Traffic Analysis for Voice in Wireless IP Networks

Size: px
Start display at page:

Download "Traffic Analysis for Voice in Wireless IP Networks"

Transcription

1 Traffic Analysis for Voice in Wireless IP Networks TONI JANEVSKI BORIS SPASENOVSKI Deartment of Telecommunicatis, Faculty of Electrical Engineering University Sv. Kiril i Metodij Karos 2 bb, 1000 Skoje Abstract: - In this aer we rovide an extensive analysis of voice service in wireless IP networks. Voice traffic is serviced with riority over the rest of the traffic. Hence, we ccentrate the voice traffic in the analysis. We model the acketized voice traffic with Markov Modulated Poiss Process (MMPP), and we roose an analytical framework for its analysis in wireless networks. Also, we created a simulator in Matlab, with caability for QoS analysis in different network scenarios, csidering user call intensity, voice-encoding rate, link caacity and buffer sizes. The observed QoS arameters are acket loss and delay. Voice traffic is very sensitive to delay, while some low losses may be tolerated. We resent overwhelming QoS analysis of IP telehy traffic at different network setus and give a ccet for dimensiing wireless links for IP telehy under given cstraints the QoS arameters. Key-Words: - Wireless, IP, Quality of Service, Traffic, Voice 1 Introducti Voice service was mainly based circuitswitched technology in the ast, and it is still nowadays. However, develoment of comuter industry and low cost of communicati devices (alm to devices, communicators, mobile hes, la-to comuters etc.) moved the telecommunicatis beyd the voice service. Now, when the enetrati of users in wireless cellular networks almost reached its maximum, telecommunicati industry and telecom oerators are facing with a challenge of extending the market by introducing more additial services besides the traditial voice service. These services that are ered now or those that will be ered in near future, have no other alternative than IP technology and Internet. In such scenario, voice will be just e of the many services ered to the end users. However, it will remain the most used e and the oldest e. Furthermore, users are used to secific quality of the voice service that came from circuitswitched networks, and they will not accet noticeable degradati of that grade of service. So, the questi is how to design cellular access networks based IP that will rovide desired Quality of Service (QoS) for voice service, something to what users are already used to. Let csider the Internet side first. Many researches and committees are addressing QoS issues in Internet. However, main csidered issues are scheduling, differentiati and admissi. However, not much is de csidering the design of IP network carrying real-time traffic. One may justify this by claiming that if enough bandwidth is rovided, then we should not worry about the caacity and the traffic. But, even in the wire Internet voice service end-to-end is still a roblem due to main ccet used at the develoment of Internet i.e. the ctrol is left to the end entities of the communicati (e.g., to the client and the server). In [1] authors rovide analysis of real-time voice service through the wire access network. They have verified the MMPP model with measurements in a laboratory test-bed. On the side of wireless cellular networks, we have rovisi of certain Grade of Service (GoS) by designing cellular networks with given cstraints call-level QoS arameters: new call blocking robability and call droing robability. However, 1G and 2G wireless networks were based circuit switching, where for each call network allocates e channel. There, adated Erlang-B formula was used for the design of cellular network, [2] [3]. But, here we csider acket-based allocati of wireless link. The aer is organized as follows. In Secti 2 we describe the traffic and system model for our analysis. The analytical analyses are given in Secti 3. Next secti shows the results from simulati runs. Finally, cclusis are given in the last secti. 2 Wireless Link Model We erform design of the wireless networks by csidering the caacity er cell (the bandwidth) as well as mobility of the users that results in handovers amg the adjacent cells. The wireless link is based IP. Packets from different sources are multilexed

2 the wireless media, which is shared amg all traffic streams. We assume that voice over IP traffic is differentiated from data traffic, which is based TCP. If IP telehy traffic is mixed with TCP traffic, which is lg-range deendent, then it will add unmanageable acket delays and acket loss. In our revious work [4] we have roosed classificati of IP traffic into two main classes: class-a, for traffic with QoS cstraints, and class-b, for best-effort traffic. We further divide class-a into three subclasses: A1 for real-time traffic with cstant bit-rate (IP telehy), A2 for real-time traffic with variable bit rate (e.g. video streaming), and A3 for best-effort traffic with a cstraint acket delay (e.g. browsing). Today, there do exist mechanisms to differentiate traffic, such as differentiated services models [5]. We assume that IP telehy is differentiated from other traffic the wireless link, and it is not mixed with TCP traffic. Packets from IP telehy are buffered into searate buffers (of course, there are also other mechanisms to bound acket delay or loss). However, we use riority scheme to differentiate IP voice traffic from the rest. Csidering the voice service in a given cell, we may have active users (with going voice cnectis) and idle users. Traffic from all active users within the cell is multilexed to wireless link. We illustrate such scenario in Figure 1. source 1 source 2 source N wireless link to base stati Figure 1. Multilexing voice sources over wireless link The design issue is how many subscribers we can serve with given network resources, or how much bandwidth we need to have service for redicted number of users of the voice service. There are two different level of csiderati: 1. Cnecti level; and 2. Packet level. On a cnecti level voice service is well modeled by using Poiss rocess, i.e. exential distributi of inter-arrival times between csecutive arrivals as well as exential distributi of call durati time. Poiss rocess is well roven for voice service through the usage of Erlang-B formula, which is in fact M/M/c/c queue, where c is the number of channels (servers) the link. Figure 2. Wireless IP network architecture On acket level we rimarily csider ackets from voice telehy streams. However, different traffic tyes are multilexed the wireless link, as shown in a tyical wireless IP network architecture given in Figure 2. When a cnecti is established for a user, we may have a talk eriod (when the user is talking and ackets are generated to the link) and an idle eriod. During talk eriods IP ackets are transmitted back-to-back. We assume that there is no acket generati in idle eriods. We do not discuss the medium access layer and hysical layer. But, we suose that these layers rovide medium access solutis to avoid collisis from different sources when transmitting ackets, based divisi of time into time stes, i.e. semiermanent logical channels. Because we model the sources as - sources, we assume that during eriod each source has dedicated time interval for acket transmissi over the wireless link. 3 Traffic model A. Call level roerties Let csider a single cell in the network. We assume Poiss arrival rocesses in the cell, which is well roven for the voice cnectis. With n and h we denote new call and handover arrival rate in the cell. An going voice cnecti comletes at rate µ c or dearts the cell at rate µ h. But, in ctrary to the circuit-switched cellular networks we do not have a limited number of channels in the networks. We do use statistical multilexing of voice sources and other n-voice traffic over the wireless link. If we denote with the total call arrival rate, then: = n + h (1) Similarly, we denote with µ the total call dearture rate: µ = µ c + µ h (2) Then we obtain a birth-death rocess as shown in Figure 3, where N is the maximum number of active users in the cell.

3 0 1 2 µ 2µ 3 µ ( N 1) µ N-1 Figure 3. Markov chain model So, a user may be an active voice source or idle csidering voice service (in this case are included situatis when users are using n-voice services). B. Single voice-source roerties As for traffic models, voice cnectis arrive according to a Poiss rocess. Once a cnecti (or call) is established, the voice source is modeled as two-state Markov chain with e state reresenting the talk surt (ON) and other state reresenting the silent eriod (OFF) [6]. A simle ON-OFF model accurately models the behavior of a single voice source. During ON (talk) eriods the source is transmitting IP ackets. Most encoding schemes have fixed bit rate and fixed acketizati delay. During (silence) eriods the source sends no ackets. We assume that ON and OFF eriods are exentially distributed, which is well analyzed in [1]. The voice sources can be viewed as two state birth-death rocesses with birth rate (arrival rate for -eriods) and death rate (ending rate for -eriods). Then, 1/ and 1/ are duratis of talk eriod and silent-eriod of a voice source, resectively. Average of talk surt durati is s, and average of silent state durati is s. The talk surt has a cstant bit rate that we denote as b ts. Then, average voice cnecti bi rate is: b T Nµ av = bts = bts (3) T + T + For examle, if talk surt is encoded with 32 kbs, then average bit rate is kbs. Csidering the voice acket sizes there are also different decoders, i.e. in [1] are used encoders with 64 bytes ayload and 40 bytes IP overhead, while in [7] authors use voice stream of 180 byte ackets, with 160 bytes ayload and 20 bytes IP overhead. Csidering the fact that IP telehy is based RTP/UDP/IP rotocol stack, the accurate model should include 20 bytes overhead for IP, and 20 bytes overhead for RTP/UDP (12 bytes for RTP and 8 bytes UDP [1]). Under the assumti of fixed acket size for voice ackets, we may divide the ON-eriod into timestes with durati T, where T is time that voice coder needs to generate e voice acket with length l. Then, e may write: N 1 T = = T N (3) where N is the number of IP ackets during the ONeriod when the ackets are sent to the wireless link back to back. So, during the talk surt ackets are generated at rate b ts : l b ts = (5) T The robability that a user is in ON-eriod is given by: P user _ = Pcall _ Psource _ (6) where: P source 1 P call _ = (7) µ _ = (8) ( + ) where 1 is average call arrival rate for a single source. Csidering Figure 3, we may write: = N 1 (9) The robability that a source is OFF is P =1-P. C. Suerositi of voice sources The suerositi of the voice sources can be also viewed as birth-death rocess, where total incoming rate is sum of incoming rates of individual sources. A cvenient model in teletraffic theory for a suerositi of many - voice sources is Markov Modulated Poiss Process (MMPP). For voice sources with talk surts and silent eriods (without ackets link) it is more cvenient to use the secial case of MMPP, i.e. IPP (Interruted Poiss Process). When the rocess is in state j that means j sources are. Below we show transitistate diagram for suerositi of k active voice sources. k ( k 1) ( k 2) 2 3 k 1) 2 k-1 k ( k Figure 4. State transiti diagram for a suerositi of k voice sources (established voice cnectis) In Figure 4 we assume that all k cnectis are reviously established. Now, we may link this chain with Markov chain for calls given in Figure 3. To

