SlideShare a Scribd company logo
INVESTIGATION AND EVALUATION OF IEEE
802.11N WLANS LINK FEATURES PERFORMANCE
UNDER SINGLE HOST AND CONCURRENT
COMMUNICATION
Sumon Kumar Debnath1
Prodip Kumar Sarker2
, Md. Manowarul Islam3
, and
Ileas Pramanik2
1
Department of Electrical and Electronic Eng., Begum Rokeya University, Bangladesh
2
Department of Computer Science and Eng., Begum Rokeya University, Bangladesh
3
Department of Computer Science and Eng., Jagannath University, Bangladesh
ABSTRACT
For an efficient design of wireless local-area networks (WLANs), the simulation tools are important to
accurately estimate the IEEE 802.11n/ac link features for WLANs. However, this true simulation of
network behavior is critical in designing high-performance WLANs. Through testing, analysis, and
modeling of the proposed scheme repetitively, the design of the WLAN can be enhanced with a small
budget before making its practical implementation. Many network simulation tools have been established
to give solutions for this request and ns-3 is the most widely used tools among them by the research
industry as an open-source network simulator. In this paper, we examine the various link features of the
802.11n WLANs under several conditions. We investigate the effects of 802.11n WLAN modulation and
coding schemes (MCSs), 20MHz single channel or 40 MHz bonded channel, guard intervals (GI), frame
aggregation, data encoding, number of antennas and their data rate, and link distance features of
802.11n WLAN in ns-3 when only a unique host connects with the access point (AP) and generates data
traffic. Besides, the performance for an enterprise scenario proposed by the IEEE 802.11ax study group
is evaluated when several hosts are simultaneously creating traffic with their associated APs. The results
demonstrate that ns-3 support most of the link features of the 802.11n protocol with significant accuracy.
KEYWORDS
IEEE 802.11n, MIMO, SISO, neighboring access-point association, Algorithm, ns-3 simulator.
1. INTRODUCTION
Currently, the IEEE 802.11n/ac WiFi standard has commonly installed on most customer
devices like a variety of laptop PCs, smartphones, tablets, and access points (APs) due to their
small price, flexible and high-performance Internet accessed services [1] [2]. Among them, the
IEEE 802.11n is the most commonly used protocol in wireless local-area networks (WLANs). It
approves several new technologies such as the number of antennas employed in Multiple Input
Multiple Output (MIMO) devices, the 40MHz bonded channel, the aggregation of the frame,
and the block acknowledgment mechanism that can increase the data transmission capacity up
to 600Mbps [3] [4]. Thus, the IEEE 802.11n protocol should be focused on.
In WLAN, a host normally uses a laptop/desktop PC, or a mobile device that can generate
traffic by single-host communication or multiple-hosts concurrent communication with the AP
at a time. In the scenario of concurrent traffic, multiple hosts send data simultaneously with one
AP. During concurrent communication, the rate of packet collision increases with the amount of
1
DOI: 10.5121/ijans.2021.11101
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
communicating hosts per AP and that makes throughput drops significantly [5]. In this case, a
host which is adjacent to the AP might have higher data transmission possibility than the remote
hosts.
In many cases, the WLAN researchers and engineers should need to test the link features of
802.11n protocols, hardware, and scenarios through simulation studies before implementing
them in a practical environment. This accurate simulation of link features of IEEE 802.11n is a
very critical matter in developing an innovative model or algorithms for WLAN [6] [7] [8],
mobile ad-hoc network (MANET) [9] [10] or vehicular ad-hoc networks (VANET) [11]. Using
repetitive modeling, and simulation of any proposed algorithm through network simulator, the
IEEE 802.11n WLANs system design can be enhanced cost-effectively before its physical
deployment in real environments. Several network simulators have been proposed to give their
solutions. They include WIMNET simulator [12], ns-2 [13], ns-3 [14], QualNet [15], and
OPNET [16]. Among them, ns-3 has been widely used in academic societies to evaluate new
protocols and techniques for WLANs as a realistic non-proprietary software platform.
Therefore, it is significant to study the various link features of the 802.11n protocol through ns-
3 simulations and evaluate their performance accuracy under different operating conditions.
In this paper, we evaluate the performance of various link features of 802.11n WLANs using ns-
3 simulation. We investigate different key features such as the throughput and maximum
feasible range with modulation coding schemes (MCSs), frame aggregation, long/short GI,
channel bonding, link distance performance, and the impact of the number of antennas in Single
Input Single Output (SISO) or MIMO links and their data rate through ns-3 simulation when
considering only one host is sending to or receiving packets from one AP. We also evaluate the
effect of concurrent communication by multiple hosts per AP in an enterprise network scenario.
We organize the rest of the paper as follows: Section 2 inspects some related works relevant to
our research. Section 3 reviews the 802.11n WLANs protocol and its link features. Section 4
briefly mentions the procedure of the neighboring AP association approach used for finding
hosts association for an enterprise network. Section 5 shows an overview of the simulation
environment for performance evaluation. Section 6 and section 7 explores the performance
evaluation results by simulation. Lastly, Section 8 concludes the paper with some future
recommendations.
2. RELATED WORKS
Currently, numerous research activities are carried out in literature to examine various
performance issues of 802.11n/ac protocol for WLANs through simulation. In this section, we
concisely review some related previous works relevant to our paper.
In [17], the authors evaluate the comparative performance features of the 802.11ac WLAN
relative to 802.11n protocol using ns-3.24.1 by considering several links features like channel
bonding(20/40MHz channel in 802.11n and 20/40/80/160MHz channel in 802.11ac), guard
intervals (long/short) and MCSs (MCS-0 ~ MCS-7/MCS-9) while evaluating HT/VHT
throughput, jitters, and delay. In the simulation, they did not evaluate all link features of the
protocol such as SU-MIMO and MU-MIMO link features, the influence of frame aggregation,
rate adaptation WiFi manager, and channel interference effects. Besides, they assume only a
single client/host communication scenario with the Access Point (AP) through ns-3 simulation.
But in a real network environment, concurrent traffic generation by multiple hosts with an AP
may have different performance features which should be analyzed through ns-3 simulation.
In [18], the throughput estimation model for the 802.11n MIMO link in WLANs is investigated
by considering a single-host and multiple-hosts communications scenario with an AP. They
2
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
verified their model accuracy by comparing the measured throughput results with the estimated
one using their throughput estimation model through WIMNET simulation [8].
In [19], the effect of Quality of Service (QoS) on the performance enhancement of the 802.11n
4×4 MIMO WLAN with random network topology for multimedia traffic is investigated using
OPNET modular. In [20], authors evaluate the efficacy of 802.11n standard over the long-
distances network in terms of 802.11a link using ns-3 simulation. Through simulation, they
validate the efficiency of 802.11n PHY and MAC layer performance by evaluating several
simulation scenarios like frame aggregation, data rates, bandwidth, and distances.
In [21], authors made modifications to the existing PHY model of the ns-3 simulator to support
for wider channels together with the bit-error-rate (BER) estimations with higher MCSs for
802.11ac WLAN. They evaluated these modifications using various simulation scenarios for the
traffic generated by a single client with an AP. They also examined the performance of
802.11ac for the multiple client concurrent communication situations carried out in an enterprise
network scenario from the upcoming IEEE 802.11ax work-group where multiple clients
produced traffic simultaneously to their associate APs. However, in this study, the SU-MIMO
and MU-MIMO and beam-forming link feature for 802.11ac/n standard were not implemented
and evaluated through simulation.
3. OVERVIEW OF IEEE 802.11N STANDARD
The 802.11n protocol mainly builds on the former 802.11 standards which include various novel
technologies into it. They include multiple-antennas MIMO concepts at the access point (AP)
and at the client PC side of the network, 40MHz channel bonding by combining two adjacent
20MHz channels and aggregated multiple frames into one frame before packet transmission to
enhance its communication performance [2]. In this section, we briefly review the link features
of the 802.11n protocol.
In 802.11n WLAN, the MIMO technology uses multiple antennas to concurrently transmit
and/or receive more information up to four times than the SISO link. It can afford this by using
Spatial Division Multiplexing (SDM), which can enhance the throughput significantly by
raising the number of spatial streams (SSs) [3]. Because each SS involves a separate
transmitting and receiving antenna. The 802.11n standards support 1×1 to 4×4 antennas. For
example, the 802.11n can provide the maximum 600Mbps throughput with the bonded channel
of 40 MHz, the short guard interval (GI) of 400ns, and with the 4 × 4 MIMO technology [3].
The 802.11n link can be operated in both 5 GHz or 2.4 GHz RF band and compatible with the
former standard (802.11 a/b/g). Besides working with 20 MHz channels, it can support channel
bonding (CB) to double the physical-layer (PHY) data rate where two adjacent 20 MHz
channels are worked together to make one broader channel of 40 MHz. The MIMO architecture
together with the CB can further increase the physical data rate [22]. However, the CB concept
has a higher potential for interference with other systems using the same frequencies in 2.4
GHz.
In the 802.11n standard, various modulations, error-correcting codes, and the number of SSs
used, denoted by MCSs index, which is called mode. The 802.11n standard outlines 31 modes
(MCS-0 ~ MCS-31). Through using orthogonal frequency division multiplexing (OFDM), this
protocol offers more immunity counter to the selective fading. In 802.11n, the amount of
OFDM sub-carriers is also improved. For example, with the 20 MHz channel the total OFDM
sub-carriers are 56 (52 usable) to support High Throughput (HT) and with the 40 MHz channel
bonding it can be improved up to 114 (108 usable) in HT. Every sub-carrier is modulated using
a suitable modulation type (BPSK, QPSK, 16-QAM, or 64-QAM) and forward error correction
3
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
symbols to afford more data throughput.
The 802.11n protocol supports frame aggregation and blocked acknowledgment (ACK)
mechanism to provide its MAC layer enhancements. With frame aggregation, we can increase
the data rate at the user level by aggregating multiple data frames into one for transmission at
each occurrence to cut the overhead of the protocol. The 802.11n protocol supports two types of
aggregation namely 1) MAC protocol data unit (A-MPDU) and 2) the MAC service data unit
(A-MSDU) [3].
4. NEIGHBORING ACCESS POINT (NAP) ASSOCIATION ALGORITHM FOR
EVALUATION OF AN ENTERPRISE NETWORK
In this section, we describe the procedure of the neighboring AP association algorithm to find
the set of associated hosts to each AP for an enterprise network.
1. We calculate the throughput between each of the available candidates APs and hosts
through the throughput estimation model in [18] as:
A. First, we compute the Euclid distance for each possible pair of APs and a host.
B. Then, we estimate received signal strength (RSS) between them via the log distance
model.
C. Finally, we convert the RSS into the throughput.
2. Drive the associable AP for a host with the largest link speed by the greedy approach as:
A. For each host, select a candidate AP such that the RSS at the host is maximum.
B. Associate the host to the AP in step 2. (A) with the largest link speed.
3. Repeat step 2 until each host is associated with an AP.
5. SIMULATION ENVIRONMENT FOR PERFORMANCE EVALUATION
Network simulator ns-3 is used to evaluate various link features of the IEEE 802.11n WLANs
MIMO/SISO protocol. ns-3 is the discrete-event network simulator commonly used in academic
societies as an openly accessible software tool to model any new protocols, techniques, and
algorithms for WLANs [14]. In this paper, we use the ns-3.28 version that was released in
March 2018. The code has been developed by C++, and the scenario for network simulations
can be written by Python. It has been developed as the simulation engine by many users in the
study and research of wired and wireless LANs. Currently, ns-3 adopts the key feature of IEEE
802.11n/ac or others protocol such as Multiple-Input-Multiple-Output (MIMO), the channel
bonding, long and short GI, and the MSDU or MPDU frame aggregation that can be useful to
model and evaluate various algorithms for WLANs in 2.4 and 5 GHz. For performance
evaluation, we consider two network scenarios by simulation: 1) Traffic created between a
unique host and the AP to form WLAN and 2) traffic produced concurrently by many hosts with
their associated APs. In the first scenario, a single host is associated and generated traffic with
the AP, forming 802.11n WLAN. In this scenario, we investigate the effect of data throughput
and transmission range with different MCSs (802.11n allows MCS-0 to MCS-31), link distance
features by rate adaptation, doubling the bandwidth of 802.11n channels (802.11n agrees 20
MHz channel or 40 MHz bonded channel), the number of antennas proportional to the
simultaneous data streams at both sides of the link (802.11n permits 1 × 1 to 4 × 4 antennas), the
long or short GI, and the maximum size of the aggregated frame.
In the second scenario, we consider an enterprise network scenario where multiple hosts are
associated with an AP and concurrently generating traffic with it. Here, we examine the average
throughput performance by increasing the numbers of active hosts that are concurrently
4
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
coding rate of 1/2, 2/3, 3/4, or 5/6 [3]. The GI is reduced by half (400ns) between OFDM
communicating with their associated APs. In both scenarios, we estimate the throughput for
every HT bit rate value as the main performance metric which is calculated using the flow
monitor [22] as
xpkt
TimeFirstR
-
pkt
TimeLastRx
8
*
rxBytes

Throughpt (1)
Where rxBytes is the total number of received packets, TimeLastRxPacket is the absolute time
of the last received packet and TimeFirstRxPacket does the absolute time of the first received
packet by flow monitor.
6. EVALUATION RESULTS FOR TRAFFIC PRODUCED BETWEEN A UNIQUE
HOST AND AN AP
In this portion, we show various simulation results when a unique host makes traffic with AP.
6.1. Average throughput and maximum range with various MCSs
In the first simulation, we investigate the relationship between peak throughput and
transmission range with different MCSs and various physical distances between the AP and a
host. Table 1 shows the simulation parameters and Figure 1 demonstrates the simulation results.
From Figure 1 it is observed that although the peak throughput rises with increasing the MCSs
value, it decreases its communication range. This lower range with higher MCSs index values is
expected because the higher MCSs require more signal-to-noise ratio (SNR) value so that the
receiver can successfully understand them and signals pass through longer distances tend to
become weak that offer inferior SNRs.
Table 1. Parameters for transmission range simulation.
Parameter Value
Propagation Model constant position model
mobility model log distance model
remote station manager constant rate manager
packet size UDP, 1472 bytes
error rate model YansErrorRateModel
# of spatial streams 1×1, 2×2
Tx power 16.0206 dBm
Mode 40
0
20
40
60
80
100
120
0 20 40 60 80 100 120
Throughput
(Mbps)
Distance (m)
HtMcs-0
HtMcs-1
HtMcs-2
HtMcs-3
HtMcs-4
HtMcs-5
HtMcs-6
HtMcs-7
120
180
240
300
roughput
(Mbps)
HtMcs-8
HtMcs-9
HtMcs-10
HtMcs-11
HtMcs-12
HtMcs-13
HtMcs-14
(a) Throughput for 1×1 SISO link
5
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
0
20
40
Throu
Distance (m)
HtMcs-6
HtMcs-7
0
60
120
180
240
300
0 20 40 60 80 100 120
Throughput
(Mbps)
Distance (m)
HtMcs-8
HtMcs-9
HtMcs-10
HtMcs-11
HtMcs-12
HtMcs-13
HtMcs-14
HtMcs-15
0
30
60
90
120
150
0 20 40 60 80 100 120
Throughput
(Mbps)
Distance (m)
20MHz
40MHz
40MHz+3dBm
40MHz+6dBm
40MHz+9dBm
(b) Throughput for 2×2 MIMO link
Figure 1. Maximum throughput and transmission range with MCSs.
However, when the range is short enough higher MCS can provide higher throughput.
Simulation results in Figure 1 also indicate that two end nodes can communicate at the
maximum range of less than or equal to 110 m with the smallest throughput when lowest MCSs
value is used. That is the communication at maximum throughput can occur when a host located
near to an AP.
6.2. Average throughput result with aggregated frame size (A-MPDU)
In the second simulation scenario, we examine the effects of the A-MPDU frame aggregation on
the data throughput for various MCS (MCS-0 to MCS-15) value. Our purpose is to know how
this implementation feature affects the throughput and their throughput performance under
different aggregated frame sizes. The configuration parameters used for this simulation study
are depicted in Table 2. Figure 2(a) and Figure 2(b) shows the average throughput estimation
results with maximum A-MPDU frame size (64 kB) under different MCSs index when a single
host is located at 1 m distance from the AP and generates traffic with it.
It is observed from Figure 2(a) and Figure 2(b) that with the maximum A-MPDU frame, the
throughput for 1×1 SISO and 2×2 MIMO link is significantly much higher than without A-
MPDU aggregation. Because, with the A-MPDU much of the CSMA/CA access specific
overhead can be reduced and therefore, in a unique transmission, we can easily transmit
multiple frames. This effect can significantly improve throughput. It is also perceived from
Figure 2(c) that the throughput of 1×1 SISO and 2×2 MIMO link improves as the aggregated
frame size increases and the performance graph looks exponential.
Table 2. Parameters for aggregation simulation.
Parameter Value
Propagation Model constant position model
mobility model log distance model
remote station manager constant rate manager
packet size UDP, 1472 bytes
error rate model YansErrorRateModel
# of spatial streams 1×1, 2×2
max A-MPDU size (kB) 0, 4, 6, 7, 8, 10, 15, 20, 25,
30, 35, 40, 45, 50, 60, 64
Tx power 16.0206 dBm
Mode 40
6
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
(a) MCS vs. throughput for 1×1 SISO link
(b) MCS vs. throughput for 2×2 MIMO link
(c) A-MPDU frame size vs. throughput
Figure 2. Average throughput with frame aggregation
6.3. Average throughput result by doubling channel width
In the third simulation, we investigate the relationships between the average throughput and
channel width. Table 3 gives the parameters of simulation and Figure 3 does the simulation
results. By doubling up the channel width, the average throughput also increases but this will
reduce its transmission range. Because, if we move from 20 MHz to 40MHz, then we should
also raise the power of the transmitter so that the packets can effectively coverer the same range.
7
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
Table 3. Parameters for channel width simulation.
Parameter Value
Propagation Model constant position model
mobility model log distance model
remote station manager constant rate manager
data rate HtMcs 11
Packet size UDP, 1472 bytes
error rate model YansErrorRateModel
# of spatial streams 2×2
Mode 20/40 MHz, short GI
Figure 3. Average throughput results with 20 MHz and 40MHz channel width
This is reasonable since the 3dBm increase in transmit power is almost equivalent to doubling
the power.
6.4. Average throughput result with the number of antennas or special streams
In the 4th simulation scenario, we investigate the effects on throughput with the number of data
streams concurrently send/receive packet under different MCSs value. This total amount of
instantaneous data streams is restricted by the discrete number of antennas used at the sender
and receiver side ranging from 1×1 to 4×4 streams. Table 4 shows the simulation parameters.
Average throughput results with the number of special streams are shown in Figure 4.
Table 4. Parameters for # of spatial streams simulation.
Parameter Value
propagation model constant position model
mobility model log distance model
remote station manager constant rate manager
Packet size UDP, 1472 bytes
error rate model YansErrorRateModel
# of spatial streams 1 × 1, 2 × 2, 3 × 3, 4 × 4
Tx power 16:0206 dBm
Mode 40MHz, 400ns
8
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
0
100
200
300
400
500
600
0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32
Throughput
(Mbps)
MCS (0 ~ 31)
Theoretical Rate ns-3 simulation
Figure 4. Average throughput with the number of spatial streams, and different MCSs.
It is observed from Figure 4 that by using a 40 MHz bonded channel with a 1×1 spatial stream,
we can achieve a maximum physical data rate of 120 Mbps with 800ns long GI and 133 Mbps
with 400ns short GI. If more antennas are used, then the data rate of 451 Mbps is achieved by
using one 40 MHz channel and 4×4 spatial streams. If no other microwave, Bluetooth, or WiFi
signal propagation occurred in the vicinity then the data rate of the 802.11n network will be
closer to the physical rate. Therefore, this MIMO feature can considerably raise the data
throughput of 802.11n standard with growing the quantity of the committed spatial stream. We
also compare this simulation results with the physical data rate.
6.5. Link distance and throughput features by rate adaptation algorithm
In this fifth simulation scenario, we investigate the effects of throughput of a SISO link with the
link distance. Figure 5 shows the throughput simulation results with the Ideal rate adaptation
algorithm in ns-3 when we increase the link distance of a host from the AP with certain
interims. First, we place a host at 1 m distance from the AP and then gradually change its
physical distance up to 150m with a breakpoint of 5m. The simulation parameters are shown in
Table 5.
It can be perceived from Figure 5 that any throughput drops as we rise the physical distance
between the AP and a host pair. This may happen because of the RSS also declines with the
distance. This worse RSS value indicates that a host may get the poor SNR at this point and
causes higher packet errors. To overcome these errors, the system slows down its transmission
speed by lowering its MCSs. The throughput simulation results by ns-3 are stepwise on account
of the variation of MCSs index value. We can also notice from Figure 5 that the ns-3 simulation
results are very similar to the measurement one in [24].
Table 5. Parameters for rate adaptation simulation.
Parameter Value
propagation model constant position model
mobility model log distance model
remote station manager Ideal rate adaptation
error rate model YansErrorRateModel
# of spatial streams 1×1
Tx power 16:0206 dBm
Mode 40MHz, 800ns
9
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
Figure 5. Average throughput with link distance.
7. EVALUATION RESULT FOR CONCURRENT COMMUNICATION BY
MULTIPLE HOSTS
Finally, in this sixth simulation scenario, we investigate the impact of the number of active hosts
associated with all the active AP when multiple hosts simultaneously generate traffic with them.
To perform this evaluation, we use an enterprise network model which is proposed by the
802.11ax study group [21].
We assume all APs use different channels and simulation is run with various offered loads by 4,
8, 16, 32, 48, and 64 hosts respectively. The configuration parameters used for this simulation
study are shown in Table 6. Figure 6(a) shows the 50×50 enterprise network field where 4 APs
and 64 hosts are uniformly distributed. In Figure 6(a), the circles represent the APs, and squares
denote the host’s location in the field. Hosts association to each AP in the topology is selected
by applying the nearest AP association algorithm. Figure 6 (c) shows the throughput results by
simulation when multiple hosts offer traffic with their associated APs as in Figure 6 (b).
It can be perceived from Figure 6(c) that the average throughput drops significantly as more
active hosts or clients offer traffic to their associated APs in the network field. This means that
the 4 hosts give 29% higher throughput than 64 active hosts. This is because with fewer active
hosts, there is less competition for channel access and packet errors increase with increasing the
number of concurrent communicating links which decreases the speed of their data
transmission. Also, the transmission chances of near host and far host to the associated AP are
not the same and the host with stronger RSS always dominates the channel.
Table 6. Parameters for transmission range simulation.
Parameter Value
propagation model log distance model
mobility model constant position model
remote station manager Ideal rate adaptation
error rate model YansErrorRateModel
# of antennas 1×1
Tx power 16:0206 dBm
Mode 40MHz, 800ns
# of active hosts per AP 4, 16, 32, 48, 64
10
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
(a) Network topology with 4 APs and 64 hosts.
(b) Hosts association by NAP association approach for 64 hosts with 4 APs.
(c) # of hosts vs. average throughput per AP
Figure 6. Simulation result for the number of active users increasing scenario.
It can be perceived from Figure 6(c) that the average throughput drops significantly as more
active hosts or clients offer traffic to their associated APs in the network field. This means that
the 4 hosts give 29% higher throughput than 64 active hosts. This is because with fewer active
11
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021Type your text
hosts, there is less competition for channel access and packet errors increase with increasing the
number of concurrent communicating links which decreases the speed of their data
transmission. Also, the transmission chances of near host and far host to the associated AP are
not the same and the host with stronger RSS always dominates the channel.
8. CONCLUSIONS
This paper investigated the 802.11n WLANs key link features performance in ns-3 under
various conditions for single-host communication between a host and an AP. Besides,
performance evaluation for an enterprise scenario from the 802.11ax group was evaluated when
there exists a concurrent packet transmission or reception that occurred by multiple hosts with
their associated APs. To find hosts association to the APs for an enterprise network scenario, we
apply the neighboring AP association approach. The simulation results show that the ns-3
support the link features for the IEEE 802.11n protocol with considerable accuracy and can
provide satisfactory performance for an enterprise scenario in WLAN. Our future works include
the continuous investigation of the 802.11n protocol in diverse network environments and usage
of the model to the ideal design of WLANs.
REFERENCES
[1] M. S. Gast, “802.11 wireless networks”, 2nd ed., O’Reilly, 2005.
[2] M. S. Gast, “802.11n: a survival guide”, 1st ed., O’Reilly, 2012.
[3] S. Moghe, R. Upadhyay,“Comparison of SISO and MIMO techniques in 802.11n wireless local
area network”, Proc. Int. Conf. Emer. Trend. Elec. Photo. Dev. & Syst. (ELECTRO-2009), pp.
245-246, 2009.
[4] IEEE 802.11n, https://en.wikipedia.org/wiki/IEEE 802.11n-2009.
[5] I. Syed and B. Roh, “Adaptive backoff algorithm for contention window for dense IEEE 802.11
WLANs”, Mobile Inf. Sys., 2016.
[6] M. S. A. Mamun, N. Funabiki, K. S. Lwin, M. E. Islam, and W.-C. Kao, “A channel assignment
extension of active access-point 6configuration algorithm for elastic WLAN system and its
implementation using Raspberry Pi”, Int. J. Network. Comput., vol. 7, no. 2, pp. 248-270, 2017.
[7] S. K. Debnath, N. Funabiki, M. Saha, M. S. A. Mamun, and W.-C. Kao, “MIMO host location
optimization in active access-point configuration algorithm for elastic WLAN system”, Int. J.
Space-Base. Sit. Comput., (IJSSC), vol. 8, no. 2, pp. 59-69, 2018.
[8] K. S. Lwin, N. Funabiki, C. Taniguchi, K. K. Zaw, M. S. A. Mamun, M. Kuribayashi, and W.-C.
Kao, “A minimax approach for access point setup optimization in IEEE 802.11n wireless
networks”, Int. J. Network. Computing, vol. 7, no. 2, pp. 187-207, 2017.
[9] S. K. Debnath and A.Z.M. T. Islam, “Analysis of Neighbor Knowledge Based Bcast Protocol
Performance for Multi-hop Wireless Ad Hoc Networks”, Int. J. on AdHoc Netw. Systems
(IJANS), ISSN: 2249 – 0175, Vol. 1, Issue 2, pp. 01-12, 2011.
[10] M. Muhammad, A. G. Halilu, and S. M. Bunu, “Framework, Implementation and Algorithm for
Asynchronous Power Saving of UWBMAC with Steerable Directional”, Int. J. on AdHoc Netw.
Systems (IJANS), ISSN: 2249 – 0175, Vol. 9, Issue 3, pp. 1-11, 2019.
[11] B. Mahma and A. Korichi,, “Simulation & VANET: Towards a New Reliable and Optimal Data
Dissemination Model”, Int. J. on AdHoc Netw. Systems (IJANS), ISSN: 2249 – 0175, Vol.6,
Issue 2, 2016.
[12] N. Funabiki ed., “Wireless mesh networks”, InTech Open Access Pub., Jan. 2011,
http://www.intechopen.com/ books/wireless-mesh-networks.
[13] “The network simulator ns-2”, https://www.isi.edu/nsnam/ns/.
12
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
[14] “The network simulator ns-3”, http://www.nsnam.org.
[15] QualNet, http://web.scalable-networks.com/ qualnet-network-simulator-software.
[16] W. Jiang, “OPNET-based WLAN modeling and its performance Testing”, Chem. Eng. Trans.,
vol. 51, pp. 361-366, 2016.
[17] N. S. Ravindranath, I. Singh, A. Prasad, and V. S. Rao, “Performance evaluation of IEEE
802.11ac and 802.11n using NS3,” Indian Journal of Science and Technology, vol. 9, no. 26,
2016.
[18] S. K. Debnath, M. Saha, N. Funabiki, and W.-C. Kao, “A throughput estimation model for IEEE
802.11n MIMO link in wireless local-area networks”, Proc. Int. Conf. Comp. Commun. Syst.
(ICCCS), pp. 327-331, 2018.
[19] Z. K. Farej, and M. M. Jasim, “Performance evaluation of the IEEE 802.11n random topology
WLAN with QoS application”, Int. J. Elec. and Comp. Eng., Vol. 10, no. 2, pp. 1924-1934,
2020.
[20] P. Ludeña, J. Simó, K. Rohoden, and M. Morocho, “Performance Evaluation of Long-Distance
802.11n Networks”, In New Contributions in Information Systems and Technologies, pp. 1033-
1043, Springer, Cham, 2015.
[21] A. Jonsson, D. A. kerman, and E. Fitzgerald, “Modeling, Implementation and Evaluation of
IEEE 802.11ac in NS-3 for Enterprise Networks”, Proc. Wireless Days (WD), 2016.
[22] I. Vermesan, A. Moldovan, T. Palade, and R. Colda, “Multi antenna STBC transmission
technique evaluation under IEEE 802.11n conditions”, Proc. Int. Conf. Micro. Tech. (COMITE),
pp. 51-54, 2010.
[23] Flow monitor Model library-ns-3 https://www.nsnam.org/ docs/models/html/flow-monitor.html.
[24] S. K. Debnath, N. Funabiki, P. K. Sarker, K. S. Lwin and M. Saha, “Throughput Estimation of
SISO and MIMO Links under LOS and NLOS Conditions in IEEE 802.11n WLAN”, J. of
Comp. Sci. and Eng. Research, (CSERJ), vol. 11, pp. 19-27, 2019.
13
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021

