In this paper, a novel scheduling scheme for the Fourth Generation (4G)-Wireless Local Area Network (WLAN) network is proposed to ensure that end to end traffic transaction is provisioned seamlessly. The scheduling scheme is divided into two stages; in stage one, traffic is separated into Actual Time Traffic (ATT) and Non-Actual-Time Traffic (NATT), while in stage two, complex queuing strategy is performed. In stage one, Class-Based Queuing (CBQ) and Deficit Round Robin(DRR) are used for NATT and ATT applications, respectively to separate and forward traffic themselves according to source requirements. Whereas in the stage, two Control Priority Queuing (CPQ) is used to assign each class the appropriate priority level. Evaluation of the performance of the integrated network was done according to several metrics such as end-to-end delay, jitter, packet loss, and network’s throughput. Results demonstrate major improvements for AT services with minor degradation on NAT applications after implementing the new scheduling scheme.
Abstract
The rapid growth in the Internet of Things (IoTs)
has change our life to be more intelligent and smart,
the development in the Wireless Sensors Networks
(WSNs), besides the wide use of the embedded devices
in different area like industry, home automation,
transport, agriculture and health care, which was led
the Routing Over Low-power and Lossy-network
(ROLL) working group to introduce the IPv6 Routing
Protocol for Low-Power and Lossy Networks (RPL),
therein the RPL nodes have organized topology as a
Directed Acyclic Graph (DAG) and terminated at one
root to form the Destination Oriented DAGs
(DODAGs). In this paper by using InstantContiki3.0
and CoojaGUI we analyze the DODAG formations,
the RPL control messages that are send downward
and upward routes to construct and maintain
DODAG and the Rank computation by Objective
Function (OF) for inconsistency and loop detection,
also we evaluate the performance of the RPL based
on the Expected Transmission Count (ETX) OF that
enable RPL to select and optimize routes within RPL
instance, as well as we evaluate the following metrics:
The ETX Reliability Object (ETX), Radio Duty Cycle
(RDC), energy consumption, the received packets by
the motes and neighbor count. The simulation results
show that the RPL control messages flow in consistent
manner, the DODAG root able to connect to all of the
neighbor motes, also Rank illustration shows no loops
and DODAG topology consistent, as well as the ETX
can essentially take control over DODAG formations
and it has an effects in the RDC ratio, furthermore
most of the motes show reasonable low power
consumption, also the motes show acceptable number
of the received packets.
Abstract - The Transmission Control Protocol (TCP) is
connection oriented, reliable and end-to-end protocol that support
flow and congestion control, with the evolution and rapid growth
of the internet and emergence of internet of things IoT, flow and
congestion have clear impact in the network performance. In this
paper we study congestion control mechanisms Tahoe, Reno,
Newreno, SACK and Vegas, which are introduced to control
network utilization and increase throughput, in the performance
evaluation we evaluate the performance metrics such as
throughput, packets loss, delivery and reveals impact of the cwnd.
Showing that SACK had done better performance in terms of
numbers of packets sent, throughput and delivery ratio than
Newreno, Vegas shows the best performance of all of them.
Review Paper on 802.11ax Scheduling and Resource Allocationijtsrd
Nowadays a fast remote Internet association is a need as opposed to a luxury. IEEE 802.11ax could be a revolution to present an improvement over this age of 802.11. 802.11ax has been accepted to convey next generation Wireless Local Area Network WLAN techniques. 802.11ax using multiple techniques as using modulation 1024 Quadrature Amplitude Modulation QAM , Orthogonal Frequency Division Multiple Access OFDMA , robust high efficiency signaling for better operation at a significantly lower Received Signal Strength Indication RSSI , Target Wakeup Time TWT where the station can request to wake up at any time in the future and more. 802.11ax achieves multiple benefits as enabling a more than 35 speed burst, reduce overhead and latency, and more. This paper gives a review of the IEEE 802.11ax resource allocation scheduling in both 1 Downlink DL data transfer 2 Uplink UL data transfer. Ibrahim Masri | Erdal Erdal | Atilla Ergüzen "Review Paper on 802.11ax Scheduling and Resource Allocation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38162.pdf Paper URL : https://www.ijtsrd.com/engineering/computer-engineering/38162/review-paper-on-80211ax-scheduling-and-resource-allocation/ibrahim-masri
Assessing Buffering with Scheduling Schemes in a QoS Internet RouterIOSR Journals
This document examines different scheduling algorithms that could be used with RIO-C penalty enforcement buffering in a multi-queue QoS router to improve network performance. It simulates priority, round robin, and weighted round robin scheduling with RIO-C buffering. The results show that priority scheduling achieved the lowest loss rates, with 29.46% scheduler drop rate and 14.95% RED loss rate. Round robin was second with 29.53% and 10.50% losses. Weighted round robin was third with 30.28% and 3.04% losses. The document concludes that a network seeking quality of service could adopt priority scheduling with RIO-C admission control.
This document discusses how the theoretical peak throughput of 300 Mbps for LTE systems is calculated. It provides background information on key aspects of the LTE physical layer that influence throughput calculations, including bandwidth, modulation schemes, coding rates, and duplexing methods. The document then examines the calculations for theoretical throughput for both Frequency Division Duplexing (FDD) and Time Division Duplexing (TDD) LTE systems.
The document outlines Chapter 4 of a networking textbook. Chapter 4 covers the network layer, including network layer services, how routers work, routing algorithms, and implementations in the Internet. The key topics covered are virtual circuit versus datagram networks, the functions of routers including forwarding and routing, and routing algorithms like link state and distance vector.
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...IJECEIAES
The demand for internet applications has increased rapidly. Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task Force (IETF). In this paper, we evaluate the performance of UDP, DCCP, SCTP and TFRC protocols for different traffic flows: data transmission, video traffic, and VOIP in wired networks. The performance criteria used for this evaluation include throughput, end to end delay, and packet loss rate. Well-known network simulator NS-2 used to implement the UDP, DCCP, SCTP, and TFRC protocols performance comparison. Based on the simulation results, the performance throughput of SCTP and TFRC is better than UDP. Moreover, DCCP performance is superior SCTP and TFRC in term of end-to-end delay.
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...RESHAN FARAZ
This document summarizes literature on scheduling and resource allocation algorithms for IEEE 802.11ax wireless networks. It discusses key features of 802.11ax like OFDMA and higher modulation schemes. It then reviews several papers that propose algorithms using buffer status reports, grouping, and optimized resource unit allocation to improve throughput in dense environments. Overall resource allocation and scheduling remain challenging areas of research for fully utilizing 802.11ax capabilities and achieving high average throughput.
Abstract
The rapid growth in the Internet of Things (IoTs)
has change our life to be more intelligent and smart,
the development in the Wireless Sensors Networks
(WSNs), besides the wide use of the embedded devices
in different area like industry, home automation,
transport, agriculture and health care, which was led
the Routing Over Low-power and Lossy-network
(ROLL) working group to introduce the IPv6 Routing
Protocol for Low-Power and Lossy Networks (RPL),
therein the RPL nodes have organized topology as a
Directed Acyclic Graph (DAG) and terminated at one
root to form the Destination Oriented DAGs
(DODAGs). In this paper by using InstantContiki3.0
and CoojaGUI we analyze the DODAG formations,
the RPL control messages that are send downward
and upward routes to construct and maintain
DODAG and the Rank computation by Objective
Function (OF) for inconsistency and loop detection,
also we evaluate the performance of the RPL based
on the Expected Transmission Count (ETX) OF that
enable RPL to select and optimize routes within RPL
instance, as well as we evaluate the following metrics:
The ETX Reliability Object (ETX), Radio Duty Cycle
(RDC), energy consumption, the received packets by
the motes and neighbor count. The simulation results
show that the RPL control messages flow in consistent
manner, the DODAG root able to connect to all of the
neighbor motes, also Rank illustration shows no loops
and DODAG topology consistent, as well as the ETX
can essentially take control over DODAG formations
and it has an effects in the RDC ratio, furthermore
most of the motes show reasonable low power
consumption, also the motes show acceptable number
of the received packets.
Abstract - The Transmission Control Protocol (TCP) is
connection oriented, reliable and end-to-end protocol that support
flow and congestion control, with the evolution and rapid growth
of the internet and emergence of internet of things IoT, flow and
congestion have clear impact in the network performance. In this
paper we study congestion control mechanisms Tahoe, Reno,
Newreno, SACK and Vegas, which are introduced to control
network utilization and increase throughput, in the performance
evaluation we evaluate the performance metrics such as
throughput, packets loss, delivery and reveals impact of the cwnd.
Showing that SACK had done better performance in terms of
numbers of packets sent, throughput and delivery ratio than
Newreno, Vegas shows the best performance of all of them.
Review Paper on 802.11ax Scheduling and Resource Allocationijtsrd
Nowadays a fast remote Internet association is a need as opposed to a luxury. IEEE 802.11ax could be a revolution to present an improvement over this age of 802.11. 802.11ax has been accepted to convey next generation Wireless Local Area Network WLAN techniques. 802.11ax using multiple techniques as using modulation 1024 Quadrature Amplitude Modulation QAM , Orthogonal Frequency Division Multiple Access OFDMA , robust high efficiency signaling for better operation at a significantly lower Received Signal Strength Indication RSSI , Target Wakeup Time TWT where the station can request to wake up at any time in the future and more. 802.11ax achieves multiple benefits as enabling a more than 35 speed burst, reduce overhead and latency, and more. This paper gives a review of the IEEE 802.11ax resource allocation scheduling in both 1 Downlink DL data transfer 2 Uplink UL data transfer. Ibrahim Masri | Erdal Erdal | Atilla Ergüzen "Review Paper on 802.11ax Scheduling and Resource Allocation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38162.pdf Paper URL : https://www.ijtsrd.com/engineering/computer-engineering/38162/review-paper-on-80211ax-scheduling-and-resource-allocation/ibrahim-masri
Assessing Buffering with Scheduling Schemes in a QoS Internet RouterIOSR Journals
This document examines different scheduling algorithms that could be used with RIO-C penalty enforcement buffering in a multi-queue QoS router to improve network performance. It simulates priority, round robin, and weighted round robin scheduling with RIO-C buffering. The results show that priority scheduling achieved the lowest loss rates, with 29.46% scheduler drop rate and 14.95% RED loss rate. Round robin was second with 29.53% and 10.50% losses. Weighted round robin was third with 30.28% and 3.04% losses. The document concludes that a network seeking quality of service could adopt priority scheduling with RIO-C admission control.
