The WLANs or the Wireless Local Area Networks with higher and greater speed are absolutely famous or popular in each and every sectors in the world (Bayraktaroglu et al., 2013). These particular sectors are considered to be the most beneficial sectors in the society. The most important standard for the Wireless Local Area Networks is known as the IEEE 802.11. The most important aspect present in this particular standard is that this standard helps in the specification of the MAC or medium access control and the physical layer for the Wireless Local Area Networks. In the physical layer of the Wireless Local Area Networks, the IEEE 802.11 has four distinct standards, which are known as the 802.11a, 802.11b, 802.11g and 802.11n (Vinel, 2012). The comparison and contrast between the two standards that is the 802.11a and 802.11b are as follows:
Key Features |
802.11a |
802.11b |
1. Range of Frequency |
Up to 5 GHz |
Up to 2.4 GHz |
2. Speed or Rate in Mbps |
6, 9, 12, 18, 24, 36, 48, 54 |
1, 2, 5.5, 6, 9, 11, 12, 18, 22, 24, 33, 36, 48, 54 |
3. Modulation |
BPSK or Binary Phase Shift Keying, QPSK or Quadrature Phase Shift Keying, 16 QAM or Quadrature Amplitude Modulation 64 QAM or Quadrature Amplitude Modulation (Orthogonal Frequency Division Multiplexing or OFDM) |
DPSK or Differential Phase Shift Keying, DQPSK or Differentially Quadrature Phase Shift Keying, CCK (DSSS or Direct Sequence Spread Spectrum, FH and IR) |
4. Base Rate |
Up to 6 Mbps |
Up to 1 or 2 Mbps |
5. Forward Error Correction Rate |
1/2, 2/3, ¾ |
NA |
6. Main Functions |
Provides eight PHY or physical modes and further transmits data (Naraei, Amiri & Saberi, 2014). |
Serving as an interface between the host device and the physical layer; moreover, the most important features are the CRC or Cyclic Redundancy Check and the Packer Fragmentation. |
The above given table helps to understand the basic contrast and the comparisons between the two most important standards of 802.11, the 802.11a and the 802.11b. The common feature between these two is that both the standards do their tasks in the WLAN’s physical layer.
The enhancement of the 802.11 standard is done by the 802.11i standard with the help of several new and innovative security mechanisms to be sure about the confidentiality and the integrity of the messages (Naraei, Amiri & Saberi, 2014). Additions are one of the innovative security mechanisms. The other mechanisms are the perfect substitutes of the major processes of the standard 802.11. Some other standard of IEEE is allowed by 802.11i. This particular standard is the authentication algorithm of 802.1x port. It provides a typical framework for obtaining the strong management of the keys and the mutual authentication (Vinel, 2012). The process of authentication, which begins at the first step is carried out with the help of two specific and relevant ways. The first way is by utilizing the PSK or the Pre-Shared Key whereas the second way is by following the interchange of EAP through the 802.1x port. This particular interchange of EAP is known as the EAPOL. The authentication server is required to be present when the exchange of EAP is done (De Cristofaro et al., 2013). The process of the exchange of EAP makes sure that the help of an access point should authenticate the client station or the client device. The moment the PSK or the pre shared key is completed, a brand new shared secret key is generated (Alasmary & Zhuang, 2012). This new shared key is called as the pair wise master key or PMK. Thus, it can be said that the standard of 802.11i allows a specific client device for the authentication against an authentication server by the help of the EAP exchange.
The Virtual Private Network or the VPN is an extended version of a private network, which allows all of its users for transmitting all types of information and data in any of the public networks with extreme security (Uskov, 2012). The various applications, which are run on a typical VPN, receive all of its benefits from the network’s security, functionality and management. There is not much differences between this Virtual Private Network and the several computing devices, which are connected directly. The private network is usually generated by the help of the establishment of a perfect point-to-point connection virtually by perfect connections and by several encryption in the traffic. This particular encryption traffic algorithm helps in the security of the communication and no hacker or intruder is able to intrude in the network (Uskov, 2012). The most important benefit that is provided by VPN to the point-to-point connection on a typical public network is that it absolutely acts like a WAN o a wide area network.
ZeeTech is a recognized multinational company that does import and export. They have five offices in Australia with forty employees in each of their offices. All of these five offices are attending approximately four hundred daily clients or customers regularly (Vinel, 2012). ZeeTech have thought of implementing a WMAN or Wireless Metropolitan Area Network technology in their multinational company that will connect all of their five offices and also, will be providing a mobile wireless access to their field workers because these workers have to travel in various sites.
ZeeTech has thought of implementing one Wireless Metropolitan Area Network in in their multinational company that will connect all of their five offices. There are some of the technologies of WMAN (Naraei, Amiri & Saberi, 2014). The best technology should be implemented in ZeeTech for their organization amongst every other technology. There are mainly three types of standards for WMANS. They are the HiperMAN, HiperACCESS and IEEE 802.16.
