Wireless Communication Network Protocols and Security

Verified

Added on  2021/04/17

|26
|7309
|66
AI Summary
The provided assignment is a compilation of research papers and studies on wireless communication network protocols and security. It covers a wide range of topics, including MAC layer issues in machine-to-machine communications, physical layer security in 5G networks, and the design of management solutions for wireless mesh networks. The document also explores the use of IEEE 802.11 standards in robotic systems and the application of physical layer informed adaptive video streaming over LTE. Additionally, it discusses safeguarding 5G wireless communication networks using physical layer security and provides an analysis model of IEEE 802.11p with difference services.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11
STANDARDS
A Detailed Comparison of current and future IEEE 802.11
Standards
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
Executive Summary
The report is prepared for presentation of a detailed comparison of the IEEE 802.11 standards for
its application in the current and future needs of the network. The IEEE 802.11 are air interface
standards that is used for connecting the wireless interfaces and communicating with each other.
There are different network technologies that are based on wired solution, but with the
deployment of the 802.11 standards the wireless LAN technologies have improved and it have
increased the scope to provide unlimited broadband access. The paper discusses on different
IEEE 802.11 standards and the encryption techniques followed for securing the wireless
networks. The security risk of the wireless network and the vulnerability are analyzed and
discussed in the report. There are several benefits of the wireless technology such as less
complexity in installation and elimination of the cabling cost and access of the network from the
mobile devices. There are several challenges of the wireless technology and this paper discussed
about the different IEEE 802.11 standards and the protocols used for the configuration of a
wireless network.
Document Page
2
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
Table of Contents
Introduction..........................................................................................................................3
Standardization in IEEE 802...............................................................................................4
IEEE Standard Association..............................................................................................4
IEEE 802: LAN MAN standard committee.....................................................................5
Physical Layer:..............................................................................................................10
Medium Access Control Layer:.....................................................................................11
Development of IEEE 802.11:...........................................................................................12
Authentication and Encryption in 802.11:.........................................................................12
Other Standards:................................................................................................................13
Conclusion.........................................................................................................................18
References..........................................................................................................................20
Document Page
3
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
Introduction
There has been a convergence of the networks of communication and technologies and it
is used for the development of the data communications for application in different fields of the
telecommunication environment. The technology is not dependent on the application in different
telecommunication networks, there are different communication standards that should be
followed for establishment of connection between the nodes installed in a telecommunication
framework. The telecommunication standards are followed internationally and the specification
of the standards are set by the IETF Internet Task Engineering Force (Xie et al. 2015). The
communication devices has increased and the use of mobile handheld devices has also increased
in the recent times. Thus with the increase in the mobile users new connection technology is
required to be deployed. IEEE 802.11 standard finds its application in the WLAN, Wifi,
WiMAX, 3G, 4G, etc. It is used for supporting the growth of the wireless networks and state the
communication methodology (Fay et al. 2016). The wireless technology is growing and a
comparison is made on the different IEEE standards for finding its application in different
wireless networks. The comparison is made based on the area of coverage, bandwidth,
interference and quality of the signals.
The main focus of the study is made on the WLA technology and different literatures are
reviewed for analyzing the access points and modes used for communication. A centralized
communication mode is followed for establishment of the wireless connection between the nodes
installed in the network. A study is also made on the decentralized communication modes and
communicate directly with the access points installed in different location of the network. IEEE
802.11 standards are reviewed in the context of extension point and the features available on the
IEEE 802.11 standards. There are some upcoming standards for the development of the IEEE
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
802.11 i.e. HiperLAN. The different layers of the network such as the physical layer, access
layer and the network layer are used for the transmission of the data packets in the network.
Radio medium are used for the transmission and for the development of the IEEE 802.11 the
targeted and the available standards are analyzed. The extension of the 802.11 are evaluated and
the data rate that should be maintained in the network are analyzed. The base standards of the
802.11 provides a data rate of 2Mbps and it can reach to 11 Mbps with the implementation of the
802.11b standards.
Standardization in IEEE 802
IEEE Standard Association
The IEEE is used for the development of nonprofit transitional methodology that are
supported by different technical activities that includes active program of standardization using
the IEEE standard association. The IEEE is a nonprofit translational technical professional
organization and it supports different technical activities such as an active standardization
program (Trappe 2015). It can be openly developed and it have been proved that the participation
of the voluntary participants can help in producing high quality accepted result that can be used
for the development of the IEEE 802.11 standards. IEE 802.11 have a parameter that is the
fragmentation threshold which defines the method of transmission also known as the
fragmentation burst. The Mac protocol data unit which is larger than the threshold is divided into
smaller elements and each of the elements are transmitted in the wireless network at a regular
interval of time. This procedure saves the cost and time wireless network by retransmitting the
smaller elements where error is found instead of resending the whole MSDU unit (Lyamin et al.
2014). There is a requirement of implementation of the QoS in the wireless LAN and the
Document Page
5
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
following four parameters should be considered for maintaining the quality of the network such
as:
- Bandwidth /Throughput
- Latency / Delay
- Jitter, and
- Error or data loss
The environment of the WLAN is dependent on inference and it can cause high errors
and it should be eliminated for getting the best performance of the wireless network. The
confidentiality of the network should be maintained and data should not be access by any third
party and it should reach to the user as the same fort when it was sent by the sender over the
network.
IEEE 802: LAN MAN standard committee
The 802 standards works on the Open Systems Interconnection OSI layer. The radio
waves was first used for the transferring of data packets over short distance and it is different
from the wired medium used for transmission of the data packets. Attenuation occurs in the
signals of the radio waves and thus it is difficult to find the collision between the data packets
(Zheng and Li 2015). The 802.11 standards was developed following the home and the office
networks and it was introduced in the year 1999. The primary standard of 802.11 can provide a
data rate of 2 mbps for each of the access points installed in the network the data rate can be
increased to 11 mbps with the implementation of the 802.11b standard in the network. There are
new IEEE extensions such as IEEE 802.11g and IEEE 802.11a that can be applied for
connecting the wireless local area network. The WLAN devices selected for the transmission of
the data should fulfill the security mechanism and it should also have the QoS support for
Document Page
6
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
handling the security threats that can affect the network (Ma et al. 2015). There are certain
limitations of the IEEE 802.11 and it should be improved for meeting the security framework
and different features must be enabled for allowing seamless transmission between the nodes
installed in the network. Different bands are used for transmission such as the 2.4 GHZ and 5
GHz bands for reducing the inference and improve the quality of the network.
The physical layer of the network consists of the Infrared (IR) spectrum, Direct Sequence
Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS). Different physical
PHY layer are utilized by the IEEE 802.11 standards based on the multiplexing and increasing
the throughput of the network (Yang et al. 2015). The modulation techniques followed for IEEE
802.11 are tabulated below:
Data rate Coding rate Modulation Code bits/
OFDM
symbol
Code bits/
sub carrier
Data bits/
OFDM
symbols
6 1/2 BPSK 48 1 24
9 3/4 BPSK 48 1 36
12 1/2 QPSK 96 2 48
18 3/4 QPSK 96 2 72
24 1/2 16-QAM 192 4 96
36 3/4 16-QAM 192 4 144
48 2/3 64-QAM 288 6 192
54 3/4 64-QAM 288 6 216
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
The IEEE 802.11b utilizes a new PHY layer and high rate DSSS which is based on the
orthogonal Frequency Division Multiplexing and is used for increasing the overall throughput of
the access point installed in different location of the network. Most of the extension of IEEE
Conclusion works on the 2.4 Ghz frequency band and it has 14 different channels. The
availability of the channels depends on different countries (Rajandekar and Sikdar 2015). In the
year 1997 the 802.11 standard was developed for the WLANs and it supports the radio
transmission in the 2.4 Ghz frequency bands. In the year 1999, IEEE made two amendments in
the 802.11 standards i.e. the 802.11 a standard and the 802.11 b standard, which is used for
defining the transmission methodology and the WLAN equipment’s for the enterprise and the
personal usage.
The 802.11b is the most successful wireless technology and it can offer data rate of about
11 mbps. It is designed to get the maximum performance from the network with more security
and throughput when compared with the wired network. The IEEE 802.11g was launched in the
year 2003 that offers the network utilizing the 2.4 Ghz frequency band to support a data rate of
54 mbps and most importantly it was designed such that it was compatible with the previous
802.11 standards (Qiao et al. 2015). The following table is created to demonstrate the maximum
data rate that can be achieved with the different IEEE 802.11 standards in the network, their
typical range and the frequency bands.
IEEE
Standards
Typical Range Maximum Data
Rate
Frequency
bands
Comment
802.11 50 to 100 m 2.4 GHz 2 Mbps
802.11a 50 to 100 m 5 GHz 54 Mbps It is not
compatible with
Document Page
8
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
the later 802.11b
standard
802.11b 50 to 100 m 2.4 GHz 11 Mbps It is the best
802.11 standard
for normal
wireless network
802.11g 50 to 100 m 2.4 GHz 54 Mbps It is compatible
with the IEEE
802.11b
standards.
