This document summarizes various switching and multicast schemes used in asynchronous transfer mode (ATM) networks. It discusses shared memory ATM switching architectures and different approaches for supporting multicast traffic in shared memory switches including replication-at-receiving, replication-at-sending, multiple write multiple read, and single write single read schemes. It also covers requirements for ATM multicast and compares these schemes in terms of advantages and disadvantages related to memory usage and switching performance.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document analyzes the effects of carrier frequency offset (CFO) and fading branch correlation (FBC) on the performance of an asynchronous multi-carrier coded-division multiple-access (MC-CDMA) system. It establishes models for an MC-CDMA system with transmitter and receiver, and examines how CFO and FBC impact the bit error rate (BER) performance. Equations are derived relating CFO and FBC, and simulation results are presented showing which parameter, CFO or FBC, has a greater influence on system performance.
ABSTRACT : Performance enhancement of smart antennas versus their complexity for commercial wireless
applications. The goal of the study presented in this paper is to investigate the performance improvement
attainable using relatively simple smart antenna techniques when applied to the third-generation W-CDMA air
interface. Methods to achieve this goal include fixed multi beam architectures with different beam selection
algorithms (maximum power criterion, combined beams) or adaptive solutions driven by relatively simple direction
finding algorithms. After comparing these methods against each other for several representative scenarios, some
issues related to the sensitivity of these methods are also studied, (e.g., robustness to environment, mismatches
originating from implementation limitations, etc.). Results indicate that overall, conventional beam forming
seems to be the best choice in terms of balancing the performance and complexity requirements, in particular
when the problem with interfering high-bit-rate W-CDMA 3g users is considered.
Combining SFBC_OFDM Systems with SVD Assisted Multiuser Transmitter and Multi...IOSR Journals
Abstract: In this work, we exploit the SVD assisted multiuser transmitter (MUT) and multiuser detector (MUD) technique, using downlink (DL) preprocessing transmitter and DL postprocessing receiver matrice .In combination with space frequency block coding (SFBC). And also propose the precoded DL transmission scheme, were the both proposed schemes take advantage of the channel state information (CSI) of all users at the base station (BS), but only of the mobile station (MS)’s own CSI, to decompose the MU MIMO channels into parallel single input single output (SISO), these two proposed schemes are compared to the vertical layered space time (V_BLAST) combined with SFBC (SFBC_VBLAST). Our Simulation results show that the performance of the proposed scheme with DL Zero Forcing (ZF) transmitter for interference canceller outperforms the SFBC_VBLAST and the precoded DL schemes with ZF receiver in frequency selective fading channels. Keywords – Post processing, Preprocessing,, SFBC, SVD, ZF.
PERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNELIJCSES Journal
Multi Carrier Code Division Multiple Access (MC-CDMA) is a well known technique for high speed
wireless data transmission .Two advanced technology was included in the MC-CDMA structure, such as
orthogonal frequency division multiplex (OFDM) and the code division multiple access (CDMA),so that it
benefits from the robustness of OFDM against multipath environment and from the capability of multiuser
multiplexing services that is achieved via (CDMA) system. MC-CDMA is a multicarrier spread spectrum
system which is classified as the candidate scheme for future mobile radio systems. In this paper MCCDMA
system, with Rayleigh fading channel and 16QAM array modulation, was simulated to investigate
the effects of different parameters on the system performance, such as processing gain; number of paths;
number of users; interleaving; and coding ratio.MC-CDMA performances can be considerably improved
by proper selection of these parameters. As expected, results show that MC-CDMA has a better performance over CDMA system.
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration schemeIOSR Journals
Abstract: The AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme proposed three methods for data transmiting from master to slave for on chip communication. Multilayer advanced high-performance bus (ML-AHB) busmatrix employs slave-side arbitration. Slave-side arbitration is different from master-side arbitration in terms of request and grant signals since, in the former, the master merely starts a burst transaction and waits for the slave response to proceed to the next transfer. Therefore, in the former, the unit of arbitration can be a transaction or a transfer. However, the ML-AHB busmatrix of ARM offers only transfer-based fixed-pri-ority and round-robin arbitration schemes. In this paper, we propose the design and implementation of a flexible arbiter for the ML-AHB busmatrix to support three priority policies fixed priority, round robin, and dynamic priority and three data multiplexing modes transfer, transaction, and desired transfer length. In total, there are nine possible arbitration schemes. The proposed arbiter, which is self-motivated (SM), selects one of the nine possible arbitration schemes based upon the priority-level notifications and the desired transfer length from the masters so that arbitration leads to the maximum performance. Experimental results show that, although the area overhead of the proposed SM arbitration scheme is 9%–25% larger than those of the other arbitration schemes, our arbiter improves the throughput by 14%–62% compared to other schemes.
This document discusses various technical aspects of GSM radio frequency (RF) including:
1. The three main services offered by GSM - teleservices, bearer services, and supplementary services.
2. Spectrum allocation for GSM-900 and DCS-1800 networks.
3. Concepts like ciphering, authentication, equalization, and interleaving which are used to secure communications and address issues like signal distortion over the air interface.
4. Channel coding and speech coding techniques used to compress voice data and add error correction for transmission.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document analyzes the effects of carrier frequency offset (CFO) and fading branch correlation (FBC) on the performance of an asynchronous multi-carrier coded-division multiple-access (MC-CDMA) system. It establishes models for an MC-CDMA system with transmitter and receiver, and examines how CFO and FBC impact the bit error rate (BER) performance. Equations are derived relating CFO and FBC, and simulation results are presented showing which parameter, CFO or FBC, has a greater influence on system performance.
ABSTRACT : Performance enhancement of smart antennas versus their complexity for commercial wireless
applications. The goal of the study presented in this paper is to investigate the performance improvement
attainable using relatively simple smart antenna techniques when applied to the third-generation W-CDMA air
interface. Methods to achieve this goal include fixed multi beam architectures with different beam selection
algorithms (maximum power criterion, combined beams) or adaptive solutions driven by relatively simple direction
finding algorithms. After comparing these methods against each other for several representative scenarios, some
issues related to the sensitivity of these methods are also studied, (e.g., robustness to environment, mismatches
originating from implementation limitations, etc.). Results indicate that overall, conventional beam forming
seems to be the best choice in terms of balancing the performance and complexity requirements, in particular
when the problem with interfering high-bit-rate W-CDMA 3g users is considered.
Combining SFBC_OFDM Systems with SVD Assisted Multiuser Transmitter and Multi...IOSR Journals
Abstract: In this work, we exploit the SVD assisted multiuser transmitter (MUT) and multiuser detector (MUD) technique, using downlink (DL) preprocessing transmitter and DL postprocessing receiver matrice .In combination with space frequency block coding (SFBC). And also propose the precoded DL transmission scheme, were the both proposed schemes take advantage of the channel state information (CSI) of all users at the base station (BS), but only of the mobile station (MS)’s own CSI, to decompose the MU MIMO channels into parallel single input single output (SISO), these two proposed schemes are compared to the vertical layered space time (V_BLAST) combined with SFBC (SFBC_VBLAST). Our Simulation results show that the performance of the proposed scheme with DL Zero Forcing (ZF) transmitter for interference canceller outperforms the SFBC_VBLAST and the precoded DL schemes with ZF receiver in frequency selective fading channels. Keywords – Post processing, Preprocessing,, SFBC, SVD, ZF.
PERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNELIJCSES Journal
Multi Carrier Code Division Multiple Access (MC-CDMA) is a well known technique for high speed
wireless data transmission .Two advanced technology was included in the MC-CDMA structure, such as
orthogonal frequency division multiplex (OFDM) and the code division multiple access (CDMA),so that it
benefits from the robustness of OFDM against multipath environment and from the capability of multiuser
multiplexing services that is achieved via (CDMA) system. MC-CDMA is a multicarrier spread spectrum
system which is classified as the candidate scheme for future mobile radio systems. In this paper MCCDMA
system, with Rayleigh fading channel and 16QAM array modulation, was simulated to investigate
the effects of different parameters on the system performance, such as processing gain; number of paths;
number of users; interleaving; and coding ratio.MC-CDMA performances can be considerably improved
by proper selection of these parameters. As expected, results show that MC-CDMA has a better performance over CDMA system.
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration schemeIOSR Journals
Abstract: The AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme proposed three methods for data transmiting from master to slave for on chip communication. Multilayer advanced high-performance bus (ML-AHB) busmatrix employs slave-side arbitration. Slave-side arbitration is different from master-side arbitration in terms of request and grant signals since, in the former, the master merely starts a burst transaction and waits for the slave response to proceed to the next transfer. Therefore, in the former, the unit of arbitration can be a transaction or a transfer. However, the ML-AHB busmatrix of ARM offers only transfer-based fixed-pri-ority and round-robin arbitration schemes. In this paper, we propose the design and implementation of a flexible arbiter for the ML-AHB busmatrix to support three priority policies fixed priority, round robin, and dynamic priority and three data multiplexing modes transfer, transaction, and desired transfer length. In total, there are nine possible arbitration schemes. The proposed arbiter, which is self-motivated (SM), selects one of the nine possible arbitration schemes based upon the priority-level notifications and the desired transfer length from the masters so that arbitration leads to the maximum performance. Experimental results show that, although the area overhead of the proposed SM arbitration scheme is 9%–25% larger than those of the other arbitration schemes, our arbiter improves the throughput by 14%–62% compared to other schemes.
This document discusses various technical aspects of GSM radio frequency (RF) including:
1. The three main services offered by GSM - teleservices, bearer services, and supplementary services.
2. Spectrum allocation for GSM-900 and DCS-1800 networks.
3. Concepts like ciphering, authentication, equalization, and interleaving which are used to secure communications and address issues like signal distortion over the air interface.
4. Channel coding and speech coding techniques used to compress voice data and add error correction for transmission.
This document analyzes carrier frequency offset estimation techniques for MC-DS-CDMA uplink systems using zero-IF receivers. It proposes using zero correlation zone spreading sequences to exploit frequency and temporal diversity. Simulation results show that the variance of carrier frequency offset estimators is lower for MC-DS-CDMA compared to OFDM systems. The document also compares MC-DS-CDMA and MC-CDMA, discussing their differences in spreading, spectral efficiency, peak-to-average power ratio, and applications. Tables and figures are included to analyze the performance of carrier frequency offset estimation and compare theoretical and simulated variances.
The document provides an overview of GSM RF interview questions and answers. It covers topics such as the three services offered by GSM (teleservices, bearer services, and supplementary services), spectrum allocation for GSM-900 and DCS-1800, carrier frequencies and separation, ciphering and authentication algorithms, equalization, interleaving, speech coding, channel coding, frequency reuse, cell splitting, interfaces (Um, Abis, A), LAPD and LAPDm, WPS, MA, MAIO, frequency hopping types, DTX, DRX, gross data rate, Erlangs and grade of service, coverage differences between GSM900 and DCS1800, time advance, location area and location update
This document contains interview questions and answers related to GSM RF technology. Some key points covered include:
- The three main services offered by GSM are teleservices, bearer services, and supplementary services. Bearer services provide the underlying network capacity for transmission, while supplementary services are optional features like call forwarding.
- Questions cover topics like the spectrum allocation for GSM900 and DCS1800, the number of carrier frequencies and their separation, ciphering and authentication algorithms, equalization techniques, interleaving, and speech coding in GSM.
- Other concepts discussed include frequency reuse, cell splitting, interfaces like Um, Abis and A, protocols like LAPDm, features like WPS, MA
CEPT began developing the Global System for Mobile (GSM) network in 1982 with the objectives of pan-European roaming and compatibility with ISDN. The first commercial GSM system was implemented in Germany in 1992. GSM consists of mobile stations, base station subsystems, a network and switching subsystem, and an operation subsystem. It uses TDMA to allow multiple users to access the same radio frequency channel simultaneously. GSM has undergone 35 revisions to accommodate unexpected rapid growth in cellular services.
Mac protocols for ad hoc wireless networks Divya Tiwari
The document discusses MAC protocols for ad hoc wireless networks. It addresses key issues in designing MAC protocols including limited bandwidth, quality of service support, synchronization, hidden and exposed terminal problems, error-prone shared channels, distributed coordination without centralized control, and node mobility. Common MAC protocol classifications and examples are also presented, such as contention-based protocols, sender-initiated versus receiver-initiated protocols, and protocols using techniques like reservation, scheduling, and directional antennas.
This document discusses different medium access control (MAC) protocols for wireless networks. It describes the problems with using carrier sense multiple access with collision detection (CSMA/CD) in wireless networks due to signal strength decreasing with distance and hidden and exposed terminal problems. It then discusses various MAC protocols to address these issues, including space division multiple access (SDMA), frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA). It provides details on how FDMA, TDMA, and CDMA work to allow multiple access to the wireless medium.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Asynchronous Transfer Mode (ATM) is a protocol developed for broadband ISDN that supports high data transmission rates. It uses fixed-size cells called ATM cells that are 53 bytes long, with 5 bytes for header and 48 bytes for payload. ATM cells allow data to be organized into logical connections identified by Virtual Channel Identifier and Virtual Path Identifier values. These logical connections support quality of service guarantees and efficient transmission of data, making ATM well-suited for real-time multimedia applications.
The document discusses ad hoc and sensor networks. It provides sample questions and answers related to various topics in this area. Some key points covered include:
- Characteristics of wireless channels include path loss, fading, interference, Doppler shift, and transmission rate constraints.
- Shannon's theorem states the maximum possible data rate on a noisy channel as a function of bandwidth and signal-to-noise ratio.
- An ad hoc network is a decentralized type of wireless network without any fixed infrastructure. It is suitable for situations where a wired network cannot be setup.
- Challenging issues in ad hoc network maintenance include medium access, routing, multicasting, transport layer protocols, pricing schemes, and quality of service
The document discusses different medium access control (MAC) schemes for wireless networks. It describes some key challenges with applying carrier sense multiple access with collision detection (CSMA/CD) to wireless networks due to signal strength degradation over distance and hidden and exposed terminal problems. It then covers space division multiple access (SDMA), frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA) schemes and discusses their applications to wireless multiple access and duplexing. Specific TDMA schemes like fixed and dynamic TDMA as well as Aloha and slotted Aloha are also summarized.
This document discusses multiple access techniques in wireless communication. It describes several techniques including Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), and Space Division Multiple Access (SDMA). It also covers packet radio access methods like ALOHA, slotted ALOHA, and Carrier Sense Multiple Access (CSMA). Each technique allows multiple users to share wireless spectrum resources simultaneously through dividing access in frequency, time, code, or space.
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
The document discusses various medium access control (MAC) protocols for wireless networks. It describes challenges with applying carrier sense multiple access with collision detection (CSMA/CD) to wireless networks due to problems like hidden and exposed terminals. It then covers different MAC schemes like space division multiple access (SDMA), frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA) that aim to address these challenges. Specific protocols discussed in more detail include Aloha, slotted Aloha, and how TDMA can be used for fixed or dynamic channel allocation.
Wireless Application Protocol (WAP) allows devices to access the Internet over wireless networks. There are three main categories of protocols for managing shared access to wireless networks: fixed assignment, demand assignment, and random assignment. Fixed assignment divides resources like frequency bands or time slots and allocates them exclusively. Demand assignment allocates resources only to nodes that need them. Random assignment does not preallocate resources and relies on collision detection and retransmission to manage shared access. Common protocols that fall under these categories include FDMA, TDMA, CDMA, ALOHA, and CSMA.
ATM is a packet-oriented transfer mode. It allows multiple logical connections to be multiplexed over a single physical interface. The information flow on each logical connection is organized into fixed-size packets, called cells. As with frame relay, there is no link-by-link error control or flow control.
This document summarizes key aspects of second-generation digital wireless systems including TDMA-based IS-136 and GSM as well as CDMA-based IS-95. It describes the basic infrastructure components including base stations, mobile switching centers, home and visitor location registers. It also provides overviews of channel structures and framing in GSM, IS-136 and IS-95 including descriptions of broadcast, traffic and control channels. Mobile registration, authentication and handoff procedures are also summarized.
The document discusses the history and development of the London Underground rail system. It describes how Charles Pearson envisioned a system of trains running through spacious, well-lit tunnels to connect the main railroad terminals in London. While an earlier plan involved gaslit streets underground for horse-drawn carriages, it was rejected due to safety concerns. Pearson's vision eventually led to the successful implementation of the London Underground railway system.
Time division multiplexing (TDM) is a technique used in telecommunications to transmit multiple signals over a shared medium. It involves dividing a signal into multiple time slots and assigning each slot to a different signal. TDM was initially developed for telegraphy in 1870 and is now widely used. It is used in digital networks like TDM telephone networks and synchronous digital hierarchy (SDH) networks to efficiently allocate bandwidth to multiple signals or data streams. Common examples of TDM include digitally transmitting multiple telephone calls over the same cable or interleaving left and right stereo signals in an audio file.
This document provides an overview of Asynchronous Transfer Mode (ATM) networking. It begins by stating the objectives of explaining ATM and then provides background on ATM, noting that it transfers information in small, fixed-size cells. It describes the benefits of ATM, including dynamic bandwidth allocation and support for multimedia traffic. It then explains the basic components of an ATM network, including switches and endpoints, and describes the ATM cell format and header fields. Finally, it introduces the concept of virtual connections in ATM networks.
This document is a report on Asynchronous Transfer Mode (ATM) switching that was written by Abid Afsar for an assignment. The 3-page report discusses several key topics in ATM switching including: ATM switch architecture types such as single bus, multiple bus, and self-routing [1]; functional components like input/output modules and switch fabrics [2]; and operations including routing, buffering, and connection admission control [3]. The report provides an overview of ATM switching technology.
Asynchronous Transfer Mode (ATM) is a cell-based switching and multiplexing technology that was designed in the early 1990s to expedite the transmission of voice, video, and data over digital networks. ATM uses fixed-length cells of 53 bytes to carry traffic. It establishes virtual connections between endpoints to guarantee quality of service. ATM works by segmenting data into fixed-size cells at the source, transporting cells through a switch network via virtual circuits, and reassembling them at the destination. It provides benefits like high performance, integration of multiple data types, and adaptability to different network speeds.
This document analyzes carrier frequency offset estimation techniques for MC-DS-CDMA uplink systems using zero-IF receivers. It proposes using zero correlation zone spreading sequences to exploit frequency and temporal diversity. Simulation results show that the variance of carrier frequency offset estimators is lower for MC-DS-CDMA compared to OFDM systems. The document also compares MC-DS-CDMA and MC-CDMA, discussing their differences in spreading, spectral efficiency, peak-to-average power ratio, and applications. Tables and figures are included to analyze the performance of carrier frequency offset estimation and compare theoretical and simulated variances.
The document provides an overview of GSM RF interview questions and answers. It covers topics such as the three services offered by GSM (teleservices, bearer services, and supplementary services), spectrum allocation for GSM-900 and DCS-1800, carrier frequencies and separation, ciphering and authentication algorithms, equalization, interleaving, speech coding, channel coding, frequency reuse, cell splitting, interfaces (Um, Abis, A), LAPD and LAPDm, WPS, MA, MAIO, frequency hopping types, DTX, DRX, gross data rate, Erlangs and grade of service, coverage differences between GSM900 and DCS1800, time advance, location area and location update
This document contains interview questions and answers related to GSM RF technology. Some key points covered include:
- The three main services offered by GSM are teleservices, bearer services, and supplementary services. Bearer services provide the underlying network capacity for transmission, while supplementary services are optional features like call forwarding.
- Questions cover topics like the spectrum allocation for GSM900 and DCS1800, the number of carrier frequencies and their separation, ciphering and authentication algorithms, equalization techniques, interleaving, and speech coding in GSM.
- Other concepts discussed include frequency reuse, cell splitting, interfaces like Um, Abis and A, protocols like LAPDm, features like WPS, MA
CEPT began developing the Global System for Mobile (GSM) network in 1982 with the objectives of pan-European roaming and compatibility with ISDN. The first commercial GSM system was implemented in Germany in 1992. GSM consists of mobile stations, base station subsystems, a network and switching subsystem, and an operation subsystem. It uses TDMA to allow multiple users to access the same radio frequency channel simultaneously. GSM has undergone 35 revisions to accommodate unexpected rapid growth in cellular services.
Mac protocols for ad hoc wireless networks Divya Tiwari
The document discusses MAC protocols for ad hoc wireless networks. It addresses key issues in designing MAC protocols including limited bandwidth, quality of service support, synchronization, hidden and exposed terminal problems, error-prone shared channels, distributed coordination without centralized control, and node mobility. Common MAC protocol classifications and examples are also presented, such as contention-based protocols, sender-initiated versus receiver-initiated protocols, and protocols using techniques like reservation, scheduling, and directional antennas.
This document discusses different medium access control (MAC) protocols for wireless networks. It describes the problems with using carrier sense multiple access with collision detection (CSMA/CD) in wireless networks due to signal strength decreasing with distance and hidden and exposed terminal problems. It then discusses various MAC protocols to address these issues, including space division multiple access (SDMA), frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA). It provides details on how FDMA, TDMA, and CDMA work to allow multiple access to the wireless medium.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Asynchronous Transfer Mode (ATM) is a protocol developed for broadband ISDN that supports high data transmission rates. It uses fixed-size cells called ATM cells that are 53 bytes long, with 5 bytes for header and 48 bytes for payload. ATM cells allow data to be organized into logical connections identified by Virtual Channel Identifier and Virtual Path Identifier values. These logical connections support quality of service guarantees and efficient transmission of data, making ATM well-suited for real-time multimedia applications.
The document discusses ad hoc and sensor networks. It provides sample questions and answers related to various topics in this area. Some key points covered include:
- Characteristics of wireless channels include path loss, fading, interference, Doppler shift, and transmission rate constraints.
- Shannon's theorem states the maximum possible data rate on a noisy channel as a function of bandwidth and signal-to-noise ratio.
- An ad hoc network is a decentralized type of wireless network without any fixed infrastructure. It is suitable for situations where a wired network cannot be setup.
- Challenging issues in ad hoc network maintenance include medium access, routing, multicasting, transport layer protocols, pricing schemes, and quality of service
The document discusses different medium access control (MAC) schemes for wireless networks. It describes some key challenges with applying carrier sense multiple access with collision detection (CSMA/CD) to wireless networks due to signal strength degradation over distance and hidden and exposed terminal problems. It then covers space division multiple access (SDMA), frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA) schemes and discusses their applications to wireless multiple access and duplexing. Specific TDMA schemes like fixed and dynamic TDMA as well as Aloha and slotted Aloha are also summarized.
This document discusses multiple access techniques in wireless communication. It describes several techniques including Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), and Space Division Multiple Access (SDMA). It also covers packet radio access methods like ALOHA, slotted ALOHA, and Carrier Sense Multiple Access (CSMA). Each technique allows multiple users to share wireless spectrum resources simultaneously through dividing access in frequency, time, code, or space.
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
The document discusses various medium access control (MAC) protocols for wireless networks. It describes challenges with applying carrier sense multiple access with collision detection (CSMA/CD) to wireless networks due to problems like hidden and exposed terminals. It then covers different MAC schemes like space division multiple access (SDMA), frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA) that aim to address these challenges. Specific protocols discussed in more detail include Aloha, slotted Aloha, and how TDMA can be used for fixed or dynamic channel allocation.
Wireless Application Protocol (WAP) allows devices to access the Internet over wireless networks. There are three main categories of protocols for managing shared access to wireless networks: fixed assignment, demand assignment, and random assignment. Fixed assignment divides resources like frequency bands or time slots and allocates them exclusively. Demand assignment allocates resources only to nodes that need them. Random assignment does not preallocate resources and relies on collision detection and retransmission to manage shared access. Common protocols that fall under these categories include FDMA, TDMA, CDMA, ALOHA, and CSMA.
ATM is a packet-oriented transfer mode. It allows multiple logical connections to be multiplexed over a single physical interface. The information flow on each logical connection is organized into fixed-size packets, called cells. As with frame relay, there is no link-by-link error control or flow control.
This document summarizes key aspects of second-generation digital wireless systems including TDMA-based IS-136 and GSM as well as CDMA-based IS-95. It describes the basic infrastructure components including base stations, mobile switching centers, home and visitor location registers. It also provides overviews of channel structures and framing in GSM, IS-136 and IS-95 including descriptions of broadcast, traffic and control channels. Mobile registration, authentication and handoff procedures are also summarized.
The document discusses the history and development of the London Underground rail system. It describes how Charles Pearson envisioned a system of trains running through spacious, well-lit tunnels to connect the main railroad terminals in London. While an earlier plan involved gaslit streets underground for horse-drawn carriages, it was rejected due to safety concerns. Pearson's vision eventually led to the successful implementation of the London Underground railway system.
Time division multiplexing (TDM) is a technique used in telecommunications to transmit multiple signals over a shared medium. It involves dividing a signal into multiple time slots and assigning each slot to a different signal. TDM was initially developed for telegraphy in 1870 and is now widely used. It is used in digital networks like TDM telephone networks and synchronous digital hierarchy (SDH) networks to efficiently allocate bandwidth to multiple signals or data streams. Common examples of TDM include digitally transmitting multiple telephone calls over the same cable or interleaving left and right stereo signals in an audio file.
This document provides an overview of Asynchronous Transfer Mode (ATM) networking. It begins by stating the objectives of explaining ATM and then provides background on ATM, noting that it transfers information in small, fixed-size cells. It describes the benefits of ATM, including dynamic bandwidth allocation and support for multimedia traffic. It then explains the basic components of an ATM network, including switches and endpoints, and describes the ATM cell format and header fields. Finally, it introduces the concept of virtual connections in ATM networks.
This document is a report on Asynchronous Transfer Mode (ATM) switching that was written by Abid Afsar for an assignment. The 3-page report discusses several key topics in ATM switching including: ATM switch architecture types such as single bus, multiple bus, and self-routing [1]; functional components like input/output modules and switch fabrics [2]; and operations including routing, buffering, and connection admission control [3]. The report provides an overview of ATM switching technology.
Asynchronous Transfer Mode (ATM) is a cell-based switching and multiplexing technology that was designed in the early 1990s to expedite the transmission of voice, video, and data over digital networks. ATM uses fixed-length cells of 53 bytes to carry traffic. It establishes virtual connections between endpoints to guarantee quality of service. ATM works by segmenting data into fixed-size cells at the source, transporting cells through a switch network via virtual circuits, and reassembling them at the destination. It provides benefits like high performance, integration of multiple data types, and adaptability to different network speeds.
The document discusses the history and development of ATM networks. It explains that ATM networks emerged from standardization activities around Integrated Services Digital Networks (ISDN) in the 1970s. This was driven by the trend toward an all-digital telephone network and the need to support digital connectivity for end users as well as non-voice applications like data and video. The document then provides details on the ATM cell header format and its various fields that are used to identify connections and support different types of traffic and services.
ATM is a cell relay protocol designed to optimize fiber optic networks. It breaks data into fixed-size cells for uniform transmission. ATM aims to maximize bandwidth, interface existing systems, be inexpensive, support telecom hierarchies, ensure reliable delivery, and minimize software functions. Connections between endpoints are established through virtual paths and circuits identified by header fields. Cells contain a 5-byte header and 48-byte payload. Connections can be permanent or switched. ATM defines layers for applications, cell processing, and physical transmission. It supports various quality of service levels through parameters like cell error and loss rates.
This includes description about what is ATM, its definition, layers, applications, working procedure, format type, available data bit rates, necessity of ATM, benefits & difference between Internet & ATM Network.
Asynchronous Transfer Mode (ATM) is a cell-switching and multiplexing technology that uses fixed-length packets called cells to carry different types of traffic like voice, video, and data. ATM works by segmenting data into these fixed-size cells which are then transmitted through virtual connections set up across an ATM network and reassembled at their destination. It provides benefits like high performance, Quality of Service guarantees, and the ability to handle different traffic types.
Asynchronous transfer mode (atm) in computer networkMH Shihab
Asynchronous Transfer Mode (ATM) is a telecommunications standard that allows multiple data types like voice, video, and data to be transmitted over the same network. ATM breaks information into small, fixed-size cells and transmits them asynchronously. It is connection-oriented and supports services with different quality of service requirements. ATM cells are 53 bytes long, with a 5 byte header containing information like virtual path/channel identifiers and an 8-bit checksum, and 48 bytes of payload. ATM supports both constant and variable rate traffic through its connection-oriented virtual circuits.
Q1: What is the use of Asynchronous Transfer mode switching(ATM)?
ATM as a Backbone technology:
ATM Devices:
ATM network interface:
User to Network Interface (UNI):
Network to Node Interface (NNI):
ATM reference model:
ATM services:
ATM Virtual Connections:
ATM CLASS OF SERVICES:
ATM CONCEPTS SERIVES CATEGORIES:
Published in the year 2014, this paper explains how interoperability and decentralized automation system can be achived in electrical distribution grid using IEC61850. Network information from neighboring nodes can help field controllers make decisions faster and more accurately thereby making the distribution network self- healing and reliable.
Performance evaluation of bandwidth optimization algorithm (boa) in atm networkEditor Jacotech
domains: none of them are suitable, alone, for the wide range of traffic services expected in ATM-based networks. Therefore, some integration of these basic schemes should be considered. In this paper, we propose a new traffic control algorithm, called the Bandwidth optimization Algorithm (BOA). BOA is a multi-level control algorithm that attempts to optimally manage network resources and perform traffic control among a wide range of traffic services in ATM-based networks. The basic objective of BOA is to meet the quality of service requirements for different traffic sources, while making the best possible use of network bandwidth. In addition. BOA attempts to minimize network congestion in a preventive way.
This document is an assignment on Asynchronous Transfer Mode (ATM) submitted to Pranab Bandhu Nath. It provides an overview of ATM including that it is an efficient call relay technology that transmits all information in fixed size 53 byte packets called cells. It discusses why ATM networks were developed to support a range of service qualities at reasonable cost. The document also describes some applications of ATM like WANs, virtual private networks, and residential broadband, and outlines the basic working including virtual path and channel connections and the ATM layers of adaptation, physical, and ATM itself.
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
This document analyzes MAC protocols for cognitive radio wireless sensor networks (CR-WSNs). It begins with an introduction to cognitive radio and how combining it with wireless sensor networks can yield new networking capabilities. It then discusses various MAC protocol layers and focuses on the COGMAC protocol. COGMAC is a decentralized cognitive MAC protocol based on the multichannel preamble reservation scheme. The document outlines COGMAC's advantages over conventional MAC protocols and introduces an upgraded version called COGMAC+. COGMAC+ uses adaptive energy detection and random backoff schemes to improve performance. Finally, the document summarizes that cognitive radio can improve spectrum utilization and quality in sensor networks by exploiting multiple channel availability and overcoming issues from dense deployments.
Survey on energy efficiency in wireless sensor network using mac protocol wit...Editor Jacotech
Dynamic feature evaluation and concept evaluation is major challenging task in the field of data classification. The continuity of data induced a new feature during classification process, but the classification process is predefined task for assigning data into class. Data comes into multiple feature sub-set format into infinite length. The infinite length not decided the how many class are assigned. Support vector machine is well recognized method for data classification. For the process of support vector machine evaluation of new feature during classification is major problem. The problem of feature evaluation decreases the performance of Support Vector Machine (SVM). For the improvement of support vector machine, particle of swarm optimization technique is used. Particle of swarm optimization controls the dynamic feature evaluation process and decreases the possibility of confusion in selection of class and increase the classification ratio of support vector machine. Particle of swarm optimization work in two phases one used as dynamic population selection and another are used for optimization process of evolved new feature.
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsIOSR Journals
This document presents a proposed multi-channel distribution scheme for mobile ad hoc networks (MANETs) and evaluates it through simulation. The proposed scheme assigns channels to nodes based on their node IDs to avoid control overhead from time synchronization. While neighboring nodes on the same channel is possible, the probability is low given random node distribution. The proposed scheme is compared to a single-channel scheme in ns-2 simulations. Results show the proposed technique has better performance.
PERFORMANCE AND REKEYING ANALYSIS OF MULTICAST SECURITY IN LTEIJCNCJournal
This document analyzes the performance and rekeying of multicast security in LTE networks. It compares two security solutions for multimedia broadcast multicast services (MBMS) in LTE - Group Security Association (GSA) and Secure Multicast Overlay (SMO). It models parameters for different multicast services like TV channels, Twitter, and Facebook. It calculates the computational and storage costs for rekeying using logical key hierarchy (LKH) tree with and without dynamic rekeying, and for changing the tree degree or height. The goal is to assess the performance of GSA and SMO solutions and determine which is more appropriate based on different parameters and services.
This document summarizes adaptive resource allocation techniques for wireless MIMO-OFDMA systems used for multimedia multicasting. It discusses different multicast scheduling approaches, including single-rate and multi-rate transmissions. For single-rate, a fixed default rate, worst user's rate, or group average throughput can be used. For multi-rate, information can be split into multiple streams or subgroups can be formed based on channel quality. The document also provides an overview of the multicast resource allocation block in an OFDMA system, which determines subcarrier allocation and transmit power based on channel state information feedback to optimize throughput or power.
Improved SCTP Scheme To Overcome Congestion Losses Over ManetIJERA Editor
Transmission control conventions have been utilized for data transmission process. TCP has been pre-possessed
for information transmission over wired correspondence having diverse transfer speeds and message delays over
the system. TCP gives correspondence utilizing 3-handshake which sends RTS and ACK originate from server
end and information message has been transmitted over the data transmission gave. This does not give security
over flooding assault happened on the system. TCP gives correspondence between distinctive hubs of the wired
correspondence however when multi-spilling happens in a system TCP does not gives legitimate throughput of
the framework which is significant issue that happened in the past framework. In the proposed work, to beat this
issue SCTP and Improved SCTP transmission control convention has been executed for the framework
execution of the framework. SCTP gives 4-handshake correspondence in the message transmit and improved
SCTP gives the performance when the queue length comes to its full value then it divides the message to other
nodes because of which security element get expansions and this likewise gives correspondence administrations
over multi-spilling and multi-homing. Numerous sender and recipients can impart over wired system utilizing
different methodologies of correspondence through same routers, which debases in the TCP convention. In last
we assess parameters for execution assessment. Here, we composed and actualized our proving ground utilizing
Network Simulator (NS-2.35) to test the execution of both Routing conventions.
ATM is a cell switching and multiplexing technology designed to unify telecommunication network infrastructures. It uses fixed length cells to transport data and signaling information. ATM networks support connections with different quality of service (QoS) levels for various media like voice, video, and data. ATM allows for predictable delivery of real-time media through constant bit rate connections while also supporting bursty data traffic.
Similar to Switching and multicast schemes in asynchronous transfer mode networks (20)
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Editor Jacotech
Direct-sequence code-division multiple access (DS-CDMA) is
currently the subject of much research as it is a promising
multiple access capability for third and fourth generations
mobile communication systems. The synchronous DS-CDMA
system is well known for eliminating the effects of multiple
access interference (MAI) which limits the capacity and
degrades the BER performance of the system. In this paper,
we investigate the bit error rate (BER) performance of a
synchronous DS-CDMA system over a wideband mobile
radio channel. The BER performance is affected by the
difference in path length ΔL and the number of arriving
signals N. Furthermore, the effect of these parameters is
examined on the synchronous DS-CDMA system for different
users’ number as well as different processing gain Gp. In this
environment and under the above conditions the performances
of the BPSK (Binary Phase Shift Keying) and the QPSK
(Quadrature Phase Shift Keying) modulations are compared.
The promising simulation results showed the possibility of
applying this system to the wideband mobile radio channel.
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSISEditor Jacotech
With microblogging platforms such as Twitter generating
huge amounts of textual data every day, the possibilities of
knowledge discovery through Twitter data becomes
increasingly relevant. Similar to the public voting mechanism
on websites such as the Internet Movie Database (IMDb) that
aggregates movies ratings, Twitter content contains
reflections of public opinion about movies. This study aims to
explore the use of Twitter content as textual data for
predicting the movie rating. In this study, we extract number
of tweets and compiled to predict the rating scores of newly
released movies. Predictions were done with the algorithms,
exploring the tweet polarity. In addition, this study explores
the use of several different kinds of tweet classification
Algorithm and movie rating algorithm. Results show that
movie rating developed by our application is compared to
IMDB and Rotten Tomatoes.
Non integer order controller based robust performance analysis of a conical t...Editor Jacotech
The design of robust controller for any non linear process is a
challenging task because of the presence of various types of
uncertainties. In this paper, various design methods of robust
PID controller for the level control of conical tank are
discussed. Uncertainties are of different types, among that
structured uncertainty of 30% is introduced to the nominal
plant for analysing the robustness. As a first step, the control
of level is done by using conventional integer order controller
for both nominal and uncertain system. Then, the control is
done by means of Fractional Order Proportional Integral
Derivative (FOPID) controller for achieving robustness. With
the help of time series parameters, a comparison is made
between conventional PID and FOPID with respect to the
simulated output using MATLAB and also analyzed the
robustness.
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...Editor Jacotech
This document summarizes a research study that examined factors causing stress among female doctors working in public and private sector hospitals in India. The study aimed to identify whether there were associations between hospital sector (public or private) and 12 different stress measures among 300 female doctors. A survey was administered to collect data. Chi-square tests found statistically significant associations (p < 0.05) between hospital sector and 11 of the 12 stress measures, including stress due to workload, working conditions, physical exertion, emotional exhaustion, job security, organizational support, work-family conflict, family adjustment, task demands, patient expectations, and working hours. Only the association between sector and stress due to psychosomatic problems was not statistically significant. The results indicate
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
Watermarking technique be employ instance & for a second time for
validation and protection of digital data (images, video and audio
files, digital repositories and libraries, web publishing). It is helpful
to copyright protection and illegal copying of digital data like video
frames and making digital data more robust and imperceptible. With
the advent of internet, creation and delivery of digital data has grown
many fold. In that Scenario has to need a technique for transferring
digital data securely without changing their originality and
robustness. In this paper proposed a plan of latest watermarking
method which involves inserting and adding two or more digital data
or pictures in a single video frame for the principle of protection and
replicate the similar procedure for N no video frames for
authentication of entire digital video. After that digital video is
encrypted and decrypted by using motion vector bit-xor encryption
and decryption technique.
The Impact of Line Resistance on the Performance of Controllable Series Compe...Editor Jacotech
In recent years controllable FACTS devices are increasingly
integrated into the transmission system. FACTS devices that
provide series control such as Controllable Series Compensator
(CSC) has significant effect on the voltage stability of Electric
Power system. In this work impact of line resistance on the
performance of CSC in a single-load infinitive-bus (SLIB)
model is investigated. The proposed framework is applied to
SLIB model and obtained results demonstrates that line
resistance has considerable effect on voltage stability limits and
performance of CSC.
Security Strength Evaluation of Some Chaos Based Substitution-BoxesEditor Jacotech
Recently, handful amount of S-boxes, using the various
methods such as affine transformations, gray coding,
optimization, chaotic systems, etc, have been suggested. It is
prudent to use cryptographically strong S-boxes for the design
of powerful ciphers. In this paper, we sampled some widely
used 8×8 S-boxes which are recently synthesized and security
analysis and evaluation is executed to uncover the best
candidate(s). The performance analysis is exercised against
the crucial measures like nonlinearity, linear approximation
probability, algebraic immunity, algebraic complexity,
differential uniformity. These parameters are custom selected
because their scores decide the security strength against
cryptographic assaults like linear cryptanalysis, algebraic
attacks, and differential cryptanalysis. The anticipated
analysis in this work facilitates the cryptographers, designers,
researchers to choose suitable candidate decided over many
parameters and can be engaged in modern block encryption
systems that solely rely on 8×8 S-box. Moreover, the analysis
assists in articulating efficient S-boxes and to evaluate the
attacks resistivity of their S-boxes.
Traffic Detection System is an Android application that aims at determining the behavior of traffic in a particular location. It calculates the speed of the vehicle and the level of congestion or the amount of traffic is determined on the basis of the values of sensors. If any such obstruct found, then the driver is provided an option to send messages regarding high traffic to his/her friends. After a distinct number of repeated low speed and breaks, the location of the vehicle (latitude and longitude) send to a pre-specified contact (selected in case of traffic congestion) through an SMS. This application uses the features of the Global positioning system. The Latitude, as well as the longitude of the location where traffic jams are formed, is sent to the friends of the user. The Goggle map of the location also sends to the friends. It uses the SMS Manager a functionality of Android. The friends receiving the messages will thereby avoid taking the congested route and hence the level of traffic on the congested road will decrease, and the friends will reach the destination in comparatively less time.
