Wireless Networking Concepts: A Study
VerifiedAdded on 2020/05/28
|15
|1083
|28
AI Summary
This assignment examines various facets of wireless networking. It begins by comparing and contrasting channel reuse in WLANs with frequency reuse in mobile phone networks, using diagrams for illustration. Two examples of WMAN technologies, Wi-Fi and WiMAX, are analyzed for their respective security challenges. Furthermore, the assignment requires a critical reflection on energy harvesting within the context of IoT based on two recent research papers. Finally, it tasks students with creating a presentation on the Telestra case study.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: WIRELESS NETWORKING CONCEPTS
Wireless Networking Concepts
Name of the Student
Name of the University
Author’s Note:
Wireless Networking Concepts
Name of the Student
Name of the University
Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2
WIRELESS NETWORKING CONCEPTS
Table of Contents
Question 1..................................................................................................................................3
Question 2..................................................................................................................................4
Question 3..................................................................................................................................5
Question 4..................................................................................................................................6
References................................................................................................................................14
WIRELESS NETWORKING CONCEPTS
Table of Contents
Question 1..................................................................................................................................3
Question 2..................................................................................................................................4
Question 3..................................................................................................................................5
Question 4..................................................................................................................................6
References................................................................................................................................14
3
WIRELESS NETWORKING CONCEPTS
Question 1
Compare and contrast Channel reuse in WLAN with frequency reuse in Mobile Phone
networks? Explain with the help of diagrams.
Answer: Channel reuse in wireless local area of network in the mobile phone networks
usually allows control on the side of the receiver. The major characteristic of this channel
reuse is that it is always applied to the non-DFS or non distributed file system (Ghosh et al.,
2012). Channel reuse is altered internally for the several types of distributed file system and it
never affects radar signature. This is configured for the utilization of three distinct modes of
disable, dynamic and static.
Figure 1: Channel Reuse in WLAN
(Source: )
Frequency is generally allocated to several types of cellular networks in the form of
patterns. The base station is responsible for the maintenance of the cells (Hajli & Lin, 2016).
WIRELESS NETWORKING CONCEPTS
Question 1
Compare and contrast Channel reuse in WLAN with frequency reuse in Mobile Phone
networks? Explain with the help of diagrams.
Answer: Channel reuse in wireless local area of network in the mobile phone networks
usually allows control on the side of the receiver. The major characteristic of this channel
reuse is that it is always applied to the non-DFS or non distributed file system (Ghosh et al.,
2012). Channel reuse is altered internally for the several types of distributed file system and it
never affects radar signature. This is configured for the utilization of three distinct modes of
disable, dynamic and static.
Figure 1: Channel Reuse in WLAN
(Source: )
Frequency is generally allocated to several types of cellular networks in the form of
patterns. The base station is responsible for the maintenance of the cells (Hajli & Lin, 2016).
4
WIRELESS NETWORKING CONCEPTS
For the mobile phones, the cells have the structure of hexagon. The cells ensure if there is any
similarity amongst the interference for several users (Gamage et al., 2014). Te contiguous
cells further make the utilization of all the various types of frequencies. Most of the time, the
frequency is clustered on the cells. These clustered frequencies are often reused in several
types of the regular pattern for the complete utilization of networks.
Figure 2: Frequency Reuse
(Source: )
Question 2
Research the security challenges for any two examples of WMAN technologies.
Answer: The two examples of WMAN technologies are the Wi-fi and WiMAX. The security
challenges of these two above mentioned WMAN technologies are as follows:
i) Wi-Fi: Wi-fi or wireless fiction is a wireless technology that provides fast
networking to a broad area with extremely less complexities (Duarte et al., 2014). The
security challenges of this technology are as follows:
WIRELESS NETWORKING CONCEPTS
For the mobile phones, the cells have the structure of hexagon. The cells ensure if there is any
similarity amongst the interference for several users (Gamage et al., 2014). Te contiguous
cells further make the utilization of all the various types of frequencies. Most of the time, the
frequency is clustered on the cells. These clustered frequencies are often reused in several
types of the regular pattern for the complete utilization of networks.
Figure 2: Frequency Reuse
(Source: )
Question 2
Research the security challenges for any two examples of WMAN technologies.
