1. Strengths and Weaknesses of Yagi, Horn Cellular and New Digital Antennas
The major strengths of these Yagi antennas are given below:
The major weaknesses of the Yagi antennas are given below:
The strengths of the horn antennas are given below:
The weaknesses of horn antenna are given below:
iii) Cellular Antennas: The specific kind of network, where the end link is wireless is termed as cellular antenna. Cellular network is distributed on land areas and each one of these is termed as cell, which is subsequently served by any one transceiver (Azharuddin & Jana, 2015). These cellular antennas can be used as the networks of mobile phones.
The major strengths of the cellular antenna are given below:
The weaknesses of cellular antenna are given below:
The strengths of new digital antenna are given below:
The weaknesses of this antenna are given below:
The significant dominant player of the medium as well as longer distance wireless network in future will be the new digitalized antenna. This is mainly because this antenna is very portable and could be used by any user and the installation is also very easy. The new digital antenna can be termed as cost effective with an extensible bandwidth (Ghosh et al., 2014). Due to this benefit, it can work easily in UHF and VHF bands.
2. Three Different Wireless Network Protocols with Strengths and Weaknesses
There are three specific protocols of wireless network, which are very famous, are given below:
The major strengths of the LTE are given below:
The major weaknesses of the LTE are given below:
The main security challenge in LTE is authentication. Often data is hacked by the attackers and for this issue; a ciphering algorithm is implemented in it. The second issue is insecure key of AKA (Agiwal, Roy & Saxena, 2016). Hence, an EAP AKA is implemented in the architecture.
The major strengths of Bluetooth are given below:
The main weaknesses of Bluetooth are given below:
The significant security issue is that there is no security to the data and thus is often hacked. Hence, it is often advised for not using Bluetooth to transfer any confidential data. The second issue is short distance (Rangan, Rappaport & Erkip, 2014). The range is only between 2.4GHz to 2.485GHz.
iii) WiFi: Another important protocol is wireless fidelity or WiFi. This network protocol is based on the standard of IEEE 802.11. The interoperability testing could be done easily and it could be used in smart TVs, laptops, smart phones, desktops and many others.
The main strengths of WiFi are given below:
The main weaknesses of WiFi are given below:
The major security challenge of WiFi is the lack of security of data. Thus, passwords are provided for every user and the passwords are changed periodically.
3. Reflection of Paper 1: “An Architecture for Software Defined Wireless Networking”
Software defined networking or SDN facilitates any type of network management to allow the efficient as well as effective network configuration. This helps in improving the network monitoring or performances. SDN thus addresses static architectures and finally the network intelligence can be centralized. There is disassociation in the forward procedure of data plane and this is completed from control plane (Bernardos et al., 2014). Control plane and data plane are then separated by the wired networking. Thus, SDN helps the other network operators in running the infrastructures with better efficiency or effectiveness. The newer services could be easily deployed when the virtualization characteristics are allowed.
The SDN approach is eventually applied to wireless mobile networks and hence it provides better features than wired network. Moreover, leverage is brought within these features to enhance improvements. The SDN referred architecture is proposed in this article for describing the centralized intelligence in the controller that is software-based and has the core capability for device controlling (Bernardos et al., 2014). CAPWAP protocol then centralizes wireless network management. The second SDN architecture is the SDWN that given better interfaces for control plane functionalities and hence the handling of traffic is easier. The two architectures are much effective for any wireless mobile network.
Reflection of Paper 2: “Software Defined Wireless Networks: A Survey of Issues and Solutions”
SDN architecture helps to make the wireless network more flexible and agile. The network control can be improved by allowing these service providers to respond quickly and hence changing the various requirements (Rangisetti & Tamma, 2017). The SDN controller then directs all switches to deliver the network services when there is lack of connectivity between service and device. These wireless networks consist of the inflexible network infrastructure and thus there are various challenges to handle traffic. The mobile network operators or MNOs make network control simpler and the solution deployment is fast in hardware.
The SDN makes network agile and flexible after separating the data plane and control plane. LTE mobile network is then implemented by network services. NFV or network function virtualization can handle control signal with more efficiency and the traffics could be controlled. Furthermore, NFV and SDN make the network service platforms flexible, scalable and adaptable when inflexible middle boxes are replaced (Rangisetti & Tamma, 2017). The mobile edge computing or MEC platform can bring cloud computing and IT service only by offering network solutions. Various issues such as frequency or handover with their proper solutions are described here.
References
Agiwal, M., Roy, A., & Saxena, N. (2016). Next generation 5G wireless networks: A comprehensive survey. IEEE Communications Surveys & Tutorials, 18(3), 1617-1655.
Al-Imari, M., Xiao, P., Imran, M. A., & Tafazolli, R. (2014, August). Uplink non-orthogonal multiple access for 5G wireless networks. In Wireless Communications Systems (ISWCS), 2014 11th International Symposium on (pp. 781-785). IEEE.
Azharuddin, M., & Jana, P. K. (2015). A distributed algorithm for energy efficient and fault tolerant routing in wireless sensor networks. Wireless Networks, 21(1), 251-267.
Bernardos, C. J., De La Oliva, A., Serrano, P., Banchs, A., Contreras, L. M., Jin, H., & Zúñiga, J. C. (2014). An architecture for software defined wireless networking. IEEE wireless communications, 21(3), 52-61.
ElSawy, H., Hossain, E., & Haenggi, M. (2013). Stochastic geometry for modeling, analysis, and design of multi-tier and cognitive cellular wireless networks: A survey. IEEE Communications Surveys & Tutorials, 15(3), 996-1019.
Ghosh, A., Thomas, T. A., Cudak, M. C., Ratasuk, R., Moorut, P., Vook, F. W., … & Nie, S. (2014). Millimeter-wave enhanced local area systems: A high-data-rate approach for future wireless networks. IEEE Journal on Selected Areas in Communications, 32(6), 1152-1163.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
Lu, X., Wang, P., Niyato, D., Kim, D. I., & Han, Z. (2015). Wireless networks with RF energy harvesting: A contemporary survey. IEEE Communications Surveys & Tutorials, 17(2), 757-789.
Ngai, E. C. H., & Rodhe, I. (2013). On providing location privacy for mobile sinks in wireless sensor networks. Wireless networks, 19(1), 115-130.
Rangan, S., Rappaport, T. S., & Erkip, E. (2014). Millimeter-wave cellular wireless networks: Potentials and challenges. Proceedings of the IEEE, 102(3), 366-385.
Rangisetti, A. K., & Tamma, B. R. (2017). Software Defined Wireless Networks: A Survey of Issues and Solutions. Wireless Personal Communications, 97(4), 6019-6053.
Yang, M., Li, Y., Jin, D., Zeng, L., Wu, X., & Vasilakos, A. V. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications, 20(1), 4-18.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download