SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 5, October 2020, pp. 5420∼5429
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i5.pp5420-5429 Ì 5420
Influence of various application types on the performance
of LTE mobile networks
Adel Agamy, Ahmed M. Mohamed
Electrical Engineering Department, Faculty of Engineering, Aswan University, Egypt
Article Info
Article history:
Received Jan 16, 2020
Revised Apr 16, 2020
Accepted Apr 29, 2020
Keywords:
LTE
Queuing theory
Traffic modeling
Wireless network
ABSTRACT
Modern mobile internet networks are becoming heavier and denser. Also it is not reg-
ularly planned, and becoming more heterogeneous. The explosive growth in the usage
of smartphones poses numerous challenges for LTE cellular networks design and im-
plementation. The performance of LTE networks with bursty and self-similar traffic
has become a major challenge. Accurate modeling of the data generated by each con-
nected wireless device is important for properly investigating the performance of LTE
networks. This paper presents a mathematical model for LTE networks using queuing
theory considering the influence of various application types. Using sporadic source
traffic feeding to the queue of the evolved nodeB and with the exponential service
time assumption, we construct a queuing model to estimate the performance of LTE
networks. We use the performance model presented in this paper to study the influence
of various application categories on the performance of LTE cellular networks. Also
we validate our model with simulation using NS3 simulator with different scenarios.
Copyright c 2020 Insitute of Advanced Engineeering and Science.
All rights reserved.
Corresponding Author:
Adel Agamy,
Electrical Engineering Department, Faculty of Engineering,
Aswan University, Aswan, 81542, Egypt
Email: a.f.agamy@aswu.edu.eg
1. INTRODUCTION
The incredible growth in the number of wireless devices such as smart-phones, tablets and Inter-
net of Thing (IoT) in addition to the fast development of media streaming applications, IPTV, telemedicine
and Internet gaming have led to a significant challenge to the design and deployment of cellular technology.
The mobile networks specifically the LTE networks are used only for accommodating voice and video calls
traffic which are considered real time application. Also nowadays the mobile networks are used to transfer
non-real time data (Email, ftp, ..etc). Each application type demands to maintain a certain level of quality
(throughput, delay..etc) during his sojourn time through the LTE network [1, 2, 3, 4]. Investigating and ana-
lyzing the distribution of data generated by each device in LTE network should be the most important factor to
estimate the quality requirements and capabilities of LTE networks. In this research we investigate and analyze
(by analytical modeling and simulation) the influence of various application types on the LTE network perfor-
mance. Also we validate our model through real network simulator NS3 with various scenarios. Our paper is
organized as follows, previous studies related to the paper topic is presented in section II. The LTE network
system model and its parameters are presented in section III. Section IV shows the LTE network performance
estimation using analytical analysis with network performance metrics such as end to end packet delay and
blockage probability. Section V shows the performance behavior of the LTE network using NS3 simulator with
different operation scenarios. In section VII we conclude our work.
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 5421
2. RELATED WORK
Sajid et all in [5] developed a model using two different distributions. For Constant bit Rate (CBR)
traffic (Ex. VOIP traffic) they used exponential distribution. To model Variable Bit Rate (VBR) traffic (video
streaming) they used fractional brownie motion (FBM) traffic with heavy-tailed Weibull distribution for buffer
occupancy [6]. The authors in [7] investigated the performance of cognitive radio links subject to recurrent
failures and interruptions. They studied the performance with single and multiple channels. Using the queuing
model M/M/1, they considered the service interruption from primary users, also they used the pricing policy to
charge each secondary user in the queue. Authors in [8] proposed a queueing model with four different priority
queueing disciplines to apply dynamic optimization. They considered a dynamic priority queueing discipline
to optimize a joint performance utility function on two classes of cognitive radio.
The performance of vehicular network communication using cellular LTE network using queueing
models is presented in [9, 10, 11, 12, 13]. For example the author in [11] developed an analytical model describ-
ing the performance of periodic broadcast in Vehicular Ad-hoc Networks (VANET) in terms of packet collision
probability and average packet delay using M/M/∞ queuing model. Analytical models to evaluate the queue
length behavior at the intersection points as a function of the percentage of vehicles are presented in [12]. The
authors in [13] used deterministic arrival process and the queueing model D/M/1 for studying the performance
of periodic broadcast in VANETs using metrics such as the packet collision probability and average packet
delay. The authors in [14] used the queuing theory to develop a model for cellular LTE wireless networks.
They assumed that the cellular LTE network is serving variable bit-rate calls. The authors in [15] evaluated the
polling behavior on a MAC for cellular network analytically considering the packet delay, buffer overflow rates
and energy consumption. Also in their work in [16] they introduced analytical models to characterize the delay
for multicast transmission over a communication channel model. In [17], authors presented a mixed queueing
network models of several mobility users at numerous access points to accurately predicting the number of
network-level performance and user-level performance in a wireless network. In [18] Scott et all introduced
a model for Vehicular Wireless Channel Communication, they modeled the LTE system channel with M/M/m
Queueing model. They modeled the LTE wireless communication channel with M/M/m queueing model with
infinite number of resources channel m. Also they assumed that each vehicle generates traffic with Poisson
process of exponential inter arrival time distribution. They used the First Come First Send (FCFS) queueing
discipline to handle traffic in the queue. They evaluated the probability that channels being busy, also developed
the expected waiting times and the expected number of channel switches. Fowler et all in [19] described the
behavior of the LTE video call (ex. Skype video call) and video streaming traffic in heterogeneous real environ-
ment using gaussian mixture model. They derived a semi-Markov model with six states for video call and they
derived a semi-Markov model with fifteen states to fit the statistics of composite LTE video measurements.
Najem et all in [20] used the Disjoint Queue Scheduler (DQS) for the LTE-A heterogeneous network
deployment of a macro-cell and a variable number of picocells. They evaluated and compared the Quality of
Service (QoS) of the user performance using the DQS based on different techniques. They evaluated the QoS
using the average subscriber’s metrics throughput, Packet Loss Rate (PLR), and average packet delay. They
experimentally evaluated the performance of the DQS and its effect on the user quality of service. Naumov et all
in [21] studied the performance of LTE cellular networks using queueing models with limited resources. They
developed a mathematical model for resource sharing in LTE cellular network using multi-server queueing
model. They assumed that users arrive in the system as independent Poisson flows. The service time for each
arrival is modeled with exponential distribution. The authors considered a multi-server queuing model and
they used semi-markov chains to derive the stationary probabilities for the LTE cellular network with single
LTE networks serving users using video conference call. Polaganga et all in [22] explored the Self-Similarity
property of LTE and LTE-advance cellular networks. They showed that the selfsimilarity characteristics of LTE
and LTE-advanced cellular networks traffic, also they evaluated and compared selfsimilarity degree for both
networks and compared user traffic with traditional voice traffic. They summarized from different data sets that
the arrival pattern of the user in real LTE networks follows Poisson process. Also, they found that the inter
arrival time follows the Exponential distribution. Based on our knowledge there aren’t any previous studies that
used sporadic and heavy tail characteristics of the LTE cellular traffic in one model. With sporadic input traffic
feed to the eNodeB queue, we derived performance metrics such as mean packet delay and blocking probability
analytically and verified that using the NS3 simulator under various burst values (various application) with fixed
utilization. We choose the power tail distribution with various truncated tail values to represent the number of
packets during a request. The reliability function of the power tail distribution used is:
Influence of various application types on the performance of... (Adel Agamy)
5422 Ì ISSN: 2088-8708
R(x) :=
1 − θ
1 − θT
T −1
j=0
θj
exp
−µx
λj
(1)
T = 1 refers to the exponential and large T for highly tail properties[23].
3. LTE NETWORK SYSTEM MODEL
The topology used for LTE networks is illustrated in Figure 1. It consists of a single evolved nodeB
