SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 04 Pages: 3118-3123 (2017) ISSN: 0975-0290
3118
IEEE 802 Standard Network’s Comparison under
Grid and Random Node Arrangement in 2.4 GHz
ISM Band for Single and Multiple CBR Traffic
J.Jaslin deva gifty
Department of ECE, Dr. Mahalingam College of Engineering & Technology, Udumalai Road,Pollachi -642003
Email: jaslindevaece@gmail.com
Dr.K.Sumathi
Department of ECE, Dr. Mahalingam College of Engineering & Technology, Udumalai Road,Pollachi -642003
Email: sumathimin@gmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
The IEEE 802 standard well-known as 802.11 called as Wi-Fi network, 802.15.4 called as ZigBee or sensor
network and 802.15.1 called as Bluetooth network. The network such as ZigBee, Bluetooth and Wi-Fi works in 2.4
GHz ISM band. All the above networks works in same ISM band of 2.4 GHz, but the performance of the network
varies. The performance of simulation depends upon the coverage area, data rates, and power consumption in
each network. The heterogeneous network performances is evaluated with static and mobility model in random
and grid node placement by varying the traffic loads of one CBR and with five CBR for each network. The
simulation result is compared in terms of jitter, average end to end delay and throughput to analyze the network
performance in the 2.4 GHz frequency band. IEEE 802.11 network shows the low jitter and delay value with high
throughput compared with sensor network.
Keywords - CBR traffic loads, IEEE 802.15.4, IEEE 802.11, Qualnet 5.0.2 simulator, Wireless Sensor Networks (WSNs).
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Jan 18, 2017 Date of Acceptance: Jan 31, 2017
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
The unlicensed ISM band is abbreviated as Industrial,
Scientific and Medical is widely used among popular
wireless network standards such as IEEE 802.15.4 called
as Low-Rate Wireless Personal Area Network (LRWPAN)
such as ZigBee or sensor network IEEE 802.15.1, called
as Bluetooth network and IEEE 802.11b called as Wireless
Local Area Network (WLAN) such as Wi-Fi or ad-hoc
manet network. As the demand for the usage of ISM band
is increasing rapidly, there are many scenarios where we
need communication access such as wireless local area
networks (WLANs) based on IEEE 802.11b specifications
and wireless personal area networks (WPANs) on IEEE
802.15.4 based and Bluetooth specifications. Wireless
Sensor Network (WSN) is a promising and ever growing
sensor technology for implementing variety of
applications like monitoring of environment, security
aspects and applications that save our lives and assets. In
WSN, more number of sensor nodes are adapted to
sensing and gathering information and forwarding to the
base station such as PAN coordinator with the help of
routing protocol [1]. A WSN is the spatially distributed
autonomous network for monitoring and collecting
information about environmental conditions like, sound,
temperature, pressure etc., WSNs are subdivided into two
classes namely static WSNs and mobile WSNs [2].
Random based placement of sensor nodes and grid based
placement of sensor nodes working depends on location
[3]. WSNs are the integration of many technologies, such
as communication in wireless medium, sensors network,
embedded computing and distributed information
processing. It is widely used for military purposes,
environmental conditions, medical field, transport and
other fields [4].Different traffic applications are constant
bit rate (CBR), variable bit rate (VBR), and file transfer
protocol (FTP) are used to analyze the performance of
each network [5]. Mobile ad-hoc network is wireless
network of mobile nodes without any centralized
administration. The network topology changes
periodically in mobile ad-hoc network [6]. IEEE 802.11 is
the standard family of wireless networking. It is the first
wireless LAN (WLAN) standard proposed in the year
1997. The medium access mechanism function, called the
Distributed Coordination Function (DCF) is a Carrier
Sense Multiple Access with Collision Avoidance
mechanism (CSMA/CA) [7]. It uses microwaves
frequency in the range of 2.4 GHz and 5GHz. Ad hoc
network mobile nodes do not have any definite form of
infrastructure. They are self-organized structure and
communication done by wireless links [8]. The standard
802.11 provides two variations in radio frequency (RF)
physical (PHY) layer. These include two modulation
techniques such as direct sequence spread spectrum
(DSSS) and frequency-hopping spread spectrum (FHSS)
[9]. In the current era the interacting technologies are Wi-
Fi and WLAN technologies. Many researches are being
done in different networking field such as peer to peer or
point to point network, cellular wireless, file server, World
Wide Web and grid computing system. The mobility in
distributed network provides the best quality of services to
the clients and the mobility is important to accommodate
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 04 Pages: 3118-3123 (2017) ISSN: 0975-0290
3119
the demand in wireless network. The routing protocols
plays major role in all kinds of network either static or
dynamic model. The Ad hoc On-Demand Distance Vector
(AODV) routing protocol is an on-demand approach to
identify the most recent path by employing destination
sequence numbers. Here, the next-hop information stored
in the source node and the intermediate nodes
corresponding to each flow for data packet transmission.
In an on-demand routing protocol, the source node floods
the Route Request packet in the network when a route is
not available for the desired destination. It may also obtain
multiple routes to different destinations from a single
Route request [11]. AODV provides better throughput and
high packet delivery ratio compared to other protocols
under grid and random placement [12].The efficiency of
AODV gives better throughput and performance of AODV
plays better role in all case of topologies [13].
The rest of the paper is organized as follows. Chapter II
addresses the ISM band and different network
technologies. Simulation parameters and results are
discussed in Chapter III. Conclusions are given in Chapter
IV.
II. ISM BAND
The ISM band is the parts of the radio spectrum or
refers to a group of radio bands that are internationally
reserved for the use of radio frequency (RF). ISM bands
are generally open frequency bands, which vary according
to different regions and permits. It uses the unlicensed
ISM ranges are 902-928 MHz, 2400-2483.5 MHz and
5725-5850.
1.1 IEEE 802.11 (WI-FI)
The IEEE 802.11 standard is the WLAN wireless
communication network and also called as Mobile Ad-hoc
Network (MANET). It is intended for device to device or
computer to computer wireless communication, as a
replacement for cabled connection or wired networks. It
gives internet access at broadband speeds through the
connection access point. Wi-Fi gives a data rate in higher,
whereas Bluetooth and ZigBee network gives lower data
rates. Wi-Fi operates with either a 2.4, 5 GHz or 5.8GHz
frequency band. It supports large number of nodes in a
network when compared to other networks. The range is
from 10-100m. The data rate is 2 - 54 M bits/sec and has
medium power consumption. It uses star topology
1.2 IEEE 802.15.1(Bluetooth)
The IEEE 802.15.1 standard is the WPAN wireless
communication network or Bluetooth network. It is
intended to enable the communication in short-range that
supports peripherals devices such as computer mice,
keyboards, printer etc., This range is known as wireless
personal area network. It also operates with a 2.4 GHz
frequency band. The range is 10-30m with data rate of 1M
bits/sec. Due to low data rate, the complexity and power
consumption is low. The frequency hopping modulation
technique is used and uses star topology.
1.3 IEEE 802.15.4(ZigBee)
The IEEE 802.15.4 standard is the WPAN wireless
communication network .For example ZigBee network. It
is a standard that defines the set of communication
protocols for low-data-rate, short-range wireless
communication networking. ZigBee based wireless