4 rovide desired Quality of Service (QoS) for the voice calls we need to determine maximum number of active voice calls at a time. This number is denoted with N in Figure 3. So, at a given moment of time we may have k voice cnectis, where k n. If we have k active cnectis then we have the situati given in Figure 4 csidering ON and OFF eriods of sources. IP ackets arrive from k inut lines/sources. Each of the k calls occuying the inut lines i.e. wireless link alternates between talk surts and silent eriods. Assuming state-equilibrium in Figure 4, we may derive the distributi of active voice sources, i.e. the robability that j sources are ON out of k active voice cnectis is: b j k j = 1 + k j (10) Suerositi of many Poiss rocesses is also a Poiss rocess. So, for the wireless link we may csider e Poiss rocess where arrival rate for ON eriods is a sum of ON arrival rates of individual sources. One may notice that the same statement is valid for call arrival rocess from users. Csidering the assumti for exential distributi of call arrivals and call duratis, as well as exential distributi of ON and OFF eriods during e call, and by using (5) and (6), e may write: P{at least e source is ON}= (11) µ + ) ( 4 Simulati analysis We imlemented our model in Matlab rogramming envirment. As inut arameters we use number of IP voice sources, bandwidth of the wireless link, buffer length in the network nodes, voice encoding rate, call arrival and dearture rates. We observe acket loss and mean acket delay. Various voice coders for IP networks exist the market today. All of them are using RTP/UDP/IP rotocol stack. For the inut arameter values, csidering the simulator setu, we used the same values as found in [1], i.e., 32 kb/s ADPCM voice encoding with 16 ms acket inter-arrival time, which results in 64 bytes of voice ayload er acket, a rotocol overhead of 40 bytes (12 bytes for RTP, 8 for UDP and 20 bytes for IP). Link headers are not included. So, the total acket size is 104 bytes. We use fixed size for all voice ackets. The durati of talk-surts and silence eriods is exentially distributed the ositive integers with a mean of 0.351s for ON-eriods and 0.650s for the OFFeriods. The results from the simulatis are divided into two main grous. The first grou csiders voice sources that are ermanently active (during the whole simulati eriod). This assumti does not reflect the real situatis in the network. However, it is useful for calculating the limits of the network caabilities. The number of sources, the number of buffers and the bandwidth of the outut link are the inut arameters while the average acket loss and the average acket delay are the outut arameters of the simulati rocess. Figures 5 and 6 show the average acket loss and the average acket delay as a functi of the number of buffers (measured in ackets). The number of sources is used as a arameter. The bandwidth of the outut link is 2 Mb/s and the voice sources have bit rates of 52 kb/s in ON eriods. The simulati eriod is 1 hour. We can see from these grahs that the average acket loss, regardless of the number of sources, raidly decreases until certain buffer length. For 40 and 80 voice sources, the number of buffers that is of articular imortance is 20 and 40 buffers, resectively. Further enlargement of buffer length does not lead to better results, and the average acket delay increases with increasing the number of buffers. This means that the revious buffer length gives otimal results, regarding the average acket loss and average acket delay. When the network link is loaded with 110 voice sources, after reaching buffer length of 40 ackets, the average acket loss stays retty much the same while the average acket delay increases linearly. According to the recommended QoS arameters [8] and csidering the results of the simulati runs, the otimal buffer length for this articular situati is around 45. With roer analysis of the simulati results, we can give certain guarantees for the quality of the voice services that are being ered by the roviders to their csumers. Also, we can determine the margins of the csumers that can receive adequate quality regarding the network infrastructure. The secd set of results reflects the behavior of the real systems. This means that the activity of the voice sources is modeled csidering statistical analysis of the real voice traffic in the acket-based networks. We csider the erformance model of a single cell in a cellular wireless communicati network. We use Poiss arrival stream of new calls at the rate n and the Poiss stream of handover arrivals at the rate h. An going call (new or handover) comletes service at the rate µ c and the mobile engaged in the call dearts the cell at the rate µ d. These rates are used as inut arameters in the simulati. The bandwidth of the outut link, the number of the buffers and the sources bit rates are

5 also used as inut arameters. The outut arameters are the same as in the revious set of results. Our main task was to create a set of grahs that can be used for dimensiing wireless cellular networks for IP telehy. Figures 7 and 8 show the average acket loss and the average acket delay as a functi of the number of total calls (new and handover). The number of buffers is used as a arameter. The bandwidth of the outut link is 2 Mb/s and the voice sources have bit rates of 52 kb/s in active eriods. From these grahs we can see that buffer length of 20 ackets is comletely unusable. Also, we can determine the range of the inut voice traffic that is eligible to certain, desirable quality. After we determined this range, in order to find the otimal buffer length, we made two more grahs, i.e. Figures 9 and 10, which show the average acket loss and the average acket delay as a functi of the number of buffers. The number of total calls is used as a arameter. With roer analysis of these grahs, according to the required quality of service, we can easy inoint the most effective buffer length that can be used in the articular network. Usually we have given cstraints both arameters, i.e. acket loss and delay. While real-time alicatis (such as IP telehy) have stringent demands acket delay, they can tolerate reasable acket loss (e.g., losses < 1%). We should choose the buffer size as a balance to either of the two cstraints. Of course, e should aly admissi ctrol mechanism that will satisfy the cstraints loss and delay, i.e. reject the incoming calls to rovide the desired quality to the going calls. Figures 11 and 12 show the average acket loss and the average acket delay as a functi of the voice source s bit rate (this means different voiceencoding techniques). The number of buffers is 40 and the link is loaded with 1.0 calls/s (the bandwidth of the outut link is 1.5 Mb/s). We may notice that the average acket loss decreases u to 90 % going from 52 kb/s to 28 kb/s rate of the voice-encoding scheme, as given in Figure 11. Also, the average acket delay also decreases significantly, Figure 12. According to these results we may cclude that by reducing the encoding bit rate we can either increase the quality of the ered services (the network QoS) for the same number of csumers, or increase the number of the csumers that will be able to receive the revious quality of service. 5 Cclusis In this aer we analyzed the QoS for voice service over the wireless IP networks. However, the analysis may be extended to the wired es. We assumed that voice is serviced with riority over other services the link. Figure 5 Average acket loss vs. number of buffers for different number of sources Figure 6 Average acket delay vs. number of buffers for different number of sources Figure 7 Average acket loss vs. call intensity for different buffer sizes Figure 8 Figure 7 Average acket delay vs. call intensity for different buffer sizes

