Submit Search
Upload
Study on Performance of Simulation Analysis on Multimedia Network
•
0 likes
•
31 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i3/IRJET-V4I3397.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Ez33917920
Ez33917920
IJERA Editor
A41040105
A41040105
IJERA Editor
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
ijwmn
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
IJCSIT Journal
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
IRJET Journal
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET Journal
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
csandit
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
CSCJournals
Recommended
Ez33917920
Ez33917920
IJERA Editor
A41040105
A41040105
IJERA Editor
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
ijwmn
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
IJCSIT Journal
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
IRJET Journal
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET Journal
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
csandit
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
CSCJournals
A survey on congestion control mechanisms
A survey on congestion control mechanisms
eSAT Publishing House
A New Data Link Layer Protocolfor Satellite IP Networks
A New Data Link Layer Protocolfor Satellite IP Networks
Niraj Solanki
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
Divya Tiwari
Advanced Networking on GloMoSim
Advanced Networking on GloMoSim
Kathirvel Ayyaswamy
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
ijsrd.com
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
Congestion Control in Wireless Sensor Networks- An overview of Current Trends
Congestion Control in Wireless Sensor Networks- An overview of Current Trends
Editor IJCATR
Network Layer
Network Layer
reshmadayma
A Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling Router
IJERA Editor
proactive and reactive routing comparisons
proactive and reactive routing comparisons
ITM Universe - Vadodara
Routing in Manet
Routing in Manet
shiujinghan
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
ijsrd.com
F41023946
F41023946
IJERA Editor
Network layer new
Network layer new
reshmadayma
Wmn Tutorial
Wmn Tutorial
tritv
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
IJCSIS Research Publications
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
IJTET Journal
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
IJCI JOURNAL
Performing Network Simulators of TCP with E2E Network Model over UMTS Networks
Performing Network Simulators of TCP with E2E Network Model over UMTS Networks
AM Publications,India
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
Editor IJMTER
S URVEY OF L TE D OWNLINK S CHEDULERS A LGORITHMS IN O PEN A CCESS S IM...
S URVEY OF L TE D OWNLINK S CHEDULERS A LGORITHMS IN O PEN A CCESS S IM...
ijwmn
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)
Krishan Pareek
More Related Content
What's hot
A survey on congestion control mechanisms
A survey on congestion control mechanisms
eSAT Publishing House
A New Data Link Layer Protocolfor Satellite IP Networks
A New Data Link Layer Protocolfor Satellite IP Networks
Niraj Solanki
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
Divya Tiwari
Advanced Networking on GloMoSim
Advanced Networking on GloMoSim
Kathirvel Ayyaswamy
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
ijsrd.com
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
Congestion Control in Wireless Sensor Networks- An overview of Current Trends
Congestion Control in Wireless Sensor Networks- An overview of Current Trends
Editor IJCATR
Network Layer
Network Layer
reshmadayma
A Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling Router
IJERA Editor
proactive and reactive routing comparisons
proactive and reactive routing comparisons
ITM Universe - Vadodara
Routing in Manet
Routing in Manet
shiujinghan
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
ijsrd.com
F41023946
F41023946
IJERA Editor
Network layer new
Network layer new
reshmadayma
Wmn Tutorial
Wmn Tutorial
tritv
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
IJCSIS Research Publications
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
IJTET Journal
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
IJCI JOURNAL
What's hot
(18)
A survey on congestion control mechanisms
A survey on congestion control mechanisms
A New Data Link Layer Protocolfor Satellite IP Networks
A New Data Link Layer Protocolfor Satellite IP Networks
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
Advanced Networking on GloMoSim
Advanced Networking on GloMoSim
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Congestion Control in Wireless Sensor Networks- An overview of Current Trends
Congestion Control in Wireless Sensor Networks- An overview of Current Trends
Network Layer
Network Layer
A Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling Router
proactive and reactive routing comparisons
proactive and reactive routing comparisons
Routing in Manet
Routing in Manet
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
F41023946
F41023946
Network layer new
Network layer new
Wmn Tutorial
Wmn Tutorial
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Similar to Study on Performance of Simulation Analysis on Multimedia Network
Performing Network Simulators of TCP with E2E Network Model over UMTS Networks
Performing Network Simulators of TCP with E2E Network Model over UMTS Networks
AM Publications,India
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
Editor IJMTER
S URVEY OF L TE D OWNLINK S CHEDULERS A LGORITHMS IN O PEN A CCESS S IM...
