Recently the VoIP technology has been used for the purpose of voice conversation through the
Internet since the proliferation of smart phones. In this paper, we are interested in the network performance
of the group communication a.k.a. the push-to-talk (PTT) service. As the media traffic to a VoIP server
increases, the VoIP server can be a bottleneck and the voice quality can be declined, which results from the
asymmetry between the in-bound traffic and the out-bound traffic in a VoIP server. To simulate the voice
packet transfer of the group communication, we use ns-2.34 and the ns2VoIP++ package to calculate the
end-to-end mean opinion score. Simulation results show that both the packet error rate and the packet delay
have a significant effect on the performance in terms of the mean opinion score.
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 ijngnjournal
Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6) both are the mobility management solutions proposed by the Internet Engineering Task Force (IETF) to support IP Mobility. It’s been an important issue, that upon certain condition, out of MIPv6 and HMIPv6 which one is better. In this paper an Optimum Efficient Mobility Management (OEMM) scheme is described on the basis of analytical model which shows that OEMM Scheme is better in terms of performance and applicability of MIPv6 and HMIPv6. It shows that which one is better alternative between MIPv6 and HMIPv6 and if HMIPv6 is adopted it chooses the best Mobility Anchor Point (MAP). Finally it is illustrated that OEMM scheme is
better than that of MIPv6 and HMIPv6.
The document discusses various topics related to network layer in computer networks including network layer services, packet switching, IP addressing, forwarding of IP packets, routing algorithms, and IP protocols. Specifically, it covers logical addressing, services provided at different nodes, forwarding methods based on destination address and labels, IP version 4 addressing including classes and subnetting, and processing of packets at routers and destination computers.
The document proposes a solution for interconnecting connectionless and connection-oriented networks that allows gateways to set up connections through the connection-oriented network for certain traffic when data arrives before a connection is established. It describes using routing protocols to share routing information between gateways and holding up packets at the gateway until a connection is set up, either by triggering connection establishment from transport layer headers or using small provisioned connections. The solution aims to take advantage of shorter paths through the connection-oriented network when possible.
This document discusses the seven layers of the OSI model. It describes each layer in detail, including their functions and protocols. The physical layer is responsible for transmitting raw bits over a communication channel. The data link layer handles framing and accessing the physical medium. The network layer handles logical addressing and routing. The transport layer provides reliable data transmission and flow control. The session layer manages connections between applications. The presentation layer converts between different data representations. The application layer contains protocols for common network applications and interacts directly with software.
The document describes the Internet Protocol version 4 (IPv4). It discusses the IPv4 datagram format including the header fields, fragmentation, and options. It also covers how IPv4 provides an unreliable datagram delivery service and must be paired with TCP for reliability. The document discusses security issues with IPv4 like packet sniffing, modification, and spoofing, and how IPSec can provide protection against these attacks.
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...TELKOMNIKA JOURNAL
In the future wireless systems, non-orthogonal multiple-access (NOMA) with partial relay selection scheme is considered as developing research topic. In this paper, dual-hop relaying systems is deployed for NOMA, in which the signals are communicated with the assistance of decode-and-forward (DF) scheme. This paper presents exact expressions for outage probability over independent Rayleigh fading channels, and two partial relay selection schemes are provided. Using analytical result and Monte-Carlo method, we introduce forwarding strategy selection for fixed user allocation and exactness of derived formula is checked. The presented simulations confirm the the advantage of such proposed NOMA, and the effectiveness of the proposed forwarding strategy.
On-Demand Multicast Routing Protocol.
This paper presents a novel multicast routing protocol for mobile ad hoc wireless networks. The protocol, termed ODMRP (On-Demand Multicast Routing Protocol), is a mesh-based, rather than a conventional tree- based, multicast scheme and uses a forwarding group concept (only a sub- set of nodes forwards the multicast packets via scoped flooding). It applies on-demand procedures to dynamically build routes and maintain multicast group membership. ODMRP is well suited for ad hoc wireless networks with mobile hosts where bandwidth is limited, topology changes frequently, and power is constrained. We evaluate ODMRP’s scalability and performance via simulation.
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 ijngnjournal
Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6) both are the mobility management solutions proposed by the Internet Engineering Task Force (IETF) to support IP Mobility. It’s been an important issue, that upon certain condition, out of MIPv6 and HMIPv6 which one is better. In this paper an Optimum Efficient Mobility Management (OEMM) scheme is described on the basis of analytical model which shows that OEMM Scheme is better in terms of performance and applicability of MIPv6 and HMIPv6. It shows that which one is better alternative between MIPv6 and HMIPv6 and if HMIPv6 is adopted it chooses the best Mobility Anchor Point (MAP). Finally it is illustrated that OEMM scheme is
better than that of MIPv6 and HMIPv6.
The document discusses various topics related to network layer in computer networks including network layer services, packet switching, IP addressing, forwarding of IP packets, routing algorithms, and IP protocols. Specifically, it covers logical addressing, services provided at different nodes, forwarding methods based on destination address and labels, IP version 4 addressing including classes and subnetting, and processing of packets at routers and destination computers.
The document proposes a solution for interconnecting connectionless and connection-oriented networks that allows gateways to set up connections through the connection-oriented network for certain traffic when data arrives before a connection is established. It describes using routing protocols to share routing information between gateways and holding up packets at the gateway until a connection is set up, either by triggering connection establishment from transport layer headers or using small provisioned connections. The solution aims to take advantage of shorter paths through the connection-oriented network when possible.
This document discusses the seven layers of the OSI model. It describes each layer in detail, including their functions and protocols. The physical layer is responsible for transmitting raw bits over a communication channel. The data link layer handles framing and accessing the physical medium. The network layer handles logical addressing and routing. The transport layer provides reliable data transmission and flow control. The session layer manages connections between applications. The presentation layer converts between different data representations. The application layer contains protocols for common network applications and interacts directly with software.
The document describes the Internet Protocol version 4 (IPv4). It discusses the IPv4 datagram format including the header fields, fragmentation, and options. It also covers how IPv4 provides an unreliable datagram delivery service and must be paired with TCP for reliability. The document discusses security issues with IPv4 like packet sniffing, modification, and spoofing, and how IPSec can provide protection against these attacks.
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...TELKOMNIKA JOURNAL
In the future wireless systems, non-orthogonal multiple-access (NOMA) with partial relay selection scheme is considered as developing research topic. In this paper, dual-hop relaying systems is deployed for NOMA, in which the signals are communicated with the assistance of decode-and-forward (DF) scheme. This paper presents exact expressions for outage probability over independent Rayleigh fading channels, and two partial relay selection schemes are provided. Using analytical result and Monte-Carlo method, we introduce forwarding strategy selection for fixed user allocation and exactness of derived formula is checked. The presented simulations confirm the the advantage of such proposed NOMA, and the effectiveness of the proposed forwarding strategy.
On-Demand Multicast Routing Protocol.
This paper presents a novel multicast routing protocol for mobile ad hoc wireless networks. The protocol, termed ODMRP (On-Demand Multicast Routing Protocol), is a mesh-based, rather than a conventional tree- based, multicast scheme and uses a forwarding group concept (only a sub- set of nodes forwards the multicast packets via scoped flooding). It applies on-demand procedures to dynamically build routes and maintain multicast group membership. ODMRP is well suited for ad hoc wireless networks with mobile hosts where bandwidth is limited, topology changes frequently, and power is constrained. We evaluate ODMRP’s scalability and performance via simulation.
This document summarizes a faculty development program on computer networks held from April 24-30, 2019. On April 25, Dr. A. Kathirvel from MNM Jain Engineering College gave a lecture covering various topics related to the data link layer, including data link protocols, media access control, encoding, framing, and error detection techniques. Specific protocols and concepts discussed include HDLC, PPP, Manchester encoding, 4B/5B encoding, byte-oriented and bit-oriented framing, CRC, checksums, and two-dimensional parity.
This document describes slides for a chapter on the transport layer. It states that the slides can be freely used and modified for educational purposes with proper attribution. It asks users to mention the source if the slides are used for a class and to note any adaptation if slides are posted online. The document also provides copyright information for the material.
RS Codes for Downlink LTE System over LTE-MIMO ChannelTELKOMNIKA JOURNAL
This document summarizes a study that used Reed-Solomon codes with a downlink Long Term Evolution (LTE) system over an LTE Multiple-Input Multiple-Output (MIMO) channel to improve performance. Reed-Solomon codes were chosen because they have low decoding complexity compared to convolutional and turbo codes. Simulation results showed that using Reed-Solomon codes decreased the bit error rate more than convolutional or turbo codes. Additionally, increasing the number of antennas in the LTE-MIMO channel provided further improvements to downlink LTE system performance. BPSK modulation provided better performance gains compared to QPSK when used with Reed-Solomon codes over the LTE-MIMO channel.
Quantitative Evaluation for PMPIv6 Multicast Fast Reroute OperationsjournalBEEI
This paper evaluates Proxy Mobile Internet Protocol Version 6 (PMIPv6) multicast fast reroute operations using quantitative analysis. The motivation is to cater the fast growth of mobile data traffic consumption and its networking technologies. Hence it is significance to enhancing the present techniques. Multicast enabled PMIPv6 is a mobile multicast networking management protocol that is highly acceptable in handling mobile data traffic. This paper briefly highlights the methodology, architecture and processes involved to produce the quatitative equations for each parameter. The quantitative parameters discussed are packet loss cost and handover latency.
1. The document discusses IP multicast routing protocols including DVMRP and PIM. It describes how multicast routing differs from unicast routing in establishing distribution trees from sources to receivers.
2. Key aspects covered include IGMP for hosts to join multicast groups, source trees versus shared trees, dense and sparse mode protocols, and data distribution policies using ACK and NACK approaches.
3. DVMRP is introduced as an early multicast routing protocol that uses distance vector exchange and reverse path forwarding to construct source trees and prune branches without receivers.
