This document discusses research on developing a real-time, non-intrusive model for estimating speech quality over VoIP networks. The research aims to assess speech quality at mid-network points by evaluating both transport layer metrics like packet loss and jitter, as well as speech layer metrics using perceptual models. The current status describes capturing transport metrics from RTP/RTCP and implementing a perceptual model on an IXP2400 processor. Future work involves integrating the transport and speech models, testing under various network conditions, and evaluating the model for multiple calls and low bitrate codecs.
Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...Kaushik Panta
In a packet network, the term packet delay characterizes as the difference in end-to-end one-
way delay between selected packets in a flow with any lost packets being ignored. The effect is
sometimes referred to as jitter, although the definition is an imprecise fit. The delay is specified
from the start of the packet being transmitted at the source to the start of the packet being
received at the destination. Analysis of packet delay in both protocol IPv4 and IPv6 is
essential to measure network performance.
This project entitled “Analysis of Packet on the basis of Delay on IPv6 and IPv4
Networks in Open Short Path First Routing Protocol ” intends to analyze the packet
delay in both protocol IPv4 and IPv6 under the same condition and find out the fact that
which one is better in term of packet delay parameter of network performance. Due to the
insufficient IPv4 addresses and other issues, the world should migrate to IPv6 in near future.
So, measuring the network parameter is necessary.
OSPF (Open Shortest Path First) is a routing protocol for Internet Protocol networks. It uses
a link state routing algorithm and falls into the group of interior gateway protocols, operating
within a single autonomous system. It is defined as OSPF Version 2 in IPv4 and the updates
for IPv6 are specified as OSPF Version 3.
This project deals with the techniques of measure and analyze the packet delay. As, the
number of Internet users growing exponentially, it is really necessary to reduce the packet
delay in every possible way to improve network performance.
An Effective Approach for Colour Image Transmission using DWT Over OFDM for B...IJMTST Journal
Image transmission over the fading channels without degrading the perceptual quality is a challenging task while mitigating the power consumption in many fields such as broadband networks, mobile communications, Image sharing and video broadcasting. Also, it is not possible to resend the lost packets every time in many applications such as video broadcasting. Here, an effective approach for color image transmission has been proposed with power saving approach over OFDM system. Experimental results shows that the reception quality of received image is good enough with various peak signal to noise ratios also saved 60% of energy.
Multicast protocols can be classified as either reliable or unreliable both uses a best effort
method of setting up, maintaining and tearing down the multicast distribution tree. Pragmatic
General Multicast (PGM), Reliable Hybrid Multicast Protocol (RHMP) and Elastic Reliable
Multicast (ERM) are examples of reliable multicast protocols. PGM and ERM sends flood messages
to the Rendezvous Point source (RPS) from the source node towards the stub nodes which then
forward it to leaf nodes, leaf nodes that are not interested sends a prune message while any leaf node
that misses a packet sends a message to the RPS through the stub node requesting for the missed
multicast packet. A repair multicast packet is then forwarded to all leaf nodes that requested for it.
For a large distribution tree congestion might occur in the RPS if there is much failure and the leaf
node keeps requesting for repair data. In a distributed RPS such as the reliable hybrid multicast
protocol (RHMP) the stub nodes originates the flood message to the leaf and uninterested leaf sends
prune message, any stub that has one or more interested leaf sends a join message to the RPS. If a
leaf node in the multicast distribution misses a multicast packet it requests a repair packet its stub
node sends the repair data. A simulation model was developed to mimic the behaviour of PGM, ERM
and RHMP in different network size using hierarchical network and the control bandwidth overhead
(CBO) for each of the multicast protocols was calculated at the source node, stud node and leaf
nodes, CBO was use as the cost metric. The result shows that the RHMP uses less CBO than PGM
and ERM in a sparsely and densely populated network at the source and leaf nodes but more CBO is
used at the stub nodes but since more than one stub nodes act as the RPS to the leafs connected to it,
RHMP was found out to be better than the PGM or ERM.
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networksijceronline
An efficient and secured routing protocol design is the vital concern for mobile ad hoc networks in view of major problems raising on security issues and loss of the network resources is due to changes within the connections of the network like Node failures, link breakages in the network. Our proposed scheme enhances the secured and reliable transmission of data, which also improves the network constancy, efficient packet delivery ratio and network life time by integrating through the AODV Routing protocol. It unites the authentication, stable routes and signal strength of the nodes to attain the secure and reliable transmission of data through nodes.
