Free Essay

Benchmarking of Wireless Routers

In:

Submitted By pjbustamante
Words 4964
Pages 20
Network Performance Project
Benchmarking of Wireless Routers
Pedro Bustamante

Noopur Chowdhary

School of Information Science
University of Pittsburgh
Pittsburgh, United States pjb63@pitt.edu School of Information Science
University of Pittsburgh
Pittsburgh, United States noc13@pitt.edu Abstract— This paper explores a basic technique for Network
Performance Analysis: Compare alternate equipment based on real measurements. Further, this work describes the comparison between two wireless routers configured as access points. The analysis of the equipment was implemented in terms of throughput (TCP) and jitter (UDP). In this way, this work aims to show the results of the benchmarking process of two wireless routers from different vendors through the utilization of a basic performance terminal tool such as “iperf”.
Keywords—benchmarking;
wireless; routers.

network;

performance;

II. GOALS


First, this project seeks to execute, analyze and evaluate a Network Performance Analysis based on real measurements. •

To benchmark two wireless routers of different vendors using an active software network performance tool such as iperf.



To measure and evaluate the total available throughput of parallel TCP connections over tested wireless routers
(acces points) in a server/client configuration.



To determine and exanimate the average jitter and percentage of lost packets of parallel UDP connections over the tested wireless routers (acces points) in a server/client architecture.

iperf;

I. INTRODUCTION
There is no doubt that Wi-Fi (IEEE 802.11), the most globalized Wireless Network LAN, has become one of the most noticeable ways to connect devices in universities, homes, business, etc. Nevertheless, not many users know about the complex performance factors of a Wi-Fi network, and how all the devices are able to stay connected exchanging information with the world. Moreover, the performance factors of the key element of the network: the wireless router (access point).
In this way, in the technical field (leaving the cost aside, which is most of the time the considered factor) signal strength is often the in effect performance benchmark quality of a wireless router (i.e., performance of the network).
Nonetheless, for a deeper analysis signal strength alone could not be enough to determine the viability and usability of a network. All too often, a network’s signal strength will fall within acceptable ranges, yet have insufficient data rates for an optimal (at least usable) connectivity. Considering this fact, this project aims to analyze other characteristics of wireless routers such as Throughput (TCP) and Jitter (UDP).
Indeed, this experiment setup and analysis presents the results of the comparison of two wireless routers of different vendors. The analysis of the devices would be centered in key characteristics of the most common transport layer protocols used nowadays in the internet: Transport Control Protocol, and
User Datagram Protocol.

III. GENERAL INFORMATION
A. Wireless Routers
As observed the present work is based in the benchmarking process of two wireless routers. Thus, Table I details the characteristics of the equipment to be compared.
TABLE I.
Routers
Router 1
(R1)
Router 2
(R2)

WIRELESS ROUTERS

Characteristics
Brand

Model

Netgear

WNDR4300 802.11N Dual Band

Linksys

WRT600N 802.11N Dual Band

The compared routers are commercial residential devices. In addition, they posses similar technical features (processor speed and RAM) to guarantee an objective evaluation. Further, the chosen routers are designed for medium to large residential spaces and to operate under the 802.11n standard. Besides, both devices are capable of reaching speeds between 300 to 450
Mbps (Information gathered from the vendor webpage).

Besides, both routers use the latest available property firmware, and were configured as access points to serve as a link in a client/server architecture. Consequently, the chosen wireless routers are configured undre normal parameters (no added functionalities or firmware modifications) to obtain the best possible performance under normal enviromental conditions.

Factors
TCP
Connections
UDP
Connections

Description

2

2 parallel streams / 5 parallel streams

2

2 parallel streams / 5 parallel streams

IV. METHODOLOGY

B. Used Tools
Due to the nature of this project, a tool with not only traffic generation but also measurement capability was needed.
Therefore, the natural choice was: Iperf. This performance tool is a widely-utilized open-source active software performance tool written in C. Besides, Iperf 3 (latest version) runs on several operating systems using the command window (or terminal) to test and/or evaluate a Network. It allows the creation of TCP (Transmission Control Protocol) and UDP
(User Datagram Protocol) data streams between two hosts in a
Client/Server architecture. The basic functionality of the tool is to measure the throughput (Bits/unit of time), jitter (rate of change in the end-to-end delay) and number of lost packets of the tested network (percentage).
It is necessary to point out that all the set of results were saved in text files (.txt) to keep record of the complete measurements and to facilitate the post-processing tasks.
Indeed, all the original files were processed and analyzed using
MATLAB ® and Microsoft Excel ®.
C. Factors and Variables
The first step in the experiment design is to choose the adequate response variables. In this way, this project will utilize two main response variables to analyze the performance of each of the wireless routers:



Factors and Levels for the Experiment
Levels

A. Experiment Design
As shown in Table II, 5 experimental factors with 2 levels each were chosen for the benchmarking task of this project. For each combination of factor and level, the experiment recollected 100 values of the response variables (replications).
Furthermore, the Total Number of Experiments (TNR) was obtained using the Full Factorial Design (all combinations of levels and factors); which resulted in a total of 3200 recollected values in the experiment divided in 32 sets of measurements. = ∗

)
(*+

(

= 10 22222 = 3200

(1)
(2)

B. Data collection
As explored in the previous sections, the testing was aimed under a Full Factorial Design. In this way, all the factors and its levels were combined. For instance, to obtain a determine throughput we could have: Router: 1, Frequency: 2.4, TCP, 2 parallel connections and a distance of 150ft in a set of measurements. For each of the tests (32 in total), the routers were connected as access points, serving as the link between the iperf Client (traffic generator) and the iperf Server (point of measurement) as it is shown in Fig. 1.

Throughput: Measured using parallel TCP connections
End-to-end delay variation (Jitter): Measured using parallel UDP connections.

