Multiprotocol Label Switching (MPLS) is effective in managing and utilizing available network bandwidth. It has advanced security features and a lower time delay. The existing literature has covered the performance of MPLS-based networks in relation to conventional Internet Protocol (IP) networks. But, too few literatures exist on the performance of MPLS-based Virtual Private Networks (VPN) in relation to traditional VPN networks. In this paper, a comparison is made between the effectiveness of the MPLS-VPN network and a classic VPN network using simulation studies done on OPNET®. The performance metrics used to carry out the comparison include; End to End Delay, Voice Packet Sent/Received and Label Switched Path’s Traffic. The simulation study was carried out with Voice over Internet Protocol (VoIP) as the test bed. The result of the study showed that MPLS-based VPN networks outperform classic VPN networks.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...IJCNCJournal
Network Mobility Basic Support (NEMO BS) protocol (RFC 3963) is an extension of Mobile IPv6. The NEMO BS embraced by IETF working group to permit any node in the portable network to be accessible to the Internet despite the fact the network itself is roaming. This protocol likewise Mobile IPv6 doesn’t deliver any kind of Quality of Service (QoS) guarantees to its clients. It can barely offer the same level of services (i.e. Best-Effort) to all the users without obligation to the application’s needs. This propositions a challenge to real-time applications that demand a precise level of QoS pledge. The Differentiated Services has recently come to be the most widely used QoS support technology in IP networks due to its relative simplicity and scalability benefits. This paper proposes a new scheme to provide QoS to mobile network nodes within NEMO context. The proposed scheme intends to reduce handover latency for the users of MNN as well as alleviates packet losses. The feasibility of the proposed enhancement is assessed by measuring its performance against the native NEMO BS standard protocol using NS-2 simulator. The obtained results in the simulation study have demonstrated that the proposed scheme outperforms the standard NEMO BS protocol.
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...IJERA Editor
This paper proposes a load balancing algorithm using fuzzy logic so that maximum Quality of Experience can
be achieved. Avoidance of congestion is one of the major performance objectives of traffic engineering in
MPLS networks. Load balancing can prevent the congestion caused due to inefficient allocation of network
resources. Another aspect of the network performance is Quality of Experience (QoE). QoE in
telecommunications terminology, it is a measurement used to determine how well that network is satisfying the
end user's requirements. The Mean Opinion Score (MOS) is an important factor in determining the QoE. MOS
is a measurement of the quality delivered by the network based on human perception at the destination end.
Specifically we can tell mean opinion score (MOS) provides a numerical indication of the perceived quality of
received media after compression and/or transmission.
The article looks into the current state of the art of dynamic routing protocols with respect to their
possibilities to react to changes in the Quality of Service when selecting the best route towards a
destination network. New options that could leverage information about the ever changing QoS parameters
for data communication are analysed and a Cisco Performance Routing solution is described more in
detail. The practical part of this work focuses on a design and implementation of a test bed that provides a
scalable laboratory architecture to manipulate QoS parameters of different data communications flowing
through it. The test bed is used in various use cases that were used to evaluate Cisco Performance Routing
optimization capabilities in different scenarios.
Talhunt is a leader in assisting and executing IEEE Engineering projects to Engineering students - run by young and dynamic IT entrepreneurs. Our primary motto is to help Engineering graduates in IT and Computer science department to implement their final year project with first-class technical and academic assistance.
Project assistance is provided by 15+ years experienced IT Professionals. Over 100+ IEEE 2015 and 200+ yester year IEEE project titles are available with us. Projects are based on Software Development Life-Cycle (SDLC) model.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...IJCNCJournal
Network Mobility Basic Support (NEMO BS) protocol (RFC 3963) is an extension of Mobile IPv6. The NEMO BS embraced by IETF working group to permit any node in the portable network to be accessible to the Internet despite the fact the network itself is roaming. This protocol likewise Mobile IPv6 doesn’t deliver any kind of Quality of Service (QoS) guarantees to its clients. It can barely offer the same level of services (i.e. Best-Effort) to all the users without obligation to the application’s needs. This propositions a challenge to real-time applications that demand a precise level of QoS pledge. The Differentiated Services has recently come to be the most widely used QoS support technology in IP networks due to its relative simplicity and scalability benefits. This paper proposes a new scheme to provide QoS to mobile network nodes within NEMO context. The proposed scheme intends to reduce handover latency for the users of MNN as well as alleviates packet losses. The feasibility of the proposed enhancement is assessed by measuring its performance against the native NEMO BS standard protocol using NS-2 simulator. The obtained results in the simulation study have demonstrated that the proposed scheme outperforms the standard NEMO BS protocol.
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...IJERA Editor
This paper proposes a load balancing algorithm using fuzzy logic so that maximum Quality of Experience can
be achieved. Avoidance of congestion is one of the major performance objectives of traffic engineering in
MPLS networks. Load balancing can prevent the congestion caused due to inefficient allocation of network
resources. Another aspect of the network performance is Quality of Experience (QoE). QoE in
telecommunications terminology, it is a measurement used to determine how well that network is satisfying the
end user's requirements. The Mean Opinion Score (MOS) is an important factor in determining the QoE. MOS
is a measurement of the quality delivered by the network based on human perception at the destination end.
Specifically we can tell mean opinion score (MOS) provides a numerical indication of the perceived quality of
received media after compression and/or transmission.