devices operate in 868 MHz, 915 MHz and 2.4 GHz
frequency band. The 868 MHz band used in Europe, the
915 MHz frequency band in North America, whereas 2.4
GHz frequency band is used in world wide. The maximum
data rate is 250 K bits/sec. The range supported is 10-30m.
Due to low data rate, the complexity and power
consumption is less than Bluetooth. It uses direct sequence
spread spectrum and frequency hopping spread spectrum
modulation technique. It uses star, tree and mesh
topologies.
III. SIMULATION AND RESULTS
The simulation is performed with the following
parameters mentioned in Table I.
TABLE I
Simulation parameters
Parameters Values
Area 1000m*1000m
Simulation Time 300sec
Item to send 100
Packet size 50 bytes
Packet rate (packet per sec) 0.1.0.2,1,2
MAC layer 802.15.4, 802.11
Energy Model Mica motes
Battery Model Linear model
Protocol AODV
Node placement Random, Grid
No of nodes 10
Traffic CBR
The nodes are placed both randomly and in the form of
grid for both network as shown in Fig 1 and 2 for static
model.The random mobility model shown in Fig 3. The
simulation is carried out by varying the data rate per
packet interval in both static and dynamic model.
Fig.1.Random placement
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 04 Pages: 3118-3123 (2017) ISSN: 0975-0290
3120
Fig.2.Grid placement
Fig.3.Moblity model
3.1 Average jitter
Average jitter versus packet interval in static
model with one and five CBR is shown in Fig 3. Fig 4
shows the jitter comparison is static model with one CBR
for 802.15.4 and 802.11. The network 802.11 shows lower
jitter in static model. The jitter is low for 0.1 packet
interval and increases with the increase in packet interval
and high at 0.4 packet interval for both networks. The Fig
5 and Fig 6 shows the mobility model with one and five
CBR for 802.15.4 and 802.11. In mobility model also, the
network 802.11 has low jitter as compared with sensor
network. The grid placed static and mobility model is
shown in Fig 7 and Fig 8 shows lower jitter for 802.11
networks for all packet interval.
Fig.4.Average jitter in static model with one CBR
Fig .5. Average jitter in static model with five CBR
Fig.6. Average jitter in mobility model with one CBR
Fig.7. Average jitter in mobility model with five CBR
Fig.8 Grid placed average jitter in static model
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 04 Pages: 3118-3123 (2017) ISSN: 0975-0290
3121
Fig.9 Grid placed average jitter in mobility model
3.2 Average end to end delay
Average end to end delay versus packet interval in static
model with one and five CBR is shown in Fig 9 and in Fig
10 for 802.15.4 and 802.11. The network 802.11 shows
low delay in static model. The delay is low at 0.1 packet
intervals and increases when packet interval increases and
high at 0.4 packet interval for both networks. The Fig 11
and Fig 12 shows the mobility model with one and five
CBR for 802.15.4 and 802.11.In mobility model, network
802.11 has lower delay as well. The grid placed static and
mobility model is shown in Fig 13 and Fig 14 shows lower
delay for 802.11 networks for all packet interval.
Fig.10.Average delay in static model with one CBR
Fig .11. Average delay in static model with five CBR
Fig.12. Average delay in mobility model with one CBR
Fig.13. Average delay in mobility model with five CBR
Fig.14. Grid placed average delay in static model
Fig.15. Grid placed average delay in mobility model
3.4 Throughput
Throughput versus packet interval in static model with
one and five CBR is shown in Fig 15 and in Fig 16 for
802.15.4 and 802.11. The network 802.11 shows higher
throughput in static model. The throughput is high at .1
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 04 Pages: 3118-3123 (2017) ISSN: 0975-0290
3122
packet intervals and decreases when packet interval
increases and low at .4 packet interval for both networks
Fig.16.Throughput static model with one CBR
The Fig 17 and Fig 18 shows the mobility model with one
and five CBR for 802.15.4 and 802.11.In mobility model,
network 802.11 has higher throughput as well. The grid
placed static and mobility model is shown in Fig 19 and
Fig 20 shows higher throughput for 802.11 networks for
all packet interval.
Fig .17. Throughput in static model with five CBR
Fig .18. Throughput in mobility model with one CBR
Fig.19. Throughput in mobility model with five CBR
Fig.20 Grid placed throughput in static model
Fig.21.Grid placed throughput in mobility model
IV. CONCLUSION
The performance evaluated using qualnet simulator.The
two IEEE 802 standard works in 2.4Ghz ISM band.The
result shows the performance of 802.11 and IEEE
802.15.4 in random placement and grid placement for
static and mobility model with single and multiple CBR
traffic loads. The simulation performance of the IEEE
802.11 network shows the low jitter and low delay value
followed by high throughput when compared to the
standard network of 802.15.4.The performance
degradation of this network is due to the low coverage
area and has low data rates though works in the same
2.4GHz ISM frequency band. The future scope is to detect
the collision of two network by placing in heterogeneous
manner.
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 04 Pages: 3118-3123 (2017) ISSN: 0975-0290
3123
REFERENCES
.
[1] P.N.Renjith and E.Baburaj, “Analysis On Ad Hoc
Routing Protocols In Wireless Sensor Networks”,
in International Journal of Ad hoc, Sensor &
Ubiquitous Computing (IJASUC), Vol.3, No.6, pp.
3480-3493.2012.
[2] P. Samundiswary, K Dilip, “Performance Analysis
of Energy Aware LAR Protocol in IEEE 802.15.4
based Mobile Wireless Sensor Networks”, in
International Journal of Innovative Technology and
Exploring Engineering (IJITEE), Vol 3, Issue-
9,pp.1243-1255, 2014.
[3] PratibhaKevre, LaxmiShrivastava., “Compare
threereactive routing protocols in grid based cluster
wireless sensor network using qualnet simulator”,
in International journal of Applied Sciences and
Engineering Research, Vol. 3, No. 2, 2014
[4] Manju Khurana “Direction Determination in
Wireless Sensor Networks Using Grid
Topology”,in Journal Of Emerging Technologies In
Web Intelligence, Vol. 5, No. 2, 2013
[5] Gurjit Kaur, Kunal Malik and Kiran Ahuja.,
“Impact on Power Consumption of ZigBee based
Home Automation Network using Various
Traffic”, in International Journal of Future
Generation Communication and Networking ,Vol.6,
No.6 , pp.17-24,2013.
[6] Dhanvanthri Gokulkrishna1, Rinki Sharma,
Narasimha Murthy3, “Design And Implementation
Of A Routing Protocol For Mobile Ad
HocNetworks”, In Sastech 29, Vol.10, Issue 2,
2011.
[7] Manish Uzzwal1, Rajan Sharma2, “Energy
Efficient MAC Protocol & Radio Energy Model for
AODV & Bellman Ford Routing Protocol”, in
IOSR Journal of Electronics and Communication
Engineering (IOSR-JECE).Vol 9, Issue 1, pp. 44-50
,2014.
[8] Prinu C. PhilipȦ, Rajeev PaulusȦ, A.K. JaiswalȦ
and A. AshokȦ, “Comparative Analysis of Adhoc
Routing Protocols in Wi-Fi & Wi Max Networks
using QualNet 6.1”, in International Journal of
Current Engineering and Technology, Vol.4, No.1
2014.
[9] Prof. K.H. Wandra, Dr. Ketan Kotecha and Mitul
R. Khandhedia, “Various effect of modulation
schemes on Wi-Fi Network using Qualnet
Simulator”, in International Conference on
Education Technology and Computer
(ICETC),2010.
[10]
[11]
[12]
[13]
Pulak Singh, Mayur Kumar and
A.K.Jaiswal,“Characteristic Analysis of Mobility
using Heterogeneous Network”, in International
Journal of Computer Applications, Vol. 119,No.9,
2015.
Dr. Sumathi.K, Kiruthika Gowri.D Sathiyapriya.T
Sureshkumar.K, “Performance Analysis of various
MANET Protocols based on Route Processing
using different Antenna Models”,
Dr. Sumathi, K. Suresh Kumar, T. Sathiyapriya,
and D. Kiruthika Gowri , “An Investigation on the
Impact of Weather Modelling on Various MANET
Routing Protocols”, in Indian Journal of Science
and Technology, Vol 8(15), 59557, July 2015.
Jaslin Deva Gifty. J and Dr Sumathi K,
“Simulation Of Wireless Sensor Network With
Hybrid Topology “in ICTACT Journal On
Communication Technology, March 2016, Volume:
07, Issue .01.

