logo

802.11 WLAN Data Throughput and Security Overheads

   

Added on  2023-06-12

8 Pages1796 Words78 Views
 | 
 | 
 | 
Running head: WIRELESS NETWORKS AND SECURITY
802.11 WLAN data throughput and security overheads
Name of the Student
Name of the University
Author’s Note
802.11 WLAN Data Throughput and Security Overheads_1

1
WIRELESS NETWORKS AND SECURITY
Executive Summary
The advancement of technology has provided the users with IEEE 802.11 Wireless Networks,
which provides seamless connectivity and flexibility of usage. The previous WLAN networks
provided to the users were found to be vulnerable to security risks and exposed to attacks.
Studies have also previously been conducted for IEEE 802.11 WLAN, but they were only
focused on single-server clients. The following experiment would be conducted to evaluate the
security methodologies and their effects on the 802.11 WLAN systems. This would estimate the
amount of throughput achieved by each node of WLAN accurately, where each node have
diverse characteristics depending on the transmission rates, traffic demands, and packet sizes. It
is conducted through a partially theoretical implementation and partially experimental
framework describing data throughput and would further be verified through practical
implementation of the model depending on the traditional networking devices. The experiment is
carried out by analyzing the effect of various different security mechanisms applied to the
performances of multiple-clients. This experiment is conducted on congested as well as
uncongested networks. For validating the accuracy of the developed estimation method, an
extensive packet-level simulation is conducted and it is confirmed that the method estimates the
WLAN throughput performance precisely. The results have put forward the fact that the
degraded performances of congested network in comparison to the uncongested network is due
to the increased number of users with respect to the utilization of all the security mechanisms.
802.11 WLAN Data Throughput and Security Overheads_2

2
WIRELESS NETWORKS AND SECURITY
Introduction
Throughput is a measurement of a system’s ability to traverse unit of information in a
given time. The utilization of throughput is primarily served for organizations and individuals to
map the usage of the networks by a networking device. Throughput is considered to be the
source of measurement for the relative effectiveness of large-scale computers that perform too
many heavy programs concurrently. The following assignment is based on the obtained results
by experimenting data throughput in 802.11 WLAN systems. This would include the theoretical
development of the throughput system along with the practical experimental methods. The next
part of the experiment would consist of results and discussion about the obtained inference.
Theoretical Throughput Development
This section would discuss about the theoretical throughput development method for
802.11 Wireless Local Area Networks or WLANs. This would help in precisely estimating the
amount of throughput each node will be able to achieve in a WLAN. These nodes would have
different characteristics based on few factors, such as, transmission rates, traffic demands and the
size of the packets. Since, the IEEE 802.11 WLAN is able to provide broadband wireless
connectivity at inexpensive rates, it is feasible to develop admission control and channel
selection. However, it is necessary that the variation of the throughput is estimated when a node
is being newly introduced in a WLAN system or any other operational changes in the channels
occur. Wireless Medium is distributed in a WLAN system though Distributed Coordination
Function or DCF. This is again based on Carrier Sense Multiple Access with Collision
Avoidance or CSMA/CA. It could even be seen that a medium has been idle more than
Distributed Inter-frame Space or DIFS. In those situations, for every time slot, back-off counter
802.11 WLAN Data Throughput and Security Overheads_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents