|Comparison of Environments on 802.11 Throughput Performance||Diana Lewis, Justin Rebe, Jeremy deVries||
The chaotic nature of the radio frequency medium of 802.11 wireless networks makes it problematic to obtain accurate and precise repetition of performance tests and measurements. Environmental variables that deeply influence link performance must be addressed before throughput testing can be accurately measured across various devices. An RF shielded room with anechoic foam provides the most ideal environment for throughput tests compared to either an RF shielded room without foam or an open air laboratory. Location within the RF shielded room with anechoic foam was shown to have a negligible effect on performance, but using an RF absorbing rubber mat under a device was shown to reduce reflections, producing an optimal environment for throughput testing.
|September 18, 2014||White Papers|
|The Ethernet Effect: Collaboration, Interoperability, and Adoption of New Technologies||Seamus Crehan, George Kimura, Eric Lynskey and Chris Volpe||
Representing the first public summary of objective, multi-vendor Ethernet conformance and interoperability testing conducted over an extended period. This whitepaper summarizes seven years of Fast and Gigabit Ethernet testing data gathered through the end of 2005, including test reports from 900 individual products representing several hundred companies.
|January 1, 2006||White Papers|
|Wireless Networking Overview||Kevin Karcz, Jeremy Kent||
An overview of various wireless networking technologies, their relationship to one another, and a look at emerging standards.
|September 18, 2014||Tutorials|
|WPA-PSK: Step-by-Step||Jeremy deVries||
In today's age of ubiquitous SOHO networks and ever more Wi-Fi in laptops, security is a paramount concern. Unsecured or improperly set up wireless networks can leave you vulnerable to intrusion, viruses, hijacking of bandwidth, and more problems than one can list, which is why properly setting up your secured network using an authentication mechanism such as WPA-PSK is a crucial step in creating a wireless network. This article provides an overview of the Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) security mechanism, and a step-by-step guide to securing your wireless network.
|September 30, 2005||Tutorials|
|Clause 28 Auto-Negotiation Basic Introduction||Matthew Hersh||
View this for a basic introduction to Copper and Fiber Ethernet Auto-Negotiation.
|August 5, 2005||Tutorials|
|OSRM Test Event 2005||Henry He, Takumi Ohba, Kaori Shimizu, Chris Volpe, John Allen, Ankur Chadda, and Scott Larsonk||
The third UNH-IOL OSRM test event was designed with a new focus on the failure recovery mechanisms of a GMPLS network. The event provided a vendor-neutral setting that gave participants an opportunity to assess interoperability and valuable feedback to assist them in refining their implementations. Testing included interconnected products demonstrating the functionality of various aspects of explicit route and label control to set up GMPLS traffic engineered most suitable path, control channel failure recovery, data plane failure recovery by multi-layer traffic engineering, end-to-end protection in signaling, and the ability of GMPLS to manage diverse networks with increased scalability.
|July 25, 2005||White Papers|
|IEEE 802.11 Working Group for WLAN Standards||IEEE LMSC||
IEEE P802.11 is a standards working group on wireless local area networks. The working group is a part of IEEE LMSC (LAN MAN Standards Committee) formerly called IEEE Project 802. IEEE LMSC reports to the Standards Activity Board (SAB) of the IEEE Computer Society.
|June 1, 2005||External Links|
|Voice Over IP and Wireless Data Coexistence in a WLAN Switch Deployment||Tom Leary, UNH-IOL; Aruba Networks||
Wireless technology is becoming increasingly integrated into the world's networks. Recent innovations, such as offloading processing to wireless local area network (WLAN) switches at the network's edge, have cleared the way for large-scale enterprise deployments. However, despite improved maintenance and administration tools, switched WLAN networks are vulnerable to issues arising from the heterogeneous network environment, especially the integration of services such as voice over IP (VoIP). An open-industry enterprise services and security test event held from March 21 to March 25, 2005 at the University of New Hampshire InterOperability Laboratory (UNH-IOL) provided a backdrop for testing these solutions.
|May 13, 2005||White Papers|
|Testing Triple Play Services and Security in Enterprise Networks||Wireless, Bridge Functions, and VoX Consortiums||
Testing scenarios, caveats and issues encountered in testing converged or "triple play" (voice, video, data) services and security in converged enterprise-class deployment scenarios.
|May 4, 2005||White Papers|
|Fibre Channel Overview||ZoltÃ¡n Meggyesi||
A technical overview of Fibre Channel
|April 13, 2005||External Links|