1,670 research outputs found

    The Effect of the Buffer Size in QoS for Multimedia and bursty Traffic: When an Upgrade Becomes a Downgrade

    Get PDF
    This work presents an analysis of the buffer features of an access router, especially the size, the impact on delay and the packet loss rate. In particular, we study how these features can affect the Quality of Service (QoS) of multimedia applications when generating traffic bursts in local networks. First, we show how in a typical SME (Small and Medium Enterprise) network in which several multimedia flows (VoIP, videoconferencing and video surveillance) share access, the upgrade of the bandwidth of the internal network may cause the appearance of a significant amount of packet loss caused by buffer overflow. Secondly, the study shows that the bursty nature of the traffic in some applications traffic (video surveillance) may impair their QoS and that of other services (VoIP and videoconferencing), especially when a certain number of bursts overlap. Various tests have been developed with the aim of characterizing the problems that may appear when network capacity is increased in these scenarios. In some cases, especially when applications generating bursty traffic are present, increasing the network speed may lead to a deterioration in the quality. It has been found that the cause of this quality degradation is buffer overflow, which depends on the bandwidth relationship between the access and the internal networks. Besides, it has been necessary to describe the packet loss distribution by means of a histogram since, although most of the communications present good QoS results, a few of them have worse outcomes. Finally, in order to complete the study we present the MOS results for VoIP calculated from the delay and packet loss rate

    Statistical priority-based uplink scheduling for M2M communications

    Get PDF
    Currently, the worldwide network is witnessing major efforts to transform it from being the Internet of humans only to becoming the Internet of Things (IoT). It is expected that Machine Type Communication Devices (MTCDs) will overwhelm the cellular networks with huge traffic of data that they collect from their environments to be sent to other remote MTCDs for processing thus forming what is known as Machine-to-Machine (M2M) communications. Long Term Evolution (LTE) and LTE-Advanced (LTE-A) appear as the best technology to support M2M communications due to their native IP support. LTE can provide high capacity, flexible radio resource allocation and scalability, which are the required pillars for supporting the expected large numbers of deployed MTCDs. Supporting M2M communications over LTE faces many challenges. These challenges include medium access control and the allocation of radio resources among MTCDs. The problem of radio resources allocation, or scheduling, originates from the nature of M2M traffic. This traffic consists of a large number of small data packets, with specific deadlines, generated by a potentially massive number of MTCDs. M2M traffic is therefore mostly in the uplink direction, i.e. from MTCDs to the base station (known as eNB in LTE terminology). These characteristics impose some design requirements on M2M scheduling techniques such as the need to use insufficient radio resources to transmit a huge amount of traffic within certain deadlines. This presents the main motivation behind this thesis work. In this thesis, we introduce a novel M2M scheduling scheme that utilizes what we term the “statistical priority” in determining the importance of information carried by data packets. Statistical priority is calculated based on the statistical features of the data such as value similarity, trend similarity and auto-correlation. These calculations are made and then reported by the MTCDs to the serving eNBs along with other reports such as channel state. Statistical priority is then used to assign priorities to data packets so that the scarce radio resources are allocated to the MTCDs that are sending statistically important information. This would help avoid exploiting limited radio resources to carry redundant or repetitive data which is a common situation in M2M communications. In order to validate our technique, we perform a simulation-based comparison among the main scheduling techniques and our proposed statistical priority-based scheduling technique. This comparison was conducted in a network that includes different types of MTCDs, such as environmental monitoring sensors, surveillance cameras and alarms. The results show that our proposed statistical priority-based scheduler outperforms the other schedulers in terms of having the least losses of alarm data packets and the highest rate in sending critical data packets that carry non-redundant information for both environmental monitoring and video traffic. This indicates that the proposed technique is the most efficient in the utilization of limited radio resources as compared to the other techniques

    Performance analysis and application development of hybrid WiMAX-WiFi IP video surveillance systems

