International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Performance Analysis of WiMAX and LTE Using NS-2IJERA Editor
The increasing use of wireless devices and in particular smart phones has resulted the need for greater capacity
and higher speed than the existing network technologies. Hence, LTE (Long Term Evolution) and WiMAX
(Worldwide Interoper- ability for Microwave Access) became the two leading technologies. Services are
increasingly shifting from voice to data and from circuit-switched to packet-switched ones. Battle between LTE
and WiMAX technologies is already heating up with WiMAX being ahead due to availability of standards
through IEEE 802.16 and is up and running but lacks in substantial roll out plans due to cost. The targets for
LTE indicate bandwidth increases as high as 100 Mbps on the downlink, and up to 50 Mbps on the uplink.
However, this potential increase in bandwidth is just a small part of the overall improvement LTE aims to
provide. This study illustrates the model and representation of LTE links and traffics using NS-2 network
simulator and observation of TCP performance investigated. The Evaluation of the network performance with
TCP is mainly based on congestion window behavior, throughput, average delay and lost packet.
Performance Evaluation of Interactive Video Streaming over WiMAX Network IJECEIAES
Nowadays, the desire of internet access and the need of digital encodings have influenced quite a large number of users to access high quality video application. Offering multimedia services not only to the wired but to wireless mobile client is becoming more viable. In wireless medium, videostreaming still has high resource requirements, for example, bandwidth, traffic priority, smooth play-backs. Therefore, bandwidth demands of these applications are far exceeding the capacity of 3G and Wireless Local Area Networks (LANs). The current research demonstrates the introductory understanding of the Worldwide Interoperability for Microwave Access (WiMax) network, applications, the mechanisms, its potential features, and techniques used to provide QoS in WiMAX, and lastly the network is simulated to report the diverse requirements of streamed video conferencing traffic and its specifications. For this purpose two input parameters of video traffic are selected, i.e, refresh rate, which is monitored in terms of frames per second and pixel resolutions which basically counts the number of pixels in digital imaging. The network model is developed in OPNET. Different outcomes from simulation based models are analyzed and appropriate reasons are also discussed. Apart from this, the second aim of the current research is to address whether WiMAX access technology for streaming video applications could provide comparable network performance to Asymmetric Digital Subscriber Line (ADSL). For this purpose network metrices such as End to End delay and throughput is taken into consideration for optimization.
This document discusses various research topics related to proactive networking and edge computing. It begins with an outline of topics including edge caching, mobile edge computing (MEC), 5G vehicle-to-everything (V2X), virtual reality (VR), unmanned aerial vehicles (UAVs), and ultra-reliable low-latency communications (URLLC). It then discusses the need to move from reactive to proactive networking approaches to meet new requirements from applications like VR and industry 4.0. Key challenges discussed include time-varying content popularity, hierarchical caching, fog/edge computing with mobility, and ultra-reliable low-latency networking.
The document discusses research toward efficient video perception through artificial intelligence. It describes how video perception is challenging due to the large volume and diversity of video data and limited computing platforms. The research explores techniques like learning to skip redundant computations by reusing what is computed in previous frames. It also examines determining computation gates for skip convolutions and early exiting from neural networks conditionally based on frame complexity. The techniques aim to efficiently run video perception on devices without sacrificing accuracy and provide speed-ups over state-of-the-art methods for tasks like object detection and pose estimation.
Wi MAX Deinter leaver’s Address Generation Unit through FPGA Implementationijceronline
The IEEE 802.16 standard, commonly known as WiMAX has broadband wirelessaccess over long distance. WiMAX has evolved from 802.16 to 802.16d for fixedwireless access and IEEE 802.16e standard is for mobility support. WiMAX Forumcreated the name "WiMAX". The forum describes WiMAX as "a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL". WiMAX is similar to Wi-Fi, but it can enable usage at much larger scale and at faster speeds [1]. Inorder to minimize the effect of burst error, the channel interleaver/deinterleaver employed in the WiMAX transreceiver is used. The channel interleaver/deinterleaver consists of two memory blocks and an address generator. The objective of this project is to implement an area and delay efficient circuitry for address generator for WiMAX 2- D Deinterleaver using the Xilinx FPGA for all permissible code rates and modulation schemes. This project also build up a generalized circuit for all permissible Ncbps without manual computation of column number.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
The document discusses the key requirements and principles for designing the 5G network architecture. It outlines that 5G networks will utilize Network Function Virtualization (NFV) and Software Defined Networking (SDN) to provide increased flexibility. NFV allows network functions to be implemented through software on industry standard servers, while SDN separates the network control and user planes. The 5G architecture aims to benefit from existing LTE deployments but avoid inter-system dependencies. It should also enable devices to connect via multiple links and RATs to leverage multi-connectivity.
The document provides an overview of 4G and 5G mobile network architectures as well as an introduction to device-to-device (D2D) network technology. It describes the key features and components of 4G networks including the evolved packet core and how 5G networks aim to achieve much higher data rates and connectivity for many more devices. The document also outlines the benefits of D2D communication, how it can operate in both licensed and unlicensed spectrum, and some potential applications including multi-user cooperative communication and vehicle-to-vehicle networks.
Performance Analysis of WiMAX and LTE Using NS-2IJERA Editor
The increasing use of wireless devices and in particular smart phones has resulted the need for greater capacity
and higher speed than the existing network technologies. Hence, LTE (Long Term Evolution) and WiMAX
(Worldwide Interoper- ability for Microwave Access) became the two leading technologies. Services are
increasingly shifting from voice to data and from circuit-switched to packet-switched ones. Battle between LTE
and WiMAX technologies is already heating up with WiMAX being ahead due to availability of standards
through IEEE 802.16 and is up and running but lacks in substantial roll out plans due to cost. The targets for
LTE indicate bandwidth increases as high as 100 Mbps on the downlink, and up to 50 Mbps on the uplink.
However, this potential increase in bandwidth is just a small part of the overall improvement LTE aims to
provide. This study illustrates the model and representation of LTE links and traffics using NS-2 network
simulator and observation of TCP performance investigated. The Evaluation of the network performance with
TCP is mainly based on congestion window behavior, throughput, average delay and lost packet.
Performance Evaluation of Interactive Video Streaming over WiMAX Network IJECEIAES
Nowadays, the desire of internet access and the need of digital encodings have influenced quite a large number of users to access high quality video application. Offering multimedia services not only to the wired but to wireless mobile client is becoming more viable. In wireless medium, videostreaming still has high resource requirements, for example, bandwidth, traffic priority, smooth play-backs. Therefore, bandwidth demands of these applications are far exceeding the capacity of 3G and Wireless Local Area Networks (LANs). The current research demonstrates the introductory understanding of the Worldwide Interoperability for Microwave Access (WiMax) network, applications, the mechanisms, its potential features, and techniques used to provide QoS in WiMAX, and lastly the network is simulated to report the diverse requirements of streamed video conferencing traffic and its specifications. For this purpose two input parameters of video traffic are selected, i.e, refresh rate, which is monitored in terms of frames per second and pixel resolutions which basically counts the number of pixels in digital imaging. The network model is developed in OPNET. Different outcomes from simulation based models are analyzed and appropriate reasons are also discussed. Apart from this, the second aim of the current research is to address whether WiMAX access technology for streaming video applications could provide comparable network performance to Asymmetric Digital Subscriber Line (ADSL). For this purpose network metrices such as End to End delay and throughput is taken into consideration for optimization.
