6th Annual Communication Networks and Services Research Conference (Cnsr 2008) 2008
DOI: 10.1109/cnsr.2008.60
|View full text |Cite
|
Sign up to set email alerts
|

The Influence of Wireless 802.11g LAN Encryption Methods on Throughput and Round Trip Time for Various Windows Operating Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…We analysed our network's overall performance using D-ITG. In [10][11][12][13][14], similar test-beds have been used by the authors.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…We analysed our network's overall performance using D-ITG. In [10][11][12][13][14], similar test-beds have been used by the authors.…”
Section: Introductionmentioning
confidence: 99%
“…6RD specifies a protocol to deploy IPv6 sites via an Internet Service Providers', (ISP) IPv4 network and it is built on 6to4 transition mechanism with the difference being it uses ISPs' IP. ISATAP is an automatic tunnelling protocol which transmits IPv6 packets between Duals Stacks hosts over an IPv4 network [10]. 6to4 transition mechanism, allows IPv6 data to be transported across IPv4 network [4].…”
Section: Introductionmentioning
confidence: 99%