International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Abstract— Scheduler is the backbone of intelligence in a LTE network. Scheduler will often have clashing needs that can make its design very complex and non-trivial.
The overall system throughput needs to be maintained at the best possible value without sacrificing the cell edge user experience.
In this paper, authors compared different scheduler designs for voice and packet services. They explained the role of configuration parameters through simulations. These parameters control the tradeoff between the sector throughput and the fairness in system through. They explained a possible scheduler implementation.
This document analyzes the impact of different router queuing disciplines, specifically Packet-ordered FIFO (PFIFO) and Time-ordered FIFO (TFIFO), on multimedia quality of experience (QoE) in internet protocol television (IPTV) deployments. The analysis is based on objective QoE metrics measured in over 500 test scenarios that varied user, application, and network factors. Key results showed that PFIFO and TFIFO can impact QoE differently by changing the inter-packet jitter experienced by IPTV traffic. Specifically, PFIFO processing may reduce perceived audio and video impairments compared to TFIFO but could also cause frame freezing due to buffer starvation at the receiver.
The document discusses policy and charging control (PCC) procedures in mobile data networks. PCC allows mobile providers to guarantee bandwidth for high revenue services, allow market segmentation, ensure fair network usage, and optimize the end user experience. It discusses how PCC uses policy and charging rules to identify and authorize IP traffic flows based on source/destination addresses and ports. PCC supports online and offline charging methods to appropriately charge service flows based on user subscriptions.
1) The mobile device searches for synchronization signals to detect available LTE cells and identifies key parameters like PCI from the PSS and SSS.
2) It then receives the MIB and SIBs containing configuration details to access the network from the selected cell.
3) The attach procedure is started, establishing an RRC connection and authenticating the user to activate a default bearer for IP data transmission.
This document provides an overview of communication systems topics including characteristics, examples, transmitting and receiving processes, and issues. It discusses key aspects like protocols, handshaking, networks, topologies, and hardware. Specific communication examples like email, voice mail, and the internet are outlined. Transmission methods such as serial, parallel, analog and digital are defined. The document also examines information processes like collecting, processing and displaying data. Finally, it covers issues relating to communication systems regarding messaging, internet usage, and telecommuting.
The document discusses Beam Division Multiple Access (BDMA) as a new multiple access technique for 5G networks to increase system capacity. BDMA divides antenna beams according to mobile station locations, allocating orthogonal beams to allow multiple access. This significantly increases capacity compared to existing techniques like FDMA, TDMA, CDMA, and OFDMA. The base station transmits directional beams to mobile stations based on their positions and speeds. Mobile stations sharing beams divide frequency/time resources. BDMA maximizes spatial reuse of resources and solves inter-cell interference and control channel problems. It is proposed as a radio interface for 5G cellular systems.
The document describes the signaling flow and messages exchanged between the various network entities during the LTE attach procedure and default bearer activation for a UE. It provides details on the S1AP, S6a, S11 and NAS messages with information elements like IMSI, GUTI, QoS parameters, GTP tunneling endpoints etc. exchanged at each step of the procedure to establish the default data path for a UE attaching to the network.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Abstract— Scheduler is the backbone of intelligence in a LTE network. Scheduler will often have clashing needs that can make its design very complex and non-trivial.
The overall system throughput needs to be maintained at the best possible value without sacrificing the cell edge user experience.
In this paper, authors compared different scheduler designs for voice and packet services. They explained the role of configuration parameters through simulations. These parameters control the tradeoff between the sector throughput and the fairness in system through. They explained a possible scheduler implementation.
This document analyzes the impact of different router queuing disciplines, specifically Packet-ordered FIFO (PFIFO) and Time-ordered FIFO (TFIFO), on multimedia quality of experience (QoE) in internet protocol television (IPTV) deployments. The analysis is based on objective QoE metrics measured in over 500 test scenarios that varied user, application, and network factors. Key results showed that PFIFO and TFIFO can impact QoE differently by changing the inter-packet jitter experienced by IPTV traffic. Specifically, PFIFO processing may reduce perceived audio and video impairments compared to TFIFO but could also cause frame freezing due to buffer starvation at the receiver.
The document discusses policy and charging control (PCC) procedures in mobile data networks. PCC allows mobile providers to guarantee bandwidth for high revenue services, allow market segmentation, ensure fair network usage, and optimize the end user experience. It discusses how PCC uses policy and charging rules to identify and authorize IP traffic flows based on source/destination addresses and ports. PCC supports online and offline charging methods to appropriately charge service flows based on user subscriptions.
1) The mobile device searches for synchronization signals to detect available LTE cells and identifies key parameters like PCI from the PSS and SSS.
2) It then receives the MIB and SIBs containing configuration details to access the network from the selected cell.
3) The attach procedure is started, establishing an RRC connection and authenticating the user to activate a default bearer for IP data transmission.
This document provides an overview of communication systems topics including characteristics, examples, transmitting and receiving processes, and issues. It discusses key aspects like protocols, handshaking, networks, topologies, and hardware. Specific communication examples like email, voice mail, and the internet are outlined. Transmission methods such as serial, parallel, analog and digital are defined. The document also examines information processes like collecting, processing and displaying data. Finally, it covers issues relating to communication systems regarding messaging, internet usage, and telecommuting.
The document discusses Beam Division Multiple Access (BDMA) as a new multiple access technique for 5G networks to increase system capacity. BDMA divides antenna beams according to mobile station locations, allocating orthogonal beams to allow multiple access. This significantly increases capacity compared to existing techniques like FDMA, TDMA, CDMA, and OFDMA. The base station transmits directional beams to mobile stations based on their positions and speeds. Mobile stations sharing beams divide frequency/time resources. BDMA maximizes spatial reuse of resources and solves inter-cell interference and control channel problems. It is proposed as a radio interface for 5G cellular systems.
The document describes the signaling flow and messages exchanged between the various network entities during the LTE attach procedure and default bearer activation for a UE. It provides details on the S1AP, S6a, S11 and NAS messages with information elements like IMSI, GUTI, QoS parameters, GTP tunneling endpoints etc. exchanged at each step of the procedure to establish the default data path for a UE attaching to the network.
Audio/Video Conferencing over Publish/Subscribe Messaging SystemsVideoguy
This document discusses integrating audio/video conferencing as a web service using NaradaBrokering, a publish/subscribe messaging system. It describes how RTP is commonly used to transmit multimedia over the internet using UDP or multicast. While multicast has advantages like easy group communication, it has issues like lack of authentication, potential denial of service attacks, and limited multicast domains. The document proposes using a publish/subscribe messaging system like NaradaBrokering to transport RTP, which could address multicast's issues while providing benefits like unified application support and easier management compared to multicast or a dedicated media server. However, it notes this approach adds header overhead which increases bandwidth usage.
This document provides an overview of LTE networks and technology. It discusses key aspects of LTE including peak data rates of 50-100 Mbps, reduced latency under 10ms, OFDMA for downlink and SC-FDMA for uplink, support for bandwidths from 1.4-20 MHz, and mobility support up to 350km/h. It also examines the architecture including elements such as the eNodeB, MME, S-GW, P-GW, and interfaces such as S1, X2.
Introduction To Cellular And Wireless NetworksYoram Orzach
This document provides an overview of cellular and wireless networks. It discusses the history and evolution of 1G to 4G cellular networks, including the development of technologies like GSM, CDMA, UMTS, HSPA and LTE. It also covers the basics of wireless local area networks (WiFi) and describes the IEEE 802.11 standards including 802.11b, 802.11g and 802.11n. Finally, it discusses future trends in both cellular and wireless networks.
The document discusses MPLS (Multi-Protocol Label Switching) including traditional IP forwarding, IP over ATM, MPLS concepts, MPLS architecture, MPLS forwarding, MPLS applications, MPLS protocols, and forwarding equivalence classes. MPLS combines the advantages of connection-oriented forwarding with IP routing by assigning labels to packets and forwarding based on those labels rather than long IP addresses.
Mobile Networking and Ad hoc routing protocols validationIOSR Journals
This document discusses mobile networking and ad hoc routing protocols. It begins with an overview of cellular phone networks and their growth in usage. It then describes mobile ad hoc networks and some of the challenges in designing routing protocols for them. The document evaluates two model checking tools, SPIN and UPPAAL, and discusses their ability to verify properties of ad hoc routing protocols through formal validation methods.
The document discusses Mobile IP, which allows mobile devices to change their point of connection to the internet without changing their IP address. It describes key concepts like the home agent, foreign agent, care-of address, and registration process. Mobile IP addresses issues like triangular routing and proposes optimizations like reverse tunneling to improve efficiency when a mobile node changes locations.
