteza Iravani 4th
Sajad sabri
dept. of Computer Engineering, dept. of Telecommunication dept. of Computer Engineering, dept. of Computer engineering,
Ferdowsi University of Mashhad, Engineering, Islamic Azad Ferdowsi University of Shafagh Institute, Tonekabon,
Iran University, Mashhad, Iran Mashhad, Iran Iran
dept. of R&D member of dept. of R&D member of dept. of R&D member of dept. of R&D member of
NasimTelecom knowledge-base NasimTelecom knowledge-base NasimTelecom knowledge-base NasimTelecom knowledge-base
co, Tehran, Iran co, Tehran, Iran co, Tehran, Iran co, Tehran, Iran
Email: Email: Email: Email:
esfandiari@nasimtelecom.com najafi@nasimtelecom.com iravani@nasimtelecom.com sabri@nasimtelecom.com

Abstract—The IP Multimedia Subsystem is an architectural


network for delivering IP multimedia services and data. The IMS
network has built on three layers which allows for the convergence
of different access networks. Each layer in IMS is consisting of
various elements and protocols that consequently process signaling
or media flow to specific application service. While the Call Session
Control Function (CSCF) is the main route decision of the IMS
network, the most significant of resources are used by routing and
delivering media flow in Transport data layer in IMS network.
With raising of request for service in IMS, the usage of resource
have been increased. The ingress and egress nodes in IMS network
are critical points and could potentially being bottleneck because
they have to transmit huge signaling and media packets from and
to IMS network. In this paper, we focused on Transport data layer
on Edge-Border IMS network to manage and optimize its
resources. We propose a new model of proxy that is called Light-
RTP-Engine-Proxy (LREProxy). Also we implement our proposed
paper as new module for Kamailio, Open Source SIP Server. We
demonstrate how to use this module, the usage of resources in IMS
network especially Edge-Border and IMS-Transit network have
been significantly decreased.

Keywords—IMS/NGN, CSCFs, ATGW, MGCF, I-BGW, TrGW,


Transport-Layer, MMTEL, TAS
Fig. 1. The IMS Core Network. (Three layers)
I.INTRODUCTION
IP Multimedia Subsystem have introduced by 3 rd
Generation Partnership Project[1]. It is a completely All SIP servers are placed in the Session and
new open network structure for providing IP Control layer in Fig.1. The main protocol for
multimedia services in next gneration networks controlling sessions and signaling is Session
(NGN). It supports real-time communications like as Initiation Protocol (SIP) [2]. The SIP is simplicity
voice, video, Instance Message(IM). Text Style Protocol in application layer for creating,
modifying and terminating communication.
IMS provides three distributed horizontal layers
for supporting of multimedia data and control them The SIP protocol cooperates with some other
(Fig.1). protocols such as the Session Description Protocol
(SDP) which use to describe streaming media
978-1-7281-8566-8/20/$31.00 ©2020 IEEE

