Discuss about the Wireless Network and Security for Communications Magazine.
The wireless network is the type of network that enables various devices to stay connected with the network [8]. The access points eventually intensify the signals of the wireless fidelity so that the device could be kept significantly far from the router and still lined with the network. There are numerous benefits of this wireless network like convenience, high productivity, and easy collaboration [1]. Due to these benefits, wireless networks are used in various organizations or even used by individuals. Several technologies are used in this wireless communication network.
The following report will outline a brief view on wireless network and all its technologies and applications, a detailed comparison among them. Finally, it will declare the best network out there.
The comparison among satellite communication technology, wireless fidelity, and Worldwide Interoperability for Microwave Access is as follows:
Main Factors |
Satellite communication Technology |
Wireless Fidelity (Wi-Fi) |
Worldwide Interoperability for Microwave Access |
i) Communication Spectrum |
Communication spectrum refers to the bandwidth spectrum. There are various communication spectra in several networking devices [13]. The six bands of satellite communication are Ka band, X band, Ku band, L band, C band, and S band. The respective spectra are 26 to 40 GHz, 12 to 18 GHz, 8 to 12 GHz, 4 to 8 GHz, 2 to 4 GHz and 1 to 2 GHz. The most used band amongst these is Ku band. |
The communication spectrum of Wi-Fi is separate in various locations in all over the world. There are several protocols present in the wide domain of IEEE 802.11. Each and every protocol has its respective frequency band. The frequency band for IEEE 802.11a is 5 GHz, the frequency band for IEEE 802.11b is 2.4 GHz, the frequency band for IEEE 802.11g is 2.4 GHz, the frequency band for IEEE 802.11n is 5 GHz, the frequency band for IEEE 802.11ac is 6 GHz, the frequency band for IEEE 802.11ad is up to 60 GHz, the frequency band for IEEE 802.11af is below 1 GHz and the frequency band for IEEE 802.11ah is 700 MHz. |
The communication spectrum of WiMax is different in various locations in all over the world. Two protocols are utilized. They are IEEE 802.16d and IEEE 802.16e. For IEEE 802.16d, the most utilized frequencies are 3.5 GHZ and 5.8 GHz. For IEEE 802.16e, the most utilized frequencies are 2.3 GHz, 2.5 GHz and 3.5 GHz [1]. |
ii) Modulation Techniques |
Three techniques for modulation are available- Orthogonal Quadrature Phase Shift Keying (OQPSK), Quadrature Phase Shift Keying (QPSK) and Binary Phase Shift Keying (BPSK) [3]. |
Two distinct techniques for modulation in Wi-Fi- QPSK and Complementary Coded Keying (CCK). |
Four distinct techniques for modulation in WiMax- 64 QAM or 64 Quadrature Amplitude Modulation, 16 QAM or 16 QPSK and BPSK [11]. |
iii) Medium Access Control Mechanism |
The MAC protocols of satellite technology are Frequency Division Multiple Access (FDMA) and Time Division Multiple Access (TDMA). |
The MAC of Wi-Fi is completely is based on IEEE 802.11 specifications. |
The MAC protocols of WiMax are utilized for fulfilling all the connections of point-to-multipoint orientation [6]. |
There are various types of wireless communication standards that are widely accepted by the users and also provide necessary range of balance, throughput of network and mobility to devices [9]. The enhancement of these standards is extremely important for the network. The wireless sensors that are connected by IoT are centralized for the designing of CPS. Thus, the security is extremely high with this integration.
The significant evaluations are given below:
UHF RFID and NFC: The newest form for RFID is ultra-high frequency RFID where the frequency is extremely high [12]. In the IoT, the data acquisition is checked to meet every requirement. The perception layer of the IoT needs practical requirements to be fulfilled and having the property of very low power consumption; UHF RFID is capable of doing so. The computational entities are easily combined with the physical system for cyber physical systems [5]. The RFID of ultra-high frequency is a basic form of cyber physical systems since the storage functions and controlling elements are present within it.
The Near Field Communication (NFC) is a collection of protocols that are utilized for communication and hence enabling a secured connection between the two. The restriction is that presence of smart phone is required here. The integration of NFC and IoTs mainly involve energy saving, higher security, and convenience. The medical field gets a huge benefit from this integration [3]. In case of CPS, NFC is responsible for stopping the eavesdropping and relay attacks on the computer devices.
ZigBee and Z-Wave: Personal area network is accessed with the ZigBee protocol of IEEE 802.15. The expenses are very less in comparison to others. For the IoTs, the protocol of ZigBee is integrated via ZigBee gateways [4]. It provides security and safety with proper stability to the protocol. In case of cyber physical systems, ZigBee provides highest possible level of security to the systems. Moreover, the lowest power microcontroller CC2530 is used here which ensures low power consumption.
Mesh network is present within the Z-Wave network. The radio waves that are utilized here are of extremely lower energy, which ensures low energy consumption. Z-Wave powers the IoTs [10]. The devices that provide smart lighting of the IoTs, are the type of mesh network, allowing communication even from 100 feet distance. For the CPS, Z-Wave is utilized in automated vehicles and robotics domains.
Bluetooth and Bluetooth Low Energy: Bluetooth is the easiest way to transfer any type of data. However, the data transfer is restricted to short distances [2]. This technology can be linked with all the systems for providing various easy modes of communication.
Bluetooth Low Energy or Bluetooth 4.0 is the next standard of wireless communication which is responsible for alerting the systems of house and hence the crimes get reduced [7]. In case of CPS, the Bluetooth low energy communicates amongst the master computer systems and slave microcontrollers.
After evaluating all the nine wireless networking standards for CPS and IoTs, the suitable network is UHF RFID. Having the maximum bandwidth, it is extremely effective and the range area is also high for this RFID, ranging from 300 MHZ to 3 GHz.
Conclusion
From the above discussion, it can be concluded that the above report has highlighted the best network which is the wireless network. This type of network can be set up by utilizing the radio signal frequencies. This network is extremely popular and acceptable worldwide due to its easy and simple setting up feature. Moreover, the overall expenses are reduced largely as no cables are involved in this network and thus all the problems and complexities with the wires are removed. Moreover, the computers and the systems are easily connected with the wireless networking in a cost effective way. The security of this type of network is also high and no security protections are required here.
References
[1] Burg, Andreas, Anupam Chattopadhyay, and Kwok-Yan Lam. “Wireless Communication and Security Issues for Cyber–Physical Systems and the Internet-of-Things.” Proceedings of the IEEE 106, no. 1 (2018): 38-60.
[2] Andrews, Jeffrey G., Xinchen Zhang, Gregory D. Durgin, and Abhishek K. Gupta. “Are we approaching the fundamental limits of wireless network densification?.” IEEE Communications Magazine 54, no. 10 (2016): 184-190.
[3] Dey, Kakan Chandra, Anjan Rayamajhi, Mashrur Chowdhury, Parth Bhavsar, and James Martin. “Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network–Performance evaluation.” Transportation Research Part C: Emerging Technologies 68 (2016): 168-184.
[4] Xiao, Yang, ed. Security in sensor networks. CRC Press, 2016.
[5] Pathan, Al-Sakib Khan, ed. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press, 2016.
[6] Zhou, Xiangyun, Yan Zhang, and Lingyang Song. Physical layer security in wireless communications. Crc Press, 2016.
[7] Zhao, Nan, F. Richard Yu, Ming Li, Qiao Yan, and Victor CM Leung. “Physical layer security issues in interference-alignment-based wireless networks.” IEEE Communications Magazine 54, no. 8 (2016): 162-168.
[8] Chen, Yuang, and Thomas Kunz. “Performance evaluation of IoT protocols under a constrained wireless access network.” In Selected Topics in Mobile & Wireless Networking (MoWNeT), 2016 International Conference on, pp. 1-7. IEEE, 2016.
[9] Shin, Seungwon, Lei Xu, Sungmin Hong, and Guofei Gu. “Enhancing network security through software defined networking (SDN).” In Computer Communication and Networks (ICCCN), 2016 25th International Conference on, pp. 1-9. IEEE, 2016.
[10] Liyanage, Madhusanka, Ahmed Bux Abro, Mika Ylianttila, and Andrei Gurtov. “Opportunities and challenges of software-defined mobile networks in network security.” IEEE Security & Privacy 14, no. 4 (2016): 34-44.
[11] Mahgoub, Imad, and Mohammad Ilyas. Sensor network protocols. CRC press, 2016.
[12] Sarkar, Subir Kumar, T. G. Basavaraju, and C. Puttamadappa. Ad hoc mobile wireless networks: principles, protocols, and applications. CRC Press, 2016. He, Debiao, Sherali Zeadally, Neeraj Kumar, and Jong-Hyouk Lee. “Anonymous authentication for wireless body area networks with provable security.” IEEE Systems Journal 11, no. 4 (2017): 2590-2601.
[13] He, Debiao, Sherali Zeadally, Neeraj Kumar, and Jong-Hyouk Lee. “Anonymous authentication for wireless body area networks with provable security.” IEEE Systems Journal 11, no. 4 (2017): 2590-2601.
[14] Makimoto, Mitsuo, and Sadahiko Yamashita. Microwave resonators and filters for wireless communication: theory, design and application. Vol. 4. Springer Science & Business Media, 2013.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download