StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Wireless LAN: Traffic and Congestion Control - Case Study Example

Cite this document
Summary
The study is mainly focused on providing an analysis of traffic and congestion control on Wireless LAN networks using various research methods and tools.This case study has…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Wireless LAN: Traffic and Congestion Control
Read Text Preview

Extract of sample "Wireless LAN: Traffic and Congestion Control"

The paper "Wireless LAN: Traffic and Congestion Control" is a worthy example of a term paper on information technology. This paper seeks to analyze the issues that are presented in the Wireless LAN case study Analysis. The study is mainly focused on providing an analysis of traffic and congestion control on Wireless LAN networks using various research methods and tools. This case study has highlighted a number of researches which has been conducted to demonstrate traffic in a dense wireless Local Area Network (LAN) environment.

Analysis of Wireless LAN Characteristics Various studies have been conducted in a number of Campus networks to measure network traffic using different approaches. The studies try to analyze macro characteristics of wireless LANs such as overall usage, traffic characteristics, user mobility, and application mix. User Mobility and session data in the network has been measured using the authentication logs of users. In terms of user mobility, the network performance is measured depending on the location of the user and how user movement affects the network usage.

From studies carried out, a common conclusion was reached that the network users remained constant as the user tended to move around an access point. Another characteristic that has been illustrated by the study is the user population across APs and its relation to network performance. The studies reveal that the aggregate data transfer rate of an AP did not depend on the number of users that are associated with it, but it can rather be related to the users present. In short, the study has explored a number of macro-characteristics that are associated with network traffic.

The major characteristics under study include User mobility, session duration, and overall traffic. It can also be deduced that HTTP applications and TCP packets contribute to P2P network traffic as well. The variation in the application and the bandwidth also affect the traffic congestion in the P2P networks. Wireless LAN Environment Analysis The second issue highlighted in this study is the analysis of the wireless LAN environment using porcupine a platform that is used in wireless data analysis.

This platform is used to support research into an advanced wireless environment. It consists of sixteen separate radios, sixteen single board computers and sixteen directional antennae each of which can be configured to function together. The porcupine can be able to capture wireless packets and determine their origin in a real-time manner. The Porcupine was demonstrated to be able to sniff all 802.11 traffic (both management frames and user data). One of the advantages of passive sniffing is that it can allow one to be able to observe the unconstrained behavior of the wireless network.

This type of model allows one to detect rouge Access points, ad-hoc networks and misconfigured clients which cannot be detected by other means. One disadvantage of passive sniffing is that it can only capture wireless traffic that can be decoded properly any of the antennae. Another disadvantage of the passive sniffing of wireless data by the porcupine relates to the variety of 802.11 modes offered at the SC2004 exhibit floor. The porcupine has been designed to capture only 802.11b wireless packets.

This is an implication that the effect of the presence of 802.11g traffic would be indirectly observed in the 802.11b performance, directly observing 802.11g traffic, that shares 2.4GHz radio frequency spectrum with 802.11 is not possible. It is not also possible to save all traffic of 802.11b due to Network Protocols The third issue this case study tries to demonstrate is the use of protocols in the analysis of traffic. The study IPv4 protocol was used to test out for logs at the network layer.

The transport layer consists of two main types of protocols, these are TCP and UDP. The TCP is a connection-oriented protocol and is used to perform congestion control while the UDP is a connectionless protocol and does not perform congestion control.TCP and UDP are unicast protocols while IGMP is a broadcast protocol. Because of these differences, it is vital to understand the performance of a network that is based on the exact mix of different protocols. Bytes and flows are traditional methods in the analysis of traffic and so the perspective of the packet is used since it better measures the popularity of a protocol in a wireless medium since channel contention can be resolved per packet, irrespective of the number bytes that a packet contains.

The adoption of the use of packets in the understanding of traffic results to a number of important insights into various transport protocols. One of the conventionally accepted beliefs about the prevalence of transport protocols on the internet is that TCP carries most internet traffic while the fraction that of traffic by other transports protocols other than UDP and TCP is quite insignificant. The other issue illustrated in this study is the HTTP application how much it accounts to the total internet traffic.

Studies carried out on the wireless LAN networks shows that HTTP application does not dominate in the traffic in bytes on the internet. NetBIOS and UDP based application seem to dominate the traffic on the internet. Conclusion The micro-scale analysis that has been used in the case study reveals that there is significant performance loss for the users for a dense wireless LAN traffic. There is a question as to whether to trust protocol usages and distributions without using the micro-scale analysis.

