SlideShare a Scribd company logo
Afjal Hossen Mondul et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 11, (Part - 5) November 2015, pp.116-119
www.ijera.com 116 | P a g e
Performance Analysis of WiMAX and LTE Using NS-2
Afjal Hossen Mondul, Rezwan Salmani
Electrical and Electronic Engineering American International University-Bangladesh Dhaka, Bangladesh
Electrical and Electronic Engineering American International University-Bangladesh Dhaka, Bangladesh
Abstract
The increasing use of wireless devices and in particular smart phones has resulted the need for greater capacity
and higher speed than the existing network technologies. Hence, LTE (Long Term Evolution) and WiMAX
(Worldwide Interoper- ability for Microwave Access) became the two leading technologies. Services are
increasingly shifting from voice to data and from circuit-switched to packet-switched ones. Battle between LTE
and WiMAX technologies is already heating up with WiMAX being ahead due to availability of standards
through IEEE 802.16 and is up and running but lacks in substantial roll out plans due to cost. The targets for
LTE indicate bandwidth increases as high as 100 Mbps on the downlink, and up to 50 Mbps on the uplink.
However, this potential increase in bandwidth is just a small part of the overall improvement LTE aims to
provide. This study illustrates the model and representation of LTE links and traffics using NS-2 network
simulator and observation of TCP performance investigated. The Evaluation of the network performance with
TCP is mainly based on congestion window behavior, throughput, average delay and lost packet.
Keywords- NS-2 (Network Simulator-2), LTE (Long Term Evolution), Wimax (Worldwide Interoperability
For Microwave Access), Technologies.
I. INTRODUCTION
In telecommunications, 4G is the fourth
generation of cell phone mobile communications
standards. There are many features associated with
4G, which make it promising. On the other hand,
New applications required to be supported by new
mobile systems include a variety; VoIP, video
conference, multimedia messaging, multi-player
games, virtual private networks (VPN), etc. All these
applications require higher throughput, wider BW,
smaller delay and innovative transmission methods
that will give higher spectral efficiency and good
quality. Two leading emerging technologies are: LTE
(Long Term Evolution standardized by third
generation partnership project(3GPP)and WiMAX
(the IEEE802.16e,the worldwide interoperability for
microwave access) are considered able to fulfill the
4G requirements announced by ITU-R which is
known as International Mobile Telecommunications
Advanced (IMT-Advanced).Future scope of both
these technologies is enormous. Also, both the
technologies have their own advantages and
disadvantages. In future, a network may be possible
which combines the advantages of both these
technologies. Our report hopes to bring forth ns2
simulations of two of the most widely used wireless
network technologies. In particular we will be
running simulations of both LTE and WiMax
network, and then compare their performances to
each other, in hopes to discover which one of the two
technologies is better.
II. WIMAX
WiMAX stands for Worldwide Interoperability
for Microwave Access, which supports point to
multi-point (PMP) broadband wireless access.
WiMAX technology enables ubiquitous delivery of
wireless broadband service for fixed and mobile users,
and became a reality in 2006 when Korea Telecom
started the deployment of a 2.3 GHz version of mobile
WiMAX service called WiBRO in the Seoul
metropolitan area to offer high performance for data
and video. In a recent market forecast published in
April 2008, WiMAX Forum Subscriber and User
Forecast Study, the WiMAX Forum projects a rather
aggressive forecast of more than 133 million WiMAX
users globally by 2012 (WiMAX Forum, 2008c). The
WiMAX Forum also claims that there are more than
250 trials and deployments worldwide. The air
interface of WiMAX technology is based on the IEEE
802.16 standards. In particular, the current Mobile
WiMAX technology is mainly based on the IEEE
802.16e amendment (IEEE, 2006a), approved by the
IEEE in December 2005, which specifies the
Orthogonal Frequency Division Multiple Access
(OFDMA) air interface and provides support for
mobility. The IEEE wireless standard has a range of
up to 30 miles, and can deliver broadband at around
75 megabits per second. This is theoretically, 20 times
faster than a commercially available wireless
broadband. WiMax can be used for wireless
networking like the popular WiFi. WiMax, a second-
generation protocol, allows higher data rates over
longer distances, efficient use of bandwidth, and
avoids interference almost to a minimum. WiMax can
RESEARCH ARTICLE OPEN ACCESS
Afjal Hossen Mondul et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 11, (Part - 5) November 2015, pp.116-119
www.ijera.com 117 | P a g e
be termed partially a successor to the Wi-Fi protocol,
which is measured in feet, and works, over shorter
distances.
III. LTE
Long Term Evolution (LTE) is a significant
project of 3rd Generation Partnership Project (3GPP),
initially proposed on the Toronto conference of 3GPP
in 2004 and officially started as LTE work item in
2006. LTE, as a transition from the 3rd generation
(3G) to the 4th generation (4G), has achieved great
capacity and high speed of mobile telephone networks
without doubt. It defines a new packet-only wideband
radio with flat architecture and assumes a full Internet
Protocol (IP) network architecture in order to assure
voice supported in packet domain in design. In
addition, it is combined with top-of-the-line radio
techniques in order to gain better performance than
Code Division Multiple Access (CDMA) approaches.
LTE provides scalable carrier bandwidths from 1.4
MHz to 20 MHz and frequency division duplexing
(FDD), as well as time division duplexing (TDD). In
this paper, it presents an overall description of LTE
technology separately in different aspects of LTE
architecture and technical principles to clarify how
LTE as a radio technology achieves a high
performance for cellular mobile communication
systems. LTE has multiple access principles such as
OFDMA for DL and SC-FDMA for UL.
Table 1: LTE Requirements
Technical Items LTE-Advanced,
IMT Requirement
Downlink peak
data rates
1 Gbps (low
mobility 15 km/hr)
Uplink peak data
rates
500 Mbps (low
mobility 15 km/hr)
Bandwidth Scalable up to 100
MHz
User plane latency 10 ms
Control plane
latency
50 to 100 ms
Uplink peak spectral
efficiency
15 bps/Hz
Downlink peak
spectral efficiency
30 bps/Hz
Access Scheme OFDMA
IV. SIMULATION SOFTWARE: NS2
Many network simulation softwares are available
in market. Some of the leading network simulators
are Qualnet, Ns-2, JiST/SWANS, Opnet, Omnett,
Netsim REAL, SSFNet, JSimetc. Here we present a
quick comparison of various available network
simulation software. But we have decided to use NS-
2(Network Simulator-2) because of its following
features and advantages over other simulators:
Popular used in academia and industries
Open Source software
Provides greater accuracy and speed of testing
Supports large number of external protocols
Programming can be done using tclscript and/or
C++
Provided with visualization tools
Complex scenarios can be easily tested
More ideas can be tested in a smaller timeframe
Network Simulator version 2 (NS-2) is discrete event
packet level simulator. The network simulator covers
a very large number of application of different kind
of protocols of different network types consisting of
different network elements and traffic models. NS-2
is a package of tools that simulates behavior of
networks such as creating network topologies, log
events that happen under any load, analyze
the events and understand the network.
Platform required to run network Simulator
1. Unix and Unix like systems
 Linux
 Free BSD
 SunOS/Solaris

