Nt1310 Unit 3 Assignment

Words: 1415
Pages: 6

Module: KF7031 Wireless Networks and Security

Assignment: A study of Data Throughput in 802.11a WLAN Systems

Module Lecturer: Dr. Graham Sexton

Student Name and ID: GYIMANI DONKOR, 17043411

Submission Date: 11/05/2018

ABSTRACT
Even though wireless network has become more popular as a result of decreased cost of acquisition and increase data rate, yet there is an industrial demand for a higher data rates. Despite the IEEE 802.11a specifications providing 54 Mbps date rate, the industries are calling for over 100 Mbps.
However, as medium access control (MAC) overhead increases with data rate while the infrastructure remains unchanged, there is ongoing IEEE’s effort
…show more content…
1 Windows OS (Laptop-1) with on-board Ethernet adapter (NIC)
3. 1 Windows OS Laptop (Laptop-2) with in-built wireless adapter (WNIC)
4. Wi-Spy adapter (hardware)
5. AirPCap (hardware)
6. Channelizer Pro spectrum analyser (Software)
7. iPerf (software)
8. Wireshark (software)
3.2 Steps to setup Private WLAN System for the experiment
1. Set up the WLAN and activate the DHCP server on the router to distribute IP-addresses to the nodes automatically.
2. Connect Laptop-1 to the switch port on the AP by Ethernet cable
3. Connect Laptop-2 to the AP wirelessly
4. Use the PING-command to verify all the nodes on the WLAN can communicate successfully.
5. Install iPerf sever on the Laptop-1
6. Install iPerf client on the Laptop-2
7. Install Wireshark on the Laptop-2
8. Install AirPCap on Laptop-2 to establish connection to capture wireless traffic using for Wireshark
9. Install Wi-Spy adapter and Channel Analyzer software on Laptop-1 to detect the right channel for data transmission. The channel 116 chosen for this
…show more content…
Select WPA2-Personal for WLAN security.
3.3 Access Point Settings: 3.4 Experimental procedure (Without WPA2-Personal security in place)
1. UDP data was generated with iPerf client on Laptop-1 and sent wirelessly to the iPerf Sever on Laptop-2.
2. UDP data (payloads) was sent in incremental of 200 bytes and up to 2000 bytes
3. Results were captured in iPerf server and tabled into excel as shown in appendix

3.5 Experimental procedure (With WPA2-Personal security in place)
1. WLAN Security protocol (WPA2-Personal) was activated at the AP
2. UDP packets was generated with iPerf client on Laptop-1 wirelessly to the iPerf Sever on Laptop-2.
3. This packets sent by iPerf client were captured using Wireshark with the help of the AirPCap wireless adapter. On Laptop-1
4. UDP data (payloads) were sent in incremental of 200byte and up to 2000 bytes
5. Results were captured and tabled as shown in appendix
4 RESULTS
The results of the experiment are grouped into theoretical and physical.
4.1 Theoretical Module
Payload size verses maximum throughput (with TUL)
Figure 1: With set data rate and infinity data rate

Payload size verses maximum throughput (without TUL