SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
International Journal of Engineering Research and Development
ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48
www.ijerd.com

       Performance Evaluation of Wired and Wireless Local Area
                              Networks
      Prof. Satish K. Shah1, Ms. Sonal J Rane2, Ms. Dharmistha D Vishwakarma3
1,3
   Department of Elect. Engg., Faculty of Tech.& Engg., M.S.University of Baroda, Kalabhavan,Vadodara-390001,Gujarat,
                                                           India
2
  Dept. of Elect. Engg., Faculty of Tech. & Engg., M.S.University of Baroda, Kalabhavan, Vadodara-390001, Gujarat, India


Abstract––Very large scale integration of complex circuits on to a smaller chip demands for the evolution of high speed
computer networks. The traditional wired network constraints like mobility and expensive cabling. But wireless
communication is a flexible data communication system implemented as an extension to or as an alternative for wired
communication. The bandwidth and the services provided by the wireless communication networks are similar to that
provided by the wired networks. Computing the viability and performance of computer networks in real can be very
expensive task. In this paper, performance of wireless and wired networks as well as comparison is evaluated using OPNET
simulation tool. For wired network, collision count, traffic received, delay, throughput is studied while for wireless network,
data dropped, traffic received, media access delay, and throughput is studied. For comparison of both wired and wireless
networks, the performance parameters throughput is investigated. All these performance is carried out by varying number of
users.

Keywords—Ethernet, WLAN, OPNET, Throughput, Delay

                                            I.          INTRODUCTION
          Networks (Wired and Wireless) have grown like weed over the past few decades providing a pace to the means of
accessing network resources. Therefore, it is vital to have an accurate and a reliable generic platform to enable network. The
wired Networks provide a secure and faster means of connectivity. The performance of the wired Ethernet is very sensitive
to the number of users, offered load, transmission links while wireless is also very sensitive to the number of users, offered
load as well as physical characteristics, data rate, packet size and so on. We can compare wired and wireless networks in the
area of installation, cost, reliability, performance, security, mobility. As networks are being upgraded from scratch all over
the word, network planning is becoming most important. Computing the viability and performance of networks in real can
be very expensive and painstaking task. To ease and comfort the process of estimating and predicting a network techniques
are widely used and put into practice. A variety of simulation tools like Qualnet, NS2, Netsim and OPNET are available for
the purpose of modelling and simulation but the choice of a simulator depends upon the features available and requirements
of network application. Among the various network simulators OPNET provides the industry’s leading environment for
network modelling and simulation. It allows to design and study communication networks, devices, protocols, and
applications with flexibility and scalability. It provides object oriented modelling approach and graphical editors that mirror
the structure of actual networks and network components. The analysis helped to estimate and optimize the performance of
wired and wireless networks using proposed optimization techniques [1].

          This paper has been organized as follows: Part I deals with Introduction, Part II and Part III deal with the brief
description of IEEE 802.11 and IEEE 802.3, Part IV deals with the simulation set-up and result with the performance metrics
being focused upon and in the last section the paper has been concluded.

                                   II.           WIRED NETWORK : IEEE802.3
           Wired local area networks include several technologies like Ethernet, token ring, token bus, Fibre distributed data
interface and asynchronous transfer mode local area networks [2]. Standardized in IEEE 802.3, Ethernet has largely replaced
competing wired LAN technologies. The Ethernet is a working example of the more general Carrier Sense, Multiple Access
with Collision Detect (CSMA/CD) local area network technology. The Ethernet is a multiple-access network, meaning that a
set of nodes sends and receives frames over a shared link. When the two devices transmit at the same time the collision can
occur. This collision generates a jam signal that causes all nodes on the segment to stop sending data, which informs all the
devices that a collision has occurred. The ―carrier sense‖ in CSMA/CD means that all the nodes can distinguish between an
idle and a busy link. The ―collision detect‖ means that a node listens as it transmits and can therefore detect when a frame it
is transmitting has interfered (collided) with a frame transmitted by another node. The Ethernet is said to be a 1-persistent
protocol because an adaptor with a frame to send transmits with probability 1 whenever a busy line goes idle.

                            III.          WIRELESS NETWORK : IEEE 802.11
          IEEE 802.11 is a recent standard developed for wireless local area networks (WLANs). IEEE 802.11 is a multiple
access protocol in which stations in the network must ―compete‖ for access to the shared communications medium to
transmit data. IEEE 802.11 uses a carrier sensing capability to determine if the communications medium is currently being
used [3]. If two or more stations in the network transmit at the same time (i.e., a collision occurs), stations retransmit their

                                                              43
Performance Evaluation of Wired and Wireless Local Area Networks

data after random periods of time as in Ethernet. Wi-Fi (Wireless Fidelity) Technology, referred as the 802.11
communications standard for WLAN is the popular wireless networking technology that uses radio waves to provide
wireless high-speed Internet and network connections.

          The 802.11 data link layer is divided in two sub layers: Logical Link Control (LLC) and Media Access Control
(MAC). LLC is the same as in 802 LAN allowing for very simple bridging from wireless to wire networks. MAC is different
to WLANs. The first method in MAC is CSMA with collision avoidance protocol. This protocol is to ask each station to
listen before action. If the channel is busy, the station has to wait until channel is free. Another method in MAC is called
RTS/CTS to solve hidden-Node problem [4].

                           IV.           SIMULATION SET-UP AND RESULTS
          The Ethernet is a multi-access network, meaning that a set of nodes sends and receives frames over a shared link.
It implements the capability of transmitting and monitoring a connected bus link at a same time. It has full duplex capability.
Here we setup Ethernet network model with star topology and data rate of 10Mbps using OPNET [5] with 25, 50,100 users.
Scenario for wired network, created for Ethernet using 50 nodes, is shown in Figure 1(a). The Wireless LAN model suite
includes the features of the IEEE 802.11 operating at a data rate of 10Mbps in a star topology using OPNET Modeler 14.5 is
as shown in Figure 1(b). The network also expanded for the 25 and 100 users.




                                  Fig. 1(a) Ethernet network model for 50 Ethernet stations




                                        Fig.1(b) Wireless network model for 50 users

        In this section, the wireless and wired networks performances are analysed using OPNET [6] simulation. In wired
and wireless network, comparison is done by varying number of users. The performance metrics evaluated are throughput,
delay, data dropped, traffic received, collision count, retransmission attempts.
     Throughput: network throughput is the average rate of successful message delivery over a communication channel.
        It is measured in bits per second (bit/s or bps) or in data packets per second or data packets per time slot.
     Retransmission attempts: Total number of retransmission attempts by all WLAN MAC in the network until either
        packet is successfully transmitted or it is discarded as a result of reaching short or long retry limit.
     Collision Count: Total number of collisions encountered by this station during packet transmissions [5].
     Data Dropped: Total higher layer data traffic (in bits/sec) dropped by the all the WLAN MACs in the network as a
        result of consistently failing retransmissions. This statistic reports the number of the higher layer packets that are

                                                             44
Performance Evaluation of Wired and Wireless Local Area Networks

       dropped because the MAC couldn't receive any ACKs for the (re)transmissions of those packets or their fragments, and
       the packets' short or long retry counts reached the MAC's short retry limit or long retry limit, respectively [5].

       From the Figure 2 it is observed that the received bit rate is approximately equal to the sent bit rate for small number
of users. As the number of user increases, more traffic was sent and received. As the number of users increases the hub
switch becomes overloaded and cannot deliver all the traffic that it received.




                         Fig. 2(a) traffic sent (bits/sec) of different scenarios having 25,50,100 users




                     Fig. 2(b) Traffic received (bits/sec) of different scenarios having 25, 50, 100 users

           Discrepancies between send and receive rates can be accounted for by inspecting the collision count statistic as
shown in Figure 3. In Figure 4, it is observed that maximum throughput is achieved in the case when less number of users is
deployed. As the number of users increases, more number of the higher layer packets that are dropped because the MAC
couldn’t receive any ACK for the (re) transmissions of those packets or their fragments, and the packets’ short retry limit or
long retry limit, respectively. With less number of users, the overall performance of the system increases as data transmission
will be faster.




