scholarly journals Quality of Service of VoIP over WiMAX

Author(s):  
Mustafa Qays Hatem ◽  
Ahmed Aizaldeen Abdullah

In this paper, the Voice over Internet Protocol (VoIP) was analyzed, and the performance of the quality of service (QoS) parameters obtained through the OPNET simulation software was evaluated. The case study started with the analysis of the network structure .It examined the optimal planning parameters and considered to optimize the performance of the Worldwide Interoperability for Microwave Access network to increase the VoIP service performance. The simulation covered three scenarios with different configurations; each scenario was elevated in term of QoS. The simulations studied various cases including variation in cell radius, different number of users, and different number of cells. Results showed that increasing the cell radius does not increase the quality of the network, and increasing the number of users inside one cell also degrades the quality of the network. By contrast, distributing users into different cells increasesthe network performance but enhances the delay time and increases the throughput.

Author(s):  
Oladunni Abosede Daramola

Voice over Internet Protocol (VoIP) is a significant application of the converged network principle where the voice traffic is routed over Internet Protocol shared traffic networks. VoIP traffic was modelled over wireless network and a simulation of the traffic was transmitted over the network. E-model technique was used to analyze the traffic data and also to rate VoIP QoS parameters.  The result achieved was mapped to the Mean Opinion Scale to determine the Quality of Service of VoIP over wireless networks. The results shows that QoS in the VoIP communications is significantly impacted by these parameters and the impact varies according to the parameters and also the communication aspects selected for the VoIP traffic analysis.Keywords: VoIP, QoS, E-Model and Mean Opinion Scale  


Author(s):  
Murhaban Murhaban ◽  
Ahmad Ashari

Handover method is used to keep the stabilization of connection. Its connected with the performance was caused the process canal traffic transfer automatically in mobile station (MS) that was used to communicate without cutting off the connection. The main factor of success in handover was quality of service to provide the difference level of service in arranging and giving the traffic priority in the network like voice over IP (VoIP) application or communication voice using internet network.             This research will analyse the achievement quality of service in the WiMax network standard 802.16e used hard handover and softhandover method with the VoIP application in mobile station.            Based on the testing that was carried out hard handover and soft handover method used  the application of voice over internet protocol in mobile station has obtained  value jitter 0.001 Ms – 0.31 ms, and delay 10.5 ms 39 ms this is proved that the influence of jitter and delay against handover with the VoIP application still in the tolerance stage that was permitted.  It is different with the output throughput 85 Bit/Sekon  - 550 Bit/Sekon that is too low and indicated that throughput is not sentitif against handover with the voice over  internet protocol application.


2019 ◽  
Vol 1 (1) ◽  
pp. 49-59
Author(s):  
Yukos Pratama ◽  
Heri Suroyo

Computer networks have penetrated into various fields including education for the learning process which is used as a medium for delivering scientific concepts to be more attractive and easily accepted. The Muhammadiyah University of Palembang currently has very high mobility, both used for browsing information, downloading data and using other facilities. For the need for bandwidth management to manage each passing data so that the distribution of bandwidth becomes evenly distributed by using the queue tree method that is applied to the proxy. To evaluate internet bandwidth analyze QoS (Quality of Service) using typhoid standardization in terms of measurement of throughput, delay, and packet loss. The results of this study show that the quality of the network with the hierarchical token bucket method is more optimal, this is because the bandwidth will be divided according to the rules applied to bandwidth management and does not cause clients to fight over bandwidth


2019 ◽  
Vol 1 (1) ◽  
pp. 49-59
Author(s):  
Yukos Pratama ◽  
Usman Ependi ◽  
Heri Suroyo

Computer networks have penetrated into various fields including education for the learning process which is used as a medium for delivering scientific concepts to be more attractive and easily accepted. The Muhammadiyah University of Palembang currently has very high mobility, both used for browsing information, downloading data and using other facilities. For the need for bandwidth management to manage each passing data so that the distribution of bandwidth becomes evenly distributed by using the queue tree method that is applied to the proxy. To evaluate internet bandwidth analyze QoS (Quality of Service) using typhoid standardization in terms of measurement of throughput, delay, and packet loss. The results of this study show that the quality of the network with the hierarchical token bucket method is more optimal, this is because the bandwidth will be divided according to the rules applied to bandwidth management and does not cause clients to fight over bandwidth


