Discuss about the Wireless Network and Security for Satellite Communication.
The wireless network is the type of network that enables various devices in staying connected with the network; however roam un tethered with other wires [8]. The access points eventually amplify the signals of wireless fidelity for the reason that the device could be kept extremely far from the router and still lined with the network. The benefit of this wireless network mainly includes being absolutely convenient, i.e. it can access the resources of the network from all locations within the coverage area of the wireless network or even from any Wi-Fi connected region. Moreover, this type of network provides high productivity and easy collaboration [1]. Due to these above mentioned advantages or benefits, wireless networks are taken by various organizations or individuals. There are several technologies of this wireless communication network.
The following report will be outlining a brief discussion on wireless network and all its technologies or applications. This report will be substantially focusing on the three important types of wireless communication technologies and thus providing a detailed comparison between them. Moreover, there are various standards of wireless communication and they would be evaluated on the basis of Internet of Things and CPS or cyber physical systems. Furthermore, the best network would be selected on the basis of its performance.
The comparison between satellite communication technology, wireless fidelity and Worldwide Interoperability for Microwave Access is as follows:
Main Factors |
Satellite communication Technology |
Wireless Fidelity |
Worldwide Interoperability for Microwave Access |
i) Communication Spectrum |
Communication spectrum refers to the bandwidth spectrum. There are various communication spectra in several networking devices [13]. The six bands of satellite communication are Ka band, Ku band, X band, C band, S band and L band. The respective spectra are 26 to 40 GHz, 12 to 18 GHz, 8 to 12 GHz, 4 to 8 GHz, 2 to 4 GHz and 1 to 2 GHz. The most used band amongst these is Ku band. |
The communication spectrum of Wi-Fi or wireless fidelity is separate in various locations in all over the world. There are several protocols present in the wide domain of IEEE 802.11. Each and every protocol has its respective frequency band. The frequency band for IEEE 802.11a is 5 GHz, the frequency band for IEEE 802.11b is 2.4 GHz, the frequency band for IEEE 802.11g is 2.4 GHz, the frequency band for IEEE 802.11n is 5 GHz, the frequency band for IEEE 802.11ac is 6 GHz, the frequency band for IEEE 802.11ad is up to 60 GHz, the frequency band for IEEE 802.11af is below 1 GHz and the frequency band for IEEE 802.11ah is 700 MHz. |
The communication spectrum of WiMax is separate in various locations in all over the world. Two protocols are utilized. They are IEEE 802.16d and IEEE 802.16e. For IEEE 802.16d, the most utilized frequencies are 3.5 GHZ and 5.8 GHz. For IEEE 802.16e, the most utilized frequencies are 2.3 GHz, 2.5 GHz and 3.5 GHz [1]. |
ii) Modulation Techniques |
There are three techniques for modulation in satellite. They are orthogonal quadrature phase shift keying or OQPSK, quadrature phase shift keying or QPSK and binary phase shift keying or BPSK [3]. |
There are two distinct techniques for modulation in wireless fidelity. They are Quadrature Phase Shift Keying or QPSK and complementary coded keying or CCK. |
There are four distinct techniques for modulation in WiMax. They are 64 QAM or 64 quadrature amplitude modulation, 16 QAM or 16 quadrature amplitude modulation, QPSK or quadrature phase shift keying and BPSK or binary phase shift keying [11]. |
iii) Medium Access Control Mechanism |
The MAC protocols of satellite technology are frequency division multiple access or FDMA and time division multiple access or TDMA |
The MAC of Wi-Fi is completely on the basis of IEEE 802.11 specifications. |
The MAC protocols of WiMax are utilized for fulfilling all the connections of point-to-multipoint orientation [6]. |
iv) Network Technologies |
Switched topology, point to point topology and hybrid topology. |
Black-haul topology and mesh topology. |
AP based topology, point-to-multipoint bridge topology. |
The wireless communication standards refer to those types of standards that support the varying levels for communication and thus helping the user. There are various types of wireless communication standards that are widely accepted by the users and also provide necessary range of balance, throughput of network and mobility to devices [9]. The enhancement of these standards is extremely important for the network. The wireless sensors that are connected by IoT are centralized for the designing of CPS. Thus, the security is extremely high with this integration.
The significant evaluation of various wireless communication standards for the cyber physical systems ad Internet of Things are given below:
NFC or simply the Near Field Communication is a collection of protocols that are utilized for communication and hence enabling a secured connection between the two. The restriction is that presence of smart phone is required here. The most significant advantages of the i0ntegration of Near Field Communication and Internet of Things mainly involve energy saving, higher security, convenience and many other. The medical field gets a huge benefit from this integration [3]. In case of cyber physical systems, NFC is responsible for stopping the eavesdropping and relay attacks on the computer devices.
Z-Wave is the next type of standard in wireless communication. The network that is present within this network is mesh and thus connections are possible in all aspects. The radio waves that are utilized here are of extremely lower energy and thus the energy consumption is also low. Z-Wave powers the IoT or Internet of Things [10]. The devices that provide smart lighting of the Internet of Things is the type of mesh network that allows communicate even from 100 feet distance. For the CPS, Z-Wave is utilized in domains such automated vehicles and robotics.
