Spring 2015
ENSC 427: COMMUNICATION NETWORKS

FINAL PROJECTS:


  • 1. Zheng (Matt) Chang, Yigang (Yi Gang) Tao, and Haoxian (Colman) Wen
        (zchang at sfu.ca, ygt at sfu.ca, cwen at sfu.ca)

    Simulation and Analysis of Wi-Fi Performance in Campus Network

    Presentation slides and final report (PDF files).

    Abstract:
    Wi-Fi is based on the IEEE 802.11 standard. It is one of the wireless mobile network products that are widely used in this decade. It allows different electronics devices to exchange data over a computer network. In this project, we analyze the performance of Wi-Fi in a small area network and simulate Wi-Fi transmission speed for different numbers of routers and users. Simulation results are obtained using Riverbed Modeler.

    References:
    [1] "How Wi-Fi Work", retrieved Feb 2010 from http://nostarch.com/download/wifi_01.pdf.
    [2] R. Paul, S. Lally, and Lj. Trajkovic, "Simulation and performance evaluation of WiFi and WiMAX using OPNET,"OPNETWORK 2011, Washington, DC, Aug. 2011. Washington, DC, Aug. 2002.
    [3] C.-H. Ng, J. Chow, Lj. Trajkovic, "Performance evaluation of the TCP over WLAN 802.11 with the Snoop performance enhancing proxy," OPNETWORK 2002, Washington, DC, Aug. 2002.
    [4] C. Zhang, R. Chau, W. Sun, "Wi-Fi Network Simulation OPNET," Simon Fraser University, Apr. 2009.
    [5] C. Toma, "Issues in WiFi Networks," Journal of Mobile Embedded and Distributed Systems - JMEDS, vol/issue: 1, pp. 3-12, June 2009.
    [6] J. P. Shim, S. Shin, and M. B.H. Weiss, "Wireless Internet competition: municipal wireless vs. 3G mobile service," WTS 2007, Pomona, CA, July 2007, pp. 1-6.
    [7] N. Cheng, M. Hun, and S. Nguyen, "Analysis of VoIP Performance over Wi-Fi Networks", Simon Fraser University, April 2010.


  • 2. Jae (Jay) Kim, Yongyu (Jack) Zheng, and Paniz Bertsch
        (jwk10 at sfu.ca, jza96 at sfu.ca, pseifpou at sfu.ca)

    Video Streaming over WiFi

    Presentation slides and final report (PDF files).

    Abstract:
    Wireless Fidelity (WiFi) is a wireless local area network (WLAN) technology that allows multiple users to connect to a network through radio waves. WiFi was introduced as the 802.11 standard by the Institute of Electrical and Electronics Engineers (IEEE). Nowadays, many devices such as smartphones, laptops, and tablets can connect to a network environment through access points. With video streaming applications becoming more widely used than ever, we will attempt to simulate streaming performance in a home environment using various 802.11 specifications. This simulation will cover metrics such as packets received, jitter, and end-to-end delay using Riverbed Modeler.

    References:
    [1] Tutorial-Reports, "Wireless LAN (Wifi) Tutorial | Tutorial-Reports.com," 18 February 2013. [Online]. Available: Here
    [2] National Instruments, "WLAN - 802.11 a,b,g and n - National Instruments," 3 December 2013. [Online]. Available: Here
    [3] S. Calzada, C. Rietchel, and T. Szajner, "Performance Analysis of a Wireless Home Network," April 2014. Available: Here
    [4] W. Hrudey and L. Trajkovic, "Streaming Video Content Over IEEE 802.16/WiMAX Broadband Access," OPNETWORK, Washington, 2008. Available: Here
    [5] Arizona State University, "MPEG-4 Part 2 Trace Files and Statistics," [Online]. Available: Here


  • 3. Jeremy Borys and Jimmy Chenjie Yao
        (jborys at sfu.ca, chenjiey at sfu.ca)

    Performance and Safety of VANET

    Presentation slides and final report (PDF files).

