SystemC - NS-2 Co-simulation using HSN
|
|
- Stephen Rice
- 8 years ago
- Views:
Transcription
1 Verona, 12/09/2005 SystemC - NS-2 Co-simulation using HSN Giovanni Perbellini 1 REQUIRED BACKGROUND 2 2 GOAL 2 3 WHAT IS SYSTEMC? 2 4 WHAT IS NS-2? 2 5 WHAT IS HSN? 3 6 HARDWARE-NETWORK COSIMULATION SYSTEMC-NS2 COSIMULATION INTERFACES NS SYSTEMC CASE STUDY (VOIP) SYSTEMC TRANSACTOR NS-2 TCL CODE EXECUTING THE HARDWARE-NETWORK COSIMULATION REFERENCES 11 1
2 1 Required Background Students interested in learning the cosimulation between SystemC and NS-2 are required to know the fundamentals of C/C++ language and basic concepts related to modeling and synthesizing digital systems. 2 Goal The goal of this lecture consists of describing the basic concepts related to the cosimulation between the SystemC language (to design an hardware device) and NS-2 simulator (to model a Network infrastructure). Students will learn to: design a SystemC VoIP device connected to the NS-2 Simulator; model a NS-2 UDP/IP Network connected to a SystemC design. 3 What is SystemC? SystemC is a C++ class library and a methodology that you can use to effectively create a cycle-accurate model of software algorithms, hardware architecture, and interfaces of your SoC (System On a Chip) and system-level designs. You can use SystemC and standard C++ development tools to create a system-level model, quickly simulate to validate and optimize the design, explore various algorithms, and provide the hardware and software development team with an executable specification of the system. An executable specification is essentially a C++ program that exhibits the same behavior as the system when executed. C or C++ are the language choice for software algorithm and interface specifications because they provide the control and data abstractions necessary to develop compact and efficient system descriptions. Most designers are familiar with these languages and the large number of development tools associated with them. The SystemC Class Library provides the necessary constructs to model system architecture including hardware timing, concurrency, and reactive behavior that are missing in standard C++. Adding these constructs to C would require proprietary extensions to the language, which is not an acceptable solution for the industry. The C++ object-oriented programming language provides the ability to extend the language through classes, without adding new syntactic constructs. SystemC provides these necessary classes and allows designers to continue to use the familiar C++ language and development tools. More Informations in [1] and [2]. 4 What is NS-2? NS (version 2) is an object-oriented, discrete event driven network simulator developed at UC Berkely written in C++ and OTcl (Tcl script language with Object-oriented extensions). It implements network protocols such as TCP and UPD, traffic source behavior such as FTP, Telnet, Web, CBR and VBR, router queue management mechanism such as Drop Tail, RED and CBQ, routing algorithms such as Dijkstra, and more. NS also implements multicasting and some of the MAC layer protocols for LAN simulations. More informations in [3] and [4]. 2
3 5 What is HSN? Modern embedded systems exhibit an increasingly large quantity of communication capabilities. The devices should be, often, casually accessible, mobile or embedded in the environment, sometimes in hostile conditions and connected to a network structure. The design of such a system involves two main aspects: the design of the system itself, in terms of hardware and software; and the design of the communication mechanism used by the system to communicate with other systems. The hardware part is usually designed by creating a model of the hardware components with a hardware description language such as SystemC. Having a model of the system, it is possible to simulate and verify it. Once the model is correct the real hardware can be synthesized starting from its description. In this way the so produced hardware will behave exactly in the same way of the model. If the system is a networked system, the interaction with