LONG TERM EVOLUTION INVOLVES CHANGES TO BOTH RADIO INTERFACE AND NETWORK ARCHITECTURE IN ORDER TO KEEP 3RD GENERATION PARTNERSHIP PROJECT TECHNOLOGY COMPETITIVE. OFDMA WAS CHOSEN AS THE DOWNLINK AIR INTERFACE DUE TO ITS ADVANTAGES SUCH AS HIGH SPECTRAL EFFICIENCY AND ROBUSTNESS. THE PAPER DESCRIBES THE CELL SEARCH PROCEDURE AND POTENTIAL DESIGNS FOR THE PRIMARY AND SECONDARY SYNCHRONIZATION CHANNELS TO FACILITATE TIMING AND FREQUENCY SYNCHRONIZATION WITH LOW COMPLEXITY. SEVERAL
Improved voice quality with the combination of transport layer & audio codec ...journalBEEI
Improving voice quality over wireless communication becomes a demanding feature for social media apps like facebook, whatsapp and other communication channels. Voice-over-internet protocol (VoIP) helps us to make quick telephone calls over the internet. It includes various mechanism which are signaling, controlling and transport layer. Over wireless links, packet loss and high transmission delay damage voice quality. Here VoIP quality will be measured by three main elements which are signaling protocol, audio codec and transport layer. To improve the overall voice quality, we need to combine these three elements properly to get the best score. Otherwise perceptual speech quality will not be the right tool to measure the voice quality. Here we will use Mean Opinion Score (MOS) for calculated jitter values and end to end delay. At the end, best combination of audio codec & signaling protocol produced the quality speech.
Implementing multicast communication system making use of an existing data ne...iosrjce
This document discusses implementing a multicast communication system using an existing data network to offer free TV channels. It describes how a company can use multicast routing protocols like PIM and IGMP to efficiently stream video to multiple devices. The key advantages of multicast are reducing bandwidth usage and server load compared to unicast. It also discusses challenges like lack of reliability and potential security issues. The document provides an overview of PIM sparse and dense modes and how to configure a prototype multicast network with load balancing and failover between multiple rendezvous points for high availability.
dynamic media streaming over wireless and ip networksNaveen Dubey
The document discusses internet and wireless technologies such as IEEE 802.11, HTTP, and Mobile IP. It describes experiments on dynamic media streaming over wireless networks using different transport protocols like TCP and PRRT. The experiments showed that TCP suffers from throughput variations on wireless networks leading to underutilization of bandwidth. In contrast, PRRT, which implements predictably reliable transport, was able to optimize bandwidth utilization for media streaming over wireless and mobile internet paths.
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPTbabuece
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
BABU M
ASST PROFESSOR
DEPARTMENT OD ELECTRONICS AND COMMUNICATION ENGINEERING
RMK COLLEGE OF ENGINEERING AND TECHNOLOGY
CHENNAI
THIRUVALLUR DISTRICT
Wireless local area networks (WLANs) connect devices within a local area using radio waves instead of wires. They became popular in the 1980s-1990s as a way to share resources like printers and storage over a local area network (LAN). Almost all modern WLANs use the 802.11 standard and operate in the 2.4GHz or 5GHz spectrum. A typical WLAN consists of an access point that connects wireless clients like laptops and smartphones to a wired network backbone. WLANs provide flexibility but come with challenges around interference and security.
Throughput Performance Analysis VOIP over LTEiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Digital and Analog--Bachelor of Computer ApplicationAjay Kumar
1) The document discusses key concepts in analog and digital communications including data, signals, channels, bit rates, bandwidth, modulation techniques, and transmission media.
2) It defines analog signals as continuous signals representing other varying quantities, while digital signals represent discrete values or sequences through techniques like pulse code modulation.
3) A channel refers to a transmission path, with examples including telephone lines, radio frequencies, fiber optic wavelengths, and computer networks. Channel capacity is determined by its bandwidth.
The document provides information about various networking concepts and protocols. It contains 26 questions and answers about topics such as IGMP, ping, tracert, RSVP, DHCP, domains vs workgroups, NAT, PPP, IP spoofing, IP datagrams, application gateways, circuit gateways, default gateways, LANs, intranets vs the Internet, protocols, FTP, the OSI model layers, network types, topologies, IP, TCP, UDP, IP addressing classes, multicasting, DNS, telnet, and SMTP. It also defines MAC addresses.
The document discusses LTE network architecture including nodes like the eNodeB, MME, SGW and PGW, and their functions. It also outlines the basic LTE call flows for initial call setup, detach procedures, idle-to-active transitions, and handovers. Key call flow steps include attach request, authentication, context setup, and establishment of bearers between the UE and PDN gateway.
This document provides an introduction to switching systems. It discusses how telecommunication networks allow entities like computers and humans to transfer information over long distances. The key components of a communication switching system are end systems, transmission systems, switching systems, and signaling. The document traces the historical development of switching technologies from human operators to modern digital systems. It also covers various telephone networks, criteria for network design like grade of service, and different switching approaches like centralized and hierarchical systems.
The document discusses various protocols and approaches for improving the performance of TCP over wireless networks. It notes that wireless networks have higher bit error rates, lower bandwidth, and mobility issues compared to wired networks. Several protocols are described that aim to distinguish wireless losses from congestion losses to avoid unnecessary TCP reactions:
- Indirect TCP splits the connection and handles losses locally at the base station. Snoop caches packets at the base station for retransmission.
- Mobile TCP further splits the connection and has the base station defer acknowledgments. It can also inform the sender about handoffs versus interface switches.
- Multiple acknowledgments uses two types of ACKs to isolate the wireless and wired portions of the network.
-
The document provides an overview of LTE (Long Term Evolution) network architecture and transmission schemes. It describes the simplified LTE network elements including eNB, MME, S-GW and P-GW. It explains the downlink transmission scheme using OFDMA and reference signal structure. It also covers uplink transmission using SC-FDMA, control and data channels as well as frame structure in both FDD and TDD modes.
This document outlines the objectives and content for an introduction to data and computer networks course. The objectives are to identify the scope and significance of computer networking, define data communications and networks, describe network components and architecture, illustrate the internet, and explain network communication models. The document then covers topics such as the definition of a network, different network types (LAN, MAN, WAN, internetworks), network requirements, media, topologies (mesh, star, bus, ring), network architectures (peer-to-peer, client-server), and why networks are used.
Audio/Video Conferencing over Publish/Subscribe Messaging SystemsVideoguy
This document discusses integrating audio/video conferencing as a web service using NaradaBrokering, a publish/subscribe messaging system. It describes how RTP is commonly used to transmit multimedia over the internet using UDP or multicast. While multicast has advantages like easy group communication, it has issues like lack of authentication, potential denial of service attacks, and limited multicast domains. The document proposes using a publish/subscribe messaging system like NaradaBrokering to transport RTP, which could address multicast's issues while providing benefits like unified application support and easier management compared to multicast or a dedicated media server. However, it notes this approach adds header overhead which increases bandwidth usage.
This document provides an overview of LTE networks and technology. It discusses key aspects of LTE including peak data rates of 50-100 Mbps, reduced latency under 10ms, OFDMA for downlink and SC-FDMA for uplink, support for bandwidths from 1.4-20 MHz, and mobility support up to 350km/h. It also examines the architecture including elements such as the eNodeB, MME, S-GW, P-GW, and interfaces such as S1, X2.
Introduction To Cellular And Wireless NetworksYoram Orzach
This document provides an overview of cellular and wireless networks. It discusses the history and evolution of 1G to 4G cellular networks, including the development of technologies like GSM, CDMA, UMTS, HSPA and LTE. It also covers the basics of wireless local area networks (WiFi) and describes the IEEE 802.11 standards including 802.11b, 802.11g and 802.11n. Finally, it discusses future trends in both cellular and wireless networks.
The document discusses MPLS (Multi-Protocol Label Switching) including traditional IP forwarding, IP over ATM, MPLS concepts, MPLS architecture, MPLS forwarding, MPLS applications, MPLS protocols, and forwarding equivalence classes. MPLS combines the advantages of connection-oriented forwarding with IP routing by assigning labels to packets and forwarding based on those labels rather than long IP addresses.
Mobile Networking and Ad hoc routing protocols validationIOSR Journals
This document discusses mobile networking and ad hoc routing protocols. It begins with an overview of cellular phone networks and their growth in usage. It then describes mobile ad hoc networks and some of the challenges in designing routing protocols for them. The document evaluates two model checking tools, SPIN and UPPAAL, and discusses their ability to verify properties of ad hoc routing protocols through formal validation methods.
The document discusses Mobile IP, which allows mobile devices to change their point of connection to the internet without changing their IP address. It describes key concepts like the home agent, foreign agent, care-of address, and registration process. Mobile IP addresses issues like triangular routing and proposes optimizations like reverse tunneling to improve efficiency when a mobile node changes locations.
