A simulation model is presented to analyze and evaluate the performance of VoIP based integrated
wireless LAN/WAN with taking into account various voice encoding schemes. The network model was
simulated using OPNET Modeler software. Different parameters that indicate the QoS like MOS, jitter,
end to end delay, traffic send and traffic received are calculated and analyzed in Wireless LAN/WAN
scenarios. Depending on this evaluation, Selection codecs G.729A consider the best choice for VoIP.
Due to the proliferation in the number of users that are accessing the internet and due to the increase in
the number of the electronic devices that support mobility like mobiles, laptops and many others that
definitely lead to the need of a protocol that supports a mobility. Mobile Internet Protocol is a
recommended Internet protocol designed to support the mobility of a user (host). This protocol provides a
continuous connectivity for any mobile host . In the traditional Mobile IP all packets forwarded to the
Mobile host from the correspondent node will be forwarded via the Home Agent (HA) and that leads to
the triangle routing problem .
(ISP MBG) technique is used as a route optimization technique for solving the triangle routing problem
in conventional Mobile IPv4. This technique has been implemented on .net platform .The study of this
technique was discussed before using 2 similar Internet Service Providers and the simulation results
provided a better performance compared with the Conventional Mobile IP Technique. In this paper the
simulator will be used to study the performance of the (ISP MBG) technique using two different Internet
Service Providers ( ISPs) structures separated by a single Mobile Border Gateway ( MBG).Simulation
results shows also a better performance compared with the conventional Mobile IP technique .
1) The document discusses route optimization techniques for solving the triangle routing problem in Mobile IPv4, specifically evaluating the performance of the Internet Service Provider Mobile Border Gateway (ISP MBG) scheme.
2) It provides background on Mobile IP, the triangle routing problem, and introduces the ISP MBG technique for optimizing routes.
3) The study evaluates the performance of ISP MBG by varying system parameters like number of nodes and zones, finding it provides shorter transmission times compared to conventional Mobile IP.
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
This document reviews several studies that analyzed the performance of VoIP traffic over WiMAX networks using different VoIP codecs and WiMAX service classes. It summarizes the findings of various papers on how QoS parameters like throughput, delay, jitter compared for codecs like G.711, G.723, G.729 when using the UGS, rtPS, nrtPS and BE service classes. Most studies found that UGS generally performed best for VoIP due to its ability to guarantee bandwidth and minimize jitter and delay, while G.711 typically provided the best voice quality. The document aims to compare the results across different service classes and codecs.
This document discusses speed adaptive mobile IP over wireless LAN. It first analyzes the relationship between performance and moving speed for mobile IP over wireless LAN, showing that current mobile IP is not suitable for rapid movement. It then proposes a speed adaptive mobile IP protocol that extends registration messages with speed information to allow the network behavior to automatically adapt based on node speed, improving performance for rapid movement without high resource costs. The protocol is emulated and shown to greatly improve mobile IP performance for rapid movement over wireless LAN.
This document provides an overview of Chapter 7 from the textbook "Computer Networking: A Top-Down Approach 8th edition" by Jim Kurose and Keith Ross. It includes notes on using the PowerPoint slides freely but asking users to cite the source and copyright. The chapter outline covers wireless links and networks, WiFi (802.11), cellular networks, and mobility management. It provides context on the growth of wireless and mobile networks and examples of wireless link characteristics, protocols, and WiFi frame addressing.
PLNOG 6: Maciej Konstantynowicz - Implementing Seamless MPLS PROIDEA
Implementing Seamless MPLS discusses service provider priorities such as reducing costs, simplifying operations, and improving service delivery. It outlines requirements for a converged packet network including support for large scale, deterministic availability, and simplified service provisioning. The document also describes Juniper's Seamless MPLS architecture which addresses these requirements through hierarchical MPLS labeling, fast restoration mechanisms, and decoupled network and service architectures.
The document describes a software project called MASK that aims to develop a web-based application for LTE planning processes like calculating site requirements and throughput for a given area, placing sites on a map, following LTE planning standards and providing skills relevant to mobile communications careers. The project methodology involves studying LTE features and planning, choosing tools like C# and ArcGIS, implementing algorithms, and creating a graphical user interface for the program.
Performance Analysis of Data Traffic Offload Scheme on Long Term Evolution (L...TELKOMNIKA JOURNAL
One of new mobile technology is being developed by 3GPP is Long Term Evolution (LTE). LTE
usually used by user because provide high data rate. Many traffic sending over LTE, makes several users
didn’t get good Quality of Service (QoS). Traffic diversion is needed to increasing QoS value. It can be
done with offloading data method from LTE to Wi-Fi network. This paper using 802.11ah standard to
evaluate Wi-Fi network. IEEE 802.11ah have 1000 meters coverage area and efficiency energy
mechanism, which is proposed for M2M in 5G techonology. Some research has proven that traffic
diversion with offloading can increasing network performance. The contribution of this paper is to evaluate
the impact of traffic offload between LTE and IEEE 802.11ah standard. This paper propose two scenarios
using increment number of user and increment mobility speed of user to evaluate throughput and delay
value before and after the offload process. The simulation will simulate using Network Simulator-3. We can
conclude that network performance after offloading is better for every scenario. For increment number of
user scenario, throughput value increasing 29.08%, and delay decreasing 8.12%. Scenario with increment
mobility speed of user obtain throughput value increasing 37,57%, and delay value decreasing 27.228%.
This document presents a novel approach for minimizing delay and load in wireless networks (WiMAX) developed by Shilpa Mehta et al. It begins by introducing WiMAX and discussing challenges in providing quality of service. It then proposes a new scheduling algorithm called QOS Recovered that aims to minimize delay and load by fixing queue size and number of packets. The algorithm is compared to the existing weighted fair queuing algorithm through simulation. The document provides background on scheduling in WiMAX and discusses common scheduling strategies and algorithms. It also describes using the OPNET simulator to model the wireless network and evaluate the new algorithm's performance.
1. The document discusses how Multi-Protocol Label Switching (MPLS) can improve Voice over Internet Protocol (VoIP) services by enabling traffic engineering and quality of service controls.
2. MPLS allows traffic to be forwarded at layer 2 for faster routing and makes it easier to manage networks for quality of service. This helps meet the low latency and jitter requirements of real-time VoIP traffic.
3. The document analyzes VoIP performance over an MPLS network connecting three branch offices using a network monitoring tool. It finds that while MPLS provides better connectivity than the public Internet, additional steps may be needed to deliver business-quality VoIP.
This document provides an overview of fixed access networks and the service order project flow. It discusses key topics such as:
- The hierarchy of ISPs from tier 1 to tier 3 and their roles in connectivity.
- The main types of fixed access network services including dedicated internet access, leased lines, VPNs, and PRI.
- Factors considered in network planning like topology, technology, and last mile solutions.
- The end-to-end process flow for a service order project from initial order to provisioning and acceptance.
- An example project for a dedicated internet access order for 155 Mbps of bandwidth for a customer.
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...optljjournal
Recently, indoor Optical Wireless (OW) connectivity has gained significant attention as a possible
alternative to tackle the problem of bottleneck access and as an improvement to ever more conventional RF
/ microwave connections. In indoor OW communication, OOK encoding is more widely used owing to its
effective usage of bandwidth and robustness to timing errors, given the fact that the power consumption is
less than PPM. The modulation format in this research work is Q-array PPM over lasers, with modulation
of power. The effects of the analysis are analyzed numerically in view of the amount of bit error (BER). It is
shown that, because of coding for 4PPM framework, the bit error performance is increased. For instance,
an LDPC-coded device with stable foundation radiation provides a important coding improvement of 5 to 6
dB over uncoded device at BER in the order of 10-8 and 10-12 respectively.
This document discusses PowerGrid's diversification into the telecom business under the brand PowerTel. It provides an overview of PowerGrid as the central transmission utility of India, carrying over 51% of the country's power. In 2001, PowerGrid diversified into telecom to utilize spare optic fiber capacity from its transmission infrastructure, providing telecom services across India. The document describes PowerTel's network and various telecom equipment used, and also discusses digital transmission systems like SDH and DWDM, fiber management, and troubleshooting techniques.
This document outlines the basic design of a Tier 3 ISP network. It defines key ISP terminology like tiers and points of presence. The project goal is described as providing internet access to 3 departments on campus through a wired or wireless network. The core architecture includes a backbone with a core router connecting to distribution routers that provide access to the departments. The document also covers addressing, routing protocols and how the network would be set up and tested.
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...ijcnac
The key QoS parameters for VoIP are delay, jitter and loss. In the Internet, VoIP requires
the underlying packet switched network to minimize the impact of these parameters. A
major contributing factor in this regard is traffic engineering carried out by scheduling
algorithms. This paper studies the behavior of different types of scheduling algorithms on
the delay, jitter and loss QoS parameters. The performance evaluation involves
identifying the scheduling algorithms which are most suitable for VoIP communications.
The result from the analysis also shows the impact of the QoS parameters on VoIP over
the Internet.
This document provides an introduction to mobile computing. It defines mobile computing as using a computer while on the move, involving mobility, computing, and network connectivity. The key aspects of mobile computing are discussed, including mobile communication infrastructure, software, hardware, and devices. Common network types that enable mobile computing like WLAN, MAN, WAN, and wireless networks are also summarized. The relationship between mobile computing and wireless networking is described, with wireless networking providing the basic communication capabilities. Examples of mobile computing applications are given for various fields.
4 lte access transport network dimensioning issue 1.02saeed_sh65
The document discusses several key aspects of an LTE access transport network:
1. It describes the five major interfaces of an eNodeB including S1, X2, OM, clock, and co-transmission interfaces.
2. It explains the protocols used on the S1 and X2 interfaces including SCTP, GTP-U, and X2AP.
3. It provides an overview of the different layers - layers 1, 2, and 3 - that can be used as transport bearer networks for an LTE system and their characteristics.
The document discusses how to characterize and dimension user traffic in 4G networks. It describes how to define data traffic in terms of data speed and data tonnage. Data speed is the rate at which data is transferred, while data tonnage refers to the total amount of data exchanged. The document provides examples of data speed metrics used in 3GPP standards and outlines factors to consider when calculating expected data usage per subscriber based on typical mobile application usage patterns and available data plans. Dimensioning user traffic accurately is important for designing 4G networks to meet capacity demands.
A review study of handover performance in mobile ipIJCNCJournal
The Mobile Internet Protocol (Mobile IP) is an extension to the Internet Protocol proposed by the Internet
Engineering Task Force (IETF) that addresses the mobility issues. In order to support un-interrupted
services and seamless mobility of nodes across the networks (and/or sub-networks) with permanent IP
addresses, handover is performed in mobile IP enabled networks. Handover in mobile IP is source cause of
performance degradation as it results in increased latency and packet loss during handover. Other issues
like scalability issues, ordered packet delivery issues, control plane management issues etc are also
adversely affected by it. The paper provides a constructive survey by classifying, discussing and comparing
different handover techniques that have been proposed so far, for enhancing the performance during
handovers. Finally some general solutions that have been used to solve handover related problems are
briefly discussed.
Performance Evaluation of two Port and four Port Measurement for Twisted Pair...IJECEIAES
This document summarizes a study that evaluated twisted pair cable measurement using two-port and four-port vector network analyzers. Twisted pair cables of 500m and 1000m in length with various conditions were measured. The four-port measurements were converted to two-port S-parameters for comparison. Results showed good correlation between methods at 500m, especially below 50MHz. Four-port measurement is suitable for measuring twisted pair cable up to higher frequencies but over shorter distances. Root mean square error analysis supported this, with lower errors below 5MHz. The study validated using a four-port analyzer for twisted pair cable characterization.
Implementation Cost Analysis of the Interpolator for the Wimax Technologyiosrjce
The design of the multirate filter (programmable) has been proposed which can be used in digital
transceivers that meets 802.16d/e (wimax) standard in the wireless communication system. Wimax is a
technology emerging in the wireless communication system in order to increase the broadband wireless internet
access. As there is wide spread need of the digital representation of the signal for the transmission and storage
which create the challenges in DSP [1]. In this paper, analysis of the implementation cost of interpolator for the
wimax technology, and cost of interpolator is analyzed on the basis of number of adders and multiplier. The
Filters are designed using the FDA (filters design and analysis) tool in MATLAB.
The document summarizes planning and optimization of an LTE radio access network for an urban area in Taiz City, Yemen. It involved using simulation software to plan the network, including determining the number and locations of base stations. The network was then optimized using techniques like Automatic Cell Planning and Automatic Frequency Planning. This improved coverage from 90% to 98%, CINR from 65% to 77%, and increased total network traffic by 30%. The optimization reduced overlapping between sectors and interference, and increased throughput and coverage area.
Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc.
In this module, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations. We will also look at some of the countermeasures you can put in place to protect against such attacks.
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACKIJCNCJournal
Internet of Things (IoT) deployments mostly relies on the establishment of Low-Power and Lossy Networks (LLNs) among a large number of constraint devices. The Internet Engineering Task Force (IETF) provides an effective IPv6-based LLN routing protocol, namely the IPv6 Routing Protocol for Low Power and Lossy Network (RPL). RPL provides adequate protection against external security attacks but stays vulnerable to internal routing attacks such as a rank attack. Malicious RPL nodes can carry out a rank attack in different forms and cause serious network performance degradation. An experimental study of the impact of the decreased rank attack on the overall network performance is presented in this paper. In also besides, it is
important to understand the main influencing factors in this context. In this study, several some many network scenarios were considered with varying network sizes, attacker properties, and topological setups. The experimental results indicate a noticeable adverse effect of the rank attack on the average PDR, delay, ETX, and beacon interval. However, such impact was varied according to network size, attacker position,
attacker neighbor count, number of attack-affected nodes, and overall hops increase. The results give a practical reference to the overall performance of RPL networks under rank attacks.
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
This document discusses enhancing the performance of ad hoc wireless networks using Cisco devices. It proposes using Cisco routers and access points to create a three-layer ad hoc network with endpoints, intermediate coordinators, and a core router layer for improved processing, reliability, cost, power consumption, and accessibility. It then outlines various protocols and configurations that could be implemented using Cisco devices, including NAT, ACLs, DHCP, and wireless security settings. Diagrams and tables show an example network topology and device IP addresses and configurations.
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
Due to the rapidly increasing data speed requirement, it has become essential to smartly utilize the available frequency spectrum. In wireless communications systems, channel quality parameters are often used to enable resource allocation techniques that improve system capacity and user quality. The uncoded bit or symbol error rate (SER) is specified as an important parameter in the second and third generation partnership project (3GPP). Nonetheless, techniques to estimate the uncoded SER are usually not much published. This paper introduces a novel uncoded bit error rate (BER) estimation method using the
accurate-bits sequence of the new channel codes over the AWGN channel. Here, we have used the new channel codes as a forward error correction coding scheme for our communication system. This paper also presents the simulation results to demonstrate and compare the estimation accuracy of the proposed method over the AWGN channel.
Intelligent transportation system (ITS) is an application which provides intelligence to the transportation
and traffic management systems. Although the word ITS applies to all systems in the transportation but as
per the European union directive it is the application of Information and communication technology in the
field of transportation is defined as ITS. The communication technology has evolved greatly today from
2G/3G to long term evolution (LTE). In this paper we focus on the LTE and its application in the ITS. Since
LTE offers excellent QoS, wide area coverage and high availability it is a preferred choice for vehicle to
infrastructure (V2I) service. At the same time the LTE customer base is increasing day by day which results
in congestion and accessing the network to send or request resources becomes difficult. In this paper we
have proposed a group based node selection algorithm to reduce the preamble ID collision otherwise this
uncoordinated preamble ID transmission by vehicle node (VN) will eventually clog the network and there
will be a massive congestion and re-transmissions attempts by VNs to obtain the random access channel
(RACH).
A major role is played in the layout and evaluation of any empirical wireless structure to manifest is the goal of this paper that counterfeit mode architectures affect counterfeit conduct, regarding structure accomplishment metrics, essentially and therefore, the excellent architecture should be explored in order to accomplish the most accurate and reliable results. It is found that the most analytical factors it is found that that actuate counterfeit mode accomplishment are counterfeit time, structure event organizing and
grade of adequate. It is, also, found that counterfeit time in relation to event existence in the real structure
along with the usage of modern architectural concepts such as multi-interweave technology complement
analytical issues too in the advancement of an adequate counterfeit organization for wireless communications. In order to evaluate the above findings an extensive empirical review has been
demeanored analysising several distinct events counterfeitorganizations towards presenting the relation
between channel designing collections, counterfeit time and structure accomplishment.
Cellular wireless systems like GSM suffer from congestion resulting in overall system degradation and poor service delivery. When the traffic demand in a geographical area is high, the input traffic rate will exceed thecapacity of the output lines. This work focused on homogenous wireless network (the network traffic and resource dimensioning that are statistically identical) such that the network performance
evaluation can be reduced to a system with single cell and a single traffic type. Such system can employa queuing model to evaluate the performance metric of a cell in terms of blocking probability.
Five congestion control models were compared in the work to ascertain their peculiarities, they are Erlang B, Erlang C, Engset (cleared), Engset (buffered), and Bernoulli. To analyze the system, an aggregate onedimensional Markov chain wasderived, such that it describes a call arrival process under the assumption
that it is Poisson distributed. The models were simulated and their results show varying performances, however the Bernoulli model (Pb5) tends to show a situation that allows more users access to the system and the congestion level remain unaffected despite increase in the number of users and the offered traffic into the system.
This document presents a novel approach for minimizing delay and load in wireless networks (WiMAX) developed by Shilpa Mehta et al. It begins by introducing WiMAX and discussing challenges in providing quality of service. It then proposes a new scheduling algorithm called QOS Recovered that aims to minimize delay and load by fixing queue size and number of packets. The algorithm is compared to the existing weighted fair queuing algorithm through simulation. The document provides background on scheduling in WiMAX and discusses common scheduling strategies and algorithms. It also describes using the OPNET simulator to model the wireless network and evaluate the new algorithm's performance.
1. The document discusses how Multi-Protocol Label Switching (MPLS) can improve Voice over Internet Protocol (VoIP) services by enabling traffic engineering and quality of service controls.
2. MPLS allows traffic to be forwarded at layer 2 for faster routing and makes it easier to manage networks for quality of service. This helps meet the low latency and jitter requirements of real-time VoIP traffic.
3. The document analyzes VoIP performance over an MPLS network connecting three branch offices using a network monitoring tool. It finds that while MPLS provides better connectivity than the public Internet, additional steps may be needed to deliver business-quality VoIP.
This document provides an overview of fixed access networks and the service order project flow. It discusses key topics such as:
- The hierarchy of ISPs from tier 1 to tier 3 and their roles in connectivity.
- The main types of fixed access network services including dedicated internet access, leased lines, VPNs, and PRI.
- Factors considered in network planning like topology, technology, and last mile solutions.
- The end-to-end process flow for a service order project from initial order to provisioning and acceptance.
- An example project for a dedicated internet access order for 155 Mbps of bandwidth for a customer.
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...optljjournal
Recently, indoor Optical Wireless (OW) connectivity has gained significant attention as a possible
alternative to tackle the problem of bottleneck access and as an improvement to ever more conventional RF
/ microwave connections. In indoor OW communication, OOK encoding is more widely used owing to its
effective usage of bandwidth and robustness to timing errors, given the fact that the power consumption is
less than PPM. The modulation format in this research work is Q-array PPM over lasers, with modulation
of power. The effects of the analysis are analyzed numerically in view of the amount of bit error (BER). It is
shown that, because of coding for 4PPM framework, the bit error performance is increased. For instance,
an LDPC-coded device with stable foundation radiation provides a important coding improvement of 5 to 6
dB over uncoded device at BER in the order of 10-8 and 10-12 respectively.
This document discusses PowerGrid's diversification into the telecom business under the brand PowerTel. It provides an overview of PowerGrid as the central transmission utility of India, carrying over 51% of the country's power. In 2001, PowerGrid diversified into telecom to utilize spare optic fiber capacity from its transmission infrastructure, providing telecom services across India. The document describes PowerTel's network and various telecom equipment used, and also discusses digital transmission systems like SDH and DWDM, fiber management, and troubleshooting techniques.
This document outlines the basic design of a Tier 3 ISP network. It defines key ISP terminology like tiers and points of presence. The project goal is described as providing internet access to 3 departments on campus through a wired or wireless network. The core architecture includes a backbone with a core router connecting to distribution routers that provide access to the departments. The document also covers addressing, routing protocols and how the network would be set up and tested.
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...ijcnac
The key QoS parameters for VoIP are delay, jitter and loss. In the Internet, VoIP requires
the underlying packet switched network to minimize the impact of these parameters. A
major contributing factor in this regard is traffic engineering carried out by scheduling
algorithms. This paper studies the behavior of different types of scheduling algorithms on
the delay, jitter and loss QoS parameters. The performance evaluation involves
identifying the scheduling algorithms which are most suitable for VoIP communications.
The result from the analysis also shows the impact of the QoS parameters on VoIP over
the Internet.
This document provides an introduction to mobile computing. It defines mobile computing as using a computer while on the move, involving mobility, computing, and network connectivity. The key aspects of mobile computing are discussed, including mobile communication infrastructure, software, hardware, and devices. Common network types that enable mobile computing like WLAN, MAN, WAN, and wireless networks are also summarized. The relationship between mobile computing and wireless networking is described, with wireless networking providing the basic communication capabilities. Examples of mobile computing applications are given for various fields.