Multicast protocols can be classified as either reliable or unreliable both uses a best effort method of
setting up, maintaining and tearing down the multicast distribution tree. Pragmatic General Multicast (PGM),
Reliable Hybrid Multicast Protocol (RHMP) and Elastic Reliable Multicast (ERM) are examples of reliable
multicast protocols. PGM and ERM sends flood messages to the Rendezvous Point source (RPS) from the
source node towards the stub nodes which then forward it to leaf nodes, leaf nodes that are not interested sends
a prune message while any leaf node that misses a packet sends a message to the RPS through the stub node
requesting for the missed multicast packet. A repair multicast packet is then forwarded to all leaf nodes that
requested for it. For a large distribution tree congestion might occur in the RPS if there is much failure and the
leaf node keeps requesting for repair data. In a distributed RPS such as the reliable hybrid multicast protocol
(RHMP) the stub nodes originates the flood message to the leaf and uninterested leaf sends prune message, any
stub that has one or more interested leaf sends a join message to the RPS. If a leaf node in the multicast
distribution misses a multicast packet it requests a repair packet its stub node sends the repair data. A
simulation model was developed to mimic the behaviour of PGM, ERM and RHMP in different network size
using hierarchical network and the control bandwidth overhead (CBO) for each of the multicast protocols was
calculated at the source node, stud node and leaf nodes, CBO was use as the cost metric. The result shows that
the RHMP uses less CBO than PGM and ERM in a sparsely and densely populated network at the source and
leaf nodes but more CBO is used at the stub nodes but since more than one stub nodes act as the RPS to the
leafs connected to it, RHMP was found out to be better than the PGM or ERM.
Analysis of Packet on the basis of Delay on IPv6 and IPv4 Networks in Open Sh...Kaushik Panta
In a packet network, the term packet delay characterizes as the difference in end-to-end one-
way delay between selected packets in a flow with any lost packets being ignored. The effect is
sometimes referred to as jitter, although the definition is an imprecise fit. The delay is specified
from the start of the packet being transmitted at the source to the start of the packet being
received at the destination. Analysis of packet delay in both protocol IPv4 and IPv6 is
essential to measure network performance.
This project entitled “Analysis of Packet on the basis of Delay on IPv6 and IPv4
Networks in Open Short Path First Routing Protocol ” intends to analyze the packet
delay in both protocol IPv4 and IPv6 under the same condition and find out the fact that
which one is better in term of packet delay parameter of network performance. Due to the
insufficient IPv4 addresses and other issues, the world should migrate to IPv6 in near future.
So, measuring the network parameter is necessary.
OSPF (Open Shortest Path First) is a routing protocol for Internet Protocol networks. It uses
a link state routing algorithm and falls into the group of interior gateway protocols, operating
within a single autonomous system. It is defined as OSPF Version 2 in IPv4 and the updates
for IPv6 are specified as OSPF Version 3.
This project deals with the techniques of measure and analyze the packet delay. As, the
number of Internet users growing exponentially, it is really necessary to reduce the packet
delay in every possible way to improve network performance.
An Effective Approach for Colour Image Transmission using DWT Over OFDM for B...IJMTST Journal
Image transmission over the fading channels without degrading the perceptual quality is a challenging task while mitigating the power consumption in many fields such as broadband networks, mobile communications, Image sharing and video broadcasting. Also, it is not possible to resend the lost packets every time in many applications such as video broadcasting. Here, an effective approach for color image transmission has been proposed with power saving approach over OFDM system. Experimental results shows that the reception quality of received image is good enough with various peak signal to noise ratios also saved 60% of energy.
Multicast protocols can be classified as either reliable or unreliable both uses a best effort
method of setting up, maintaining and tearing down the multicast distribution tree. Pragmatic
General Multicast (PGM), Reliable Hybrid Multicast Protocol (RHMP) and Elastic Reliable
Multicast (ERM) are examples of reliable multicast protocols. PGM and ERM sends flood messages
to the Rendezvous Point source (RPS) from the source node towards the stub nodes which then
forward it to leaf nodes, leaf nodes that are not interested sends a prune message while any leaf node
that misses a packet sends a message to the RPS through the stub node requesting for the missed
multicast packet. A repair multicast packet is then forwarded to all leaf nodes that requested for it.
For a large distribution tree congestion might occur in the RPS if there is much failure and the leaf
node keeps requesting for repair data. In a distributed RPS such as the reliable hybrid multicast
protocol (RHMP) the stub nodes originates the flood message to the leaf and uninterested leaf sends
prune message, any stub that has one or more interested leaf sends a join message to the RPS. If a
leaf node in the multicast distribution misses a multicast packet it requests a repair packet its stub
node sends the repair data. A simulation model was developed to mimic the behaviour of PGM, ERM
and RHMP in different network size using hierarchical network and the control bandwidth overhead
(CBO) for each of the multicast protocols was calculated at the source node, stud node and leaf
nodes, CBO was use as the cost metric. The result shows that the RHMP uses less CBO than PGM
and ERM in a sparsely and densely populated network at the source and leaf nodes but more CBO is
used at the stub nodes but since more than one stub nodes act as the RPS to the leafs connected to it,
RHMP was found out to be better than the PGM or ERM.