6 One model that rovides such differentiati of voice traffic is differentiated services model. We resented an analytical framework for the analysis of the voice service in wireless IP networks. We used ON-OFF MMPP model, which is well roven for modeling acketized voice traffic [1]. We imlemented our model in Matlab. Using the simulator we erformed analyses of acket loss behavior and delay for different traffic and network scenarios, i.e. by using different inut arameters, such as call intensities of the users, number of voice sources multilexed the link, voice-encoding rates, link caacity, buffer sizes, to obtain their influence the QoS arameters. Csidering the results shown in the revious Secti, this model can be alied in several different situatis. One tyical scenario is when we have a given bandwidth and we need to rovide certain QoS to the users, according to the delay requirements secified in [8] as well as a given cstraint the acket losses. In such case, we may use the simulati results for access network dimensiing wireless links for IP telehy, or, as an inut to an admissi ctrol algorithm. References [1] B. Ahlgren at el., Dimensiing Links for IP Telehy, SICS, CNA Laboratory, Sweden. [2] L. Gavrilovska, T. Janevski, Modeling Techniques for Mobile Communicatis Systems, GLOBECOM 98, Sydney, Australia, November [3] G. Harring, Loss Formulas and Their Alicati to Otimizati for Cellular Networks, IEEE Transactis Vehicular Technology, Vol. 50, No. 3, May [4] T. Janevski, B. Sasenovski, QoS Provisiing for Wireless IP Networks with Multile Classes Through Flexible Fair Queuing, GLOBECOM 2000, San Francisco, USA, November [5] C. Dovroolis et al, Proortial Differentiated Services: Delay Differentiati and Packet Scheduling, SIGCOMM, [6] M. Schwartz, Broadband Integrated Networks, Prentice Hall, [7] D. Cavendish, A. Dubrovsky, M. Gerla, G. Reali, S.S. Lee, Statistical Internet QoS Guarantees for IP Telehy, UCLA CSD TR# [8] ITU-T, One-way transmissi time, Recommendati G.114, Geneva, Switzerland, March [9] T. Janevski, B. Sasenovski, Admissi Ctrol for QoS Provisiing in Wireless IP Networks, Euroean Wireless 2002, February Figure 9 Average acket loss vs. buffer sizes for different call intensities Figure 10 Average acket delay vs. buffer sizes for different call intensities Figure 11 Average acket loss at different voiceencoding rates 2 Mb/s link Figure 12 Average acket delay at different voiceencoding rates 2 Mb/s link

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]

More information

Storage Basics Architecting the Storage Supplemental Handout

Storage Basics Architecting the Storage Supplemental Handout Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it

More information

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This

More information

Buffer Capacity Allocation: A method to QoS support on MPLS networks**

Buffer Capacity Allocation: A method to QoS support on MPLS networks** Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean

More information

Red vs. Blue - Aneue of TCP congestion Control Model

Red vs. Blue - Aneue of TCP congestion Control Model In IEEE INFOCOM 2 A Study of Active Queue Management for Congestion Control Victor Firoiu Marty Borden 1 [email protected] [email protected] Nortel Networks TollBridge Technologies 6

More information

ANALYSIS OF VOICE OVER IP DURING VERTICAL HANDOVERS IN HETEROGENEOUS WIRELESS AND MOBILE NETWORKS

ANALYSIS OF VOICE OVER IP DURING VERTICAL HANDOVERS IN HETEROGENEOUS WIRELESS AND MOBILE NETWORKS ANALYSIS OF VOICE OVER IP DURING VERTICAL HANDOVERS IN HETEROGENEOUS WIRELESS AND MOBILE NETWORKS Kire Jakimoski Ss. Cyril and Methodius University, Faculty of Electrical Engineering and Information Technologies

More information

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks On Multicast Caacity and Delay in Cognitive Radio Mobile Ad-hoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering

More information

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 [email protected] Ugo Buy Comuter Science

More information

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK [email protected]

More information

Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems

Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems Howon Lee, Taesoo Kwon and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and

More information

Load Balancing Mechanism in Agent-based Grid

Load Balancing Mechanism in Agent-based Grid Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042

More information

Wireless Mesh Networks Impact on Voice over Internet Protocol. Mohammad Tariq Meeran PhD Student Institute of Informatics, Tallinn University

Wireless Mesh Networks Impact on Voice over Internet Protocol. Mohammad Tariq Meeran PhD Student Institute of Informatics, Tallinn University Wireless Mesh Networks Impact on Voice over Internet Protocol Mohammad Tariq Meeran PhD Student Institute of Informatics, Tallinn University Email: [email protected] February 2014 What is wireless mesh networks?

