{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T08:24:56Z","timestamp":1751876696740,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540472421"},{"type":"electronic","value":"9783540472438"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11902140_51","type":"book-chapter","created":{"date-parts":[[2006,10,26]],"date-time":"2006-10-26T13:35:29Z","timestamp":1161869729000},"page":"474-482","source":"Crossref","is-referenced-by-count":2,"title":["Throughput Analysis of UDP and VPN Traffic in 802.11g Networks"],"prefix":"10.1007","author":[{"given":"S\u00fcheyla","family":"Ikiz","sequence":"first","affiliation":[]},{"given":"Y. M.","family":"Erten","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"51_CR1","doi-asserted-by":"crossref","unstructured":"Ferre, P., Doufexi, A., Nix, A., Bull, D.: Throughput Analysis of IEEE 802.11 and IEEE 802.11 e MAC. In: Wireless Communications and Networking, WCNC 2004, vol. 2, pp. 783\u2013788 (2004)","DOI":"10.1109\/WCNC.2004.1311286"},{"key":"51_CR2","doi-asserted-by":"crossref","unstructured":"Garg, S., Kappes, M.: An experimental study of throughput for UDP and VoIP traffic in IEEE 802.11b networks. Wireless Communications and Networking, WCNC 2003, vol. 3, pp. 1748\u20131753 (2003)","DOI":"10.1109\/WCNC.2003.1200651"},{"key":"51_CR3","doi-asserted-by":"crossref","unstructured":"Wijesinha, A.L., Yeong-tae Song Krishnan, M., Mathur, V., Ahn, J., Shyamasundar, V.: Throughput measurement for UDP traffic in an IEEE 802.11g WLAN. In: Sixth International Conference onSoftware Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing, 2005 and First ACIS International Workshop on Self-Assembling Wireless Networks. SNPD\/SAWN 2005, pp. 220\u2013225 (2005)","DOI":"10.1109\/SNPD-SAWN.2005.76"},{"key":"51_CR4","unstructured":"Jun, J., Peddabachagari, P., Sichitiu, M.: Theoretical maximum throughput of IEEE 802.11 and its applications. In: Second IEEE International Symposium onNetwork Computing and Applications, NCA 2003, pp. 249\u2013256 (2003)"},{"key":"51_CR5","unstructured":"Wang, S.-C., Chen, Y.-M., Lee, T.-H., Helmy, A.: Performance evaluations for hybrid IEEE 802.11b and 802.11g wireless networks. In: 24th IEEE International Performance, Computing, and Communications Conference, IPCCC 2005, pp. 111\u2013118 (2005)"},{"issue":"8","key":"51_CR6","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/LCOMM.2002.802035","volume":"6","author":"Y. Xiao","year":"2002","unstructured":"Xiao, Y., Rosdahl, J.: Throughput and delay limits of IEEE 802.11. IEEE Communications Letters\u00a06(8), 5\u2013357 (2002)","journal-title":"IEEE Communications Letters"},{"key":"51_CR7","doi-asserted-by":"crossref","unstructured":"Munasinghe, K.S., Shahrestani, S.A.: Wireless VPNs: an evaluation of QoS metrics and measures. In: International Conference on Mobile Business, ICMB 2005, pp. 616\u2013622 (2005)","DOI":"10.1109\/ICMB.2005.117"},{"key":"51_CR8","doi-asserted-by":"crossref","unstructured":"Allen, J., Wilson, J.: Securing a wireless network. In: Proceedings of the 30th Annual ACM SIGUCCS Conference on User Services, November 2002, pp. 213\u2013215 (2002)","DOI":"10.1145\/588646.588696"},{"key":"51_CR9","doi-asserted-by":"crossref","unstructured":"Fazal, L., Ganu, S., Kappes, M., Krishnakumar, A.S., Krishnan, P.: Tackling security vulnerabilities in VPN-based wireless deployments. In: IEEE International Conference on Communications, June 2004, vol.\u00a01, pp. 100\u2013104 (2004)","DOI":"10.1109\/ICC.2004.1312460"}],"container-title":["Lecture Notes in Computer Science","Computer and Information Sciences \u2013 ISCIS 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11902140_51.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T17:54:22Z","timestamp":1736618062000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11902140_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540472421","9783540472438"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/11902140_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}