• Login
    View Item 
    •   Research Bank Home
    • Unitec Institute of Technology
    • Study Areas
    • Computing
    • Computing Conference Papers
    • View Item
    •   Research Bank Home
    • Unitec Institute of Technology
    • Study Areas
    • Computing
    • Computing Conference Papers
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN

    Kolahi, Samad; Almatrook, A.A.

    Thumbnail
    Share
    View fulltext online
    Impact of Security on Bandwidth and Latency in IEEE 802.11ac Client to Server WLAN.pdf (638.7Kb)
    Date
    2017-07-04
    Citation:
    Kolahi, S. S., & Almatrook, A. A. (2017) Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN. IEEE (Ed.), 2017 Ninth International Conference on Ubiquitous and Future Networks (IEEE ICUFN), (pp.893-897). doi:10.1109/ICUFN.2017.7993928
    Permanent link to Research Bank record:
    https://hdl.handle.net/10652/4181
    Abstract
    In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of IPv4 and IPv6 on average decreased by 16.79% and 10.22% respectively. Throughput for UDP is decreased by 18.07% and 12.99% for IPv4 and IPv6 respectively. For both IPv4 and IPv6, WPA2 wireless security implementation also increases the round trip time (RTT) and CPU Utilization for both TCP and UDP.
    Keywords:
    802.11ac client-to-server WLAN, wireless local area networks (WLANs), network security, 802.11ac, network performance, IPv4, IPv6, WPA2 (Wi-Fi Protected Access 2)
    ANZSRC Field of Research:
    100503 Computer Communications Networks, 080303 Computer System Security

    Copyright Notice:
    All rights reserved
    Rights:
    This digital work is protected by copyright. It may be consulted by you, provided you comply with the provisions of the Act and the following conditions of use. These documents or images may be used for research or private study purposes. Whether they can be used for any other purpose depends upon the Copyright Notice above. You will recognise the author's and publishers rights and give due acknowledgement where appropriate.
    Metadata
    Show detailed record
    This item appears in
    • Computing Conference Papers [149]

    Te Pūkenga

    Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

    • About Te Pūkenga
    • Privacy Notice

    Copyright ©2022 Te Pūkenga

    Usage

    Downloads, last 12 months
    36
     
     

    Usage Statistics

    For this itemFor the Research Bank

    Share

    About

    About Research BankContact us

    Help for authors  

    How to add research

    Register for updates  

    LoginRegister

    Browse Research Bank  

    EverywhereInstitutionsStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaboratorThis CollectionStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaborator

    Te Pūkenga

    Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

    • About Te Pūkenga
    • Privacy Notice

    Copyright ©2022 Te Pūkenga