Wireless Communication Technologies
VerifiedAdded on 2020/03/16
|8
|1886
|54
AI Summary
This assignment delves into a comparative analysis of key wireless communication technologies. It examines GSM's role in transitioning from analog to digital communication, highlights the differences between CDMA and TDMA techniques, particularly emphasizing the use of codes for efficient transmission, and discusses their applications in modern communication systems.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: WIRELESS NETWORKS
Wireless networks
Name of the student
Name of the University
Author Note
Wireless networks
Name of the student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1WIRELESS NETWORKS
Answer to question 1:
802.11b:
The operation for the 802.11b standards includes the ISM frequency bands. The
operational range of frequency in the United States is 2.4-2.4835 GHz. It consists of 14 channels
partially overlapping each other with a width of 22 MHz. The requirement for this connectivity is
the use of same channels in the devices across the network (Yuan et al., 2014). The chip rate
associated with the standard is 11 MHz and the transmission data rate is 1, 2, 5.5 and 11 Mbps.
The various techniques adopted by this standard are the direct sequence spread spectrum (DSSS)
and complementary code keying modulation (CCK). The frame structure includes the data,
header and the preamble.
802.11a:
The standard operates using the radio frequency spectrum at 2.4 GHz frequency band.
The transmission rate of this standard is 54 Mbps which is the most important benefit of it
(Chakraborty et al., 2014). The frame structure includes the data, header and the preamble. It is
said to include 48 data carriers, 64 point FFT, 4 pilot carriers and 1 DC carrier. The remaining
carriers are termed as guard carriers. The operational technique adopted by the 802.11a band is
the use of OFDM technology.
802.11a standard 802.11b standard
Data rate extends up to 54 Mbps Data rate extends up to 11 Mbps
OFDM is used for operations DSSS and CCK techniques for operation
It has more than 100 carrier channels It has 14 carrier channels
Frame structure consists of preamble, data and
header
Frame structure consists of preamble, data and
header
The PLCP frame includes the reserved, length,
parity, tail, service, PSDU and Pad bits.
The PLCP frame includes Sync, frame delimiter,
signal, service, length, frame check sequence and
PSDU bits.
Answer to question 1:
802.11b:
The operation for the 802.11b standards includes the ISM frequency bands. The
operational range of frequency in the United States is 2.4-2.4835 GHz. It consists of 14 channels
partially overlapping each other with a width of 22 MHz. The requirement for this connectivity is
the use of same channels in the devices across the network (Yuan et al., 2014). The chip rate
associated with the standard is 11 MHz and the transmission data rate is 1, 2, 5.5 and 11 Mbps.
The various techniques adopted by this standard are the direct sequence spread spectrum (DSSS)
and complementary code keying modulation (CCK). The frame structure includes the data,
header and the preamble.
802.11a:
The standard operates using the radio frequency spectrum at 2.4 GHz frequency band.
The transmission rate of this standard is 54 Mbps which is the most important benefit of it
(Chakraborty et al., 2014). The frame structure includes the data, header and the preamble. It is
said to include 48 data carriers, 64 point FFT, 4 pilot carriers and 1 DC carrier. The remaining
carriers are termed as guard carriers. The operational technique adopted by the 802.11a band is
the use of OFDM technology.
802.11a standard 802.11b standard
Data rate extends up to 54 Mbps Data rate extends up to 11 Mbps
OFDM is used for operations DSSS and CCK techniques for operation
It has more than 100 carrier channels It has 14 carrier channels
Frame structure consists of preamble, data and
header
Frame structure consists of preamble, data and
header
The PLCP frame includes the reserved, length,
parity, tail, service, PSDU and Pad bits.
The PLCP frame includes Sync, frame delimiter,
signal, service, length, frame check sequence and
PSDU bits.
2WIRELESS NETWORKS
Answer to question 2:
a) The robust security network (RSN) is the purpose for authentication by the 802.11i
standard. Two types of protocols are used to reference the authentication purposes. These are the
4-way handshake and the group key handshake. The requirement for an authenticated server is
addressed by this standard of authentications. The standard of IEEE 802.1X is followed by this
standard which involves the development and verification of cryptographic keys. The process
utilizes the use of pre-shared key or EAP exchange (Baldini et al., 2014). The authentication is
done between a client and the server without the need of disclosing the private key.
b) The virtual private network (VPN) is used to facilitate connection between two points
by utilizing a public network. This helps in the security of data transfer as the connection is
deemed private. The methods undertaken for encrypting the private network is done by the
adoption of certain protocols like the L2TP (Layer 2 Tunneling Protocol), IPSec (IP security),
Point-to-Point Tunneling Protocol (PPTP), Secure Socket Layer (SSL) or Transport Layer
Security (TLS) and Secure Shell (SSH).
Answer to question 3:
Introduction:
This report discusses about the various wireless metropolitan area network (WMAN)
technologies. The main advantage of this technology is the connectivity among various locations
in the network. Moreover, the need for higher cost installations is also removed by the presence
of such technologies.
Discussion:
Answer to question 2:
a) The robust security network (RSN) is the purpose for authentication by the 802.11i
standard. Two types of protocols are used to reference the authentication purposes. These are the
4-way handshake and the group key handshake. The requirement for an authenticated server is
addressed by this standard of authentications. The standard of IEEE 802.1X is followed by this
standard which involves the development and verification of cryptographic keys. The process
utilizes the use of pre-shared key or EAP exchange (Baldini et al., 2014). The authentication is
done between a client and the server without the need of disclosing the private key.
b) The virtual private network (VPN) is used to facilitate connection between two points
by utilizing a public network. This helps in the security of data transfer as the connection is
deemed private. The methods undertaken for encrypting the private network is done by the
adoption of certain protocols like the L2TP (Layer 2 Tunneling Protocol), IPSec (IP security),
Point-to-Point Tunneling Protocol (PPTP), Secure Socket Layer (SSL) or Transport Layer
Security (TLS) and Secure Shell (SSH).
Answer to question 3:
Introduction:
This report discusses about the various wireless metropolitan area network (WMAN)
technologies. The main advantage of this technology is the connectivity among various locations
in the network. Moreover, the need for higher cost installations is also removed by the presence
of such technologies.
Discussion:
3WIRELESS NETWORKS
ZeeTech is the chosen multinational company operating in the export and import aspects.
The company is supposed to have 5 offices with 40 employees in each of them. The company is
considering the use of tablets and mobile phones for addressing their business operations.
WMAN:
The wireless metropolitan area network (WMAN) technologies which is used to facilitate
connectivity among various locations in the network. Moreover, the need for higher cost
installations is also removed by the presence of such technologies. In case of unstable
connections among the infrastructures, the WMAN technology is used to serve as backups to
provide support. The main frequency ranges used in this technology lies between the radio
frequency and the infrared transmission ranges. In addition, the WMAN technology uses three
standards to be applied in operations. These are the HiperMan, HiperACCESS and the 802.16.
HiperMan:
The High Performance Radio Metropolitan Area Network (HiperMan) is mainly used to
provide broadband connections by utilizing the wireless media. The range of frequencies used is
the radio frequencies. Their range of operations lies between 2-11 GHz.
HiperACCESS:
This technology is also used to provide broadband connections over a wireless media.
This technology is mainly used for the small to medium infrastructures. In addition, it can also be
used to facilitate mobile connectivity. Their range of operations includes the high frequency
bands with 40-43 GHz frequencies. 100 Mbit/s is considered the bit rate of this technology.
IEEE 802.16:
This technology is also used to provide broadband connections over a wireless media.
The range of frequencies used in this technique lies between the ranges of 10-66 GHz (Lu &
ZeeTech is the chosen multinational company operating in the export and import aspects.
The company is supposed to have 5 offices with 40 employees in each of them. The company is
considering the use of tablets and mobile phones for addressing their business operations.
WMAN:
The wireless metropolitan area network (WMAN) technologies which is used to facilitate
connectivity among various locations in the network. Moreover, the need for higher cost
installations is also removed by the presence of such technologies. In case of unstable
connections among the infrastructures, the WMAN technology is used to serve as backups to
provide support. The main frequency ranges used in this technology lies between the radio
frequency and the infrared transmission ranges. In addition, the WMAN technology uses three
standards to be applied in operations. These are the HiperMan, HiperACCESS and the 802.16.
HiperMan:
The High Performance Radio Metropolitan Area Network (HiperMan) is mainly used to
provide broadband connections by utilizing the wireless media. The range of frequencies used is
the radio frequencies. Their range of operations lies between 2-11 GHz.
HiperACCESS:
This technology is also used to provide broadband connections over a wireless media.
This technology is mainly used for the small to medium infrastructures. In addition, it can also be
used to facilitate mobile connectivity. Their range of operations includes the high frequency
bands with 40-43 GHz frequencies. 100 Mbit/s is considered the bit rate of this technology.
IEEE 802.16:
This technology is also used to provide broadband connections over a wireless media.