Más contenido relacionado

La actualidad más candente

VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
 
Opnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo sOpnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo seSAT Publishing House
 
Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...IJECEIAES
 
Wireless Sensor Networks UNIT-2
Wireless Sensor Networks UNIT-2Wireless Sensor Networks UNIT-2
Wireless Sensor Networks UNIT-2Easy n Inspire L
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Wide-Area Wireless Networks (WANS) – GSM Evolution
Wide-Area Wireless Networks (WANS) – GSM EvolutionWide-Area Wireless Networks (WANS) – GSM Evolution
Wide-Area Wireless Networks (WANS) – GSM EvolutionDon Norwood
 
Simulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical LayerSimulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical LayerIOSR Journals
 
Data Communication and Computer Networking Part # 1
Data Communication and Computer Networking Part # 1Data Communication and Computer Networking Part # 1
Data Communication and Computer Networking Part # 1Quaid-i-Azam University
 
Network system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyNetwork system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyManas Saha
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos incaijjournal
 
4 g communication architecture
4 g communication  architecture4 g communication  architecture
4 g communication architectureIAEME Publication
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDon Norwood
 
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...Xi'an Jiaotong-Liverpool University
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerAbdelkhalik Mosa
 

La actualidad más candente (19)

VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
 
J010216776
J010216776J010216776
J010216776
 
Ieee standards
Ieee standardsIeee standards
Ieee standards
 
Opnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo sOpnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo s
 
Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...
 
