Wireless And Network Security Assignment 2022
VerifiedAdded on 2022/09/17
|10
|2527
|22
Assignment
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Wireless network and security
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
NETWORKING 1
Table of Contents
Introduction...........................................................................................................................................................2
Comparison of cellular networks............................................................................................................................2
2G cellular network............................................................................................................................................2
3G cellular networks...........................................................................................................................................3
4G cellular network............................................................................................................................................3
5G cellular network............................................................................................................................................4
The architecture of a 5G network...........................................................................................................................4
Attacks and risks related to 5G networks...............................................................................................................5
Issues related to 5G network coverage..................................................................................................................6
Conclusion..............................................................................................................................................................7
References..............................................................................................................................................................8
Table of Contents
Introduction...........................................................................................................................................................2
Comparison of cellular networks............................................................................................................................2
2G cellular network............................................................................................................................................2
3G cellular networks...........................................................................................................................................3
4G cellular network............................................................................................................................................3
5G cellular network............................................................................................................................................4
The architecture of a 5G network...........................................................................................................................4
Attacks and risks related to 5G networks...............................................................................................................5
Issues related to 5G network coverage..................................................................................................................6
Conclusion..............................................................................................................................................................7
References..............................................................................................................................................................8
NETWORKING 2
Introduction
The next generation (5G) is more effective and reliable in terms of data communication that replaced 4G
cellular networks and systems. The main evolution compared with previous generations is that 5G technology
improved data rate speed which helps the consumers for transferring data in an effective way [1]. New IoT and
wireless networks require advanced cellular network for reducing errors and problems and 5G is the latest
communication technology that addressed risks occurred in the IoT devices. The major objective of this
investigation is to identify the importance of 5G networks in communication systems and compare the features
of cellular networks along with the risks and issues. It is argued that the readers require a platform for
understanding the key issues related to the wireless networks and analyze the key features of 5G technology.
The outline of this report will include several sections for example; comparison of cellular networks, 5G
architecture and security attacks or issues occurred in 5G networks.
Comparison of cellular networks
2G cellular network
2G technology was developed and implemented in the year 1999 that used digital cellular networks in order to
perform data transmission over the networks. From recent literature, it is identified that the communication
spectrum of 2G networks involves 1.8 GHz frequency in order to provide digital communication to the
consumers [2]. The bandwidth of 2G over the previous generation is very high (900 MHz) and also included
digital modulation technology in order to modulate the transmitted signals or data. With the help of the 2G
cellular network, the users were able to perform data communication and also provided 64 kbps data rate
which is not enough for completing long-distance communication. As compared with previous-generation 2G
enables text message services to the consumers and transferred signals are effective and reliable that helped
the users for obtaining better signals. Therefore, it is stated that 2G networks are not much secure that
produced data breach and security threats that affected the personal data of consumers.
Figure: cellular networks [5]
Introduction
The next generation (5G) is more effective and reliable in terms of data communication that replaced 4G
cellular networks and systems. The main evolution compared with previous generations is that 5G technology
improved data rate speed which helps the consumers for transferring data in an effective way [1]. New IoT and
wireless networks require advanced cellular network for reducing errors and problems and 5G is the latest
communication technology that addressed risks occurred in the IoT devices. The major objective of this
investigation is to identify the importance of 5G networks in communication systems and compare the features
of cellular networks along with the risks and issues. It is argued that the readers require a platform for
understanding the key issues related to the wireless networks and analyze the key features of 5G technology.
The outline of this report will include several sections for example; comparison of cellular networks, 5G
architecture and security attacks or issues occurred in 5G networks.
Comparison of cellular networks
2G cellular network
2G technology was developed and implemented in the year 1999 that used digital cellular networks in order to
perform data transmission over the networks. From recent literature, it is identified that the communication
spectrum of 2G networks involves 1.8 GHz frequency in order to provide digital communication to the
consumers [2]. The bandwidth of 2G over the previous generation is very high (900 MHz) and also included
digital modulation technology in order to modulate the transmitted signals or data. With the help of the 2G
cellular network, the users were able to perform data communication and also provided 64 kbps data rate
which is not enough for completing long-distance communication. As compared with previous-generation 2G
enables text message services to the consumers and transferred signals are effective and reliable that helped
the users for obtaining better signals. Therefore, it is stated that 2G networks are not much secure that
produced data breach and security threats that affected the personal data of consumers.
