SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 420 – 426
___________________________________________________________________________________________
420
IJRITCC | July 2017, Available @ http://www.ijritcc.org
___________________________________________________________________________________
Performance Analysis of Wired, Wireless and Optical Network using NS2
Jyoti1
1
M.Tech. Student, Department of ECE
DCRUST, Murthal
Sonipat, India
1
mltrjyt.22@gmail.com
Himanshi Saini2
2
Assistant Professor, Department of ECE
DCRUST, Murthal
Sonipat, India
2
himanshi.4887@gmail.com
Abstract- In computer terminology, the definition for networks is simply a group of computers physically or logically connected with each
other for sharing information or services. In this paper, wired, wireless and optical networks have been analyzed and implemented using
network simulator tool NS2. A systematic simulation based performance analysis of wired, wireless and optical networks using distance
vector routing protocol has been carried out. Analysis of the performance of these networks on the basis of three metrics- Packet delivery
ratio, end to end delay, throughput using NS2 based Simulation has been undertaken.
Keywords: Networks, Wired, Wireless, Optical, NS2
_________________________________________________*****______________________________________________
1. INTRODUCTION
Computer networks are the base of modern communication.
All modern aspects of public switched telephone network
are computer-controlled. The scope of communication
would not be possible without computer network. A data
network is a communication network which is used to
exchange information from one node to another node using
a data link or a data network is a system in which multiple
computers are connected with each other to share
information. The connections between nodes are established
by using cable media, wireless media or light pulse [1].
Computer network provide different type of interpersonal
facilities to user like email, instant messaging, telephone,
video telephone calls and audio conferencing. A network
allows users to share data, files and information. The user
has the ability to access information which is stored on the
computer network that may be used by unauthorized user to
generate viruses or computer worms, to prevent these
devices from viruses access that network via denial of
service attack [1].
2. NETWORK
A data network is a communication network which is used
to exchange information from one node to another node
using a data link or a data network is a system in which
multiple computers are connected with each other to share
information. The connections between nodes are established
by using cable media, wireless media or light pulse. The
example of network is internet, which connects millions of
computers all over the world [1].
1. Wired Network
Wired networks exist between a number of devices
connected with each other using connecting media, such as
cables and routers. These networks can be used within
limited area by cables and routers that allow the data sharing
(sending or receiving data). The word “wired” is used to
differentiate between wireless connections and those involve
cables to transfer data between different devices and
computer systems. Most wired networks use Ethernet cables
to transfer data between connected computer systems that’s
why wired networks, also called networks. In small wired
network, a single router is used to connect all the computers.
Larger networks often use multiple routers or switches [5].
Figure 1: Wired Network [2]
2. Wireless Network
Wireless Networks used infrared or radio frequency signals
to share information and resources between devices.
Wireless networks have connection between nodes without
use of wires. Theses network development are cost
effectiveness and it can be applicable to environments where
wiring is not possible or it is a preferable solution as
compared to wired networks. A wireless network consists of
an access point or a base station. The access point acts like a
hub, providing connectivity for wireless computers. There
are four types of wireless standards for wireless networking
and these types are produced by Institute of Electrical and
electronics Engineers (IEEE). These standards define all
aspects of radio frequency wireless networking. They have
established different type of transmission standards: 802.11,
802.11a, 802.11b, 802.11g. [4][5].
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 420 – 426
___________________________________________________________________________________________
421
IJRITCC | July 2017, Available @ http://www.ijritcc.org
___________________________________________________________________________________
All these type of transmission standards have different speed
and radio frequency. 802.11 and 802.11b are the slowest at
1 or 2Mbps and 5.5 and 11Mbps respectively. They both
operate off of the 2.4 GHz radio frequency and can transmit
up to 54 Mbps. Actual transmission speeds may vary and
depends on such factors as number and size of the physical
barriers in the network and any interference in the radio
transmissions. These networks are reliable, but when
interference occurs it reduce the range and the quality of the
signal. Interference can be caused by other devices operating
on the same radio frequency and it is very hard to control
the addition of new devices on the same frequency [4] [5].
Many types of wireless devices are available today for
examples, mobile terminals, pocket size PCs hand held PCs,
laptops etc. The emerging third generation cellular
networks have enables a variety of higher speed mobile data
services. [16] [17].
Figure 2: Wireless Networks [2]
3. Optical Network
Fiber optic communication is a communication technology
that uses light pulses to transfer information from one point
to another through an optical fiber. The information
transmitted is essentially digital information generated by
telephone systems, cable television companies, and
computer systems as shown in the figure [7] [12].
An optical network is a type of communication network that
built with optical fiber technology. It convert electrical
signal into light pulses between sender and receiver nodes. It
connects computers (or any other device which can generate
or store data in electronic form using optical fibers. Optical
fibers are essentially very thin glass cylinders or filaments
which carry signals in the form of light. Optical network is
implemented by using Wavelength Division Multiplexing
(WDM). The WDM is a data transmission technology that
transmits data in an optical fiber by establishing various
channels, each channel have it’s a specific light wavelength.
It is a large complex network of server hubs at different
locations on ground. The server hubs are also known as
head-ends, nodes or simply, sites. These networks are the
backbone of Internet Service Providers [6] [7].
Figure 3: Basic Optical Fibre Communication [8]
3. TOOL USED
Network Simulator (Version 2) is known as NS2 which is an
event-driven simulation tool. It source code is freely
distributed and discrete event simulator which works on