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networksijceronline
An efficient and secured routing protocol design is the vital concern for mobile ad hoc networks in view of major problems raising on security issues and loss of the network resources is due to changes within the connections of the network like Node failures, link breakages in the network. Our proposed scheme enhances the secured and reliable transmission of data, which also improves the network constancy, efficient packet delivery ratio and network life time by integrating through the AODV Routing protocol. It unites the authentication, stable routes and signal strength of the nodes to attain the secure and reliable transmission of data through nodes.
Multicast protocols can be classified as either reliable or unreliable both uses a best effort method of
setting up, maintaining and tearing down the multicast distribution tree. Pragmatic General Multicast (PGM),
Reliable Hybrid Multicast Protocol (RHMP) and Elastic Reliable Multicast (ERM) are examples of reliable
multicast protocols. PGM and ERM sends flood messages to the Rendezvous Point source (RPS) from the
source node towards the stub nodes which then forward it to leaf nodes, leaf nodes that are not interested sends
a prune message while any leaf node that misses a packet sends a message to the RPS through the stub node
requesting for the missed multicast packet. A repair multicast packet is then forwarded to all leaf nodes that
requested for it. For a large distribution tree congestion might occur in the RPS if there is much failure and the
leaf node keeps requesting for repair data. In a distributed RPS such as the reliable hybrid multicast protocol
(RHMP) the stub nodes originates the flood message to the leaf and uninterested leaf sends prune message, any
stub that has one or more interested leaf sends a join message to the RPS. If a leaf node in the multicast
distribution misses a multicast packet it requests a repair packet its stub node sends the repair data. A
simulation model was developed to mimic the behaviour of PGM, ERM and RHMP in different network size
using hierarchical network and the control bandwidth overhead (CBO) for each of the multicast protocols was
calculated at the source node, stud node and leaf nodes, CBO was use as the cost metric. The result shows that
the RHMP uses less CBO than PGM and ERM in a sparsely and densely populated network at the source and
leaf nodes but more CBO is used at the stub nodes but since more than one stub nodes act as the RPS to the
leafs connected to it, RHMP was found out to be better than the PGM or ERM.
Peer-to-peer and mobile networks gained significant attention of both research community and industry. Applying the peer-to-peer paradigm in mobile networks lead to several problems regarding the bandwidth demand of peer-to-peer networks. Time-critical messages are delayed and delivered unacceptably slow. In addition to this, scarce bandwidth is wasted on messages of less priority. Therefore, the focus of this paper is on bandwidth management issues at the overlay layer and how they can be solved. We present HiPNOS.KOM, a priority based scheduling and active queue management system. It guarantees better QoS for higher prioritized messages in upper network layers of peer-to-peer systems. Evaluation using the peer-to-peer simulator PeerfactSim.KOM shows that HiPNOS.KOM brings significant improvement in Kademlia in comparison to FIFO and Drop-Tail, strategies that are used nowadays on each peer. User initiated lookups have in Kademlia 24% smaller operation duration when using HiPNOS.KOM.
Challenges and Opportunities for HPC Interconnects and MPIinside-BigData.com
In this video from the 2017 MVAPICH User Group, Ron Brightwell from Sandia presents: Challenges and Opportunities for HPC Interconnects and MPI.
"This talk will reflect on prior analysis of the challenges facing high-performance interconnect technologies intended to support extreme-scale scientific computing systems, how some of these challenges have been addressed, and what new challenges lay ahead. Many of these challenges can be attributed to the complexity created by hardware diversity, which has a direct impact on interconnect technology, but new challenges are also arising indirectly as reactions to other aspects of high-performance computing, such as alternative parallel programming models and more complex system usage models. We will describe some near-term research on proposed extensions to MPI to better support massive multithreading and implementation optimizations aimed at reducing the overhead of MPI tag matching. We will also describe a new portable programming model to offload simple packet processing functions to a network interface that is based on the current Portals data movement layer. We believe this capability will offer significant performance improvements to applications and services relevant to high-performance computing as well as data analytics."