Answer: The two examples of WMAN technologies are the Wi-fi and WiMAX. The security
challenges of these two above mentioned WMAN technologies are as follows:
i) Wi-Fi: Wi-fi or wireless fiction is a wireless technology that provides fast
networking to a broad area with extremely less complexities (Duarte et al., 2014). The
security challenges of this technology are as follows:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
5
WIRELESS NETWORKING CONCEPTS
a) Unauthorized Access to Data: Wi-Fi has a major problem of authorized data access
(Leith et al., 2012).
b) DOS or Denial of Service: DoS attacks are extremely common for Wi-Fi.
c) Alteration of information: The information is often altered or theft in Wi-fi.
ii) WiMax: WiMAx or Worldwide Interoperability for Microwave Access is an
important technology of WMAN (Bellalta, 2016). The security challenges of WiMax are as
follows:
a) Lack of Authentication: WiMAX has a security issue because of the lack of
authentication.
b) Lack of encryption: The data is not encrypted in WiMAX.
c) DoS attacks: DoS attacks are very common for WiMAX.
Question 3
Read the two recent research papers on the topic of Internet of Things (IoT) as saved in the
resources folder; please give your critical reflection on the topic of Energy Harvest.
Answer: I have gone through the two research papers on IoT.
The first paper, i.e., “Design and Simulation of State-of-Art Zigbee Transmitter for
IoT Wireless Devices”, discusses about ZigBee technology. The extraordinary demands for
the low consumption of data and network have created ZigBee technology (Elarabi, Deep &
Rai, 2015). It is WPAN technology with extremely less cost and lower rate of data. ZigBee
can operate in the frequency bands of 868MHz, 915MHz and 2.4GHz. It has a potential
application in IoT.
WIRELESS NETWORKING CONCEPTS
a) Unauthorized Access to Data: Wi-Fi has a major problem of authorized data access
(Leith et al., 2012).
b) DOS or Denial of Service: DoS attacks are extremely common for Wi-Fi.
c) Alteration of information: The information is often altered or theft in Wi-fi.
ii) WiMax: WiMAx or Worldwide Interoperability for Microwave Access is an
important technology of WMAN (Bellalta, 2016). The security challenges of WiMax are as
follows:
a) Lack of Authentication: WiMAX has a security issue because of the lack of
authentication.
b) Lack of encryption: The data is not encrypted in WiMAX.
c) DoS attacks: DoS attacks are very common for WiMAX.
Question 3
Read the two recent research papers on the topic of Internet of Things (IoT) as saved in the
resources folder; please give your critical reflection on the topic of Energy Harvest.
Answer: I have gone through the two research papers on IoT.
The first paper, i.e., “Design and Simulation of State-of-Art Zigbee Transmitter for
IoT Wireless Devices”, discusses about ZigBee technology. The extraordinary demands for
the low consumption of data and network have created ZigBee technology (Elarabi, Deep &
Rai, 2015). It is WPAN technology with extremely less cost and lower rate of data. ZigBee
can operate in the frequency bands of 868MHz, 915MHz and 2.4GHz. It has a potential
application in IoT.
6
WIRELESS NETWORKING CONCEPTS
The second paper, i.e., “From Today’s Intranet of Things to a Future Internet of
Things: A Wireless-And Mobility-Related View” discusses about the recent situation of
various Intranets of Things must change into more heterogeneous system (Zorzi et al., 2010).
There are several technical challenges of wireless-and mobility-related view.
Question 4
Create a presentation on the Telestra Case Study.
Answer:
WIRELESS NETWORKING CONCEPTS
The second paper, i.e., “From Today’s Intranet of Things to a Future Internet of
Things: A Wireless-And Mobility-Related View” discusses about the recent situation of
various Intranets of Things must change into more heterogeneous system (Zorzi et al., 2010).
There are several technical challenges of wireless-and mobility-related view.
Question 4
Create a presentation on the Telestra Case Study.
Answer:
7
WIRELESS NETWORKING CONCEPTS
WIRELESS NETWORKING CONCEPTS
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
8
WIRELESS NETWORKING CONCEPTS
WIRELESS NETWORKING CONCEPTS
9
WIRELESS NETWORKING CONCEPTS
WIRELESS NETWORKING CONCEPTS
10
WIRELESS NETWORKING CONCEPTS
WIRELESS NETWORKING CONCEPTS
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
11
WIRELESS NETWORKING CONCEPTS
WIRELESS NETWORKING CONCEPTS
12
WIRELESS NETWORKING CONCEPTS
WIRELESS NETWORKING CONCEPTS
13
WIRELESS NETWORKING CONCEPTS
WIRELESS NETWORKING CONCEPTS
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
14
WIRELESS NETWORKING CONCEPTS
References
Bellalta, B. (2016). IEEE 802.11 ax: High-efficiency WLANs. IEEE Wireless
Communications, 23(1), 38-46.
Duarte, M., Sabharwal, A., Aggarwal, V., Jana, R., Ramakrishnan, K. K., Rice, C. W., &
Shankaranarayanan, N. K. (2014). Design and characterization of a full-duplex
multiantenna system for WiFi networks. IEEE Transactions on Vehicular
Technology, 63(3), 1160-1177.
Elarabi, T., Deep, V., & Rai, C. K. (2015, December). Design and simulation of state-of-art
ZigBee transmitter for IoT wireless devices. In Signal Processing and Information
Technology (ISSPIT), 2015 IEEE International Symposium on(pp. 297-300). IEEE.
Gamage, A. T., Liang, H., Zhang, R., & Shen, X. (2014). Device-to-device communication
underlaying converged heterogeneous networks. IEEE Wireless
Communications, 21(6), 98-107.
Ghosh, A., Mangalvedhe, N., Ratasuk, R., Mondal, B., Cudak, M., Visotsky, E., ... &
Dhillon, H. S. (2012). Heterogeneous cellular networks: From theory to
practice. IEEE communications magazine, 50(6).
Hajli, N., & Lin, X. (2016). Exploring the security of information sharing on social
networking sites: The role of perceived control of information. Journal of Business
Ethics, 133(1), 111-123.
Leith, D. J., Clifford, P., Badarla, V., & Malone, D. (2012). WLAN channel selection without
communication. Computer Networks, 56(4), 1424-1441.
WIRELESS NETWORKING CONCEPTS
References
Bellalta, B. (2016). IEEE 802.11 ax: High-efficiency WLANs. IEEE Wireless
Communications, 23(1), 38-46.
Duarte, M., Sabharwal, A., Aggarwal, V., Jana, R., Ramakrishnan, K. K., Rice, C. W., &
Shankaranarayanan, N. K. (2014). Design and characterization of a full-duplex
multiantenna system for WiFi networks. IEEE Transactions on Vehicular
Technology, 63(3), 1160-1177.
Elarabi, T., Deep, V., & Rai, C. K. (2015, December). Design and simulation of state-of-art
ZigBee transmitter for IoT wireless devices. In Signal Processing and Information
Technology (ISSPIT), 2015 IEEE International Symposium on(pp. 297-300). IEEE.
Gamage, A. T., Liang, H., Zhang, R., & Shen, X. (2014). Device-to-device communication
underlaying converged heterogeneous networks. IEEE Wireless
Communications, 21(6), 98-107.
Ghosh, A., Mangalvedhe, N., Ratasuk, R., Mondal, B., Cudak, M., Visotsky, E., ... &
Dhillon, H. S. (2012). Heterogeneous cellular networks: From theory to
practice. IEEE communications magazine, 50(6).
Hajli, N., & Lin, X. (2016). Exploring the security of information sharing on social
networking sites: The role of perceived control of information. Journal of Business
Ethics, 133(1), 111-123.
Leith, D. J., Clifford, P., Badarla, V., & Malone, D. (2012). WLAN channel selection without
communication. Computer Networks, 56(4), 1424-1441.
15
WIRELESS NETWORKING CONCEPTS
Zorzi, M., Gluhak, A., Lange, S., & Bassi, A. (2010). From today's intranet of things to a
future internet of things: a wireless-and mobility-related view. IEEE Wireless
Communications, 17(6).
WIRELESS NETWORKING CONCEPTS
Zorzi, M., Gluhak, A., Lange, S., & Bassi, A. (2010). From today's intranet of things to a
future internet of things: a wireless-and mobility-related view. IEEE Wireless
Communications, 17(6).
1 out of 15
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.