Traffic management and congestion control are major issues in Asynchronous Transfer Mode(ATM) networks. Congestion arises when traffic in the network is more than offered load. The primary function of congestion control is to ensure good throughput and low delay performance while maintaining a fair allocation of network resources to users. In this paper, Enhanced Proportional Rate based Congestion Avoidance (EPRCA) scheme proposed by ATM forum has been considered. But this scheme has limitation of higher cell drop problem for the bursty traffic. Improvements to EPRCA scheme have been proposed to reduce cell drop problem and results of
improved EPRCA schemes were analyzed with basic EPRCA scheme.
Study of the VariousChannel Estimation Schemes in Wireless Mimo-Ofdm Networkstheijes
The Multiple Input Multiple Output Orthogonal Frequency Division Multiplexing system is used widely use.so it
is essential to understand the data transmission in such system. As the characteristics of the transmission
channel always changing with time, it is necessary to know the channel and channel estimation schemes in
wireless networks. The channel estimation schemes are required to make the channels according to required
parameters for the data transmission. Several channel estimation schemes are available and can be used with
different algorithms. In this paper various channel estimation schemes were discussed and their performance in
fading channel.
Topics covered in this presentation:
1. RF spectrum and GSM specifications
2. FDMA and TDMA
3. Digital Voice Transmission
4. Channel coding, Interleaving and Burst formatting
5. GMSK
6. Frame structure of GSM
7. Corrective actions against multipath fading
Study of the VariousChannel Estimation Schemes in Wireless Mimo-Ofdm Networkstheijes
The Multiple Input Multiple Output Orthogonal Frequency Division Multiplexing system is used widely use.so it
is essential to understand the data transmission in such system. As the characteristics of the transmission
channel always changing with time, it is necessary to know the channel and channel estimation schemes in
wireless networks. The channel estimation schemes are required to make the channels according to required
parameters for the data transmission. Several channel estimation schemes are available and can be used with
different algorithms. In this paper various channel estimation schemes were discussed and their performance in
fading channel.
Topics covered in this presentation:
1. RF spectrum and GSM specifications
2. FDMA and TDMA
3. Digital Voice Transmission
4. Channel coding, Interleaving and Burst formatting
5. GMSK
6. Frame structure of GSM
7. Corrective actions against multipath fading
Asynchronous Transfer Mode ATM is the cell relay protocol designed by ATM Forum and adopted by the ITU-T. Cell, a small fixed size block of information with asynchronous TDM ensures high speed real time transmission with efficient and cheaper technology. Instead of user addresses, it uses virtual circuit identifier and virtual path identifier, which can be repeated at unrelated locations. This technology ensures connectivity to much more users than normal packet switching networks.
ATM and ISDN-B combination allows high-speed interconnection of world's network.
PERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNELIJCSES Journal
Multi Carrier Code Division Multiple Access (MC-CDMA) is a well known technique for high speed
wireless data transmission .Two advanced technology was included in the MC-CDMA structure, such as
orthogonal frequency division multiplex (OFDM) and the code division multiple access (CDMA),so that it
benefits from the robustness of OFDM against multipath environment and from the capability of multiuser
multiplexing services that is achieved via (CDMA) system. MC-CDMA is a multicarrier spread spectrum
system which is classified as the candidate scheme for future mobile radio systems. In this paper MCCDMA
system, with Rayleigh fading channel and 16QAM array modulation, was simulated to investigate
the effects of different parameters on the system performance, such as processing gain; number of paths;
number of users; interleaving; and coding ratio.MC-CDMA performances can be considerably improved
by proper selection of these parameters. As expected, results show that MC-CDMA has a better performance over CDMA system.