and a set of N wireless devices that access the LTE network. All of the wireless devices use the LTE wire-
less access technology for downloading data (using downlink) and to request and upload data (using uplink).
We focus on downlink communication and assume that these devices use various mobile applications. Also the
corresponding request traffic in the LTE downlink access network have various properties due to the different
mobile applications used. The number of packets during a user request is a random variable and depends on the
mobile application used, so the distribution of downlink entrance process will be different with each mobile ap-
plication type. Ahmed et al in [24] compared various traffic model schemes to model the Internet data and how
each model can capture behavior of the real application traffic. they showed that the bursty traffic introduced
in [23] is the best distribution to model various application types due to its various parameters. The model can
represent the bursty traffic (with the idle and active periods) as in Figure 2 and also produces the self-similarity
property which presents many modes of use (continuous flow, Bulk arrival, Poisson arrival etc) [17, 19].
Figure 1. LTE network topology
Figure 2. ON/OFF Model
The essential parameters of the traffic model used are as introduced in [24]:
K:= the average rate of packets arrival of connected LTE devices.
λ := the aggregated rates that produced by the N-LTE devices where λ =KN.
np:= The average number of packets produced during in the burst.
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5420 – 5429
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 5423
λp:= the maximum rate that a device can send during an active period.
ON:= np / λp = average time for an active period.
OFF:= average idle time between two burst sending periods.
As shown in Figure 3 the LTE network consists of the evolved packet node (eNodeB) which is respon-
sible for allocating resources to the connected devices and the service gate way (S-GW) and packet gate way
(P-GW) which connects to the eNodeB through MME unit and from MME to the internet. Also the connected
devices (smart-phones) with bursty traffic model for the multi-applications. We assume that all devices are
constant (so no handover to other neighbor cells). We also assume that the resources allocation in the eNodeB
uses the round robin scheduling so that the resources are divided equally among the users. We use the whole
single LTE cell topology as in Figure 3 with Nburst/M/1 queuing model. Now we outline the single cell LTE
traffic model using sporadic traffic model:
µ:= average service rate of an eNodeB.
U:= λ/µ = Load utilization of the access eNodeB.
Also we can control on the sporadic type with parameter ”b”, which can get as in [23] from the following:
b = 1 −
K
Rp
= 1 −
λ
nRp
(2)
Figure 3. LTE Network Model
4. LTE ANALYTICAL PERFORMANCE MODEL
4.1. Performance metrics
The analysis of a single cell LTE access network performance with sporadic can be derived for all
various distributions using matrix-exponential approach [25]. As we mentioned above that there many modes
of use to our model. The first mode of use for the model where the idle period approaches zero which lead to
continuous flow (no bursts and b=0) so the model can be reduced to Poisson arrival (Mλ/Mµ/l queueing model)
and hence the delay can be derived from the following equation as in [25]: Mean Delay(b=0)=((1/µ)/(1-U))
Where U=λ/µ. The second mode of use occurs when the active time approaches zero, in this case the packets
arrive as a bulk arrival where ”b=1”. So the delay can be calculated as in [25] from equation: Mean De-
lay(b=1)=(D (1/µ)/(1-U)),.. where D =
E(
L(L+1)
2 )
E(L) . where the best performance of the cellular network is in
the first mode of use where ”b=0”, the worst performance is in the second mode of use when ”b=1”. Through
the analytical analysis we use fixed load utilization ˇU at eNodeB, while we investigate the influence of bursty
degree (different mobile application). The eNodeB load utilization is fixed while the size of the bursts increases
or decreases according to the degree of burstiness ”b” to capture the influence of different applications (each
value of b represents a traffic type). The queueing model can be represented with matrix exponential approach
of multiple application types. The steady state solution for the system can be derived as in [23] so we can get:
The end to end packet delay is calculated using little s formula:
DELAY =
1
K
R(I − R)−1
......(3)
Influence of various application types on the performance of... (Adel Agamy)
5424 Ì ISSN: 2088-8708
Also we can get the block probability as follows:
BlockProability =
1
K
π(RB
L) .(4)
Where the matrix R can be calculated by solving the system as Quasi-Birth-Death Process, K is the average
arrival rate, I is the identity matrix and is unity vector.
4.2. Model analysis
The first scenario shows the topology of the LTE network as in Figure 2. We assume that the load
arrives to the eNodeB as a single flow (N=1 in the model in Figure 3). In all scenarios we set the idle period to
the exponential distribution where during active time each device produce a flow with a random size (Power tail
distribution with various tail values) to represent the qualitative statistical manner of various mobile applications
traffic. Setting truncated tail distribution to ”1” refers to exponential distribution.
First Figure 4 shows the relation between the end to end packet delay and the burstiness parameter
”b”. We notice that the delay increases significantly with the increase of the burstiness parameter ”b”, also
the delay jumps to a large value at point (b=0.1) and then starts to increase gradually. More significantly the
packet delay of the applications which follow distribution with tail equal to ”28” is almost twice the delay
of the applications that follow the exponential distribution. So, assuming that all applications will follow the
exponential distribution as a service time distribution will lead to an over estimate of the LTE network capa-
bilities. These estimates in Figure 5 are based on only a single user in the network so the effect of contention
is minimum. So even with no contention, the application type has a significant impact on the packet delay of
the LTE networks. Figure 5 shows the behavior of blocking probability versus the burstiness parameter ”b”.
The figure shows clearly how the application type can affect the user block probability on the LTE networks.
Clearly applications with high variability (long tails) starts to have significant blockage probability earlier than
applications with small variability (exponential distributions). For small values of ”b” there isn’t a significant
difference between various values of blockage probability for truncated tail and the exponential distribution,
as burstiness parameter ”b” increases, the gap between the exponential and other high variability distributions
increases. By taking into account (2) and (3), we can find out that the jump happen if Rp > µ,where b > ”l -
U” at this moment.
Figure 4. Single user mean delay with different burst
Figure 5. Single block probability
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5420 – 5429
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 5425
Our next scenario as the network topology in Figure 3. We assume that the arrival at the eNodeB
comes from two different sources (N=2), each one with ON periods that follow power tail distribution and
exponential OFF period distribution. The integration of ”N” multiple exponential distributions with rate ”r”
is Nr exponential distribution [25]. Hence, we can use the (N-burst/M/1) queueing model. For small values
of ”b”, the model reduces to a continuous arrival flow with rate NK while for large values of ”b” the model
approaches the bulk arrival and leads to worst performance on the LTE network. To get a fair comparison with
the single load source scenario, we maintain the same load utilization on the eNodeB.
The results in Figures 6 and 7 are consistent with the single flow source results. The difference in the
two flow sources that users don’t suffer from a large jump where the users blowup points need long bursts to
occur. In case of multiple flow ”N=2” we have two jump points occur as in Figure 6 for the delay and Figure 7
for the blocking probability. Hence, the performance of the delay become more complex for large values of N.
We can estimate the jump points in LTE networks with a bursty traffic source from the following equation:
b = 1 −
K
Rp
= 1 −
λ
NRp
(5)
Figure 6. Multiple users mean delay with different burst
Figure 7. Multiple users block probability
5. LTE NETWORK SIMULATION
Our simulation consists of a single zone covered by an LTE network through one evolved NodeB
(eNB) as in Figure 2 and LTE network model in Figure 3. The specification of LTE technology used in the
simulator can be found in Table 1. The smartphones or subscribers are uniformly distributed in the zone
according to a disc around the eNodeB. Each device generates load for amount of time (active period) and
idle for another time (OFF period). We run the simulation for two scenarios with exponential OFF period
distribution. The first scenario represents the normal traffic (exponential for active period) while the second
scenario uses the heavy tail traffic (Pareto distribution for active period). We run the simulator for various time
periods and then calculate the average over all cases.
During the active period, the number of packets in a request is a random variable with mean of 1024
byte. We refer to the number of packet with np packets which are transmitted with a constant peak rate 2
