Science topic

Network Performance - Science topic

Explore the latest questions and answers in Network Performance, and find Network Performance experts.
Questions related to Network Performance
  • asked a question related to Network Performance
Question
5 answers
What is the impact of varying the number of hidden layers in a deep neural network on its performance for a specific classification task, and how does this impact change when different activation functions are used?
Relevant answer
  • asked a question related to Network Performance
Question
7 answers
hello..
i want to know if i change the transmission power or the path loss in 5G networks will network performance like (delay, jitter, throughput) be effected by this change?
or only other parameters like signal to noise ratio and other thing is effected by the transmission power and PL
and what are the main parameter that will be effected ?
thanks
Relevant answer
Answer
It is better you use industry standard tools like MATLAB or NetSim.
  • asked a question related to Network Performance
Question
9 answers
I am currently working on a 5G network simulation using a network simulator. For a given scenario, there are many configurable network parameters such as channel models, scheduler, Bands, transmitter power, bandwidth, numerology, mobility, etc. My goal is to adjust the tunable network parameters to get optimal network performances such as throughput, delay, etc based on the user traffic. Any suggestions on how to proceed and what kind of algorithm to choose will be beneficial.
Relevant answer
Answer
  • asked a question related to Network Performance
Question
7 answers
hi
i want to know how SDN can Improve network performance like delay, throughput, pdr
for the delay i understand that SDN controller have a global view of network and so i chose the best bath (less congestion)
what about the throughput ?
and Packet Delivery Ratio
thanks
  • asked a question related to Network Performance
Question
3 answers
Why does my neural network perform better with more input neurons than features/variables ? Now if I use the exact input neurons to features/variables the neural network performs much worse. For example, I have 6 dimensions of data that are 200 in length (or 200 samples). Within that data there are groups of 6 data sets - is this why my NN with 36 neuron inputs performs better than 6 neuron inputs? The dimensions should suggest I just need a NN with 6 input neurons. The hidden layers for the 6 inputs are 12 and 6 and for the 36 inputs, are 72 and 36 respectively.
It's been a long time since I last used NNs and so many thanks for answers or pointers on this?
Relevant answer
Answer
Thanks for the question and the clarification answer.
Best regards
  • asked a question related to Network Performance
Question
1 answer
Hello,
In my experiment setup, I have different servers that host files with different sizes. The client downloads files continually and estimates the performance of each server by estimating the throughput. However, when I download a big file it shows higher throughput comparing small files.
My question, for a given server, how I can aggregate correctly the measured throughputs to have a single value that represents its performance.
Thank you very much for your time.
Relevant answer
Answer
One possible reason could be that many smaller files involve that mean TCP connection establishment and tear downs, while one largefile would have only one TCP establishment and tear down. So the overhead when having many small files is larger.
  • asked a question related to Network Performance
Question
8 answers
How can i customize my Convolution Neural Network (CNN) to deal with gray images (2D ultrasound) as the input layer is something like (3, 256, 256) the 3 represents the R, G and B channel in CNN but in my case the number of channels will be only one.
when i run the code i got the error :
ValueError: Cannot feed value of shape (16, 256, 256, 3) for Tensor 'x:0', which has shape '(?, 256, 256, 1)'.
is there any workaround for this without affecting the network performance?
Relevant answer
Answer
Amro Saleh there is no need to convert a gray scale image to RGB, it will definitely increase your computation cost as Ken Mascola says. You can directly pass a grayscale image to CNN by setting your channel dimension as 1. Check this link:
Your problem is as simple as working in a MNIST dataset that has only grayscale images.
  • asked a question related to Network Performance
Question
10 answers
Analyze the working of token bucket traffic shaper on 5th generation mobile networks and the performance of fuzzy predictor for dynamic token generation rate in 5th generation mobile networks.
Relevant answer
Answer
I would go with MATLAB for 5G link level simulation, or NetSim if you want to do 5G system level simulation
  • asked a question related to Network Performance
Question
8 answers
In a set of connected Nodes(routers), how can i measure the distance between them in which i can predict how much time a Packet take to reach next node?
Thank You.
Relevant answer
Answer
In order to measure the distance between two nodes communicating with each other in full duplex mode then as Manfridi said you can send a sequence of bits and receive them again promptly from the the other node without and processing them.
Then the transmit and receive time will be delay time between the front of the transmit signal and the front of the received signal. This time = 2L/v whwere L is the length and v is the velocity of the transmission. If the signal is propagating in space its speed will be = speed of light in the space c. In other medium the v= c/sq.root of epsilon r where epsilonr is the dielectric consatnt.
Best wishes
  • asked a question related to Network Performance
Question
4 answers
Nowadays there are different types of available access networks which are used by end users to connect to the internet. Thus, the users must be provided with seamless network connectivity to stay connected while moving around from one place to another. This seamless network connectivity is achieved by connecting different types of networks which is called heterogeneous internetworking. By integrating different network technologies into one common heterogeneous network architecture, they can coexist and interoperate with each other and improve network performance in term of Quality of Service (QoS).
Relevant answer
Answer
Dear Fawaz,
One method to access the available wireless networks are supplying the mobile devices with the capability to detect the different networks and display them for the users and the user can choose one from them. Most advanced mobile user equipment and laptops are supplied with this property. They detect the Wlans and they detect the the mobile service if it contains a valid simcard.
As a user you can choose among them.
As for the mobile devices there is a need for the hand off control between the wide area network and the wlan. This type of handover is called vertical handover and there are some protocols developed for it in the so called heterogeneous network.