2019 ◽  
Vol 1 (1) ◽  
pp. 49-59
Author(s):  
Yukos Pratama ◽  
Heri Suroyo

Computer networks have penetrated into various fields including education for the learning process which is used as a medium for delivering scientific concepts to be more attractive and easily accepted. The Muhammadiyah University of Palembang currently has very high mobility, both used for browsing information, downloading data and using other facilities. For the need for bandwidth management to manage each passing data so that the distribution of bandwidth becomes evenly distributed by using the queue tree method that is applied to the proxy. To evaluate internet bandwidth analyze QoS (Quality of Service) using typhoid standardization in terms of measurement of throughput, delay, and packet loss. The results of this study show that the quality of the network with the hierarchical token bucket method is more optimal, this is because the bandwidth will be divided according to the rules applied to bandwidth management and does not cause clients to fight over bandwidth


2015 ◽  
Vol 14 (6) ◽  
pp. 5809-5813
Author(s):  
Abhishek Prabhakar ◽  
Amod Tiwari ◽  
Vinay Kumar Pathak

Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.


2021 ◽  
Vol 37 (1-4) ◽  
pp. 1-30
Author(s):  
Vincenzo Agate ◽  
Alessandra De Paola ◽  
Giuseppe Lo Re ◽  
Marco Morana

Multi-agent distributed systems are characterized by autonomous entities that interact with each other to provide, and/or request, different kinds of services. In several contexts, especially when a reward is offered according to the quality of service, individual agents (or coordinated groups) may act in a selfish way. To prevent such behaviours, distributed Reputation Management Systems (RMSs) provide every agent with the capability of computing the reputation of the others according to direct past interactions, as well as indirect opinions reported by their neighbourhood. This last point introduces a weakness on gossiped information that makes RMSs vulnerable to malicious agents’ intent on disseminating false reputation values. Given the variety of application scenarios in which RMSs can be adopted, as well as the multitude of behaviours that agents can implement, designers need RMS evaluation tools that allow them to predict the robustness of the system to security attacks, before its actual deployment. To this aim, we present a simulation software for the vulnerability evaluation of RMSs and illustrate three case studies in which this tool was effectively used to model and assess state-of-the-art RMSs.


Author(s):  
Juan de Dios Unión-Sánchez ◽  
Manuel Jesús Hermoso-Orzáez ◽  
Manuel Jesús Hervás-Pulido ◽  
Blas Ogáyar-Fernández

Currently, LED technology is an established form of lighting in our cities and homes. Its lighting performance, durability, energy efficiency and light, together with the economic savings that its use implies, are displacing other classic forms of lighting. However, some problems associated with the durability of the equipment related to the problems of thermal dissipation and high temperature have begun to be detected, which end up affecting their luminous intensity and the useful life. There are many studies that show a direct relationship between the low quality of LED lighting and the aging of the equipment or its overheating, observing the depreciation of the intensity of the light and the visual chromaticity performance that can affect the health of users by altering circadian rhythms. On the other hand, the shortened useful life of the luminaires due to thermal stress has a direct impact on the LCA (Life Cycle Analysis) and its environmental impact, which indirectly affects human health. The purpose of this article is to compare the results previously obtained, at different contour temperatures, by theoretical thermal simulation of the 3D model of LED street lighting luminaires through the ANSYS Fluent simulation software. Contrasting these results with the practical results obtained with a thermal imaging camera, the study shows how the phenomenon of thermal dissipation plays a fundamental role in the lighting performance of LED technology. The parameter studied in this work is junction temperature (Tj), and how it can be used to predict the luminous properties in the design phase of luminaires in order to increase their useful life.


Sign in / Sign up

Export Citation Format

Share Document