    Abstract:
    Vehicle safety has always been a major concern for automotive engineers. Information carried by a vehicle can be forwarded to another vehicle using Dedicated Short-Range Communication (DSRC) providing a driver or autonomous vehicle with information regarding speed and direction of the approaching vehicle. With the focus on safety, this paper seeks to determine the performance of a vehicular ad hoc network (VANET) under varying conditions and constraints. This paper seeks to understand the effect on packet delivery and latency with respect to the varying number and directions of mobile nodes.

    References:
    [1] S. Biswas, R. Tatchikou, and F. Dion, "Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety," Communications Magazine, vol. 44, no. 1, pp. 74-82, 2006.
    [2] Q. Xu and T. Mak, "Vehicle-to-vehicle safety messaging in DSRC," Association for Computing Machinery, pp. 19-28, 2004.
    [3] S. D. Patil, D. Thombare, and V. D. Khairnar, "DEMO: Simulation of realistic mobility model," International Journal of Computer Applications, vol. 43, no. 21, pp. 33-36, 2012.
    [4] N. Jaber, K. E. Tepe, and E. Abdel-Raheem, "Performance enhancement of the DSRC system using frequency-domain equalization for 5.9 GHz DSRC applications," Science Direct, vol. 65, no. 11, pp. 924-928, 2011.
    [5] J. Rezgui and S. Cherkaoui, "About deterministic and non-deterministic vehicular communications over DSRC/802.11p," Wireless Communications and Mobile Computing, vol. 14, no. 15, pp. 1435-1449, 2014.


  • 4. SeungJun Lee and Paul Chen
        (sjl14 at sfu.ca and pfc3 at sfu.ca)

    Black-Hole Attack in Ad-Hoc On-Demand Distance Vector (AODV)

    Presentation slides and final report (PDF files).

    Abstract:
    Mobile devices cannot be separated from our daily life. They can construct network proactively to exchange information where the conventional communication infrastructure are not existent. We call this type of network environment an Ad Hoc Network. However, the Ad Hoc Network has vulnerability in data security due to the characteristics of its network protocol. The Black Hole Attack is the major risks in the Ad Hoc Network when an attacker makes faulty route by responding with fake network information to the information source and intercepts data through faulty route they made. In this project, we construct an Ad Hoc Network and analyze the results from the simulation of the Black Hole Attack by using the ns-2 network simulator.

    References:
    [1] A. Leon-Garcia and I. Widjaja, Communication Networks: Fundamental Concepts and Key Architectures. 2nd edition, McGraw -Hill, 2004.
    [2] A. E. M. Anita and V. Vasudevan, "Black hole attack prevention in multicast routing protocols for mobile ad hoc networks using certificate chaining," International Journal of Computer Applications, 2010, vol. no, 1-12, pp. 21-28.
    [3] C. E. Perkins and E. M. Royer, "Ad-hoc on-demand distance vector routing," Proceedings Second IEEE Workshop on Mobile Computing Systems and Applications, WMCSA '99, pp. 90-100, 25-26 Feb. 1999.
    [4] E. H. Teerawat Issariyakul. Introduction to Network Simulator NS2. Springer US, 2009.
    [5] G. I. Papadimitriou, A. S. Pomportsis, P. Nicopolitidis, and M. S. Obaidat, Wireless Networks, John Wiley and Sons Ltd, December 2002, pp. 291-292.
    [6] M. Al-Shurman, S. Yoo, and S. Park, "BlackHole Attack in Mobile Ad hoc Networks," ACM Southeast Regional Conference, Huntville, Alabama, 2-3 April 2004, pp. 96-97.
    [7] M. Greis. "Marc Greis Tutorial for the Network Simulator NS-2." [Online] Available: http://www.isi.edu/nsnam/ns/tutorial/index.html, [Accessed February 14, 2015].
    [8] S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, "Prevention of Cooperative BlackHole Attack in Wireless Ad hoc Networks," International Conference on Wireless Networks, Las Vegas, Nevada, USA, 23-26 June 2003.


  • 5. Don Rafael Prades (Don) Labayo and Arshit (Arshit) Singh
        (dlabayo at sfu.ca and arshits at sfu.ca)

    Performance Analysis of Video Stream over Wi-Fi and Ethernet

    Presentation slides and final report (PDF files).