Best wishes
  • asked a question related to Network Performance
Question
8 answers
The use of pre-trained CNN models to perform transfer learning from one task to another one is widely utilized nowadays. Most of the models publicly available are trained on natural images, whose values fall in the range between 0 and 255. However, this is not the case for amplitude (or intensity) SAR images, where the dynamic is high and not comparable to that of a natural image.
The problem is then: how can one adapt a model trained on natural images to effectively process SAR images? Do SAR values have to be clipped above some threshold (let's say threshold = mean + 3*std) and then linearly normalized between 0 and 255, thus resulting in a loss of information? Or is there any smart way to preserve the full statistics of a SAR image and shrink the dynamic to make it comparable to that of a natural image?
For instance, one of the tasks could be edge detection, for which there is scarcity of groundtruth of SAR. Let us say we want to train a network to perform edge detection on 1-look noisy SAR images. One possibility is to corrupt the natural images with simulated speckle and train the network to detect edges on this images, for which the groundtruth is available. The problem then would be how to pre-process this simulated noisy images and real SAR images to make the network work effectively.
I hope it is clear enough. Thank you in advance.
Relevant answer
Answer
Emanuele Dalsasso fair enough!
  • asked a question related to Network Performance
Question
6 answers
I am working on a project to compare Software Defined network and conventional network using performance metrics such as throughput, delay, and latency; but I have not been able to use OPNET Modeller to simulate the OpenFlow SDN. I need help and if possible an instructor regarding this.
Relevant answer
Answer
How can make security settings for APS in opnet project
  • asked a question related to Network Performance
Question
2 answers
In the complex-valued neural network, the first few layers of neural networks perform complex operations. The operation and the activation function output, then reshape is placed in the fully connected layer, normalized before output, and the imaginary part is divided by the real part and then the arctan is used to obtain the angle. I intensively sample the generated sample data for the purpose of realizing regression and complex value signal inverse-mapping to the phase angle.
I got the training process as shown in the figure. It seems that I was learning something successfully, but it always fell to the middle and it was strangely convergent. But the error is still very large, and it is impossible to estimate the angle slightly. Please give some advice.
Relevant answer
Answer
Dear Yashuai,
welcome
In addition to the construction of the neural network, i think that the error can be due to nonlinear behavior of the inverse tan function as becomes very nonlinear after 45 degrees. In additions the values of the tan becomes large. For Cartesian to polar conversion you can use Cordic algorithm which is considered one of the efficient algorithms for the conversion process.
Best wishes
  • asked a question related to Network Performance
Question
7 answers
I am running the simulation for multi-hop network to observe the effect of the different number of hops on the CBR throughput. I ran the simulation for hops = 1, 2, 3, 4 and 5. After running the simulation, I have observed that CBR throughput remains almost same for the values 1, 2 and 3 but when I increased hops to 4, the CBR throughput decreased slightly. The most surprising aspect of the simulation results was that when I increased the hop count to 5, the CBR throughput jumped to 73 % from 67 %.
I fail to understand this upward trend as I thought that due to different aspect such as duty cycling, nodes synchronization, the throughput should decrease when increasing the hop count but the results for counts count 5 were surprising. Can someone explain me why is the reason for this behavior? 
Relevant answer
Answer
Any related work on Throughput utilization of WSN for worst case situations?
  • asked a question related to Network Performance
Question
3 answers
The peer-to-peer (P2P) is common architecture to share wide range of media on the Internet. P2P traffic represents about 50% of the total Internet traffic, subject to geographical location. The high volume of P2P traffic is due to file sharing, video streaming, on-line gaming. Dynamic increase in P2P traffic volume often causes poorer network performance and higher congestion rates, triggered by P2P high bandwidth demand.
  • asked a question related to Network Performance
Question
2 answers
usually simulators or network traffic generators calculates network performance metrics like: latency,jitter,throughput.. , they calculate the metrics using different formulas . I wonder if there are known mathematical formulas to calculate these metrics.
Relevant answer
Answer
Dear Hantouti,
in the following literature You find the required informations.
Here are all link-based and node-based metrics presented:
 R. Baumann, S. Heimlicher, M. Strasser and A. Weibel: A Survey on Routing Metrics, TIK Rep. 262, Computer Engineering and Networks Laboratory, ETH-Zentrum, Switzerland, Feb. 2007
 G. Parissidis, M. Karaliopoulos, R. Baumann, T. Spyropoulos and B. Plattner: Routing metrics for Wireless Mesh Networks, in Guide to Wireless Mesh Networks, Springer, 2009
L. Zhao and A. Y. Al-Dubai: „Routing Metrics for Wireless Mesh Networks: A Survey“, Lecture Notes in Electrical Engineering (LNEE), Part of the Lecture Notes in Electrical Engineering, Vol. 127, Feb. 2012
N. Baccour, A. Koubâa, L. Mottola, M. A. Zúñiga, H. Youssef, C. A. Boano and M. Alves: „Radio Link Quality Estimation in Wireless Sensor Networks: A Survey“, ACM Transactions on Sensor Networks (TOSN), Vol. 8(4), Sep. 2012; DOI: 10.1145/2240116.2240123
For the information on ETX see:
 D. S. De Couto, D. Aguayo, J. Bicket and R. Morris: A High-Throughput Path Metric for Multi-Hop Wireless Routing,  MobiCom ’03, Sep. 2003
N. Javaid, A. Javaid, I. A. Khan and K. Djouani: Performance Study of ETX based Wireless Routing Metrics, 2nd IEEE International Conference on Computer, Control and Communication, Feb. 2009; DOI:  10.1109/IC4.2009.4909163
 For a well-founded mathematical description of metrics see:
Y. Yang and  J. Wang: Design Guidelines for Routing Metrics in Multihop Wireless Networks, IEEE 27th Conference on Computer Communications, (INFOCOM 2008), Apr. 2008; DOI: 10.1109/INFOCOM.2008.222
P. Karkazis, P. Trakadas, H. C. Leligou, L. Sarakis, I. Papaefstathiou and T. Zahariadis: Evaluating routing metric composition approaches for QoS differentiation in low power and lossy networks , Wireless Networks, Vol. 19(6), Aug. 2013; DOI 10.1007/s11276-012-0532-2
Best regards and much success
Anatol Badach
  • asked a question related to Network Performance
Question
7 answers
Can some one please let me know the exact mathematical definition of jitter in packet networks ? Some RFCs indicate it as packet delay variation ? Is this variation to calculated among consecutive packets or for all the packets ?
