This document discusses the need for network simulation tools to test telecom network components before deployment. It describes the key requirements for building an efficient simulation tool that can accurately model a complex telecom network, including 3G and UMTS networks. Specifically, it discusses modeling internet traffic and using semi-Markovian models to generate traffic. It also covers the importance of considering physical layer factors like RF path loss and mechanisms like power control when simulating UMTS networks. The document provides details on the algorithms and architecture needed for a simulation tool to generate traffic according to specified models and evaluate network performance and capacity.
On the real time hardware implementation feasibility of joint radio resource ...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A Survey on the Common Network Traffic Sources ModelsCSCJournals
Selecting the appropriate traffic model can lead to the successful design of networks. The more accurate is the traffic model the better is the system quantified in terms of its performance Successful design lead to enhancement the overall performance of the whole of network .in literature there is innumerous traffic models proposed for understanding and analyzing the traffic characteristics of networks. Consequently, the study of traffic models to understand the features of the models and identify eventually the best traffic model, for a concerned environment has become a crucial and lucrative task. Good traffic modeling is also a basic requirement for accurate capacity planning. This paper provides an overview of some of the widely used network traffic models, highlighting the core features of the model and traffic characteristics they capture best. Finally we found that the N_BURST traffic model can capture the traffic characteristics of most types of networks, under every possible circumstance rather than any type of traffic model.
On the real time hardware implementation feasibility of joint radio resource ...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A Survey on the Common Network Traffic Sources ModelsCSCJournals
Selecting the appropriate traffic model can lead to the successful design of networks. The more accurate is the traffic model the better is the system quantified in terms of its performance Successful design lead to enhancement the overall performance of the whole of network .in literature there is innumerous traffic models proposed for understanding and analyzing the traffic characteristics of networks. Consequently, the study of traffic models to understand the features of the models and identify eventually the best traffic model, for a concerned environment has become a crucial and lucrative task. Good traffic modeling is also a basic requirement for accurate capacity planning. This paper provides an overview of some of the widely used network traffic models, highlighting the core features of the model and traffic characteristics they capture best. Finally we found that the N_BURST traffic model can capture the traffic characteristics of most types of networks, under every possible circumstance rather than any type of traffic model.
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.
The article looks into the current state of the art of dynamic routing protocols with respect to their
possibilities to react to changes in the Quality of Service when selecting the best route towards a
destination network. New options that could leverage information about the ever changing QoS parameters
for data communication are analysed and a Cisco Performance Routing solution is described more in
detail. The practical part of this work focuses on a design and implementation of a test bed that provides a
scalable laboratory architecture to manipulate QoS parameters of different data communications flowing
through it. The test bed is used in various use cases that were used to evaluate Cisco Performance Routing
optimization capabilities in different scenarios.
Efficient P2P data dissemination in integrated optical and wireless networks ...TELKOMNIKA JOURNAL
The Quality of Service (QoS) resource consumption is always the tricky problem and also
the on-going issue in the access network of mobile wireless part because of its dynamic nature of network
wireless transmissions. It is very critical for the infrastructure-less wireless mobile ad hoc network that is
distributed while interconnects in a peer-to-peer manner. Toward resolve the problem, Taguchi method
optimization of mobile ad hoc routing (AODVUU) is applied in integrated optical and wireless networks
called the adLMMHOWAN. Practically, this technique was carry out using OMNeT++ software by building
a simulation based optimization through design of experiment. Its QoS network performance is examined
based on packet delivery ratio (PDR) metric and packet loss probabilities (PLP) metric that consider
the scenario of variation number of nodes. During the performing stage with random mobile connectivity
based on improvement in optimized front-end wireless domain of AODVUU routing, the result is performing
better when compared with previous study called the oRia scheme with the improvement of 14.1% PDR
and 43.3% PLP in this convergence of heterogeneous optical wireless network.
Adaptive resource allocation and internet traffic engineering on data networkcsandit
This research paper describes the issues of bandwidth allocation, optimum capacity allocation,network operational cost reduction, and improve Internet user experience. Traffic engineering (TE) is used to manipulate network traffic to achieve certain requirements and meets certain
needs. TE becomes one of the most important building blocks in the design of the Internet backbone infrastructure. Research objective: efficient allocation of bandwidth across multiple paths. Optimum path selection. Minimize network traffic delays and maximize bandwidth utilization over multiple network paths. The bandwidth allocation is performed proportionally over multiple paths based on the path capacity.
The performance of the vehicular communication-clustering processTELKOMNIKA JOURNAL
For the new wireless systems and beyond, the intelligent transportation system is considered as one of the main features that could be covered in the new research topics. Furthermore, both high-speed data transmission and data processing play a crucial role for these generations. Our work covers two main propositions in order to attain an improvement in such intelligent systems performance. A clustering algorithm is proposed and presented for grouping mobile nodes based on their speeds with some modified head assignments processes. This will be combined with a parallel-processing technique that enhances the QoS. Mainly, this work concerns enhancing the V2V data transmission and the processing speed. Thus, a wavelet processing stage has been imposed to optimize the transmitted power phenomenon. In order to check the validity of such proposition, five main efficiency factors have been investigated; namely complementary cumulative distributions, bit rates, energy efficiency, the lifetime of cluster head and the ordinary nodes reattaching-head average times.
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
With the wide spread of WiFi hotspots, concentrated traffic workload on Smart Web (SW) can slow down
the network performance. This paper presents a congestion management strategy considering real time
activities in today’s smart web. With the SW context, cooperative packet recovery using resource
reservation procedure for TCP flows was adapted for mitigating packet losses. This is to maintain data
consistency between various access points of smart web hotspot. Using a real world scenario, it was
confirmed that generic TCP cannot handle traffic congestion in a SW hotspot network. With TCP in
scalable workload environments, continuous packet drops at the event of congestion remains obvious. This
is unacceptable for mission critical domains. An enhanced Link State Resource Reservation Protocol (LSRSVP)
which serves as dynamic feedback mechanism in smart web hotspots is presented. The contextual
behaviour was contrasted with the generic TCP model. For the LS-RSVP, a simulation experiment for TCP
connection between servers at the remote core layer and the access layer was carried out while using
selected benchmark metrics. From the results, under realistic workloads, a steady-state throughput
response was achieved by TCP LS-RSVP to about 3650Bits/secs compared with generic TCP plots in a
previous study. Considering network service availability, this was found to be dependent on fault-tolerance
of the hotspot network. From study, a high peak threshold of 0.009 (i.e. 90%) was observed. This shows
fairly acceptable service availability behaviour compared with the existing TCP schemes. For packet drop
effects, an analysis on the network behaviour with respect to the LS-RSVP yielded a drop response of about
0.000106 bits/sec which is much lower compared with the case with generic TCP with over 0.38 bits/sec.
