Throughput analysis of UDP and VPN traffic in 802.11g networks

2006-11-03
Ikiz, Suheyla
Erten, Y. M.
In this study the effects of using VPNs on the throughput of wireless LANs are investigated. To this end we have set up a test bed and based our observations on the actual measurements obtained from the experiments performed using this test bed. The wireless LAN we have used is an IEEE 802.11g network and we compared the throughput values obtained by employing IPSec in this network with the calculated ones. We performed the tests using periodically generated traffic with 1ms and 5 ms intervals between successive packets. We have also considered the case for random traffic generated according to exponential distribution. We present the variations of the throughput with respect to packet size for different input traffic patterns.
21st International Symposium on Computer and Information Sciences (ISCIS 2006)

Suggestions

Security and quality of service for wireless sensor networks
Tomur, Emrah; Bilgen, Semih; Department of Information Systems (2008)
Security and quality of service (QoS) issues in cluster-based wireless sensor networks are investigated. The QoS perspective is mostly at application level consisting of four attributes, which are spatial resolution, coverage, system lifetime and packet loss due to collisions. The addressed security aspects are message integrity and authentication. Under this scope, the interactions between security and service quality are analyzed with particular emphasis on the tradeoff between security and spatial resolu...
Improving performance of network intrusion detection systems through concurrent mechanisms
Atakan, Mustafa; Şener, Cevat; Department of Computer Engineering (2003)
As the bandwidth of present networks gets larger than the past, the demand of Network Intrusion Detection Systems (NIDS) that function in real time becomes the major requirement for high-speed networks. If these systems are not fast enough to process all network traffic passing, some malicious security violations may take role using this drawback. In order to make that kind of applications schedulable, some concurrency mechanism is introduced to the general flowchart of their algorithm. The principal aim is...
Security and service quality analysis for cluster-based wireless sensor networks
Tomur, Emrah; Erten, Y. Murat (2007-05-25)
In this study, we analyze security and quality of service (QoS) issues in cluster-based wireless sensor networks (WSN). Taking spatial resolution as the main QoS metric and limiting the security definition to data integrity and authentication, we present a control strategy to maintain desired QoS and security levels during the entire operation of a cluster-based sensor network. Besides, our proposed strategy considers some other WSN QoS attributes such as coverage, packet collision and system lifetime. It p...
Tradeoff analysis and optimization of security and spatial resolution for sensor networks
Tomur, Emrah; Erten, Y. M. (2007-03-16)
In this study, we investigate the correlation between security and spatial resolution -a measure of service quality- in cluster-based wireless sensor networks (WSN). We analyze the tradeoff between these two concepts resulting from the limited channel capacity and propose a method to determine the best tradeoff between security and spatial resolution for cases where network capacity is not sufficient to support required levels. We also present some numerical results obtained by application of the proposed m...
Scheduling Policies for Minimizing Age of Information in Broadcast Wireless Networks
Kadota, Igor; Sinha, Abhishek; Uysal, Elif; Singh, Rahul; Modiano, Eytan (2018-12-01)
In this paper, we consider a wireless broadcast network with a base station sending time-sensitive information to a number of clients through unreliable channels. The Age of Information (AoI), namely the amount of time that elapsed since the most recently delivered packet was generated, captures the freshness of the information. We formulate a discrete-time decision problem to find a transmission scheduling policy that minimizes the expected weighted sum AoI of the clients in the network. We first show that...
Citation Formats
S. Ikiz and Y. M. Erten, “Throughput analysis of UDP and VPN traffic in 802.11g networks,” Istanbul, Turkey, 2006, vol. 4263, p. 474, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/65076.