193

Authorized licensed use limited to: Carleton University. Downloaded on June 03,2021 at 00:15:32 UTC from IEEE Xplore. Restrictions apply.
communication parameter in a session [3], the real- bottleneck. Using NFV techniques, like other section
time Transport Protocol (RTP) which use for carrying of IMS network, in Edge-Border of IMS, could
data and RTP-Control Protocol (RTCP) for increase of scalability, but it does not lead to reduce
controlling and monitoring the QoS in session [4]. the development cost and management.
The Transport Layer is responsible to carry out In this study, we demonstrate why using the NFV
real-time multimedia and data in the IMS network. techniques for Transport layer is not sufficient and
Some elements that will be used in this session are: would be costly. We will propose how our model will
Session Border Controller (SBC), Media Gateway improve the usage of resources in Edge-Border of
(MGW), Interconnect Border Gateway Function (I- IMS network or IMS-Transit network. The method in
BGF). All these elements provide access to transport this study could be extended in IMS core network.
layer in IMS network. Our study could be extended in [11], [13], [14], [15]
to improve performance of IMS network.
With extending and developing new Application
Services in IMS, the number of requests to IMS This paper aims to identify of positive potential of
would be increased. In this situation, the capability using LREProxy module while using NFV
of share public identities in IMS/VoLTE is more techniques in Edge-Border of IMS network in
significant [5] and the capability of elastic scalability Transport layer or in IMS-Transit network. While
and extendibility of IMS/VoLTE is more and more most resources of IMS network has been consumed
important [6]. Although it could be composed of in Transport layer, none of previous studies have
various framework vendors, it is possible to migrate covered in this layer.
from hardware and moving all functions to VM The rest of the paper is organized as follows:
which is running in the cloud environments as a real Section II introduces the background studies. Section
example realization of Network Function III presents the System Under Test (SUT) or System
Virtualization (NFV) techniques [7]. Using NFV Model. In Section IV, we illustrate the architecture of
techniques, not only increases the scalability and LREProxy module in SUT in details. In Section V,
extendibility of development, but also decreases the we evaluate the performance of IMS network and
development cost. LREProxy module. We conclude our work in Section
The IMS Cloud-Computing can provide a VI. We also describe some of disadvantage of our
convenient access mechanism to improve the work.
scalability and extendibility of developing IMS. [8], II. RELATED WORKS
[9] and [10] introduce some software architecture
ways to improve efficient virtualization on IMS Much researches have been done for improving
network in different operating systems. IMS core network and its protocol. These approaches
are classified as below:
We also could use the NFV techniques in Edge-
Border of IMS and IMS-Transit networks. In IMS- A. Security
Transit networks or the Edge-Border of IMS core As the voice over internet protocol has become the
network, transmitting real-time multimedia is really popular communication around the world, more
playing critical rules in the heavy load-traffic security is required to reduce the risk of attack from
network. attacker. The security could be divided into two
sections, authentication in SIP protocol and
The cost of scalability and extendibility of IMS
confidentiality in RTP protocol. In [16], the security
network, especially in Edge-Border network for
of SIP Trunk on IMS network using Session Border
transferring real-time multimedia, is more and more
Controller (SBC) has described. [17] offers a realistic
higher than other parts in IMS core network. The
solutions to encrypt Instant Messages (IM) in VoIP
servers in Edge-Border of IMS network, works as a
network. The IM would be used in IMS network as
Transit Gateway(TrGW), and routes all incoming
an Application Service.
traffics to IMS network. Even though, there are some
critical bottleneck points in IMS core network[11], The work presented in [18] based on some
[12], the elements in Edge-Border of IMS network, weaknesses of SIP protocol (such as generating
could become a bigger problem and higher critical random value of nonce), introduces an approach for

2
194

Authorized licensed use limited to: Carleton University. Downloaded on June 03,2021 at 00:15:32 UTC from IEEE Xplore. Restrictions apply.
generating significant value of nonce, that depends on in vIMS. This paper is focused on virtualizing IMS
callid, realm, URI, secret key and timestamp. by using network functioning virtualization (NFV).
In [15], authors propose a new model of virtual load
In [19], two different models for security
balancing for call admission control (VLB-CAC) in
requirement in IMS Home Network have evaluated:
cloud-hosted SIP servers. The authors used a new
the HTTP-Digest and TLS for a secure authentication
linear programming model for optimization. It
and IPSec tunnel and SRTP for data confidentiality.
requires some critical information (CPU, RAM,
In our recent book [20], we described some methods
bandwidth of SIP servers) as input. In [10], a set of
to increase the security of SIP protocol for
three software architectures has introduced for
authentication. They could be used in MMTEL or
efficient virtualization of IP Multimedia Subsystem
TAS in Application Service Layer in IMS network.
(IMS) to respond to the high level requirements of the
B. Load Management in Session and Control Layer ETSI NFV. The Virtualized-IMS as standardized by
All methods in this way is used to control overload 3GPP, Split-IMS architecture, and Merge-IMS
and congestions in CSCFs in IMS network. The architecture. In [29], a model has proposed to
methods are divided as local (independent) way and distribute SDN controller in order to maintain the
distributed way. All nodes in CSCFs, would be aware signaling IMS network in session and control layers.
of its resource. As a local SIP controller, [21] In [30], the author focuses on expansion of IBCF
proposes an overload control system for regulating entities in IMS network to improve interconnection
both of the queue length and the CPU load of the SIP with other telecommunication networks. The model
server using the Extreme Seeking algorithm. The that we are going to introduce it, would be used in
proposed control system is made of two proportional- IBCF elements in Edge-Border of IMS network in
integral controllers tuned by minimizing a proper cost Transport Layer.
function. The main drawback of this methods is use
of its resources to reject the excess calls with heavy
overload. In [22], distributed overload control D. Performance Evaluation and Analysis of IMS
mechanisms for SIP has investigated. It shows a Network
positive effect in controlling overload. In [23] In this field, several works have done to evaluate
demonstrate window-based overload control method and improve the Quality of Services (QoS) of IMS
to limit the number of messages are sent to an SIP networks. The attributes of QoS are defined by the
proxy. The author uses fuzzy logic for regulating the ITU in 1994 [31]. The QoS of packet-switched
accurate size of window at first. In [24], a heuristic telecommunication networks is defined in Bit-Rate,
approach based on mathematical optimization has Delay, Packet-Loss and Jitter. In [32], introduced
introduced. What would be notice is all of these three different layer of QoS classes: conversational,
researches are done on SIP protocol in Session and streaming and interactive. In [33], an analytical model
Control layer in IMS network. of jitter has proposed to evaluate manage the QoS in
C. Scalability of IMS Network Based on NFV IMS network and for stable networks, it showed how
traffic would be distributed. [11] introduces the aim
Technique and Cloud Computing
of evaluating the operation of IMS. This paper is
It is possible to abstract the IMS functionalities focused on identify the potential performance and
from hardware and moving them to virtual machine figure out bottleneck points in IMS network. In [34],
that is running in the cloud environment. In [6], [25], [35], the capacity of IMS test-bed components, which
[26], [27], NFV techniques have used to implement are developed on one machine, have measured. In
IMS networks in cloud environment. In [28] has each paper, the resource of machines are difference.
shown the challenges of IMS inter-domain scalability [36] has exclusively focused on measuring the
with three core original contributions toward. In [14], performance of FOKUS Fraunhofer HSS (FHOSS).
the author tries to decompose SCSCF into two To improve its performance and to eliminate disk
functions. The first one is handling the UE access, the back-end databases has been mounted on
registration (vI-CSCF(R)) and the second is a memory-based file-system. In [11], the authors used
processing the call control (vS-CSCF(C)). This paper IMS Bench SIPp as a bench-marking software based
also designs for registration and Call-Setup procedure on IMS benchmarks the ETSI IMS/NGN