More Related Content

What's hot

Types of network topology
Types of network topologyTypes of network topology
Types of network topology
Md Ashikur Rahman
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
ijwmn
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
Chaynika Verma
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
Ccna day1Ccna day1
Ccna day1
danishrafiq
 
Experimental analysis of channel interference in ad hoc network
Experimental analysis of channel interference in ad hoc networkExperimental analysis of channel interference in ad hoc network
Experimental analysis of channel interference in ad hoc network
ijcsa
 
Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologiesAnup Pandey
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
Physical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and DevicesPhysical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and Devices
Shahid Khan
 
Seamless ho within wifi wimax
Seamless ho within wifi wimaxSeamless ho within wifi wimax
Seamless ho within wifi wimaxWily Langit
 
Ns 2 based simulation environment for performance evaluation of umts architec...
Ns 2 based simulation environment for performance evaluation of umts architec...Ns 2 based simulation environment for performance evaluation of umts architec...
Ns 2 based simulation environment for performance evaluation of umts architec...
Makhdoom Waseem Hashmi
 
Network topology
Network topologyNetwork topology
Network topology
lekshmik
 
A NURBS-optimized dRRM solution in a mono-channel condition for IEEE 802.11 e...
A NURBS-optimized dRRM solution in a mono-channel condition for IEEE 802.11 e...A NURBS-optimized dRRM solution in a mono-channel condition for IEEE 802.11 e...
A NURBS-optimized dRRM solution in a mono-channel condition for IEEE 802.11 e...
IJECEIAES
 
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
IJCSIS Research Publications
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
IJTET Journal
 

What's hot (19)

Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
05688207
0568820705688207
05688207
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Experimental analysis of channel interference in ad hoc network
Experimental analysis of channel interference in ad hoc networkExperimental analysis of channel interference in ad hoc network
Experimental analysis of channel interference in ad hoc network
 
Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologies
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Physical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and DevicesPhysical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and Devices
 
Seamless ho within wifi wimax
Seamless ho within wifi wimaxSeamless ho within wifi wimax
Seamless ho within wifi wimax
 
Ns 2 based simulation environment for performance evaluation of umts architec...
Ns 2 based simulation environment for performance evaluation of umts architec...Ns 2 based simulation environment for performance evaluation of umts architec...
Ns 2 based simulation environment for performance evaluation of umts architec...
 
Network topology
Network topologyNetwork topology
Network topology
 
A NURBS-optimized dRRM solution in a mono-channel condition for IEEE 802.11 e...
A NURBS-optimized dRRM solution in a mono-channel condition for IEEE 802.11 e...A NURBS-optimized dRRM solution in a mono-channel condition for IEEE 802.11 e...
A NURBS-optimized dRRM solution in a mono-channel condition for IEEE 802.11 e...
 