Also does some one know to calculate this is NetSim simulator? It is not directly available in the results window ?
Relevant answer
Dear Rahul,
The colleagues above gave a satisfactory answer to your question but i want to stress some basic principles: 
Jitter concerns statistical variations of theoretically regular occurrence of certain event.
For example the period time of an oscillator. If the oscillator is ideal then its pulses will be very strictly eqi spaced in time, however, this will never physically occurs because there is statistical factors affecting the periodic time such as the noise signal which varies the zero crossings of the deterministic waveform.
Like wise the time jitter  of the average delivery time of the packets in a packet switched networks. Because the packets transport in packet switched network has statistical nature therefore the packet delivery will not be strictly regular. The delay  gitter may be defined by the standard deviation of the delay from an average value.
It is calculated as it is defined.
best wishes
  • asked a question related to Network Performance
Question
3 answers
Seismic noise levels analysis is useful to characterize network performance; to detect problems with seismic stations and to characterize the frequency dependent noise levels due to background site conditions.
Relevant answer
Answer
To answer completely to your question more detail on the measurement are necessary, and first of all the real observed differences in terms of relative ratios. In my opinion variations of few percentages are acceptable for “field measurements in exact site”. Anyway, I send you a general response to give response to yours question.
In physical sense, the seismic measurement is the result of a chain of many transfer functions (TF). Namely, using their frequency (f) domain representations:
source S(f), regional propagation model M(f), local site propagation model L(f) and apparatus A(f). A(f) can be further splitted in the sensor TF, I(f) and data-logger TF, DL(f). so that our measurement in frequency domain is the product of them (or convolution in time domain).
When we perform a seismic measurement we must take into account the contribution of each component (TFs).
Now we consider the measurement with “two seismic sensors, of different brand but same bandwidth, in the exact same location”. In this case we can assume that S(f) (the transfer function of a set of sources, (which are homogeneously distributed around our measurement point) and M(f) are the same. In other words, the input at the measurement site can be assumed the same for the two sensors. If we install the sensor at “exact same location” (==really a small distance between them) with the same terrain-coupling procedure, we can assume that L(f) is again the same for the two sensor. Then the measurement should depend on only the apparatus transfer function A(f)=I(f)*DL(f).
If the cited conditions are satisfied, the answer to your question could be find in the responses of sensor and/or data logger. In particular, sensor response I(f) mainly depends on: the type of sensor (velocimeter, accelerometer) and its constructive modality (passive or active: generally, force balanced type). DL(f) is mainly depends on the Analogic/Digital conversion system, which involves the frequency response of: cable and connectors, the embedded electronic of amplifiers of data-logger system, the sampling rate and decimation procedure.
Assuming that the sensors are of the same type and have the same constructive modality we should invoke the effect of data-logger response. Assuming the same sampling rate of A/D converter and decimation procedure (you should verify this condition, also due to different producers of stations) the main effect should be produced by the data-logger (embedded) electronic that, generally, it manifests as the presence of continuous component in recording (also variable in time). This effect is relatively relevant in presence of low noise site recording.
If the data-logger and cable are the same we must invoke the effect of sensor response. You must verify if the manufacturer responses in your bandwidth are the same. Finally, an operational consideration: using sensors with different proper period it is necessary to wait to reach the optimal recording condition. Also in this case spurious response, like variable continuous component and mainly in low frequency, could be observed.  It is important, to perform high quality seismic noise measurements, to use a very long recording windows (i.e. almost 1-2 days).
  • asked a question related to Network Performance
Question
1 answer
I am researching throughput of random access with capture.
I am wondering throughput of S-ALOHA considering frequency  reuse factor?
In my opinion, the throughput becomes FG exp(-FG), where F is frequency reuse factor and G is transmission attempt per unit time. From that equation, the maximum throughput is not changed even when F is changed.
However, i thought if the freq. reuse factor increases, the max. throughput decreases.
Does anyone have any idea for get throughput of S-ALOHA considering frequency reuse factor?   
Relevant answer
Answer
Dear Choi,
You can make a survey on previous research articles related to S-ALOHA and review CDM-based results and discussion. 
  • asked a question related to Network Performance
Question
5 answers
In LTE networks , how we can know that a particular eNB node is overloaded or not ? I mean how to know that there is a requirement of load balancing . Is there any unit or metric to measure load of eNB?
Kindly reply asap.
Thanks Much
Relevant answer
Answer
Well i don't know how to start Mr. Shilpy Agrawal. Offloading is a kind of handover, but based on QoS and not for example on SINR. So when an eNB is overloaded, some of the users have to be handed over to another eNB or a Femto and so on, and this to release some of the radio resources to maintain the QoS of the rest of the users. So really, its not  looked on as the max value of throughput of the eNB. But on how much resources the eNB can assign to the users, and this depends on the BW and the number of users. So to start with, just find the number of resource blocks (RB), and you can give a random  QoS requirement for each user (number of RBs) and then see if all users are satisfied, other wise the eNB is congested or overloaded. In this case handover  one user and calculate satisfaction rate, is it still below? yes , handover another user, if No stop handing over. That's it. very simple. Hope this helps.