The latency profile of average FTP download response was found to be 0.030secs, but with that of FTP
upload response, this yielded about 0.028 sec. The results from the study demonstrate efficiency and
optimality for realistic loads in Smart web contexts.
Practical active network services within content-aware gatewaysTal Lavian Ph.D.
The Internet has seen an increase in complexity due to the introduction of new types of networking devices and services, particularly at points of discontinuity known as network edges. As the networking industry continues to add revenue generating services at network edges, there is an increasing need to provide a systematic method for dynamically introducing and providing these new services in lieu of the ad-hoc approach that is in use today. To this end we support a phased approach to "activating" the Internet and suggest that there exists an immediate need for realizing Active Networks concepts at the network edges. In this context, we present our efforts towards the development of a Content-aware Active Gateway (CAG) architecture. With the help of two practical services running on our initial prototype, built from commercial networking devices, we give a qualitative and quantitative view of the CAG potential.
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband IJECEIAES
The impending next generation of mobile communications denoted 5G intends to interconnect user equipment, things, vehicles, and cities. It will provide an order of magnitude improvement in performance and network efficiency, and different combinations of use cases enhanced mobile broadband (eMBB), ultra reliable low latency communications (URLLC), massive internet of things (mIoT) with new capabilities and diverse requirements. Adoption of advanced radio resource management procedures such as packet scheduling algorithms is necessary to distribute radio resources among different users efficiently. The proportional fair (PF) scheduling algorithm and its modified versions have proved to be the commonly used scheduling algorithms for their ability to provide a tradeoff between throughput and fairness. In this article, the buffer status is combined with the PF metric to suggest a new scheduling algorithm for efficient support for eMBB. The effectiveness of the proposed scheduling strategy is proved through à comprehensive experimental analysis based on the evaluation of different quality of service key performance indicators (QoS KPIs) such as throughput, fairness, and buffer status.
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS ijwmn
The paper proposes a new method for the analysis and evaluation of the Quality of Service (QoS) in a
mobile Internet access scenario. In particular, the paper proposes a throughput evaluation method based
on PathChirp algorithm. The end-to-end bandwidth was estimated by means of the Self Loading of Periodic
Streams (SloPS) technique. The obtained measurements were then analyzed by estimating the degree of
correlation with other parameters that characterize the data transmission such as power, round trip time,
etc. Finally, in order to have greater spatial resolution performance guaranteed by an Internet service
provider, a 3D reconstruction method based on using drones is proposed and some preliminary results are
discussed.
Thus the article offers the model represented by algebraic equations and inequalities for routing and
policing traffic in infocommunication network. The novelty of the model is as follows: multiflow nature of
modern ICN is taken into account (1), i.е. a set of flows circling between different pairs of network routers are
considered simultaneously; coherent formalization of processes of traffic routing and policing within the model
that has lower dimensionality in comparison to known earlier is provided; the choice of optimality criterion, use
of which allows to implement multipath routing with consequent inclusion of paths as well as to organize
limitation of flow intensity on all the used routs simultaneously depending on their characteristics and flow
priority. According to the results of the analysis conducted we offer recommendations for choosing relation in
numerical values of routing metrics and service denial regarding the provision of the given values for the main
QoS characteristics, e.g. average packet delay. The model can be used as a basis for perspective protocol
decisions aimed at coherence of solutions for the tasks of traffic routing and policing. Further development of
the given model is possible under full account of stochastic characteristics of packet flows circling in the
network.
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.
The article looks into the current state of the art of dynamic routing protocols with respect to their
possibilities to react to changes in the Quality of Service when selecting the best route towards a
destination network. New options that could leverage information about the ever changing QoS parameters
for data communication are analysed and a Cisco Performance Routing solution is described more in
detail. The practical part of this work focuses on a design and implementation of a test bed that provides a
scalable laboratory architecture to manipulate QoS parameters of different data communications flowing
through it. The test bed is used in various use cases that were used to evaluate Cisco Performance Routing
optimization capabilities in different scenarios.
Efficient P2P data dissemination in integrated optical and wireless networks ...TELKOMNIKA JOURNAL
The Quality of Service (QoS) resource consumption is always the tricky problem and also
the on-going issue in the access network of mobile wireless part because of its dynamic nature of network
wireless transmissions. It is very critical for the infrastructure-less wireless mobile ad hoc network that is
distributed while interconnects in a peer-to-peer manner. Toward resolve the problem, Taguchi method
optimization of mobile ad hoc routing (AODVUU) is applied in integrated optical and wireless networks
called the adLMMHOWAN. Practically, this technique was carry out using OMNeT++ software by building
a simulation based optimization through design of experiment. Its QoS network performance is examined
based on packet delivery ratio (PDR) metric and packet loss probabilities (PLP) metric that consider
the scenario of variation number of nodes. During the performing stage with random mobile connectivity
based on improvement in optimized front-end wireless domain of AODVUU routing, the result is performing
better when compared with previous study called the oRia scheme with the improvement of 14.1% PDR
and 43.3% PLP in this convergence of heterogeneous optical wireless network.
Adaptive resource allocation and internet traffic engineering on data networkcsandit
This research paper describes the issues of bandwidth allocation, optimum capacity allocation,network operational cost reduction, and improve Internet user experience. Traffic engineering (TE) is used to manipulate network traffic to achieve certain requirements and meets certain
needs. TE becomes one of the most important building blocks in the design of the Internet backbone infrastructure. Research objective: efficient allocation of bandwidth across multiple paths. Optimum path selection. Minimize network traffic delays and maximize bandwidth utilization over multiple network paths. The bandwidth allocation is performed proportionally over multiple paths based on the path capacity.
