For an efficient design of wireless local-area networks (WLANs), the simulation tools are important to accurately estimate the IEEE 802.11n/ac link features for WLANs. However, this true simulation of network behavior is critical in designing high-performance WLANs. Through testing, analysis, and modeling of the proposed scheme repetitively, the design of the WLAN can be enhanced with a small budget before making its practical implementation. Many network simulation tools have been established to give solutions for this request and ns-3 is the most widely used tools among them by the research industry as an open-source network simulator. In this paper, we examine the various link features of the 802.11n WLANs under several conditions. We investigate the effects of 802.11n WLAN modulation and coding schemes (MCSs), 20MHz single channel or 40 MHz bonded channel, guard intervals (GI), frame aggregation, data encoding, number of antennas and their data rate, and link distance features of 802.11n WLAN in ns-3 when only a unique host connects with the access point (AP) and generates data traffic. Besides, the performance for an enterprise scenario proposed by the IEEE 802.11ax study group is evaluated when several hosts are simultaneously creating traffic with their associated APs. The results demonstrate that ns-3 support most of the link features of the 802.11n protocol with significant accuracy.
INVESTIGATION OF BEAM FORMING EFFECTIVENESS IN IEEE802.11AC INDOOR WIRELESS L...cscpconf
The strong demand for large capacity transmission due to an unprecedented growth in data traffic requires an enhancement in the quality of service in the medium access control. This
quality delivery features strongly in the IEEE802.11ac standard. Here, we have performed empirical measurements of an 802.11ac system based on the beam forming technology. In this
work, an empirical analysis was conducted to determine the effectiveness of Beamforming Technology as depicts in the quality of service (QoS) enhancement in the newest wireless
technology deployed on IEEE802.11ac standard. The experimental outcomes revealed the quality of service (QoS) enhancement in IEEE802.11ac. Although the realized throughput in real application scenario fell below designed specification. Nevertheless there is a considerable
data throughput improvement on the counterpart 802.11n. There remain opportunities for further enhancements in beam-forming technology.
In this paper, we examine WiMAX – based network and evaluate the performance for quality of service (QoS) using an idea of IEEE 802.16 technology. In our models, the study used a multiprocessor architecture organized by the interconnection network. OPNET Modeler is used to simulate the architecture and to calculate the performance criteria (i.e. throughput, delay and data dropped) that
slightly concerned in network estimation. It is concluded that our models shorten the time quite a bit for
obtaining the performance measures of an end-to-end delay as well as throughput can be used as an
effective tool for this purpose.
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresEditor IJCATR
Ethernet a popular choice for metropolitan-area networks (MAN) due to simplicity, cost effectiveness and scalability. The
Spanning-Tree based switching mechanism, which is considered to be very efficient at avoiding switching loops in LAN environment,
is a performance bottleneck in Metro network context. Handling of link failure is an important issue in metro Ethernet networks. A
link failure may result in serious service disruptions. A local restoration method for metro Ethernet with multiple spanning trees, which
aims at fast handling of single link failures in a distributed manner, have been proposed in the literature. In this paper, we propose a
local restoration mechanism that uses MULTILINK algorithm for solving multiple link failures
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
INVESTIGATION OF BEAM FORMING EFFECTIVENESS IN IEEE802.11AC INDOOR WIRELESS L...cscpconf
The strong demand for large capacity transmission due to an unprecedented growth in data traffic requires an enhancement in the quality of service in the medium access control. This
quality delivery features strongly in the IEEE802.11ac standard. Here, we have performed empirical measurements of an 802.11ac system based on the beam forming technology. In this
work, an empirical analysis was conducted to determine the effectiveness of Beamforming Technology as depicts in the quality of service (QoS) enhancement in the newest wireless
technology deployed on IEEE802.11ac standard. The experimental outcomes revealed the quality of service (QoS) enhancement in IEEE802.11ac. Although the realized throughput in real application scenario fell below designed specification. Nevertheless there is a considerable
data throughput improvement on the counterpart 802.11n. There remain opportunities for further enhancements in beam-forming technology.
In this paper, we examine WiMAX – based network and evaluate the performance for quality of service (QoS) using an idea of IEEE 802.16 technology. In our models, the study used a multiprocessor architecture organized by the interconnection network. OPNET Modeler is used to simulate the architecture and to calculate the performance criteria (i.e. throughput, delay and data dropped) that
slightly concerned in network estimation. It is concluded that our models shorten the time quite a bit for
obtaining the performance measures of an end-to-end delay as well as throughput can be used as an
effective tool for this purpose.
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresEditor IJCATR
Ethernet a popular choice for metropolitan-area networks (MAN) due to simplicity, cost effectiveness and scalability. The
Spanning-Tree based switching mechanism, which is considered to be very efficient at avoiding switching loops in LAN environment,
is a performance bottleneck in Metro network context. Handling of link failure is an important issue in metro Ethernet networks. A
link failure may result in serious service disruptions. A local restoration method for metro Ethernet with multiple spanning trees, which
aims at fast handling of single link failures in a distributed manner, have been proposed in the literature. In this paper, we propose a
local restoration mechanism that uses MULTILINK algorithm for solving multiple link failures
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the
hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and
modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin,
CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated
throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms
basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on
network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput
in expense of average delay. The tradeoff relationships among the performance metrics are also observed
in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for
new NS-3 users to design and modify script and results greatly benefit the network design and
management.
Experimental analysis of channel interference in ad hoc networkijcsa
In recent times, the use of ad hoc networks is a common research area among a researcher. Designing an
efficient and reliable network is not easy task. Network engineer faces many problems at the time of
deploying a network such as interference; Signal coverage, proper location of access point etc. channel
interference in one of them which must be considered at the time of deploying WLAN indoor environments
because channel interference impacts the network throughput and degrade the network performance.
In this experiment, we design a two WLAN BSS1 and BSS2 and investigate the impact of interference on
nodes. BSS1 contains three FTP clients and BSS2 contains two FTP client and their jobs is to upload data
to FTP Server Initially, they are far from each other. BSS1 moves toward BSS2 and after some time at
particular position both BSSs overlaps to each other. When BSSs overlaps to each other interference is
high and decrease network performance and increase upload time.
International Refereed Journal of Engineering and Science (IRJES)irjes
The core of the vision IRJES is to disseminate new knowledge and technology for the benefit of all, ranging from academic research and professional communities to industry professionals in a range of topics in computer science and engineering. It also provides a place for high-caliber researchers, practitioners and PhD students to present ongoing research and development in these areas.
Ns 2 based simulation environment for performance evaluation of umts architec...Makhdoom Waseem Hashmi
Ns 2 based simulation environment for performance evaluation of umts architecture.
NS2, UMTS, 3G, EURANE, scheduling, architecture and umts simultation and NS2 simulation and EURANE SIMULATION
A NURBS-optimized dRRM solution in a mono-channel condition for IEEE 802.11 e...IJECEIAES
Dynamic Radio Resource Management, RRM, is an essential design block in the functional architecture of any Wifi controller in IEEE 802.11 indoor dense enterprise Wlans. In a mono-channel condition, it helps tackle co-channel interference problem and enrich end-to-end Wifi clients experience. In this work, we present our dRRM solution: WLCx, and demonstrate its performance over related-work and vendor approaches. Our solution is built on a novel and realistic per-Beam coverage representation approach. Unlike the other RRM solutions, WLCx is dynamic: even the calculation system parameters are processed. This processing comes at price in terms of processing time. To overcome this limitation, we constructed and implemented a NURBS surface-based optimization to our RRM solution. Our NURBS optimized WLCx, N-WLCx, solution achieves almost 92:58% time reduction in comparison with basic WLCx. Furthermore, our optimization could easily be extended to enhance others, vendors and research, RRM solutions.
This paper presents a comparative study of IEEE 802.11 a/b/g/n wireless LAN standards in an ELearning classroom network using adhoc networks as communication support. The evaluation is performed through a series of scenarios schematizing communication between students and practitioners in an educational context. The first objective is to plan the physical layer via the choice of the suitable transmission standard that satisfy the implementation specifications. Given the real-time traffic considered, a good traffic transmission must be ensured.
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
Abstract: Wireless sensor network (WSN) is used to collect and send various kinds of messages to a base station (BS). Wireless sensor nodes are deployed randomly and densely in a target region, especially where the physical environment is very harsh that the macro-sensor counterparts cannot be deployed. Low Energy Adaptive Clustering Hierarchical (LEACH) Routing protocol builds a process where it reduces the Packet Loss Rate from 100 % to 55% .Simulations are carried out using NS2 simulator.
COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...pijans
The escalating demand for swift and dependable wireless internet access has spurred the development of
various protocols within 802.11 WLANs. Among them, the 802.11ac protocols have gained widespread
acceptance over the past few years, offering enhanced data transfer rates compared to the 802.11n
standard. However, the persistent congestion of wireless IoT devices, particularly in densely populated
areas, remains a significant challenge. To tackle this issue, IEEE 802.11 has advanced IEEE 802.11ax as
the successor to 802.11ac, introducing critical enhancements at the PHY/MAC layers to improve
throughput in dense scenarios. Additionally, modelling and simulating these protocols are vital for WLAN
researchers and designers to anticipate link characteristics effectively, fostering high-performance WLAN
design. The need for such tools led to the creation of diverse network simulation programs, and NS-2 is
widely accepted as an open-source program that has achieved remarkable success in research. In this
paper, we focus on various connection properties of 802.11ax WLANs through NS-3 simulations, including
MCSs, bonded channels, GI, data encoding, antennas, data rates, link distance, Tx/Rx power, gain, and
payload size. We also compare their performance against 802.11ac, which demonstrates that NS-3
accurately supports most 802.11ax capabilities and outperforms 802.11ac in various scenarios.
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparisonpijans
The widespread adoption of IEEE 802.11 WLANs is attributed to their inherent mobility, flexibility, and
cost-effectiveness. Within the IEEE 802 working group, a dedicated task group is diligently advancing
WLAN technologies, particularly tailored for dense network scenarios. Amidst these advancements, the
802.11ac protocols have emerged as a preferred choice, delivering superior data transfer rates compared
to the preceding 802.11n standard. Significantly, the sixth-generation wireless protocol, IEEE 802.11ax,
has been introduced, showcasing enhanced performance capabilities that outpace its fifth-generation
predecessor, 802.11ac.In this pioneering investigation, we engage in an in-depth simulation-based scrutiny
of prominentWLAN protocols—namely, IEEE 802.11n, IEEE 802.11ac, and the cutting-edge IEEE
802.11ax. Our exhaustive analyses traverse a spectrum of critical metrics, encompassing throughput,
coverage, spectral efficiency, Tx/Rx gain, and Tx/Rx power.In a single-user and SISO scenario, both
802.11ac and 802.11ax outperform 802.11n. Significantly, 802.11ax surpasses the previous 802.11n/ac
standards, highlighting substantial advancements in wireless performance.
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the
hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and
modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin,
CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated
throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms
basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on
network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput
in expense of average delay. The tradeoff relationships among the performance metrics are also observed
in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for
new NS-3 users to design and modify script and results greatly benefit the network design and
management.
Experimental analysis of channel interference in ad hoc networkijcsa
In recent times, the use of ad hoc networks is a common research area among a researcher. Designing an
efficient and reliable network is not easy task. Network engineer faces many problems at the time of
deploying a network such as interference; Signal coverage, proper location of access point etc. channel
interference in one of them which must be considered at the time of deploying WLAN indoor environments
because channel interference impacts the network throughput and degrade the network performance.
In this experiment, we design a two WLAN BSS1 and BSS2 and investigate the impact of interference on
nodes. BSS1 contains three FTP clients and BSS2 contains two FTP client and their jobs is to upload data
to FTP Server Initially, they are far from each other. BSS1 moves toward BSS2 and after some time at
particular position both BSSs overlaps to each other. When BSSs overlaps to each other interference is
high and decrease network performance and increase upload time.
International Refereed Journal of Engineering and Science (IRJES)irjes
The core of the vision IRJES is to disseminate new knowledge and technology for the benefit of all, ranging from academic research and professional communities to industry professionals in a range of topics in computer science and engineering. It also provides a place for high-caliber researchers, practitioners and PhD students to present ongoing research and development in these areas.
Ns 2 based simulation environment for performance evaluation of umts architec...Makhdoom Waseem Hashmi
Ns 2 based simulation environment for performance evaluation of umts architecture.
NS2, UMTS, 3G, EURANE, scheduling, architecture and umts simultation and NS2 simulation and EURANE SIMULATION
A NURBS-optimized dRRM solution in a mono-channel condition for IEEE 802.11 e...IJECEIAES
Dynamic Radio Resource Management, RRM, is an essential design block in the functional architecture of any Wifi controller in IEEE 802.11 indoor dense enterprise Wlans. In a mono-channel condition, it helps tackle co-channel interference problem and enrich end-to-end Wifi clients experience. In this work, we present our dRRM solution: WLCx, and demonstrate its performance over related-work and vendor approaches. Our solution is built on a novel and realistic per-Beam coverage representation approach. Unlike the other RRM solutions, WLCx is dynamic: even the calculation system parameters are processed. This processing comes at price in terms of processing time. To overcome this limitation, we constructed and implemented a NURBS surface-based optimization to our RRM solution. Our NURBS optimized WLCx, N-WLCx, solution achieves almost 92:58% time reduction in comparison with basic WLCx. Furthermore, our optimization could easily be extended to enhance others, vendors and research, RRM solutions.
This paper presents a comparative study of IEEE 802.11 a/b/g/n wireless LAN standards in an ELearning classroom network using adhoc networks as communication support. The evaluation is performed through a series of scenarios schematizing communication between students and practitioners in an educational context. The first objective is to plan the physical layer via the choice of the suitable transmission standard that satisfy the implementation specifications. Given the real-time traffic considered, a good traffic transmission must be ensured.
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
Abstract: Wireless sensor network (WSN) is used to collect and send various kinds of messages to a base station (BS). Wireless sensor nodes are deployed randomly and densely in a target region, especially where the physical environment is very harsh that the macro-sensor counterparts cannot be deployed. Low Energy Adaptive Clustering Hierarchical (LEACH) Routing protocol builds a process where it reduces the Packet Loss Rate from 100 % to 55% .Simulations are carried out using NS2 simulator.
COMPARATIVE PERFORMANCE ANALYSIS OF THE IEEE802.11AX AND 802.11AC MIMOLINK FO...pijans
The escalating demand for swift and dependable wireless internet access has spurred the development of
various protocols within 802.11 WLANs. Among them, the 802.11ac protocols have gained widespread
acceptance over the past few years, offering enhanced data transfer rates compared to the 802.11n
standard. However, the persistent congestion of wireless IoT devices, particularly in densely populated
areas, remains a significant challenge. To tackle this issue, IEEE 802.11 has advanced IEEE 802.11ax as
the successor to 802.11ac, introducing critical enhancements at the PHY/MAC layers to improve
throughput in dense scenarios. Additionally, modelling and simulating these protocols are vital for WLAN
researchers and designers to anticipate link characteristics effectively, fostering high-performance WLAN
design. The need for such tools led to the creation of diverse network simulation programs, and NS-2 is
widely accepted as an open-source program that has achieved remarkable success in research. In this
paper, we focus on various connection properties of 802.11ax WLANs through NS-3 simulations, including
MCSs, bonded channels, GI, data encoding, antennas, data rates, link distance, Tx/Rx power, gain, and
payload size. We also compare their performance against 802.11ac, which demonstrates that NS-3
accurately supports most 802.11ax capabilities and outperforms 802.11ac in various scenarios.
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparisonpijans
The widespread adoption of IEEE 802.11 WLANs is attributed to their inherent mobility, flexibility, and
cost-effectiveness. Within the IEEE 802 working group, a dedicated task group is diligently advancing
WLAN technologies, particularly tailored for dense network scenarios. Amidst these advancements, the
802.11ac protocols have emerged as a preferred choice, delivering superior data transfer rates compared
to the preceding 802.11n standard. Significantly, the sixth-generation wireless protocol, IEEE 802.11ax,
has been introduced, showcasing enhanced performance capabilities that outpace its fifth-generation
predecessor, 802.11ac.In this pioneering investigation, we engage in an in-depth simulation-based scrutiny
of prominentWLAN protocols—namely, IEEE 802.11n, IEEE 802.11ac, and the cutting-edge IEEE
802.11ax. Our exhaustive analyses traverse a spectrum of critical metrics, encompassing throughput,
coverage, spectral efficiency, Tx/Rx gain, and Tx/Rx power.In a single-user and SISO scenario, both
802.11ac and 802.11ax outperform 802.11n. Significantly, 802.11ax surpasses the previous 802.11n/ac
standards, highlighting substantial advancements in wireless performance.
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...IJECEIAES
The IEEE 802.11n supports high data rate transmissions due its physical layer Multiple Input Multiple Output (MIMO) advanced antenna system and MAC layer enhancement features (frame aggregation and block acknowledgement). As a result this standard is very suitable for multimedia services through its Enhanced Distributed Channel Access (EDCA). This paper focuses on evaluating the Quality of Service (QoS) application on the performance of the IEEE 802.11n random topology WLAN. Three different number of nodes (3, 9 and 18) random topology with one access point are modeled and simulated by using the Riverbed OPNET 17.5 Modular to investigate the Wireless Local Area Network (WLAN) performance for different spatial streams. The result clarified the impact of QoS application and showed that its effect is best at the 18 node number topology. For a 4x4 MIMO, when QoS is applied and with respect to the no QoS application case, simulation results show a maximum improvement of 86.4%, 33.9%, 52.2% and 68.9% for throughput, delay, data drop and retransmission attempts, respectively.
Opnet based simulation and investigation of wimax network using different qo seSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Performance analysis of voip traffic over integrating wireless lan and wan us...ijwmn
A simulation model is presented to analyze and evaluate the performance of VoIP based integrated
wireless LAN/WAN with taking into account various voice encoding schemes. The network model was
simulated using OPNET Modeler software. Different parameters that indicate the QoS like MOS, jitter,
end to end delay, traffic send and traffic received are calculated and analyzed in Wireless LAN/WAN
scenarios. Depending on this evaluation, Selection codecs G.729A consider the best choice for VoIP.
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
In IEEE 802.11 based wireless mesh network (WMN), a mesh client often finds multiple access points (AP) to associate with. How to select the best AP is the open research problem. The traditional AP selection method defined by IEEE 802.11 standard is based on received signal strength. This method is proven inefficient as it does not consider many important factors such as channel conditions, AP load, etc. Many alternate solutions have been proposed so far in the literature, but they are all focused on wireless local area network (WLAN) environment. As there are significant differences between WLAN and WMN, all these proposed association mechanisms must be redesigned to fit into WMN environment. This paper studies the AP selection problem in the context of WMN. We critically analyze the existing work and identify technical challenges involved in AP selection problem. This paper also provides directions to design the metrics of AP selection method in WMN.
Performance analysis of 802.11ac with frame aggregation using NS3 IJECEIAES
802.11ac is an interesting standard of IEEE bringing multiple advantages than its predecessor 802.11n. 802.11ac is faster and more scalable version of 802.11n offering the capabilities of wireless Gigabit Ethernet. 802.11ac will enable access points (AP) to support more STAs with a better experience for clients and more channel bonding increasing from a maximum of 40 MHz with 802.11n up to 80 or 160 MHz with 802.11ac standard. In this paper, we analyze and evaluate the 802.11ac performance using NS3 simulator (v3.26) relying on several features like channel bonding, modulation and coding schemes, guard interval and frame aggregation. Then, we presentthe effect of the variation of d istance between STAs and AP on the network performance in term of throughput. Finally, we capture the most relevant simulations outcomes and we indicate some research challenges for the future work.
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
Relay technology promises appreciable network throughput and coverage enhancement which is required
for high speed wireless cellular systems to function to their optimum. This paper is focused on analysing
the link performance of a relay-based WiMAX network under varying conditions. Comparison is made
between relay and direct link communication in terms of BER (Bit Error Rate), spectral efficiency and
capacity. Effect of multipath fading and user speed on performance are investigated as well. The entire
study involves a hypothetical view as well as MATLAB simulations to predict the benefit of relay
deployment. This is aimed at solving pertinent issues such as coverage holes and cell edge problems which
are associated with traditional non-relay based cellular networks.
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
Relay technology promises appreciable network throughput and coverage enhancement which is required
for high speed wireless cellular systems to function to their optimum. This paper is focused on analysing
the link performance of a relay-based WiMAX network under varying conditions. Comparison is made
between relay and direct link communication in terms of BER (Bit Error Rate), spectral efficiency and
capacity. Effect of multipath fading and user speed on performance are investigated as well. The entire
study involves a hypothetical view as well as MATLAB simulations to predict the benefit of relay
deployment. This is aimed at solving pertinent issues such as coverage holes and cell edge problems which
are associated with traditional non-relay based cellular networks
A novel approach to develop a reliable routing protocol for wireless mesh net...eSAT Journals
Abstract Wireless mesh networks (WMNs) have emerged as a flexible and low-cost network infrastructure, where heterogeneous mesh routers managed by different users collaborate to extend the network coverage. IEEE 802.11s standard was defined as a wireless mesh network which extends IEEE 802.11 MAC standard. The protocols introduced by IEEE 802.11s draft are divided into Proactive, Reactive or Hybrid categories. This paper aims to improve the routing process of HWMP: Hybrid Wireless Mesh Protocol defined by IEEE 802.11s standard by interworking 802.11s network with LTE network. Also, it aims to make the protocol more reliable by providing the QoS to the network. The pre-defined path selection metric is also enhanced to get more accurate information about the path quality. The proposed contribution aims to provide better performance to the 802.11s-LTE network and enhances the network with delay-aware routing. A simulation study will be conducted under NS-3 to observe the impact of the proposed protocol in offloading mechanism. Finally, the performance of overall contribution is compared to HWMP. Keywords: Delay-aware routing, HWMP, IEEE 802.11s, Interworking, LTE, Multi-path routing, nALM metric, QoS and Wireless mesh networks.
The relay stations are widely used in major wireless technologies such as WiMAX (Worldwide Interoperability for Microwave Access) and LTE (Long term evolution) which provide cost effective service to the operators and end users. It is quite challenging to provide guaranteed Quality of Service (QoS) in WiMAX networks in cost effective manner.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance Under Single Host and Concurrent Communication (20)
An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...pijans
On-going revolution in ever-improving wireless communication enforces the necessity of a self configuring,
rapidly deployable and infrastructure less network. MANET is such an autonomous wireless network that
meets the requirements. At the same time MANET’s random behavior and absence of any central
intelligence to gather unambiguous knowledge about user contexts complexes QoS maintenance and
hampers proper utilization of network resources resulting into unnecessary handovers. In past, few policy
driven handover approaches have been proposed for MANET but none of them explores a comprehensive
policy design. Therefore in this paper we propose an adaptive and optimized policy based handover
mechanism which is based on explicitly designed policies like load balancing, service discovery and next
hop selection .Efficient procedures for these policies are also explored .This work predicts the high time of
handover need on the basis of application specific needs of individual freely roaming mobile nodes,
avoiding unnecessary handovers and provides efficient handover procedure with optimized resource
consumption, reduced latency and interruption time.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
As-Puma : Anycast Semantics In Parking Using Metaheuristic Approachpijans
The number of vehicle used in the world are increasing day by day resulting in the obvious problem of
parking of these vehicle’s in residential and vocational areas. We perceive the problem of vehicles parking
in vocational establishments / malls. Today majority of parking systems are manual parking systems where
in, on the spot, parking of the vehicle is done and a parking slip is generated and handed over to customer.
This is cumbersome technique wherein various parking attendants in the parking areas manually keeps on
informing the Parking inspector on how many free parking slots available so that only that many number of
parking slips/tickets are generated as the number of free parking slots. We address the problem of parking
in Delay Tolerant Network (DTN) by proposing metaheuristic driven approach of Ant Colony optimization
(ACO) technique with anycast semantics models . Here we propose the parking architecture to solve the
problem of parking especially in commercial areas with their design diagrams . In this architecture we
apply the delivery model to deliver the packet correctly to the intended receiver. Using this we can book
various parking’s through remote areas so that the customer can get the information about availability of
various parking’s inside an area and the parking fare for each category of the automobile. Using this
architecture the customer can get the prior knowledge about various vacant parking slots inside a parking
area and he can book the corresponding parking from his location.
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...pijans
Mobile Adhoc Networks is a wireless network and it has become an important technology in current years
in which security has become an important problem. Black hole Attack is one of the promising and severe
security attacks in mobile ad hoc networks which block the communication of secret data during packet
delivery. Black hole attack directly attacks the node’s data traffic on the path and with intent drops, alters
or delays the data traffic passing through that node. In other type of black hole attack which misleadingly
replies for the route request which comes from the node which initiates the route discovery process that it
has as much as necessary routes to the destination even it does not have path to the destination. This paper
deals with prevention of black hole attacks using Shamir’s secret sharing and Random Multipath Routing
Algorithm
Performance Analysis of Mtpr Routing Protocol in Power Deficient Nodepijans
Power conservation in Mobile Ad hoc Network (MANET) is a major challenge even today for researchers.
To conserve it various power aware routing protocols have been proposed. These protocols do not take into
consideration the residual power left in nodes. To find the impact of the same a simulator was designed in
MATLAB-7.01. The routing protocol used in our simulation is Minimum Total Power Routing (MTPR) and
different performance metrics such as path optimality, throughput and hop count were recorded in
presence and absence of power scarce node. The result shows significant impact of power scarce node on
MANET performance.
Path Duration Analysis in Vehicular Ad Hoc Networkpijans
In Vehicular Ad hoc Networks (VANETs) the mobility of the nodes is the main concern. This mobility of
nodes makes the route unstable and unreliable for the information exchange and communication between
two nodes in the network. To enhance the performance and throughput of the VANETs, routes between
nodes must be reliable and stable. In this paper, we study the significance of path duration and link
duration in Vehicular Ad hoc Networks (VANETs). Because of this mobility, connectivity graphs changes
very frequently and it affects the performance of VANETs. Therefore, path duration can be used to predict
the behaviour of the mobile nodes in the network. Estimation of the path duration in VANETs can be a key
factor to improve the performance of the routing protocol. Estimation of path duration is a challenging task
to perform as it depends on many parameters including node density, transmission range, numbers of hops,
and velocity of nodes. This paper will provide a comprehensive study for estimating the path duration in
VANETs.
Study of Various Schemes for Link Recovery in Wireless Mesh Networkpijans
As there is a growing need for the cost effective and highly dynamic large-bandwidth networks over large
coverage area , the Wireless Mesh Network provide first step towards effective communication. A Wireless
Mesh Network is one of the most advanced wireless network used for communication. During their
operating period , the wireless mesh network may suffer from frequent link failure which results in poor
performance of network. Link failure detection plays crucial role in performance of WMN. The proposed
paper presents the review of various techniques used for detection of link failure and the techniques used
for recovery of wireless mesh network.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
This document is Intended for the purpose of Enabling the power of social media to Empower Ridesharing.
this entails the creation of an ad-ridesharing Initiative with a view to tackling real-world problems such as
traffic congestion and the ever-increasing fuel prices. The main objectives include creating applications,
both web and mobile based, to seamlessly integrate the app’s functionality into and everyday user’s
routine.
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...pijans
Power Control in Mobile Ad Hoc networks is a critical issue, since nodes are powered by batteries.The
main idea of power control schemes is to use different power levels for RTS/CTS and DATA/ACK. These
schemes may degrade network throughput and reduce energy efficiency of the network. In this paper we
have evaluated the performance of Improved Autonomous Power Control MAC Protocol (IAPCMP),that
allows nodes to dynamically adjust power levels for transmission of DATA/ACK according to the distance
between the transmitter and its neighbors.In IAPCMP power level for transmission of RTS/CTS is also
adjustable. This also used maximum power level for transmitting DATA/ACK periodically to make
neighboring nodes aware about ongoing transmission. The performance of IAPCMP is evaluated through
the metrics namely, packet delivery ratio and rate of energy efficiency.The simulation results show
significant improvement in protocol.
A Survey of Using Directional Antennas in Ad Hoc Networkspijans
In this paper, we present a comprehensive overview on Ad hoc networking by directional antennas. Use of
Directional antennas can largely reduce the interference, increase the spatial reuse and due to their longer
range we can have routes with fewer hop for two distant nodes. However the main problem of using
directional antennas in Ad hoc networks is due to the dynamic nature of the network. Neighbour discovery,
maintenance the track of moving neighbours, exploitation of the benefit of long range and directional MAC
protocols are the most challenging issues. We present three Directional MAC protocols and two
combinational protocols and system which give solutions to MAC and Neighbour discovery and compare
the throughput of them with 802.11 with omnidirectional antennas.
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
Mobile Ad-hoc Networks (MANETS) consists of a collection of mobile nodes without having a central
coordination. In MANET, node mobility and dynamic topology play an important role in the performance.
MANET provide a solution for network connection at anywhere and at any time. The major features of
MANET are quick set up, self organization and self maintenance. Routing is a major challenge in MANET
due to it’s dynamic topology and high mobility. Several routing algorithms have been developed for
routing. This paper studies the AODV protocol and how AODV is performed under multiple connections in
the network. Several issues have been identified. The bandwidth is recognized as the prominent factor
reducing the performance of the network. This paper gives an improvement of normal AODV for
simultaneous multiple connections under the consideration of bandwidth of node.
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...pijans
Personal Communication Network (PCN) is an emerging wireless network that promises many new
services for the telecommunication industry. The proliferation of demands for extending wireless services
to integrated services, which supports the transmission of data and multimedia information, has resulted in
the need for broadband wireless systems that are able to provide service capabilities similar to those of
wire line networks. The ATM cell - relay paradigm is one possible approach to provide broadband wireless
transmission with PCN’s using the ATM switching networks for interconnection of PCN cells. As traffic in
these mobile cellular networks increases, Handoffs will become an increasingly important issue. As cell
sizes shrink to accommodate an increasingly large demand of services, newer more efficient handoff
schemes need to be used. In this paper, the authors describe the use of novel and efficient data structure
which dynamically allocates guard channel for handoffs and introduces the concept of channel borrowing
strategy. The proposed scheme allocates the guard channels for handoff requests dynamically, based on the
traffic load for certain time period. A new originating call in the cell coverage area also uses these guard
channels if they are unused. Our basic idea is to allow Guard channels to be shared between new calls and
handoff calls. This approach maximizes the channel utilization. The simulation results prove that the
channel borrowing scheme improves the overall throughput.
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
This article presents a probabilistic modeling method utilizing smart meter data and an innovative agentbased simulator for electric vehicles (EVs). The aim is to assess the effects of different cost-driven EV charging strategies on the power distribution network (PDN). We investigate the effects of a 40% EV adoption on three parts of Frederiksberg's low voltage distribution network (LVDN), a densely urbanized municipality in Denmark. Our findings indicate that cable and transformer overloading especially pose a challenge. However, the impact of EVs varies significantly between each LVDN area and charging scenario. Across scenarios and LVDNs, the share of cables facing congestion ranges between 5% and 60%. It is also revealed that time-of-use (ToU)-based and single-day cost-minimized charging could be beneficial for LVDNs with moderate EV adoption rates. In contrast, multiple-day optimization will likely lead to severe congestion, as such strategies concentrate demand on a single day that would otherwise be distributed over several days, thus raising concerns about how to prevent it. The broader implications of our research suggest that, despite initial worries primarily centered on congestion due to unregulated charging during peak hours, a transition to cost-based smart charging, propelled by an increasing awareness of time-dependent electricity prices, may lead to a significant rise in charging synchronization, bringing about undesirable consequences for the power distribution network (PDN).
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
This article presents a probabilistic modeling method utilizing smart meter data and an innovative agentbased simulator for electric vehicles (EVs). The aim is to assess the effects of different cost-driven EV
charging strategies on the power distribution network (PDN). We investigate the effects of a 40% EV
adoption on three parts of Frederiksberg's low voltage distribution network (LVDN), a densely urbanized
municipality in Denmark. Our findings indicate that cable and transformer overloading especially pose a
challenge. However, the impact of EVs varies significantly between each LVDN area and charging
scenario. Across scenarios and LVDNs, the share of cables facing congestion ranges between 5% and
60%. It is also revealed that time-of-use (ToU)-based and single-day cost-minimized charging could be
beneficial for LVDNs with moderate EV adoption rates. In contrast, multiple-day optimization will likely
lead to severe congestion, as such strategies concentrate demand on a single day that would otherwise be
distributed over several days, thus raising concerns about how to prevent it. The broader implications of
our research suggest that, despite initial worries primarily centered on congestion due to unregulated
charging during peak hours, a transition to cost-based smart charging, propelled by an increasing
awareness of time-dependent electricity prices, may lead to a significant rise in charging synchronization,
bringing about undesirable consequences for the power distribution network (PDN).
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
In this paper, a multilayer perceptron guided key generation for encryption/decryption (MLPKG) has been
proposed through recursive replacement using mutated character code generation for wireless
communication of data/information. Multilayer perceptron transmitting systems at both ends accept an
identical input vector, generate an output bit and the network are trained based on the output bit which is
used to form a protected variable length secret-key. For each session, different hidden layer of multilayer
neural network is selected randomly and weights or hidden units of this selected hidden layer help to form
a secret session key. The plain text is encrypted using mutated character code table. Intermediate cipher
text is yet again encrypted through recursive replacement technique to from next intermediate encrypted
text which is again encrypted to form the final cipher text through chaining , cascaded xoring of multilayer
perceptron generated session key. If size of the final block of intermediate cipher text is less than the size of
the key then this block is kept unaltered. Receiver will use identical multilayer perceptron generated
session key for performing deciphering process for getting the recursive replacement encrypted cipher text
and then mutated character code table is used for decoding. Parametric tests have been done and results
are compared in terms of Chi-Square test, response time in transmission with some existing classical
techniques, which shows comparable results for the proposed technique.
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
Securing Mobile Ad hoc Networks: Key Management and Routingpijans
Secure communication between two nodes in a network depends on reliable key management systems that generate and distribute keys between communicating nodes and a secure routing protocol that establishes a route between them. But due to lack of central server and infrastructure in Mobile Ad hoc Networks (MANETs), this is major problem to manage the keys in the network. Dynamically changes in network’s topology causes weak trust relationship among the nodes in the network. . In MANETs a mobile node operates as not only end terminal but also as an intermediate router. Therefore, a multi-hop scenario occurs for communication in MANETs; where there may be one or more malicious nodes in between source and destination. A routing protocol is said to be secure that detects the detrimental effects of malicious node(s in the path from source to destination). In this paper, we proposed a key management scheme and a secure routing protocol that secures on demand routing protocol such as DSR and AODV. We assume that MANETs is divided into groups having a group leader in each group. Group leader has responsibility of key management in its group. Proposed key management scheme is a decentralized scheme that does not require any Trusted Third Party (TTP) for key management. In proposed key management system, both a new node and group leader authenticates each other mutually before joining the network. While proposed secure routing protocol allows both communicating parties as well as intermediate nodes to authenticate other nodes and maintains message integrity.
MANET (Mobile Ad-hoc Network) is hot spot for research due to its various advantages and
disadvantages. Providing safe communication between mobile nodes, recognization the position of
nodes, reducing overhead, handling misbehavior and location updates are such a difficult issues in
ad-hoc network, so providing trust schemes is an important in this network. MANET provides some
basic functions like routing, communication, network management and packet forwarding etc over
self organized network. Because MANET has not a fixed topology, in which mobile nodes comes and
leaves the network within a random period of time. It effects energy, bandwidth and memory
computations of network. Providing trust in MANET is such a crucial task because it doesn’t having
centralized infrastructure. In this paper, we survey the different trust model schemes of MANET with
their unique features, merits and demerits & findings.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
How libraries can support authors with open access requirements for UKRI fund...
Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance Under Single Host and Concurrent Communication
1. INVESTIGATION AND EVALUATION OF IEEE
802.11N WLANS LINK FEATURES PERFORMANCE
UNDER SINGLE HOST AND CONCURRENT
COMMUNICATION
Sumon Kumar Debnath1
Prodip Kumar Sarker2
, Md. Manowarul Islam3
, and
Ileas Pramanik2
1
Department of Electrical and Electronic Eng., Begum Rokeya University, Bangladesh
2
Department of Computer Science and Eng., Begum Rokeya University, Bangladesh
3
Department of Computer Science and Eng., Jagannath University, Bangladesh
ABSTRACT
For an efficient design of wireless local-area networks (WLANs), the simulation tools are important to
accurately estimate the IEEE 802.11n/ac link features for WLANs. However, this true simulation of
network behavior is critical in designing high-performance WLANs. Through testing, analysis, and
modeling of the proposed scheme repetitively, the design of the WLAN can be enhanced with a small
budget before making its practical implementation. Many network simulation tools have been established
to give solutions for this request and ns-3 is the most widely used tools among them by the research
industry as an open-source network simulator. In this paper, we examine the various link features of the
802.11n WLANs under several conditions. We investigate the effects of 802.11n WLAN modulation and
coding schemes (MCSs), 20MHz single channel or 40 MHz bonded channel, guard intervals (GI), frame
aggregation, data encoding, number of antennas and their data rate, and link distance features of
802.11n WLAN in ns-3 when only a unique host connects with the access point (AP) and generates data
traffic. Besides, the performance for an enterprise scenario proposed by the IEEE 802.11ax study group
is evaluated when several hosts are simultaneously creating traffic with their associated APs. The results
demonstrate that ns-3 support most of the link features of the 802.11n protocol with significant accuracy.
KEYWORDS
IEEE 802.11n, MIMO, SISO, neighboring access-point association, Algorithm, ns-3 simulator.
1. INTRODUCTION
Currently, the IEEE 802.11n/ac WiFi standard has commonly installed on most customer
devices like a variety of laptop PCs, smartphones, tablets, and access points (APs) due to their
small price, flexible and high-performance Internet accessed services [1] [2]. Among them, the
IEEE 802.11n is the most commonly used protocol in wireless local-area networks (WLANs). It
approves several new technologies such as the number of antennas employed in Multiple Input
Multiple Output (MIMO) devices, the 40MHz bonded channel, the aggregation of the frame,
and the block acknowledgment mechanism that can increase the data transmission capacity up
to 600Mbps [3] [4]. Thus, the IEEE 802.11n protocol should be focused on.
In WLAN, a host normally uses a laptop/desktop PC, or a mobile device that can generate
traffic by single-host communication or multiple-hosts concurrent communication with the AP
at a time. In the scenario of concurrent traffic, multiple hosts send data simultaneously with one
AP. During concurrent communication, the rate of packet collision increases with the amount of
1
DOI: 10.5121/ijans.2021.11101
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
2. communicating hosts per AP and that makes throughput drops significantly [5]. In this case, a
host which is adjacent to the AP might have higher data transmission possibility than the remote
hosts.
In many cases, the WLAN researchers and engineers should need to test the link features of
802.11n protocols, hardware, and scenarios through simulation studies before implementing
them in a practical environment. This accurate simulation of link features of IEEE 802.11n is a
very critical matter in developing an innovative model or algorithms for WLAN [6] [7] [8],
mobile ad-hoc network (MANET) [9] [10] or vehicular ad-hoc networks (VANET) [11]. Using
repetitive modeling, and simulation of any proposed algorithm through network simulator, the
IEEE 802.11n WLANs system design can be enhanced cost-effectively before its physical
deployment in real environments. Several network simulators have been proposed to give their
solutions. They include WIMNET simulator [12], ns-2 [13], ns-3 [14], QualNet [15], and
OPNET [16]. Among them, ns-3 has been widely used in academic societies to evaluate new
protocols and techniques for WLANs as a realistic non-proprietary software platform.
Therefore, it is significant to study the various link features of the 802.11n protocol through ns-
3 simulations and evaluate their performance accuracy under different operating conditions.
In this paper, we evaluate the performance of various link features of 802.11n WLANs using ns-
3 simulation. We investigate different key features such as the throughput and maximum
feasible range with modulation coding schemes (MCSs), frame aggregation, long/short GI,
channel bonding, link distance performance, and the impact of the number of antennas in Single
Input Single Output (SISO) or MIMO links and their data rate through ns-3 simulation when
considering only one host is sending to or receiving packets from one AP. We also evaluate the
effect of concurrent communication by multiple hosts per AP in an enterprise network scenario.
We organize the rest of the paper as follows: Section 2 inspects some related works relevant to
our research. Section 3 reviews the 802.11n WLANs protocol and its link features. Section 4
briefly mentions the procedure of the neighboring AP association approach used for finding
hosts association for an enterprise network. Section 5 shows an overview of the simulation
environment for performance evaluation. Section 6 and section 7 explores the performance
evaluation results by simulation. Lastly, Section 8 concludes the paper with some future
recommendations.
2. RELATED WORKS
Currently, numerous research activities are carried out in literature to examine various
performance issues of 802.11n/ac protocol for WLANs through simulation. In this section, we
concisely review some related previous works relevant to our paper.