This paper describes a novel system for vectorizing 2D raster cartoon. The output videos are the resolution independent, smaller in file size. As a first step, input video is segment to scene thereafter all processes are done for each scene separately. Every scene contains foreground and background objects so in each and every scene foreground background classification is performed. Background details can occlude by foreground objects but when foreground objects move its previous position such occluded details exposed in one of the next frame so using that frame can fill the occluded area and can generate static background. Classified foreground objects are identified and the motion of the foreground objects tracked for this simple user assistance is required from those motion details of foreground object’s animation generated. Static background and foreground objects segmented using K-means clustering and each and every cluster’s vectorized using potrace. Using vectored background and foreground object animation path vector video regenerated.
Asynchronous Transfer Mode ATM is the cell relay protocol designed by ATM Forum and adopted by the ITU-T. Cell, a small fixed size block of information with asynchronous TDM ensures high speed real time transmission with efficient and cheaper technology. Instead of user addresses, it uses virtual circuit identifier and virtual path identifier, which can be repeated at unrelated locations. This technology ensures connectivity to much more users than normal packet switching networks.
ATM and ISDN-B combination allows high-speed interconnection of world's network.
PERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNELIJCSES Journal
Multi Carrier Code Division Multiple Access (MC-CDMA) is a well known technique for high speed
wireless data transmission .Two advanced technology was included in the MC-CDMA structure, such as
orthogonal frequency division multiplex (OFDM) and the code division multiple access (CDMA),so that it
benefits from the robustness of OFDM against multipath environment and from the capability of multiuser
multiplexing services that is achieved via (CDMA) system. MC-CDMA is a multicarrier spread spectrum
system which is classified as the candidate scheme for future mobile radio systems. In this paper MCCDMA
system, with Rayleigh fading channel and 16QAM array modulation, was simulated to investigate
the effects of different parameters on the system performance, such as processing gain; number of paths;
number of users; interleaving; and coding ratio.MC-CDMA performances can be considerably improved
by proper selection of these parameters. As expected, results show that MC-CDMA has a better performance over CDMA system.
This paper describes a novel system for vectorizing 2D raster cartoon. The output videos are the resolution independent, smaller in file size. As a first step, input video is segment to scene thereafter all processes are done for each scene separately. Every scene contains foreground and background objects so in each and every scene foreground background classification is performed. Background details can occlude by foreground objects but when foreground objects move its previous position such occluded details exposed in one of the next frame so using that frame can fill the occluded area and can generate static background. Classified foreground objects are identified and the motion of the foreground objects tracked for this simple user assistance is required from those motion details of foreground object’s animation generated. Static background and foreground objects segmented using K-means clustering and each and every cluster’s vectorized using potrace. Using vectored background and foreground object animation path vector video regenerated.
Skillsoft perspectives 2014 marketing learning and development workshopMarie Sanguinetti
Presented at the MGM, Las Vegas SkillSoft Perspectives Annual Conference.
This initiative allowed JCS to move from a handful of instructor lead workshops to a blended environment where we employees can access thousands of online learning, as well as, ILT courses. JCS University received many accolades and was recognized throughout the company and featured in Jarden's 2012 Annual Report.
Un Hito en la Historia Educativa del ParaguayFabiola Oviedo
La Ley N° 4088/10 es considerada un hito en la historia educativa de nuestro país por el Informe Integrante de la Iniciativa Global por los Niños Fuera de la Escuela, Perfiles de la exclusión educativa en la República del Paraguay, de OOSCI, Unicef-UIS y Unesco, entre otros factores, porque se creció en inclusión, no solamente en términos verificables en dígitos, sino también en la internalización de estos derechos sobre todo por parte de los sectores más vulnerables.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Transient Stability Assessment and Enhancement in Power SystemIJMER
Power system is subjected to sudden changes in load levels. Stability is an important concept
which determines the stable operation of power system. For the improvement of transient stability the
general methods adopted are fast acting exciters, circuit breakers and reduction in system transfer
reactance. The modern trend is to employ FACTS devices in the existing system for effective utilization
of existing transmission resources. The critical clearing time is a measure to assess transient instability.