Influence of various application types on the performance of... (Adel Agamy)
5426 Ì ISSN: 2088-8708
Mb/s during an active time. Through the network simulator, we generate the different distributions from the
following function:
R(x) =
1
(1 + x
M(α−1) )x
(6)
Where R(x) = Pr(X > x): a reliability function of the random variable.
α :.. a shape parameter.
M :..the average of the distribution, (i.e., E(X) = M).
5.1. Simulation result analysis
Figure 8 shows the aggregated throughput of the cell (eNodeB) for both the small variability distri-
bution (exponential) and high variability (Pareto) traffic. We notice from the Figure 8 that the total aggregated
throughput of LTE network for heavy traffic (Pareto) is smaller than throughput of the well behaved traffic.
The result from the Figure 8 confirms with what we got in the analytical model and the cell throughput satu-
rated at approximately”33MB/s” which is close to the standard throughput set in Table 1 [26]. Figure 9shows
the number of users demand over time. It is very clear from Figure 9 that the large negative influence of heavy
tail applications on the performance of LTE networks. The well-behaved applications network can serve more
users than the network with heavy tail applications. The Figures 10 and 11 show changes of packet loss per-
centage per user over time. The figures clearly show that a large part of users lost 50% of their requests in
Pareto distribution while the number decrease to 13%on the exponential distribution. The same consistence
behavior is shown in Figures 12 and 13 for the average delay, where the delay for heavy tail distributions reach
90% of user while for well-behaved application the large delay effects 70% of users.
Table 1. LTE parameters setting
Carrier frequency.. .. 2.6 GHZ
Bandwidth.. .. 10 MHz (50 RB)
Height eNB.. .. 25 m
Transmission Power eNB 46 dBm
MIMO/SISO.. ..SISO
eNB noise figure 5 dB
Transmission power devices 24 dB
UE noise figure 7 dB
Scheduler- HARQ Round robin Scheduler-Yes
Transmission model RLC UM
Propagation Loss Model TwoRayGround PropagationLoss Model
range 150 m
Antenna model Isotropic
Figure 8. Throughput Figure 9. Demand
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5420 – 5429
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 5427
Figure 10. Packet loss distribution(EXP Figure 11. Packet loss distribution(Pareto)
Figure 12. Delay distribution(EXP) Figure 13. Delay distribution(Pareto)
6. CONCLUSIONS
We investigated the influence of various types of mobile application traffic on the performance of LTE
mobile networks. Our research focused on the heavy-tailed and self-similar statistical characteristics of the
mobile applications and its negative effect on the LTE network performance. Using the (N-Burst/M/l) Queuing
model and NS3 simulator, we estimated the influence of application types on LTE cellular network performance
behavior. Specifically, we studied LTE network performance metrics such as packet delay, block probability
analytically and the throughput, packet delay, packet loss and user demand by the NS3 simulator. Our future
work is to extend the analytical model for heterogeneous network taking into account the mobility model for
wireless devices. Also to evaluate more complicated scenarios with NS3 simulator to accurately estimate actual
network traffic.
REFERENCES
[1] Index, Cisco Visual Networking, “Cisco visual networking index: Global mobile data traffic forecast
update 2015-2020 White Paper,” Accessed date, 2016.
Influence of various application types on the performance of... (Adel Agamy)
5428 Ì ISSN: 2088-8708
[2] J. Wu, C. Yuen, N.-M. Cheung, J. Chen, and C. W. Chen, “Enabling adaptive high-frame-rate video
streaming in mobile cloud gaming applications,” IEEE Trans. Circuits Syst. Video Techn., vol. 25, no. 12,
pp. 1988–2001, 2015.
[3] N. Panwar, S. Sharma, and A. K. Singh, “A survey on 5g: The next generation of mobile communication,”
Physical Communication, vol. 18, pp. 64–84, 2016.
[4] A. Gupta and R. K. Jha, “A survey of 5g network: Architecture and emerging technologies,” IEEE access,
vol. 3, pp. 1206–1232, 2015.
[5] M. S. Mushtaq, S. Fowler, B. Augustin, and A. Mellouk, “Qoe in 5g cloud networks using multimedia
services,” Wireless Communications and Networking Conference (WCNC), pp. 1–6, 2016.
[6] I. Norros, “On the use of fractional brownian motion in the theory of connectionless networks,”
IEEE Journal on selected areas in communications, vol. 13, no. 6, pp. 953–962, 1995.
[7] A. Azarfar, J.-F. Frigo, and B. Sanso, “Analysis of cognitive radio networks based on a queueing model
with server interruptions,” IEEE International Conference on Communications, pp. 1703–1708, 2012.
[8] A. Azarfar, J.-F. Frigon, and B. Sans‘o, “Dynamic selection of priority queueing discipline in cognitive
radio networks,” Vehicular Technology Conference (VTC Fall), pp. 1–5, 2012.
[9] Q. Yang, J. Zheng, and L. Shen, “Modeling and performance analysis of periodic broadcast in vehicular
ad hoc networks,” Global Telecommunications Conference (GLOBECOM 2011), pp. 1–5, 2011.
[10] S. Yang, C. K. Yeo, and B. S. Lee, “Predictive scheduling in drive-thru networks with flow-level dynamics
and deadlines,” IEEE International Conference on Communications (ICC), pp. 1–5, 2011.
[11] M. J. Khabbaz, W. F. Fawaz, and C. M. Assi, “A simple free-flow traffic model for vehicular intermit-
tently connected networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 13, no. 3,
pp. 1312–1326, 2012.
[12] G. Comert and M. Cetin, “Analytical evaluation of the error in queue length estimation at traffic sig-
nals from probe vehicle data,” IEEE Transactions on Intelligent Transportation Systems, vol. 12, no. 2,
pp. 563–573, 2011.
[13] M. J. Khabbaz, W. F. Fawaz, and C. M. Assi, “Modeling and delay analysis of intermittently con-
nected roadside communication networks,” IEEE Transactions on Vehicular Technology, vol. 61, no. 6,
pp. 2698–2706, 2012.
[14] M. K. Karray and M. Jovanovic, “A queueing theoretic approach to the dimensioning of wireless cellular
networks serving variable-bit-rate calls,” IEEE Transactions on Vehicular Technology, vol. 62, no. 6,
pp. 2713–2723, 2013.
[15] H. Yang and B. Sikdar, “Queueing analysis of polling based wireless mac protocols with sleep-wake
cycles,” IEEE Transactions on Communications, vol. 60, no. 9, pp. 2427–2433, 2012.
[16] B. Shrader and A. Ephremides, “Queueing delay analysis for multicast with random linear coding,”
IEEE Transactions on Information Theory, vol. 58, no. 1, pp. 421–429, 2012.
[17] Y.-C. Chen, J. Kurose, and D. Towsley, “A mixed queueing network model of mobility in a campus
wireless network,” Proceedings IEEE INFOCOM, pp. 2656–2660, 2012.
[18] S. Fowler, C. H. Hall, D. Yuan, G. Baravdish, and A. Mellouk, “Analysis of vehicular wireless channel
communication via queueing theory model,” IEEE International Conference on Communications (ICC),
pp. 1736–1741, 2014.
[19] S. Fowler, J. Sarfraz, M. M. Abbas, and V. Angelakis, “Gaussian semi-markov model based on real video
multimedia traffic,” IEEE International Conference on Communications (ICC), pp. 6971–6976, 2015.
[20] N. N. Sirhan, M. Martınez-Ramon, G. L. Heileman, N. Ghani, and C. C. Lamb, “Qos performance eval-
uation of disjoint queue scheduler for video-applications over lte-a hetnets,” Proceedings of the 7th
International Conference on Computing Communication and Networking Technologies, pp. 4, 2016.
[21] V. Naumov, K. Samouylov, N. Yarkina, E. Sopin, S. Andreev, and A. Samuylov, “Lte performance analy-
sis using queuing systems with finite resources and random requirements,” 7th International Congress on
Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 100–103, 2015.
[22] R. K. Polaganga and Q. Liang, “Self-similarity and modeling of lte/lte-a data traffic,” Measurement,
vol. 75, pp. 218–229, 2015.
[23] H.-P. Schwefel and L. Lipsky, “Performance results for analytic models of traffic in telecommunication
systems, based on multiple ON-OFF sources with self-similar behavior,” Teletraffic science and engineer-
ing, pp. 55–65, 1999.
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5420 – 5429
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 5429
[24] Ahmed M. Mohamed and , Adel F. Agamy, “A survey on the common network traffic sources models,”
Interenational Journal Of Computer Network (IJCN), vol. 3, no. 2, 2011.
[25] L. Lipsky, ”Queueing Theory: A linear algebraic approach,” Springer Science Business Media second
Edition, 2008.
[26] E. Dahlman, S. Parkvall, and J. Skold, ”4G: LTE/LTE-advanced for mobile broadband,” Academic
press, 2013.
BIOGRAPHIES OF AUTHORS
Adel Agamy received the B.Sc. in Communications and Electronics engineering in 2007, M.Sc. in
Electrical Engineering in 2012 from Aswan university, Egypt. He is currently an assistant lecturer
at electrical engineering department, Aswan faculty of engineering, Aswan University. His fields of
interest: traffic modeling, wireless communication, cellular network and computer network
Ahmed Mohamed received the B.Sc. in electrical and computer engineering from Assiut university,
Egypt, in 1994, the M.Sc. in computer science and engineering from university of Connecticut, USA
in 2001 and the Ph.D. in computer science and engineering from university of Connecticut, USA
in 2004. He is currently an assistant professor at electrical engineering department, Aswan faculty
of engineering, Aswan University. His research interests include, performance modeling, queueing
analysis, distributed systems, computer networks and operating systems.
Influence of various application types on the performance of... (Adel Agamy)

