Telecom IT ◽  
2020 ◽  
Vol 8 (2) ◽  
pp. 12-19
Author(s):  
M. Buranova

Analysis of the parameters of the functioning of IP-networks in the processing of multimedia streams is a very important task. There are many approaches to assessing the quality of service parameters in the G/G/1 system. Changing the delay of packets on the network is a very important parameter that deter-mines the quality of traffic processing. The change in delay is usually defined either as packet jitter or as a variation in packet delay. At the same time, the required accuracy in determining the parameters can be obtained quite accurately, since all decisions are mainly based on certain assumptions. The paper presents an approach to determining the change in packet delay in the G/G/1 system as packet jitter. The basis of the presented approach is the approximation of arbitrary distributions by hyperexponential distributions, i.e. modeling of the G/G/1 system by the H2/H2/1 system. The solution to the jitter estima-tion problem is to determine the distribution parameters. To evaluate the parameters of hyperexponen-tial distributions, the EM algorithm is used. As the traffic studied, a multimedia stream registered on a real network was used. An analytical estimate of jitter in the G/G/1 system is obtained. The results ob-tained are applicable for independent flows and for random variables uncorrelated in the structure of each sequence.


2015 ◽  
Vol 14 (6) ◽  
pp. 5809-5813
Author(s):  
Abhishek Prabhakar ◽  
Amod Tiwari ◽  
Vinay Kumar Pathak

Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.


Author(s):  
Simar Preet Singh ◽  
Rajesh Kumar ◽  
Anju Sharma ◽  
S. Raji Reddy ◽  
Priyanka Vashisht

Background: Fog computing paradigm has recently emerged and gained higher attention in present era of Internet of Things. The growth of large number of devices all around, leads to the situation of flow of packets everywhere on the Internet. To overcome this situation and to provide computations at network edge, fog computing is the need of present time that enhances traffic management and avoids critical situations of jam, congestion etc. Methods: For research purposes, there are many methods to implement the scenarios of fog computing i.e. real-time implementation, implementation using emulators, implementation using simulators etc. The present study aims to describe the various simulation and emulation tools for implementing fog computing scenarios. Results: Review shows that iFogSim is the simulator that most of the researchers use in their research work. Among emulators, EmuFog is being used at higher pace than other available emulators. This might be due to ease of implementation and user-friendly nature of these tools and language these tools are based upon. The use of such tools enhance better research experience and leads to improved quality of service parameters (like bandwidth, network, security etc.). Conclusion: There are many fog computing simulators/emulators based on many different platforms that uses different programming languages. The paper concludes that the two main simulation and emulation tools in the area of fog computing are iFogSim and EmuFog. Accessibility of these simulation/emulation tools enhance better research experience and leads to improved quality of service parameters along with the ease of their usage.


Sign in / Sign up

Export Citation Format

Share Document