The document discusses topics related to the network layer, including:
1. It describes virtual circuits and datagrams, which are two methods for transferring data across networks.
2. It covers IPv4 addressing concepts such as address space, notations, classful and classless addressing, subnetting, and network address translation.
3. It provides an overview of additional network layer topics like IPv6 addressing, routing algorithms, internet control protocols, and routing protocols.
This document summarizes a research paper that analyzes the performance of decode-and-forward relaying techniques for cellular communication networks. It introduces a new technique called network coded cooperative relaying that combines network coding strategies with cooperative relaying. Simulation results show that this approach outperforms conventional relaying and non-relaying schemes by achieving a higher diversity order and lower blocking probability. Specifically, it is shown that network coded cooperative relaying provides improved performance for both cell center and cell edge users when the distance of the relay station is between 0.4 and 0.6 of the distance to the base station.
The document provides the answers to multiple choice questions about networking concepts such as encapsulation, OSI model layers, network devices, and protocols. It addresses topics like the functions of encapsulation, trailer information in data link layer encapsulation, layers that correspond to the TCP/IP Network Access layer, characteristics of local area networks, networking terms like multiplexing, purpose of layer 4 port assignment, what can be identified by examining the network layer header, and purpose of the TCP/IP Network Access layer. The document also contains questions about protocols, encapsulation process, network types, OSI model layer order, roles of network devices, and types of networks.
IP Multicast Routing Part One.
Concepts explained inside are : Internet Multicast Backbone, Multicast Addressing and Mapping, Multicast: How it works, IGMP v1,v2,v3 and more.
Note: All slides care of a more detailed explanation about the concepts involved. If you need just that, send me a message and I'll reply with a pdf document with just that. All explanations are in English or/and Portuguese.
Thanks, Pedro Almeida.
This document provides an overview of various topics related to the network layer, including IPv4, IPv6, ARP, RARP, mobile IP, routing algorithms, and routing protocols. It begins with basics of IPv4 such as its addressing scheme and role in interconnecting networks. IPv6 is then introduced, along with reasons for its development and key features like its large 128-bit addresses. Address Resolution Protocol (ARP) and Reverse ARP (RARP) are also covered. The document concludes by discussing routing algorithms like link-state and distance-vector, as well as protocols including RIP, OSPF, and BGP.
This document discusses fundamentals and link layer concepts in computer networks including:
- Network requirements, layering, protocols, and Internet architecture
- Link layer services such as framing, error detection, and flow control
- Performance metrics including bandwidth, latency, and the relationship between delay and bandwidth
- Common communication patterns like client-server and examples of TCP and UDP socket programming in C
4 lte access transport network dimensioning issue 1.02saeed_sh65
The document discusses several key aspects of an LTE access transport network:
1. It describes the five major interfaces of an eNodeB including S1, X2, OM, clock, and co-transmission interfaces.
2. It explains the protocols used on the S1 and X2 interfaces including SCTP, GTP-U, and X2AP.
3. It provides an overview of the different layers - layers 1, 2, and 3 - that can be used as transport bearer networks for an LTE system and their characteristics.
The document discusses the application layer in computer networking. It describes the client-server model where clients send queries to servers which respond with answers. It also discusses name resolution, where hostnames are translated to IP addresses, and protocols like TCP and UDP which provide transport services. Common applications like email, the web, and peer-to-peer are briefly mentioned as examples.
IP multicasting allows for efficient one-to-many and many-to-many communication on the internet. It uses multicast groups and protocols like IGMP for group management and PIM for multicast routing. PIM supports both source-based trees using flood-and-prune and core-based trees with a rendezvous point to deliver multicast data.
The document outlines the key components of IP multicasting including multicast addressing, groups, routing protocols, and properties of routing protocols. It discusses Internet Group Management Protocol (IGMP) and its role in allowing hosts to join and leave multicast groups. The document also explains the differences between opt-in and opt-out routing protocols, source-based and shared trees, and dense and sparse modes such as PIM-Dense Mode and PIM-Sparse Mode.
The transport layer provides efficient, reliable, and cost-effective process-to-process delivery by making use of network layer services. The transport layer works through transport entities to achieve its goal of reliable delivery between application processes. It provides an interface for applications to access its services.
Multicast is a communication protocol that allows a single sender to transmit data to multiple receivers simultaneously. It works by addressing data to a group of destination computers, reducing network load compared to unicast which requires separate transmissions to each receiver. The document outlines the history of multicast, how it works including reverse path forwarding using pruning and grafting, the IGMP protocol used by end systems to signal group membership, challenges in implementing multicast security, and applications such as audio/video broadcasting and software distribution where it provides benefits over unicast.
Dcf learn and performance analysis of 802.11 b wireless networkIJCNCJournal
Though WLAN wireless network has been widely deployed as the main split-flow deployment of the
communication network, little study emphasizes its performance as WLAN protocols were only designed for
the public communicating conveniently with each other. Actually that too much wireless access points
assembling together will cause self-interference to the whole WLAN network. This paper investigates the
distributed coordination function (DCF) learn and the performance study of 802.11b networks. Firstly, our
study illustrates the performance of its MAC layer and its fairness issues related to DCF. Next we propose
the details which should be paid attention to in deploying network services. Then, performance analyses
are evaluated by simulation and real test for a dense wireless network. Our main goal is to give proposals
to network operators how to design a WLAN network more standardized and orderly.
The document examines different possibilities for installing and orienting solar thermal systems on the rooftop of a reference building. A simulation was conducted to analyze how installation and orientation impact the costs of solar energy production, savings on wood pellets for heating, and the system's efficiency. The economic efficiency of a solar thermal installation can be strongly influenced by the installation method and orientation. Simulation results show variations in solar energy contribution percentages, heating and hot water fractions, and the energy balance for different installation scenarios.
Investigate the Route of Chaos Induced Instabilities in Power System NetworkIJMER
In this paper possible causes of various instability and chances of system break down in a
power system network are investigated based on theory of nonlinear dynamics applied to a Power system
network. Here a simple three bus power system model is used for the analysis. First the routes to chaotic
oscillation through various oscillatory modes are completely determined. Then it is shown that chaotic
oscillation eventually leads to system break-down characterized by collapse of system voltage and large
deviation in Generator rotor angle (angle divergence), also known as chaos induced instability. It has
been shown that chaos and chaos induced instability in Power system take place due to the variation in
system parameters and the inherent nonlinear nature of the power system network. The relation between
chaotic oscillation and various system instabilities are discussed here. Using the simple power system
model, here it is shown that how chaos leads to voltage collapse and angle divergence, taken place
simultaneously when the stability condition of the chaotic oscillation are broken. All nonlinear analysis
is implemented using MATLAB. It is indicated that there is a maximum lodability point after which the
system enters into instability modes. All these studies are helpful to understand the mechanism of various
instability modes and to find out effective anti-chaos strategies to prevent power system instability.
This document summarizes a faculty development program on computer networks held from April 24-30, 2019. On April 25, Dr. A. Kathirvel from MNM Jain Engineering College gave a lecture covering various topics related to the data link layer, including data link protocols, media access control, encoding, framing, and error detection techniques. Specific protocols and concepts discussed include HDLC, PPP, Manchester encoding, 4B/5B encoding, byte-oriented and bit-oriented framing, CRC, checksums, and two-dimensional parity.
This document describes slides for a chapter on the transport layer. It states that the slides can be freely used and modified for educational purposes with proper attribution. It asks users to mention the source if the slides are used for a class and to note any adaptation if slides are posted online. The document also provides copyright information for the material.
RS Codes for Downlink LTE System over LTE-MIMO ChannelTELKOMNIKA JOURNAL
This document summarizes a study that used Reed-Solomon codes with a downlink Long Term Evolution (LTE) system over an LTE Multiple-Input Multiple-Output (MIMO) channel to improve performance. Reed-Solomon codes were chosen because they have low decoding complexity compared to convolutional and turbo codes. Simulation results showed that using Reed-Solomon codes decreased the bit error rate more than convolutional or turbo codes. Additionally, increasing the number of antennas in the LTE-MIMO channel provided further improvements to downlink LTE system performance. BPSK modulation provided better performance gains compared to QPSK when used with Reed-Solomon codes over the LTE-MIMO channel.
Quantitative Evaluation for PMPIv6 Multicast Fast Reroute OperationsjournalBEEI
This paper evaluates Proxy Mobile Internet Protocol Version 6 (PMIPv6) multicast fast reroute operations using quantitative analysis. The motivation is to cater the fast growth of mobile data traffic consumption and its networking technologies. Hence it is significance to enhancing the present techniques. Multicast enabled PMIPv6 is a mobile multicast networking management protocol that is highly acceptable in handling mobile data traffic. This paper briefly highlights the methodology, architecture and processes involved to produce the quatitative equations for each parameter. The quantitative parameters discussed are packet loss cost and handover latency.
1. The document discusses IP multicast routing protocols including DVMRP and PIM. It describes how multicast routing differs from unicast routing in establishing distribution trees from sources to receivers.
2. Key aspects covered include IGMP for hosts to join multicast groups, source trees versus shared trees, dense and sparse mode protocols, and data distribution policies using ACK and NACK approaches.
3. DVMRP is introduced as an early multicast routing protocol that uses distance vector exchange and reverse path forwarding to construct source trees and prune branches without receivers.
The document discusses topics related to the network layer, including:
1. It describes virtual circuits and datagrams, which are two methods for transferring data across networks.
2. It covers IPv4 addressing concepts such as address space, notations, classful and classless addressing, subnetting, and network address translation.
3. It provides an overview of additional network layer topics like IPv6 addressing, routing algorithms, internet control protocols, and routing protocols.
This document summarizes a research paper that analyzes the performance of decode-and-forward relaying techniques for cellular communication networks. It introduces a new technique called network coded cooperative relaying that combines network coding strategies with cooperative relaying. Simulation results show that this approach outperforms conventional relaying and non-relaying schemes by achieving a higher diversity order and lower blocking probability. Specifically, it is shown that network coded cooperative relaying provides improved performance for both cell center and cell edge users when the distance of the relay station is between 0.4 and 0.6 of the distance to the base station.
The document provides the answers to multiple choice questions about networking concepts such as encapsulation, OSI model layers, network devices, and protocols. It addresses topics like the functions of encapsulation, trailer information in data link layer encapsulation, layers that correspond to the TCP/IP Network Access layer, characteristics of local area networks, networking terms like multiplexing, purpose of layer 4 port assignment, what can be identified by examining the network layer header, and purpose of the TCP/IP Network Access layer. The document also contains questions about protocols, encapsulation process, network types, OSI model layer order, roles of network devices, and types of networks.
IP Multicast Routing Part One.
Concepts explained inside are : Internet Multicast Backbone, Multicast Addressing and Mapping, Multicast: How it works, IGMP v1,v2,v3 and more.
Note: All slides care of a more detailed explanation about the concepts involved. If you need just that, send me a message and I'll reply with a pdf document with just that. All explanations are in English or/and Portuguese.
Thanks, Pedro Almeida.
This document provides an overview of various topics related to the network layer, including IPv4, IPv6, ARP, RARP, mobile IP, routing algorithms, and routing protocols. It begins with basics of IPv4 such as its addressing scheme and role in interconnecting networks. IPv6 is then introduced, along with reasons for its development and key features like its large 128-bit addresses. Address Resolution Protocol (ARP) and Reverse ARP (RARP) are also covered. The document concludes by discussing routing algorithms like link-state and distance-vector, as well as protocols including RIP, OSPF, and BGP.
This document discusses fundamentals and link layer concepts in computer networks including:
- Network requirements, layering, protocols, and Internet architecture
- Link layer services such as framing, error detection, and flow control
- Performance metrics including bandwidth, latency, and the relationship between delay and bandwidth
- Common communication patterns like client-server and examples of TCP and UDP socket programming in C
4 lte access transport network dimensioning issue 1.02saeed_sh65
The document discusses several key aspects of an LTE access transport network:
1. It describes the five major interfaces of an eNodeB including S1, X2, OM, clock, and co-transmission interfaces.
2. It explains the protocols used on the S1 and X2 interfaces including SCTP, GTP-U, and X2AP.
3. It provides an overview of the different layers - layers 1, 2, and 3 - that can be used as transport bearer networks for an LTE system and their characteristics.
The document discusses the application layer in computer networking. It describes the client-server model where clients send queries to servers which respond with answers. It also discusses name resolution, where hostnames are translated to IP addresses, and protocols like TCP and UDP which provide transport services. Common applications like email, the web, and peer-to-peer are briefly mentioned as examples.
IP multicasting allows for efficient one-to-many and many-to-many communication on the internet. It uses multicast groups and protocols like IGMP for group management and PIM for multicast routing. PIM supports both source-based trees using flood-and-prune and core-based trees with a rendezvous point to deliver multicast data.
The document outlines the key components of IP multicasting including multicast addressing, groups, routing protocols, and properties of routing protocols. It discusses Internet Group Management Protocol (IGMP) and its role in allowing hosts to join and leave multicast groups. The document also explains the differences between opt-in and opt-out routing protocols, source-based and shared trees, and dense and sparse modes such as PIM-Dense Mode and PIM-Sparse Mode.
The transport layer provides efficient, reliable, and cost-effective process-to-process delivery by making use of network layer services. The transport layer works through transport entities to achieve its goal of reliable delivery between application processes. It provides an interface for applications to access its services.
Multicast is a communication protocol that allows a single sender to transmit data to multiple receivers simultaneously. It works by addressing data to a group of destination computers, reducing network load compared to unicast which requires separate transmissions to each receiver. The document outlines the history of multicast, how it works including reverse path forwarding using pruning and grafting, the IGMP protocol used by end systems to signal group membership, challenges in implementing multicast security, and applications such as audio/video broadcasting and software distribution where it provides benefits over unicast.
Dcf learn and performance analysis of 802.11 b wireless networkIJCNCJournal
Though WLAN wireless network has been widely deployed as the main split-flow deployment of the
communication network, little study emphasizes its performance as WLAN protocols were only designed for
the public communicating conveniently with each other. Actually that too much wireless access points
assembling together will cause self-interference to the whole WLAN network. This paper investigates the
distributed coordination function (DCF) learn and the performance study of 802.11b networks. Firstly, our
study illustrates the performance of its MAC layer and its fairness issues related to DCF. Next we propose
the details which should be paid attention to in deploying network services. Then, performance analyses
are evaluated by simulation and real test for a dense wireless network. Our main goal is to give proposals
to network operators how to design a WLAN network more standardized and orderly.
The document examines different possibilities for installing and orienting solar thermal systems on the rooftop of a reference building. A simulation was conducted to analyze how installation and orientation impact the costs of solar energy production, savings on wood pellets for heating, and the system's efficiency. The economic efficiency of a solar thermal installation can be strongly influenced by the installation method and orientation. Simulation results show variations in solar energy contribution percentages, heating and hot water fractions, and the energy balance for different installation scenarios.
Investigate the Route of Chaos Induced Instabilities in Power System NetworkIJMER
In this paper possible causes of various instability and chances of system break down in a
power system network are investigated based on theory of nonlinear dynamics applied to a Power system
network. Here a simple three bus power system model is used for the analysis. First the routes to chaotic
oscillation through various oscillatory modes are completely determined. Then it is shown that chaotic
oscillation eventually leads to system break-down characterized by collapse of system voltage and large
deviation in Generator rotor angle (angle divergence), also known as chaos induced instability. It has
been shown that chaos and chaos induced instability in Power system take place due to the variation in
system parameters and the inherent nonlinear nature of the power system network. The relation between
chaotic oscillation and various system instabilities are discussed here. Using the simple power system
model, here it is shown that how chaos leads to voltage collapse and angle divergence, taken place
simultaneously when the stability condition of the chaotic oscillation are broken. All nonlinear analysis
is implemented using MATLAB. It is indicated that there is a maximum lodability point after which the
system enters into instability modes. All these studies are helpful to understand the mechanism of various
instability modes and to find out effective anti-chaos strategies to prevent power system instability.
This document summarizes a paper on improving the coefficient of performance (COP) of an ice making plant using a vapor compression refrigeration system without adding any additional systems. The paper discusses how cleaning condenser tubes to improve heat transfer increased the COP from 5.37 to 5.59, reducing ice production time from 48 to 46 hours. This saved costs and increased profits without requiring capital investment in new equipment. Preventative maintenance like cleaning condenser tubes can improve plant efficiency and profits.
Effective Devops - Velocity New York 2015 Jennifer Davis
This document outlines an agenda and presentation for a workshop on effective DevOps collaboration and tools. It introduces the presenters Jennifer Davis and Katherine Daniels and provides their contact information. It then details the schedule, expectations, topics to be covered including DevOps principles, visualization of work, infrastructure automation, and tools. Breaks and networking opportunities are included. The goal is to learn effective workflows for source control, configuration management, and testing infrastructure automation changes.
High End Solution for Advanced Civil Engineering ProjectsIJMER
Civil FEM performs the best customization of the well-known Finite Element Program ANSYS.
The combination of both programs, totally integrated, provides the Construction and Civil Engineering
fields with the possibility of applying high-end technology to a wide range of projects. Using the same
windows graphic user interface and sharing input data and results, makes it very easy for the user to
apply them for solving difficult Civil Engineering problems. The ability to generate finite element models
of any complex three-dimensional civil structure with non-linear behaviour and construction process
simulation means a new and efficient approach to run advanced analysis on PC’s.
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
In MANETs (mobile ad hoc network), security is common problem and lack of issues in
MANET network. When comparing to wired network, MANETs are harmed to security attacks due to the
scarcity of a trusted centralized enforce authority and limited resources. This paper proposed a technique
to avoid Blackhole node behaviour in AODV (Ad Hoc On-Demand Distance Vector) using Hexagonal
Encryption inNS2. Hexagonal Encryption has been chosen for low cost and high computation speed up.
Compared to existing blackhole detection technique, this proposed technique obtains better result by
stimulating in NS2.
This presentation was given to the master class Environment and Development (ENP 33306) under the Social Sciences Group at the Wageningen University (April 22,2015). The core of the topic is upgrading in the value chain. The elements in the vertical and horizontal dimensions of the value chain and the capabilities literature are the theoretical lens used to gain a deeper understanding of upgrading. The theory has been applied to the cases of Philippine tuna fishery.
The document summarizes the synthesis, characterization, and AC conductivity of nickel-doped magnesium ferrite. Key findings include:
1) Magnesium nickel ferrites were synthesized via a sol gel technique and sintered at 1473 K. X-ray diffraction analysis revealed the presence of a nickel oxide phase along with the ferrite phase, indicating an almost stoichiometric (Mg,Ni)-ferrite phase was obtained.
2) Scanning electron microscopy images showed the (MgNi) ferrite had a regular, granular structure with well-connected grains and an average grain size of 0.7 micrometers.
3) The AC conductivity of the magnesium nickel ferrite increased with increasing frequency
The document discusses techniques for constant bit rate video streaming over packet switching networks. It proposes adapting variable bit rate video to a constant bit rate by controlling the video encoder's output rate based on buffer level feedback. This allows transporting video over networks using constant bit rate channels while avoiding network congestion issues. The key techniques involve bit allocation to each coding unit based on buffer status, and adjusting encoder quantization parameters to encode units with the allocated bits. Simulation results show the approach maintains constant compression ratio and peak signal-to-noise ratio while varying group of picture size and quality settings.
This document summarizes a research paper on background subtraction techniques for motion detection in video. It describes a proposed technique that stores and compares past pixel values to the current value to determine if a pixel belongs to the background or foreground. It also discusses using a k-means algorithm and Gaussian mixture model to build a probabilistic background model and classify pixels. The paper evaluates different shadow detection approaches and finds RGB color spaces perform best for segmentation and shadow removal.
Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...IJMER
At high vehicular speeds, rapid changes in surrounding environments, cause severe fading at
the receiver, resulting a drastic fall in throughput and unless any proactive measure is taken to combat
this problem, throughput becomes insufficient to support many applications, particularly those with
multimedia contents. Bit Error Rate (BER) estimation is an integral part of any proactive measure and
recent studies suggest that Nakagami-m model performs better for modelling channel fading in wireless
communications at high vehicular speeds. No work has been reported in literature that estimates BER
at high vehicular speeds in WiMAX communication using Nakagami-m model. In this thesis, we develop
and present an analytical model to estimate BER in WiMAX at vehicular speeds using Nakagami-m
fading model. The proposed model is adaptive and can be used with resource management schemes
designed for fixed, nomadic, and mobile WiMAX communications.
This document summarizes a research paper on a novel soft switching LCL-T buck DC-DC converter system. The proposed converter uses an LCL-T topology with four switches to step down the input voltage. It connects capacitors in series with the input to generate a midpoint voltage of Vin/2, allowing each switch to experience only half the input voltage during operation. Simulation results show this converter achieves zero voltage switching and reduces switching losses compared to a conventional full bridge buck converter. Both open and closed loop models are developed and simulated in MATLAB, demonstrating constant output voltage regulation can be achieved.
This document summarizes a research paper on improving the accuracy and speed of automatic speech recognition systems through hardware-software co-design. It discusses:
1) Using a hardware accelerator for the Gaussian mixture model calculations in order to speed up the computationally intensive emission probability calculations.
2) Adopting a double buffering scheme to access acoustic parameters and avoid large memory requirements for the hardware accelerator.
3) Using a weighted finite state transducer for the Viterbi search model to output a word sequence from the emission probability calculations.
4) Achieving a word accuracy rate of 93.33% and a system that is about four times faster than a pure software-based system, making it suitable
This document discusses the effect of preform geometry on material behavior and densification during hot upset forging of sintered AISI 9840 steel powder metal parts. Powder blends were prepared with different compositions and compacted into preforms with varying initial aspect ratios between 0.45-0.92. The preforms were sintered and hot forged to different height strains. Results showed that lower aspect ratio preforms densified more rapidly than higher ratios. Densification curves followed a third order polynomial relationship with height strain. Preform geometry significantly affected the densification curves and Poisson's ratio with density.
Online Bus Arrival Time Prediction Using Hybrid Neural Network and Kalman fil...IJMER
This document presents a hybrid method for predicting bus arrival times using neural networks and Kalman filters. The proposed method combines a neural network trained on historical bus location and travel time data to make initial predictions, and then uses a Kalman filter to continuously update the predictions based on real-time GPS measurements from buses. The neural network model uses seven input nodes and a double hidden layer structure. The Kalman filter equations are used to fuse the neural network predictions with current GPS observations to improve prediction accuracy over time. A case study on a real bus route in Egypt showed the hybrid method achieved satisfactory prediction accuracy.
This document presents a performance analysis of multicarrier sinusoidal pulse width modulation (MCSPWM) strategies for a three-phase seven-level Z-source cascaded inverter. It describes the topology of the Z-source seven-level cascaded inverter and discusses five different MCSPWM strategies: phase disposition, phase opposition disposition, alternate phase opposition disposition, carrier overlapping, and variable frequency. Simulation results in MATLAB/Simulink are presented to analyze the output voltage waveform and total harmonic distortion for each strategy at different modulation indices. The phase opposition disposition strategy provided the lowest THD and highest fundamental output voltage.
This document discusses night vision techniques, including image intensification, active illumination, and thermal imaging. Image intensification systems amplify low levels of light, allowing vision in dark conditions. Active illumination uses infrared light sources to illuminate scenes. Thermal imaging detects infrared radiation emitted by objects and creates images based on surface temperature differences. The document provides details on how each technique works and lists their applications in military, law enforcement, wildlife observation, and other areas where low-light vision is needed.
Mislaid character analysis using 2-dimensional discrete wavelet transform for...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Novel mechanical Whistle Counter Device for Pressure CookerIJMER
The domestic pressure cooker is one of the most essential cooking utensils used in kitchens
worldwide. It ensures that the food is prepared in time, and still retains the nutritional value of the
ingredients used. A major flaw associated with it is the fact that one has to keep an account of the
number of whistles generated by the pressure regulator. Otherwise, the food turns out undercooked or
Over-cooked and even leads to wastage of fuel. The problem becomes particularly acute for the
hearing impaired. The device explained in this paper helpstokeep the track of number of whistles
produced by cooker
Performance Analysis of VoIP by Communicating Two Systems IOSR Journals
This document discusses performance analysis of Voice over IP (VoIP) communication between two systems. It introduces VoIP technology and explores problems that can occur when sending voice and data packets over different windows. The proposed work evaluates performance of open source VoIP software tools like Linphone for clients, OpenSIPS for the server, and NS-2 for network traffic analysis. Two systems are configured as clients and one as the server to simulate a VoIP call between Client A and B routed through the server.
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEMEIJCNCJournal
This document discusses optimizing VoIP quality over wireless networks using a cross-layer call admission control scheme. It proposes monitoring real-time control protocol reports and data rates at the MAC layer to determine when quality is degraded. When quality degrades due to issues like network congestion or variable transmission rates, the solution is to adapt the packet size or codec type. The proposed scheme is simulated using a wireless campus network model to improve performance.
This document discusses VoIP (Voice over Internet Protocol) techniques and challenges. It begins by introducing VoIP as an alternative to traditional PSTN telephone networks that transmits voice over internet and packet-switched networks more cheaply. However, ensuring high quality of service (QoS) with factors like jitter, packet delay/loss, and bandwidth allocation presents major challenges for VoIP systems. The document goes on to describe how VoIP works by carrying voice in RTP packets within IP packets and discusses challenges to VoIP performance and QoS from system capacity, packet loss, delay, jitter, echo, and security.
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Zac Darcy
Voice over IP (VoIP) applications such as Skype, Google Talk, and FaceTime are promising technologies for providing cheaper voice calls to end users over extant networks. Wireless networks such as WiMAX and Wi-Fi focus on providing perfection of service for VoIP. However, there are numerous aspects that affect quality of voice connections over wireless networks [13]. The adoption of Voice over Wireless Local Area Network is on tremendous increase due its relief, non-invasive, economicexpansion, low maintenance cost, universal coverage and basic roaming capabilities.
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
Voice over IP (VoIP) applications such as Skype, Google Talk, and FaceTime are promising technologies for providing cheaper voice calls to end users over extant networks. ireless networks such as WiMAX and Wi-Fi focus on providing perfection of service for VoIP. However, there are numerous aspects that affect quality of voice connections over wireless networks [13]. The adoption of Voice over Wireless Local Area
Network is on tremendous increase due its relief, non-invasive, economicexpansion, low maintenance cost, universal coverage and basic roaming capabilities. However, expansion Voice over Internet Protocol (VoIP) over Wireless Local Area Network (WLAN) is a challenging task for many network specialist and engineers. Voice codec is one of the most critical components of a VoIP system. In this project, we evaluate
the performance analysis of various codecs such as G.711, G.723 and G.729 over Wi-Fi networks. NS2 WiFi
simulation models are designed. Performance metrics such as Mean Opinion Score (MOS), average
end-to-end latency, and disconcert are evaluated and discussed [13]. 1. In this paper, our area of interest is to compare and study the performance analysis of VoIP codecs in Non-mobility scenarios by changing some parameters and plotting the graphs throughput, End to end Delay, MOS, Packet delivery Ratio, and Jitter by using Network Simulator version.
2. In this paper we analyze the different performance parameters, Recent research has focused on simulation studies with non- mobility scenarios to analyze different VoIP codecs with nodes up to 5. We have simulated the different VoIP codecs in non-mobility scenario with nodes up to 300.
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Zac Darcy
Voice over IP (VoIP) applications such as Skype, Google Talk, and FaceTime are promising technologies
for providing cheaper voice calls to end users over extant networks. Wireless networks such as WiMAX and
Wi-Fi focus on providing perfection of service for VoIP. However, there are numerous aspects that affect
quality of voice connections over wireless networks [13]. The adoption of Voice over Wireless Local Area
Network is on tremendous increase due its relief, non-invasive, economicexpansion, low maintenance cost,
universal coverage and basic roaming capabilities. However, expansion Voice over Internet Protocol
(VoIP) over Wireless Local Area Network (WLAN) is a challenging task for many network specialist and
engineers. Voice codec is one of the most critical components of a VoIP system. In this project, we evaluate
the performance analysis of various codecs such as G.711, G.723 and G.729 over Wi-Fi networks. NS2 WiFi simulation models are designed. Performance metrics such as Mean Opinion Score (MOS), average
end-to-end latency, and disconcert are evaluated and discussed [13].
1. In this paper, our area of interest is to compare and study the performance analysis of VoIP
codecs in Non-mobility scenarios by changing some parameters and plotting the graphs
throughput, End to end Delay, MOS, Packet delivery Ratio, and Jitter by using Network
Simulator version.
2. In this paper we analyze the different performance parameters, Recent research has focused on
simulation studies with non- mobility scenarios to analyze different VoIP codecs with nodes up to
5. We have simulated the different VoIP codecs in non-mobility scenario with nodes up to 300.
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
The recent Voice over IP (VOIP) applications such as Skype, Google Talk, and Face Time have
changed the way people communicate to each other. Due to the low cost, people find VOIP as an
alternative to the expensive traditional Public Switched Telephone Network (PSTN). VOIP has
set of parameters that defined its Quality of Service (QoS) such as end to delay, jitter, packets
loss, Mean Opinion Score (MOS, and throughput[13]. The existing wireless networks such as WiFi offer flexibility to support such applications. At the time the IEEE 802.11 (Wi-Fi) technology
showed great success as cheap wireless internet access. The Motive of this survey paper is to
analyse of Qos in VOIP [13].
