Discuss about the Wireless Networks for Complementary Code Checking.
As like any other wireless technology, the IEEE 802.11b standard offers a suitable wireless alternative to wired networks based on a short frequency range application. It is a simple standard that requires a minimal cost to establish. Now, physical layer characteristics (inner workings):
Another suitable alternative to wired systems where wireless communication is supported using the radio spectrum. 802.11a is characterized by the use of OFDM (orthogonal frequency division multiplexing) technique, which increases the bandwidth of transmission. Now, the physical layer:
802.11b |
802.11a |
|
Data rate |
1 to 11 Mbps |
6 to 24 Mbps |
Frequency band |
2.4 GHz |
5 GHz |
Modulation techniques |
CCK and DSSS |
BPSK and QAM |
The 802.11i
A security protocol developed to solve the problems of the original standard of 802.11 which had various authentication limitations. In general, the 802.11 standards were developed to offer security features of authentication and encryption based on the Wi-Fi protection access (WPA). However, this structure had limitation based on its unencrypted systems, an outcome that exposed WLAN. Now, in its place is the 802.11i standard which provides a second generation security standard (WPA2) having enhanced encryption in the form of AES (Advanced encryption standard). Moreover, a four-way handshake is used based on the extensible authentication protocol (EAP) (Latour, 2012).
Client getting server authentication:
If identity is verified, the client is given access to the server by the transformation of the access ports into the authorized state (electronics, 2017).
As the name suggests, this technology offers internet subscribers the ability to transmit data using personalized and private channels. These channels are established across the greater medium of the internet where security is never guaranteed. VPNs, encrypt data based on several security protocols including IPsec and GRE (generic routing encapsulation). These protocols facilitate the encryption of data frames which minimizes intrusions based on interception techniques such as snooping and eavesdropping. Moreover, they facilitate the authentication of the access medium through personalized accounts or portals which improves accountability and operation conveniences (Cisco, 2000).
Two general types of VPN exist: Site to site networks where big scale connections are established based on verified encryption standards, and Remote access where point to point access is given to users accessing LANs from remote locations.
As a multinational organization, ZeeTech is growing at a tremendous rate which has necessitated the need for system expansion. Now, Wireless Metropolitan Area Network offers a convenient solution for this business as it would facilitate the exchange of information across a wider area while meeting the conveniences of wireless transmission. Several WMAN technologies are thus considered:
It is also characterized by:
Features:
Code division multiple access (CDMA) – another multiplexing technique that is used in wireless networks to maximize the bandwidth of operation. Unlike TDMA, CDMA does not allocate the space of the radio spectrum, instead, it facilitates transmission of several signals by using a pseudo-code identification scheme. Therefore, unique codes are assigned to the individual users who use the entire radio spectrum. Now, this outcome increases the individual bandwidth of the communicating signals which is a convenient solution for modern digital systems.
Features:
Global system for mobile communications (GSM) – another wireless technology that offers both digital and cellular functionalities. GSM is identified as an open technology as its function objectives promote integration and interoperability (FLETC, 2012). Furthermore, unlike the previous two, it uses circuit switching techniques to establish network connections.
Features:
References
Cisco. (2000). Introduction to VPNs. Extending the Classic WAN, Retrieved 27 September, 2017, from: https://www.cisco.com/networkers/nw00/pres/2400.pdf.
electronics, R. (2017). IEEE 802.11i Wi-Fi Security: WEP & WPA / WPA2. Radio electronics, Retrieved 27 September, 2017, from:” https://www.radio-electronics.com/info/wireless/wi-fi/ieee-802-11i-security-wpa2-wep.php.
ETSI. (2009). Broadband Radio Access Networks (BRAN); HIPERACCESS; Packet based Convergence Layer; Part 1. ETSI TS 102 117-1, REtrieved 27 September, 2017, from: www.etsi.org/deliver/etsi_ts/102100_102199/…/01.01…/ts_10211502v010101p.pdf.
FLETC, D. . (2012). Global System for Mobile Communication Technology. Mobile Device Investigations Program, Retrieved 28 September, 2017, from: https://www.eff.org/files/filenode/global_system_for_mobile_communication_technology.pdf.
Geier, J. (2003). 802.11a Physical Layer Revealed. Wi-Fi planet, Retrieved 26 Sepember, 2017, from:www.wi-fiplanet.com/tutorials/article.php/2109881/80211a-Physical-Layer-gra.htm.
IEEE. (2016). The IEEE 802.16 Working Group on Broadband Wireless Access Standards. WirelessMAN® standards for Wireless Metropolitan Area Networks, Retrieved 26 September, 2017, from: https://www.ieee802.org/16/.
Khan, R. (2013). Comparison of IEEE 802.11a, IEEE 802.11b and IEEE 802.11g. Code project, Retrieved 27 September, 2017, from: https://www.codeproject.com/Articles/13253/Comparison-of-IEEE-a-IEEE-b-and-IEEE.
Koivisto, T. (2006). Overview of IEEE 802.11b Wireless LAN. S-72.4210 Postgraduate course in Radio Communication, Retrieved 26 September, 2017, from: https://www.comlab.hut.fi/opetus/4210/presentations/8_wlan.pdf.
Latour, L. (2012). 802.11i, Authentication and You. CISCO, Retrieved 26 September, 2017, from; https://supportforums.cisco.com/t5/wireless-mobility-blogs/802-11i-authentication-and-you/ba-p/3104143.
Omerovic, S. (n.d.). WiMax Overview. Retrieved 27 September, 2017, from: https://www.lait.fe.uni-lj.si/Seminarji/s_omerovic.pdf.
WMICH. (2015). WPAN, WLAN, WMAN. Retrieved 26 September, 2017, from; ttps://cs.wmich.edu/alfuqaha/Fall11/cs6570/lectures/Bluetooth-ZigBee.pdf.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download