Using PSAT, the critical clearing time (CCT) corresponding to various faults are calculated. The most
critical faults were identified using this calculation. The CCT for the critical faults were found to change
with change in operating point. The CCT values are predicted using Artificial Neural Network (ANN) to
study the training effects of ANN. TCSC is selected as the FACTS device for transient stability
enhancement. Particle Swarm Optimization method is used to find the optimal position of TCSC using
the objective function real power loss minimization. The result shows that the technique effectively
increases the transient stability of the system
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Machine Learning Based Session Drop Prediction in LTE Networks and its SON As...Ericsson
Abnormal bearer session release (i.e. bearer session drop) in cellular telecommunication networks may seriously impact the quality of experience of mobile users. The latest mobile technologies enable high granularity real-time reporting of all conditions of individual sessions, which gives rise to use data analytics methods to process and monetize this data for network optimization. One such example for analytics is Machine Learning (ML) to predict session drops well before the end of session.
Performance evaluation of bandwidth optimization algorithm (boa) in atm networkEditor Jacotech
domains: none of them are suitable, alone, for the wide range of traffic services expected in ATM-based networks. Therefore, some integration of these basic schemes should be considered. In this paper, we propose a new traffic control algorithm, called the Bandwidth optimization Algorithm (BOA). BOA is a multi-level control algorithm that attempts to optimally manage network resources and perform traffic control among a wide range of traffic services in ATM-based networks. The basic objective of BOA is to meet the quality of service requirements for different traffic sources, while making the best possible use of network bandwidth. In addition. BOA attempts to minimize network congestion in a preventive way.
Analysis of harmonics and resonances in hvdc mmc link connected to AC gridBérengère VIGNAUX
High-frequency responses of HVDC-MMC links are essential to study because harmonic and resonance phenomena may impact the AC grid. In this paper, EMT-type simulations are used to analyze converter station’s frequency response.
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor NetworksCSCJournals
In this paper we analyze the performance of 802.15.4 Wireless Sensor Network (WSN) and derive the queue size trade off for different modulation schemes like: Minimum Shift Keying (MSK), Quadrature Amplitude Modulation of 64 bits (QAM_64) and Binary Phase Shift Keying (BPSK) at the radio transmitter of different types of devices in IEEE 802.15.4 for WSN. It is concluded that if queue size at the PAN coordinator of 802.15.4 wireless sensor network is to be taken into consideration then QAM_64 is recommended. Also it has been concluded that if the queue size at the GTS or Non GTS end device is to be considered then BPSK should be preferred. Our results can be used for planning and deploying IEEE 802.15.4 based wireless sensor networks with specific performance demands. Overall it has been revealed that there is trade off for using various modulation schemes in WSN devices.
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
The cyber attacks have become most prevalent in the past few years. During this time, attackers have discovered new vulnerabilities to carry out malicious activities on the internet. Both the clients and the servers have been victimized by the attackers. Clickjacking is one of the attacks that have been adopted by the attackers to deceive the innocuous internet users to initiate some action. Clickjacking attack exploits one of the vulnerabilities existing in the web applications. This attack uses a technique that allows cross domain attacks with the help of userinitiated clicks and performs unintended actions. This paper traces out the vulnerabilities that make a website vulnerable to clickjacking attack and proposes a solution for the same.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4
Improved EPRCA Congestion Control Scheme for ATM Networks
1. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2409-2413 (2015) ISSN: 0975-0290
2409
Improved EPRCA Congestion Control Scheme
for ATM Networks
Dr. M.Sreenivasulu
Department of CSE, K.S.R.M.College of Engineering, Kadapa, Andhra Pradesh, India.
Email: mesrinu@rediffmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
Traffic management and congestion control are major issues in Asynchronous Transfer Mode(ATM) networks.
Congestion arises when traffic in the network is more than offered load. The primary function of congestion
control is to ensure good throughput and low delay performance while maintaining a fair allocation of network
resources to users. In this paper, Enhanced Proportional Rate based Congestion Avoidance (EPRCA) scheme
proposed by ATM forum has been considered. But this scheme has limitation of higher cell drop problem for the
bursty traffic. Improvements to EPRCA scheme have been proposed to reduce cell drop problem and results of
improved EPRCA schemes were analyzed with basic EPRCA scheme.