    Get PDF
    Traditional Closed Circuit Television (CCTV) analogue cameras installed in buildings and other areas of security interest necessitates the use of cable lines. However, analogue systems are limited by distance; and storing analogue data requires huge space or bandwidth. Wired systems are also prone to vandalism, they cannot be installed in a hostile terrain and in heritage sites, where cabling would distort original design. Currently, there is a paradigm shift towards wireless solutions (WiMAX, Wi-Fi, 3G, 4G) to complement and in some cases replace the wired system. A wireless solution of the Fourth-Generation Surveillance System (4GSS) has been proposed in this thesis. It is a hybrid WiMAX-WiFi video surveillance system. The performance analysis of the hybrid WiMAX-WiFi is compared with the conventional WiMAX surveillance models. The video surveillance models and the algorithm that exploit the advantages of both WiMAX and Wi-Fi for scenarios of fixed and mobile wireless cameras have been proposed, simulated and compared with the mathematical/analytical models. The hybrid WiMAX-WiFi video surveillance model has been extended to include a Wireless Mesh configuration on the Wi-Fi part, to improve the scalability and reliability. A performance analysis for hybrid WiMAX-WiFi system with an appropriate Mobility model has been considered for the case of mobile cameras. A security software application for mobile smartphones that sends surveillance images to either local or remote servers has been developed. The developed software has been tested, evaluated and deployed in low bandwidth Wi-Fi wireless network environments. WiMAX is a wireless metropolitan access network technology that provides broadband services to the connected customers. Major modules and units of WiMAX include the Customer Provided Equipment (CPE), the Access Service Network (ASN) which consist one or more Base Stations (BS) and the Connectivity Service Network (CSN). Various interfaces exist between each unit and module. WiMAX is based on the IEEE 802.16 family of standards. Wi-Fi, on the other hand, is a wireless access network operating in the local area network; and it is based on the IEEE 802.11 standards

    Camera Surveillance as a Measure of Counterterrorism?

    Get PDF
    Camera surveillance has recently gained prominence in policy proposals on combating terrorism. We evaluate this instrument of counterterrorism as resting on the premise of a deterrence effect. Based on comparative arguments and previous evidence on crime, we expect camera surveillance to have a relatively smaller deterrent effect on terrorism than on other forms of crime. In particular, we emphasize opportunities for substitution (i.e., displacement effects), the interaction with media attention aspired to by terrorists, the limits of real-time interventions, the crowding-out of social surveillance, the risk of misguided profiling, and politico-economic concerns regarding the misuse of the technology.Camera surveillance, closed-circuit television (CCTV), public security, deterrence, terrorism

    Camera Surveillance as a Measure of Counterterrorism?

    Get PDF
    Camera surveillance has recently gained prominence in policy proposals on combating terrorism. We evaluate this instrument of counterterrorism as resting on the premise of a deterrence effect. Based on comparative arguments and previous evidence on crime, we expect camera surveillance to have a relatively smaller deterrent effect on terrorism than on other forms of crime. In particular, we emphasize opportunities for substitution (i.e., displacement effects), the interaction with media attention aspired to by terrorists, the limits of real-time interventions, the crowding-out of social surveillance, the risk of misguided profiling, and politico-economic concerns regarding the misuse of the technology.Camera surveillance, closed-circuit television (CCTV), public security, deterrence, terrorism.

    Assessment of Different Technologies for Improving Visibility during Foggy Weather in Mining and Transportation Sectors

    Get PDF
    Generally during foggy weather in winter season, mining operation remains suspended for hours due to problem of visibility. Foggy weather also leads to accidents, loss of life and infrastructure damages in mining and transportation sectors. This paper discusses about the existing technologies for improving visibility in transportation sector and suitability assessment of these technologies in mines for uninterrupted mining operations in foggy weathe

    A study for upgrading the vessel traffic services [VTS] in Korean coastal waters

    Get PDF
    The rapid growth of niarine traffic volume in the Korean waters has created difficulties in navigation, and increased the risk in those areas during the last three decades. In addition to the traffic volume increase, ship’s higher speed tendency and larger size tendency lead to more frequent and bigger casualties occurring in those areas. Various measures have been taken to improve navigation safety in those areas such as, aids to navigation, vessel movement reporting systems, traffic separation schemes, and the radar surveillance systems in some port areas also. However, casualties occurred in those areas has not decreased. They are still increasing. If there is no adequate device provided, those tendencies regarding the casualties are expected to be increased more in the future. ; For the purpose of developing safe navigation and preventing traffic accidents in Korean coastal areas, it is needed to examine maritime environment and to analyze the casualties occurred in those arenas, in order to identify the issues and problems existing in those areas. This study used many statistical data in examining the maritime environment, analyze marine casualties, and evaluate existing traffic services in Korean coastal areas. Meanwhile, research has been carried out on the VTS concept, equipment, its future trends, and also case studies carried out on VTS status and its effectiveness has taken place in foreign countries. Finally, on the basis of the findings in this study, it is suggested to maintain adequate VTS in Korean coastal areas to prevent accidents and to help safe navigation. The conclusions include recommendations to extend the advanced VTS system to major ports in Korea and consolidate the VTS authority to extend their services to fully operational VTS functions
    • 

    corecore