Wireless Communication Network Analysis
VerifiedAdded on 2020/10/22
|21
|1732
|89
AI Summary
The provided assignment delves into the realm of wireless communication networks, examining their characteristics and the trade-offs involved in designing such systems. The discussion touches on the strength of network presence in wireless networks, which can both facilitate management and compromise security throughput. The summary highlights key points from the reference list, which includes various research papers and articles related to wireless networks and their applications.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Wireless Networking
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................3
PART A...........................................................................................................................................3
Describe RFID and NFC network and explain security considerations and challenges.............3
a) Does every laptop ping every other laptop through the authenticated connections? Explain
the communication process.........................................................................................................4
b) What happens when the channel is changed on any of the access points...............................5
c) What happens if there is a passphrase mismatch between the clients and the access points..5
PART B............................................................................................................................................6
Overview of your design.............................................................................................................6
Reasons for proposed wireless technologies...............................................................................6
How it meets the specified project goals....................................................................................6
Discuss specific technical design issues or trade-offs that you have made in your design. .......6
CONCLUSION................................................................................................................................8
INTRODUCTION...........................................................................................................................2
INTRODUCTION...........................................................................................................................3
PART A...........................................................................................................................................3
Describe RFID and NFC network and explain security considerations and challenges.............3
a) Does every laptop ping every other laptop through the authenticated connections? Explain
the communication process.........................................................................................................4
b) What happens when the channel is changed on any of the access points...............................5
c) What happens if there is a passphrase mismatch between the clients and the access points..5
PART B............................................................................................................................................6
Overview of your design.............................................................................................................6
Reasons for proposed wireless technologies...............................................................................6
How it meets the specified project goals....................................................................................6
Discuss specific technical design issues or trade-offs that you have made in your design. .......6
CONCLUSION................................................................................................................................8
INTRODUCTION...........................................................................................................................2
INTRODUCTION
Wireless networking is a type of method which help for communicating form one place
to another place by using communication device. This network will establish connection between
one node to another. Wireless network includes mobile phones, sensor, local area network and
satellite communication etc. This report will discuss about the RFID and NFC work in wireless
network. This report will describe Internet of things to establish connection and connect devices
in wirelessly.
PART A
Describe RFID and NFC network and explain security considerations and challenges
RFID is radio frequency identification and security method which help for wireless
network to maintain their signals effective manner. RFID is backbone of internet of things and
near field communication system. RF system is plays important role in data security and
counterfeiting issues while hardware embedded and on chip security based on physical functions.
The major aim of RFID is to use the latest technology and technique utilised the concept of
identifications and security respectively.
NFC is near filed communication technique for communicating with user and it also
useful for storing the details of credit card information of user. It is very important for securing
the private information so it required for use NFC technology to manage the information’s
effectively and efficiently. There is various type security attack such as data corruption, physical
thefts, interception attacks and NFC technique help for preventing by data breach.
Security considerations and challenges-
There are some important security challenges in Near Frequency communication network
discuss in followings:
Eavesdropping- This is the main security issue that affect the wireless network and NFC is
communication technology by using radio frequency waves etc.
Denial of services- This attack has done by exchanging data between two different devices and
data sent by sending devices that is decoded by second device.
Secure channel- Secure channel useful for NFC device to easily set up and protect their data
send form modifications. This protocol is help for communicating between parties to hold secret
key.
Wireless networking is a type of method which help for communicating form one place
to another place by using communication device. This network will establish connection between
one node to another. Wireless network includes mobile phones, sensor, local area network and
satellite communication etc. This report will discuss about the RFID and NFC work in wireless
network. This report will describe Internet of things to establish connection and connect devices
in wirelessly.
PART A
Describe RFID and NFC network and explain security considerations and challenges
RFID is radio frequency identification and security method which help for wireless
network to maintain their signals effective manner. RFID is backbone of internet of things and
near field communication system. RF system is plays important role in data security and
counterfeiting issues while hardware embedded and on chip security based on physical functions.