This document discusses various research topics related to proactive networking and edge computing. It begins with an outline of topics including edge caching, mobile edge computing (MEC), 5G vehicle-to-everything (V2X), virtual reality (VR), unmanned aerial vehicles (UAVs), and ultra-reliable low-latency communications (URLLC). It then discusses the need to move from reactive to proactive networking approaches to meet new requirements from applications like VR and industry 4.0. Key challenges discussed include time-varying content popularity, hierarchical caching, fog/edge computing with mobility, and ultra-reliable low-latency networking.
The document discusses research toward efficient video perception through artificial intelligence. It describes how video perception is challenging due to the large volume and diversity of video data and limited computing platforms. The research explores techniques like learning to skip redundant computations by reusing what is computed in previous frames. It also examines determining computation gates for skip convolutions and early exiting from neural networks conditionally based on frame complexity. The techniques aim to efficiently run video perception on devices without sacrificing accuracy and provide speed-ups over state-of-the-art methods for tasks like object detection and pose estimation.
Wi MAX Deinter leaver’s Address Generation Unit through FPGA Implementationijceronline
The IEEE 802.16 standard, commonly known as WiMAX has broadband wirelessaccess over long distance. WiMAX has evolved from 802.16 to 802.16d for fixedwireless access and IEEE 802.16e standard is for mobility support. WiMAX Forumcreated the name "WiMAX". The forum describes WiMAX as "a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL". WiMAX is similar to Wi-Fi, but it can enable usage at much larger scale and at faster speeds [1]. Inorder to minimize the effect of burst error, the channel interleaver/deinterleaver employed in the WiMAX transreceiver is used. The channel interleaver/deinterleaver consists of two memory blocks and an address generator. The objective of this project is to implement an area and delay efficient circuitry for address generator for WiMAX 2- D Deinterleaver using the Xilinx FPGA for all permissible code rates and modulation schemes. This project also build up a generalized circuit for all permissible Ncbps without manual computation of column number.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
The document discusses the key requirements and principles for designing the 5G network architecture. It outlines that 5G networks will utilize Network Function Virtualization (NFV) and Software Defined Networking (SDN) to provide increased flexibility. NFV allows network functions to be implemented through software on industry standard servers, while SDN separates the network control and user planes. The 5G architecture aims to benefit from existing LTE deployments but avoid inter-system dependencies. It should also enable devices to connect via multiple links and RATs to leverage multi-connectivity.
The document provides an overview of 4G and 5G mobile network architectures as well as an introduction to device-to-device (D2D) network technology. It describes the key features and components of 4G networks including the evolved packet core and how 5G networks aim to achieve much higher data rates and connectivity for many more devices. The document also outlines the benefits of D2D communication, how it can operate in both licensed and unlicensed spectrum, and some potential applications including multi-user cooperative communication and vehicle-to-vehicle networks.
This document proposes a new platform called CAAP (Cluster As Application Platform) that allows distributed applications to run on wireless device clusters. The key aspects are:
1. Replacing wired links between high-performance computing nodes with wireless D2D (device-to-device) links between mobile devices.
2. Allowing user-programmable networking beyond traditional protocols by programming RDMA verbs.
3. Pooled mobile device clusters can join multiple clusters simultaneously, running multiple applications and instances on shared resources. This opens new opportunities for distributed and edge computing applications.
3GPP Standardization Status
Candidate Technologies for B4G and Beyond
• Device to Device (D2D) Communication
• Full Dimension MIMO (FD ‐ MIMO)
• CoMP with Non ‐ Ideal Backhaul
• Network Assisted interference Cancelation and Suppression (NAICS)
• Millimeter Wave (mmWave) Communication
Concluding Remarks
Acknowledge 09 Useraspecten En Evaluatie Ilse MariëN Ibbt Smit Vubimec.archive
This document discusses ETSI's work towards standardizing cognitive radio technologies. It provides background on ETSI as a standards organization and describes its RRS Technical Committee, which has four working groups studying different aspects of cognitive radio standardization, such as system architecture and a cognitive pilot channel. The document explains that standardization is needed as cognitive radio capabilities are being introduced and to facilitate cooperation among stakeholders in the heterogeneous wireless industry.
11.performance evaluation of mpeg 0004www.iiste.org call for-paper video tran...Alexander Decker
This document evaluates the performance of transmitting MPEG-4 video over IP networks using two different network types: best-effort and Quality of Service (QoS). The researchers used the NS-2 network simulator along with additional tools to encode video, transmit it over simulated networks, then evaluate the received video quality. Key performance metrics like peak signal-to-noise ratio (PSNR), throughput, and frame/packet statistics were calculated and compared between the best-effort and QoS networks. The results showed that transmitting MPEG-4 video over a QoS network achieved better performance than a best-effort network according to the measured metrics.
Performance evaluation of mpeg 4 video transmission over ip-networksAlexander Decker
This document summarizes research evaluating the performance of transmitting MPEG-4 video over IP networks with and without quality of service (QoS). The researchers transmitted MPEG-4 video over a best-effort network and a QoS network in a simulation using NS-2. They measured peak signal noise ratio, throughput, and frame/packet statistics to compare the performance between the two networks. The results showed that transmitting video over the QoS network performed better than over the best-effort network.
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
Several researches are focused on the QoS (Quality of Service) and Energy consumption in wireless Multimedia Sensor Networks. Those research projects invest in theory and practice in order to extend the spectrum of use of norms, standards and technologies which are emerged in wireless communications.
The performance of these technologies is strongly related to domains of use and limitations of their characteristics. In this paper, we give a comparison of ZigBee technology, most widely used in sensor networks, and UWB (Ultra Wide Band) which presents itself as competitor that present in these work better results for audiovisual applications with medium-range and high throughput.
An overview about the new feature proposed for LTE Release 12 and beyond: Proximity Services (ProSe) / D2D.
It covers the D2D features: Discovery, Communication, Security and also shows some use-cases.
Enabling the rise of the smartphone: Chronicling the developmental history at...Qualcomm Research
Today’s smartphones are a marvel of modern technology — handheld devices with vast computing power, incredible multimedia and AI capabilities, and blazing fast data rates that support mobile browsing, social media interaction, and more. From humble beginnings as a cellphone focused purely on voice communication, the capability and functionality of modern smartphones have advanced tremendously. This presentation chronicles Qualcomm’s role in the rise of the smartphone from its initial beginnings to becoming the largest computing platform in the world. It includes:
- Key technology developments that led to today’s smartphones
- The role of Moore’s Law in driving new innovations and additional integration into mobile processors
- Qualcomm’s critical role in advancing the smartphone’s capabilities through groundbreaking innovations and key technology developments
This document provides an agenda for an end-to-end quality of experience workshop taking place on January 29, 2009 at IMEC in Heverlee. The agenda includes demonstrations on scalable video coding over error-prone networks, wireless thin clients, cross-layer control of reconfigurable radios, unobservable VOIP communications, and protecting applications from buffer overflows. Presentations will also be given on network neutrality in the context of electronic communications reform and situating network neutrality in the broader context of content distribution. Additionally, there will be a discussion on evaluating quality of experience and bridging the gap between technical parameters and human experience factors.