    Abstract:
    Past couple of years have seen a steady upsurge in the demand of internet video streaming services; most notably Netflix, HuluPlus, and HBO Now. This has motivated us to analyze the performance profile of Internet video streaming over Ethernet, Wi-Fi, and Wi-Fi connected Mobile users. In order to achieve this, we plan to use the Riverbed Modeler to test a video trace file and measure the end-to-end delay as well as Throughput. We will be setting up a master server in California, connected to a subnet that will house an Ethernet server. To this server, we will attach a switch that in turn will connect our end user (an Ethernet workstation), Wireless Mobile node such (a laptop), or a cell phone and a Wireless capable fixed device such as a gaming console or a wireless Desktop.

    References:
    [1] Sandvine, "Sandvine Global Internet Phenomena Report," 2014.
    [2] "What is Wi-Fi?," [Online]. Available: http://www.webopedia.com/TERM/W/Wi_Fi.html. [Accessed 11 April 2015].
    [3] N. Instruments, "WLAN - 802.11 A, b, g and N," [Online]. Available: http://www.ni.com/white-paper/7131/en/. [Accessed 11 04 2015].
    [4] "802.11e," [Online]. Available: http://www.vocal.com/networking/ieee-802-11e/. [Accessed April 2015].
    [5] S. Grafling, P. Mahonen, and J. Riihijarvi, "Performance evaluation of IEEE 1609 WAVE and IEEE 802.11p," Second International Conference on Ubiquitous and Future Networks, pp. 344-348, 2010.
    [6] E. T. S. Institute, "Final Draft ETSI ES 202 663," 2013.
    [7] IEEE, "Status of Project IEEE 802.11 Task Group p: Wireless Access in Vehicular Environments," 2011.
    [8] W. V. A. Exploits, "wirelesswave.org," 15 March 2008. [Online]. Available: http://www.wirelessve.org/entries/show/WVE-2005-0020.
    [9] L. Donguk, "TVWS Regulation and Standards," 29 May 2013. [Online]. Available: http://edu.tta.or.kr/sub3/down.php?No=139&file=1-4_TVWS_Regulation_and_Standardization_%C0%D3%B5%BF%B1%B9.pdf.


  • 6. Yu Heng (Yu Heng) Lin and Chase (Youdao) Wen
        (yuhengl at sfu.ca, andywa56 at sfu.ca)

    802.11n and 802.11g Performance Comparison for FTP Transmissions in Office Area

    Presentation slides and final report (PDF files).

    Abstract:
    In this project, we plan to simulate and compare performance of Wi-Fi standards 802.11ac and 802.11n. The new generation of Wi-Fi, 802.11ac, aims to have four times faster speed than its previous generation, 802.11n. However, the range of 802.11ac is inferior to 802.11n due to its communication methods.

    References:
    [1] T. Vanhatupa, "Wi-Fi Capacity Analysis for 802.11ac and 802.11n: Theory and Practice," 2013 [Online]. Available: http://www.ekahau.com/userData/ekahau/wifi-design/documents/ESS_Capacity_Analysis-Whitepaper-2013.pdf .
    [2] "802.11ac: The Fifth Generation of Wi-Fi Technical White Paper," Cisco, [Online]. Available: http://www.cisco.com/c/en/us/products/collateral/wireless/aironet-3600-series/white_paper_c11-713103.html .
    [3] "White Paper: The impact of 802.11ac wireless networks on network technicians," Fluke networks, [Online]. Available:http://www.flukenetworks.com/content/white-paper-impact-80211ac-wireless-networks-network-technicians .
    [4] "WiFi Direct Data Performance Tests," Microsoft, [Online]. Available: https://msdn.microsoft.com/en-us/library/windows/hardware/dn247504.aspx .
    [5] "Next Generation Gigabyte WiFi - 802.11ac," Netgear [Online]. Available: http://www.netgear.com/landing/80211ac/images/WP_NETGEAR_802_11ac_WiFi.pdf .


  • 7. Alexandrea (Lexi) Chor, Wei (Wei) Dai, and Chi (Chi) Zhang
        (lchor at sfu.ca, wda14 at sfu.ca, cza51 at sfu.ca)

    Performance Analysis on VoIP over LTE network

    Presentation slides and final report (PDF files).

