This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.

Summary

DS-0995
The kyutech/interference dataset
External Dataset
External Data Source
Crawdad (Dartmouth)
Unknown
01/01/2008
51 (lowest rank is 51)

Category & Restrictions

Other
application layer security, network data, local networks, wireless
Unrestricted
Unknown

Description


Measurements of HTTP requests over 802.11 in dense wireless classrooms

The common wisdom tells one not to attach more than 5-10 wireless devices to an access point. This is a problem in wireless educational classes, one can get between 10 and 50 students in the same room. Such spaces are referred to as dense wireless networks. While there are several methods that can be used to deal with dense wireless environments, installing multiple APs and separating them by channel is arguably the most readily available method today. In 802.11g/n the practical advice is to assign CH1, CH5 and CH9 to the three APs. However, even in such environments, wireless channels can become congested. It was noticed that tablet terminals would often fail to complete HTTP requests or fail getting access to the wireless channel entirely. In order to deal with this reliability problem, educational webapps had to be updated in such a way that they would detect failed requests and repeat them multiple times until a valid reply comes back. This dataset contains measurements which can help model such environments and the related application logic. The dataset has slightly non-trivial metrics which described failed/repeated. The experiment was run over multiple parameters and with on-the-fly changes in the layout. The measurement itself was simple -- a web application (in browser) on user terminal would send a GET request to the web server and would download bulk of a randomly selected size. All the performance metrics were recorded at user terminals and gradually uploaded to the server -- specifically, each new request would also contain the variables containing the results of the previous request, which had negligible effect on size but facilitated efficient log-keeping.

; maratishe@gmail.com

Additional Details

N/A
false
false
gmail, server, web browser, upload, communication protocol, cryptographic protocol, application layer protocols, local area networks, transport layer security, external data source, servers, history of the internet, 995, browser, cloud infrastructure attacks failures, internet protocol, the kyutech/interference dataset, wireless lan, wireless network, uniform resource identifier, website, hypertext transfer protocol clients, hypertext transfer protocol, web server software, inferlink corporation, secure communication, web server, history of computing, communication software, wireless