packet scenario of networking projects for both wired and
wireless network. It is useful in studying the nature of
communication networks. It is a portable tool that works on
all Linux and windows operating systems. It support many
routing protocols, network topologies like bus, ring, hybrid,
star topologies to design both wired and wireless network
with the help of simulation scripts. This tool is help to
calculate throughput, error rate, end to end delay, packet
delivery ratio, total number of packet send and received by
destination using TCL scripts AWK, Perl. [13]
Ns-2 support both transport layer protocols TCP and UDP.
Theses protocols are used to transmit data in the form of
packets from source to destination and it also support
various type of traffic generators to generate data in the
form of packets and these packets send over transport layer
protocols. CBR (Constant Bit Rate), exponential traffic
(poison traffic), Pareto traffic (expoo traffic) and FTP are
traffic generators which are used to generate data between
nodes. [13]
To run the TCL script NS2 use the NAM (network
animator) which is a visualization tool which show the
nodes and flow of packet as written in the TCL script
1. Basic architecture of NS2
NS2 consists of two key languages: C++ and Object-
oriented Tool Command Language (OTcl). The C++ and the
OTcl are linked together using TclCL and mapped to a C++
object, variables in the Otcl domain. This language helps to
create network scenario and also allows modification in Tcl
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 420 – 426
___________________________________________________________________________________________
422
IJRITCC | July 2017, Available @ http://www.ijritcc.org
___________________________________________________________________________________
script. [2] [3]
Simulation scenario contains network nodes, topology and
connections between the nodes. NS2 provides users to
executable command ns with the name of a Tcl simulation
scripting file. In the scenario, Tcl language is used to design
the network which set parameters, node configurations and
topology, Connection between nodes, transfer packages and
simulation time [2] [10].
NS2 outputs either text-based or animation-based simulation
results. NAM (Network Animator) is a visualization tool
which shows communication between nodes, flow of
packets as written in the TCL script and also provides
animation based result. XGraph are used to generate graph
to analyze a particular behavior of the network presentation
[2].
Figure 4: Basic architecture of NS2 [2]
2. Programming Language in NS2
NS2 provides a large number of built-in C++ objects. The
C++ is used for the simulation with the help of Tcl
simulation script but the users find that these objects are
insufficient. They develop their own C++ objects and use an
Otcl configuration and interface these objects. The two
programming languages are used because this makes tool
easy to use, yet fast and powerful simulator. C++ defines the
internal mechanism of simulation objects and also used for
the security packages in encryption and decryption while
OTcl works for the frontend environment. OTcl and C++
interact with each other through Tcl/C++ interface called
TclCL as show in figure 5 [3].
Figure 5: C++ and Tcl Communication [3]
Otcl is a language with simple syntaxes which can easily
integrate with other languages. The characteristics of the
languages are:
• It provides a graphic interface
• It is compatible with many protocols
• It is very flexible for integration
• The scripting language is used which is easy to
understand
4. TRAFFIC SCENARIO FOR WIRED NETWORK
A wired network using distance vector routing protocol has
been designed and implemented. The distance vector routing
protocol selects a shortest path from source to destination.
This wired network traffic scenario has been generated by
using tcl script which specifies information about different
nodes, links, delay and also agents used at source and
destination nodes. After executing the program which is
written in tcl script using ns command then this network has
been visualized in the NAM animator as shown in the
figure 6 [10].
Figure 6: Wired Network Communication
1. Tracing
Simulation of network in NS2 generates traces of all the
events in a trace file as shown in below figure7. The format
for trace file of a network differs depending on whether the
network is wired or wireless. This trace file is data is used to
calculate the different performance metrics and for plotting
the data on graphs for further analysis and comparison.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 420 – 426
___________________________________________________________________________________________
423
IJRITCC | July 2017, Available @ http://www.ijritcc.org
___________________________________________________________________________________
Figure 7: Wired Network Trace file
5. TRAFIC SCENARIO FOR WIRELESS
NETWORK
A wireless network using Destination-Sequenced Distance
Vector routing protocol has also been designed and
implemented. The Destination-Sequenced Distance Vector
(DSDV) protocol is the commonly used proactive routing
protocol in mobile ad hoc network. Proactive routing
protocol maintains constant and updated routing information
for each pair of networking nodes by propagating route
updates proactively at fixed interval of time. The periodic
and event-driven messages are responsible for route
establishment and route maintenance. In DSDV, each node
maintains a routing table with one route entry for each
destination in which the shortest path is recorded. It uses a
destination sequence number to avoid routing loops. The
figure 4.3 shows a node configuration for a wireless mobile
node that runs DSDV as its ad hoc routing protocol.
After that the program has been executed which is written in
tcl script using ns command then could be visualized the
network in the NAM animator as shown in the figure 8.
Figure 8: Wireless Network Communication
1. Tracing
Simulation of network in NS2 generates traces of all the
events in a trace file as shown in below figure 9. The format
in wireless network is different for different routing
protocol. This trace file is data is used to calculate the
different performance metrics and for plotting the data on
graphs for further analysis and comparison.
Figure 9: Wireless Network Trace file
6. TRAFFIC SCENARIO FOR OPTICAL
NETWORK
An optical network using distance vector routing protocol
has been designed and implemented. The distance vector
routing protocol selects a shortest path from source to
destination. We create the optical network traffic scenario
by using tcl script which consist with six nodes, duplex
links, delay in ms and also used agents at source and
destination nodes. After that execute the program which is
written in tcl script using ns command then we could
visualize the network in the NAM animator as shown in the
figure 10.
Figure 10: Optical Network Communication
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 420 – 426
___________________________________________________________________________________________
424