other systems is an important factor to be considered during the design. In fact, the behavior of the device can vary in function of the traffic on the network, the network topology end so on. Therefore, when a network device is simulated it is important to simulate also the interaction with other devices, i.e. the network. The network can be usually modelled with the NS-2 Simulator. The use of a hardware-network co-simulation permits to merge the analysis of the behavior of the internal components of the system, and the external behavior when other systems communicate with the device under project. A more accurate documentation about this topic can be found in [5]. This kind of co-simulation leads to a more accurate design procedure, because the designer can handle a wider range of factors, not only the internal ones. Another important interaction, to be considered during the design of a system, is that between the hardware and the software. Usually a system is a set of ad-hoc devices and a CPU running an operating system and a set of applications. The software can be simulated by using an Instruction Set Simulator (ISS) which represents the CPU of the system, while the other ad-hoc devices can be modeled and simulated with SystemC. In this way, a hardware-software co-simulation can help the designer to exactly define the interaction between the running software and the hardware. More accurate information about this topic can be found in [6] and [7]. A more generic approach consists in a generic hardware-software-network (HSN) cosimulation. This kind of co-simulation handles all the main aspects of the design of a networked system. To learn more about this topics, refer to [8]. The HSN co-design tool allows to design a networked system without having to know how to set up all the necessary tools needed by the co-simulation. The following Sections describe the only cosimulation between SystemC and NS-2. 6 Hardware-Network cosimulation The hardware-network cosimulation included in HSN is based on the timing accurate integration of the system-level modeling language SystemC and the network simulation environment NS-2. More information in [5]. 3
4 6.1 SystemC-NS2 cosimulation interfaces The SystemC and NS-2 simulators provide the components to allow the timing accurate data exchange among them NS-2 From the NS-2 simulator side, a new Agent has been created to allow the data exchange with SystemC. This Agent, called ns_sc, implements a gateway between NS-2 and SystemC. The next line creates a ns_sc Agent (configured using the systemc keyword): set agent0 [new Agent/ns_sc 20 "systemc" 10] This line tells the NS-2 simulator to create a ns_sc Agent, named agent0, bound to: ns_in SystemC port at address 10; ns_out SystemC port at address 20. Next figure shows this idea: SystemC 10 sc_ns_transactor_tl3 20 ns_in ns_out NS-2 agent0 (ns_sc) SystemC From the SystemC side, the new ports ns_in and ns_out have been added to allow the user to send/receive a packet to/from a NS-2 object. They are derived by the template classes sc_in and sc_out, they are of a generic type and they are managed by two methods read() and and write(), which are an extension of the standard methods managing sc_in and sc_out ports. A SystemC process with a bidirectional communication with NS- 2 is simply defined as follows: SC MODULE(m) { ns_in *in_port = new ns_in(10); // port to receive a packet from NS-2 ns_out *out_port = new ns_out(20); // port to send a packet to NS-2... // standard ports to communicate with other modules SC CTOR(m) { SC METHOD(proc1); sensitive << in port; void proc1(); To send(read) a packet to(from) NS-2, the process must simply manipulate the ports as follows: void m::proc1(){ 4
5 ... Packet p; p =... // the packet is explicitly built out_port.write((void*)&p, sizeof(packet)); // packet sent in_port.read((void*)&p, sizeof(packet); // Read from NS-2 5
6 7 Case Study (VoIP) The case study used to describe the cosimulation between SystemC and NS-2 is V-CLIP (Voice Client Over IP), a multimedia embedded system for transmitting voice over IP. It is composed of: Voice Signal Generator: it is used to generate voice data to verify the correctness of the application. ADPCM Coder: it performs data compression by exploiting the Adaptive Differential Pulse Code Modulation algorithm. Huffman Coder: it further improves the data compression by encoding the most frequent input symbols with the shorter sequence of output symbols. RTP Packet Generator: it performs data packetization according to the Real-Time Transport Protocol and it sends data over the network. SystemC-NS2 transactor: it connects the VoIP SystemC model with NS-2 Simulator using the interfaces described in Section SystemC Voice Signal Generator ADPCM Coder Huffman Coder (optional) NS2 System Agent socket RTP Packet Generator socket SystemC-NS2 Transactor The Voice signal generated by the TLM3 SystemC model is sent (using the ns_out port) to the NS-2 Network that simulates a UDP Network; once crossed the NS-2 network, the UDP packets exit from the simulator and are received by a Voice Player. In [2] has been already described the ADPCM coder module; therefore, in this report, about the SystemC V-CLIP implementation, we only described the NS-2 interface (sc_ns_transactor_tl3). 6
7 To compile and simulate the SystemC VoIP design connected to NS-2 Simulator it is necessary to use the HSN SystemC (in this case has been used systemc-2.1.v1-hsn). On the other hand to perform the NS-2 netowrk cosimulation with SystemC, it is necessary to use the HSN NS-2 Network simulator (in this case has been used nsallinone.2.28-hsn). 7.1 SystemC transactor Following is shown the OSCI TLM3 SystemC code to implement the SystemC-NS2 transactor module (called sc_ns_transactor_tl3). SC_MODULE(sc_ns_transactor_TL3), virtual basic_slave_base <ADDRESS_TYPE, DATA_TYPE_ns> { public: //Ports //get data from rtp module sc_export<if_type> target_port_sc_ns_transactor; //put data to NS-2 network simulator ns_out *out; //Functions void end_of_elaboration(); basic_status write(const ADDRESS_TYPE &,const DATA_TYPE_ns &); basic_status read(const ADDRESS_TYPE &,DATA_TYPE_ns &); //Construct SC_CTOR(sc_ns_transactor_TL3) { target_port_sc_ns_transactor(*this); out=new ns_out(20); end_module(); ; #include "sc_ns_transactor_tl3.h" void sc_ns_transactor_tl3 :: end_of_elaboration(){ basic_status sc_ns_transactor_tl3::write(const ADDRESS_TYPE &a, const DATA_TYPE_ns &d){ unsigned int delay; out->write((void *)(d->abuf),d->len); // wait next samples delay= (unsigned int)(((d->len-12)*8* )/ (SAMPLERATE*BITPERSAMPLE)+0.5); wait(delay, SC_US); return basic_protocol::success; basic_status sc_ns_transactor_tl3::read(const ADDRESS_TYPE &a, DATA_TYPE_ns &d){ 7
8 return basic_protocol::success; The module sc_ns_transactor_tl3 includes a sc_export port named target_port_sc_ns_transactor to receive the data from the rtp module. Moreover, it includes a ns_out port (called out) to inject data into the NS-2 Simulator that simulates a UDP network described follow. In the constructor, the module creates the ns_out port with the address 20. The tcl code to implement the NS-2 Network introduced above, is reported in the next section. 7.2 NS-2 Tcl code The network is composed of four nodes, as shown in the following figure. On the first (node 0) and the last (node 3) node is attached one NS agent each. Node 0 is associated to a ns_sc agent which receives packets from the SystemC domain. The tap agent is attached to the node 3 to redirect the traffic towards the real network and then to the player application. 8
9 First of all, you need to create a RealTime simulator object. This is done with the command: set ns [new Simulator] $ns use-scheduler RealTime The following line informs the NS-2 Scheduler to execute a SystemC-NS2 cosimulation. $ns set cosim_type 2 Now we open a file for writing that is going to be used for the nam trace data. #### Open files for statistics ##### set tracefile [open vclip1.tr w] $ns trace-all $tracefile set namfile [open vclip1.nam w] $ns namtrace-all $namfile The next step is to add a 'finish' procedure that closes the trace file and starts nam. proc finish { { global ns global namfile global tracefile $ns