logo

Wireless Networking Assignment Case Study

   

Added on  2020-05-28

22 Pages1409 Words141 Views
Running head: WIRELESS NETWORKING-CASE STUDYWireless Networking-Case StudyName of the StudentName of the UniversityAuthor Note

1WIRELESS NETWORKING-CASE STUDYTable of ContentsQuestion 1: WLAN network and Mobile network..........................................................................2Question 2: Security Challenges for WMAN examples..................................................................4Question 3: Critical reflection on the research papers related to ZigBee and IoT...........................5Question 4: Case Study- Telestra....................................................................................................6References........................................................................................................................................7

2WIRELESS NETWORKING-CASE STUDYQuestion 1: WLAN network and Mobile network WLAN networkThe wireless local area network (WLAN) based Co-Channel Interference (CCI) is acrosstalk that uses same frequency however they belong from two different radio transmitters inan area (Jamil, Cariou & Helard, 2014). The dense deployment is the major cause that createsinterference in the co-channel radio crosstalk. The channel reuse provides dynamic control whichhelps to access the sensitivity of received output to improve spatial reuse of the channel that isCo-Channel Interference. The channel reuse has a feature that applies to non-DynamicFrequency Selection (non-DFS) however it does not applies to Dynamic Frequency Selection(DFS). The operation of channel reuse feature can be configured in following modes ofoperation. They are static, dynamic and disable. The static mode is used for coverage-basedadaptation of the Clear Channel Assessment thresholds operations. The dynamic mode is usedfor taking into account the location related to the clients of channel reuse. The disable mode isnot used as it does not support the Clear Channel Assessment detect thresholds for channel reuse.

3WIRELESS NETWORKING-CASE STUDYFigure 1: Channel Reuse in WLANSource: (Created by Author)Mobile Phone NetworksThe mobile phone networks use frequency reuse concept. The mobile phone network issuch that it is distributed over different areas called cells. The mobile phone network uses basestation for transmission of data in various forms such as audio or video. These cells uses set offrequencies that are different from each other. The frequency reuse concept is important as itprovides different frequencies suitable for different areas. The mobile phone network usesfrequencies that are allocated to different areas called cells and each cell uses differentfrequencies. The design of the cells is usually in hexagonal form and the different frequencies

4WIRELESS NETWORKING-CASE STUDYused by different areas prevent interference (Qian et al., 2015). The frequency reuse come intoplay when the cells are separated far away from each other that is frequency can be reused whencells are separated far away from each other. Figure 2: Frequency Reuse in Mobile Phone NetworksSource: (Created by Author)Therefore, the channel reuse is helpful in preventing dense interferences in the channelswhereas frequency reuse is helpful in preventing mutual interferences between cells. The channelreuse is applicable to small areas whereas frequency reuse is applicable to countrywide area.Question 2: Security Challenges for WMAN examplesThe security challenges for WMAN technology examples, DoS attacks and WiMAX arediscussed below.

5WIRELESS NETWORKING-CASE STUDYWiMAX or Worldwide Interoperability for Microwave Access is a type of Wi-Fi thatprovides broad coverage and very high speed unlike standard Wi-Fi. The security challenges aregiven in the following discussion. The first one is lack of quality when many networks use samebase station for communication. The second one is interference due to wireless radio interferenceand adverse weather. The third one is high power consumer due to WiMAX equipments. Theother challenges are water torture attack were the hacker sends continuous frames to receiverresulting in draining or consuming of battery of receiver. The hijacking of signal using radiofrequency receiver is also a concern which needs attention. DOS attack or Denial of Service attacks is a type of attack that is severe and canprevent the legitimate people from using their own system. This attack is defined as the attackwhere the hackers attempt to prevent authorized users from accessing the service on the system(Zhang et al., 2016). The security challenges are given in the following discussion. The first isineffective services that creates problem for authorized people. The second is inaccessibleservices that create a major issue for authorized people as they cannot use their own services.The third is privacy and data breach issue that creates major havoc as sensitive information canbe breached and it can be misused. Question 3: Critical reflection on the research papers related to ZigBee and IoTThe first article is based on future prospective of Internet of Things (IoT). The articlefocuses on current status of Internet of Things. The article focuses on the scenario of Internet ofThings that is developing nowadays and how it will shape in future. The Internet of Things inthis article focuses on three different areas which includes architectural reference model, itsmechanisms and novel resolution infrastructure. The general issues of Internet of Things which

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Paper on Wireless Networking Concepts
|15
|1083
|28

Contrast Frequency Reuse in WLAN
|9
|1518
|344

ITC 513 Wireless Networking Concepts Assignment
|26
|1314
|34

ITC513 Wireless Networking Concept Assignment
|29
|2196
|68

Wireless Networking Assignment: ICT Assignment
|29
|2251
|83

Assignment Wireless Communication
|15
|1529
|40