More Related Content

What's hot

Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...IJCNCJournal
 
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERPERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERIJCNCJournal
 
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET Journal
 
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband IJECEIAES
 
Routing protocol for hetrogeneous wireless mesh network
Routing protocol for hetrogeneous wireless mesh networkRouting protocol for hetrogeneous wireless mesh network
Routing protocol for hetrogeneous wireless mesh networkredpel dot com
 
Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networks
Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networksGenetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networks
Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networksIJECEIAES
 
General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...ijwmn
 
Reduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in ManetsReduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in ManetsIJMER
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...
Bit Error Rate Analysis in WiMAX Communication at Vehicular  Speeds using mod...Bit Error Rate Analysis in WiMAX Communication at Vehicular  Speeds using mod...
Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...IJMER
 
STUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAY
STUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAYSTUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAY
STUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAYcscpconf
 
Study of vanet routing protocols for end to end delay
Study of vanet routing protocols for end to end delayStudy of vanet routing protocols for end to end delay
Study of vanet routing protocols for end to end delaycsandit
 
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...IJCNCJournal
 
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKSANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKSIJEEE
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSpharmaindexing
 
Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...Pvrtechnologies Nellore
 
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...IJERA Editor
 

What's hot (19)

RoutingMetrics_PHD_2006
RoutingMetrics_PHD_2006RoutingMetrics_PHD_2006
RoutingMetrics_PHD_2006
 
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...
 
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERPERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
 
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
 
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband
 
Routing protocol for hetrogeneous wireless mesh network
Routing protocol for hetrogeneous wireless mesh networkRouting protocol for hetrogeneous wireless mesh network
Routing protocol for hetrogeneous wireless mesh network
 
Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networks
Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networksGenetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networks
Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networks
 
General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...
 
Reduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in ManetsReduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in Manets
 
H1075460
H1075460H1075460
H1075460
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...
Bit Error Rate Analysis in WiMAX Communication at Vehicular  Speeds using mod...Bit Error Rate Analysis in WiMAX Communication at Vehicular  Speeds using mod...
Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...
 
STUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAY
STUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAYSTUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAY
STUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAY
 
Study of vanet routing protocols for end to end delay
Study of vanet routing protocols for end to end delayStudy of vanet routing protocols for end to end delay
Study of vanet routing protocols for end to end delay
 
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
 
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKSANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
 
Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...
 