Figure: cellular networks [5]
NETWORKING 3
3G cellular networks
In order to control and address the issues associated with 2G networks, the third generation is developed with
better data rate and large efficiency. As compared with the previous generation, 3G technology included 1.6 to
2.0 frequency range in the communication spectrum that changed the way of communication and able the
users for sending or receiving data over the networks [3]. The bandwidth of 3G technologies is around 100 MHz
that helped the users for enhancing the communication speed and included CDMA and EDGE modulation
techniques for modulating the transferred signals. It is observed that the OSI layers were included in the MAC
mechanism in order to enhance the capacity of the telecommunication systems. The overall data rate of 3G
technology is 2 MBPS which is larger compared to the 1G and 2G cellular networks. It is estimated that 3G
technology is faster communication technology rather than previous generations because it utilized the CDMA
technique along with the authentic security systems. The major issue linked with 3G technology is that it
produced privacy-related issues and also increased cyber-security attacks including malware, DDOS and so on.
4G cellular network
It is an advanced version of 3G communication technology that has the potential to provide effective
communication by including 2 to 8 GHz frequency range in the communication spectrum. While comparing 4G
technology with previous generations it is evaluated that 4G networks adopted LTE, CDMA and PSK modulation
technique that enhanced the strengths of output signals and reduced errors occurred in the systems. With the
help of wireless MAC layers 4G technology provided appropriate communication systems and networks to the
consumers [4]. Moreover, the data rate provided by 4G technology is between 100 Mbps and 1 Gbps that
improved the data communication speed and reduced distortion related issues from the telecommunication
3G cellular networks
In order to control and address the issues associated with 2G networks, the third generation is developed with
better data rate and large efficiency. As compared with the previous generation, 3G technology included 1.6 to
2.0 frequency range in the communication spectrum that changed the way of communication and able the
users for sending or receiving data over the networks [3]. The bandwidth of 3G technologies is around 100 MHz
that helped the users for enhancing the communication speed and included CDMA and EDGE modulation
techniques for modulating the transferred signals. It is observed that the OSI layers were included in the MAC
mechanism in order to enhance the capacity of the telecommunication systems. The overall data rate of 3G
technology is 2 MBPS which is larger compared to the 1G and 2G cellular networks. It is estimated that 3G
technology is faster communication technology rather than previous generations because it utilized the CDMA
technique along with the authentic security systems. The major issue linked with 3G technology is that it
produced privacy-related issues and also increased cyber-security attacks including malware, DDOS and so on.
4G cellular network
It is an advanced version of 3G communication technology that has the potential to provide effective
communication by including 2 to 8 GHz frequency range in the communication spectrum. While comparing 4G
technology with previous generations it is evaluated that 4G networks adopted LTE, CDMA and PSK modulation
technique that enhanced the strengths of output signals and reduced errors occurred in the systems. With the
help of wireless MAC layers 4G technology provided appropriate communication systems and networks to the
consumers [4]. Moreover, the data rate provided by 4G technology is between 100 Mbps and 1 Gbps that
improved the data communication speed and reduced distortion related issues from the telecommunication
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
NETWORKING 4
systems. There are major two security techniques used in the 4G networks for improving the privacy of
transmitted signals including encryption and authentic access. A recent study identified that there various kinds
of risks and issues occurred in 4G networks, for example, conflict issues, security breach and threats and DDOS
attack.