More information

Local Connectivity Tests to Identify Wormholes in Wireless Networks

Local Connectivity Tests to Identify Wormholes in Wireless Networks Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University [email protected] Rik Sarkar Comuter Science Freie Universität Berlin [email protected]

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]

More information

C-Bus Voltage Calculation

C-Bus Voltage Calculation D E S I G N E R N O T E S C-Bus Voltage Calculation Designer note number: 3-12-1256 Designer: Darren Snodgrass Contact Person: Darren Snodgrass Aroved: Date: Synosis: The guidelines used by installers

More information

Simulink Implementation of a CDMA Smart Antenna System

Simulink Implementation of a CDMA Smart Antenna System Simulink Imlementation of a CDMA Smart Antenna System MOSTAFA HEFNAWI Deartment of Electrical and Comuter Engineering Royal Military College of Canada Kingston, Ontario, K7K 7B4 CANADA Abstract: - The

More information

Automatic Search for Correlated Alarms

Automatic Search for Correlated Alarms Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden [email protected] School of Technology and Society, Malmö University,

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless

More information

Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and

Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and 1.1 Background Voice over Internet Protocol (VoIP) is a technology that allows users to make telephone calls using a broadband Internet connection instead of an analog phone line. VoIP holds great promise

More information

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])

More information

One-Chip Linear Control IPS, F5106H

One-Chip Linear Control IPS, F5106H One-Chi Linear Control IPS, F5106H NAKAGAWA Sho OE Takatoshi IWAMOTO Motomitsu ABSTRACT In the fi eld of vehicle electrical comonents, the increasing demands for miniaturization, reliability imrovement

More information

Call Admission Control and Traffic Engineering of VoIP

Call Admission Control and Traffic Engineering of VoIP Call Admission Control and Traffic Engineering of VoIP James Yu and Imad Al-Ajarmeh [email protected] [email protected] DePaul University Chicago, Illinois, USA ABSTRACT. This paper presents an extension

More information

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks Multi-Channel Oortunistic Routing in Multi-Ho Wireless Networks ANATOLIJ ZUBOW, MATHIAS KURTH and JENS-PETER REDLICH Humboldt University Berlin Unter den Linden 6, D-99 Berlin, Germany (zubow kurth jr)@informatik.hu-berlin.de

More information

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29. Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet

More information

PFS scheme for forcing better service in best effort IP network

PFS scheme for forcing better service in best effort IP network Paper PFS scheme for forcing better service in best effort IP network Monika Fudała and Wojciech Burakowski Abstract The paper presents recent results corresponding to a new strategy for source traffic

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,

More information

Measuring Data and VoIP Traffic in WiMAX Networks

Measuring Data and VoIP Traffic in WiMAX Networks JOURNAL OF TELECOMMUNICATIONS, VOLUME 2, ISSUE 1, APRIL 2010 Measuring Data and VoIP Traffic in WiMAX Networks 1 Iwan Adhicandra Abstract Due to its large coverage area, low cost of deployment and high

More information

Introduction VOIP in an 802.11 Network VOIP 3

Introduction VOIP in an 802.11 Network VOIP 3 Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11

More information

Chapter 3 ATM and Multimedia Traffic

Chapter 3 ATM and Multimedia Traffic In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very

More information

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad

More information

Packetized Telephony Networks

Packetized Telephony Networks Packetized Telephony Networks Benefits of Packet Telephony Networks Traditionally, the potential savings on long-distance costs was the driving force behind the migration to converged voice and data networks.

More information

Receiver Buffer Requirement for Video Streaming over TCP

Receiver Buffer Requirement for Video Streaming over TCP Receiver Buffer Requirement for Video Streaming over TCP Taehyun Kim a and Mostafa H. Ammar b a Wireless and Mobile Systems Grou, Freescale Semiconductor, Austin, TX 7735, USA E-mail: [email protected]

More information

Improving ertps Grant Allocation for VoIP Traffic in Silence Duration

Improving ertps Grant Allocation for VoIP Traffic in Silence Duration Improving ertps Grant Allocation for VoIP Traffic in Silence Duration S. Amir. Hoseini, S. Saed Rezaie, and H. Taheri Abstract This paper proposes a new uplink scheduling algorithm that can increase the

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11) Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint

More information

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software I Planning Guide The Comlete Buyer s Guide for Payroll Software Table of Contents Introduction... 1 Recent Payroll Trends... 2 Payroll Automation With Emloyee Self-Service... 2 Analyzing Your Current Payroll

More information

Rummage Web Server Tuning Evaluation through Benchmark

Rummage Web Server Tuning Evaluation through Benchmark IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.

More information

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents

More information

Modeling and Simulation of an Incremental Encoder Used in Electrical Drives

Modeling and Simulation of an Incremental Encoder Used in Electrical Drives 10 th International Symosium of Hungarian Researchers on Comutational Intelligence and Informatics Modeling and Simulation of an Incremental Encoder Used in Electrical Drives János Jób Incze, Csaba Szabó,

More information

Comparing Dissimilarity Measures for Symbolic Data Analysis

Comparing Dissimilarity Measures for Symbolic Data Analysis Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,

More information

Characterizing and Modeling Network Traffic Variability

Characterizing and Modeling Network Traffic Variability Characterizing and Modeling etwork Traffic Variability Sarat Pothuri, David W. Petr, Sohel Khan Information and Telecommunication Technology Center Electrical Engineering and Comuter Science Deartment,

More information

Web Application Scalability: A Model-Based Approach

Web Application Scalability: A Model-Based Approach Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM)

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM) Comutational and Alied Mathematics Journal 15; 1(1: 1-6 Published online January, 15 (htt://www.aascit.org/ournal/cam he fast Fourier transform method for the valuation of Euroean style otions in-the-money

More information

Branch-and-Price for Service Network Design with Asset Management Constraints

Branch-and-Price for Service Network Design with Asset Management Constraints Branch-and-Price for Servicee Network Design with Asset Management Constraints Jardar Andersen Roar Grønhaug Mariellee Christiansen Teodor Gabriel Crainic December 2007 CIRRELT-2007-55 Branch-and-Price

More information

How To Determine The Capacity Of An 802.11B Network

How To Determine The Capacity Of An 802.11B Network Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford

More information

Simulative Investigation of QoS parameters for VoIP over WiMAX networks

Simulative Investigation of QoS parameters for VoIP over WiMAX networks www.ijcsi.org 288 Simulative Investigation of QoS parameters for VoIP over WiMAX networks Priyanka 1, Jyoteesh Malhotra 2, Kuldeep Sharma 3 1,3 Department of Electronics, Ramgarhia Institue of Engineering

More information

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs Memory management Chater : Memory Management Part : Mechanisms for Managing Memory asic management Swaing Virtual Page relacement algorithms Modeling age relacement algorithms Design issues for aging systems

More information

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal

More information

Concurrent Program Synthesis Based on Supervisory Control

Concurrent Program Synthesis Based on Supervisory Control 010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract

More information

4 Internet QoS Management

4 Internet QoS Management 4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control

More information

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models 2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung

More information

Failure Behavior Analysis for Reliable Distributed Embedded Systems

Failure Behavior Analysis for Reliable Distributed Embedded Systems Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of

More information

EECS 122: Introduction to Communication Networks Homework 3 Solutions

EECS 122: Introduction to Communication Networks Homework 3 Solutions EECS 22: Introduction to Communication Networks Homework 3 Solutions Solution. a) We find out that one-layer subnetting does not work: indeed, 3 deartments need 5000 host addresses, so we need 3 bits (2

More information

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS D. Todinca, P. Perry and J. Murphy Dublin City University, Ireland ABSTRACT The goal of this paper

More information

Voice over IP (VoIP) for Telephony. Advantages of VoIP Migration for SMBs BLACK BOX. 724-746-5500 blackbox.com

Voice over IP (VoIP) for Telephony. Advantages of VoIP Migration for SMBs BLACK BOX. 724-746-5500 blackbox.com Voice over IP (VoIP) for Telephony Advantages of VoIP Migration for SMBs BLACK BOX Hybrid PBX VoIP Gateways SIP Phones Headsets 724-746-5500 blackbox.com Table of Contents Introduction...3 About Voice

More information

Aggregation of VoIP Streams in a 3G Mobile Network: A Teletraffic Perspective

Aggregation of VoIP Streams in a 3G Mobile Network: A Teletraffic Perspective Aggregation of VoIP Streams in a 3G Mobile Network: A Teletraffic Perspective Olufemi Komolafe Agilent Laboratories, South Queensferry, EH30 9TG, UK, [email protected] Robert Gardner Agilent Laboratories,

More information

Safety evaluation of digital post-release environment sensor data interface for distributed fuzing systems

Safety evaluation of digital post-release environment sensor data interface for distributed fuzing systems Safety evaluation of digital ost-release environment sensor data interface for distributed fuzing systems 57 th Fuze Conference, Newark, NJ Wednesday, July 30 th, 2014 Oen Session IIIA, 3:20 PM S. Ebenhöch,

More information

Computer Networks Homework 1

Computer Networks Homework 1 Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.