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
 

Similar to Influence of Application Types on LTE Network Performance

QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...ijasuc
 
ROUTING PROTOCOLS PERFORMANCE IN MOBILE AD-HOC NETWORKS USING MILLIMETER WAVE
ROUTING PROTOCOLS PERFORMANCE IN MOBILE AD-HOC NETWORKS USING MILLIMETER WAVEROUTING PROTOCOLS PERFORMANCE IN MOBILE AD-HOC NETWORKS USING MILLIMETER WAVE
ROUTING PROTOCOLS PERFORMANCE IN MOBILE AD-HOC NETWORKS USING MILLIMETER WAVEIJCNCJournal
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
 
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...IJCNCJournal
 
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...IJCNCJournal
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
 
Performance Evaluation of Gauss-Markov Mobility Model in Hybrid LTE-VANET Net...
Performance Evaluation of Gauss-Markov Mobility Model in Hybrid LTE-VANET Net...Performance Evaluation of Gauss-Markov Mobility Model in Hybrid LTE-VANET Net...
Performance Evaluation of Gauss-Markov Mobility Model in Hybrid LTE-VANET Net...TELKOMNIKA JOURNAL
 
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...IJECEIAES
 
Bandwidth guaranteed
Bandwidth guaranteedBandwidth guaranteed
Bandwidth guaranteedIJCNCJournal
 
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...IJECEIAES
 
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...IJECEIAES
 
Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2IAEME Publication
 
Design and development of handover simulator model in 5G cellular network
Design and development of handover simulator model in 5G cellular network Design and development of handover simulator model in 5G cellular network
Design and development of handover simulator model in 5G cellular network IJECEIAES
 
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...ranjith kumar
 

Similar to Influence of Application Types on LTE Network Performance (20)

A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
 
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
 
ROUTING PROTOCOLS PERFORMANCE IN MOBILE AD-HOC NETWORKS USING MILLIMETER WAVE
ROUTING PROTOCOLS PERFORMANCE IN MOBILE AD-HOC NETWORKS USING MILLIMETER WAVEROUTING PROTOCOLS PERFORMANCE IN MOBILE AD-HOC NETWORKS USING MILLIMETER WAVE
ROUTING PROTOCOLS PERFORMANCE IN MOBILE AD-HOC NETWORKS USING MILLIMETER WAVE
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
 
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...
 
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
Performance Evaluation of Gauss-Markov Mobility Model in Hybrid LTE-VANET Net...
Performance Evaluation of Gauss-Markov Mobility Model in Hybrid LTE-VANET Net...Performance Evaluation of Gauss-Markov Mobility Model in Hybrid LTE-VANET Net...
Performance Evaluation of Gauss-Markov Mobility Model in Hybrid LTE-VANET Net...
 
1720 1724
1720 17241720 1724
1720 1724
 
1720 1724
1720 17241720 1724
1720 1724
 
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
 
Bandwidth guaranteed
Bandwidth guaranteedBandwidth guaranteed
Bandwidth guaranteed
 
1605.01126
1605.011261605.01126
1605.01126
 
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
 
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
 
Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2
 
Design and development of handover simulator model in 5G cellular network
Design and development of handover simulator model in 5G cellular network Design and development of handover simulator model in 5G cellular network
Design and development of handover simulator model in 5G cellular network
 
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Recently uploaded (20)