S URVEY OF L TE D OWNLINK S CHEDULERS A LGORITHMS IN O PEN A CCESS S IM...
ijwmn
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)
Krishan Pareek
E04124030034
E04124030034
IOSR-JEN
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
CSCJournals
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...
IJECEIAES
2002023
2002023
pglehn
C011111523
C011111523
IOSR Journals
Throughput Performance Analysis VOIP over LTE
Throughput Performance Analysis VOIP over LTE
iosrjce
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
IJECEIAES
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
ijwmn
ETE405-lec7.ppt
ETE405-lec7.ppt
mashiur
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Eswar Publications
Assignment on data network
Assignment on data network
Abhishek Kesharwani
Assignment on data network
Assignment on data network
Abhishek Kesharwani
Signaling system 7
Signaling system 7
Dhrubaji Mandal ♛
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
IJERA Editor
my project publication
my project publication
Emmanuel Onyeakusi
Recital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless network
iosrjce
Similar to Study on Performance of Simulation Analysis on Multimedia Network
(20)
Performing Network Simulators of TCP with E2E Network Model over UMTS Networks
Performing Network Simulators of TCP with E2E Network Model over UMTS Networks
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
S URVEY OF L TE D OWNLINK S CHEDULERS A LGORITHMS IN O PEN A CCESS S IM...
S URVEY OF L TE D OWNLINK S CHEDULERS A LGORITHMS IN O PEN A CCESS S IM...
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)
E04124030034
E04124030034
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...
2002023
2002023
C011111523
C011111523
Throughput Performance Analysis VOIP over LTE
Throughput Performance Analysis VOIP over LTE
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
ETE405-lec7.ppt
ETE405-lec7.ppt
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Assignment on data network
Assignment on data network
Assignment on data network
Assignment on data network
Signaling system 7
Signaling system 7
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
my project publication
my project publication
Recital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless network
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Tagore Institute of Engineering And Technology
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
me23b1001
Recently uploaded
(20)
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Internship report on mechanical engineering
Internship report on mechanical engineering
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
Study on Performance of Simulation Analysis on Multimedia Network
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03| March -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1726 Study on Performance of simulation analysis on Multimedia Network Shiferaw Hermela Shimelash1, Li Yao Hui2 ,Fares Mohmmed Mehdi Hassan3 1,2Tianjin University of Technology and Education, School of Applied Computer Technology Add: 1310 Dagu Nan Road, Hexi District Tianjin, P.R.China 3 Nanjing Forestry University, School of mechanical and electrical engineering Add: No.159 Lonpan Road Nanjing,P,R, China Abstract: On these days, the Internet is used for multimedia applications, such as streaming audio and video to users. There is also great interest in delivering conversational voice to Internet users. As users, will expect the same services to be available on the wireless Internet as they enjoy on the wired Internet, it is important showing that mobility schemes can support multimedia applications. Indeed, it can be argued that for data applications such as web browsing, it is mostly acceptable to re-establish a session when a user moves between networks, as data requests are typically separated by a couple of seconds. However, this is not acceptable in multimedia applications. In this thesis, try to a handover scheme for a simulated voice application is presented based on a modified version of the Stream Control Transmission Protocol (SCTP). Multimedia applications are sensitive to delay, so SCTP was modified to monitor the available networks and to transport data over the network with the lowest delay and learn about on the jitter and latency performance of wired voice over internet protocol (VOIP). The performance of voice communication over wired connections is done using NS-2 simulator. Keywords: VoIP, SCTP, wired LAN, Ns2. 1. INTRODUCTION Voices over Internet Protocol (VoIP) allow users to make calls and receive calls by connecting through internet protocols to deliver voice data. The reasons behind growing popularity of VoIP include; low cost, efficient bandwidth, and flexibility over Public Switched Telephone Network (PSTN). VoIP operates by transferring voice signals between IP addresses, which means that those signals have to transform into pieces of data small enough to transmit. Vocals samples from the sender are broken down into voice “packets”, which are given routing information and sent to the receiving end. The packets transmit one-by-one, and then re-form as close to the original state as possible, creating one whole voice. This process compresses the voice signal and then decompresses the signal for the receiver. Wired networks exist between a number of devices connected to each other using connecting media, such as cables and routers. Wired networks can be applied within an area limited by the cables and routers that allow