• Login
    View Item 
    •   Research Bank Home
    • Study Areas
    • Computing
    • Computing Conference Papers
    • View Item
    •   Research Bank Home
    • Study Areas
    • Computing
    • Computing Conference Papers
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    The Influence of WPA2 Security on the UDP performance of IPv4 and IPv6 Using 802.11n WLAN in Windows 7-Windows 2008 environment

    Kolahi, Samad; Singla, Hitesh; Ehsan, Mohd Nash; Dong, Clarence

    Thumbnail
    Share
    View fulltext online
    The Influence of WPA2 Security on the UDP performance of IPv4 and IPv6.pdf (165.3Kb)
    Date
    2011-02-16
    Citation:
    Kolahi, S. S., Singla, H., Ehsan, M. N., and Dong , C. (2011). The influence of WPA2 security on the UDP performance of IPv4 and IPv6 using 802.11n WLAN in Windows 7-Windows 2008 environment. Baltic Congress on Future Internet and Communications - BCFIC Riga , 2011 (pp 50-53).
    Permanent link to Research Bank record:
    https://hdl.handle.net/10652/3413
    Abstract
    The impact of WPA2 security-bandwidth trade-off for IPv4 and IPv6 on wireless 802.11n network implementing Windows 7-Windows Server 2008 is investigated. The highest point of difference between open system and WPA2 for UDP was noticed at packet size 1408 bytes where IPv4 provided 31.48 Mbps and IPv6 provided 24.33 Mbps higher throughput in the open environment. The performance of IPv4 and IPv6 are also compared.
    Keywords:
    TCP/UDP networks, network performance, Wi-Fi protected access II (WPA2) security, IPv4, IPv6, wireless local area networks (WLANs), 802.11n, Windows 7, Windows Server 2008, network security
    ANZSRC Field of Research:
    080303 Computer System Security, 100510 Wireless Communications
    Copyright Holder:
    Institute of Electrical and Electronics Engineers (IEEE)
    Available Online at:
    http://toc.proceedings.com/10920webtoc.pdf
    Rights:
    This digital work is protected by copyright. It may be consulted by you, provided you comply with the provisions of the Act and the following conditions of use: Any use you make of these documents or images must be for research or private study purposes only, and you may not make them available to any other person. You will recognise the author's and publishers rights and give due acknowledgement where appropriate.
    Metadata
    Show detailed record
    This item appears in
    • Computing Conference Papers [147]

    Library home
    Send Feedback
    Research publications
    Unitec
    Moodle
    © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142
     

     

    Usage

    Downloads, last 12 months
    62
     
     

    Usage Statistics

    For this itemFor the Research Bank

    Share

    About

    About Research BankResearch at UnitecContact us

    Help for authors  

    How to add researchOpen Access GuideVersions Toolkit

    Register for updates  

    LoginRegister

    Browse Research Bank  

    EverywhereAcademic study areasAuthorDateSubjectTitleType of researchSupervisorThis CollectionAuthorDateSubjectTitleType of researchSupervisor

    Library home
    Send Feedback
    Research publications
    Unitec
    Moodle
    © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142