    Abstract:
    Recent demand for higher data rates has quickly increased among mobile users. LTE provides an effective solution for this demand, as it has the ability to provide higher capacity and data rates, and reduces latency. For this reason, LTE has become the most popular wireless data communication network for mobile devices. Unfortunately, LTE only supports packet switching across an all IP network, therefore the traditional voice call solution of circuit switching is no longer available. To work around this dilemma, VoIP is introduced to enable voice calls over LTE networks. The objective of this project is to focus on the Quality of Service (QoS) of VoIP over LTE networks. We will simulate multiple scenarios to measure and analyze its performance via measurement of delay, jitter, and packet loss over a variety of distances and network loads.

    References:
    [1] G. A. Abed and M. Ismail and K. Jumari, "A Realistic Model and Simulation Parameters of LTE-Advanced Networks," Fac. Eng. & Built Env., National University of Malaysia, Selangor, Rep. ISSN:2278-1021, Aug. 2012. Available: www.researchgate.net/publication/256871810_A_Realistic_Model_and_Simulation_Parameters_of_LTE-Advanced_Networks/file/72e7e524063701459f.pdf+&cd=1&hl=en&ct=clnk&gl=ca .
    [2] S. Sesia, I. Toufik, and M. Baker, "LTE-The UMTS Long Term Evolution-From Theory to Practice," Second Edition including Release 10 for LTE-Advanced, John Wiley & Sons, 2011.
    [3] L. Chu, "Implementation and Application of VoIP Networks," IEEE AIMSEC Conference, pp. 2139-2141, 2011.
    [4] 4G LTE-Advanced Techonology Overview (n.d.) http://www.home.agilent.com/agilent/editorial.jspx?ckey=1905163&id=1905163%22&lc=eng&cc=IN.
    [5] Long Term Evolution Overview. (2010, October). [Online]. Available: http://www.freescale.com/files/wireless_comm/doc/white_paper/LTEPTCLOVWWP.pdf .


  • 8. Samuel Pui Ho (Samuel) Chow, Md. Shamsul (Sam) Hoque, and Phur Tenzin (Tenzin) Serpa
        (spc12 at sfu.ca, tserpa at sfu.ca, shoque at sfu.ca)

    Performance Analysis of a System During a DDoS Attack

    Presentation slides and final report (PDF files).

    Abstract:
    Distributed Denial of Service (DDoS) attacks have become a common phenomena and a threat to modern day Internet. Popular web and mail servers face DDoS attacks on a regular basis. After some major attacks, firms have put in place robust prevention strategies to mitigate these threats. With the growth of the Internet, data sharing between host and client machines have amplified over time. A DDoS attack results in denial of service for legitimate users and is achieved by interrupting or suspending services of a host connected to the Internet. Attackers utilize methods to limit bandwidth or cause inefficient packet handling to restrict the servers from communicating with the clients. In this report, we provide a general overview of DDoS attacks and its prevention measures. Additionally, we simulate a DDoS attack on a client-server model and also examine the "Black hole" preventative technique. Analysis and observations are performed later with the same parameters to note its effects pre and post a DDoS attack.

    References:
    [1] F. Lau, S. H. Rubin, M. H. Smith, and Lj. Trajkovic, "Distributed denial of service attacks," (invited paper) in Proc. IEEE Int. Conf. on Systems, Man, and Cybernetics, SMC 2000, Nashville, TN, Oct. 2000, pp. 2275-2280.
    [2] X. Rui, M. W. Li, and Z. W. Ling, "SYN flooding detecting using negative selection algorithm based on eigen value sets," May 2009, [Online]. Available: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=5138099
    [3] M. Blagov, "DDoS Definition," [Online]. Available: https://www.incapsula.com/ddos/ddos-attacks/
    [4] M. Greis, "Tutorials for the Network Simulator 'ns'," [Online]. Available: http://www.isi.edu/nsnam/ns/tutorial/
    [5] P. White, "How much traffic can a single server handle," Mar. 2011, [Online]. Available: http://blog.whitesites.com/How-much-traffic-can-a-single-serverhandle__634363981032706250_blog.htm
    [6] M. Prince, "The DDoS that knocked Spamhaus Offline (And how we mitigated it)," Mar. 2013, [Online]. Available: https://blog.cloudflare.com/the-ddos-that-knockedspamhaus-offline-and-ho/
    [7] Computer Emergency Response Team (CERT) for the Software Engineer Institute, "Denial of Service Attacks," 1997, [Online]. Available: https://www.cert.org/information-for/denial_of_service.cfm?
    [8] A. S. Tanenbaum, "Authentication Protocols" in Computer Networks, 4th edition, New Jersey, Prentice Hall, 2003, ch.8, sec. 7, pp. 787-790.
    [9] The Anti-Abuse Project, "DNS blacklists," [Online]. Available: http://www.antiabuse.org/dns-blacklists/
    [10] B. Cane, "Mitigating DoS attacks with a null (or black hole) route on Linux," Jan. 2013, [Online]. Available: http://bencane.com/2013/01/14/mitigating-dos-attacks-with-anull-or-blackhole-route-on-linux/
    [11] Global Dots, "DDoS mitigation," [Online]. Available: http://www.globaldots.com/knowledge-base/ddos-mitigation/
    [12] E. Ahmed, "Working Mechanism of FQ, RED, SFQ, DRR and Drop-Tail Queues," [Online]. Available: https://sites.google.com/a/seecs.edu.pk/network-technologies-tcp-ipsuite/home/performance-analysis-of-impact-of-various-queuing-mechanisms-on-mpegtraffic/working-mechanism-of-fq-red-sfq-drr-and-drop-tail-queues
    [13] US Department of Homeland Security, "DDoS quick guide," Jan. 2014, [Online]. Available: https://www.uscert.gov/sites/default/files/publications/DDoS%20Quick%20Guide.pdf


  • 9. Zheng Yang (Jasmine) Liu and Saumya (Saumya) Sangal
        (zyl2 at sfu.ca and ssangal at sfu.ca)

    Quality of Service of the Wireless Networking Standard over a Multi User Environment

    Presentation slides and final report (PDF files).

    Abstract:
    Wi-Fi is a term synonymous with daily life as we utilize this technology as a basis for a variety of activities. Hence, a constant question remains as to how to increase the speed and efficiency of our Wi-Fi network. In our project, we seek to analyse, compare, and scrutinize the wireless networking standards in terms of the quality of service they provide to the users. For this purpose, we shall consider a multiple user environment consisting of mobile users and shall study the effects of an increase in the number of users as well as a variation in distance from the access point. Our analysis shall take into account throughput and delay as we seek to complete our objective.

    References:
    [1] B. Vangie, "What is WiFi," 2014. [Online] (Accessed Feb 12, 2015). Available: http://www.webopedia.com/TERM/W/Wi_Fi.html .
    [2] Microsoft, "What is QoS," 2003. [Online] (Accessed Feb 12, 2015). Available: https://technet.microsoft.com/en-us/library/cc757120 (v=ws.10).aspx .
    [3] K. Topher, "Diagnosing and addressing Wi-Fi signal quality problems," 2011. [Online](Accessed Feb 12, 2015) Available: http://www.cnet.com/news/diagnosing-and-addressing-wi-fi-signal-quality-problems
    [4] Learning Centre "Wireless Networking," 2014. [Online] (Accessed Feb 12, 2015) Available: http://www.vicomsoft.com/learning-center/wireless-networking (links to an external site).
    [5] F. Ohrtman and K. Roeder, Wi-Fi Handbook: Building 802.11b Wireless Networks, Edition of book: McGraw-Hill, 2003, p. 1-383.


  • 10. Owen Man Hin Au, Jiaqi Li, and Yuanjie Zhang
        (yuanjiez at sfu.ca, lijiaqi at sfu.ca, owena at sfu.ca)

    Simulate VoIP over WiFi in Riverbed

    Presentation slides and final report (PDF files).