Watch the video: https://wp.me/p3RLHQ-hhK
Learn more: http://mug.mvapich.cse.ohio-state.edu/program/
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Presentación sobre redes sociales y educación, realizada para la asignatura de Investigación en Tecnología Digital Aplicada a la Educación del Máster en Investigación Educativa de la Universidad de Alicante.
Peer-to-peer and mobile networks gained significant attention of both research community and industry. Applying the peer-to-peer paradigm in mobile networks lead to several problems regarding the bandwidth demand of peer-to-peer networks. Time-critical messages are delayed and delivered unacceptably slow. In addition to this, scarce bandwidth is wasted on messages of less priority. Therefore, the focus of this paper is on bandwidth management issues at the overlay layer and how they can be solved. We present HiPNOS.KOM, a priority based scheduling and active queue management system. It guarantees better QoS for higher prioritized messages in upper network layers of peer-to-peer systems. Evaluation using the peer-to-peer simulator PeerfactSim.KOM shows that HiPNOS.KOM brings significant improvement in Kademlia in comparison to FIFO and Drop-Tail, strategies that are used nowadays on each peer. User initiated lookups have in Kademlia 24% smaller operation duration when using HiPNOS.KOM.
Challenges and Opportunities for HPC Interconnects and MPIinside-BigData.com
In this video from the 2017 MVAPICH User Group, Ron Brightwell from Sandia presents: Challenges and Opportunities for HPC Interconnects and MPI.
"This talk will reflect on prior analysis of the challenges facing high-performance interconnect technologies intended to support extreme-scale scientific computing systems, how some of these challenges have been addressed, and what new challenges lay ahead. Many of these challenges can be attributed to the complexity created by hardware diversity, which has a direct impact on interconnect technology, but new challenges are also arising indirectly as reactions to other aspects of high-performance computing, such as alternative parallel programming models and more complex system usage models. We will describe some near-term research on proposed extensions to MPI to better support massive multithreading and implementation optimizations aimed at reducing the overhead of MPI tag matching. We will also describe a new portable programming model to offload simple packet processing functions to a network interface that is based on the current Portals data movement layer. We believe this capability will offer significant performance improvements to applications and services relevant to high-performance computing as well as data analytics."
Watch the video: https://wp.me/p3RLHQ-hhK
Learn more: http://mug.mvapich.cse.ohio-state.edu/program/
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Presentación sobre redes sociales y educación, realizada para la asignatura de Investigación en Tecnología Digital Aplicada a la Educación del Máster en Investigación Educativa de la Universidad de Alicante.
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classification methods are not always efficient and systematic analysis of packet payloads is too slow. Most recent research proposals use flow statistics to classify traffic flows once they are finished, which limit their applicability for online classification. In this paper, we evaluate the feasibility of application identification at the beginning of a TCP connection. Based on an analysis of packet traces collected on eight different networks, we find that it is possible to distinguish the behavior of an application from the observation of the size and the direction of the first few packets of the TCP connection. We apply three techniques to cluster TCP connections: K-Means, Gaussian Mixture Model and spectral clustering. Resulting clusters are used together with assignment and labeling heuristics to design classifiers. We evaluate these classifiers on different packet traces. Our results show that the first four packets of a TCP connection are sufficient to classify known applications with an accuracy over 90% and to identify new applications as unknown with a probability of 60%.
Globecom 2015: Adaptive Raptor Carousel for 802.11Andrew Nix
These slides describe an adaptive raptor carousel for multicast transmission over 802.11. This work was presented by Berna Bulut at Globecom 2015, San Diego.
ATI Laser RADAR and Applications Training for Advanced Students Course SamplerJim Jenkins
Major technology advancements in Laser Radar (LADAR) have made a profound new impact on future mobile, airborne and space-based missions. In an effort to cope with problems such as target clutter, battlefield commanders require a new breed of LADAR, consisting of new programs such as Jigsaw and True 3D Flash. New LADAR systems and applications are currently in development, and will be based on entirely new technology, which has not been feasible until just now. These new LADAR technologies will support the Service-wide drive for a Single Integrated Air Picture (SIAP), which provides military forces access to reliable information about ground, air, space or undersea threats in any given theater of operations to achieve total theater air dominance. Developmental challenges are vast for LADAR and opportunities for industry involvement appear to be endless.
