scholarly journals Comparison of Multicast Algorithm Evaluation Results in Low and High Multicast Saturation Environments

Author(s):  
Krzysztof Stachowiak ◽  
Piotr Zwierzykowski

The multicast quality of service-enabled routing is a computationally challenging task. Despite ongoing research efforts, the associated mathematical problems are still considered to be NP-hard. In certain applications, computational complexity of finding the optimal connection between a set of network devices may be a particularly difficult challenge. For example, connecting a small group of participants of a teleconference is not much more complex than setting up a set of mutual point-to-point connections. On the other hand, satisfying the demand for such services as IPTV, with their receivers constituting the majority of the network, requires applying appropriate optimization methods in order to ensure real system execution. In this paper, algorithms solving this class of problems are considered. The notion of multicast saturation is introduced to measure the amount of multicast participants relative to the entire network, and the efficiency of the analyzed algorithms is evaluated for different saturation degrees.

2021 ◽  
Vol 3 (1) ◽  
pp. 21-24
Author(s):  
Ali Humardani ◽  
Yuly Peristiowati ◽  
Agusta D. Ellina

Handling emergency cases must not only be carried out quickly but also must be precise. Standard Operating Procedures (SOP) is one of the instruments to measure the quality of service. the number of patient visits that can affect the quality of service. Triage is a way of sorting patients based on therapy needs and available resources. Therapy is based on ABC conditions (Airway, with cervical spine control, Breathing, and Circulation with bleeding control). On the other hand, the COVID-19 pandemic greatly affects the response time, impacting the number of patient visits. Response time is the time between the beginning of a request being responded to in other words it can be called response time. A good response time for patients is 5 minutes. The purpose of this study was to identify the relationship between the number of patient visits and the accuracy of triage implementation and response time. The electronic database used is PubMed, Springer, and Google Scholar with a search strategy using the PICO (patient, intervention, comparison, and outcome) method.


Author(s):  
Anil Kumar ◽  
Mohan Balaji ◽  
Ujjwal Krishna ◽  
Mohit Yadav

The chapter examines various viewpoints in regards to Reliance Jio and Bharti Airtel. This includes the entry of Jio in the telecom space along with the difference in the market Jio bought right after its introduction of the services for public. The focus area for the research has been the secondary sources. A complete understanding of both these companies has been taken into account for this study to pick up the points that both Jio and Bharti have been lacking upon and areas in which one has surpassed the other by attracting a new set of consumers into their family. The chapter as recorded by the facts presented through the Telecom Regulatory Authority of India Analytics Portal witnessed that Jio proved to have an upper hand in terms of the quality of service, which included data speed and tariffs. The other side of the story shows Bharti Airtel's lack of dominance in 4G experience delivery after Jio's entrance.


Author(s):  
Anthony M. Pagano ◽  
Paul Metaxatos ◽  
Mark King

The few computer-assisted scheduling and dispatching (CASD) systems evaluated to date do not, in general, provide details on the effects of quality of service. An analysis of the quality-of-service effects of a CASD system in central Illinois is presented. The analysis finds that a variety of service attributes have been positively affected by CASD implementation. Passengers experienced greater on-time rates at both pickup and drop-off, overall satisfaction with the service increased, and customer reporting of ride denials was reduced. On the other hand, the use of CASD to promote higher vehicle productivity resulted in slightly longer ride times. In addition, callers to the system experienced being put on hold more often. On the whole, the conclusion is that quality of service has been positively affected by the implementation of the CASD system.


2021 ◽  
Author(s):  
Naveen Kumar ◽  
Shashank Srivast

Abstract The performance of Named Data Networking (NDN) depends on the caching efficiency of routers. Cache Pollution Attack (CPA) refers to colonization of unpopular contents in the Content Store (CS) of an NDN router, which leads to declined Quality of Service (QoS) in NDN. CPA has very few solutions proposed for its mitigation. Most of these solutions are based on the statistics of the router itself. However, an attacker can influence these statistics by requesting unpopular contents repeatedly. This article proposes a new parameter for the detection of CPA, which is based on the number of distinct users requesting interest packets for a content over a period of time. The local popularity of the attackers’ content does not affect the proposed approach. Results show that the proposed approach consumes less storage, reduces processing time, and more effectively mitigates the CPA, as compared to the other existing approaches.