Performance analysis of aodv with the constraints of varying terrain area and...Editor Jacotech
Mobile Ad Hoc Networks (MANETs) are wireless networks,
where there is no requirement for any infrastructure support to
transfer data packets between mobile nodes. These nodes
communicate in a multi-hop mode; each mobile node acts
both as a host and router. The main job of Quality of Service
(QoS)[1][2] routing in MANETs is to search and establish
routes among different mobile nodes for satisfying QoS
requirements of wireless sensor networks as PDR, Average
end-to-end delay, Average Throughput. The QoS routing
protocols efficient for commercial, real-time and multimedia
applications are in demand for day to day activities[2].
Modeling of solar array and analyze the current transient response of shunt s...Editor Jacotech
Spacecraft bus voltage is regulated by power
conditioning unit using switching shunt voltage regulator having
solar array cells as the primary source of power. This source
switches between the bus loads and the shunt switch for fine
control of spacecraft bus voltage. The effect of solar array cell
capacitance [5][6] along with inductance and resistance of the
interface wires between solar cells and power conditioning
unit[1], generates damped sinusoidal currents superimposed on
the short circuit current of solar cell when shunted through
switch. The peak current stress on the shunt switch is to be
considered in the selection of shunt switch in power conditioning
unit. The analysis of current transients of shunt switch in PCU
considering actual spacecraft interface wire length by
illumination of solar panel (combination of series and parallel
solar cells) is difficult with hardware simulation. Software
simulation by modeling solar cell is carried out for a single string
(one parallel) in Pspice [6]. Since in spacecrafts number of
parallels and interface cable length are variable parameters the
analysis of current transients of shunt switch is carried out by
modeling solar array with the help of solar cell model[6] for the
actual spacecraft condition.
License plate recognition an insight to the proposed approach for plate local...Editor Jacotech
License Plate Recognition (LPR) system for vehicles is an innovative and a very challenging area for research due to the innumerous plate formats and the nonuniform outdoor illumination conditions during which images are acquired. Thus, most approaches developed, work under certain restrictions such as fixed illumination, stationary background and limited speed. Algorithms developed for LPR systems are generally composed of three significant stages: 1] localization of the license plate from an entire scene image; 2] segmentation of the characters on the plate; 3] recognition of each of the segmented characters. A simple approach for preprocessing of the images, localization and extraction phase has been described in this paper. Numerous procedures have been developed for LPR systems and are assessed in this paper taking into consideration issues like processing time, computational power and recognition rate wherever available.
Design of airfoil using backpropagation training with mixed approachEditor Jacotech
Levenberg-Marquardt back-propagation training method has some limitations associated with over fitting and local optimum problems. Here, we proposed a new algorithm to increase the convergence speed of Backpropagation learning to design the airfoil. The aerodynamic force coefficients corresponding to series of airfoil are stored in a database along with the airfoil coordinates. A feedforward neural network is created with aerodynamic coefficient as input to produce the airfoil coordinates as output. In the proposed algorithm, for output layer, we used the cost function having linear & nonlinear error terms then for the hidden layer, we used steepest descent cost function. Results indicate that this mixed approach greatly enhances the training of artificial neural network and may accurately predict airfoil profile.
Ant colony optimization based routing algorithm in various wireless sensor ne...Editor Jacotech
Wireless Sensor Network has several issues and challenges due to limited battery backup, limited computation capability, and limited computation capability. These issues and challenges must be taken care while designing the algorithms to increase the Network lifetime of WSN. Routing, the act of moving information across an internet world from a source to a destination is one of the vital issue associated with Wireless Sensor Network. The Ant Colony Optimization (ACO) algorithm is a probabilistic technique for solving computational problems that can be used to find optimal paths through graphs. The short route will be increasingly enhanced therefore become more attractive. The foraging behavior and optimal route finding capability of ants can be the inspiration for ACO based algorithm in WSN. The nature of ants is to wander randomly in search of food from their nest. While moving, ants lay down a pheromone trail on the ground. This chemical pheromone has the ability to evaporate with the time. Ants have the ability to smell pheromone. When selecting their path, they tend to select, probably the paths that has strong pheromone concentrations. As soon as an ant finds a food source, carries some of it back to the nest. While returning, the quantity of chemical pheromone that an ant lay down on the ground may depend on the quantity and quality of the food. The pheromone trails will lead other ants towards the food source. The path which has the strongest pheromone concentration is followed by the ant which is the shortest paths between their nest and food source. This paper surveys the ACO based routing in various Networking domains like Wireless Sensor Networks and Mobile Ad Hoc Networks.
An efficient ant optimized multipath routing in wireless sensor networkEditor Jacotech
Today, the Wireless Sensor Network is increasingly gaining popularity and importance. It is the more interesting and stimulating area of research. Now, the WSN is applied in object tracking and environmental monitoring applications. This paper presents the self-optimized model of multipath routing algorithm for WSN which considers definite parameters like delay, throughput level and loss and generates the outcomes that maximizes data throughput rate and minimizes delay and loss. This algorithm is based on ANT optimization technique that will bring out an optimal and organized route for WSN and is also to avoid congestion in WSN, the algorithm incorporate multipath capability..
A mobile monitoring and alert sms system with remote configuration – a case s...Editor Jacotech
One of the parent´s main concerns nowadays it to know their children´s whereabouts. Some applications exist to address this issue and most of them rely on internet connection which makes the solution expensive. In this paper we present a low cost solution, based on SMS, and with the ability to remotely configure the child monitoring process. We also present the architecture and the full flowchart of the child application whenever a SMS is received. This case study uses Android and the more recent location API – the Fused Location Provider. For obvious reasons, the security issue has been a concern, which resulted in a configuration module in the child application to specify authorized senders
Leader Election Approach: A Comparison and SurveyEditor Jacotech
In distributed system, the coordinator is needed to manage the use of the resources in the shared environment. Many algorithms have been proposed for the same. They have various positive and negative parts. Here we will discuss those issues which ensure the efficiency of the algorithm for election leader. Here a comparison will be provided to show the advantages and disadvantages of different election algorithms. The comparison would be based on the number of messages passing and the order of time complexity.
Leader election approach a comparison and surveyEditor Jacotech
This document summarizes and compares several leader election algorithms in distributed systems. It discusses the Bully algorithm and some modifications, including using two successors, dividing nodes into sets, and using max-heap and Fibonacci heap data structures. The algorithms are compared based on time complexity, number of messages required, and memory usage. The Fibonacci heap approach is identified as the most efficient with O(log n) time complexity and minimum message passing of log(n).
Modeling of solar array and analyze the current transientEditor Jacotech
Spacecraft bus voltage is regulated by power
conditioning unit using switching shunt voltage regulator having
solar array cells as the primary source of power. This source
switches between the bus loads and the shunt switch for fine
control of spacecraft bus voltage. The effect of solar array cell
capacitance [5][6] along with inductance and resistance of the
interface wires between solar cells and power conditioning
unit[1], generates damped sinusoidal currents superimposed on
the short circuit current of solar cell when shunted through
switch. The peak current stress on the shunt switch is to be
considered in the selection of shunt switch in power conditioning
unit. The analysis of current transients of shunt switch in PCU
considering actual spacecraft interface wire length by
illumination of solar panel (combination of series and parallel
solar cells) is difficult with hardware simulation. Software
simulation by modeling solar cell is carried out for a single string
(one parallel) in Pspice [6]. Since in spacecrafts number of
parallels and interface cable length are variable parameters the
analysis of current transients of shunt switch is carried out by
modeling solar array with the help of solar cell model[6] for the
actual spacecraft condition.