2. Windows 95/98/NT/2000/XP/7/8.1 (requires
Cygwin).
Simulation System Architecture
Figure 1: Working in NS2
V. PARAMETERS COMPARED
 Packet delivery ratio:
Packet dropping is where network traffic fails to
reach its destination in a timely manner. Most
commonly packets get dropped before the destination
can be reached
PDR = (No. of Packets received / No of Packets
sent)*100
 Throughput:
Network throughput is the average rate of
successful message delivery over a communication
Afjal Hossen Mondul et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 11, (Part - 5) November 2015, pp.00-00
www.ijera.com 118 |
P a g e
channel. This data may be delivered over a physical
or logical link, or pass through a certain network
node. The throughput is usually measured in bits per
second (bit/s or bps), and sometimes in data packets
per second or data packets per time slot.
Throughput T =No.of bytes*8/(Finish time-Start
time) bps
 Delay:
Delay refers to the amount of time it takes for a
bit to be transmitted from source to destination. It can
take a long time for a packet to be delivered across
intervening networks. In reliable protocols where a
receiver acknowledges delivery of each chunk of
data, it is possible to measure this as round-trip time.
One way to view latency is how long a system holds
on to a packet. That system may be a single device
like a router, or a complete communication system
including routers and links. Delay of packets in the
network can be measured through the trace file
obtained after the execution of code. End to end
delay D = (Td - Ts) seconds where Td is the packet
receive time at the destination and Ts is packet send
time at source node.
VI. SIMULATION RESULTS
Figure 2: LTE Throughput
Figure 3: WiMax Throughput
Figure 4: LTE Packet Loss Rate
Figure 5: Wimax Packet Loss Rate
Figure 6: LTE Delay
Afjal Hossen Mondul et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 11, (Part - 5) November 2015, pp.116-119
www.ijera.com 119 | P a g e
FIGURE 7: WIMAX DELAY
VII. FUTURE IMPROVEMENTS
For future work individuals may choose to
implement the 802.11ac standard for WiMax instead
of our 802.11g standard. This will undoubtedly result
in a simulation more concurrent with today’s
technologies. Individuals may also implement larger
traffic to represent high-definition video calling by
users.
VIII. CONCLUSION
For our report we have brought forth ns2
simulations of LTE and WiMax, currently the two
most widely used network technologies. Using the
capabilities of ns2 we have successfully simulated
and collected data from both the LTE and WiMax
topologies. From the data, it can be seen from their
established graphs that the throughput, delay for both
technologies are very similar. Small performance
differences in the two technologies can be seen from
the packet loss and delay graphs, which show LTE as
the prevailing technology. As a result, it is fair to
conclude that LTE provides a more fluid experience
when performing voice calls over the internet.
Although LTE has prevailed as the better technology.
REFERENCES
[1] Information Sciences Institute, The Network
Simulator, http://www.isi.edu/ nsnam/ns/,
June 2011
[2]. The ns-2 network simulator, retrieved from
http://teacher.buet.ac.bd/ashikur/ns2/,Septe
mber 2011
[3]. The SSF Research Network, retrieved from
http://ssfnet.org/, September 2011
[4] OPNET simulator, retrieved from
http://www.opnet.com/, September 2011
[5] 3GPP R1-072261, LTE Performance
Evaluation-Uplink Summary, May 2007
[6]. Tejas Bhandare, “LTE and WiMAX
Comparison”, Santa Clara University, 2008,
White Paper
[7] WiMAX Forum White Paper, Mobile
WiMAX Part I: A Technical Overview and
Performance Evaluation, August 2006
[8] LTE Deployments, retrieved from
http://ltemaps.org/, March 2015
[9] Dieter Eberle, LTE vs. WiMAX 4th
generation telecommunication networks,
2010
[10] WiMAX Deployments, retrieved from
http://www.wimaxmaps.org/, March 2015
Authors Profile
Md. Afjal Hossen Mondul Pursuing
Masters of Electrical and Electronic Engineering
from American International University-Bangladesh
(AIUB). He received his BSc in Electrical
Engineering from AIUB in October 2013. Presently
he is involved in network simulator research. I’m
interested in networking and telecommunication
which made me to do this paper.
Md. Rezwan Salmani is an Assistant
Network Engineer of Spectrum Engineering
Consortium Ltd. He received his BSc in Electrical
and Electronic Engineering from American
International University Bangladesh (AIUB) in 2013.