Wireless Sensor Networks UNIT-2
Wireless Sensor Networks UNIT-2Wireless Sensor Networks UNIT-2
Wireless Sensor Networks UNIT-2
 
What is WPAN?
What is WPAN?What is WPAN?
What is WPAN?
 
Unit 3
Unit 3Unit 3
Unit 3
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Wide-Area Wireless Networks (WANS) – GSM Evolution
Wide-Area Wireless Networks (WANS) – GSM EvolutionWide-Area Wireless Networks (WANS) – GSM Evolution
Wide-Area Wireless Networks (WANS) – GSM Evolution
 
Simulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical LayerSimulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical Layer
 
Data Communication and Computer Networking Part # 1
Data Communication and Computer Networking Part # 1Data Communication and Computer Networking Part # 1
Data Communication and Computer Networking Part # 1
 
Network system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyNetwork system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & Technology
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 
IEEE 802 standards
IEEE 802 standardsIEEE 802 standards
IEEE 802 standards
 
4 g communication architecture
4 g communication  architecture4 g communication  architecture
4 g communication architecture
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical Layer
 

Destacado

Requirement to Improve C.B.R value in Black Cotton Soil in Saline Condition: ...
Requirement to Improve C.B.R value in Black Cotton Soil in Saline Condition: ...Requirement to Improve C.B.R value in Black Cotton Soil in Saline Condition: ...
Requirement to Improve C.B.R value in Black Cotton Soil in Saline Condition: ...ijsrd.com
 
Catálogo Ingeniar Solutions Portafolio
Catálogo Ingeniar Solutions PortafolioCatálogo Ingeniar Solutions Portafolio
Catálogo Ingeniar Solutions Portafolioingeniarsolutions
 
A Review of Machine Learning based Anomaly Detection Techniques
A Review of Machine Learning based Anomaly Detection TechniquesA Review of Machine Learning based Anomaly Detection Techniques
A Review of Machine Learning based Anomaly Detection TechniquesEditor IJCATR
 
Customer Presentation - KCP&L
Customer Presentation - KCP&LCustomer Presentation - KCP&L
Customer Presentation - KCP&LSplunk
 
Ficha información padres actividades visita a oviedo lengua e historia
Ficha información padres  actividades  visita a oviedo lengua e historiaFicha información padres  actividades  visita a oviedo lengua e historia
Ficha información padres actividades visita a oviedo lengua e historiaActividadesIESULGIJON
 
Separata princpios y fines de la educación peruana tumbes
Separata princpios y fines de la educación peruana tumbesSeparata princpios y fines de la educación peruana tumbes
Separata princpios y fines de la educación peruana tumbesDarwin Lazo Espino
 
Ficha información padres 22_f_actividades (1)
Ficha información padres  22_f_actividades (1)Ficha información padres  22_f_actividades (1)
Ficha información padres 22_f_actividades (1)ActividadesIESULGIJON
 
Ficha información padres ciudadela bh2 b
Ficha información padres  ciudadela bh2 bFicha información padres  ciudadela bh2 b
Ficha información padres ciudadela bh2 bActividadesIESULGIJON
 
Parametric Characterization and Model Prediction of CBR Values of Stabilized ...
Parametric Characterization and Model Prediction of CBR Values of Stabilized ...Parametric Characterization and Model Prediction of CBR Values of Stabilized ...
Parametric Characterization and Model Prediction of CBR Values of Stabilized ...IJMER
 
Media Kit FUNtastico 2009
Media Kit FUNtastico 2009Media Kit FUNtastico 2009
Media Kit FUNtastico 2009Gustavo Coelho
 
Higiene Oral2[1]
Higiene Oral2[1]Higiene Oral2[1]
Higiene Oral2[1]guesta482db
 
Exercicis pràctics sobre canals mutimèdia
Exercicis pràctics sobre canals mutimèdiaExercicis pràctics sobre canals mutimèdia
Exercicis pràctics sobre canals mutimèdiaFundació CATIC
 
Presentación tarea bloque II del Curso "Diseño de presentaciones y su publica...
Presentación tarea bloque II del Curso "Diseño de presentaciones y su publica...Presentación tarea bloque II del Curso "Diseño de presentaciones y su publica...
Presentación tarea bloque II del Curso "Diseño de presentaciones y su publica...PVPique
 

Destacado (20)

Requirement to Improve C.B.R value in Black Cotton Soil in Saline Condition: ...
Requirement to Improve C.B.R value in Black Cotton Soil in Saline Condition: ...Requirement to Improve C.B.R value in Black Cotton Soil in Saline Condition: ...
Requirement to Improve C.B.R value in Black Cotton Soil in Saline Condition: ...
 