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

Influence of Application Types on LTE Network Performance

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 5, October 2020, pp. 5420∼5429 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i5.pp5420-5429 Ì 5420 Influence of various application types on the performance of LTE mobile networks Adel Agamy, Ahmed M. Mohamed Electrical Engineering Department, Faculty of Engineering, Aswan University, Egypt Article Info Article history: Received Jan 16, 2020 Revised Apr 16, 2020 Accepted Apr 29, 2020 Keywords: LTE Queuing theory Traffic modeling Wireless network ABSTRACT Modern mobile internet networks are becoming heavier and denser. Also it is not reg- ularly planned, and becoming more heterogeneous. The explosive growth in the usage of smartphones poses numerous challenges for LTE cellular networks design and im- plementation. The performance of LTE networks with bursty and self-similar traffic has become a major challenge. Accurate modeling of the data generated by each con- nected wireless device is important for properly investigating the performance of LTE networks. This paper presents a mathematical model for LTE networks using queuing theory considering the influence of various application types. Using sporadic source traffic feeding to the queue of the evolved nodeB and with the exponential service time assumption, we construct a queuing model to estimate the performance of LTE networks. We use the performance model presented in this paper to study the influence of various application categories on the performance of LTE cellular networks. Also we validate our model with simulation using NS3 simulator with different scenarios. Copyright c 2020 Insitute of Advanced Engineeering and Science. All rights reserved. Corresponding Author: Adel Agamy, Electrical Engineering Department, Faculty of Engineering, Aswan University, Aswan, 81542, Egypt Email: a.f.agamy@aswu.edu.eg 1. INTRODUCTION The incredible growth in the number of wireless devices such as smart-phones, tablets and Inter- net of Thing (IoT) in addition to the fast development of media streaming applications, IPTV, telemedicine and Internet gaming have led to a significant challenge to the design and deployment of cellular technology. The mobile networks specifically the LTE networks are used only for accommodating voice and video calls traffic which are considered real time application. Also nowadays the mobile networks are used to transfer non-real time data (Email, ftp, ..etc). Each application type demands to maintain a certain level of quality (throughput, delay..etc) during his sojourn time through the LTE network [1, 2, 3, 4]. Investigating and ana- lyzing the distribution of data generated by each device in LTE network should be the most important factor to estimate the quality requirements and capabilities of LTE networks. In this research we investigate and analyze (by analytical modeling and simulation) the influence of various application types on the LTE network perfor- mance. Also we validate our model through real network simulator NS3 with various scenarios. Our paper is organized as follows, previous studies related to the paper topic is presented in section II. The LTE network system model and its parameters are presented in section III. Section IV shows the LTE network performance estimation using analytical analysis with network performance metrics such as end to end packet delay and blockage probability. Section V shows the performance behavior of the LTE network using NS3 simulator with different operation scenarios. In section VII we conclude our work. Journal homepage: http://ijece.iaescore.com/index.php/IJECE
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 5421 2. RELATED WORK Sajid et all in [5] developed a model using two different distributions. For Constant bit Rate (CBR) traffic (Ex. VOIP traffic) they used exponential distribution. To model Variable Bit Rate (VBR) traffic (video streaming) they used fractional brownie motion (FBM) traffic with heavy-tailed Weibull distribution for buffer occupancy [6]. The authors in [7] investigated the performance of cognitive radio links subject to recurrent failures and interruptions. They studied the performance with single and multiple channels. Using the queuing model M/M/1, they considered the service interruption from primary users, also they used the pricing policy to charge each secondary user in the queue. Authors in [8] proposed a queueing model with four different priority queueing disciplines to apply dynamic optimization. They considered a dynamic priority queueing discipline to optimize a joint performance utility function on two classes of cognitive radio. The performance of vehicular network communication using cellular LTE network using queueing models is presented in [9, 10, 11, 12, 13]. For example the author in [11] developed an analytical model describ- ing the performance of periodic broadcast in Vehicular Ad-hoc Networks (VANET) in terms of packet collision probability and average packet delay using M/M/∞ queuing model. Analytical models to evaluate the queue length behavior at the intersection points as a function of the percentage of vehicles are presented in [12]. The authors in [13] used deterministic arrival process and the queueing model D/M/1 for studying the performance of periodic broadcast in VANETs using metrics such as the packet collision probability and average packet delay. The authors in [14] used the queuing theory to develop a model for cellular LTE wireless networks. They assumed that the cellular LTE network is serving variable bit-rate calls. The authors in [15] evaluated the polling behavior on a MAC for cellular network analytically considering the packet delay, buffer overflow rates and energy consumption. Also in their work in [16] they introduced analytical models to characterize the delay for multicast transmission over a communication channel model. In [17], authors presented a mixed queueing network models of several mobility users at numerous access points to accurately predicting the number of network-level performance and user-level performance in a wireless network. In [18] Scott et all introduced a model for Vehicular Wireless Channel Communication, they modeled the LTE system channel with M/M/m Queueing model. They modeled the LTE wireless communication channel with M/M/m queueing model with infinite number of resources channel m. Also they assumed that each vehicle generates traffic with Poisson process of exponential inter arrival time distribution. They used the First Come First Send (FCFS) queueing discipline to handle traffic in the queue. They evaluated the probability that channels being busy, also developed the expected waiting times and the expected number of channel switches. Fowler et all in [19] described the behavior of the LTE video call (ex. Skype video call) and video streaming traffic in heterogeneous real environ- ment using gaussian mixture model. They derived a semi-Markov model with six states for video call and they derived a semi-Markov model with fifteen states to fit the statistics of composite LTE video measurements. Najem et all in [20] used the Disjoint Queue Scheduler (DQS) for the LTE-A heterogeneous network deployment of a macro-cell and a variable number of picocells. They evaluated and compared the Quality of Service (QoS) of the user performance using the DQS based on different techniques. They evaluated the QoS using the average subscriber’s metrics throughput, Packet Loss Rate (PLR), and average packet delay. They experimentally evaluated the performance of the DQS and its effect on the user quality of service. Naumov et all in [21] studied the performance of LTE cellular networks using queueing models with limited resources. They developed a mathematical model for resource sharing in LTE cellular network using multi-server queueing model. They assumed that users arrive in the system as independent Poisson flows. The service time for each arrival is modeled with exponential distribution. The authors considered a multi-server queuing model and they used semi-markov chains to derive the stationary probabilities for the LTE cellular network with single LTE networks serving users using video conference call. Polaganga et all in [22] explored the Self-Similarity property of LTE and LTE-advance cellular networks. They showed that the selfsimilarity characteristics of LTE and LTE-advanced cellular networks traffic, also they evaluated and compared selfsimilarity degree for both networks and compared user traffic with traditional voice traffic. They summarized from different data sets that the arrival pattern of the user in real LTE networks follows Poisson process. Also, they found that the inter arrival time follows the Exponential distribution. Based on our knowledge there aren’t any previous studies that used sporadic and heavy tail characteristics of the LTE cellular traffic in one model. With sporadic input traffic feed to the eNodeB queue, we derived performance metrics such as mean packet delay and blocking probability analytically and verified that using the NS3 simulator under various burst values (various application) with fixed utilization. We choose the power tail distribution with various truncated tail values to represent the number of packets during a request. The reliability function of the power tail distribution used is: Influence of various application types on the performance of... (Adel Agamy)