Analysis of wifi and wimax and wireless network coexistenceIJCNCJournal
Wireless networks are very popular nowadays. Wireless Local Area Network (WLAN) that uses the IEEE 802.11 standard and WiMAX (Worldwide Interoperability for Microwave Access) that uses the IEEE802.16 standard are networks that we want to explore. WiMAX has been developed over 10 years, but it is still unknown by most people. However, compared with WLAN, it has many advantages in transmission speed and coverage area. This paper will introduce these two technologies and make comparisons between WiMAX and WiFi. In addition, wireless network coexistence of WLAN and WiMAX will be explored through simulation. Lastly we want to discuss the future of WiMAX in relation to WiFi.
Modeling, Analysis, and Design of Multi-tier and Cognitive Cellular Wireless ...indonesiabelajar
Abstract: Multi-tier architecture with small cells such as femtocells, picocells, macrocells, and metrocells, overlaid with traditional macrocells is considered as a promising option to improve the network coverage and capacity of the next generation cellular wireless networks. Also, in such multi-tier networks, cognitive radio concepts will likely to be used by these small cells to improve the radio spectrum utilization. In this context, modeling, analysis, and design of multi-tier and cognitive cellular networks is increasingly attracting the attention of the research community. Recently, stochastic geometry models have been shown to provide tractable yet accurate performance bounds for multi-tier and cognitive cellular wireless networks. Given the need for interference characterization in multi-tier cellular networks, stochastic geometry models provide high potential to simplify their modeling and provide insights into their design. In this seminar, I will present a review of the stochastic geometry models for single-tier as well as multi-tier and cognitive cellular wireless networks. I will also present a taxonomy based on the target network model, the point process used, and the performance evaluation technique. To this end, I will discuss the open research challenges and future research directions.
Prof Ekram Hossain
Performance Evaluation of VEnodeb Using Virtualized Radio Resource ManagementJIEMS Akkalkuwa
This paper proposes implementing a virtualized eNodeB component called Radio Resource Management (RRM) to improve performance of cellular networks. The authors capture spectrum utilization data and develop an analytical model for call admission control. They implement a virtual RRM using SDN and NFV technologies and compare the performance to a traditional base station. Results show the virtual RRM can increase network utilization by 60% and reduce energy consumption by 33%, but is susceptible to violating service level agreements during spikes in network traffic due to its reactive nature. The work presents opportunities for future research using machine learning for predictive analysis and combining virtual RRM with cognitive cellular networks.
Video streaming over Ad hoc on-demand distance vector routing protocoljournalBEEI
Video streaming is content sent in compressed form over the netwoks and viwed the users progressively. The transmission of video with the end goal that it can be prepared as consistent and nonstop stream. The point is that to give client support to client at anyplace and at whatever time. Mobile Ad hoc Networks (MANETs) are considered an attractive nertwork for information transmission in many applications where the customer programme can begin showing the information before the whole record has been transmitted.
Ad hoc On-demand Distance Vector (AODV) protocol is considered as one of the most important routing protocols in MANET. However, routing protocols assume a crucial part in transmission of information over the network. This paper investigates the performance of AODV Routing Protocol under video traffic over PHY IEEE 802.11g. The protocol model was developed in OPNET. Different outcomes from simulation based models are analyzed and appropriate reasons are also discussed. A different scenarios of video streaming were used. The metric in terms of throughput, end to end delay, packet delivery ratio and routing overhead were measured.
A comparision with GRP and GRP are also reported.
This document summarizes the work of the ATHENA Research Group led by Professor Manos Tentzeris. Some key areas of focus for the group include inkjet-printed RF electronics, nanotechnology-enabled wireless sensors, and flexible 3D wireless modules. The group has developed inkjet-printed antennas, sensors, and power harvesting circuits on paper and flexible substrates for applications in wireless sensor networks and the Internet of Things.
Introduction to Wireless cellular technologie and NGN,IMS ganeshmaali
This document provides an overview of wireless cellular technologies and introduces Next Generation Networks (NGN). It discusses 2G technologies like GSM and CDMA and how they focused on circuit switched voice, SMS, and low-speed data. It then covers 2.5G and 3G technologies like GPRS, EDGE, UMTS, CDMA2000, which enabled higher-speed packet-switched data. The document also discusses 4G technologies like LTE and LTE-Advanced, along with key aspects of their network architectures. Finally, it provides a brief introduction to NGN and the IP Multimedia Subsystem.
NGN is a packet-based network able to provide Telecommunication Services to users and able to make use of multiple broadband, QoS-enabled transport technologies and in which service-related functions are independent of the underlying transport-related technologies. It enables unfettered access for users to networks and to competing service providers and services of their choice. It supports generalized mobility which will allow consistent and ubiquitous provision of services to users.
The document discusses 3G vs 4G mobile technology. It provides an overview of 1G and 2G networks, and then defines 3G as the third generation of wireless technology focused on faster services like voice, fax and internet. It outlines some key differences between 1G, 2G and 3G. The document then discusses benefits and issues with 3G, before defining 4G as the successor to 3G focused on being entirely packet-switched with higher bandwidth up to 100Mbps. Key features of 4G networks are listed such as being IP-based and supporting new multimedia services. Challenges to deploying 4G like accessing different networks and providing terminal mobility are also summarized.
The document discusses optical networking services and applications. It outlines Tal Lavian's research focus on building service composition and infrastructure for optical networks. It then provides an agenda covering optical networking technologies, challenges, service solutions like optics combined with Ethernet, and potential killer applications such as large data exchange and content networking.
Achievements and future works of ITU-T Study Group 13 on Future networks including cloud computing, mobile and next-generation networks
Presented at WTSA-16 by Mr Leo Lehmann, Chairman of ITU-T Study Group 13
The document provides biographical information about Alan H. Orr from Banbridge, Northern Ireland. It notes that he is from Banbridge, Northern Ireland and the document was created in December 2008, providing his name, location and date.
Este documento presenta 5 actividades para la unidad 1 sobre exploración y descubrimiento. La primera actividad compara brújulas y GPS. La segunda es un viaje virtual usando Google Earth. La tercera es un organizador gráfico sobre programas iLife. La cuarta ubica lugares usando Google Earth y Maps. La quinta es una investigación sobre exploración espacial usando herramientas como Inspiration. Cada actividad incluye indicaciones específicas y habilidades de software.
This document proposes a new platform called CAAP (Cluster As Application Platform) that allows distributed applications to run on wireless device clusters. The key aspects are:
1. Replacing wired links between high-performance computing nodes with wireless D2D (device-to-device) links between mobile devices.
