Advanced Wireless Technologies and Security

Verified

Added on  2020/03/02

|6
|1392
|81
AI Summary
This assignment delves into the realm of advanced wireless technologies, focusing on topics such as 5G cellular networks, millimeter-wave antennas for high-speed data transmission, and Voice over Internet Protocol (VoIP). It examines the evolution of antenna design and explores the security vulnerabilities inherent in modern wireless communication systems. The assignment highlights the importance of firewalls and intrusion detection systems in mitigating these threats.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: WIRELESS NETWORKING AND COMMUNICATION
WIRELESS NETWORKING AND COMMUNICATION
Name of the Student
Name of the University

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1WIRELESS NETWORKING AND COMMUNICATION
Question 1
Defining different kinds of antenna:
1. Horn Antennas: A microwave horn or horn antenna is that kind of antenna which
is consist of flaring metal waveguide shaped like a horn for the radio waves to be directed in
a beam. These antennas are used at microwave frequency and UHF which are more than
300MHz (Esquius-Moroteet al., 2013). There are several types of horn antennas and its
catagories the corrugated horn antenna, conical horn and pyramid antennas. The transition
between free space and wave guides are affected on the enabling of this antenna.
Following are the strength and weakness of the Horn antennas:
Strength Weakness
Good impedance match Flare angled and length of the flare must not
be very small
Small minor lobes are formed Decides the directivity
Greater directivity Designing of the flare angle
Narrow beam width
Avoids the standing waves
2. Helical Antennas: Helical antenna consists of wire that can conduct in the form of
a helix. Helical antennas are mostly grounded over a plane ground. Thus, feed line gets
connected between the ground and the bottom of the helix. The frequency by which the
helical antenna operates is from 30MHz to 3GHz (Ju& Zhang, 2014).
Following are the strength and weakness of the Helical antenna:
Document Page
2WIRELESS NETWORKING AND COMMUNICATION
Strength Weakness
Wider bandwidth Efficiency decreases with the number of
turns
Provide polarized waves circularly The antenna size is large so it requires more
space
Have simple design
Also can be used at HF and VHF bands
Highest directivity
3. Yagi Antennas: Yagi antennas are also known as the Yagi-Uda antenna, which is has been
constructed in such a way that is simple but also has higher gain that is greater than 10dB
(Esquius-Moroteet al., 2013). This antenna can be operated in HF to UHF bands that are from
3MHz to 3GHz, therefore has smaller bandwidth. Basically used in the roof tops.
Following are the strength and weakness of the Yagi antenna:
Strength Weakness
High directives is achieved Prone to noise
High gain is achieved Experiences degradation of the electrical
characteristics
Less amount of power is needed Frequency range and bandwidth is limited
Easy of handling and maintenance Prone to atmospheric effects
Broader coverage of frequency
Document Page
3WIRELESS NETWORKING AND COMMUNICATION
4. Cellular Antenna: Cellular antennas are also called the cell antennas. These are basically
used to make conjunction with the help of several power boosters like inline amplifier and
some of them are directly connected with the cell phone adapter cables (Honget al., 2014).
Following are the strength and weakness of the Cellular antenna:
Strength Weakness
Wireless service Effects the environment
Can be used remotely Data and signals might get lost some times
5. Parabolic Reflector Antenna: This is mainly made of metal and screen mesh and is used
for the conjunction with horn antennas. EM-waves falls on the wide dish and the gets radiated
in the air during the transmission.
Following are the strength and weakness of the Parabolic antenna:
Strength Weakness
Wider bandwidth Requires drive element and reflectors
High gain Additional cost may be needed
High directivity Not as small as other antennas thus used in
specific purpose
Future Prospective:
Selection of the Antenna : Helical Antenna

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4WIRELESS NETWORKING AND COMMUNICATION
Reason:
The reason of the selection of the helical antenna is because of the field of radiation
which is at the ned of the end in this mode of radiation (Abbasiet al.,2016).. The end fire is
mainlyb directed in the helical axis. With emohasis on the wave it can be circular or may be
polarized circularly. Minor lobes are created with the direction along the beam axis at the
oblique angles as a result of which the radiation that is proceduced is broader than others
types of antenna. The dimension of the helix is also small when it is compared to the
wavelength of it.
Question 2
Comparing and contrasting CDMA and FDMA
FDMA CDMA
Frequency division multiple access is the
system in which the bandwidth is available
divides in frequencies. FDMA is used mainly
for analog transmission because this
technology is not capable of carrying digital
information. Transmission takes place in
single frequency.
CDMA separates calls by code. Transmitter
should let the receiver know the codeword
that must only be known to single user. The
receiver can only detect the desired pseudo-
code and the narrowband signals are
multiplied by the spreading wideband
signals.
Document Page
5WIRELESS NETWORKING AND COMMUNICATION
Question 3
Advanced wireless technologies: Voice Over IP Network (VoIP) uses the Internet
Protocol that helps in transmitting the voice over an IP network. This transmission is done
through packets, providing the required service to the clients (Ju& Zhang, 2014). This
technology is used in several browsers. The main advantages of using this VoIP are this is
cost effective, facilitates multi-vendor interoperability, data networks and integrated IP
voices. There are several protocols in VoIP like: SIP, MGCP, Megaco, H.248 and H.323.
VoIP applications are broadly used over the internet browsers, used in voice processing, has
to be flexible and thus allow a mixture of private and public service that helps in adapting the
local regulations (Loo, Mauri & Ortiz, 2016).
The security concerns of VoIP are much similar to the internet connected devices this tends
to the hackers knowing the connection’s vulnerability may plant DoS attack, comprise the
voice mails, record all the conversation and data breach the data of the customers. It is a
challenging task to route the VoIP traffic through network address translators or firewalls.
Firewalls can be very much helpful in preventing from unwanted attacks and malware.
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]