4 lte access transport network dimensioning issue 1.02saeed_sh65
The document discusses several key aspects of an LTE access transport network:
1. It describes the five major interfaces of an eNodeB including S1, X2, OM, clock, and co-transmission interfaces.
2. It explains the protocols used on the S1 and X2 interfaces including SCTP, GTP-U, and X2AP.
3. It provides an overview of the different layers - layers 1, 2, and 3 - that can be used as transport bearer networks for an LTE system and their characteristics.
The document discusses how to characterize and dimension user traffic in 4G networks. It describes how to define data traffic in terms of data speed and data tonnage. Data speed is the rate at which data is transferred, while data tonnage refers to the total amount of data exchanged. The document provides examples of data speed metrics used in 3GPP standards and outlines factors to consider when calculating expected data usage per subscriber based on typical mobile application usage patterns and available data plans. Dimensioning user traffic accurately is important for designing 4G networks to meet capacity demands.
A review study of handover performance in mobile ipIJCNCJournal
The Mobile Internet Protocol (Mobile IP) is an extension to the Internet Protocol proposed by the Internet
Engineering Task Force (IETF) that addresses the mobility issues. In order to support un-interrupted
services and seamless mobility of nodes across the networks (and/or sub-networks) with permanent IP
addresses, handover is performed in mobile IP enabled networks. Handover in mobile IP is source cause of
performance degradation as it results in increased latency and packet loss during handover. Other issues
like scalability issues, ordered packet delivery issues, control plane management issues etc are also
adversely affected by it. The paper provides a constructive survey by classifying, discussing and comparing
different handover techniques that have been proposed so far, for enhancing the performance during
handovers. Finally some general solutions that have been used to solve handover related problems are
briefly discussed.
Performance Evaluation of two Port and four Port Measurement for Twisted Pair...IJECEIAES
This document summarizes a study that evaluated twisted pair cable measurement using two-port and four-port vector network analyzers. Twisted pair cables of 500m and 1000m in length with various conditions were measured. The four-port measurements were converted to two-port S-parameters for comparison. Results showed good correlation between methods at 500m, especially below 50MHz. Four-port measurement is suitable for measuring twisted pair cable up to higher frequencies but over shorter distances. Root mean square error analysis supported this, with lower errors below 5MHz. The study validated using a four-port analyzer for twisted pair cable characterization.
Implementation Cost Analysis of the Interpolator for the Wimax Technologyiosrjce
The design of the multirate filter (programmable) has been proposed which can be used in digital
transceivers that meets 802.16d/e (wimax) standard in the wireless communication system. Wimax is a
technology emerging in the wireless communication system in order to increase the broadband wireless internet
access. As there is wide spread need of the digital representation of the signal for the transmission and storage
which create the challenges in DSP [1]. In this paper, analysis of the implementation cost of interpolator for the
wimax technology, and cost of interpolator is analyzed on the basis of number of adders and multiplier. The
Filters are designed using the FDA (filters design and analysis) tool in MATLAB.
The document summarizes planning and optimization of an LTE radio access network for an urban area in Taiz City, Yemen. It involved using simulation software to plan the network, including determining the number and locations of base stations. The network was then optimized using techniques like Automatic Cell Planning and Automatic Frequency Planning. This improved coverage from 90% to 98%, CINR from 65% to 77%, and increased total network traffic by 30%. The optimization reduced overlapping between sectors and interference, and increased throughput and coverage area.
Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc.
In this module, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations. We will also look at some of the countermeasures you can put in place to protect against such attacks.
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACKIJCNCJournal
Internet of Things (IoT) deployments mostly relies on the establishment of Low-Power and Lossy Networks (LLNs) among a large number of constraint devices. The Internet Engineering Task Force (IETF) provides an effective IPv6-based LLN routing protocol, namely the IPv6 Routing Protocol for Low Power and Lossy Network (RPL). RPL provides adequate protection against external security attacks but stays vulnerable to internal routing attacks such as a rank attack. Malicious RPL nodes can carry out a rank attack in different forms and cause serious network performance degradation. An experimental study of the impact of the decreased rank attack on the overall network performance is presented in this paper. In also besides, it is
important to understand the main influencing factors in this context. In this study, several some many network scenarios were considered with varying network sizes, attacker properties, and topological setups. The experimental results indicate a noticeable adverse effect of the rank attack on the average PDR, delay, ETX, and beacon interval. However, such impact was varied according to network size, attacker position,
attacker neighbor count, number of attack-affected nodes, and overall hops increase. The results give a practical reference to the overall performance of RPL networks under rank attacks.
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
This document discusses enhancing the performance of ad hoc wireless networks using Cisco devices. It proposes using Cisco routers and access points to create a three-layer ad hoc network with endpoints, intermediate coordinators, and a core router layer for improved processing, reliability, cost, power consumption, and accessibility. It then outlines various protocols and configurations that could be implemented using Cisco devices, including NAT, ACLs, DHCP, and wireless security settings. Diagrams and tables show an example network topology and device IP addresses and configurations.
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
Due to the rapidly increasing data speed requirement, it has become essential to smartly utilize the available frequency spectrum. In wireless communications systems, channel quality parameters are often used to enable resource allocation techniques that improve system capacity and user quality. The uncoded bit or symbol error rate (SER) is specified as an important parameter in the second and third generation partnership project (3GPP). Nonetheless, techniques to estimate the uncoded SER are usually not much published. This paper introduces a novel uncoded bit error rate (BER) estimation method using the
accurate-bits sequence of the new channel codes over the AWGN channel. Here, we have used the new channel codes as a forward error correction coding scheme for our communication system. This paper also presents the simulation results to demonstrate and compare the estimation accuracy of the proposed method over the AWGN channel.
Intelligent transportation system (ITS) is an application which provides intelligence to the transportation
and traffic management systems. Although the word ITS applies to all systems in the transportation but as
per the European union directive it is the application of Information and communication technology in the
field of transportation is defined as ITS. The communication technology has evolved greatly today from
2G/3G to long term evolution (LTE). In this paper we focus on the LTE and its application in the ITS. Since
LTE offers excellent QoS, wide area coverage and high availability it is a preferred choice for vehicle to
infrastructure (V2I) service. At the same time the LTE customer base is increasing day by day which results
in congestion and accessing the network to send or request resources becomes difficult. In this paper we
have proposed a group based node selection algorithm to reduce the preamble ID collision otherwise this
uncoordinated preamble ID transmission by vehicle node (VN) will eventually clog the network and there
will be a massive congestion and re-transmissions attempts by VNs to obtain the random access channel
(RACH).
A major role is played in the layout and evaluation of any empirical wireless structure to manifest is the goal of this paper that counterfeit mode architectures affect counterfeit conduct, regarding structure accomplishment metrics, essentially and therefore, the excellent architecture should be explored in order to accomplish the most accurate and reliable results. It is found that the most analytical factors it is found that that actuate counterfeit mode accomplishment are counterfeit time, structure event organizing and
grade of adequate. It is, also, found that counterfeit time in relation to event existence in the real structure
along with the usage of modern architectural concepts such as multi-interweave technology complement
analytical issues too in the advancement of an adequate counterfeit organization for wireless communications. In order to evaluate the above findings an extensive empirical review has been
demeanored analysising several distinct events counterfeitorganizations towards presenting the relation
between channel designing collections, counterfeit time and structure accomplishment.
Cellular wireless systems like GSM suffer from congestion resulting in overall system degradation and poor service delivery. When the traffic demand in a geographical area is high, the input traffic rate will exceed thecapacity of the output lines. This work focused on homogenous wireless network (the network traffic and resource dimensioning that are statistically identical) such that the network performance
evaluation can be reduced to a system with single cell and a single traffic type. Such system can employa queuing model to evaluate the performance metric of a cell in terms of blocking probability.
Five congestion control models were compared in the work to ascertain their peculiarities, they are Erlang B, Erlang C, Engset (cleared), Engset (buffered), and Bernoulli. To analyze the system, an aggregate onedimensional Markov chain wasderived, such that it describes a call arrival process under the assumption
that it is Poisson distributed. The models were simulated and their results show varying performances, however the Bernoulli model (Pb5) tends to show a situation that allows more users access to the system and the congestion level remain unaffected despite increase in the number of users and the offered traffic into the system.
An approach to dsr routing qos by fuzzy genetic algorithmsijwmn
This document summarizes a research paper that proposes improvements to the DSR routing protocol in mobile ad hoc networks through the use of genetic and fuzzy algorithms. The proposed GA-DSR protocol adds link costs to route request packets and has the destination node use the received route requests as input to a genetic algorithm to find the two best routes. It then sends these routes back to the source in a route reply packet. The protocol also uses fuzzy logic to dynamically adjust the route update period based on route error counts. The researchers believe this approach can help improve quality of service in DSR routing by selecting optimal paths based on link costs and maintaining up-to-date routes.
Impact of client antenna’s rotation angle and height of 5g wi fi access point...ijwmn
This paper investigates the impact of antenna rotation’s angle at the receiver side and antenna height at
transmitter side on radio channel’s amount of fading. Amount of fading is considered as a measure of
severity of fading conditions in radio channels. It indicates how severe the fading level relative to Rayleigh
fading channel. The results give an input to optimize height of 5G Wi-Fi access point for better link
performance for different antenna’s rotation angles at receiver side. The investigation covers three
different indoor environments with different multipath dispersion levels in delay and direction domains;
lecture hall, corridor, and banquet hall.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
In ad hoc networks, routing plays a pertinent role. Deploying the appropriate routing protocol is very important in order to achieve best routing performance and reliability. Equally important is the mobility model that is used in the routing protocol. Various mobility models are available and each can have different impact on the performance of the routing protocol. In this paper, we focus on this issue by examining how the routing protocol, Optimized Link State Routing protocol, behaves as the mobility model is varied. For this, three random mobility models, viz., random waypoint, random walk and random direction are considered. The performance metrics used for assessment of Optimized Link State Routing protocol are Optimized Link State Routing protocol, end-to-end delay and packet delivery ratio.
A novel resource efficient dmms approach for network monitoring and controlli...ijwmn
In this paper, we propose a novel Distributed MANET Management System (DMMS) approach to use cross layer models to demonstrate a simplified way of efficiently managing the overall performance of individual network resources (nodes) and the network itself which is critical for not only monitoring the traffic, but also dynamically controlling the end-to-end Quality of Service (QoS) for different applications. In the proposed DMMS architecture, each network resource maintains a set of Management Information Base (MIB) elements and stores resource activities in their abstraction in terms of counters, timer, flag and threshold values. The abstract data is exchanged between different management agents residing in different resources on a need-to-know basis and each agent logically executes management functions locally to develop understanding of the behavior of all network resources to ensure that user protocols can function smoothly. However, in traditional network management systems, they collect statistical data such as resource usage and performance by spoofing of resources. The amount of data that is exchanged with other resources through management protocols that can be extremely high and the bandwidth for overhead management functions increases significantly. Also, the data storage requirements in each network resource for management functions increases and become inefficient as it increases the power usage for processing. Our proposed scheme targets at solving the problems.