Peng Kang, Software Engineer, Dropbox + Richi Gupta, Engineering Manager, Dropbox
As a scalable and reliable data streaming solution with a rich ecosystem, Kafka is widely adopted in Dropbox infrastructure in various scenarios. It is part of Dropbox’s analytics data pipeline, stream processing platform and more mission critical systems. Jetstream is the team that provides Kafka as a service in Dropbox infrastructure. We manage the clusters, develop tooling, and enforce policies, so that our users can enjoy a highly available and reliable service. In this talk, we will share our experiences and learnings running Kafka clusters, pipelines that enable high durability (direct writes to kafka) and availability (goscribe), the policies we enforce for high reliability, the tooling we have for maintenance and stress testing, and finally an overview of Dropbox’s next generation queueing service built on top Kafka.
https://www.meetup.com/KafkaBayArea/events/266327152/
This is inspired from Tom Mitchell's book on Machine Learning. You can achieve a bit exact implementation of the back propagation algorithm if you follow the code in this.
A simple client-server application in java in which a client sends a message to a server and the server tries to be funny by sending back a funny response.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
2. Wireless Access Research Group, University of Limerick
OutlineOutline
• Research MilestonesResearch Milestones
• Theoretical AspectsTheoretical Aspects
• Evaluation PlatformsEvaluation Platforms
• ConclusionConclusion
3. Wireless Access Research Group, University of Limerick
Research MilestonesResearch Milestones
• Problem Statement.Problem Statement.
• Objectives.Objectives.
• Related Work.Related Work.
• Current Status of The Project.Current Status of The Project.
• Future Work.Future Work.
4. Wireless Access Research Group, University of Limerick
Problem StatementProblem Statement
• Lack of aLack of a Real-timeReal-time,, Non-intrusiveNon-intrusive
Speech Quality Estimation atSpeech Quality Estimation at mid-mid-
networknetwork points.points.
5. Wireless Access Research Group, University of Limerick
ObjectivesObjectives
• To develop aTo develop a Real-TimeReal-Time,, Non-intrusiveNon-intrusive
speech quality estimation model for VoIPspeech quality estimation model for VoIP
networks.networks.
• Particular emphasis is on effectiveness ofParticular emphasis is on effectiveness of
the model onthe model on “mid-network”“mid-network” points.points.
• The model should assess the over-all speechThe model should assess the over-all speech
quality by evaluating:quality by evaluating:
Transport Layer metrics.Transport Layer metrics.
Speech layer metrics.Speech layer metrics.
• Effective implementation of a perceptualEffective implementation of a perceptual
model is crucial.model is crucial.
6. Wireless Access Research Group, University of Limerick
Related WorkRelated Work
• Standards – E-Model, P.563 {ITU-T}.Standards – E-Model, P.563 {ITU-T}.
• Industry.Industry.
PsyVoIP for gateways {Psytechnics}.PsyVoIP for gateways {Psytechnics}.
VQMon/EP {Telechemy}VQMon/EP {Telechemy}
3SQM {OPTICOM}3SQM {OPTICOM}
PSM {Psytechnics}PSM {Psytechnics}
• Theoretical Research.Theoretical Research.
Transport layer assessments.Transport layer assessments.
Perceptual Models.Perceptual Models.
Cognitive Models.Cognitive Models.
7. Wireless Access Research Group, University of Limerick
Current Status of TheCurrent Status of The
ProjectProject
• Transport layer metrics can beTransport layer metrics can be
captured using RTP packets and RTCPcaptured using RTP packets and RTCP
reports.reports.
• The metrics include:The metrics include:
Packet loss – From RTP packetsPacket loss – From RTP packets
Jitter – From RTP packetsJitter – From RTP packets
Round-trip-delay – RTCP-SR/RR reportsRound-trip-delay – RTCP-SR/RR reports
8. Wireless Access Research Group, University of Limerick
Current Status of TheCurrent Status of The
ProjectProject
• A perceptual model based on Perceptual LinearA perceptual model based on Perceptual Linear
Prediction (and MFCC) has been ported toPrediction (and MFCC) has been ported to
IXP2400 XScale processor.IXP2400 XScale processor.
• SOM_PAK has been ported to IXP2400 XScaleSOM_PAK has been ported to IXP2400 XScale
processor.processor.
• MicroEngine code for buffering of packets onMicroEngine code for buffering of packets on
SRAM has been done.SRAM has been done.
• The overall model design is based on a singleThe overall model design is based on a single
VoIP call.VoIP call.
9. Wireless Access Research Group, University of Limerick
Future WorkFuture Work
• Integration of Speech layer model withIntegration of Speech layer model with
transport layer model.transport layer model.
• Testing under various packet delay andTesting under various packet delay and
loss scenarios.loss scenarios.
• Evaluation of Model for low bit-rateEvaluation of Model for low bit-rate
codecs.codecs.
• Scalability testing for multiple VoIPScalability testing for multiple VoIP
calls.calls.
10. Wireless Access Research Group, University of Limerick
Theoretical AspectsTheoretical Aspects
• Packet Loss and Jitter Evaluation.Packet Loss and Jitter Evaluation.
• Effect of Packet Loss Distribution.Effect of Packet Loss Distribution.
• Unordered and Missing Packets.Unordered and Missing Packets.
• Computational Lag.Computational Lag.
• Methodology.Methodology.
• Perceptual Evaluation of Low Bit-Rate Vocoders.Perceptual Evaluation of Low Bit-Rate Vocoders.
• Self Organizing Maps.Self Organizing Maps.
• Hidden Markov Models.Hidden Markov Models.
11. Wireless Access Research Group, University of Limerick
Packet Loss and JitterPacket Loss and Jitter
EvaluationEvaluation
• Performance on mid-network points.Performance on mid-network points.
IXP2400
NPU
RTCP-SR and RTCP-RR
packets used to compute
round-trip delay.
ENDPOINT-A ENDPOINT-B
RTP PACKETS USED TO
COMPUTE THE VALUES OF
JITTER AND PACKET LOSS
12. Wireless Access Research Group, University of Limerick
Packet Loss and JitterPacket Loss and Jitter
EvaluationEvaluation
RouterComputer ComputerRouter Router
Router
Router
13. Wireless Access Research Group, University of Limerick
Packet Loss and JitterPacket Loss and Jitter
EvaluationEvaluation
• ReasonsReasons
Routing Table updates.Routing Table updates.
Traffic Engineering.Traffic Engineering.
14. Wireless Access Research Group, University of Limerick
Packet Loss and JitterPacket Loss and Jitter
EvaluationEvaluation
• To Capture Packet loss and jitter from RTCP-SR/RRTo Capture Packet loss and jitter from RTCP-SR/RR
packets.packets.
• Other Advantages.Other Advantages.
RTCP-SR/RR report fraction of packets lost over a certainRTCP-SR/RR report fraction of packets lost over a certain
interval of time.interval of time.
This provides the mean loss rate for a call in the currentThis provides the mean loss rate for a call in the current
time frame as opposed to overall loss rate.time frame as opposed to overall loss rate.
Some computation is offloaded from the IXP2400.Some computation is offloaded from the IXP2400.
End-to-end transport layer metrics as opposed to end-toEnd-to-end transport layer metrics as opposed to end-to
mid network point metrics.mid network point metrics.
15. Wireless Access Research Group, University of Limerick
Effect of Packet LossEffect of Packet Loss
DistributionDistribution
• Most models assess the impact ofMost models assess the impact of
packet loss on speech quality in termspacket loss on speech quality in terms
of mean loss rate.of mean loss rate.
• Packet loss is bursty in nature.Packet loss is bursty in nature.
• Packet loss location has a variable effectPacket loss location has a variable effect
on the quality of speech. {H.on the quality of speech. {H.
Schulzrinne}.Schulzrinne}.
• The impact of packet loss distributionThe impact of packet loss distribution
should be used as a QoS metric.should be used as a QoS metric.
16. Wireless Access Research Group, University of Limerick
Unordered and MissingUnordered and Missing
PacketsPackets
• Packets arrive out of order.Packets arrive out of order.
• Some packets are lost and some takeSome packets are lost and some take
alternative paths.alternative paths.
• These factors can have adverseThese factors can have adverse
effects when acoustic back-end is aeffects when acoustic back-end is a
HMM (for instance).HMM (for instance).
17. Wireless Access Research Group, University of Limerick
Computational LagComputational Lag
T0
TN
Speech Layer Processing
Transport Layer Processing
• Perceptual Model reports the results of the pastPerceptual Model reports the results of the past
samples.samples.
• The computational lag between the speechThe computational lag between the speech
layer model and the perceptual modellayer model and the perceptual model
increases as the time progresses.increases as the time progresses.
• Some samples have to be skipped to overcomeSome samples have to be skipped to overcome
this lag.this lag.
18. Wireless Access Research Group, University of Limerick
MethodologyMethodology
• Transport Layer ModelTransport Layer Model
Jitter, Loss, Delay.Jitter, Loss, Delay.
• Speech layer ModelSpeech layer Model
Perceptual Model.Perceptual Model.
Perceptual Linear Prediction.Perceptual Linear Prediction.
Mel Frequency Cepstral Coefficients.Mel Frequency Cepstral Coefficients.
Bark Spectral Distortion.Bark Spectral Distortion.
Code-book of Clean Speech Feature VectorsCode-book of Clean Speech Feature Vectors
Self-organizing Maps – Vector Quantization.Self-organizing Maps – Vector Quantization.
Hidden Markov Models – Probabilistic.Hidden Markov Models – Probabilistic.