flush-trace close $namfile close $tracefile $ns close-channel exit 0 The following four lines define the four network nodes. set Node0 [$ns node] set Node1 [$ns node] set Node2 [$ns node] set Node3 [$ns node] The next lines connecte the four nodes. These lines tell the simulator object to connect the nodes Node0 with Node1, Node1 with Node2 and finally Node2 with Node3 using a duplex link with the bandwidth 500 kbit, a delay of 200ms and a DropTail queue. $ns duplex-link $Node0 $Node1 500kb 200ms DropTail $ns duplex-link $Node1 $Node2 500kb 200ms DropTail $ns duplex-link $Node2 $Node3 500kb 200ms DropTail The next lines create a ns_sc agent and attach it to the node Node0. set agent0 [new Agent/ns_sc 20 "systemc" 10] 9
10 $agent0 set class_ 1 $agent0 set fid_ 1 $agent0 set packetsize_ 2000 $ns attach-agent $Node0 $agent0 The next step is to define the IP-UDP Network Object to inject UDP traffic from the simulator into the live network via UDP Socket at :4460 address. set ipnet [new Network/IP/UDP] $ipnet open writeonly $ipnet connect The Network ipnet object is connected to a Tap Agent called agent3. #### Create the Tap Agent #### set agent3 [new Agent/Tap] $agent3 network $ipnet The next line attaches the agent3 Tap Agent to node Node3. $ns attach-agent $Node3 $agent3 Now the two agents have to be connected with each other. $ns connect $agent0 $agent3 The next line tells the simulator object to execute the 'finish' procedure after 30.0 seconds of simulation time. $ns at 30.0 "finish" The last line finally starts the simulation. $ns run Now it is possible to save the file (e.g. vclip1.tcl) and start the simulation. 7.3 Executing the Hardware-Network cosimulation After the SystemC simulation executable and the vclip1.tcl simulation script are built, you run the cosimulation by executing before the SystemC simulation executable (the batch program that executes the simulation) and then by executing the NS-2 simulation script (the tcl script generated in the previous Section). For example, to run the cosimulation between the SystemC module simulating the VoIP design, named run, and the NS-2 UDP network described in the vclip1.tcl simulation script, type the following commands: First, start a VoIP client to receive the voice data sent by V-CLIP (e.g. a speaker); 10
11 simply type run < speech.raw at the command prompt and press return to simulate the SystemC VoIP example with speech.raw as a source; nse vclip1.tcl to start the NS-2 network simulation to transfer data from SystemC VoIP to speaker. To visualize the NS-2 result it is possible to use a Network Animator (NAM). 8 References [1] Giovanni Perbellini, An Introduction to SystemC, 2005, Internal Report. [2] Giovanni Perbellini, Transaction Level Modeling in SystemC, 2005, Internal Report. [3] Giovanni Perbellini, An Introduction to NS-2, 2005, Internal Report. [4] Giovanni Perbellini, Network Advanced Modeling in NS-2, 2005, Internal Report. [5] F.Fummi, P.Gallo, S.Martini, G.Perbellini, M.Poncino, F.Ricciato, A Timing-Accurate Modeling and Simulation Environment for Networked Embedded Systems, Proceedings of "ACM/IEEE Design Automation Conference (DAC)", Los Angeles, CA, 2-6 June 2003, pp [6] F.Fummi, S.Martini, G.Perbellini, M.Poncino, Native ISS-SystemC Integration for the Co-Simulation of Multi-Processor SoC, Proceedings of "IEEE Design Automation and Test in Europe Conference (DATE)", Paris, France, February 2004, pp [7] F. Fummi, M. Poncino, M. Loghi, S. Martini, G. Perbellini, M. Monguzzi, Virtual Hardware Prototyping Through Timed Hardware-Software Co-Simulation, Proceedings of IEEE Design Automation and Test in Europe Conference (DATE), Munich, Germany, 7-11 March, [8] F. Fummi, S. Martini, G. Perbellini, M. Poncino, F. Ricciato, M. Turolla, Heterogeneous Co-Simulation of Networked Embedded Systems, Proceedings of "IEEE Design Automation and Test in Europe Conference (DATE)", Paris, France, February 2004, pp
ns-2 Tutorial Exercise
ns-2 Tutorial Exercise Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Partly adopted from Nicolas s slides On to the Tutorial Work in group of two. At least one people