More Related Content

What's hot

VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
CSCJournals
 
Enable device to-device communications underlaying networks
Enable device to-device communications underlaying networksEnable device to-device communications underlaying networks
Enable device to-device communications underlaying networks
Mansour Naslcheraghi
 
TERM PAPER REVIEW FINAL-VIKAS
TERM PAPER REVIEW FINAL-VIKASTERM PAPER REVIEW FINAL-VIKAS
TERM PAPER REVIEW FINAL-VIKAS
vikas choudhary
 
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
IJCSIS Research Publications
 
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz Frequency
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz FrequencyRadio Link Analysis for 4G TD- LTE Technology at 2.3 GHz Frequency
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz Frequency
Sukhvinder Singh Malik
 
Device to Device communication
Device to Device communicationDevice to Device communication
Device to Device communication
Sharu Sparky
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
International Journal for management Science and Technology - https://www.ijmst.com/
 
Georgia tech 2010
Georgia tech 2010Georgia tech 2010
Georgia tech 2010
oeslle
 
D2DCommunication
D2DCommunicationD2DCommunication
D2DCommunication
Bekir Kendirci
 
Ct3210321037
Ct3210321037Ct3210321037
Ct3210321037
IJMER
 
Wireless pan technologies ieee 802.15.x
Wireless pan technologies ieee 802.15.xWireless pan technologies ieee 802.15.x
Wireless pan technologies ieee 802.15.x
Pawan Koshta
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
Arunabh Mishra
 
Vo ip on 3gpp lte network a survey
Vo ip on 3gpp lte network a surveyVo ip on 3gpp lte network a survey
Vo ip on 3gpp lte network a survey
Alexander Decker
 
4g magic communication
4g magic communication4g magic communication
4g magic communication
sukanya thatamsetty
 
A survey on Device-to-Device Communication
A survey on Device-to-Device CommunicationA survey on Device-to-Device Communication
A survey on Device-to-Device Communication
Kuldeep Narayan Singh
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area Networks
Dilum Bandara
 
Wifi adhoc and infrastructure mode
Wifi adhoc and infrastructure modeWifi adhoc and infrastructure mode
Wifi adhoc and infrastructure mode
sandhilu
 
Frontiers of Wireless and Mobile Communications
Frontiers of Wireless and Mobile CommunicationsFrontiers of Wireless and Mobile Communications
Frontiers of Wireless and Mobile Communications
Sai Varrshini
 
Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01
Sreedhar Chowdam
 

What's hot (20)

VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
 
Enable device to-device communications underlaying networks
Enable device to-device communications underlaying networksEnable device to-device communications underlaying networks
Enable device to-device communications underlaying networks
 
TERM PAPER REVIEW FINAL-VIKAS
TERM PAPER REVIEW FINAL-VIKASTERM PAPER REVIEW FINAL-VIKAS
TERM PAPER REVIEW FINAL-VIKAS
 
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
Performance comparison of Wireless IEEE 802.11 a, b, g and n used for Ad-Hoc ...
 