The article looks into the current state of the art of dynamic routing protocols with respect to their
possibilities to react to changes in the Quality of Service when selecting the best route towards a
destination network. New options that could leverage information about the ever changing QoS parameters
for data communication are analysed and a Cisco Performance Routing solution is described more in
detail. The practical part of this work focuses on a design and implementation of a test bed that provides a
scalable laboratory architecture to manipulate QoS parameters of different data communications flowing
through it. The test bed is used in various use cases that were used to evaluate Cisco Performance Routing
optimization capabilities in different scenarios.
Talhunt is a leader in assisting and executing IEEE Engineering projects to Engineering students - run by young and dynamic IT entrepreneurs. Our primary motto is to help Engineering graduates in IT and Computer science department to implement their final year project with first-class technical and academic assistance.
Project assistance is provided by 15+ years experienced IT Professionals. Over 100+ IEEE 2015 and 200+ yester year IEEE project titles are available with us. Projects are based on Software Development Life-Cycle (SDLC) model.
MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...IJCNCJournal
The importance of IPv6 Routing Protocol for Low power and Lossy Networks (LLNs), also called RPL, has motivated in the development of a robust and quality of service (QoS) oriented Multi-Constraints Adaptive Link Quality Index (MALQI) based routing protocol. Unlike classical RPL protocols, MALQI enables mobile-RPL while ensuring fault-resilient, reliable and QoS communication over LLNs. MALQI protocol exploits key novelties such as signal strength based mobile node positioning, average received signal strength indicator (ARSSI) and ETX based objective function for fault tolerant best forwarding path selection. The functional architecture of MALQI enables it to be used as the parallel to the link layer RPL that even in the case of link failure can assist efficient data delivery over LLNs. Once detecting link outage, MALQI can execute node discover and best forwarding path selection to assist QoS delivery. Contiki-Cooja based simulation reveals that MALQI based mobile-RPL outperforms other state-of-art routing protocols.
3 S W 2009 I E E E Abstracts Java, N C C T Chennaincct
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
With the wide spread of WiFi hotspots, concentrated traffic workload on Smart Web (SW) can slow down
the network performance. This paper presents a congestion management strategy considering real time
activities in today’s smart web. With the SW context, cooperative packet recovery using resource
reservation procedure for TCP flows was adapted for mitigating packet losses. This is to maintain data
consistency between various access points of smart web hotspot. Using a real world scenario, it was
confirmed that generic TCP cannot handle traffic congestion in a SW hotspot network. With TCP in
scalable workload environments, continuous packet drops at the event of congestion remains obvious. This
is unacceptable for mission critical domains. An enhanced Link State Resource Reservation Protocol (LSRSVP)
which serves as dynamic feedback mechanism in smart web hotspots is presented. The contextual
behaviour was contrasted with the generic TCP model. For the LS-RSVP, a simulation experiment for TCP
connection between servers at the remote core layer and the access layer was carried out while using
selected benchmark metrics. From the results, under realistic workloads, a steady-state throughput
response was achieved by TCP LS-RSVP to about 3650Bits/secs compared with generic TCP plots in a
previous study. Considering network service availability, this was found to be dependent on fault-tolerance
of the hotspot network. From study, a high peak threshold of 0.009 (i.e. 90%) was observed. This shows
fairly acceptable service availability behaviour compared with the existing TCP schemes. For packet drop
effects, an analysis on the network behaviour with respect to the LS-RSVP yielded a drop response of about
0.000106 bits/sec which is much lower compared with the case with generic TCP with over 0.38 bits/sec.
The latency profile of average FTP download response was found to be 0.030secs, but with that of FTP
upload response, this yielded about 0.028 sec. The results from the study demonstrate efficiency and
optimality for realistic loads in Smart web contexts.
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
The quality of service is a need in recent computer network developments. The present paper evaluates some characteristics in a proposed network topology such as dropped packets and bandwidth use, using two traffic sources, firstly a VoIP source over an UDP agent, then a CBR traffic source over an UDP agent as well as the previous one. Two possible configurations are proposed, implementing both of them in the Network Simulator, and implementing in one of them differentiated services to compare the results. Statistics results are shown, in both cases showing the accumulative dropped packet number and the throughput in the link, obtaining a reducer number of dropped packets in the stage with differentiated services, and an improvement in the bandwidth use.
Comparative analysis of the performance of various active queue management te...IJECEIAES
This paper demonstrates the robustness of active queue management techniques to varying load, link capacity and propagation delay in a wireless environment. The performances of four standard controllers used in Transmission Control Protocol/Active Queue Management (TCP/AQM) systems were compared. The active queue management controllers were the Fixed-Parameter Proportional Integral (PI), Random Early Detection (RED), Self-Tuning Regulator (STR) and the Model Predictive Control (MPC). The robustness of the congestion control algorithm of each technique was documented by simulating the varying conditions using MATLAB® and Simulink® software. From the results obtained, the MPC controller gives the best result in terms of response time and controllability in a wireless network with varying link capacity and propagation delay. Thus, the MPC controller is the best bet when adaptive algorithms are to be employed in a wireless network environment. The MPC controller can also be recommended for heterogeneous networks where the network load cannot be estimated.
Mpls vpn using vrf virtual routing and forwardingIJARIIT
Multi-Protocol Label Switching (MPLS) which was introduced by Internet Engineering Task Force (IETF) is
usually used in communication networks which started attracting all the internet service provider(ISP) networks with its
brilliant and excellent features that provide quality of services (QOS)and guarantees to traffic which carries data from one
network to another network directly through labels.