  • asked a question related to Network Performance
Question
23 answers
The ONE is a simulator designed for the DTN routing protocols. I have experience in NS2.
Now want to understand how ONE works? 
For example for NS2 simulation, first of all one has to write a TCL script which is run via terminal. Output of TCL is a trace file which is further processed through AWK script to get the network performance i.e PDR, delay etc. Output of AWK can be plotted using GNUPLOT.
If I replace NS2 to ONE simulator then how to get the network performance?
Relevant answer
Answer
//** Apologies, if you have received multiple copies. Please forward the email to interested colleagues and research scholars**//
Respected Sir/Madam,
Book Chapter proposals are invited for the Edited book titled "Opportunistic Networks: Mobility Models, Protocols, Security & Privacy" in the following topics:
1. Foundations of Opportunistic Network:
v  Migration from MANET to Opportunistic Networks, Basic Concepts of Opportunistic Networks (OppNets)
v  Need of Opportunistic Networks, Types of Opportunistic Networks
v  Sensor Networks: MULE, BIONETS, ZebraNet, SWIM 
v  Pocket Switched Networks: MANET, MSN, VANET, DTN
v  Amorphous Opportunistic Networks: Semantic Opportunistic Networks, Freenet
v  Requirement for OppNets
2. Delay Tolerant Networks (DTNs):
v  Basic Concept, DTN Architecture: Virtual Message Switching Using Store-and-Forward Operation, Nodes and Endpoints, Endpoint Identifiers (EIDs) and Registrations, Priority Classes, Congestion and Flow Control at Bundle Layer
v  Buffer Management, Challenges for Applications over DTN
v  Security for DTN Applications
v  Case Studies: Message-Based Applications—E-mail/SMS, Stream-Based Applications—XMPP, Web, Content Search, Underground Mines, Floating Content
3. Taxonomy of Mobility Models:
v  Random Waypoint Movement Model (RWPM)
v  Map-Based Movement Models: Well Known Text (WKT) format: Map Route Movement and Shortest Path Map Based Movement (SPMBM)
v  Route Based Movement Model (RBM), Working Day Movement Model (WDMM)
v  Transportation Analysis and Simulation Systems (TRANSIMS)
v  Social Network Based Mobility Models: Social Network Models, Community Based Mobility Model
v  Pursue Model, Manhattan Mobility Model, Rush Hour (Human) Traffic Model, Random Direction Model
v  Brownian model, Obstacle Mobility model, Trace-Based Mobility Models, Smooth Random Mobility Model
v  Evaluation of Mobility Models
4. Taxonomy of Routing Protocols:
v  Infrastructure Opportunistic Networks
v  Dissemination based: Epidemic Routing: PROPHET, MaxProp, MV Routing, Spray &Wait, SMART, MARS, RAPID, EBR, SCAR, Direct Delivery
v  Network Coding Based Routing
v  Context Base Routing: Context –Aware Routing (CAR) Protocol, PROPICMAN, Moby-Space Routing Protocol, History-Based Opportunistic Routing Protocol (Hi-BOP)
v  Without Infrastructure Opportunistic Networks
v  Evaluation of Routing Protocols
5. Route Optimization Techniques for fast Data Delivery:
v  Basic Concepts, Route Optimization using Membrane Computing, Route Optimization using Game Theory, Route Optimization using Ant Colony Optimization (ACO), Route Optimization using PlayNCool
v  Performance Evaluation of Route Optimization Techniques
6. Improve Quality of Service of Opportunistic Network:
v  Heterogeneous Connections: Connection Process, Heterogeneous Connections, Network Capacity
v  Network Selection: Network Discovery, Network Selection Algorithms for Information Dissemination
v  Message Forwarding: Single-Copy Forwarding, Multi-Copy Forwarding
v  Congestion Control, Mobile Agents   
7. Vehicular Ad hoc Networks (VANETs):
v  Basic Concepts, VANET Architecture
v  VANET Routing Approaches: Geocast/Broadcast, Unicast, Multicast
v  Geocast/Broadcast:Spatially aware packet routing algorithm, SADV, Interference Aware Routing, FROV,Multihop broadcast protocol, Proposed Algorithms: V-TRADE, UMB, AMB, MHVB, MDDV
v  Unicast:  Greedy: GSR, GPCR, GyTAR, Connectivity Aware Routing, Opportunistic: OPERA, Topology-assist geo-opportunistic routingandMaxProp, Trajectory: SiFT, GeOps, TBD, TTBR
v  Multicast: Topology-Based Approaches: ODMRP, MAODV, GHM, Location-Based Approaches: PBM, SPBM, LBM, RBM, IVG
v  Simulation Methods: Traffic Simulators,Network Simulators
v  Applications
8. Energy Management:
v  Localized Algorithms save Energy, Minimum-Energy Broadcasting and Multicasting, Power-Aware Routing
v  Power-Efficient Neighbour Communication and Discovery for Asymmetric and Symmetric Links
v  Challenges for Energy Management
9. Network Coding Schemes:
v  Basic Concepts
v  CodeOR, SlideOR, AONC, BEND, COPE
v   Performance Evaluation of Network Coding Schemes
10. Taxonomy of Security Attacks
v   Basic Concepts of Attacks, Types of Attacks: Jamming: DoS, DDoS, RDDoS Attack, Black Hole Attack, Cooperative Black Hole Attack, Wormhole Attack, Byzantine Attack, Sybil Attack, Sleep Deprivation,  Rushing Attack, Colluding misrerlay attack, Link Spoofing Attack, Selective Forwarding Attack (Gray Hole attack), Snare Attack, Blackmail Attack, Cooperative Blackmail Attack, Cloning Attack, Sinkhole Attack, Desynchronization attack, Overwhelm attack, Jellyfish Attack
v  Comparison of Attacks
11. Security, Privacy & Trust, Anonymity:
v  Security issues, Authentication and Authorization, Privacy and Trust management techniques, Identity management,  Location-based security services