In [17], the authors evaluate the comparative performance features of the 802.11ac WLAN
relative to 802.11n protocol using ns-3.24.1 by considering several links features like channel
bonding(20/40MHz channel in 802.11n and 20/40/80/160MHz channel in 802.11ac), guard
intervals (long/short) and MCSs (MCS-0 ~ MCS-7/MCS-9) while evaluating HT/VHT
throughput, jitters, and delay. In the simulation, they did not evaluate all link features of the
protocol such as SU-MIMO and MU-MIMO link features, the influence of frame aggregation,
rate adaptation WiFi manager, and channel interference effects. Besides, they assume only a
single client/host communication scenario with the Access Point (AP) through ns-3 simulation.
But in a real network environment, concurrent traffic generation by multiple hosts with an AP
may have different performance features which should be analyzed through ns-3 simulation.
In [18], the throughput estimation model for the 802.11n MIMO link in WLANs is investigated
by considering a single-host and multiple-hosts communications scenario with an AP. They
2
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
3. verified their model accuracy by comparing the measured throughput results with the estimated
one using their throughput estimation model through WIMNET simulation [8].
In [19], the effect of Quality of Service (QoS) on the performance enhancement of the 802.11n
4×4 MIMO WLAN with random network topology for multimedia traffic is investigated using
OPNET modular. In [20], authors evaluate the efficacy of 802.11n standard over the long-
distances network in terms of 802.11a link using ns-3 simulation. Through simulation, they
validate the efficiency of 802.11n PHY and MAC layer performance by evaluating several
simulation scenarios like frame aggregation, data rates, bandwidth, and distances.
In [21], authors made modifications to the existing PHY model of the ns-3 simulator to support
for wider channels together with the bit-error-rate (BER) estimations with higher MCSs for
802.11ac WLAN. They evaluated these modifications using various simulation scenarios for the
traffic generated by a single client with an AP. They also examined the performance of
802.11ac for the multiple client concurrent communication situations carried out in an enterprise
network scenario from the upcoming IEEE 802.11ax work-group where multiple clients
produced traffic simultaneously to their associate APs. However, in this study, the SU-MIMO
and MU-MIMO and beam-forming link feature for 802.11ac/n standard were not implemented
and evaluated through simulation.
3. OVERVIEW OF IEEE 802.11N STANDARD
The 802.11n protocol mainly builds on the former 802.11 standards which include various novel
technologies into it. They include multiple-antennas MIMO concepts at the access point (AP)
and at the client PC side of the network, 40MHz channel bonding by combining two adjacent
20MHz channels and aggregated multiple frames into one frame before packet transmission to
enhance its communication performance [2]. In this section, we briefly review the link features
of the 802.11n protocol.
In 802.11n WLAN, the MIMO technology uses multiple antennas to concurrently transmit
and/or receive more information up to four times than the SISO link. It can afford this by using
Spatial Division Multiplexing (SDM), which can enhance the throughput significantly by
raising the number of spatial streams (SSs) [3]. Because each SS involves a separate
transmitting and receiving antenna. The 802.11n standards support 1×1 to 4×4 antennas. For
example, the 802.11n can provide the maximum 600Mbps throughput with the bonded channel
of 40 MHz, the short guard interval (GI) of 400ns, and with the 4 × 4 MIMO technology [3].
The 802.11n link can be operated in both 5 GHz or 2.4 GHz RF band and compatible with the
former standard (802.11 a/b/g). Besides working with 20 MHz channels, it can support channel
bonding (CB) to double the physical-layer (PHY) data rate where two adjacent 20 MHz
channels are worked together to make one broader channel of 40 MHz. The MIMO architecture
together with the CB can further increase the physical data rate [22]. However, the CB concept
has a higher potential for interference with other systems using the same frequencies in 2.4
GHz.
In the 802.11n standard, various modulations, error-correcting codes, and the number of SSs
used, denoted by MCSs index, which is called mode. The 802.11n standard outlines 31 modes
(MCS-0 ~ MCS-31). Through using orthogonal frequency division multiplexing (OFDM), this
protocol offers more immunity counter to the selective fading. In 802.11n, the amount of
OFDM sub-carriers is also improved. For example, with the 20 MHz channel the total OFDM
sub-carriers are 56 (52 usable) to support High Throughput (HT) and with the 40 MHz channel
bonding it can be improved up to 114 (108 usable) in HT. Every sub-carrier is modulated using
a suitable modulation type (BPSK, QPSK, 16-QAM, or 64-QAM) and forward error correction
3
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
4. symbols to afford more data throughput.
The 802.11n protocol supports frame aggregation and blocked acknowledgment (ACK)
mechanism to provide its MAC layer enhancements. With frame aggregation, we can increase
the data rate at the user level by aggregating multiple data frames into one for transmission at
each occurrence to cut the overhead of the protocol. The 802.11n protocol supports two types of
aggregation namely 1) MAC protocol data unit (A-MPDU) and 2) the MAC service data unit
(A-MSDU) [3].
4. NEIGHBORING ACCESS POINT (NAP) ASSOCIATION ALGORITHM FOR
EVALUATION OF AN ENTERPRISE NETWORK
In this section, we describe the procedure of the neighboring AP association algorithm to find
the set of associated hosts to each AP for an enterprise network.
1. We calculate the throughput between each of the available candidates APs and hosts
through the throughput estimation model in [18] as:
A. First, we compute the Euclid distance for each possible pair of APs and a host.
B. Then, we estimate received signal strength (RSS) between them via the log distance
model.
C. Finally, we convert the RSS into the throughput.
2. Drive the associable AP for a host with the largest link speed by the greedy approach as:
A. For each host, select a candidate AP such that the RSS at the host is maximum.
B. Associate the host to the AP in step 2. (A) with the largest link speed.
3. Repeat step 2 until each host is associated with an AP.
5. SIMULATION ENVIRONMENT FOR PERFORMANCE EVALUATION
Network simulator ns-3 is used to evaluate various link features of the IEEE 802.11n WLANs
MIMO/SISO protocol. ns-3 is the discrete-event network simulator commonly used in academic
societies as an openly accessible software tool to model any new protocols, techniques, and
algorithms for WLANs [14]. In this paper, we use the ns-3.28 version that was released in
March 2018. The code has been developed by C++, and the scenario for network simulations
can be written by Python. It has been developed as the simulation engine by many users in the
study and research of wired and wireless LANs. Currently, ns-3 adopts the key feature of IEEE
802.11n/ac or others protocol such as Multiple-Input-Multiple-Output (MIMO), the channel
bonding, long and short GI, and the MSDU or MPDU frame aggregation that can be useful to
model and evaluate various algorithms for WLANs in 2.4 and 5 GHz. For performance
evaluation, we consider two network scenarios by simulation: 1) Traffic created between a
unique host and the AP to form WLAN and 2) traffic produced concurrently by many hosts with
their associated APs. In the first scenario, a single host is associated and generated traffic with
the AP, forming 802.11n WLAN. In this scenario, we investigate the effect of data throughput
and transmission range with different MCSs (802.11n allows MCS-0 to MCS-31), link distance
features by rate adaptation, doubling the bandwidth of 802.11n channels (802.11n agrees 20
MHz channel or 40 MHz bonded channel), the number of antennas proportional to the
simultaneous data streams at both sides of the link (802.11n permits 1 × 1 to 4 × 4 antennas), the
long or short GI, and the maximum size of the aggregated frame.
In the second scenario, we consider an enterprise network scenario where multiple hosts are
associated with an AP and concurrently generating traffic with it. Here, we examine the average
throughput performance by increasing the numbers of active hosts that are concurrently
4
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
coding rate of 1/2, 2/3, 3/4, or 5/6 [3]. The GI is reduced by half (400ns) between OFDM
5. communicating with their associated APs. In both scenarios, we estimate the throughput for
every HT bit rate value as the main performance metric which is calculated using the flow
monitor [22] as
xpkt
TimeFirstR
-
pkt
TimeLastRx
8
*
rxBytes
Throughpt (1)
Where rxBytes is the total number of received packets, TimeLastRxPacket is the absolute time
of the last received packet and TimeFirstRxPacket does the absolute time of the first received
packet by flow monitor.
6. EVALUATION RESULTS FOR TRAFFIC PRODUCED BETWEEN A UNIQUE
HOST AND AN AP
In this portion, we show various simulation results when a unique host makes traffic with AP.
