The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The availability and reasonable cost of broadband Internet made it an attractive and favourable option to billions of users worldwide. Being a fast service also encourages its users to use real-time applications which is streaming and live data transfer includes VoIP and video streaming. The performance of such applications in Wireless Local Area Network (WLAN) may be highly affected by security protocols...
The availability and reasonable cost of broadband Internet made it an attractive and favourable option to billions of users worldwide. Being a fast service also encourages its users to use real-time applications which is streaming and live data transfer includes VoIP and video streaming. The performance of such applications in Wireless Local Area Network (WLAN) may be highly affected by security protocols...
Currently and due to its wide use, the wireless networks in conformance with IEEE 802.11 standard are generating channels saturation, that provokes interference between themselves. IEEE 802.11n is one of the standards that offers greater benefits to improve the wireless network performance. In this paper we analyze the performance of wireless network in conformance with IEEE 802.11n standard to evaluate...
In this article, we analyze the performance evaluation of WiFi technology in conformance with IEEE 802.11b/n/ac standards and Wireless Distribution System (WDS) for indoor environments with and without obstacles. We present different scenarios by varying the distance between transmitter and receiver. We analyzed the performance of the network by using the intrusive technique of traffic injection with...
Inventions in electronics and communication industries increased rapidly the utilization of wireless sensor networks, still the selection of the routing algorithm is done application wise. The existing routing protocols are having many problems and limitations in terms of Quality of Service parameters, like energy consumption is more, delay and jitter are high, throughput and packet delivery ratio...
Broadband signal transmission through communication channels in home environments is one of the interesting topics in the field of intelligent buildings. Building designers are interested in transferring multimedia content with minimum cost, energy consumption, and acceptable quality. Limitations and drawbacks of existing transmission systems such as coaxial cable, wireless transmission, etc., have...
With an increasing use of Long-Term Evolution (LTE) in mobile networks, it is necessary to evaluate its performance. In this paper, we evaluate the performance of Long Term Evolution (LTE) for mobile networks under Transmission Control Protocol (TCP) traffic. We evaluate the performance of LTE for TCP traffic for both the directions uplink as well as downlink. During the evaluations, we focus on the...
This article describes the performance evaluation of a new wireless TCP algorithm in real environments, in order to identify the advantages and disadvantages of its operation. We evaluate the proposed wireless TCP algorithm with respect to generic TCP, considering an intrusive technique by using traffic injection. These tests were performed over point-to-point WiFi and WiMAX links in out-door and...
Usage of wireless networks is rising in popularity. In this setting different kinds of networks for indoor environments, such as Ad-Hoc, IEEE 802.11b (Wi-Fi) and Wireless Distribution System (WDS) has been developed. In this paper, an analysis of Quality of Service (QoS) has been made for each network in order to verify the values of bit rate, delay, jitter and packet loss. For performance comparison...
Industrial application of wireless sensor networks require timelines in exchanging messages among nodes. IEEE 802.15.4 is a standard to address the need for low-rate low-power low-cost wireless networking. In wired connection, the components such as actuators or sensors provides high performance besides wired links consist of many mechanical problems. Hence to achieve low latency, high performance...
Virtualization is a technology and a trend most studies and industries are putting their interest on. The capability of virtualization to carry out, perform, and deliver the task which a physical computer/server does is just one of the many benefits it has. A term open source is also buzzing the internet world; platforms OpenNode, Proxmox, and OpenVPN are examples of such. This paper evaluated the...
With the wireless technologies being widely used, it is for sure that all types of wireless networking will become more and more popular now and in the near future. Therefore, measurement-based performance evaluation of different wireless network standards and traffics is becoming very important. In this research paper, the wireless local area network performance differences between IEEE 802.11n and...
Virtualization is a key technology to enable cloud computing. It enhances resource availability and offers high flexibility and cost effectiveness. However, the driver domain-based model for network I/O virtualization exhibit poor networking performance. In this paper, we evaluate the networking performance of VMs based on Xen. The I/O channel transferring packets between the driver domain and the...
Wimax is an broadband wireless technology based on IEEE 802.16. It is very helpful and cheaper than other possible solutions. It is purely based on the 4G technology for the upcoming generation. In wireless technology the major problem is speed, Quality of Service, data rates in order to overcome that they going for some valuable technology. In this paper we consider WIMAX and WLAN for controlling...
Video streaming is the real time delivery process of video to the user's media player services. In multimedia streaming technique, the user can access data while it is being transferred. To meet the demand of providing high-quality of video streaming, it is important to design suitable QoS model. Hence, in this project, we designed around streaming services using an Internet topology on expected video...
Wireless Mesh Networks (WMNs) extend the range of the IEEE 802.11 Wi-Fi beyond the one-hop range. This has made it an attractive research topic given the exponential growth in Wi-Fi portable devices. However, the multi-hop nature of WMNs creates many new challenges, primarily in the Medium Access Control (MAC) layer. Specifically, the IEEE 802.11 Medium Access Control (MAC) layer is designed for a...
In WiMAX architecture to avoid congestion at the base station, a mechanism namely WiMAX Fair Intelligent Congestion Control (WFICC) was proposed in [11]. WFICC ensures that the traffic is scheduled in such a way that the base station output buffer operates around a target operating point, without violating the Quality of Service (QoS) requirements of connections. However, only preliminary results...
The purpose of this research is to design and evaluate a new queue management algorithm effectively controlling the heavy-tailed traffics. Among active queue managements (AQM), Random Early Detection (RED), has been widely used to improve the TCP throughput. The heavy-tailed traffic, however, generates the large fluctuation on the queue causing the degradation of fairness in terms of jitter performance...
In this paper we propose the channel assignment scheme for multi-channel wireless mesh network (WMN), where each mesh router is equipped with multiple radio interfaces. In real WMN the number of radio interfaces is much higher than the number of non-overlapping channels, which causes a lot of connections between mesh nodes operate on the same radio channel. Increasing number of simultaneous transmissions...
We present a simulation-based study of the impacts of different types of attacks in mobile ad hoc networks (MANETs). We consider three common types of attacks: blackhole attack, jellyfish attack and neighbor attack. Specifically, we study how the number of attackers and their positions affect the performance metrics of a connection such as packet delivery ratio, throughput, end-to-end delay, and delay...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.