WEP
It is a part of the IEEE 802.11 standard and was first introduced in the year 1997 for
protecting the link level data while transmitting the data wirelessly. It was the first protocol
based on cryptography for protecting the wireless access point from unauthorized access and
keep the network secure. The WEP utilizes the shared key authentication mechanism for
encrypting the wireless signals and securing the wireless communications. It have the support of
40 bit key and with the application of extension it can support for 128bit and even 256 bit
encryption (Farooq and Kunz 2015). It protects the network from Eavesdropping with the
application of the linear hash function for integration of the data. There are no key management
present in WEP and there are also some weakness that requires the WEP replaced by the WPA
encryption technique.
WPA
Document Page
9
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
There are two security protocol WPA and WPA2 developed by the Wi Fi alliance, one
was designed for mitigation of the problem faced in the WEP while the later WPA 2 was
designed for the enterprise and the personal usage. For the personal mode of 802.11 a pre shared
key is used for authentication and for the enterprise mode the IEEE 802.1X is applied for getting
an optimum result. There are different encryption algorithm applied for securing the wireless
network, among them the WPA and the WPA2 was developed for overcoming the shortcomings
of the WEP ad reducing the complexity of the network (Ma et al. 2015). The WPA 2 can be
easily deployed and meets the 802.11i specification for addressing the weakness of WEP. The
TKIP algorithm is used by the WPA and it works by providing each of the client with a unique
key and an encrypted message is used for checking the integrity and with the fields in the
packets. It is specially designed such that the attackers cannot capture the data packets sent over
the wireless network and preventing the spoofing and denial of service attacks (Shokri-
Ghadikolaei et al. 2015). There are four different key factors for the WPA2 authentication such
as:
- Mutual authentication
- Ease to Use
- Interoperability, and
- Strong Encryption
WPA2 have several advantages because it can be used for the management of the keys
and detection of the replays. The main aspect of the wireless network are the security and the
confidentiality of the users must be maintained while sending and receiving the information over
the network (Trivedi 2016). There are different types of attacks that can compromise the security
of the network such as spoofing, man in the middle attack, session hijacking, etc. With the
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
application of the IEEE a secure wireless network can be created and the data transmission speed
similar to the wired network can be achieved (Ye 2017). It can be used for effectiveness of the
mechanism and analysis of the performance of the network.
With the implementation of the IEEE the wireless network can be secured because there
are several features in the IEEE such as filtering of the Media control access address and
disabling of the SSID. The vulnerability of the network can be reduced with the evolution of the
computer hardware and software technology but some of the wireless network still needs to
address the security problems for making it more secure. The Wi Max have some drawbacks
such as mutual authentication which makes it susceptible to spoofing and relay attacks.
Physical Layer:
In order to enhance the average throughput of the network, various Physical Layers are
used in the 802.11 standard. The physical layers that are used in the network are such as
Frequency Hopping Spread Spectrum or FHSS, Direct Sequence Spread Spectrum or DSSS and
infrared or IR. The 802.11b utilizes an additional physical layer along with the mentioned layers
named as High Rate DSSS. On the basis of the (Orthogonal Frequency Division Multiplexing,
the 802.11g and 802.11a are invented (Palattella et al. 2016). This mechanism is very assisting in
increasing the entire throughput of the access point. The OFDM mechanism is used along with
the MIMO or Multi Input Multi Output methodology. Most of the extension of the 802.11
operates in the 2.4 GHz spectrum band with fourteen distinct channels. The capability of these
channels are different in different countries. The last feature that was included in the 802.11j was
the last channel of the fourteen channels mentioned above. This channel was developed
especially for Japan (Khorov et al. 2015).
Document Page
11
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
The extension of IEEE 802.11a functions with channels ranging from thirty-five to one
hundred and sixty one on the basis of frequency band. This standard works with only the 5 GHz
frequency. In U.S.A. and Europe there are twelve and nineteen non-overlapping channels
respectively. However, in terms of 802.11b there are only three out of fourteen non-overlapping
channels (Abdelrahman, Mustafa and Osman 2015). The bandwidth is high in case of 802.11n as
it work in the overlapping channels with 20 and 40 MHz bandwidth. The directional antennas
may be utilized for establishing the peer to peer WLAN links. The omnidirectional antennas that
are used in the distinctive WLAN access are ranged thirty-fifty and hundred meter in case of
indoor and outdoor respectively. The range can be highly affected by the obstacles placed within
the access point and station (Palattella et al. 2016). In comparison to 802.11b and 802.11g, the
802.11a is affected by the increase in the range. This is because the 802.11a operates in the
5MHz frequency range. The sectored antennas are capable of increasing the average data rate of
WLAN by two to three times.