v  Mix Networks, Intrusion Detection and Prevention Techniques
12. Future Networks Inspired by Opportunistic Networks:
v  Introduction
v  BIOlogically-inspired autonomic NETworks and Services (BIONETS),Mobile Ubiquitous LAN Extensions (MLUEs), Shared Wireless Infostation Model (SWIM), Vehicular Delay Tolerant Networks (VDTNs), ZebraNet, Freenet,
DakNet
v  Evaluation of OppNets
13. Network Emulation Testbed for Opportunistic Networks:
v  Design Challenges: Mobility, Disruptions, Wireless Communication, Scalability,
v  QOMB Testbed: StarBED, QOMET, Overall Architecture
v  DTN Implementations
14: Applications and Future Trends:
v  Introduction
v  Opportunistic Computing, Mobile Data Offloading, Research Trends on Recommender Systems
15: Hands-on “The ONE simulator” – Opportunistic Network Environment
Important Dates:
Last Date for Submission of Chapter Proposal (Minimum 4 Pages)                01 August 2017
Acceptance/Rejection of Book Chapter Proposal notification to Authors         20 August 2017
Full Chapter submission by Accepted Authors                                      10 December 2017
Submission of revised/Final Chapters to publisher                                 10 January 2017
NOTE: The book chapter proposal may kindly be sent by strictly following the attached format to the following Email Id: khaleelahmad.csit@gov.in
EDITORS:
Dr. Nur Izura Udzir
Universiti Putra Malaysia, Malaysia (nurizura@gmail.com, izura@upm.edu.my)
Dr. Khaleel Ahmad
Maulana Azad National Urdu University, India (Khaleelamna@gmail.com)
Dr. G C Deka
Directorate General of Training, Ministry of Skill Development & Entrepreneurship, New Delhi-110001, India (ganeshdeka2000@gmail.com)
  • asked a question related to Network Performance
Question
5 answers
Most common low-cost Bluetooth modules used in micro-controller based projects are limited to around 1 Mbps thru Serial Port Profile (SPP). In addition, while the modules can transfer short data packets at all baud rates, they halt or fail completely when trying to achieve sustained high data rates. How to successfully transfer/stream data at all available baud rates for prolonged period of time? Are there any other feasible options for use i.e. different profile of Bluetooth in this case?
Relevant answer
Answer
The standard data rate of 1 Mbps and ( cough! ) "enhanced" data rate of 2Mbps is pretty much what you have to work with.  The high speed devices are still fairly expensive and uncommon, as you mention, those get you to 25Mbps.    That is the native symbol rate.  So not much to "fix" there.
As for Bluetooth cutting out?  That's not a feature of Bluetooth, it could be a number of factors specific to your use case: drivers, RF environment, the transport methods, the computing devices.  I consider that not to be an intrinsic Bluetooth issue.   For synchronous transfer near maximum throughput, you do not have an throughput to retry lost block because the aggregate of valid and retried data exceeds the available throughput.   So you cannot run at 1Mbps, as there is no room for errors.   The strategy is to reduce the bulk of the data, leaving ample headroom.
For asynchronous data transmission, you need s TCP-like transport mechanism.  Heck, even things like Z-Modem does a block integrity check and re-transmission, is appropriate.
Another factor is the RF space.   Bluetooth devices come in 3 distance ranges - in some cases the only difference is the type of antenna in the device.   The maximum range of 100 meters is achievable.   Its also possible to attach yagi antennas to bluetooth interfaces dramatically extend the range.   I have, myself, sent bluetooth over 500 meters with very cheap yagis.  You can even do this with low power devices.  More gain is always better,
The point of the above paragraph is that if you improve the gain of the antennas, you can have much more immunity to ambient RF.   Improving the SNR will help increase the throughout.
Hope that helps.
  • asked a question related to Network Performance
Question
5 answers
I am master student starting my thesis on this title:
"Performance Evaluation of Application layer/middleware so-lutions for the IoT"
here my task is to test application layer IOT protocols using simulator:
protocols to be tested:MQTT,COAP,XMPP,...etc
now the question is which simulator to use for which protocol?
which simulator fits which protocol?
thanks in Advance,
Relevant answer
Answer
NS2, NS3 & also GNS3 are the simulators that I recommend.
With Python, NETWORKX can help
Node-Red, a visual programming library can be useful.
  • asked a question related to Network Performance
Question
5 answers
Internet of things is not merely connecting few LED,s , temp controller  with any board Now a days some people give training on the name of IOT. and teach the students only  basics of embedded system  Will it be the training on IOT? Kindly comment
Relevant answer
Answer
With the advancement of IPv6 IOT will be the near future?
Agreed with the above statement.  Because IPv6 address space is 128-bits (2128) in size, containing 340,282,366,920,938,463,463,374,607,431,768,211,456 IPv6 addresses.  This is significant increase from IPv4 which only contains 4,294,967,296 or 4.3 billion IPv4 addresses (IPv6 is 7.9×1028 times as many as IPv4 addresses).