2. Allowing user-programmable networking beyond traditional protocols by programming RDMA verbs.
3. Pooled mobile device clusters can join multiple clusters simultaneously, running multiple applications and instances on shared resources. This opens new opportunities for distributed and edge computing applications.
3GPP Standardization Status
Candidate Technologies for B4G and Beyond
• Device to Device (D2D) Communication
• Full Dimension MIMO (FD ‐ MIMO)
• CoMP with Non ‐ Ideal Backhaul
• Network Assisted interference Cancelation and Suppression (NAICS)
• Millimeter Wave (mmWave) Communication
Concluding Remarks
Acknowledge 09 Useraspecten En Evaluatie Ilse MariëN Ibbt Smit Vubimec.archive
This document discusses ETSI's work towards standardizing cognitive radio technologies. It provides background on ETSI as a standards organization and describes its RRS Technical Committee, which has four working groups studying different aspects of cognitive radio standardization, such as system architecture and a cognitive pilot channel. The document explains that standardization is needed as cognitive radio capabilities are being introduced and to facilitate cooperation among stakeholders in the heterogeneous wireless industry.
11.performance evaluation of mpeg 0004www.iiste.org call for-paper video tran...Alexander Decker
This document evaluates the performance of transmitting MPEG-4 video over IP networks using two different network types: best-effort and Quality of Service (QoS). The researchers used the NS-2 network simulator along with additional tools to encode video, transmit it over simulated networks, then evaluate the received video quality. Key performance metrics like peak signal-to-noise ratio (PSNR), throughput, and frame/packet statistics were calculated and compared between the best-effort and QoS networks. The results showed that transmitting MPEG-4 video over a QoS network achieved better performance than a best-effort network according to the measured metrics.
Performance evaluation of mpeg 4 video transmission over ip-networksAlexander Decker
This document summarizes research evaluating the performance of transmitting MPEG-4 video over IP networks with and without quality of service (QoS). The researchers transmitted MPEG-4 video over a best-effort network and a QoS network in a simulation using NS-2. They measured peak signal noise ratio, throughput, and frame/packet statistics to compare the performance between the two networks. The results showed that transmitting video over the QoS network performed better than over the best-effort network.
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
Several researches are focused on the QoS (Quality of Service) and Energy consumption in wireless Multimedia Sensor Networks. Those research projects invest in theory and practice in order to extend the spectrum of use of norms, standards and technologies which are emerged in wireless communications.
The performance of these technologies is strongly related to domains of use and limitations of their characteristics. In this paper, we give a comparison of ZigBee technology, most widely used in sensor networks, and UWB (Ultra Wide Band) which presents itself as competitor that present in these work better results for audiovisual applications with medium-range and high throughput.
An overview about the new feature proposed for LTE Release 12 and beyond: Proximity Services (ProSe) / D2D.
It covers the D2D features: Discovery, Communication, Security and also shows some use-cases.
Enabling the rise of the smartphone: Chronicling the developmental history at...Qualcomm Research
Today’s smartphones are a marvel of modern technology — handheld devices with vast computing power, incredible multimedia and AI capabilities, and blazing fast data rates that support mobile browsing, social media interaction, and more. From humble beginnings as a cellphone focused purely on voice communication, the capability and functionality of modern smartphones have advanced tremendously. This presentation chronicles Qualcomm’s role in the rise of the smartphone from its initial beginnings to becoming the largest computing platform in the world. It includes:
- Key technology developments that led to today’s smartphones
- The role of Moore’s Law in driving new innovations and additional integration into mobile processors
- Qualcomm’s critical role in advancing the smartphone’s capabilities through groundbreaking innovations and key technology developments
This document provides an agenda for an end-to-end quality of experience workshop taking place on January 29, 2009 at IMEC in Heverlee. The agenda includes demonstrations on scalable video coding over error-prone networks, wireless thin clients, cross-layer control of reconfigurable radios, unobservable VOIP communications, and protecting applications from buffer overflows. Presentations will also be given on network neutrality in the context of electronic communications reform and situating network neutrality in the broader context of content distribution. Additionally, there will be a discussion on evaluating quality of experience and bridging the gap between technical parameters and human experience factors.
Analysis of wifi and wimax and wireless network coexistenceIJCNCJournal
Wireless networks are very popular nowadays. Wireless Local Area Network (WLAN) that uses the IEEE 802.11 standard and WiMAX (Worldwide Interoperability for Microwave Access) that uses the IEEE802.16 standard are networks that we want to explore. WiMAX has been developed over 10 years, but it is still unknown by most people. However, compared with WLAN, it has many advantages in transmission speed and coverage area. This paper will introduce these two technologies and make comparisons between WiMAX and WiFi. In addition, wireless network coexistence of WLAN and WiMAX will be explored through simulation. Lastly we want to discuss the future of WiMAX in relation to WiFi.
Modeling, Analysis, and Design of Multi-tier and Cognitive Cellular Wireless ...indonesiabelajar
Abstract: Multi-tier architecture with small cells such as femtocells, picocells, macrocells, and metrocells, overlaid with traditional macrocells is considered as a promising option to improve the network coverage and capacity of the next generation cellular wireless networks. Also, in such multi-tier networks, cognitive radio concepts will likely to be used by these small cells to improve the radio spectrum utilization. In this context, modeling, analysis, and design of multi-tier and cognitive cellular networks is increasingly attracting the attention of the research community. Recently, stochastic geometry models have been shown to provide tractable yet accurate performance bounds for multi-tier and cognitive cellular wireless networks. Given the need for interference characterization in multi-tier cellular networks, stochastic geometry models provide high potential to simplify their modeling and provide insights into their design. In this seminar, I will present a review of the stochastic geometry models for single-tier as well as multi-tier and cognitive cellular wireless networks. I will also present a taxonomy based on the target network model, the point process used, and the performance evaluation technique. To this end, I will discuss the open research challenges and future research directions.
Prof Ekram Hossain
Performance Evaluation of VEnodeb Using Virtualized Radio Resource ManagementJIEMS Akkalkuwa
This paper proposes implementing a virtualized eNodeB component called Radio Resource Management (RRM) to improve performance of cellular networks. The authors capture spectrum utilization data and develop an analytical model for call admission control. They implement a virtual RRM using SDN and NFV technologies and compare the performance to a traditional base station. Results show the virtual RRM can increase network utilization by 60% and reduce energy consumption by 33%, but is susceptible to violating service level agreements during spikes in network traffic due to its reactive nature. The work presents opportunities for future research using machine learning for predictive analysis and combining virtual RRM with cognitive cellular networks.
Video streaming over Ad hoc on-demand distance vector routing protocoljournalBEEI
Video streaming is content sent in compressed form over the netwoks and viwed the users progressively. The transmission of video with the end goal that it can be prepared as consistent and nonstop stream. The point is that to give client support to client at anyplace and at whatever time. Mobile Ad hoc Networks (MANETs) are considered an attractive nertwork for information transmission in many applications where the customer programme can begin showing the information before the whole record has been transmitted.