Medium Access Control Layer:
The scheme named as the Distributed Coordinated Function or DCF is used by the IEEE
802.11 which is based on contention. Within this method, the station in connection with the
access point is responsible for scanning the interface of air regarding identifying the availability
of channel. If the interface is found to be idle then the station transmits its information to the
designated destination via access point. The collision occurs while more than a single station is
trying to access the access point or the air interface is busy (Freudiger 2015). The IEEE 802.11
CSMA/CA or Carrier Sense Multiple Access/Collision Avoidance for avoiding the collisions.
Another MAC method is utilized by IEEE 802.11 named as Point Coordination Function. This
methodology is consisted with two sections. Round Robin mechanism is used by the access
Document Page
12
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
points to scan the stations. This scanning is done to identify if any station has any packet to send.
If the polling of the stations is not done in the stations during the present period then in the next
polling period the station will be queued for polling (Liu et al. 2016). The scheme based on
contention is used for scanning process and it is similar to DCF. Furthermore, because of the
polling mechanism within the PCF, the reduction in the throughput of the 802.11 network
occurs. In 802.11 standard, the DCF is used as the default MAC mechanism. While PCF is
associated with the Wi-Fi alliance standard at the time of using both the MAC mechanisms in the
standard, the DCF has become less popular.
Development of IEEE 802.11:
The main target of the IEEE 802.11 are MAC or medium access control and PHY or
Physical Layer. At the beginning of the forming the wireless network available physical layer
standard was considered. The first standard which was taken for Wireless Network was the most
prominent standard of IEEE, 802.3 (Kasparick et al. 2015). Because of the using a standard that
is similar to wired connection standard, the radio waves were not working properly. There was
another problem as the no collision detection could be applied to 802.3 carrier sense multiple
access. This happened because the over a short distance the attenuation could be detected.
After that 802.4 was considered to develop the wireless network. The Token Bus concept
was formed by the new wireless standard and it was believed that this token bus concept was
superior to the connection based scheme of 802.3 (Bray 2017). The Wireless Local Area
Network was began as the 802.4L. In 1990, it was revealed that the managing the radio network
through token handling was very difficult. On 21st March of 1991, the 802.11 standard was
approved.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
Authentication and Encryption in 802.11:
The Medium Access Layer manages the security. Various encryption methodologies has
been implemented in the 802.11 standard for preventing the unauthorized access from the
stations. The WEP or Wired Equivalent Piracy is one of the foremost encryption mechanisms.
The WPA or Wi-Fi protection Access was developed by the Wi-Fi alliance in order to reduce the
security vulnerabilities was present in the WPA encryption mechanism (Festag 2015). An
advance version of Wi-Fi protection has been used in the IEEE 802.11i standard. The
authentication issues associated with shared key and open standard authentication has been
addressed in the 802.11i standard. The authentication mechanism that is being currently used in
the 802.11 family was introduced in the 802.11X (Nitsche et al. 2014). A diameter or RADIUS
server is used for authenticating the identities of the users. The 802.11 standard is being currently
used has defined a term “frame” for managing and controlling the wireless links. The Protected
Management Frames were developed by the TGw by inventing the 802.11w standard (Centenaro
et al. 2016). The organization is still working on the MAC layer of the IEEE 802.11. It has been
discovered that the security of the Wireless Network can be enhanced by improving the data
confidentiality of the management frames. These extensions is capable of interacting with the
IEEE 802.11r as well as IEEE 802.11u.
Other Standards:
IEEE 802.11c: This standard is responsible for covering the bridge operation. In general,
the bridge is referred to as a device that is linking to LANs with an identical or alike MAC
protocol. The functions similar to IP or internet protocol level router functions are performed by
the bridge. However, this functions are carried out in the MAC layer of the network (Bellalta et
Document Page
14
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
al. 2016). The bridge is considered to be easy to manage and configure in comparison to internet
protocol routers.
IEEE 802.11d: The 802.11d was created in the 2001. The additional regulatory domain
is supported by this amendment to the 802.11 standard specification. In this standard the
differences in the regulatory in different countries are covered (Lyamin et al. 2014). Through this
standard the operation parameters has been defined for the frequency band of 5 MHz, but it was
being done only for Japan, North America and Europe. The support provided by this standard is
also consisted with country data element to beacons, probe needs as well as to probe reactions
(Kolias et al. 2016). Various regulations are enforced at the various countries of the world. In
order to simplify the impact of the regulations on the access points and user devices. The country
information is also assisting in conforming to operate at the frequency of 5MHz.
IEEE 802.11e: The 802.11e standard was first used in the year 2005. This standard is a
crucial addition to the 802.11 standard which offers a collection of QoS advancements for the
wireless Local Area Network applications via updating to the MAC or Medium Access Control
layer. As it has been mentioned before, this standard has an impact on the communication of
polled and time-scheduled communication at the time of null periods (Al-Sultan et al. 2014).
During null periods, no data moves through the system. The robustness of the channel and the
efficiency of the polling is enhanced by the IEEE 802.11e standard. The enhanced robustness
and efficiency is proved to be crucial for the services like video streaming and IP telephony.
IEEE 802.11f: This is also considered as the optional extension to the IEEE 802.11
standard. The inter access point protocol or 802.11f is used in the environment where support is
needed to be provided among the multivendor system. Through this standard, the access points is
also capable of functioning as a bridge (Vladyko et al. 2016). This provides the medium of
Document Page
15
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
communication among the Wireless LAN stations within a specific region. The bridge that is
connecting two LANs on a different types of the network is possible through this standard. The
different networks are WMAN, LAN and Ethernet.
IEEE 802.11h: Along with the 802.11a signals 5GHz frequency is also used by the
European Union Military with the purpose of radar and satellite communication. In order to
handle the communication properly two methodologies has been introduced. These standards are
DFS or Dynamic Frequency Selection and TCP or Transmit Power Control (Tian and Xu 2017).
As per the DFS scheme, the networks that are functioning in the same frequency band is detected
by the access point in order to prevent collision. Furthermore, the TPC can be utilized to update
the condition of the link through switching the frequency in which access point is working to a
further suitable channel. The only condition is that the later channel has to be clearer and must be
able to reduce the consumption of the power.
IEEE 802.11i: Those point of the IEEE 802. 11i standard might have been will deliver
security issues. The security Furthermore Confirmation instruments at those Macintosh layer
were characterized in this standard. It tended to the security deficiencies in the wired
proportional security (WEP) calculation initially intended for the Macintosh layer about 802. 11
(Ghandour et al. 2014). Wired equal security (WEP) might have been indicated to bring security
vulnerabilities. Wi-Fi ensured get (WPA) might have been acquainted Toward the Wi-Fi
collusion as a middle of the road answer for those WEP insecurities. The Wi-Fi union alludes on
their interoperable usage of the full 802. 11i Likewise WPA2, Additionally called RSN (Robust
security Network). Those 802. 11i standard makes utilization of the propelled encryption
standard (AES) piece cipher as opposed on WEP Also WPA which utilize the RC4 stream
cipher.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
IEEE 802.11j: In 2004, this standard was introduced to the world of networking. This
standard was specially developed for the Japanese market. This is capable of providing the
WLAN operations form the frequency range of 4.9 to 5 GHz (Raeesi et al. 2014). This capability
of working within these specific frequency has been done to cope with the Japanese protocols for
outdoor, mobile and indoor communication.
IEEE 802.11k: In the IEEE 802.11k standard, the various enhancements has been
defined for providing methodologies that are available to protocols layers over the PHY layers.
This standard was developed with the purpose of enhancing the radio resource management
(Rethfeldt et al. 2015). The management of the air interface among various access points has
been enabled in this protocol.
IEEE 802.11l: The standard is not used and it is reserved. This standard is avoided in
the particle world to prevent confusion with a well-known standard called 802.11i.
IEEE 802.11m: A continuous undertaking bunch might have been set in control for the
support of the standard. The revisions and in addition clarifications Also adjustments need aid
transformed occasionally. IEEE 802. 11m will be a continuous activity that gives a bound
together perspective of the 802. 11 base measures through constant monitoring, administration
and support. IEEE 802. 11m is dependent upon two archived activities (Giust, Cominardi and
Bernardos 2015). They would IEEE 802. 11ma Furthermore IEEE 802. 11mb.