Additionally, to guarantee a zero impact of external factors in the measurements the signal characteristics of the routers were monitored during the complete experiment.
On the other hand, the factors (parameters to be varied in the study) and its levels (values for the factors) of the experiment were also selected (Table II).
TABLE II.
Factors

FACTORS AND LEVELS

Factors and Levels for the Experiment
Levels

Description

Routers

2

Netgear / Linksys

Frequencies

2

2.4 GHz / 5.0 GHz

Distance

2

20 Feet / 150 Feet

Fig. 1. Experiment Architecture

The iperf client was configured in a single machine (Apple personal computer). In the same light, the iperf server was configured in another independent PC (Apple). Both computers had similar and sufficient technical characteristics (Operating system, processor speed, hard drive and bus capacity), which minimize any impact of the end-hosts in the results. In addition, each replication measured the throughput for each parallel stream and a resulting throughput (sum of the individual

throughputs). To fulfill the designed experiment setup, iperf
(version 3) was configured as follows:

in terms of Signal Strength. Consequently, no future analysis will be done respecting this matter.

iperf -c 192.168.1.1 -P 1 -i 1 -p 5001 -C -f m -t 100 -T 1
(Client)
iperf -s -P 0 -i 1 -p 5001 -C -f m
(Server)

The UDP configuration of the project was done in the same manner as TCP: generating traffic from client to server using the aforementioned equipment. In addition, each replication measured jitter and percentage of lost packets for each parallel stream and a resulting throughput (sum of the individual throughputs). Thus, we have the UDP configuration as follows: iperf -c 192.168.1.1 -u -P 1 -i 1 -p 5001 -C -f m -b 1.0M -t 100 -T 1
(Client)
iperf -s -u -P 0 -i 1 -p 5001 -C -f m
(Server)

C. Sets of Measurements
Table III details the combinations that were tested using the above configuration of the tool (Same for distance = 100 feet and Router 2 as well).
TABLE III.

Fig. 2. Signal Analysis (SNR (Quality) and Signal Strength)

E. Benchmarking
To analyze the individual performance of each router and its posterior comparison against each other, the following procedure was implemented:
1.

COMBINATIONS OF FACTORS (SETS OF MEASUREMENTS)

Combinations of Factors

Combination

2.

Description

1

Router 1/2.4 GHz/TCP/2 Parallel Connections/20ft

2

Router 1/2.4 GHz/TCP/5 Parallel Connections/20ft

3

Router 1/5.0 GHz/TCP/2 Parallel Connections/20ft

4

Router 1/5.0 GHz/TCP/5 Parallel Connections/20ft

5

Router 1/2.4 GHz/UDP/2 Parallel Connections/20ft

6

Router 1/2.4 GHz/UDP/5 Parallel Connections/20ft

7

Router 1/5.0 GHz/UDP/2 Parallel Connections/20ft

8

Router 1/5.0 GHz/UDP/5 Parallel Connections/20ft

3.

= = ± ∗

D. Signal Characteristics
Finally, it is necessary to point out that in each of the tests
(32 in total), the signal strength of the routers was monitored all the time. For this purpose, the embedded Apple tool “Wireless
Diagnostics Performance” was utilized. The signal characteristics that were monitored were the Signal Strength in
(dBm) as well as the Signal to Noise Ratio (dB), as shown in the examples in Fig. 2.
From this monitoring process, we can conclude that for none of the 32 tests the SNR of the Signal Strength were as critical as to be considered a constrain in the measurements. In other words, both routers displayed an acceptable performance

Verify if the measured data was correlated. Further, the coefficient of correlation was calculated for each set of measurements (32 in total)
The present project used measurements of central tendency for comparing purposes. Indeed, the following values were calculated for the analysis:
a. Total average throughput under the TCP configuration (Sum of the individual streams) b. Average jitter using the UDP configuration
(Average of the individual streams)
c. Average percentage of lost packets for the
UDP tests
Using the aforementioned values, a 90% confidence interval was calculated for each of set of measurements (32). Each of the CI was obtained through the following expression:
@
A

= 1.645 = ; = . ; = #

4.

(4)
(5)
(6)

Once a CI was calculated for each of the sets of measurements, a comparison (benchmarking) between the routers was possible. Thus, when there is no overlapping in the CI, a conclusion can be made in terms of a better performance metric of one wireless router over the other

V. RESULTS

3
2.5

A. Original Information TCP

2
1.5
1
0.5
0

1
5
9
13
17
21
25
29
33
37
41
45
49
53
57
61
65
69
73
77
81
85
89
93
97

As mentioned in the previous section, the TCP tests were implemented using two variations: 2 and 5 parallel streams.
Moreover, for each test the effective throughput was presented as the individual measurements and the sum of the signals (Fig.
3 and Fig. 4).

Stream 1
16

Stream 2

Fig. 5. Jitter Measurements Example (R1/2.4/UDP/2/150ft)

14
12

35

10
8

30

6

25

4

20

2

15

SUM

Stream 1

Stream 2

Fig. 3. Throughput Measurements Example (R1/2.4/TCP/2/150ft)

10
5
0

1
5
9
13
17
21
25
29
33
37
41
45
49
53
57
61
65
69
73
77
81
85
89
93
97

1
4
7
10
13
16
19
22
25
28
31
34
37
40
43
46
49
52
55
58
61
64
67
70
73
76
79
82
85
88
91
94
97
100

0

Stream 1

40

Stream 2

Stream 3

Stream 4

Stream 5

Fig. 6. Jitter Measurements Example (R1/2.4/UDP/5/150ft)

35

Additionally, under the UDP testing scheme, iperf also measures the percentage of lost packets (lost packets/total packets) of each stream in the connection. This characteristic is shown in Fig. 7.

30
25
20
15
10

120%

5

100%
1
5
9
13
17
21
25
29
33
37
41
45
49
53
57
61
65
69
73
77
81
85
89
93
97

0
SUM

Stream 1

Stream 2

Stream 3

Stream 4

Stream 5

80%
60%
40%

B. Original Information UDP
The UDP measurements were configured in the same manner as the TCP tests (2 and 5 parallel streams).
Nevertheless, the response variable to analyze was jitter through the individual jitter of each stream.