The major aim of RFID is to use the latest technology and technique utilised the concept of
identifications and security respectively.
NFC is near filed communication technique for communicating with user and it also
useful for storing the details of credit card information of user. It is very important for securing
the private information so it required for use NFC technology to manage the information’s
effectively and efficiently. There is various type security attack such as data corruption, physical
thefts, interception attacks and NFC technique help for preventing by data breach.
Security considerations and challenges-
There are some important security challenges in Near Frequency communication network
discuss in followings:
Eavesdropping- This is the main security issue that affect the wireless network and NFC is
communication technology by using radio frequency waves etc.
Denial of services- This attack has done by exchanging data between two different devices and
data sent by sending devices that is decoded by second device.
Secure channel- Secure channel useful for NFC device to easily set up and protect their data
send form modifications. This protocol is help for communicating between parties to hold secret
key.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Set up wireless network with the help of Packet tracer simulation software-
Illustration 1: Fig:1
§
Figure :1 show set up different network by using Packet tracer simulation software to connect
with different devices and configuration. All the laptops are connected to access point to share
information effective manner.
a) Does every laptop ping every other laptop through the authenticated connections? Explain the
communication process
Each and every laptop are connected to each other and establish authentication
connection which help for sharing information from one place to another. First all set up
connection by using wireless network. It is simple process for create simple network for
assigning network information to each laptop such as
laptop A:
Illustration 1: Fig:1
§
Figure :1 show set up different network by using Packet tracer simulation software to connect
with different devices and configuration. All the laptops are connected to access point to share
information effective manner.
a) Does every laptop ping every other laptop through the authenticated connections? Explain the
communication process
Each and every laptop are connected to each other and establish authentication
connection which help for sharing information from one place to another. First all set up
connection by using wireless network. It is simple process for create simple network for
assigning network information to each laptop such as
laptop A:
IP Address: 10.0.c.1/0
Subnet mask: 255.255.255.0
Laptop B:
IP Address: 10.0.02/8
Subnet mask: 255.255.255.0
Gateway:
DNS Servers:
The internet connection sharing information from one laptop to another, it will set the other
laptop to obtain an IP Address automatically and the laptop will able to access internet by using
wireless network and after completion configuration, laptop one can connect with another system
to share file by wireless network.
b) What happens when the channel is changed on any of the access points
Each and every wireless network has wide range and it is just for access points into
different wireless transmission specs. All devices that are configured to communicate using the
spec. Most of time, wireless network is creating default channel is move from one access point to
another access point.
Changing channel provide the limiting amount of broad caster in their local areas. By
limiting, the device gets clean the signals and increase the speed in different range. By changing
the channel so that eliminate the interferences and many routers will help to detect the
interference on default channel.
Design network by using Packet tracer software: -
This network is logical IP network that is dividing into different sub networks. It provides
the security which help for securing their data in proper manner. This network will important
part of organization for improving the performance of speed and capability. Design an efficient
network by using packet tracer software in given below:
Subnet mask: 255.255.255.0
Laptop B:
IP Address: 10.0.02/8
Subnet mask: 255.255.255.0
Gateway:
DNS Servers:
The internet connection sharing information from one laptop to another, it will set the other
laptop to obtain an IP Address automatically and the laptop will able to access internet by using
wireless network and after completion configuration, laptop one can connect with another system
to share file by wireless network.
b) What happens when the channel is changed on any of the access points
Each and every wireless network has wide range and it is just for access points into
different wireless transmission specs. All devices that are configured to communicate using the
spec. Most of time, wireless network is creating default channel is move from one access point to
another access point.
Changing channel provide the limiting amount of broad caster in their local areas. By
limiting, the device gets clean the signals and increase the speed in different range. By changing
the channel so that eliminate the interferences and many routers will help to detect the
interference on default channel.