IEEE 802.11n: At last designed in 2009, the purpose of the IEEE 802.11n is for
accessing the throughput of MAC or Medium Access Control band from the predecessor
standards. First considered in 2002, the IEEE 802.11n standard development has been accepted
as the source of assorted improvements to the center and Medium Access Control layers for
Document Page
17
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
advancement ion the throughput of the band. These advancements includes such entities as alters
for schemes of proper encoding, antennas hat are miscellaneous, antennas that are acute, and
alterations to protocols of MAC. IEEE 802.11n includes new mechanisms of MAC layer for
accessing the throughput (Liang et al. 2015). The admitted utilizations of MIMO and mixed
fresh emphasis and coding methodologies for accessing the summary amounts. The standard
utilizes a fastened technique bandwidth that is 20MHz. This is beneficial for prior attraction with
prior standards. IEEE 802.11n is also capable of working on a substitute channel with frequency
of 40MHz.
IEEE 802.11o: In the present world, there are many stores full of draft 802.11n and the
estimation had shown that out of the total buyers of these products, 94% of them are from small
business enterprises and consumers who are unknown to the standards issues. Majority of the
corporate or enterprise users are not using these drafts products (Corrado 2016). The possibility
of the products is not compliant with the final standards of the process. The incomplete
technology would result in causing the potential headaches to the users. The technical writers
have to promote the 802.11n heavily for the trade journals although AIR802 in USA has polled
to have 98% of people no interest in 802.11n. After the rating of the standard and the proving of
the technology and products, the other countries and USA have started to take interest in the
technology (Cam-Winget, Popa and Hui 2017). The AIR802’s majority of customers are
working as government agents, computer network companies, and the value added resellers. The
consumers and distributors and the various companies that specializes in installing wireless
products for both small working environment and residential are also a part of AIR802 (Bedogni
et al. 2014). Most of the buyers of AIR802 have taken caution for adopting the 802.11n as a
standard for their working sphere.
Document Page
18
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
The most crucial concern for the development of the network connection among the users
for any of the small and medium enterprise and residential operation is helpful for listing the
desired operation for the integration. The lack of the desired signal coverage is a major setback
for the users as it hampers the reliability of the operations. The 802.11b/g products have been
developed for these users as it would allow them for forming the high RF power output product
services (Espina et al. 2014). It is the most desirable output required for operation. The retail
stores have a RF output power of limit of 30 to 65 mW. However, with the same expense, a high
power of 250mW can be achieved. The comparison tests have yielded that the 802.11b/g routers
can provide significantly greater coverage and distance. Considering the wireless network for the
internet access and cable modem or DSL as service, the speed is less than the range of 1-6 Mbps
depending on the service provider (Bloessl et al. 2015). The typical 25 Mbps output speed can be
achieved with the help of a high range of RF that is powered with 802.11b/g router.
For users that require higher speed of data transfer for any specific application, the
802.11n can be considered. The standard of 802.11n has been set for providing better range
along with 100 Mbps or greater speed of data transmission. However, the practical
demonstration has shown that the existence of other wireless signals and the building materials
have considerable impact on the speed of data transmission (Eze, Zhang and Liu 2014). The
noises in the signal have caused the decrease of the speed of data transmission as low as 26
Mbps. If the congestion and interference is considered as major factor, 802.11a can be
considered (however, it should be considered that 802.11a is not compatible with all devices)
(Festag 2014). Hence, it can be said that most of the small businesses are better off without the
use of 802.11b/g device powered by a high RF.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
19
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
Conclusion
From the above report it can be concluded that with the analysis of the IEEE 802.11
standards the best standards can be applied in the network. The security of the wireless network
should be maintained and different protocols that can be applied on the wireless network are
evaluated for the selection of the best protocol. The deficiencies of the wireless standards are
analyzed and the advantages of the network is also highlighted in the report for providing a better
understanding on the IEEE 802.11 standards. The paper is prepared for reviewing the wireless
technology and comparing the physical standards for the implementation of the wireless lan. The
technology issues can be added with the functionality that is expected for the development of the
future application. There has been a recent advancement in the connectivity and the
communication standards such as 802.11 a, b, g, n and ac. The standards are equipped with the
features and capabilities of evolution of the conditions for operations and a study has been made
for the comparison of the different IEEE 802.11 standards and its application in different fields
of network.
Document Page
20
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
References
Abdelrahman, R.B.M., Mustafa, A.B.A. and Osman, A.A., 2015. A Comparison between IEEE
802.11 n and ac Standards.
Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H. and Zedan, H., 2014. A comprehensive survey
on vehicular ad hoc network. Journal of network and computer applications, 37, pp.380-392.