5G cellular network
It is an advanced communication technology that has the capability to improve the performance of
telecommunication systems and networks effectively. It is observed that 5G technology replaced 4G networks
and improved the data rate of transmitted signals and data. 5G technologies involve 300 GHz frequency in the
communication spectrum which is larger rather than previous generations [4]. Moreover, in terms of data rate
5G networks are more capable of long-distance communication while comparing with others that included
OFDMA and QPSK modulation techniques in the telecommunication systems. The data rate of 5G
communication technology is around 1 GBPS that helped the consumers for improving the effectiveness of the
communication channels. As compared with the 4G cellular network it is identified that 5G technology included
OSI layers and network layers that improved the channel capacity and improved the performance of data
transmission systems [5]. In terms of security, 5G is more secure and reliable that has the potential to control
and manage unwanted signals and distortions from the systems and provide better outcomes to the receivers.
Therefore, it is stated that in future 5G t6echnology will change the way of communication in the companies
because it uses advanced encryption technology that provides secure private keys to the consumers and
reduce data breach-related issues.
The architecture of a 5G network
In the case of 5G technology, a single network system can meet the service requirements and maintain data
transmissions over the networks. It is examined that the architecture of 5G networks includes various
attributes which are described below:
5G architecture delivers a logically independent network on a specific computing network in order to
meet the diversified requirements of the consumers and also provides DC-based cloud infrastructure
for supporting numerous communication applications [6].
It utilizes CloudRAN in order to redesign radio access networks and servers for providing massive
interconnection to the numbers of standards and implementing real-time communication over the
networks [13].
systems. There are major two security techniques used in the 4G networks for improving the privacy of
transmitted signals including encryption and authentic access. A recent study identified that there various kinds
of risks and issues occurred in 4G networks, for example, conflict issues, security breach and threats and DDOS
attack.
5G cellular network
It is an advanced communication technology that has the capability to improve the performance of
telecommunication systems and networks effectively. It is observed that 5G technology replaced 4G networks
and improved the data rate of transmitted signals and data. 5G technologies involve 300 GHz frequency in the
communication spectrum which is larger rather than previous generations [4]. Moreover, in terms of data rate
5G networks are more capable of long-distance communication while comparing with others that included
OFDMA and QPSK modulation techniques in the telecommunication systems. The data rate of 5G
communication technology is around 1 GBPS that helped the consumers for improving the effectiveness of the
communication channels. As compared with the 4G cellular network it is identified that 5G technology included
OSI layers and network layers that improved the channel capacity and improved the performance of data
transmission systems [5]. In terms of security, 5G is more secure and reliable that has the potential to control
and manage unwanted signals and distortions from the systems and provide better outcomes to the receivers.
Therefore, it is stated that in future 5G t6echnology will change the way of communication in the companies
because it uses advanced encryption technology that provides secure private keys to the consumers and
reduce data breach-related issues.
The architecture of a 5G network
In the case of 5G technology, a single network system can meet the service requirements and maintain data
transmissions over the networks. It is examined that the architecture of 5G networks includes various
attributes which are described below:
5G architecture delivers a logically independent network on a specific computing network in order to
meet the diversified requirements of the consumers and also provides DC-based cloud infrastructure
for supporting numerous communication applications [6].
It utilizes CloudRAN in order to redesign radio access networks and servers for providing massive
interconnection to the numbers of standards and implementing real-time communication over the
networks [13].
NETWORKING 5
The developed 5G architecture has the potential to simplify core network architecture for evaluating
the on-demand configuration of network functions by controlling and managing the communication
between the computing networks [14].
Figure: Architecture of 5G network [4]
It is observed that 5G architecture include a core network and computer servers for implementing data
transmission which helps consumers for exchanging data effectively. Therefore, it is stated that the developed
architecture of 5G networks are able to perform data transmission in an appropriate manner and avoid
conflict-related issues from the systems [7].
Attacks and risks related to 5G networks
From the previous investigation, it is observed that 5G is the latest communication technology which is able to
improve the overall performance of telecommunication systems by providing better services. However,
security is a key problem which affects the performance of wireless networks and communication channels and
in 5G networks, numerous security attacks occurred that faced by the consumers [8].