IJRITCC | July 2017, Available @ http://www.ijritcc.org
___________________________________________________________________________________
1. Tracing
Simulation of network in NS2 generates traces of all the
events in a trace file as shown in below figure 11. This trace
file is data which is used to calculate the different
performance metrics and for plotting the data on graphs for
further analysis and comparison
Figure 11: Optical Network Trace file
7. PERFORMANCE ANALYSIS OF PARAMETERS
1. Average End-to-End Delay
The end to end delay is the time from the generation of the
packet by the sender up to send at the destination application
layer and expressed in second. It therefore include all the
delay in the network such as buffer Queue, transmission and
delay induced by routing protocol activities and MAC
control data exchanges. [12]
End to End delay = [(Sum of Individual data packet delay) /
(Total number of data Packets delivered)]
Figure 12: Comparison of average end-to-end delay
The figure 12 shows the graph between end to end delay and
number of nodes. The graph shows that wireless network
have more delay as compared to wired and optical network
and optical network have less delay as compared to wired
network.
2. Packet Delivery Ratio
Packet Delivery Ratio is defined as the ratio between the
received packets at the destination and the generated packets
at the source it is calculated by using awk script which
processes the trace file and produces the result. [2]
Packet Delivery Ratio= [(Total packets received at the
destination) / (Total packets generated at the source)]
Figure 13: Comparison of Packet Delivery Ratio
The figure 13 shows the graph between packet delivery ratio
and number of nodes. The graph shows that optical network
have more packet delivery ratio as compared to wired and
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 420 – 426
___________________________________________________________________________________________
425
IJRITCC | July 2017, Available @ http://www.ijritcc.org
___________________________________________________________________________________
optical network and wireless network have less packet
delivery ratio as compared to wired network.
3. Average Throughput
The ratio of total amount of data that reaches from source to
destination to the time for the destination to get the last
packet is referred as Throughput. A network with high
average throughput is desirable.
Throughput = (Number of data packets received*Packet
size*8) / Simulation time
Figure 14: Comparison of Throughput
The figure 14 shows the graph between throughput and
number of nodes. The graph shows that optical network
have more throughput as compared to wired and optical
network and wireless network have less packet delivery
ratio as compared to wired network.
III. CONCLUSION AND FUTURE SCOPE
The optical network has many advantages over copper based
communication in terms of bandwidth, signal security,
electrical interference, size and weight but it is more costly
as compared to wired and wireless network. A wireless
network is that whose interconnection is implemented
without use of wire. This network is mostly associated with
telecommunication network. The electromagnetic waves are
used for the communication and the reason for using
wireless networks are cost effectiveness of network. This
network is applicable in that environment where wiring is
not possible or it is preferable solution. The optical network
has higher bandwidth and high speed as compared to wired
and wireless networks. The wireless network is easy to use
but due to interference signal may lost.
In this research work, we designed and simulate a wired,
wireless and optical network. The results of simulation are
stored in a trace file that records data about all events that
occurred during simulation process. The graphs show that
the optical networks have more throughput and packet
delivery ratio whereas end to end delay is less as compared
to wired and wireless network. So from the results we can
conclude that the optical network is better as compared to
wired and wireless network.
In future, there is a lot of work that can be done and wide
variety of parameters that can be compared for wired,
wireless and optical networks for a large range of
applications in different scenarios.
REFERENCES
[1] Aditi Mehta, Vaishali Yadav, “A STUDY ON
COMPUTER NETWORK AND NETWORK
TOPOLOGY”, 2014 IJIRT | Volume 1 Issue 5 | ISSN:
2349-6002.
[2] Sachi Pandey, Vibhore Tyagi, “Performance Analysis of
Wired and Wireless Network using NS2 Simulator”
International Journal of Computer Applications (0975 –
8887) Volume72– No.21, June 2013.
[3] S.Jeneeth Subashini, D. Guna Shekar, C.Harinath Reddy,
M. Manikanta, “Implementation of Wired and Wireless
Networks, Analysis Simulation and Result Comparison
Using Ns2”, International Journal of Electrical and
Electronics Research ISSN 2348-6988 (online) Vol. 2,
Issue 3, pp: (209-225), Month: July - September 2014.
[4] Eng.Nassar Enad. GH. Muhanna, “Computer Wireless
Networking And Communication”, International Journal
of Advanced Research in Computer and Communication
Engineering Vol. 2, Issue 8, August 2013.
[5] Navpreet Kaur, Sangeeta Monga, “COMPARISONS OF
WIRED AND WIRELESS NETWORKS: A REVIEW”,
Kaur et al., International Journal of Advanced
Engineering Technology E-ISSN 0976-3945.
[6] M. Arumugam, ―Optical Fibre Communication – An
Overview‖ Pramana journal of physics, VOL. 57, Nos5
& 6, PP. 849–869, 2001.
[7] Prachi Sharma, Rohit Kumar Arora, Suraj Pardeshi,
Mandeep Singh, “ Fibre Optic Communications: An
Overview” , International Journal of Emerging
Technology and Advanced Engineering Website:
www.ijetae.com (ISSN 2250-2459, ISO 9001:2008
Certified Journal, Volume 3, Issue 5, May 2013.
[8] Francis Idachaba, Dike U. Ike, and Orovwode Hope,
“Future Trends in Fiber Optics Communication”,
Proceedings of the World Congress on Engineering 2014
Vol I,WCE 2014, July 2 - 4, 2014, London, U.K.
[9] Sirwan A.Mohammed Prof. Dr. Sattar B.Sadkhan,
“DESIGN OF WIRELESS NETWORK BASED ON
NS2”, Volume 3, No. 12, December 2012.
[10] Sirwan a. Mohammed, “design and simulation of
network using NS2”, International Journal of Electronics,
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 420 – 426
___________________________________________________________________________________________
426
IJRITCC | July 2017, Available @ http://www.ijritcc.org
___________________________________________________________________________________
Communication & Instrumentation Engineering
Research and Development (IJECIERD) ISSN 2249-
684X Vol.3, Issue 1, Mar 2013, 237-248.
[11] Almargni Ezreik, Abdalla Gheryani, “Design and
Simulation of Wireless Network using NS-2”,2nd
International Conference on Computer Science and
Information Technology (ICCSIT'2012) Singapore April
28-29, 2012.
[12] Parul Kaushik, “Optical Networking – A Study”,
Volume 5, Issue 5, May 2015 ISSN: 2277 128X.
[13] Sharat Kaushik, Poonam, Anita Tomar, “A Comparative
Analysis of Transport Layer Protocols International
Journal of Information & Computation Technology”,
ISSN 0974-2239 Volume 4, Number 14 (2014), pp.
1403-1410.

Contenu connexe

Tendances

Analysis of Prestressed Concrete Girder for Bridges
Analysis of Prestressed Concrete Girder for BridgesAnalysis of Prestressed Concrete Girder for Bridges
Analysis of Prestressed Concrete Girder for Bridgesijtsrd
 
transmission line tower design
transmission line tower designtransmission line tower design
transmission line tower designkunalbhattgecd
 
Seismic Analysis of G 10 Storey Building with Various Locations of Shear Wall...
Seismic Analysis of G 10 Storey Building with Various Locations of Shear Wall...Seismic Analysis of G 10 Storey Building with Various Locations of Shear Wall...
Seismic Analysis of G 10 Storey Building with Various Locations of Shear Wall...ijtsrd
 
Analysis And Design Of G+7 Story Building Using E-tabs Software
Analysis And Design Of G+7 Story Building Using E-tabs SoftwareAnalysis And Design Of G+7 Story Building Using E-tabs Software
Analysis And Design Of G+7 Story Building Using E-tabs SoftwareIRJET Journal
 
Design of Transmission Tower
Design of Transmission TowerDesign of Transmission Tower
Design of Transmission TowerAbhijit Kumar
 
Communications.ppt
Communications.pptCommunications.ppt
Communications.pptDeepa Bman
 
Design and Analysis of Microstrip Patch Antenna with Optimization for Wireles...
Design and Analysis of Microstrip Patch Antenna with Optimization for Wireles...Design and Analysis of Microstrip Patch Antenna with Optimization for Wireles...
Design and Analysis of Microstrip Patch Antenna with Optimization for Wireles...ijsrd.com
 
Modelling of Cable stayed bridge by AIT
Modelling of Cable stayed bridge by AITModelling of Cable stayed bridge by AIT
Modelling of Cable stayed bridge by AITRahul Saraswat
 
Chapter02.structural design using staad pro
Chapter02.structural design using staad proChapter02.structural design using staad pro
Chapter02.structural design using staad prodevaraj pavan kumar
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi ArchitectureArnab Ghosal
 
Analysis and Design of Transmission Tower
Analysis and Design of Transmission Tower Analysis and Design of Transmission Tower
Analysis and Design of Transmission Tower IJMER
 
stress ribbon bridge ppt
stress ribbon bridge pptstress ribbon bridge ppt
stress ribbon bridge pptvikash mishra
 

Tendances (20)

Analysis of Prestressed Concrete Girder for Bridges
Analysis of Prestressed Concrete Girder for BridgesAnalysis of Prestressed Concrete Girder for Bridges
Analysis of Prestressed Concrete Girder for Bridges
 
Cable Course.pptx
Cable Course.pptxCable Course.pptx
Cable Course.pptx
 
Railway project
Railway projectRailway project
Railway project
 
transmission line tower design
transmission line tower designtransmission line tower design
transmission line tower design
 
OSI MODEL
    OSI MODEL    OSI MODEL
OSI MODEL
 
5. what is network cabling
5. what is network cabling5. what is network cabling
5. what is network cabling
 
Seismic Analysis of G 10 Storey Building with Various Locations of Shear Wall...
Seismic Analysis of G 10 Storey Building with Various Locations of Shear Wall...Seismic Analysis of G 10 Storey Building with Various Locations of Shear Wall...
Seismic Analysis of G 10 Storey Building with Various Locations of Shear Wall...
 
Analysis And Design Of G+7 Story Building Using E-tabs Software
Analysis And Design Of G+7 Story Building Using E-tabs SoftwareAnalysis And Design Of G+7 Story Building Using E-tabs Software
Analysis And Design Of G+7 Story Building Using E-tabs Software
 
design of tower
design of towerdesign of tower
design of tower
 
Thesis on Wimax
Thesis on WimaxThesis on Wimax
Thesis on Wimax
 
Design of Transmission Tower
Design of Transmission TowerDesign of Transmission Tower
Design of Transmission Tower
 
Communications.ppt
Communications.pptCommunications.ppt
Communications.ppt
 
Design and Analysis of Microstrip Patch Antenna with Optimization for Wireles...
Design and Analysis of Microstrip Patch Antenna with Optimization for Wireles...Design and Analysis of Microstrip Patch Antenna with Optimization for Wireles...
Design and Analysis of Microstrip Patch Antenna with Optimization for Wireles...
 
Cable
CableCable
Cable
 
Modelling of Cable stayed bridge by AIT
Modelling of Cable stayed bridge by AITModelling of Cable stayed bridge by AIT
Modelling of Cable stayed bridge by AIT
 
Chapter02.structural design using staad pro
Chapter02.structural design using staad proChapter02.structural design using staad pro
Chapter02.structural design using staad pro
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi Architecture
 
Analysis and Design of Transmission Tower
Analysis and Design of Transmission Tower Analysis and Design of Transmission Tower
Analysis and Design of Transmission Tower
 
stress ribbon bridge ppt
stress ribbon bridge pptstress ribbon bridge ppt
stress ribbon bridge ppt
 
Suspension bridge
Suspension bridgeSuspension bridge
Suspension bridge
 

Similaire à Performance Analysis of Wired, Wireless and Optical Network using NS2

Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...
Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...
Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...rahulmonikasharma
 
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSOPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSIJCNCJournal
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
 
Review on State-Of-The-Art of PEGASIS Protocol in WSNS
Review on State-Of-The-Art of PEGASIS Protocol in WSNSReview on State-Of-The-Art of PEGASIS Protocol in WSNS
Review on State-Of-The-Art of PEGASIS Protocol in WSNSrahulmonikasharma
 
Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSN
Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSNData Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSN
Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSNrahulmonikasharma
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkPatricia Viljoen
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Securityijtsrd
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architectureAdeel Javaid
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues andijfcstjournal
 
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...IJCNCJournal
 
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...IRJET Journal
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkeSAT Publishing House
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachIJERA Editor
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachIJERA Editor
 

Similaire à Performance Analysis of Wired, Wireless and Optical Network using NS2 (20)

Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...
Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...
Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...
 
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSOPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 
Review on State-Of-The-Art of PEGASIS Protocol in WSNS
Review on State-Of-The-Art of PEGASIS Protocol in WSNSReview on State-Of-The-Art of PEGASIS Protocol in WSNS
Review on State-Of-The-Art of PEGASIS Protocol in WSNS
 
Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSN
Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSNData Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSN
Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSN
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The Network
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues and
 
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...
 
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh network
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
 

Plus de rahulmonikasharma

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paperrahulmonikasharma
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Techniquerahulmonikasharma
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
 

Plus de rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 

Dernier

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Dernier (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