                                                              45
Performance Evaluation of Wired and Wireless Local Area Networks




                                          Fig. 3 Collision count in wireless network




                          Fig.4 Throughput (bits/sec) of different scenarios on node 21 for Ethernet

           As the number of users increases in WLAN, data dropped in wireless LAN increases. Some of the packets that were
sent collided and require retransmissions. So as the users increases, retransmission rate increases for the more number of users
which is shown in Figure 5(a) and Figure 5(b) respectively. As the number of user increases, collision between the user data
increases and the retransmissions of the user increases which cause for the degradation in the performance of wireless
network. It can be observed from Figure 6 that as the number of users increases from 25 to 100 the performance of WLAN
decreases.




                               Fig.5 (a) Data dropped for different scenarios for Wireless LAN




                                                              46
Performance Evaluation of Wired and Wireless Local Area Networks




                         Fig. 5(b) Retransmission attempts of different scenarios for Wireless LAN




                            Fig.6 Throughput (bits/sec) of different scenarios for Wireless LAN

           Throughput comparison of wired and wireless network is performed for the number of users of 25, 50, and 100
with the data rate of 10 MBPS for both the network. The performance of the networks measured using performance of the
random node present in the network. While comparing throughput of Ethernet (wired) in blue color and WLAN (wireless) in
red color in Figure 7(a) ,(b),(c) for 25 users on node_07, for node 37 in 50 users scenario and node 97 for the scenario with
100 users respectively. With less number of users, the overall performance of the system increases as data transmission will
be faster. Also it is observed that the throughput of Wireless LAN is greater than throughput of Ethernet for less number of
users. As the number of user increases, throughput of WLAN becomes poor because of slow transmission speed and data
dropped. When the number of users is increased, the throughput decreases for wireless systems, these effects associated with
wireless transmission limit the SNR (Signal to Noise Ratio) and bandwidth of the received signal, and therefore the maximum
number of bits that can be sent.




                                 Fig. 7(a) Throughput of Ethernet and WLAN on node 07




                                                            47
Performance Evaluation of Wired and Wireless Local Area Networks




                                  Fig.7(b) Throughput of Ethernet and WLAN on node 37




                                  Fig. 7(c) Throughput of Ethernet and WLAN on node 97

                             V.            CONCLUSIONS & FUTURE WORK
          In this paper set of simulation experiments performed in OPNET simulator that compares wired and wireless
network performances. For the less number of users wireless network performs better than the wired network for the same
data rate of packets. While as the number of user increases the performance and throughput degradation occurs for wireless
network than the wired network with same speed due to the transmission limit, SNR (signal to noise) and bandwidth of the
received signal. As the number of users or load increases beyond some limit on wireless network can cause the collisions
among the packets sent by the users and due to that the retransmissions occurs in the wireless network which degrade the
performance. So to improve the overall performance of the system it is better to use hybrid network which is the
combination of both wired and wireless network.

                                     VI.          ACKNOWLEDGMENT
          Authors are thankful to Dept. of Elect. Engg., Faculty of Tech. & Engg., M.S.University of Baroda for technical
help in doing this work.

                                                  REFERENCES
  [1].   Dr. R.K.Bansal,Vikas Gupta,Rahul Malhotra,‖ Performance analysis of wired and wireless LAN using soft
         computing techniques-A review‖, Global Journal of Computer Science and Technology, Vol. 10 Issue 8 Ver.1.0
         September 2010.
  [2].   Ikram Ud Din, Saeed Mahfooz and Muhammad Adnan, ―Performance Evaluation of Different Ethernet LANs
         Connected by Switches and Hubs, European Journal of Scientific Research, vol. 37 No. 3, pp. 461-470, 2009.
  [3].    Jia Wang and Srinivasan Keshav,‖Efficient and Accurate Ethernet Simulation‖, Proc. Of the 24th Conference on
         Local Computer Networks (LCN'99), pp. 182-191, 1999.
  [4].   Mohammad Hussain Ali and Manal Kadhim Odah, ―Simulation Study of802.11b DCF using OPNET Simulator,‖
         Eng. & Tech. Journal, vol.27,No6,2009,pp:1108-1117,2009
  [5].   OPNET Technologies, www.opnet.com
  [6].   Constantinos Hilas1 and Anastasios Politis2 ,‖ Simulations of various IEEE 802.11b network configurations for
         educational purposes‖