Keywords: ATM networks, EPRCA, IEPRCA, NIST ATM Network Simulator.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: November 27, 2014 Date of Acceptance: January 7, 2015
---------------------------------------------------------------------------------------------------------------------------------------------------
1. Introduction
Broadband Integrated Services Digital Network (B-
ISDN) can offer high speed data transport, multimedia
communication, high quality video conferences, video
telephony, etc [17]. The Asynchronous Transfer Mode
(ATM) has emerged as a standard technology for
supporting gigabit BISDN services [18-20]. Using ATM,
the information is usually transmitted in fixed size units
called cells. The ATM technique is designed to provide
fast packet switching at variable rates from 1.54 Mbps to
2 Gbps and even beyond.
Traffic Management and congestion control are major
issues in ATM networks [1-6]. Congestion arises when
incoming traffic to specific link is more than outgoing
link capacity. When congestion problem arises, cells are
discarded without being processed. The design of
congestion control mechanism is essential not only for
regulating traffic to prevent congestion but also for
providing efficient and fair bandwidth allocation [9,15].
Among various congestion control mechanisms, rate base
mechanisms are proved efficient than other mechanisms.
Rate based congestion control schemes are end-to-end
feedback mechanisms, and the cell transmission rate of
each source end system is regulated according to
congestion feedback information returned by the network
[8,12,13].
In this paper, Enhanced Proportional Rate Control
Algorithm (EPRCA), which is a rate based scheme for
controlling congestion in ATM networks, has been
considered. The improvements to EPRCA scheme is also
presented in this paper. The basic and improved schemes
were implemented using NIST ATM network simulator.
This paper is organized as follows: The importance of
Resource Management (RM) cell and its fields are
presented in Section 2. The basic EPRCA mechanism, the
simulation environment and results analysis of EPRCA
are presented in section 3. The improvements to EPRCA
schemes, with results are presented in section 4. Finally
the conclusion of paper is presented in section 5.
2. Resource Management (RM) Cell
In rate based congestion control schemes, source end
system periodically sends a Resource Management (RM)
cell for every 31 data cells. The RM cell is used to carry
control and flow information over the connection between
source and destination end systems [11]. The destination
end system sends an RM cell with an indicator showing
the status of traffic back to the source end system. The
intermediate switches may simply forward these RM cells
or specify the explicit rate in RM cell based on
functionality of different rate based congestion control
schemes. The source end system then uses the
information in the RM cell for specifying the transmission
rate until a new RM cell is received.
The RM cell is used for finding status of congestion, if
any, in the network. Every RM cell has the header of five
bytes width. The payload type indicator (PTI) in cell
header is set to a 3 bit binary, 110, as the default value, to
indicate a RM cell. The protocol ID field, which is one
byte long, is set to one for Available Bit Rate (ABR)
application connections. The direction (DIR) bit
distinguishes between forward and backward RM cells.
The backward notification (BN) bit is set only in switch
generated RM cells. The congestion indication (CI) bit is
set by a switch to indicate presence of congestion. The no
increase (NI) bit, is set by a switch to indicate moderate
congestion in the network. The sequence number field
value is set by source end system to indicate the current
sequence number for the RM cell and the queue length
field value is set by a switch in the network. The Explicit
Rate (ER) field indicates the maximum rate allowed to the
source and this field value is set by the switch. When the
source receives the backward RM cell from the network,
2. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2409-2413 (2015) ISSN: 0975-0290
2410
it adjusts its transmission rate using the ER, CI, and NI
values in the received RM Cell.
3. Basic EPRCA Scheme
The Enhanced Proportional Rate Control Algorithm
(EPRCA) is a rate based scheme, in which switch
explicitly specifies the rate at which transmission should
be made at the source [14,16]. In this scheme, each
switch in the path between source and destination end
systems maintains a queue or buffer, with two congestion
thresholds namely, thresholds QT (i.e. to indicate normal
congestion) and DQT (i.e. to indicate severe congestion).