Traffic Detection System is an Android application that aims at determining the behavior of traffic in a particular location. It calculates the speed of the vehicle and the level of congestion or the amount of traffic is determined on the basis of the values of sensors. If any such obstruct found, then the driver is provided an option to send messages regarding high traffic to his/her friends. After a distinct number of repeated low speed and breaks, the location of the vehicle (latitude and longitude) send to a pre-specified contact (selected in case of traffic congestion) through an SMS. This application uses the features of the Global positioning system. The Latitude, as well as the longitude of the location where traffic jams are formed, is sent to the friends of the user. The Goggle map of the location also sends to the friends. It uses the SMS Manager a functionality of Android. The friends receiving the messages will thereby avoid taking the congested route and hence the level of traffic on the congested road will decrease, and the friends will reach the destination in comparatively less time.
Performance analysis of aodv with the constraints ofEditor Jacotech
This document summarizes a research paper that analyzed the performance of the AODV routing protocol in wireless sensor networks under different terrain area sizes and pause times using the NS-3 simulator. The researchers found that packet delivery ratio remained nearly constant for small terrain areas but decreased for larger areas. Average throughput decreased with larger terrain areas, while average delay remained nearly constant for small areas but increased for larger ones. The paper concludes that AODV has better performance in networks with high mobility and size and is preferred for real-time traffic over other protocols like DSR and DSDV.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Switching and multicast schemes in asynchronous transfer mode networks
1. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No.2 Issue No. 4, August 2014
(ETACICT-2014)
28
Switching and Multicast Schemes in Asynchronous Transfer Mode Networks By Dr. Brijesh Kr. Gupta, Mr. Roop Ranjan Prof. & Head , Dept. of Computer Applications Galgotias College of Engg. & Technology, Greater Noida - 201 306 Asst. Prof., Dept. of Computer Applications Galgotias College of Engg. & Technology, Greater Noida - 201 306
ABSTRACT The purpose of this paper is to provide an overview of the ATM switching technology and to describe various multicast schemes in ATM Networks. One of the most promising solutions of ATM switches is based on the shared-memory principle. A shared- memory ATM switch provides sharing of memory space among its switches ports and superior cell loss rate performance compared to input-buffer-based and output-buffer-based ATM under conditions of identical memory size. We studied various multicast schemes, which are presented in this paper. Key Words: ATM Switch, buffer allocation, multicasting, queue length threshold, shared memory switch. 1. INTRODUCTION The telecommunications industry is rapidly becoming a high bandwidth and high speed network environment due to fast growing market demands for multimedia applications. New multimedia based applications (such as data, voice, video and image) require greater bandwidth with capability of handling multiservice traffic on the same network. One technology known as asynchronous transfer mode (ATM) was developed and is continually being further enhanced to meet this demand. ATM is a high speed, packet switching network technology capable of supporting many classes of traffic. It incorporates the advantage of fiber optic techniques to transport a wide range of traffic types such as voice, video, image and various data traffic. ATM is a standard being developed by 2 major organizations: the ATM Forum and the ITU-T. The ATM standards define guidelines needed to support cell-based voice, data, video, and multimedia communication in a public network under Broadband ISDN. Although ATM standards are very well defined, there is one area that is not included the overall standard. It is the area of ATM switching. By default, ATM switch vendors use a wide variety of techniques to build their switches based on their own research and development efforts. Therefore, this paper will provide the reader with ATM basics overview in addition to a general description of the major components of an ATM switch and various switch design techniques being implemented by ATM switch vendors. 2. ATM SWITCHING FUNCTIONS As described earlier in previous sections, user traffic information is routed through the network via virtual paths or channels. Therefore, one key function of an
ATM switch is its ability to buffer cells and quickly relay them without cell loss. However, ATM switches not only relay cells but must also perform control and management functions in order to support both asynchronous and synchronous traffic as well as connectionless and connection-oriented traffic. An ATM switch contains a set of input and output ports, which are utilized to interconnect to users, other switches, and other network elements. It also has interfaces to exchange control and management information with special purpose networks (i.e., network management systems). According to ATM standards, the switching function of ATM switches are categorized into 3 planes based on the Broadband ISDN model: User plane (U-plane),Control plane (C-plane), and Management plane (M-plane).The User plane relay user information cells from input ports to appropriate output ports by processing cell headers. It is useful to note that in the User plane, cell payloads are carried transparently through the network. Therefore, this cell relay function can be divided into 3 major blocks: the input module at the input port, the cell switch matrix that performs the routing function, and the output modules at the output ports. The Control plane deals with call establishment and release of virtual path/virtual channel connections. Information in control cells payload is not transparent to the network because it contains signaling information required for setting-up connections. The Management plane provides management functions to ensure correct and efficient network operation. The management function can further be divided as follows: Fault management Performance management Configuration management Security management Accounting management Traffic management 3. MULTICASTING SCHEMES 3.1 UNICASTING AND BROADCASTING Unicasting means sending a message from a single source to a single destination. Whereas in broadcasting a message is sent to all the destinations like in the television, the signals are broadcasted to all the destinations through the satellites. 3.2 Multicasting
Multicast can be simply defined as the ability to send one message to one or more in a single operation. This is different than using replicated unicast which sends messages from one node to a group of nodes by sending to each node individually. This will incur one operation for each destination node and is non-atomic. A 1:N multicast allows one source to reach N
2. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No.2 Issue No. 4, August 2014
(ETACICT-2014)
29
destinations. An M:N multicast allows M sources to reach N destinations. 3.3 Why Multicasting ?
Many envisioned applications in asynchronous transfer mode (ATM) networks are multicast in nature and are expected to generate a significant portion of the total traffic. Examples of such applications are broadcast video-conferencing, multiparty telephony and work group applications. The ability to support multicast traffic is therefore a basic functionality that needs to be implemented in ATM switches. Mechanisms have to be provided in the switches to replicate cells arriving at an incoming multicast virtual connection (VC) and deliver them to multiple outgoing legs of that connection. 4.REQUIREMENTS FOR ATM MULTICAST
ATM imposes specific requirements [11] that must be considered for the design of the multicast services. The short, fixed length of the ATM cell requires an adaptation layer at the end points to transfer complete message and guarantee that cells from different sources are not interleaved by intermediate switches. The overhead of call setup and tear-down for the connection based ATM protocol require an efficient mechanism for adding and removing users to a multicast group. The limited size of the VPI/VCI field prevents the use of source-based routing, as used by the existing IP multicast routing programs A B C D
Timing
Bit rate
Mode
Table 1. Multicast Application Characteristics gives an indication of the requirements of those application types that would require multicasting protocols. Connection oriented protocols can incur a high overhead when setting up and destroying links, therefore connectionless links are preferable. Some applications that require multicasting such as audio would prefer a constant bit rate where as video is less susceptible to the jitters. This is due to a human’s high sensitivity to audio jitters. It can then be taken from the Fig.[1] that class D services are along the lines needed to implement multicast on an ATM network. More advanced details could be studied in [15-22]. 5.MULTICASTING SCHEMES FOR SHARED MEMORY SWITCH Various ways of supporting multicast operation with shared- memory architecture can be categorized under two different classes :
Replication-at-Receiving (RAR) or copying Network scheme. Replication-at-Sending (RAS) A brief description of each of the multicast classes is given below. 5.1 RAR schemes In RAR scheme, a multicast cell arriving at the switch and destined to m destinations is first copied m times Fig.[1]. A copy of the cell is linked to each output queue to which the multicast cell is destined. All copies are stored in the buffer then each copy is served independently. The RAR scheme has been used in several existing shared memory switches because it is relatively simple to implement [3]. In fact, once a cell has been replicated each copy of the cell can be treated in the same way as a unicast cell. Consequently, both the control and the structure of the linked lists are basically the same as those used in a unicast switch.
MWMR Multicast Scheme Fig.[1] Shared Memory : Multicasting with copying n/w
5.2 RAS scheme In RAS scheme the multicast cell is not replicated before storage in shared buffer, only single instance of cell is stored in the buffer. Cell is replicated at the output port. This is shown in Fig.[2].