3
195

Authorized licensed use limited to: Carleton University. Downloaded on June 03,2021 at 00:15:32 UTC from IEEE Xplore. Restrictions apply.
Performance Benchmark specification. [37] has and try to evaluate the network from different
suggested an mathematical model for evaluating end- perspectives: performance metrics, dynamic load
to-end characteristics of network based on the latest manager, call admission controller.
Internet Engineering task force (IETF)
recommendation. In [38], a model proposed to III. SYSTEM MODEL
calculate the volume of incoming traffic from Our System Under Test (SUT) is based on [50] in
network and its value after conversion to requirement call flows use-case scenario. Since the SUT model is
of IMS architecture. The result in [39] shows the required to allow not only a complete IMS network
maximum delay in IMS network takes place at but also subsystems of a network corresponding to
Serving-Call Session Control Function (S-CSCF). discrete products that may be available from a
supplier, all CSCFs are based on Virtualized
E. High-Performance Network Processing and NIC
Functions on KVM hypervisors. We used Kamailio
Queue Management V.5.0 in our SUT. The Fig.2 shows the topology of
In this field, several works have done to improve IMS core components on SUT.
performance enhancements that can be achieved in
IMS in different networks (5G/6G-SDN) on NFV
multicore systems
The researches try to evaluate performance data
based IP flow in Multi-Core system (Linux)[40],
[41], Multi-Queue NIC [40], [42] and Multi-Thread
connection tracking applications [41], [43], [44]. In
paper [45], the authors propose a radical network
stack design to treat queue allocation policy in NIC
driver or protocol implementation instead of utilizing
NIC hardware queues. It operates on a NIC hardware
abstraction that represents NICs as directed graphs.
Using this abstraction, Dragonet searches the NIC Fig. 2. The Topology of IMS Core Component on System Model
configuration space for optimal solutions based on
cost functions expressing policy requirements. The
FlexNIC [46], propose FlexNIC, a flexible network Kamailio configuration of CSCFs are default and
DMA interface that can be used by operating systems based on Table II on [11].
and applications alike to reduce packet processing
overheads. It moves some of the packet processing to The Linux scheduler load-balancing algorithm [41]
the NIC driver. It can be done flexibly at high speed. has positive impact on performance of multi-threaded
Sometimes, it is needed to leverage NIC features Kamailio SIP server.
implemented in software and hardware, without As our SUT is limited, we use a specific server for
sacrificing performance. In [47], presents a hybrid virtualization platform with hardware configuration
software-hardware architecture to bridge the gap has shown in Table I.
between limited hardware capabilities and ever
TABLE I. VIRTUALIZATION PLATFORM MACHINE
changing user demands. We could use this feature of
SoftNIC in our study while relaying different codecs CPU RAM HDD NIC OS Kernel
in IMS network.
2*CPU
2*10 G Debian Linux 4.15.0
In [48], describe the model to discover a failure on (12 Core 64 GB 500 GB
Intel (Buster)
2.4 GHZ)
emergency service in Application Layer based on
charging events [49] and implementing alarming
system in IMS Network. We could extend this IV. THE PROPOSED METHOD AND WEAK POINTS
method in our study, LREProxy.
The architecture of LREProxy model could be
Most previous researches, had worked on CSCFs stand-alone node in IMS network or be integrated
in Session and Control Layer in IMS core network with other nodes in IMS network. These nodes are:

4
196

Authorized licensed use limited to: Carleton University. Downloaded on June 03,2021 at 00:15:32 UTC from IEEE Xplore. Restrictions apply.
 P-CSCF/ATGW: The Access Transfer B. LREP_Transport Stateful Layer (LREP_TSL)
Gateway is an entity in P-CSCP to relay The second layer is developed in Kernel-Space as
Multimedia to IMS networks. It could be a main decision point for RTP admission controller
worked as SBC or B2BUA. and Quickpath selector to where a received packet
 I-BCF/IM-MGW: IMS Media Gateway to should be forwarded with power of packet mangling
relay Multimedia to other IMS networks. framework in the network stack [53].
 MGCF/TrGW: Transit Gateway to relay It offers some netfilter hooks, which is a way to
multimedia to other PSTN networks. use callbacks in order to forwarding packets inside
the kernel. There are five different kinds of netfilter
The LREProxy architecture is composed of two hooks. We create and define a new hook function and
different layers. These layers are independent of each register it in kernel. We used netlink socket [54] to
other. communicate between the kernel and user-space
A. LREP_Controlling Layer (LREP_CL) application.
The first layer is developed as User-Space When a new RTP packet is revived by LREP-TSL,
application based on Netmap [51] that allows User- it is en-queued to one of queues NIC and an
Space to directly access and manipulate cache data interruption is occurred. Then, based on its related
buffer and packet buffer in Kernel-Space. This layer CPU core, the admission controller algorithm uses
gets all information about creating new sessions, destination port as index to access build-in
active sessions and tear-down sessions which is connection tracking linked-list for getting SDP
gotten from SDP body during signaling plan and relay information. When the packet is received, the index
them to the LREP-Transport Stateful Layer (LREP- based destination is calculated. Since destination port
TSL). The data structures of layer are used by LREP- of each RTP session is unique in LREP_TSL, the
TSL algorithm could get access to the SDP information of
The data structures is like bellow. RTP session in one order time. If there is any SDP
information, matching algorithm is started to check
struct lreproxy_hash_entry_tuple { other tuple information of packet. The process of
__be32 src_ipv4_caller; matching is done as binary operation. It causes the
process of our study is done quickly and just need a
__be16 src_port_caller; bit time to find RTP session and relaying.
__be32 dst_ipv4_callee;
__be16 dst_port_callee;
__be32 res_audio_port_caller;
__be32 res_audio_port_callee;
str callid;
str viabranch;
struct lrep_node *node;
unsigned int tout;
struct lreproxy_hash_entry *next;
};
To improve performance and reduce time
conversion of data structure, we used Big-Endian
Byte-Order [52].

5
197

Authorized licensed use limited to: Carleton University. Downloaded on June 03,2021 at 00:15:32 UTC from IEEE Xplore. Restrictions apply.
Fig. 5. One LREP_CL with Multiple LREP-TSL