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 

Similar to Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance Under Single Host and Concurrent Communication

COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...
COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...
COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...
pijans
 
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance ComparisonWireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
pijans
 
EMPIRICAL PERFORMANCE EVALUATION OF ENHANCED THROUGHPUT SCHEMES OF IEEE802.11...
EMPIRICAL PERFORMANCE EVALUATION OF ENHANCED THROUGHPUT SCHEMES OF IEEE802.11...EMPIRICAL PERFORMANCE EVALUATION OF ENHANCED THROUGHPUT SCHEMES OF IEEE802.11...
EMPIRICAL PERFORMANCE EVALUATION OF ENHANCED THROUGHPUT SCHEMES OF IEEE802.11...
ijwmn
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485IJRAT
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
ijwmn
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
IJECEIAES
 
Opnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo sOpnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo s
eSAT Publishing House
 
RAMON : Rapid Mobile Network Emulation
RAMON : Rapid Mobile Network EmulationRAMON : Rapid Mobile Network Emulation
RAMON : Rapid Mobile Network Emulation
Dr. Edwin Hernandez
 
Performance analysis of voip traffic over integrating wireless lan and wan us...
Performance analysis of voip traffic over integrating wireless lan and wan us...Performance analysis of voip traffic over integrating wireless lan and wan us...
Performance analysis of voip traffic over integrating wireless lan and wan us...
ijwmn
 
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksA Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
Eswar Publications
 
Performance analysis of 802.11ac with frame aggregation using NS3
Performance analysis of 802.11ac with frame aggregation using NS3 Performance analysis of 802.11ac with frame aggregation using NS3
Performance analysis of 802.11ac with frame aggregation using NS3
IJECEIAES
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportPanth Shah
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
ijwmn
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
ijwmn
 
A novel approach to develop a reliable routing protocol for wireless mesh net...
A novel approach to develop a reliable routing protocol for wireless mesh net...A novel approach to develop a reliable routing protocol for wireless mesh net...
A novel approach to develop a reliable routing protocol for wireless mesh net...
eSAT Journals
 
Thesis on Wimax
Thesis on WimaxThesis on Wimax
Gu3311901196
Gu3311901196Gu3311901196
Gu3311901196
IJERA Editor
 

Similar to Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance Under Single Host and Concurrent Communication (20)

COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...
COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...
COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...
 
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance ComparisonWireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
 
EMPIRICAL PERFORMANCE EVALUATION OF ENHANCED THROUGHPUT SCHEMES OF IEEE802.11...
EMPIRICAL PERFORMANCE EVALUATION OF ENHANCED THROUGHPUT SCHEMES OF IEEE802.11...EMPIRICAL PERFORMANCE EVALUATION OF ENHANCED THROUGHPUT SCHEMES OF IEEE802.11...
EMPIRICAL PERFORMANCE EVALUATION OF ENHANCED THROUGHPUT SCHEMES OF IEEE802.11...
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
 
Opnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo sOpnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo s
 
RAMON : Rapid Mobile Network Emulation
RAMON : Rapid Mobile Network EmulationRAMON : Rapid Mobile Network Emulation
RAMON : Rapid Mobile Network Emulation
 
Performance analysis of voip traffic over integrating wireless lan and wan us...
Performance analysis of voip traffic over integrating wireless lan and wan us...Performance analysis of voip traffic over integrating wireless lan and wan us...
Performance analysis of voip traffic over integrating wireless lan and wan us...
 
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksA Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
 
Performance analysis of 802.11ac with frame aggregation using NS3
Performance analysis of 802.11ac with frame aggregation using NS3 Performance analysis of 802.11ac with frame aggregation using NS3
Performance analysis of 802.11ac with frame aggregation using NS3
 
Survey on mobile wimax
Survey on mobile wimaxSurvey on mobile wimax
Survey on mobile wimax
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_Report
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
 
A novel approach to develop a reliable routing protocol for wireless mesh net...
A novel approach to develop a reliable routing protocol for wireless mesh net...A novel approach to develop a reliable routing protocol for wireless mesh net...
A novel approach to develop a reliable routing protocol for wireless mesh net...
 
Thesis on Wimax
Thesis on WimaxThesis on Wimax
Thesis on Wimax
 
Gu3311901196
Gu3311901196Gu3311901196
Gu3311901196
 

More from pijans

An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...
An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...
An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...
pijans
 
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...
pijans
 
As-Puma : Anycast Semantics In Parking Using Metaheuristic Approach
As-Puma : Anycast Semantics In Parking Using Metaheuristic ApproachAs-Puma : Anycast Semantics In Parking Using Metaheuristic Approach
As-Puma : Anycast Semantics In Parking Using Metaheuristic Approach
pijans
 
A Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for ManetsA Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for Manets
pijans
 
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
pijans
 
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
pijans
 
Path Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc NetworkPath Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc Network
pijans
 
Study of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh NetworkStudy of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh Network
pijans
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
pijans
 
Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -
pijans
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
pijans
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networks
pijans
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...
pijans
 
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
pijans
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
pijans
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
pijans
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
pijans
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
pijans
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routing
pijans
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANET
pijans
 

More from pijans (20)

An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...
An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...
An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...
 
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...
 
As-Puma : Anycast Semantics In Parking Using Metaheuristic Approach
As-Puma : Anycast Semantics In Parking Using Metaheuristic ApproachAs-Puma : Anycast Semantics In Parking Using Metaheuristic Approach
As-Puma : Anycast Semantics In Parking Using Metaheuristic Approach
 
A Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for ManetsA Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for Manets
 
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
 
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
 
Path Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc NetworkPath Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc Network
 
Study of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh NetworkStudy of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh Network
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networks
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...
 
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routing
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANET
 

Recently uploaded

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 

Recently uploaded (20)

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 

Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance Under Single Host and Concurrent Communication