20%
0%

1
5
9
13
17
21
25
29
33
37
41
45
49
53
57
61
65
69
73
77
81
85
89
93
97
101

Fig. 4. Throughput Measurements Example (R1/2.4/TCP/5/150ft)

Stream 1

Stream 2

Stream 3

Stream 4

Stream 5

Fig. 7. Packet Lost Measurements Example (R1/2.4/UDP/5/150ft)

C. Results Router 1
All the measured information was processed for each of the routers as the first step in the comparison process. In this manner, Table IV shows the average results in terms of throughput obtained after each TCP test (8 in total) of the first benchmarked router (Netgear WNDR4300).

TABLE IV.
Frequency
(MHz)
2.4
2.4
5.0
5.0
2.4
2.4
5.0
5.0

Protocol
TCP
TCP
TCP
TCP
TCP
TCP
TCP
TCP

RESULTS ROUTER 1(THROUGHPUT)
Router 1 (Netgear)
Parallel
Distance (ft)
Connections
2
150
5
150
2
150
5
150
2
20
5
20
2
20
5
20

7.0000
6.0000

Average Throughput
(Mbits/sec)
9.6736
5.7620
39.6083
36.7984
42.8203
44.6169
100.1848
103.8958

5.0000
4.0000
3.0000
2.0000
1.0000
0.0000
1
2.4 UDP 2 150 2.4 UDP 5 150 5.0 UDP 2 150 5.0 UDP 5 150

120.00

2.4 UDP 2 20

2.4 UDP 5 20

5.0 UDP 2 20

5.0 UDP 5 20

Fig. 9. Jitter Results Router 1 (Table V)

100.00
80.00
50.00%

60.00

45.00%
40.00%

40.00

35.00%
30.00%

20.00

25.00%
20.00%

0.00

15.00%

1

10.00%
5.00%

2.4 TCP 2 150 2.4 TCP 5 150 5.0 TCP 2 150 5.0 TCP 5 150
2.4 TCP 2 20

2.4 TCP 5 20

5.0 TCP 2 20

0.00%
1

5.0 TCP 5 20

2.4 UDP 2 150 2.4 UDP 5 150 5.0 UDP 2 150 5.0 UDP 5 150

Fig. 8. Throughput Results Router 1 (Table IV)

2.4 UDP 2 20

In the same light, Table V and VI expose the average jitter and percentage of lost packets. This values were obtained for the different UDP performance tests (8 in total) of the Netgear wireless router (R1).
TABLE V.

RESULTS ROUTER 1(JITTER)

Parallel
Connections

Distance (ft)

Average
Jitter
(msec)

2.4
2.4
5.0
5.0
2.4
2.4
5.0
5.0

UDP
UDP
UDP
UDP
UDP
UDP
UDP
UDP

2
5
2
5
2
5
2
5

150
150
150
150
20
20
20
20

1.3685
6.2372
0.5872
1.8602
1.4564
4.2698
0.3693
0.5581

TABLE VI.
Frequency
(MHz)
2.4
2.4
2.4
2.4
5.0
5.0
5.0
5.0

Protocol
UDP
UDP
UDP
UDP
UDP
UDP
UDP
UDP

RESULTS ROUTER 1(PACKET LOSS)
Router 1 (Netgear)
Parallel
Distance (ft)
Connections
2
150
2
150
5
150
5
150
2
20
2
20
5
20
5
20

5.0 UDP 5 20

From the aforementioned information we can describe the performance of the first wireless router as follows:


Protocol

5.0 UDP 2 20

Fig. 10. Packet Loss Results Router 1 (Table VI)

Router 1 (Netgear)
Frequency
(MHz)

2.4 UDP 5 20



In terms of throughput we can observe that at less distance
(router to server/client) a higher throughput is obtained. In the same way the 5.0 GHz frequency of the equipment displays a higher throughput rate.
As expected, in the UDP measurements, the amount of jitter and number of lost packets is directly impacted by the number of parallel streams and the distance. Thus, more streams and distance are translated in a bigger difference in the end-to-end delay (jitter) and in more loss of packets between client and server.

D. Results Router 2
Packet Loss
(%)
0.16%
47.37%
2.26%
9.02%
0.00%
0.00%
30.43%
47.55%

Table VII shows the average results in terms of throughput obtained after each TCP test (8 in total) of the second benchmarked wireless router (Linksys WRT600N).
TABLE VII.
Frequency
(MHz)
2.4
2.4
5.0
5.0
2.4
2.4
5.0
5.0

Protocol
TCP
TCP
TCP
TCP
TCP
TCP
TCP
TCP

RESULTS ROUTER 2(THROUGHPUT)
Router 2 (Linksys)
Parallel
Connections
2
5
2
5
2
5
2
5

Distance (ft)
150
150
150
150
20
20
20
20

Throughput
(Mbps/sec)
5.3072
6.3169
5.5941
5.7859
8.9916
8.9916
6.9441
7.1983

0.00

2.00

4.00

5.0 TCP 5 20

6.00

5.0 TCP 2 20

8.00

2.4 TCP 5 20

0.00%

10.00

20.00%
5.0 UDP 5 20

2.4 TCP 2 20

Fig. 11. Throughput Results Router 2 (Table VII)

Frequency
(MHz)
2.4
2.4
5.0
5.0
2.4
2.4
5.0
5.0

Protocol
UDP
UDP
UDP
UDP
UDP
UDP
UDP
UDP

TABLE IX.
Frequency
(MHz)
2.4
2.4
5.0
5.0
2.4
2.4
5.0
5.0

Protocol
UDP
UDP
UDP
UDP
UDP
UDP
UDP
UDP

2.4 UDP 5 20

100.00%

2.4 UDP 2 20

From the aforementioned data we can describe the performance of the second wireless router in the following terms: RESULTS ROUTER 2(JITTER)

