Discuss about the Wireless Networking Technologies And Their Securities.
Wireless network can be defined as the specific computer network, which eventually utilizes the wireless data connections within the nodes of network. The methods through which all types of telecommunications networks or business installations substantially avoid the expensive procedure to introduce cables to any building are known as wireless networking [4]. The connection is very easy with the help of this wireless network; moreover, the entire process of implementation is extremely simple and easy. Wireless networking is implemented as well as administrated with the help of radio communication.
The following report outlines a brief discussion on the concept of wireless networking technologies and their securities. Three specific parts will be covered here. They are the comparison between the technologies in respect to four factors, evaluation of six wireless communication standards for the systems of IoT and cyber physical and the final part is the justification of the best network performance.
There are several technologies in wireless communications. The most significant technologies of the wireless communications are satellite, WiMax or Worldwide Interoperability for Microwave Access and Wireless Fidelity or Wi-Fi. All the three above mentioned technologies are extremely popular and effective and are accepted by various users all over the world [11]. The detailed comparison of these three technologies in respect to the communication spectrum, modulation techniques, medium access control or MAC and network topologies are as follows:
Key Factors |
Satellite Technology |
WiMax |
Wireless Fidelity |
i) Communication Spectrum |
The communication spectrum of satellite wireless technology is 12 to 18 GHz for the Ku band. |
The communication spectrum of WiMax is different in various places [3]. The most commonly utilized frequencies are 3.5 GHz and 5.8 GHZ for the standard of 802.16d and 2.3 GHz, 2.5 GHz and 3.5 GHz for the standard of 802.16e. |
The communication spectrum of Wireless Fidelity or Wi-Fi is different for various variants. The variants are 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, 802.11ad, 802.11af and 802.11ah [9]. The frequency bands for these variants are 5 GHz, 2.4 GHz, 2.4 GHZ, 2.4 GHZ and 5 GHZ, below 6 GHz, up to 60 GHz, below 1 GHz and 700 MHz, 860 MHz, 902 MHz respectively for the variants [6]. |
ii) Modulation Techniques |
The modulation technique for satellite communication is Phase Shift Keying or PSK. |
The modulation techniques for WiMax are BPSK, QPSK, 16 QAM and 64 QAM. |
The modulation techniques for wireless fidelity are complementary coded keying or CCK and Quadrature Phase Shift Keying or QPSK. |
iii) Medium Access Control Mechanism |
The MAC protocols of satellite communication are time division multiple access or TDMA and frequency division multiple access or FDMA [2]. |
The MAC mechanism of WiMax has to fulfil various requirements like connection orientation, supporting communication to all and point to multipoint connection. The main tasks are data transmission and data reception. |
The Wi-fi MAC protocol is the specific underlying technology of WLAN that is based on the specifications of IEEE 802.11, providing data link layer of Ethernet LAN system [12]. |
iv) Network Topologies |
The network topology of the satellite is point to point and point to multi point topology, switched topology, TDMA and hybrid topology. |
The network topologies of WiMax communication are mesh topology and black haul topology. |
The network topologies of Wi-Fi communication are mainly AP based topology, peer to peer topology and point to multipoint bridge topology [7]. |
The evaluation of the wireless communication standards in respect to the cyber physical systems and internet of things is given below:
NFC or Near-field communication is the respective collection of communication protocols, which allow any two electronic devices to communicate amongst each other. One of the devices is any portable device like smart phone [1]. This is done by bringing these two devices closer to each other within 4 cm of distance. Any NFC device could work in three distinct modes, which are NFC card emulation, NFC reader or writer and NFC peer to peer.
Z-Wave is the protocol of wireless communication that is utilized mainly for the home automation. It is the specific mesh network that utilizes lower energy radio waves for the purpose of communicating from various appliances and thus allowing wireless control for the users. The frequency range is 800 MHz to 900 MHz. Since, the range is short, it is not effective in the IoT in compared to others.
Bluetooth Low Energy is the wireless technology for personal area network that is designed as well as marketed by the Bluetooth SIG. the most significant applications of this particular technology are security, healthcare, fitness, home entertainment and many more. Various operating systems like iOS, Windows, Linux and Android support this technology [9]. The power consumption is extremely less in this technology. This particular technology is expected to become effective for IoT and cyber physical systems in the near future.
On the evaluation of the wireless communication standards for cyber physical systems and internet of things, the standard that would produce the best network performance is UHF RFID. This is because the frequency range is extremely higher than the rest and hence it could be easily utilized in cyber physical systems and internet of things [2]. As it is new, the availability is much higher than the rest.
Conclusion
Therefore, from the above discussion, it can be concluded that wireless networks are certain computer networks, which are not linked with the help of any cable. The utilization of the wireless network solely allows the enterprises in avoiding costly process for implementing cables within a building for the purpose of connections. The implementation of the wireless networks always takes place within the physical layer of the OSI model. The main types of the wireless network are LAN, WAN, MAN and PAN. There are various technologies of wireless networking. These technologies are well accepted by all users and in various organizations. The above report has provided the detailed description on the wireless networking concept and its security. The technologies are being compared with other and the comparison is provided here. Moreover, the wireless communication standards are also evaluated and the best network is selected on the basis of the performances of the networks.
References
Andrews, Jeffrey G., Xinchen Zhang, Gregory D. Durgin, and Abhishek K. Gupta. “Are we approaching the fundamental limits of wireless network densification?.” IEEE Communications Magazine 54, no. 10 (2016): 184-190.
Dey, Kakan Chandra, Anjan Rayamajhi, Mashrur Chowdhury, Parth Bhavsar, and James Martin. “Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network–Performance evaluation.” Transportation Research Part C: Emerging Technologies 68 (2016): 168-184.
Pathan, Al-Sakib Khan, ed. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press, 2016.
Zhao, Nan, F. Richard Yu, Ming Li, Qiao Yan, and Victor CM Leung. “Physical layer security issues in interference-alignment-based wireless networks.” IEEE Communications Magazine 54, no. 8 (2016): 162-168.
Xiao, Yang, ed. Security in sensor networks. CRC Press, 2016.
Chen, Yuang, and Thomas Kunz. “Performance evaluation of IoT protocols under a constrained wireless access network.” In Selected Topics in Mobile & Wireless Networking (MoWNeT), 2016 International Conference on, pp. 1-7. IEEE, 2016.
Zhou, Xiangyun, Yan Zhang, and Lingyang Song. Physical layer security in wireless communications. Crc Press, 2016.
Liyanage, Madhusanka, Ahmed Bux Abro, Mika Ylianttila, and Andrei Gurtov. “Opportunities and challenges of software-defined mobile networks in network security.” IEEE Security & Privacy 14, no. 4 (2016): 34-44.
Shin, Seungwon, Lei Xu, Sungmin Hong, and Guofei Gu. “Enhancing network security through software defined networking (SDN).” In Computer Communication and Networks (ICCCN), 2016 25th International Conference on, pp. 1-9. IEEE, 2016.
He, Debiao, Sherali Zeadally, Neeraj Kumar, and Jong-Hyouk Lee. “Anonymous authentication for wireless body area networks with provable security.” IEEE Systems Journal 11, no. 4 (2017): 2590-2601.
Sarkar, Subir Kumar, T. G. Basavaraju, and C. Puttamadappa. Ad hoc mobile wireless networks: principles, protocols, and applications. CRC Press, 2016.
Mahgoub, Imad, and Mohammad Ilyas. Sensor network protocols. CRC press, 2016.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download