These security attacks include malware attack, ransomware attack, denial of service attack, phishing, spyware
and so on. It is reported that in 5G attacks malware is a very dangerous security attack related to the wireless
networks and system that has the ability to access the private accounts of the consumers without their
knowledge [9]. A recent article observed that malware attack includes viruses, unwanted signals and spams
that developed by the hackers for performing data breach activities in the workplace.
The developed 5G architecture has the potential to simplify core network architecture for evaluating
the on-demand configuration of network functions by controlling and managing the communication
between the computing networks [14].
Figure: Architecture of 5G network [4]
It is observed that 5G architecture include a core network and computer servers for implementing data
transmission which helps consumers for exchanging data effectively. Therefore, it is stated that the developed
architecture of 5G networks are able to perform data transmission in an appropriate manner and avoid
conflict-related issues from the systems [7].
Attacks and risks related to 5G networks
From the previous investigation, it is observed that 5G is the latest communication technology which is able to
improve the overall performance of telecommunication systems by providing better services. However,
security is a key problem which affects the performance of wireless networks and communication channels and
in 5G networks, numerous security attacks occurred that faced by the consumers [8].
These security attacks include malware attack, ransomware attack, denial of service attack, phishing, spyware
and so on. It is reported that in 5G attacks malware is a very dangerous security attack related to the wireless
networks and system that has the ability to access the private accounts of the consumers without their
knowledge [9]. A recent article observed that malware attack includes viruses, unwanted signals and spams
that developed by the hackers for performing data breach activities in the workplace.
NETWORKING 6
Figure: issues in 5G networks [7]
These unwanted signals transferred by the hackers to the wireless networks used in the 5G technology and
reduce the performance of developed systems along with the communication channels [12]. Therefore, it is
reported that 5G networks are less secure if the consumers use unauthentic networks and third-party
applications for performing communication because the criminals enter into the main server using these
techniques and perform malware activities in the systems.
In order to control and manage the rate of malware attack in 5G networks, the consumers should avoid the
unauthentic networks and fraud connections while transferring data over the networks because these signals
help the consumers for collecting sensitive data. Moreover, the developers should focus on the security
systems and wireless networks while implementing 5G technology in the workplace and implement encryption
techniques to transfer the signals in an effective way [9]. For reducing malware signals and networks from the
system firewall tools can be used in the computing devices and 5G devices that detect fraud cases from the
systems and provide better communication networks.
Issues related to 5G network coverage
5G is a current communication technology that provides larger data rate over the communication networks but
still, configuration conflict is a common issue related to 5G network coverage which helps the hackers for
entering into the main server [10]. Moreover, a data breach can occur in-network coverage if consumers use
unauthentic networks and less secured systems for performing data communication in the workplace. Larger
bandwidth may lead issues in the network coverage and it is very important to provide a proper line of sight
Figure: issues in 5G networks [7]
These unwanted signals transferred by the hackers to the wireless networks used in the 5G technology and
reduce the performance of developed systems along with the communication channels [12]. Therefore, it is
reported that 5G networks are less secure if the consumers use unauthentic networks and third-party
applications for performing communication because the criminals enter into the main server using these
techniques and perform malware activities in the systems.
In order to control and manage the rate of malware attack in 5G networks, the consumers should avoid the
unauthentic networks and fraud connections while transferring data over the networks because these signals
help the consumers for collecting sensitive data. Moreover, the developers should focus on the security
systems and wireless networks while implementing 5G technology in the workplace and implement encryption
techniques to transfer the signals in an effective way [9]. For reducing malware signals and networks from the
system firewall tools can be used in the computing devices and 5G devices that detect fraud cases from the
systems and provide better communication networks.
Issues related to 5G network coverage
5G is a current communication technology that provides larger data rate over the communication networks but
still, configuration conflict is a common issue related to 5G network coverage which helps the hackers for
entering into the main server [10]. Moreover, a data breach can occur in-network coverage if consumers use
unauthentic networks and less secured systems for performing data communication in the workplace. Larger
bandwidth may lead issues in the network coverage and it is very important to provide a proper line of sight
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
NETWORKING 7
communication for better communications systems [11]. Therefore, for reducing network coverage-related
issues the developers can enhance numbers of routers and communication servers which help for providing
better communication between transmitter and receiver.