Bedogni, L., Di Felice, M., Malabocchia, F. and Bononi, L., 2014, December. Cognitive
modulation and coding scheme adaptation for 802.11 n and 802.11 af networks. In Globecom
Workshops (GC Wkshps), 2014 (pp. 717-722). IEEE.
Bellalta, B., Bononi, L., Bruno, R. and Kassler, A., 2016. Next generation IEEE 802.11 Wireless
Local Area Networks: Current status, future directions and open challenges. Computer
Communications, 75, pp.1-25.
Bloessl, B., Puschmann, A., Sommer, C. and Dressler, F., 2015. Timings matter: Standard
compliant IEEE 802.11 channel access for a fully software-based SDR architecture. ACM
SIGMOBILE Mobile Computing and Communications Review, 18(3), pp.81-90.
Bray, T., 2017. The javascript object notation (json) data interchange format.
Cam-Winget, N., Popa, D. and Hui, J., 2017. Applicability Statement for the Routing Protocol
for Low-Power and Lossy Networks (RPL) in Advanced Metering Infrastructure (AMI)
Networks.
Centenaro, M., Vangelista, L., Zanella, A. and Zorzi, M., 2016. Long-range communications in
unlicensed bands: The rising stars in the IoT and smart city scenarios. IEEE Wireless
Communications, 23(5), pp.60-67.
Document Page
21
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
Corrado, R., 2016. Audio/Video Transmission over IEEE 802.11 e Networks: Retry Limit
Adaptation and Distortion Estimation.
Espina, J., Falck, T., Panousopoulou, A., Schmitt, L., Mülhens, O. and Yang, G.Z., 2014.
Network topologies, communication protocols, and standards. In Body sensor networks (pp. 189-
236). Springer, London.
Eze, E.C., Zhang, S. and Liu, E., 2014, September. Vehicular ad hoc networks (VANETs):
Current state, challenges, potentials and way forward. In Automation and Computing (ICAC),
2014 20th International Conference on (pp. 176-181). IEEE.
Farooq, M.O. and Kunz, T., 2015. Contiki-Based IEEE 802.15. 4 Channel Capacity Estimation
and Suitability of Its CSMA-CA MAC Layer Protocol for Real-Time Multimedia Applications.
Mobile Information Systems, 2015.
Fay, L., Michael, L., Gómez-Barquero, D., Ammar, N. and Caldwell, M.W., 2016. An overview
of the ATSC 3.0 physical layer specification. IEEE Transactions on Broadcasting, 62(1), pp.159-
171.
Festag, A., 2014. Cooperative intelligent transport systems standards in Europe. IEEE
communications magazine, 52(12), pp.166-172.
Festag, A., 2015. Standards for vehicular communication—from IEEE 802.11 p to 5G. e & i
Elektrotechnik und Informationstechnik, 132(7), pp.409-416.
Freudiger, J., 2015, June. How talkative is your mobile device?: an experimental study of Wi-Fi
probe requests. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless
and Mobile Networks (p. 8). ACM.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
22
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
Ghandour, A.J., Di Felice, M., Artail, H. and Bononi, L., 2014. Dissemination of safety
messages in IEEE 802.11 p/WAVE vehicular network: Analytical study and protocol
enhancements. Pervasive and mobile computing, 11, pp.3-18.
Giust, F., Cominardi, L. and Bernardos, C.J., 2015. Distributed mobility management for future
5G networks: overview and analysis of existing approaches. IEEE Communications Magazine,
53(1), pp.142-149.
Kasparick, M., Schlichting, S., Golatowski, F. and Timmermann, D., 2015, August. New IEEE
11073 standards for interoperable, networked point-of-care Medical Devices. In Engineering in
Medicine and Biology Society (EMBC), 2015 37th Annual International Conference of the IEEE
(pp. 1721-1724). IEEE.
Khorov, E., Lyakhov, A., Krotov, A. and Guschin, A., 2015. A survey on IEEE 802.11 ah: An
enabling networking technology for smart cities. Computer Communications, 58, pp.53-69.
Kolias, C., Kambourakis, G., Stavrou, A. and Gritzalis, S., 2016. Intrusion detection in 802.11
networks: empirical evaluation of threats and a public dataset. IEEE Communications Surveys &
Tutorials, 18(1), pp.184-208.
Liang, W., Li, Z., Zhang, H., Wang, S. and Bie, R., 2015. Vehicular ad hoc networks:
architectures, research issues, methodologies, challenges, and trends. International Journal of
Distributed Sensor Networks, 11(8), p.745303.
