Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1385289.1385308acmconferencesArticle/Chapter ViewAbstractPublication PagesmobimediaConference Proceedingsconference-collections
research-article

Experimental evaluation of community-based WLAN voice and data services

Published: 27 August 2007 Publication History

Abstract

The purpose of this work is to experimentally evaluate the quality of voice and data services over community-based WLAN access networks. We use P2PWNC, the Wireless LAN roaming architecture that we have developed, as the basis for the provision of ubiquitous citywide WLAN access and set up an infrastructure for secure voice and data communications on top of it. Our scheme was designed with widely available, low-cost WLAN equipment in mind. Thus, we wish to estimate the performance penalty our proposed mechanisms incur for such devices and study their limitations as to the support for secure data and multimedia communications. In this work, we measure the maximum number of simultaneous voice calls that a P2PWNC-enabled access point can sustain, and the TCP throughput achieved by a single mobile station in the presence of simultaneous TCP flows by other P2PWNC users, when IPsec is employed to secure communications.

References

[1]
Athens Wireless Metropolitan Network. http://www.awmn.net.
[2]
FON. http://en.fon.com.
[3]
KNOPPIX Linux Live CD. http://www.knoppix.org.
[4]
Linksys. http://www.linksys.com.
[5]
Openswan. http://www.openswan.org.
[6]
Open WRT Linux distribution. http://openwrt.org.
[7]
The P2PWNC project website. http://mm.aueb.gr/research/p2pwnc/.
[8]
Seattle Wireless. http://www.seattlewireless.net.
[9]
Speakeasy WiFi NetShare service. http://www.speakeasy.net/netshare/.
[10]
Wireless Philadelphia Executive Committee. http://www.phila.gov/wireless.
[11]
R. Barbieri, D. Bruschi, and E. Rosti. Voice over IPsec: Analysis and solutions. In Proc. 18th Annual Computer Security Applications Conference (ACSAC '02), page 261, 2002.
[12]
R. G. Cole and J. H. Rosenbluth. Voice over IP performance monitoring. Computer Communication Review, 31(2):9--24, 2001.
[13]
E. C. Efstathiou, F. A. Elianos, P. A. Frangoudis, V. P. Kemerlis, D. C. Paraskevaidis, E. C. Stefanis, and G. C. Polyzos. Public infrastructures for Internet access in metropolitan areas. In Proc. AccessNets'06, Athens, Greece, September 2006.
[14]
E. C. Efstathiou, P. A. Frangoudis, and G. C. Polyzos. Stimulating participation in wireless community networks. In Proc. IEEE INFOCOM, Barcelona, Spain, April 2006.
[15]
S. Garg and M. Kappes. Can I add a VoIP call? In Proc. IEEE International Conference on Communications (ICC '03), volume 2, pages 779--783, 2003.
[16]
M. Heusse, F. Rousseau, G. Berger-Sabbatel, and A. Duda. Performance anomaly of 802.11b. In Proc. IEEE INFOCOM, San Francisco, CA, March 2003.
[17]
ITU-T Recommendation G.107. The E-model, a computational model for use in transmission planning, December 1998.
[18]
S. Kent and R. Atkinson. IP Encapsulating Security Payload (ESP). RFC 2406, Nov. 1998.
[19]
N. Koblitz, A. Menezes, and S. A. Vanstone. The state of elliptic curve cryptography. Des. Codes Cryptography, 19(2/3):173--193, 2000.
[20]
S. Miltchev, S. Ioannidis, and A. Keromytis. A study of the relative costs of network security protocols. In USENIX 2002 Annual Technical Conference, pages 41--48, June 2002.
[21]
A. Nascimento, A. Passito, E. Mota, E. Nascimento, and L. Carvalho. Can I add a secure VoIP call? In Proc. WOWMOM '06, pages 435--437, 2006.
[22]
D. Niculescu, S. Ganguly, K. Kim, and R. Izmailov. Performance of VoIP in a 802.11 wireless mesh network. In Proc. IEEE INFOCOM, Barcelona, Spain, April 2006.
[23]
B. Patel, B. Aboba, W. Dixon, G. Zorn, and S. Booth. Securing L2TP using IPsec. RFC 3193, Nov. 2001.
[24]
N. B. Salem, J.-P. Hubaux, and M. Jakobsson. Reputation-based Wi-Fi deployment. SIGMOBILE Mob. Comput. Commun. Rev., 9(3):69--81, 2005.
[25]
Standards for Efficient Cryptography Group. SEC1: Elliptic Curve Cryptography, September 2000. Available at http://www.secg.org.
[26]
Standards for Efficient Cryptography Group. SEC2: Recommended Elliptic Curve Domain Parameters, September 2000. Available at http://www.secg.org.
[27]
C. Xenakis, N. Laoutaris, L. Merakos, and I. Stavrakakis. A generic characterization of the overheads imposed by IPsec and and associated cryptographic algorithms. Computer Networks, 50(17):3225--3241, 2006.

Index Terms

  1. Experimental evaluation of community-based WLAN voice and data services
              Index terms have been assigned to the content through auto-classification.

              Recommendations

              Comments

              Information & Contributors

              Information

              Published In

              cover image ACM Conferences
              MobiMedia '07: Proceedings of the 3rd international conference on Mobile multimedia communications
              August 2007
              403 pages
              ISBN:9789630626705

              Sponsors

              Publisher

              ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)

              Brussels, Belgium

              Publication History

              Published: 27 August 2007

              Check for updates

              Author Tags

              1. community networks
              2. performance measurements
              3. secure VoIP
              4. wi-fi networks

              Qualifiers

              • Research-article

              Conference

              MobiMedia07
              Sponsor:

              Contributors

              Other Metrics

              Bibliometrics & Citations

              Bibliometrics

              Article Metrics

              • 0
                Total Citations
              • 154
                Total Downloads
              • Downloads (Last 12 months)0
              • Downloads (Last 6 weeks)0
              Reflects downloads up to 09 Nov 2024

              Other Metrics

              Citations

              View Options

              Get Access

              Login options

              View options

              PDF

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader

              Media

              Figures

              Other

              Tables

              Share

              Share

              Share this Publication link

              Share on social media