This document discusses how the theoretical peak throughput of 300 Mbps for LTE systems is calculated. It provides background information on key aspects of the LTE physical layer that influence throughput calculations, including bandwidth, modulation schemes, coding rates, and duplexing methods. The document then examines the calculations for theoretical throughput for both Frequency Division Duplexing (FDD) and Time Division Duplexing (TDD) LTE systems.
The document outlines Chapter 4 of a networking textbook. Chapter 4 covers the network layer, including network layer services, how routers work, routing algorithms, and implementations in the Internet. The key topics covered are virtual circuit versus datagram networks, the functions of routers including forwarding and routing, and routing algorithms like link state and distance vector.
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...IJECEIAES
The demand for internet applications has increased rapidly. Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task Force (IETF). In this paper, we evaluate the performance of UDP, DCCP, SCTP and TFRC protocols for different traffic flows: data transmission, video traffic, and VOIP in wired networks. The performance criteria used for this evaluation include throughput, end to end delay, and packet loss rate. Well-known network simulator NS-2 used to implement the UDP, DCCP, SCTP, and TFRC protocols performance comparison. Based on the simulation results, the performance throughput of SCTP and TFRC is better than UDP. Moreover, DCCP performance is superior SCTP and TFRC in term of end-to-end delay.
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...RESHAN FARAZ
This document summarizes literature on scheduling and resource allocation algorithms for IEEE 802.11ax wireless networks. It discusses key features of 802.11ax like OFDMA and higher modulation schemes. It then reviews several papers that propose algorithms using buffer status reports, grouping, and optimized resource unit allocation to improve throughput in dense environments. Overall resource allocation and scheduling remain challenging areas of research for fully utilizing 802.11ax capabilities and achieving high average throughput.
High Speed Networks - Applications in FinanceOmar Bashir
Speed and agility in finance and banking is essential in executing a successful trade. In modern banking systems, including algorithmic and high frequency trading platforms, high speed networks communicate timely market data and liquidity information and carry execution instructions to trading venues and counterparties. Suboptimal networks, protocol stacks and applications can easily result in a financial impact when execution instructions are delayed or are based on stale market data.
This talk suggest optimisation opportunities in computer networks and introduces performant banking systems.
Survey on scheduling and radio resources allocation in lteijngnjournal
- The document discusses scheduling and radio resource allocation in LTE networks. It focuses on the radio resource manager (RRM) element in LTE that performs admission control and packet scheduling.
- Several scheduling algorithms are proposed for both uplink and downlink directions, including proportional fair, EXP-PF, round robin, max-min fair, and algorithms that aim to maximize throughput or support quality of service requirements.
- The paper provides an overview of these scheduling algorithms, evaluates their performance, and offers criticism on how to best allocate radio resources in LTE networks.
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
This document compares different wireless routing protocols to find the most energy efficient for creating a cognitive radio network model with attacker nodes. It analyzes reactive, proactive, and hybrid routing protocols including AODV, DSR, DSDV, OLSR, and a hybrid protocol. Simulation results show the hybrid protocol consumes the least energy compared to other protocols, making it well-suited for an energy efficient cognitive radio network model.
Quality of Service at the Internet Engineering Task ForceJohn Loughney
"Quality of Service at the Internet Engineering Task Force" Workshop on "End-to-End Quality of Service. What is it? How do we get it?" Geneva, 1-3 October 2003.
A cross layer delay-aware multipath routing algorithm for mobile adhoc networkscsandit
Mobile Ad Hoc Networks (MANETS) require reliable routing and Quality of Service(QoS)
mechanism to support diverse applications with varying and stringent requirements. Routing
protocols such as AODV, AOMDV, DSR and OLSR use minimum hop count as the metric for
path selection, hence are not suitable for delay sensitive real time applications. To support such
applications delay constrained routing protocols are employed. These Protocols makes path
selection based on the delay over the discovered links during routing discovery and routing
table calculations. We propose a variation of a node-disjoint Multipath QoS Routing protocol
called Cross Layer Delay aware Node Disjoint Multipath AODV (CLDM-AODV) based on
delay constraint. It employs cross-layer communications between MAC and routing layers to
achieve link and channel-awareness. It regularly updates the path status in terms of lowest
delay incurred at each intermediate node. Performance of the proposed protocol is compared
with single path AODV and NDMR protocols. Proposed CLDM-AODV is superior in terms of
better packet delivery and reduced overhead between intermediate nodes.
Research Inventy : International Journal of Engineering and Scienceresearchinventy
The document summarizes a study that evaluated the performance of three mobile ad hoc network (MANET) routing protocols: AODV, DSDV, and DSR. The protocols were simulated using the NS-2 network simulator across networks of 30 to 70 nodes. Key performance metrics analyzed include packet delivery fraction, average end-to-end delay, normalized routing load, and packet loss. The results found that AODV performed best in terms of packet delivery fraction and shortest end-to-end delay, while DSDV had the lowest normalized routing load and DSR had the lowest packet loss. Overall, the document compares the performance of these three MANET routing protocols under different conditions using simulation results.
A cross layer delay-aware node disjoint multipath routing algorithm for mobil...ijwmn
Mobile Ad Hoc Networks (MANETS) require reliable routing and Quality of Service(QoS) mechanism to
support diverse applications with varying and stringent requirements for delay, jitter, bandwidth, packets
loss. Routing protocols such as AODV, AOMDV, DSR and OLSR use shortest path with minimum hop
count as the main metric for path selection, hence are not suitable for delay sensitive real time
applications. To support such applications delay constrained routing protocols are employed. These
Protocols makes path selection between source and destination based on the delay over the discovered
links during routing discovery and routing table calculations. We propose a variation of a node-disjoint
Multipath QoS Routing protocol called Cross Layer Delay aware Node Disjoint Multipath AODV (CLDMAODV)
based on delay constraint. It employs cross-layer communications between MAC and routing
layers to achieve link and channel-awareness. It regularly updates the path status in terms of lowest delay
incurred at each intermediate node. Performance of the proposed protocol is compared with single path
AODV and NDMR protocols. Proposed CLDM-AODV is superior in terms of better packet delivery and
reduced overhead between intermediate nodes.
The document discusses the evolution of 3GPP's Long Term Evolution (LTE) radio technology and System Architecture Evolution (SAE). It describes the initial feasibility study in 2004 to develop a high-data-rate, low-latency packet-optimized radio access technology. Key requirements were identified for peak data rates, latency, capacity, throughput, spectrum efficiency, mobility, and more. Radio interface options were evaluated, leading to the selection of OFDM for the downlink and SC-FDMA for the uplink. The evolved UTRAN architecture was defined consisting of eNBs interconnected by the X2 interface.
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...ijwmn
1) The document discusses packet scheduling algorithms for LTE downlink systems that must operate under imperfect channel quality information (CQI) due to errors, delays, and other issues.
2) It proposes a new packet scheduling algorithm that uses a Kalman filter-based channel predictor in the frequency domain to estimate the true CQI from erroneous feedback, combined with a time domain grouping technique using proportional fair and modified largest weighted delay first algorithms.
3) Simulation results showed this approach achieves better performance than existing algorithms in terms of system throughput and packet loss ratio under imperfect CQI conditions.
Quality of Service for Video Streaming using EDCA in MANETijsrd.com
Mobile Ad-hoc network(MANET) is a collection of wireless terminals that are able to dynamically form a temporary network. To establish such a network no fixed infrastructure is required. Here, it is the responsibility of network nodes to forward each other's packets and thus these nodes also act as routers. In such a network resources are limited and also topology changes dynamically. So providing Quality of service(QoS) is also necessary. QoS is more important for real time applications for example Video Streaming. IEEE 802.11e network standard supports QoS through EDCA technique. This technique does not fulfill the requirements of QoS. So, in this project modified EDCA technique is proposed to enhance QoS for Video Streaming application. This technique is implemented in NS2 and compared with traditional EDCA.
Macro with pico cells (hetnets) system behaviour using well known scheduling ...ijwmn
This paper demonstrates the concept of using Heterogeneous networks (HetNets) to improve Long Term Evolution (LTE) system by introducing the LTE Advance (LTE-A). The type of HetNets that has been chosen for this study is Macro with Pico cells. Comparing the system performance with and without Pico cells has clearly illustrated using three well-known scheduling algorithms (Proportional Fair PF, Maximum Largest Weighted Delay First MLWDF and Exponential/Proportional Fair EXP/PF). The system is judged based on throughput, Packet Loss Ratio PLR, delay and fairness.. A simulation platform called LTE-Sim has been used to collect the data and produce the paper’s outcomes and graphs. The results prove that adding Pico cells enhances the overall system performance. From the simulation outcomes, the overall system performance is as follows: throughput is duplicated or tripled based on the number of users, the PLR is almost quartered, the delay is nearly reduced ten times (PF case) and changed to be a half (MLWDF/EXP cases), and the fairness stays closer to value of 1. It is considered an efficient and cost effective way to increase the throughput, coverage and reduce the latency.
3 gpp long term evolution (lte) transport block size and code ratetjuanmx
The document discusses how transport block size is calculated in LTE. It explains that the transport block size depends on the modulation and coding scheme (MCS) and number of resource blocks assigned to the user equipment. The size is determined by looking up the MCS index and transport block size index in 3GPP specification tables. For example, with an MCS index of 20 and 2 resource blocks, the transport block size is 776 bits. The code rate, or ratio of transmitted bits to maximum possible bits, is also calculated as an example.
The network layer is concerned with routing packets from the source to the destination across multiple networks. It must understand the topology of connected networks and choose optimal paths while avoiding overloading some lines. The network layer provides either connection-oriented or connectionless services to the transport layer and deals with differences when sources and destinations are in different networks. Dynamic routing algorithms like distance vector routing are used to adaptively route packets based on current network conditions.