    Abstract:
    VoIP is an essential for the delivery of voice communication and sees wide applications in office and home use. VoIP over WiFi although not as high in quality as VoIP over Ethernet is connectionless and is popularized by mobile phone applications such as NetTalk and Viber. We will be examining how delay, jitter, packet loss contribute to congestion and affect the voice quality.

    References:
    [1] I. Gupta and P. Kaur, "omparative Throughput of WiFi & Ethernet LANs using OPNET MODELER, International Journal of Computer Applications (0975 - 8887), vol. 8, no. 6, 2010.
    [2] Izotope. What is Buffer Size and why is it important? Retrieved from https://www.izotope.com/support/kb/index.php/kb/article/503-What_is_Buffer_Size_and_why_is_it_important .
    [3] A. F. Ribadeneira, "An Analysis of the MOS under Conditions of Delay, Jitter and Packet Loss and an Analysis of the Impact of Introducing Piggybacking and Reed Solomon FEC for VOIP." Thesis, Georgia State University, 2007. http://scholarworks.gsu.edu/cs_theses/44 .
    [4] Voip.com (2008, May 09), G.729 versus G.711. Retrieved from http://www.voip.com/blog/2008/05/g729-versus-g711.html
    [5] Understanding Jitter in Packet Voice Networks (Cisco IOS Platforms) Retrieved from http://www.cisco.com/c/en/us/support/docs/voice/voice-quality/18902-jitter-packet-voice.html .
    [6] Understanding Delay in Packet Voice Networks Retrieved from http://www.cisco.com/c/en/us/support/docs/voice/voice-quality/5125-delay-details.html .
    [7] UDP VS TCP for Voip Retrieved from http://www.onsip.com/about-voip/sip/udp-versus-tcp-for-voip .


  • 11. Jiewen Mai, James (Chia Hung) Lee, and Dong Hao Zhuo
        (jiewenm at sfu.ca, chl30 at sfu.ca, and dzhuo at sfu.ca)

    Comparison of RIP, EIGRP, and OSPF Routing Protocols based on Riverbed

    Presentation slides and final report (PDF files).

    Abstract:
    Transferring data is essential for communications between computer networks. Various protocols are made to provide the constraints for data sharing in network environment. Our team plans to evaluate efficiency of three protocols: RIP, OSPF, and EIGRP. Routing Information Protocol (RIP) is one of the oldest distance-vector routing protocols. OSPF uses routing algorithm to quickly complete data transfer. EIGRP is one of the fastest distance vector protocol and was designed by Cisco Systems.

    References:
    [1] P. Kalamani, M. V. Kumar, M. Chithambarathanu, and R. Thomas, "Comparison of RIP, OSPF, EIGRP Routing Protocols in WLAN," Retrieved on August, 2014. Internet: http://www.academia.edu/8054013/Comparison_of_RIP_EIGRP_OSPF_IGRP_Routing_Protocols_in_Wireless_Local_Area_Network_WLAN_by_using_OPNET_Simulator_tool_-A_Practical_Approach
    [2] B. A. Forouzan, TCP/IP Protocol Suite, McGraw-Hill Education Press. p. 269. Retrieved on March 25, 2009.
    [3] Cisco, "Cisco Active Network Abstraction 3.7 Reference Guide." Retrieved on Feb 1st, 2010. Internet: http://www.cisco.com/c/en/us/td/docs/net_mgmt/active_network_abstraction/3-7/reference/guide/ANARefGuide37.pdf
    [4] D. Sankar, "Routing Protocol Convergence Comparison," Retrieved on Jan 24th, 2014. Internet: http://www.google.ca/url?sa=t&rct=j&q=&esrc=s&source=web&cd=16&ved=0CEAQFjAFOAo&url=http%3A%2F%2Fwww.cscan.org%2Fdownload%2F%3Fid%3D926&ei=icgZVZH-D8O1yAS-rICABQ&usg=AFQjCNFi0OPrtXDUfOpL2RtS-5wu_-J7qA&bvm=bv.89381419,d.aWw
    [5] J. Doyle, Routing TCP/IP (Volumn I), Cisco System Press. Chapter 5 - 9, 1997. Internet: http://www.net130.com/tutorial/cisco-pdf/routingtcpipv1.pdf


  • 12. Peterson Kai Fung (Peterson) Poon and Justin Alistair (Justin) Raine
        (pkpoon at sfu.ca and raine at sfu.ca)

    Performance Analysis of Transferring Large Data Files in Ethernet Network

    Presentation slides and final report (PDF files).