Real Time
None
Real Time
None
Real Time
None
Real Time
None
Constant
Variable
Constant
Variable
Connection Oriented
Connectionless
3. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No.2 Issue No. 4, August 2014
(ETACICT-2014)
30
Fig. [2] SWSR Multicast Support employing a Fanout bus 5.3 Multiple Write Multiple Read (MWMR) This is a straightforward solution to providing multicast support. The MWMR scheme applies to all those multicast schemes where an incoming multicast cell is replicated first, and then its multiple copies are used to write into and read out of the shared memory space for switching purpose. A multicast cell is replicated for all its multicast connections and switched to a predestined group of output ports with the help of a point–to- point routing network before being written to the shared memory space. From a shared memory point of view, a multicast cell is replicated into multiple copies and stored in shared memory (multiple write); then multiple copies are eventually read out of the shared memory (multiple read) for their respective output port. Advantages of MWMR scheme: In the MWMR scheme, multicast cells after replication are treated the same as the unicast cells. This scheme is a fair scheme in the sense that copies of a multicast cell destined to a loaded output are more likely to be dropped and an idle output port would always get its cell if the copies are present in the memory. Disadvantages of MWMR: The biggest disadvantage of this approach is that for an effective load, the number of replicated cells input to the shared memory switch could be of O(N2). As in the worst case, N cells might get replicated to at most N2 cells and only at most N cells could be transmitted in a given switch cycle. This would result in storing O(N2) cells in each switch cycle, and for a finite memory space it would result in an considerable cell loss for a given effective load. Furthermore replication of multicast cells would require O(N2) ATM cells to be written to the shared memory space in a given switch cycle. This scheme obviously becomes limited by the memory cycle time as the degree of fanout increases in a large shared memory based ATM switching system. 5.4 Single Write Single Read (SWSR)
In this scheme, multicast cells form a separate logical queue within the shared memory space. A dedicated multicast output port is used to serve multicast cells in a first-in-first-out (FIFO) fashion every cycle. In a given In a given write cycle, upto N multicast cells or some combination of unicast and multicast cells can be written to the shared memory for switching purposes. During a given read cycle, upto N unicast cells and one multicast can be read out of the shared memory. If a multicast cell is read out of the shared memory, it is routed to the high-speed bus for its replication and transmission to its fanout destinations. Advantages of SWSR: Since no replication of a multicast cell takes place before its storage, it is an efficient scheme in terms of memory space. Since no multiple memory accesses are performed for the same information, it is an efficient scheme in terms of the memory access time. In this scheme, sequential read operations are not involved in reading the fanouts of a multicast cell; hence, it is well suited for high-performance shared memory ATM architectures. Disadvantages of SWSR: Some additional hardware, such as a fanout bus and an additional buffer or mask at the output ports, is used to perform reading the fanout of a multicast cell within a fixed switching time slot. Use of additional hardware is the only disadvantage of this scheme. SWSR with Output Buffer (SWSR-OB ) Under this scheme, additional buffers are employed at the output Fig.[3]. The amount of buffer used at the output will depend on the percentage of incoming multicast traffic, the degree average fanouts, and the degree of cell loss rate tolerated by the system. Use of dedicated buffers at the output could also result in excessive cell loss under a bursty traffic consisting of a mix of unicast and multicast cell bursts. SWSR with Output Mask (SWSR-OM) This scheme uses a mask called the output mask (OM) to drop additional ATM cells at the output and retain them in the shared memory Fig [4]. In the case of multiple arrivals (i.e. arrival of a unicast cell and a multicast fanout) and depending on the switching priority used, unicast cells or multicast cells are dropped by the output mask (OM) at the output. This scheme prevents loss of cells at the output ports by retaining the cells (those dropped by the output mask) in the shared memory space and outputting them in the successive switch cycles.
Multicast Cell Enable Block
4. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No.2 Issue No. 4, August 2014
(ETACICT-2014)
31
Fig. [3] Shared Memory : Multicasting With Additional Buffer Figure 4: shared Memory Multicasting with Output Mask
6. CONCLUSIONS Shared memory ATM switches have gained significant importance in handling bursty traffic in ATM networks because of their superior performance characteristics in terms of cell loss and throughput for a given memory space. A shared-memory ATM switch provides sharing of memory space among its switch ports and superior cell loss rate performance compared to input-buffer-based and output-buffer-based ATM switches under condition of identical memory size. REFERENCES [1] Joan Garcia-Haro and Andrzej Jajszczyk “ATM Shared Memory Switching Architectures”, IEEE Network, July/August 1994, pp 18-26. [2] Abhijit K. Choudhury, Ellen L. Hahne “Dynamic Queue Length Thresholds for Shared Memory Packet Switches”, IEEE Network, Vol-6, April 1998 , pp 130-140.
[3] Sanjeev Kumar and Dharma P. Agrawal, “On Multicast Support for Shared Memory Based ATM Switch Architecture”, IEEE Network, January/February 1996, pp 34-39.
[4] Yuhui Shi, Russell Ebarhart and Yaobin Chen, “Implementation of Evolutionary Fuzzy Systems”, IEEE Network, Vol-7, April 1999, pp 109-118. [5] Abdelnaser Adas, “Traffic Models in Broadband Networks”, IEEE Communications Magazine, July 1997, pp 82-89. [6] Jaime Jungok Bae and Tatsuya Suda, IEEE Network, Vol- 79, February 1998, pp 170-173. [7] Mohan Lal, Anil K. Sarje and Vivek Kumar Bhugra, “Performance Analysis of Leaky Bucket Schemes Against A Fuzzy Based Approach”, University of Roorkee. [8] J.Y. Le Boudec, “The Asynchronous Transfer Mode: A Tutorial”, Computer Networks and ISDN Systems, Vol-24, 1992, pp. 279-309.
5. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No.2 Issue No. 4, August 2014
(ETACICT-2014)
32
[9] Thomas D. Ndousse, “Fuzzy Neural Control of Voice Cells In ATM Networks”, IEEE Journal on selected areas in communications, December 1994, pp. 1488-1494. [10] S. Kumar and D. P. Agrawal, “A Shared Buffer Direct Access ATM Switch Architecture for Broadband Networks”, Proc. IEEE Conference, 1994 pp. 101-105. [11] Lee Goldberg, “ATM Switching: A Brief Introduction”, Electronic Design, December 1994, pp. 87-103. [12] H. Kitamura, “A Study on Shared Buffer type ATM Switch”, Electronics and Communications in Japan, Part-1, Vol- 73, November 1990, pp. 58-64. [13] Andrew S. Tanenbaum, “Computer Networks”, Third Edition, Prentice-Hall of India, New Delhi, 1997. [14] Yedidyah Langsam, Mosche J. Augenstein and Aaron M. Tenembaum, “Data Structures using C and C++”, Second Edition, Prentice-Hall of India, New Delhi, 2000.
[15] Cui, J., Xiong, N. : “A novel and efficient source-path discovery and maintenance method for application layer multicast,” Journal of Computers and Electrical Engineering, Vol. 39, Issue 1, Pages 67-75, January 2013
[16] Xuan, Y., Lea, C.T. : “Network-coding multicast networks with QoS guarantees,” IEEE/ACM Transactions on Networking (TON), Vol. 19, Issue 1, pp. 265-274, February 2011 [17] Holopainen, V., Kantola, R., Taira, T., Lamminen O. : “Automatic link numbering and source routed multicast,” 4th international conference on Autonomous infrastructure, management and security, pp. 123-134, 2010
[18] Zhang, C. : “Optical multicast provisioning with differentiated leaf availability guarantee in WDM networks,” Journal of Photonic Network Communications, Vol. 21, Issue 1, pp. 21-27, February 2011
[19] Molnar, M.: “On the Optimal Tree-Based Explicit Multicast Routing,” Second International Conference on Communication Theory, Reliability, and Quality of Service, pp. 91-96, 2009
[20] Garofalakis, J., Stergiou, E.: “Mechanisms and analysis for supporting multicast traffic by using multilayer multistage interconnection networks,” International Journal of Network Management, Vol. 21, Issue 2, 2011
[21] Singh, A.P., Potey, S.M., Barbhuiya, Nandi, F.A., S. : “A Scalable and Secure Key Distribution Mechanism for Multicast Networks,” Proceedings of International Conference on Advances in Computing and Communications, pp. 211-214, 2012 [22] Sierra, J.E., Caro, L.F., Marzo, J.L., Fabregat, R., Solano, F., Donoso,Y. : “Impact of the number of SAB on architectures that support unicast & multicast traffic in WDM networks,” International Journal of Communication Networks and Distributed Systems , Vol. 4, Issue 1, 2010