The performance of the vehicular communication-clustering processTELKOMNIKA JOURNAL
For the new wireless systems and beyond, the intelligent transportation system is considered as one of the main features that could be covered in the new research topics. Furthermore, both high-speed data transmission and data processing play a crucial role for these generations. Our work covers two main propositions in order to attain an improvement in such intelligent systems performance. A clustering algorithm is proposed and presented for grouping mobile nodes based on their speeds with some modified head assignments processes. This will be combined with a parallel-processing technique that enhances the QoS. Mainly, this work concerns enhancing the V2V data transmission and the processing speed. Thus, a wavelet processing stage has been imposed to optimize the transmitted power phenomenon. In order to check the validity of such proposition, five main efficiency factors have been investigated; namely complementary cumulative distributions, bit rates, energy efficiency, the lifetime of cluster head and the ordinary nodes reattaching-head average times.
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
With the wide spread of WiFi hotspots, concentrated traffic workload on Smart Web (SW) can slow down
the network performance. This paper presents a congestion management strategy considering real time
activities in today’s smart web. With the SW context, cooperative packet recovery using resource
reservation procedure for TCP flows was adapted for mitigating packet losses. This is to maintain data
consistency between various access points of smart web hotspot. Using a real world scenario, it was
confirmed that generic TCP cannot handle traffic congestion in a SW hotspot network. With TCP in
scalable workload environments, continuous packet drops at the event of congestion remains obvious. This
is unacceptable for mission critical domains. An enhanced Link State Resource Reservation Protocol (LSRSVP)
which serves as dynamic feedback mechanism in smart web hotspots is presented. The contextual
behaviour was contrasted with the generic TCP model. For the LS-RSVP, a simulation experiment for TCP
connection between servers at the remote core layer and the access layer was carried out while using
selected benchmark metrics. From the results, under realistic workloads, a steady-state throughput
response was achieved by TCP LS-RSVP to about 3650Bits/secs compared with generic TCP plots in a
previous study. Considering network service availability, this was found to be dependent on fault-tolerance
of the hotspot network. From study, a high peak threshold of 0.009 (i.e. 90%) was observed. This shows
fairly acceptable service availability behaviour compared with the existing TCP schemes. For packet drop
effects, an analysis on the network behaviour with respect to the LS-RSVP yielded a drop response of about
0.000106 bits/sec which is much lower compared with the case with generic TCP with over 0.38 bits/sec.
The latency profile of average FTP download response was found to be 0.030secs, but with that of FTP
upload response, this yielded about 0.028 sec. The results from the study demonstrate efficiency and
optimality for realistic loads in Smart web contexts.
Practical active network services within content-aware gatewaysTal Lavian Ph.D.
The Internet has seen an increase in complexity due to the introduction of new types of networking devices and services, particularly at points of discontinuity known as network edges. As the networking industry continues to add revenue generating services at network edges, there is an increasing need to provide a systematic method for dynamically introducing and providing these new services in lieu of the ad-hoc approach that is in use today. To this end we support a phased approach to "activating" the Internet and suggest that there exists an immediate need for realizing Active Networks concepts at the network edges. In this context, we present our efforts towards the development of a Content-aware Active Gateway (CAG) architecture. With the help of two practical services running on our initial prototype, built from commercial networking devices, we give a qualitative and quantitative view of the CAG potential.
Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband IJECEIAES
The impending next generation of mobile communications denoted 5G intends to interconnect user equipment, things, vehicles, and cities. It will provide an order of magnitude improvement in performance and network efficiency, and different combinations of use cases enhanced mobile broadband (eMBB), ultra reliable low latency communications (URLLC), massive internet of things (mIoT) with new capabilities and diverse requirements. Adoption of advanced radio resource management procedures such as packet scheduling algorithms is necessary to distribute radio resources among different users efficiently. The proportional fair (PF) scheduling algorithm and its modified versions have proved to be the commonly used scheduling algorithms for their ability to provide a tradeoff between throughput and fairness. In this article, the buffer status is combined with the PF metric to suggest a new scheduling algorithm for efficient support for eMBB. The effectiveness of the proposed scheduling strategy is proved through à comprehensive experimental analysis based on the evaluation of different quality of service key performance indicators (QoS KPIs) such as throughput, fairness, and buffer status.
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS ijwmn
The paper proposes a new method for the analysis and evaluation of the Quality of Service (QoS) in a
mobile Internet access scenario. In particular, the paper proposes a throughput evaluation method based
on PathChirp algorithm. The end-to-end bandwidth was estimated by means of the Self Loading of Periodic
Streams (SloPS) technique. The obtained measurements were then analyzed by estimating the degree of
correlation with other parameters that characterize the data transmission such as power, round trip time,
etc. Finally, in order to have greater spatial resolution performance guaranteed by an Internet service
provider, a 3D reconstruction method based on using drones is proposed and some preliminary results are
discussed.
Thus the article offers the model represented by algebraic equations and inequalities for routing and
policing traffic in infocommunication network. The novelty of the model is as follows: multiflow nature of
modern ICN is taken into account (1), i.е. a set of flows circling between different pairs of network routers are
considered simultaneously; coherent formalization of processes of traffic routing and policing within the model
that has lower dimensionality in comparison to known earlier is provided; the choice of optimality criterion, use
of which allows to implement multipath routing with consequent inclusion of paths as well as to organize
limitation of flow intensity on all the used routs simultaneously depending on their characteristics and flow
priority. According to the results of the analysis conducted we offer recommendations for choosing relation in
numerical values of routing metrics and service denial regarding the provision of the given values for the main
QoS characteristics, e.g. average packet delay. The model can be used as a basis for perspective protocol
decisions aimed at coherence of solutions for the tasks of traffic routing and policing. Further development of
the given model is possible under full account of stochastic characteristics of packet flows circling in the
network.
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
The information and communication technologies (ICT) integrate different types of wireless communication to
provide IT-enabled services and applications. The great majority end devices are equipped with multiple network
interfaces such as Wi-Fi and 4G. Our goal is to integrate the available network interfaces and technologies to
enhance seamless communication efficiency and increase resources utilization. We proposed a heterogeneous
network management algorithm based on machine learning methods which includes roaming and sharing
functions. The roaming function provides the multiple network resources in physical and media access control
layers. The sharing function supports multiple network resources allocation and the service handover process
based on the Multi-Path TCP protocol. The simulation result also shows that the proposed scheme can increase
the network bandwidth utilization effectively. The sharing system could be used in home, mobile and vehicular
environments to realize ubiquitous social sharing networks.
