<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-04-17T17:42:40.618Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:2:188" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:2:188</identifier>
                <datestamp>2013-10-21T19:59:34Z</datestamp>
                <setSpec>2</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2013</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/2/188</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://www.isaet.org/images/extraimages/P413054.pdf</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:674" confidence="-1">A. Gheryani</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0001-6136-1895" confidence="-1">M. Veinović</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">This paper studies and measures the outcome of
different security algorithms on the performance of a wireless LAN
over TCP and UDP protocols. Real experiments were performed on a
wireless LAN by uploading traffic in different data rate. The data
obtained was analyzed for throughput, jitter and delay under different
security scenarios. Both TCP and UDP traffic streams were analyzed
at three different data rates. The effect of congestion is also
measured. The results tell that no important degradation in
performa nce occurs by enabling security algorithms in a wireless
LAN. In low bit rate, it shows there is no important degradation, but
in case of high rate more than channel rate, it shows there is
influence. </dim:field>
                    <dim:field mdschema="dc" element="type">article</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="volume">1</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="issue">2</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="spage">320</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="epage">325</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="issn">2320–4028</dim:field>
                    <dim:field mdschema="dc" element="source">International Journal of Computer Science and Electronics Engineering (IJCSEE)</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