Ad hoc On-demand Distance Vector (AODV) protocol is considered as one of the most important routing protocols in MANET. However, routing protocols assume a crucial part in transmission of information over the network. This paper investigates the performance of AODV Routing Protocol under video traffic over PHY IEEE 802.11g. The protocol model was developed in OPNET. Different outcomes from simulation based models are analyzed and appropriate reasons are also discussed. A different scenarios of video streaming were used. The metric in terms of throughput, end to end delay, packet delivery ratio and routing overhead were measured.
A comparision with GRP and GRP are also reported.
This document summarizes the work of the ATHENA Research Group led by Professor Manos Tentzeris. Some key areas of focus for the group include inkjet-printed RF electronics, nanotechnology-enabled wireless sensors, and flexible 3D wireless modules. The group has developed inkjet-printed antennas, sensors, and power harvesting circuits on paper and flexible substrates for applications in wireless sensor networks and the Internet of Things.
Introduction to Wireless cellular technologie and NGN,IMS ganeshmaali
This document provides an overview of wireless cellular technologies and introduces Next Generation Networks (NGN). It discusses 2G technologies like GSM and CDMA and how they focused on circuit switched voice, SMS, and low-speed data. It then covers 2.5G and 3G technologies like GPRS, EDGE, UMTS, CDMA2000, which enabled higher-speed packet-switched data. The document also discusses 4G technologies like LTE and LTE-Advanced, along with key aspects of their network architectures. Finally, it provides a brief introduction to NGN and the IP Multimedia Subsystem.
NGN is a packet-based network able to provide Telecommunication Services to users and able to make use of multiple broadband, QoS-enabled transport technologies and in which service-related functions are independent of the underlying transport-related technologies. It enables unfettered access for users to networks and to competing service providers and services of their choice. It supports generalized mobility which will allow consistent and ubiquitous provision of services to users.
The document discusses 3G vs 4G mobile technology. It provides an overview of 1G and 2G networks, and then defines 3G as the third generation of wireless technology focused on faster services like voice, fax and internet. It outlines some key differences between 1G, 2G and 3G. The document then discusses benefits and issues with 3G, before defining 4G as the successor to 3G focused on being entirely packet-switched with higher bandwidth up to 100Mbps. Key features of 4G networks are listed such as being IP-based and supporting new multimedia services. Challenges to deploying 4G like accessing different networks and providing terminal mobility are also summarized.
The document discusses optical networking services and applications. It outlines Tal Lavian's research focus on building service composition and infrastructure for optical networks. It then provides an agenda covering optical networking technologies, challenges, service solutions like optics combined with Ethernet, and potential killer applications such as large data exchange and content networking.
Achievements and future works of ITU-T Study Group 13 on Future networks including cloud computing, mobile and next-generation networks
Presented at WTSA-16 by Mr Leo Lehmann, Chairman of ITU-T Study Group 13
The document provides biographical information about Alan H. Orr from Banbridge, Northern Ireland. It notes that he is from Banbridge, Northern Ireland and the document was created in December 2008, providing his name, location and date.
Este documento presenta 5 actividades para la unidad 1 sobre exploración y descubrimiento. La primera actividad compara brújulas y GPS. La segunda es un viaje virtual usando Google Earth. La tercera es un organizador gráfico sobre programas iLife. La cuarta ubica lugares usando Google Earth y Maps. La quinta es una investigación sobre exploración espacial usando herramientas como Inspiration. Cada actividad incluye indicaciones específicas y habilidades de software.
La escena describe una situación observada desde la perspectiva de un testigo. El narrador procede a escribir de forma objetiva los detalles y sucesos presenciados sin añadir juicios de valor.
This document provides an introduction to PHP for beginners. It covers the basics of PHP syntax, variables, arrays, functions, interacting with URLs, loading content from external websites, displaying XML and JSON data, and connecting to a MySQL database. Code samples and links for further reference are included to demonstrate common PHP tasks.
La miltefosina es un medicamento antiparasitario que se usa para tratar la leishmaniosis humana y canina. Interrumpe las vías de señalización celular y la síntesis de membrana del parásito, induciendo su muerte. Se administra por vía oral para tratar la leishmaniosis visceral, y tópicamente para tratar lesiones cutáneas malignas como el cáncer de mama y linfomas cutáneos. Se recomiendan dosis de 100-150 mg/día por 28 días para adultos, y 2.
Electronic Data Interchange (EDI) allows organizations to exchange standard electronic documents like purchase orders and invoices directly between computer systems, enabling automated processing and cost savings. While EDI originated in the 1960s, the internet boosted its use across many industries. Early EDI used closed proprietary standards, but internet-based EDI now uses international standards, allowing organizations to transact with any partner using the same standard. However, multiple competing standards still present interoperability challenges.
This document discusses video transmission using wireless networks like WiMAX. It begins with an abstract discussing real-time video communication needs and previous work transmitting video over wireless LANs and visible light communication. It then reviews WiMAX capabilities like providing wireless broadband access over 50km at 70mbps. The paper proposes a WiMAX transmitter and receiver design to efficiently transmit and receive video. It reviews literature on similar wireless video transmission systems and their limitations. The methodology section provides block diagrams and circuit diagrams of the proposed WiMAX transmitter and receiver. It describes the transmitter components like an analog to digital converter, RF amplifier and transmitting antenna. The receiver components include a receiving antenna, DC modulator, video amplifier and display device.
This document analyzes the performance of different VoIP codecs over a WiMAX network using the network simulator NS2. The simulation varies parameters like the number of nodes and type of VoIP codec. Performance is evaluated based on metrics like throughput, average delay, and jitter. Results are presented graphically to compare these metrics for different codecs and number of nodes. The document provides background on VoIP codecs, IEEE 802.16 service flow classes, and simulation setup using NS2.
This document discusses issues and challenges with delivering Voice over IP (VoIP) traffic over WiMAX networks. It begins with an overview of WiMAX technology and architecture, as well as VoIP architecture and codecs. Key issues discussed include limited bandwidth, need for security to encrypt voice transmissions, and link failures causing delays. The document aims to evaluate voice quality over wireless networks and improve delivery of VoIP traffic over WiMAX by addressing factors such as delay, jitter, throughput, and other quality parameters.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document presents a novel approach for minimizing delay and load in wireless networks (WiMAX) developed by Shilpa Mehta et al. It begins by introducing WiMAX and discussing challenges in providing quality of service. It then proposes a new scheduling algorithm called QOS Recovered that aims to minimize delay and load by fixing queue size and number of packets. The algorithm is compared to the existing weighted fair queuing algorithm through simulation. The document provides background on scheduling in WiMAX and discusses common scheduling strategies and algorithms. It also describes using the OPNET simulator to model the wireless network and evaluate the new algorithm's performance.
This document evaluates the performance of IPTV video streaming over WiMAX networks under different terrain environments, including free space, outdoor to indoor, and pedestrian environments. It uses OPNET simulations to analyze network statistics such as packet loss, path loss, delay, and throughput. The results show that free space terrain has the lowest path loss and packet delay, while outdoor to indoor and pedestrian environments have higher path loss and delay. Specifically, free space path loss was around 100dB while outdoor environments was around 145dB. Additionally, packet loss was highest for outdoor scenarios due to lower signal to noise ratios in those environments. In general, more obstructed environments led to worse performance for IPTV video streaming over WiMAX networks.