Catálogo Ingeniar Solutions Portafolio
Catálogo Ingeniar Solutions PortafolioCatálogo Ingeniar Solutions Portafolio
Catálogo Ingeniar Solutions Portafolio
 
A Review of Machine Learning based Anomaly Detection Techniques
A Review of Machine Learning based Anomaly Detection TechniquesA Review of Machine Learning based Anomaly Detection Techniques
A Review of Machine Learning based Anomaly Detection Techniques
 
Customer Presentation - KCP&L
Customer Presentation - KCP&LCustomer Presentation - KCP&L
Customer Presentation - KCP&L
 
Ficha información padres actividades visita a oviedo lengua e historia
Ficha información padres  actividades  visita a oviedo lengua e historiaFicha información padres  actividades  visita a oviedo lengua e historia
Ficha información padres actividades visita a oviedo lengua e historia
 
Separata princpios y fines de la educación peruana tumbes
Separata princpios y fines de la educación peruana tumbesSeparata princpios y fines de la educación peruana tumbes
Separata princpios y fines de la educación peruana tumbes
 
Ficha información padres 22_f_actividades (1)
Ficha información padres  22_f_actividades (1)Ficha información padres  22_f_actividades (1)
Ficha información padres 22_f_actividades (1)
 
Ficha información padres ciudadela bh2 b
Ficha información padres  ciudadela bh2 bFicha información padres  ciudadela bh2 b
Ficha información padres ciudadela bh2 b
 
Sesión de aprendizaje GIMNASIA
Sesión de aprendizaje GIMNASIASesión de aprendizaje GIMNASIA
Sesión de aprendizaje GIMNASIA
 
Parametric Characterization and Model Prediction of CBR Values of Stabilized ...
Parametric Characterization and Model Prediction of CBR Values of Stabilized ...Parametric Characterization and Model Prediction of CBR Values of Stabilized ...
Parametric Characterization and Model Prediction of CBR Values of Stabilized ...
 
Media Kit FUNtastico 2009
Media Kit FUNtastico 2009Media Kit FUNtastico 2009
Media Kit FUNtastico 2009
 
Servicios
ServiciosServicios
Servicios
 
Depepito
DepepitoDepepito
Depepito
 
Higiene Oral2[1]
Higiene Oral2[1]Higiene Oral2[1]
Higiene Oral2[1]
 
Pacie
PaciePacie
Pacie
 
Blogs de aula
Blogs de aulaBlogs de aula
Blogs de aula
 
Exercicis pràctics sobre canals mutimèdia
Exercicis pràctics sobre canals mutimèdiaExercicis pràctics sobre canals mutimèdia
Exercicis pràctics sobre canals mutimèdia
 
Milagrost
MilagrostMilagrost
Milagrost
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Presentación tarea bloque II del Curso "Diseño de presentaciones y su publica...
Presentación tarea bloque II del Curso "Diseño de presentaciones y su publica...Presentación tarea bloque II del Curso "Diseño de presentaciones y su publica...
Presentación tarea bloque II del Curso "Diseño de presentaciones y su publica...
 

Similar a IEEE 802 Standard Network’s Comparison under Grid and Random Node Arrangement in 2.4 GHz ISM Band for Single and Multiple CBR Traffic

Mobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validationMobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validationIOSR Journals
 
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...IJERA Editor
 
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusZigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusIJMER
 
Granularity of efficient energy saving in wireless sensor networks
Granularity of efficient energy saving in wireless sensor networksGranularity of efficient energy saving in wireless sensor networks
Granularity of efficient energy saving in wireless sensor networkseSAT Journals
 
Comparative analysis of 802.11b&g WLAN systems based on Throughput metric
Comparative analysis of 802.11b&g WLAN systems based on Throughput metricComparative analysis of 802.11b&g WLAN systems based on Throughput metric
Comparative analysis of 802.11b&g WLAN systems based on Throughput metricIRJET Journal
 
A Review of Physical, Data and Network Layer Specification and its Protocols ...
A Review of Physical, Data and Network Layer Specification and its Protocols ...A Review of Physical, Data and Network Layer Specification and its Protocols ...
A Review of Physical, Data and Network Layer Specification and its Protocols ...Editor IJMTER
 
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICESZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICESVLSICS Design
 
Zigbee Transmitter for IoT Wireless Devices
Zigbee Transmitter for IoT Wireless DevicesZigbee Transmitter for IoT Wireless Devices
Zigbee Transmitter for IoT Wireless DevicesVLSICS Design
 
Data Transmission Analysis using MW-5000 at 5.8 GHz Frequency
Data Transmission Analysis using MW-5000  at 5.8 GHz Frequency Data Transmission Analysis using MW-5000  at 5.8 GHz Frequency
Data Transmission Analysis using MW-5000 at 5.8 GHz Frequency IJECEIAES
 
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput IJECEIAES
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 
10 satishkumar final_paper--105--113
10 satishkumar final_paper--105--11310 satishkumar final_paper--105--113
10 satishkumar final_paper--105--113Alexander Decker
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
 
IoT2_Module2_partofCVMUFacultykasashah.pptx
IoT2_Module2_partofCVMUFacultykasashah.pptxIoT2_Module2_partofCVMUFacultykasashah.pptx
IoT2_Module2_partofCVMUFacultykasashah.pptxkhushali32
 
IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...
IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...
IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...IRJET Journal
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485IJRAT
 

Similar a IEEE 802 Standard Network’s Comparison under Grid and Random Node Arrangement in 2.4 GHz ISM Band for Single and Multiple CBR Traffic (20)

Mobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validationMobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validation
 
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
 
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusZigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart Campus
 
Granularity of efficient energy saving in wireless sensor networks
Granularity of efficient energy saving in wireless sensor networksGranularity of efficient energy saving in wireless sensor networks
Granularity of efficient energy saving in wireless sensor networks
 
Comparative analysis of 802.11b&g WLAN systems based on Throughput metric
Comparative analysis of 802.11b&g WLAN systems based on Throughput metricComparative analysis of 802.11b&g WLAN systems based on Throughput metric
Comparative analysis of 802.11b&g WLAN systems based on Throughput metric
 
IoT Connectivity
IoT Connectivity IoT Connectivity
IoT Connectivity
 
A Review of Physical, Data and Network Layer Specification and its Protocols ...
A Review of Physical, Data and Network Layer Specification and its Protocols ...A Review of Physical, Data and Network Layer Specification and its Protocols ...
A Review of Physical, Data and Network Layer Specification and its Protocols ...
 