Virtual Private Network (VPN) is one of the highly useful MPLS applications which allow a service provider or a large enterprise
network to offer network Layer VPN services that guarantee and carries traffic securely and privately from customer’s one to
another through the service provider’s network. To support multiple customers that Customers Request for secure, reliable,
private and ultrafast connections over the internet MPLS VPN standards include the concept of a virtual router. This feature
called a VRF table. VRF or Virtual Routing and Forwarding technology that permit a router to have various routing table or
multiple VPN at the same time that they are located in the same router but they are independent and also the VRF feature in
VPN now allows different customers to use same IP addresses connected to the same ISP. A VRF exists inside a single MPLS
router and typically routers need at least one VRF for each customer attached to that particular router.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Our approach in this thesis is that, we have designed and built a National Carrier based core and edge network to simulate a real live scenario that spans the kingdom of Saudi Arabia. Some of the results in the thesis are presented against simulation time and some against network load.how to implement mpls on network
Efficient P2P data dissemination in integrated optical and wireless networks ...TELKOMNIKA JOURNAL
The Quality of Service (QoS) resource consumption is always the tricky problem and also
the on-going issue in the access network of mobile wireless part because of its dynamic nature of network
wireless transmissions. It is very critical for the infrastructure-less wireless mobile ad hoc network that is
distributed while interconnects in a peer-to-peer manner. Toward resolve the problem, Taguchi method
optimization of mobile ad hoc routing (AODVUU) is applied in integrated optical and wireless networks
called the adLMMHOWAN. Practically, this technique was carry out using OMNeT++ software by building
a simulation based optimization through design of experiment. Its QoS network performance is examined
based on packet delivery ratio (PDR) metric and packet loss probabilities (PLP) metric that consider
the scenario of variation number of nodes. During the performing stage with random mobile connectivity
based on improvement in optimized front-end wireless domain of AODVUU routing, the result is performing
better when compared with previous study called the oRia scheme with the improvement of 14.1% PDR
and 43.3% PLP in this convergence of heterogeneous optical wireless network.
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksIJECEIAES
Ensuring the best quality of smart multimedia services becomes an essential goal for modern enterprises so there is always a need for effective IP mobility smart management schemes in order to fulfill the following two main functions: (I) interconnecting the moving terminals around the extended indoor smart services. In addition, (II) providing session continuity for instant data transfer in real-time and multimedia applications with negligible latency, efficient bandwidth utilization, and improved reliability. In this context, it found out that the Generalized Multi-Protocol Label Switching (GMPLS) over LTE-A network that offers many advanced services for large numbers of users with higher bandwidths, better spectrum efficiency, and lower latency. In GMPLS, there is an elimination of the routing searches and choice of routing protocols on every core LTE-A router also it provides the architecture simplicity and increases the scalability. A comparative assessment of three types of IPv6 mobility management schemes over the LTE-A provided by using various types of multimedia. By using OPNET Simulator 17.5, In accordance with these schemes, it was proven that the IPv6-GMPLS scheme is the best choice for the system's operation, in comparison to the IPv6-MPLS and Mobile IPv6 for all multimedia offerings and on the overall network performance.
MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...IJCNCJournal
The importance of IPv6 Routing Protocol for Low power and Lossy Networks (LLNs), also called RPL, has motivated in the development of a robust and quality of service (QoS) oriented Multi-Constraints Adaptive Link Quality Index (MALQI) based routing protocol. Unlike classical RPL protocols, MALQI enables mobile-RPL while ensuring fault-resilient, reliable and QoS communication over LLNs. MALQI protocol exploits key novelties such as signal strength based mobile node positioning, average received signal strength indicator (ARSSI) and ETX based objective function for fault tolerant best forwarding path selection. The functional architecture of MALQI enables it to be used as the parallel to the link layer RPL that even in the case of link failure can assist efficient data delivery over LLNs. Once detecting link outage, MALQI can execute node discover and best forwarding path selection to assist QoS delivery. Contiki-Cooja based simulation reveals that MALQI based mobile-RPL outperforms other state-of-art routing protocols.
3 S W 2009 I E E E Abstracts Java, N C C T Chennaincct
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
With the wide spread of WiFi hotspots, concentrated traffic workload on Smart Web (SW) can slow down
the network performance. This paper presents a congestion management strategy considering real time
activities in today’s smart web. With the SW context, cooperative packet recovery using resource
reservation procedure for TCP flows was adapted for mitigating packet losses. This is to maintain data
consistency between various access points of smart web hotspot. Using a real world scenario, it was
confirmed that generic TCP cannot handle traffic congestion in a SW hotspot network. With TCP in
scalable workload environments, continuous packet drops at the event of congestion remains obvious. This
is unacceptable for mission critical domains. An enhanced Link State Resource Reservation Protocol (LSRSVP)
which serves as dynamic feedback mechanism in smart web hotspots is presented. The contextual
behaviour was contrasted with the generic TCP model. For the LS-RSVP, a simulation experiment for TCP
connection between servers at the remote core layer and the access layer was carried out while using
selected benchmark metrics. From the results, under realistic workloads, a steady-state throughput
response was achieved by TCP LS-RSVP to about 3650Bits/secs compared with generic TCP plots in a
previous study. Considering network service availability, this was found to be dependent on fault-tolerance
of the hotspot network. From study, a high peak threshold of 0.009 (i.e. 90%) was observed. This shows
fairly acceptable service availability behaviour compared with the existing TCP schemes. For packet drop
effects, an analysis on the network behaviour with respect to the LS-RSVP yielded a drop response of about
0.000106 bits/sec which is much lower compared with the case with generic TCP with over 0.38 bits/sec.