More informationNetwork Simulator: ns-2
Network Simulator: ns-2 Antonio Cianfrani Dipartimento DIET Università Sapienza di Roma E-mail: cianfrani@diet.uniroma1.it Introduction Network simulator provides a powerful support to research in networking
More informationHow To Monitor Performance On Eve
Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,
More informationPerformance Monitoring on Networked Virtual Environments
ICC2129 1 Performance Monitoring on Networked Virtual Environments Christos Bouras, Eri Giannaka Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet
More informationns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2004 cs757 1 Today
ns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2004 cs757 1 Contents: Objectives of this week What is ns-2? Working with ns-2 Tutorial
More informationIntroduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationSimulation and Evaluation for a Network on Chip Architecture Using Ns-2
Simulation and Evaluation for a Network on Chip Architecture Using Ns-2 Yi-Ran Sun, Shashi Kumar, Axel Jantsch the Lab of Electronics and Computer Systems (LECS), the Department of Microelectronics & Information
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationpacket retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
More information10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
More informationKeywords: DSDV and AODV Protocol
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparison
More informationExercises on ns-2. Chadi BARAKAT. INRIA, PLANETE research group 2004, route des Lucioles 06902 Sophia Antipolis, France
Exercises on ns-2 Chadi BARAKAT INRIA, PLANETE research group 2004, route des Lucioles 06902 Sophia Antipolis, France Email: Chadi.Barakat@sophia.inria.fr November 21, 2003 The code provided between the
More informationQoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
More informationTo ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:
To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: Firewall Settings - you may need to check with your technical department Step 1 Install Hardware Step
More informationStudy Plan Masters of Science in Computer Engineering and Networks (Thesis Track)
Plan Number 2009 Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track) I. General Rules and Conditions 1. This plan conforms to the regulations of the general frame of programs
More informationVoice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and
1.1 Background Voice over Internet Protocol (VoIP) is a technology that allows users to make telephone calls using a broadband Internet connection instead of an analog phone line. VoIP holds great promise
More informationVoice Over IP. Priscilla Oppenheimer www.priscilla.com
Voice Over IP Priscilla Oppenheimer www.priscilla.com Objectives A technical overview of the devices and protocols that enable Voice over IP (VoIP) Demo Packet8 and Skype Discuss network administrator
More informationVoice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
More informationINTRODUCTION TO VOICE OVER IP
52-30-20 DATA COMMUNICATIONS MANAGEMENT INTRODUCTION TO VOICE OVER IP Gilbert Held INSIDE Equipment Utilization; VoIP Gateway; Router with Voice Modules; IP Gateway; Latency; Delay Components; Encoding;
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationhttp://d-nb.info/1041302002
Contents 1 Introduction 1 1.1 Requirements for Evaluation Techniques 1 1.2 Performance Evaluation Techniques 2 1.2.1 Network Testbeds / Real-World Measurements 2 1.2.2 Network Simulators 3 1.2.3 Analytic
More informationVegaStream Information Note Considerations for a VoIP installation
VegaStream Information Note Considerations for a VoIP installation To get the best out of a VoIP system, there are a number of items that need to be considered before and during installation. This document
More informationCisco PIX vs. Checkpoint Firewall
Cisco PIX vs. Checkpoint Firewall Introduction Firewall technology ranges from packet filtering to application-layer proxies, to Stateful inspection; each technique gleaning the benefits from its predecessor.