  • 1. INVESTIGATION AND EVALUATION OF IEEE 802.11N WLANS LINK FEATURES PERFORMANCE UNDER SINGLE HOST AND CONCURRENT COMMUNICATION Sumon Kumar Debnath1 Prodip Kumar Sarker2 , Md. Manowarul Islam3 , and Ileas Pramanik2 1 Department of Electrical and Electronic Eng., Begum Rokeya University, Bangladesh 2 Department of Computer Science and Eng., Begum Rokeya University, Bangladesh 3 Department of Computer Science and Eng., Jagannath University, Bangladesh ABSTRACT For an efficient design of wireless local-area networks (WLANs), the simulation tools are important to accurately estimate the IEEE 802.11n/ac link features for WLANs. However, this true simulation of network behavior is critical in designing high-performance WLANs. Through testing, analysis, and modeling of the proposed scheme repetitively, the design of the WLAN can be enhanced with a small budget before making its practical implementation. Many network simulation tools have been established to give solutions for this request and ns-3 is the most widely used tools among them by the research industry as an open-source network simulator. In this paper, we examine the various link features of the 802.11n WLANs under several conditions. We investigate the effects of 802.11n WLAN modulation and coding schemes (MCSs), 20MHz single channel or 40 MHz bonded channel, guard intervals (GI), frame aggregation, data encoding, number of antennas and their data rate, and link distance features of 802.11n WLAN in ns-3 when only a unique host connects with the access point (AP) and generates data traffic. Besides, the performance for an enterprise scenario proposed by the IEEE 802.11ax study group is evaluated when several hosts are simultaneously creating traffic with their associated APs. The results demonstrate that ns-3 support most of the link features of the 802.11n protocol with significant accuracy. KEYWORDS IEEE 802.11n, MIMO, SISO, neighboring access-point association, Algorithm, ns-3 simulator. 1. INTRODUCTION Currently, the IEEE 802.11n/ac WiFi standard has commonly installed on most customer devices like a variety of laptop PCs, smartphones, tablets, and access points (APs) due to their small price, flexible and high-performance Internet accessed services [1] [2]. Among them, the IEEE 802.11n is the most commonly used protocol in wireless local-area networks (WLANs). It approves several new technologies such as the number of antennas employed in Multiple Input Multiple Output (MIMO) devices, the 40MHz bonded channel, the aggregation of the frame, and the block acknowledgment mechanism that can increase the data transmission capacity up to 600Mbps [3] [4]. Thus, the IEEE 802.11n protocol should be focused on. In WLAN, a host normally uses a laptop/desktop PC, or a mobile device that can generate traffic by single-host communication or multiple-hosts concurrent communication with the AP at a time. In the scenario of concurrent traffic, multiple hosts send data simultaneously with one AP. During concurrent communication, the rate of packet collision increases with the amount of 1 DOI: 10.5121/ijans.2021.11101 International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
  • 2. communicating hosts per AP and that makes throughput drops significantly [5]. In this case, a host which is adjacent to the AP might have higher data transmission possibility than the remote hosts. In many cases, the WLAN researchers and engineers should need to test the link features of 802.11n protocols, hardware, and scenarios through simulation studies before implementing them in a practical environment. This accurate simulation of link features of IEEE 802.11n is a very critical matter in developing an innovative model or algorithms for WLAN [6] [7] [8], mobile ad-hoc network (MANET) [9] [10] or vehicular ad-hoc networks (VANET) [11]. Using repetitive modeling, and simulation of any proposed algorithm through network simulator, the IEEE 802.11n WLANs system design can be enhanced cost-effectively before its physical deployment in real environments. Several network simulators have been proposed to give their solutions. They include WIMNET simulator [12], ns-2 [13], ns-3 [14], QualNet [15], and OPNET [16]. Among them, ns-3 has been widely used in academic societies to evaluate new protocols and techniques for WLANs as a realistic non-proprietary software platform. Therefore, it is significant to study the various link features of the 802.11n protocol through ns- 3 simulations and evaluate their performance accuracy under different operating conditions. In this paper, we evaluate the performance of various link features of 802.11n WLANs using ns- 3 simulation. We investigate different key features such as the throughput and maximum feasible range with modulation coding schemes (MCSs), frame aggregation, long/short GI, channel bonding, link distance performance, and the impact of the number of antennas in Single Input Single Output (SISO) or MIMO links and their data rate through ns-3 simulation when considering only one host is sending to or receiving packets from one AP. We also evaluate the effect of concurrent communication by multiple hosts per AP in an enterprise network scenario. We organize the rest of the paper as follows: Section 2 inspects some related works relevant to our research. Section 3 reviews the 802.11n WLANs protocol and its link features. Section 4 briefly mentions the procedure of the neighboring AP association approach used for finding hosts association for an enterprise network. Section 5 shows an overview of the simulation environment for performance evaluation. Section 6 and section 7 explores the performance evaluation results by simulation. Lastly, Section 8 concludes the paper with some future recommendations. 2. RELATED WORKS Currently, numerous research activities are carried out in literature to examine various performance issues of 802.11n/ac protocol for WLANs through simulation. In this section, we concisely review some related previous works relevant to our paper. In [17], the authors evaluate the comparative performance features of the 802.11ac WLAN relative to 802.11n protocol using ns-3.24.1 by considering several links features like channel bonding(20/40MHz channel in 802.11n and 20/40/80/160MHz channel in 802.11ac), guard intervals (long/short) and MCSs (MCS-0 ~ MCS-7/MCS-9) while evaluating HT/VHT throughput, jitters, and delay. In the simulation, they did not evaluate all link features of the protocol such as SU-MIMO and MU-MIMO link features, the influence of frame aggregation, rate adaptation WiFi manager, and channel interference effects. Besides, they assume only a single client/host communication scenario with the Access Point (AP) through ns-3 simulation. But in a real network environment, concurrent traffic generation by multiple hosts with an AP may have different performance features which should be analyzed through ns-3 simulation. In [18], the throughput estimation model for the 802.11n MIMO link in WLANs is investigated by considering a single-host and multiple-hosts communications scenario with an AP. They 2 International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
  • 3. verified their model accuracy by comparing the measured throughput results with the estimated one using their throughput estimation model through WIMNET simulation [8]. In [19], the effect of Quality of Service (QoS) on the performance enhancement of the 802.11n 4×4 MIMO WLAN with random network topology for multimedia traffic is investigated using OPNET modular. In [20], authors evaluate the efficacy of 802.11n standard over the long- distances network in terms of 802.11a link using ns-3 simulation. Through simulation, they validate the efficiency of 802.11n PHY and MAC layer performance by evaluating several simulation scenarios like frame aggregation, data rates, bandwidth, and distances. In [21], authors made modifications to the existing PHY model of the ns-3 simulator to support for wider channels together with the bit-error-rate (BER) estimations with higher MCSs for 802.11ac WLAN. They evaluated these modifications using various simulation scenarios for the traffic generated by a single client with an AP. They also examined the performance of 802.11ac for the multiple client concurrent communication situations carried out in an enterprise network scenario from the upcoming IEEE 802.11ax work-group where multiple clients produced traffic simultaneously to their associate APs. However, in this study, the SU-MIMO and MU-MIMO and beam-forming link feature for 802.11ac/n standard were not implemented and evaluated through simulation. 3. OVERVIEW OF IEEE 802.11N STANDARD The 802.11n protocol mainly builds on the former 802.11 standards which include various novel technologies into it. They include multiple-antennas MIMO concepts at the access point (AP) and at the client PC side of the network, 40MHz channel bonding by combining two adjacent 20MHz channels and aggregated multiple frames into one frame before packet transmission to enhance its communication performance [2]. In this section, we briefly review the link features of the 802.11n protocol. In 802.11n WLAN, the MIMO technology uses multiple antennas to concurrently transmit and/or receive more information up to four times than the SISO link. It can afford this by using Spatial Division Multiplexing (SDM), which can enhance the throughput significantly by raising the number of spatial streams (SSs) [3]. Because each SS involves a separate transmitting and receiving antenna. The 802.11n standards support 1×1 to 4×4 antennas. For example, the 802.11n can provide the maximum 600Mbps throughput with the bonded channel of 40 MHz, the short guard interval (GI) of 400ns, and with the 4 × 4 MIMO technology [3]. The 802.11n link can be operated in both 5 GHz or 2.4 GHz RF band and compatible with the former standard (802.11 a/b/g). Besides working with 20 MHz channels, it can support channel bonding (CB) to double the physical-layer (PHY) data rate where two adjacent 20 MHz channels are worked together to make one broader channel of 40 MHz. The MIMO architecture together with the CB can further increase the physical data rate [22]. However, the CB concept has a higher potential for interference with other systems using the same frequencies in 2.4 GHz. In the 802.11n standard, various modulations, error-correcting codes, and the number of SSs used, denoted by MCSs index, which is called mode. The 802.11n standard outlines 31 modes (MCS-0 ~ MCS-31). Through using orthogonal frequency division multiplexing (OFDM), this protocol offers more immunity counter to the selective fading. In 802.11n, the amount of OFDM sub-carriers is also improved. For example, with the 20 MHz channel the total OFDM sub-carriers are 56 (52 usable) to support High Throughput (HT) and with the 40 MHz channel bonding it can be improved up to 114 (108 usable) in HT. Every sub-carrier is modulated using a suitable modulation type (BPSK, QPSK, 16-QAM, or 64-QAM) and forward error correction 3 International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