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
The information and communication technologies (ICT) integrate different types of wireless communication to provide IT-enabled services and applications. The great majority end devices are equipped with multiple network interfaces such as Wi-Fi and 4G. Our goal is to integrate the available network interfaces and technologies to enhance seamless communication efficiency and increase resources utilization. We proposed a heterogeneous network management algorithm based on machine learning methods which includes roaming and sharing functions. The roaming function provides the multiple network resources in physical and media access control layers. The sharing function supports multiple network resources allocation and the service handover process based on the Multi-Path TCP protocol. The simulation result also shows that the proposed scheme can increase the network bandwidth utilization effectively. The sharing system could be used in home, mobile and vehicular environments to realize ubiquitous social sharing networks.
Talhunt is a leader in assisting and executing IEEE Engineering projects to Engineering students - run by young and dynamic IT entrepreneurs. Our primary motto is to help Engineering graduates in IT and Computer science department to implement their final year project with first-class technical and academic assistance.
Project assistance is provided by 15+ years experienced IT Professionals. Over 100+ IEEE 2015 and 200+ yester year IEEE project titles are available with us. Projects are based on Software Development Life-Cycle (SDLC) model.
Talhunt is a leader in assisting and executing IEEE Engineering projects to Engineering students - run by young and dynamic IT entrepreneurs. Our primary motto is to help Engineering graduates in IT and Computer science department to implement their final year project with first-class technical and academic assistance.
Project assistance is provided by 15+ years experienced IT Professionals. Over 100+ IEEE 2015 and 200+ yester year IEEE project titles are available with us. Projects are based on Software Development Life-Cycle (SDLC) model.
Performing Network Simulators of TCP with E2E Network Model over UMTS NetworksAM Publications,India
Wireless links losses result in poor TCP throughput since losses are perceived as congestion by TCP with the evolution of 3G technologies like Universal Mobile Telecommunication System (UMTS), the usage of TCP has become more popular for a reliable end-to-end (e2e) data delivery. However, TCP was initially designed for wired networks and therefore it suffers performance degradation due to the radio signal getting affected by fading, shadowing and interference. There are many strategies proposed by the research community on how to improve the performance of TCP over wireless links such as introducing link-layer retransmission, explicitly notifying the sender of network conditions or using new variants of TCP. As UMTS network coverage and availability are currently experiencing rapid growth, optimization of various internal components of its wireless network is very important. One of the optimization is the introduction of High Speed Downlink Packet Access (HSDPA). This architecture not only allows higher data rates but also more reliable data transfer by the introduction of Hybrid ARQ (HARQ). With this enhancement to the UMTS network, it becomes vital to see the performance of TCP in such a network. Therefore in this thesis, we try to evaluate two aspects of UMTS networks: first, the impact of HSDPA parameters like scheduling algorithm and RLC/MAC-hs buffer size on overall performance of TCP and second, to study the behaviour of two categories of TCP rate and flow control: loss based and delay based. Our simulation shows that delay based TCP tends to perform better than loss based TCP in our selected scenarios. The simulations are performed using the network simulator NS-2 with an e2e network model for enhanced UMTS (EURANE).
Multi port network ethernet performance improvement techniquesIJARIIT
An Ethernet has its own importance and space in network subsystem. In today’s resource-intensive engineering the
applications need to deal with the real-time data processing, server virtualization, and high-volume data transactions. The realtime
technologies such as video on demand and Voice over IP operations demand the network devices with efficient network
data processing as well as better networking bandwidth. The performance is the major issues with the multi-port network
devices. It requires the sufficient network bandwidth and CPU processing speed to process the real-time data at the context.
And this demand is goes on increasing. The new multi-port hardware technologies can help to improvements in the
performance of the virtualized server environments. But, these hardware technologies having their own limitations in terms of
CPU utilization levels and power consumption. It also impacts on latency and the overall system cost. This thesis will provide
the insights to some of the key configuration decisions at hardware as well as software designs in order to facilitate multi-port
network devices performance improvement over the existing infrastructure. This thesis will also discuss the solutions such as
Virtual LAN and balanced or symmetric network to reduce the cost and hardware dependency to improve the multi-port
network system performance significantly over the currently existing infrastructure. This performance improvement includes
CPU utilization and bandwidth in the heavy network loads.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ijgca
With the wide spread of WiFi hotspots, concentrated traffic workload on Smart Web (SW) can slow down the network performance. This paper presents a congestion management strategy considering real time activities in today’s smart web. With the SW context, cooperative packet recovery using resource reservation procedure for TCP flows was adapted for mitigating packet losses. This is to maintain data consistency between various access points of smart web hotspot. Using a real world scenario, it was confirmed that generic TCP cannot handle traffic congestion in a SW hotspot network. With TCP in scalable workload environments, continuous packet drops at the event of congestion remains obvious. This is unacceptable for mission critical domains. An enhanced Link State Resource Reservation Protocol (LSRSVP) which serves as dynamic feedback mechanism in smart web hotspots is presented. The contextual behaviour was contrasted with the generic TCP model. For the LS-RSVP, a simulation experiment for TCP connection between servers at the remote core layer and the access layer was carried out while using selected benchmark metrics. From the results, under realistic workloads, a steady-state throughput response was achieved by TCP LS-RSVP to about 3650Bits/secs compared with generic TCP plots in a previous study. Considering network service availability, this was found to be dependent on fault-tolerance of the hotspot network. From study, a high peak threshold of 0.009 (i.e. 90%) was observed. This shows fairly acceptable service availability behaviour compared with the existing TCP schemes. For packet drop effects, an analysis on the network behaviour with respect to the LS-RSVP yielded a drop response of about 0.000106 bits/sec which is much lower compared with the case with generic TCP with over 0.38 bits/sec. The latency profile of average FTP download response was found to be 0.030secs, but with that of FTP upload response, this yielded about 0.028 sec. The results from the study demonstrate efficiency and optimality for realistic loads in Smart web contexts.