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz Frequency
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz FrequencyRadio Link Analysis for 4G TD- LTE Technology at 2.3 GHz Frequency
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz Frequency
 
Device to Device communication
Device to Device communicationDevice to Device communication
Device to Device communication
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
 
Georgia tech 2010
Georgia tech 2010Georgia tech 2010
Georgia tech 2010
 
D2DCommunication
D2DCommunicationD2DCommunication
D2DCommunication
 
Ct3210321037
Ct3210321037Ct3210321037
Ct3210321037
 
Wireless pan technologies ieee 802.15.x
Wireless pan technologies ieee 802.15.xWireless pan technologies ieee 802.15.x
Wireless pan technologies ieee 802.15.x
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
 
Vo ip on 3gpp lte network a survey
Vo ip on 3gpp lte network a surveyVo ip on 3gpp lte network a survey
Vo ip on 3gpp lte network a survey
 
4g magic communication
4g magic communication4g magic communication
4g magic communication
 
A survey on Device-to-Device Communication
A survey on Device-to-Device CommunicationA survey on Device-to-Device Communication
A survey on Device-to-Device Communication
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area Networks
 
Wifi adhoc and infrastructure mode
Wifi adhoc and infrastructure modeWifi adhoc and infrastructure mode
Wifi adhoc and infrastructure mode
 
Frontiers of Wireless and Mobile Communications
Frontiers of Wireless and Mobile CommunicationsFrontiers of Wireless and Mobile Communications
Frontiers of Wireless and Mobile Communications
 
Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01
 

Viewers also liked

Simulation d'un réseau Ad-Hoc sous NS2
Simulation d'un réseau Ad-Hoc sous NS2Simulation d'un réseau Ad-Hoc sous NS2
Simulation d'un réseau Ad-Hoc sous NS2
Rihab Chebbah
 
Ns2
Ns2Ns2
NS2 Projects Source Code NS2 Projects 2013 Wireless Sensor Networks Cognitive...
NS2 Projects Source Code NS2 Projects 2013 Wireless Sensor Networks Cognitive...NS2 Projects Source Code NS2 Projects 2013 Wireless Sensor Networks Cognitive...
NS2 Projects Source Code NS2 Projects 2013 Wireless Sensor Networks Cognitive...
ns2matrixcube
 
NS2 Projects 2013 NS2 Projects in Chennai MANET VANET DDOS LEACH WSN
NS2 Projects 2013 NS2 Projects in Chennai MANET VANET DDOS LEACH WSN NS2 Projects 2013 NS2 Projects in Chennai MANET VANET DDOS LEACH WSN
NS2 Projects 2013 NS2 Projects in Chennai MANET VANET DDOS LEACH WSN
ns2matrixcube
 
1 session installation
1 session installation1 session installation
1 session installation
Rahul Hada
 
2014 IEEE Network Simulations(NS-2&NS-3) based Network Communication Projects
2014 IEEE Network Simulations(NS-2&NS-3) based Network Communication Projects2014 IEEE Network Simulations(NS-2&NS-3) based Network Communication Projects
2014 IEEE Network Simulations(NS-2&NS-3) based Network Communication Projects
Chinnasamy C
 
Building Complex Topology using NS3
Building Complex Topology using NS3Building Complex Topology using NS3
Building Complex Topology using NS3
Rahul Hada
 
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
Manoj Subramanian
 
Ns 2 Network Simulator An Introduction
Ns 2 Network Simulator An IntroductionNs 2 Network Simulator An Introduction
Ns 2 Network Simulator An Introduction
Jaipur National University, Jaipur, Rajasthan, India
 
Ns2programs
Ns2programsNs2programs
Ns2programs
Meenakshi Devi
 
Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34
Shaikhul Islam Chowdhury
 
Cour simulation ns2
Cour simulation ns2Cour simulation ns2
Cour simulation ns2Gilles Samba
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
Abhishek Wadhwa
 
D045042227
D045042227D045042227
D045042227
IJERA Editor
 
Electrochemical Synthesis of MoO3 Nanoparticles Effect of Temperature Convert...
Electrochemical Synthesis of MoO3 Nanoparticles Effect of Temperature Convert...Electrochemical Synthesis of MoO3 Nanoparticles Effect of Temperature Convert...
Electrochemical Synthesis of MoO3 Nanoparticles Effect of Temperature Convert...
IJERA Editor
 
Geomatics Based Landslide Vulnerability Zonation Mapping - Parts Of Nilgiri D...
Geomatics Based Landslide Vulnerability Zonation Mapping - Parts Of Nilgiri D...Geomatics Based Landslide Vulnerability Zonation Mapping - Parts Of Nilgiri D...
Geomatics Based Landslide Vulnerability Zonation Mapping - Parts Of Nilgiri D...
IJERA Editor
 
Traffic Violation Detection Using Multiple Trajectories of Vehicles
Traffic Violation Detection Using Multiple Trajectories of VehiclesTraffic Violation Detection Using Multiple Trajectories of Vehicles
Traffic Violation Detection Using Multiple Trajectories of Vehicles
IJERA Editor
 
E0442328
E0442328E0442328
E0442328
IJERA Editor
 
Dimensional and Constructional Details of Components, Fundamentals of TNM Met...
Dimensional and Constructional Details of Components, Fundamentals of TNM Met...Dimensional and Constructional Details of Components, Fundamentals of TNM Met...
Dimensional and Constructional Details of Components, Fundamentals of TNM Met...
IJERA Editor
 