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICESZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
 
Zigbee Transmitter for IoT Wireless Devices
Zigbee Transmitter for IoT Wireless DevicesZigbee Transmitter for IoT Wireless Devices
Zigbee Transmitter for IoT Wireless Devices
 
Data Transmission Analysis using MW-5000 at 5.8 GHz Frequency
Data Transmission Analysis using MW-5000  at 5.8 GHz Frequency Data Transmission Analysis using MW-5000  at 5.8 GHz Frequency
Data Transmission Analysis using MW-5000 at 5.8 GHz Frequency
 
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
10 satishkumar final_paper--105--113
10 satishkumar final_paper--105--11310 satishkumar final_paper--105--113
10 satishkumar final_paper--105--113
 
Iot module2
Iot module2Iot module2
Iot module2
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
 
IoT2_Module2_partofCVMUFacultykasashah.pptx
IoT2_Module2_partofCVMUFacultykasashah.pptxIoT2_Module2_partofCVMUFacultykasashah.pptx
IoT2_Module2_partofCVMUFacultykasashah.pptx
 
IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...
IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...
IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485
 
IEEE802.16-Anoverview
IEEE802.16-AnoverviewIEEE802.16-Anoverview
IEEE802.16-Anoverview
 

Más de Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

Más de Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Último

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Último (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

IEEE 802 Standard Network’s Comparison under Grid and Random Node Arrangement in 2.4 GHz ISM Band for Single and Multiple CBR Traffic