Mobility models for delay tolerant network a surveyijwmn
Delay Tolerant Network (DTN) is an emerging networking technology that is widely used in the
environment where end-to-end paths do not exist. DTN follows store-carry-forward mechanism to route
data. This mechanism exploits the mobility of nodes and hence the performances of DTN routing and
application protocols are highly dependent on the underlying mobility of nodes and its characteristics.
Therefore, suitable mobility models are required to be incorporated in the simulation tools to evaluate DTN
protocols across many scenarios. In DTN mobility modelling literature, a number of mobility models have
been developed based on synthetic theory and real world mobility traces. Furthermore, many researchers
have developed specific application oriented mobility models. All these models do not provide accurate
evaluation in the all scenarios. Therefore, model selection is an important issue in DTN protocol
simulation. In this study, we have summarized various widely used mobility models and made a comparison
of their performances. Finally, we have concluded with future research directions in mobility modelling for
DTN simulation.
A cross layer delay-aware node disjoint multipath routing algorithm for mobil...ijwmn
Mobile Ad Hoc Networks (MANETS) require reliable routing and Quality of Service(QoS) mechanism to
support diverse applications with varying and stringent requirements for delay, jitter, bandwidth, packets
loss. Routing protocols such as AODV, AOMDV, DSR and OLSR use shortest path with minimum hop
count as the main metric for path selection, hence are not suitable for delay sensitive real time
applications. To support such applications delay constrained routing protocols are employed. These
Protocols makes path selection between source and destination based on the delay over the discovered
links during routing discovery and routing table calculations. We propose a variation of a node-disjoint
Multipath QoS Routing protocol called Cross Layer Delay aware Node Disjoint Multipath AODV (CLDMAODV)
based on delay constraint. It employs cross-layer communications between MAC and routing
layers to achieve link and channel-awareness. It regularly updates the path status in terms of lowest delay
incurred at each intermediate node. Performance of the proposed protocol is compared with single path
AODV and NDMR protocols. Proposed CLDM-AODV is superior in terms of better packet delivery and
reduced overhead between intermediate nodes.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
Bandwidth aware on demand multipath routing in manetsijwmn
The document proposes a modification to the AOMDV routing protocol to utilize available bandwidth in MANETs. It describes enhancing AOMDV to select multiple paths during route discovery based on available bandwidth, and using periodic detector packets to monitor bandwidth on alternate paths. Simulation results showed this bandwidth-aware multipath approach improves end-to-end throughput, packet delivery ratio, and end-to-end delay compared to the original AOMDV protocol.
New strategy to optimize the performance of spray and wait routing protocolijwmn
Delay Tolerant Networks have been (DTN) have been developed to support the irregular connectivity often
separate networks. The main routing problem in this type of network is embarrassed by time that is
extremely long, since connections are intermittent and opportunistic. Routing protocols must take into
account the maximum constraint encountered in this type of environment , use effective strategies
regarding the choice of relay nodes and buffer management nodes to improve the delivery of messages and
the time of their delivery . This article proposes a new strategy that optimizes the routing Spray and wait.
The proposed method uses the information contained in the messages delivered mostly paths traversed by
the messages before arriving at their destination and the time when nodes have receive these messages.
Simulation results show that the proposed strategy can increase the probability of delivery and minimizing
overhead unlike FIFO technology used with the default routing ' sprat and wait'
Path constrained data gathering scheme for wireless sensor networks with mobi...ijwmn
This document summarizes a research paper on using mobile elements to gather data in wireless sensor networks. The paper proposes a heuristic algorithm called Graph Partitioning (GP) to address the K-Hop tour planning (KH-tour) problem of designing the shortest possible tour for a mobile element to visit a subset of sensor nodes called caching points, such that any node is at most k hops from the tour.
The GP algorithm works by first partitioning the sensor network graph into partitions where the depth of each partition is bounded by k hops. It then identifies the minimum number of caching points needed in each partition. Finally, it constructs the mobile element's tour to visit all the identified caching points.
Stochastic analysis of random ad hoc networks with maximum entropy deploymentsijwmn
In this paper, we present the first stochastic analysis of the link performance of an ad hoc network modelled
by a single homogeneous Poisson point process (HPPP). According to the maximum entropy principle, the
single HPPP model is mathematically the best model for random deployments with a given node density.
However, previous works in the literature only consider a modified model which shows a discrepancy in the
interference distribution with the more suitable single HPPP model. The main contributions of this paper
are as follows. 1) It presents a new mathematical framework leading to closed form expressions of the
probability of success of both one-way transmissions and handshakes for a deployment modelled by a
single HPPP. Our approach, based on stochastic geometry, can be extended to complex protocols. 2) From
the obtained results, all confirmed by comparison to simulated data, optimal PHY and MAC layer
parameters are determined and the relations between them is described in details. 3) The influence of the
routing protocol on handshake performance is taken into account in a realistic manner, leading to the
confirmation of the intuitive result that the effect of imperfect feedback on the probability of success of a
handshake is only negligible for transmissions to the first neighbour node.
Data mining is important process to extract the useful information and pattern from huge amount of data.
NS-2 is an efficient tool to build the environment of network. The results from simulate these environment
in NS-2 is trace file that contains several columns and lines represent the network events. This trace file
can be used to analyse the network according to performance metrics but it has redundant columns and
rows. So, this paper is to perform the data mining in order to find only the necessary information in
analysis operation to reduce the execution time and the storage size of the trace file.
Virtual 2 d positioning system by using wireless sensors in indoor environmentijwmn
A 2D location detection system is constructed by using Wireless Sensor Nodes (WSN) to create aVirtual
Fingerprint map, specifically designed for use in an indoor environment. WSN technologies and
programmable ZigBee wireless network protocols are employed. This system is based on radio-location
fingerprinting technique. Both Linear taper functions and exponential taper functions are utilized with the
received signal strength distributions between the fingerprint nodes to generate virtual fingerprint maps.
Thus, areal and virtual combined fingerprint map is generated across the test area. K-nearest
neighborhood algorithm has been implemented on virtual fingerprint maps, in conjunction with weight
functions used to find the coordinates of the unknown objects. The system Localization accuracies of less
than a grid space areproved in calculations.
Performance analysis of voip over wired and wireless networks network impleme...eSAT Journals
Abstract In this Paper, the objective of simulation models is presented to investigate the performance of VoIP codecs over WiMAX and
FDDI networks that specially design for Aden University. To assure if the University IP network is prepared and adequate for this
new type of traffic before adding any new components, Aden University IP network will be simulated by using OPNET simulation
software then the new VoIP service will be added to the University networks. Different parameters that represent the QoS like end
to end delay, jitter, traffic sends and traffic received, MOS are calculated and analyzed in both network scenarios.
Keywords: VoIP, Codecs, QoS, WiMAX, FDDI
Investigating the performance of voip over wlan in campus networkAlexander Decker
This document discusses a simulation study of Voice over IP (VoIP) performance over a wireless campus network. The study investigated three factors:
1) Increasing the number of VoIP workstations from 6 to 30, which significantly increased jitter, delay, data dropped and decreased throughput. The network could only support 2-4 VoIP clients.
2) Using different voice coding schemes (G.711, G.723, G.729), which found that G.711 had the lowest jitter and delay but highest data dropped, while G.729 had the highest jitter and delay but lowest data dropped.
3) Increasing clients in video conferencing, which was not explicitly studied but would further degrade performance
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Zac Darcy
Voice over IP (VoIP) applications such as Skype, Google Talk, and FaceTime are promising technologies
for providing cheaper voice calls to end users over extant networks. Wireless networks such as WiMAX and
Wi-Fi focus on providing perfection of service for VoIP. However, there are numerous aspects that affect
quality of voice connections over wireless networks [13]. The adoption of Voice over Wireless Local Area
Network is on tremendous increase due its relief, non-invasive, economicexpansion, low maintenance cost,
universal coverage and basic roaming capabilities. However, expansion Voice over Internet Protocol
(VoIP) over Wireless Local Area Network (WLAN) is a challenging task for many network specialist and
engineers. Voice codec is one of the most critical components of a VoIP system. In this project, we evaluate
the performance analysis of various codecs such as G.711, G.723 and G.729 over Wi-Fi networks. NS2 WiFi simulation models are designed. Performance metrics such as Mean Opinion Score (MOS), average
end-to-end latency, and disconcert are evaluated and discussed [13].
1. In this paper, our area of interest is to compare and study the performance analysis of VoIP
codecs in Non-mobility scenarios by changing some parameters and plotting the graphs
throughput, End to end Delay, MOS, Packet delivery Ratio, and Jitter by using Network
Simulator version.
2. In this paper we analyze the different performance parameters, Recent research has focused on
simulation studies with non- mobility scenarios to analyze different VoIP codecs with nodes up to
5. We have simulated the different VoIP codecs in non-mobility scenario with nodes up to 300.
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Zac Darcy
Voice over IP (VoIP) applications such as Skype, Google Talk, and FaceTime are promising technologies for providing cheaper voice calls to end users over extant networks. Wireless networks such as WiMAX and Wi-Fi focus on providing perfection of service for VoIP. However, there are numerous aspects that affect quality of voice connections over wireless networks [13]. The adoption of Voice over Wireless Local Area Network is on tremendous increase due its relief, non-invasive, economicexpansion, low maintenance cost, universal coverage and basic roaming capabilities.
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
Voice over IP (VoIP) applications such as Skype, Google Talk, and FaceTime are promising technologies for providing cheaper voice calls to end users over extant networks. ireless networks such as WiMAX and Wi-Fi focus on providing perfection of service for VoIP. However, there are numerous aspects that affect quality of voice connections over wireless networks [13]. The adoption of Voice over Wireless Local Area
Network is on tremendous increase due its relief, non-invasive, economicexpansion, low maintenance cost, universal coverage and basic roaming capabilities. However, expansion Voice over Internet Protocol (VoIP) over Wireless Local Area Network (WLAN) is a challenging task for many network specialist and engineers. Voice codec is one of the most critical components of a VoIP system. In this project, we evaluate
the performance analysis of various codecs such as G.711, G.723 and G.729 over Wi-Fi networks. NS2 WiFi
simulation models are designed. Performance metrics such as Mean Opinion Score (MOS), average
end-to-end latency, and disconcert are evaluated and discussed [13]. 1. In this paper, our area of interest is to compare and study the performance analysis of VoIP codecs in Non-mobility scenarios by changing some parameters and plotting the graphs throughput, End to end Delay, MOS, Packet delivery Ratio, and Jitter by using Network Simulator version.
2. In this paper we analyze the different performance parameters, Recent research has focused on simulation studies with non- mobility scenarios to analyze different VoIP codecs with nodes up to 5. We have simulated the different VoIP codecs in non-mobility scenario with nodes up to 300.
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Zac Darcy
Voice over IP (VoIP) applications such as Skype, Google Talk, and FaceTime are promising technologies
for providing cheaper voice calls to end users over extant networks. Wireless networks such as WiMAX and
Wi-Fi focus on providing perfection of service for VoIP. However, there are numerous aspects that affect
quality of voice connections over wireless networks [13]. The adoption of Voice over Wireless Local Area
Network is on tremendous increase due its relief, non-invasive, economicexpansion, low maintenance cost,
universal coverage and basic roaming capabilities. However, expansion Voice over Internet Protocol
(VoIP) over Wireless Local Area Network (WLAN) is a challenging task for many network specialist and
engineers. Voice codec is one of the most critical components of a VoIP system. In this project, we evaluate
the performance analysis of various codecs such as G.711, G.723 and G.729 over Wi-Fi networks. NS2 WiFi simulation models are designed. Performance metrics such as Mean Opinion Score (MOS), average
end-to-end latency, and disconcert are evaluated and discussed [13].
1. In this paper, our area of interest is to compare and study the performance analysis of VoIP
codecs in Non-mobility scenarios by changing some parameters and plotting the graphs
throughput, End to end Delay, MOS, Packet delivery Ratio, and Jitter by using Network
Simulator version.
2. In this paper we analyze the different performance parameters, Recent research has focused on
simulation studies with non- mobility scenarios to analyze different VoIP codecs with nodes up to
5. We have simulated the different VoIP codecs in non-mobility scenario with nodes up to 300.
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Zac Darcy
Voice over IP (VoIP) applications such as Skype, Google Talk, and FaceTime are promising technologies
for providing cheaper voice calls to end users over extant networks. Wireless networks such as WiMAX and
Wi-Fi focus on providing perfection of service for VoIP. However, there are numerous aspects that affect
quality of voice connections over wireless networks [13]. The adoption of Voice over Wireless Local Area
Network is on tremendous increase due its relief, non-invasive, economicexpansion, low maintenance cost,
universal coverage and basic roaming capabilities. However, expansion Voice over Internet Protocol
(VoIP) over Wireless Local Area Network (WLAN) is a challenging task for many network specialist and
engineers. Voice codec is one of the most critical components of a VoIP system. In this project, we evaluate
the performance analysis of various codecs such as G.711, G.723 and G.729 over Wi-Fi networks. NS2 WiFi simulation models are designed. Performance metrics such as Mean Opinion Score (MOS), average
end-to-end latency, and disconcert are evaluated and discussed [13].
1. In this paper, our area of interest is to compare and study the performance analysis of VoIP
codecs in Non-mobility scenarios by changing some parameters and plotting the graphs
throughput, End to end Delay, MOS, Packet delivery Ratio, and Jitter by using Network
Simulator version.
2. In this paper we analyze the different performance parameters, Recent research has focused on
simulation studies with non- mobility scenarios to analyze different VoIP codecs with nodes up to
5. We have simulated the different VoIP codecs in non-mobility scenario with nodes up to 300.
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
Voice over IP (VoIP) applications such as Skype, Google Talk, and FaceTime are promising technologies
for providing cheaper voice calls to end users over extant networks. Wireless networks such as WiMAX and
Wi-Fi focus on providing perfection of service for VoIP. However, there are numerous aspects that affect
quality of voice connections over wireless networks [13]. The adoption of Voice over Wireless Local Area
Network is on tremendous increase due its relief, non-invasive, economicexpansion, low maintenance cost,
universal coverage and basic roaming capabilities. However, expansion Voice over Internet Protocol
(VoIP) over Wireless Local Area Network (WLAN) is a challenging task for many network specialist and
engineers. Voice codec is one of the most critical components of a VoIP system. In this project, we evaluate
the performance analysis of various codecs such as G.711, G.723 and G.729 over Wi-Fi networks. NS2 WiFi simulation models are designed. Performance metrics such as Mean Opinion Score (MOS), average
end-to-end latency, and disconcert are evaluated and discussed [13]
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
The recent Voice over IP (VOIP) applications such as Skype, Google Talk, and Face Time have
changed the way people communicate to each other. Due to the low cost, people find VOIP as an
alternative to the expensive traditional Public Switched Telephone Network (PSTN). VOIP has
set of parameters that defined its Quality of Service (QoS) such as end to delay, jitter, packets
loss, Mean Opinion Score (MOS, and throughput[13]. The existing wireless networks such as WiFi offer flexibility to support such applications. At the time the IEEE 802.11 (Wi-Fi) technology
showed great success as cheap wireless internet access. The Motive of this survey paper is to
analyse of Qos in VOIP [13].
This document evaluates the quality of service (QoS) of Voice over Internet Protocol (VoIP) over different broadband networks using the G.729A codec. Simulations were conducted using OPNET Modeler to compare QoS parameters such as mean opinion score, end-to-end delay, jitter, and throughput for VoIP over wired, wireless LAN, UMTS, and WiMAX networks. The results found that wired and WiMAX networks provided the best VoIP quality with high mean opinion scores and low delay and jitter. UMTS had the worst performance with high delay and packet loss affecting voice quality.
Investigating the qo s of voice over ip using wimax accessAlexander Decker
This document discusses investigating the quality of service (QoS) of Voice over IP (VoIP) using WiMAX access networks in a campus network. It aims to identify key network performance parameters for VoIP over WiMAX. The study uses simulation experiments in OPNET to analyze the effects of different voice encoder schemes on VoIP QoS over IEEE 802.16e WiMAX networks. Results show that the choice of voice encoder scheme and number of voice frames per packet can impact VoIP performance over WiMAX, with lower frame sizes and suitable codecs affecting jitter, delay, throughput and other QoS metrics.
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEMEIJCNCJournal
This document discusses optimizing VoIP quality over wireless networks using a cross-layer call admission control scheme. It proposes monitoring real-time control protocol reports and data rates at the MAC layer to determine when quality is degraded. When quality degrades due to issues like network congestion or variable transmission rates, the solution is to adapt the packet size or codec type. The proposed scheme is simulated using a wireless campus network model to improve performance.
Comparisons of QoS in VoIP over WIMAX by Varying the Voice codes and Buffer sizeEditor IJCATR
Voice over Internet Protocol (VoIP) is developed for voice communications system based on voice packets transmitted over
IP network with real-time communications of voice across networks using the Internet protocols. Quality of Service (QoS) mechanism
is applied to guarantee successful voice packets transmitted over IP network with reduced delay or drop according to assigned priority
of voice packets. In this paper, the goal of simulation models is present to investigate the performance of VoIP codecs and buffer size
for improving quality of service (QoS) with the simulation results by using OPNET modeler version 14.5. The performance of the
proposed algorithm is analyzed and compared the quality of service for VoIP. The final simulated result shows that the VoIP service
performance best under G.729 voice encoder scheme and buffer size 256 Kb over WiMAX network.
CASE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS IN NON-MOBILITY SCENARIOSijcsity
IEEE 802.11 is the most popular standard for WLAN networks. It offers different physical transmission
rates. This paper focuses on this multi transmission rate of 802.11 WLANs and its effect on speech quality.
In non-adaptive systems, when the physical layer switches from a higher transmission rate to a lower one,
different than the one that the VoIP flow needs, the switching may result in congestion, high delay and
packet loss, and consequently speech quality degradation. However, there are some algorithms that adapt
the transmission parameters according to the channel conditions. In this study we demonstrate how
choosing parameter (different codec and packet size) can affect the voice quality, network delay and packet
loss. Further, this study presents a comparison between adaptive and non-adaptive methods. The adaptive method has also been evaluated for different congestion level from perceived speech quality point of view.
VOIP PERFORMANCE OVER BROADBAND WIRELESS NETWORKS UNDER STATIC AND MOBILE ENV...ijwmn
Voice over IP is expected to be very promising application in the next generation communication networks. The objective of this paper is to analyse the VoIP performance among the most competing next generation wireless networks like WiMAX, WLAN and its integrated frameworks etc. WiMAX having higher bandwidth provides higher capacity but with degraded quality of service while WLAN provides low capacity and coverage. Hence, an integrated network using WiMAX backbone and WLAN hotspots has been developed and VoIP application has been setup. As OPNET 14.5.A provides a real life simulation environment, we have opted OPNET as the simulation platform for all performance studies in this work. Quality of the service is critically analysed with parameters like jitter, MOS and delay for various voice codecs in the aforesaid networks for both fixed and mobile scenario. Finally, it is observed and concluded that the WiMAX-WLAN integrated network provides improved and optimal performance over WLAN and WiMAX network with respect to network capacity and quality of service. Exhaustive simulation results have been provided.
This document discusses issues and challenges with delivering Voice over IP (VoIP) traffic over WiMAX networks. It begins with an overview of WiMAX technology and architecture, as well as VoIP architecture and codecs. Key issues discussed include limited bandwidth, need for security to encrypt voice transmissions, and link failures causing delays. The document aims to evaluate voice quality over wireless networks and improve delivery of VoIP traffic over WiMAX by addressing factors such as delay, jitter, throughput, and other quality parameters.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
The document summarizes research on using Voice over Internet Protocol (VoIP) for voice communication over wireless networks. VoIP digitizes voice and transmits it over the internet using protocols like SIP and RTP. Factors that affect VoIP quality include delay, jitter, and packet loss. The document discusses how VoIP can provide lower communication costs compared to traditional phone networks and allow optimized functionality like video/audio chats. Routing in VoIP networks aims to ensure stability through well-connected nodes and standardized transmission protocols to minimize packet loss and jitter. Services provided by VoIP include PC-to-PC, PC-to-phone, and phone-to-phone calls over IP networks. Potential drawbacks are reliance on
This document discusses VoIP (Voice over Internet Protocol) techniques and challenges. It begins by introducing VoIP as an alternative to traditional PSTN telephone networks that transmits voice over internet and packet-switched networks more cheaply. However, ensuring high quality of service (QoS) with factors like jitter, packet delay/loss, and bandwidth allocation presents major challenges for VoIP systems. The document goes on to describe how VoIP works by carrying voice in RTP packets within IP packets and discusses challenges to VoIP performance and QoS from system capacity, packet loss, delay, jitter, echo, and security.
This document discusses implementing Voice over IP (VoIP) and IP Multimedia Subsystem services over WiMAX wireless networks. It addresses introducing VoIP and multimedia transmission over wireless, using soft switching for compatibility with WiMAX. It also discusses challenges like ensuring voice quality, security, and E911 support. Finally, it explores services like video on demand that WiMAX networks can provide using IP Media Subsystem technologies.
The document discusses the challenges of wireless Voice over IP (VoIP), including ensuring decent voice quality given network delays and packet loss, developing efficient signaling protocols for mobility, and whether telecom companies can accept losing some control over voice services and infrastructure with an IP-based system. It analyzes technical issues around uplink bandwidth, packetization, and signaling protocols and societal concerns regarding emergency services and lawful interception.
Droidal: AI Agents Revolutionizing HealthcareDroidal LLC
Droidal’s AI Agents are transforming healthcare by bringing intelligence, speed, and efficiency to key areas such as Revenue Cycle Management (RCM), clinical operations, and patient engagement. Built specifically for the needs of U.S. hospitals and clinics, Droidal's solutions are designed to improve outcomes and reduce administrative burden.
Through simple visuals and clear examples, the presentation explains how AI Agents can support medical coding, streamline claims processing, manage denials, ensure compliance, and enhance communication between providers and patients. By integrating seamlessly with existing systems, these agents act as digital coworkers that deliver faster reimbursements, reduce errors, and enable teams to focus more on patient care.
Droidal's AI technology is more than just automation — it's a shift toward intelligent healthcare operations that are scalable, secure, and cost-effective. The presentation also offers insights into future developments in AI-driven healthcare, including how continuous learning and agent autonomy will redefine daily workflows.
Whether you're a healthcare administrator, a tech leader, or a provider looking for smarter solutions, this presentation offers a compelling overview of how Droidal’s AI Agents can help your organization achieve operational excellence and better patient outcomes.
A free demo trial is available for those interested in experiencing Droidal’s AI Agents firsthand. Our team will walk you through a live demo tailored to your specific workflows, helping you understand the immediate value and long-term impact of adopting AI in your healthcare environment.
To request a free trial or learn more:
https://droidal.com/
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...Aaryan Kansari
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generative AI
Discover Agentic AI, the revolutionary step beyond reactive generative AI. Learn how these autonomous systems can reason, plan, execute, and adapt to achieve human-defined goals, acting as digital co-workers. Explore its promise, key frameworks like LangChain and AutoGen, and the challenges in designing reliable and safe AI agents for future workflows.
Sticky Note Bullets:
Definition: Next stage beyond ChatGPT-like systems, offering true autonomy.
Core Function: Can "reason, plan, execute and adapt" independently.
Distinction: Proactive (sets own actions for goals) vs. Reactive (responds to prompts).
Promise: Acts as "digital co-workers," handling grunt work like research, drafting, bug fixing.
Industry Outlook: Seen as a game-changer; Deloitte predicts 50% of companies using GenAI will have agentic AI pilots by 2027.
Key Frameworks: LangChain, Microsoft's AutoGen, LangGraph, CrewAI.
Development Focus: Learning to think in workflows and goals, not just model outputs.
Challenges: Ensuring reliability, safety; agents can still hallucinate or go astray.
Best Practices: Start small, iterate, add memory, keep humans in the loop for final decisions.
Use Cases: Limited only by imagination (e.g., drafting business plans, complex simulations).
Adtran’s SDG 9000 Series brings high-performance, cloud-managed Wi-Fi 7 to homes, businesses and public spaces. Built on a unified SmartOS platform, the portfolio includes outdoor access points, ceiling-mount APs and a 10G PoE router. Intellifi and Mosaic One simplify deployment, deliver AI-driven insights and unlock powerful new revenue streams for service providers.
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....Jasper Oosterveld
Sensitivity labels, powered by Microsoft Purview Information Protection, serve as the foundation for classifying and protecting your sensitive data within Microsoft 365. Their importance extends beyond classification and play a crucial role in enforcing governance policies across your Microsoft 365 environment. Join me, a Data Security Consultant and Microsoft MVP, as I share practical tips and tricks to get the full potential of sensitivity labels. I discuss sensitive information types, automatic labeling, and seamless integration with Data Loss Prevention, Teams Premium, and Microsoft 365 Copilot.
Introducing FME Realize: A New Era of Spatial Computing and ARSafe Software
A new era for the FME Platform has arrived – and it’s taking data into the real world.
Meet FME Realize: marking a new chapter in how organizations connect digital information with the physical environment around them. With the addition of FME Realize, FME has evolved into an All-data, Any-AI Spatial Computing Platform.
FME Realize brings spatial computing, augmented reality (AR), and the full power of FME to mobile teams: making it easy to visualize, interact with, and update data right in the field. From infrastructure management to asset inspections, you can put any data into real-world context, instantly.
Join us to discover how spatial computing, powered by FME, enables digital twins, AI-driven insights, and real-time field interactions: all through an intuitive no-code experience.
In this one-hour webinar, you’ll:
-Explore what FME Realize includes and how it fits into the FME Platform
-Learn how to deliver real-time AR experiences, fast
-See how FME enables live, contextual interactions with enterprise data across systems
-See demos, including ones you can try yourself
-Get tutorials and downloadable resources to help you start right away
Whether you’re exploring spatial computing for the first time or looking to scale AR across your organization, this session will give you the tools and insights to get started with confidence.
Nix(OS) for Python Developers - PyCon 25 (Bologna, Italia)Peter Bittner
How do you onboard new colleagues in 2025? How long does it take? Would you love a standardized setup under version control that everyone can customize for themselves? A stable desktop setup, reinstalled in just minutes. It can be done.
This talk was given in Italian, 29 May 2025, at PyCon 25, Bologna, Italy. All slides are provided in English.
Original slides at https://slides.com/bittner/pycon25-nixos-for-python-developers
Maxx nft market place new generation nft marketing placeusersalmanrazdelhi
PREFACE OF MAXXNFT
MaxxNFT: Powering the Future of Digital Ownership
MaxxNFT is a cutting-edge Web3 platform designed to revolutionize how
digital assets are owned, traded, and valued. Positioned at the forefront of the
NFT movement, MaxxNFT views NFTs not just as collectibles, but as the next
generation of internet equity—unique, verifiable digital assets that unlock new
possibilities for creators, investors, and everyday users alike.
Through strategic integrations with OKT Chain and OKX Web3, MaxxNFT
enables seamless cross-chain NFT trading, improved liquidity, and enhanced
user accessibility. These collaborations make it easier than ever to participate
in the NFT ecosystem while expanding the platform’s global reach.
With a focus on innovation, user rewards, and inclusive financial growth,
MaxxNFT offers multiple income streams—from referral bonuses to liquidity
incentives—creating a vibrant community-driven economy. Whether you
'
re
minting your first NFT or building a digital asset portfolio, MaxxNFT empowers
you to participate in the future of decentralized value exchange.
https://maxxnft.xyz/
New Ways to Reduce Database Costs with ScyllaDBScyllaDB
How ScyllaDB’s latest capabilities can reduce your infrastructure costs
ScyllaDB has been obsessed with price-performance from day 1. Our core database is architected with low-level engineering optimizations that squeeze every ounce of power from the underlying infrastructure. And we just completed a multi-year effort to introduce a set of new capabilities for additional savings.
Join this webinar to learn about these new capabilities: the underlying challenges we wanted to address, the workloads that will benefit most from each, and how to get started. We’ll cover ways to:
- Avoid overprovisioning with “just-in-time” scaling
- Safely operate at up to ~90% storage utilization
- Cut network costs with new compression strategies and file-based streaming
We’ll also highlight a “hidden gem” capability that lets you safely balance multiple workloads in a single cluster. To conclude, we will share the efficiency-focused capabilities on our short-term and long-term roadmaps.
Protecting Your Sensitive Data with Microsoft Purview - IRMS 2025Nikki Chapple
Session | Protecting Your Sensitive Data with Microsoft Purview: Practical Information Protection and DLP Strategies
Presenter | Nikki Chapple (MVP| Principal Cloud Architect CloudWay) & Ryan John Murphy (Microsoft)
Event | IRMS Conference 2025
Format | Birmingham UK
Date | 18-20 May 2025
In this closing keynote session from the IRMS Conference 2025, Nikki Chapple and Ryan John Murphy deliver a compelling and practical guide to data protection, compliance, and information governance using Microsoft Purview. As organizations generate over 2 billion pieces of content daily in Microsoft 365, the need for robust data classification, sensitivity labeling, and Data Loss Prevention (DLP) has never been more urgent.
This session addresses the growing challenge of managing unstructured data, with 73% of sensitive content remaining undiscovered and unclassified. Using a mountaineering metaphor, the speakers introduce the “Secure by Default” blueprint—a four-phase maturity model designed to help organizations scale their data security journey with confidence, clarity, and control.
🔐 Key Topics and Microsoft 365 Security Features Covered:
Microsoft Purview Information Protection and DLP
Sensitivity labels, auto-labeling, and adaptive protection
Data discovery, classification, and content labeling
DLP for both labeled and unlabeled content
SharePoint Advanced Management for workspace governance
Microsoft 365 compliance center best practices
Real-world case study: reducing 42 sensitivity labels to 4 parent labels
Empowering users through training, change management, and adoption strategies
🧭 The Secure by Default Path – Microsoft Purview Maturity Model:
Foundational – Apply default sensitivity labels at content creation; train users to manage exceptions; implement DLP for labeled content.
Managed – Focus on crown jewel data; use client-side auto-labeling; apply DLP to unlabeled content; enable adaptive protection.
Optimized – Auto-label historical content; simulate and test policies; use advanced classifiers to identify sensitive data at scale.
Strategic – Conduct operational reviews; identify new labeling scenarios; implement workspace governance using SharePoint Advanced Management.
🎒 Top Takeaways for Information Management Professionals:
Start secure. Stay protected. Expand with purpose.
Simplify your sensitivity label taxonomy for better adoption.
Train your users—they are your first line of defense.
Don’t wait for perfection—start small and iterate fast.
Align your data protection strategy with business goals and regulatory requirements.
💡 Who Should Watch This Presentation?
This session is ideal for compliance officers, IT administrators, records managers, data protection officers (DPOs), security architects, and Microsoft 365 governance leads. Whether you're in the public sector, financial services, healthcare, or education.
🔗 Read the blog: https://nikkichapple.com/irms-conference-2025/
As data privacy regulations become more pervasive across the globe and organizations increasingly handle and transfer (including across borders) meaningful volumes of personal and confidential information, the need for robust contracts to be in place is more important than ever.
This webinar will provide a deep dive into privacy contracting, covering essential terms and concepts, negotiation strategies, and key practices for managing data privacy risks.
Whether you're in legal, privacy, security, compliance, GRC, procurement, or otherwise, this session will include actionable insights and practical strategies to help you enhance your agreements, reduce risk, and enable your business to move fast while protecting itself.
This webinar will review key aspects and considerations in privacy contracting, including:
- Data processing addenda, cross-border transfer terms including EU Model Clauses/Standard Contractual Clauses, etc.