In the TCP configuration we have that: we can have more throughput rate at smaller distances. In the same way the
5.0 GHz frequency presents a higher throughput than the
2.4 band in the same router.
For the UDP measurements, the amount of jitter and number of lost packets is directly impacted by the number of parallel streams and the distance. Thus, more streams and distance are translated in a greater variation in the endto-end delay (jitter)


Distance (ft)

Jitter (msec)

150
150
150
150
20
20
20
20

4.5386
8.7997
5.8742
15.0149
1.7606
4.0174
4.2845
5.3822



RESULTS ROUTER 2(PACKET LOSS)
Router 2 (Linksys)
Parallel
Connections
2
5
2
5
2
5
2
5

80.00%

Fig. 13. Packet Loss Results Router 2 (Table IX)

Furthermore, Table VIII and IX expose the average jitter and percentage of lost packets, which corresponds to Router 2 performance indicators.

Router 2 (Linksys)
Parallel
Connections
2
5
2
5
2
5
2
5

5.0 UDP 2 20

60.00%

5.0 UDP 5 150 5.0 UDP 2 150 2.4 UDP 5 150 2.4 UDP 2 150

5.0 TCP 5 150 5.0 TCP 2 150 2.4 TCP 5 150 2.4 TCP 2 150

TABLE VIII.

40.00%

VI. ANALYSIS

Distance (ft)

Packet Loss

150
150
150
150
20
20
20
20

1.91%
5.46%
67.75%
78.70%
0.45%
0.67%
40.25%
90.33%

This final section explores the core of the project: the comparison (benchmark) of both wireless routers. In this manner, from the exposed results of both routers it is possible to calculate the 90% Confidence Interval of each set of measurements (32). Further, it is possible to determine a better performance of one over the other in each individual combination (e.g., which router has better throughput in this conditions: TCP connection on the 5.0 GHz band with 2 parallel streams at a 100 feet distance).
Therefore, for the first response variable (throughput over parallel TCP streams) we have:
TABLE X.

COMPARISON THROUGHPUT (150 FEET)
Confidence
Interval

Parallel
Connections

Average
Throughput
(Mbits/sec)

Min

Max

TCP

2

9.6736

9.341

10.0057

2.4

TCP

2

5.3072

4.799

5.8154

2.4

TCP

5

5.7620

4.646

6.8784

2

2.4

TCP

5

6.3169

5.913

6.7205

1

5.0

TCP

2

39.6083

38.022

41.1941

2

5.0

TCP

2

5.5941

5.149

6.0395

1

5.0

TCP

5

36.7984

35.137

38.4598

2

5.0

TCP

5

5.7859

5.361

6.2109

Frequency
(MHz)

Protocol

1

2.4

2
1

Router

0.00

2.00

4.00

5.0 UDP 5 20

6.00

8.00

5.0 UDP 2 20

10.00
2.4 UDP 5 20

12.00

14.00

2.4 UDP 2 20

5.0 UDP 5 150 5.0 UDP 2 150 2.4 UDP 5 150 2.4 UDP 2 150

Fig. 12. Jitter Results Router 2 (Table VIII)

16.00

Comparison
Router 1 Better
Throughput
It cannot be determined Router 1 Better
Throughput
Router 1 Better
Throughput

TABLE XI.

COMPARISON THROUGHPUT (20 FEET)

Router

Frequency
(MHz)

Protocol

Parallel
Connections

Average
Throughput
(Mbits/sec)

1

2.4

TCP

2

42.8203

2

2.4

TCP

2

8.9916

8.8639

9.1193

1

2.4

TCP

5

44.6169

44.2718

44.9620

2

2.4

TCP

5

8.9916

6.0905

7.1037

1

5.0

TCP

2

100.1848

96.3289

104.0407

2

5.0

TCP

2

6.9441

6.5781

7.3101

1

5.0

TCP

5

103.8958

102.9048

104.8869

2

5.0

TCP

5

7.1983

6.8187

7.5779

Confidence Interval
Min

Max

41.9171

43.7235

Comparison

2.4 GHz, TCP, 5 parallel streams and 150 feet. In this case, the
Confidence Intervals overlap; thus it is not possible to conclude which router has a better performance.

Router 1 Better
Throughput
Router 1 Better
Throughput
Router 1 Better
Throughput

For the second tested response variable (jitter over parallel
UDP connections) we have the following:
TABLE XII.

Router 1 Better
Throughput

COMPARISON JITTER (150 FEET)

Router

34

Parallel
Connections

Jitter
(ms)

2.4
2.4
2.4

UDP
UDP
UDP

2
2
5

2
1
2
1
2

39

Protocol

1
2
1

44

Frequency
(MHz)

2.4
5.0
5.0
5.0
5.0

UDP
UDP
UDP
UDP
UDP

5
2
2
5
5

TABLE XIII.

29

Min

Max

1.3685
4.5386
6.2372

1.3328
3.8683
5.9377

1.4042
5.2088
6.5367

8.7997
0.5872
5.8742
1.8602
15.0149

8.3099
0.5003
4.8841
1.6699
14.0068

9.2895
0.6740
6.8642
2.0504
16.0229

14

Frequency
(MHz)

Protocol

Parallel
Connections

Jitter
(ms)

1
2
1
2
1
2
1
2

19

Percentage
Lost
Packets

Comparison

0.16%
1.91%
47.37%

Router 2 More
Jitter
Router 2 More
Jitter

5.46%
2.26%
67.75%
9.02%
78.70%

Router 2 More
Jitter
Router 2 More
Jitter

COMPARISON JITTER (20 FEET)