The latency profile of average FTP download response was found to be 0.030secs, but with that of FTP
upload response, this yielded about 0.028 sec. The results from the study demonstrate efficiency and
optimality for realistic loads in Smart web contexts.
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
The quality of service is a need in recent computer network developments. The present paper evaluates some characteristics in a proposed network topology such as dropped packets and bandwidth use, using two traffic sources, firstly a VoIP source over an UDP agent, then a CBR traffic source over an UDP agent as well as the previous one. Two possible configurations are proposed, implementing both of them in the Network Simulator, and implementing in one of them differentiated services to compare the results. Statistics results are shown, in both cases showing the accumulative dropped packet number and the throughput in the link, obtaining a reducer number of dropped packets in the stage with differentiated services, and an improvement in the bandwidth use.
Comparative analysis of the performance of various active queue management te...IJECEIAES
This paper demonstrates the robustness of active queue management techniques to varying load, link capacity and propagation delay in a wireless environment. The performances of four standard controllers used in Transmission Control Protocol/Active Queue Management (TCP/AQM) systems were compared. The active queue management controllers were the Fixed-Parameter Proportional Integral (PI), Random Early Detection (RED), Self-Tuning Regulator (STR) and the Model Predictive Control (MPC). The robustness of the congestion control algorithm of each technique was documented by simulating the varying conditions using MATLAB® and Simulink® software. From the results obtained, the MPC controller gives the best result in terms of response time and controllability in a wireless network with varying link capacity and propagation delay. Thus, the MPC controller is the best bet when adaptive algorithms are to be employed in a wireless network environment. The MPC controller can also be recommended for heterogeneous networks where the network load cannot be estimated.
Mpls vpn using vrf virtual routing and forwardingIJARIIT
Multi-Protocol Label Switching (MPLS) which was introduced by Internet Engineering Task Force (IETF) is
usually used in communication networks which started attracting all the internet service provider(ISP) networks with its
brilliant and excellent features that provide quality of services (QOS)and guarantees to traffic which carries data from one
network to another network directly through labels.
Virtual Private Network (VPN) is one of the highly useful MPLS applications which allow a service provider or a large enterprise
network to offer network Layer VPN services that guarantee and carries traffic securely and privately from customer’s one to
another through the service provider’s network. To support multiple customers that Customers Request for secure, reliable,
private and ultrafast connections over the internet MPLS VPN standards include the concept of a virtual router. This feature
called a VRF table. VRF or Virtual Routing and Forwarding technology that permit a router to have various routing table or
multiple VPN at the same time that they are located in the same router but they are independent and also the VRF feature in
VPN now allows different customers to use same IP addresses connected to the same ISP. A VRF exists inside a single MPLS
router and typically routers need at least one VRF for each customer attached to that particular router.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Our approach in this thesis is that, we have designed and built a National Carrier based core and edge network to simulate a real live scenario that spans the kingdom of Saudi Arabia. Some of the results in the thesis are presented against simulation time and some against network load.how to implement mpls on network
Efficient P2P data dissemination in integrated optical and wireless networks ...TELKOMNIKA JOURNAL
The Quality of Service (QoS) resource consumption is always the tricky problem and also
the on-going issue in the access network of mobile wireless part because of its dynamic nature of network
wireless transmissions. It is very critical for the infrastructure-less wireless mobile ad hoc network that is
distributed while interconnects in a peer-to-peer manner. Toward resolve the problem, Taguchi method
optimization of mobile ad hoc routing (AODVUU) is applied in integrated optical and wireless networks
called the adLMMHOWAN. Practically, this technique was carry out using OMNeT++ software by building
a simulation based optimization through design of experiment. Its QoS network performance is examined
based on packet delivery ratio (PDR) metric and packet loss probabilities (PLP) metric that consider
the scenario of variation number of nodes. During the performing stage with random mobile connectivity
based on improvement in optimized front-end wireless domain of AODVUU routing, the result is performing
better when compared with previous study called the oRia scheme with the improvement of 14.1% PDR
and 43.3% PLP in this convergence of heterogeneous optical wireless network.
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksIJECEIAES
Ensuring the best quality of smart multimedia services becomes an essential goal for modern enterprises so there is always a need for effective IP mobility smart management schemes in order to fulfill the following two main functions: (I) interconnecting the moving terminals around the extended indoor smart services. In addition, (II) providing session continuity for instant data transfer in real-time and multimedia applications with negligible latency, efficient bandwidth utilization, and improved reliability. In this context, it found out that the Generalized Multi-Protocol Label Switching (GMPLS) over LTE-A network that offers many advanced services for large numbers of users with higher bandwidths, better spectrum efficiency, and lower latency. In GMPLS, there is an elimination of the routing searches and choice of routing protocols on every core LTE-A router also it provides the architecture simplicity and increases the scalability. A comparative assessment of three types of IPv6 mobility management schemes over the LTE-A provided by using various types of multimedia. By using OPNET Simulator 17.5, In accordance with these schemes, it was proven that the IPv6-GMPLS scheme is the best choice for the system's operation, in comparison to the IPv6-MPLS and Mobile IPv6 for all multimedia offerings and on the overall network performance.