for sending and receiving data. A communication network topology refers to the schematic representation of switching elements, routers, transmission links and other peripherals. It acts as a layout for a communication network which exists in real time scenario. Network topologies can be classified into two types based on the layouts: 1. Physical network layout 2. Logical network layout Physical network layout is the actual layout of computer cables, routers, and other network devices. Logical network layout is the way in which network appears to the devices in use. Commonly used topologies are bus, ring, and star. The analysis of a sophisticated network becomes difficult as there is a hectic calculation involved at each and every node spaced at a 100-200 km interval. The next section provide an overview of SCTP (stream control transmission protocol) 2. SCTP OVERVIEW The SCTP is a reliable transport protocol operating over a connectionless packet switched network, such as IP. SCTP emerged from the need for telecommunications companies
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03| March -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1727 to manage SS7 applications and services over an IP infrastructure. SS7 is a protocol suite for managing PSTN and other telecommunication networks. The upper layers of SS7 are designed to operate over a circuit-switched control channel of the industry’s TDM phone system network. Therefore SCTP is oriented towards providing connection oriented reliable message streams between communication endpoints. While SCTP was originally designed for signaling transport and much of the current work on SCTP in the IETF is centered on this application the protocol is capable of broader application [1]. SCTP attempts to enhance the services of UDP and overcomes the limitation of TCP. SCTP is a reliable message-based connection-oriented transport protocol, which according to [1], provides the following services Acknowledged error-free non-duplicated transfer of user data. Congestion avoidance behavior, Sequenced delivery of user message within multiple streams with an option order of arrival delivery of individual user messages. Data fragmentation to conform to discovered path MTU size, Optional bundling of multiple user messages into a single SCTP packet, Network level fault tolerance through support of multihoming at either or both ends of an association, and Resistance to flooding and masquerade attacks. Stream Control Transmission Protocol is hybrid of TCP and UDP and it offers features of both these protocols. It is a reliable, message-oriented transport layer protocol compared to TCP and UDP. SCTP is a multiple streams are allowed in each connection. Can be used as the transport protocol for applications where monitoring and detection of loss of session are required. For such applications, the SCTP path/session failure detection mechanisms, especially the heartbeat, will actively monitor the connectivity of the session. SCTP distinguishes different Streams of messages within one SCTP association. This enables a delivery scheme where only the sequence of messages needs to be maintained per stream (partial in- sequence delivery), which reduces unnecessary head-of- line blocking between independent streams of messages. SCTP operates on two levels: Within an association, the reliable transfer of datagrams is assured by using a checksum, a sequence number, and a selective retransmission mechanism. Without taking the initial sequence into account, every correctly received data chunk is delivered to a second, independent level. The second level realizes a flexible delivery mechanism, which is based on the notion of several independent streams of datagrams within an association. Chunks belonging to one or several streams may be bundled and transmitted in one SCTP packet provided they are not longer than the current path MTU. Detection of loss and duplication of data chunks is enabled by numbering all data chunks in the sender with the so-called Transport Sequence Number (TSN). The acknowledgments sent from the receiver to the sender are based on these sequence numbers. Retransmissions are timer-controlled. The timer duration is derived from continuous measurements of the round-trip delay. Whenever such a retransmission timer expires, (and congestion control allows transmissions) all non- acknowledged data chunks are retransmitted and the timer is started again doubling its initial duration (like in TCP). When the receiver detects one or more gaps in the sequence of data chunks, each received SCTP packet is acknowledged by sending a Selective Acknowledgement (SACK), which reports all gaps. The SACK is contained in a specific control chunk. Whenever the sender receives four consecutive SACKs reporting the same data chunk missing, this data chunk is immediately retransmitted (fast retransmit). Some of the key advantages of using SCTP are given below. Flow Control Selective Acknowledgement Congestion Control Multihoming Fig -1: packet structure