The document discusses the concept of 5G mobile networks. It notes that new mobile generations have emerged every 10 years, with 5G expected by 2020. 5G networks will utilize nanotechnology, cloud computing, and an all-IP platform. Key aspects of 5G architecture include the nanocore for controlling devices at the nanoscale, cloud computing for flexible resources, and a flat IP network for universal access. Beam division multiple access allows beams to be allocated to each mobile station for increased capacity. 802.11ac is an interim step providing speeds up to 1.35Gbps to help enable a 5G "Star Trek" world.
This is the second part of my 5G project which consists of the architecture structure of 5G. What all it consists of, what all technologies it uses, what all layers it contain etc.
We are looking at the future of technology that has the structure of Nanocore, beneficial for future applications.
The document discusses challenges and security issues related to the Internet of Things (IoT). It notes that while IoT provides many benefits across various industries like healthcare, transportation, and more, it also faces challenges. Key challenges include the large number of devices and sensors requiring unique identification, and the need for proper data storage, management, and processing. Regarding security issues, the document states that IoT devices are vulnerable to attacks due to limited computing resources. It proposes using cloud computing and other techniques to help build a more secure IoT infrastructure.
This document discusses softswitches, which are central devices that connect phone calls entirely through software running on computer systems, replacing physical switchboards. It provides background on softswitches and their advantages over hardware switches, noting they can reduce costs, improve services, and facilitate migration to IP networks. Key elements of a softswitch architecture are described, including media gateways and call agents. Benefits of softswitch architecture for wireless networks are outlined, such as enabling distributed switching to reduce costs compared to centralized hardware switches.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Video transmission over wireless networks is considered the most interesting application in our daily life nowadays. As
mobile data rates continue to increase and more people rely on wireless transmission, the amount of video transmitted over at least one
wireless hop will likely continue to increase. This kind of application needs large bandwidth, efficient routing protocols, and content
delivery methods to provide smooth video playback to the receivers. Current generation wireless networks are likely to operate on
internet technology combined with various access technologies. Achieving effective bandwidth aggregation in wireless environments
raises several challenges related to deployment, link heterogeneity, Network congestion, network fluctuation, and energy consumption.
In this work, an overview of technical challenges of over wireless networks is presented. A survey of wireless networks in recent video
transmission schemes is introduced. Demonstration results of few scenarios are showed.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
In this paper, we examine WiMAX – based network and evaluate the performance for quality of service (QoS) using an idea of IEEE 802.16 technology. In our models, the study used a multiprocessor architecture organized by the interconnection network. OPNET Modeler is used to simulate the architecture and to calculate the performance criteria (i.e. throughput, delay and data dropped) that
slightly concerned in network estimation. It is concluded that our models shorten the time quite a bit for
obtaining the performance measures of an end-to-end delay as well as throughput can be used as an
effective tool for this purpose.
5G is the next generation of wireless technology that will provide significantly faster data speeds, reduced latency, and the ability to connect many more devices simultaneously. The document discusses the evolution of wireless technologies from 1G to 5G, providing details on the key features and capabilities of each generation. It then describes the proposed 5G architecture and working, highlighting aspects like its IP-based design, use of cognitive radio technology, and open wireless and transport protocols. The remaining sections cover the expected features, advantages, challenges and applications of 5G networks.
The document presents a study on interworking heterogeneous networks such as WiMAX, WLAN and MANET using IMS protocol. It discusses the objectives, challenges and modules involved. The implemented architecture integrates these networks using IMS, analyzing performance both with and without MANET. Results show IMS enables interworking and provides quality of service across the different networks.
This document analyzes the performance of routing algorithms for an integrated Wi-Fi/WiMAX heterogeneous network. It begins with an introduction describing the need for such integrated networks to provide uninterrupted wireless service. It then provides overviews of the Wi-Fi (IEEE 802.11n) and WiMAX (IEEE 802.16e) technologies that would be integrated. Several routing algorithms are described, including Bellman-Ford, AODV, DYMO, OLSRv2, RIP, and OSPFv2. The document then discusses how to statistically analyze the performance of the integrated network using these various routing algorithms, focusing on metrics like throughput, packet loss probability, and distortion. The analysis will
This document provides an overview of high speed backbone network design and routing. It discusses key elements of backbone networks including fiber optics, layer 2 and 3 switches, dense wavelength division multiplexing (DWDM), quality of service measures, and resilience. Fiber optic cables provide benefits like high bandwidth, low loss, and security. Layer 2 switches operate at the data link layer, while layer 3 switches perform both layer 2 and layer 3 functions for improved performance. DWDM combines multiple light wavelengths on a single fiber to increase bandwidth. Quality of service and resilience features ensure high throughput and network stability.
Next Generation all property, all fiber networks are the way of the future. This paper helps any reader to gain a better understanding of why switched networks are at their usable end of life and how campus networks will transform not just technical but budgetary capability.
The document discusses the future of wireless technology. It aims to make wireless technologies universally accessible anywhere and enable always-on broadband connections across any network or device. This can be achieved by combining existing technologies like cellular, Wi-Fi and Bluetooth. Alternatively, new architectures like cloud computing, mesh networks and self-organizing networks could be developed. Hybrid wireless networks that integrate multiple technologies may provide data rates up to 2x768 kbps. The key is developing solutions that maximize the accessibility of wireless connectivity over time and space.
Similar to Wimax Emulator to Enhance Media and Video Quality (20)
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Generative AI leverages algorithms to create various forms of content
Wimax Emulator to Enhance Media and Video Quality
1. ISSN (e): 2250 – 3005 || Vol, 05 || Issue,02 || February – 2015 ||
International Journal of Computational Engineering Research (IJCER)
www.ijceronline.com Open Access Journal Page 22
Wimax Emulator to Enhance Media and Video Quality
1
Supriya. L. Shitole, 2
Prof.Ranjana.R. Gite
1
M.E (EXTC), VIT/ Mumbai University, Mumbai, Maharashtra, India
2
EXTC Dept, VIT/Mumbai University Mumbai, Maharashtra, India
I. INTRODUCTION
In today's rising computational era everyone needs a device that's computationally robust enough to
satisfy individuals want. WiMAX is that the one. WiMAX has already been adopted worldwide by operators
attracted by promises of enormous throughput and coverage for broadband wireless access. Broadband may be a
generic term used to describe high-speed networking services, that's a collection of data communication
technologies with the capability to transmit vital amounts of information at a high rate, Supporting the delivery of
a variety of digital services some or all of which may occur at the same time. It’s typically a symmetrical service
permitting quick in and outbound knowledge capability. There are several devices use to provide broadband
connection like Wi-Fi.