In this paper we discuss about how to increase the reliability, energy-efficiency in a wireless sensor network. Since energy saving has become the top factor on demand due to the increasing multimedia services in mobile devices. The existing batteries unfortunately do not provide the desirable lifetime. Therefore reducing energy consumption has become very crucial factor in all the tasks the mobile devices perform. This work presents an Opportunistic Routing Protocol, which supports energy consumption by increasing the networks performance and also providing reliability to the wireless sensor networks.
SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAXijngnjournal
In this paper it is proposed to provide the QoS to the user by using the degradation of service under hostile environment being itself be a parameter to improve the QoS. Here the relation between the service and environment of its best performance drawn on the basis of simulation and analysis .The service then taken as a parameter to decide present environment of the user and to take measurable steps to improve the QoS either doing handover to nearby station or increasing power or to provide some marginal bandwidth etc.All analysis done over a WiMax network i.e. being designed and simulated using the Qualnet wireless simulator.
This lesson describes the concept of VPN and introduces some VPN terminology.
Importance
This lesson is the foundation lesson for the MPLS VPN Curriculum.
Objectives
Upon completion of this lesson, the learner will be able to perform the following
tasks:
■ Describe the concept of VPN
■ Explain VPN terminology as defined by MPLS VPN architecture
Great slides about factors to consider when looking at migrating to MPLS. OnCall Telecom can help with all your migration and design concerns and handle your migration from order to implementation. Contact us today to discuss your organization's needs!
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
2. ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 5, October 2018: 2073-2081
2074
can combine the advantages of IP and other network protocols to deliver the QoS desired [9].
This has led to the proliferation of ISPs that provide MPLS-VPN services and the growing
number of businesses that use MPLS-VPNs. The sophisticated nature of MPLS-VPNs has also
given room for sustainable security solutions for MPLS-VPNs [10].
Programs have also been developed to provide solutions for the use of VPNs utilizing
MPLS backbone in public networks. A VPN does not provide a second layer of information
because it cannot perform automatic encryption and thus, finds it difficult to connect easily
especially when there are errors caused by interruption of information disclosure protocol and
other issues [11]. Label Switching Paths (LSPs) are the means by which traffic demands are
routed in MPLS networks. LSPs have dynamic routing capabilities that can handle rapidly
varying traffic demands. Some LSPs are removed from the network when traffic demands are
low and created when traffic demands are high. The creation and deletion of LSPs due to vary
traffic demands could lead to bandwidth underutilization. Rerouting LSPs using a better
configuration has been proposed as a way of checkmating bandwidth underutilization in MPLS
networks. Rerouting is usually performed offline and at a time when the network is stable. The
services the LSP supports, the desired Quality of Service informs the way and manner in which
LSPs are confiured to prevent bandwidth underutilization. One way to improve the situation at
any instance is to reroute the present LSP to a known and better global configuration. This
rerouting process is performed „„off-line‟‟ during a quiet period when the network state is stable.
To achieve this, the desired Quality of Service is taken into serious consideration as rerouting
has its own unique effect on network traffic.
1.1. Related Work
It is common knowledge that MPLS-based network infrastructure is quite efficient.
Authors In paper [12], looked closely at how MPLS is implemented on VPNs. An architectural
model was clarified and a proposal was made for a unique model that allows a design and
implementation procedure for MPLS on VPNs. The authors elucidated on the various QoS that
must be considered when designing MPLS-VPN schemes. In paper [13] a detailed description
was given on how to simulate a MPLS scheme using OPNET
®.
The authors focused on
describing the functionality of MPLS architecture through a simulation model.
The authors in [14] explained a rerouting technique that used three levels of QoS
requirements to tackle the issue of network resource wastage. The technique involved the use
of an algorithm that gave priority to medium quality LSPs over low quality LSP when rerouting.
The technique considers low quality LSPs only after all medium quality LSPs has been rerouted.
The technique was a two pronged one that tried to keep reroutings to the barest minimum. The
authors supported their findings with some numerical results.
In [15] a distortion factor was used to represent the varied network streams that are
usually found at the node of a network. This enabled the authors to use MPLS to address what-
if scenerios that are dependent on anticipated traffic demands. A problem known as a distortion-
aware non-linear discrete optimization was created to view how the MPLS can be used to
reroute traffic from a heterogenous data stream.The main problem was splited into two phases.
The frist phase was used to break down the major problem into micro-problems and the second
stage was used to show how the non-linear distortion aware problem was solved.
1.2. The problem
A lot of literature exists on comparions between conventional IP and MPLS networks.
The authors in [16] used the performance metrics of end-to-end delay, voice packet delay,
received and sent voice packets and voice packet jitter to evaluate the comparative
performance of IP and MPLS networks. Voice over VoIP was used as the test bed for the
simulation study. The simulation study‟s result showed that MPLS-based networks outperform
conventional IP networks. However, the study was not carried out on VPNs.The authors in [17]
implemented the MPLS technology for a different test bed known as Vehicular Ad-hoc Networks
(VANETS) and were able to show the comparative effieciency of IP and MPLS networks using
QoS parameters such as packet loss, round trip delays and fault tolerant paths. The result of the
study showed that MPLS-based networks perform better than their IP counterpart. But security
measures were not considered in the study. The study carried out by the authors in [7]
incorporated security and VPNs. The comparative study used frame relay as a performance
3. TELKOMNIKA ISSN: 1693-6930
Performance of MPLS-Based Virtual Private Networks and Classic .... (Kennedy Okokpujie)
2075
metric. The study showed that MPLS-VPNs are better in performance than IP based networks.