Router

24

Confidence Interval

2.4
2.4
2.4
2.4
5.0
5.0
5.0
5.0

UDP
UDP
UDP
UDP
UDP
UDP
UDP
UDP

2
2
5
5
2
2
5
5

1.4564
1.7606
4.2698
4.0174
0.3693
4.2845
0.5581
5.3822

Confidence
Interval
Min
Max
1.3152
1.5976
1.6450
1.8763
3.7944
4.7451
3.8129
4.2218
0.3619
0.3766
3.5112
5.0577
0.5507
0.5655
5.0196
5.7448

Comparison

Percentage
Lost
Packets

Router 2 More
Jitter
Router 2 More
Jitter
Router 2 More
Jitter
Router 2 More
Jitter

0.00%
0.45%
0.00%
0.67%
30.43%
40.25%
47.55%
90.33%

9

18.00
4
0

1

2

3

R1/2.4/TCP/2
R2/2.4/TCP/5
R1/5.0/TCP/5

R2/2.4TCP/2
R1/5.0/TCP/2
R2/5.0/TCP/5

4

5

R1/2.4/TCP/5
R2/5.0/TCP/2

16.00
14.00
12.00

Fig. 14. CI Comparison (Router 1 vs Router 2) (Throughput 150ft)
(Table X)

10.00
8.00
6.00

120.00

4.00
100.00

2.00
0.00
0

80.00

60.00

1
R1/2.4/UDP/2
R2/2.4/UDP/5
R1/5.0/UDP/5

2

3
R2/2.4/UDP/2
R1/5.0/UDP/2
R2/5.0/UDP/5

4
R1/2.4/UDP/5
R2/5.0/UDP/2

5

Fig. 16. CI Comparison (Router 1 vs Router 2) (Jitter 150ft)
(Table XII)

40.00

20.00

0.00
0

1
R1/2.4/TCP/2
R2/2.4/TCP/5
R1/5.0/TCP/5

2

3
R2/2.4/TCP/2
R1/5.0/TCP/2
R2/5.0/TCP/5

4
R1/2.4/TCP/5
R2/5.0/TCP/2

5

Fig. 15. CI Comparison (Router 1 vs Router 2) (Throughput 20ft)
(Table XI)

As shown in Tables X and XI in terms of throughput over the TCP connections configuration, for all set of measurements, R1 (Netgear) presents a better performance compared to R2 (Linksys). The only exception is in the case of

As shown in Tables XII and XIII in terms of variation in the end-to-end delay (jitter) of the parallel UDP connections, for all set of measurements, R1 (Netgear) presents a better performance compared to R2 (Linksys). In other words, R1 has better variation of the end-to-end delay, which is considered a better performance especially for application layer processes running real time audio or video.
In this manner, based on the gathered measurements that were previously exposed, we can grade the performance of the wireless routers. Therefore, we can conclude, with a 90% confidence interval, that R1 (Netgear) has a better performance that R2 (Linksys) in terms of throughput (TCP), jitter and packet loss (UDP).

7.00



6.00

4.00

3.00

2.00

1.00

0.00
0

1
R1/2.4/UDP/2
R2/2.4/UDP/5
R1/5.0/UDP/5

2

3
R2/2.4/UDP/2
R1/5.0/UDP/5
R2/5.0/UDP/5

4
R1/2.4/UDP/5
R2/5.0/UDP/2

5

Fig. 17. CI Comparison (Router 1 vs Router 2) (Jitter 20ft)



VII. CONCLUSIONS



For the throughput response variable in TCP parallel connections, for all set of measurements,
Router 1 presents a better performance compared to Router 2. The only exception is in the case of
2.4 GHz, TCP, 5 parallel streams and 150 feet. In this case, the Confidence Intervals overlap; thus it is not possible to conclude which router has a better performance. o In the same light, for the second response variable, variation in the end-to-end delay (jitter) of the parallel UDP connections, for all set of measurements, Router 1 presents a better performance compared to Router 2. In other words, R1 has less variation of the end-to-end delay. Thus, we can conclude that the tested router Netgear
WNDR4300 has a better performance than the router
Linksys WRT600N. o 5.00



In addition, using Confidence Intervals (90%), this project explored the differences in performance of Router 1
(Netgear) and Router 2 (Linksys). Further, we have:

The proposed network performance study was successfully executed. Further, real measurements were taken, processed and analyzed in order to the comparison between equipment of different vendors.
The selected response variables (throughput, jitter and packet loss) were processed and analyzed from the original data, which was obtained through an iperf client/server architecture. Moreover, we observed the following circumstances: o

o

For both wireless routers in terms of throughput, we can observe that at less distance higher throughput. In the same way the 5.0 GHz frequency presents a higher throughput rate than the 2.4 band.
For the UDP measurements in the two routers, the amount of jitter and number of lost packets is directly impacted by the number of parallel streams and the distance. Thus, more streams and distance are translated in a bigger difference in the end-to-end delay (jitter)

REFERENCES
[1]
[2]
[3]

[4]
[5]
[6]

[7]

[8]

R. Golani, S. Kandalan, “WiFi Traffic Analysis Project Report”, Stony
Brook University”, New York.
Luxul Technology, “Use Iperf to Measure Wi-Fi Network Data Rates:
Data Rates vs. Signal Strength”, Lindon, UT.
J. Griffit, “How to Guide: Jperf and Iperf”, Wireless LAN Professionals, retrieved from: http://wirelesslanprofessionals.com/wpcontent/uploads/2011/02/How-to-Guide-on-JPerf-and-IPerf.pdf Iperf Support, “The Network Bandwidth Measurement Tool”, obtained from: https://iperf.fr
Netgear Support, “Manuals and Technical Information”, retrieved from: http://www.netgear.com/home/ Linksys Support, “Manuals and Technical Information”, obtained from: http://www.linksys.com/us/?gclid=Cj0KEQiA4qSzBRCq1iLhZ6Vsc0BEiQA1qt-zoQNczouEqTJHJnt2WPCMmLlnQDjVjZ02PSdmwG6RgaAkxR8P8HAQ Paessler AG, “Monitoring Tools Stay on Top of Your Network Using
Paessler’s
Monitoring
Tools”,
retrieved from: https://www.paessler.com/monitoring_tools
Kolahi, Samad S., et al. "Performance monitoring of various network traffic generators." Computer Modelling and Simulation (UKSim), 2011
UkSim 13th International Conference on. IEEE, 2011.