Performance Analysis of Wired, Wireless and Optical Network using NS2

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 420 – 426 ___________________________________________________________________________________________ 420 IJRITCC | July 2017, Available @ http://www.ijritcc.org ___________________________________________________________________________________ Performance Analysis of Wired, Wireless and Optical Network using NS2 Jyoti1 1 M.Tech. Student, Department of ECE DCRUST, Murthal Sonipat, India 1 mltrjyt.22@gmail.com Himanshi Saini2 2 Assistant Professor, Department of ECE DCRUST, Murthal Sonipat, India 2 himanshi.4887@gmail.com Abstract- In computer terminology, the definition for networks is simply a group of computers physically or logically connected with each other for sharing information or services. In this paper, wired, wireless and optical networks have been analyzed and implemented using network simulator tool NS2. A systematic simulation based performance analysis of wired, wireless and optical networks using distance vector routing protocol has been carried out. Analysis of the performance of these networks on the basis of three metrics- Packet delivery ratio, end to end delay, throughput using NS2 based Simulation has been undertaken. Keywords: Networks, Wired, Wireless, Optical, NS2 _________________________________________________*****______________________________________________ 1. INTRODUCTION Computer networks are the base of modern communication. All modern aspects of public switched telephone network are computer-controlled. The scope of communication would not be possible without computer network. A data network is a communication network which is used to exchange information from one node to another node using a data link or a data network is a system in which multiple computers are connected with each other to share information. The connections between nodes are established by using cable media, wireless media or light pulse [1]. Computer network provide different type of interpersonal facilities to user like email, instant messaging, telephone, video telephone calls and audio conferencing. A network allows users to share data, files and information. The user has the ability to access information which is stored on the computer network that may be used by unauthorized user to generate viruses or computer worms, to prevent these devices from viruses access that network via denial of service attack [1]. 2. NETWORK A data network is a communication network which is used to exchange information from one node to another node using a data link or a data network is a system in which multiple computers are connected with each other to share information. The connections between nodes are established by using cable media, wireless media or light pulse. The example of network is internet, which connects millions of computers all over the world [1]. 1. Wired Network Wired networks exist between a number of devices connected with each other using connecting media, such as cables and routers. These networks can be used within limited area by cables and routers that allow the data sharing (sending or receiving data). The word “wired” is used to differentiate between wireless connections and those involve cables to transfer data between different devices and computer systems. Most wired networks use Ethernet cables to transfer data between connected computer systems that’s why wired networks, also called networks. In small wired network, a single router is used to connect all the computers. Larger networks often use multiple routers or switches [5]. Figure 1: Wired Network [2] 2. Wireless Network Wireless Networks used infrared or radio frequency signals to share information and resources between devices. Wireless networks have connection between nodes without use of wires. Theses network development are cost effectiveness and it can be applicable to environments where wiring is not possible or it is a preferable solution as compared to wired networks. A wireless network consists of an access point or a base station. The access point acts like a hub, providing connectivity for wireless computers. There are four types of wireless standards for wireless networking and these types are produced by Institute of Electrical and electronics Engineers (IEEE). These standards define all aspects of radio frequency wireless networking. They have established different type of transmission standards: 802.11, 802.11a, 802.11b, 802.11g. [4][5].
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 420 – 426 ___________________________________________________________________________________________ 421 IJRITCC | July 2017, Available @ http://www.ijritcc.org ___________________________________________________________________________________ All these type of transmission standards have different speed and radio frequency. 802.11 and 802.11b are the slowest at 1 or 2Mbps and 5.5 and 11Mbps respectively. They both operate off of the 2.4 GHz radio frequency and can transmit up to 54 Mbps. Actual transmission speeds may vary and depends on such factors as number and size of the physical barriers in the network and any interference in the radio transmissions. These networks are reliable, but when interference occurs it reduce the range and the quality of the signal. Interference can be caused by other devices operating on the same radio frequency and it is very hard to control the addition of new devices on the same frequency [4] [5]. Many types of wireless devices are available today for examples, mobile terminals, pocket size PCs hand held PCs, laptops etc. The emerging third generation cellular networks have enables a variety of higher speed mobile data services. [16] [17]. Figure 2: Wireless Networks [2] 3. Optical Network Fiber optic communication is a communication technology that uses light pulses to transfer information from one point to another through an optical fiber. The information transmitted is essentially digital information generated by telephone systems, cable television companies, and computer systems as shown in the figure [7] [12]. An optical network is a type of communication network that built with optical fiber technology. It convert electrical signal into light pulses between sender and receiver nodes. It connects computers (or any other device which can generate or store data in electronic form using optical fibers. Optical fibers are essentially very thin glass cylinders or filaments which carry signals in the form of light. Optical network is implemented by using Wavelength Division Multiplexing (WDM). The WDM is a data transmission technology that transmits data in an optical fiber by establishing various channels, each channel have it’s a specific light wavelength. It is a large complex network of server hubs at different locations on ground. The server hubs are also known as head-ends, nodes or simply, sites. These networks are the backbone of Internet Service Providers [6] [7]. Figure 3: Basic Optical Fibre Communication [8] 3. TOOL USED Network Simulator (Version 2) is known as NS2 which is an