However, their test bed was only meant to cater to data sevices [18].
1.3. Proposed Solution
Since most work done in this area have already been able to show that for efficient
management in traffic engineering, MPLS backbone provides better peformance than it‟s IP
conterpart, and also VPN based MPLS is the best security scheme to be used, the later was
only justified for data networks, voice and video was not considered. Since real life infrastructure
will carry video, voice and data, this work is going to compare the performance of MLPS-VPNs
with classic VPNs using VoIP as the test bed [19,20].
2. Research Method
2.1. Experiment Description
This section describes the overall network design for the simulation study.Transmission
and switching using the VPN-MPLS backbone is simulated and compared with the classic VPN
only. The simulation study shows the location of network devices and their optimum connection
matrix. The simulations study is carried out in:
a. A simple MPLS-VPN network
b. A traditional VPN network.
The network components as used in this paper from OPNET
®
library include:
a. Ethernet_wkstn: This is the OPNET
®
element that is used to simulate the total number of
network users. It consists of ethernet connections at a selected rate. It is controlled by the
underlying medium used to connect to an ethernet switch.
b. Ethernet_server: This is used to simulate the service server in the network.
c. Cisco 7200 router: This is the Cisco router model that is capable of supporting MPLS traffic
management technology.
d. 100BaseT: This link provides a full duplex capability with speeds up to 100Mbps for
connecting the Cisco router to the Ethernet_server and Ethernet_wkstn.
e. PPP_E3: This is used to provide a point to point duplex link connecting two workstations or
nodes and it can deliver an IP rate of speeds amounting to 34.36Mbps. It is also used for
connecting the Cisco 7200 series router.
f. MPLS_E-LSP_STATIC: This is configured so that the static LSPs are not signaled during
startup. This helps to ensure total control of the routing process.
g. Application Config: This network component is used to direct OPNET
®
to the application
that contains the underlying framework for the simulation study. Only one application
configuration is for OPNET
®
to deal with multiple network applications. Application
parameters for different application types being observed are configured in this element.
h. Profile Config: This is used to represent the different traffic patterns of users on a network.
It can be used to show the different applications a user might or will be using in some time
duration, i.e. (simulated period). There is no limit to the number of profiles that can be
simulated. The simulated profiles can be viewed on assigned networks and observations
can be made. User profiles vary from one user to the other and in this study; users were
assigned to profiles that were configured for the needed application.
i. MPLS_Config_Object: This element is used for the configuration of MPLS Forwarding
Equivalence Class (FEC) and Traffic Trunk. The specifications are implemented at the
Ingress Edge router. The main purpose of the implementation is to reroute traffic flows and
allocate distinct LSPs to different application traffic. The utmost intention of the simulated
OPNET
®
implementation was to provide a networking environment with traffic flow that can
be related to an ISP network. The model site simulated can provide the networking
capabilities of Servers, Workstations, Routers and Link Models. At the edges of the
networks, Cisco 7200 series routers were provided to deal with the traffic ingress and
egress from the servers and workstations.
2.2. Description of the Topology
The profiles discussed in the earlier section were used to configure two applications that
use Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) as their transport
protocols. The simulation study ensures the routing of these network traffic types through the
4. ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 5, October 2018: 2073-2081
2076
shortest paths possible.The choice of UDP and TCP as the transport protocols for the
simulation study was informed by its wide use in IP systems. During configuration, two minutes
was assigned to allow for sufficient flooding of the network with TCP and UDP traffic. The two
minutes‟ convergence time allows enough time for the network components such as the routers
to exchange Hello packets, thereby, helping to build the topology tables and routing paths.
At the start of the second minute, the application responsible for the transfer of data is triggered,
allowing TCP packets to move across the network.
The maximum TCP packets allowed to be downloaded from the file server was capped
at 50MB. The application that provides UDP packets on the network starts one minute after the
TCP packets have reached an assigned threshold. The maximum traffic load for the UDP
packets was set at 3MB. The default Maximum Transmission Unit (MTU) value used was 1500
bytes for Ethernet connections. This specifies the amount of IP datagram packets that can be
carried in a frame.
2.3. MPLS SIMULATION SCENARIO
The TCP and UDP traffics generated were controlled by installing LSPs that labeled the
packets and made rerouting easy. A total amount of four LSPs were created between the edge
router allowing traffic into the network (i.e. ingress router (PE_1)) and the router taking packets
out of the network (i.e. egress router (PE_2)). The flow specification for TCP and UDP traffic
entering into the network was configured for router (PE_1). The LSP traffic was made to pass
through two traffic trunks as shown in Figure 1. Trunking was configured on the LSP links to
engineer the packets from the File Transfer Protocol (FTP) clients (CE_1) to the server hosting
the FTP protocol application. The simulation is shown in Figure 1. For the MPLS scenario, the
maximum transfer rate was recorded for the TCP and UDP protocols. The throughput between
the routers was measured and finally the queuing delay was also considered.
Figure 1. MPLS Simulation Scenario
2.4. VPN-MPLS SIMULATION SCENARIO
The network components for the VPN-MPLS simulation study include: The Autonomous
System 1 (AS-1) that contains four provider routers (P) and three provider Edge routers (PE).