6.1. Average throughput and maximum range with various MCSs
In the first simulation, we investigate the relationship between peak throughput and
transmission range with different MCSs and various physical distances between the AP and a
host. Table 1 shows the simulation parameters and Figure 1 demonstrates the simulation results.
From Figure 1 it is observed that although the peak throughput rises with increasing the MCSs
value, it decreases its communication range. This lower range with higher MCSs index values is
expected because the higher MCSs require more signal-to-noise ratio (SNR) value so that the
receiver can successfully understand them and signals pass through longer distances tend to
become weak that offer inferior SNRs.
Table 1. Parameters for transmission range simulation.
Parameter Value
Propagation Model constant position model
mobility model log distance model
remote station manager constant rate manager
packet size UDP, 1472 bytes
error rate model YansErrorRateModel
# of spatial streams 1×1, 2×2
Tx power 16.0206 dBm
Mode 40
0
20
40
60
80
100
120
0 20 40 60 80 100 120
Throughput
(Mbps)
Distance (m)
HtMcs-0
HtMcs-1
HtMcs-2
HtMcs-3
HtMcs-4
HtMcs-5
HtMcs-6
HtMcs-7
120
180
240
300
roughput
(Mbps)
HtMcs-8
HtMcs-9
HtMcs-10
HtMcs-11
HtMcs-12
HtMcs-13
HtMcs-14
(a) Throughput for 1×1 SISO link
5
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
6. 0
20
40
Throu
Distance (m)
HtMcs-6
HtMcs-7
0
60
120
180
240
300
0 20 40 60 80 100 120
Throughput
(Mbps)
Distance (m)
HtMcs-8
HtMcs-9
HtMcs-10
HtMcs-11
HtMcs-12
HtMcs-13
HtMcs-14
HtMcs-15
0
30
60
90
120
150
0 20 40 60 80 100 120
Throughput
(Mbps)
Distance (m)
20MHz
40MHz
40MHz+3dBm
40MHz+6dBm
40MHz+9dBm
(b) Throughput for 2×2 MIMO link
Figure 1. Maximum throughput and transmission range with MCSs.
However, when the range is short enough higher MCS can provide higher throughput.
Simulation results in Figure 1 also indicate that two end nodes can communicate at the
maximum range of less than or equal to 110 m with the smallest throughput when lowest MCSs
value is used. That is the communication at maximum throughput can occur when a host located
near to an AP.
6.2. Average throughput result with aggregated frame size (A-MPDU)
In the second simulation scenario, we examine the effects of the A-MPDU frame aggregation on
the data throughput for various MCS (MCS-0 to MCS-15) value. Our purpose is to know how
this implementation feature affects the throughput and their throughput performance under
different aggregated frame sizes. The configuration parameters used for this simulation study
are depicted in Table 2. Figure 2(a) and Figure 2(b) shows the average throughput estimation
results with maximum A-MPDU frame size (64 kB) under different MCSs index when a single
host is located at 1 m distance from the AP and generates traffic with it.
It is observed from Figure 2(a) and Figure 2(b) that with the maximum A-MPDU frame, the
throughput for 1×1 SISO and 2×2 MIMO link is significantly much higher than without A-
MPDU aggregation. Because, with the A-MPDU much of the CSMA/CA access specific
overhead can be reduced and therefore, in a unique transmission, we can easily transmit
multiple frames. This effect can significantly improve throughput. It is also perceived from
Figure 2(c) that the throughput of 1×1 SISO and 2×2 MIMO link improves as the aggregated
frame size increases and the performance graph looks exponential.
Table 2. Parameters for aggregation simulation.
Parameter Value
Propagation Model constant position model
mobility model log distance model
remote station manager constant rate manager
packet size UDP, 1472 bytes
error rate model YansErrorRateModel
# of spatial streams 1×1, 2×2
max A-MPDU size (kB) 0, 4, 6, 7, 8, 10, 15, 20, 25,
30, 35, 40, 45, 50, 60, 64
Tx power 16.0206 dBm
Mode 40
6
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
7. (a) MCS vs. throughput for 1×1 SISO link
(b) MCS vs. throughput for 2×2 MIMO link
(c) A-MPDU frame size vs. throughput
Figure 2. Average throughput with frame aggregation
6.3. Average throughput result by doubling channel width
In the third simulation, we investigate the relationships between the average throughput and
channel width. Table 3 gives the parameters of simulation and Figure 3 does the simulation
results. By doubling up the channel width, the average throughput also increases but this will
reduce its transmission range. Because, if we move from 20 MHz to 40MHz, then we should
also raise the power of the transmitter so that the packets can effectively coverer the same range.
7
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
8. Table 3. Parameters for channel width simulation.
Parameter Value
Propagation Model constant position model
mobility model log distance model
remote station manager constant rate manager
data rate HtMcs 11
Packet size UDP, 1472 bytes
error rate model YansErrorRateModel
# of spatial streams 2×2
Mode 20/40 MHz, short GI
Figure 3. Average throughput results with 20 MHz and 40MHz channel width
This is reasonable since the 3dBm increase in transmit power is almost equivalent to doubling
the power.
6.4. Average throughput result with the number of antennas or special streams
In the 4th simulation scenario, we investigate the effects on throughput with the number of data
streams concurrently send/receive packet under different MCSs value. This total amount of
instantaneous data streams is restricted by the discrete number of antennas used at the sender
and receiver side ranging from 1×1 to 4×4 streams. Table 4 shows the simulation parameters.
Average throughput results with the number of special streams are shown in Figure 4.
Table 4. Parameters for # of spatial streams simulation.
Parameter Value
propagation model constant position model
mobility model log distance model
remote station manager constant rate manager
Packet size UDP, 1472 bytes
error rate model YansErrorRateModel
# of spatial streams 1 × 1, 2 × 2, 3 × 3, 4 × 4
Tx power 16:0206 dBm
Mode 40MHz, 400ns
8
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
9. 0
100
200
300
400
500
600
0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32
Throughput
(Mbps)
MCS (0 ~ 31)
Theoretical Rate ns-3 simulation
Figure 4. Average throughput with the number of spatial streams, and different MCSs.
It is observed from Figure 4 that by using a 40 MHz bonded channel with a 1×1 spatial stream,
we can achieve a maximum physical data rate of 120 Mbps with 800ns long GI and 133 Mbps
with 400ns short GI. If more antennas are used, then the data rate of 451 Mbps is achieved by
using one 40 MHz channel and 4×4 spatial streams. If no other microwave, Bluetooth, or WiFi
signal propagation occurred in the vicinity then the data rate of the 802.11n network will be
closer to the physical rate. Therefore, this MIMO feature can considerably raise the data
throughput of 802.11n standard with growing the quantity of the committed spatial stream. We
also compare this simulation results with the physical data rate.
6.5. Link distance and throughput features by rate adaptation algorithm
In this fifth simulation scenario, we investigate the effects of throughput of a SISO link with the
link distance. Figure 5 shows the throughput simulation results with the Ideal rate adaptation
algorithm in ns-3 when we increase the link distance of a host from the AP with certain
interims. First, we place a host at 1 m distance from the AP and then gradually change its
physical distance up to 150m with a breakpoint of 5m. The simulation parameters are shown in
Table 5.
It can be perceived from Figure 5 that any throughput drops as we rise the physical distance
between the AP and a host pair. This may happen because of the RSS also declines with the
distance. This worse RSS value indicates that a host may get the poor SNR at this point and
causes higher packet errors. To overcome these errors, the system slows down its transmission
speed by lowering its MCSs. The throughput simulation results by ns-3 are stepwise on account
of the variation of MCSs index value. We can also notice from Figure 5 that the ns-3 simulation
results are very similar to the measurement one in [24].
Table 5. Parameters for rate adaptation simulation.
Parameter Value
propagation model constant position model
mobility model log distance model
remote station manager Ideal rate adaptation
error rate model YansErrorRateModel
# of spatial streams 1×1
Tx power 16:0206 dBm
Mode 40MHz, 800ns
9
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
10. Figure 5. Average throughput with link distance.
7. EVALUATION RESULT FOR CONCURRENT COMMUNICATION BY
MULTIPLE HOSTS
Finally, in this sixth simulation scenario, we investigate the impact of the number of active hosts
associated with all the active AP when multiple hosts simultaneously generate traffic with them.
