what you expect to see in terms of transfer rates on a cell with only 2 clients given the conditions is very predictable ( - crappy hardware)
so the constraints we have are:
total theoretical speed = 250 odd mbit
half duplex tech
CSMA/CA
type of traffic flow, ie in a ftp file transfer its 97 odd % one way little bit back the other way depending on windowing etc.
so CSMA/CA wipes off 30% of your theoretical max speed right off the bat. So you are down to 175mb. half duplex starts getting collisions around the 70-80% mark (70% is for CSMA/CD not sure about CA) so you lose 20 odd% so your now at 140mbit.
Take off a little bit for TCP ACK's and in best case i would expect to see 133mbit max in a ftp transfer if you are using something a bit more chatty like windows files sharing i would expect it to drop alot, 30%, 40%(but this is more the fact that SMB/CLIFS is evil then the link itself). You have to remember that that this is with nothing else taking on the link and in perfect conditions. As soon as other traffic is generated weather by your own host or a completely different client on the segment you are going to see performance drop very quickly.
On to security
.
there are two parts to this, the authentication method and the encapsulation method.
there are two authentication methods for preshared keys, open and shared? ( cant remember its name)
shared is flawed and no mater what encapsulation/encryption you use the oringal key can easily be obtained. WPA V2 doesn't allow for shared authentication. Open allows you to connect to the AP with out Authenticating but you cant send data until you do. Open authentication can be broken if the key or phrase is too short.
now we have the encapsulation or encryption, there are 3 main options
WEP
TKIP
AES
WEP, is based off a flawed encryption method known as RC4, its the predictability of RC4 which allows for the key to be obtained very fast.
TKIP, is WEP with temporal keying meaning it changes. it is WEP but with a changing key which means by the time the key is broken it has changed, this does not protect your data anymore then WEP!! Some one can still sniff it and break it easily later. TKIP uses the open authentication method so if you have a short key <8 characters then it can be broken.
AES, AES is a very strong encryption cipher, it is also very fast 258bit AES is much faster then 168 bit 3DES to encrypt and being mathematically much strong (it depends who you ask as to which one is stronger). while i dont know for sure i would expect RC4 to be much faster then the both but it is much much weaker then the both (this is before hardware acceleration). As to what is hardware accelerated in consumer level hardware i have no idea ( i spend my time on cisco gear)
So as to what is faster AES or TKIP it would come down to the computational power needed to generate the keying based of the passphrase. But if all done is software i would expect TKIP to be much faster.
what does all this mean? buggered if i know