The autonomous System 2 (AS-2) was modeled as an enterprise network named Enterprise 1.
Enterprise 1 was created and divided into two (2) sites, namely, site 1 and 2 respectively. Site
one consists of two Customer routers (C) and one Customer Edge router (CE). Site 2 also
contains the same amount of Customer Routers and Customer Edge Routers. The configuration
is shown in Figure 2.
The VPN in this simulation study is named “Yellow_VPN”. The routers are interlinked by
using PPP_SONET_OC3 links. The desired IP QoS is implemented on every router in the
MPLS backbone with the following parameters:
5. TELKOMNIKA ISSN: 1693-6930
Performance of MPLS-Based Virtual Private Networks and Classic .... (Kennedy Okokpujie)
2077
a. QoS Scheme: Priority Queuing
b. QoS profile: Protocol Based.
The results were analyzed based on VPN delay and VPN load/throughput (in bits/seconds and
packet/seconds).
Figure 2. VPN-MPLS simulation Scenario
3. Results and Analysis
3.1. VPN Simulation Scenario
Figure 3 is the result got for the MPLS scenario. By observation, it was discovered that
the maximum transfer rate was obtained at the 594th second, with a value of 1923004.16
bits/second. After one minute, the UDP traffic generated from the CE_2 reached a maximum
transmission rate of 3017570.37 bits/second after a period of about 594 seconds. The values
were got from the traffic moving towards the (PE_1) router. It was also observed that the
intensity of traffic from the UDP packets in the network had some effect on the traffic intensity
recorded by the TCP protocol. These effects were noticeable throughout the simulation period.
Figure 3. UDP Traffic Analysis
6. ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 5, October 2018: 2073-2081
2078
To obtain the TCP parameters, the simulation was allowed to continue for another 168
seconds and a minimum TCP value was obtained. The minimum TCP value obtained was
388712.82 bits/second. A maximum value of 1923004.16 bits/second was obtained at the 594th
second. This is shown in Figure 4. The transients can be attributed to TCP acknowledgements
travelling back and forth from the server to the client along the shortest path. Transients
appeared in the result for the ingress router in charge of traffic forwarding to other areas of the
network from the (PE_1). For packets to be rerouted or engineered to move in a specific path, it
must adhere to the LSPs policy and path reservation so configured.
Figure 4. TCP Traffic Analysis
For proper working of the LSP configuration, packet routing for a particular specification
of LSP must be established. This gives sole control of packet rerouting to the PE_1 ingress
router on the edge of the network. The PE_1 ingress router also has the ability to supervise the
average bit rate permitted by the flow specification predefined by the LSP. The flow specification
configured and implemented for UDP traffic permitted bits averaging 4214400 bits/sec. It was
noticed that some UDP traffic exceeded the specified average at some point due to increased
traffic intensity. The LSP, configured at the ingress router, provided the queuing mechanism to
control the amount of UDP packets to the specified value. This delay, caused by the LSP had
some influence on the flow of TCP packets.
Experimentations done on the MPLS also yielded results based on the maximum
throughput of the system which was measured by the routers that were configured to handle
traffic flows. Compared to the earlier simulation, it was observed that the throughput measured
between the routers that combines the shortest path and the longest path experienced load
balancing. While in the earlier simulation, there were some nodes that had to carry more load
than others. The throughput measured for the TCP traffic travelling along the ingress and
egress routers reached a maximum value of 28247.78 bits/second. It was noticed that the
throughput starts to rise after a period of 120 seconds from the beginning of the simulation.
From the result of the simulation study, it was noticed that long paths were utilized
better i.e. the traffic engineering qualities of the MPLS was more evident with such paths. It was
observed that there was no throughput at the non-shortest path without the traffic engineering
provided by the MPLS. Without the traffic engineering of the MPLS, TCP traffic would
experience more bandwidth deprivation when competing with its UDP counterpart along the
shortest path. The MPLS reduces congestion on the network because it carries more UDP
traffic by default whenever edge routers have shortest path configurations.
7. TELKOMNIKA ISSN: 1693-6930
Performance of MPLS-Based Virtual Private Networks and Classic .... (Kennedy Okokpujie)
2079
Figure 5. Showing the Impartation of the LSP
3.2. VPN-MPLS SIMULATION SCENARIO RESULT
For the VPN-MPLS simulation Scenario, The VPN delay statistics gives the end-to-end
delay for traffic through an MPLS VPN network. This delay is measured as the time elapsed
between traffic entering the Provider‟s network through the Ingress PE and traffic departing the
Provider‟s Network through the Egress PE. Figure 6 illustrates the VPN delay for 500 calls per
hour. The sample mean of the VPN delay is 4.69E-006.
The network throughput and load are main parameters that reflect the network
capability. By definition, the load is the amount of VPN traffic that enters the Provider‟s network
through the Ingress PE while the throughput is the amount of VPN traffic that leaves the
Provider‟s network through the Egress PE. Figure 7 shows the MPLS VPN load for 500 calls. It
was observed that the sample mean for the load was 3814132 bit/s. From Figure 8, it was
observed that the sample mean of the VPN throughput was 3822233.94 bit/s.