Each switch in the network periodically computes mean
allowed cell rate (MACR) that should ideally be the mean
of all source end systems ACRs. The MACR value is
used for computing explicit rate in RM cell.
3.1. EPRCA Algorithm
Before transmission of data by the source end system, the
connection or route to be established between source and
destination end systems. The route comprising of source,
destination end systems, intermediate systems, and
switches. The behaviour of source, destination end
systems, and intermediate switch are mentioned below
[10]:
Source End System behaviour
1. At the beginning of transmission, the source transmits
an RM cell. The allowed cell rate (ACR) or current cell
rate (CCR) is initially set to peak cell rate.
2. The source sends data cells and after every 31 data
cells transmitted, one RM cell is followed.
3. The source continuously decreases its ACR until it
receives an RM cell returned from the destination. Upon
receipt of every RM cell, the source increases its ACR by
no greater than ER.
Destination End System behaviour
1. The destination returns an RM cell upon receiving
each RM cell.
Switch behaviour
1. In the network, each switch periodically computes a
mean allowed cell rate (MACR) using the following
formula:
MACR = (1 – AV) * MACR + AV * ACR,
where AV is the Average Factor, which is set to a default
value of 0.0625.
If the queue length is less than QT, then there is no
congestion in the network. When non-congested switch
receives a RM cell from a source end system and if ACR
is less than MACR, then there is no need to adjust its
MACR. If ACR is greater than or equal to MACR, it
means that MACR is not adequately large enough, then
MACR needs to be increased by using the above formula.
2. If the queue length exceeds DQT, indicating that the
switch is said to be in severe congestion state, then ER
needs to be replaced in RM suitably, as follows:
ER = min (ER, MACR * MRF)
Where MRF is Major Reduction Factor, set to a default
value of 0.95
If queue length exceeds QT, the switch is said to be in
congestion state, then only those source end systems
whose ACR is more than MACR is need to reduce their
ACR value by replacing ER in RM cell given by the
formula:
ER = min (ER, MACR*ERF)
Where ERF is Explicit Reduction Factor, set to a default
value of 0.9375.
3.2 Simulation Environment
The basic EPRCA scheme described in previous section
was implemented using NIST ATM Network Simulator
for a sample network configuration shown in fig 1 [7].
Fig.1: A Sample Network Configuration
The network shown in fig.1, consist of four source end
systems (BTE1 to BTE 4 – Broadband Terminal
Equipment), four destination end systems (BTE5 to
BTE8), nine communication links (link1 to link 9), two
switches (switch1 and switch2), four applications
(Available Bit Rate applications ABR1 to ABR4) running
on source end systems and another four applications
(ABR5 to ABR8) running on destination end systems.
The ABR applications are attached to source and
destination terminals for sending and receiving data
respectively. For example, in given network
configuration, four virtual channels have been considered
for explanation. The first Virtual Channel (VC1) can be
established is through BTE1, Switch 1, Switch 2, and BTE
5. The Second Virtual Channel (VC2) is through BTE 2,
Switch 1, Switch 2, and BTE 6. The Third Virtual Channel
(VC3) is through BTE 3, Switch 1, Switch 2, and BTE 7.
The Fourth Virtual Channel (VC4) is through BTE 4,
Switch 1, Switch 2, and BTE 8.
In our simulation, the source end systems transmit cells at
its given Allowed Cell Rate which is initially set to PCR
with default value of 149 Mbps. The bandwidths of all
links (i.e link 1 to link 9) were set to 155 Mbps. The
default values for various control parameters of switches
and source end systems are also set, as mentioned in Table
1 and Table 2 respectively.
3. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2409-2413 (2015) ISSN: 0975-0290
2411
Table 1: Control parameters for Switch1 & Switch 2
for EPRCA scheme
Parameter Value
Queue length (in cells)
Low threshold (in cells)
Very Congested Queue Threshold (in cells)
Explicit Reduction Factor (ERF)
Major Reduction Factor (MRF)
Average Factor (AV)
1000
600
900
0.9375
0.95
0.0625
Table 2: Control parameters of source end systems for
EPRCA scheme
Parameter Value
Initial Cell Rate (ICR)
Minimum Cell Rate (MCR)
Peak Cell Rate (PCR)
7.49 Mbps
1. 49 Mbps
149.76 Mbps
3.3 Results Analysis
The performance of EPRCA Scheme is measured based on
cell drop percentage during transmission period of data
cells. The graph showing cell drop percentage over
transmission time is shown in figure 2.
Fig: 2 Percentage of Cell drop Vs Time at Switch 1
for basic EPRCA Scheme
From the above graph, higher percentage of cell drop is
noticed at the beginning of transmission, because ACR
was set to PCR. The cell drop at switch 1 is approximately
33 % and need a mechanism to reduce.
4. Improved EPRCA Schemes
Improvements to EPRCA scheme have been proposed to
reduce the cell drop problem by considering the
following modifications to basic EPRCA scheme.
4.1. Improved EPRCA (IEPRCA) Scheme1
In this, the behavior of source end systems are modified
by changing value of PCR to get reduced cell drops as
well as optimal link utilization. In basic EPRCA scheme,
a default value of 149.7 Mbps is set to PCR. This PCR
value is assigned to Initial Cell Rate (ICR) and all source
end systems start transmitting cells at higher rates (i.e.
with PCR) initially, resulting high cell drops at switch1.
The experimental tests have been conducted by varying
values for PCR and able to notice that the maximum
network efficiency can be reached by selecting PCR
value at an optimal value equal to 100 Mbps.
The improved EPRCA with optimal PCR value (i.e.
modified source end system behavior) was implemented
and graph for percentage of cell drop at switch1 over
transmission time is Fig. 3.
Fig.3: Percentage of Cell drop Vs Time at Switch1 for
IEPRCA sheme1
From the graph, it has been noticed that, the IEPRCA
scheme1 gives 21% cell drop, where as in the case of
basic EPRCA scheme it is approximately 33%. So the
IEPRCA scheme1 effectively reduces cell drop problem
by selecting PCR value at optimum and hence better than
basic EPRCA scheme.
4.2 Improved EPRCA (IEPRCA) Scheme2
The modification of switch behavior is also considered to
improve the performance of EPRCA scheme. The
modified switch behavior is given below.
1. When non congested switch receives forward RM cell
from source end system, it computes mean ACR
(MACR) using the following formula:
MACR = (1 – AV) * MACR + AV * CCR
Time in microseconds
%ofCelldrop
a
Time in microseconds
%ofCelldrop
a
4. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2409-2413 (2015) ISSN: 0975-0290
2412
The mean ACR is used for setting ER field of the RM
cell and CCR is the Current Cell Rate.
2. When switch receives backward RM cell from the
destination end system, it checks, if there is congestion at
the switch. It compares the queue length with threshold
value to detect congestion.
(i) If queue length exceeds threshold DQT, the switch
is said to be in severe congestion state. Then it replaces
ER in RM cell by min (ER, MACR * MRF) and
reduced ER communicated to all source end systems
via backward RM cell.
(ii) If queue length exceeds QT, the switch is said to be
in congestion state. To relieve congestion in network,
the switch reduces ER by replacing ER with min(ER,
MACR * ERF) and this reduced rate is communicated
by sending backward RM cell to all source end
systems.
The IEPRCA scheme2 was implemented with modified
switch behavior and graph showing percentage of cell
drop at switch1 over transmission time is shown in Fig.
3.
From this graph, it can be observed that switch reduces
explicit rate in backward RM cell, whenever it finds the
queue length exceeds threshold value.