Differentiated Classes of Service and Flow Management using An Hybrid Broker1IDES Editor
Recently, mobile networks have been overloaded
with a considerable amount of data traffic. The current paper
proposes a management service for mobile environments,
using policies and quality metrics, which ensure a better usage
of network resources with a more fine-grained management
based on flows with different classes of service and
transmission rates. This management of flows is supported
through a closed innovative control loop among a flexible
brokerage service in the network, and agents at the mobile
terminals. It also allows the terminals to make well-informed
decisions about their connections to enhance the number of
connected flows per technology and the individual service level
offered to each flow. Our results indicate that the proposed
solution optimizes the usage of available 4G network resources
among a high number of differentiated flows in several
scenarios where access technologies are extremely overloaded
whilst protecting, through a low complexity scheme, the flows
associated to users that have celebrated more expensive
contracts with their network operators.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
The document discusses various layers and concepts in computer networks and internetworking. It covers the network layer and its responsibilities in delivering packets from source to destination. It then discusses services provided by the network layer to the transport layer, including connection-oriented and connectionless services. Various routing algorithms and concepts are covered such as distance vector routing, link state routing, hierarchical routing, flooding, shortest path algorithms, broadcast routing, and multicast routing.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Improving Performance of TCP in Wireless Environment using TCP-PIDES Editor
Improving the performance of the transmission
control protocol (TCP) in wireless environment has been an
active research area. Main reason behind performance
degradation of TCP is not having ability to detect actual reason
of packet losses in wireless environment. In this paper, we are
providing a simulation results for TCP-P (TCP-Performance).
TCP-P is intelligent protocol in wireless environment which
is able to distinguish actual reasons for packet losses and
applies an appropriate solution to packet loss.
TCP-P deals with main three issues, Congestion in
network, Disconnection in network and random packet losses.
TCP-P consists of Congestion avoidance algorithm and
Disconnection detection algorithm with some changes in TCP
header part. If congestion is occurring in network then
congestion avoidance algorithm is applied. In congestion
avoidance algorithm, TCP-P calculates number of sending
packets and receiving acknowledgements and accordingly set
a sending buffer value, so that it can prevent system from
happening congestion. In disconnection detection algorithm,
TCP-P senses medium continuously to detect a happening
disconnection in network. TCP-P modifies header of TCP
packet so that loss packet can itself notify sender that it is
lost.This paper describes the design of TCP-P, and presents
results from experiments using the NS-2 network simulator.
Results from simulations show that TCP-P is 4% more
efficient than TCP-Tahoe, 5% more efficient than TCP-Vegas,
7% more efficient than TCP-Sack and equally efficient in
performance as of TCP-Reno and TCP-New Reno. But we can
say TCP-P is more efficient than TCP-Reno and TCP-New
Reno since it is able to solve more issues of TCP in wireless
environment.
This document discusses how the theoretical peak throughput of 300 Mbps for LTE systems is calculated. It begins by introducing some of the key concepts in LTE including Long Term Evolution (LTE), the LTE architecture, and duplexing methods like Frequency Division Duplexing (FDD) and Time Division Duplexing (TDD). It then explains how parameters of the LTE physical layer such as bandwidth, modulation, coding rate, and multiple-input multiple-output (MIMO) techniques impact the calculation of throughput. The document demonstrates throughput calculations for both FDD and TDD systems using these parameters and assumptions from the 3GPP specifications. It concludes by showing example calculations of downlink and uplink throughput for 20
This document presents a QoS-based packet scheduling algorithm for hybrid wireless networks. It proposes using the Earliest Deadline First (EDF) algorithm to schedule packets for online conference applications and the Least Slack Time First algorithm to schedule packets for online video applications. The goal is to reduce transmission delay and improve QoS. It implements this scheduling approach using the NS2 network simulator. The scheduling algorithm classifies packets by application type and places them in queues. EDF and Least Slack Time are then used to schedule packets from each queue to minimize delay for multimedia applications over hybrid wireless networks.
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIJCNCJournal
This document proposes an improved quality of service protocol for real-time traffic in mobile ad hoc networks. It presents a modified version of the AODV routing protocol that provides two key improvements: 1) A balanced best-effort traffic aware route discovery mechanism that selects paths with lower ratios of best-effort packets to minimize their impact on real-time traffic. 2) A packet forwarding procedure that gives transmission priority to real-time packets by transmitting them immediately from the queue while best-effort packets have to wait, improving throughput for real-time applications. Simulation results show the proposed protocol performs better than basic AODV in terms of throughput and delay for real-time traffic.
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
The quality of service is a need in recent computer network developments. The present paper evaluates some characteristics in a proposed network topology such as dropped packets and bandwidth use, using two traffic sources, firstly a VoIP source over an UDP agent, then a CBR traffic source over an UDP agent as well as the previous one. Two possible configurations are proposed, implementing both of them in the Network Simulator, and implementing in one of them differentiated services to compare the results. Statistics results are shown, in both cases showing the accumulative dropped packet number and the throughput in the link, obtaining a reducer number of dropped packets in the stage with differentiated services, and an improvement in the bandwidth use.
High Speed Networks - Applications in FinanceOmar Bashir
Speed and agility in finance and banking is essential in executing a successful trade. In modern banking systems, including algorithmic and high frequency trading platforms, high speed networks communicate timely market data and liquidity information and carry execution instructions to trading venues and counterparties. Suboptimal networks, protocol stacks and applications can easily result in a financial impact when execution instructions are delayed or are based on stale market data.
This talk suggest optimisation opportunities in computer networks and introduces performant banking systems.
Survey on scheduling and radio resources allocation in lteijngnjournal
- The document discusses scheduling and radio resource allocation in LTE networks. It focuses on the radio resource manager (RRM) element in LTE that performs admission control and packet scheduling.
- Several scheduling algorithms are proposed for both uplink and downlink directions, including proportional fair, EXP-PF, round robin, max-min fair, and algorithms that aim to maximize throughput or support quality of service requirements.
- The paper provides an overview of these scheduling algorithms, evaluates their performance, and offers criticism on how to best allocate radio resources in LTE networks.
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
This document compares different wireless routing protocols to find the most energy efficient for creating a cognitive radio network model with attacker nodes. It analyzes reactive, proactive, and hybrid routing protocols including AODV, DSR, DSDV, OLSR, and a hybrid protocol. Simulation results show the hybrid protocol consumes the least energy compared to other protocols, making it well-suited for an energy efficient cognitive radio network model.
Quality of Service at the Internet Engineering Task ForceJohn Loughney
"Quality of Service at the Internet Engineering Task Force" Workshop on "End-to-End Quality of Service. What is it? How do we get it?" Geneva, 1-3 October 2003.
A cross layer delay-aware multipath routing algorithm for mobile adhoc networkscsandit
Mobile Ad Hoc Networks (MANETS) require reliable routing and Quality of Service(QoS)
mechanism to support diverse applications with varying and stringent requirements. Routing
protocols such as AODV, AOMDV, DSR and OLSR use minimum hop count as the metric for
path selection, hence are not suitable for delay sensitive real time applications. To support such
applications delay constrained routing protocols are employed. These Protocols makes path
selection based on the delay over the discovered links during routing discovery and routing
table calculations. We propose a variation of a node-disjoint Multipath QoS Routing protocol
called Cross Layer Delay aware Node Disjoint Multipath AODV (CLDM-AODV) based on
delay constraint. It employs cross-layer communications between MAC and routing layers to
achieve link and channel-awareness. It regularly updates the path status in terms of lowest
delay incurred at each intermediate node. Performance of the proposed protocol is compared
with single path AODV and NDMR protocols. Proposed CLDM-AODV is superior in terms of
better packet delivery and reduced overhead between intermediate nodes.
Research Inventy : International Journal of Engineering and Scienceresearchinventy
The document summarizes a study that evaluated the performance of three mobile ad hoc network (MANET) routing protocols: AODV, DSDV, and DSR. The protocols were simulated using the NS-2 network simulator across networks of 30 to 70 nodes. Key performance metrics analyzed include packet delivery fraction, average end-to-end delay, normalized routing load, and packet loss. The results found that AODV performed best in terms of packet delivery fraction and shortest end-to-end delay, while DSDV had the lowest normalized routing load and DSR had the lowest packet loss. Overall, the document compares the performance of these three MANET routing protocols under different conditions using simulation results.
A cross layer delay-aware node disjoint multipath routing algorithm for mobil...ijwmn
Mobile Ad Hoc Networks (MANETS) require reliable routing and Quality of Service(QoS) mechanism to
support diverse applications with varying and stringent requirements for delay, jitter, bandwidth, packets
loss. Routing protocols such as AODV, AOMDV, DSR and OLSR use shortest path with minimum hop
count as the main metric for path selection, hence are not suitable for delay sensitive real time
applications. To support such applications delay constrained routing protocols are employed. These
Protocols makes path selection between source and destination based on the delay over the discovered
links during routing discovery and routing table calculations. We propose a variation of a node-disjoint
Multipath QoS Routing protocol called Cross Layer Delay aware Node Disjoint Multipath AODV (CLDMAODV)
based on delay constraint. It employs cross-layer communications between MAC and routing
layers to achieve link and channel-awareness. It regularly updates the path status in terms of lowest delay
incurred at each intermediate node. Performance of the proposed protocol is compared with single path
AODV and NDMR protocols. Proposed CLDM-AODV is superior in terms of better packet delivery and
reduced overhead between intermediate nodes.
The document discusses the evolution of 3GPP's Long Term Evolution (LTE) radio technology and System Architecture Evolution (SAE). It describes the initial feasibility study in 2004 to develop a high-data-rate, low-latency packet-optimized radio access technology. Key requirements were identified for peak data rates, latency, capacity, throughput, spectrum efficiency, mobility, and more. Radio interface options were evaluated, leading to the selection of OFDM for the downlink and SC-FDMA for the uplink. The evolved UTRAN architecture was defined consisting of eNBs interconnected by the X2 interface.
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...ijwmn
1) The document discusses packet scheduling algorithms for LTE downlink systems that must operate under imperfect channel quality information (CQI) due to errors, delays, and other issues.
2) It proposes a new packet scheduling algorithm that uses a Kalman filter-based channel predictor in the frequency domain to estimate the true CQI from erroneous feedback, combined with a time domain grouping technique using proportional fair and modified largest weighted delay first algorithms.
3) Simulation results showed this approach achieves better performance than existing algorithms in terms of system throughput and packet loss ratio under imperfect CQI conditions.
Quality of Service for Video Streaming using EDCA in MANETijsrd.com
Mobile Ad-hoc network(MANET) is a collection of wireless terminals that are able to dynamically form a temporary network. To establish such a network no fixed infrastructure is required. Here, it is the responsibility of network nodes to forward each other's packets and thus these nodes also act as routers. In such a network resources are limited and also topology changes dynamically. So providing Quality of service(QoS) is also necessary. QoS is more important for real time applications for example Video Streaming. IEEE 802.11e network standard supports QoS through EDCA technique. This technique does not fulfill the requirements of QoS. So, in this project modified EDCA technique is proposed to enhance QoS for Video Streaming application. This technique is implemented in NS2 and compared with traditional EDCA.
Macro with pico cells (hetnets) system behaviour using well known scheduling ...ijwmn
This paper demonstrates the concept of using Heterogeneous networks (HetNets) to improve Long Term Evolution (LTE) system by introducing the LTE Advance (LTE-A). The type of HetNets that has been chosen for this study is Macro with Pico cells. Comparing the system performance with and without Pico cells has clearly illustrated using three well-known scheduling algorithms (Proportional Fair PF, Maximum Largest Weighted Delay First MLWDF and Exponential/Proportional Fair EXP/PF). The system is judged based on throughput, Packet Loss Ratio PLR, delay and fairness.. A simulation platform called LTE-Sim has been used to collect the data and produce the paper’s outcomes and graphs. The results prove that adding Pico cells enhances the overall system performance. From the simulation outcomes, the overall system performance is as follows: throughput is duplicated or tripled based on the number of users, the PLR is almost quartered, the delay is nearly reduced ten times (PF case) and changed to be a half (MLWDF/EXP cases), and the fairness stays closer to value of 1. It is considered an efficient and cost effective way to increase the throughput, coverage and reduce the latency.
3 gpp long term evolution (lte) transport block size and code ratetjuanmx
The document discusses how transport block size is calculated in LTE. It explains that the transport block size depends on the modulation and coding scheme (MCS) and number of resource blocks assigned to the user equipment. The size is determined by looking up the MCS index and transport block size index in 3GPP specification tables. For example, with an MCS index of 20 and 2 resource blocks, the transport block size is 776 bits. The code rate, or ratio of transmitted bits to maximum possible bits, is also calculated as an example.
The network layer is concerned with routing packets from the source to the destination across multiple networks. It must understand the topology of connected networks and choose optimal paths while avoiding overloading some lines. The network layer provides either connection-oriented or connectionless services to the transport layer and deals with differences when sources and destinations are in different networks. Dynamic routing algorithms like distance vector routing are used to adaptively route packets based on current network conditions.
Differentiated Classes of Service and Flow Management using An Hybrid Broker1IDES Editor
Recently, mobile networks have been overloaded
with a considerable amount of data traffic. The current paper
proposes a management service for mobile environments,
using policies and quality metrics, which ensure a better usage
of network resources with a more fine-grained management
based on flows with different classes of service and
transmission rates. This management of flows is supported
through a closed innovative control loop among a flexible
brokerage service in the network, and agents at the mobile
terminals. It also allows the terminals to make well-informed
decisions about their connections to enhance the number of
connected flows per technology and the individual service level
offered to each flow. Our results indicate that the proposed
solution optimizes the usage of available 4G network resources
among a high number of differentiated flows in several
scenarios where access technologies are extremely overloaded
whilst protecting, through a low complexity scheme, the flows
associated to users that have celebrated more expensive
contracts with their network operators.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
The document discusses various layers and concepts in computer networks and internetworking. It covers the network layer and its responsibilities in delivering packets from source to destination. It then discusses services provided by the network layer to the transport layer, including connection-oriented and connectionless services. Various routing algorithms and concepts are covered such as distance vector routing, link state routing, hierarchical routing, flooding, shortest path algorithms, broadcast routing, and multicast routing.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Improving Performance of TCP in Wireless Environment using TCP-PIDES Editor
Improving the performance of the transmission
control protocol (TCP) in wireless environment has been an
active research area. Main reason behind performance
degradation of TCP is not having ability to detect actual reason
of packet losses in wireless environment. In this paper, we are
providing a simulation results for TCP-P (TCP-Performance).
TCP-P is intelligent protocol in wireless environment which
is able to distinguish actual reasons for packet losses and
applies an appropriate solution to packet loss.
TCP-P deals with main three issues, Congestion in
network, Disconnection in network and random packet losses.
TCP-P consists of Congestion avoidance algorithm and
Disconnection detection algorithm with some changes in TCP
header part. If congestion is occurring in network then
congestion avoidance algorithm is applied. In congestion
avoidance algorithm, TCP-P calculates number of sending
packets and receiving acknowledgements and accordingly set
a sending buffer value, so that it can prevent system from
happening congestion. In disconnection detection algorithm,
TCP-P senses medium continuously to detect a happening
disconnection in network. TCP-P modifies header of TCP
packet so that loss packet can itself notify sender that it is
lost.This paper describes the design of TCP-P, and presents
results from experiments using the NS-2 network simulator.
Results from simulations show that TCP-P is 4% more
efficient than TCP-Tahoe, 5% more efficient than TCP-Vegas,
7% more efficient than TCP-Sack and equally efficient in
performance as of TCP-Reno and TCP-New Reno. But we can
say TCP-P is more efficient than TCP-Reno and TCP-New
Reno since it is able to solve more issues of TCP in wireless
environment.
This document discusses how the theoretical peak throughput of 300 Mbps for LTE systems is calculated. It begins by introducing some of the key concepts in LTE including Long Term Evolution (LTE), the LTE architecture, and duplexing methods like Frequency Division Duplexing (FDD) and Time Division Duplexing (TDD). It then explains how parameters of the LTE physical layer such as bandwidth, modulation, coding rate, and multiple-input multiple-output (MIMO) techniques impact the calculation of throughput. The document demonstrates throughput calculations for both FDD and TDD systems using these parameters and assumptions from the 3GPP specifications. It concludes by showing example calculations of downlink and uplink throughput for 20
This document presents a QoS-based packet scheduling algorithm for hybrid wireless networks. It proposes using the Earliest Deadline First (EDF) algorithm to schedule packets for online conference applications and the Least Slack Time First algorithm to schedule packets for online video applications. The goal is to reduce transmission delay and improve QoS. It implements this scheduling approach using the NS2 network simulator. The scheduling algorithm classifies packets by application type and places them in queues. EDF and Least Slack Time are then used to schedule packets from each queue to minimize delay for multimedia applications over hybrid wireless networks.
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIJCNCJournal
This document proposes an improved quality of service protocol for real-time traffic in mobile ad hoc networks. It presents a modified version of the AODV routing protocol that provides two key improvements: 1) A balanced best-effort traffic aware route discovery mechanism that selects paths with lower ratios of best-effort packets to minimize their impact on real-time traffic. 2) A packet forwarding procedure that gives transmission priority to real-time packets by transmitting them immediately from the queue while best-effort packets have to wait, improving throughput for real-time applications. Simulation results show the proposed protocol performs better than basic AODV in terms of throughput and delay for real-time traffic.
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
The quality of service is a need in recent computer network developments. The present paper evaluates some characteristics in a proposed network topology such as dropped packets and bandwidth use, using two traffic sources, firstly a VoIP source over an UDP agent, then a CBR traffic source over an UDP agent as well as the previous one. Two possible configurations are proposed, implementing both of them in the Network Simulator, and implementing in one of them differentiated services to compare the results. Statistics results are shown, in both cases showing the accumulative dropped packet number and the throughput in the link, obtaining a reducer number of dropped packets in the stage with differentiated services, and an improvement in the bandwidth use.
The document proposes a WFQ-based dynamic bandwidth allocation framework for mobile WiMAX applications. It uses a packet scheduler scheme, call admission policy, and dynamic bandwidth allocation mechanism. Bandwidth is dynamically allocated based on a BVal parameter, which considers fairness, utilization, and delay bound. Packet scheduling is done in two tiers - the first uses EDF, WFQ, WFQ, and RR for different traffic classes, while the second uses WFQ. This architecture aims to provide quality of service support in a fair manner for different traffic types.
A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...ijdpsjournal
The key concern on the bandwidth allocation and scheduling for non real time traffic are the fulfillment of its minimum throughput requirement and improvement of bandwidth utilization with acceptable delay. This paper proposes a simple and efficient scheduling framework for allocating bandwidth to non real time
polling service (nrtPS) users in IEEE 802.16 networks. In this framework, jointly selective repeat ARQ at the MAC layer and adaptive modulation and coding techniques at the physical are considered. Numerical simulations demonstrate that the proposed scheduling approach provides a graceful compromise between bandwidth utilization and packet delivery delay while maintaining the minimum throughput requirements of nrtPS applications. Thus proves the efficiency of the proposed framework. The simulation is done for unicast scenario.
This document discusses an efficient CSFQ (Eff-CSFQ) algorithm proposed for congestion management that improves upon regular CSFQ. It summarizes existing queuing techniques like RED, FRED, and CSFQ that are used to control packet transmission and dropping. The proposed Eff-CSFQ combines priority queuing and max-min fairness with CSFQ, treating real-time traffic like VoIP as higher priority and using multiple queues for such flows at core routers. This improves fairness and avoids congestion compared to the single FIFO queue used in regular CSFQ. The document aims to simulate and analyze the performance of Eff-CSFQ versus regular CSFQ, RED and FRED using metrics like packet delivery fraction, end-to
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...ijasuc
This paper proposes a fair and efficient QoS scheduling scheme for IEEE 802.16 BWA systems that
satisfies both throughput and delay guarantee to various real and non-real time applications. The proposed
QoS scheduling scheme is compared with an existing QoS scheduling scheme proposed in literature in
recent past. Simulation results show that the proposed scheduling scheme can provide a tight QoS
guarantee in terms of delay, delay violation rate and throughput for all types of traffic as defined in the
WiMAX standard, thereby maintaining the fairness and helps to eliminate starvation of lower priority
class services. Bandwidth utilization of the system and fairness index of the resources are also
encountered to validate the QoS provided by our proposed scheduling scheme.
QOS-BASED PACKET SCHEDULING ALGORITHMS FOR HETEROGENEOUS LTEADVANCED NETWORKS...ijwmn
The number of LTE (Long-Term Evolution) users and their applications has increased significantly in the
last decade, which increased the demand on the mobile network. LTE-Advanced (LTE-A) comes with many
features that can support this increasing demand. LTE-A supports Heterogeneous Networks (HetNets)
deployment, in which it consists of a mix of macro-cells, remote radio heads, and low power nodes such as
Pico-cells, and Femto-cells. Embedding this mix of base-stations in a macro-cellular network allows for
achieving significant gains in coverage, throughput and system capacity compared to the use of macrocells only. These base-stations can operate on the same wireless channel as the macro-cellular network,
which will provide higher spatial reuse via cell splitting. Also, it allows network operators to support
higher data traffic by offloading it to smaller cells, such as Femto-cells. Hence, it enables network
operators to provide their growing number of users with the required Quality of Service (QoS) that meets
with their service demands. In-order for the network operators to make the best out of the heterogeneous
LTE-A network, they need to use QoS-based packet scheduling algorithms that can efficiently manage the
spectrum resources in the HetNets deployment. In this paper, we survey Quality of Service (QoS) based
packet scheduling algorithms that were proposed in the literature for the use of packet scheduling in
Heterogeneous LTE-A Networks. We start by explaining the concepts of QoS in LTE, heterogeneous LTE-A
networks, and how traffic is classified within a packet scheduling architecture for heterogeneous LTE-A
networks. Then, by summarising the proposed QoS-based packet scheduling algorithms in the literature for
Heterogeneous LTE-A Networks, and for Femtocells LTE-A Networks. And finally, we provide some
concluding remarks in the last section.
QoS-based Packet Scheduling Algorithms for Heterogeneous LTE-Advanced Network...ijwmn
The number of LTE (Long-Term Evolution) users and their applications has increased significantly in the last decade, which increased the demand on the mobile network. LTE-Advanced (LTE-A) comes with many features that can support this increasing demand. LTE-A supports Heterogeneous Networks (HetNets) deployment, in which it consists of a mix of macro-cells, remote radio heads, and low power nodes such as Pico-cells, and Femto-cells. Embedding this mix of base-stations in a macro-cellular network allows for achieving significant gains in coverage, throughput and system capacity compared to the use of macrocells only. These base-stations can operate on the same wireless channel as the macro-cellular network, which will provide higher spatial reuse via cell splitting. Also, it allows network operators to support higher data traffic by offloading it to smaller cells, such as Femto-cells. Hence, it enables network operators to provide their growing number of users with the required Quality of Service (QoS) that meets with their service demands. In-order for the network operators to make the best out of the heterogeneous LTE-A network, they need to use QoS-based packet scheduling algorithms that can efficiently manage the spectrum resources in the HetNets deployment. In this paper, we survey Quality of Service (QoS) based packet scheduling algorithms that were proposed in the literature for the use of packet scheduling in Heterogeneous LTE-A Networks. We start by explaining the concepts of QoS in LTE, heterogeneous LTE-A networks, and how traffic is classified within a packet scheduling architecture for heterogeneous LTE-A networks. Then, by summarising the proposed QoS-based packet scheduling algorithms in the literature for Heterogeneous LTE-A Networks, and for Femtocells LTE-A Networks. And finally, we provide some concluding remarks in the last section.
This document summarizes a research paper that proposes a clustered conduction of VoIP routing (CCVR) topology for 802.11 wireless local area networks to improve quality of service. The CCVR topology clusters VoIP data packets into different buffers based on their properties. It introduces a novel scheduling mechanism to differentiate packet loss and transmission delay. Simulation results showed that the CCVR approach achieved better frame delivery ratios and less frame overhead compared to existing single buffer and scheduling strategies. The clustering and prioritization of buffers and adaptive scheduling of traffic flows helped meet various quality of service guarantees for delay, packet loss and bandwidth utilization.
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSijscmcj
6LowPAN was introduced by the IETF as a standard protocol to interconnect tiny and constrained devices
across IPv6 clouds. 6LowPAN supports a QoS feature based on two priority bits. So far, little interest has
been granted and this QoS feature and there are no implementations of such feature in real networks. In
this paper,we evaluate the capacity to provide QoS of these priority bits in various scenarios. We show that
under very heavy or very low network load, these bits have a limited effect on the delay
Choosing the best quality of service algorithm using OPNET simulationIJECEIAES
The concept of quality of service (QoS) is a new computer technology. Previously, there was a slow internet connection to access the sites and it was slow to send information. But now, it requires speeding up the traffic and increasing the efficiency for audio and video. In this study, we discuss the concepts of QoS provided over the network to achieve these goals. This study aims to compare six algorithms to control the QoS, then, the best algorithm will be selected to improve the traffic. These algorithms are named first in first out (FIFO), priority queuing (PQ), custom queuing (CQ), CQ with low latency queuing (LLQ), weighted fair queuing (WFQ), WFQ with low latency queuing (LLQ), so the behavior of these algorithms can be measured. The results obtained by comparing between them using OPNET simulation show that the best algorithm is the priority queuing algorithm, followed by CQ, then CQ with LLQ, then WFQ, then WFQ with LLQ and finally FIFO. All these results are plotted in the form of graphs to show the paths of these algorithms for the single state with an operation time of 5 minutes for each algorithm.
PERFORMANCE COMPARISON OF PACKET SCHEDULING ALGORITHMS FOR VIDEO TRAFFIC IN L...ijmnct
In this paper we have studied downlink packet scheduling algorithms proposed for LTE cellular networks.
The study emphasize on three most promising scheduling algorithms such as: FLS, EXP rule and LOG rule.
The performance of these three algorithms is conducted over video traffic in a vehicular environment using
LTE-Sim simulator. The simulation was setup with varying number of users from 10 - 60 in fixed bounded
regions of 1 km radius. The main goal this study is to provide results that will help in the design process of
packet scheduler for LTE cellular networks, aiming to get better overall performance users. Simulation
results show that, the FLS scheme outperforms in terms of average system throughput, average packet
delay, PLR; and with a satisfactory level of fairness index.
This document discusses quality of service (QoS) techniques for managing bandwidth and latency requirements of different network applications like VoIP. It covers class of service and type of service fields which allow grouping of packet flows. It also discusses queuing techniques like weighted fair queuing, priority queuing, and custom queuing which allow controlling bandwidth allocation to different traffic types. Packet classification methods like IP precedence and policy routing are also covered which allow setting priority levels for traffic.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document presents a novel approach for minimizing delay and load in wireless networks (WiMAX) developed by Shilpa Mehta et al. It begins by introducing WiMAX and discussing challenges in providing quality of service. It then proposes a new scheduling algorithm called QOS Recovered that aims to minimize delay and load by fixing queue size and number of packets. The algorithm is compared to the existing weighted fair queuing algorithm through simulation. The document provides background on scheduling in WiMAX and discusses common scheduling strategies and algorithms. It also describes using the OPNET simulator to model the wireless network and evaluate the new algorithm's performance.
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...ijcnac
The key QoS parameters for VoIP are delay, jitter and loss. In the Internet, VoIP requires
the underlying packet switched network to minimize the impact of these parameters. A
major contributing factor in this regard is traffic engineering carried out by scheduling
algorithms. This paper studies the behavior of different types of scheduling algorithms on
the delay, jitter and loss QoS parameters. The performance evaluation involves
identifying the scheduling algorithms which are most suitable for VoIP communications.
The result from the analysis also shows the impact of the QoS parameters on VoIP over
the Internet.
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
WiMAX network introduces a multimedia data scheduling service with different quality of service (QoS) requirements. Transmission opportunities are scheduled by the service according to the types of traffic data for the different connections or users. In the paper, we first propose a uniform definition of QoS level for the multimedia data types in the service. The QoS level of a connection are determined by the type of data of the connection and its allocated resources. Based on these QoS levels, we propose a call admission control (CAC) scheme for the entry admission of a new connection without degrading the network performance and the QoS of ongoing connections. The key idea of this scheme is to regulate the arriving traffic of the network such that the network can work at an optimal point, given under a heavy load traffic. Taking advantage of the simulation experiments, we confirm the fact that the proposed scheme can achieve better trade-off between the overall performance of network system and the QoS level of individual connection.
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
This document summarizes research on resource allocation algorithms for quality of service (QoS) optimization in mobile WiMAX networks. It discusses the Swapping Min-Max (SWIM) algorithm and Cooperative Multicast Scheduling (CMS) technique. SWIM performs scheduling for real-time polling service to meet QoS criteria like optimal throughput, latency guarantees, minimal delay jitter and number of bursts. CMS enhances throughput for multicast video by dividing transmission bursts into two phases where selected stations retransmit to nearby members for cooperation. Simulation results show SWIM has less bursts, zero jitter and optimal throughput, while CMS further improves throughput for each multicast group member.
Similar to Two-level scheduling scheme for integrated 4G-WLAN network (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2633 - 2643
2634
The main contributions of this paper are proposing a novel framework for the scheduling scheme to
ensure end-to-end QoS is intact over the integrated networks; and finding a solution for bottleneck in
the 4G-WLAN integrated network through creating a scheduling algorithm to transfer traffic from 4G to
WLAN back and forth, taking into consideration requirements of Actual Time (AT) and Non-Actual Time
(NAT) traffic.
2. SCHEDULING MECHANISM
Different types of queuing scheduling disciplines are offered to control packets transmitting and
dropping. These different kinds of scheduling have an effect on the latency by determining how long a packet
waits to be transmitted [7]. A queue scheduling is applied to the output port of the routers. IETF presents
several scheduling types. However, this work focusses on only some of them, such as Priority Queuing (PQ),
Class Base Queuing (CBQ), and Deficit Round Robin Queuing (DRR). In Priority Queuing, the packets are
first classified by the system; then they are located into different priority queues. Packets are scheduled from
the head of a given queue starting with the highest priority to the low priority [8]. Low priority packets will be
scheduled only if the whole queues of higher priority are empty. Packets are scheduled in First In First Out
(FIFO) order with each of the priority queues as shown in Figure 1.
Figure 1. Priority queuing (PQ)
PQ has been modified to serve AT applications in a better way that ensures processing flows in short
delay by adding rate control, which enables configuring the ratio of each priority queue. This modified queuing
discipline is called controlled Priority Queuing (CPQ), which is presented in more details in Section IV. Deficit
Round Robin Queuing (DRRQ) is a scheduling algorithm used to process the traffic in queues based on their
weights, packet size, and counter. It supports the arbitration of output port bandwidth on high-speed interfaces
in both the core and at the edges of the network. In this type of queuing, each queue is configured with various
parameters: A weight is the ratio of the output port bandwidth assigned to the queue. A Deficit Counter
specifies the number of allowed bytes for the queue to transmit when is visited by the scheduler. It permits
the queue that was not allowed to transmit in the previous round because the value of DeficitCounter was
smaller than the packet at the head of the queue to save transmission "credits" and use them in the next
round [9, 10]. A quantum of service is related to the weight of the queue and is expressed in terms of a number
of bytes. The Deficit Counter for a queue is reduced by the quantum each time the scheduler visits the queue.
If quantum [i]= 2* quantum[x], then queue i will get twice the bandwidth as queue x in case both queues
are active.
IP Quality of Service (QoS) : Internet Engineering Task Force (IETF) has offered two approaches to
provide the end-to-end QoS on IP: Integrated Services (IntServ) and Differentiated Services (DiffServ) [11].
IntServ has some limitations, so Diffserv has been projected to solve these limitations [12]. Four standards of
Per Hop Behavior (PHBs) in Diffserv were identified by the IETF to offer different levels of classes in order
to guarantee the QoS [13, 14]. PHB is defined as the forwarding behavior that is identified to a Differentiated
Services Code Point (DSCP), and states to packet scheduling and queuing or shaping the behavior of a node
on any given packet. The four standards PHBs are Default Per Hop Behavior, Class-Selector Per Hop Behavior
(CS), Assured Forwarding (AF), and Expedited Forwarding PHB (EF). Default PHB has characteristic of Best
Effort service and it is dedicated to any packets that do not achieve the requirements of any other standards.
3. Int J Elec & Comp Eng ISSN: 2088-8708
Two-level scheduling scheme for integrated 4G-WLAN network (Mohammed Qasim Taha)
2635
CS PHB is used to maintain backward compatibility with network devices which still uses the Precedence field.
AF is used to ensure a certain bandwidth, and there are four classes: AF1, AF2, AF3, and AF4. Each class has
three possibilities of drop levels: high, medium, and low. EF is the last standard and it is used to offer low
packet loss, low jitter, a minimum delay, and certain bandwidth service. Therefore, it is typically used for delay
sensitive applications, such as Voice over IP (VoIP) [15, 16].
3. PROPOSED METHODOLOGY
The proposed scheduling scheme is built to enhance the performance of the WLAN-4G integrated
network. The object of this framework is to optimize network by getting acceptable packet loss and delay for
AT applications and a reasonable ratio of packet loss for NRT applications. It is important to clearly define AT
and NAT traffic or applications before presenting the details of this scheme. The AT traffic is the traffic that
is very sensitive to time and delay, so time and delay play important role in using AT application successfully.
There is a precise required value for the delay and beyond this value, the traffic will not deliver properly.
For example, Voice over IP (AT applications) has a specific value of delay, so in case of this value become
higher than the rated level, the users might not be able to comprehend the communication. On the other hand,
the NAT traffic doesn’t care much about time or delay, therefore users can successfully use the NAT
applications even if it takes a longer than predictable time. For instance, Email is an example of NAT traffic,
the important point for users is to deliver and obtain the email and delay is not critical, as long as the e-mail
successfully delivers to the destination. The proposed method is done by separating incoming traffic into AT
and NAT through the classifier, and further using a different queuing scheme to split those traffic based on
the type of service in two stages. In the first stage, Deficit Round Robin (DRR) queuing and Class-Based
Queuing (CBQ) are used to deliver AT and NAT traffic themselves, respectively. Then to schedule and
differentiate AT and NAT flows based on their category and the relevant assigned ratio of bandwidth for each
class. To distinguish AT from NAT traffic classes, Control- Priority Queuing (CPQ) is used as the second stage
by giving the AT flows an appropriate weight and higher priority as presented in Figure 2.
Figure 2. The proposed two-level scheduling scheme
Based on kind of traffic, packets are categorized into AT and NAT flows. Therefore, there are two
queues, AT queue which includes sensitive to delay applications, such as interactive online gaming, voice,
video while NAT includes low or non-sensitive to delays application. Then, each class is assigned diverse
ratios of bandwidth to be scheduled. A higher ratio of AT bandwidth (Y %) is given to Average Sensitive
Actual Time Traffic (ASATT) as shown in Figure 2. While the lower ratio of bandwidth (X %) is assigned to
Extremely Sensitive Actual Time Traffic (ESATT) as compared with Y % since the ESATT class includes
voice applications that need less bandwidth than do video applications. In case of AT traffic, Deficit Round
Robin (DRR) is used in the first stage to differentiate and schedule AT flows based on their type and allocated
ratio of bandwidth for each class. Both AT classes (ESATT, and ASATT) have many requirements, one of
them is to be transmitted within a specific range of delay. Therefore, each AT class is set a certain weight of
bandwidth, and these given bandwidths depend on traffic’s characteristic that it serves and range of packet
sizes. In DRR, weight for bandwidth in each class is represented by the number of bits instead of packets and
a deficit counter is used to count precisely the assigned number of bits to be scheduled for each queue.
The mechanism of DRR is to allocate weight for flows, represented as bits in the deficit counter.
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2633 - 2643
2636
Thus, the deficit counter conducts a comparison between the head packet size in bits in flow with the assigned
numbers of flows in the counter. The packet will be moved if the head packet’s bit number is less than or equal
to the number in the counter. If not, the packet will process in the next cycle. Since there are differences in
flow weights and packet sizes, some flows are sent before others in each cycle. For example, the ESATT flow
may be processed before the ASATT flows because ESATT flows process voice while ASATT flows process
video application packets, which has large packet sizes [17].
The NAT applications are considered as non-sensitive to delay applications and include many types
such as File Transfer Protocol (FTP), Hypertext Transfer Protocol (HTTP), Email, .etc. Although NAT traffic
is not sensitive to delay, each application has its own requirements. Therefore, a Class-Based Queuing (CBQ)
is used to distinguish among different NAT traffic and to give each group of traffic an appropriate ratio of
bandwidth. In this mode, NAT traffic is divided into two forms: Minor Sensitive Traffic (MST) and
Non-Sensitive Traffic (NST). MST traffic preserves the higher ratio of bandwidth (A %) while NST traffic
takes the lower one (B %).
#Algorithm 1: scheduling scheme#
1: Start
2: Receiving Traffic (R)
3: If R== ATT? Then //R: Receiving Traffic ATT: Actual Time traffic
4: {
5: If AT==ESATT? Then // ESATT: Extremely Sensitive Actual-Time Traffic
6: {
7: ESATT=X% bwt // bwt: Total Bandwidth
8: Else {
9: ASATT=Y% bwt //ASATT: Average Sensitive Actual-Time Traffic
10: }}
11: Schedule based on DRR //DRR: Deficit Round Robin
12: Go to step 22
13: Else {
14: R=NAT //NAT: Non Actual-Time
15: If NRT== MST? Then //MST: Minor Sensitive Traffic
16: {
17: MST= A% bwt
18: Else {
19: NST=B% bwt
20: }}
21: Schedule based on CBQ //CBQ: Class-Based Queuing
22: Give priority level ESATT=1, ASATT=2, MST=3, NST=4
23: Schedule based on CPQ // CPQ: Control- Priority Queuing
24: Output
25: End
The object of allocating a higher bandwidth to the MST class is because it serves a number of NAT
applications and many of them have a large packet size. In CBQ, each type of class will be provided by
a minimum ratio of bandwidth in case of congestion [18]. For instance, if we assign A% and B% of bandwidth
ratio for MST and NST, respectively, then A% of MST packets and B% of NST packets will be scheduled
through the output port in each round of scheduling. In the last stage (second stage), Control- Priority Queuing
(CPQ) is used as the gateway scheduler for NAT and AT flows. The CPQ is a developed scheduling scheme
of PQ. In CPQ, packets are scheduled according to the priority level and a controller, which might be
a percentage of bandwidth. The mechanism of CPQ is giving each AT application an appropriate level of
priority to be scheduled over NAT application which depends on the ratio of given bandwidth and priority
level. For example, ESATT has a superior chance to transmit and deliver over the other classes (ASATT, MST,
and NST) because ESATT has a higher priority level. Nevertheless, if the ratio of bandwidth Y% is completely
occupied, the scheduler will change to other types of traffic and goes back to HSATT. The scheduling scheme
is illustrated in detail in Algorithm 1, and its flowchart is presented in Figure 3. In brief, the proposed scheme
can provide the QoS requirements of the integrated 4G-WLAN network and make outstanding improvements
for AT traffic (VoIP, video conferencing, etc.) and suitable changes for NAT traffic The weights percentage
for bandwidth is adaptive to achieve the requirements of network customers [19].
5. Int J Elec & Comp Eng ISSN: 2088-8708
Two-level scheduling scheme for integrated 4G-WLAN network (Mohammed Qasim Taha)
2637
Figure 3. Flow chart of scheduling scheme
4. PROPOSED SOLUTION
The Optimized Network Engineering Tool (OPNET) Modeler is a very common commercial product
among the family of OPNET. It provides network modeling and simulation. In this paper, we used OPNET
version 18.0-PL2. In order to represent the proposed modules, four applications were used in the simulation
model: Voice over IP for HSATT; video conferencing for MSATT; File Transfer Protocol (FTP) for LST; and
Hypertext Transfer Protocol (HTTP) for NST. PCM quality speech with G.711 encoder scheme was used for
Voice over IP. To increase the congestion in the network, video conferencing parameter was configured at 30
frames/Sec with 2400 bytes for each frame. Also, to create further congestion in the network, a full load with
a file size of 1.7 MB and an Inter-request Time of 5 sec were configured for the FTP application. For HTTP,
heavy browsing with a page interval time of 65 Sec was set. Eight large images and 8 short videos were
configured for HTTP. The default of buffer size in OPNET was set as 500 packets. The purpose of increasing
the congestion in the network was to assess the network's performance in the worst case scenario.
The converged 4G-WLAN network is composed of two networks, the 4G network, and the WLAN network,
connected through an IP cloud as shown in Figure 4.
Figure 4. 4G-WLAN converged network
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2633 - 2643
2638
In 4G side, four UEs were used, one of UE was set as a source call, another one has used a source of
video calling, and the two others were assigned for HTTP and FTP. The eNodeB is connected to the backbone
and gateway router through the 10 BaseT link. The gateway router is connected to the HTTP and FTP servers
through the same type of link (10 Base T link). The LTE network was configured using following parameters
shown in Table 1.
Table 1. The parameters of the LTE network
Technique MIMO with one Antenna for input/output
Antenna Gain 15 dBi
Path Loss Free Space
Bandwidth 3MHz
While the WLAN side consists of four devices and one Access point (IEEE 802.11n ). Four UEs were
used, one of them was set as VoIP client and connected to the VoIP calling in the 4G network and the second
one was assigned as video client and connected to the video calling in 4G. The rest of UEs were assigned for
HTTP and FTP. These devices were configured with the same parameters as devices on the 4G side. The access
point was connected to the gateway router through the backbone. The network also connected to the FTP and
HTTP servers through a gateway router to provide HTTP and FTP services Figure 4. In this summation, we
conducted a comparison between two scenarios in order to test the proposed converged 4G-WLAN network.
Scenario1was the baseline scenario, which is the well-known QoS scheme for AT applications; Diffserv with
Priority Queuing. In, this scenario, different priority levels were assigned to different applications: the highest
level of priority is given to VoIP (EF), then Video Conferencing (AF41), and then FTP (AF21), and finally
the lowest priority was given to HTTP (CS0). For the 4G network (LTE), the Gold bearer (highest priority),
the Silver, Bronze were assigned to VoIP, video conferencing, and the FTP and HTTP, respectively. Scenario
2 was the implementation of our proposed scheduling scheme, that included implementation in the converged
4G-WLAN network. In this scenario, we set the same priority level of Diffserv and QCI as in Scenerio 1 [20].
However, the proposed scheduling scheme was implemented based on allocated bandwidth ratios. The ratios
of bandwidth were 16% for HTTP, 24% for FTP, 35% for video conference, and 25% for voice traffic.
The simulation was run for 10 mins.
5. RESULTS AND DISCUSSION
In order to evaluate the effect of scheme on the converged 4G-WLAN network, different metrics were
collected and analyzed such as Mean Opinion Score (MOS), end-to-end delay, jitter, and packet loss.
5.1. End-to-end delay
The end-to-end delay is one of the essential factors to evaluate the performance of the network.
Each type of AT applications (VoIP, Video Conferencing, etc) requires the specified range of end-to-end delay
which has to be less than the threshold assigned by Cisco and ITU. The threshold value of end-to-end delay
for video and voice is 150 ms [21]. If the value of delay becomes higher than the threshold, the end user will
notice a degradation in service. In this work, the end-to-end delay was collected for AT applications: video
and VoIP.
The average end-to-end delay for Voice over IP and video interactive application for the PQD and
the TLSS scenario are presented respectively in Figure 5 (a and b). Although the two lines of voice over IP are
within the suitable range delay, the delay is decreased from 135 to 120 msec when the proposed scheme is
implemented as explained in Figure 5 (a). The end-to-end delay line started with 129 msec and continue
increased to stabilize around the 138 msec from the 300th second until the end of the test time. However,
the line graph continued stable around 120 msec value along test time in the Voice over IP TLSS scenario.
Values of delay are more stable in TLSS rather than PQD , and there is a slight decrease in delay was observed.
This is expected result because the EF class granted a high priority for the VoIP application in the case of PQD
and higher priority with certain bandwidth in case of TLSS (the proposed scheme).
Figure 5 (b) demonstrates the average end-to-end delay (E2E) lines for video interactive application
for both scenarios. It is obvious there was a major improvement in the average packet end-to-end delay for
video. The value of E2E delay moved from the non-acceptable range (160 msec in the second 350 and 180
msec in the second 450) in case of the PQD scenario to an acceptable value (60 msec in the second 350 and 63
msec in the second 450) in the proposed scheme (TLSS). In summary, the E2E delay for the video was reduced
by 61%. This is because a certain weight of bandwidth (35%) was assigned and given to the video packets by
7. Int J Elec & Comp Eng ISSN: 2088-8708
Two-level scheduling scheme for integrated 4G-WLAN network (Mohammed Qasim Taha)
2639
DRR and CPQ in case of the proposed scheme. In contrast, video packets in the PQD scenario were not
guaranteed because the highest priority was given to voice over IP through the EF class while the video packets
were given the second priority level through AF41. Therefore, the video can be sent through the queue only in
case there is no voice packet in a queue. That means video packets might wait a long time in the PQD
scenario [22].
(a) (b)
Figure 5. Average End to End delay: (a). VoIP, (b). Video Conferencing
5.2. Jitter
Jitter or Delay Variation is a major metric for AT applications because it plays an important role to
determine the size of the best buffer for applications. The value of jitter for video and voice applications should
be less than 30 ms, and 25, respectively [23]. Average packet jitter for voice over IP and video applications for
the PQD and TLSS scenarios are presented in Figure 6. The figure shows that the values of Jitter for voice over
IP in both scenarios are within the acceptable range. In the case of PQD scenario, the value of jitter delay was
around 10 ms along the test time, but in case of TLSS scenario, the value started with 15 ms and then started
to increase until reach to the value 23 ms at the second 180 and then stable at around this value throughout
the test time. Even though the Voice over IP is assigned high priority level in both scenarios, but there was
an increase in jitter values in case of TLSS. This increase is predictable because in case of PQD the scheduler
will process all voice packets as long as there is a packet in the queue but in case of TLSS (proposed scheme),
the scheduler is moved to schedule other applications when the whole assigned voice bandwidth is occupied
as explained before.
Figure 6. Average Jitter (mSec) of Voice over IP for both Sceneries
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2633 - 2643
2640
The packet jitter of the video interactive application for both sceneries is shown in Figure 7.
In the case of the baseline scenario, jitter values increased gradually until it reached the value of 162.5 ms in
the 400th second and then continued around this value along the rest of the test time. This happens because
there is a positive relationship between the values of delay and test time, the number of packets is increased by
forwarding the simulation time. Therefore, the delay variation of interactive video will increase, especially if
a queue contains on voice packets. Yet, there is a significant improvement when the proposed scheme is
applied. The delay reduced from 150 to 6 ms in the 300th second. When the proposed scheme is implemented,
the delay was improved and moved from a non-acceptable to an acceptable range. The reason behind this
remarkable improvement is because, in the PQD Scenario, the video packets has a chance to be delivered only
if there are no voice packets in 6the queue while in TLSS Scenario, the chance for video packets to send is
higher since the ratio of bandwidth is booked for video application. The quality of voice is measured by
mea tric called Mean Opinion Score (MOS). The MOS is sca ale that starts with scale 1 and scscales.
One means the lowest quality while five represents the highest quality [21].
If the value of MOS becomes lower than 2, then the voice becomes useless and the value is considered
unacceptable by end users [24]. Figure 7 (b) shows the values of MOS for Voice over IP in case of the proposed
scheme. In this simulation, G.712 codec scheme was used for the Voice over IP application. Based on
the standard for G.712 codec, the desired value of MOS is 4. In TLthe SS scenario, the desired value was
achieved as shown in Figure 8. The MOS value starts with 4 at the initial simulatino time, and then stable
around 4.1 during simulation time.
(a) (b)
Figure 7. (a) Average jitter (mSec) of interactive video for PQD and TLSS, (b) Mean opinion score (MOS)
5.3. Traffic loss for at applications
Traffic loss is the amount of lost traffic from the source to the destination. It usually measured in ratio,
so the amount of lost traffic is divided on sent traffic according to (1).
Traffic Loss %= Source traffic– received traffic / Source traffic.× 100% (1)
The average voice over IP traffic sent/received lines for the PQD and TLSS scenario in the WLAN-
4G network are shown in the Figure 8 (a). It is obvious there is no traffic loss happened in both scenarios,
the reason behind that because voice application has been given the higher priority in both scenarios. One of
the voice application’s requirements is that the traffic loss should be zero, so the proposed scheme achieved
this main requirement. Average Traffic Sent/ Received of interactive video for PQD and TLSS scenarios are
presented in Figure 8 (b). In the use of PQD scenario, traffic loss occurs for in stand, in the 700th second
the value of sent traffic was around 108 Kbytes/sec while received traffic was around 80 Kbytes/sec. In other
words, the traffic loss ratio of interactive was around 26% in the use of PQD scenario. This loss ratio is in
the acceptable range for video applications based on Cisco and ITU [25]. This loss is because the interactive
video was given the second priority level and it has not given any specific ratio of bandwidth, so the video
packets are sent if and only if there are voice packets in the queue according to the mechanism of priority
queening scheduler. In contrast, in case of TLSS scenario, traffic loss ratio is zero, so there is no drop in traffic
because interactive video traffic has been assigned the highest ratio bandwidth (35%) with an assured priority
level. That means the video packets are guaranteed to be delivered even if there is a ingestion in the network.
9. Int J Elec & Comp Eng ISSN: 2088-8708
Two-level scheduling scheme for integrated 4G-WLAN network (Mohammed Qasim Taha)
2641
(a) (b)
Figure 8. (a) Average traffic sent, (b) Average interactive video traffic sent
5.4. Traffic loss ratio for NRT applications
Figure 9-a shows the average FTP traffic sent/received per second for the PQ and the TLSS scenarios.
As shown in Figure 8 (b), the values of traffic sent dropped at the receiver side throughout all the test time in
case of PQ scheme. For example, the value of traffic sent were around 480 and 570 Kbytes/sec in the second
300th and 700th respectively, while the traffic received 365 and 490 Kbytes/sec at the same mentioned seconds.
The traffic loss ratio was around 15-22%. However, the traffic loss ratio reduced remarkably when the proposed
scheme is implemented. As presented in the Figure 9 (a), there is no major drop in traffic sent/received,
the loss ratio was almost zero. For example, in the 700th second, traffic sent was around 490 h, however,
the receivedraffic was around 488, so loss ratio was around 0-1%. The HTTP traffic sent/received for both
PQD and TLSS scheme is shown in Figure 9 (b). In the case of the PQD scenario, there is a noticeable traffic
loss during the test time. For example, the traffic sent were 50 and 62 Kbytes/sec in the 300th and 700th
seconds, while the traffic received were 37 and 48 Kbytes/sec, in the 300th and 700th seconds, respectively.