Liu, D., Wang, L., Chen, Y., Elkashlan, M., Wong, K.K., Schober, R. and Hanzo, L., 2016. User
association in 5G networks: A survey and an outlook. IEEE Communications Surveys &
Tutorials, 18(2), pp.1018-1044.
Document Page
23
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
Lyamin, N., Vinel, A., Jonsson, M. and Loo, J., 2014. Real-time detection of denial-of-service
attacks in IEEE 802.11 p vehicular networks. IEEE Communications letters, 18(1), pp.110-113.
Ma, Z., Zhang, Z., Ding, Z., Fan, P. and Li, H., 2015. Key techniques for 5G wireless
communications: network architecture, physical layer, and MAC layer perspectives. Science
China information sciences, 58(4), pp.1-20.
Nitsche, T., Cordeiro, C., Flores, A.B., Knightly, E.W., Perahia, E. and Widmer, J.C., 2014.
IEEE 802.11 ad: directional 60 GHz communication for multi-Gigabit-per-second Wi-Fi. IEEE
Communications Magazine, 52(12), pp.132-141.
Palattella, M.R., Dohler, M., Grieco, A., Rizzo, G., Torsner, J., Engel, T. and Ladid, L., 2016.
Internet of things in the 5G era: Enablers, architecture, and business models. IEEE Journal on
Selected Areas in Communications, 34(3), pp.510-527.
Qiao, J., Shen, X., Mark, J.W. and He, Y., 2015. MAC-layer concurrent beamforming protocol
for indoor millimeter-wave networks. IEEE Transactions on Vehicular Technology, 64(1),
pp.327-338.
Raeesi, O., Pirskanen, J., Hazmi, A., Talvitie, J. and Valkama, M., 2014, May. Performance
enhancement and evaluation of IEEE 802.11 ah multi-access point network using restricted
access window mechanism. In Distributed Computing in Sensor Systems (DCOSS), 2014 IEEE
International Conference on (pp. 287-293). IEEE.
Rajandekar, A. and Sikdar, B., 2015. A survey of MAC layer issues and protocols for machine-
to-machine communications. IEEE Internet of Things Journal, 2(2), pp.175-186.
Document Page
24
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
Rethfeldt, M., Danielis, P., Moritz, G., Konieczek, B. and Timmermann, D., 2015, May. Design
and Development of a Management Solution for Wireless Mesh Networks based on IEEE 802.11
s. In Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on (pp.
902-905). IEEE.
Shokri-Ghadikolaei, H., Fischione, C., Fodor, G., Popovski, P. and Zorzi, M., 2015. Millimeter
wave cellular networks: A MAC layer perspective. IEEE Transactions on Communications,
63(10), pp.3437-3458.
Tian, J. and Xu, L., 2017, October. An Analysis Model of IEEE 802.11 p with Difference
Services. In Journal of Physics: Conference Series (Vol. 910, No. 1, p. 012068). IOP Publishing.
Trappe, W., 2015. The challenges facing physical layer security. IEEE communications
magazine, 53(6), pp.16-20.
Trivedi, Y., 2016. Ethernet, the networking standard: more mature, more powerful where the
whole world is going with ethernet. IEEE Communications Magazine, 54(9), pp.5-11.
Vladyko, A., Paramonov, A., Kirichek, R. and Koucheryavy, A., 2016. Using the IEEE 802.11
Family of Standards for Communication Between Robotic Systems. Advances in Intelligent
Systems Research, 133, pp.153-157.
Xie, X., Zhang, X., Kumar, S. and Li, L.E., 2015. pistream: Physical layer informed adaptive
video streaming over lte. In Proceedings of the 21st Annual International Conference on Mobile
Computing and Networking (pp. 413-425). ACM.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
25
A DETAILED COMPARISON OF CURRENT AND FUTURE IEEE 802.11 STANDARDS
Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J. and Di Renzo, M., 2015. Safeguarding
5G wireless communication networks using physical layer security. IEEE Communications
Magazine, 53(4), pp.20-27.
Ye, H., 2017. 96. Adaptive BEB Algorithm Based on Window Saturation Degree for Wireless
System. Boletín Técnico, ISSN: 0376-723X, 55(12).
Zheng, Y. and Li, M., 2015. P-MTI: Physical-layer missing tag identification via compressive
sensing. IEEE/ACM Transactions on Networking (TON), 23(4), pp.1356-1366.
chevron_up_icon
1 out of 26
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]