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03| March -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1728 SCTP Packets The protocol data units (PDU) of SCTP are called SCTP packets. SCTP runs over IP, an SCTP packet forms the payload of an IP packet. An SCTP packet is composed of a common header and chunks. Multiple chunks may be multiplexed into one packet up to the Path-MTU size. A chunk may contain either control information or user data. 3. Implementation, Simulations, Calculations and Result Simulation with ns-2 The tests will be carried out in NS-2. C++ scripts will be used to parse the resulting simulation trace files, and evaluate the latency, jitter, and packet loss. The test topology includes VoIP clients, sending two-way traffic to each other to simulate normal voice communication. The VoIP traffic is running at the start of the simulation. At a later time, background traffic is being added to evaluate its effects on the VoIP traffic. The background traffic is sent via separated nodes/clients, while only sharing the transmission paths. Of course the SCTP protocol will be used for this scenario: Fig- 2: VOIP simulation topology In the implementation, a G.711 codec is used since it is known one. This codec uses a 64kbps bit rate and packet size of 160 bytes. The background traffic is sending at a constant bit rate of 128kbps. The topology setup is shown in Figure 2, with red denoting two-way traffic between the VoIP clients. The green denotes two-way traffic between the background sources. Node 1 & Node 3 is a VoIP traffic and also Node 0 & Node 2is the background. There is two- way traffic for both background and VoIP. The bandwidth limits for the routers (Node 4 & Node 5) is set to the same bitrate as the background traffic with 20 milliseconds. Once the background traffic starts, the links between the routers are overloaded and the impact on the VoIP application can be seen. The queue build-up exists at the center link, serving as a bandwidth bottleneck. The simulation of this thesis will be done using the Network Simulator Ns-2.30 Ns-2 is an open source discrete event simulator used by the research community for research in networking. It has support for both wired and wireless networks and can simulate several network protocols. The standard ns-2 distribution runs on Linux. However, a package for running ns-2 on Cygwin (Linux Emulation for Windows) is available. In this mode, ns-2 runs in the Windows environment on top of Cygwin. Gnuplot be used to graph the resulting data. Fig -3: basic architecture of NS-2 According to the specific topology on the above description, the simulation result will be as follows. On the below fig shows the animator or name file (the animation simulation) from the network simulator 2. The four types of color refer different packet moving from source to destination node. Which will help to distinguish which node is communicated to which node? Fig- 4: Network animator
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03| March -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1729 4. AWK Performance Calculations Latency is a measure of time delay experienced in a system. In simulation, the delay is measured by taking the time difference between when a packet is sent from the source node, and when it reaches its destination. The latency (end-to-end delay) will be measured for each packet sent from a VoIP client and reaches its partner. The instantaneous latency formula is given as: Instantaneous Latency = Receive time of destination node – Send time of source node----------------------- (2) The instantaneous latency can be presented graphically, where the end-to-end delay (in seconds, y-axis) for a specific packet is posted at the time it was received by the destination node (x-axis). The Average Latency is a single value, calculated from the formula given below: Average Latency = cumulative total of instantaneous latency / simulation runtime---------------------------- (3) The average latency produces a single value which can be easily used to carry out performance comparisons between different scenarios. Packet Delay Variation (Jitter) Jitter is an informal name for IP packet delay variation (IPDV), but it is often used in electronics and telecommunication. Jitter is the undesired deviation from true periodicity of an assumed periodic signal in computer network. “As an example, say packets are transmitted every 20ms. If the 2nd packet is received 30ms after the 1st packet, IPDV = −10ms. This is referred to as dispersion. If the 2nd packet is received 10ms after the 1st packet, IPDV = +10ms. This is referred to as clumping [5].” Instantaneous Jitter = Current Latency – Previous Latency ------------------------------------------------------ (4) Instantaneous Jitter is graphed over the simulation period, and each data point will be mapped to its respective time in the Instantaneous Latency graph. This allows examination of the stability of the network as the traffic pattern constantly changes throughout the simulation. The average jitter can be calculated as: Instantaneous Jitter = sum (Current Latency – Previous Latency) / simulation runtime---------------------------- (5) 5. Performance Result After the simulation, we find the trace file. The trace file helps as to see the performance of the specific topology and animator. This is the sample of the trace file. Table -1: Trace file format Which describe event status r for receive (at to node) + for enqueue, - for dequeue, d for drop. Therefore, using the trace file (.tr) and the awk file we can get the result of the performance on different parameters, but in our case of thesis latency and jitters (Delay variation) are our concern. Those from below are some packet status result. Packetid 2051 Send time 57.30525 End time 59.23125 New duration 1.926 Old duration 1.661 Jitter 0.265 Packetid 2069 Send time 58.43725 End time 59.87925 New duration 1.442 Old duration 1.926 Jitter -0.484 Table-2: Result of jitter on specific Packet ID It explains which packet id is sent on which specific sending time and ending time and also calculate the duration so that it give the result of delay variation. Ave jitter: 0.00600833 the average delay variation. And finally, we can see the average jitter from all the packets. Not only jitter the packet drop status and the end to end delay result as below. Ave latency: 0.981304 the average latency result. A number of packets dropped is 98. EVENT TIME FROME NODEL PKT TYPE FLAGS FID ARC ADDR DST ADDR SEQ NUM PKT ID r 1.0085 1 4 Sctp 56 3 1.0 3.1 -1 5 + 1.0085 4 5 Sctp 56 3 1.0 3.1 -1 5 - 1.0085 4 5 Sctp 56 3 1.0 3.1 -15 d 1.2 0 4 Sctp 208 1 0.0 2.1 -18