                                                           48

Mais conteúdo relacionado

Mais procurados

Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
 
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJASOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJAvtunotesbysree
 
Communication Networks 2 marks q &answers
Communication Networks  2 marks q &answersCommunication Networks  2 marks q &answers
Communication Networks 2 marks q &answersRaja Madhuvanthi
 
Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance ...
Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance ...Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance ...
Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance ...pijans
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos incaijjournal
 
Module 1 computer networks imtroduction,data link layer
Module 1  computer networks imtroduction,data link layerModule 1  computer networks imtroduction,data link layer
Module 1 computer networks imtroduction,data link layerDeepak John
 
EC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKSEC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKSGOWTHAMMS6
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing TechonologiesKathirvel Ayyaswamy
 
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...ijceronline
 
Ad hoc and wsn
Ad hoc and wsnAd hoc and wsn
Ad hoc and wsnGOWTHAMMS6
 
Efectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeEfectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeGregorio Toro Rivera
 
The Network Layer
The Network LayerThe Network Layer
The Network Layeradil raja
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
 
Networking Related
Networking RelatedNetworking Related
Networking RelatedZunAib Ali
 
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...CSCJournals
 
03 internetworking
03 internetworking03 internetworking
03 internetworkingbajulusiraj
 

Mais procurados (19)

Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJASOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
 
Communication Networks 2 marks q &answers
Communication Networks  2 marks q &answersCommunication Networks  2 marks q &answers
Communication Networks 2 marks q &answers
 
Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance ...
Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance ...Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance ...
Investigation and Evaluation of IEEE 802.11n Wlans Link Features Performance ...
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 
Module 1 computer networks imtroduction,data link layer
Module 1  computer networks imtroduction,data link layerModule 1  computer networks imtroduction,data link layer
Module 1 computer networks imtroduction,data link layer
 
EC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKSEC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKS
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing Techonologies
 
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
 
Ad hoc and wsn
Ad hoc and wsnAd hoc and wsn
Ad hoc and wsn
 
Efectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeEfectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig bee
 
The Network Layer
The Network LayerThe Network Layer
The Network Layer
 
Chapter7 l1
Chapter7 l1Chapter7 l1
Chapter7 l1
 
Network layer
Network layerNetwork layer
Network layer
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
 
Networking Related
Networking RelatedNetworking Related
Networking Related
 
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
 
03 internetworking
03 internetworking03 internetworking
03 internetworking
 
Computer network answer
Computer network answerComputer network answer
Computer network answer
 

Semelhante a Performance comparison of wired and wireless LANs

Paper id 36201527
Paper id 36201527Paper id 36201527
Paper id 36201527IJRAT
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS ijwmn
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...IRJET Journal
 
Traffic Engineering in Metro Ethernet
Traffic Engineering in Metro EthernetTraffic Engineering in Metro Ethernet
Traffic Engineering in Metro EthernetCSCJournals
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11eSAT Publishing House
 
Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 eteSAT Journals
 

Semelhante a Performance comparison of wired and wireless LANs (20)

Paper id 36201527
Paper id 36201527Paper id 36201527
Paper id 36201527
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Cw25585588
Cw25585588Cw25585588
Cw25585588
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 
Traffic Engineering in Metro Ethernet
Traffic Engineering in Metro EthernetTraffic Engineering in Metro Ethernet
Traffic Engineering in Metro Ethernet
 
J010216776
J010216776J010216776
J010216776
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11
 
Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 et
 

Mais de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Mais de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Último

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Último (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Performance comparison of wired and wireless LANs

  • 1. International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof. Satish K. Shah1, Ms. Sonal J Rane2, Ms. Dharmistha D Vishwakarma3 1,3 Department of Elect. Engg., Faculty of Tech.& Engg., M.S.University of Baroda, Kalabhavan,Vadodara-390001,Gujarat, India 2 Dept. of Elect. Engg., Faculty of Tech. & Engg., M.S.University of Baroda, Kalabhavan, Vadodara-390001, Gujarat, India Abstract––Very large scale integration of complex circuits on to a smaller chip demands for the evolution of high speed computer networks. The traditional wired network constraints like mobility and expensive cabling. But wireless communication is a flexible data communication system implemented as an extension to or as an alternative for wired communication. The bandwidth and the services provided by the wireless communication networks are similar to that provided by the wired networks. Computing the viability and performance of computer networks in real can be very expensive task. In this paper, performance of wireless and wired networks as well as comparison is evaluated using OPNET simulation tool. For wired network, collision count, traffic received, delay, throughput is studied while for wireless network, data dropped, traffic received, media access delay, and throughput is studied. For comparison of both wired and wireless networks, the performance parameters throughput is investigated. All these performance is carried out by varying number of users. Keywords—Ethernet, WLAN, OPNET, Throughput, Delay I. INTRODUCTION Networks (Wired and Wireless) have grown like weed over the past few decades providing a pace to the means of accessing network resources. Therefore, it is vital to have an accurate and a reliable generic platform to enable network. The wired Networks provide a secure and faster means of connectivity. The performance of the wired Ethernet is very sensitive to the number of users, offered load, transmission links while wireless is also very sensitive to the number of users, offered load as well as physical characteristics, data rate, packet size and so on. We can compare wired and wireless networks in the area of installation, cost, reliability, performance, security, mobility. As networks are being upgraded from scratch all over the word, network planning is becoming most important. Computing the viability and performance of networks in real can be very expensive and painstaking task. To ease and comfort the process of estimating and predicting a network techniques are widely used and put into practice. A variety of simulation tools like Qualnet, NS2, Netsim and OPNET are available for the purpose of modelling and simulation but the choice of a simulator depends upon the features available and requirements of network application. Among the various network simulators OPNET provides the industry’s leading environment for network modelling and simulation. It allows to design and study communication networks, devices, protocols, and applications with flexibility and scalability. It provides object oriented modelling approach and graphical editors that mirror the structure of actual networks and network components. The analysis helped to estimate and optimize the performance of wired and wireless networks using proposed optimization techniques [1]. This paper has been organized as follows: Part I deals with Introduction, Part II and Part III deal with the brief description of IEEE 802.11 and IEEE 802.3, Part IV deals with the simulation set-up and result with the performance metrics being focused upon and in the last section the paper has been concluded. II. WIRED NETWORK : IEEE802.3 Wired local area networks include several technologies like Ethernet, token ring, token bus, Fibre distributed data interface and asynchronous transfer mode local area networks [2]. Standardized in IEEE 802.3, Ethernet has largely replaced competing wired LAN technologies. The Ethernet is a working example of the more general Carrier Sense, Multiple Access with Collision Detect (CSMA/CD) local area network technology. The Ethernet is a multiple-access network, meaning that a set of nodes sends and receives frames over a shared link. When the two devices transmit at the same time the collision can occur. This collision generates a jam signal that causes all nodes on the segment to stop sending