LONG TERM EVOLUTION INVOLVES CHANGES TO BOTH RADIO INTERFACE AND NETWORK ARCHITECTURE IN ORDER TO KEEP 3RD GENERATION PARTNERSHIP PROJECT TECHNOLOGY COMPETITIVE. OFDMA WAS CHOSEN AS THE DOWNLINK AIR INTERFACE DUE TO ITS ADVANTAGES SUCH AS HIGH SPECTRAL EFFICIENCY AND ROBUSTNESS. THE PAPER DESCRIBES THE CELL SEARCH PROCEDURE AND POTENTIAL DESIGNS FOR THE PRIMARY AND SECONDARY SYNCHRONIZATION CHANNELS TO FACILITATE TIMING AND FREQUENCY SYNCHRONIZATION WITH LOW COMPLEXITY. SEVERAL
Improved voice quality with the combination of transport layer & audio codec ...journalBEEI
Improving voice quality over wireless communication becomes a demanding feature for social media apps like facebook, whatsapp and other communication channels. Voice-over-internet protocol (VoIP) helps us to make quick telephone calls over the internet. It includes various mechanism which are signaling, controlling and transport layer. Over wireless links, packet loss and high transmission delay damage voice quality. Here VoIP quality will be measured by three main elements which are signaling protocol, audio codec and transport layer. To improve the overall voice quality, we need to combine these three elements properly to get the best score. Otherwise perceptual speech quality will not be the right tool to measure the voice quality. Here we will use Mean Opinion Score (MOS) for calculated jitter values and end to end delay. At the end, best combination of audio codec & signaling protocol produced the quality speech.
Implementing multicast communication system making use of an existing data ne...iosrjce
This document discusses implementing a multicast communication system using an existing data network to offer free TV channels. It describes how a company can use multicast routing protocols like PIM and IGMP to efficiently stream video to multiple devices. The key advantages of multicast are reducing bandwidth usage and server load compared to unicast. It also discusses challenges like lack of reliability and potential security issues. The document provides an overview of PIM sparse and dense modes and how to configure a prototype multicast network with load balancing and failover between multiple rendezvous points for high availability.
dynamic media streaming over wireless and ip networksNaveen Dubey
The document discusses internet and wireless technologies such as IEEE 802.11, HTTP, and Mobile IP. It describes experiments on dynamic media streaming over wireless networks using different transport protocols like TCP and PRRT. The experiments showed that TCP suffers from throughput variations on wireless networks leading to underutilization of bandwidth. In contrast, PRRT, which implements predictably reliable transport, was able to optimize bandwidth utilization for media streaming over wireless and mobile internet paths.
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPTbabuece
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
BABU M
ASST PROFESSOR
DEPARTMENT OD ELECTRONICS AND COMMUNICATION ENGINEERING
RMK COLLEGE OF ENGINEERING AND TECHNOLOGY
CHENNAI
THIRUVALLUR DISTRICT
Wireless local area networks (WLANs) connect devices within a local area using radio waves instead of wires. They became popular in the 1980s-1990s as a way to share resources like printers and storage over a local area network (LAN). Almost all modern WLANs use the 802.11 standard and operate in the 2.4GHz or 5GHz spectrum. A typical WLAN consists of an access point that connects wireless clients like laptops and smartphones to a wired network backbone. WLANs provide flexibility but come with challenges around interference and security.
Throughput Performance Analysis VOIP over LTEiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Digital and Analog--Bachelor of Computer ApplicationAjay Kumar
1) The document discusses key concepts in analog and digital communications including data, signals, channels, bit rates, bandwidth, modulation techniques, and transmission media.
2) It defines analog signals as continuous signals representing other varying quantities, while digital signals represent discrete values or sequences through techniques like pulse code modulation.
3) A channel refers to a transmission path, with examples including telephone lines, radio frequencies, fiber optic wavelengths, and computer networks. Channel capacity is determined by its bandwidth.
The document provides information about various networking concepts and protocols. It contains 26 questions and answers about topics such as IGMP, ping, tracert, RSVP, DHCP, domains vs workgroups, NAT, PPP, IP spoofing, IP datagrams, application gateways, circuit gateways, default gateways, LANs, intranets vs the Internet, protocols, FTP, the OSI model layers, network types, topologies, IP, TCP, UDP, IP addressing classes, multicasting, DNS, telnet, and SMTP. It also defines MAC addresses.
The document discusses LTE network architecture including nodes like the eNodeB, MME, SGW and PGW, and their functions. It also outlines the basic LTE call flows for initial call setup, detach procedures, idle-to-active transitions, and handovers. Key call flow steps include attach request, authentication, context setup, and establishment of bearers between the UE and PDN gateway.
This document provides an introduction to switching systems. It discusses how telecommunication networks allow entities like computers and humans to transfer information over long distances. The key components of a communication switching system are end systems, transmission systems, switching systems, and signaling. The document traces the historical development of switching technologies from human operators to modern digital systems. It also covers various telephone networks, criteria for network design like grade of service, and different switching approaches like centralized and hierarchical systems.
The document discusses various protocols and approaches for improving the performance of TCP over wireless networks. It notes that wireless networks have higher bit error rates, lower bandwidth, and mobility issues compared to wired networks. Several protocols are described that aim to distinguish wireless losses from congestion losses to avoid unnecessary TCP reactions:
- Indirect TCP splits the connection and handles losses locally at the base station. Snoop caches packets at the base station for retransmission.
- Mobile TCP further splits the connection and has the base station defer acknowledgments. It can also inform the sender about handoffs versus interface switches.
- Multiple acknowledgments uses two types of ACKs to isolate the wireless and wired portions of the network.
-
The document provides an overview of LTE (Long Term Evolution) network architecture and transmission schemes. It describes the simplified LTE network elements including eNB, MME, S-GW and P-GW. It explains the downlink transmission scheme using OFDMA and reference signal structure. It also covers uplink transmission using SC-FDMA, control and data channels as well as frame structure in both FDD and TDD modes.
This document outlines the objectives and content for an introduction to data and computer networks course. The objectives are to identify the scope and significance of computer networking, define data communications and networks, describe network components and architecture, illustrate the internet, and explain network communication models. The document then covers topics such as the definition of a network, different network types (LAN, MAN, WAN, internetworks), network requirements, media, topologies (mesh, star, bus, ring), network architectures (peer-to-peer, client-server), and why networks are used.
This document discusses the synthesis of nano materials using sputtering. It begins by introducing nano materials and describing electron beam lithography and sputtering processes. The document then details the experimental procedure used, which involves using EBL to pattern PMMA resist on a silicon nitride wafer with a desired pattern. Sputtering is then used to co-deposit alumina and silica onto the patterned wafer. Scanning electron microscopy and atomic force microscopy are used to characterize the synthesized nano materials and confirm the presence of uniformly distributed 50nm cubes. Analysis of SEM and AFM images shows the nano materials have a flat surface, good adhesiveness, and low surface roughness.
Dokumen ini memberikan contoh-contoh penulisan bilangan bulat dari 1 hingga 100 dalam bentuk angka dan kata-kata. Terdapat 3 aktiviti pengukuhan yang melibatkan pemadanan bilangan dengan kata-kata dan sebaliknya.
This document contains two short phrases: "38 group" and "Nino talabadze". It does not provide enough context or details to generate a meaningful multi-sentence summary. The document appears to list a group name and a person's name but without additional context around what they refer to or their significance.
This document discusses extremally β-disconnectedness in smooth fuzzy β-centered systems. It introduces the concept of maximal smooth fuzzy β-centered systems and defines the space (R) as the collection of all such systems belonging to a space R. Properties of maximal smooth fuzzy β-centered systems are proved. The space (R) is given a smooth fuzzy maximal structure and shown to be a smooth fuzzy β-compact space with a base of r-fuzzy β-open and β-closed neighborhoods. Finally, smooth fuzzy extremal β-disconnectedness is defined for a smooth fuzzy β-Hausdorff space R as the β-closure of any r-fuzzy β-open set
Impact of Mechanical System in Machining Of AISI 1018 Using Taguchi Design o...IJMER
The imperative objective of the science of metal cutting is the solution of practical problems
associated with the efficient and precise removal of metal from work piece. Optimization of process
parameters is done to have great control over quality, productivity and cost aspects of the process.
Taguchi method stresses the importance of studying the response variation using the signal–to–noise
(S/N) ratio, resulting in minimization of quality characteristic variation due to uncontrollable
parameter. Orthogonal array was adopted in order to planning the (L9) experimental runs in turning of
AISI 1018 by taking the help of software Minitab 16. The MRR and time
This document provides an overview of management fundamentals taught by Professor M. Muzahidul Islam. It defines management as the process of planning, organizing, leading, and controlling resources to achieve organizational goals efficiently and effectively. The nature of management involves using factors of production, applying to any organization, and directing efforts towards common objectives. Management is both a science and an art that teaches skills and utilizes scientific approaches. Excellent companies are oriented towards action, learn customer needs, promote autonomy, and focus on productivity through employee needs.