Wi-Fi is generally used to give a Wi-Fi enabled device like computer, cell phone or personal digital
assistant an Internet/LAN connection when in proximity of access purpose. Wi-Fi can even be used to produce a
mesh network. Wi-Fi additionally permits connectivity in peer-to-peer mode. That allows devices directly
connected to every different. WiMAX on the opposite hand, with its higher bandwidth and longer reach is
planned to be connecting Wi-Fi hotspot for every different and to alternative a part of the internet providing a
wireless different to cable and provide high speed mobile information and telecommunication service. This paper
is shown on improving media and video quality by using WiMAX emulator. Since this paper is functioning in
wireless networking area, on Ns2 primarily based WiMAX emulator. Emulator is same like simulator it uses
external packets for simulation so it's known as emulator. During this case, emulator uses real time video frames
for simulation. This paper will generate emulator in Ns2. These papers have used Ns2 as a result of its fully
developed and analysis on Ns3 continues to be going. Ns2 has 2 main components Otcl and C++. Otcl is at front
end and C++ resides at back end. Otcl is scripting language. Object creation is completed in Otcl and object
ABSTRACT
Worldwide interoperability for Microwave Access (WiMAX) is one amongst the
forthcoming generations (4G) promising networks to cover a number of the consumers’
desires. It’s a promising technology that's supposed to deliver mounted and additional
recently, mobile broadband connectivity. It’s a forthcoming technology it's primarily
supposed to overcome the drawbacks of previous version. It’s developed primarily because
of the coverage area is larger compare all different networks, high information rates, it's
simply deployable and secure Quality of service. WiMax may be a new technology
handling provision of information over long distance using wireless communication
methodology in many alternative ways that supported. IEEE 802.16 WiMax is claimed as
another broadband instead of cable and telephone circuits. Worldwide interoperability for
Microwave Access (WiMAX) technology will concentrate on Quality of Service (QoS).
Quality of Service is an important parameter to evaluate performance of any Network.
During this article, Quality of video is improved using WiMAX emulator. Applications like
video and audio streaming, on-line play, video conferencing, voice over IP (VoIP) and File
Transfer Protocol (FTP) demand a large range of QOS necessities like bandwidth and
delay. IEEE 802.16 normal referred to as WIMAX provides broadband wireless access
with QOS requirements. These paper have designed a system using WiMAX and RTP to
enhance quality of media and video transmitted over network. These paper are progressing
to use NS2 emulator so it will use external packets for simulation. These papers are using
Ns2 for showing the complete network completely.
Keywords: Emulator, NS2, Quality of services, RTP, Wi-Fi, Wimax.
2. Wimax Emulator to Enhance…
www.ijceronline.com Open Access Journal Page 23
invocation is completed in C++. These papers have preferred WiMAX technology for transmission of media and
video because of its following advantages:
• WiMAX will handle up to speed of 70 Mbps.
• WiMAX typically blankets a radius of 30 miles (50 km).
• WiMAX has most frequency of 10-66 gigahertz frequency.
• In WiMAX, large numbers of individuals get access to tower at same time whereas Wi-Fi user need to kind of
fight to remain connected with specified access purpose.
• WiMAX proposes the complete range of security
These papers have designed a system using WiMAX and RTP to enhance quality of video and media
transmitted over network. This paper has used RTP because of its features like recovering lost segments and re-
sequencing of packets at application layer. This method design implements features like multicasting facility in
network and to cut back packet drop ratio using WiMAX technology and RTP protocol.
Objective of the paper
• The applications logical ensue one module to a different among the system.
• The application is functioning consistent with the necessity specifications.
• The application is reliable and strong and it will recover graciously from failures.
• The application is simple to use and maintain as this paper as secure.
1.1 Technology Preview
NS2
NS-2 is an event driven packet level network simulator developed as a part of the VINT project (Virtual net
Tested). This was a collaboration of the many institutes as well as UC Berkeley, AT and T, XEROX PARC and
ETH. Version one of NS was developed in 1995 and with version two released in 1996. Version two enclosed a
scripting language referred to as Object orientating Tcl (OTcl). It’s an open source software system package
accessible for each Windows 32 and Linux platforms. NS-2 has several and increasing uses including:
• To assess the performance of existing network protocols.
• To assess new network protocols before use.
• To run massive scale experiments impossible in real experiments.
• To simulate kind of IP networks.
1.1.1 NS2 Features
NS-2: Network simulator version two
• Discrete event simulator.
• Open source, supported two languages.
• C++, for the object oriented simulator, quick to run, slower to alter.
• OTcl, Object Tool command language, interpreter accustomed execute user's command, scripts, slower to run
however modified quickly.
3. Wimax Emulator to Enhance…
www.ijceronline.com Open Access Journal Page 24
1.1.2 Support
• Wired networks: P2P links, LAN.
• Wireless networks: (Ad-hoc, Mobile, WLAN, Bluetooth, Satellite).
• Support emulation.
II. LITERATURE SURVEY
[1] Mojtaba Seyedzadegan and Mohamed Othman proposed IEEE 802.16: WiMAX summary, WiMAX
architecture that WiMAX may be a new technology handling provision of information over long distance using
wireless communication methodology in many various ways in which. Supported IEEE 802.16 WiMAX is
claimed as another broadband instead of cable and telephone circuit. It’s a fast technical summary and covers:
WiMAX overview (Fundamental Concept; Technology; standard update) and WiMAX architecture. WiMAX
Technology is facing several hurdles in market whereas it's some great benefits that create it a technology of
nowadays.
[2] Gyan Prakash, Sadhana Pal proposed WiMAX Technology and Its Applications presents the features of
the worldwide interoperability for Microwave Access (WiMAX) technology and future applications of WiMAX.
A discussion is given by comparison WIMAX with DSL (Digital subscriber line) & Cable and wireless local area
network (Wi-Fi). WiMAX may be a global broadband wireless standard. Several developing countries merely
don't have the infrastructure to support either cable or telephone circuit broadband technologies. In fact, several
such countries are already wide using proprietary broadband wireless technologies. Even in such regions to this
paper, it's impossible that either Cable or telephone circuit technologies would disappear. The basic infrastructure
usually dictates that the most affordable solutions can predominate. In several areas in developing nations, it
should be cheaper to deploy Cable and telephone circuit within the cities a minimum of for fixed applications,
whereas WiMAX can dominate outside of major cities.
[3] Min Xing, Siyuan Xiang, Lin Cai, proposed a time period adaptive algorithmic rule for Media and video
streaming over Multiple Wireless Access Networks that the way to with efficiency and cost-effectively utilizes
multiple links to boost media and video streaming quality desires investigation. So as to take care of high media
and video streaming quality whereas reducing the wireless service price. In this, first, they formulate the media
and video streaming method over multiple links as an MDP drawback. To realize smooth and top quality media
and video streaming, this paper outlines many actions and reward functions for every state. Second, this paper
proposes a depth-first period of time search algorithmic rule. The proposed adaptation algorithmic rule can take
many future steps into consideration to avoid playback interruption and accomplish higher smoothness and
quality.
