1.
i) Yagi Antennas: Yagi antenna is a bidirectional antenna that is composed of parallel elements within one specific line or even the half wave dipole. This type of dipole is composed of metal rod (Lei et al., 2013). Yagi uda antenna is eventually linked with transmitter and thus it is being utilized as the high gain antenna over the ultra high frequency band or UHF band, very high frequency band or VHF band and high frequency band or HF band.
Several benefits of Yagi uda antenna are:
a) Cheaper: Yagi uda antenna is cheaper and cost effective and hence using this specific antenna is better.
b) Wide Bandwidth: Another advantage of Yagi uda antenna is that the bandwidth of this antenna is wide and broad. This is majorly because of several folded dipoles (Kumar, Sivalingam & Kumar, 2013).
Several disadvantages of the Yagi uda antenna are:
a) Frequency Sensitivity: Yagi uda antenna comprises of frequency sensitivity. The entire design of Yagi uda antenna is obstructive in nature and hence is often avoided by various users.
b) Lack of Higher Gain: Another important disadvantage of the Yagi uda antenna is that it does not have ability for providing higher gain to the users (Zhao et al., 2016). The highest limit of this gain is only till 7 dB.
ii) Horn Antennas: This type of antenna is composed of flaring metallic waveguides and the shape of this antenna is of a horn. When the radio waves are directed to one single beam, these antennas are active. The horn antennas are majorly utilized at ultra high frequencies and microwave frequencies (Rao, Jana & Banka, 2017). The bandwidth range of this type of antenna is between 0.8 GHz to 18 GHz.
Several benefits of horn antenna are:
a) Simple Architecture: The entire architecture of the horn antenna is much simpler than any other popular antennas.
b) Adequate Directivity: Adequate and sufficient directivity is obtained from horn antenna.
Several disadvantages of horn antenna are:
a) Large Length: As the total gain of horn antenna is restricted to only 20 dB and when this gain increments, the entire length of the horn antenna will be increasing (Ali-Ahmad et al., 2013).
b) Lack of Directive Beams: Since the horn antenna can radiate the energy in a shape of the sphere, there is lack of directive or even sharp beam.
iii) Cellular Antenna: The third type of network is the cellular antenna. This specific wireless network is eventually distributed in the land areas. All the wireless networks on the land are called cells. These cells are thus served by the transceivers. It is utilized as mobile phone networks (Deng, Zhou & Haenggi, 2015).
Several benefits of cellular antenna are:
a) Data as well as Voice Service: Cellular networks provide both data as well as voice services.
b) Easy Maintenance and Up Gradation: This type of cellular antenna could be easily or simply maintained as well as upgraded (Shi et al., 2014).
Several disadvantages of cellular antenna are:
a) Extremely Expensive: Cellular network provides high speed and hence is quite expensive.
b) Restricted Data Amount: The amount of data is restricted and hence is often not used by all users.
The particular dominant player for long distance wireless networks is cellular antennas (Zappone & Jorswieck, 2015). It is highly portable and hence could be utilized by all users. The installation of this antenna is also easier.
2.
Three Different Wireless Network Protocols with Strengths and Weaknesses
The three different wireless network protocols with their various advantages and disadvantages are as follows:
i) Bluetooth: The first wireless protocol is the Bluetooth connectivity. The data transmission is done within an extremely short distance (Lei et al., 2013). The wavelength range is within 2.4 to 2.485 GHz.
Several benefits of Bluetooth technology are:
a) Better Speed: The total speed of this technology is extremely high and thus this protocol is quite popular.
b) Cost Effective: Bluetooth technology is cost effective and does not incur huge cost.
Several disadvantages of Bluetooth technology are:
a) Low Security: The overall security of the confidential data or information is extremely low (Kumar, Sivalingam & Kumar, 2013).
b) Low Bandwidth Range: The bandwidth range of the Bluetooth technology is extremely low.
The basic security challenge of Bluetooth technology is that there is absolutely no security to data. Often the hackers get a chance to hack the data easily.
ii) Wi-Fi: The next important wireless protocol is the Wi-Fi or simply wireless fidelity. The standards of the IEEE 802.11 are executed on the basis of this protocol (Zhao et al., 2016). Wi-Fi network protocol is used in the schools, colleges as well as offices.
Several benefits of Wi-Fi are:
a) Extremely Fast: Wi-Fi is extremely fast and thus data transmission is easier.
b) Lower Cost: This network protocol does not incur huge costs and is utilized by all.
Several disadvantages of Wi-Fi are:
a) Lack of Security: There is absolutely no security to the data that is being transferred (Rao, Jana & Banka, 2017).
b) Needs Extra Hardware: There is a constant requirement of extra hardware for implementing Wi-Fi.