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03| March -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1730 Fig 5: Result on specific parameters It's known that the Excessive network latency creates bottlenecks in the network, which lead to as reduction of effective bandwidth. When determining network speed, it is important to use not only a bandwidth calculator but also to run a network latency test. According to the chart below is the performance of the latency with respect to simulation time on the x-axis. Fig -6: latency (delay) performance using Gnuplot Since each packet may take a different route to its destination, network congestion or improper configuration can result in significant variations in packet delay. We can also see the result from the perspective of specific nodes with sctp and cbr delay simulation. Fig -7: delay performances within 2-10ms simulation times The time delay on transferring the voice packets from the source to the destination result as show the latency result is not greater than 150ms. This will help deterioration of call quality performance. Fig -8: jitter performance on Gnuplot The delay variation result as shown on above chart with respect to the simulation time. I also analysis's with a different perspective of nodes and packets delay and jitter performances. These all help to evaluate and make understand when we want to demonstrate different network according to different ideas of agent protocols and traffic. Sample result from the trace analysis as shown as follow.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03| March -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1731 Fig -9: jitter performances with respect to packet These explain with the range of 1400 to 1600 packet id deliberation of packets with the y-axis which is jitter in milliseconds. As we can see the jitter performance it’s not more than 0.9ms. Which refer to it’s not that bad performance. 6. Conclusion and Future work Network simulation provides a reliable alternative to calculate the performance of a given topology network. The NS2, which is open source simulation software, predicts the performance of the different agent. NS2 checks the functioning of any given network virtually and presents the performance characteristics of the network, which is a better alternative to a tedious calculation of performance characteristics such as end to end delay and average number of packets received at each node, the jitter and how many packets its drop and so on. In this thesis, It has been designed a four node with the access point and router wired network with TCL script as a front end to the simulator. The TCL script uses compiled C++ hierarchy to achieve efficiency in simulation and faster execution time. After defining the topology using tool command language, agents such as CBR over SCTP are attached to the respective nodes of the network topology. The traffic flow between the nodes allows us to calculate the performance of the network. The latency and jitter of the network have been calculated. Also by using the Gnuplot as we seen the above, I plotted the performance in a graphs form. All these results extending as to think SCTP protocol is also good to use in outside of the world. The Future work will be extending this simulation to future idea by relating with the queuing theory which is queuing delay it could be M/M/1 or M/M/m with n servers or single server, so that studying about the arrival process by calculating the arrival rate, packet delay in queue and so on. 7. References [1] R.stewart et al. Stream control transsmission protocol.RFC 2960, October 2000. [2] NS3 doxygen “NS3 Documentation,” https://www.nsnam.org/doxygen/ [Accesses: January 27, 2016] [3] “Voice Over IP - Per Call Bandwidth Consumption,” Available:http://www.cisco.com/c/en/us/support/do cs/voice/voicequality/7934-bwidth-consume.html [4] [Accessed: January 27, 2016] [5] Wikipedia. “Packet delay variation,” Available: http://en.wikipedia.org/wiki/Packet_delay_variation [Accessed: January 27, 2016] [6] Hole, D.P. Tobagi, F.A. "Capacity of an IEEE 802.11b Wireless Lan supporting VoIP," Communications, 2004 IEEE International Conference on, vol.1, no., pp. 196- 201 [7] http://forum.wsnlab.org/threads/how-to-install- cygwin-ns2-in-windows.14/ [8] www.isi.edu/nsnam/ns/tutorial/ [9] Salvatore Loreto, Antonio Pescape and Giorgio Ventre "Measuring SCTP Through put and Jitter over Heterogeneous Networks" [10] PreethiNatarajan, Paul. D. Amer and Randall Stewart "SCTP: An Innovative Transport layer Protocol fortheWeb" [11] R. Rajamani, S. Kumar, andN. Gupta. "SCTP versus: Comparing the Performance ofTransportprotocols for web traffic". [12] R. Stewart et al., "Stream Control Transmission Protocol," RFC 4960, IETF, Sep. 2007. [13] Gnuplot in Action, Second Edition Understanding data with graphs philipp K.lanert
Download now