19. Wireless Access Research Group, University of Limerick
MethodologyMethodology
SRAM
Optional host
CPU, PCI
bus devices
External
Media
Device(s)
Scratchpad
Memory
PCI
Controller
Media Switch
Fabric
Interface
CAP
Hash Unit
SRAM
Controller 1
SRAM
Controller 0
DRAM
COntroller 0
DRAM
IXP2400
PCI (64 bit, 33/66 MHz)
SP14, CSIX QDR DDR
Packet Receive/
Transmit MEs
Packet Processing
MEs
SHaC
These MEs Receive
the packets from the
MSF interface and
forward them to
DRAM controller on
reception. And do the
opposite for
transmission
Parse various header
fields of VoIP
packets and Calculte
packet based Qos
Metrics and place the
results on SRAM.
They buffer the
speech frames on
SRAM on addresses
known to perceptual
model.
Intel XScale Core
The perceptual model
calculates distortions due to
encoding and bit-errors and
places the result on the
SRAM.
This module calculates the
objective score from all the
values accumulated on
SRAM
ObjectiveScore = S(s,c,e)
20. Wireless Access Research Group, University of Limerick
MethodologyMethodology
• At a given time a number ofAt a given time a number of
(contiguous) packets are buffered to(contiguous) packets are buffered to
be input to the perceptual model.be input to the perceptual model.
• Statistical Analysis.Statistical Analysis.
21. Wireless Access Research Group, University of Limerick
MethodologyMethodology
• Optimum number of packets to be buffered?Optimum number of packets to be buffered?
• Optimum buffering interval?Optimum buffering interval?
• The overall speech quality is a function of bothThe overall speech quality is a function of both
auditory distance and transport layer distortions.auditory distance and transport layer distortions.
22. Wireless Access Research Group, University of Limerick
MethodologyMethodology
• Assessment of Model for one VoIP callAssessment of Model for one VoIP call
scenario.scenario.
• G.711 is the preferred codecG.711 is the preferred codec
• Simulate Packet loss rate, packet lossSimulate Packet loss rate, packet loss
distribution, delay and jitter (Fine Tuning).distribution, delay and jitter (Fine Tuning).
• Analysis of low-bit rate codecs.Analysis of low-bit rate codecs.
• Scale the model for multiple VoIP calls.Scale the model for multiple VoIP calls.
• IXP2400 NPU is the target hardware platform.IXP2400 NPU is the target hardware platform.
23. Wireless Access Research Group, University of Limerick
Perceptual Evaluation of LowPerceptual Evaluation of Low
Bit-Rate Vocoders.Bit-Rate Vocoders.
• Real time speech quality estimation for low bitReal time speech quality estimation for low bit
rate codecs (G.729, G.723.1) without decodingrate codecs (G.729, G.723.1) without decoding
the frames.the frames.
• {Carmen Peláez-Moreno, Ascensión Gallardo-
Antolín, and Fernando} perform speech
recognition by only extracting the LP coefficients.
26. Wireless Access Research Group, University of Limerick
SOMSOM
• What is the average quantization error (QE)?What is the average quantization error (QE)?
• Auditory Distance = Distortion + QE.Auditory Distance = Distortion + QE.
• How to deal with QE?How to deal with QE?
27. Wireless Access Research Group, University of Limerick
SOM – Quantization ErrorSOM – Quantization Error
• SOM Discretizes data.SOM Discretizes data.
28. Wireless Access Research Group, University of Limerick
SOM – Data DistributionSOM – Data Distribution
Timo
Kostiainen
29. Wireless Access Research Group, University of Limerick
Growing Hierarchical SOMGrowing Hierarchical SOM
Layer 0
Layer 2
Layer 1
30. Wireless Access Research Group, University of Limerick
GHSOM - AdvantagesGHSOM - Advantages
• A desired level of granularity in discriminatingA desired level of granularity in discriminating
input data is achievable.input data is achievable.
• Horizontal Expansion.Horizontal Expansion.
• Vertical Expansion.Vertical Expansion.
• As the SOM is hierarchical, the searching timeAs the SOM is hierarchical, the searching time
is reduced.is reduced.
• What if a distorted signal of class A has lowerWhat if a distorted signal of class A has lower
AD with class B?AD with class B?
0.i imqe mqe
0.m mMQE mqe
31. Wireless Access Research Group, University of Limerick
Hidden Markov ModelsHidden Markov Models
• Auditory scores based on logically connectedAuditory scores based on logically connected
sequence of feature vectors.sequence of feature vectors.
• λλ = (A, B,= (A, B, ))
• A – transition probability matrix from oneA – transition probability matrix from one
phonemic class to the next.phonemic class to the next.