Design network by using Packet tracer software: -
This network is logical IP network that is dividing into different sub networks. It provides
the security which help for securing their data in proper manner. This network will important
part of organization for improving the performance of speed and capability. Design an efficient
network by using packet tracer software in given below:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
c) What happens if there is a passphrase mismatch between the clients and the access points
In this software, the client and access point mismatch because access point has unique
identifier that establish wireless networking to maintain the wireless connectivity. Multiple
access point can used same unique identifier which establish wireless connection between client
and access point. Sometimes access point doesn't mismatch the wireless clients and not connect
with the applications.
Packet tracer
A69050.ppt
In this software, the client and access point mismatch because access point has unique
identifier that establish wireless networking to maintain the wireless connectivity. Multiple
access point can used same unique identifier which establish wireless connection between client
and access point. Sometimes access point doesn't mismatch the wireless clients and not connect
with the applications.
Packet tracer
A69050.ppt
PART B
Overview of your design
The wireless communication network stablish connection between sender and receiver
which help for creating an efficient network to manage their entire process effectively and
efficiently. For creating strong network, it is important for using packet tracer software that
applicable in wireless architecture for generate connection oriented. According to this figure:1, it
concludes that there are different devices and having various access points to connect with
common server and switch. The switch will transfer the signals to all hardware and sharing
information form one device to another.
Reasons for proposed wireless technologies
There is various reason for proposing wireless technologies discuss in given below:
It is very efficient network useful for communication purpose.
It is the fastest network
It is reliable and flexible for establishing strong network.
How it meets the specified project goals
There are some specific criteria to meet the requirement of project goals.
To identify the technical need and requirement of performance, time, quality and cost of
project.
It can use technical software like packet tracer software help for creating a strong and
efficient wireless network.
Discuss specific technical design issues or trade-offs that you have made in your design.
Wireless communication network is wide range of technologies including electronic
devices, routers, switches and hubs etc. This is useful for control network protocol and algorithm
that are included in technologies. Wireless technology set up specific constraints and challenges
in communication network. Public switched network, internet and telephone switched network
are special constraints make it difficult to design wireless network.
Trader-off issues in wireless network-
There are various fundamental trade-offs in between throughput in encryption based wireless and
security.
Overview of your design
The wireless communication network stablish connection between sender and receiver
which help for creating an efficient network to manage their entire process effectively and
efficiently. For creating strong network, it is important for using packet tracer software that
applicable in wireless architecture for generate connection oriented. According to this figure:1, it
concludes that there are different devices and having various access points to connect with
common server and switch. The switch will transfer the signals to all hardware and sharing
information form one device to another.
Reasons for proposed wireless technologies
There is various reason for proposing wireless technologies discuss in given below:
It is very efficient network useful for communication purpose.
It is the fastest network
It is reliable and flexible for establishing strong network.
How it meets the specified project goals
There are some specific criteria to meet the requirement of project goals.
To identify the technical need and requirement of performance, time, quality and cost of
project.
It can use technical software like packet tracer software help for creating a strong and
efficient wireless network.
Discuss specific technical design issues or trade-offs that you have made in your design.
Wireless communication network is wide range of technologies including electronic
devices, routers, switches and hubs etc. This is useful for control network protocol and algorithm
that are included in technologies. Wireless technology set up specific constraints and challenges
in communication network. Public switched network, internet and telephone switched network
are special constraints make it difficult to design wireless network.
Trader-off issues in wireless network-
There are various fundamental trade-offs in between throughput in encryption based wireless and
security.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The strength of network present in wireless network and it will prevent to manage the entire
network system. On the other hand, It will twist the security through put in trade off.
CONCLUSION
As per discussion, it can conclude that wireless communication network is the best
method for interacting form one device to another by using signals. Data will transfer in the form
packet to their destinations. It also helps for establishing connection between client to server.
network system. On the other hand, It will twist the security through put in trade off.