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...ijccsa
With recent developments in cloud computing, a paradigm shift from rather static deployment of resources to more dynamic, on-demand practices means more flexibility and better utilization of resources. This demands new ways to efficiently configure networks. In this paper, we will characterize a class of competitive cloud services that telecom operators could provide based on the characteristics of telecom infrastructure through an applicable streaming service architecture. Then, we will model this architecture as a cost-based mathematic model. This model provides a tool to evaluate and compare the cost of software services for different telecom network topologies and deployment strategies. Additionally, with each topology it acts as a means to characterize the deployment solution that yields the lowest resource usage over the entire network. These applications are illustrated through numerical analysis. Finally, a proof-of-concept prototype is deployed to shows dynamic properties of the service in the architecture and the model above
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksIJECEIAES
This paper describes a framework application for the control plane of a network infras- tructure; the objective is to feature end-user applications with the capability of requesting at any time a customised end-to-end Quality-of-Service profile in the context of dynamic Service-Level-Agreements. Our solution targets current and future real-time applications that require tight QoS parameters, such as a guaranteed end-to-end delay bound. These applications include, but are not limited to, health-care, mobility, education, manufacturing, smart grids, gaming and much more. We discuss the issues related to the previous Integrated Service and the reason why the RSVP protocol for guaranteed QoS did not take off. Then we present a new signaling and resource reservation framework based on the cutting-edge network controller ONOS. Moreover, the presented system foresees the need of considering the edges of the network, where terminal applications are connected to, to be piloted by distinct logically centralised controllers. We discuss a possible inter-domain communication mechanism to achieve the end-to-end QoS guarantee.
Electrically small antennas: The art of miniaturizationEditor IJARCET
We are living in the technological era, were we preferred to have the portable devices rather than unmovable devices. We are isolating our self rom the wires and we are becoming the habitual of wireless world what makes the device portable? I guess physical dimensions (mechanical) of that particular device, but along with this the electrical dimension is of the device is also of great importance. Reducing the physical dimension of the antenna would result in the small antenna but not electrically small antenna. We have different definition for the electrically small antenna but the one which is most appropriate is, where k is the wave number and is equal to and a is the radius of the imaginary sphere circumscribing the maximum dimension of the antenna. As the present day electronic devices progress to diminish in size, technocrats have become increasingly concentrated on electrically small antenna (ESA) designs to reduce the size of the antenna in the overall electronics system. Researchers in many fields, including RF and Microwave, biomedical technology and national intelligence, can benefit from electrically small antennas as long as the performance of the designed ESA meets the system requirement.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
1. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1720
www.ijarcet.org
Abstract
In this is an era of drastic evolution
Telecommunications, packet data communication has gained
paramount attention due to increased internet multimedia
usage. One of the challenges faced by telecom companies is to
provide robust and powerful network components that are
capable to handle the tremendous load of traffic and data on it.
Companies evaluate their products performance before
releasing them to the market by applying a large amount of
generated traffic in order to measure their capability under
traffic load; powerful solutions are hence needed for generating
traffic and modeling various telecom protocols. The
performance is also need to be evaluated for other scenarios that
exists in the real network. The scenarios include capacity tests,
busy hour call loads, rainy day scenarios, and different types of
handoffs. Hence there is a requirement of a simulator tool which
evaluates the product’s performance. Packet Load Generator
(PLG) is a tool developed to evaluate Network Controller.
Index Terms— Network Controller, RF path loss,
Semi- marcovian Traffic, Traffic Models.
I. INTRODUCTION
The ever increasing need for the multimedia communication
over telecom network is guiding the telecom industry to better
the existing features and data rates. Thus developed new or
enhanced technologies cannot be introduced directly to the
public. The expected or the theoretical figures from the
network elements have to be tested rigorously for their
capacity before it is deployed. The vendors cannot test and
verify the figures and functionalities with the existing real
world network. So there is a need for the network simulators
that imitate the actual traffic scenarios and hence validate the
newly developed network components.
Network components being complex entities challenge
building such simulator tools. The telecom network
components are majorly IP packet networks and thus such
simulation tool can be equally employed for all kinds of IP
networks for capacity and functionality testing or the existing
packet generator tool can be employed with new
functionalities embedded.
The tool has to consider the intermediate protocols and
interfaces lying in connecting such network components. It
have to include the air interfaces between switching center to
Access Terminals, the Backhaul interfaces and protocols with
the main network element and the IP link with the PDSN
(Packet Data Serving Node) for internet connections. Major
parameters of the network components determined will be the
delays and losses of the packets transmitted.
Major challenge for the tool design is to create a virtual
environment almost similar to the actual 3G network.
Functionalities like Idle, Soft, Softer, Virtual Soft and Virtual
Softer Handoff's are to be simulated between the tool
simulated cells with the handoff's specified between which
particular cells or sectors clearly. Measurements like Busy
Hour Call Attempts( ), Connection Disconnects( connection
and disconnection requests per hour to a particular cell ) are to
be simulated which are generally the mathematical
considerations made from the times of Public telephone lines
capacity analysis. Traffic is to be measured on both the sides
Reverse Link (RL) and Forward Link (FL) and are measured
in kilobitspersecond(kbps) and displayed to the user so that he
can notice the rise and drops in the traffic with the required
functionality and required number of cells simulated.
Many mathematical models are suggested for the figures
used in generating the random numbers used in any of the
steps here in the simulation. Generally the number of requests
are said to be following Poisson distribution and some of the
parameters like traffic are said to follow Erlang's distribution
curve. Also Gaussian distribution functions holds similar to
the Register and Deregistering the calls.
Different people have put forth their ideas of different
aspects of this tool but a technical paper that enumerates all
the conceptual requisites of such a tool is hardly available.
This was our motive and this paper describes the key
requirements of building an efficient simulation tool that
exactly imitates the complex telecom network components
and hence aids for capacity and performance testing. The
traffic generation procedure, proposed in this paper, is highly
modular. The proposed traffic generator architecture must be
flexible and capable of producing traffic streams compliant
with fully general high-level traffic models, either stochastic
or deterministic. The software that drives the traffic
generation process should employ several kinds of
optimization, for removing limitations due to hardware speed
and memory constraints of the host machine, and for ensuring
that traffic streams corresponding to models with a wide range
of parameters can be generated in an efficient and reliable
manner. This tool can be used in conjunction with the traffic
generator to support measurement-based performance
evaluation in experimental test beds.
We give an example of the state of art of such a tool for the
CDMA EVDO case and same techniques or architecture can
be followed for UMTS networks with slight protocol and
interface changes.