There is only one important security issue in Wi-Fi and that is that there is no security to the data to be transferred. Hence, the solution is using passwords.
iii) LTE: LTE or Long Term Evolution is the third specific protocol that provides high speed. This network is wireless and is utilized for the mobile devices. The terminals of data are on the basis of GSM and EDGE technologies.
Several benefits of LTE are:
a) Lower Consumption of Time: The total time consumption is very less and thus LTE is the most popular wireless network protocol (Ali-Ahmad et al., 2013).
b) Data Transmission Rate: The rate of data transmission is extremely higher for the protocol.
Several disadvantages of LTE are:
a) Costly: LTE network protocol is extremely costly as the speed is huge.
b) Complicated Architecture: The LTE architecture is much complicated than any other protocols.
The lack of authorization as well as authentication is the only important security challenge of long term evolution (Deng, Zhou & Haenggi, 2015). However, encryption helps in this case.
3.
Software defined wireless networking helps in the effective and efficient configuration of networks. The network performance and monitoring and easily improvised by this type of networking. Software defined networking helps in addressing the static architecture (Bernardos et al., 2014). Moreover the centralized network intelligence is possible by this type of networking. The deployment of new services is much easier only when the several virtualization aspects are being enabled. Due to the centralization of the network intelligence, the disconnection or disassociation of the data plane from the control plane eventually occurs. This is termed as the forward process of this data plane.
Two specific types of architectures are being discussed in the article. The first and the foremost architecture is SDN referral architecture. In this particular architecture, the centralized intelligence is based on software and thus it allows controlling the devices. The network management is centralized with the help of CAPWAP protocols (Bernardos et al., 2014). The next SDN architecture is the SDWN architecture. A better interface is provided to make the functions of control plane work. Network traffic handling is extremely easier with this architecture.
The entire architecture of SDN is responsible for making this network extremely agile or flexible. It could easily control the network by enabling and allowing the service providers for the response of the network with much efficiency (Rangisetti & Tamma, 2017). The requirements are also changed and the controller of SDN directs the switches for the successful delivery of networking services. These networking services are delivered only when the service or the device are not connected. Several issues are present for handling the network traffic and MNO or mobile network operator makes this network even simpler.
After the disassociation of control and data plane, the mobile network of LTE gets implemented by the networking services. The network function virtualization or NFVs handle the control signals with better efficiency (Rangisetti & Tamma, 2017). Apart from this feature, NFV makes the network platforms more adaptable and flexible by removing the pre existing middle boxes. The few issues with the significant solutions are provided within the article.
References
Ali-Ahmad, H., Cicconetti, C., De la Oliva, A., Mancuso, V., Sama, M. R., Seite, P., & Shanmugalingam, S. (2013, November). An SDN-based network architecture for extremely dense wireless networks. In Future Networks and Services (SDN4FNS), 2013 IEEE SDN for (pp. 1-7). IEEE.
Bernardos, C. J., De La Oliva, A., Serrano, P., Banchs, A., Contreras, L. M., Jin, H., & Zúñiga, J. C. (2014). An architecture for software defined wireless networking. IEEE wireless communications, 21(3), 52-61.
Deng, N., Zhou, W., & Haenggi, M. (2015). The Ginibre Point Process as a Model for Wireless Networks With Repulsion. IEEE Trans. Wireless Communications, 14(1), 107-121.
Kumar, A. K., Sivalingam, K. M., & Kumar, A. (2013). On reducing delay in mobile data collection based wireless sensor networks. Wireless networks, 19(3), 285-299.
Lei, L., Zhong, Z., Zheng, K., Chen, J., & Meng, H. (2013). Challenges on wireless heterogeneous networks for mobile cloud computing. IEEE Wireless Communications, 20(3), 34-44.
Rangisetti, A. K., & Tamma, B. R. (2017). Software Defined Wireless Networks: A Survey of Issues and Solutions. Wireless Personal Communications, 97(4), 6019-6053.
Rao, P. S., Jana, P. K., & Banka, H. (2017). A particle swarm optimization based energy efficient cluster head selection algorithm for wireless sensor networks. Wireless networks, 23(7), 2005-2020.
Shi, H., Prasad, R. V., Onur, E., & Niemegeers, I. G. M. M. (2014). Fairness in wireless networks: Issues, measures and challenges. IEEE Communications Surveys & Tutorials, 16(1), 5-24.
Zappone, A., & Jorswieck, E. (2015). Energy efficiency in wireless networks via fractional programming theory. Foundations and Trends® in Communications and Information Theory, 11(3-4), 185-396.
Zhao, N., Yu, F. R., Li, M., Yan, Q., & Leung, V. C. (2016). Physical layer security issues in interference-alignment-based wireless networks. IEEE Communications Magazine, 54(8), 162-168.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download