Bluetooth and Bluetooth Low Energy: Bluetooth is the most easy way to transfer any type of data such as images, videos and audios. The only restriction in this type of technology is that it cannot cover huge distances [2]. The data transfer can only occur in short distances. In the IoT, the main strong point of this technology is the easy communication and for cyber physical devices, the technology of Bluetooth is linked with all the systems for providing various easy modes of communication.
Bluetooth Low Energy or Bluetooth 4.0 is the next standard of wireless communication. In the Internet of things, this type of connectivity is responsible for alerting the systems of house and hence the crimes are reduced [7]. Several other applications are also involved with this technology. In case of CPS, the Bluetooth low energy communicates amongst the master computer systems and slave microcontrollers.
After evaluating all the nine wireless networking standards for CPS and IoT, the suitable network is UHF RFID. It is extremely effective as the bandwidth is maximum and the range area is also high for this RFID. The range varies from 300 MHZ to 3 GHz. Hence, it is termed as the best of all.
Conclusion
Therefore, from the above discussion, it can be concluded that wireless networks are the new advancements in the networking world. It is the type of network that is being set up by utilizing the radio signal frequencies in order to communicate within the network devices and computer systems. This type of network is also referred to as the WLAN or Wireless fidelity network. The feature of ease in setting up of the network makes the wireless network extremely popular and well acceptable by all. Moreover, since no cables are involved in this network, the overall expenses are reduced to a great extent and thus all the problems and complexities with the wires are removed with this type of network. Moreover, the computers and the systems are easily connected with the wireless networking and also in a cost effective way. The security of this type of network is also high and there is almost chance of security issues in wireless networking. The protections to this security are not required here; however, they do possess this type of security within the networks. The above report has highlighted the topic of wireless networking with relevant details. A comparison has been done on various technologies and standards have been evaluated. Finally the best network has been selected.
References
[1] Burg, Andreas, Anupam Chattopadhyay, and Kwok-Yan Lam. “Wireless Communication and Security Issues for Cyber–Physical Systems and the Internet-of-Things.” Proceedings of the IEEE 106, no. 1 (2018): 38-60.
[2] Andrews, Jeffrey G., Xinchen Zhang, Gregory D. Durgin, and Abhishek K. Gupta. “Are we approaching the fundamental limits of wireless network densification?.” IEEE Communications Magazine 54, no. 10 (2016): 184-190.
[3] Dey, Kakan Chandra, Anjan Rayamajhi, Mashrur Chowdhury, Parth Bhavsar, and James Martin. “Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network–Performance evaluation.” Transportation Research Part C: Emerging Technologies 68 (2016): 168-184.
[4] Xiao, Yang, ed. Security in sensor networks. CRC Press, 2016.
[5] Pathan, Al-Sakib Khan, ed. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press, 2016.
[6] Zhou, Xiangyun, Yan Zhang, and Lingyang Song. Physical layer security in wireless communications. Crc Press, 2016.
[7] Zhao, Nan, F. Richard Yu, Ming Li, Qiao Yan, and Victor CM Leung. “Physical layer security issues in interference-alignment-based wireless networks.” IEEE Communications Magazine 54, no. 8 (2016): 162-168.
[8] Chen, Yuang, and Thomas Kunz. “Performance evaluation of IoT protocols under a constrained wireless access network.” In Selected Topics in Mobile & Wireless Networking (MoWNeT), 2016 International Conference on, pp. 1-7. IEEE, 2016.
[9] Shin, Seungwon, Lei Xu, Sungmin Hong, and Guofei Gu. “Enhancing network security through software defined networking (SDN).” In Computer Communication and Networks (ICCCN), 2016 25th International Conference on, pp. 1-9. IEEE, 2016.
[10] Liyanage, Madhusanka, Ahmed Bux Abro, Mika Ylianttila, and Andrei Gurtov. “Opportunities and challenges of software-defined mobile networks in network security.” IEEE Security & Privacy 14, no. 4 (2016): 34-44.
[11] Mahgoub, Imad, and Mohammad Ilyas. Sensor network protocols. CRC press, 2016.
[12] Sarkar, Subir Kumar, T. G. Basavaraju, and C. Puttamadappa. Ad hoc mobile wireless networks: principles, protocols, and applications. CRC Press, 2016. He, Debiao, Sherali Zeadally, Neeraj Kumar, and Jong-Hyouk Lee. “Anonymous authentication for wireless body area networks with provable security.” IEEE Systems Journal 11, no. 4 (2017): 2590-2601.
[13] He, Debiao, Sherali Zeadally, Neeraj Kumar, and Jong-Hyouk Lee. “Anonymous authentication for wireless body area networks with provable security.” IEEE Systems Journal 11, no. 4 (2017): 2590-2601.
[14] Makimoto, Mitsuo, and Sadahiko Yamashita. Microwave resonators and filters for wireless communication: theory, design and application. Vol. 4. Springer Science & Business Media, 2013.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download