Ultrasonic and Volumetric Investigations of -Butyrolactone with Aliphatic Al...
Ultrasonic and Volumetric Investigations of -Butyrolactone with Aliphatic Al...Ultrasonic and Volumetric Investigations of -Butyrolactone with Aliphatic Al...
Ultrasonic and Volumetric Investigations of -Butyrolactone with Aliphatic Al...
IJERA Editor
 

Viewers also liked (20)

Simulation d'un réseau Ad-Hoc sous NS2
Simulation d'un réseau Ad-Hoc sous NS2Simulation d'un réseau Ad-Hoc sous NS2
Simulation d'un réseau Ad-Hoc sous NS2
 
Ns2
Ns2Ns2
Ns2
 
NS2 Projects Source Code NS2 Projects 2013 Wireless Sensor Networks Cognitive...
NS2 Projects Source Code NS2 Projects 2013 Wireless Sensor Networks Cognitive...NS2 Projects Source Code NS2 Projects 2013 Wireless Sensor Networks Cognitive...
NS2 Projects Source Code NS2 Projects 2013 Wireless Sensor Networks Cognitive...
 
NS2 Projects 2013 NS2 Projects in Chennai MANET VANET DDOS LEACH WSN
NS2 Projects 2013 NS2 Projects in Chennai MANET VANET DDOS LEACH WSN NS2 Projects 2013 NS2 Projects in Chennai MANET VANET DDOS LEACH WSN
NS2 Projects 2013 NS2 Projects in Chennai MANET VANET DDOS LEACH WSN
 
1 session installation
1 session installation1 session installation
1 session installation
 
2014 IEEE Network Simulations(NS-2&NS-3) based Network Communication Projects
2014 IEEE Network Simulations(NS-2&NS-3) based Network Communication Projects2014 IEEE Network Simulations(NS-2&NS-3) based Network Communication Projects
2014 IEEE Network Simulations(NS-2&NS-3) based Network Communication Projects
 
Building Complex Topology using NS3
Building Complex Topology using NS3Building Complex Topology using NS3
Building Complex Topology using NS3
 
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
 
Ns 2 Network Simulator An Introduction
Ns 2 Network Simulator An IntroductionNs 2 Network Simulator An Introduction
Ns 2 Network Simulator An Introduction
 
Ns2programs
Ns2programsNs2programs
Ns2programs
 
Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34
 
Cour simulation ns2
Cour simulation ns2Cour simulation ns2
Cour simulation ns2
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
D045042227
D045042227D045042227
D045042227
 
Electrochemical Synthesis of MoO3 Nanoparticles Effect of Temperature Convert...
Electrochemical Synthesis of MoO3 Nanoparticles Effect of Temperature Convert...Electrochemical Synthesis of MoO3 Nanoparticles Effect of Temperature Convert...
Electrochemical Synthesis of MoO3 Nanoparticles Effect of Temperature Convert...
 
Geomatics Based Landslide Vulnerability Zonation Mapping - Parts Of Nilgiri D...
Geomatics Based Landslide Vulnerability Zonation Mapping - Parts Of Nilgiri D...Geomatics Based Landslide Vulnerability Zonation Mapping - Parts Of Nilgiri D...
Geomatics Based Landslide Vulnerability Zonation Mapping - Parts Of Nilgiri D...
 
Traffic Violation Detection Using Multiple Trajectories of Vehicles
Traffic Violation Detection Using Multiple Trajectories of VehiclesTraffic Violation Detection Using Multiple Trajectories of Vehicles
Traffic Violation Detection Using Multiple Trajectories of Vehicles
 
E0442328
E0442328E0442328
E0442328
 
Dimensional and Constructional Details of Components, Fundamentals of TNM Met...
Dimensional and Constructional Details of Components, Fundamentals of TNM Met...Dimensional and Constructional Details of Components, Fundamentals of TNM Met...
Dimensional and Constructional Details of Components, Fundamentals of TNM Met...
 
Ultrasonic and Volumetric Investigations of -Butyrolactone with Aliphatic Al...
Ultrasonic and Volumetric Investigations of -Butyrolactone with Aliphatic Al...Ultrasonic and Volumetric Investigations of -Butyrolactone with Aliphatic Al...
Ultrasonic and Volumetric Investigations of -Butyrolactone with Aliphatic Al...
 

Similar to Performance Analysis of WiMAX and LTE Using NS-2

LTE_and_WiMAX_Comparison_and_Future_Pers.pdf
LTE_and_WiMAX_Comparison_and_Future_Pers.pdfLTE_and_WiMAX_Comparison_and_Future_Pers.pdf
LTE_and_WiMAX_Comparison_and_Future_Pers.pdf
YunesHasanAhmedAli1
 
Mobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validationMobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validation
IOSR Journals
 
Video steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTEVideo steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTE
iosrjce
 
D011112432
D011112432D011112432
D011112432
IOSR Journals
 
L010636772
L010636772L010636772
L010636772
IOSR Journals
 
A Comparative Study on 4G and 5G Technology for Wireless Applications
A Comparative Study on 4G and 5G Technology for Wireless ApplicationsA Comparative Study on 4G and 5G Technology for Wireless Applications
A Comparative Study on 4G and 5G Technology for Wireless Applications
iosrjce
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
ijceronline
 
comparsion of LTE and wimax
comparsion of LTE and wimaxcomparsion of LTE and wimax
comparsion of LTE and wimax
Syed Ali Raza Rizvi
 