III. PROBLEM DEFINATION
The major limitation are Specialized instrumentation required for utilizing full practicality of wimax you
wish specialized hardware with dedicated antennas. Interference might have an effect on connectivity because the
wimax uses radio waves; it's susceptible to interference caused by different instrumentation. The major limitation
with any wireless technology is that it's very exhausting to satisfy its security desires. Same is that the case with
Wimax the hackers can even attack this connection and may steal some helpful info. The intruders are capable
enough of repetition the Mac frames therefore they will break the safety codes. The hackers will even hijack the
full network by creating use of denial of service attack. This security threat will devastate the complete
connections. Another limitation that comes with the Wimax is that hackers have devised manner to masquerade
because the base station during this way, the confidential information is accessed. The concerned departments
like Wimax forum try exhausting to overcome this major limitation as this may cause the individuals to refrain
from using this technology. Numerous software’s present within the market alter the hackers and crackers to
decipher the codes and exploit info. Therefore given that the range is low the Wimax technology operates
considerably.The infrastructure demand for 802.16 technologies needs distributed network that is complicated
and costly to make. The technology is therefore costly that solely massive names like Intel are able to
manufacture silicone chips that are integrated with the PCs to extend the efficiency of the system. The
marketplace for Wimax continues to be not terribly attractive as there are not enough hardware devices that
support this technology. Immense investment is needed to produce equipments that may correspond with this
technology. But during this time of recession who would invest such amount quantity in new technology like
Wimax. Moreover people are a lot of familiar with use Wi-Fi and that they notice it a lot of users friendly. Thus
it's not possible for them to change to the current new technology.
4. Wimax Emulator to Enhance…
www.ijceronline.com Open Access Journal Page 25
The IT experience required to take care of its security is additionally rare. In different words we will say that
individuals don't seem to be attentive to handling the pros and cons related to this technology. This technology
has didn't prove it as an independent technology. Individuals take into account it as a 3G technology and also the
one exchange broadband wired DSL. The Wimax claims to figure well with the mobile technologies, however
still they're not adopted. This is often due to the restricted devices that add accordance with WiMax. The antennas
that enhance the efficiency of network are extremely tiny and their electricity power demand is more.
Generally for transmitting videos and something Wi-Fi technology is employed. It’s not reliable due to its
speed. This paper are coming up with our system to get rid of issues with videos like slow streaming, and slow
transmission rate of packets. This paper is transmitting our packets through Network emulator. These papers are
getting to use WiMAX technology and RTP for it. WiMAX technology is employed over Wi-Fi. There are
several drawbacks of Wi-Fi over WiMAX.
• Wi-Fi is slower than WiMAX. Wi-Fi will transmit up to 54 mbps only. WiMAX will transmit up to 70 Mbps.
• Wi-Fi range is minimum i.e. 30m only as compared to WiMAX (50 km).
• Wi-Fi frequency is extremely low i.e. 5 gigahertz as compared to WiMAX.
These papers are progressing to use NS2 emulator so it will use external packets for simulation. These papers
are using Ns2 for showing the complete network nearly. To implement WiMAX physically isn't cheap to us;
therefore this paper is using NS2.
IV. PROPOSED METHODOLOGY
4.1 System Architecture
The proposed network architecture is shown in Fig.3. 1. During this design, one computer is employed
as a media server and several other Clients are used as video clients. One pc running ns-2 is employed as a
WiMAX network emulator that mimics the impairments introduced by the wireless channel in time period. The
media and video streaming packets generated by the media server are fed within the WiMAX emulator then
multicast to clients. Every client will then show the received video stream severally. The network simulator ns-2
could be a distinct event simulator targeted at networking analysis.
Media and video streaming
Request
Figure 4.1: System architecture
5. Wimax Emulator to Enhance…
www.ijceronline.com Open Access Journal Page 26
Ns-2 provides modules for simulation of communication protocol, routing, and multicast protocols over wired
and wireless (local and satellite) networks. A similar ns-2 WiMAX module utilized in the system level simulator
of WiMAX Forum is additionally utilized in this emulator.
4.1.1. System Feature
1. WiMAX Transmission
• Description and Priority
The media and video streaming aren't quick. They continuously take more time to load. Particularly for
multimedia system information, dependability isn't as necessary as timely transmission. Therefore this paper is
using WiMAX technology for quick transmission. Ultimately quality of media and video gets improved because
of WiMAX.
• Response Sequences
User means that client request for media and Video packets then Packets are transmitted through Ns2
emulator using this feature i.e. WiMAX. Ultimately transmission rate raised.
2. Functional necessities
• Clients should be within the range of WiMAX i.e. 50 km. It needs massive power for transmission.
• It is needed to put in a further WiMAX card to extend the efficiency and strength of the signals.
• The antennas that enhance the efficiency of network are extremely tiny and their electricity power demand is
additional.
4.2 Data Flow Diagram
The Data flow diagram (DFD) is that the graphical illustration of the processes and also the flow of
information among them. An information flow diagram illustrates the processes, information stores, external
entities and therefore the connecting information flows in an exceedingly system. it's a typical observe to draw a
context- level information flow diagram initial which shows the interaction between the system and outdoors
entities. This context- level DFD is then "exploded" into a close DFD.
Figure 4.2.1 Data flow diagram1
Figure 4.2.2 Data flow diagram2
6. Wimax Emulator to Enhance…
www.ijceronline.com Open Access Journal Page 27
V.CONCLUSION
Thus this paper presented an NS-2 based mostly IEEE 802.16 network emulator for supporting media
and video streaming services. The proposed emulator will emulate completely different channels and real
propagation conditions. The video is displayed on client aspect and permits for analysis of application-level
media and video streaming metrics. The performance of the proposed emulator was evaluated once time period
services are taken under consideration. Wi-Fi and WiMAX transmission are compared through this overall
transmission of media and video from server. Finally this paper have Shown that if WiMAX technology is
employed instead of Wi-Fi. This paper got additional responsibility and sensible network performance overall.
REFERENCES
[1] Mojtaba Seyedzadegan and Mohamed Othman “IEEE 802.16: WiMAX Overview, WiMAX Architecture “International Journal
of Computer Theory and Engineering, Vol. 5, No. 5, October 2013.
[2] Gyan Prakash, Sadhana Pal, International Journal of Engineering Research and Applications (IJERA) “WIMAX Technology and
Its Applications”
[3] Min Xing, Student Member, IEEE, Siyuan Xiang, Member, IEEE, and Lin Cai, Senior Member, IEEE“A Real-Time Adaptive
Algorithm for Media and video streaming over Multiple Wireless Access Networks” VOL. 32, NO. 4, APRIL 2014
[4] Mehdi Alasti and Behnam Neekzad, ClearwireJie Hui and Rath Vannithamby, Intel Labs” Quality of Service in WiMAX and
LTE Networks”
[5] Johan ElgeredA, A.SafaeiMoghaddamA, and Benjamin Vedder B, “How Quality of Service (QoS) is achieved in WiMAX (IEEE
802.16)”
[6] Sanjay Kumar Dhurandher, Isaac Woungang, Mohammad S. Obaidat, Fellow, IEEE, Kirti Kumar, Mamta Joshi, and Monika
Verma. “A Distributed Adaptive Admission Control Scheme for Multimedia Wireless Mesh Networks”.