According to Gartner, only 6.4 billion connected "Things" of IoT will be used in 2016 whereby there is still plenty of IPv6 addresses to be used up for IoT purpose.
Yes, there are many IoT training offered by academic institutions as well as software & hardware products companies.  E.g., you can refer to the following YouTube link:
  • asked a question related to Network Performance
Question
2 answers
I'm wondering that if I can use Real Time Digital Simulator (RTDS) to model a distribution network and then perform some optimal placement of PVDGs with the economic objective function.
Relevant answer
Answer
I never used it in this way personally but in my opinion it should be possible.
But I think it would be difficult to define what is the optimal placement of PVDGs.
  • asked a question related to Network Performance
Question
7 answers
Please, am looking for a D2D system level simulator, either free or pay-for, Can anyone help? I want to set up a D2D communication underlaying LTE network, and perform interference analysis
  • asked a question related to Network Performance
Question
5 answers
I have been struggling with getting the right model to evaluate campus network performance
Relevant answer
Answer
Dear Tunde.
It depends on your research, normally you can check power signal strength, link quality, signal noise ratio, etc. There are many models are available to check the wireless LAN, you will find through the internet. 
  • asked a question related to Network Performance
Question
7 answers
The purpose of the query is to know some of the best open source monitoring tools for SDN network and measuring controller, switch of SDN architecture. Tools with reporting and exporting functionalities are preferred for comparative analysis.
Relevant answer
Answer
Hi Asma,
Did you checked NetFlow or you can make your own Network Monitoring tool. Network Monitoring is  a Sampling technique it can be random or systematic so choose any sampling technique like I choose Network Monitoring using Poisson Sampling. And it also depends where you are performing your experiment on simulated environment(Mininet) or with real openflow enabled Switch.
  • asked a question related to Network Performance
Question
3 answers
Are there any papers for the comparison of automated diagnosis for network performance metric?
Relevant answer
Answer
Use google search engine and many reference works would pop up.
  • asked a question related to Network Performance
Question
3 answers
Control system over wired/wireless network performance might be unstable due to packet loss which causes system inconstancy. To achieve optimized operation, finding a method to compensate to packet loss is significant awareness.
Relevant answer
Answer
You're right that packet loss in wireless networks is more of an issue than it is with cabled networks. For this reason, IEEE 802.11 includes its own packet acknowledgment or retransmit protocol, at layer 2 (ARQ, or automatic repeat request), much as TCP does at layer 4. This is in addition to forward error correction schemes, such as Reed-Solomon and/or convolutional codes, that both wired and wireless networks would implement.
Which is why WiFi is not very good with IP multicast. The lower layer retries are incompatible with multicast, so they have to be disabled. Which leads to a relatively high level of missed packets.
Another possible technique, to distribute IP multicast streams to WiFi nets, is to convert the multicast packets into unicast packets, at the wired network edge. The problem is being considered by the IETF mboned working group.
  • asked a question related to Network Performance
Question
1 answer
Recently I’m reading paper[1][2] related to my interest. while here are some questions about Traffic Aware Scheduling Algorithm of Time Slotted Channel Hopping mode in 802.15.4e which I could’t well understand.
It’s stated that “minimize the number of active time slots; such number direct impacts the end-to-end delay, and also the network duty cycle, and, thus, the network lifetime.” [2] introduction part, page 2.  I can get the point the duty cycle is reduced obviously, but on the average view, the end-to-end delay may not reduced as expected(e.g. if we always allow the deeper nodes that far from root transfer first, the average end-to-end delay maybe shorter). Also, once the traffic load(bit*meter) is determined, without other assumption like aggregators traffic reduction or additional routing method, we know nodes not transmitting or receiving are in inactive/sleep mode at each time slot, how can energy be saved compare to other method(e.g a method treat degree or level as priority when scheduling)? Or does it necessary mean less power consumption when we get least active slots? Are there any nodes that have to keep active for other consideration even they don’t have transmission load right now?
[1].Traffic Aware Scheduling Algorithm for reliable low-power multi-hop IEEE 802.15.4e networks
[2].On Optimal Scheduling in Duty-Cycled Industrial IoT Applications Using IEEE802.15.4e TSCH
Relevant answer
Answer
Jet,
       This IEEE paper shows the tested energy efficiency of and 802.15.4 network during Tx, Rx, Ack, Ka, and Adv activity as well as during idle and off states: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6627960. Hopefully this paper offers you another option for calculating specific energy consumption on a TSCH network using the 802.15.4e (LR-WPAN) guidelines.
  • asked a question related to Network Performance
Question
4 answers
Please refer any journal paper if you wish. Thank you.
Relevant answer
Answer
In addition to Imran Shafi and Jacek Bartman suggested parameters you have to also consider the values of mu and learning rate. More importantly training algorithm itself also has influence on error-different algorithm work differently with a particular problem.
  • asked a question related to Network Performance
Question
3 answers
inserting a distributed generators in distribution system improves the distribution network performance in terms of minimizing of power losses and simultaneously improves the voltage stability of the system. But up to what extent it should be added? and how it influences on existing system.
  • asked a question related to Network Performance
Question
12 answers
I need to do a transition from Ipv4 to Ipv6, i konw how to do it, but also I want to analise/evaluate the network performance, latency, packet loss/loss rate, throughput, CPU Utilization, jitter , TTL, etc.. Anyone know how to do it?? Anyone know a software to do this analyse??
Relevant answer
Answer
Dear
As I know the latency, packet loss/loss rate, throughput was occurred by the transfer data through the link and the root of the network.
