Main Article Content
Due to the rapid expansion of Mobile Device, which connected through wireless network. The replacing of Internet Protocol version 4(IPv4) to Internet Protocol version 6(IPv6). This study has an aim to compare data loss rate, transmission delay, and throughput over a wireless network. The first step is identifying wireless networking standard in IEEE 802.11ac. The second step is upload example large file on IPV4 with wireless security protocols test. The third step is an upload example multimedia file on IPV6 with wiles security protocols test. The fourth step is analyzing the performance of the IPV4, IPV6 on the wireless network. The last step is providing result. The result is the IPV4 network is more stable over IPV6.
Article Accepting Policy
The editorial board of Thai-Nichi Institute of Technology is pleased to receive articles from lecturers and experts in the fields of business administration, languages, engineering and technology written in Thai or English. The academic work submitted for publication must not be published in any other publication before and must not be under consideration of other journal submissions. Therefore, those interested in participating in the dissemination of work and knowledge can submit their article to the editorial board for further submission to the screening committee to consider publishing in the journal. The articles that can be published include solely research articles. Interested persons can prepare their articles by reviewing recommendations for article authors.
Copyright infringement is solely the responsibility of the author(s) of the article. Articles that have been published must be screened and reviewed for quality from qualified experts approved by the editorial board.
The text that appears within each article published in this research journal is a personal opinion of each author, nothing related to Thai-Nichi Institute of Technology, and other faculty members in the institution in any way. Responsibilities and accuracy for the content of each article are owned by each author. If there is any mistake, each author will be responsible for his/her own article(s).
The editorial board reserves the right not to bring any content, views or comments of articles in the Journal of Thai-Nichi Institute of Technology to publish before receiving permission from the authorized author(s) in writing. The published work is the copyright of the Journal of Thai-Nichi Institute of Technology.
A. H. Lashkari, M. M. S. Danesh, and B. Samadi, “A survey on wireless security protocols (WEP, WPA and WPA2/802.11i),” in 2nd IEEE International Conference on Computer Science and Information Technology, 2009. ICCSIT 2009, 2009, pp. 48–52.
K. Nichols, D. L. Black, S. Blake, and F. Baker, “Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers.” [Online]. Available: https://tools.ietf.org/html/rfc2474. [Accessed: 12-Dec-2015].
Y.-N. Law, M.-C. Lai, W. L. Tan, and W. C. Lau, “Empirical Performance of IPv6 vs. IPv4 under a Dual-Stack Environment,” in IEEE International Conference on Communications, 2008. ICC ’08, 2008, pp. 5924–5929.
M. Ilyas and S. A. Ahson, Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards. CRC Press, 2005.
M. K. Sailan and R. Hassan, “Impact of TCP window size on IPv4 and IPv6 performance,” Int. J. Comput. Sci. Network Secur, vol. 9, pp. 129–133, 2009.
“LOW COST TEST BENCH TO ASSESS ENERGY EFFICIENCY OF COMMUNICATIONS NETWORK EQUIPMENT - ProQuest.” [Online]. Available: https://search. Proquest.com/openview/5a9b14e908300e1a8cb50f34e7cbd898/1?pq-origsite=gscholar. [Accessed: 22-DEC-2015].
J. Xie and U. Narayanan, “Performance Analysis of Mobility Support in IPv4/IPv6 Mixed Wireless Networks,” IEEE Transactions on Vehicular Technology, vol. 59, no. 2, pp. 962–973, Feb. 2010.
S. Narayan, P. Shang, and N. Fan, “Performance Evaluation of IPv4 and IPv6 on Windows Vista and Linux Ubuntu,” in International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC ’09, 2009, vol. 1, pp. 653–656.
“Troubleshooting client speed and traffic shaping using Jperf,” Cisco Meraki, 03-Feb-2015. [Online]. Available: https://documentation.meraki.com/zGeneral_Administration/Tools_and_Troubleshooting/Troubleshooting_client_speed_and_traffic_shaping_using_Jperf. [Accessed: 11-Feb-2016].
“Understanding the Difference Between Wireless Encryption Protocols,” blogs@Cisco - Cisco Blogs. [Online]. Available: https://blogs.cisco.com/smallbusiness/understanding-the-differenc e-between-wireless-encryption-protocols. [Accessed: 13-Jan-2016].
S. R. | in Linux, O. Source, F. 21, 2012, and 1:19 Am Pst, “Using jperf to check network performance,” TechRepublic. [Online]. Available: https://www.techrepublic.com/blog/linux-and-open-source/using-jperf-to-check-network-performance/. [Accessed: 17-Jan-2016].