... CHAPTER 4 RESULTS AND DISCUSSION 4.1 INTRODUCTION In the simulations, we use the performance metrics of packet loss, delay, jitter and throughput to evaluate the performance of Mobile WiMAX in delivering video streaming applications. The simulation results for 1 hour interval of three different video encoders to two client subscribers of Mobile WiMAX with different types of pathloss model were presented in this chapter. 4.2 RESULTS AND DISCUSSION The results obtained for this project were analyzed based on the expected results in order to evaluate the performance of the video streaming application in Mobile WIMAX. The performance metrics should be in the range of the QoS specifications such as: • Packet loss: → 1 - (# of received packets) / (# of expected packets) → Average: < 10-3; Ideal: < 10-5 • Delay: → processing delay + propagation delay + queuing delay → Average: < 300 ms; Ideal: < 10 ms [14] • Jitter: → Actual reception time – expected reception time → Average: < 60 ms; Ideal: < 20 ms • Throughput: → Measured in bytes/sec (or bps) → 10 kbps – 5 Mbps [15] 4.2.1 Packet Loss Packet loss is the failure of one or more transmitted packets to arrive at their destination. This event can cause noticeable effects in all types of digital communications. Figure 4.1a and 4.1b illustrate the traffic received for three video encoders. The results show that the traffics received are matched by the receiving rate...
Words: 1740 - Pages: 7
...Exercise One Nt1310 Week 1 In: Computers and Technology Exercise One Nt1310 Week 1 NT1310:Week 1 Telecommunications By: Kenneth Martin You are an IT Network Specialist and are required to develop the design of the company’s telephone system for its new building which will begin construction in a few months. In order to get a background which will help when developing the new system, your supervisor asked you to research the current Plain Old Telephone Service (POTS) currently used by the company. You must research the system components and report back to your supervisor , the Telecommunications Manager, within a week. 1. Describe a local land line phone system based on the following Landline Telephone Components: a. Local Loop a local loop is the wired connection from a telephone company's central office in a locality to its customers' telephones at homes and businesses. This connection is usually on a pair of copper wires called twisted pair. The system was originally designed for voice transmission only using analog transmission technology on a single voice channel. Today, your computer's modem makes the conversion between analog signals and digital signals. With Integrated Services Digital Network (ISDN) or Digital Subscriber Line (DSL), the local loop can carry digital signals directly and at a much higher bandwidth than they do for voice only. b. Central Office In telephone communication in the United States, a central office (CO) is an office in a locality...
Words: 496 - Pages: 2
...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA NT2580 NT2670 Introduction to Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to Security Auditing for Compliance Countermeasures Information Security Email and Web Services NT1230 NT1330 Client-Server Client-Server Networking I Networking II IS3230 IS3350 NT1230 NT1330 Issues Client-Server Client-Server SecurityContext in Legal Access Security Networking I Networking II NT1110...
Words: 2305 - Pages: 10