This document provides a practice exam for ACC 422 with 40 multiple choice questions covering various accounting topics such as cash, receivables, inventory valuation, long-term assets, and intangibles including goodwill. The questions assess understanding of concepts like lower of cost or market, methods of depreciation and capitalization, and impairment of intangible assets.
Associationship is an important component of data mining. In real world applications, the knowledge that is used for aiding decision-making is always time-varying. However, most of the existing data mining approaches rely on the assumption that discovered knowledge is valid indefinitely. For supporting better decision making, it is desirable to be able to actually identify the temporal features with the interesting patterns or rules. This paper presents a novel approach for mining Efficient Temporal Association Rule (ETAR). The basic idea of ETAR is to first partition the database into time periods of item set and then progressively accumulates the occurrence count of each item set based on the intrinsic partitioning characteristics. Explicitly, the execution time of ETAR is, in orders of magnitude, smaller than those required by schemes which are directly extended from existing methods because it scan the database only once.
Visualizing Self - Exploring Your Personal MetricsJennifer Davis
Imagine a future in which you can more easily log, measure, and visualize work in ways that allows you to make decisions about how you improve, and choose work. Let's work together to change the culture around performance reviews by talking about the work we do, share metrics that expose the value of our work, and communicate about our work through visualizations.
This document provides a brief overview of attractions in London including museums such as the British Museum, National Gallery and Tate Gallery. It also mentions parks like St. James Park, Hyde Park and Green Park as well as education and entertainment opportunities. The document conveys greetings and thanks the reader for their attention.
This document summarizes a study that evaluated the spatial and physical factors of open areas in residential complexes (RCs) in Iran, specifically in the Apadana residential complex. The study aimed to improve life quality within RCs by better understanding relationships between internal and external residential areas. 325 households in Apadana were surveyed about the quality of open areas. Results found that 50% rated open area quality as moderate, 48.8% as desirable, and 0.6% as undesirable. Suggestions are made to qualitatively and quantitatively expand open areas by emphasizing spatial and physical factors and relationships between internal and external spaces.
The document discusses a study on the impact of idol immersion activities on water quality in the Budhabalanga River in Balasore, India. Samples were collected before, during, and after immersion periods and analyzed for heavy metal concentrations. The results showed increased levels of calcium, magnesium, chromium, cadmium, lead, arsenic, and other metals in the river water after idol immersions. While religious activities are important, the materials used to make idols like paint with heavy metals can increase pollution levels if immersed. Changes are suggested to make idols and rituals more environmentally friendly.
This document discusses an email automation system created using Java Server Pages (JSP) and SQL Server 2000. The system allows users to send and receive emails and includes features like tracking emails, reporting, adding/removing accounts. It uses a client-server architecture for storage and access. Dataflow diagrams and database tables are presented. The system provides a user-friendly interface and leverages security and recovery of the database platform. Automating email could provide significant benefits in efficiency and reduced workload.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...ijp2p
The vast majority of research in P2P live streaming systems focuses on system architectures that offer to
participating peers: high upload bandwidth utilization, low delays during the video stream diffusion,
robustness and stability under dynamic network conditions and peers behavior. On the other hand in order
to guarantee the complete and on time video distribution to every participating peer, the average upload
bandwidth of the participating peers should be always greater than the playback rate of the video stream.
Most of the approaches do not take into consideration this requirement. Thus, in this paper we propose a
very scalable monitoring mechanism of the total upload bandwidth of the participating peers, which is
dynamic, accurate and with low overhead. Moreover, by exploiting this monitoring mechanism we present
and evaluate an algorithm that allows the accurate and on time estimation of the minimal required
additional bandwidth that an external set of resources (e.g. auxiliary peers) have to contribute. In this way
we guarantee the uninterrupted the stream delivery and provide high Quality of Service (QoS) in live
streaming.
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...ijp2p
The vast majority of research in P2P live streaming systems focuses on system architectures that offer to
participating peers: high upload bandwidth utilization, low delays during the video stream diffusion,
robustness and stability under dynamic network conditions and peers behavior. On the other hand in order
to guarantee the complete and on time video distribution to every participating peer, the average upload
bandwidth of the participating peers should be always greater than the playback rate of the video stream.
Most of the approaches do not take into consideration this requirement. Thus, in this paper we propose a
very scalable monitoring mechanism of the total upload bandwidth of the participating peers, which is
dynamic, accurate and with low overhead. Moreover, by exploiting this monitoring mechanism we present
and evaluate an algorithm that allows the accurate and on time estimation of the minimal required
additional bandwidth that an external set of resources (e.g. auxiliary peers) have to contribute. In this way
we guarantee the uninterrupted the stream delivery and provide high Quality of Service (QoS) in live
streaming.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
This document discusses using network coding to improve live video streaming over peer-to-peer mesh networks. It begins by introducing live video streaming and its challenges. It then discusses peer-to-peer and wireless mesh networks as infrastructures for video distribution. Network coding is presented as a technique to increase bandwidth utilization, robustness, and video quality by allowing intermediate nodes to combine packets before forwarding. The results showed that network coding can reduce delay and jitter, increase data localization, and improve bandwidth utilization and network scalability.
Probabilistic Approach to Provisioning of ITV - Amos K.Amos Kohn
This white paper discusses a probabilistic approach to provisioning network and computing resources for delivering interactive TV. It develops a proprietary spreadsheet model to estimate the costs and benefits of deploying an interactive TV streaming processor. The model is based on analyzing user behavior, data packaging into MPEG streams, required bit rates, transport of data over the forward and return paths, necessary processing power, and financial projections to calculate return on investment.
Probabilistic Approach to Provisioning of ITV - By Amos_KohnAmos Kohn
This white paper discusses a probabilistic approach to provisioning network and computing resources for delivering interactive TV. It develops a proprietary spreadsheet model to estimate the costs and benefits of deploying an interactive TV streaming processor. The model is based on analyzing user behavior, data packaging into MPEG streams, required bit rates, forward and return network paths, processing needs, and financial projections to calculate return on investment.
Delay Efficient Method for Delivering IPTV ServicesIJERA Editor
Internet Protocol Television (IPTV) is a system through which Internet television services are delivered using
the architecture and networking methods of the Internet Protocol Suite over a packet-switched network
infrastructure, e.g., the Internet and broadband Internet access networks, instead of being delivered through
traditional radio frequency broadcast, satellite signal, and cable television (CATV) formats. IPTV provides
mainly three services: live TV, catch up TV, and video on demand (VoD).This paper focuses on delivering the
live TV services by exploiting the virtualised cloud architecture of the IPTV and statistical multiplexing. The
VoD tasks are prescheduled so that there will be less Instant Channel Change (ICC) delay. We select a proper
scheduling algorithm for rescheduling the VoD tasks. We then implement the scheduling algorithm for preshifting
the VoD tasks.
International Journal of Peer to Peer Networks (IJP2P) Vol.6, No.2, August 20...ijp2p
In recent years, research efforts tried to exploit peer-to-peer (P2P) systems in order to provide Live
Streaming (LS) and Video-on-Demand (VoD) services. Most of these research efforts focus on the
development of distributed P2P block schedulers for content exchange among the participating peers and
on the characteristics of the overlay graph (P2P overlay) that interconnects the set of these peers.
Currently, researchers try to combine peer-to-peer systems with cloud infrastructures. They developed
monitoring and control architectures that use resources from the cloud in order to enhance QoS and
achieve an attractive trade-off between stability and low cost operation. However, there is a lack of
research effort on the congestion control of these systems and the existing congestion control architectures
are not suitable for P2P live streaming traffic (small sequential non persistent traffic towards multiple
network locations). This paper proposes a P2P live streaming traffic aware congestion control protocol
that: i) is capable to manage sequential traffic heading to multiple network destinations , ii) efficiently
exploits the available bandwidth, iii) accurately measures the idle peer resources, iv) avoids network
congestion, and v) is friendly to traditional TCP generated traffic. The proposed P2P congestion control
has been implemented, tested and evaluated through a series of real experiments powered across the
BonFIRE infrastructure
This document summarizes a research paper that proposes a congestion control protocol for peer-to-peer live streaming systems. The protocol is designed to handle sequential traffic heading to multiple destinations efficiently, measure available bandwidth accurately, avoid network congestion, and be friendly to traditional TCP traffic. It was implemented and evaluated on a testbed. The key aspects of the proposed protocol are that it controls transmission rates based on acknowledgments from receivers to keep bottleneck queue sizes stable, and aims to fully utilize bandwidth while avoiding bufferbloat.