This paper first gives an overview of a EVDO network
under next heading. The next heading deals with theory
behind modeling the internet traffic for data used in data
communication, then the basic architecture of the state space
model is described, later we discuss about the importance of
physical layer considerations in UMTS network and at the
end, we give a over view of how the tool architecture.
Packet Load Generator for Telecom Networks
Niranjan U, Ramacharyulu P Govardhanam, K Vijaya
2. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1721
www.ijarcet.org
II. INTERNET TRAFFIC THEORY
Observations of traffic on network links typically reveal
intensity levels (in bits/sec) averaged over periods of 5 to 10
minutes which are relatively predictable from day to day.
Systematic intensity variations occur within the day reflecting
user activity. It is possible to detect a busy period (usually in
the afternoon between 2 and 5 pm) during which the traffic
intensity is roughly constant. This constancy suggests that
Internet traffic, like telephone traffic, can be modeled as a
stationary stochastic process here statistical variations occur
about an underlying constant intensity. Busy period
performance is then estimated by the long term average
behavior derived for the stationary process.[2]
But still there is some ambiguity in the literature that
whether the statistical theory of public telephone network can
be applied as it is to the TCP or UDP supported internet traffic
systems. The precise characteristics of this stationary process
depend on the composition of Internet traffic. Currently, some
90 to 95% of Internet packets use TCP and correspond to the
transfer of digital documents of one form or another (Web
pages, data files, MP3 tracks …). The congestion avoidance
algorithms of TCP cause throughput to vary elastically in
reaction to random changes in the set of transfers in progress.
A small but growing proportion of traffic relates to inelastic
streaming audio and video transmission for both interactive
and playback applications.
A. Traffic Objects
The traffic process can be described in terms of the
characteristics of a number of objects, including packets,
bursts, flows, sessions and connections, depending on the
time scale of relevant statistical variations. The preferred
choice for modeling purposes depends on the object to which
traffic controls are applied. Conversely, in designing traffic
controls it is necessary to bear in mind the facility of
characterizing the implied traffic object. This consideration is
particularly important in the design of the future Internet
where only the datagram and the broad destination-based
aggregate used in routing are currently recognized. Traffic
characterization proves most convenient at an intermediate
flow level.
A flow is defined for present purposes as the unidirectional
succession of packets relating to one instance of an
application (sometimes referred to as a microflow). For
practical purposes, the packets belonging to a given flow have
the same identifier (e.g., source and destination addresses and
port numbers) and occur with a maximum separation of a few
seconds. Flows are frequently emitted successively and in
parallel in what are loosely termed ―sessions.‖ A session
corresponds to a continuous period of activity during which a
user generates a set of elastic or streaming flows.
Some network service models define the notion of
―connection‖ and control resource allocation by means of
explicit signaling exchanges. The connection might be set up
for a particular flow or used over a long period for an
aggregation of flows between given network end points. A
significant difficulty resides in defining parsimonious traffic
descriptors representing the impact the connection is likely to
have on network performance. Signaling overhead may also
prove excessive, particularly when each connection relates to
an individual flow.
B. Arrival Processes And Service Requirements
It is well known that the arrival process of IP packets can
exhibit extreme rate variations at multiple time scales. First
reports of this behavior more than ten years ago have given
rise to a large amount of research aiming to explain the
so-called self similarity phenomenon and to predict its impact
on network. The main reason for rate fluctuations at time
scales greater than a few hundred milliseconds turns out to be
extreme variability in the size of the flows making up the
observed packet process. Yet more extreme variability (so
called multi-fractal behavior) occurs at smaller time scales
due to the burstiness induced by TCP. It proves much simpler
to describe traffic in terms of flows.
The arrival process of flows in a backbone link typically
results from the superposition of a large number of
independent sessions. Observations confirm the predictable
property that session arrivals can be assimilated to a Poisson
process. This means simply that the probability of a new
arrival in a short interval of length dt is equal to λdt, where λ is
the arrival intensity, and is independent of all past activity. A
Poisson process results naturally when traffic is due to the
independent activity of a very large population of users, each
individually having a very small intensity.
As a first approximation, it is not unreasonable to assume
that individual flows also occur as a Poisson process. To
ignore the correlation between flow arrivals within the same
session is not necessarily significant when the number of
sessions is large. It is also true that results derived under the
simple Poisson assumption are also often true under more
general assumptions.
III. TRAFFIC GENERATION THROUGH HIGH-LEVEL
MODELS
A traffic model is one that have different states of the
simulation tool and the advancements of the states are carried
on according to random process that suits the particular
physical process. Consider an example of Registering calls
and states of tool is the number of calls registered per minute
and this is modeled using Gaussian Process.
In [3], they discuss about the model for the system to
change its state from one to another based on the traffic
models and the present event.
A. The Structure of Semi-Markov Traffic Models
The traffic generator adopts a high level traffic specification
in terms of (time invariant) semi- Markovian models.
According to this framework, each traffic model is
characterized by a set of N states. During a sojourn at some
state i, a constant, state-dependent data rate ri is maintained.
(The modeling framework assumes a ―fluid-flow‖ approach,
according to which more complex cell level rate fluctuations
within each state can be ignored. This approach is entirely
adequate for representing the important burst level
phenomena, while at the same time avoiding excessive
low-level complexity.) Transitions among states occur
according to a discrete irreducible Markov chain with a
transition probability matrix P = [pij ]. The sojourns at a state
i are independent and identically distributed random
variables, of a general probability distribution function (PDF)
Fi(·). The well-known MMRP traffic models, where all
3. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1722
www.ijarcet.org
sojourn times are exponentially distributed, are an important
special case of semi-Markovian models. [3]
B. Top Level Architecture
From a high level view, traffic generation corresponding to
a semi-Markovian model consists of a sequence of events
(high level traffic events—HLTEs). Each HLTE signifies the
emission of cells at a constant rate ri, depending on the
currently occupied state i, for a duration chosen through
sampling the respective PDF governing the sojourns at this
state.
Fig.1. Basic functional diagram for generating
semi-Markovian traffic.