Conclusion
After reviewing 5G communication technology, it is summarized that 5G is the best cellular network which can
be used in the companies for enhancing data transmission speed and overall channel capacity. This propose
investigation provided in-depth analysis related to 5G networks and security attacks occurred in 5G technology.
It is argued that malware and DDOS both are very serious attacks occurred in 5G technologies which have the
ability to control and access the sensitive data of the users and companies. Therefore, it is stated that
companies can adopt 5G networks in the communication systems but it is very important to focus on the
privacy of data and management can install firewall tools in the systems for addressing malware signals and
viruses.
communication for better communications systems [11]. Therefore, for reducing network coverage-related
issues the developers can enhance numbers of routers and communication servers which help for providing
better communication between transmitter and receiver.
Conclusion
After reviewing 5G communication technology, it is summarized that 5G is the best cellular network which can
be used in the companies for enhancing data transmission speed and overall channel capacity. This propose
investigation provided in-depth analysis related to 5G networks and security attacks occurred in 5G technology.
It is argued that malware and DDOS both are very serious attacks occurred in 5G technologies which have the
ability to control and access the sensitive data of the users and companies. Therefore, it is stated that
companies can adopt 5G networks in the communication systems but it is very important to focus on the
privacy of data and management can install firewall tools in the systems for addressing malware signals and
viruses.
NETWORKING 8
References
[1]. A. Chakraborty and, P., Medinipur, “A study on third-generation mobile technology (3G) and
comparison among all generations of mobile communication,” Int. J. Innov. Technol. Adapt.
Manag, vol. 1, no. 2, pp. 12-15, 2013.
[2]. S., Chen, S., Sun, Y., Wang, G. Xiao and, R., Tamrakar, “A comprehensive survey of TDD-based mobile
communication systems from TD-SCDMA 3G to TD-LTE (A) 4G and 5G directions,” China
Communications, vol. 12, no. 2, pp.40-60, 2015.
[3]. O., Fagbohun, “Comparative studies on 3G, 4G and 5G wireless technology,” IOSR Journal of
Electronics and Communication Engineering, vol. 9, no. 3, pp.88-94, 2014.
[4]. A.U., Gawas, “An overview on the evolution of mobile wireless communication networks: 1G-
6G,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 3,
no. 5, pp.3130-3133, 2015.
[5]. S., Hossain, “5G wireless communication systems,” American Journal of Engineering Research
(AJER), vol. 2, no. 10, pp.344-353, 2013.
[6]. Y., Huo, X. Dong and, W., Xu, “5G cellular user equipment: From theory to practical hardware
design,” IEEE Access, vol. 5, no. 7, pp.13992-14010, 2017.
[7]. T.S., Rappaport, S., Sun, R., Mayzus, H., Zhao, Y., Azar, K., Wang, G.N., Wong, J.K., Schulz, M. Samimi
and, F., Gutierrez, “Millimetre-wave mobile communications for 5G cellular: It will work!,” IEEE
Access, vol. 1, no. 7, pp.335-349, 2013.
[8]. S.S., Sahoo, M.K. Hota and, K.K., Barik, “5G network a new look into the future: Beyond all generation
networks,” American Journal of Systems and Software, vol. 2, no. 4, pp.108-112, 2014.
[9]. P., Sharma, “Evolution of mobile wireless communication networks-1G to 5G as well as future
prospective of next-generation communication network,” International Journal of Computer Science
and Mobile Computing, vol. 2, no. 8, pp.47-53, 2013.
[10]. S., Shukla, V., Khare, S. Garg and, P., Sharma2013, “Comparative Study of 1G, 2G, 3G and
4G,” Journal of Engineering, Computers & Applied Sciences, vol. 2, no. 4, pp.55-63, 2013.
[11]. R. Sood and, A., Garg, “Digital society from 1G to 5G: a comparative study,” International
Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 3, no. 2, pp.186-193,
2014.
