Ask a question from expert

Ask now

Wireless Networks and Security - Doc

9 Pages2701 Words60 Views
   

Added on  2021-06-14

Wireless Networks and Security - Doc

   Added on 2021-06-14

BookmarkShareRelated Documents
Running head: WIRELESS NETWORKS AND SECURITYWireless Networks and SecurityName of the StudentName of the UniversityAuthor’s Note:
Wireless Networks and Security - Doc_1
1WIRELESS NETWORKS AND SECURITYTable of ContentsIntroduction...........................................................................................................................................2Discussion..............................................................................................................................................21. Comparison of Wireless Communication Technologies.................................................................22. Evaluation of Wireless Communication Standards for IoT and Cyber Physical Systems................43. Wireless Network Performance.....................................................................................................6Conclusion.............................................................................................................................................6References.............................................................................................................................................7
Wireless Networks and Security - Doc_2
2WIRELESS NETWORKS AND SECURITYIntroductionWireless networks are the types of computer networks, which could not be connected withthe help of cables. The typical methodology, through which various telecommunication networks aswell as the business installations, introduce the connection, without involving any cables or wireswithin it is known as wireless networking [3]. This wireless network of telecommunication areusually implemented, incorporated or administrated with the help of radio communication. Theimplementation of wireless communication occurs within the physical layer in the network structureof OSI model. The following report provides a brief discussion on the entire concept of wirelesstelecommunications with relevant details. This report will be focusing on the various technologies ofwireless networking as well as their securities. The report is divided into three major parts. The firstpart covers a detailed comparison of technologies of wireless communication on the basis of fewfactors. The second part covers the distinct evaluation for nine wireless standards for cyber physicalsystems and internet of things. The third part covers the justification for the performance of the bestnetwork based on evaluation. Discussion1. Comparison of Wireless Communication TechnologiesWireless communication technology plays the most vital role in regular life. It is the sole partof daily activities [14]. The data transmission or information transmission from any one place to theother without the connection of wires is known as wireless communication. It allows the dataexchange without the help of conductors and via radio signals or radio frequencies. The informationthat is being transmitted between the various devices covers distances from few meters tothousands of kilometres. This transmission is done via several well defined channels [1]. The variouskinds of signals that are utilized for communication within wireless data transmission mainly includeradio frequency, microwave, infrared and light wave transmissions. The three popular wireless communication technologies are Worldwide Interoperability forMicrowave Access or WiMax, Wi-Fi or Wireless Fidelity and Satellite communication [9]. The propercomparison between these three wireless communication technologies on the basis of fourimportant factors, i.e. communication spectrum, techniques for modulation, MAC or medium accesscontrol and various network topologies is given below:
Wireless Networks and Security - Doc_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireless Network and Security
|8
|2312
|88

Wireless Networks and Security Name of the University Author's Name
|7
|1934
|291

Wireless Network and Security: Assignment
|9
|2205
|22

Wireless Network and Security Name of the University Author's Name
|9
|2695
|285

Wireless Network and Security - Assignment
|8
|2350
|16

Evaluation of LTE/LTE-A Network Security
|11
|2487
|236