More informationVoice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP
Voice over IP Andreas Mettis University of Cyprus November 23, 2004 Overview What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP 1 VoIP VoIP (voice over IP - that is,
More informationHands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction
Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice
More informationComputer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill
Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationTop-Down Network Design
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer Network Traffic Factors Traffic flow unidirectional, bidirectional symmetric, asymmetric
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
More informationAnalysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
More informationEstablishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student
More informationSSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationThe network we see so far. Internet Best Effort Service. Is best-effort good enough? An Audio Example. Network Support for Playback
The network we see so far CSE56 - Lecture 08 QoS Network Xiaowei Yang TCP saw-tooth FIFO w/ droptail or red Best-effort service Web-surfing, email, ftp, file-sharing Internet Best Effort Service Our network
More informationRe-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol
International Journal of Networks and Communications 2015, 5(2): 23-30 DOI: 10.5923/j.ijnc.20150502.01 Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol Francisca O. Oladipo
More informationPer-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
More informationOptimization of VoIP over 802.11e EDCA based on synchronized time
Optimization of VoIP over 802.11e EDCA based on synchronized time Padraig O Flaithearta, Dr. Hugh Melvin Discipline of Information Technology, College of Engineering and Informatics, National University
More informationDaniele Messina, Ilenia Tinnirello
!"! #$ %& ' %& traffic source agent node link n0 ftp tcp sink 2mbps 10 ms n2 1.7mbps, 20 ms n3 cbr udp n1 2mbps 10 ms null pktsize 1KB, rate 1mbps #Create a simulator object set ns [new Simulator] $ $
More informationAnalysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com
More informationTREK GETTING STARTED GUIDE
TREK GETTING STARTED GUIDE February 2015 Approved for Public Release; Distribution is Unlimited. TABLE OF CONTENTS PARAGRAPH PAGE 1 Welcome... 2 1.1 About TReK... 2 1.2 About this Guide... 2 1.3 Important
More informationCurso de Telefonía IP para el MTC. Sesión 2 Requerimientos principales. Mg. Antonio Ocampo Zúñiga
Curso de Telefonía IP para el MTC Sesión 2 Requerimientos principales Mg. Antonio Ocampo Zúñiga Factors Affecting Audio Clarity Fidelity: Audio accuracy or quality Echo: Usually due to impedance mismatch
More informationCapacity Estimation of VOIP Channels on Wireless Networks
Capacity Estimation of VOIP Channels on Wireless Networks T. J. Patel, V. A. Ogale, S. Baek, N. Cui, R. Park WNCG, Dept of Electrical and Computer Engineering The University of Texas at Austin Austin TX
More informationRequirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
More information1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance
More informationPerformance Analysis of VoIP Traffic in WiMAX using various Service Classes
Performance Analysis of VoIP Traffic in WiMAX using various Service Classes Tarik ANOUARI 1 Abdelkrim HAQIQ 1, 2 1 Computer, Networks, Mobility and Modeling laboratory Department of Mathematics and Computer
More informationThe IP Transmission Process. V1.4: Geoff Bennett
The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks
More informationOptimizing Configuration and Application Mapping for MPSoC Architectures
Optimizing Configuration and Application Mapping for MPSoC Architectures École Polytechnique de Montréal, Canada Email : Sebastien.Le-Beux@polymtl.ca 1 Multi-Processor Systems on Chip (MPSoC) Design Trends
More informationSystemC Tutorial. John Moondanos. Strategic CAD Labs, INTEL Corp. & GSRC Visiting Fellow, UC Berkeley
SystemC Tutorial John Moondanos Strategic CAD Labs, INTEL Corp. & GSRC Visiting Fellow, UC Berkeley SystemC Introduction Why not leverage experience of C/C++ developers for H/W & System Level Design? But
More informationSECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
More informationChallenges and Solutions in VoIP
Challenges and Solutions in VoIP Challenges in VoIP The traditional telephony network strives to provide 99.99 percent uptime to the user. This corresponds to 5.25 minutes per year of down time. Many data
More informationQuality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
More informationFrequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
More informationIndepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
More informationANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)
More informationWhat is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.