[12]. S.M., Tondre, S.D. Panchal and, D.T., Kushner, “Evolutionary steps from 1G to 4.5 G,”
International Journal of Advanced Research in Computer and Communication Engineering, vol. 3, no. 4,
p.6164, 2014.
References
[1]. A. Chakraborty and, P., Medinipur, “A study on third-generation mobile technology (3G) and
comparison among all generations of mobile communication,” Int. J. Innov. Technol. Adapt.
Manag, vol. 1, no. 2, pp. 12-15, 2013.
[2]. S., Chen, S., Sun, Y., Wang, G. Xiao and, R., Tamrakar, “A comprehensive survey of TDD-based mobile
communication systems from TD-SCDMA 3G to TD-LTE (A) 4G and 5G directions,” China
Communications, vol. 12, no. 2, pp.40-60, 2015.
[3]. O., Fagbohun, “Comparative studies on 3G, 4G and 5G wireless technology,” IOSR Journal of
Electronics and Communication Engineering, vol. 9, no. 3, pp.88-94, 2014.
[4]. A.U., Gawas, “An overview on the evolution of mobile wireless communication networks: 1G-
6G,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 3,
no. 5, pp.3130-3133, 2015.
[5]. S., Hossain, “5G wireless communication systems,” American Journal of Engineering Research
(AJER), vol. 2, no. 10, pp.344-353, 2013.
[6]. Y., Huo, X. Dong and, W., Xu, “5G cellular user equipment: From theory to practical hardware
design,” IEEE Access, vol. 5, no. 7, pp.13992-14010, 2017.
[7]. T.S., Rappaport, S., Sun, R., Mayzus, H., Zhao, Y., Azar, K., Wang, G.N., Wong, J.K., Schulz, M. Samimi
and, F., Gutierrez, “Millimetre-wave mobile communications for 5G cellular: It will work!,” IEEE
Access, vol. 1, no. 7, pp.335-349, 2013.
[8]. S.S., Sahoo, M.K. Hota and, K.K., Barik, “5G network a new look into the future: Beyond all generation
networks,” American Journal of Systems and Software, vol. 2, no. 4, pp.108-112, 2014.
[9]. P., Sharma, “Evolution of mobile wireless communication networks-1G to 5G as well as future
prospective of next-generation communication network,” International Journal of Computer Science
and Mobile Computing, vol. 2, no. 8, pp.47-53, 2013.
[10]. S., Shukla, V., Khare, S. Garg and, P., Sharma2013, “Comparative Study of 1G, 2G, 3G and
4G,” Journal of Engineering, Computers & Applied Sciences, vol. 2, no. 4, pp.55-63, 2013.
[11]. R. Sood and, A., Garg, “Digital society from 1G to 5G: a comparative study,” International
Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 3, no. 2, pp.186-193,
2014.
[12]. S.M., Tondre, S.D. Panchal and, D.T., Kushner, “Evolutionary steps from 1G to 4.5 G,”
International Journal of Advanced Research in Computer and Communication Engineering, vol. 3, no. 4,
p.6164, 2014.
NETWORKING 9
[13]. S. Vij and, A., Jain, “5G: Evolution of secure mobile technology," In 2016 3rd International
Conference on Computing for Sustainable Global Development (INDIACom), vol. 12, no. 6, pp. 2192-
2196, 2016.
[14]. L.J., Vora, “Evolution of mobile generation technology: 1G to 5G and review of upcoming
wireless technology 5G,” Int. J. of Modern Trends in Engineer. and Research, vol. 2, no. 10, pp.281-290,
2015.
[13]. S. Vij and, A., Jain, “5G: Evolution of secure mobile technology," In 2016 3rd International
Conference on Computing for Sustainable Global Development (INDIACom), vol. 12, no. 6, pp. 2192-
2196, 2016.
[14]. L.J., Vora, “Evolution of mobile generation technology: 1G to 5G and review of upcoming
wireless technology 5G,” Int. J. of Modern Trends in Engineer. and Research, vol. 2, no. 10, pp.281-290,
2015.
1 out of 10
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.