With the notion of an HLTE at hand, the task of semi-
Markovian traffic generation requires an algorithm to decide
on the next state to be occupied by the model (next state
decision algorithm—NSDA) and an algorithm to sample the
sojourn time that will be spent at the chosen state (sojourn
time decision algorithm—STDA). Furthermore, the nature of
ATM and the structure of the traffic generation hardware
suggest the need for two more mechanisms: One to convert
data-rates, and the durations for which these rates are
sustained, to ETEPs, i.e., (ID,NC) pairs (rate to pairs
conversion algorithm—RPCA) and another to encapsulate the
high-level traffic event sequence into units of size HMS (high
level traffic events encapsulation algorithm—TEEA).The
relation between these building blocks is depicted in Fig. 3.
C. The Next State Decision Algorithm (NSDA)
Given as input an Integer value expressing the state
visited last time, the NSDA determines the state to be visited
next. For this purpose, NSDA makes use of the transition
probabilities matrix P = [pij ], as follows: During an
initialization step, performed once before the actual traffic
generation process, NSDA computes the aggregate transition
probabilities matrix A = [aij ], where aij = _j k=0 pik, for all i,
j = 0, ..., N − 1. During normal operation, given the state i
currently occupied, the next state is decided upon by drawing
a random number s in the interval [0, 1) and determining the
smallest index j, such that the quantity aij exceeds s. Since the
transition probability matrix P does not change over time, the
partial probability sums are also invariant and having them
ready into the elements of A reduces the time needed to
determine the next state.
D. The Sojourn Time Decision Algorithm (STDA)
STDA consists of two modules: STDA 1, an initialization step
performed once in startup, and STDA 2, which is executed
repeatedly during the generation process. The preprocessing
stage of STDA 1 undertakes the conversion of the sojourn
PDFs into a form that allows for the efficient selection of
actual sojourn samples by STDA 2 during on-line operation.
Introduction of the preprocessing makes sense because the
PDFs do not change over time. More specifically, STDA 1
reads data that determine the PDFs governing the sojourn
times at all states of the model. Then, for each state the
algorithm computes values of the respective PDF2 and creates
an array of size M that contains inverse distribution function
values (i.e., sojourn time values), which correspond to
equally spaced PDF values in the range from 0 to (M − 1)/M.
The dimension M (common to the arrays of all states) is
chosen large enough to ensure a sufficiently dense
representation of the PDF, while also avoiding excessive
storage requirements. Once the arrays have been produced,
STDA 1 exercises the RPCA algorithm upon each element of
each array, taking as input the sojourn time of this element and
the data rate associated with the corresponding state, and
transforms this input into a collection of ETEPs. This is done
in a way explained in the next subsection and further detailed
in Appendix-A. During the cell generation process, the STDA
2 performs (in a highly efficient manner) a much simpler task,
namely that of drawing a random index into the array
corresponding to the state picked by the NSDA. The low-level
traffic event information in the chosen element is then fed into
TEEA, which has the responsibility of generating HMS
ETEPs for download to the hardware. TEEA is described in
Section III-F.
IV. PHYSICAL LAYER CONSIDERATIONS:
The advance communication theory proves that the RF
multipath loss is less in the CDMA links compared to the
TDM or FDM links due to its wide band nature, Hence
physical layer consideration would not matter much in
CDMA network simulation but is a point to be considered for
UMTS networks.[4]
Most of the available commercial traffic generators utilize
the network resources on the fixed side of the cellular
network. This is a big disadvantage because such generators
produce traffic without involving the overload of the air
interface, which is the most important interface (Uu) at the
UMTS network. In this way, we have not a complete and
realistic view of the traffic generation, because it is well
known that several congestion problems on 3G networks
occur due to air interface limitations. The use of air interface
resources, from a 3G traffic generator is very important,
because CDMA networks like UMTS, have several crucial
mechanisms that are implemented on RF layer, such as the
open loop power control, admission control and fast close
loop power control at both directions uplink/downlink. On the
other hand, the most common use of a traffic generator is the
ability to produce enormous traffic, in order to produce
overload and congestion scenarios, for evaluating the
response of the network in such situations.
In an UTRAN network the traffic generator, which works
from the fixed network side will produce faulty and optimistic
4. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1723
www.ijarcet.org
results comparing to traffic generator, which implements an
―end to end‖ traffic generation. This means that on an UMTS
traffic generator it is important to emulate not only the
produced Erlang at the specific traffic scenario with
determined services, but also to provide information about the
response of the network to random and complex RF pathloss
environment with multipath fadings etc.
Also, the majority of traffic generators need specific
equipment and hardware, like terminals and control consoles,
which is a minus point due to incompatibility. This
proprietary architecture sometimes provides lack of
scalability and of course increases the overall cost of the
platform. The available traffic generators could be controlled
only locally, which is not very practical. Also there is no
capability to send the results and statistics remotely to a
central database. [4]
In [5], a separate simulator tool design is discussed to
imitate the RF losses in UMTS network.
Rayleigh fading generation
Generally in wireless transmission scenarios where a receiver
is in motion relative to a transmitter with no line-of-sight path
between their antennas, Rayleigh fading is often a good
approximation of realistic channel conditions. The term
Rayleigh fading channel refers to a multiplicative distortion
h(t) of the transmitted signal s(t), as in y(t) = h(t) . s(t) + n(t)
where, y(t) is the received waveform and n(t) is the noise. The
TGP is going to implement the fading generation, by
performing a sampled version of the channel waveform h(t) in
a statistically accurate and computationally efficient fashion.
Thus, with the use of specific microwave filters and polyphase
interpolators, we could produce such fadings on the Uu
interface. But in our prototype we could emulate these
fadings, with very fast alterations on the attenuation level on
the programmable attenuators.
The channel waveform h(t) is modeled as a
wide-sensestationary complex Gaussian process with zero
mean, which makes the marginal distributions of the phase
and amplitude at any given time uniform and Rayleigh,
respectively, hence the term Rayleigh fading. The
autocorrelation properties of the random process h(t) are
governed by the Doppler frequency fD, as in[ ]:
where Jo({) is the zero-order Bessel function of the first kind.
V. WORKING PROTOTYPE
Let us consider a CDMA EV-DO network as shown in the
figure. Let us assume we are manufacturing an RNC and as
explained earlier, it is really important to make sure of its
capacity before rolling to down to the market. So, the tool that
does this task needs all the requisites explained before. Let us
consider we are using machines with any flavor of Unix
operating system and works influenced by the before
mentioned algorithms and design.