  • 3. 5422 Ì ISSN: 2088-8708 R(x) := 1 − θ 1 − θT T −1 j=0 θj exp −µx λj (1) T = 1 refers to the exponential and large T for highly tail properties[23]. 3. LTE NETWORK SYSTEM MODEL The topology used for LTE networks is illustrated in Figure 1. It consists of a single evolved nodeB and a set of N wireless devices that access the LTE network. All of the wireless devices use the LTE wire- less access technology for downloading data (using downlink) and to request and upload data (using uplink). We focus on downlink communication and assume that these devices use various mobile applications. Also the corresponding request traffic in the LTE downlink access network have various properties due to the different mobile applications used. The number of packets during a user request is a random variable and depends on the mobile application used, so the distribution of downlink entrance process will be different with each mobile ap- plication type. Ahmed et al in [24] compared various traffic model schemes to model the Internet data and how each model can capture behavior of the real application traffic. they showed that the bursty traffic introduced in [23] is the best distribution to model various application types due to its various parameters. The model can represent the bursty traffic (with the idle and active periods) as in Figure 2 and also produces the self-similarity property which presents many modes of use (continuous flow, Bulk arrival, Poisson arrival etc) [17, 19]. Figure 1. LTE network topology Figure 2. ON/OFF Model The essential parameters of the traffic model used are as introduced in [24]: K:= the average rate of packets arrival of connected LTE devices. λ := the aggregated rates that produced by the N-LTE devices where λ =KN. np:= The average number of packets produced during in the burst. Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5420 – 5429
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 5423 λp:= the maximum rate that a device can send during an active period. ON:= np / λp = average time for an active period. OFF:= average idle time between two burst sending periods. As shown in Figure 3 the LTE network consists of the evolved packet node (eNodeB) which is respon- sible for allocating resources to the connected devices and the service gate way (S-GW) and packet gate way (P-GW) which connects to the eNodeB through MME unit and from MME to the internet. Also the connected devices (smart-phones) with bursty traffic model for the multi-applications. We assume that all devices are constant (so no handover to other neighbor cells). We also assume that the resources allocation in the eNodeB uses the round robin scheduling so that the resources are divided equally among the users. We use the whole single LTE cell topology as in Figure 3 with Nburst/M/1 queuing model. Now we outline the single cell LTE traffic model using sporadic traffic model: µ:= average service rate of an eNodeB. U:= λ/µ = Load utilization of the access eNodeB. Also we can control on the sporadic type with parameter ”b”, which can get as in [23] from the following: b = 1 − K Rp = 1 − λ nRp (2) Figure 3. LTE Network Model 4. LTE ANALYTICAL PERFORMANCE MODEL 4.1. Performance metrics The analysis of a single cell LTE access network performance with sporadic can be derived for all various distributions using matrix-exponential approach [25]. As we mentioned above that there many modes of use to our model. The first mode of use for the model where the idle period approaches zero which lead to continuous flow (no bursts and b=0) so the model can be reduced to Poisson arrival (Mλ/Mµ/l queueing model) and hence the delay can be derived from the following equation as in [25]: Mean Delay(b=0)=((1/µ)/(1-U)) Where U=λ/µ. The second mode of use occurs when the active time approaches zero, in this case the packets arrive as a bulk arrival where ”b=1”. So the delay can be calculated as in [25] from equation: Mean De- lay(b=1)=(D (1/µ)/(1-U)),.. where D = E( L(L+1) 2 ) E(L) . where the best performance of the cellular network is in the first mode of use where ”b=0”, the worst performance is in the second mode of use when ”b=1”. Through the analytical analysis we use fixed load utilization ˇU at eNodeB, while we investigate the influence of bursty degree (different mobile application). The eNodeB load utilization is fixed while the size of the bursts increases or decreases according to the degree of burstiness ”b” to capture the influence of different applications (each value of b represents a traffic type). The queueing model can be represented with matrix exponential approach of multiple application types. The steady state solution for the system can be derived as in [23] so we can get: The end to end packet delay is calculated using little s formula: DELAY = 1 K R(I − R)−1 ......(3) Influence of various application types on the performance of... (Adel Agamy)
  • 5. 5424 Ì ISSN: 2088-8708 Also we can get the block probability as follows: BlockProability = 1 K π(RB L) .(4) Where the matrix R can be calculated by solving the system as Quasi-Birth-Death Process, K is the average arrival rate, I is the identity matrix and is unity vector. 4.2. Model analysis The first scenario shows the topology of the LTE network as in Figure 2. We assume that the load arrives to the eNodeB as a single flow (N=1 in the model in Figure 3). In all scenarios we set the idle period to the exponential distribution where during active time each device produce a flow with a random size (Power tail distribution with various tail values) to represent the qualitative statistical manner of various mobile applications traffic. Setting truncated tail distribution to ”1” refers to exponential distribution. First Figure 4 shows the relation between the end to end packet delay and the burstiness parameter ”b”. We notice that the delay increases significantly with the increase of the burstiness parameter ”b”, also the delay jumps to a large value at point (b=0.1) and then starts to increase gradually. More significantly the packet delay of the applications which follow distribution with tail equal to ”28” is almost twice the delay of the applications that follow the exponential distribution. So, assuming that all applications will follow the exponential distribution as a service time distribution will lead to an over estimate of the LTE network capa- bilities. These estimates in Figure 5 are based on only a single user in the network so the effect of contention is minimum. So even with no contention, the application type has a significant impact on the packet delay of the LTE networks. Figure 5 shows the behavior of blocking probability versus the burstiness parameter ”b”. The figure shows clearly how the application type can affect the user block probability on the LTE networks. Clearly applications with high variability (long tails) starts to have significant blockage probability earlier than applications with small variability (exponential distributions). For small values of ”b” there isn’t a significant difference between various values of blockage probability for truncated tail and the exponential distribution, as burstiness parameter ”b” increases, the gap between the exponential and other high variability distributions increases. By taking into account (2) and (3), we can find out that the jump happen if Rp > µ,where b > ”l - U” at this moment. Figure 4. Single user mean delay with different burst Figure 5. Single block probability Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5420 – 5429
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 5425 Our next scenario as the network topology in Figure 3. We assume that the arrival at the eNodeB comes from two different sources (N=2), each one with ON periods that follow power tail distribution and exponential OFF period distribution. The integration of ”N” multiple exponential distributions with rate ”r” is Nr exponential distribution [25]. Hence, we can use the (N-burst/M/1) queueing model. For small values of ”b”, the model reduces to a continuous arrival flow with rate NK while for large values of ”b” the model approaches the bulk arrival and leads to worst performance on the LTE network. To get a fair comparison with the single load source scenario, we maintain the same load utilization on the eNodeB. The results in Figures 6 and 7 are consistent with the single flow source results. The difference in the two flow sources that users don’t suffer from a large jump where the users blowup points need long bursts to occur. In case of multiple flow ”N=2” we have two jump points occur as in Figure 6 for the delay and Figure 7 for the blocking probability. Hence, the performance of the delay become more complex for large values of N. We can estimate the jump points in LTE networks with a bursty traffic source from the following equation: b = 1 − K Rp = 1 − λ NRp (5) Figure 6. Multiple users mean delay with different burst Figure 7. Multiple users block probability 5. LTE NETWORK SIMULATION Our simulation consists of a single zone covered by an LTE network through one evolved NodeB (eNB) as in Figure 2 and LTE network model in Figure 3. The specification of LTE technology used in the simulator can be found in Table 1. The smartphones or subscribers are uniformly distributed in the zone according to a disc around the eNodeB. Each device generates load for amount of time (active period) and idle for another time (OFF period). We run the simulation for two scenarios with exponential OFF period distribution. The first scenario represents the normal traffic (exponential for active period) while the second scenario uses the heavy tail traffic (Pareto distribution for active period). We run the simulator for various time periods and then calculate the average over all cases. During the active period, the number of packets in a request is a random variable with mean of 1024 byte. We refer to the number of packet with np packets which are transmitted with a constant peak rate 2 Influence of various application types on the performance of... (Adel Agamy)