The source end system decreases allowed cell rate when it
receives reduced ER in backward RM cell. When the
switch1 gets relief from congestion, it increases ER field
value in backward RM cell to allow source end systems to
increase their allowed cell rate.
It can also easily noticed from the graph that, % cell drop
fairly depends upon the cell transmission rate, and
increases with the rate of transmission The % cell drop
with IEPRCA scheme2 is 27%, as against 33% with basic
EPRCA scheme. Hence IEPRCA scheme2 is proved to be
better than basic EPRCA scheme.
Fig.4: Percentage of Cell drop Vs Time at Switch1 for
IEPRCA scheme2
4.3 Improved EPRCA (IEPRCA) Scheme3
To reduce the cell drop still further, the effects of
method 1 and method 2 have been combined to achieve
yet another improved scheme, called, IEPRCA scheme3.
In this scheme3, the optimal value of 100 Mbps is set to
PCR for source end system and also switch behavior is
modified as in IEPRCA scheme2. The IEPRCA scheme3
was implemented and results are shown in form of graph
for % cell drop vs time at intermediate switch1 in shown
in Fig 5.
Fig.5: Percentage of Cell drop Vs Time at Switch1 for
IEPRCA scheme3
From this graph, % cell drop is 17% noticed at switch1,
which is considerably less than that of basic EPRCA
scheme as well as IEPRCA scheme1 and scheme2.
Hence it can be concluded that IEPRCA scheme3 is far
better than basic EPRCA scheme.
4.4 Performance Comparison of EPRCA and improved
EPRCA schemes
The performance of IEPRCA schemes and basic EPRCA
can be compared by considering the amount of % cell
drop at intermediate switch1 and it was tabulated in table
3.
Table 3: Percentage of cell drop for EPRCA and
IEPRCA schemes
Sl.
No.
Scheme % cell drop
1. EPRCA 33
2. IEPRCA Scheme1 21
3. IEPRCA Scheme2 27
4. IEPRCA Scheme3 17
From the above the table, it has been noticed that,
IEPRCA shceme3 results with 17% cell drop which is
considerably less than that of basic EPRCA scheme as
well as IEPRCA scheme1 and scheme2. Hence it can be
Time in microseconds
%ofCelldrop
a
Time in microseconds
%ofCelldrop
a
5. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2409-2413 (2015) ISSN: 0975-0290
2413
concluded that IEPRCA scheme3 is far better than the
basic IEPRCA scheme.
5. Conclusion
In this paper, 3 methods have been proposed to enhance the
performance of basic EPRCA scheme, (i) by setting PCR to
optimal value (IEPRCA scheme1), (ii) by modifying the
switch behavior (IEPRCA scheme2), and (iii) by
setting optimal PCR value and modified switch
behavior (IEPRCA scheme3). The IEPRCA scheme3 found
to achieve the best results when compared to basic EPRCA
scheme as well as over other improved schemes IEPRCA
scheme1 and IEPRCA scheme2.
References
[1] R.S.Deshpande, Dr. P.D. Vyavahare, “Recent
Advances and a survey of congestion control
mechanisms in ATM networks”, IE(I) Journal, Vol.
88, pp. 47-54, , 2007 .
[2] W Li, Z Che, Y Li, “Research on the congestion
control of Broadband Integrated Service Digital
Network based on ATM”, Proceedings of the fifth
international conference on Machine Learning and
Cybernetics, Daliaan, pp 2510-2512, 2006.
[3] E Al-Hammadi and M M Shasavari, “Engineering
ATM networks for congestion avoidance”, Mobile
Networks and Application, Vol. 5, pp.157 – 163,
2000.
[4] Ching-Fong Su, Gustavo Do Vacianna, Jean
Warland, “Explicit Rate Flow Control for ABR
Services in ATM Networks”, IEEE/ACM
Transactions on Networking, Vol. 8, Issue 3, pp. 350-
361, 2000.
[5] A Hac, H.Lin, “Congestion Control for ABR traffic
in an ATM network”, International Journal of
Network Management, Vol. 9, pp. 249-264, 1999.