As we are analyzing an RNC, which is at the middle of the
whole network, with network components on both sides, and
packets sent from one side is received and sent to the
components on the other side. This requires a simulation tool
that should be capable of sending packets to the RNC and at
the same time should be able to capture the packets from the
other end and analyze it. Thus there is a need of a feedback
type of architecture and complicates the design.
Figure 2. Basic block diagram of EV-DO network
The figure 3 gives a high level diagram of the possible
simulation tool. One side, it acts as a generator and other side,
analyzer. Some literature describes building two separate
tools for these two purposes as Generator tool and Analyzer
tool [1]. But extra complexities are to be faced for
synchronizing both the tools and two separate architectures
required for two different tools. In measuring delay and
throughputs of the RNC under test, tools on both the sides
must be matched in time and parameters. Small variations
might lead to wrong measurements. Hence we, in this paper
propose a single simulation tool that is capable of doing both
the functions together. This includes the traffic model which
is very near to the actual traffic scenarios in the existing
networks. And the states changes are modeled by the next
state algorithm referred earlier.
Figure 3. High level architecture
Since the traffic analyzer has to cope with the real time
issues like computation of loss-oriented metrics and logging
of results, there is a need for an autonomous entity that can
work with the real time constraints. The performance of the
traffic analyzer depends on the reduction in time consumption
in processing the packets in real time. The module has to pass
system calls each time a packet has to be processed. Instead of
this, if the control is passed to the Unix kernel space and the
packet processing module be implemented to work in the
kernel space, then the overhead of system calls can be
eliminated. Hence UNIX kernel space will be the best choice
for the intended purpose.
The interfaces of the tool with other network components
like HCS (HDR Cell Site) or the link with PDSN takes place
5. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1724
www.ijarcet.org
in different interfacing protocols in different levels on the
protocol stack. Hence the packets destined to the different
components are to be prepared with the respective protocols
and sent.
Apart from design and architecture, the simulation tool
needs a good User Interface for the users to effectively and
easily interact with the tool. Some literature deals with the
geographical maps of urban or rural areas based on the RF
path losses available from experimentation and GPS services
are used to calculate the attenuation at each Access
Terminal.[2]
Other useful information that that are desired by the
user are the data rates on both the sides, time of the simulation
and the number of calls registered and de-registered per hour
basis. These data serve as the observations of the capacity
testers and decisions are made based on these data.
Figure 4 Prototype of User Activity window
The figure 4 gives an overview of a User window that gives
the live details of some of the important details to the user.
There will be a heartbeat time interval within which the tool
gets the values from the network and refreshes the same on the
window. Here Register deregisters are the number of Access
Terminals registered and deregistered within the heartbeat
interval. FL and RL are the link between Cell and AT and vice
versa. The traffics on these links are also displayed. If the user
is running the functionality of any different kind of hand-off,
the number of hand-off's taken place per time interval and
hand-off type is displayed. One of the main scenarios tested
for telecom networks is Busy Hour Calling Attempts(BHCA)
is also considered in the tool and the numbers are displayed on
the user activity window. All these values are printed in their
respective windows in a line joining points pattern and user
can see the up's and down's occurred across the simulation
period. Decreasing the heartbeat time gives more precise
updates and come with disadvantage of consuming more
processor and memory resources.
VI. CONCLUSION
In this paper we have presented a prototype traffic generator
that can be used in CDMA networks and gives the ability
operators to validate their networks. This is very important
tool for the companies working on development and
enhancements of telecom network components. The paper
does not include any results, as the system cannot be
compared with similar one. However the systems are build on
such architecture and is used widely.
The system concept is simple; though innovative and
can strongly support the operator in its planning and
acceptance needs. In the future the prototype will become a
commercial product, including other air-interface modules as
well.
ACKNOWLEDGMENT
I am thankful to Alcatel-Lucent, Bangalore and my
manager, Ramacharyulu GP and guide Mrs. K Vijaya, for
their constant encouragement, guidance and support since
beginning, which has transformed me as a ―Subject Matter
Expert‖.
Last but not least, I would like to extend my gratitude to all
those who indirectly supported me for the success of this
paper.
REFERENCES
[1] Loukatos, L. Sarakis, K. Kontovasilis, C. Skianis, G.
Kormentzas, "Tools And Practices For Measurement–Based
Network Performance Evaluation", The 18th Annual IEEE
International Symposium on Personal, Indoor and Mobile Radio
Communications (PIMRC'07), 2007.
[2] Jim W. Roberts, France Telecom R&D, "Traffic Theory and the
Internet", IEEE Communications Magazine, 2001.
[3] Dimitrios Loukatos, Lambros Sarakis, Kimon Kontovasilis, and
Nikolas Mitrou ,―An Efficient ATM Traffic Generator for the
Real-Time Production of a Large Class of Complex Traffic
Profiles‖, Journal of communications and networks, vol. 7, no.
1, march 2005.
[4] Nikolaos Chr. Papaoulakis, Maria Marchitti, Sofoklis
Kyriazakos,Neeli Prasad, "Traffic Generation Platform in
W-CDMA Networks", IEEE 2007.
[5] Fratu, S Halunga, D N Vurreanu, ―Radio Link Simulation
Method For Umts Communications In Rayleigh Fading
Environment‖, IEEE 2003.
Niranjan U, presently pursuing M.Tech in Digital Communication at
BMSCE, Bangalore. I did B.E in Telecommunications from BNMIT,
Bangalore and published a paper earlier on Speech encoding in IJCA.
Presently I am doing internship in Alcatel Lucent in a tools development
team for EVDO technology.
Mr. Ramacharyulu GP is presently Technical Manages in Alcatel-Lucent
India Limited, Bangalore in a DO tools development team. He completed his
B.Tech in Andhra University and M.S. in BITS, Pilani. He has more than 25
years of experience. He have worked on various telecommunication projects
in companies like Ericson, HP, ALU on different Simulation tools for
Wireless, 2G, 3G technologies.
Mrs. K Vijaya is currently Assistant professor at BMS College of
Engineering, Bangalore. She has done B.E and M.Tech under Electronics
and Communications. She has 15 years of industrial experience and 6 years
of teaching experience. She has guided many M.Tech and B.E level projects
and published many technical papers.