More information

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits. Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information

More information

Frame Error Rate. IEEE 802.3bj Task Force. September 24-26, 2012, Geneva, Switzerland. Roy Cideciyan IBM

Frame Error Rate. IEEE 802.3bj Task Force. September 24-26, 2012, Geneva, Switzerland. Roy Cideciyan IBM Frame Error Rate IEEE 802.3bj Task Force Setember 24-26, 2012, Geneva, Switzerland Roy Cideciyan Introduction This resentation addresses 802.3bj Draft 1.1 comments 159, 258, 261 and 392 802.3bj is required

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently

More information

Performance Analysis of Scheduling Algorithms

Performance Analysis of Scheduling Algorithms Performance Analysis of Scheduling Algorithms for VoIP Services in IEEE 82.1 6e Systems Howon Lee*, Taesoo Kwon*, Dong-Ho Cho*, Geunhwi Limt and Yong Changt *Department of Electrical Engineering and Computer

More information

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched

More information

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of

More information

Study of the impact of UMTS Best Effort parameters on QoE of VoIP services

Study of the impact of UMTS Best Effort parameters on QoE of VoIP services Study of the impact of UMTS Best Effort parameters on QoE of VoIP services Jose Oscar Fajardo, Fidel Liberal, Nagore Bilbao Department of Electronics and Telecommunciations, University of the Basque Country

More information

Title: Stochastic models of resource allocation for services

Title: Stochastic models of resource allocation for services Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, [email protected] Phone : (54) 231-7688,

More information

Machine Learning with Operational Costs

Machine Learning with Operational Costs Journal of Machine Learning Research 14 (2013) 1989-2028 Submitted 12/11; Revised 8/12; Published 7/13 Machine Learning with Oerational Costs Theja Tulabandhula Deartment of Electrical Engineering and

More information

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity

More information

The impact of metadata implementation on webpage visibility in search engine results (Part II) q

The impact of metadata implementation on webpage visibility in search engine results (Part II) q Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra

More information

VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS. Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev

VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS. Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev International Journal "Information Technologies and Knowledge" Vol.2 / 28 181 VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov,

More information

Optimal Routing and Scheduling in Transportation: Using Genetic Algorithm to Solve Difficult Optimization Problems

Optimal Routing and Scheduling in Transportation: Using Genetic Algorithm to Solve Difficult Optimization Problems By Partha Chakroborty Brics "The roblem of designing a good or efficient route set (or route network) for a transit system is a difficult otimization roblem which does not lend itself readily to mathematical

More information

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,

More information

Monitoring Frequency of Change By Li Qin

Monitoring Frequency of Change By Li Qin Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial

More information

Comparison of Voice over IP with circuit switching techniques

Comparison of Voice over IP with circuit switching techniques Comparison of Voice over IP with circuit switching techniques Author Richard Sinden Richard Sinden 1 of 9 Abstract Voice-over-IP is a growing technology. Companies are beginning to consider commercial

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems

CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems CSE3214 Computer Network Protocols and Applications Chapter 1 Examples and Homework Problems Example 1 (review question 18) (1) How long does it take a packet of length 1000 bytes to propagate over a link

More information

Beyond the F Test: Effect Size Confidence Intervals and Tests of Close Fit in the Analysis of Variance and Contrast Analysis

Beyond the F Test: Effect Size Confidence Intervals and Tests of Close Fit in the Analysis of Variance and Contrast Analysis Psychological Methods 004, Vol. 9, No., 164 18 Coyright 004 by the American Psychological Association 108-989X/04/$1.00 DOI: 10.1037/108-989X.9..164 Beyond the F Test: Effect Size Confidence Intervals

More information

Indepth Voice over IP and SIP Networking Course

Indepth Voice over IP and SIP Networking Course Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.

More information

Application Note How To Determine Bandwidth Requirements

Application Note How To Determine Bandwidth Requirements Application Note How To Determine Bandwidth Requirements 08 July 2008 Bandwidth Table of Contents 1 BANDWIDTH REQUIREMENTS... 1 1.1 VOICE REQUIREMENTS... 1 1.1.1 Calculating VoIP Bandwidth... 2 2 VOIP

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction 1.1. Motivation Network performance analysis, and the underlying queueing theory, was born at the beginning of the 20th Century when two Scandinavian engineers, Erlang 1 and Engset

More information