Be noticed using of IRQ load balancing service


[40] could have negative effect. In the proposed
model, LREProxy does not perform the codec
conversion (trans-coding) here. Instead, this
operation is assigned to other specific services within
IMS network, like as Application-Services.
V. PERFORMANCE EVALUATION
To evaluate our LREProxy module and its
performance, we performed various experiments in
different conditions. The main important things in our
Fig. 3. The Flow Chart of LREP_TSL (Admission Controller Algorithm and
experiments is QoS metrics with respect to
Matching Algorithm) concurrent SIP sessions for relaying RTP with
LREProxy. In other words, we evaluated the
The number of queue would be defined based on LREProxy and its QoS when the SIP sessions calls
the number of CPU cores in machine [42], [43]. We are increasing per second more and more. Also, we
could use NIC IRQ affinization between NIC queues evaluated the QoS metrics and all resources during
and CPU core [40], [42] for more optimization, (Fig. test-bed. The metrics that we focused on were Packet
4). loss, Delay, Jitter, MoS Score, CPS, Voice Codec,
Queue Buffer Length, Rx/Tx-Flow-Hash algorithm,
Rx/Tx Multiple Queue.
In practical experiment, the Maximum SIP sessions
calls in Sipp is limited for generating RTP media,
Sipp is limited to 10000 concurrent RTP sessions for
pcap_play. However to overcome this problem, we
preferred to run the call-flow scenario of Sipp several
times simultaneously in one machine. The RTP
Fig. 4. NIC IRQ Affinization Between Queues and CPU’s Core traffic over SIP sessions are selected from different
Voice Codecs during our test. The Codecs are used
for converting an analog voice signal to a digitally
The LREP_CL and LREP-TSL could be run as encoded version. The standard popular Voice Codes
independence functions on different machines. We are G.711, G723, G729 and GSM. For making calls
could have one LREP_CL with multiple LREP-TSL up to 20000 concurrent RTP sessions with SIPp, we
on different machines. The LREP_CL could works use specific hardware configuration [table II].
with all LREP-TSL with different strategies.

6
198

Authorized licensed use limited to: Carleton University. Downloaded on June 03,2021 at 00:15:32 UTC from IEEE Xplore. Restrictions apply.
TABLE II. SIPP HARDWARE CONFIGURATION AND LREPROXY

CPU RAM HDD NIC OS Kernel

2*CPU
2*10 G Debian
(16 Core 92 GB 500 GB Linux 4.15.0
Intel 10
2.4 GHZ)

A. QoS Metrics (Packet loss, Delay, Jitter, MoS


Score)
Fig. 8. Jitter and RTP Session
The following plots show the performance result
of maximum scale of system with different metrics.
As shown in figures, LREProxy has excellent values
quality in Qos metrics. This means that the QoS
percentage metrics provided by LREProxy is within
acceptable range for real-time voice communication
[55].
Since the more compact is codec used (such as
G729 and GSM), the lower volume of relaying
packets but the rate of sending packages increases,
QoS parameters will be lower than the standard G711
codec. Fig. 9. MOS Score and RTP Session

B. IRQ Affinization And NIC Multi-Queue


Combined
As we described in section IV that LREProxy
could be as stand-alone node in IMS network, one of
our experiments is based on limiting INC IRE
affinization between NIC queues and CPU’s core
[40], [42], [45]. In some NIC, we could control
network driver and hardware setting, using ethtool
[56].
Fig. 6. Packet Loss and RTP Session
Since the number of sending packets in sessions
that use more compact codecs is higher, CPU
resources will consume are more than G711codec,
that do not use compression mechanisms.

Fig. 7. Delay (MAX Delta) and RTP Session

Fig. 10. The effect of Number of Queues on CPU Core Performance

7
199

Authorized licensed use limited to: Carleton University. Downloaded on June 03,2021 at 00:15:32 UTC from IEEE Xplore. Restrictions apply.
Fig. 12. Compare suggested method with common method

Fig. 11. The Effect of Number of CPU Cores on QoS in 20000 RTP Sessions
VI. CONCLUSION
In this study, we proposed a new model of relaying
C. Multi-Queue Hashing Algorithm RTP multimedia in IMS network. In this study, we
One of main question could be raised is how does used two NIC with HP 817747-001 10 Gigabit
the NIC decide to which RX queue to enter a packet Ethernet controller. The packet classification used in
when it received. Actually, load-balancing or Round- this study is related of SDP metadata in SIP sessions.
robin balancing is not acceptable. The best way based The LREProxy architecture provide these
on [57] is using hash from the packet. The hash is information for each layer in the model. The
counted from a 5-tuple (srcip, dstip, src port, dst port, information transmit between each layers with netlink
protocol). Many NICs allow customization of the sockets. The LREP-TSL provide a Quickpath
hash using ethtool. Selector, which uses a SDP metadata index lookup
table to identify the output port. Our experiment
$ethtool -N ethN rx-flow-hash udp4
indicates that how to use LREProxy in IMS network
sdfn
affects on the overall performance of QoS and usage
of resources. Also we have presented the effect of
allocating more NIC queue and CPU resource for
D. Compared to RTPEngine ،RTPProxy, and
Connection Tracking in Linux packet forwarding. We assume that the remaining
CPU resources will be used for more RTP sessions
Compared to other existing services such as forwarding or other service processing. The
RTPEngine and RTPProxy, and even connection DPDK[58] is the data plan development kit that
tracking in Linux, LREProxy has better performance created by Intel to accelerate packet processing
in the volume of high number of sessions because it workloads running on a wide variety of CPU
performs forwarding operations at the third layer of architectures. By enabling very fast processing of
the network. Connection tracking will have good packages, DPDK allows the communications
performance at low capacities but will show negative industry to transfer performance-sensitive
performance at high capacities. RTPEngine has the applications such as the backbone for mobile
ability to forward packages in the third layer in the networks. It has also been identified as an important
local-hooking section of the network, but has lower technology for network performance virtualization
performance compared to LREProxy, which works in (NFV) in the original white ETSI NFV article [59].
the prerouting-hooking section.