CONCLUSION
As per discussion, it can conclude that wireless communication network is the best
method for interacting form one device to another by using signals. Data will transfer in the form
packet to their destinations. It also helps for establishing connection between client to server.
REFERENCES
Books and Journals:
Azharuddin, M., & Jana, P. K. (2015). A distributed algorithm for energy efficient and fault
tolerant routing in wireless sensor networks. Wireless Networks, 21(1), 251-267.
Baştuğ, E., Bennis, M., & Debbah, M. (2014). Living on the edge: The role of proactive caching
in 5G wireless networks. arXiv preprint arXiv:1405.5974.
Batra, P. K., & Kant, K. (2016). LEACH-MAC: a new cluster head selection algorithm for
Wireless Sensor Networks. Wireless Networks, 22(1), 49-60.
Chin, W. H., Fan, Z., & Haines, R. (2014). Emerging technologies and research challenges for
5G wireless networks. IEEE Wireless Communications, 21(2), 106-112.
Halder, S., & Ghosal, A. (2016). A survey on mobile anchor assisted localization techniques in
wireless sensor networks. Wireless Networks, 22(7), 2317-2336.
Jiang, D., Ying, X., Han, Y., & Lv, Z. (2016). Collaborative multi-hop routing in cognitive
wireless networks. Wireless personal communications, 86(2), 901-923.
Rao, P. S., & Banka, H. (2017). Novel chemical reaction optimization based unequal clustering
and routing algorithms for wireless sensor networks. Wireless Networks, 23(3), 759-778.
Willig, A., & Uhlemann, E. (2014). Deadline-aware scheduling of cooperative relayers in
TDMA-based wireless industrial networks. Wireless networks, 20(1), 73-88.
Zhao, N., Yu, F. R., & Leung, V. C. (2015). Opportunistic communications in interference
alignment networks with wireless power transfer. IEEE Wireless Communications, 22(1),
88-95.
Zhao, N., Yu, F. R., & Leung, V. C. (2015). Wireless energy harvesting in interference alignment
networks. IEEE Communications Magazine, 53(6), 72-78.
Books and Journals:
Azharuddin, M., & Jana, P. K. (2015). A distributed algorithm for energy efficient and fault
tolerant routing in wireless sensor networks. Wireless Networks, 21(1), 251-267.
Baştuğ, E., Bennis, M., & Debbah, M. (2014). Living on the edge: The role of proactive caching
in 5G wireless networks. arXiv preprint arXiv:1405.5974.
Batra, P. K., & Kant, K. (2016). LEACH-MAC: a new cluster head selection algorithm for
Wireless Sensor Networks. Wireless Networks, 22(1), 49-60.
Chin, W. H., Fan, Z., & Haines, R. (2014). Emerging technologies and research challenges for
5G wireless networks. IEEE Wireless Communications, 21(2), 106-112.
Halder, S., & Ghosal, A. (2016). A survey on mobile anchor assisted localization techniques in
wireless sensor networks. Wireless Networks, 22(7), 2317-2336.
Jiang, D., Ying, X., Han, Y., & Lv, Z. (2016). Collaborative multi-hop routing in cognitive
wireless networks. Wireless personal communications, 86(2), 901-923.
Rao, P. S., & Banka, H. (2017). Novel chemical reaction optimization based unequal clustering
and routing algorithms for wireless sensor networks. Wireless Networks, 23(3), 759-778.
Willig, A., & Uhlemann, E. (2014). Deadline-aware scheduling of cooperative relayers in
TDMA-based wireless industrial networks. Wireless networks, 20(1), 73-88.
Zhao, N., Yu, F. R., & Leung, V. C. (2015). Opportunistic communications in interference
alignment networks with wireless power transfer. IEEE Wireless Communications, 22(1),
88-95.
Zhao, N., Yu, F. R., & Leung, V. C. (2015). Wireless energy harvesting in interference alignment
networks. IEEE Communications Magazine, 53(6), 72-78.
Packet Tracer File:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
1 out of 21
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.