• B – Emission probability of a phonemic vector.B – Emission probability of a phonemic vector.
- Initial State Probability.- Initial State Probability.
• Parameters are learnt during training.Parameters are learnt during training.
32. Wireless Access Research Group, University of Limerick
Hidden Markov ModelsHidden Markov Models
• A suitably trained HMM can beA suitably trained HMM can be
used to find auditory distance.used to find auditory distance.
• Continuous HMM.Continuous HMM.
• Reliable Results.Reliable Results.
33. Wireless Access Research Group, University of Limerick
Evaluation PlatformsEvaluation Platforms
• Cell Broad Band Engine ProcessorCell Broad Band Engine Processor
Architecture.Architecture.
• Programming the Cell.Programming the Cell.
• Some ConcernsSome Concerns
34. Wireless Access Research Group, University of Limerick
Cell Broadband ProcessorCell Broadband Processor
35. Wireless Access Research Group, University of Limerick
Cell BE Processor ……Cell BE Processor ……
Sr No Feature Qty
1 Power Processing Element (PPEs) 1
2 Synergistic Processing Elements (SPEs) 8
3 Element Interconnect Bus (EIB) 1
4 Direct Memory Access Controller (DMAC) 1
5 Rambus XDR memory controllers 2
6 Rambus File IO interface
7 PCI Express x 4
7 256 GFLOPS (Single precision at 4 GHz).
8 25 GFLOPS (Double precision at 4 GHz).
36. Wireless Access Research Group, University of Limerick
Mercury Computer SystemsMercury Computer Systems
Cell Technology Evaluation
System (CTES)
37. Wireless Access Research Group, University of Limerick
Programming the CellProgramming the Cell
• The primary language is C, C++ is also supportedThe primary language is C, C++ is also supported
to some exteent.to some exteent.
• Programming ModelsProgramming Models
Job Queue – PPE schedules the jobs for SPEs.Job Queue – PPE schedules the jobs for SPEs.
Self-multitasking of SPEs – kernel and scheduling isSelf-multitasking of SPEs – kernel and scheduling is
distributed across SPEs.distributed across SPEs.
Stream Processing - The SPEs use shared memory for allStream Processing - The SPEs use shared memory for all
tasks.tasks.
• Development PlatformsDevelopment Platforms
Cell BE Engine SDK (alpha version) {IBM} – Full systemCell BE Engine SDK (alpha version) {IBM} – Full system
simulator.simulator.
Yellow Dog Linux {Mercury Computer Systems}.Yellow Dog Linux {Mercury Computer Systems}.
38. Wireless Access Research Group, University of Limerick
Some ConcernsSome Concerns
• Software design is key to effective performance of Cell.Software design is key to effective performance of Cell.
• Multithread execution – key to effective execution.Multithread execution – key to effective execution.
• The code has to be vectorisable and parrallisable.The code has to be vectorisable and parrallisable.
• To port the code to SPEs it has to be partitioned from rest ofTo port the code to SPEs it has to be partitioned from rest of
the code so that it is fully self-contained.the code so that it is fully self-contained.
• Hardware abstraction.Hardware abstraction.
• Learning Curve Effect.Learning Curve Effect.
Support from IBM.Support from IBM.
Credibility of SDK/APIs.Credibility of SDK/APIs.
Comments from Peter Seebach.Comments from Peter Seebach.
• CostCost
39. Wireless Access Research Group, University of Limerick
AlternativesAlternatives
• XScale.XScale.
• Offloading of compute intensive tasksOffloading of compute intensive tasks
to another processor using gigabit port.to another processor using gigabit port.
• PCI with Pentium 4.PCI with Pentium 4.
• PCI with a suitable graphics card.PCI with a suitable graphics card.
40. Wireless Access Research Group, University of Limerick
Gigabit Alternative …Gigabit Alternative …
IP NETWORK
IP NETWORK
IXP2400
NPU
Workstation
41. Wireless Access Research Group, University of Limerick
ConclusionsConclusions
• Preliminary work of the model is complete.Preliminary work of the model is complete.
• Packet loss distribution.Packet loss distribution.
• Evaluation of low bit rate codecs.Evaluation of low bit rate codecs.
• Evaluation platform.Evaluation platform.
• Overall Research GoalsOverall Research Goals
Real-time non-intrusive VoIP QualityReal-time non-intrusive VoIP Quality
assessment model.assessment model.
Perceptual Distortion Measures.Perceptual Distortion Measures.
Model Training.Model Training.
42. Wireless Access Research Group, University of Limerick
Thank you for Your TimeThank you for Your Time