ACKNOWLEDGMENT
The result of this study lead to defining new
module for Kamailio, called LREProxy module [60].
It will be published in Kamailio open-source project.
This work is supported by laboratory of Nasim
Ertebat Ayande knowledge-base Co.

8
200

Authorized licensed use limited to: Carleton University. Downloaded on June 03,2021 at 00:15:32 UTC from IEEE Xplore. Restrictions apply.
[21] L. De Cicco, G. Cofano, and S. Mascolo, "Local SIP overload control:
Controller design and optimization by extremum seeking", IEEE
Transactions on Control of Network Systems, 2015.
REFERENCES [22] V. Hilt and I. Widjaja, "Controlling overload in networks of SIP servers",
[1] ETSI, "Digital cellular telecommunications system (GSM); Universal IEEE International Conference on Network Protocols, USA, 2008, pp.
Mobile Telecommunications System (UMTS); LTE; IP Multimedia 83–93.
Subsystem (IMS)", 3GPP, TS23.228 v15.2.0, Available: http://etsi.org. [23] A Montazerolghaem, M.H. Yaghmaee, "Fuzzy Logic Overload Control in
[Accessed: May. 12, 2020] Asterisk Proxy", 13th Iranian Conference on Fuzzy Systems (IFSC),
[2] J. Rosen, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, Qazvin, Iran, 2013.
R.Sparks, M. Handley, and E. Schooler, "SIP: session initiation protocol", [24] A. Montazerolghaem, M. Hossein Y. Moghaddam, and F. Tashtarian,
IETF, RFC 3261, 2002. "Overload control in SIP networks: A heuristic approach based on
[3] M. Handley, V. Jacobson, C. Perkins, "SDP: Session Description mathematical optimization", IEEE Global Communications Conference,
Protocol", IETF, RFC 4566, 2006, Available: https://ietf.org. 2015.
[4] C. Huitema, "Real Time Control Protocol (RTCP) attribute in Session [25] F. C. De Gouveia, S. Wahle, N. Blum, and T. Magedanz, "Cloud
Description Protocol (SDP)", RFC 3605, 2003, Available: https://ietf.org. computing and EPC/IMS integration: new value-added services on
[5] R. Azim, N. Bajaj, N. Chen, "Implementing Multiple Identities in demand", Proceedings of the 5th International Conference on Mobile
IMS/VoLTE Networks using Implicit Registration", IEEE Wireless Multimedia Communications, 2009, London
Communications and Networking Conference, 2018, Spain [26] B. Han, V. Gopalakrishnan, L. Ji, and S. Lee, "Network function
[6] M. Abu Lebdeh, J. Sahoo, R. Glitho, and C. W. Tchouati, "Cloudifying virtualization: Challenges and opportunities for innovations", IEEE
the 3GPP IP multimedia subsystem for 4G and beyond: A survey", IEEE Communications Magazine, 2015
Communications Magazine, 2016. [27] G. Carella, M. Corici, P. Crosta, P. Comi, T.M. Bohnert, A.A. Corici, D.
[7] B. Han, V. Gopalakrishnan, L. Ji, and S. Lee, "Network function Vingarzan, and T. Magedanz, "Cloudified IP Multimedia Subsystem
virtualization: Challenges and opportunities for innovations", IEEE (IMS) for Network Function Virtualization (NFV)-based architectures",
Communications Magazine, 2015. IEEE Symposium on Computers and Communication (ISCC), 2014.
[8] The National Institute of Standards and Technology, "NIST Cloud [28] P. Bellavista, L. Foschini, "Enhancing Intra-Domain Scalability of IMS-
Computing Program - NCCP", nist.gov, 2019. Available: based Services", IEEE Transactions on Parallel and Distributed Systems,
https://nist.gov/programs-projects/nist-cloud-computing-program-nccp IEEE, 2013
[Accessed May.12, 2020] [29] Z. Liu, J. Kim, J. Lee, "A Model of SDN Controllers Supporting for
[9] H. Nemati, A. Singhvi, N. Kara, and M. El Barachi, "Adaptive SLA-based Processing of Flows Based on the IMS", 17th Asia-Pacific Network
elasticity management algorithms for a virtualized IP multimedia Operations and Management Symposium (APNOMS), Busan, South
subsystem", IEEE Globecom Workshops (GC Wkshps), 2014. Korea, 2015
[10] G. Carella, M. Corici, P. Crosta, "Cloudified IP multimedia subsystem [30] S. Massner, "Dynamic expansion of IBCF entities in IMS interconnection
(IMS) for network function virtualization (NFV)-based architectures", scenarios", 15th International Conference on Systems, Signals and Image
IEEE Symposium on Computers and Communications, 2014. Processing, Bratislava, Slovakia, 2008
[11] M. Roshani, S. Khorasandi, "A Performance Benchmark and Bottleneck [31] E.800: Terms and definitions related to quality of service and network
Analysis of IP Multimedia Subsystem", International Journal of performance including dependability", https://itu.int/rec/T-REC-E.800/en
Communication Systems (INT J COMMUN SYST), 23rd Iranian [32] ETSI, "Digital cellular telecommunications system (Phase 2+) (GSM);
Conference on Electrical Engineering,Tehran, Iran, 2015 Universal Mobile Telecommunications System (UMTS); LTE; Quality of
[12] ETSI, "Telecommunications and Internet converged Services and Service (QoS) concept and architecture", 3GPP, TS23.107 v15.0.0,
Protocols for Advanced Networking (TISPAN); IMS/NGN Performance Available: http://etsi.org. [Accessed: May. 19, 2020]
Benchmark Part 3: Traffic Sets and Traffic Profiles", ETSI TS186-008-3, [33] BA. Alassane, K. Karim, "An Analytical Jitter Model in IMS network",
Oct. 2007. IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile
[13] K. Dandin, I. Hokelek, G. Karabulut, "Dynamic Load Management for Communication Conference (UEMCON), New York, NY, USA, 2016
IMS Networks Using Network Function Virtualization", IEEE/IFIP [34] D.Thissen,J.M.E. Carlin,and R. Herpertz, "Evaluating the Performance of
Network Operations and Management Symposium, Istanbul, Turkey, an IMS/NGN Deployment, " in GI Jahrestagung Lubeck, 2009, pp.2561-
2016 2573.
[14] W. Chiang, J. Wen, Design and Experiment of NFV-Based Virtualized IP [35] R.herpertz and J.M.E Carlin "A Performance Benchmark of a Multimedia
Multimedia Subsystem, 3rd International Conference on Computer and Service Delivery Framework", in Computer Science (ENC), 2009
Communication Systems (ICCCS), Nagoya, Japan, 2018 Mexican International Conference on, Mexico City, 2009,pp. 137-141
[15] A, Montazerolghaem, M. Yaghmaee, "A Load-Balanced Call Admission [36] Petter Lindgren, "Diameter service creation investigation and HSS
Controller for IMS Cloud Computing", IEEE Transactions on Network Evaluation, "M.S. thesis, CoS, KTH Royal Institute of Technology, Kista
and Service Management, 2016 Sweden, 2010
[16] S.Pantunn, S. Pattaramalai, "Security of Connecting SIP Trunk Via SBC [37] N. Kulikov, ESt. Petersburg, "End-to-End Performance Metrics Analysis
on IMS Network", International Electrical Engineering Congress in IMS Networks With Different Message Types", International
(iEECON), 2017, Thailand, IEEE Symposium on Consumer Technologies (ISCT), St. Petersburg, Russia,
[17] R. Ndaohialy, R. A. Auguste, "Contribution to secure SIP instant 2018
message", International Conference on Information Science, Electronics [38] Romanov O.I, Veres.L.A.H, "IMS: Model And Calculation Method of
and Electrical Engineering, 2014, IEEE Telecommunication Network’s Capacity"-2017 International Conference
[18] E. Belmekki, B. Raouyane, A. Belmekki, and M. Bellafkih, "Secure SIP on Information and Telecommunication Technologies and Radio
signalling service in IMS network", 9th International Conference on Electronics (UkrMiCo) September 11-17, 2017, Odessa, Ukraine
Intelligent Systems: Theories and Applications, SITA-14, 2014 [39] S. Pandey, V. Jain, D. Das, "Performance Study of IMS Signaling Plane",
[19] O. Demir, T. Aktaş, "Evaluation of two models for securing SIP for home International Conference on IP Multimedia Subsystem Architecture and
network communications", 16th International Symposium on Wireless Applications, Bangalore, India, 2007
Personal Multimedia Communications (WPMC), 2013 [40] Wen-Yen Tsai 1 , Nen-Fu Huang 1,2 and Hsien-Wei Hung 3, A Port-
[20] M. Esfandiari.S and M. Najafi.M, Asterisk: The Definitive Guide in Configuration Assisted NIC IRQ Affinitization Scheme for Multi-Core
Persian Language. Mashhad: Vazhegan Kherad, 2017. Packet Forwarding Applications

9
201

Authorized licensed use limited to: Carleton University. Downloaded on June 03,2021 at 00:15:32 UTC from IEEE Xplore. Restrictions apply.
[41] R. Krishnamurthy, G.N. Rouskas, "Performance Evaluation of Multi-
Core, Multi-Threaded SIP Proxy Servers (SPS)", IEEE International
Conference on Communications (ICC), Kuala Lumpur, Malaysia, 2016
[42] Chungang Huang , Xiangzhan Yu, Hao. Luo, "Research on high-speed
network data stream capture based on multi-queue NIC and multi-core
processor", 2nd IEEE International Conference on Information
Management and Engineering, Chengdu, China, 2010
[43] Voravit Tanyingyong, Markus Hidell, Peter Sjödin, "Improving
Performance in a Combined Router/Server", IEEE 13th International
Conference on High Performance Switching and Routing, Belgrade,
Serbia, 2012
[44] Ke Zhang, Juan Wang, Dasen Ren, "A Matching Algorithm of Netfilter
Connection Tracking Based on IP flow", 2nd International Conference on
Anti-counterfeiting, Security and Identification, Guiyang, China, 2008
[45] K Kourtis, P Shinde, A Kaufmann, "Intelligent NIC Queue Management
in the Dragonet Network Stack", 2015
[46] A Kaufmann, SI Peter, NK Sharma, T Anderson, " High Performance
Packet Processing with FlexNIC", 2016
[47] S Han, K Jang, A Panda, S Palkar, " A Software NIC to Augment
Hardware", 2015
[48] Ivan Krevatin, Željko Presecki, Mate Gudelj, Improvements in failure
detection for emergency service centers in IMS network, MIPRO 2015,
25-29 May 2015, Opatija, Croatia
[49] ETSI, "IP Multimedia Subsystem (IMS) charging", 3GPP TS32.260
v12.6.0 Release 12, Available: http://etsi.org. [Accessed: May. 12, 2020].
[50] ETSI, "Telecommunications and Internet converged Services and
Protocols for Advanced Networking (TISPAN); IMS/NGN Performance
Benchmark Part 2: Subsystem Configurations and Benchmarks", 3GPP
TS186 008-2 v1.1.1, 2007, Available: http://etsi.org. [Accessed: May. 12,
2020]
[51] L. Rizzo and M. Landi, "netmap: memory mapped access to network
devices", in SIGCOMM ’11. NY, USA: ACM, 2011, pp. 422–423.
[52] "Big-endian" and "Little-endian" or "Endianness", Available:
https://en.wikipedia.org/wiki/Endianness [Accessed May.12, 2020]
[53] R Rosen, "Linux Kernel Networking: Implementation and Theory",
chapter 8. Avalable: https://amazon.com [Accessed May.12, 2020]
[54] Pablo Neira Ayuso, Communicating between the kernel and user-space in
Linux using Netlink Sockets: Source code reference
[55] "QoS Class Identifier", Available:
https://en.wikipedia.org/wiki/QoS_Class_Identifier [Accessed May.12,
2020]
[56] "ethtool(8) - Linux man page", Available:
https://linux.die.net/man/8/ethtool [Accessed May.12, 2020]
[57] M Majkowski, "How to receive a million packets per second", Available:
https://blog.cloudflare.com/how-to-receive-a-million-packets/ [Accessed
May.12, 2020]
[58] "Data Plane Development Kit", Available: https://dpdk.org [Accessed
May.12, 2020]
[59] M Chiosi, "Network Functions Virtualisation. An Introduction, Benefits,
Enablers, Challenges & Call for Action", Available: https://etsi.org/
[Accessed May.12, 2020]
[60] "lreproxy module", Available:
https://github.com/kamailio/kamailio/pull/2208 [Accessed May.12,
2020]

10
202

Authorized licensed use limited to: Carleton University. Downloaded on June 03,2021 at 00:15:32 UTC from IEEE Xplore. Restrictions apply.

You might also like