Analysis for Modulation and Coding Scheme with Data Rate Traffic Over IEEE 802.11AC and 802.11N in Wireless Multimedia
Keywords:WMM, DSCP, QoS, voice, video, data packets, best-effort
This paper discusses wireless traffic consisting of various types of data packets. Regardless of the type of data being sent and received, the transmission can suffer from latency problems. The wireless multimedia standard enables the service provider to prioritize voice, video, best-effort, and background data by adding differentiated services code point value to the internet protocol header. This effectively allows network users to benefit from optimal network performance while using various applications with different latency and throughput requirements. In this paper, we conducted a study of five use-cases over two common wireless standards, IEEE 802.11n and IEEE 802.11ac. The study was carried out by prioritizing, respectively, voice, video data packets, with lowest priority assigned to best-effort data packets. The best-effort traffic can have more bandwidth than the voice or video. Under each use case, we evaluated the impact of additional network load on video streaming.
P. Sharma, R. K. Chaurasiya, and A. Saxena, “Comparison analysis between IEEE 802.11 a/b/g/n,” International Journal of Scientific & Engineering Research, vol. 4, issue 5, pp. 988-993, 2013.
G. Redieteab, L. Cariou, P. Christin, J. F. Helard, “SU/MU-MIMO in IEEE 802.11 ac: PHY+ MAC performance comparison for single antenna stations,” Proceedings of the IEEE Wireless Telecommunications Symposium, London, April 2012, pp. 1-5. https://doi.org/10.1109/WTS.2012.6266132.
D. Bhaskar, B. Mallick, “Performance evaluation of MAC protocol for IEEE 802. 11, 802. 11Ext. WLAN and IEEE 802. 15. 4 WPAN using NS-2,” International Journal of Computer Applications, vol. 119, no. 16, pp. 25-30, 2015. https://doi.org/10.5120/21153-4151.
T. Szigeti, et al., End-to-End QoS Network Design: Quality of Service for Rich-Media & Cloud Networks, Cisco Press, 2013.
S. Choy, B. Wong, G. Simon, and C. Rosenberg, “A hybrid edge-cloud architecture for reducing on-demand gaming latency,” Multimed. Syst., vol. 20, no. 5, pp. 503–519, 2014. https://doi.org/10.1007/s00530-014-0367-z.
P. Saxena, and S. K. Sharma, “Analysis of network traffic by using packet sniffing tool: Wireshark,” Int. J. Adv. Res. Ideas Innov. Technol., vol. 3, no. 6, pp. 804–808, 2017.
P. Čisar, and S. Maravić Čisar, “Ethical hacking of wireless networks in Kali Linux environment,” Annals of the Faculty of Engineering Hunedoara, vol. 16, issue 3, pp. 181-186, 2018.
A. R. Machdi, “Implementation analysis power line communication sebagai backbone Wi-Fi Extender,” Jurnal Teknologi Jurnal Pakuan Bidang Keteknikan, vol. 1, no. 29, pp. 1-7, 2017. (in Indonesian)
M. Wu, M. Zhao, and H. H. Yu, Dynamic Priority Queue Mapping for QoS Routing in Software Defined Networks, U.S. Patent 9,571,384, issued February 14, 2017.
M. X. Gong, B. Hart, and S. Mao, “Advanced wireless LAN technologies: IEEE 802.11 ac and beyond,” GetMobile: Mobile Computing and Communications, vol. 18, no. 4, pp. 48-52, 2015. https://doi.org/10.1145/2721914.2721933.
C. Buchanan, and V. Ramach-Andran, Kali Linux Wireless Penetration Testing Beginner's Guide: Master Wireless Testing Techniques to Survey and Attack Wireless Networks with Kali Linux, Including the KRACK Attack, Packt Publishing Ltd, 2017.
P. Cisar, and R. Pinter, “Some ethical hacking possibilities in Kali Linux environment,” Journal of Applied Technical and Educational Sciences, no. 9(4), pp. 129-149, 2019.
A. M. K. Al-Dulaimi, S. V. Harkusha, and M. K. H. Al-Dulaimi, “Investigation of the method of allocating the time-frequency resource of the downlink LTE using RAT 1,” Problems of Telecommunications, no. 1 (22), pp. 75-92, 2018. (in Russian). https://doi.org/10.30837/pt.2018.1.06.
P. Sharma, G. Singh, “Comparison of Wi-Fi IEEE 802.11 standards relating to media access control protocols,” International Journal of Computer Science and Information Security, vol. 14, no. 10, pp. 856-862, 2016.
F. Ammar, and H. Hanafi, “Analisis transfer rate wireless local area network dengan standar IEEE 802.11 a dan IEEE 802.11 G pada kanal line of sight,” Jurnal Ecotipe (Electronic, Control, Telecommunication, Information, and Power Engineering), vol. 3, no. 1, pp. 31-39, 2016. (in Indonesian) https://doi.org/10.33019/ecotipe.v3i1.28.
M. Mohammed, H. M. Jawad, A. M. K. Al-Dulaimi, A. A. Al-Oraifi, and O. M. K. Al-Dulaimi, “Maximization of user’ s power in D2D communication based on geometric assumption and transient cloud conception,” vol. 62, no. 04, pp. 1481–1492, 2020.
A. T. A. Sadda, R. S. A. Anooz, A. M. K. Al-Dulaimi, “Acoustics recognition with expert intelligent system,” Journal of Green Engineering, vol. 10, no. 3, pp. 972–985, 2020.
S. Yoshizawa, D. Nakagawa, N. Miyazaki, T. Kaji, & Y. Miyanaga, “LSI development of 8×8 single-user MIMO-OFDM for IEEE 802.11 ac WLANs,” Proceedings of the 2011 11th IEEE International Symposium on Communications & Information Technologies (ISCIT), October 2011, pp. 585-588. https://doi.org/10.1109/ISCIT.2011.6089703.
O. Bejarano, E. W. Knightly, & M. Park, “IEEE 802.11 ac: from channelization to multi-user MIMO,” IEEE Communications Magazine, vol. 51, issue 10, pp. 84-90, 2013. https://doi.org/10.1109/MCOM.2013.6619570.
M. S. Gast, 802.11 AC: A Survival Guide: Wi-Fi at Gigabit and Beyond, O'Reilly Media, Inc., 2013.
S. Saxena, B. K. Kanaujia, S. Dwari, S. Kumar, and R. Tiwari, “A compact microstrip fed dual polarised multiband antenna for IEEE 802.11 a/b/g/n/ac/ax applications,” AEU-International Journal of Electronics and Communications, no. 72, pp. 95-103, 2017. https://doi.org/10.1016/j.aeue.2016.11.024.
How to Cite
LicenseInternational Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:
• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.