Ways to Analyse Further Channel Characteristics

Published: 2021-06-23 21:45:34
1735 words
7 pages
15 min to read
Boston College
Type of paper: 
Dissertation methodology
This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

According to (Acharya, 2013), there exists a need for assessing the key metrics in terms of size of network and the corresponding speed of the internet, so as to analyse further channel characteristics. Accordingly, this paper, would involve two wireless networks that is, one configured for generating channel interference and the other applicable in video streaming.

3.2 Aspects

The secondary metrics investigated includes; all channel characteristics having the ricean K factor, channel interference and the VQM. The channel interference and the VQM characteristics offers ideal metric features that will aid in proper understanding of the experiment and hence, achievement of the research methodology objectives. For the primary aspects, we have performance indicators in the network such as latency and performance, granular data retention and dynamic trending. Such indicators form vital tools of evaluating the suitability and workability of the experiment (Krishna, Bathemma & Rao, 2012).

3.3 Experiment Information/ Information Research:

The multitasking channel is unique per the experiment. The efficient use of the site streamtest.net diagnostic utility examines the effect of realistic viewing to the performance. The test will involve analyzing and sampling the relevant test parameters and data points that constitute the individual end-user streaming experience. The streaming URL validates by copying the link to the platform and starting the application. Once the test is finished, all the data gathered would be calculated and availed in an organized manner for different stakeholders within the streaming video ecosystem. The results viewed from the high-level panel since it provides useful information for technically inclined users. This is because it facilitates data transmission throughout long distances so that, user applications may decode data under the condition of less traffic consumption rate. In order to effectively design and establish a proper-secured network, considering many elements in order to ensure that attaining credible corporate network is essential. These elements include topology, selection of software and hardware technologies, the placing of hosts within a given network and lastly keen configuration of each component. In the design, three aspects of network architecture become considerable: emerging techniques in the security of networks, logical and physical design in a given corporate network. These designs consider the securing of switches and routers that connect hosts and segments to form a stable network. Through experimentation, the smoothness of inter arrival time variance is the critical factor in availing bandwidths that helps to manage streaming packets. (Mingzheli and Kinicki, 2009) proved that "if the available bandwidth is less than the streaming rate, the expected arrival rate at the play-out buffer will also be less than the streaming rate.

The Video Streaming Scenario:


Figure 1: Video Streaming Set-up

The experiment involves five computers fully equipped with wireless network adapter cards, running version 10 Windows operating system, wireless transmitter, and IEEE 802.11b with wireless Ethernet connection, and surveillance equipment like a smart phone (Working Group for WLAN Standards, 2017).


Figure 2

Various files that supporting the computer include programming files, audio files, and internet related files among others. The potential risks need evaluation and consequently, identification of the various resources such as budget, hardware and even the work force need establishing.

File format generated by LaTeX is, *.tex it is readable and editable in any text editor, as it contains plain text without any hidden complicated format codes or great binary instructions. For this project, the mark- up tagging conventions of LaTeX2e will used as the current software version, the powerful and highly customizable typesetting software, can separate the content and the design. In addition, LaTex is for typesetting professional research papers (LaTeX Project, 2017).


Figure 3: Sampling

Quantitative method of sampling is enforced. (Zhu and Girod, 2007) used theoretical homogenous sampling, to investigate further the effectiveness of using VLC while streaming videos as a subtopic of interest in our research. Other aspects such as proofing on using routing metric are reliable on accounts for assessing the quality of the link while streaming. Applying the homogeneous sampling technique, as it is cost and time-effective based on of data validity and reliability (Acharya et al., 2013).

Requirements of Data:

Since there is implementing a multicast streaming server, the requirements of the data involved:


After setting up a LAN, management of wireless resources would require WEX that determine experimental workflow, scenario configuration and data collection.

Placing Nodes:

The environment required a spacious room (measuring 10 X 5 m) that would enable installation of 20 nodes.

Software Parameters:

In this case, wireless tools would require Linux version number 29 for configuration of interfaces. On the other hand, VLC is important for generating multicast video stream that are enabling with custom modifications.

Wireless Parameters:

PHY and MAC versions of wireless are required for use by driver versions and streamlining of the various channel types used in streaming videos (Ahmed, 2010).

Data Analysis:

The use of VideoLAN enabled VLC for streaming a short MPEG-4 clip is necessary for multicasting clients from a streaming server. For each of the target clients, the video stream would be capturing into a single file, in the same instance, applying probes would be for capturing packet traces of this video stream. The same node is not for capturing both video stream and packet stream only for performance considerations. Instead, each of the probes and multicast clients is placing on top of one another in order to achieve similarity in reception conditions. In this case, the LAN become bounding with other forms of technologies such as VLANs that is the Virtual LANs and VPN (Virtual Private Networks). The two are flexible in designing a logical working topology. The design therefore, can use access lists at third layer in order to implement the appropriate security policy for the company. When it comes to the transition of traffic into the subnet, the design should be in such a way that permission is granting only for relevant incoming packets that follow protocol based on the subnet. Similarly, the LANs applicability would seek to filter any outbound traffic in order to cancel any spoofing activities in the network system (Li, Claypool & Kinicki., 2009).

