Now a days, in a world most of the peoples are using internet. The internet networks are mainly classified into two types. One is wired network and another one wireless networks. The wired networks are connected by LAN cable. The Wireless networks are connected by WIFI. In the wireless there no cables are connected with your device. In the wireless networks and security, Theoretical throughput development will be studied. In the theoretical throughput development, Impact of MAC overhead will be described. Impact of security overhead will be studied. Experimental method will be analyzed. In the Experimental method, comparison of wireless networks like 802.11a, 802.11b, and 802.11g will be studied. The design of wired network will be analyzed. The design of wireless network will also be described.
IEEE 802.11(WLAN) contains IEEE 802.11g, IEEE 802.11a and IEEE 802.11b.High data rates and maximum throughput can be produced by IEEE 802.11ac, IEEE 802.11ad and IEEE 802.11n with improvements in MAC and physical layers. Reduction of MAC layer overhead can be done by technologies like block acknowledgement and frame aggregation.
Overhead in multiple access system is due to facts like uncoordinated communication of user and performance losses. For classic MAC, comparison can be done by comparing performance of similar system that are coordinated totally. In control systems, the region for capacity in accurate channel has two inputs X2 and X1 is given by (Huang, 2010) (Thalore, Jha and Bhattacharya, 2018),
The above equation shows the region of capacity for feedback correlated users for a memory less accurate channel the capacity remains constant with feedback. The region for capacity is the sum rate taken over joint distribution of X2 x X1, so that input of the user is correlated arbitrarily (Jayram, and Ashoka, 2014).
The unrelated user has region for capacity which is given by,
In the data networks security for the shared data is most important. The main solution for this is IPsec VPN (Guichard, Pepelnjak and Apcar, 2014). The impact of other traffic is produced by IPsec in the domain of network resource. This can be done by OPNET software. The main OPNET tool sets are process model, package format, simulation window and project window. For displaying and capturing the result simulation window is used. Behavior of network devices can be done by process model. Project window is used to define network topology and link connectivity. Interface for network devices can be done by nodal modal. For organization of collage network diagram is used. For reducing the network traffic the selected organization is used. For the design of whole network start topology is used. At last investigations are made to analyze network performance which are affected by link performance. OPNET can be used to secure traffic flow from distant sites that are connected with the tunnels of IPsec. The important secured technology is IPsec, which provides protected access over internet with the help of coding and authentication (Hong, 2014) (Firewall and VPN Technology, 2017).
In internet data are sent in secured manner. In data transmission from starting point to end, the network of intermediate is shared, the access of data flow can be done by unwanted customer. The solution for this problem is provided by VPN (Ring, 2013) (Hong, 2014).
The simulation of two scenarios are shown below,
In the first simulation server is approached by client from three sites which are connected with the help of DS1 channel through router HQ in network configuration without the help of tunneling the VPN. In second one tunneling of VPN are changed between the router HQ and three sites. The servers DB, HTTP, and FTP server act as client in three sites (Lin and Lu, 2015).
The physical layer is connected the network with the help of LAN. The physical layer protocol for 801.11a is connected only with 802.11a. The 802.11a can’t connect with 802.11b and 802.11g. Because the password syntax for 802.11a is numbers only but both the password syntax for 802.11b and 802.11g is mixture of words and numbers. That’s why the 802.11a is not physically connected with 802.11b and 802.11g.The physical layer protocol 802.11b can be connected with 802.11b and 802.11g. But the 802.11b can’t connect with 802.11a. Because the password syntax is same for both 802.11b and 802.11g. The password syntax is different for 802.11a and 802.11b. So the physical layer is not connected between 802.11a and 802.11b. The communication between 802.11g is connected with 802.11b and 802.11g only. It can’t connect with the 802.11a. The reason for 802.11a is not connected with 802.11g is the password syntax. In the 802.11a password is only numbers. For 802.11g the password is mixture of letters and numbers. So that is the reason for 802.11a is not connected with 802.11g. The explained comparison is given in the below figure (Xiao, Shen and Du, 2011) (Gast, 2017).
The standard confirmation for 802.11a is September 99, 802.11b is also September 99 and 802.11g is May 2003. The standard confirmation is also known as publish. The Raw Data Rates for 802.11a and 802.11g is 54Mbps and raw data rate for 802.11b is 11Mbps. The raw data rate is defined as transferring data speed. But the average actual throughput for 802.11a is 4 to 5 Mbps. The average actual throughput for 802.11b is 27 Mbps and 802.11g is 20 to 25 Mbps. The average actual throughput is average internet speed. The frequency for 802.11a is 5 GHz. The frequency of 802.11b is 2.4 GHz. 802.11g frequency is 2.4 GHz. The Available spectrum for 802.11a is 300 MHz 802.11b’s available spectrum is 83.5 MHz and the Available spectrum for 802.11g is 83.5 MHz Modulation encoding for 802.11a is OFDM. For 802.11b, DSSS/CCK modulation is used. The modulation encoding for 802.11g is DSSS/PBCC. The encoding is encryption i.e. production for the data or information. The channels/non-overlapping for 802.11a is 12/8. And the channels/non-overlapping for 802.11b is 11/3. 802.11g’s channels/ non-overlapping is 11/3. The channels/overlapping for 802.11b and 802.11g both are same. The above explained comparison datum are explained in below diagram (Ganesh and Pahlavan, 2011) (hanfi , and rai, 2016) (Prasad and Zaheeruddin, 2011)
In site survey Wi-Fi signal is covered by Wituner which is done by floor plan. Wituners used to get automated green field and user guided deployment. By launching virtuoso, it makes the user to attach a photo copy to the floor plan. It enable to attach the file format which is in the form PDF or JPEG and it gets XML file that elaborate attenuation and structure values.