The HiperMAN or the High Performance Radio Metropolitan Area Network is the technology that provides a solution for broadband wireless for any Metropolitan Area Networks (Wang, Zhu & Gomes, 2012). HIPERMAN normally operates between the radio frequency range of 2 GHz and 11 GHz. The main advantage of this technology is that it enables flexible mesh network deployments.
The HiperACCESS or the High Performance Radio Access is the technology that provides broadband access to small and medium sized enterprises. It even provides backhaul for the mobile systems like WCDMA, GSM, CDMA2000 and GPRS (Wang, Zhu & Gomes, 2012). This particular technology was developed for providing a broadband system with but rates that ranges up to 100Mbit/sec approximately. However, the most widely deployed rate is about 25Mbit/sec. It is mainly developed for the higher frequency bands like the 40,5 to 43,5 GHz band.
The IEEE 802.16 Wireless MAN technology mostly specifies in the air interface for the particular networks. This technology also follows the connection of first mile/last mile in the WMANs (De Cristofaro et al., 2013). It mostly functions at the perfect utilization of the bandwidth between the 10 to 66 GHz and also helps in defining a MAC layer, that supports the several specifications of the physical layer.
The selection of the technology of HiperACCESS of WMAN would be the best technology for ZeeTech. The technology provides a higher speed and moreover it provides mobile communication (Bayraktaroglu et al., 2013). Moreover, it generates Backhaul. Backhaul helps in Wi-Fi connections, cellular tower connection and enterprise networks. It is extremely cost effective and can be easily afforded by Zeetecha and other organizations.
Conclusion:
Therefore, from the above discussion it can be concluded that ZeeTech is a recognized multinational company that does import and export. They have five offices in Australia with forty employees in each of their offices. All of these five offices are attending approximately four hundred daily clients or customers regularly (Vinel, 2012). ZeeTech have thought of implementing a WMAN or Wireless Metropolitan Area Network technology in their multinational company that will connect all of their five offices and also, will be providing a mobile wireless access to their field workers because these workers have to travel in various sites. They even travel across the city. ZeeTech should opt for the technology of HiperACCESS for the WMAN implementation.
The major three multiple access technologies, which are utilized with the 2G are the Time Division Multiple Access or TDMA, Code Division Multiple Access or CDMA and the Global System for Mobile Communications or GSM. The description of these topics is given below:
i) TDMA: The TDMA or Time Division Multiple Access is a process of accessing all the channels for all types of networks which are shared medium. It even enables all of its users in sharing the same channel of frequency (Ma, Leung & Li, 2014). This particular sharing is completely done by the segmentation of a specific signal into several slots of time.. This particular technology is utilized with 2G.
ii) CDMA: The Code Division Multiple Access or CDMA is the process to access the channel, similar to TDMA. However, the difference between the two is that CDMA is used by the several technologies of radio communications (Glisic & Leppänen, 2013). Several transmitters in a single channel of communication can transmit the data or the information simultaneously. For this particular reason, various users can share frequencies. This particular technology is also used with 2G.
iii) GSM: The Global System for Mobile Communication or GSM is the system of mobile of telephony, which works digitally (De Cristofaro et al., 2013). This particular communication uses the various technologies of TDMA within GSM. This is used in all over the world. This particular technology is also used with 2G.
References:
Alasmary, W., & Zhuang, W. (2012). Mobility impact in IEEE 802.11 p infrastructureless vehicular networks. Ad Hoc Networks, 10(2), 222-230.
Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R., & Thapa, B. (2013). Performance of IEEE 802.11 under jamming. Mobile Networks and Applications, 18(5), 678-696.
De Cristofaro, E., Du, H., Freudiger, J., & Norcie, G. (2013). A comparative usability study of two-factor authentication. arXiv preprint arXiv:1309.5344.
Glisic, S. G., & Leppänen, P. A. (2013). Wireless communications: TDMA versus CDMA. Springer Science & Business Media.
Ma, L., Leung, H., & Li, D. (2014). Hybrid TDMA/CDMA MAC Protocol for Wireless Sensor Networks. JNW, 9(10), 2665-2673.
Naraei, P., Amiri, I. S., & Saberi, I. (2014). Optimizing IEEE 802.11 i Resource and Security Essentials: For Mobile and Stationary Devices. Syngress.
Uskov, A. V. (2012, June). Information security of IPsec-based mobile VPN: Authentication and encryption algorithms performance. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on (pp. 1042-1048). IEEE.
Uskov, A. V. (2012, May). Information security of mobile VPN: Conceptual models and design methodology. In Electro/Information Technology (EIT), 2012 IEEE International Conference on (pp. 1-6). IEEE.
Vinel, A. (2012). 3GPP LTE versus IEEE 802.11 p/WAVE: Which technology is able to support cooperative vehicular safety applications?. IEEE Wireless Communications Letters, 1(2), 125-128.
Wang, J., Zhu, H., & Gomes, N. J. (2012). Distributed antenna systems for mobile communications in high speed trains. IEEE Journal on Selected Areas in Communications, 30(4), 675-683.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download