logo

WIRELESS NETWORK AND SECURITY DISCUSSION 2022

   

Added on  2022-09-15

12 Pages2964 Words26 Views
Running head: WIRELESS NETWORK AND SECURITY
Wireless Network and Security
Student’s Name
University’s Name
Author’s Note:
WIRELESS NETWORK AND SECURITY DISCUSSION 2022_1
1
WIRELESS NETWORK AND SECURITY
Table of Contents
1. Introduction....................................................................................................... 2
2. Motivation.......................................................................................................... 2
3. Comparison of Cellular Networks.......................................................................2
4. 5G Architecture................................................................................................. 4
5. Identification and Analysis of 5G Attacks...........................................................6
6. Identification and Analysis of 5G Limitation in Network Coverage.....................7
7. Conclusion......................................................................................................... 8
References............................................................................................................. 9
WIRELESS NETWORK AND SECURITY DISCUSSION 2022_2
2
WIRELESS NETWORK AND SECURITY
1. Introduction
Wireless networks could be referred to as the types of network that is
being set up with the help of radio signal frequency for the core purpose of
communicating amongst several computer devices and any other network
device. It is even being referred to as the WLAN or WiFi network and provides
some of the most significant advantages to its users [8]. This type of network
majorly utilizes wireless data connections within the network nodes and allows
business installations in an easy method. One of the most advanced wireless
network is 5G connection. The following report will be outlining a detailed
analysis on wireless network and security with relevant details such architecture
and attacks.
2. Motivation
5G or fifth generation cellular technology is the latest and the most
advanced form of wireless technology that meets with different requirements of
the ITU IMT 2020 [14]. The preceding generations of this specific wireless
network are 1G, 2G, 3G and 4G. 5G network is the digital cellular network, where
the respective service area is being covered by the providers and is being
divided into smaller geographical areas known as cells. The associated
technologies of this generation are GSM, UMTS, LTE, LTE Advanced Pro and many
more. The analog signals eventually represent sounds and the images are being
digitalized within phone that is further converted by the analog to digital
converter as well as transmitted as the bit stream. Each and every wireless
device of 5G within one cell substantially communicate by the radio waves with
the help of a local antenna array or lower power automatic transceiver from the
common frequency pool, getting reused in geographically separated cells [9].
Therefore, 5G is the most effective and significant wireless network generation
amongst the rest of the wireless networks.
3. Comparison of Cellular Networks
A detailed comparison of the existing cellular network generations such as
2G, 3G, 4G and 5G in five distinctive comparison factors is given below:
Comparis
on
Factors
5G 4G 3G 2G
Communi 5G needs 4G The The
WIRELESS NETWORK AND SECURITY DISCUSSION 2022_3
3
WIRELESS NETWORK AND SECURITY
cation
Spectrum
spectrum in 3
key frequency
ranges for
delivering
widespread
coverage,
which are -1
GHz, 1 to 6 GHz
and above 6
GHz [9].
technologies
have additional
frequency
bands of 600
MHz, 700 MHz,
1.7/ 2.1GHz,
2.3GHz and
2.5GHz
communicatio
n spectrum of
3G technology
is between
400 MHz to 3
GHz [10].
communicatio
n spectrum of
3G
technology is
between 200
MHz to 1 GHz.
Modulati
on
Techniqu
es used
in
Networks
The modulation
technique that
is being used in
5G connection
is OFDM or
orthogonal
frequency-
division
multiplexing.
The modulation
technique that
is being used in
4G connection
is SC FDMA or
single carrier
frequency
division
multiplexing.
The
modulation
techniques
that are being
used in 3G
connection
are QAM or
quadrature
amplitude
modulation
and QPSK or
quadrature
phase-shift
keying.
The
modulation
technique
used in 3G
connection is
GMSK or
Gaussian
Minimum-
Shift Keying
[11].
Medium
Access
Control
Mechanis
m
The medium
access control
mechanism of
5G connection
is information
theoretic limit.
The medium
access control
mechanism of
4G connection
is radio
resource
allocation.
The medium
access control
mechanism of
3G connection
is millimetre
wave
communicatio
n.
The medium
access
control
mechanism of
2G
connection is
advanced
modulation as
well as coding
schemes.
Network
Speed
The network
speed of 5G
The network
speed of 4G
The network
speed of 3G
The network
speed of 2G
WIRELESS NETWORK AND SECURITY DISCUSSION 2022_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireless Network and Security
|11
|2748
|62

Wireless Networks and Security
|11
|2619
|37

The wireless network and security
|10
|3158
|18

Evaluation On 5g Network And Security Report
|20
|2663
|31

5G Networks | Wireless Networks and Security
|11
|2788
|27

Wireless Network and Security
|11
|2797
|1