To perform this evaluation, we use an enterprise network model which is proposed by the
802.11ax study group [21].
We assume all APs use different channels and simulation is run with various offered loads by 4,
8, 16, 32, 48, and 64 hosts respectively. The configuration parameters used for this simulation
study are shown in Table 6. Figure 6(a) shows the 50×50 enterprise network field where 4 APs
and 64 hosts are uniformly distributed. In Figure 6(a), the circles represent the APs, and squares
denote the host’s location in the field. Hosts association to each AP in the topology is selected
by applying the nearest AP association algorithm. Figure 6 (c) shows the throughput results by
simulation when multiple hosts offer traffic with their associated APs as in Figure 6 (b).
It can be perceived from Figure 6(c) that the average throughput drops significantly as more
active hosts or clients offer traffic to their associated APs in the network field. This means that
the 4 hosts give 29% higher throughput than 64 active hosts. This is because with fewer active
hosts, there is less competition for channel access and packet errors increase with increasing the
number of concurrent communicating links which decreases the speed of their data
transmission. Also, the transmission chances of near host and far host to the associated AP are
not the same and the host with stronger RSS always dominates the channel.
Table 6. Parameters for transmission range simulation.
Parameter Value
propagation model log distance model
mobility model constant position model
remote station manager Ideal rate adaptation
error rate model YansErrorRateModel
# of antennas 1×1
Tx power 16:0206 dBm
Mode 40MHz, 800ns
# of active hosts per AP 4, 16, 32, 48, 64
10
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
11. (a) Network topology with 4 APs and 64 hosts.
(b) Hosts association by NAP association approach for 64 hosts with 4 APs.
(c) # of hosts vs. average throughput per AP
Figure 6. Simulation result for the number of active users increasing scenario.
It can be perceived from Figure 6(c) that the average throughput drops significantly as more
active hosts or clients offer traffic to their associated APs in the network field. This means that
the 4 hosts give 29% higher throughput than 64 active hosts. This is because with fewer active
11
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021Type your text
12. hosts, there is less competition for channel access and packet errors increase with increasing the
number of concurrent communicating links which decreases the speed of their data
transmission. Also, the transmission chances of near host and far host to the associated AP are
not the same and the host with stronger RSS always dominates the channel.
8. CONCLUSIONS
This paper investigated the 802.11n WLANs key link features performance in ns-3 under
various conditions for single-host communication between a host and an AP. Besides,
performance evaluation for an enterprise scenario from the 802.11ax group was evaluated when
there exists a concurrent packet transmission or reception that occurred by multiple hosts with
their associated APs. To find hosts association to the APs for an enterprise network scenario, we
apply the neighboring AP association approach. The simulation results show that the ns-3
support the link features for the IEEE 802.11n protocol with considerable accuracy and can
provide satisfactory performance for an enterprise scenario in WLAN. Our future works include
the continuous investigation of the 802.11n protocol in diverse network environments and usage
of the model to the ideal design of WLANs.
REFERENCES
[1] M. S. Gast, “802.11 wireless networks”, 2nd ed., O’Reilly, 2005.
[2] M. S. Gast, “802.11n: a survival guide”, 1st ed., O’Reilly, 2012.
[3] S. Moghe, R. Upadhyay,“Comparison of SISO and MIMO techniques in 802.11n wireless local
area network”, Proc. Int. Conf. Emer. Trend. Elec. Photo. Dev. & Syst. (ELECTRO-2009), pp.
245-246, 2009.
[4] IEEE 802.11n, https://en.wikipedia.org/wiki/IEEE 802.11n-2009.
[5] I. Syed and B. Roh, “Adaptive backoff algorithm for contention window for dense IEEE 802.11
WLANs”, Mobile Inf. Sys., 2016.
[6] M. S. A. Mamun, N. Funabiki, K. S. Lwin, M. E. Islam, and W.-C. Kao, “A channel assignment
extension of active access-point 6configuration algorithm for elastic WLAN system and its
implementation using Raspberry Pi”, Int. J. Network. Comput., vol. 7, no. 2, pp. 248-270, 2017.
[7] S. K. Debnath, N. Funabiki, M. Saha, M. S. A. Mamun, and W.-C. Kao, “MIMO host location
optimization in active access-point configuration algorithm for elastic WLAN system”, Int. J.
Space-Base. Sit. Comput., (IJSSC), vol. 8, no. 2, pp. 59-69, 2018.
[8] K. S. Lwin, N. Funabiki, C. Taniguchi, K. K. Zaw, M. S. A. Mamun, M. Kuribayashi, and W.-C.
Kao, “A minimax approach for access point setup optimization in IEEE 802.11n wireless
networks”, Int. J. Network. Computing, vol. 7, no. 2, pp. 187-207, 2017.
[9] S. K. Debnath and A.Z.M. T. Islam, “Analysis of Neighbor Knowledge Based Bcast Protocol
Performance for Multi-hop Wireless Ad Hoc Networks”, Int. J. on AdHoc Netw. Systems
(IJANS), ISSN: 2249 – 0175, Vol. 1, Issue 2, pp. 01-12, 2011.
[10] M. Muhammad, A. G. Halilu, and S. M. Bunu, “Framework, Implementation and Algorithm for
Asynchronous Power Saving of UWBMAC with Steerable Directional”, Int. J. on AdHoc Netw.
Systems (IJANS), ISSN: 2249 – 0175, Vol. 9, Issue 3, pp. 1-11, 2019.
[11] B. Mahma and A. Korichi,, “Simulation & VANET: Towards a New Reliable and Optimal Data
Dissemination Model”, Int. J. on AdHoc Netw. Systems (IJANS), ISSN: 2249 – 0175, Vol.6,
Issue 2, 2016.
[12] N. Funabiki ed., “Wireless mesh networks”, InTech Open Access Pub., Jan. 2011,
http://www.intechopen.com/ books/wireless-mesh-networks.
[13] “The network simulator ns-2”, https://www.isi.edu/nsnam/ns/.
12
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021
13. [14] “The network simulator ns-3”, http://www.nsnam.org.
[15] QualNet, http://web.scalable-networks.com/ qualnet-network-simulator-software.
[16] W. Jiang, “OPNET-based WLAN modeling and its performance Testing”, Chem. Eng. Trans.,
vol. 51, pp. 361-366, 2016.
[17] N. S. Ravindranath, I. Singh, A. Prasad, and V. S. Rao, “Performance evaluation of IEEE
802.11ac and 802.11n using NS3,” Indian Journal of Science and Technology, vol. 9, no. 26,
2016.
[18] S. K. Debnath, M. Saha, N. Funabiki, and W.-C. Kao, “A throughput estimation model for IEEE
802.11n MIMO link in wireless local-area networks”, Proc. Int. Conf. Comp. Commun. Syst.
(ICCCS), pp. 327-331, 2018.
[19] Z. K. Farej, and M. M. Jasim, “Performance evaluation of the IEEE 802.11n random topology
WLAN with QoS application”, Int. J. Elec. and Comp. Eng., Vol. 10, no. 2, pp. 1924-1934,
2020.
[20] P. Ludeña, J. Simó, K. Rohoden, and M. Morocho, “Performance Evaluation of Long-Distance
802.11n Networks”, In New Contributions in Information Systems and Technologies, pp. 1033-
1043, Springer, Cham, 2015.
[21] A. Jonsson, D. A. kerman, and E. Fitzgerald, “Modeling, Implementation and Evaluation of
IEEE 802.11ac in NS-3 for Enterprise Networks”, Proc. Wireless Days (WD), 2016.
[22] I. Vermesan, A. Moldovan, T. Palade, and R. Colda, “Multi antenna STBC transmission
technique evaluation under IEEE 802.11n conditions”, Proc. Int. Conf. Micro. Tech. (COMITE),
pp. 51-54, 2010.
[23] Flow monitor Model library-ns-3 https://www.nsnam.org/ docs/models/html/flow-monitor.html.
[24] S. K. Debnath, N. Funabiki, P. K. Sarker, K. S. Lwin and M. Saha, “Throughput Estimation of
SISO and MIMO Links under LOS and NLOS Conditions in IEEE 802.11n WLAN”, J. of
Comp. Sci. and Eng. Research, (CSERJ), vol. 11, pp. 19-27, 2019.
13
International Journal on AdHoc Networking Systems (IJANS) Vol. 11, No. 1, January 2021