So I prefer to do deference project using OPNET simulation with two scenario for each project once with IPv4 and the other with IPv6. You should use same configuration and load in each scenario of that project. Tray to do 3-6 projects with different traffic, nodes, link then you can analyze the result.
Thanks and Good luck .
  • asked a question related to Network Performance
Question
3 answers
it is helpful for my project...
Relevant answer
Answer
QoS metrics could be deadline constraints and bandwidth it fully depends on system resources
  • asked a question related to Network Performance
Question
8 answers
In my setup, the probability density function of the noise is not Gaussian-like and its PDF changes with the system statement.
Thus, I want to use the BER calculation by error counting instead of BER estimation. Moreover, the experimental BER level is around 10^-5. However, it seems the common method to calculate the BER is based on the PDF estimation.
How can I calculate the error by direct error counting? I set up a simple system model in the attachment.
Could anyone give me some advice?
Relevant answer
Answer
Hello all,
actually, beside various BER estimation methods relying on assumptions about the statistical distribution of the signal characteristics (phase/amplitude) at the detector, VPItransmissionMaker Optical Systems also provides modules for estimating the BER based on error counting (noted as Monte-Carlo method).
As Mohamed pointed out above, you should make sure sufficient number of bits (or symbols if you use higher order modulation formats) is transmitted in order to count sufficient number of errors. As rough estimate, the accuracy of your estimated BER value scales with 1/sqrt(#-of-errors). So when you count 100 errors, you have an accuracy of approx. 1/sqrt(100) = 10%.
Best regards,
Andre
  • asked a question related to Network Performance
Question
4 answers
I am using VGA camera at input side and framegrabber for H.264 compression. I am getting RTSP stream from framegrabber over ethernet. this stream has been connected to Server laptop with point to point connection.
When I request a RTSP stream from Client side using gstreamer (sometimes VLC), I get the stream for max 1 minute. After 1 minute the network from server side is going down. only server WiFi connection getting disturbed. Client is alive in this case too. I am unable to troubleshoot the exact problem.
I did some wireshark testing with different inputs: 1. Framegrabber with VGA camera 2. Surveillence camera
It work perfectly fine with serveillence camera.
One thing which I have seen is even there is network breakdown, framegrabber is keep sending frames to server. Normally it has to stop but it is keep sending it. I am confuse here also.
Configuration: Framegrabber: bitrate - 1 Mbps Resolution - 720 * 480 Framerate - 30fps ( can not be changed because of use of PAL )
Same with surveillence camera except framerate is 25fps.
Please guide me for solving network breakdown issue.
Thanks in advance!!!
Relevant answer
Answer
Hi Imed, Thanks once again for your reply. I am using framegrabber for processing image and then giving it to server laptop using RTSP. here for a heavy traffic i am using bitrate like 100kbps, 1mbps, 2mbps, 3mbps and 4 mbps. I have tested the system for all these rates but the problem is still same. 
Tried pinging back to back. Ping is available till I am asking for RTSP stream on client end. and then server going down after 30 seconds of start. I will try to check the repeated ping with -t option and will try to capture the ICMP Quench problem.
Your advice will be helpful for me to troubleshoot my problem in more detail.
  • asked a question related to Network Performance
Question
9 answers
dear expert , I have trained my neural network and simulate the output it is completely matched with training set but not in testing data set why please any one can suggest me
Relevant answer
Answer
Dear Lila,
It appears that you are overfitting the training data set. This is a very common problem when training neural networks, but more in general in machine learning. How to prevent overfitting is a large area of investigation. I would recommend you looking more in detail in machine learning and neural network literature. Common methods are called regularisation, early stop of training, reducing the number degree of freedom of the model, i.e. number of parameters, increasing the size of the data-set. 
  • asked a question related to Network Performance
Question
3 answers
Suppose our TCP SYN packet goes directly to the attacker. Can he generate fake response (TCP SYN-ACK) packet and send it back to us?
Relevant answer
Answer
TCP itself does not authenticate the receiver in any way. If the attacker replies on your TCP SYN-SENT faster than the intended socket for connection, the connection will be established with the attacker instead. That is basically the way some sort of Man-In-The-Middle attacks work. If you remember the Yahoo-highjacking by NSA last year - this worked alike (in that case according to the press even with full TSL Auth.: looking for request to Yahoo, changing some DNS servers to impose to be the receiver (the fake server was physically nearer to the sender and thus faster responding), issue a flasificated TLS Cert making sure the false Cert was verified faster than an original one (as above), and highjacking the connecting therefore.)
From wikipedia:
TCP-Handshake
1. SYN-SENT → <SEQ=100><CTL=SYN> → SYN-RECEIVED
2. SYN/ACK-RECEIVED ← <SEQ=300><ACK=101><CTL=SYN,ACK> ← SYN/ACK-SENT
3. ACK-SENT → <SEQ=101><ACK=301><CTL=ACK> → ESTABLISHED
  • asked a question related to Network Performance
Question
6 answers
my output is as in attach file
Relevant answer
Answer
Please provide sufficient information. It is not clear in what basis, you evaluated the results. What type of network is considered - is it wireless or wired?
  • asked a question related to Network Performance
Question
8 answers
I am starting research on organizational design in start-up companies. In particular I am interested in the relations between organization design, networking and performance of start-up companies. I am relatively new to the field of start-ups and I would like to know what the most important readings in this field are.
Relevant answer
Answer
Vincenzo, have a look on "journal of business venturing". At that place is plenty of research containing your interest. Also Per is on of the leading scholars in the field of entrepreneurship and start-ups.