    Abstract:
    This project simulated a video editing studio with eight workstations simultaneously accessing video footage from network-attached shared-storage over an FTP connection. The objective of the project is to determine which Ethernet links are able to provide the workstations with on-demand access of the video footage (i.e., average throughput of each client greather than or equal to the video file data rate) as well as minimal delay (less than ~500 ms).

    References:
    [1] JDSU, Fundamentals of Ethernet. 2015 [Online]. Available: http://www.jdsu.com/ProductLiterature/fundethernet_wp_cpo_tm_ae.pd
    [2] A. Atayero, A. Alatishe, and J. Iruemi (2012) Modeling and Simulation of a University LAN in OPNET Modeller Environment Environment [Online]. Available: http://www.academia.edu/2755380/Modeling_and_Simulation_of_a_University_LAN_in_OPNET_Modeller_Environment .
    [3] 10GEA, Gigabit Ethernet, 2015. [Online]. Available: https://www.10gea.org/whitepapers/gigabit-ethernet-2/ .
    [4] J. Cioara, D. Minutella, and H. Stevenson (2006, February 6) CCNA Exam Prep: Data Link Networking Concepts [Online]. Available: http://www.pearsonitcertification.com/articles/article.aspx?p=438038&seqNum=3 .
    [5] Cisco, Deploying Gigabit Ethernet to the Desktop: Drivers and Application, 2007. [Online]. Available: http://www.cisco.com/en/US/technologies/tk389/tk214/tk277/technologies_white_paper09186a00801a7595_ns17_Networking_Solutions_White_Paper.html .


  • 13. Jarid Warren, Vani Choubey, and Phyo Pyae (Henry) Hein
        (jaridw at sfu.ca, vchoubey at sfu.ca, hhein at sfu.ca)

    A Decade of Advancement: Comparing the Performance of Various Applications over 802.11b & 802.11n WiFi using Riverbed Modeler

    Presentation slides and final report (PDF files).

    Abstract:
    As portable Internet devices (PID) have evolved in the past couple of years, more emphasis has been placed on Internet services to provide: video and audio streaming, the world wide web, file transfer, in addition to Voice of IP (VoIP) as the availability and price from Internet Service Providers (ISP) improve and decline, respectively. Among the protocols to leverage these technologies are Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Real-Time Protocol (RTP). These protocols are often used to implement applications that are accessed primarily through Wireless Fidelity (WiFi) hotspots in the home, on colleges campuses, in addition to most public businesses. We aim to analyze the performance of these applications by comparing the first widely spread version of WiFi, 802.11b, and the most recent iteration available through Riverbed Modeler: 802.11n. A detailed comparison will be done by observing the throughput and delay using Riverbed Modeler Simulator at various distances from the Local Area Network (LAN) base station. In the end, our goal is to use this comparison to demonstrate the advancements made in the past decade of public LANs.

    References:
    [1] G. R. Hiertz, D. Denteneer, et al., "The IEEE 802.11 Universe," Communications Magazine, IEEE, Volume: 48, Issue: 1, January 2010. Accessed: February 15, 2015. Available: Here.
    [2] "Wireless Networking," Vicomsoft. Accessed: March 22, 2015. Available: Here.
    [3] L. Phifer, "Differences between WLANs, Wi-Fi and WiMax". Accessed: February 15, 2015. Available: Here.
    [4] C. Chen, S. Sheng, and J. Yoo, "High Resolution Video Streaming over Wi-Fi, WiMAX and LTE," Accessed: March 22, 2015. Available: Here.
    [5] R. Gill, T. Farah, and L. Trajkovic, "Comparison of WiMAX and ADSL Performance when Streaming Audio and Video Content," Accessed: March 22, 2015. Available: Here.
    [6] Riverbed Modeler's Guide to Applications. Accessed: March 22, 2015. Available: Here.


    Last modified: Sat Feb 6 19:50:14 PST 2016.