In recent years, research efforts tried to exploit peer-to-peer (P2P) systems in order to provide Live Streaming (LS) and Video-on-Demand (VoD) services. Most of these research efforts focus on the development of distributed P2P block schedulers for content exchange among the participating peers and on the characteristics of the overlay graph (P2P overlay) that interconnects the set of these peers.Currently, researchers try to combine peer-to-peer systems with cloud infrastructures. They developed monitoring and control architectures that use resources from the cloud in order to enhance QoS and achieve an attractive trade-off between stability and low cost operation. However, there is a lack of
research effort on the congestion control of these systems and the existing congestion control architectures are not suitable for P2P live streaming traffic (small sequential non persistent traffic towards multiple network locations). This paper proposes a P2P live streaming traffic aware congestion control protocol that: i) is capable to manage sequential traffic heading to multiple network destinations , ii) efficiently exploits the available bandwidth, iii) accurately measures the idle peer resources, iv) avoids network congestion, and v) is friendly to traditional TCP generated traffic.The proposed P2P congestion control has been implemented, tested and evaluated through a series of real experiments powered across the BonFIRE infrastructure.
In recent years, research efforts tried to exploit peer-to-peer (P2P) systems in order to provide Live
Streaming (LS) and Video-on-Demand (VoD) services. Most of these research efforts focus on the
development of distributed P2P block schedulers for content exchange among the participating peers and
on the characteristics of the overlay graph (P2P overlay) that interconnects the set of these peers.
Currently, researchers try to combine peer-to-peer systems with cloud infrastructures. They developed
monitoring and control architectures that use resources from the cloud in order to enhance QoS and
achieve an attractive trade-off between stability and low cost operation. However, there is a lack of
research effort on the congestion control of these systems and the existing congestion control architectures
are not suitable for P2P live streaming traffic (small sequential non persistent traffic towards multiple
network locations). This paper proposes a P2P live streaming traffic aware congestion control protocol
that: i) is capable to manage sequential traffic heading to multiple network destinations , ii) efficiently
exploits the available bandwidth, iii) accurately measures the idle peer resources, iv) avoids network
congestion, and v) is friendly to traditional TCP generated traffic. The proposed P2P congestion control
has been implemented, tested and evaluated through a series of real experiments powered across the
BonFIRE infrastructure.
Effective and Secure Scheme for Video Multicasting using Real Time Transport ...IRJET Journal
This document summarizes a research paper that proposes an effective and secure scheme for video multicasting using the Real-Time Transport Protocol (RTP). The system allows users to stream video over a local area network in real-time. It uses RTP to transport video data and the Advanced Encryption Standard (AES) to encrypt the data for security. The system was tested on a local network with a server transmitting video to multiple client systems. Testing showed the system could efficiently multicast high-quality video streams over long distances using LAN cables while maintaining bandwidth efficiency and quality of service compared to unicast transmission.
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...Journal For Research
Media has been a very important medium for entertainment and communications and the captured media was transmitted in analog form. Media providers do not want their end users to store and duplicate the streamed media because the end user can freely distribute the streamed media without any control from the source. Hence while dealing with media streaming, replay protection and integrity protection are the most important factors. The main aim of this paper is to implement the concept of WebRTC to stream the media between the participating end points which is a powerful tool used to incorporate RTC capabilities into browsers and mobile applications. The aim is to develop a secure media stream from an end point that flows through the Open Network Adapter to the Avaya Media Server (AMS) and is hosted by an application on the Engagement Development Platform. The Open Network Adapter with Avaya Fabric Attach is capable of securing the required flow.
Video contents prior storing server forIJCNCJournal
This document proposes a new architecture for multicasting live IPTV traffic in optical access networks. It involves assigning a unique logical link identifier (CLLID) to each IPTV channel. A prior storing server is constructed in the optical line terminal (OLT) and each optical network unit (ONU) to manage multicasting. The document proposes a partial prior storing strategy that considers changes in video content segment popularity over time and user access patterns to compute stored object utility. It also proposes partitioning the prior storage to avoid popular objects being evicted by unpopular objects accessed with higher frequency. Simulation results show the proposed architecture can improve performance and quality of service parameters.
In the last few years, video streaming facilities over TCP or UDP, such as YouTube, Facetime, Daily-motion, Mobile video calling have become more and more popular. The important
challenge in streaming broadcasting over the Internet is to spread the uppermost potential quality,
observe to the broadcasting play out time limitation, and efficiently and equally share the offered
bandwidth with TCP or UDP, and additional traffic types. This work familiarizes the Streaming
Media Data Congestion Control protocol (SMDCC), a new adaptive broadcasting streaming
congestion management protocol in which the connection’s data packets transmission frequency is
adjusted allowing to the dynamic bandwidth share of connection using SMDCC, the bandwidth share
of a connection is projected using algorithms similar to those introduced in TCP Westwood. SMDCC
avoids the Slow Jump phase in TCP. As a result, SMDCC does not show the pronounced rate
alternations distinguishing of modern TCP, so providing congestion control that is more appropriate
for streaming broadcasting applications. Besides, SMDCC is fair, sharing the bandwidth equitably
among a set of SMDCC connections. Main benefit is robustness when packet harms are due to
indiscriminate errors, which is typical of wireless links and is becoming an increasing concern due to
the emergence of wireless Internet access. In the presence of indiscriminate errors, SMDCC is also
approachable to TCP Tahoe and Reno (TTR). We provide simulation results using the ns3 simulator
for our protocol running together with TCP Tahoe and Reno.
Study on Performance of Simulation Analysis on Multimedia NetworkIRJET Journal
This document summarizes a study that simulated voice communication over wired networks using the NS-2 network simulator. The study modeled VoIP traffic between nodes using the SCTP protocol and added background traffic to evaluate its effects. Key findings from the simulation included:
1) Average latency was 0.98 seconds and 98 packets were dropped, indicating degraded performance when background traffic was added.
2) Average jitter (packet delay variation) was calculated to be 0.006 seconds, showing instability in the network with changing traffic patterns.
3) A graph of latency over time demonstrated increased delays and bottlenecks as background traffic overloaded network links.
This document discusses evaluating the performance of video streaming over a simulated mobile WiMAX network using different segment durations. The experiment used OPNET to simulate a mobile client moving near and far from a base station. Video was streamed from a physical server to a client using DASH with segment sizes of 4, 8, and 12 seconds. Analysis found that smaller segments provided smoother streaming with less buffering, while larger segments consumed more CPU power at the client. Proper segment size selection can improve mobile video streaming quality.
1. The document proposes a new protocol called Connection Initiation Protocol (CIP) to improve performance for real-time streaming data transmission over networks.
2. CIP would encapsulate basic connection management tasks and be used alongside RTP for streaming data and RTCP for control signaling.
3. Unlike SIP-based systems, using CIP would reduce network traffic and improve performance for real-time data delivery by establishing a virtual communication channel between parties before transmitting streaming data and not involving the CIP server for RTP/RTCP transmission.
This document discusses the interaction between application layer multicast (ALM) trees and MPEG-4 video streaming. It examines how different coding parameters and tree structures affect end-user video quality as measured by PSNR. The paper presents a simulation system to test various combinations of NICE ALM trees and MPEG-4 parameters. Results show that coding choices and tree organization depend on network characteristics like packet loss and bandwidth distribution. Large GOP sizes and many B-frames optimize quality with rare losses, while small GOPs and fewer B-frames work best with frequent losses. Uniform bandwidth favors small clusters and long paths, while varied bandwidth prefers larger clusters and shorter paths.
Similar to Live Streaming With Receiver-Based P2P Multiplexing for Future IPTV Network (20)
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
- Translucent concrete is a concrete based material with light-transferring properties,
obtained due to embedded light optical elements like Optical fibers used in concrete. Light is conducted
through the concrete from one end to the other. This results into a certain light pattern on the other
surface, depending on the fiber structure. Optical fibers transmit light so effectively that there is
virtually no loss of light conducted through the fibers. This paper deals with the modeling of such
translucent or transparent concrete blocks and panel and their usage and also the advantages it brings
in the field. The main purpose is to use sunlight as a light source to reduce the power consumption of
illumination and to use the optical fiber to sense the stress of structures and also use this concrete as an
architectural purpose of the building
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
A low cost automation system for removal of lint from cottonseed is to be designed and
developed. The setup consists of stainless steel drum with stirrer in which cottonseeds having lint is mixed
with concentrated sulphuric acid. So lint will get burn. This lint free cottonseed treated with lime water to
neutralize acidic nature. After water washing this cottonseeds are used for agriculter purpose
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
The incorporation of natural fibres such as munja fiber composites has gained
increasing applications both in many areas of Engineering and Technology. The aim of this study is to
evaluate mechanical properties such as flexural and tensile properties of reinforced epoxy composites.