5G complete presentation 2016 upload
5G complete presentation 2016 upload5G complete presentation 2016 upload
5G complete presentation 2016 upload
Nishanth C
 
Amit vishw
Amit vishwAmit vishw
Amit vishw
amit_98888
 
C011111523
C011111523C011111523
C011111523
IOSR Journals
 
Throughput Performance Analysis VOIP over LTE
Throughput Performance Analysis VOIP over LTEThroughput Performance Analysis VOIP over LTE
Throughput Performance Analysis VOIP over LTE
iosrjce
 
“Performance Analysis of an LTE-4G Network Running Multimedia Applications”
“Performance Analysis of an LTE-4G Network Running Multimedia Applications”“Performance Analysis of an LTE-4G Network Running Multimedia Applications”
“Performance Analysis of an LTE-4G Network Running Multimedia Applications”
IRJET Journal
 
LTE Advance Pro
LTE Advance ProLTE Advance Pro
LTE Advance Pro
Mohammed Abuibaid
 
WC and LTE 4G module 1- 2019 by Prof. Suresha V
WC and LTE 4G  module 1- 2019 by Prof. Suresha VWC and LTE 4G  module 1- 2019 by Prof. Suresha V
WC and LTE 4G module 1- 2019 by Prof. Suresha V
SURESHA V
 
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
SANTIAGO PABLO ALBERTO
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
caijjournal
 
14A81A05A7
14A81A05A714A81A05A7
14A81A05A7
Chaitanya Ram
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
ijmnct
 
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
IRJET Journal
 

Similar to Performance Analysis of WiMAX and LTE Using NS-2 (20)

LTE_and_WiMAX_Comparison_and_Future_Pers.pdf
LTE_and_WiMAX_Comparison_and_Future_Pers.pdfLTE_and_WiMAX_Comparison_and_Future_Pers.pdf
LTE_and_WiMAX_Comparison_and_Future_Pers.pdf
 
Mobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validationMobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validation
 
Video steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTEVideo steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTE
 
D011112432
D011112432D011112432
D011112432
 
L010636772
L010636772L010636772
L010636772
 
A Comparative Study on 4G and 5G Technology for Wireless Applications
A Comparative Study on 4G and 5G Technology for Wireless ApplicationsA Comparative Study on 4G and 5G Technology for Wireless Applications
A Comparative Study on 4G and 5G Technology for Wireless Applications
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
comparsion of LTE and wimax
comparsion of LTE and wimaxcomparsion of LTE and wimax
comparsion of LTE and wimax
 
5G complete presentation 2016 upload
5G complete presentation 2016 upload5G complete presentation 2016 upload
5G complete presentation 2016 upload
 
Amit vishw
Amit vishwAmit vishw
Amit vishw
 
C011111523
C011111523C011111523
C011111523
 
Throughput Performance Analysis VOIP over LTE
Throughput Performance Analysis VOIP over LTEThroughput Performance Analysis VOIP over LTE
Throughput Performance Analysis VOIP over LTE
 
“Performance Analysis of an LTE-4G Network Running Multimedia Applications”
“Performance Analysis of an LTE-4G Network Running Multimedia Applications”“Performance Analysis of an LTE-4G Network Running Multimedia Applications”
“Performance Analysis of an LTE-4G Network Running Multimedia Applications”
 
LTE Advance Pro
LTE Advance ProLTE Advance Pro
LTE Advance Pro
 
WC and LTE 4G module 1- 2019 by Prof. Suresha V
WC and LTE 4G  module 1- 2019 by Prof. Suresha VWC and LTE 4G  module 1- 2019 by Prof. Suresha V
WC and LTE 4G module 1- 2019 by Prof. Suresha V
 
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 
14A81A05A7
14A81A05A714A81A05A7
14A81A05A7
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
 

Recently uploaded

哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
Madan Karki
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 

Recently uploaded (20)

哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 

Performance Analysis of WiMAX and LTE Using NS-2

  • 1. Afjal Hossen Mondul et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 11, (Part - 5) November 2015, pp.116-119 www.ijera.com 116 | P a g e Performance Analysis of WiMAX and LTE Using NS-2 Afjal Hossen Mondul, Rezwan Salmani Electrical and Electronic Engineering American International University-Bangladesh Dhaka, Bangladesh Electrical and Electronic Engineering American International University-Bangladesh Dhaka, Bangladesh Abstract The increasing use of wireless devices and in particular smart phones has resulted the need for greater capacity and higher speed than the existing network technologies. Hence, LTE (Long Term Evolution) and WiMAX (Worldwide Interoper- ability for Microwave Access) became the two leading technologies. Services are increasingly shifting from voice to data and from circuit-switched to packet-switched ones. Battle between LTE and WiMAX technologies is already heating up with WiMAX being ahead due to availability of standards through IEEE 802.16 and is up and running but lacks in substantial roll out plans due to cost. The targets for LTE indicate bandwidth increases as high as 100 Mbps on the downlink, and up to 50 Mbps on the uplink. However, this potential increase in bandwidth is just a small part of the overall improvement LTE aims to provide. This study illustrates the model and representation of LTE links and traffics using NS-2 network simulator and observation of TCP performance investigated. The Evaluation of the network performance with TCP is mainly based on congestion window behavior, throughput, average delay and lost packet. Keywords- NS-2 (Network Simulator-2), LTE (Long Term Evolution), Wimax (Worldwide Interoperability For Microwave Access), Technologies. I. INTRODUCTION In telecommunications, 4G is the fourth generation of cell phone mobile communications standards. There are many features associated with 4G, which make it promising. On the other hand, New applications required to be supported by new mobile systems include a variety; VoIP, video conference, multimedia messaging, multi-player games, virtual private networks (VPN), etc. All these applications require higher throughput, wider BW, smaller delay and innovative transmission methods that will give higher spectral efficiency and good quality. Two leading emerging technologies are: LTE (Long Term Evolution standardized by third generation partnership project(3GPP)and WiMAX (the IEEE802.16e,the worldwide interoperability for microwave access) are considered able to fulfill the 4G requirements announced by ITU-R which is known as International Mobile Telecommunications Advanced (IMT-Advanced).Future scope of both these technologies is enormous. Also, both the technologies have their own advantages and disadvantages. In future, a network may be possible which combines the advantages of both these technologies. Our report hopes to bring forth ns2 simulations of two of the most widely used wireless network technologies. In particular we will be running simulations of both LTE and WiMax network, and then compare their performances to each other, in hopes to discover which one of the two technologies is better. II. WIMAX WiMAX stands for Worldwide Interoperability for Microwave Access, which supports point to multi-point (PMP) broadband wireless access. WiMAX technology enables ubiquitous delivery of wireless broadband service for fixed and mobile users, and became a reality in 2006 when Korea Telecom started the deployment of a 2.3 GHz version of mobile WiMAX service called WiBRO in the Seoul metropolitan area to offer high performance for data and video. In a recent market forecast published in April 2008, WiMAX Forum Subscriber and User Forecast Study, the WiMAX Forum projects a rather aggressive forecast of more than 133 million WiMAX users globally by 2012 (WiMAX Forum, 2008c). The WiMAX Forum also claims that there are more than 250 trials and deployments worldwide. The air interface of WiMAX technology is based on the IEEE 802.16 standards. In particular, the current Mobile WiMAX technology is mainly based on the IEEE 802.16e amendment (IEEE, 2006a), approved by the IEEE in December 2005, which specifies the Orthogonal Frequency Division Multiple Access (OFDMA) air interface and provides support for mobility. The IEEE wireless standard has a range of up to 30 miles, and can deliver broadband at around 75 megabits per second. This is theoretically, 20 times faster than a commercially available wireless broadband. WiMax can be used for wireless networking like the popular WiFi. WiMax, a second- generation protocol, allows higher data rates over longer distances, efficient use of bandwidth, and avoids interference almost to a minimum. WiMax can RESEARCH ARTICLE OPEN ACCESS
  • 2. Afjal Hossen Mondul et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 11, (Part - 5) November 2015, pp.116-119 www.ijera.com 117 | P a g e be termed partially a successor to the Wi-Fi protocol, which is measured in feet, and works, over shorter distances. III. LTE Long Term Evolution (LTE) is a significant project of 3rd Generation Partnership Project (3GPP), initially proposed on the Toronto conference of 3GPP in 2004 and officially started as LTE work item in 2006. LTE, as a transition from the 3rd generation (3G) to the 4th generation (4G), has achieved great capacity and high speed of mobile telephone networks without doubt. It defines a new packet-only wideband radio with flat architecture and assumes a full Internet Protocol (IP) network architecture in order to assure voice supported in packet domain in design. In addition, it is combined with top-of-the-line radio techniques in order to gain better performance than Code Division Multiple Access (CDMA) approaches. LTE provides scalable carrier bandwidths from 1.4 MHz to 20 MHz and frequency division duplexing (FDD), as well as time division duplexing (TDD). In this paper, it presents an overall description of LTE technology separately in different aspects of LTE architecture and technical principles to clarify how LTE as a radio technology achieves a high performance for cellular mobile communication systems. LTE