  • asked a question related to Network Performance
Question
10 answers
I would like to know if any of you has heard about in-band control and out-of-band control on SDN and if there is any article that mentions both types of control?
Relevant answer
Answer
This refers to the medium in which control traffic traverses. That is, which links are used to exchange control-related data between the controller and the forwarding devices it commands, or among controller instances.
Out-of-Band control uses separate Ethernet ports and links (i.e., a separate network) to connect forwarding devices to the controller and exchange control traffic. This separate infrastructure can be either physical or logical. In the first case, OpenFlow Switches have a physical "management" port which should be connected to controller or a traditional L2/L3 network connected to the controller(s) (this is traditional way used by todays' switch vendors). In the second case, tunneling or virtualization is used to create a separate logical network in the same physical infrastructure (e.g., in the original OpenFlow deploynment at Stanford, switches where configured with 3 VLANs, one for OpenFlow control traffic, one for experimenting data traffic with OpenFlow, and one for production traffic).
In-Band control uses the same links (i.e., same network) for both data traffic and control traffic. This case usually requires the switches to have a predefined set of rules for establishing the connection with the controller.
There is no much information about In-Band and Out-of-Band control in Software-Defined Networking. You can use the reference provided by Thomas Pfeiffenberger, as well as the OpenFlow and the OFConfig specifications to gain additional knowledge. Although, as far as I know, there is little information about it.
  • asked a question related to Network Performance
Question
8 answers
Is it possible to simulate an LTE network on the academic version of the Riverbed Opnet modeler? If not, do I actually need a professional version to use it?? P.S URGENT
Relevant answer
Answer
OPNET academic version does not come with LTE by default. Therefore you need to request for it to be added to OPNET modeler.
  • asked a question related to Network Performance
Question
3 answers
As we know that originally Internet was not designed for the applications which become part of Internet with the passage of time. The evolution in the design architecture of Internet was much slower then the invention of new applications e.g now content become first order element.
What is your opinion, to meet the future Internet challenges an evolutionary approach (e.g SDN,) or clean slate (e.g CCN, NetInf and PSIRP) approach is more appropriate .
Answer could be different from practicality, effectiveness, efficiency and implementation point of view.
Relevant answer
Answer
An approach that is focused on evolving the current protocols without a deeper change on them will be always limited to this environment.
A clean-slate architecture creates a new environment, with a new world of possibilities, not limited to the current ones.
  • asked a question related to Network Performance
Question
2 answers
I need a tutorial to make changes in NS2 source code for supporting multichannel communication.
Relevant answer
Answer
Have a look at the downloads section, probably working ns-2 distributions are available there for multichannel support in wireless networks
  • asked a question related to Network Performance
Question
4 answers
As bandwidth on WiFi links is measured with "up to", I want to measure throughput on these links to plan how to optimize the traffic in my network. But throughput is not constant and depends of some factors. I want to see how it is changed during a defined period (day, week, month).
Relevant answer
Answer
There's also QoSMeT (Quality of Service Measurement Tool) from VTT Technical research centre of Finland. It allows you to measure two-way parameters (delay, jitter, throughput). In addition, VoIP MOS PSQA can calculated as well. It works in IP level, Win and Linux are supported. Great for pinpointing when locating bottlenecks in end-to-end connection. For academic partners, there is a free lisence. It is used by tens of universities in the world.
  • asked a question related to Network Performance
Question
3 answers
In the developing countries, mobile internet service is the only means to access web services for the people living in the rural areas. 2G internet service is available all most all rural areas. But since the voice call services returns more revenue than that of Internet service, the voice call is prioritized. So practically available bandwidth is inconsistent and service quality is very poor for some operators. For some operators it is very difficult to perform the surfing and upload/download data.
In this circumstance I would like to perform a survey to identify the quality of GPRS/EDGE service offered by different operators and also identify whether the service quality is good enough to access the web services from the rural areas.
Relevant answer
Answer
What might be of some interest of you is that especially in 2G environment operators are either blocking or hindering traffic to certain TCP ports (5060) in order to prevent VoIP, which might be cheaper than regular voice call (data tariffs dependent, of course).
  • asked a question related to Network Performance
Question
1 answer
Which of those simulators is more performant and supporting mobility, energy, QoS, Faire index and more metrics?
Relevant answer
Answer
Please go through tha paper entitled "Survey of Wireless Sensor Networks Simulation Tools for Demanding". Hope this paper will help you.
  • asked a question related to Network Performance
Question
1 answer
4G networks environments are composite cooperative and opportunistic, with multiuser diversity being provided in wireless networks.
Relevant answer
Answer
Hello,
I think this is a very interesting and challenging question!
I think that three will be the most challenging issues in 4G networks:
1. providing QoS for different service classes. Indeed, flows exchanged in 4G systems are characterized by different QoS requirements and by different priority levels;
2. unicast/multicast joint delivery. indeed, multicast services are expected to be massively exchanged in 4G networks, and their coexistence with traditional unicast flows poses additional scheduling issues.
3. scheduling in heterogeneous environments. Indeed, 4G networks offer different radio access technologies with heterogeneous base stations (macro, relay, femto, pico, etc. cells) and several transmissions types (cellular or direct device-to-device communications). All these features meaningfully increase the issues to solve in scheduling in 4G systems, making a given solution (e.g., cooperative or opportunistic) hard to be suitable in all the admissible scenarios.
I found these papers very interesting, i hope they could help you:
The most promising scheduling algorithm to provide guaranteed QoS to all types of traffic in multiservice 4G wireless networks
Joint Delivery of Unicast and E-MBMS Services in LTE Networks