  • 1. Int. J. Advanced Networking and Applications Volume: 08 Issue: 04 Pages: 3118-3123 (2017) ISSN: 0975-0290 3118 IEEE 802 Standard Network’s Comparison under Grid and Random Node Arrangement in 2.4 GHz ISM Band for Single and Multiple CBR Traffic J.Jaslin deva gifty Department of ECE, Dr. Mahalingam College of Engineering & Technology, Udumalai Road,Pollachi -642003 Email: jaslindevaece@gmail.com Dr.K.Sumathi Department of ECE, Dr. Mahalingam College of Engineering & Technology, Udumalai Road,Pollachi -642003 Email: sumathimin@gmail.com -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- The IEEE 802 standard well-known as 802.11 called as Wi-Fi network, 802.15.4 called as ZigBee or sensor network and 802.15.1 called as Bluetooth network. The network such as ZigBee, Bluetooth and Wi-Fi works in 2.4 GHz ISM band. All the above networks works in same ISM band of 2.4 GHz, but the performance of the network varies. The performance of simulation depends upon the coverage area, data rates, and power consumption in each network. The heterogeneous network performances is evaluated with static and mobility model in random and grid node placement by varying the traffic loads of one CBR and with five CBR for each network. The simulation result is compared in terms of jitter, average end to end delay and throughput to analyze the network performance in the 2.4 GHz frequency band. IEEE 802.11 network shows the low jitter and delay value with high throughput compared with sensor network. Keywords - CBR traffic loads, IEEE 802.15.4, IEEE 802.11, Qualnet 5.0.2 simulator, Wireless Sensor Networks (WSNs). -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: Jan 18, 2017 Date of Acceptance: Jan 31, 2017 -------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION The unlicensed ISM band is abbreviated as Industrial, Scientific and Medical is widely used among popular wireless network standards such as IEEE 802.15.4 called as Low-Rate Wireless Personal Area Network (LRWPAN) such as ZigBee or sensor network IEEE 802.15.1, called as Bluetooth network and IEEE 802.11b called as Wireless Local Area Network (WLAN) such as Wi-Fi or ad-hoc manet network. As the demand for the usage of ISM band is increasing rapidly, there are many scenarios where we need communication access such as wireless local area networks (WLANs) based on IEEE 802.11b specifications and wireless personal area networks (WPANs) on IEEE 802.15.4 based and Bluetooth specifications. Wireless Sensor Network (WSN) is a promising and ever growing sensor technology for implementing variety of applications like monitoring of environment, security aspects and applications that save our lives and assets. In WSN, more number of sensor nodes are adapted to sensing and gathering information and forwarding to the base station such as PAN coordinator with the help of routing protocol [1]. A WSN is the spatially distributed autonomous network for monitoring and collecting information about environmental conditions like, sound, temperature, pressure etc., WSNs are subdivided into two classes namely static WSNs and mobile WSNs [2]. Random based placement of sensor nodes and grid based placement of sensor nodes working depends on location [3]. WSNs are the integration of many technologies, such as communication in wireless medium, sensors network, embedded computing and distributed information processing. It is widely used for military purposes, environmental conditions, medical field, transport and other fields [4].Different traffic applications are constant bit rate (CBR), variable bit rate (VBR), and file transfer protocol (FTP) are used to analyze the performance of each network [5]. Mobile ad-hoc network is wireless network of mobile nodes without any centralized administration. The network topology changes periodically in mobile ad-hoc network [6]. IEEE 802.11 is the standard family of wireless networking. It is the first wireless LAN (WLAN) standard proposed in the year 1997. The medium access mechanism function, called the Distributed Coordination Function (DCF) is a Carrier Sense Multiple Access with Collision Avoidance mechanism (CSMA/CA) [7]. It uses microwaves frequency in the range of 2.4 GHz and 5GHz. Ad hoc network mobile nodes do not have any definite form of infrastructure. They are self-organized structure and communication done by wireless links [8]. The standard 802.11 provides two variations in radio frequency (RF) physical (PHY) layer. These include two modulation techniques such as direct sequence spread spectrum (DSSS) and frequency-hopping spread spectrum (FHSS) [9]. In the current era the interacting technologies are Wi- Fi and WLAN technologies. Many researches are being done in different networking field such as peer to peer or point to point network, cellular wireless, file server, World Wide Web and grid computing system. The mobility in distributed network provides the best quality of services to the clients and the mobility is important to accommodate
  • 2. Int. J. Advanced Networking and Applications Volume: 08 Issue: 04 Pages: 3118-3123 (2017) ISSN: 0975-0290 3119 the demand in wireless network. The routing protocols plays major role in all kinds of network either static or dynamic model. The Ad hoc On-Demand Distance Vector (AODV) routing protocol is an on-demand approach to identify the most recent path by employing destination sequence numbers. Here, the next-hop information stored in the source node and the intermediate nodes corresponding to each flow for data packet transmission. In an on-demand routing protocol, the source node floods the Route Request packet in the network when a route is not available for the desired destination. It may also obtain multiple routes to different destinations from a single Route request [11]. AODV provides better throughput and high packet delivery ratio compared to other protocols under grid and random placement [12].The efficiency of AODV gives better throughput and performance of AODV plays better role in all case of topologies [13]. The rest of the paper is organized as follows. Chapter II addresses the ISM band and different network technologies. Simulation parameters and results are discussed in Chapter III. Conclusions are given in Chapter IV. II. ISM BAND The ISM band is the parts of the radio spectrum or refers to a group of radio bands that are internationally reserved for the use of radio frequency (RF). ISM bands are generally open frequency bands, which vary according to different regions and permits. It uses the unlicensed ISM ranges are 902-928 MHz, 2400-2483.5 MHz and 5725-5850. 1.1 IEEE 802.11 (WI-FI) The IEEE 802.11 standard is the WLAN wireless communication network and also called as Mobile Ad-hoc Network (MANET). It is intended for device to device or computer to computer wireless communication, as a replacement for cabled connection or wired networks. It gives internet access at broadband speeds through the connection access point. Wi-Fi gives a data rate in higher, whereas Bluetooth and ZigBee network gives lower data rates. Wi-Fi operates with either a 2.4, 5 GHz or 5.8GHz frequency band. It supports large number of nodes in a network when compared to other networks. The range is from 10-100m. The data rate is 2 - 54 M bits/sec and has medium power consumption. It uses star topology 1.2 IEEE 802.15.1(Bluetooth) The IEEE 802.15.1 standard is the WPAN wireless communication network or Bluetooth network. It is intended to enable the communication in short-range that supports peripherals devices such as computer mice, keyboards, printer etc., This range is known as wireless personal area network. It also operates with a 2.4 GHz frequency band. The range is 10-30m with data rate of 1M bits/sec. Due to low data rate, the complexity and power consumption is low. The frequency hopping modulation technique is used and uses star topology. 