The range of frequencies used in this technique lies between the ranges of 10-66 GHz (Lu &
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4WIRELESS NETWORKS
Huang, 2013). The main operations of this technology use the MAC layer (medium access layer)
to support various physical layers.
The wireless metropolitan area network technologies used for broadband connections via
the wireless media includes various standards known as the Back Haul and the Last Mile.
The connections among various business enterprises and cellular connectivity are done
by the adoption of the Back Haul technique. The main use of the Back haul technique is used to
reference the cost requirements. When the cost of wiring a large infrastructure goes to a very
high level, the use of the Back haul is addressed for such solutions. Moreover, the rate of
transmission of data is also very high.
The use of broadband connections by using the wireless media for the residential zones is
done by the Last Mile technique. The main advantage to this technique is the low cost of
deployment. In addition, the fast rate of business setup is another factor which contributes to
their use.
Recommendations:
Thus, the recommendations from the report include the adoption of the Last Mile feature
for wireless connectivity. In addition, the cost of deployment is also low. The security standards
adopted by the techniques are also beneficial for referencing to the business operations.
Moreover, as the rate of setup is very fast, the operations of the business will not be hampered
due to the installations.
Conclusion:
Thus, the conclusion that can be drawn from the report is that the company needs to
reference the recommended solutions. This can help to tend to their needs of business operations.
Huang, 2013). The main operations of this technology use the MAC layer (medium access layer)
to support various physical layers.
The wireless metropolitan area network technologies used for broadband connections via
the wireless media includes various standards known as the Back Haul and the Last Mile.
The connections among various business enterprises and cellular connectivity are done
by the adoption of the Back Haul technique. The main use of the Back haul technique is used to
reference the cost requirements. When the cost of wiring a large infrastructure goes to a very
high level, the use of the Back haul is addressed for such solutions. Moreover, the rate of
transmission of data is also very high.
The use of broadband connections by using the wireless media for the residential zones is
done by the Last Mile technique. The main advantage to this technique is the low cost of
deployment. In addition, the fast rate of business setup is another factor which contributes to
their use.
Recommendations:
Thus, the recommendations from the report include the adoption of the Last Mile feature
for wireless connectivity. In addition, the cost of deployment is also low. The security standards
adopted by the techniques are also beneficial for referencing to the business operations.
Moreover, as the rate of setup is very fast, the operations of the business will not be hampered
due to the installations.
Conclusion:
Thus, the conclusion that can be drawn from the report is that the company needs to
reference the recommended solutions. This can help to tend to their needs of business operations.
5WIRELESS NETWORKS
Answer to question 4:
Time Division Multiple Access (TDMA):
The basic operations of the TDMA technology are the use of a shared channel for
connectivity. The technology uses a single carrier channel that is divided into various time slots
where each one of them is used for connectivity among the users (Glisic & Leppänen, 2013). The
main advantage of this technique is the simpler handoff process. This in turn is used to facilitate
high synchronization overhead.
Code Division Multiple Access (CDMA):
The CDMA technology is used in second generation communications. They are also
used for wireless connectivity. The CDMA technique also uses a single channel as a carrier
channel. The main difference among the CDMA and the TDMA is that the CDMA has the
presence of codes that helps in communications among the transmitter and the receiver (Glisic &
Leppänen, 2013). These codes in both the transmitter and the receiver side need to match for
efficient transmission.
Global System for Mobile Communications (GSM):
The GSM is universally developed by European Telecommunications Standards Institute
(ETSI). The basic idea of the GSM technology is to replace the analog mode of communications
that were available in the first generation networks (Sharma, 2013). In addition, the use of duplex
nature of communications is also referenced by the GSM technologies.
Answer to question 4:
Time Division Multiple Access (TDMA):
The basic operations of the TDMA technology are the use of a shared channel for
connectivity. The technology uses a single carrier channel that is divided into various time slots
where each one of them is used for connectivity among the users (Glisic & Leppänen, 2013). The
main advantage of this technique is the simpler handoff process. This in turn is used to facilitate
high synchronization overhead.
Code Division Multiple Access (CDMA):
The CDMA technology is used in second generation communications. They are also
used for wireless connectivity. The CDMA technique also uses a single channel as a carrier
channel. The main difference among the CDMA and the TDMA is that the CDMA has the
presence of codes that helps in communications among the transmitter and the receiver (Glisic &
Leppänen, 2013). These codes in both the transmitter and the receiver side need to match for
efficient transmission.
Global System for Mobile Communications (GSM):
The GSM is universally developed by European Telecommunications Standards Institute
(ETSI). The basic idea of the GSM technology is to replace the analog mode of communications
that were available in the first generation networks (Sharma, 2013). In addition, the use of duplex
nature of communications is also referenced by the GSM technologies.
6WIRELESS NETWORKS
References:
Baldini, G., Karanasios, S., Allen, D., & Vergari, F. (2014). Survey of wireless communication
technologies for public safety. IEEE Communications Surveys & Tutorials, 16(2), 619-
641.
Chakraborty, U., Kundu, A., Chowdhury, S. K., & Bhattacharjee, A. K. (2014). Compact dual-
band microstrip antenna for IEEE 802.11 a WLAN application. IEEE Antennas and
Wireless Propagation Letters, 13, 407-410.
Dhillon, H. S., Huang, H., & Viswanathan, H. (2017). Wide-area wireless communication
challenges for the Internet of Things. IEEE Communications Magazine, 55(2), 168-174.
Glisic, S. G., & Leppänen, P. A. (2013). Wireless communications: TDMA versus CDMA.
Springer Science & Business Media.
Kang, S., Kim, H., & Kang, S. (2015). Virtual private network for wellness sports
information. Multimedia Tools and Applications, 74(16), 6497-6507.
Liyanage, M., Ylianttila, M., & Gurtov, A. (2014). IP-based virtual private network
implementations in future cellular networks. Handbook of Research on Progressive
Trends in Wireless Communications and Networking, 1(44), 18.
Lu, J. H., & Huang, B. J. (2013). Planar compact slot antenna with multi-band operation for
IEEE 802.16 m application. IEEE Transactions on Antennas and Propagation, 61(3),
1411-1414.
Qu, L. D., Cui, X. Y., & Liu, X. N. (2014). A Route Handoff Method Based on Virtual Private
Network in Vehicle Information Network. In Applied Mechanics and Materials (Vol.
475, pp. 699-702). Trans Tech Publications.
References:
Baldini, G., Karanasios, S., Allen, D., & Vergari, F. (2014). Survey of wireless communication
technologies for public safety. IEEE Communications Surveys & Tutorials, 16(2), 619-
641.
Chakraborty, U., Kundu, A., Chowdhury, S. K., & Bhattacharjee, A. K. (2014). Compact dual-
band microstrip antenna for IEEE 802.11 a WLAN application. IEEE Antennas and
Wireless Propagation Letters, 13, 407-410.
Dhillon, H. S., Huang, H., & Viswanathan, H. (2017). Wide-area wireless communication
challenges for the Internet of Things. IEEE Communications Magazine, 55(2), 168-174.
Glisic, S. G., & Leppänen, P. A. (2013). Wireless communications: TDMA versus CDMA.
Springer Science & Business Media.
Kang, S., Kim, H., & Kang, S. (2015). Virtual private network for wellness sports
information. Multimedia Tools and Applications, 74(16), 6497-6507.
Liyanage, M., Ylianttila, M., & Gurtov, A. (2014). IP-based virtual private network
implementations in future cellular networks. Handbook of Research on Progressive
Trends in Wireless Communications and Networking, 1(44), 18.
Lu, J. H., & Huang, B. J. (2013). Planar compact slot antenna with multi-band operation for
IEEE 802.16 m application. IEEE Transactions on Antennas and Propagation, 61(3),
1411-1414.
Qu, L. D., Cui, X. Y., & Liu, X. N. (2014). A Route Handoff Method Based on Virtual Private
Network in Vehicle Information Network. In Applied Mechanics and Materials (Vol.
475, pp. 699-702). Trans Tech Publications.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7WIRELESS NETWORKS
Sharma, P. (2013). Evolution of mobile wireless communication networks-1G to 5G as well as
future prospective of next generation communication network. International Journal of
Computer Science and Mobile Computing, 2(8), 47-53.
Yuan, W., Wang, X., Linnartz, J. P. M., & Niemegeers, I. G. (2013). Coexistence performance of
IEEE 802.15. 4 wireless sensor networks under IEEE 802.11 b/g interference. Wireless
Personal Communications, 1-22.
Sharma, P. (2013). Evolution of mobile wireless communication networks-1G to 5G as well as
future prospective of next generation communication network. International Journal of
Computer Science and Mobile Computing, 2(8), 47-53.
Yuan, W., Wang, X., Linnartz, J. P. M., & Niemegeers, I. G. (2013). Coexistence performance of
IEEE 802.15. 4 wireless sensor networks under IEEE 802.11 b/g interference. Wireless
Personal Communications, 1-22.
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.