  • 4. symbols to afford more data throughput. The 802.11n protocol supports frame aggregation and blocked acknowledgment (ACK) mechanism to provide its MAC layer enhancements. With frame aggregation, we can increase the data rate at the user level by aggregating multiple data frames into one for transmission at each occurrence to cut the overhead of the protocol. The 802.11n protocol supports two types of aggregation namely 1) MAC protocol data unit (A-MPDU) and 2) the MAC service data unit (A-MSDU) [3]. 4. NEIGHBORING ACCESS POINT (NAP) ASSOCIATION ALGORITHM FOR EVALUATION OF AN ENTERPRISE NETWORK In this section, we describe the procedure of the neighboring AP association algorithm to find the set of associated hosts to each AP for an enterprise network. 1. We calculate the throughput between each of the available candidates APs and hosts through the throughput estimation model in [18] as: A. First, we compute the Euclid distance for each possible pair of APs and a host. B. Then, we estimate received signal strength (RSS) between them via the log distance model. C. Finally, we convert the RSS into the throughput. 2. Drive the associable AP for a host with the largest link speed by the greedy approach as: A. For each host, select a candidate AP such that the RSS at the host is maximum. B. Associate the host to the AP in step 2. (A) with the largest link speed. 3. Repeat step 2 until each host is associated with an AP. 5. SIMULATION ENVIRONMENT FOR PERFORMANCE EVALUATION Network simulator ns-3 is used to evaluate various link features of the IEEE 802.11n WLANs MIMO/SISO protocol. ns-3 is the discrete-event network simulator commonly used in academic societies as an openly accessible software tool to model any new protocols, techniques, and algorithms for WLANs [14]. In this paper, we use the ns-3.28 version that was released in March 2018. The code has been developed by C++, and the scenario for network simulations can be written by Python. It has been developed as the simulation engine by many users in the study and research of wired and wireless LANs. Currently, ns-3 adopts the key feature of IEEE 802.11n/ac or others protocol such as Multiple-Input-Multiple-Output (MIMO), the channel bonding, long and short GI, and the MSDU or MPDU frame aggregation that can be useful to model and evaluate various algorithms for WLANs in 2.4 and 5 GHz. For performance evaluation, we consider two network scenarios by simulation: 1) Traffic created between a unique host and the AP to form WLAN and 2) traffic produced concurrently by many hosts with their associated APs. In the first scenario, a single host is associated and generated traffic with the AP, forming 802.11n WLAN. In this scenario, we investigate the effect of data throughput and transmission range with different MCSs (802.11n allows MCS-0 to MCS-31), link distance features by rate adaptation, doubling the bandwidth of 802.11n channels (802.11n agrees 20 MHz channel or 40 MHz bonded channel), the number of antennas proportional to the simultaneous data streams at both sides of the link (802.11n permits 1 × 1 to 4 × 4 antennas), the long or short GI, and the maximum size of the aggregated frame. In the second scenario, we consider an enterprise network scenario where multiple hosts are associated with an AP and concurrently generating traffic with it. Here, we examine the average throughput performance by increasing the numbers of active hosts that are concurrently 4 International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021 coding rate of 1/2, 2/3, 3/4, or 5/6 [3]. The GI is reduced by half (400ns) between OFDM
  • 5. communicating with their associated APs. In both scenarios, we estimate the throughput for every HT bit rate value as the main performance metric which is calculated using the flow monitor [22] as xpkt TimeFirstR - pkt TimeLastRx 8 * rxBytes  Throughpt (1) Where rxBytes is the total number of received packets, TimeLastRxPacket is the absolute time of the last received packet and TimeFirstRxPacket does the absolute time of the first received packet by flow monitor. 6. EVALUATION RESULTS FOR TRAFFIC PRODUCED BETWEEN A UNIQUE HOST AND AN AP In this portion, we show various simulation results when a unique host makes traffic with AP. 6.1. Average throughput and maximum range with various MCSs In the first simulation, we investigate the relationship between peak throughput and transmission range with different MCSs and various physical distances between the AP and a host. Table 1 shows the simulation parameters and Figure 1 demonstrates the simulation results. From Figure 1 it is observed that although the peak throughput rises with increasing the MCSs value, it decreases its communication range. This lower range with higher MCSs index values is expected because the higher MCSs require more signal-to-noise ratio (SNR) value so that the receiver can successfully understand them and signals pass through longer distances tend to become weak that offer inferior SNRs. Table 1. Parameters for transmission range simulation. Parameter Value Propagation Model constant position model mobility model log distance model remote station manager constant rate manager packet size UDP, 1472 bytes error rate model YansErrorRateModel # of spatial streams 1×1, 2×2 Tx power 16.0206 dBm Mode 40 0 20 40 60 80 100 120 0 20 40 60 80 100 120 Throughput (Mbps) Distance (m) HtMcs-0 HtMcs-1 HtMcs-2 HtMcs-3 HtMcs-4 HtMcs-5 HtMcs-6 HtMcs-7 120 180 240 300 roughput (Mbps) HtMcs-8 HtMcs-9 HtMcs-10 HtMcs-11 HtMcs-12 HtMcs-13 HtMcs-14 (a) Throughput for 1×1 SISO link 5 International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
  • 6. 0 20 40 Throu Distance (m) HtMcs-6 HtMcs-7 0 60 120 180 240 300 0 20 40 60 80 100 120 Throughput (Mbps) Distance (m) HtMcs-8 HtMcs-9 HtMcs-10 HtMcs-11 HtMcs-12 HtMcs-13 HtMcs-14 HtMcs-15 0 30 60 90 120 150 0 20 40 60 80 100 120 Throughput (Mbps) Distance (m) 20MHz 40MHz 40MHz+3dBm 40MHz+6dBm 40MHz+9dBm (b) Throughput for 2×2 MIMO link Figure 1. Maximum throughput and transmission range with MCSs. However, when the range is short enough higher MCS can provide higher throughput. Simulation results in Figure 1 also indicate that two end nodes can communicate at the maximum range of less than or equal to 110 m with the smallest throughput when lowest MCSs value is used. That is the communication at maximum throughput can occur when a host located near to an AP. 6.2. Average throughput result with aggregated frame size (A-MPDU) In the second simulation scenario, we examine the effects of the A-MPDU frame aggregation on the data throughput for various MCS (MCS-0 to MCS-15) value. Our purpose is to know how this implementation feature affects the throughput and their throughput performance under different aggregated frame sizes. The configuration parameters used for this simulation study are depicted in Table 2. Figure 2(a) and Figure 2(b) shows the average throughput estimation results with maximum A-MPDU frame size (64 kB) under different MCSs index when a single host is located at 1 m distance from the AP and generates traffic with it. It is observed from Figure 2(a) and Figure 2(b) that with the maximum A-MPDU frame, the throughput for 1×1 SISO and 2×2 MIMO link is significantly much higher than without A- MPDU aggregation. Because, with the A-MPDU much of the CSMA/CA access specific overhead can be reduced and therefore, in a unique transmission, we can easily transmit multiple frames. This effect can significantly improve throughput. It is also perceived from Figure 2(c) that the throughput of 1×1 SISO and 2×2 MIMO link improves as the aggregated frame size increases and the performance graph looks exponential. Table 2. Parameters for aggregation simulation. Parameter Value Propagation Model constant position model mobility model log distance model remote station manager constant rate manager packet size UDP, 1472 bytes error rate model YansErrorRateModel # of spatial streams 1×1, 2×2 max A-MPDU size (kB) 0, 4, 6, 7, 8, 10, 15, 20, 25, 30, 35, 40, 45, 50, 60, 64 Tx power 16.0206 dBm Mode 40 6 International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
  • 7. (a) MCS vs. throughput for 1×1 SISO link (b) MCS vs. throughput for 2×2 MIMO link (c) A-MPDU frame size vs. throughput Figure 2. Average throughput with frame aggregation 6.3. Average throughput result by doubling channel width In the third simulation, we investigate the relationships between the average throughput and channel width. Table 3 gives the parameters of simulation and Figure 3 does the simulation results. By doubling up the channel width, the average throughput also increases but this will reduce its transmission range. Because, if we move from 20 MHz to 40MHz, then we should also raise the power of the transmitter so that the packets can effectively coverer the same range. 7 International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
  • 8. Table 3. Parameters for channel width simulation. Parameter Value Propagation Model constant position model mobility model log distance model remote station manager constant rate manager data rate HtMcs 11 Packet size UDP, 1472 bytes error rate model YansErrorRateModel # of spatial streams 2×2 Mode 20/40 MHz, short GI Figure 3. Average throughput results with 20 MHz and 40MHz channel width This is reasonable since the 3dBm increase in transmit power is almost equivalent to doubling the power. 6.4. Average throughput result with the number of antennas or special streams In the 4th simulation scenario, we investigate the effects on throughput with the number of data streams concurrently send/receive packet under different MCSs value. This total amount of instantaneous data streams is restricted by the discrete number of antennas used at the sender and receiver side ranging from 1×1 to 4×4 streams. Table 4 shows the simulation parameters. Average throughput results with the number of special streams are shown in Figure 4. Table 4. Parameters for # of spatial streams simulation. Parameter Value propagation model constant position model mobility model log distance model remote station manager constant rate manager Packet size UDP, 1472 bytes error rate model YansErrorRateModel # of spatial streams 1 × 1, 2 × 2, 3 × 3, 4 × 4 Tx power 16:0206 dBm Mode 40MHz, 400ns 8 International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