Figure 6. MPLS-VPN delay Figure 7. MPLS-VPN load
8. ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 5, October 2018: 2073-2081
2080
Figure 8. VPN-MPLS throughput
4. Conclusion
This simulation study aims to analyze and compare the performance metrics of an
MPLS based VPN to that of a traditional VPN network using VoIP as the test bed. The analysis
and comparison is followed by presenting an approach in OPNET
®
modeler 14.5 to obtain the
performance metrics.
In this paper, a combination of theoretical research and empirical research were used. It
began with a literature review of the relevant state-of-the-art in MPLS, VPN and MPLS-VPN.
The simulation study yielded observations about the following areas:
a. The challenges in MPLS based VPN network with respect to IP QoS
b. How MPLS based VPN with IP QoS influences delay in VoIP network
c. The best scenario for VoIP traffic.
It was found that MPLS VPN based on the interior routing protocol (OSPF) and exterior
routing protocol (BGP) with IP QoS is the best scenario for VoIP traffic. MPLS VPN architecture
is scalable and flexible enough to provide well organized voice packet transmission, load
balancing, consistency, data security, network isolation from other networks and end to end
controlled connectivity with guaranteed QoS.
References
[1] GK Widi, ML Baihaqi, AS Nugroho, SS Hidayat. The Efficiency Test of Additional Multi Protocol Label
Switching Network Protocol Over Open Shortest Path First Network Using Graphic Network Simulator
3. Indonesian Journal of Electrical Engineering and Computer Science (IJEECS). 2015; 15: 100-106.
[2] MY Hariyawan. Comparison analysis of recovery mechanism at MPLS network. International Journal
of Electrical and Computer Engineering (IJECE). 2011; 1: 151.
[3] NE Rikli, S Almogari. Efficient priority schemes for the provision of end-to-end quality of service for
multimedia traffic over MPLS VPN networks. Journal of King Saud University-Computer and
Information Sciences. 2013; 25: 89-98.
[4] MN Soorki, H Rostami. Label switched protocol routing with guaranteed bandwidth and end to end
path delay in MPLS networks. Journal of Network and Computer Applications. 2014; 42: 21-38.
[5] M Kolhar, MM Abualhaj, F Rizwan. QoS Design Consideration for Enterprise and Provider's Network
at Ingress and Egress Router for VoIP protocols. International Journal of Electrical and Computer
Engineering (IJECE). 2016; 6: 235.
[6] BG Józsa, M Makai. On the solution of reroute sequence planning problem in MPLS networks.
Computer Networks. 2003; 42: 199-210.
9. TELKOMNIKA ISSN: 1693-6930
Performance of MPLS-Based Virtual Private Networks and Classic .... (Kennedy Okokpujie)
2081
[7] YQ Fan, H Fan, C Sun. OPNET-Based Computer Simulation of MPLS VPN Security Solutions.
Applied Mechanics and Materials. 2011: 361-365.
[8] SI Popoola, AA Atayero, N Faruk, JA Badejo. Data on the key performance indicators for quality of
service of GSM networks in Nigeria. Data in Brief. 2018; 16: 914-928.
[9] A Ezenwoke. Design of a QoS-based Framework for Service Ranking and Selection in Cloud E-
marketplaces. Asian Journal of Scientific Research. 2018; 11: 1-11.
[10] H Ifijeh, F Idachaba, I Oluwafemi. Performance Evaluation of The Quality of VoIP Over WLAN
Codecs. Proceedings of the World Congress on Engineering. 2015.
[11] D Grayson, D Guernsey, J Butts, M Spainhower, S Shenoi. Analysis of security threats to MPLS
virtual private networks. International Journal of Critical Infrastructure Protection. 2009; 2: 146-153.
[12] DO Awduche, B Jabbari. Internet traffic engineering using multi-protocol label switching (MPLS).
Computer Networks. 2002; 40: 111-129.
[13] IM Yelmo, D Larrabeiti, I Soto, P Pacyna. Multicast traffic aggregation in MPLS-based VPN networks.
IEEE Communications Magazine. 2007; 45.
[14] S Srivastava, A van de Liefvoort, D Medhi. Traffic engineering of MPLS backbone networks in the
presence of heterogeneous streams. Computer Networks. 2009; 53: 2688-2702.
[15] R Mishra, H Ahmad. Comparative Analysis of Conventional IP Network and MPLS Network over VoIP
Application. International Journal of Computer Science and Information Technologies. 2014; 5: 4496-
4499.
[16] KN Qureshi, AH Abdullah. Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS.
Information Management & Business Review. 2014; 6.
[17] KN Qureshi, AH Abdullah, AN Hassan, DK Sheet, RW Anwar. Mechanism of Multiprotocol Label
Switching for Forwarding Packets & Performance in Virtual Private Network. Middle-East Journal of
Scientific Research. 2014; 20: 2117-2127.
[18] O Obinna, O Kennedy, O Osemwegie, N Nsikan. Comparative Analysis of Channel Estimation
Techniques in SISO, MISO and MIMO Systems. International Journal of Electronics and
Telecommunications. 2017; 63: 299-304.
[19] AA Atayero, OI Sheluhin, YA Ivanov. Modeling, simulation and analysis of video streaming errors in
wireless wideband access networks. in IAENG Transactions on Engineering Technologies, ed:
Springer. 2013: 15-28.
[20] Okokpujie KO, Okoyeigbo O, Okhaifoh JE, Osemwegie O, Nkordeh N. Performance Analysis and
Modeling of MIMO Systems. International Journal of Applied Engineering.