Techno Com ◽  
2020 ◽  
Vol 19 (1) ◽  
pp. 1-11
Author(s):  
Agus Heriyanto ◽  
Lailis Syafaah ◽  
Amrul Faruq

Di dalam komunikasi Voice over Internet Protocol (VoIP) mengenal beberapa macam protocol tambahan selain protocol standar internet Transfer Control Protocol/Internet Protocol (TCP/IP), beberapa diantaranya adalah protocol Session Initation Protocol (SIP), Inter-Asterisk eXchange (IAX) dan H.323. Performansi perlu dijaga mengingat VoIP mempunyai kemungkinan melakukan berbagai cara kompresi untuk menciptakan efisiensi saluran dan pemilihan protocol yang tepat. Teknologi VoIP pada dasarnya tidak memiliki jaminan keamanan pada setiap komunikasi. Keamanan ketika melakukan komunikasi suara merupakan sesuatu yang sangat penting karena menyangkut privasi penggunanya. Penggunaan Virtual Private Network (VPN) merupakan salah satu solusi untuk menutup celah keamanan pada kasus di atas. Analisis yang dilakukan pada artikel ini adalah performa yang dihasilkan VoIP yang menggunakan protocol IAX dan SIP. Penelitian ini mengahasilkan kesimpulan bahwa performansi yang paling baik digunakan untuk membangun sistem komunikasi VoIP adalah protocol IAX dengan menggunakan sistem keamanan VPN Point to Point Protocol (PPTP) dikarenakan nilai Quality of Service (QoS)  lebih tinggi daripada protocol SIP dan juga terbukti lebih aman saat diterapkan sistem keamanan Virtual Private Network Point to Point Protocol (VPN PPTP).


2013 ◽  
Vol 8 (4) ◽  
Author(s):  
Irna Prisye Daleno ◽  
David Paul Elia Saerang ◽  
Inggriani Elim

Faced with the globalization era filled with fierce competition, companies must be able to improve the performance and adaptability to the existing environment to be able to continue to compete. The rivalry does not happen in manufacture industry environmentbut also in service industry, with increasing the competition in service industry especially in hotel, so Travello Hotel should create a competitive excellence. Therefore to create that excellence,  Travello Hotel should has efficiency with the way to manage the activity without cutdown the quality of service that give to customer. This method use to manage the activity, so that create this efficiency is calledActivity-Based Management.The research has done in room division of Manado Travello Hotel. The research is descriptive which analyze to all activity in room division of  Travello  Hotel and classify that activity to be value added activity and non value added activity. The value added activity will be eliminated or combined with the other activity that is similar, so that the value added non cost appear from this activity could reduced the amount. The data that used in this research is quantitative as cost report in room division in Travello Hotel tahun 2012 and the qualitative data is like tool from the Hotel.The conclusion this research is to apply the method of activity-basedManagement, Travello Hotel reduces the non value added cost so it can create afficiency without cutdown the quality of service the given from Travello Hotel to customer, with using the activity-based management,the totally of expense in room division are decreases as much as Rp. 176.226.624,08 from Rp. 3.576.508.933,00 to be Rp. 3.400.282.308,92.


2015 ◽  
Vol 13 (3) ◽  
pp. 1-14 ◽  
Author(s):  
M'hamed Outanoute ◽  
Mohamed Baslam ◽  
Belaid Bouikhalene

To select or change a service provider, customers use the best compromise between price and quality of service (QoS). In this work, the authors formulate a game theoretic framework for the dynamical behaviors of Service Providers (SPs). They share the same market and are competing to attract more customers to gain more profit. Due to the divergence of SPs interests, it is believed that this situation is a non-cooperative game of price and QoS. The game converges to an equilibrium position known Nash Equilibrium. Using Genetic Algorithms (GAs), the authors find strategies that produce the most favorable profile for players. GAs are from optimization methods that have shown their great power in the learning area. Using these meta-heuristics, the authors find the price and QoS that maximize the profit for each SP and illustrate the corresponding strategy in Nash Equilibrium (NE). They also show the influence of some parameters of the problem on this equilibrium.


2008 ◽  
pp. 1781-1788
Author(s):  
Christos Bouras ◽  
Apostolos Gkamas ◽  
Dimitris Primpas ◽  
Kostas Stamos

The heterogeneous network environment that Internet provides to real time applications as well as the lack of sufficient QoS (Quality of Service) guarantees, many times forces applications to embody adaptation schemes in order to work efficiently. In addition, any application that transmits data over the Internet should have a friendly behaviour towards the other flows that coexist in today’s Internet and especially towards the TCP flows that comprise the majority of flows. We define as TCP friendly flow, a flow that consumes no more bandwidth than a TCP connection, which is traversing the same path with that flow (Pandhye 1999).


Author(s):  
Harry G. Perros

When we call someone over the internet using a service such as Skype or Google talk, we may experience certain undesirable problems. For instance, we may not be able to hear the other person very well, or even worse, the call may be dropped. In order to eliminate these problems, the underlying IP network has to be able to provide quality of service guarantees. Several schemes have been developed that enable the IP network to provide such guarantees. Of these schemes, the multi-protocol label switching (MPLS) and the differentiated services (DiffServ) are the most widely used. In this chapter, some of the salient features of MPLS and DiffServ are reviewed.


2019 ◽  
Vol 10 (2) ◽  
Author(s):  
Dahnial Dahnial

<p align="center"><strong>ABSTRACT</strong></p><p><em>The internet as a data transmission backbone has security threats in sending data. To overcome the security problem of every data communication that is done through a public network (public network), then a connection is needed that requires a connection between workstations running privately, so that only workstations that have access can connect, by using a virtual private network or VPN. The advantage of a VPN is that data sent over an encrypted VPN is quite safe and the secret is maintained even through the internet network because the data sent will go through the tunnel. Tunneling itself is a method for transferring data from one network to another by using a veiled internet network. Two protocols can be chosen in a VPN, namely Point to Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP). However, the performance of each of these protocols is unknown yet. To find out the performance of the two protocols we need a test with a simulation method. Using a Mikrotik router and Wireshark application with Quality of Service (QoS) parameters consisting of Packet Loss, Delay, and Throughput on 2 clients connected to the mikrotik router and each client uses a different protocol. All clients will stream videos simultaneously to get a data packet capture. The test results will be grouped into four categories, namely bad, moderate, good and very good. It is expected that data will be able to show the quality of service of both protocols. so that it can be used as a reference in the selection of VPN protocol to be used.</em></p><p><strong><em>Keywords: </em></strong><em>Quality of Service, PPTP, L2TP</em></p><p align="center"><strong>ABSTRAK</strong></p><p><em>Internet sebagai backbone pengiriman data memiliki ancaman keamanan dalam pengiriman data. Untuk mengatasi masalah keamanan setiap komunikasi data yang dilakukan melalui jaringan publik (public network) maka diperlukan suatu mekanisme yang memungkinkan koneksi antar workstation berjalan secara private, sehingga hanya workstation yang memiliki akses yang dapat saling terhubung, dengan cara memanfaatkan virtual private network atau VPN.</em> <em>Keuntungan VPN adalah data yang dikirimkan melalui VPN terenkripsi sehingga cukup aman dan rahasianya tetap terjaga meskipun melalui jaringan internet, karena data yang dikirim akan melalui tunnel.</em> <em>Tunneling sendiri merupakan metode untuk transfer data dari suatu jaringan ke jaringan lain dengan memanfaatkan jaringan internet secara terselubung. Terdapat dua protokol yang dapat dipilih dalam VPN yaitu Point to Point Tunneling Protocol (PPTP) dan Layer 2 Tunneling Protocol (L2TP). Akan tetapi belum diketahui performa dari masing – masing protokol tersebut. Untuk mengetahui kinerja dari kedua protokol tersebut diperlukan sebuah pengujian dengan metode simulasi. Menggunakan router mikrotik dan aplikasi Wireshark dengan parameter Quality of Service (QoS) yang terdiri dari Packet Loss, Delay, dan Throughtput pada 2 client yang terhubung ke router mikrotik dan setiap client akan menggunakan protokol yang berbeda. Semua client akan melakukan video streaming secara bersamaan untuk mendapatkan capture paket data. Hasil pengujian akan dikelompokkan menjadi empat kategori, yaitu kategori buruk, sedang, bagus dan sangat bagus. Diharapkan akan dihasilkan sebuah data yang dapat menunjukkan kualitas dari layanan kedua protokol tersebut. sehingga dapat dijadikan acuan dalam pemilihan protokol vpn yang akan digunakan.</em></p><strong><em>Kata kunci:</em></strong><em> Quality of Service, PPTP, L2TP</em>


Sign in / Sign up

Export Citation Format

Share Document