Similar Documents

Free Essay

Cisco

...Preface Initiated in 1995 by Secretary of Defense, Dr. William Perry, and continued today by Secretary Rumsfeld, the SECDEF Corporate Fellows Program (SDCFP) is a long-term investment in transforming the DoD’s forces and capabilities. Annually, two senior officers with highly successful operational command and staff backgrounds from each Service are selected to receive their senior service college credit by training with Corporate America. The program’s intent is to allow officers to spend a year outside their traditional career paths to glean the best of change, innovation, and leading-edge business practices that could potentially transform DoD business and operational practices. To date, 65 corporate fellows have gone on to form a cadre of Service leaders, knowledgeable in the organizational and operational opportunities made possible by revolutionary changes in information and other technologies. To prepare for the fellowship, the fellows spend four weeks in training. Specifically, participating in lectures on current political and military topics such as strategies, technologies, and process improvement methodologies; meeting with senior DoD officials, Congressional delegates, business executives, etc; as well as taking part in a one-week graduate-level business overview provided by the University of Virginia’s Darden Graduate School of Business Administration. Following the fellows’ corporate assignment, formal outbriefs are provided to approximately forty senior...

Words: 13774 - Pages: 56

Premium Essay

Nt2580

...NT 1210 M1 Case studies # 9 Dear Mr. Sheehan: I would like to thank you for agreement regarding my recommendations to the company about deploying a SAN at each branch office, since each office uses data, audio, video and graphic files that are shared by staff at each location. The SAN may incorporate NAS devices which we have evaluated with different vendors. As we conducted a further research in order to provide you with more detail specifications on SAN and NAS solutions, we were able to come up with the following information design in a form of questions and answers. What is required to implement a SAN and /or NAS?  Storage-area networks (SANs) are composed of computers and remote storage devices. The computers are typically connected to the remote storage devices using SCSI over Fibre Channel (see Figure 1). Other implementations of SAN exist, but this is the most common. In a SAN, all the storage appears local, just as if the remote disk were directly connected to the computer and physically located inside the computer chassis. Network-attached storage (NAS) devices appear to the user as a remote drive letter or are named remote storage device. Typically, the operating system employs a protocol such as Network File System (NFS) or Common Internet File System (CIFS) to discover, log in, and transfer content to and from a storage device. NFS and CIFS both communicate over Ethernet. The user typically enters a username and password, and then is granted access to a particular...

Words: 7132 - Pages: 29

Free Essay

A Case Study on Eircom

...of change ……………………………………………..……… 8 3. Future Orientation ……………………………………………………..…. 10 4. Industry analysis …………………………………………..………………. 12 5. Importance of Convergence in Telecoms Industry ……………. 16 6. Irish Telecom Industry Lifecycle ………………………………….…. 19 7. Strategic Alliances within Irish Telecom Market …………….… 23 Part 2: Analysis of Eircom’s Strategic Capabilities …………………...….…… 25 2.1 Resources and Competences …………………………………….……. 26 2.2 Eircom’s Cost efficiency …………………………………………….….. 30 2.3 Eircom’s Sustained Competitive Advantage …………………..… 31 2.4 Usage drivers: Innovation ………………………………………….….. 33 2.5 Importance of Knowledge Management ………………………..… 36 2.6 Benchmarking ………………………………………………………...……. 38 2.7 Advertising campaigns of Eircom ……………………………………. 39 2.8 Appraising Eircom’s Resources and Capabilities …………...….. 40 Part 3: Key Internal and External Factors …………………………...…………… 42 Part 4: Organisational purposes ……………………………………………………… 43 Part 5: Portfolio Analysis & Strategic Choices …………………………………… 45 Conclusion and Recommendations ……………………………………..…… 49 Appendix 1 Oliver Wyman Company’s Outline Appendix 2 Fixed Line, Mobile and Broadband Usage Appendix 3...

Words: 8366 - Pages: 34

Premium Essay

Bsat

...Roman G. Fall 2012 bsat 303: Final Exam Study Guide Note: The study guide should be used along with the classroom lectures I posted to Moodle, your personal notes from my lectures, and the information found within the chapters.  HTML (Basic knowledge and example code) o Tags, Hyperlinks, Emails, Images o o Hyperlink Visit MTV o  HTML – the language you use to create a Web site To insert an image Steps in Decision Support Systems o Decision support system (DSS) – a highly flexible and interactive system that is designed to support decision making when the problem is not structured o Decision support systems help you analyze, but you must know how to solve the problem, and how to use the results of the analysis o o   Model management component – consists of both the DSS models and the model management system o Data management component – stores and maintains the information that you want your DSS to use o User interface management component – allows you to communicate with the DSS Types of Decisions (Structured, Nonstructured, Recurring, Nonrecurring) o Structured decision – processing a certain information in a specified way so that you will always get the right answer o Nonstructured decision – one for which there may be several “right” answers, without a sure way to get the right answer o Recurring decision – happens repeatedly o Nonrecurring (ad hoc) decision – one you make infrequently Artificial Intelligence, Geographic...

Words: 4354 - Pages: 18

Premium Essay

Network Evaluation

...In a computer network evaluation it is important to cover various areas to determine which are satisfactory and which are in need of improvement. The following 15 evaluations will be used to access the current state of the network: 1. Evaluation of Client Computer Hardware In the evaluation of client computer hardware, this evaluation seeks to identify all client computer assets owned by the company. All laptops and desktops owned by the company should be made available as needed in order for the evaluation to be as accurate as possible. It will be necessary to perform a review of all client computers that connect to the company assets. These machines will be analyzed for speed, performance, and reliability. I will look for variations in hardware manufacturers. Depending on the circumstance, it can result in better TCO (Total Cost of Ownership) if client computers are limited to one or two manufacturers. In addition, machines that are broken, out of warranty, or outdated will be recommended for repair or replacement. 1. 2. Evaluation of Client Computer Software In the evaluation of client computer software, I will seek to identify all software that is installed on client computers and being used in the workplace. This evaluation can be performed using software metering in software such as Microsoft System Center Configuration Manager, if installed. If not installed, this information will be collected manually by viewing the installed software on each machine. ...