  • 7. 5426 Ì ISSN: 2088-8708 Mb/s during an active time. Through the network simulator, we generate the different distributions from the following function: R(x) = 1 (1 + x M(α−1) )x (6) Where R(x) = Pr(X > x): a reliability function of the random variable. α :.. a shape parameter. M :..the average of the distribution, (i.e., E(X) = M). 5.1. Simulation result analysis Figure 8 shows the aggregated throughput of the cell (eNodeB) for both the small variability distri- bution (exponential) and high variability (Pareto) traffic. We notice from the Figure 8 that the total aggregated throughput of LTE network for heavy traffic (Pareto) is smaller than throughput of the well behaved traffic. The result from the Figure 8 confirms with what we got in the analytical model and the cell throughput satu- rated at approximately”33MB/s” which is close to the standard throughput set in Table 1 [26]. Figure 9shows the number of users demand over time. It is very clear from Figure 9 that the large negative influence of heavy tail applications on the performance of LTE networks. The well-behaved applications network can serve more users than the network with heavy tail applications. The Figures 10 and 11 show changes of packet loss per- centage per user over time. The figures clearly show that a large part of users lost 50% of their requests in Pareto distribution while the number decrease to 13%on the exponential distribution. The same consistence behavior is shown in Figures 12 and 13 for the average delay, where the delay for heavy tail distributions reach 90% of user while for well-behaved application the large delay effects 70% of users. Table 1. LTE parameters setting Carrier frequency.. .. 2.6 GHZ Bandwidth.. .. 10 MHz (50 RB) Height eNB.. .. 25 m Transmission Power eNB 46 dBm MIMO/SISO.. ..SISO eNB noise figure 5 dB Transmission power devices 24 dB UE noise figure 7 dB Scheduler- HARQ Round robin Scheduler-Yes Transmission model RLC UM Propagation Loss Model TwoRayGround PropagationLoss Model range 150 m Antenna model Isotropic Figure 8. Throughput Figure 9. Demand Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5420 – 5429
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 5427 Figure 10. Packet loss distribution(EXP Figure 11. Packet loss distribution(Pareto) Figure 12. Delay distribution(EXP) Figure 13. Delay distribution(Pareto) 6. CONCLUSIONS We investigated the influence of various types of mobile application traffic on the performance of LTE mobile networks. Our research focused on the heavy-tailed and self-similar statistical characteristics of the mobile applications and its negative effect on the LTE network performance. Using the (N-Burst/M/l) Queuing model and NS3 simulator, we estimated the influence of application types on LTE cellular network performance behavior. Specifically, we studied LTE network performance metrics such as packet delay, block probability analytically and the throughput, packet delay, packet loss and user demand by the NS3 simulator. Our future work is to extend the analytical model for heterogeneous network taking into account the mobility model for wireless devices. Also to evaluate more complicated scenarios with NS3 simulator to accurately estimate actual network traffic. REFERENCES [1] Index, Cisco Visual Networking, “Cisco visual networking index: Global mobile data traffic forecast update 2015-2020 White Paper,” Accessed date, 2016. Influence of various application types on the performance of... (Adel Agamy)
  • 9. 5428 Ì ISSN: 2088-8708 [2] J. Wu, C. Yuen, N.-M. Cheung, J. Chen, and C. W. Chen, “Enabling adaptive high-frame-rate video streaming in mobile cloud gaming applications,” IEEE Trans. Circuits Syst. Video Techn., vol. 25, no. 12, pp. 1988–2001, 2015. [3] N. Panwar, S. Sharma, and A. K. Singh, “A survey on 5g: The next generation of mobile communication,” Physical Communication, vol. 18, pp. 64–84, 2016. [4] A. Gupta and R. K. Jha, “A survey of 5g network: Architecture and emerging technologies,” IEEE access, vol. 3, pp. 1206–1232, 2015. [5] M. S. Mushtaq, S. Fowler, B. Augustin, and A. Mellouk, “Qoe in 5g cloud networks using multimedia services,” Wireless Communications and Networking Conference (WCNC), pp. 1–6, 2016. [6] I. Norros, “On the use of fractional brownian motion in the theory of connectionless networks,” IEEE Journal on selected areas in communications, vol. 13, no. 6, pp. 953–962, 1995. [7] A. Azarfar, J.-F. Frigo, and B. Sanso, “Analysis of cognitive radio networks based on a queueing model with server interruptions,” IEEE International Conference on Communications, pp. 1703–1708, 2012. [8] A. Azarfar, J.-F. Frigon, and B. Sans‘o, “Dynamic selection of priority queueing discipline in cognitive radio networks,” Vehicular Technology Conference (VTC Fall), pp. 1–5, 2012. [9] Q. Yang, J. Zheng, and L. Shen, “Modeling and performance analysis of periodic broadcast in vehicular ad hoc networks,” Global Telecommunications Conference (GLOBECOM 2011), pp. 1–5, 2011. [10] S. Yang, C. K. Yeo, and B. S. Lee, “Predictive scheduling in drive-thru networks with flow-level dynamics and deadlines,” IEEE International Conference on Communications (ICC), pp. 1–5, 2011. [11] M. J. Khabbaz, W. F. Fawaz, and C. M. Assi, “A simple free-flow traffic model for vehicular intermit- tently connected networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 13, no. 3, pp. 1312–1326, 2012. [12] G. Comert and M. Cetin, “Analytical evaluation of the error in queue length estimation at traffic sig- nals from probe vehicle data,” IEEE Transactions on Intelligent Transportation Systems, vol. 12, no. 2, pp. 563–573, 2011. [13] M. J. Khabbaz, W. F. Fawaz, and C. M. Assi, “Modeling and delay analysis of intermittently con- nected roadside communication networks,” IEEE Transactions on Vehicular Technology, vol. 61, no. 6, pp. 2698–2706, 2012. [14] M. K. Karray and M. Jovanovic, “A queueing theoretic approach to the dimensioning of wireless cellular networks serving variable-bit-rate calls,” IEEE Transactions on Vehicular Technology, vol. 62, no. 6, pp. 2713–2723, 2013. [15] H. Yang and B. Sikdar, “Queueing analysis of polling based wireless mac protocols with sleep-wake cycles,” IEEE Transactions on Communications, vol. 60, no. 9, pp. 2427–2433, 2012. [16] B. Shrader and A. Ephremides, “Queueing delay analysis for multicast with random linear coding,” IEEE Transactions on Information Theory, vol. 58, no. 1, pp. 421–429, 2012. [17] Y.-C. Chen, J. Kurose, and D. Towsley, “A mixed queueing network model of mobility in a campus wireless network,” Proceedings IEEE INFOCOM, pp. 2656–2660, 2012. [18] S. Fowler, C. H. Hall, D. Yuan, G. Baravdish, and A. Mellouk, “Analysis of vehicular wireless channel communication via queueing theory model,” IEEE International Conference on Communications (ICC), pp. 1736–1741, 2014. [19] S. Fowler, J. Sarfraz, M. M. Abbas, and V. Angelakis, “Gaussian semi-markov model based on real video multimedia traffic,” IEEE International Conference on Communications (ICC), pp. 6971–6976, 2015. [20] N. N. Sirhan, M. Martınez-Ramon, G. L. Heileman, N. Ghani, and C. C. Lamb, “Qos performance eval- uation of disjoint queue scheduler for video-applications over lte-a hetnets,” Proceedings of the 7th International Conference on Computing Communication and Networking Technologies, pp. 4, 2016. [21] V. Naumov, K. Samouylov, N. Yarkina, E. Sopin, S. Andreev, and A. Samuylov, “Lte performance analy- sis using queuing systems with finite resources and random requirements,” 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 100–103, 2015. [22] R. K. Polaganga and Q. Liang, “Self-similarity and modeling of lte/lte-a data traffic,” Measurement, vol. 75, pp. 218–229, 2015. [23] H.-P. Schwefel and L. Lipsky, “Performance results for analytic models of traffic in telecommunication systems, based on multiple ON-OFF sources with self-similar behavior,” Teletraffic science and engineer- ing, pp. 55–65, 1999. Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 5420 – 5429
  • 10. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 5429 [24] Ahmed M. Mohamed and , Adel F. Agamy, “A survey on the common network traffic sources models,” Interenational Journal Of Computer Network (IJCN), vol. 3, no. 2, 2011. [25] L. Lipsky, ”Queueing Theory: A linear algebraic approach,” Springer Science Business Media second Edition, 2008. [26] E. Dahlman, S. Parkvall, and J. Skold, ”4G: LTE/LTE-advanced for mobile broadband,” Academic press, 2013. BIOGRAPHIES OF AUTHORS Adel Agamy received the B.Sc. in Communications and Electronics engineering in 2007, M.Sc. in Electrical Engineering in 2012 from Aswan university, Egypt. He is currently an assistant lecturer at electrical engineering department, Aswan faculty of engineering, Aswan University. His fields of interest: traffic modeling, wireless communication, cellular network and computer network Ahmed Mohamed received the B.Sc. in electrical and computer engineering from Assiut university, Egypt, in 1994, the M.Sc. in computer science and engineering from university of Connecticut, USA in 2001 and the Ph.D. in computer science and engineering from university of Connecticut, USA in 2004. He is currently an assistant professor at electrical engineering department, Aswan faculty of engineering, Aswan University. His research interests include, performance modeling, queueing analysis, distributed systems, computer networks and operating systems. Influence of various application types on the performance of... (Adel Agamy)