What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms
More information1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
More informationMPEG-4 Video Transfer with SCTP-Friendly Rate Control Mohamed N. El Derini
MPEG-4 Video Transfer with SCTP-Friendly Rate Control Mohamed N. El Derini elderini@ieee.org Amr A.Elshikh elshikha@emro.who.int Faculty of Engineering, Alexandria University, Egypt Computer Science and
More informationTCP Performance Simulations Using Ns2. Johanna Antila 51189d TLT e-mail: jmantti3@cc.hut.fi
TCP Performance Simulations Using Ns2 Johanna Antila 51189d TLT e-mail: jmantti3@cc.hut.fi 1. Introduction...3 2. Theoretical background...3 2.1. Overview of TCP s congestion control...3 2.1.1. Slow start
More informationAn Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
More informationA Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
More informationDistributed Systems 3. Network Quality of Service (QoS)
Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski pxk@cs.rutgers.edu 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through
More informationNetwork traffic: Scaling
Network traffic: Scaling 1 Ways of representing a time series Timeseries Timeseries: information in time domain 2 Ways of representing a time series Timeseries FFT Timeseries: information in time domain
More informationVoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK V.Rakocevic@city.ac.uk
More informationOPNET simulation of voice over MPLS With Considering Traffic Engineering
Master Thesis Electrical Engineering Thesis no: MEE 10:51 June 2010 OPNET simulation of voice over MPLS With Considering Traffic Engineering KeerthiPramukh Jannu Radhakrishna Deekonda School of Computing
More informationLABORATORY: TELECOMMUNICATION SYSTEMS & NETWORKS PART 1 NCTUNS PROGRAM INTRODUCTION
LABORATORY: TELECOMMUNICATION SYSTEMS & NETWORKS PART 1 NCTUNS PROGRAM INTRODUCTION 1 NCTUns Program In General NCTUns Program is an extensible network simulator and emulator for teleinformatic networks.
More informationVOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
More informationVersion 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)
Version 0.1 June 2010 Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Thank you for choosing the Xerox WorkCentre 7120. Table of Contents Introduction.........................................
More informationFault-Tolerant Framework for Load Balancing System
Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:
More informationIntroduction to Exploration and Optimization of Multiprocessor Embedded Architectures based on Networks On-Chip
Introduction to Exploration and Optimization of Multiprocessor Embedded Architectures based on Networks On-Chip Cristina SILVANO silvano@elet.polimi.it Politecnico di Milano, Milano (Italy) Talk Outline
More informationNetwork Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
More informationVoice Over IP Per Call Bandwidth Consumption
Over IP Per Call Bandwidth Consumption Interactive: This document offers customized voice bandwidth calculations with the TAC Bandwidth Calculator ( registered customers only) tool. Introduction Before
More informationMultiple Fault Tolerance in MPLS Network using Open Source Network Simulator
Multiple Fault Tolerance in MPLS Network using Open Source Network Simulator Muhammad Kamran 1 and Adnan Noor Mian 2 Department of Computer Sciences, FAST- National University of Computer & Emerging Sciences,
More informationAuthors Mário Serafim Nunes IST / INESC-ID Lisbon, Portugal mario.nunes@inesc-id.pt
Adaptive Quality of Service of Voice over IP Communications Nelson Costa Instituto Superior Técnico (IST) Lisbon, Portugal eng.ncosta@gmail.com Authors Mário Serafim Nunes Lisbon, Portugal mario.nunes@inesc-id.pt
More informationA B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION
Wi-Fi Calling Using Android Phones. Mr.Dnyaneshwar Bhusari, Mr.Gaurav Mokase, Mr.Prasad Waghmare, Ms. Kundan Kumar Department of Information Technology D.Y.Patil College of Engineering, Akurdi, Pune, India
More informationInfluence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
More informationCGI-based applications for distributed embedded systems for monitoring temperature and humidity
CGI-based applications for distributed embedded systems for monitoring temperature and humidity Grisha Spasov, Nikolay Kakanakov Abstract: The paper discusses the using of Common Gateway Interface in developing
More informationACN2005 Term Project Improve VoIP quality
ACN2005 Term Project Improve VoIP quality By introducing TCP-Friendly protocol Burt C.F. Lien ( 連 矩 鋒 ) CSIE Department, National Taiwan University p93007@csie.ntu.edu.tw Abstract The most notorious of