When laying out the companys logical topology, consideration of security system through its policies and enhanced decision-making on which model bound for utilization is required. In designing the topology, other parts of the networks that are usually less trusted and ones that can be distinguished either grouping together or become separated. After this, it is subjecting the captured videos to analysis through a tool referred to as Batch Video Quality Metric. Finally, the packet traces are loaded to the MySQL database. MySQL database was the preferred tool since building it is easy and it is installing is manual. To add on, it has the ability to support needs that appear to be on a high scale. Having conducted the six sets of experiments concerning multicast video streaming using the WLAN over the variety of interferences, a look at the effectiveness of the streaming speed and access to traffic is inevitable. The six steps of experiments are conducting to help determine the performance of the multicast video streaming, it is evident that the interference has a higher impact on the performance of multipath fading. Concerning this, multipath fading causes performance degradation (Catalan-Cid, 2010).

The problem is that some users may detect a wireless connection point but do not have an ability to connect to it with their devices. The inability to connect to the wireless point may be because of noises from other devices (microwaves, cordless phones) that are barriers to establish a connection. The effective resolution to the problem is to provide monitoring of the network with software tools and conduct the site survey to reveal problems at the user side. The signs of the problem are sluggish data processing, freezing of an image on an individual screen point. The problem may be because of server or network failure to process requests. The effective resolution will be to double check Ethernet-based errors (e.g. Collisions, FCS Errors, Alignment Errors, etc.) to prevent packet loss (Golwelkar & Woods, 2007).

The design therefore can use access lists at third layer in order to implement the appropriate security policy for the company. When it comes to the transition of traffic into the subnet, the design should be in such a way that permission granting is only for relevant incoming packets that follow protocol based on the subnet. Similarly, the LANs applicability would seek to filter any outbound traffic in order to cancel any spoofing activities in the network system. All the design considerations depict security measures in LAN design as the greatest element to look out. A secure LAN connection assures the users or reliability and efficiency in whatever tasks they are set to execute in the whole set up where connectivity is required (Ni, 2016).

Alternatively, the use of channel interference gains more prominence and frequency turning out as the cause of performance degradation in the set up of wireless networks. A reason for the same is due to ISM 2.4 GHz band that has increasingly gained utilization in most workplaces and homes. From this experience, optimizing and benchmarking wireless networks are crucial tools in quantifying the impact of multipath fading as well as management and planning of prospective interferences. From this point, the packet traces completing is through SQL scripts that in turn do the analysis. The sequence of activities employs a multicast streaming server, an interference generator, four multicast clients and lastly four probes. In this set-up, the packet traces having radio tap wireless headers capturing using a TCP-Dump. A 2.4 GHz band recording is by using a spectrum analyzer referred to as Wi-Spy (Li, Leith & Malone 2011).

Acronym List

VQM- Video Quality Metric

WLAN- Wireless Local Area Network

WEX-Wireless Experimentation

IEEE - Institute of Electrical and Electronics Engineers

URL - Uniform Resource


Acharya, A.S., Prakash, A., Saxena, P. & Nigam (2013). Sampling: Indian Journal of Medical Specialties,4(2), 330-333.

Ahmed, J.U. (2010). Documentary Research Method: New Dimensions.Al-Busaidi, Z.Q. (2008). Qualitative research and its uses in health care. Sultan Qaboos. University Medical Journal, 8(1), pp.11-19.Bowen, G. (2009). Document analysis is a qualitative research method. Qualitative Research Journal, 9(2), pp.27-40.Catalan-Cid, M., Ferrer, J., Gomez, C., & Parallels, J. (2010). Contention- and interference-aware flow-based routing in wireless mesh networks: design and evaluation of a novel routing metric. EURASIP Journal on Wireless Communications and Networking, 2010(1), 313-768.

Centres for Disease Control and Prevention (CDC) (2009). Data collection methods for evaluation: Document review (No. 18). Viewed 11 March, 2017, http://www.cdc.gov/healthyyouth/evaluation/pdf/brief18.pdfCse.wustl.edu. (2017). QoS in wireless data networks. [online]. Cse.wustl.edu. Available at: http://www.cse.wust...

Request Removal

If you are the original author of this essay and no longer wish to have it published on the customtermpaperwriting.org website, please click below to request its removal: