Strengths and Weaknesses of Yagi, Horn and Cellular Antennas
The strengths of Yagi antenna are as follows:
The weaknesses of Yagi antenna are as follows:
The strengths of horn antenna are as follows:
The weaknesses of horn antenna are as follows:
iii) Cellular Antenna: The cellular antenna is the type of network, in which the final link is absolutely wireless. This network is then distributed over the land areas, known as cells and each of them is served by one transceiver. The transceiver has one fixed location and does not comprise of three base stations (Ghosh et al, 2014). The most popular wireless networks or cellular antennas are GSM, LTE and CDMA. Cellular antennas are majorly utilized as mobile phone networks.
The strengths of cellular antennas are as follows:
The weaknesses of cellular antennas are as follows:
The dominant player in future of medium and long distance wireless link is New Digital Antenna. This type of antenna is extremely cost effective and even the antenna bandwidth is extensible. Hence, could be utilized by everyone and it has the chance for surpassing the remaining antennas.
Three Different Wireless Network Protocols with Strengths and Weaknesses
The three different wireless network protocols that are extremely popular in today’s world are as follows:
The strengths of LTE are as follows:
The weaknesses of LTE are as follows:
There are some of the major security issues in LTE. The most significant security issue is the authentication and authorization. For this purpose, they have implemented ciphering algorithms within the architecture of the network, so that the attacks cannot decipher the sensitive data (Zou, Wang & Shen, 2013). The next issue is the insecure AKA key. For this purpose, they have implemented EAP AKA within the infrastructure.
The strengths of WiFi are as follows:
The weaknesses of WiFi are as follows:
The main security issue of WiFi is that data is often lost or stolen by attackers. For avoiding this issue, a password is provided to every user and hence when the password is changed periodically, this particular issue is resolved.
iii) Bluetooth: This is the third type of wireless networking protocol that helps to exchange data within a shorter distance. The wavelength range of this particular protocol is from 2.4 GHz to 2.485 GHz (ElSawy, Hossain & Haenggi, 2013). The physical range of Bluetooth technology ranges between 10m to 100m and speed is quite high.
The strengths of Bluetooth are as follows:
The weaknesses of Bluetooth are as follows:
The security of Bluetooth is no high and thus the attackers can easily exploit the data for wrong deeds (Shi, Beard & Mitchell, 2013). For this purpose, it is advisable to not to use this technology for any type of personal or confidential data.
Reflection of Paper 1: “An Architecture for Software Defined Wireless Networking”
SDN or software defined networking is the specific approach, which facilitates the network management for enabling efficient network configuration and improving networking monitoring and performance. This type of networking addresses the static architecture and hence network intelligence is centralized (Bernardos et al., 2014). The disassociation of forward process of the network packets or data plane is done from the process of routing or control plane. The data plane as well as control plane is separated by wired networking. Hence, with the help of SDN, the respective network operators could eventually run the infrastructures more effectively and efficiently. The fast deployment of the new services is supported after enabling the key features like virtualization.
An SDN like approach is being applied to the wireless mobile network, which does not provide similar features as the wired networks. This approach even brings leverage over the specific characteristics of the mobile deployments for pushing improvements. An SDN reference architecture is given in the article that describes that the intelligence is centralized within the software based controllers and is capable to control the devices (Bernardos et al., 2014). The protocol of CAPWAP subsequently centralizes the management of wireless network. The next architecture is SDWN, which provides proper interfaces for the functions of control plane, thus enabling flexibility to the traffic handling in user plane. Therefore, these two proposed architectures are extremely vital for the mobile network technology.
Reflection of Paper 2: “Software Defined Wireless Networks: A Survey of Issues and Solutions”
The entire architecture of SDN aims in making the wireless networks flexible as well as agile. The overall network control is improvised by simply enabling the service providers or enterprises in responding quickly to change the respective requirements. The centralized controller of SDN eventually directs the switches for delivering several network services, whenever required, even if there is no connection within device and server (Rangisetti & Tamma, 2017). The wireless networks like the mobile networks comprise of an inflexible infrastructure of network and hence often face several challenges for handling the traffic demands. Therefore, the MNO or mobile network operator simplifies the network control and management for faster deployment of solutions on the existing hardware.
SDN can easily make the network more flexible and agile by separating tasks of control plane and data plane. The mobile network service of LTE is thus deployed by the major network services. The network function virtualization or NFV helps to handle the control signal efficiently and thus the traffic demands are controlled (Rangisetti & Tamma, 2017). Moreover, the SDN and NFV offer flexible, adaptable or scalable network service platform as the replacement for the inflexible middle box. Moreover, MEC or mobile edge computing platform brings cloud computing as well as IT services to offer network solutions for the users. Some of the significant issues like handover and frequency issues are described in this article and relevant solutions are provided here.
References
Ba?tu?, E., Bennis, M., & Debbah, M. (2014). Living on the edge: The role of proactive caching in 5G wireless networks. arXiv preprint arXiv:1405.5974.
Bernardos, C. J., De La Oliva, A., Serrano, P., Banchs, A., Contreras, L. M., Jin, H., & Zúñiga, J. C. (2014). An architecture for software defined wireless networking. IEEE wireless communications, 21(3), 52-61.
Chin, W. H., Fan, Z., & Haines, R. (2014). Emerging technologies and research challenges for 5G wireless networks. IEEE Wireless Communications, 21(2), 106-112.
ElSawy, H., Hossain, E., & Haenggi, M. (2013). Stochastic geometry for modeling, analysis, and design of multi-tier and cognitive cellular wireless networks: A survey. IEEE Communications Surveys & Tutorials, 15(3), 996-1019.
Ghosh, A., Thomas, T. A., Cudak, M. C., Ratasuk, R., Moorut, P., Vook, F. W., … & Nie, S. (2014). Millimeter-wave enhanced local area systems: A high-data-rate approach for future wireless networks. IEEE Journal on Selected Areas in Communications, 32(6), 1152-1163.
Hossain, E., Rasti, M., Tabassum, H., & Abdelnasser, A. (2014). Evolution toward 5G multi-tier cellular wireless networks: An interference management perspective. IEEE Wireless Communications, 21(3), 118-127.
Li, X., Li, D., Wan, J., Vasilakos, A. V., Lai, C. F., & Wang, S. (2017). A review of industrial wireless networks in the context of industry 4.0. Wireless networks, 23(1), 23-41.
Lu, X., Wang, P., Niyato, D., Kim, D. I., & Han, Z. (2015). Wireless networks with RF energy harvesting: A contemporary survey. IEEE Communications Surveys & Tutorials, 17(2), 757-789.
Mukherjee, A., Fakoorian, S. A. A., Huang, J., & Swindlehurst, A. L. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), 1550-1573.
Rangan, S., Rappaport, T. S., & Erkip, E. (2014). Millimeter-wave cellular wireless networks: Potentials and challenges. Proceedings of the IEEE, 102(3), 366-385.
Rangisetti, A. K., & Tamma, B. R. (2017). Software Defined Wireless Networks: A Survey of Issues and Solutions. Wireless Personal Communications, 97(4), 6019-6053.
Sarkar, S. K., Basavaraju, T. G., & Puttamadappa, C. (2016). Ad hoc mobile wireless networks: principles, protocols, and applications. CRC Press.
Shi, Z., Beard, C., & Mitchell, K. (2013). Analytical models for understanding space, backoff, and flow correlation in CSMA wireless networks. Wireless networks, 19(3), 393-409.
Zou, Y., Wang, X., & Shen, W. (2013). Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE Journal on Selected Areas in Communications, 31(10), 2099-2111.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download