  • 9. 0 100 200 300 400 500 600 0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 Throughput (Mbps) MCS (0 ~ 31) Theoretical Rate ns-3 simulation Figure 4. Average throughput with the number of spatial streams, and different MCSs. It is observed from Figure 4 that by using a 40 MHz bonded channel with a 1×1 spatial stream, we can achieve a maximum physical data rate of 120 Mbps with 800ns long GI and 133 Mbps with 400ns short GI. If more antennas are used, then the data rate of 451 Mbps is achieved by using one 40 MHz channel and 4×4 spatial streams. If no other microwave, Bluetooth, or WiFi signal propagation occurred in the vicinity then the data rate of the 802.11n network will be closer to the physical rate. Therefore, this MIMO feature can considerably raise the data throughput of 802.11n standard with growing the quantity of the committed spatial stream. We also compare this simulation results with the physical data rate. 6.5. Link distance and throughput features by rate adaptation algorithm In this fifth simulation scenario, we investigate the effects of throughput of a SISO link with the link distance. Figure 5 shows the throughput simulation results with the Ideal rate adaptation algorithm in ns-3 when we increase the link distance of a host from the AP with certain interims. First, we place a host at 1 m distance from the AP and then gradually change its physical distance up to 150m with a breakpoint of 5m. The simulation parameters are shown in Table 5. It can be perceived from Figure 5 that any throughput drops as we rise the physical distance between the AP and a host pair. This may happen because of the RSS also declines with the distance. This worse RSS value indicates that a host may get the poor SNR at this point and causes higher packet errors. To overcome these errors, the system slows down its transmission speed by lowering its MCSs. The throughput simulation results by ns-3 are stepwise on account of the variation of MCSs index value. We can also notice from Figure 5 that the ns-3 simulation results are very similar to the measurement one in [24]. Table 5. Parameters for rate adaptation simulation. Parameter Value propagation model constant position model mobility model log distance model remote station manager Ideal rate adaptation error rate model YansErrorRateModel # of spatial streams 1×1 Tx power 16:0206 dBm Mode 40MHz, 800ns 9 International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
  • 10. Figure 5. Average throughput with link distance. 7. EVALUATION RESULT FOR CONCURRENT COMMUNICATION BY MULTIPLE HOSTS Finally, in this sixth simulation scenario, we investigate the impact of the number of active hosts associated with all the active AP when multiple hosts simultaneously generate traffic with them. To perform this evaluation, we use an enterprise network model which is proposed by the 802.11ax study group [21]. We assume all APs use different channels and simulation is run with various offered loads by 4, 8, 16, 32, 48, and 64 hosts respectively. The configuration parameters used for this simulation study are shown in Table 6. Figure 6(a) shows the 50×50 enterprise network field where 4 APs and 64 hosts are uniformly distributed. In Figure 6(a), the circles represent the APs, and squares denote the host’s location in the field. Hosts association to each AP in the topology is selected by applying the nearest AP association algorithm. Figure 6 (c) shows the throughput results by simulation when multiple hosts offer traffic with their associated APs as in Figure 6 (b). It can be perceived from Figure 6(c) that the average throughput drops significantly as more active hosts or clients offer traffic to their associated APs in the network field. This means that the 4 hosts give 29% higher throughput than 64 active hosts. This is because with fewer active hosts, there is less competition for channel access and packet errors increase with increasing the number of concurrent communicating links which decreases the speed of their data transmission. Also, the transmission chances of near host and far host to the associated AP are not the same and the host with stronger RSS always dominates the channel. Table 6. Parameters for transmission range simulation. Parameter Value propagation model log distance model mobility model constant position model remote station manager Ideal rate adaptation error rate model YansErrorRateModel # of antennas 1×1 Tx power 16:0206 dBm Mode 40MHz, 800ns # of active hosts per AP 4, 16, 32, 48, 64 10 International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
  • 11. (a) Network topology with 4 APs and 64 hosts. (b) Hosts association by NAP association approach for 64 hosts with 4 APs. (c) # of hosts vs. average throughput per AP Figure 6. Simulation result for the number of active users increasing scenario. It can be perceived from Figure 6(c) that the average throughput drops significantly as more active hosts or clients offer traffic to their associated APs in the network field. This means that the 4 hosts give 29% higher throughput than 64 active hosts. This is because with fewer active 11 International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021Type your text
  • 12. hosts, there is less competition for channel access and packet errors increase with increasing the number of concurrent communicating links which decreases the speed of their data transmission. Also, the transmission chances of near host and far host to the associated AP are not the same and the host with stronger RSS always dominates the channel. 8. CONCLUSIONS This paper investigated the 802.11n WLANs key link features performance in ns-3 under various conditions for single-host communication between a host and an AP. Besides, performance evaluation for an enterprise scenario from the 802.11ax group was evaluated when there exists a concurrent packet transmission or reception that occurred by multiple hosts with their associated APs. To find hosts association to the APs for an enterprise network scenario, we apply the neighboring AP association approach. The simulation results show that the ns-3 support the link features for the IEEE 802.11n protocol with considerable accuracy and can provide satisfactory performance for an enterprise scenario in WLAN. Our future works include the continuous investigation of the 802.11n protocol in diverse network environments and usage of the model to the ideal design of WLANs. REFERENCES [1] M. S. Gast, “802.11 wireless networks”, 2nd ed., O’Reilly, 2005. [2] M. S. Gast, “802.11n: a survival guide”, 1st ed., O’Reilly, 2012. [3] S. Moghe, R. Upadhyay,“Comparison of SISO and MIMO techniques in 802.11n wireless local area network”, Proc. Int. Conf. Emer. Trend. Elec. Photo. Dev. & Syst. (ELECTRO-2009), pp. 245-246, 2009. [4] IEEE 802.11n, https://en.wikipedia.org/wiki/IEEE 802.11n-2009. [5] I. Syed and B. Roh, “Adaptive backoff algorithm for contention window for dense IEEE 802.11 WLANs”, Mobile Inf. Sys., 2016. [6] M. S. A. Mamun, N. Funabiki, K. S. Lwin, M. E. Islam, and W.-C. Kao, “A channel assignment extension of active access-point 6configuration algorithm for elastic WLAN system and its implementation using Raspberry Pi”, Int. J. Network. Comput., vol. 7, no. 2, pp. 248-270, 2017. [7] S. K. Debnath, N. Funabiki, M. Saha, M. S. A. Mamun, and W.-C. Kao, “MIMO host location optimization in active access-point configuration algorithm for elastic WLAN system”, Int. J. Space-Base. Sit. Comput., (IJSSC), vol. 8, no. 2, pp. 59-69, 2018. [8] K. S. Lwin, N. Funabiki, C. Taniguchi, K. K. Zaw, M. S. A. Mamun, M. Kuribayashi, and W.-C. Kao, “A minimax approach for access point setup optimization in IEEE 802.11n wireless networks”, Int. J. Network. Computing, vol. 7, no. 2, pp. 187-207, 2017. [9] S. K. Debnath and A.Z.M. T. Islam, “Analysis of Neighbor Knowledge Based Bcast Protocol Performance for Multi-hop Wireless Ad Hoc Networks”, Int. J. on AdHoc Netw. Systems (IJANS), ISSN: 2249 – 0175, Vol. 1, Issue 2, pp. 01-12, 2011. [10] M. Muhammad, A. G. Halilu, and S. M. Bunu, “Framework, Implementation and Algorithm for Asynchronous Power Saving of UWBMAC with Steerable Directional”, Int. J. on AdHoc Netw. Systems (IJANS), ISSN: 2249 – 0175, Vol. 9, Issue 3, pp. 1-11, 2019. [11] B. Mahma and A. Korichi,, “Simulation & VANET: Towards a New Reliable and Optimal Data Dissemination Model”, Int. J. on AdHoc Netw. Systems (IJANS), ISSN: 2249 – 0175, Vol.6, Issue 2, 2016. [12] N. Funabiki ed., “Wireless mesh networks”, InTech Open Access Pub., Jan. 2011, http://www.intechopen.com/ books/wireless-mesh-networks. [13] “The network simulator ns-2”, https://www.isi.edu/nsnam/ns/. 12 International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
  • 13. [14] “The network simulator ns-3”, http://www.nsnam.org. [15] QualNet, http://web.scalable-networks.com/ qualnet-network-simulator-software. [16] W. Jiang, “OPNET-based WLAN modeling and its performance Testing”, Chem. Eng. Trans., vol. 51, pp. 361-366, 2016. [17] N. S. Ravindranath, I. Singh, A. Prasad, and V. S. Rao, “Performance evaluation of IEEE 802.11ac and 802.11n using NS3,” Indian Journal of Science and Technology, vol. 9, no. 26, 2016. [18] S. K. Debnath, M. Saha, N. Funabiki, and W.-C. Kao, “A throughput estimation model for IEEE 802.11n MIMO link in wireless local-area networks”, Proc. Int. Conf. Comp. Commun. Syst. (ICCCS), pp. 327-331, 2018. [19] Z. K. Farej, and M. M. Jasim, “Performance evaluation of the IEEE 802.11n random topology WLAN with QoS application”, Int. J. Elec. and Comp. Eng., Vol. 10, no. 2, pp. 1924-1934, 2020. [20] P. Ludeña, J. Simó, K. Rohoden, and M. Morocho, “Performance Evaluation of Long-Distance 802.11n Networks”, In New Contributions in Information Systems and Technologies, pp. 1033- 1043, Springer, Cham, 2015. [21] A. Jonsson, D. A. kerman, and E. Fitzgerald, “Modeling, Implementation and Evaluation of IEEE 802.11ac in NS-3 for Enterprise Networks”, Proc. Wireless Days (WD), 2016. [22] I. Vermesan, A. Moldovan, T. Palade, and R. Colda, “Multi antenna STBC transmission technique evaluation under IEEE 802.11n conditions”, Proc. Int. Conf. Micro. Tech. (COMITE), pp. 51-54, 2010. [23] Flow monitor Model library-ns-3 https://www.nsnam.org/ docs/models/html/flow-monitor.html. [24] S. K. Debnath, N. Funabiki, P. K. Sarker, K. S. Lwin and M. Saha, “Throughput Estimation of SISO and MIMO Links under LOS and NLOS Conditions in IEEE 802.11n WLAN”, J. of Comp. Sci. and Eng. Research, (CSERJ), vol. 11, pp. 19-27, 2019. 13 International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021