logo

Wireless Network and Security

   

Added on  2022-12-26

11 Pages2748 Words62 Views
Running head: WIRELESS NETWORK AND SECURITY
Wireless Network and Security
Student’s Name
University’s Name
Author’s Note:

1
WIRELESS NETWORK AND SECURITY
Table of Contents
1. Introduction....................................................................................................... 2
2. Motivation.......................................................................................................... 2
3. Comparison of Cellular Networks.......................................................................2
4. 5G Architecture................................................................................................. 5
5. Identification and Analysis of 5G Attacks...........................................................6
6. Identification and Analysis of 5G Limitation in Network Coverage.....................7
7. Conclusion......................................................................................................... 7
References............................................................................................................. 8

2
WIRELESS NETWORK AND SECURITY
1. Introduction
The distinctive types of networks, which could be set up with radio signal
frequencies are termed as wireless networks. The most significant purpose of
such network is to communicate amongst various computerized devices as well
as other network devices [10]. The other names of these wireless networks
include WiFi network or wireless local area network. These networks also provide
few important and noteworthy benefits to the users. 5G connections are termed
as the most significant and advanced modes of wireless networks. This report
would be briefly describing about wireless networks as well as its security after
consideration of details like attacks and architecture.
2. Motivation
The 5th generation or 5G cell technology can be referred to as the highest
advanced and the latest formation of wireless technologies, which fulfil separate
requirements. Every preceding generation of the wireless networks would be 4G,
3G, 2G and 1G [13]. The 5th generation network is digitalized cell network, in
which every specific service area could be covered by subsequent providers as
well as could be sub divided into small geographical areas, called cells. Each and
every associated technology of the 5th generation include LTE Advanced Pro, LTE,
UMTS and GSM. Analog signals majorly represent subsequent sound and image
of the users to get it digitalized in phone, which is also converted with the help of
analog to digitalized converter and get transmitted as respective bit streams. All
the wireless devices of this 5th generation connection in 1 cell subsequently
communicate with the help of radio waves by local antenna arrays as well as low
power automated transceiver [5]. This is being undertaken from the pool of
common frequency after getting it reutilized in the geographically dispersed
cells. Hence, 5th generation can be referred to as the most significant and
efficient wireless network within remaining wireless network.
3. Comparison of Cellular Networks
The brief comparison and contrast amongst every cellular network
generation like 5G, 4G, 3G and 2G after consideration of 5 distinct factors of
comparison is as follows:
Comparis
on
Factors
2G 3G 4G 5G

3
WIRELESS NETWORK AND SECURITY
Communi
cation
Spectrum
The distinctive
communication
spectrum of the
2nd generation
technology
remains within
1 GHz to 200
MHz [4].
The distinctive
communication
spectrum of the
3rd generation
technology
remains within
3 GHZ and 400
MHz.
The distinctive
communicatio
n spectrum of
the 4th
generation
technology
comprises of
few frequency
bands such as
2.5 GHz, 2.3
GHz, 2.1 GHz,
700 MHz and
600 MHz.
The
distinctive
communicatio
n spectrum of
the 5th
generation
technology
requires
spectrum
within three
main
frequency
ranges to
deliver wider
coverage that
are -1GHz,
1GHz to 6GHz
as well as
over 6GHz.
Modulati
on
Techniqu
es used
in the
Networks
Modulation
technique that
is being utilized
within the 2nd
generation
would be
Gaussian
Minimum Shift
Keying or
GMSK.
Modulation
techniques that
are being
utilized within
the 3rd
generation
would be
quadrature
phase shift
keying or QPSK
and quadrature
amplitude
modulation or
QAM.
Modulation
technique that
is being
utilized within
the 4th
generation
would be
single carrier
frequency
division
multiplexing
or SC-FDMA.
Modulation
technique
that is being
utilized within
the 5th
generation
would be
orthogonal
frequency
division
multiplexing
or OFDM.
Medium
Access
Control
The MAC
mechanism of
the 2nd
The MAC
mechanism of
the 3rd
The MAC
mechanism of
the 4th
The MAC
mechanism of
the 5th

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
WIRELESS NETWORK AND SECURITY DISCUSSION 2022
|12
|2964
|26

Wireless Networks and Security
|11
|2619
|37

Wireless Network and Security
|11
|2797
|1

The wireless network and security
|10
|3158
|18

Evaluation On 5g Network And Security Report
|20
|2663
|31

5G Networks | Wireless Networks and Security
|11
|2788
|27