Therefore, the ratio loss was around 22-26%. Nevertheless, (TLSS), an improvement happened in traffic loss
in case of the proposed scheme. For instance, in the 300th and 700th seconds, the traffic sent was 35 and
42 Kbytes/sec while the traffic received was 32 and 41 Kbytes/sec, respectively.
(a) (b)
Figure 9. (a) Average FTP Traffic sent/received, (b) Average HTTP traffic sent/received
That means, the drop range became approximately 7-9 % instead of 22-27%. This improvement
occurred because this application was assigned certain bandwidth for this application to schedule the packets.
Although there is a slight improvement in the traffic loss in the proposed scheme, the traffic was not stable and
also traffic loss was not with acceptable value because this class was given the lowest level of priority and
a small weight for the bandwidth. In case of increased congestion in the network, the higher priority is going
to RT applications such as Voice and Video.
10. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2633 - 2643
2642
5.5. Throughput in the network
The throughput of the network is defined as the quantity of data rate that is produced by
a network [26]. We collected two types of throughput: 4G Downlink Throughput and WLAN Throughput.
The throughput of LTE and WLAN for both scenarios is shown in Figure 10. Based on this figure,
the throughput of LTE and WLAN has been improved when the proposed scheme (TLSS) is implemented.
For LTE Side, throughput increased from 3150 to 3420 Kbits/Sec in the 700th second as shown in Figure 10.
Like throughput for LTE, throughput for WLAN side has also increased from 1650 to 1910 Kbits/Sec in
the 700th. We notice also the throughput of WLAN in case of TLSS has not been improved in the first
50 seconds of the test time while it is increased and improved instantly for the LTE side.
Figure 10. Average throughput (Kbits/sec) for LTE downlink and WLAN for both scenarios
This occurs because there is no congestion in the first 55 seconds for WLAN while the congestion
occurred at the beginning in the LTE network. The configuration of most applications was set to increase as
the time passed. The scheduling in the PQD scenario could not reduce the congestion; on the other hand,
the proposed scheme (TLSS) tried to alleviate the congestion. In other words, when the packet loss and delay
are reduced, the throughput is increased. As a result, the throughput increased by 8.5% in (4G) LTE and 15%
for WLAN. The improvement in throughput resulted from reducing in delay and packet loss when the proposed
scheme was implemented. There is a relation between the throughput and traffic loss and delay.
The (2) explains the relationship between 𝑃 and the data rate.
𝑃 = (𝑙 − 𝑅) ∗ 𝑡 (2)
Where: R is data rate (bytes/sec), t is time (sec), 𝑃 is available Packets in queue multiplied by their size (bytes)
According to (2), the relationship between P and R is in inverse e-relationship when 𝑙 assumed constant.
Ideally, if the arrival rate equal to the data rate (R= 𝑙), it means there is no queue or there is no packets stored,
in other words, the delay of packet queuing is equal to zero. Substituting (2) in 1 would yield (3).
𝐷 =
(𝑙−𝑅)∗𝑡
𝑙
𝑅 =
(𝑡−𝐷)∗𝑙
𝑡
(3)
Based on (3), the data rate is in an inverse relationship with the queuing delay, meaning the service
data rate increases when the queuing delay decreases.
6. CONCLUSION
In this paper, a scheduling scheme for a 4G-WLAN converged network have been proposed.
The mechanism of this scheduling is to separate traffic based on their types into AT and NAT. The traffic
crosses through the DRR in case of AT applications and CBQ for NAT. CPQ then transports the packets based
on the allocated bandwidth and priority level. The proposed scheme has been applied in the 4G-WLAN
converged network in order to improve its performance. Several metrics (end to end delay, MOS, Jitter, Packet
loss, and throughput) have been collected to evaluate the performance of this converged network. Simulation
results have presented obvious improvements for AT applications. The delay of ESATT traffic (e.g. VoIP) is
11. Int J Elec & Comp Eng ISSN: 2088-8708
Two-level scheduling scheme for integrated 4G-WLAN network (Mohammed Qasim Taha)
2643
in an acceptable range, and the value of MOS is in the "very good" score range. The packet loss of video
applications (MSRTT) was reduced and became almost zero, so the delay improved by 61%. For NAT,
the packet loss ratio changed from 15-22% to 1-zero for FTP and 22-26% to 7-9% for HTTP. Finally,
throughput increased by 8.5 % for 4G and 15% for WLAN networks.
REFERENCES
[1] Raul Palacios-Trujillo, et al., “Performance Analysis of a Burst Transmission Mechanism Using Microsleep
Operation for Green IEEE 802.11 WLANs,” Applied Science MDPI, vol. 7, no. 7, p. 744, 21 Jul. 2017.
[2] M. Kaleem Iqbal, et al., “4G Evolution and Multiplexing Techniques with Solution to Implementation Challenges,”
in Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC) 2012 International Conference, 2012.
[3] Mariya Ouaissa, and A. Rhattoy, “A New Scheme of Group-based AKA for Machine Type Communication over
LTE Networks,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 2,
pp. 1169-1181, 2018.
[4] T. Kaewkiriya, “Performance Comparison of Wi-Fi IEEE 802.11ac and Wi-Fi IEEE 802.11n,” 2nd International
Conference on Communication Systems, Computing and IT Applications CSCITA, Mumbai, 2017.
[5] Caba, C.M., and Soler, J, “APIs for QoS Configuration in Software Defined Networks,” in Proceedings of IEEE
NetSoft, 2015.
[6] E. G. N. a. I. S. V. S. I. Maniatis, “QoS Issues in the Converged 3G Wireless and Wired Networks,” IEEE
Communications Magazine, vol. 40, no. 8, pp. 44-53, Aug. 2002.
[7] Mustafa El Gili Mustafa, Samani A. Talab, “The Effect of Queuing Mechanisms First in First out (FIFO), Priority
Queuing (PQ) and Weighted Fair Queuing (WFQ) on Network’s Routers and Applications,” Wireless Sensor
Network, vol. 12, no. 6, pp. 77-84, 2010.
[8] Adarsh Sagar, T. G. Basavaraju, K. B. Surekha, “A Novel Technique to Enhance the Lifetime of Wireless Sensor
Networks through Software Realization,” International Journal of Electrical and Computer Engineering (IJECE),
vol. 8, no. 5, pp. 3839-3842, 2018.
[9] C. Semeria, “Supporting Differentiated Service Classes: Queue Scheduling Disciplines,” Juniper Network Inc.,
[Online], Available: http://www.hit.bme.hu/~jakab/edu/litr/QoS/scheduling_JUNIPER.pdf, Sunnyvale, 2001.
[10] Jitae Shin, Jong Won Kim and C. J. Kuo, “Quality-of-Service Mapping Mechanism for Packet Video in Differentiated
Services Network,” IEEE Transactions on Multimedia, vol. 3, no. 2, pp. 219-231, Jun. 2001.
[11] Mohammed Qasim Taha, Aymen Lpiza, "Design a New PWM Switching Technique in Multilevel Converters," IEEE
Connecticut Conference on Industrial Electronics Technology & Automation 2016, University of Bridgeport, CT,
United States of America, October 14–15, 2016.
[12] S. H. Zeeshan Ahmed, “Two-Level Scheduling Algorithm for Different Classes of Traffic in WiMAX Networks,”
in International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS),
Genoa, Italy., Jul. 2012,
[13] Nourchène Bradai, Lamia Chaari Fourati, Lotfi Kamoun, “WBAN data scheduling and aggregation under
WBAN/WLAN healthcare network,” Ad Hoc Networks, vol. 25, no. A, pp. 251-262, 2015.
[14] N. S. Chauhan and L. Kaur, “Implementation of QoS of Different Multimedia Applications in WLAN,” International
Journal of Computer Applications, vol. 62, no. 8, pp. 0875-887, Jan. 2013.
[15] S.F. Sulthana, R. Nakkeeran, “Performance Evaluation of Downlink Packet Scheduling for Real Time Traffic in LTE
system,” International Journal of Information and Communication Technology, vol. 10, no. 3, pp. 263-275, 2017.
[16] B. Rebekka, S. Sudheep, Malarkodi B., “Priority-Based Quality of Service Guaranteed Radio Resource Allocation
in Long Term Evolution Network,” International Journal of Information and Communication Technology, vol. 9,
no. 4, pp. 420-437, 2016.
[17] Joswill Victor P.R. and A. Esmailpour, “Integrated QoS provisioning for unified LTE-WiMAX networks,”
International Conference on Computing, Networking and Communications (ICNC), 2016, Kauai, HI, pp. 1-6, 2016.
[18] Abdullah Khalid Ahmed, et al., “On-road Automobile License Plate Recognition Using Co-Occurrence Matrix,”
Journal of Advanced Research in Dynamical & Control Systems, vol. 10, no. 7, 2018.
[19] Juwita Mohd Sultan, et al., “Integration of WiFi and WiMAX Services: Bandwidth Optimization and Traffic
Combination,” International Journal Web Applications, vol. 7, no. 3, pp. 95-107, 2015.
[20] Francesco Lucrezia, et al., “A Proposal for End-to-End QoS Provisioning in Software-Defined Networks,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 7, no. 4, 2017.
[21] Edgard Silva, et al, "Mean Opinion Score Measurements Based on E-model During a VoIP Call," in AICT 2015 :
The Eleventh Advanced International Conference on Telecommunications, 2015.
[22] L. Angrisani, et al., “Measurement of the IP Packet Delay Variation for a reliable estimation of the mean opinion
score in VoIP services," IEEE International Instrumentation and Measurement Technology Conference Proceedings,
Taipei, pp. 1-6, 2016.
[23] Ronald W. Wolff and Yi-Ching Yao, "Little’s law when the Average Waiting Time is Infinite," Queueing Systems,
vol. 76, no. 3, pp. 267-281, 2014.
[24] Robert C. Streijl, Stefan Winkler, and David S. Hands, "Mean Opinion Score (MOS) Revisited: Methods and
Applications, Limitations and Alternatives," Multimedia Systems, vol. 22, no. 2, pp. 213-227, 2016.
[25] M. Ghaleb, D. Chieng and A. T. Seh, "Preservation of QoS Across Hybrid LTE-WLAN Router," in Wireless
Communication Cluster, Malaysia Melaka, Jan. 2013.
[26] X. Xiao, M. Huang and W. Zhang, "Research and Improvement on Expected Throughput Metric in Wireless Mesh
Network," The 9th International Conference for Young Computer Scientists, 2008, Hunan, pp. 605-609, 2008.