Words: 2399 - Pages: 10

Free Essay

Test

...Chapter 1: Introduction to Computer Networks and Data Communications TRUE/FALSE 1. Data is information that has been translated into a form that is more conducive to storage, transmission, and calculation. ANS: T 2. ANS: F PTS: 1 Some people call computer terminals thick-client workstations. PTS: 1 3. A type of microcomputer-to-local area network connection that is growing in popularity is the wireless connection. ANS: T PTS: 1 4. To communicate with the Internet using a dial-up modem, a user’s computer must connect to another computer that is already communicating with the Internet. ANS: T PTS: 1 5. It is not possible to connect two local area networks so that they can share peripherals as well as software. ANS: F PTS: 1 6. Metropolitan area networks can transfer data at fast, LAN speeds but over smaller geographic regions than typically associated with a local area network. ANS: F 7. ANS: T 8. networks. ANS: T 9. ANS: F PTS: 1 The Internet is not a single network but a collection of thousands of networks. PTS: 1 One of the most explosive areas of growth in recent years has been cellular phone PTS: 1 By the 1970s, telephone systems carried more computer data than voice. PTS: 1 10. Network architectures are cohesive layers of protocols defining a set of communication services. ANS: T PTS: 1 11. The OSI model tells us what kind of wire or what kind of connector to use to connect the pieces of a network...

Words: 46505 - Pages: 187

Premium Essay

Research

...Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States SEVENTH EDITION Data Communications and Computer Networks A Business User’s Approach Curt M. White DePaul University Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition Curt M. White Editor-In-Chief: Joe Sabatino Senior Acquisitions Editor: Charles McCormick, Jr. Senior Product Manager: Kate Mason Editorial Assistant: Courtney Bavaro Marketing Director: Keri Witman Marketing Manager: Adam Marsh Senior Marketing Communications Manager: Libby Shipp Marketing Coordinator: Suellen Ruttkay Media Editor: Chris Valentine Art and Cover Direction, Production Management, and Composition: PreMediaGlobal Cover Credit: © Masterfile Royalty Free Manufacturing Coordinator: Julio Esperas © 2013 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without the prior written permission of the publisher. For product information and technology assistance...

Words: 234459 - Pages: 938

Premium Essay

Macro

...COURSE MODULE ABI 204 / ECOMM INTRODUCTION TO E-COMMERCE Unit 1) Introduction to E-Commerce Objectives In this chapter, you will learn about: • The basic elements of electronic commerce • Differences between electronic commerce and traditional commerce • Advantages and Disadvantages of E-Commerce • Business Process Suitability for E-Commerce • Economic forces that have created a business environment that fosters electronic commerce • The ways in which businesses use value chains to identify electronic commerce opportunities Traditional Commerce and Electronic Commerce To many people, the term electronic commerce means shopping on the part of the Internet called the World Wide Web. But it is much broader and encompasses many more business activities than just Web shopping. Electronic commerce refers to business activities conducted using electronic data transmission via the Internet and the World Wide Web. The three main elements of e-commerce are: • Business-to-consumer • Business-to-business • The transactions and business processes that support selling and purchasing activities on the Web Other categories include: consumer-to-consumer and consumer-to-government. Electronic Commerce Electronic Funds Transfers (EFTs) have been used by banks for many years. Electronic Data Interchange (EDI) occurs when one business transmits computer-readable data in a standard format to another business. Businesses who engage in EDI with each other are called trading...

Words: 8797 - Pages: 36

Free Essay

Disney World Case Study

...Exam Name___________________________________ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1. A characteristic or quality describing an entity is called a(n): 1. _______ A) attribute. B) key field. C) tuple. D) field. Answer: A Diff: 1 Page Ref: 230 2. The data hierarchy goes from bits and bytes to: 2. _______ A) fields, records, files, and databases. B) entities, attributes, fields, and records. C) records, entities, fields, and databases. D) fields, attributes, entities, and records. Answer: A Diff: 1 Page Ref: 230 3. In a ________ database, parts of the database are stored and maintained physically in one location and other parts are stored and maintained in other locations. 3. _______ A) fragmented B) contiguous C) split D) partitioned Answer: D Diff: 1 Page Ref: 242 4. The type of logical database model that treats data as if they were stored in two-dimensional tables is the: 4. _______ A) network DBMS. B) hybrid DBMS. C) relational DBMS. D) hierarchical DBMS. Answer: C Diff: 1 Page Ref: 236 5. Activities for detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant are called: 5. _______ A) data cleansing...

Words: 7242 - Pages: 29

Premium Essay

Sem3

...Second Year - Third Semester 3.0.1 International Business - University Assessment 100 Marks Course Content 1. Overview of the International Business Process 2. PEST factors affecting International Business 3. Government influence on trade 4. International Trade Theories 5. FDI 6. Country Evaluation and Selection 7. Collaborative Strategies 8. International Marketing 9. International Trade Agreements 10. International Trade Organizations 11. Forex 12. International HR Strategies 13. International Diplomacy Reference Text 1. International Business – Daniels and Radebough 2. International Business – Sundaram and Black 3. International Business – Roebuck and Simon 4. International Business – Charles Hill 5. International Business – Subba Rao 3.0.2 Strategic management 100 Marks Course Content 1. Strategic Management Process: Vision, Mission, Goal, Philosophy, Policies of an Organization. 2. Strategy, Strategy as planned action, Its importance, Process and advantages of planning Strategic v/s Operational Planning. 3. Decision making and problem solving, Categories of problems, Problem solving skill, Group decision making, Phases indecision making. 4. Communication, Commitment and performance, Role of the leader, Manager v/s Leader, Leadership styles. 5. Conventional Strategic Management v/s Unconventional Strategic Management, The differences, Changed Circumstance 6. Growth Accelerators: Business Web, Market Power, Learning based. 7. Management Control, Elements,...