[6] K Siu, H Tzeng, “Intelligent Congestion Control for
ABR service in ATM networks”,ACM SIGCOMM
Computer Communication Review, Vol. 25, Issue 2,
pp. 81-106, 1994.
[7] N Golmie, F Mouveaux, L Hester, Y Saintillan, A
Koenig, D.Su, “The NIST ATM/HFC Network
Simulator Operation and Programming Guide”, Dec
1998.
[8] H Ohsaki, M Murata, H Suzuki et al, “Rate based
Congestion Control for ATM networks”, ACM
SIGCOMM, Computer Communication Review, Vol.
25, Issue 2, pp. 60-72, 1995.
[9] D Gaiti, G. Pujolle, “Performance management issues
in ATM networks: traffic and congestion control”,
IEEE/ACM transactions on networking, Vol. 4, No.2,
pp.249-257, April 1996.
[10] Raj Jain, Shivkumar Kalyanraman, Sonia Fahmy,
Rohit Goyal, “Source Behavior for ATM ABR
Traffic Management: An Explanation”, IEEE
Communication Magzine, pp. 50-55, 1996.
[11] Thomos M.Chen, Steve S. Lin, David Wang, Vijay
K.Samalam, Michael J. Procanik, and Dinyar
Kavouspour, “Monitoring and control of ATM
networks using special cells”, IEEE network
magazine, pp.28-38, Sept/oct 1996.
[12] Anna Hac, Yingjun Ma, “A Rate based Congestion
Control Scheme for ABR service in ATM networks”,
International Journal of Network Management,
Vol.8, pp. 292-317, 1998.
[13] Lalita A. Kulakarni, San-qi Li, “Performance
Analysis of a Rate-based Feedback Control
Scheme”, IEEE/ACM Transactions on Networking,
Vol. 6, No. 6, Decemeber 1998.
[14] L Roberts, “Enhanced Proportional Rate Control
Algorithm”, ATM forum contribution, April 1994.
[15] Rama Krishnan, “Rate based Control Schemes for
ABR Traffic – Design Principles and performance
comparison”,Global Communication Conference
Globecom96, pp.1231-1235, 1996.
[16] Xinomel Yu, Doan B. Hoang, David D.Feng, “A
Simulation Study of using ER feedback control to
transport compressed video over ATM network”,
Proceedings Workshop on Visualization, 2001.
[17] William Stallings, “ISDN and Broadband ISDN
with Frame Relay and ATM”, (Fouth Edition,
Pearson Education Asia, 2007).
[18] A Arulambalam, Xiaoqiang Chen, N. Ansari,
“Allocating Fair Rates for Available Bit Rate Service
in ATM Networks”, IEEE Communication
Magazine, Vol. 34, No. 11, pp. 92-100, 1996.
[19] Rainer Handel,Manfred N Huber,Stefan Schroder,
”ATM Networks Concepts, Protocols,Applications’
(Third Edition, Addison,Wesly,1999).
[20] J Y. Le Boudec, “The Asynchronous Transfer
Mode: A Tutorial”, Computer Networks & ISDN
Systems, Vol.24, pp. 279-302, 1992.
Author’s Biography
M. Sreenivasunlu received B.Tech
degree in Computer Science and
Engineering, from K.L. College of
Engineering (K.L.University),
Vaddeswarm, A.P. India, in 1990. He completed
M.E. in Computer Science & Engineering, from
Jadavpur University, Calcutta, India, in 1999. He
received Ph.D. in Computer Science and
Engineering, from J.N.T.University, Anantapur, A.P.
India, in the year 2013. He is having 21 years of
teaching experience. He is currently working as
Professor & Head of Computer Science and
Engineering Department, K.S.R.M.College of
Engineering, Kadapa. He is member of IEEE, life
member of IE(I), and ISTE. He published 15 papers
in international journals and in the proceedings of
National and International Conferences.