More informationPerformance of Various Codecs Related to Jitter Buffer Variation in VoIP Using SIP
Performance of Various Related to Jitter Buffer Variation in VoIP Using SIP Iwan Handoyo Putro Electrical Engineering Department, Faculty of Industrial Technology Petra Christian University Siwalankerto
More informationPFS scheme for forcing better service in best effort IP network
Paper PFS scheme for forcing better service in best effort IP network Monika Fudała and Wojciech Burakowski Abstract The paper presents recent results corresponding to a new strategy for source traffic
More informationA Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
More informationEarthLink Business SIP Trunking. NEC SV8300 IP PBX Customer Configuration Guide
EarthLink Business SIP Trunking NEC SV8300 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 May 18, 2012 CHANGE HISTORY Version Date Change Details Changed By 1.0 5/18/2012
More informationGlossary of Terms and Acronyms for Videoconferencing
Glossary of Terms and Acronyms for Videoconferencing Compiled by Irene L. Ferro, CSA III Education Technology Services Conferencing Services Algorithm an algorithm is a specified, usually mathematical
More informationStateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
More informationBroadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
More informationArchitectures and Platforms
Hardware/Software Codesign Arch&Platf. - 1 Architectures and Platforms 1. Architecture Selection: The Basic Trade-Offs 2. General Purpose vs. Application-Specific Processors 3. Processor Specialisation
More informationAuthor: Seth Scardefield 1/8/2013
Author: Seth Scardefield 1/8/2013 pfsense VoIP QoS Guide This guide will walk you through configuring the traffic shaper in pfsense to prioritize VoIP traffic. This is a very basic configuration intended
More informationVoIP technology employs several network protocols such as MGCP, SDP, H323, SIP.
1 VoIP support configuration First used in the mid-1990s, VoIP is an emerging technology for telephone calls and other data transfer. The concept is relatively simple: Use the multiple networks that comprise
More informationMonitoring Load Balancing in the 10G Arena: Strategies and Requirements for Solving Performance Challenges
2011 is the year of the 10 Gigabit network rollout. These pipes as well as those of existing Gigabit networks, and even faster 40 and 100 Gbps networks are under growing pressure to carry skyrocketing
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More informationOptimizing Converged Cisco Networks (ONT)
Optimizing Converged Cisco Networks (ONT) Module 2: Cisco VoIP Implementations (Deploy) Calculating Bandwidth Requirements for VoIP Objectives Describe factors influencing encapsulation overhead and bandwidth
More informationApplication Note - Using Tenor behind a Firewall/NAT
Application Note - Using Tenor behind a Firewall/NAT Introduction This document has been created to assist Quintum Technology customers who wish to install equipment behind a firewall and NAT (Network
More informationDL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM
DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.
More informationPERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1
More informationAn Efficient AODV-Based Algorithm for Small Area MANETS
An Efficient AODV-Based Algorithm for Small Area MANETS Jai Prakash Kumawat 1, Prakriti Trivedi 2 PG Student, Department of Computer Engineering & IT, Government Engineering College, Ajmer, India 1 Assistant
More informationReal-time apps and Quality of Service
Real-time apps and Quality of Service Focus What transports do applications need? What network mechanisms provide which kinds of quality assurances? Topics Real-time versus Elastic applications Adapting
More informationCastelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia
22nd EUROPEAN CONFERENCE ON OPERATIONAL RESEARCH Prague, July 8 11, 2007 Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia
More informationEXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP
Scientific Bulletin of the Electrical Engineering Faculty Year 11 No. 2 (16) ISSN 1843-6188 EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Emil DIACONU 1, Gabriel PREDUŞCĂ 2, Denisa CÎRCIUMĂRESCU
More informationVOIP with Asterisk & Perl
VOIP with Asterisk & Perl By: Mike Frager 11/2011 The Elements of PSTN - Public Switched Telephone Network, the pre-internet phone system: land-lines & cell-phones. DID - Direct
More informationIP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
More information