event-driven simulation tool. It source code is freely distributed and discrete event simulator which works on packet scenario of networking projects for both wired and wireless network. It is useful in studying the nature of communication networks. It is a portable tool that works on all Linux and windows operating systems. It support many routing protocols, network topologies like bus, ring, hybrid, star topologies to design both wired and wireless network with the help of simulation scripts. This tool is help to calculate throughput, error rate, end to end delay, packet delivery ratio, total number of packet send and received by destination using TCL scripts AWK, Perl. [13] Ns-2 support both transport layer protocols TCP and UDP. Theses protocols are used to transmit data in the form of packets from source to destination and it also support various type of traffic generators to generate data in the form of packets and these packets send over transport layer protocols. CBR (Constant Bit Rate), exponential traffic (poison traffic), Pareto traffic (expoo traffic) and FTP are traffic generators which are used to generate data between nodes. [13] To run the TCL script NS2 use the NAM (network animator) which is a visualization tool which show the nodes and flow of packet as written in the TCL script 1. Basic architecture of NS2 NS2 consists of two key languages: C++ and Object- oriented Tool Command Language (OTcl). The C++ and the OTcl are linked together using TclCL and mapped to a C++ object, variables in the Otcl domain. This language helps to create network scenario and also allows modification in Tcl
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 420 – 426 ___________________________________________________________________________________________ 422 IJRITCC | July 2017, Available @ http://www.ijritcc.org ___________________________________________________________________________________ script. [2] [3] Simulation scenario contains network nodes, topology and connections between the nodes. NS2 provides users to executable command ns with the name of a Tcl simulation scripting file. In the scenario, Tcl language is used to design the network which set parameters, node configurations and topology, Connection between nodes, transfer packages and simulation time [2] [10]. NS2 outputs either text-based or animation-based simulation results. NAM (Network Animator) is a visualization tool which shows communication between nodes, flow of packets as written in the TCL script and also provides animation based result. XGraph are used to generate graph to analyze a particular behavior of the network presentation [2]. Figure 4: Basic architecture of NS2 [2] 2. Programming Language in NS2 NS2 provides a large number of built-in C++ objects. The C++ is used for the simulation with the help of Tcl simulation script but the users find that these objects are insufficient. They develop their own C++ objects and use an Otcl configuration and interface these objects. The two programming languages are used because this makes tool easy to use, yet fast and powerful simulator. C++ defines the internal mechanism of simulation objects and also used for the security packages in encryption and decryption while OTcl works for the frontend environment. OTcl and C++ interact with each other through Tcl/C++ interface called TclCL as show in figure 5 [3]. Figure 5: C++ and Tcl Communication [3] Otcl is a language with simple syntaxes which can easily integrate with other languages. The characteristics of the languages are: • It provides a graphic interface • It is compatible with many protocols • It is very flexible for integration • The scripting language is used which is easy to understand 4. TRAFFIC SCENARIO FOR WIRED NETWORK A wired network using distance vector routing protocol has been designed and implemented. The distance vector routing protocol selects a shortest path from source to destination. This wired network traffic scenario has been generated by using tcl script which specifies information about different nodes, links, delay and also agents used at source and destination nodes. After executing the program which is written in tcl script using ns command then this network has been visualized in the NAM animator as shown in the figure 6 [10]. Figure 6: Wired Network Communication 1. Tracing Simulation of network in NS2 generates traces of all the events in a trace file as shown in below figure7. The format for trace file of a network differs depending on whether the network is wired or wireless. This trace file is data is used to calculate the different performance metrics and for plotting the data on graphs for further analysis and comparison.
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 420 – 426 ___________________________________________________________________________________________ 423 IJRITCC | July 2017, Available @ http://www.ijritcc.org ___________________________________________________________________________________ Figure 7: Wired Network Trace file 5. TRAFIC SCENARIO FOR WIRELESS NETWORK A wireless network using Destination-Sequenced Distance Vector routing protocol has also been designed and implemented. The Destination-Sequenced Distance Vector (DSDV) protocol is the commonly used proactive routing protocol in mobile ad hoc network. Proactive routing protocol maintains constant and updated routing information for each pair of networking nodes by propagating route updates proactively at fixed interval of time. The periodic and event-driven messages are responsible for route establishment and route maintenance. In DSDV, each node maintains a routing table with one route entry for each destination in which the shortest path is recorded. It uses a destination sequence number to avoid routing loops. The figure 4.3 shows a node configuration for a wireless mobile node that runs DSDV as its ad hoc routing protocol. After that the program has been executed which is written in tcl script using ns command then could be visualized the network in the NAM animator as shown in the figure 8. Figure 8: Wireless Network Communication 1. Tracing Simulation of network in NS2 generates traces of all the events in a trace file as shown in below figure 9. The format in wireless network is different for different routing protocol. This trace file is data is used to calculate the different performance metrics and for plotting the data on graphs for further analysis and comparison. Figure 9: Wireless Network Trace file 6. TRAFFIC SCENARIO FOR OPTICAL NETWORK An optical network using distance vector routing protocol has been designed and implemented. The distance vector routing protocol selects a shortest path from source to destination. We create the optical network traffic scenario by using tcl script which consist with six nodes, duplex links, delay in ms and also used agents at source and destination nodes. After that execute the program which is written in tcl script using ns command then we could visualize the network in the NAM animator as shown in the figure 10. Figure 10: Optical Network Communication
  • 5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 420 – 426 ___________________________________________________________________________________________ 424 IJRITCC | July 2017, Available @ http://www.ijritcc.org ___________________________________________________________________________________ 1. Tracing Simulation of network in NS2 generates traces of all the events in a trace file as shown in below figure 11. This trace file is data which is used to calculate the different performance metrics and for plotting the data on graphs for further analysis and comparison Figure 11: Optical Network Trace file 7. PERFORMANCE ANALYSIS OF PARAMETERS 1. Average End-to-End Delay The end to end delay is the time from the generation of the packet by the sender up to send at the destination application layer and expressed in second. It therefore include all the delay in the network such as buffer Queue, transmission and delay induced by routing protocol activities and MAC control data exchanges. [12] End to End delay = [(Sum of Individual data packet delay) / (Total number of data Packets delivered)] Figure 12: Comparison of average end-to-end delay The figure 12 shows the graph between end to end delay and number of nodes. The graph shows that wireless network have more delay as compared to wired and optical network and optical network have less delay as compared to wired network. 2. Packet Delivery Ratio Packet Delivery Ratio is defined as the ratio between the received packets at the destination and the generated packets at the source it is calculated by using awk script which processes the trace file and produces the result. [2] Packet Delivery Ratio= [(Total packets received at the destination) / (Total packets generated at the source)] Figure 13: Comparison of Packet Delivery Ratio The figure 13 shows the graph between packet delivery ratio and number of nodes. The graph shows that optical network have more packet delivery ratio as compared to wired and
  • 6. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 420 – 426 ___________________________________________________________________________________________ 425 IJRITCC | July 2017, Available @ http://www.ijritcc.org ___________________________________________________________________________________ optical network and wireless network have less packet delivery ratio as compared to wired network. 3. Average Throughput The ratio of total amount of data that reaches from source to destination to the time for the destination to get the last packet is referred as Throughput. A network with high average throughput is desirable. Throughput = (Number of data packets received*Packet size*8) / Simulation time Figure 14: Comparison of Throughput The figure 14 shows the graph between throughput and number of nodes. The graph shows that optical network have more throughput as compared to wired and optical network and wireless network have less packet delivery ratio as compared to wired network. III. CONCLUSION AND FUTURE SCOPE The optical network has many advantages over copper based communication in terms of bandwidth, signal security, electrical interference, size and weight but it is more costly as compared to wired and wireless network. A wireless network is that whose interconnection is implemented without use of wire. This network is mostly associated with telecommunication network. The electromagnetic waves are used for the communication and the reason for using wireless networks are cost effectiveness of network. This network is applicable in that environment where wiring is not possible or it is preferable solution. The optical network has higher bandwidth and high speed as compared to wired and wireless networks. The wireless network is easy to use but due to interference signal may lost. In this research work, we designed and simulate a wired, wireless and optical network. The results of simulation are stored in a trace file that records data about all events that occurred during simulation process. The graphs show that the optical networks have more throughput and packet delivery ratio whereas end to end delay is less as compared to wired and wireless network. So from the results we can conclude that the optical network is better as compared to wired and wireless network. In future, there is a lot of work that can be done and wide variety of parameters that can be compared for wired, wireless and optical networks for a large range of applications in different scenarios. REFERENCES [1] Aditi Mehta, Vaishali Yadav, “A STUDY ON COMPUTER NETWORK AND NETWORK TOPOLOGY”, 2014 IJIRT | Volume 1 Issue 5 | ISSN: 2349-6002. [2] Sachi Pandey, Vibhore Tyagi, “Performance Analysis of Wired and Wireless Network using NS2 Simulator” International Journal of Computer Applications (0975 – 8887) Volume72– No.21, June 2013. [3] S.Jeneeth Subashini, D. Guna Shekar, C.Harinath Reddy, M. Manikanta, “Implementation of Wired and Wireless Networks, Analysis Simulation and Result Comparison Using Ns2”, International Journal of Electrical and Electronics Research ISSN 2348-6988 (online) Vol. 2, Issue 3, pp: (209-225), Month: July - September 2014. [4] Eng.Nassar Enad. GH. Muhanna, “Computer Wireless Networking And Communication”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 8, August 2013. [5] Navpreet Kaur, Sangeeta Monga, “COMPARISONS OF WIRED AND WIRELESS NETWORKS: A REVIEW”, Kaur et al., International Journal of Advanced Engineering Technology E-ISSN 0976-3945. [6] M. Arumugam, ―Optical Fibre Communication – An Overview‖ Pramana journal of physics, VOL. 57, Nos5 & 6, PP. 849–869, 2001. [7] Prachi Sharma, Rohit Kumar Arora, Suraj Pardeshi, Mandeep Singh, “ Fibre Optic Communications: An Overview” , International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 5, May 2013. [8] Francis Idachaba, Dike U. Ike, and Orovwode Hope, “Future Trends in Fiber Optics Communication”, Proceedings of the World Congress on Engineering 2014 Vol I,WCE 2014, July 2 - 4, 2014, London, U.K. [9] Sirwan A.Mohammed Prof. Dr. Sattar B.Sadkhan, “DESIGN OF WIRELESS NETWORK BASED ON NS2”, Volume 3, No. 12, December 2012. [10] Sirwan a. Mohammed, “design and simulation of network using NS2”, International Journal of Electronics,
  • 7. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 420 – 426 ___________________________________________________________________________________________ 426 IJRITCC | July 2017, Available @ http://www.ijritcc.org ___________________________________________________________________________________ Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249- 684X Vol.3, Issue 1, Mar 2013, 237-248. [11] Almargni Ezreik, Abdalla Gheryani, “Design and Simulation of Wireless Network using NS-2”,2nd International Conference on Computer Science and Information Technology (ICCSIT'2012) Singapore April 28-29, 2012. [12] Parul Kaushik, “Optical Networking – A Study”, Volume 5, Issue 5, May 2015 ISSN: 2277 128X. [13] Sharat Kaushik, Poonam, Anita Tomar, “A Comparative Analysis of Transport Layer Protocols International Journal of Information & Computation Technology”, ISSN 0974-2239 Volume 4, Number 14 (2014), pp. 1403-1410.