data, which informs all the devices that a collision has occurred. The ―carrier sense‖ in CSMA/CD means that all the nodes can distinguish between an idle and a busy link. The ―collision detect‖ means that a node listens as it transmits and can therefore detect when a frame it is transmitting has interfered (collided) with a frame transmitted by another node. The Ethernet is said to be a 1-persistent protocol because an adaptor with a frame to send transmits with probability 1 whenever a busy line goes idle. III. WIRELESS NETWORK : IEEE 802.11 IEEE 802.11 is a recent standard developed for wireless local area networks (WLANs). IEEE 802.11 is a multiple access protocol in which stations in the network must ―compete‖ for access to the shared communications medium to transmit data. IEEE 802.11 uses a carrier sensing capability to determine if the communications medium is currently being used [3]. If two or more stations in the network transmit at the same time (i.e., a collision occurs), stations retransmit their 43
  • 2. Performance Evaluation of Wired and Wireless Local Area Networks data after random periods of time as in Ethernet. Wi-Fi (Wireless Fidelity) Technology, referred as the 802.11 communications standard for WLAN is the popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. The 802.11 data link layer is divided in two sub layers: Logical Link Control (LLC) and Media Access Control (MAC). LLC is the same as in 802 LAN allowing for very simple bridging from wireless to wire networks. MAC is different to WLANs. The first method in MAC is CSMA with collision avoidance protocol. This protocol is to ask each station to listen before action. If the channel is busy, the station has to wait until channel is free. Another method in MAC is called RTS/CTS to solve hidden-Node problem [4]. IV. SIMULATION SET-UP AND RESULTS The Ethernet is a multi-access network, meaning that a set of nodes sends and receives frames over a shared link. It implements the capability of transmitting and monitoring a connected bus link at a same time. It has full duplex capability. Here we setup Ethernet network model with star topology and data rate of 10Mbps using OPNET [5] with 25, 50,100 users. Scenario for wired network, created for Ethernet using 50 nodes, is shown in Figure 1(a). The Wireless LAN model suite includes the features of the IEEE 802.11 operating at a data rate of 10Mbps in a star topology using OPNET Modeler 14.5 is as shown in Figure 1(b). The network also expanded for the 25 and 100 users. Fig. 1(a) Ethernet network model for 50 Ethernet stations Fig.1(b) Wireless network model for 50 users In this section, the wireless and wired networks performances are analysed using OPNET [6] simulation. In wired and wireless network, comparison is done by varying number of users. The performance metrics evaluated are throughput, delay, data dropped, traffic received, collision count, retransmission attempts.  Throughput: network throughput is the average rate of successful message delivery over a communication channel. It is measured in bits per second (bit/s or bps) or in data packets per second or data packets per time slot.  Retransmission attempts: Total number of retransmission attempts by all WLAN MAC in the network until either packet is successfully transmitted or it is discarded as a result of reaching short or long retry limit.  Collision Count: Total number of collisions encountered by this station during packet transmissions [5].  Data Dropped: Total higher layer data traffic (in bits/sec) dropped by the all the WLAN MACs in the network as a result of consistently failing retransmissions. This statistic reports the number of the higher layer packets that are 44
  • 3. Performance Evaluation of Wired and Wireless Local Area Networks dropped because the MAC couldn't receive any ACKs for the (re)transmissions of those packets or their fragments, and the packets' short or long retry counts reached the MAC's short retry limit or long retry limit, respectively [5]. From the Figure 2 it is observed that the received bit rate is approximately equal to the sent bit rate for small number of users. As the number of user increases, more traffic was sent and received. As the number of users increases the hub switch becomes overloaded and cannot deliver all the traffic that it received. Fig. 2(a) traffic sent (bits/sec) of different scenarios having 25,50,100 users Fig. 2(b) Traffic received (bits/sec) of different scenarios having 25, 50, 100 users Discrepancies between send and receive rates can be accounted for by inspecting the collision count statistic as shown in Figure 3. In Figure 4, it is observed that maximum throughput is achieved in the case when less number of users is deployed. As the number of users increases, more number of the higher layer packets that are dropped because the MAC couldn’t receive any ACK for the (re) transmissions of those packets or their fragments, and the packets’ short retry limit or long retry limit, respectively. With less number of users, the overall performance of the system increases as data transmission will be faster. 45
  • 4. Performance Evaluation of Wired and Wireless Local Area Networks Fig. 3 Collision count in wireless network Fig.4 Throughput (bits/sec) of different scenarios on node 21 for Ethernet As the number of users increases in WLAN, data dropped in wireless LAN increases. Some of the packets that were sent collided and require retransmissions. So as the users increases, retransmission rate increases for the more number of users which is shown in Figure 5(a) and Figure 5(b) respectively. As the number of user increases, collision between the user data increases and the retransmissions of the user increases which cause for the degradation in the performance of wireless network. It can be observed from Figure 6 that as the number of users increases from 25 to 100 the performance of WLAN decreases. Fig.5 (a) Data dropped for different scenarios for Wireless LAN 46
  • 5. Performance Evaluation of Wired and Wireless Local Area Networks Fig. 5(b) Retransmission attempts of different scenarios for Wireless LAN Fig.6 Throughput (bits/sec) of different scenarios for Wireless LAN Throughput comparison of wired and wireless network is performed for the number of users of 25, 50, and 100 with the data rate of 10 MBPS for both the network. The performance of the networks measured using performance of the random node present in the network. While comparing throughput of Ethernet (wired) in blue color and WLAN (wireless) in red color in Figure 7(a) ,(b),(c) for 25 users on node_07, for node 37 in 50 users scenario and node 97 for the scenario with 100 users respectively. With less number of users, the overall performance of the system increases as data transmission will be faster. Also it is observed that the throughput of Wireless LAN is greater than throughput of Ethernet for less number of users. As the number of user increases, throughput of WLAN becomes poor because of slow transmission speed and data dropped. When the number of users is increased, the throughput decreases for wireless systems, these effects associated with wireless transmission limit the SNR (Signal to Noise Ratio) and bandwidth of the received signal, and therefore the maximum number of bits that can be sent. Fig. 7(a) Throughput of Ethernet and WLAN on node 07 47
  • 6. Performance Evaluation of Wired and Wireless Local Area Networks Fig.7(b) Throughput of Ethernet and WLAN on node 37 Fig. 7(c) Throughput of Ethernet and WLAN on node 97 V. CONCLUSIONS & FUTURE WORK In this paper set of simulation experiments performed in OPNET simulator that compares wired and wireless network performances. For the less number of users wireless network performs better than the wired network for the same data rate of packets. While as the number of user increases the performance and throughput degradation occurs for wireless network than the wired network with same speed due to the transmission limit, SNR (signal to noise) and bandwidth of the received signal. As the number of users or load increases beyond some limit on wireless network can cause the collisions among the packets sent by the users and due to that the retransmissions occurs in the wireless network which degrade the performance. So to improve the overall performance of the system it is better to use hybrid network which is the combination of both wired and wireless network. VI. ACKNOWLEDGMENT Authors are thankful to Dept. of Elect. Engg., Faculty of Tech. & Engg., M.S.University of Baroda for technical help in doing this work. REFERENCES [1]. Dr. R.K.Bansal,Vikas Gupta,Rahul Malhotra,‖ Performance analysis of wired and wireless LAN using soft computing techniques-A review‖, Global Journal of Computer Science and Technology, Vol. 10 Issue 8 Ver.1.0 September 2010. [2]. Ikram Ud Din, Saeed Mahfooz and Muhammad Adnan, ―Performance Evaluation of Different Ethernet LANs Connected by Switches and Hubs, European Journal of Scientific Research, vol. 37 No. 3, pp. 461-470, 2009. [3]. Jia Wang and Srinivasan Keshav,‖Efficient and Accurate Ethernet Simulation‖, Proc. Of the 24th Conference on Local Computer Networks (LCN'99), pp. 182-191, 1999. [4]. Mohammad Hussain Ali and Manal Kadhim Odah, ―Simulation Study of802.11b DCF using OPNET Simulator,‖ Eng. & Tech. Journal, vol.27,No6,2009,pp:1108-1117,2009 [5]. OPNET Technologies, www.opnet.com [6]. Constantinos Hilas1 and Anastasios Politis2 ,‖ Simulations of various IEEE 802.11b network configurations for educational purposes‖ 48