- Certain legally-required provisions (as well as how to ensure compliance with those provisions)
- Negotiation tactics and common issues
- Recent lessons from recent regulatory actions and disputes
Contributing to WordPress With & Without Code.pptxPatrick Lumumba
Contributing to WordPress: Making an Impact on the Test Team—With or Without Coding Skills
WordPress survives on collaboration, and the Test Team plays a very important role in ensuring the CMS is stable, user-friendly, and accessible to everyone.
This talk aims to deconstruct the myth that one has to be a developer to contribute to WordPress. In this session, I will share with the audience how to get involved with the WordPress Team, whether a coder or not.
We’ll explore practical ways to contribute, from testing new features, and patches, to reporting bugs. By the end of this talk, the audience will have the tools and confidence to make a meaningful impact on WordPress—no matter the skill set.
European Accessibility Act & Integrated Accessibility TestingJulia Undeutsch
Emma Dawson will guide you through two important topics in this session.
Firstly, she will prepare you for the European Accessibility Act (EAA), which comes into effect on 28 June 2025, and show you how development teams can prepare for it.
In the second part of the webinar, Emma Dawson will explore with you various integrated testing methods and tools that will help you improve accessibility during the development cycle, such as Linters, Storybook, Playwright, just to name a few.
Focus: European Accessibility Act, Integrated Testing tools and methods (e.g. Linters, Storybook, Playwright)
Target audience: Everyone, Developers, Testers
Improving Developer Productivity With DORA, SPACE, and DevExJustin Reock
Ready to measure and improve developer productivity in your organization?
Join Justin Reock, Deputy CTO at DX, for an interactive session where you'll learn actionable strategies to measure and increase engineering performance.
Leave this session equipped with a comprehensive understanding of developer productivity and a roadmap to create a high-performing engineering team in your company.
Measuring Microsoft 365 Copilot and Gen AI SuccessNikki Chapple
Session | Measuring Microsoft 365 Copilot and Gen AI Success with Viva Insights and Purview
Presenter | Nikki Chapple 2 x MVP and Principal Cloud Architect at CloudWay
Event | European Collaboration Conference 2025
Format | In person Germany
Date | 28 May 2025
📊 Measuring Copilot and Gen AI Success with Viva Insights and Purview
Presented by Nikki Chapple – Microsoft 365 MVP & Principal Cloud Architect, CloudWay
How do you measure the success—and manage the risks—of Microsoft 365 Copilot and Generative AI (Gen AI)? In this ECS 2025 session, Microsoft MVP and Principal Cloud Architect Nikki Chapple explores how to go beyond basic usage metrics to gain full-spectrum visibility into AI adoption, business impact, user sentiment, and data security.
🎯 Key Topics Covered:
Microsoft 365 Copilot usage and adoption metrics
Viva Insights Copilot Analytics and Dashboard
Microsoft Purview Data Security Posture Management (DSPM) for AI
Measuring AI readiness, impact, and sentiment
Identifying and mitigating risks from third-party Gen AI tools
Shadow IT, oversharing, and compliance risks
Microsoft 365 Admin Center reports and Copilot Readiness
Power BI-based Copilot Business Impact Report (Preview)
📊 Why AI Measurement Matters: Without meaningful measurement, organizations risk operating in the dark—unable to prove ROI, identify friction points, or detect compliance violations. Nikki presents a unified framework combining quantitative metrics, qualitative insights, and risk monitoring to help organizations:
Prove ROI on AI investments
Drive responsible adoption
Protect sensitive data
Ensure compliance and governance
🔍 Tools and Reports Highlighted:
Microsoft 365 Admin Center: Copilot Overview, Usage, Readiness, Agents, Chat, and Adoption Score
Viva Insights Copilot Dashboard: Readiness, Adoption, Impact, Sentiment
Copilot Business Impact Report: Power BI integration for business outcome mapping
Microsoft Purview DSPM for AI: Discover and govern Copilot and third-party Gen AI usage
🔐 Security and Compliance Insights: Learn how to detect unsanctioned Gen AI tools like ChatGPT, Gemini, and Claude, track oversharing, and apply eDLP and Insider Risk Management (IRM) policies. Understand how to use Microsoft Purview—even without E5 Compliance—to monitor Copilot usage and protect sensitive data.
📈 Who Should Watch: This session is ideal for IT leaders, security professionals, compliance officers, and Microsoft 365 admins looking to:
Maximize the value of Microsoft Copilot
Build a secure, measurable AI strategy
Align AI usage with business goals and compliance requirements
🔗 Read the blog https://nikkichapple.com/measuring-copilot-gen-ai/
6th Power Grid Model Meetup
Join the Power Grid Model community for an exciting day of sharing experiences, learning from each other, planning, and collaborating.
This hybrid in-person/online event will include a full day agenda, with the opportunity to socialize afterwards for in-person attendees.
If you have a hackathon proposal, tell us when you register!
About Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
Kubernetes Cloud Native Indonesia Meetup - May 2025Prasta Maha
Performance analysis of voip traffic over integrating wireless lan and wan using different codecs
1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 3, June 2014
DOI : 10.5121/ijwmn.2014.6306 79
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER
INTEGRATING WIRELESS LAN AND WAN USING
DIFFERENT CODECS
Ali M. Alsahlany1
1
Department of Communication Engineering, Al-Najaf Technical College, Foundation
of Technical Education, Iraq
ABSTRACT
A simulation model is presented to analyze and evaluate the performance of VoIP based integrated
wireless LAN/WAN with taking into account various voice encoding schemes. The network model was
simulated using OPNET Modeler software. Different parameters that indicate the QoS like MOS, jitter,
end to end delay, traffic send and traffic received are calculated and analyzed in Wireless LAN/WAN
scenarios. Depending on this evaluation, Selection codecs G.729A consider the best choice for VoIP.
KEYWORDS
VoIP, Codecs, QoS
1. INTRODUCTION
During the recent years, there is a growing trend in real time voice communication using
Internet protocol (IP). Voice over Internet Protocol (VoIP) is a technology that allows delivery
of voice communications over the Internet or other packet switched networks rather than the
traditional Public Switched Telephone Network (PSTN). Many VoIP applications are available
on the internet: Skype, Viber, Tango, and Yahoo messenger. All of these applications provide
good quality, and free calls. In VoIP the analogue voice signal of the transmitter is converted
into digital format before compression and encoding it into a stream of IP packets for
transmission to the receiver over IP network. At the receiving end, Digital to Analogue
Converter (DAC) works on regenerating the original analogue voice signal after reassemble
received IP packets in order and processing it [1].
There are many authors have worked on various Quality of Service (QoS) parameters using
different service classes in different network types. A study was conducted on various quality
parameters impacting on the VOIP service performance. The study refers that these parameters
of QoS are required to increase the performance of a VoIP. Researchers in [2], have compared
the performance of the VoIP in both Ethernet LAN (802.3) and Wireless LAN (IEEE 802.11).
They examine how VoIP performs in two different network setups and analyzes the results
obtained using OPNETsimulator. They also examine the optimization of IEEE 802.11e for QoS
using the priorities to provide real time service for VoIP. Various QoS parameters like
throughput and average delay for VoIP using different protocols are analyzed in Ref. [3] using
OPNET simulator. Simulation results show that the Optimized Link State Routing protocol has
better performance in terms of throughput and average delay. Similar analysis has been
conducted in [4] to analyze the QoS of VoIP deployment over WiMAX network and compare
2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 3, June 2014
80
the performance obtained over various service classes. In [5] authors discussed a handoff
mechanism effect on VoIP traffic in Wireless LANs for intra and inter mobility. The study was
oriented towards the assessment of the quality of the voice traffic, the packet delays, and delay
jitter during the handover operation. Atiur et.al. [6], used an analytical model to estimate the
VoIP call capacity of IEEE 802.11g wireless LAN to support single hop networks and multi-
hop VoIP services. The authors discovered that, the number of hops between VoIP transmitters
in IEEE 802.11g wireless LAN has effects on call quality. Hussein et al. [7], conducted a
comparison between different queue algorithms. The authors found that Priority queue and
Weight Fair Queuing algorithms are the most appropriate to improve QoS for VoIP. In [8]
authors used VoIP as the multimedia measurement to identify the main limitations for
enhancing QoS in Wireless LANs, compared to wired networks.
However, none of them have presented accurate approximations to predict the performance of
QoS for VoIP when various audio codec schemes are used. Also, most of these studies were
performed in a small distance network area without taking real WAN as a one of real
application environment. In his paper, the OPNET simulator used to implement the proposed
VoIP Network. The simulation model for the proposed network is a private network for a
company has two locations located at two different countries around the world in order to
simulate the communications between two locations as a long distance and the same location as
a local. The major factors that affect on the QoS for VoIP such as: mean opinion score (MOS),
average end to end delay, jitter, traffic send, and traffic received are analyzed according to
International Telecommunication Union (ITU) standards.
A comparison was carried out between different codecs (G.711, G.729A and G.723.1) which
are the most appropriate to improve QoS for VoIP.
The rest of this paper is organized as follows. Section 2 focus on VoIP codec schemes. The
model design and configuration networks are described in Section 3. Section 4 presents
simulation results and analysis. Finally, Section 5 concludes the paper.
2. VOIP CODECS
A codec is the term used for the word coder-decoder, converts of analog audio signals into
compressed digital form for transmission and then back into an uncompressed audio signal
for the reception. There are different codec types based on the selected sampling rate, data
rate, and implemented compression. the most common codecs used for VoIP applications
are G.711, G722, G723, G726, G728, G729A, etc. each of which varies in the sound
quality, the bandwidth required, the computational requirements, encoding algorithm and
coding delay [3, 9, 10]:
In our evaluations codecs of ITU standards for audio compression and decompression are
used. Following table lists some features of the most common codecs: G.711, G.723.1, and
G.729A.
3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 3, June 2014
81
Table 1: Features of the most common codecs: G.711, G.723.1 and G.729A
IUT-T
Codec
Algorithm
Codec
Delay
(ms)
Bit Rate
(Kbps)
Packets
Per
Second
IP Packet
Size
(bytes)
Comments
G.711 pulse-code
modulation (PCM)
0 .375 64 100 120
Delivers precise speech
transmission. Very low
processor requirements
G.723.1
Multipulse
maximum likelihood
quantization/algebra
c-code excited linear
prediction
97.5 5.3 33 60
High compression with
high quality audio. Can
use with dial-up. Lot of
processor power
G.729A
Conjugate Structure
– Algebraic Code
Excited Linear
Prediction (ACELP)
35 8 100 50
Excellent bandwidth
utilization. Error
tolerant
3. NETWORK MODEL DESCRIPTION
Our simulation approach uses OPNET simulator for network modeling. OPNET simulator is an
authoritative communication system simulator developed by OPNET Technologies.
This simulation model was run in three different scenarios to evaluate the difference in
performance and to determine the best audio encoding schemes of utilizing VoIP over
integrating Wireless LAN/WAN. All the scenarios follows the same structure and the same
topology. The basic difference in all the scenarios is with the configuration of the corresponding
application and the profiles. As one scenario is implemented with the codec G.711, G.723.1,
and G.729.1. Various comparisons conducted to find the values of various parameters.
The simulation model for the network under study is illustrated in Figure 1. The Application
Config, Profile Config, Mobility Config and QoS Attribute Config are included in the model.
The Wireless LANs has been considered as the components of the whole network and its nodes
are using VoIP services.
A frame relay model supporting Permanent Virtual Circuit (PVC) implemented for the WAN.
At each end of the frame relay we had subnets. Inside these subnets was a Wireless LAN
environment. The Wireless LAN environments consisted of 3 Routers and 5 workstations in
each Router. All the Routers connected together using a Switch. At wireless subnet_0 as shown
in Figure 2, Two Servers were connected to the Ethernet Router titled VoIP_Server and Server.
The VoIP_Server handled the VOIP traffic and the Server handled the FTP and HTTP traffic.
All The Wireless LAN Routers were connected to the frame relay via an Ethernet Router that
connected the Switch. The WAN and Wireless LAN were both star topologies.
4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 3, June 2014
82
Figure 1: The Simulation Network Model
Figure 2: The wireless subnet_0
5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 3, June 2014
83
Figure 3: The wireless subnet_1
3.1 BASIC PARAMETER
The Point to Point WAN was connected directly to the Ethernet Router in each subnet using a
DS0 line. The model name of the link was ‘point_to_point_link_adv’. The Wireless LAN
environment used 1Gbps Ethernet cable for all the wired connections to the Router, Switch, and
Servers. The OPNET model name for the Servers was ‘ethernet_server’. Each Wireless LAN
environment contains a Router and 2 fixed wireless workstations and 3 moving wireless
workstations in each Router. All these wireless nodes use VoIP services. The Routers and
workstations were using 802.11g running at a data rate of 54 Mbps. There were a total of 15
workstations in each subnet. The workstations were generating traffic across the WAN and the
Wireless LAN environment to simulate a real office environment. The Routers OPNET model
name was ‘wlan_ethernet_slip4_adv. The fixed VoIP workstation model and the moving VoIP
workstation model name were ‘wlan_wksn_adv’.
All the parameters using in the Wireless LAN environment have the same value in the same
subnet. The Wireless LAN attributes are shown in Table 2.
Table 2: Parameters used in simulation
Parameter Value
Physical characteristic IEEE 802.11g
Data Rate 54 Mbps
Roaming Capability Enable
Transmit Power 0.005 W
Power Threshold -95 db
Short Retry Limit 7
Long Retry Limit 4
6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 3, June 2014
84
3.2 APPLICATION, PROFILE, AND MOBILITY CONFIGURATIONS
Application Definitions were where the applications were created for traffic generation on the
network. There are 3 applications used in each scenario. These are VoIP, FTP and web
browsing applications. The important one was VoIP. In the Voice category IP Telephony
selected for configuration VoIP. In the VoIP application, voice attributes setup as codec scheme
G.711 for scenario 1; G.723.1 for scenario 2; and G.729A for scenario 3. G.729A operates at a
bit rate of 8 Kbps, G.723.1 operates at a bit rate of 5.3/6.3 Kbps and G.711 operates at a bit rate
of 64 Kbps. For the QoS scenarios the VoIP table type of service (ToS) was changed to 8 to
give voice priority. Other parameters that were set for this project were file transfer and web
browsing. For each of these applications mentioned there was a heavy usage parameter set for
each one.
Profile Configuration describes the activity applications used by users through a period of time.
The FTP_Profile was using VoIP, FTP, Web Browsing and File Transfer with light usage
parameters. VoIP_Profile was only using VoIP applications, these were the dedicated IP
phones. All the Profiles configured to run simultaneously to allow more than one application to
operate at the same time.
The Profile Definition for VoIP traffic is configured that the first VoIP call is starting at 100
second (60 seconds offset time + 40 seconds start time) of the simulation, after that one VoIP
call is added after 1 second. The addition of VoIP calls is prepared by repeating the voice
application in the Profile Definition. This procedure continues till the end of the simulation.
Mobility Configuration setup the trajectory for the wireless mobile nodes in the Wireless LAN
environments. There were two vector mobility profiles. The differences in the profiles were
mobility speed.
4. SIMULATION RESULTS AND ANALYSIS
The following figures are obtained after collecting statistics by using OPNET Modeler
simulation tool. Each figure shows a comparative picture of the three scenarios. All the three
scenarios are using a different audio codec scheme such as G.911, G.923 and G.929. After
successfully running the simulation, The result shows the impact of different codecs on different
QoS parameters in a VoIP network. Following are the figures that show different QoS
parameters like MOS, Voice packet end to end delay (sec), Voice jitter (sec), Voice traffic
sends (packet/sec) and Voice traffic received (packet/sec).
The most widely used QoS metric in VoIP applications is MOS. The MOS value describes the
voice perception quality. The average MOS value for the three codecs is represented in Figure
4. Codecs G. 711 and G. 729A have acceptable MOS values 3.685 and 3.067, respectively. On
the other hand, the MOS value for G. 723.1 is 2.557 which indicates that the quality of service
is poor if this codec used.
7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 3, June 2014
85
Figure 4: Average voice MOS under various codecs
Average end to end delay metric is shown in Figure 5. G.729A presents the best performance
with respect to other codecs. These results are due to transfer rate and packet size. The low
packets transfer and the larger packet size, the more time is required to process them. The
relatively high transfer rate (8 kbps) and low packet size (20 bytes) for G.729A make G.729A
the ideal codecs. Otherwise, G.723.1 and G.711 suffered highest delay than G.729A for the
reason that it has the lowest bit rate (5.3 kbps for G.723.1) and larger packet size (160 bytes for
G.711). In turn, the end to end delay is increased with transfer rate and packet size.
8. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 3, June 2014
86
Figure5: Average voice packet End to End delay (sec) under various audio codecs
Figure 6 describes the average voice jitter comparison using different codecs. From the Figure,
the variation of the codec G.729A is minimum and approximately constant throughout the
simulation. The average voice jitter variation in case of codec G.723.1 is higher than the other
two codecs at the earlier time of simulation, but after some time it falls down. The jitte
variation in case of G.711 lies between two other audio codecs. The voice jitter threshold for
smooth communication in VoIP network is about 1 ms [11] so audio codec G.729A gives better
results than audio codecs G.711 and G.723.1 respectively. So there is a high increase in jitter as
audio codecs G.711 and G.723.1 are added to the network. This increase in voice jitter makes
the voice difficult to understand due to arriving packets at different time . The use audio codec
G.729A will make the jitter less and best performance of VoIP application in Integrating
Wireless LAN and WAN.
9. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 3, June 2014
87
Figure 6: Average Jitter under various audio codecs
Average voice traffic sent and received is presented in Figure 7. Any network to be more
efficiency these two traffics must be equal. The traffic received by the network with codec G.
729 is less deviated from the traffic sent comparatively with codec G.723.1 and G.711. This
analysis indicates that the noise added in the G.729A network is less when compared to the
other networks, so this codec is more efficient.
10. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 3, June 2014
88
Figure 7: Average voice traffic sent and received under various audio Codecs.
5. CONCLUSION
In this paper, analysis and evaluation of the QoS performance for VoIP traffic under various
voice codecs was carried out. The use of codecs appropriately is very important in the
implementation of VoIP to generate maximum QoS value. The result shows a selection of
G.729A codec in a simulation gives a significant result for the performance of VoIP that codec
G.729A has acceptable MOS value and less deviation of received to transmit packet as
compared to G.711 and G.723.1 also average delay like end to end delay and Voice jitter is
lesser in codec G.729A as compared to the other two referenced codecs.
11. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 3, June 2014
89
REFERENCES
[1] Y. Jung, and C. Manzano, "Burst packet loss and enhanced packet loss-based quality model for
mobile voice-over Internet protocol applications," Journal of IET Commun., Vol. 8, Iss. 1, pp. 41–49,
2014.
[2] K. Neupane, and et al, " Measuring the Performance of VoIP over Wireless LAN," In Proceedings of
the 2011 conference on Information technology education (SIGITE '11), New York, USA, pp. 269-
274, 2011.
[3] S. Anand, and et al, " Performance Analysis of VoIP Traffic using various Protocols and Throughput
enhancement in WLANs," International Conference on Computer, Communication and Electrical
Technology," March 18-19, pp. 176-180, 2011.
[4] T. Anouari, and A. Haqiq, " Performance Analysis of VoIP Traffic in WiMAX using various Service
Classes," International Journal of Computer Applications,Vol. 52, No.20, August, pp. 29-34, 2012.
[5] Abderrahmane Lakas, " Experimental Analysis of VoIP over Wireless Local Area Networks,"
Journal of Communications, Vol. 2, No. 4, June , pp. 3-9, 2007.
[6] M. Atiur, and et al, " An Analytical Approach for Voice Capacity Estimation Over WiFi Network
Using ITU-T E-Model," IEEE Transactions on Multimedia, Vol. 16, No. 2, pp. 360-372, Feb., 2014.
[7] Hussein, and et al, " The Effects of Different Queuing Algorithmswithin the Router on QoS VoIP
application Using OPNET," International Journal of Computer Networks & Communications (IJCNC)
Vol.5, No.1, Jan , pp. 117-124, 2013.
[8] Ayman Wazwaz, and et al, " Analysis of QoS parameters of VOIP calls over Wireless Local Area
Networks" The 13th International Arab Conference on Information Technology ACIT', Dec.10-13,
pp. 409-414, 2012.
[9] T. Daengsi, and et al, "A Study of Perceptual VoIP Quality Evaluation with Thai Users and Codec
Selection Using Voice Quality - Bandwidth Tradeoff Analysis," ICT Convergence (ICTC), 2013
International Conference ,pp.691-696, 2013.
[10] S. Brak , and et al, " Speech Quality Evaluation Based CODEC for VOIP over 802.11P,"
International Journal of Wireless & Mobile Networks (IJWMN), Vol. 5, No. 2, April, pp. 59-69,
2013.
[11] U. R. Alo, and Nweke Henry, " Investigating the Performance of VOIP over WLAN in Campus
Network," Journal of Computer Engineering and Intelligent Systems, Vol.4, No.4, pp. 47-58, 2013.
Author
Ali M. Alsahlany ([email protected]) has got his MSc in communications
engineering from Basrah University in 2012. He is now working as a lecturer for
computer networks and wireless communications engineering in Communication
Engineering Department at Foundation of Technical Education. His area of interest
includes Computer Networks, Wireless and Mobile Networks, Optical
Communicationand , and Data Communications.