1.3 IEEE 802.15.4(ZigBee) The IEEE 802.15.4 standard is the WPAN wireless communication network .For example ZigBee network. It is a standard that defines the set of communication protocols for low-data-rate, short-range wireless communication networking. ZigBee based wireless devices operate in 868 MHz, 915 MHz and 2.4 GHz frequency band. The 868 MHz band used in Europe, the 915 MHz frequency band in North America, whereas 2.4 GHz frequency band is used in world wide. The maximum data rate is 250 K bits/sec. The range supported is 10-30m. Due to low data rate, the complexity and power consumption is less than Bluetooth. It uses direct sequence spread spectrum and frequency hopping spread spectrum modulation technique. It uses star, tree and mesh topologies. III. SIMULATION AND RESULTS The simulation is performed with the following parameters mentioned in Table I. TABLE I Simulation parameters Parameters Values Area 1000m*1000m Simulation Time 300sec Item to send 100 Packet size 50 bytes Packet rate (packet per sec) 0.1.0.2,1,2 MAC layer 802.15.4, 802.11 Energy Model Mica motes Battery Model Linear model Protocol AODV Node placement Random, Grid No of nodes 10 Traffic CBR The nodes are placed both randomly and in the form of grid for both network as shown in Fig 1 and 2 for static model.The random mobility model shown in Fig 3. The simulation is carried out by varying the data rate per packet interval in both static and dynamic model. Fig.1.Random placement
  • 3. Int. J. Advanced Networking and Applications Volume: 08 Issue: 04 Pages: 3118-3123 (2017) ISSN: 0975-0290 3120 Fig.2.Grid placement Fig.3.Moblity model 3.1 Average jitter Average jitter versus packet interval in static model with one and five CBR is shown in Fig 3. Fig 4 shows the jitter comparison is static model with one CBR for 802.15.4 and 802.11. The network 802.11 shows lower jitter in static model. The jitter is low for 0.1 packet interval and increases with the increase in packet interval and high at 0.4 packet interval for both networks. The Fig 5 and Fig 6 shows the mobility model with one and five CBR for 802.15.4 and 802.11. In mobility model also, the network 802.11 has low jitter as compared with sensor network. The grid placed static and mobility model is shown in Fig 7 and Fig 8 shows lower jitter for 802.11 networks for all packet interval. Fig.4.Average jitter in static model with one CBR Fig .5. Average jitter in static model with five CBR Fig.6. Average jitter in mobility model with one CBR Fig.7. Average jitter in mobility model with five CBR Fig.8 Grid placed average jitter in static model
  • 4. Int. J. Advanced Networking and Applications Volume: 08 Issue: 04 Pages: 3118-3123 (2017) ISSN: 0975-0290 3121 Fig.9 Grid placed average jitter in mobility model 3.2 Average end to end delay Average end to end delay versus packet interval in static model with one and five CBR is shown in Fig 9 and in Fig 10 for 802.15.4 and 802.11. The network 802.11 shows low delay in static model. The delay is low at 0.1 packet intervals and increases when packet interval increases and high at 0.4 packet interval for both networks. The Fig 11 and Fig 12 shows the mobility model with one and five CBR for 802.15.4 and 802.11.In mobility model, network 802.11 has lower delay as well. The grid placed static and mobility model is shown in Fig 13 and Fig 14 shows lower delay for 802.11 networks for all packet interval. Fig.10.Average delay in static model with one CBR Fig .11. Average delay in static model with five CBR Fig.12. Average delay in mobility model with one CBR Fig.13. Average delay in mobility model with five CBR Fig.14. Grid placed average delay in static model Fig.15. Grid placed average delay in mobility model 3.4 Throughput Throughput versus packet interval in static model with one and five CBR is shown in Fig 15 and in Fig 16 for 802.15.4 and 802.11. The network 802.11 shows higher throughput in static model. The throughput is high at .1
  • 5. Int. J. Advanced Networking and Applications Volume: 08 Issue: 04 Pages: 3118-3123 (2017) ISSN: 0975-0290 3122 packet intervals and decreases when packet interval increases and low at .4 packet interval for both networks Fig.16.Throughput static model with one CBR The Fig 17 and Fig 18 shows the mobility model with one and five CBR for 802.15.4 and 802.11.In mobility model, network 802.11 has higher throughput as well. The grid placed static and mobility model is shown in Fig 19 and Fig 20 shows higher throughput for 802.11 networks for all packet interval. Fig .17. Throughput in static model with five CBR Fig .18. Throughput in mobility model with one CBR Fig.19. Throughput in mobility model with five CBR Fig.20 Grid placed throughput in static model Fig.21.Grid placed throughput in mobility model IV. CONCLUSION The performance evaluated using qualnet simulator.The two IEEE 802 standard works in 2.4Ghz ISM band.The result shows the performance of 802.11 and IEEE 802.15.4 in random placement and grid placement for static and mobility model with single and multiple CBR traffic loads. The simulation performance of the IEEE 802.11 network shows the low jitter and low delay value followed by high throughput when compared to the standard network of 802.15.4.The performance degradation of this network is due to the low coverage area and has low data rates though works in the same 2.4GHz ISM frequency band. The future scope is to detect the collision of two network by placing in heterogeneous manner.
  • 6. Int. J. Advanced Networking and Applications Volume: 08 Issue: 04 Pages: 3118-3123 (2017) ISSN: 0975-0290 3123 REFERENCES . [1] P.N.Renjith and E.Baburaj, “Analysis On Ad Hoc Routing Protocols In Wireless Sensor Networks”, in International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), Vol.3, No.6, pp. 3480-3493.2012. [2] P. Samundiswary, K Dilip, “Performance Analysis of Energy Aware LAR Protocol in IEEE 802.15.4 based Mobile Wireless Sensor Networks”, in International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol 3, Issue- 9,pp.1243-1255, 2014. [3] PratibhaKevre, LaxmiShrivastava., “Compare threereactive routing protocols in grid based cluster wireless sensor network using qualnet simulator”, in International journal of Applied Sciences and Engineering Research, Vol. 3, No. 2, 2014 [4] Manju Khurana “Direction Determination in Wireless Sensor Networks Using Grid Topology”,in Journal Of Emerging Technologies In Web Intelligence, Vol. 5, No. 2, 2013 [5] Gurjit Kaur, Kunal Malik and Kiran Ahuja., “Impact on Power Consumption of ZigBee based Home Automation Network using Various Traffic”, in International Journal of Future Generation Communication and Networking ,Vol.6, No.6 , pp.17-24,2013. [6] Dhanvanthri Gokulkrishna1, Rinki Sharma, Narasimha Murthy3, “Design And Implementation Of A Routing Protocol For Mobile Ad HocNetworks”, In Sastech 29, Vol.10, Issue 2, 2011. [7] Manish Uzzwal1, Rajan Sharma2, “Energy Efficient MAC Protocol & Radio Energy Model for AODV & Bellman Ford Routing Protocol”, in IOSR Journal of Electronics and Communication Engineering (IOSR-JECE).Vol 9, Issue 1, pp. 44-50 ,2014. [8] Prinu C. PhilipȦ, Rajeev PaulusȦ, A.K. JaiswalȦ and A. AshokȦ, “Comparative Analysis of Adhoc Routing Protocols in Wi-Fi & Wi Max Networks using QualNet 6.1”, in International Journal of Current Engineering and Technology, Vol.4, No.1 2014. [9] Prof. K.H. Wandra, Dr. Ketan Kotecha and Mitul R. Khandhedia, “Various effect of modulation schemes on Wi-Fi Network using Qualnet Simulator”, in International Conference on Education Technology and Computer (ICETC),2010. [10] [11] [12] [13] Pulak Singh, Mayur Kumar and A.K.Jaiswal,“Characteristic Analysis of Mobility using Heterogeneous Network”, in International Journal of Computer Applications, Vol. 119,No.9, 2015. Dr. Sumathi.K, Kiruthika Gowri.D Sathiyapriya.T Sureshkumar.K, “Performance Analysis of various MANET Protocols based on Route Processing using different Antenna Models”, Dr. Sumathi, K. Suresh Kumar, T. Sathiyapriya, and D. Kiruthika Gowri , “An Investigation on the Impact of Weather Modelling on Various MANET Routing Protocols”, in Indian Journal of Science and Technology, Vol 8(15), 59557, July 2015. Jaslin Deva Gifty. J and Dr Sumathi K, “Simulation Of Wireless Sensor Network With Hybrid Topology “in ICTACT Journal On Communication Technology, March 2016, Volume: 07, Issue .01.