This is mainly due to their applicable benefits as they are light weight and offer low cost compared to
synthetic fibre composites. Munja fibres recently have been a substitute material in many weight-critical
applications in areas such as aerospace, automotive and other high demanding industrial sectors. In
this study, natural munja fibre composites and munja/fibreglass hybrid composites were fabricated by a
combination of hand lay-up and cold-press methods. A new variety in munja fibre is the present work
the main aim of the work is to extract the neat fibre and is characterized for its flexural characteristics.
The composites are fabricated by reinforcing untreated and treated fibre and are tested for their
mechanical, properties strictly as per ASTM procedures.
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
Hybrid engine is a combination of Stirling engine, IC engine and Electric motor. All these 3 are
connected together to a single shaft. The power source of the Stirling engine will be a Solar Panel. The aim of
this is to run the automobile using a Hybrid engine
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
This document summarizes research on the fabrication and characterization of bio-composite materials using sunnhemp fibre. The document discusses how sunnhemp fibre was used to reinforce an epoxy matrix through hand lay-up methods. Various mechanical properties of the bio-composites were tested, including tensile, flexural, and impact properties. The results of the mechanical tests on the bio-composite specimens are presented. Potential applications of the sunnhemp fibre bio-composites are also suggested, such as in fall ceilings, partitions, packaging, automotive interiors, and toys.
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
The Greenstone belts of Karnataka are enriched in BIFs in Dharwar craton, where Iron
formations are confined to the basin shelf, clearly separated from the deeper-water iron formation that
accumulated at the basin margin and flanking the marine basin. Geochemical data procured in terms of
major, trace and REE are plotted in various diagrams to interpret the genesis of BIFs. Al2O3, Fe2O3 (T),
TiO2, CaO, and SiO2 abundances and ratios show a wide variation. Ni, Co, Zr, Sc, V, Rb, Sr, U, Th,
ΣREE, La, Ce and Eu anomalies and their binary relationships indicate that wherever the terrigenous
component has increased, the concentration of elements of felsic such as Zr and Hf has gone up. Elevated
concentrations of Ni, Co and Sc are contributed by chlorite and other components characteristic of basic
volcanic debris. The data suggest that these formations were generated by chemical and clastic
sedimentary processes on a shallow shelf. During transgression, chemical precipitation took place at the
sediment-water interface, whereas at the time of regression. Iron ore formed with sedimentary structures
and textures in Kammatturu area, in a setting where the water column was oxygenated.
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
In this paper, the mechanical characteristics of C45 medium carbon steel are investigated
under various working conditions. The main characteristic to be studied on this paper is impact toughness
of the material with different configurations and the experiment were carried out on charpy impact testing
equipment. This study reveals the ability of the material to absorb energy up to failure for various
specimen configurations under different heat treated conditions and the corresponding results were
compared with the analysis outcome
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
Robot guns are being increasingly employed in automotive manufacturing to replace
risky jobs and also to increase productivity. Using a single robot for a single operation proves to be
expensive. Hence for cost optimization, multiple guns are mounted on a single robot and multiple
operations are performed. Robot Gun structure is an efficient way in which multiple welds can be done
simultaneously. However mounting several weld guns on a single structure induces a variety of
dynamic loads, especially during movement of the robot arm as it maneuvers to reach the weld
locations. The primary idea employed in this paper, is to model those dynamic loads as equivalent G
force loads in FEA. This approach will be on the conservative side, and will be saving time and
subsequently cost efficient. The approach of the paper is towards creating a standard operating
procedure when it comes to analysis of such structures, with emphasis on deploying various technical
aspects of FEA such as Non Linear Geometry, Multipoint Constraint Contact Algorithm, Multizone
meshing .
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
This paper aims to do modelling, simulation and performing the static analysis of a go
kart chassis consisting of Circular beams. Modelling, simulations and analysis are performed using 3-D
modelling software i.e. Solid Works and ANSYS according to the rulebook provided by Indian Society of
New Era Engineers (ISNEE) for National Go Kart Championship (NGKC-14).The maximum deflection is
determined by performing static analysis. Computed results are then compared to analytical calculation,
where it is found that the location of maximum deflection agrees well with theoretical approximation but
varies on magnitude aspect.
In récent year various vehicle introduced in market but due to limitation in
carbon émission and BS Séries limitd speed availability vehicle in the market and causing of
environnent pollution over few year There is need to decrease dependancy on fuel vehicle.
bicycle is to be modified for optional in the future To implement new technique using change in
pedal assembly and variable speed gearbox such as planetary gear optimise speed of vehicle
with variable speed ratio.To increase the efficiency of bicycle for confortable drive and to
reduce torque appli éd on bicycle. we introduced epicyclic gear box in which transmission done
throgh Chain Drive (i.e. Sprocket )to rear wheel with help of Epicyclical gear Box to give
number of différent Speed during driving.To reduce torque requirent in the cycle with change in
the pedal mechanism
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
This document discusses integrating the Spring, Struts, and Hibernate frameworks to develop enterprise applications. It provides an overview of each framework and their features. The Spring Framework is a lightweight, modular framework that allows for inversion of control and aspect-oriented programming. It can be used to develop any or all tiers of an application. The document proposes an architecture for an e-commerce website that integrates these three frameworks, with Spring handling the business layer, Struts the presentation layer, and Hibernate the data access layer. This modular approach allows for clear separation of concerns and reduces complexity in application development.
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
Microcontroller based Automatic Sprinkler System is a new concept of using
intelligence power of embedded technology in the sprinkler irrigation work. Designed system replaces
the conventional manual work involved in sprinkler irrigation to automatic process. Using this system a
farmer is protected against adverse inhuman weather conditions, tedious work of changing over of
sprinkler water pipe lines & risk of accident due to high pressure in the water pipe line. Overall
sprinkler irrigation work is transformed in to a comfortableautomatic work. This system provides
flexibility & accuracy in respect of time set for the operation of a sprinkler water pipe lines. In present
work the author has designed and developed an automatic sprinkler irrigation system which is
controlled and monitored by a microcontroller interfaced with solenoid valves.
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
This document introduces and studies the concept of δˆ s-locally closed sets in ideal topological spaces. Some key points:
- A subset A is δˆ s-locally closed if A can be written as the intersection of a δˆ s-open set and a δˆ s-closed set.
- Various properties of δˆ s-locally closed sets are introduced and characterized, including relationships to other concepts like generalized locally closed sets.
- It is shown that a subset A is δˆ s-locally closed if and only if A can be written as the intersection of a δˆ s-open set and the δˆ s-closure of A.
- Theore
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
This paper present an approach based on the combination of, two techniques using
decision tree and Association rule mining for Probe attack detection. This approach proves to be
better than the traditional approach of generating rules for fuzzy expert system by clustering methods.
Association rule mining for selecting the best attributes together and decision tree for identifying the
best parameters together to create the rules for fuzzy expert system. After that rules for fuzzy expert
system are generated using association rule mining and decision trees. Decision trees is generated for
dataset and to find the basic parameters for creating the membership functions of fuzzy inference
system. Membership functions are generated for the probe attack. Based on these rules we have
created the fuzzy inference system that is used as an input to neuro-fuzzy system. Fuzzy inference
system is loaded to neuro-fuzzy toolbox as an input and the final ANFIS structure is generated for
outcome of neuro-fuzzy approach. The experiments and evaluations of the proposed method were
done with NSL-KDD intrusion detection dataset. As the experimental results, the proposed approach
based on the combination of, two techniques using decision tree and Association rule mining
efficiently detected probe attacks. Experimental results shows better results for detecting intrusions as
compared to others existing methods
Natural Language Ambiguity and its Effect on Machine LearningIJMER
This document discusses natural language ambiguity and its effect on machine learning. It begins by introducing different types of ambiguity that exist in natural languages, including lexical, syntactic, semantic, discourse, and pragmatic ambiguities. It then examines how these ambiguities present challenges for computational linguistics and machine translation systems. Specifically, it notes that ambiguity is a major problem for computers in processing human language as they lack the world knowledge and context that humans use to resolve ambiguities. The document concludes by outlining the typical process of machine translation and how ambiguities can interfere with tasks like analysis, transfer, and generation of text in the target language.
Today in era of software industry there is no perfect software framework available for
analysis and software development. Currently there are enormous number of software development
process exists which can be implemented to stabilize the process of developing a software system. But no
perfect system is recognized till yet which can help software developers for opting of best software
development process. This paper present the framework of skillful system combined with Likert scale. With
the help of Likert scale we define a rule based model and delegate some mass score to every process and
develop one tool name as MuxSet which will help the software developers to select an appropriate
development process that may enhance the probability of system success.
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
The present study investigates the creep in a thick-walled composite cylinders made
up of aluminum/aluminum alloy matrix and reinforced with silicon carbide particles. The distribution
of SiCp is assumed to be either uniform or decreasing linearly from the inner to the outer radius of
the cylinder. The creep behavior of the cylinder has been described by threshold stress based creep
law with a stress exponent of 5. The composite cylinders are subjected to internal pressure which is
applied gradually and steady state condition of stress is assumed. The creep parameters required to
be used in creep law, are extracted by conducting regression analysis on the available experimental
results. The mathematical models have been developed to describe steady state creep in the composite
cylinder by using von-Mises criterion. Regression analysis is used to obtain the creep parameters
required in the study. The basic equilibrium equation of the cylinder and other constitutive equations
have been solved to obtain creep stresses in the cylinder. The effect of varying particle size, particle
content and temperature on the stresses in the composite cylinder has been analyzed. The study
revealed that the stress distributions in the cylinder do not vary significantly for various combinations
of particle size, particle content and operating temperature except for slight variation observed for
varying particle content. Functionally Graded Materials (FGMs) emerged and led to the development
of superior heat resistant materials.
Energy Audit is the systematic process for finding out the energy conservation
opportunities in industrial processes. The project carried out studies on various energy conservation
measures application in areas like lighting, motors, compressors, transformer, ventilation system etc.
In this investigation, studied the technical aspects of the various measures along with its cost benefit
analysis.
Investigation found that major areas of energy conservation are-
1. Energy efficient lighting schemes.
2. Use of electronic ballast instead of copper ballast.
3. Use of wind ventilators for ventilation.
4. Use of VFD for compressor.
5. Transparent roofing sheets to reduce energy consumption.
So Energy Audit is the only perfect & analyzed way of meeting the Industrial Energy Conservation.
An Implementation of I2C Slave Interface using Verilog HDLIJMER
This document describes the implementation of an I2C slave interface using Verilog HDL. It introduces the I2C protocol which uses only two bidirectional lines (SDA and SCL) for communication. The document discusses the I2C protocol specifications including start/stop conditions, addressing, read/write operations, and acknowledgements. It then provides details on designing an I2C slave module in Verilog that responds to commands from an I2C master and allows synchronization through clock stretching. The module is simulated in ModelSim and synthesized in Xilinx. Simulation waveforms demonstrate successful read and write operations to the slave device.
Discrete Model of Two Predators competing for One PreyIJMER
This paper investigates the dynamical behavior of a discrete model of one prey two
predator systems. The equilibrium points and their stability are analyzed. Time series plots are obtained
for different sets of parameter values. Also bifurcation diagrams are plotted to show dynamical behavior
of the system in selected range of growth parameter
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Essentials of Automations: The Art of Triggers and Actions in FME
Live Streaming With Receiver-Based P2P Multiplexing for Future IPTV Network
1. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2313-2316 ISSN: 2249-6645
www.ijmer.com 2313 | Page
Md. Amanatulla1
, G. Sri Devi2
, Syed Sadat Ali3
1
M. Tech (CSE), Nimra College of Engineering & Technology, Vijayawada, A.P., India
2
Assoc.Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India
3
Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A. P., India
ABSTRACT: Future broadcast network concentrates on IPTV (Internet Protocol TeleVision). The main hurdle in IPTV is
streaming of audio and video signals. A number of commercial systems are built to study and analyze the behaviour of live
streaming of audio and video signals. Peer to Peer multiplexing (P2P) provides a good solution for this problem. In this paper a
variation of P2P multiplexing is proposed which is called as receiver based P2P multiplexing. To analyze the performance of the
proposed multiplexing techniques the very famous European network “Zatto” is considered. This paper also describes the
network architecture of Zatto and uses the data collected from the provider to evaluate the performance of the proposed
variation in P2P multiplexing.
KEYWORDS: IPTV, Live Streaming, Peer to Peer Multiplexing.
I. INTRODUCTION
Current generation broadcast network for TV is DTH which will be slowly replaced by the next generation Internet
Protocol Television (IPTV) network. There is an emerging market for IPTV. Numerous commercial systems now offer services
over the Internet that is similar to traditional over-the-air, cable, or satellite TV. Live television, time-shifted programming, and
content-on-demand are all presently available over the Internet. Increased broadband speed, growth of broadband subscription
base, and improved video compression technologies have contributed to the emergence of these IPTV services [1][6]. IPTV
systems deliver video and audio channels to viewing devices by switching a single channel to multiple sources. IP Television
networks are primarily constructed of computer servers, gateways, access connections and end user display devices. Servers
control the overall system access and processing of channel connection requests and gateways convert the IP television network
data to signals that can be used by television media viewers.
Content aggregation is the process of combining multiple content sources for distribution through other communication
channels. A head end is part of a television system that selects and processes video signals for distribution into a television
distribution network. The core network is the central network portion of a communication system. The core network primarily
provides interconnection and transfer between edge networks. An access network is a portion of a communication network (such
as the public switched telephone network) that allows individual subscribers or devices to connect to the core network. A
premises distribution network (PDN) consists of the equipment and software that are used to transfer data and other media in a
customer's facility or home. A viewing device is a combination of hardware and software that can convert media such as video,
audio or images into a form that can be experienced by humans. The network archicture of IPTV is shown in Fig1.
Peer to peer multiplexing is mainly used for Live streaming of video and audio. User draw a distinction between three uses of
peer-to-peer (P2P) [1] networks: delay-tolerant file download of archival material, delay-sensitive progressive download (or
streaming) of archival material, and real-time live streaming. In the first case, the completion of download is elastic, depending
on available bandwidth in the P2P network. The application buffer receives data as it trickles in and informs the user upon the
completion of download. The user can start playing back the file for viewing in the case of a video file. Bit torrent and variants
are examples of delay-tolerant file download systems. In the second case, video playback starts as soon as the application
assesses it has sufficient data buffered that, given the estimated download rate and the playback rate, it will not deplete the buffer
before the end of file. If this assessment is wrong, the application would have to either pause playback or rebuffed or slow down
playback. While users would like playback to start as soon as possible, the application has some degree of freedom in trading off
playback start time against estimated network capacity. Most video-on-demand systems are examples of delay-sensitive
progressive-download application. The third case, real-time live streaming has the most stringent delay requirement. While
progressive download may tolerate initial buffering of tens of seconds or even minutes, live streaming generally cannot tolerate
more than a few seconds of buffering. Taking into account the delay introduced by signal ingest and encoding, and network
transmission and propagation, the live streaming system can introduce only a few seconds of buffering time end-to-end and still
be considered ―live‖ . The Zattoo peer-to-peer live streaming system was a free-to-use network serving over 3 million
registered users in eight European countries at the time of study, with a maximum of over 60 000 concurrent users on a single
channel. The system delivers live streams using a receiver-based, peer-division multiplexing scheme.
Live Streaming With Receiver-Based P2P Multiplexing
for Future IPTV Network
2. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2313-2316 ISSN: 2249-6645
www.ijmer.com 2314 | Page
Fig. 1 Architecture of IPTV
To ensure real-time performance when peer uplink capacity is below requirement, Zattoo subsidizes the network’s bandwidth
requirement, as described in. After delving into Zattoo’s architecture in detail, large-scale measurements collected during the live
broadcast of the UEFA European Football Championship, one of the most popular one-time events in Europe, in June 2008 [5].
During the course of that month, Zattoo served more than 35 million sessions to more than 1 million distinct users.
II. SYSTEM ARCHITECTURE
The Zattoo system rebroadcasts live TV, captured from satellites, onto the Internet. The system carries each TV channel
on a separate peer-to-peer delivery network and is not limited in the number of TV channels it can carry. Although a peer can
freely switch from one TV channel to another, thereby departing and joining different peer-to-peer networks, it can only join one
peer-to-peer network at any one time. Users are required to register themselves at the Zattoo Web site to download a free copy of
the Zattoo player application. To receive the signal of a channel, the user first authenticates itself to the Zattoo Authentication
Server. Upon authentication, the user is granted a ticket with limited lifetime. The user then presents this ticket, along with the
identity of the TV channel of interest, to the Zattoo Rendezvous Server. If the ticket specifies that the user is authorized to receive
signal of the said TV channel, the Rendezvous Server returns to the user a list of peers currently joined to the P2P network
carrying the channel, together with a signed channel ticket. If the user is the first peer to join a channel, the list of peers it
receives contain only the Encoding Server. The user joins the channel by contacting the peers returned by the Rendezvous
Server, presenting its channel ticket, and obtaining the live stream of the channel from them. Zattoo uses the Reed–Solomon
(RS) error correcting code (ECC) for forward error correction [2]. The RS code is a systematic code: of the n packets sent per
segment, k<n packets carry the live stream data, while the remainder carries the redundant data [3]. Due to the variable-bit rate
nature of the data stream, the time period covered by a segment is variable, and a packet may be of size less than the maximum
packet size.
III. RECEIVER BASED P2P MULTIPLEXING
A. P2P Multiplexing
FWhen a new peer requests to join an existing peer, it specifies the
substream(s) it would like to receive from the existing peer [4]. These
substreams do not have to be consecutive. Contingent upon availability
of bandwidth at existing peers, the receiving peer
decides how to multiplex a stream onto its set of neighboring peers,
giving rise to our description of the Zattoo live streaming protocol as a
receiver-based, peer-division multiplexing protocol. To minimize per-
packet processing time of a stream, the Zattoo protocol sets up a virtual
circuit with multiple fan outs at each peer. When a peer joins a TV
Fig 2. Peer system with an IOB channel, it establishes a peer-division multiplexing (PDM) scheme
among a set of neighboring peers by building a virtual circuit to each of the neighboring peers. Baring departure or performance
degradation of a neighbor peer, the virtual circuits are maintained until the joining peer switches to another TV channel. With the
virtual circuits set up, each packet is forwarded without further per-packet handshaking between peers. The PDM establishment
process consists of two phases: the search phase and the join phase. Search Phase: To obtain a list of potential neighbors, a
joining peer sends out a SEARCH message to a random subset of the existing peers returned by the Rendezvous Server. The
SEARCH message contains the substream indices for which this joining peer is looking for peering relationships. The joining
peer continues to wait for SEARCH replies until the set of potential neighbors contains at least a minimum number of peers, or
until all SEARCH replies have been received. Join Phase: Once the set of potential neighbors is established, the joining peer
sends JOIN requests to each potential neighbor. The JOIN request lists the substreams for which the joining peer would like to
construct virtual circuit with the potential neighbor.
B. Stream Management: The IOB is referenced by an input pointer, a repair pointer, and one or more output pointers. The
input pointer points to the slot in the IOB where the next incoming packet with sequence number higher than the highest
3. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2313-2316 ISSN: 2249-6645
www.ijmer.com 2315 | Page
sequence number received so far will be stored. The repair pointer always points one slot beyond the last packet received in order
and is used to regulate packet retransmission and adaptive PDM [3] as described later. Different peers may request for different
numbers of, possibly nonconsecutive, substreams. To accommodate the different forwarding rates and regimes required by the
destinations, we associate a packet map and forwarding discipline with each output pointer. Fig. 3 shows the packet map
associated with an output peer pointer where the peer has requested substreams 1, 4, 9, and 14. Every time a peer pointer is
repositioned to the beginning of a sub-buffer of the IOB, all the packet slots of the requested substreams are marked NEEDed
and all the slots of the substreams not requested by the peer are marked SKIP. When a NEEDed packet arrives and is stored in
the IOB, its state in the packet map is changed to READY. As the peer pointer moves along its associated packet map, READY
packets are forwarded to the peer and their states changed to SENT. A slot marked NEEDed but not READY, such as slot n+4
In addition to achieving lossless recording, we use retransmission to let a
peer recover from transient network congestion. A peer sends out a
retransmission request when the distance between the repair pointer and
the input pointer has reached a threshold of R packet slots, usually
spanning multiple segments. A retransmission request consists of an R bit
packet mask, with each bit representing a packet, and the sequence
Fig. 3 Packet Map Associated with peer map number of the packet corresponding to the first bit. Marked bits in the
packet mask indicate that the corresponding packets need to be retransmitted. When a packet loss is detected, it could be caused
by congestion on the virtual circuits forming the current PDM or congestion on the path beyond the neighboring peers. In either
case, current neighbor peers will not be good sources of retransmitted packets.
C. Adaptive PDM: Peers on the Zattoo network can redistribute a highly variable number of substreams, reflecting the high
variability in uplink bandwidth of different access network technologies [7]. For a full-stream consisting of 16 constant-bit rate
substreams, our prior study showed that based on realistic peer characteristics measured from the Zattoo network, half of the
peers can support less than half of a stream, 82% of peers can support less than a full-stream, and the remainder can support up to
10 full streams (peers that can redistribute more than a full stream is conventionally known as supernodes in the literature) [5].
With variable- bit rate streams, the bandwidth carried by each substream is also variable. To increase peer bandwidth usage,
without undue degradation of service, we instituted measurement-based admission control at each peer. In addition to controlling
resource commitment, another goal of the measurement-based admission control module is to continually estimate the amount of
available uplink bandwidth at a peer.
The amount of available uplink bandwidth at a peer is initially estimated by the peer sending a pair of probe packets to
Zattoo’s Bandwidth Estimation Server. Once a peer starts forwarding substreams to other peers, it will receive from those peers
quality-of-service feedbacks that inform its update of available uplink bandwidth estimate. A peer sends quality-of-service
feedback only if the quality of a substream drops below a certain threshold [9]. Upon receiving quality feedback from multiple
peers, a peer first determines if the identified substreams are arriving in low quality. If so, the low quality of service may not be
caused by limit on its own available uplink bandwidth—in which case, it ignores the low quality feedbacks. Otherwise, the peer
decrements its estimate of available uplink bandwidth. If the new estimate is below the bandwidth needed to support existing
number of virtual circuits, the peer closes a virtual circuit. To reduce the instability introduced into the network, a peer closes
first the virtual circuit carrying the smallest number of sub streams. Each peer on the Zattoo network is assumed to serve a user
through a media player, which means that each peer must receive, and can potentially forward, all sub streams of the TV channel
the user is watching. The limited redistribution capacity of peers on the Zattoo network means that a typical client can contribute
only a fraction of the sub streams that make up a channel. This shortage of bandwidth leads to a global bandwidth deficit in the
peer-to-peer network. In the Zattoo system, two separate centralized collector servers collect usage statistics and error reports,
which we call the ―stats‖ server and the ―user-feedback‖ server respectively.The ―stats‖ server periodically collects
aggregated player statistics from individual peers, from which full session logs are constructed and entered into a session
database. The session database gives a complete picture of all past and present sessions served by the Zattoo system. A given
database entry contains statistics about a particular session, which includes join time, leave time, uplink bytes, download bytes,
and channel name associated with the session. Receiver based multiplexing ensures error free and feedback based server in Zatoo
collects the feedback and tries to reduce the delay in data delivery.
IV. CONCLUSION
A receiver-based, peer-division multiplexing engine to deliver live streaming content on a peer-to-peer network. The
same engine can be used to transparently build a hybrid P2P/CDN delivery network by adding Repeater nodes to the network.
By analyzing a large amount of usage data collected on the network during one of the largest viewing events in Europe, we have
shown that the resulting network can scale to a large number of users and can take good advantage of available uplink bandwidth
at peers. We have also shown that error-correcting code and packet retransmission can help improve network stability by
isolating packet losses and preventing transient congestion from resulting in PDM reconfigurations.
4. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2313-2316 ISSN: 2249-6645
www.ijmer.com 2316 | Page
REFERENCES
[1]. R. auf der Maur, ―Die Weiterverbreitung von TV- und Radioprogrammenüber IP-basierte Netze,‖ in Entertainment Law, F. d.
Schweiz, Ed., 1st ed. Bern, Switzerland: Stämpfli Verlag, 2006.
[2]. Euro2008,‖ UEFA [Online]. Available: http://www1.uefa.com/ [3] S. Lin and D. J. Costello Jr., Error Control Coding, 2nd ed.
Englewood Cliffs, NJ: Pearson Prentice-Hall, 2004.
[3]. S. Xie, B. Li, G. Y. Keung, and X. Zhang, ―CoolStreaming: Design, theory, and practice,‖ IEEE Trans. Multimedia, vol. 9, no. 8, pp.
1661–1671, Dec. 2007.
[4]. K. Shami et al., ―Impacts of peer characteristics on P2PTV networks scalability,‖ in Proc. IEEE INFOCOM, Apr. 2009, pp. 2736–
2740.
[5]. Bandwidth test statistics across different countries,‖ Bandwidth- Test.net [Online]. Available: http://www.bandwidth-test.
net/stats/country/
[6]. X. Hei, C. Liang, J. Liang, Y. Liu, and K. W. Ross, ―Insights into PPLive: A measurement study of a large-scale P2P IPTV system,‖
in Proc. IPTV Workshop, Int. World Wide Web Conf., May 2006.
[7]. B. Li et al., ―An empirical study of flash crowd dynamics in a P2Pbased live video streaming system,‖ in Proc. IEEE GLOBECOM,
2008, pp. 1–5.
[8]. J. Rosenberg et al., ―STUN—Simple traversal of User Datagram Protocol (UDP) through network address translators (NATs),‖ RFC
3489, 1993.
[9]. Ali, A. Mathur, and H. Zhang, ―Measurement of commercial peer-to-peer live video streaming,‖ in Proc. Workshop Recent Adv.
Peer-to-Peer Streaming, Aug. 2006.
[10]. Hyunseok Chang, Sugih Jamin, and Wenjie Wang – Live Streaming with Receiver Based PDM || in IEEE/ACM TRANSACTIONS ON
NETWORKING, vol. 19, no. 1, Feb 2011.