Wituners is used to perform deployment of WLAN. The main uses of Wituner is to catch strength of a signal from the Access point. To prove the design optimization and auditing will be done. For creating high capacity signal WLAN is planning (Randhawa and Hardy, 2011) (hanfi , and rai, 2016) (Shinde, 2009).
The above figure display the structure and arrangement for Access point for all basement in Sydney campus.
The above figure is the Wi-Fi site survey.
Structure of basement, APs and 3 dimensional blocks.
To design the wired network with three sun category networks. Engineering, Research and E –commerce customer subparts are checked (Randhawa and Hardy, 2011).
In the above diagram, object palette tree is defined with simple network design. It include logical subnet, satellite subnet and mobile subnets.
To choose the node-0 in order to set the application configuration and select creation source as object palette.
To set node 1 attributes chose model as profile configuration and creation source as object palette
In engineer departments set profile name as engineer, number of client has 50 and traffic type as all discrete.
The variables which stated earlier engineering, E-commerce, customer and research is shown in the above screenshot.
Once click the engineer sector it will move the next window for creating a LAN. The LAN is connected to pass in this window
In research departments set profile name as researcher, number of client has 50 and traffic type as all discrete
In E-commerce customer departments set profile name as E-commerce custome, number of client has 50 and traffic type as all discrete.
In the above screenshot, the server is introduced.
Now connect all the attributes engineering, research, E-commerce customer to the server by clicking the project tool war.
In the below diagram, the applications such as web, file transfer and database are connected to the Ethernet switch
In web attributes select application: supported services, a new window is shown
In the below figure, application: supported service table is shown with web browsing (heavy http 1.1) as supported.
In the below figure, application: supported service table is shown with file transfer (heavy) as supported.
In the below figure, application: supported service table is shown with database access (heavy) as supported.
Once done all the above processes,then the links are automatically generated. The below screenshot shows the Engineering deparment.
The below screenshot shows the links for Research deparment.
The below screenshot shows the links for e-commerce customer deparment.
The below screenshot shows the links for server with switch.
Once Right click the workspace then open the choose results window to set the corresponding fields.
To choose the scenario for the project and enter the duration for simulation.
To Click the run option then shows the below window
The below screenshots shows the result browser window
To select all the link connected to the server and set the traffic information in engineering department.
The below screenshot shows the traffic intensity attribute profile, which is corresponds to engineer department.
To set the traffic load for the engineer department set profile name as 1.
Now change the profile name as 3.
To click the manage scenario to run the application.
After that to execute the DES execution manager
In traffic intensity attribute profile, select profile library as local profile and profile as 3.
Now run the DES execution manager.
Now the traffic intensity attribute profile is shown with local profile as 3.
In the below screenshot shows the log viewer.
In traffic intensity attribute profile select profile library as demand profile and select profile as T3_1hr_bps
Conclusion
In the wireless networks and security, Theoretical throughput development is studied. In the theoretical throughput development, Impact of MAC overhead is described. Transfer of data is secured with the help of Virtual Private Network. Impact of security overhead is studied with the help of IPsec Virtual private network. After studying the Impact of security overhead, Experimental method is analyzed. In the Experimental method, comparison of wireless networks like 802.11a, 802.11b, and 802.11g is studied. The design of wired network is analyzed. The design of wireless network is also described. When compare to MAC overhead, IPsec has more productive. Compare to wired network, wireless local area network has more authentication, Quality of service, accessibility and high availability.
References
Firewall and VPN Technology. (2017). International Journal of Science and Research (IJSR), 6(12), pp.1762-1765.
Ganesh, R. and Pahlavan, K. (2011). Wireless network deployments. New York: Springer.
Gast, M. (2017). 802.11 wireless networks. [Place of publication not identified]: O’Reilly Media.
Guichard, J., Pepelnjak, I. and Apcar, J. (2014). MPLS and VPN architectures. Indianapolis: Cisco Press.
hanfi ,, R. and rai, Y. (2016). Wireless Sensor Network. International Journal Of Engineering And Computer Science.
hanfi ,, R. and rai, Y. (2016). Wireless Sensor Network. International Journal Of Engineering And Computer Science.
Hong, S. (2014). Issues and Security on IPSec: Survey. Journal of Digital Convergence, 12(8), pp.243-248.
Huang, G. (2010). MAC protocol adaptation in cognitive radio networks.
Jayram,, B. and Ashoka, D. (2014). MAC Layer Protocols for WSN – Comparison and Performance Improvement Strategy. International Journal of Engineering Research, 3(4), pp.217-220.
Lin, X. and Lu, R. (2015). Vehicular Ad Hoc Network Security and Privacy. Hoboken: Wiley.
Prasad, S. and Zaheeruddin (2011). A Review and Comparison of Quality of Service Routing in Wireless Ad Hoc Networks. International Journal of Wireless & Mobile Networks, 3(1), pp.172-184.
Randhawa, T. and Hardy, S. (2011). Network management in wired and wireless networks. New York: Springer.
Ring, T. (2013). IT’s megatrends: the security impact. Network Security, 2013(7), pp.5-8.
Shinde, S. (2009). Computer network. New Delhi: New Age International Ltd.
Thalore, R., Jha, M. and Bhattacharya, P. (2018). Multi-Layer MAC (ML-MAC) Protocol for WSN in Irregular Terrains. International Journal of Sensors, Wireless Communications and Control, 7(2).
Xiao, Y., Shen, X. and Du, D. (2011). Wireless network security. New York: Springer.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download