Words: 13742 - Pages: 55

Premium Essay

Information and Survey Analysis

...1. An IS auditor is reviewing access to an application to determine whether the 10 most recent "new user" forms were correctly authorized. This is an example of: A. variable sampling. B. substantive testing. C. compliance testing. D. stop-or-go sampling. The correct answer is: C. compliance testing. Explanation: Compliance testing determines whether controls are being applied in compliance with policy. This includes tests to determine whether new accounts were appropriately authorized. Variable sampling is used to estimate numerical values, such as dollar values. Substantive testing substantiates the integrity of actual processing, such as balances on financial statements. The development of substantive tests is often dependent on the outcome of compliance tests. If compliance tests indicate that there are adequate internal controls, then substantive tests can be minimized. Stop-or-go sampling allows a test to be stopped as early as possible and is not appropriate for checking whether procedures have been followed. 2. The decisions and actions of an IS auditor are MOST likely to affect which of the following risks? A. Inherent B. Detection C. Control D. Business The correct answer is: B. Detection Explanation: Detection risks are directly affected by the auditor's selection of audit procedures and techniques. Inherent risks usually are not affected by the IS auditor. Control risks are controlled by the actions of the company's management. Business...

Words: 97238 - Pages: 389

Premium Essay

Vodafone Gh Marketing Plan

...MARKETING RESEARCH PROJECT [UAMM0091] By: UAMMOO91 (Samuel Poku-Bonsu) Course title: MARKETING Institution: University of Applied Management Lecturer: MR. SHANI BASHIRU Date of submission: 10TH JANUARY 2012 1|Page Table of Contents SECTION A ........................................................................................................................ 4 COMPANY INTRODUCTION ......................................................................................... 4 VODAFONE GHANA LTD .......................................................................................... 4 MICRO-ENVIRONMENT AUDIT ................................................................................... 5 MARKETING MIX ........................................................................................................ 5 PRODUCT .................................................................................................................. 5 PRICE ......................................................................................................................... 6 PLACE ........................................................................................................................ 9 PROMOTION ............................................................................................................. 9 PROCESS ................................................................................................................. 10 PEOPLE ..............................

Words: 11087 - Pages: 45

Premium Essay

Managemet and Information Systems

...Exam Name___________________________________ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and: 1) _______ A) improved decision making. B) improved business practices. C) improved efficiency. D) improved flexibility. 2) Which of the following choices may lead to competitive advantage (1) new products, services, and business models; (2) charging less for superior products; (3) responding to customers in real time? 2) _______ A) 1 only B) 1 and 2 C) 2 and 3 D) 1, 2, and 3 3) An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support: 3) _______ A) decision making and control in an organization. B) the creation of new products and services. C) communications and data flow. D) managers analyzing the organization's raw data. 4) The three activities in an information system that produce the information organizations use to control operations are: 4) _______ A) information retrieval, research, and analysis. B) input, processing, and output. C) input, output, and feedback...

Words: 6583 - Pages: 27

Premium Essay

None

...Intel Final Paper MGMT 480- Frankforter Executive Summary As the world’s “foremost semiconductor maker,” Intel Corporation has a reputation to uphold and a future to build. Founded in 1968, Intel has grown to a company of over 90,000 employees who operate Intel’s facilities in nearly fifty countries. Intel produces processors, motherboards, chipsets, network adapters, flash memory, software, storage devices, and wireless products. Many of us are the end-users of a wide variety of Intel’s products, but the Intel’s numerous other customers are primarily OEM manufacturers who utilize Intel’s components, end-user consumers (which includes individuals, large and small businesses, and service providers), and “other manufacturers, including makers of a wide range of industrial and communications equipment.” Intel has capitalized on its ability to lead the semiconductor industry by continuous innovation. Gordon Moore, one of Intel’s founders, introduced a principle that continues to guide Intel which states that “the number of transistors on a chip roughly doubles every two years.” In keeping with Moore’s Law, Intel’s key to success in the semiconductor industry has been constant innovation. Such a strategy has allowed Intel to remain a leader among competitors such as Texas Instruments, Advanced Micro Devices, International Business Machines, and Freescale Semiconductor, among others. The semiconductor industry is extremely competitive, but...

Words: 11699 - Pages: 47

Premium Essay

Test Question

...Essential of MIS (9th edition) Chapter 1 1) As discussed in the chapter opening case, the Yankees' use of information systems in their new stadium can be seen as an effort to achieve which of the primary business objectives? A) Operational excellence B) Survival C) Customer and supplier intimacy D) Improved decision making 2) Journalist Thomas Friedman's description of the world as "flat" referred to: A) the flattening of economic and cultural advantages of developed countries. B) the use of the Internet and technology for instantaneous communication. C) the reduction in travel times and the ubiquity of global exchange and travel. D) the growth of globalization. 3) The six important business objectives of information technology are: new products, services, and business models; customer and supplier intimacy; improved decision-making; competitive advantage; operational excellence, and: A) flexibility. B) survival. C) improved business practices. D) improved efficiency. 4) The use of information systems because of necessity describes the business objective of: A) survival. B) improved business practices. C) competitive advantage. D) improved flexibility. 5) Which of the following choices may lead to competitive advantage (1) new products, services, and business models; (2) charging less for superior products; (3) responding to customers in real-time? A) 1 only B) 1 and 2 C) 2 and 3 D) 1, 2, and 3 6) Verizon's implementation of a Web-based...

Words: 23003 - Pages: 93