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
Voice over IP (VoIP) applications such as Skype, Google Talk, and FaceTime are promising technologies
for providing cheaper voice calls to end users over extant networks. Wireless networks such as WiMAX and
Wi-Fi focus on providing perfection of service for VoIP. However, there are numerous aspects that affect
quality of voice connections over wireless networks [13]. The adoption of Voice over Wireless Local Area
Network is on tremendous increase due its relief, non-invasive, economicexpansion, low maintenance cost,
universal coverage and basic roaming capabilities. However, expansion Voice over Internet Protocol
(VoIP) over Wireless Local Area Network (WLAN) is a challenging task for many network specialist and
engineers. Voice codec is one of the most critical components of a VoIP system. In this project, we evaluate
the performance analysis of various codecs such as G.711, G.723 and G.729 over Wi-Fi networks. NS2 WiFi simulation models are designed. Performance metrics such as Mean Opinion Score (MOS), average
end-to-end latency, and disconcert are evaluated and discussed [13]
This document summarizes the study of parameters that determine the quality of service of various Voice over IP (VoIP) clients. The study measured parameters like bandwidth requirement, delay, packet size and observed how clients behaved under different network conditions. Key findings were that bandwidth, jitter, latency and packet loss most affected quality of service. The VoIP clients tested included Google Talk, Skype, VQube, Windows Live Messenger and Yahoo Voice Messenger. Network Address Translation (NAT) types and Simple Traversal of UDP through NAT (STUN) were also explained.
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...csandit
The aim of this paper is to present a new System on Chip (SoC) reconfigurable gateway
architecture for Voice over Internet Telephony (VOIP). Our motivation behind this work is
justified by the following arguments: most of VOIP solutions proposed in the market are based
on the use of a general purpose processor and a DSP circuit. In these solutions, the use of the
serial multiply accumulate circuit is very limiting for the signal processing. Also, in embedded
VOIP based DSP applications, the DSP works without MMU (memory management unit). This
is a serious limitation because VOIP solutions are multi-task based. In order to overcome these
problems, we propose a new VOIP gateway architecture built around the OpenRisc-1200-V3
processor. This last one integrates a DSP circuit as well as a MMU. The hardware architecture
is mapped into the VIRTEX-5 FPGA device. We propose a design methodology based on the
design for reuse and design with reuse concepts. We demonstrate that the proposed SoC
architecture is reconfigurable, scalable and the final RTL code can be reused for any FPGA or
ASIC technology. Performances measures, in the VIRTEX-5 FPGA device family, show that the
SOC-gateway architecture occupies 52% of the FPGA in term of slice LUT, 42% of IOBs, 60%
of bloc memory, 8% of integrated DSP, 16% of PLL and the total power is estimated at
4.3Watts.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET- Campus-Wide Internet Telephony Design and Simulation using Voice over ...IRJET Journal
This document discusses the design and simulation of a Voice over Internet Protocol (VoIP) system for Adamawa State University in Nigeria using Cisco Packet Tracer. VoIP allows voice calls to be placed over an IP network like the internet rather than a traditional phone network. The proposed VoIP system would allow users across the university's campus to communicate freely using IP phones. The author conducted several simulations of the network architecture in Cisco Packet Tracer to develop a prototype VoIP system for the university. This would provide more flexible communication and help increase information sharing across the university's departments and offices by integrating them into a single network.
This section provides background on VoIP applications and their components. It discusses how VoIP works by transmitting voice packets over IP networks, unlike traditional PSTN which uses circuit switching. The two main VoIP protocols are H.323 and SIP, which provide call control and setup. UDP is typically used instead of TCP for transmitting VoIP due to its lower overhead and lack of error checking, which is tolerable for voice transmission. IPv4 and IPv6 can both be used to transmit VoIP, with IPv6 having a larger header size.
Performance analysis of voip traffic over integrating wireless lan and wan us...ijwmn
A simulation model is presented to analyze and evaluate the performance of VoIP based integrated
wireless LAN/WAN with taking into account various voice encoding schemes. The network model was
simulated using OPNET Modeler software. Different parameters that indicate the QoS like MOS, jitter,
end to end delay, traffic send and traffic received are calculated and analyzed in Wireless LAN/WAN
scenarios. Depending on this evaluation, Selection codecs G.729A consider the best choice for VoIP.
This document discusses the interaction between application layer multicast (ALM) trees and MPEG-4 video streaming. It examines how different coding parameters and tree structures affect end-user video quality as measured by PSNR. The paper presents a simulation system to test various combinations of NICE ALM trees and MPEG-4 parameters. Results show that coding choices and tree organization depend on network characteristics like packet loss and bandwidth distribution. Large GOP sizes and many B-frames optimize quality with rare losses, while small GOPs and fewer B-frames work best with frequent losses. Uniform bandwidth favors small clusters and long paths, while varied bandwidth prefers larger clusters and shorter paths.
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
VoIP uses packet networks to carry voice calls in addition to data. It works by converting analog voice signals to digital data packets which are transmitted over IP networks and reconverted to analog at the receiving end. Key components include IP phones, signaling servers, and protocols like SIP and H.323 which handle call setup and signaling. Quality of service for VoIP depends on factors like packet loss, delay, and jitter which can be managed through queuing and reserving bandwidth for voice traffic.
A Model Of An Integrated Unified Communication Network Using Public Switched ...Becky Gilbert
This document discusses a model for integrating a unified communication network at the University of Nairobi using Cisco Unified Communication Manager and public switched telephone network gateways. It proposes integrating MGCP, H.323, and SIP gateways with CUCM to connect the university's VoIP and PSTN systems. The model is designed and simulated. Results show the unified network is more efficient than separate VoIP and PSTN networks in terms of performance based on metrics like traffic volume, latency, jitter and packet loss. Integrating the different protocols and systems provides a more flexible and cost-effective communication solution for the university.
LNCS 5448 - A First Look at Media Conferencing Traffic in the ...Videoguy
This document summarizes a study analyzing media conferencing traffic in a large, globally connected enterprise network. The key findings are:
1) Endpoints on wireless networks experience poorer call quality due to higher packet loss rates and burstiness compared to wired networks.
2) Users connecting over VPNs or from home experienced significantly higher packet loss rates than those on the internal enterprise network.
3) Calls with DiffServ QoS priority markings rarely experienced packet loss rates over 2%, a threshold above which call quality is noticeably degraded.
An analysis of a large scale wireless image distribution system deploymentConference Papers
This document describes two setups of a wireless image distribution system:
1. A setup using commercial network equipment like access points and an access controller, which supported over 125 connected devices and provided sufficient bandwidth for the system load in an auditorium with 159 seats.
2. A setup using a wireless mesh network of three NerveNet nodes, which provided a quick and easy setup without wired connections but needs further performance improvements. Results from tests of both setups were analyzed to evaluate the network technologies for smart community applications.
Similar to Performance Evaluation of Push-To-Talk Group Communication (20)
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
- Translucent concrete is a concrete based material with light-transferring properties,
obtained due to embedded light optical elements like Optical fibers used in concrete. Light is conducted
through the concrete from one end to the other. This results into a certain light pattern on the other
surface, depending on the fiber structure. Optical fibers transmit light so effectively that there is
virtually no loss of light conducted through the fibers. This paper deals with the modeling of such
translucent or transparent concrete blocks and panel and their usage and also the advantages it brings
in the field. The main purpose is to use sunlight as a light source to reduce the power consumption of
illumination and to use the optical fiber to sense the stress of structures and also use this concrete as an
architectural purpose of the building
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
A low cost automation system for removal of lint from cottonseed is to be designed and
developed. The setup consists of stainless steel drum with stirrer in which cottonseeds having lint is mixed
with concentrated sulphuric acid. So lint will get burn. This lint free cottonseed treated with lime water to
neutralize acidic nature. After water washing this cottonseeds are used for agriculter purpose
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
The incorporation of natural fibres such as munja fiber composites has gained
increasing applications both in many areas of Engineering and Technology. The aim of this study is to
evaluate mechanical properties such as flexural and tensile properties of reinforced epoxy composites.
This is mainly due to their applicable benefits as they are light weight and offer low cost compared to
synthetic fibre composites. Munja fibres recently have been a substitute material in many weight-critical
applications in areas such as aerospace, automotive and other high demanding industrial sectors. In
this study, natural munja fibre composites and munja/fibreglass hybrid composites were fabricated by a
combination of hand lay-up and cold-press methods. A new variety in munja fibre is the present work
the main aim of the work is to extract the neat fibre and is characterized for its flexural characteristics.
The composites are fabricated by reinforcing untreated and treated fibre and are tested for their
mechanical, properties strictly as per ASTM procedures.
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
Hybrid engine is a combination of Stirling engine, IC engine and Electric motor. All these 3 are
connected together to a single shaft. The power source of the Stirling engine will be a Solar Panel. The aim of
this is to run the automobile using a Hybrid engine
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
This document summarizes research on the fabrication and characterization of bio-composite materials using sunnhemp fibre. The document discusses how sunnhemp fibre was used to reinforce an epoxy matrix through hand lay-up methods. Various mechanical properties of the bio-composites were tested, including tensile, flexural, and impact properties. The results of the mechanical tests on the bio-composite specimens are presented. Potential applications of the sunnhemp fibre bio-composites are also suggested, such as in fall ceilings, partitions, packaging, automotive interiors, and toys.
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
The Greenstone belts of Karnataka are enriched in BIFs in Dharwar craton, where Iron
formations are confined to the basin shelf, clearly separated from the deeper-water iron formation that
accumulated at the basin margin and flanking the marine basin. Geochemical data procured in terms of
major, trace and REE are plotted in various diagrams to interpret the genesis of BIFs. Al2O3, Fe2O3 (T),
TiO2, CaO, and SiO2 abundances and ratios show a wide variation. Ni, Co, Zr, Sc, V, Rb, Sr, U, Th,
ΣREE, La, Ce and Eu anomalies and their binary relationships indicate that wherever the terrigenous
component has increased, the concentration of elements of felsic such as Zr and Hf has gone up. Elevated
concentrations of Ni, Co and Sc are contributed by chlorite and other components characteristic of basic
volcanic debris. The data suggest that these formations were generated by chemical and clastic
sedimentary processes on a shallow shelf. During transgression, chemical precipitation took place at the
sediment-water interface, whereas at the time of regression. Iron ore formed with sedimentary structures
and textures in Kammatturu area, in a setting where the water column was oxygenated.
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
In this paper, the mechanical characteristics of C45 medium carbon steel are investigated
under various working conditions. The main characteristic to be studied on this paper is impact toughness
of the material with different configurations and the experiment were carried out on charpy impact testing
equipment. This study reveals the ability of the material to absorb energy up to failure for various
specimen configurations under different heat treated conditions and the corresponding results were
compared with the analysis outcome
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
Robot guns are being increasingly employed in automotive manufacturing to replace
risky jobs and also to increase productivity. Using a single robot for a single operation proves to be
expensive. Hence for cost optimization, multiple guns are mounted on a single robot and multiple
operations are performed. Robot Gun structure is an efficient way in which multiple welds can be done
simultaneously. However mounting several weld guns on a single structure induces a variety of
dynamic loads, especially during movement of the robot arm as it maneuvers to reach the weld
locations. The primary idea employed in this paper, is to model those dynamic loads as equivalent G
force loads in FEA. This approach will be on the conservative side, and will be saving time and
subsequently cost efficient. The approach of the paper is towards creating a standard operating
procedure when it comes to analysis of such structures, with emphasis on deploying various technical
aspects of FEA such as Non Linear Geometry, Multipoint Constraint Contact Algorithm, Multizone
meshing .
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
This paper aims to do modelling, simulation and performing the static analysis of a go
kart chassis consisting of Circular beams. Modelling, simulations and analysis are performed using 3-D
modelling software i.e. Solid Works and ANSYS according to the rulebook provided by Indian Society of
New Era Engineers (ISNEE) for National Go Kart Championship (NGKC-14).The maximum deflection is
determined by performing static analysis. Computed results are then compared to analytical calculation,
where it is found that the location of maximum deflection agrees well with theoretical approximation but
varies on magnitude aspect.
In récent year various vehicle introduced in market but due to limitation in
carbon émission and BS Séries limitd speed availability vehicle in the market and causing of
environnent pollution over few year There is need to decrease dependancy on fuel vehicle.
bicycle is to be modified for optional in the future To implement new technique using change in
pedal assembly and variable speed gearbox such as planetary gear optimise speed of vehicle
with variable speed ratio.To increase the efficiency of bicycle for confortable drive and to
reduce torque appli éd on bicycle. we introduced epicyclic gear box in which transmission done
throgh Chain Drive (i.e. Sprocket )to rear wheel with help of Epicyclical gear Box to give
number of différent Speed during driving.To reduce torque requirent in the cycle with change in
the pedal mechanism
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
This document discusses integrating the Spring, Struts, and Hibernate frameworks to develop enterprise applications. It provides an overview of each framework and their features. The Spring Framework is a lightweight, modular framework that allows for inversion of control and aspect-oriented programming. It can be used to develop any or all tiers of an application. The document proposes an architecture for an e-commerce website that integrates these three frameworks, with Spring handling the business layer, Struts the presentation layer, and Hibernate the data access layer. This modular approach allows for clear separation of concerns and reduces complexity in application development.
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
Microcontroller based Automatic Sprinkler System is a new concept of using
intelligence power of embedded technology in the sprinkler irrigation work. Designed system replaces
the conventional manual work involved in sprinkler irrigation to automatic process. Using this system a
farmer is protected against adverse inhuman weather conditions, tedious work of changing over of
sprinkler water pipe lines & risk of accident due to high pressure in the water pipe line. Overall
sprinkler irrigation work is transformed in to a comfortableautomatic work. This system provides
flexibility & accuracy in respect of time set for the operation of a sprinkler water pipe lines. In present
work the author has designed and developed an automatic sprinkler irrigation system which is
controlled and monitored by a microcontroller interfaced with solenoid valves.
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
This document introduces and studies the concept of δˆ s-locally closed sets in ideal topological spaces. Some key points:
- A subset A is δˆ s-locally closed if A can be written as the intersection of a δˆ s-open set and a δˆ s-closed set.
- Various properties of δˆ s-locally closed sets are introduced and characterized, including relationships to other concepts like generalized locally closed sets.
- It is shown that a subset A is δˆ s-locally closed if and only if A can be written as the intersection of a δˆ s-open set and the δˆ s-closure of A.
- Theore
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
This paper present an approach based on the combination of, two techniques using
decision tree and Association rule mining for Probe attack detection. This approach proves to be
better than the traditional approach of generating rules for fuzzy expert system by clustering methods.
Association rule mining for selecting the best attributes together and decision tree for identifying the
best parameters together to create the rules for fuzzy expert system. After that rules for fuzzy expert
system are generated using association rule mining and decision trees. Decision trees is generated for
dataset and to find the basic parameters for creating the membership functions of fuzzy inference
system. Membership functions are generated for the probe attack. Based on these rules we have
created the fuzzy inference system that is used as an input to neuro-fuzzy system. Fuzzy inference
system is loaded to neuro-fuzzy toolbox as an input and the final ANFIS structure is generated for
outcome of neuro-fuzzy approach. The experiments and evaluations of the proposed method were
done with NSL-KDD intrusion detection dataset. As the experimental results, the proposed approach
based on the combination of, two techniques using decision tree and Association rule mining
efficiently detected probe attacks. Experimental results shows better results for detecting intrusions as
compared to others existing methods
Natural Language Ambiguity and its Effect on Machine LearningIJMER
This document discusses natural language ambiguity and its effect on machine learning. It begins by introducing different types of ambiguity that exist in natural languages, including lexical, syntactic, semantic, discourse, and pragmatic ambiguities. It then examines how these ambiguities present challenges for computational linguistics and machine translation systems. Specifically, it notes that ambiguity is a major problem for computers in processing human language as they lack the world knowledge and context that humans use to resolve ambiguities. The document concludes by outlining the typical process of machine translation and how ambiguities can interfere with tasks like analysis, transfer, and generation of text in the target language.
Today in era of software industry there is no perfect software framework available for
analysis and software development. Currently there are enormous number of software development
process exists which can be implemented to stabilize the process of developing a software system. But no
perfect system is recognized till yet which can help software developers for opting of best software
development process. This paper present the framework of skillful system combined with Likert scale. With
the help of Likert scale we define a rule based model and delegate some mass score to every process and
develop one tool name as MuxSet which will help the software developers to select an appropriate
development process that may enhance the probability of system success.
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
The present study investigates the creep in a thick-walled composite cylinders made
up of aluminum/aluminum alloy matrix and reinforced with silicon carbide particles. The distribution
of SiCp is assumed to be either uniform or decreasing linearly from the inner to the outer radius of
the cylinder. The creep behavior of the cylinder has been described by threshold stress based creep
law with a stress exponent of 5. The composite cylinders are subjected to internal pressure which is
applied gradually and steady state condition of stress is assumed. The creep parameters required to
be used in creep law, are extracted by conducting regression analysis on the available experimental
results. The mathematical models have been developed to describe steady state creep in the composite
cylinder by using von-Mises criterion. Regression analysis is used to obtain the creep parameters
required in the study. The basic equilibrium equation of the cylinder and other constitutive equations
have been solved to obtain creep stresses in the cylinder. The effect of varying particle size, particle
content and temperature on the stresses in the composite cylinder has been analyzed. The study
revealed that the stress distributions in the cylinder do not vary significantly for various combinations
of particle size, particle content and operating temperature except for slight variation observed for
varying particle content. Functionally Graded Materials (FGMs) emerged and led to the development
of superior heat resistant materials.
Energy Audit is the systematic process for finding out the energy conservation
opportunities in industrial processes. The project carried out studies on various energy conservation
measures application in areas like lighting, motors, compressors, transformer, ventilation system etc.
In this investigation, studied the technical aspects of the various measures along with its cost benefit
analysis.
Investigation found that major areas of energy conservation are-
1. Energy efficient lighting schemes.
2. Use of electronic ballast instead of copper ballast.
3. Use of wind ventilators for ventilation.
4. Use of VFD for compressor.
5. Transparent roofing sheets to reduce energy consumption.
So Energy Audit is the only perfect & analyzed way of meeting the Industrial Energy Conservation.
An Implementation of I2C Slave Interface using Verilog HDLIJMER
This document describes the implementation of an I2C slave interface using Verilog HDL. It introduces the I2C protocol which uses only two bidirectional lines (SDA and SCL) for communication. The document discusses the I2C protocol specifications including start/stop conditions, addressing, read/write operations, and acknowledgements. It then provides details on designing an I2C slave module in Verilog that responds to commands from an I2C master and allows synchronization through clock stretching. The module is simulated in ModelSim and synthesized in Xilinx. Simulation waveforms demonstrate successful read and write operations to the slave device.
Discrete Model of Two Predators competing for One PreyIJMER
This paper investigates the dynamical behavior of a discrete model of one prey two
predator systems. The equilibrium points and their stability are analyzed. Time series plots are obtained
for different sets of parameter values. Also bifurcation diagrams are plotted to show dynamical behavior
of the system in selected range of growth parameter
Properties of Fluids, Fluid Statics, Pressure MeasurementIndrajeet sahu
Properties of Fluids: Density, viscosity, surface tension, compressibility, and specific gravity define fluid behavior.
Fluid Statics: Studies pressure, hydrostatic pressure, buoyancy, and fluid forces on surfaces.
Pressure at a Point: In a static fluid, the pressure at any point is the same in all directions. This is known as Pascal's principle. The pressure increases with depth due to the weight of the fluid above.
Hydrostatic Pressure: The pressure exerted by a fluid at rest due to the force of gravity. It can be calculated using the formula P=ρghP=ρgh, where PP is the pressure, ρρ is the fluid density, gg is the acceleration due to gravity, and hh is the height of the fluid column above the point in question.
Buoyancy: The upward force exerted by a fluid on a submerged or partially submerged object. This force is equal to the weight of the fluid displaced by the object, as described by Archimedes' principle. Buoyancy explains why objects float or sink in fluids.
Fluid Pressure on Surfaces: The analysis of pressure forces on surfaces submerged in fluids. This includes calculating the total force and the center of pressure, which is the point where the resultant pressure force acts.
Pressure Measurement: Manometers, barometers, pressure gauges, and differential pressure transducers measure fluid pressure.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...IJCNCJournal
Paper Title
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation with Hybrid Beam Forming Power Transfer in WSN-IoT Applications
Authors
Reginald Jude Sixtus J and Tamilarasi Muthu, Puducherry Technological University, India
Abstract
Non-Orthogonal Multiple Access (NOMA) helps to overcome various difficulties in future technology wireless communications. NOMA, when utilized with millimeter wave multiple-input multiple-output (MIMO) systems, channel estimation becomes extremely difficult. For reaping the benefits of the NOMA and mm-Wave combination, effective channel estimation is required. In this paper, we propose an enhanced particle swarm optimization based long short-term memory estimator network (PSOLSTMEstNet), which is a neural network model that can be employed to forecast the bandwidth required in the mm-Wave MIMO network. The prime advantage of the LSTM is that it has the capability of dynamically adapting to the functioning pattern of fluctuating channel state. The LSTM stage with adaptive coding and modulation enhances the BER.PSO algorithm is employed to optimize input weights of LSTM network. The modified algorithm splits the power by channel condition of every single user. Participants will be first sorted into distinct groups depending upon respective channel conditions, using a hybrid beamforming approach. The network characteristics are fine-estimated using PSO-LSTMEstNet after a rough approximation of channels parameters derived from the received data.
Keywords
Signal to Noise Ratio (SNR), Bit Error Rate (BER), mm-Wave, MIMO, NOMA, deep learning, optimization.
Volume URL: https://airccse.org/journal/ijc2022.html
Abstract URL:https://aircconline.com/abstract/ijcnc/v14n5/14522cnc05.html
Pdf URL: https://aircconline.com/ijcnc/V14N5/14522cnc05.pdf
#scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #journalpaper #submission #journalsubmission #WBAN #requirements #tailoredtreatment #MACstrategy #enhancedefficiency #protrcal #computing #analysis #wirelessbodyareanetworks #wirelessnetworks
#adhocnetwork #VANETs #OLSRrouting #routing #MPR #nderesidualenergy #korea #cognitiveradionetworks #radionetworks #rendezvoussequence
Here's where you can reach us : ijcnc@airccse.org or ijcnc@aircconline.com
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Digital Twins Computer Networking Paper Presentation.pptx
Performance Evaluation of Push-To-Talk Group Communication
1. International
OPEN ACCESS Journal
Of Modern Engineering Research (IJMER)
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 6| June. 2014 | 34|
Performance Evaluation of Push-To-Talk Group Communication
Jong Min Lee1
1
Department of Computer Software Engineering, Dong-Eui University, Republic of Korea
I. INTRODUCTION
Recently many Internet applications have been used widely in our lives for the proliferation of smart
phones. Especiallythe concept of the VoIP has been used in manyapplications such as Skype, Viber, Voxer, TiKL
etc. Among applications which support VoIP, there are several VoIP applications such as Voxer, and TiKL which
support the group communication as well as one-to-one communication, which is also known as the push-to-talk
(PTT or P2T) [1, 2, 3]. This push-to-talk technology supports the half duplex communication among end-to-end
users like the trunked radio system (TRS). Nextel communications was the first company to provide the
push-to-talk service commercially using iDEN.
The problem of the group communication results from the asymmetry between the in-bound traffic and
the out-bound traffic in a VoIP server. As the out-bound traffic increases, the packet delay and the packet loss can
be occurred. There are no problem in terms of sending and receiving packets, but there can be the decrease of the
voice quality in terms of listeners due to the characteristic of voice traffic. In this paper, we analyze how these
parameters results in the voice quality. We use ns-2.34 [4] for the simulation study and ns2Voip++ package [5]
for the analysis of the voice quality.
In Section 2, we describe the media transfer in the group communication and ns2Voip++ package briefly.
In Section 3, we describe the VoIP server added to the legacy ns-2.34 code to simulate the group communication.
The performance study due to the packet delay and the packet loss is given in Section 4. Finally, we give a
conclusion in Section 5.
II. RELATED WORKS
In this section, we describe the media transfer in the PoC architecture [6] briefly in order to explain the
flow of VoIP packets. Then we describe the ns2Voip++ Package [5] in short to explain the simulation
environment.
2.1 Media Transfer
Major communication and computer companies such as Nokia, Samsung Electronics, Qualcomm, Intel
and Microsoft have standardized the Push-to-talk over Cellular (PoC) to support group communication under the
Open Mobile Alliance (OMA) [7]. We use the PoC standard to explain the group communication. After the PoC
Session [8] is established, media packets including voice data are transferred between the PoC Server and PoC
Clients. These media packets are transported by RTP/UDP/IP [6]. The PoC Server forwards received RTP Media
packets towards all other PoC Clients that are not on hold [6], that is, the received packet is copied and forwarded
to other PoC Clients in a group. The basic RTP header of media packets is described in RFC 3550 [9] and
additional RTP payload formats for various audio/video codecs such as G.729A, GSM, EVRC and AMR are
described in several RFC documents [10, 11, 12]. From the SSRC field of the RTP header, the PoC Server and
PoC Clients can find who sends the RTP packet.
Abstract: Recently the VoIP technology has been used for the purpose of voice conversation through the
Internet since the proliferation of smart phones. In this paper, we are interested in the network performance
of the group communication a.k.a. the push-to-talk (PTT) service. As the media traffic to a VoIP server
increases, the VoIP server can be a bottleneck and the voice quality can be declined, which results from the
asymmetry between the in-bound traffic and the out-bound traffic in a VoIP server. To simulate the voice
packet transfer of the group communication, we use ns-2.34 and the ns2VoIP++ package to calculate the
end-to-end mean opinion score. Simulation results show that both the packet error rate and the packet delay
have a significant effect on the performance in terms of the mean opinion score.
Keywords: OMA PoC, User Plane, Group Communication, Push-To-Talk, MOS
2. Performance Evaluation of Push-To-Talk Group Communication
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 6| June. 2014 | 35|
Figure 1. Media transfer options
Fig.1 shows two options that transfer voice data between PoC clients. In Option 1, the Participating PoC
Server is in charge of transferring voice packets and also provides the filtering function and the transcoding
function among different codecs. However the performance may be degraded due to the increased packet delay
compared to Option 2 in which voice packets and other related packets are transmitted directly through the
Controlling PoC Server. In this paper, we onlyconsider Option 2 to support group communication. The incoming
traffic and the outgoing traffic of a PoC Server are unbalanced because of its one-to-many communication pattern.
Thus problems such as the traffic handling at a PoC Server and packet transmission to recipient PoC Clients occur
especially when network congestion happens.
2.2 ns2Voip++ Package
In general, the voice communication has two states, Talkspurt and Silence. Fig. 2 shows the basic
concept of ns2Voip++ package. The package generates VoIP voice traffic according to the designated codec such
as G.711, G.723, G.729A, AMR etc. The transmission of voice packets are performed using an ns-2 UDP agent.
The package also has the functionality to calculate the voice quality using the E-model [13], with which we can
finally get the mean opinion score (MOS) [14].
Figure 2. Basic concept of ns2Voip++ package
The toll quality has been standardized by ITU-T, in which typical methods are the MOS and the
E-model. The E-model and the MOS are an objective method and a subjective method, respectively. The E-model
can be expressed by the packet delay and the packet loss according the used codec, so it is used frequently to
evaluate the toll quality. The package also can model the voice using Talkspurt and Silence states using the
Weibull distribution. It also maygenerate voice packets using the exponential distribution. The average Talkspurt
time and the average Silence time are assumed to be 1 seconds and 1.5 seconds, respectively.
Fig. 3 shows class diagrams of the ns2Voip++ package. Fig. 3(a) illustrates the talker-side class diagram.
VoipSource initiates and terminates the voice communication according to Talkspurt and Silence states.
VoipEncoder generate packets according to the designated codec when it is in Talkspurt state. Fig. 3(b) is a
listener-side class diagram. VoipDecoder receives voice packets from a talker and then calculates the MOS value
using the E-model.
3. Performance Evaluation of Push-To-Talk Group Communication
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 6| June. 2014 | 36|
Figure 3. Class diagrams of ns2Voip++: (a) a talker-side class diagram; (b) a listener-side class diagram
III. IMPLEMENTATION OF A VOIP SERVER
To evaluate the network performance, we implement a VoIP server for group communication. In this
section, we describe the basic concept and the detailed design of a VoIP server.
3.1 Basic Concept
The existing ns2VoIP++ package in Fig. 4(a) cannot model the group communication. To make the
group communication possible using the ns-2 network simulator, we add an agent to mimic the functionality of a
VoIP server as shown in Fig. 4(b). In the original scheme, the source node s(0) should make the same packet for
different destination nodes d(i), in which we can easily find that this scheme is not equal to the method handling
the media transfer through the PoC Server, or the VoIP server.
In Fig. 4(b), we can find that the VoIP server receives packets generated by s(0) and replicates them to
every d(i). To make it possible, the VoIP server should handle the information about all groups and each group
members in a group. In the PoC architecture, the PoC Server with a Controlling PoC Function performs the Talk
Burst control and duplication of RTP media packets.
s(0)
n(2) n(3)
vs
n(1)
s(0) d(0)
n(2) n(3)
vs
n(1)
d(1)
(a) (b)
d(0) d(1) …… ……d(l-1) d(l-1)
Figure 4. ns2Voip++ extension: (a) the original scheme; (b) the extended scheme
4. Performance Evaluation of Push-To-Talk Group Communication
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 6| June. 2014 | 37|
3.2 VoipServer Agent
The following functionalities of a VoIP server are required to simulate the group communication:
The function to set the maximum number of groups
The function to add a group member to a certain group
The function to duplicate packets from a source node and transfer them to group members
Figure 5. The VoipServer agent class
We add the VoipServer agent as shown in Fig. 5. The name of an ns-2 agent acting as a VoIP server is
definded as “Agent/VoipServer” and can be declared in the ns-2 script as follows:
set voipserver [$ns node]
set agtserver [new Agent/VoipServer]
$ns attach-agent $voipserver $agtserver
It is easy to implement the function to set the maximum number of groups, k. We implement it in
VoipServer::command() and it can be set as follows.
$agtserver set-ksize 10
We assume that the number of group members, l, for each group is the same for simplicity. The
information of group members, or destination nodes, for each group is managed using the C++ STL map class in
ns-2, which is shown in Fig. 6. In the Tcl script, we can set the value k and l for arbitrary number of destination
nodes.
0
1
.
.
.
k-1
d(0) d(1) …… d(l-1)
d(l) d(l+1) …… d(2l-1)
d((k-1)l)
d((k-1)l
+1)
…… d(kl-1)
group id list of destination nodes
Figure 6. Data structure for managing the list of destination nodes
To implement the function to duplicate packets from a source node and transfer them to group members,
we reflect the service time to make a packet for a group member and send it. The service time is fixed as 10-6
second. To change the service time freely without compilation, Tcl/C++ binding is used.
Except the VoipServer agent, the existing ns2Voip++ package is changed as follows:
The configuration of RNG (random number generator) for the class „VoipSource‟ to change the RNG
The singleton class „MosLogger‟ is added to record the final MOS value to get the average MOS
value
The class „VoipDecoderOptimal‟ is changed to use the class „MosLogger‟ to record the MOS value
5. Performance Evaluation of Push-To-Talk Group Communication
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 6| June. 2014 | 38|
IV. PERFORMANCE EVALUATION
In this section, we perform the simulation study to see the effect of voice quality due to the out-bound
voice traffic of a VoIP server in the group communication.
4.1 Simulation Environment
We use ns-2.34 for the simulation and simulation parameters are shown in Table 1. We use the AMR
codec for voice encoding and decoding, which generates 32-byte voice packet every 0.02 second. The aggregation
scheme is used to merge the voice packet because it is too small for transmitting through Internet. The
aggregation size „two‟ means that two continuous voice packets are merged as one and it is transmitted every 0.04
second for network efficiency. The IP header size is assumed to be 3 because we assume that the IP header
compression scheme [15] is used in the simulation. A source node, destination nodes, and a VoIP server are
configured as the network model in Fig. 4(b).
Table 1. Simulation parameters
Parameter Value
Link bandwidth 10 Mbps
Link delay 10 msec
Queue length 5000
Packet loss rate 0.00 ~ 0.20
Service time 10-6
sec
Talkspurt p.d.f. Weibull distribution f(x; 0.412, 0.824)
Silence p.d.f. Weibull distribution f(x; 0.899, 1.089)
codec AMR
aggregation size 2
IP header size 3
4.2 Simulation Results
First, we perform the simulation by fixing the number of destination nodes k * l. Thus we can find that
the maximum number of groups, k, is inverse proportion to the number of group members in each group, l. Fig.
7(a) shows the change in the MOS value according to the number of groups for the fixed number of destination
nodes=100~500. In cases with small number of groups less than 10, MOS values are not good compared to group
bigger than 10. However, the MOS value of the worst case with the number of destination nodes = 500 is 4.29,
which means the voice quality is in „very satisfied‟ condition. In this case, the link bandwidth is big enough to
handle voice packets and thus there is no performance decrease.
(a) (b)
Figure 7. The effect of the number of group members: (a) The number of destination nodes=100~500;
(b) The number of destination nodes=600~1000
In Fig. 7(b), the number of all destination nodes are varied from 600 to 1000. The overall curve looks
similar as in Fig. 7(a). In case that the number of destination nodes becomes bigger than 900 and the number of
groups, k, in in [1, 10], the MOS values becomes less than 3, which means the voice quality becomes poor to listen.
In case that the number of all destination node = 1,000, the performance in terms of the MOS value is still good
6. Performance Evaluation of Push-To-Talk Group Communication
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 6| June. 2014 | 39|
with the number of groups > 20. As the number of groups become larger, we can find easily that the number of
group members become smaller and the overall performance in terms of MOS show good behavior.
To see the performance in terms of MOS better, we fix the number of group members, l, and then change
the number of all destination nodes as shown in Fig. 8. For l ≤ 20, the overall performance show good but it
degrades as the number of group members becomes larger than 20. Thus we can find that it is important to
manage the number of group members per each group to a certain degree.
Figure 8. The effect of the number of group members
Now we change the packet error rate on the out-bound link of a VoIP server to see the overall
performance, which is shown in Fig. 9. The number of group members per each group, l, is assumed to be 10. In
Fig. 9, the MOS value decreases from 4.9% to 6.7% as the packet error rate (per) increases by 0.01. For the packet
error rate greater than 0.03, the MOS values becomes less than 3.5, which means the listener gets the poor voice
quality. Thus we can find that the packet error rate has a great influence on the voice quality.
Figure 9. The effect of a packet error rate
We also change the packet delay on the network of a VoIP server to see the overall performance, which
is shown in Fig. 10. The number of group members per each group, l, is also assumed to be 10. For the packet
delay greater than 20 msec, the overall performance in terms of MOS degrades to a poor state. The packet delay
can be occurred when the packet is routed on the Internet due to the congestion and the link state, which results
in the poor voice quality for the group communication.
Figure10. The effect of a packet delay
7. Performance Evaluation of Push-To-Talk Group Communication
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 6| June. 2014 | 40|
V. CONCLUSION
In this paper, we have evaluated the overall performance of the group communication in terms of the
mean opinion score (MOS), that is the voice quality. We have used ns-2.34 for the simulation and the ns2VoIP++
package for the analysis of the voice quality. To simulate the group communication, we have added some
functionalities of the VoIP server. The large number of group members has a significant effect on the overall
performance, so we have found that it should be managed equal to or less than 20. We also have found that both
the packet error rate and the packet delay have a significant effect on the performance in terms of MOS. From the
simulation result, we can find that the efficient scheme to manage the voice quality for the group communication
is required to handle those situations.
ACKNOWLEDGEMENTS
This work was supported by Dong-Eui University Foundation Grant (2013).
REFERENCES
[1] Open Mobile Alliance, Push to talk over cellular (PoC) – architecture: approved version 2.0 (Aug. 2011).
[2] R.S. Cruz, M. Serafim, G. Varatojo, and L. Reis, Push-to-talk in IMS mobile environment, Proc. 2009 fifth Int‟l Conf.
on Networking and Services, Valencia, Spain, 2009, 389-395.
[3] L.-H. Chang, C.-H. Sung, H.-C. Chu, and J.-J. Liaw, Design and implementation of the push-to-talk service in ad hoc
VoIP network, IET Communications, 3(5), 2009, 740-751.
[4] ns-2 homepage, http://nsnam.isi.edu/nsnam/index.php/Main_Page.
[5] M.M. Andreozzi, D. Miqliorini, G. Stea and C. Vallati, Ns2Voip++, and Enhanced Module for VoIP Simulations, Proc.
3rd
Intl. ICST Conf. on Simulation Tools and Techniques, Brussels, Belgium, 2010.
[6] Open Mobile Alliance, PoC user plane: approved version 2.0 (Aug. 2011).
[7] Open Mobile Alliance Mobile Phone Standards and Specification, http://openmobilealliance.org/.
[8] Open Mobile Alliance, OMA PoC control plane: approved version 2.0 (Aug. 2011).
[9] H. Schulzrinne, S. Casner,R. Frederick and V. Jacobson, RTP: A Transport Protocol for Real-Time Applications,
RFC 3550, July 2003.
[10] H. Schulzrinne and S. Casner, RTP Profile for Audio and Video Conferences with Minimal Control, RFC 3551, July
2003.
[11] A. Li, RTP Payload Format for Enhanced Variable Rate Codecs (EVRC) and Selectable Mode Vocoders (SMV), RFC
3558, July 2003.
[12] J. Sjoberg , M. Westerlund, A. Lakaniemi and Q. Xie, RTP Payload Format and File Storage Format for the Adaptive
Multi-Rate (AMR) and Adaptive Multi-Rate Wideband (AMR-WB) Audio Codecs, RFC 4867, April 2007.
[13] ITU-T Recommendation G.107, “The E-Model, a Computational Model for Use in Transmission Planning,” March
2005.
[14] ITU-T Recommendation P.800, “Methods for Subjective Determination of Transmission Quality,” Aug. 1996.
[15] Bormann (Ed.), Robust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and
uncompressed, RFC 3095, July 2001.
Jong Min Lee received the B.S. degree in computer engineering from Kyungpook National
University, Korea, in 1992, and the M.S. and the Ph.D. degrees in Computer Science from
Korea Advanced Institute of Science and Technology (KAIST) in 1994 and 2000,
respectively. From Sept. 1999 to Feb. 2002, he worked for Samsung Electronics as a senior
engineer. Since 2002, he has been a faculty member of the Department of Computer Software
Engineering, Dong-Eui University, Busan, Korea. From Feb. 2005 to Feb. 2006, he visited the
University of California, Santa Cruz as a research associate. From Feb. 2012 to Feb. 2013, he
was a visiting scholar of the Department of Computer Science at The University of Alabama,
Tuscaloosa, AL. His research interests include routing in ad hoc networks and sensor networks, mobile
computing, and parallel computing.