has multiple access principles such as OFDMA for DL and SC-FDMA for UL. Table 1: LTE Requirements Technical Items LTE-Advanced, IMT Requirement Downlink peak data rates 1 Gbps (low mobility 15 km/hr) Uplink peak data rates 500 Mbps (low mobility 15 km/hr) Bandwidth Scalable up to 100 MHz User plane latency 10 ms Control plane latency 50 to 100 ms Uplink peak spectral efficiency 15 bps/Hz Downlink peak spectral efficiency 30 bps/Hz Access Scheme OFDMA IV. SIMULATION SOFTWARE: NS2 Many network simulation softwares are available in market. Some of the leading network simulators are Qualnet, Ns-2, JiST/SWANS, Opnet, Omnett, Netsim REAL, SSFNet, JSimetc. Here we present a quick comparison of various available network simulation software. But we have decided to use NS- 2(Network Simulator-2) because of its following features and advantages over other simulators: Popular used in academia and industries Open Source software Provides greater accuracy and speed of testing Supports large number of external protocols Programming can be done using tclscript and/or C++ Provided with visualization tools Complex scenarios can be easily tested More ideas can be tested in a smaller timeframe Network Simulator version 2 (NS-2) is discrete event packet level simulator. The network simulator covers a very large number of application of different kind of protocols of different network types consisting of different network elements and traffic models. NS-2 is a package of tools that simulates behavior of networks such as creating network topologies, log events that happen under any load, analyze the events and understand the network. Platform required to run network Simulator 1. Unix and Unix like systems  Linux  Free BSD  SunOS/Solaris  2. Windows 95/98/NT/2000/XP/7/8.1 (requires Cygwin). Simulation System Architecture Figure 1: Working in NS2 V. PARAMETERS COMPARED  Packet delivery ratio: Packet dropping is where network traffic fails to reach its destination in a timely manner. Most commonly packets get dropped before the destination can be reached PDR = (No. of Packets received / No of Packets sent)*100  Throughput: Network throughput is the average rate of successful message delivery over a communication
  • 3. Afjal Hossen Mondul et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 11, (Part - 5) November 2015, pp.00-00 www.ijera.com 118 | P a g e channel. This data may be delivered over a physical or logical link, or pass through a certain network node. The throughput is usually measured in bits per second (bit/s or bps), and sometimes in data packets per second or data packets per time slot. Throughput T =No.of bytes*8/(Finish time-Start time) bps  Delay: Delay refers to the amount of time it takes for a bit to be transmitted from source to destination. It can take a long time for a packet to be delivered across intervening networks. In reliable protocols where a receiver acknowledges delivery of each chunk of data, it is possible to measure this as round-trip time. One way to view latency is how long a system holds on to a packet. That system may be a single device like a router, or a complete communication system including routers and links. Delay of packets in the network can be measured through the trace file obtained after the execution of code. End to end delay D = (Td - Ts) seconds where Td is the packet receive time at the destination and Ts is packet send time at source node. VI. SIMULATION RESULTS Figure 2: LTE Throughput Figure 3: WiMax Throughput Figure 4: LTE Packet Loss Rate Figure 5: Wimax Packet Loss Rate Figure 6: LTE Delay
  • 4. Afjal Hossen Mondul et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 11, (Part - 5) November 2015, pp.116-119 www.ijera.com 119 | P a g e FIGURE 7: WIMAX DELAY VII. FUTURE IMPROVEMENTS For future work individuals may choose to implement the 802.11ac standard for WiMax instead of our 802.11g standard. This will undoubtedly result in a simulation more concurrent with today’s technologies. Individuals may also implement larger traffic to represent high-definition video calling by users. VIII. CONCLUSION For our report we have brought forth ns2 simulations of LTE and WiMax, currently the two most widely used network technologies. Using the capabilities of ns2 we have successfully simulated and collected data from both the LTE and WiMax topologies. From the data, it can be seen from their established graphs that the throughput, delay for both technologies are very similar. Small performance differences in the two technologies can be seen from the packet loss and delay graphs, which show LTE as the prevailing technology. As a result, it is fair to conclude that LTE provides a more fluid experience when performing voice calls over the internet. Although LTE has prevailed as the better technology. REFERENCES [1] Information Sciences Institute, The Network Simulator, http://www.isi.edu/ nsnam/ns/, June 2011 [2]. The ns-2 network simulator, retrieved from http://teacher.buet.ac.bd/ashikur/ns2/,Septe mber 2011 [3]. The SSF Research Network, retrieved from http://ssfnet.org/, September 2011 [4] OPNET simulator, retrieved from http://www.opnet.com/, September 2011 [5] 3GPP R1-072261, LTE Performance Evaluation-Uplink Summary, May 2007 [6]. Tejas Bhandare, “LTE and WiMAX Comparison”, Santa Clara University, 2008, White Paper [7] WiMAX Forum White Paper, Mobile WiMAX Part I: A Technical Overview and Performance Evaluation, August 2006 [8] LTE Deployments, retrieved from http://ltemaps.org/, March 2015 [9] Dieter Eberle, LTE vs. WiMAX 4th generation telecommunication networks, 2010 [10] WiMAX Deployments, retrieved from http://www.wimaxmaps.org/, March 2015 Authors Profile Md. Afjal Hossen Mondul Pursuing Masters of Electrical and Electronic Engineering from American International University-Bangladesh (AIUB). He received his BSc in Electrical Engineering from AIUB in October 2013. Presently he is involved in network simulator research. I’m interested in networking and telecommunication which made me to do this paper. Md. Rezwan Salmani is an Assistant Network Engineer of Spectrum Engineering Consortium Ltd. He received his BSc in Electrical and Electronic Engineering from American International University Bangladesh (AIUB) in 2013.