It is evident from the research that TCP application is involved in congestion control that may result in reduced sending rates. The study has shown that there is a need for some congestion control for other protocols other than TCP, otherwise TCP-based application may suffer immensely if the transport layer protocol that is observed becomes an internet reality.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Wireless LAN: Traffic and Congestion Control Case Study, n.d.)
Wireless LAN: Traffic and Congestion Control Case Study. https://studentshare.org/information-technology/1868304-wireless-lan-case-study
(Wireless LAN: Traffic and Congestion Control Case Study)
Wireless LAN: Traffic and Congestion Control Case Study. https://studentshare.org/information-technology/1868304-wireless-lan-case-study.
“Wireless LAN: Traffic and Congestion Control Case Study”. https://studentshare.org/information-technology/1868304-wireless-lan-case-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wireless LAN: Traffic and Congestion Control

Networks and Real-Time Traffic for Industrial Control Applications

In the paper “Networks and Real-Time Traffic for Industrial control Applications” the author discusses pervasive adoption of location tracking technologies, such as GPS, that heavily rely on internetworks of computers, internet, and communications technologies.... Wireless technology surveyed seeks to establish the capacity, reliability and most importantly the future and existing modifications to cater for industrial control application needs for data, voice and video transfer....
10 Pages (2500 words) Essay

3G Vs 4G Wireless Technology

Telecommunication is developing with a fast pace and it is the result of the advancement of technology in the areas of mobile and wireless communication systems.... 3G mobile communication system is the standard communication system… 3G Vs 4G wireless Technology Abstract Telecommunication is developing with a very fast pace and it is the result of the advancement of technology in the areas of mobile as well as wireless communication systems....
11 Pages (2750 words) Term Paper

Wi-Fi as a Type of Internet Network

Afterwards, you would need a wireless router, that is, a device that will facilitate the flow of data traffic between all the PCs that are to be networked together (see Figure 1).... Since all current high speed wireless networks are using IEEE standards, especially 802.... 1g, the term Wi-Fi is used to distinguish wireless networks from other traditional wired networks.... For a wireless network, a cable modem is recommended which is a device that enables high speed internet connectivity....
4 Pages (1000 words) Assignment

An Evaluation of Wireless Intrusion Prevention and Protecting Insecure Channels

In the past few years, wireless networks have caught the attention of the majority of business organizations as well as individuals.... At the present, the trend of wireless networks has become very common.... hellip; In the past few years, wireless networks have caught the attention of the majority of business organizations as well as individuals.... At the present, the trend of wireless networks has become very common.... Now the latest mobile and computing devices such as iPhones also provide considerable support for accessing Internet through wireless computing....
30 Pages (7500 words) Research Paper

Networking and Management

IntServ specifies a fine-grained Quality of service system, in contrast to DiffServ's coarse-grained system of control.... Thus, the rate at which tokens arrive dictates the average rate of traffic flow, while the depth of the bucket dictates how large the traffic is allowed to be.... However, this means the bucket depth needs to be increased to compensate for the traffic being larger....
16 Pages (4000 words) Essay

Wireless management

When we talk about wireless Management, it is for sure that we are discussing proper configuration, management and performance assessment of a WLAN.... Using a wireless Access-point, networks can be configured with systems connected via cables and via wireless connections.... Using a wireless Access-point, networks can be configured with systems connected via cables and via wireless connections.... wireless provides several mobile services that are ready for deployment, including those for such Personal Information Management (PIM) tools as calendar, address book, fax, and mail....
5 Pages (1250 words) Essay

Integration of WIMAX to Broadband Networks

hellip; The author states that WIMAX provides ample opportunity to converge data and voice, and provide wireless access to the users in form of wireless local area network (WLAN).... This paper “Integration of WIMAX to Broadband Networks” looks into ways to integrate WIMAX to broadband networks....
4 Pages (1000 words) Dissertation

Research in Sensys and competitor analysis

Additionally, TransCore has also developed their own version of Intelligent Transportation Systems technologies, giving this business yet another advantage through their coordinated technology systems related to traffic and highway systems.... The product uses intelligent transportation system and “small, in-ground sensors” which “sends unique vehicle information through a wireless link for data collection, control and aggregation” (Sensys Networks, Inc....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us