Wireless Communication Technologies
VerifiedAdded on  2020/05/11
|13
|2886
|64
AI Summary
The provided assignment explores various aspects of wireless communication technology. It encompasses topics such as heterogeneous cellular networks, the comparison between Time Division Multiple Access (TDMA) and Code Division Multiple Access (CDMA), Ultra-Wideband (UWB) antenna designs for WiMAX and WLAN applications, TiO2 nanoparticle photoluminescence, security considerations in IEEE 802.11i, and interference management in femtocell networks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: Wireless Sensor Network
Wireless Sensor Network
Name of the student
Name of the University
Authors note
Wireless Sensor Network
Name of the student
Name of the University
Authors note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1Wireless Sensor Network
Table of Contents
Answer to Question 1..........................................................................................................2
Answer to Question 2..........................................................................................................3
Answer to Question 3..........................................................................................................4
Data Capacity...................................................................................................................5
Service area......................................................................................................................5
Speed of installation........................................................................................................5
Security............................................................................................................................5
Answer to Question 4..........................................................................................................6
Time division multiple Access (TDMA).........................................................................6
Code division multiple access (CDMA)..........................................................................6
Global system for mobile communications (GSM).........................................................7
References............................................................................................................................9
Table of Contents
Answer to Question 1..........................................................................................................2
Answer to Question 2..........................................................................................................3
Answer to Question 3..........................................................................................................4
Data Capacity...................................................................................................................5
Service area......................................................................................................................5
Speed of installation........................................................................................................5
Security............................................................................................................................5
Answer to Question 4..........................................................................................................6
Time division multiple Access (TDMA).........................................................................6
Code division multiple access (CDMA)..........................................................................6
Global system for mobile communications (GSM).........................................................7
References............................................................................................................................9
2Wireless Sensor Network
Answer to Question 1
IEEE stands for Institute of Electrical and Electronics which has a standard of wireless
local area network that is WLAN 802.11 (Ghosh et al., 2012). It has mainly three standard that is
IEEE 802.3 for ethernet, IEEE 802.5 which is known as token ring, IEEE 802.11 for media
access control (MAC) (Bloessl et al., 2013). There are three different types of layer that is FHSS
which stands for frequency hopping spread spectrum, DSSS which stands for direct sequence
spread spectrum (DSSS) and IR that is Infrared (Duarte et al.,2012). The above mentioned
different layer proved to provide a transmission speed of 2 Mbps.
IEEE has two physical layers that is 802.11b and 802.11a, 802.11b has transmission rate
of 11 Mbps on the contrary 802.11a has data transmission rate of 54 Mbps (Naraei, Amiri &
Saberi, 2014). 802.11b works on the principle of DSSS which is Direct Sequence Spread
Spectrum and 802.11a works on the principle of OFDM which stands for orthogonal division
multiplexing. 802.11b operates in the band of 2.4 Ghz and 802.11a operates on the band of 5
GHz.
Advantage of using 802.11b is that it is generally considered to be low cost, range of
signal is very good and the signals are not easily obstructed on the contrary it has some
disadvantages like at the of pick of maximum speed it is found to be slowest one and many
home-based appliances can interfere due to unregulated band of frequency (Ghafouri-Shiraz &
Karbassian, 2012).
Advantage of using 802.11a is that it provides maximum speed and regulated frequency
prevents the interference of signal form other devices on the contrary it has some disadvantage
like cost is high and signal of short range can be easily obstructed (Naraei, Amiri & Saberi,
Answer to Question 1
IEEE stands for Institute of Electrical and Electronics which has a standard of wireless
local area network that is WLAN 802.11 (Ghosh et al., 2012). It has mainly three standard that is
IEEE 802.3 for ethernet, IEEE 802.5 which is known as token ring, IEEE 802.11 for media
access control (MAC) (Bloessl et al., 2013). There are three different types of layer that is FHSS
which stands for frequency hopping spread spectrum, DSSS which stands for direct sequence
spread spectrum (DSSS) and IR that is Infrared (Duarte et al.,2012). The above mentioned
different layer proved to provide a transmission speed of 2 Mbps.
IEEE has two physical layers that is 802.11b and 802.11a, 802.11b has transmission rate
of 11 Mbps on the contrary 802.11a has data transmission rate of 54 Mbps (Naraei, Amiri &
Saberi, 2014). 802.11b works on the principle of DSSS which is Direct Sequence Spread
Spectrum and 802.11a works on the principle of OFDM which stands for orthogonal division
multiplexing. 802.11b operates in the band of 2.4 Ghz and 802.11a operates on the band of 5
GHz.
Advantage of using 802.11b is that it is generally considered to be low cost, range of
signal is very good and the signals are not easily obstructed on the contrary it has some
disadvantages like at the of pick of maximum speed it is found to be slowest one and many
home-based appliances can interfere due to unregulated band of frequency (Ghafouri-Shiraz &
Karbassian, 2012).
Advantage of using 802.11a is that it provides maximum speed and regulated frequency
prevents the interference of signal form other devices on the contrary it has some disadvantage
like cost is high and signal of short range can be easily obstructed (Naraei, Amiri & Saberi,
3Wireless Sensor Network
2014). The advantages and disadvantages of 802.11b and 802.11a are opposite to each other
(Ghosh et al., 2012).
2014). The advantages and disadvantages of 802.11b and 802.11a are opposite to each other
(Ghosh et al., 2012).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4Wireless Sensor Network
Answer to Question 2
a.
802.11i allows for a client device to be authenticated against an authentication server by
making use of given five keys that are Authentication, Authorization and Authorization (AAA)
key, Pairwise Master key (PMK), Pairwise transient key (PTK), Group master key (GMK),
Group temporal key (GTK) (Ngo et al., 2012).
In AAA key the given information is shared between supplicant and authentication server
(AS). The information of key is transmitted securely through a channel between authentication
server and authenticator. The pairwise master key that is PMK is derived from it (Ghafouri-
Shiraz & Karbassian, 2012). PMK is considered to be the highest key which is used within
802.11i. It is derived by the method of extensible authentication protocol (EAP) or can be
directly obtain through PSK. PTK is derived from PMK, AA and many other keys and it
generally splits into five keys. GMK is a key which is used for deriving a key known as group
temporal key (GTK) (Nziko & Scheiner, 2014). GTK which stands for Group temporal key is
nothing but a particular value provided by different broadcast sources limiting the access to data
of media access protocol (Mathew et al., 2012).
b.
VPN stands for virtual private network which the gives the freedom to different
user to access a private network very securely and safely and sharing of data through various
public networks (Mathew et al., 2012). It is similar to firewall which protects the important data
present in the system of a user (Ghafouri-Shiraz & Karbassian, 2012). Firewalls protects the data
through offline method while VPN protect it through online method (Omar, Zhuang & Li, 2013).
Answer to Question 2
a.
802.11i allows for a client device to be authenticated against an authentication server by
making use of given five keys that are Authentication, Authorization and Authorization (AAA)
key, Pairwise Master key (PMK), Pairwise transient key (PTK), Group master key (GMK),
Group temporal key (GTK) (Ngo et al., 2012).
In AAA key the given information is shared between supplicant and authentication server
(AS). The information of key is transmitted securely through a channel between authentication
server and authenticator. The pairwise master key that is PMK is derived from it (Ghafouri-
Shiraz & Karbassian, 2012). PMK is considered to be the highest key which is used within
802.11i. It is derived by the method of extensible authentication protocol (EAP) or can be
directly obtain through PSK. PTK is derived from PMK, AA and many other keys and it
generally splits into five keys. GMK is a key which is used for deriving a key known as group
temporal key (GTK) (Nziko & Scheiner, 2014). GTK which stands for Group temporal key is
nothing but a particular value provided by different broadcast sources limiting the access to data
of media access protocol (Mathew et al., 2012).
b.
VPN stands for virtual private network which the gives the freedom to different
user to access a private network very securely and safely and sharing of data through various
public networks (Mathew et al., 2012). It is similar to firewall which protects the important data
present in the system of a user (Ghafouri-Shiraz & Karbassian, 2012). Firewalls protects the data
through offline method while VPN protect it through online method (Omar, Zhuang & Li, 2013).
5Wireless Sensor Network
VPN can be technically considered same as a WAN (Wide Area Network) as it has a function,
privacy and look similar to a private network (Ghosh et al., 2012). Four five types of known
VPN are IP security, Layer 2 tunneling protocol (L2TP), secure socket layer (SSL) and transport
layer security (TLS), Point to point tunneling protocol (PPTP) and lastly secure shell (SSH)
(Mathew et al., 2012).
IP security mainly aims to provide secure communication over the internet and operates
in two different modes that is transport mode and tunneling mode. L2TP generally provides the
best feature by building up a secure network by making use of VPN clients (Glisic & Leppänen,
2013). SSL and TSL is mainly used by various ecommerce retailer for maintaining security and
providing various kinds of services (Liu et al., 2012). PPTP is a different kind of VPN which
does not encrypt the various commands on the contrary it simply uses tunnels and cover the
different available data packets. SSH aims in creating VPN tunnel and various methods of
encryption for protecting it (Saberi et al., 2012).
Answer to Question 3
WMAN stands for wireless metropolitan area network which is a method of wireless
networking which has function of covering a large area which can be easily taken to be size of a
city (Liu et al., 2012). WMAN tends to cover a large area than wireless local network (WLAN)
on the contrary it covers a smaller area than wireless wide area network (WWAN). WMAN are
generally found to be two types that is point to point and point to multipoint network (Wang,
Zhu, & Gomes, 2012). WMAN are generally found to owned by various bodies like government,
ISP and big corporation.
VPN can be technically considered same as a WAN (Wide Area Network) as it has a function,
privacy and look similar to a private network (Ghosh et al., 2012). Four five types of known
VPN are IP security, Layer 2 tunneling protocol (L2TP), secure socket layer (SSL) and transport
layer security (TLS), Point to point tunneling protocol (PPTP) and lastly secure shell (SSH)
(Mathew et al., 2012).
IP security mainly aims to provide secure communication over the internet and operates
in two different modes that is transport mode and tunneling mode. L2TP generally provides the
best feature by building up a secure network by making use of VPN clients (Glisic & Leppänen,
2013). SSL and TSL is mainly used by various ecommerce retailer for maintaining security and
providing various kinds of services (Liu et al., 2012). PPTP is a different kind of VPN which
does not encrypt the various commands on the contrary it simply uses tunnels and cover the
different available data packets. SSH aims in creating VPN tunnel and various methods of
encryption for protecting it (Saberi et al., 2012).
Answer to Question 3
WMAN stands for wireless metropolitan area network which is a method of wireless
networking which has function of covering a large area which can be easily taken to be size of a
city (Liu et al., 2012). WMAN tends to cover a large area than wireless local network (WLAN)
on the contrary it covers a smaller area than wireless wide area network (WWAN). WMAN are
generally found to be two types that is point to point and point to multipoint network (Wang,
Zhu, & Gomes, 2012). WMAN are generally found to owned by various bodies like government,
ISP and big corporation.
6Wireless Sensor Network
For the given organization that is Zee Tech the best WMAN technology is WiMax
because it provides high bandwidth over a large distance transmission of data (Zhai, Han &
Liang, 2013). WiMax stands for Worldwide Interoperability for Microwave Access which uses
license and unlicensed bands for establishment of wireless communication with a speed of 40
Mbps within a range of 10 kilometers. WiMax proved to provide a link distance within a range
of distance around 50 kilometers. This range factor can be proved beneficial to this organization
that is Zee Tech (Liu et al., 2012).
Data Capacity
WiMAX is designed in such a way that it can easily provide data rate of around 30 to 40
megabits of data in a second and later on in the year of 2011 this technology was updated to
provide a data rate of 1 Gbit per second (Glisic & Leppänen, 2013).
Service area
WiMAX is designed in such a way that it can easily provide data to consumer within a
range of 50 kilometers. This ultimately starts that it can easily cover a whole city with a cell
radius of around 10 kilometers. WiMAX are generally expected to deliver broadband services in
a economical method to residential as well as enterprise customers.
Speed of installation
WiMAX is enables communication around a large distance of around 30 miles. This fact
is to be taken into consideration that longer distance will result slowing of speed on the contrary
it is faster and covers a large distance than Wi-Fi. Telecommunication round globe are planning
for the implementation of WiMAX technology because it is found to provide faster and long-
range coverage in comparison to Wi-Fi.
For the given organization that is Zee Tech the best WMAN technology is WiMax
because it provides high bandwidth over a large distance transmission of data (Zhai, Han &
Liang, 2013). WiMax stands for Worldwide Interoperability for Microwave Access which uses
license and unlicensed bands for establishment of wireless communication with a speed of 40
Mbps within a range of 10 kilometers. WiMax proved to provide a link distance within a range
of distance around 50 kilometers. This range factor can be proved beneficial to this organization
that is Zee Tech (Liu et al., 2012).
Data Capacity
WiMAX is designed in such a way that it can easily provide data rate of around 30 to 40
megabits of data in a second and later on in the year of 2011 this technology was updated to
provide a data rate of 1 Gbit per second (Glisic & Leppänen, 2013).
Service area
WiMAX is designed in such a way that it can easily provide data to consumer within a
range of 50 kilometers. This ultimately starts that it can easily cover a whole city with a cell
radius of around 10 kilometers. WiMAX are generally expected to deliver broadband services in
a economical method to residential as well as enterprise customers.
Speed of installation
WiMAX is enables communication around a large distance of around 30 miles. This fact
is to be taken into consideration that longer distance will result slowing of speed on the contrary
it is faster and covers a large distance than Wi-Fi. Telecommunication round globe are planning
for the implementation of WiMAX technology because it is found to provide faster and long-
range coverage in comparison to Wi-Fi.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7Wireless Sensor Network
Security
Two common security issues of WiMAX are Authentication and Encryption. A basic
principle in WiMAX technology is that each and every subscriber must have a certificate which
will help in unique identification of the subscriber (Duarte et al.,2012). The certificate will make
it difficult for the hacker or attacker to make misuse of identity. In the encryption method, frames
of management are not generally encrypted which allow a hacker or an attacker to gather
information about the different subscriber in an area (Jiang & Che, 2012).
In spite of the various good intention of WiMAX security there are many other attacks
related to it like rogue based station, Dos attacks, man in the middle attacks and manipulation
made in the network by hacker (Glisic & Leppänen, 2013).
Answer to Question 4
Time division multiple Access (TDMA)
Time division multiple access (TDMA) is nothing but a digital cellular technology for
telephonic communication. It provides a platform where user can easily use the same frequency
without any kind of inference (Dunlop, Girma & Irvine, 2013). In this particular technology a
given signal in divided into different time slots which ultimately improves the data carrying
capacity of the given signal.
TDMA is considered to be a complex technology as it needs a proper synchronization
between transmitter and receiver. TDMA is generally uses in digital mobiles for communication
(Jiang & Che, 2012). There are certain advantages of TDMA that is allow flexible rate, number
of slot can be easily changed, no requirement of guard band for wideband system, there is no
requirement of narrowband filter for any given wideband system.
Security
Two common security issues of WiMAX are Authentication and Encryption. A basic
principle in WiMAX technology is that each and every subscriber must have a certificate which
will help in unique identification of the subscriber (Duarte et al.,2012). The certificate will make
it difficult for the hacker or attacker to make misuse of identity. In the encryption method, frames
of management are not generally encrypted which allow a hacker or an attacker to gather
information about the different subscriber in an area (Jiang & Che, 2012).
In spite of the various good intention of WiMAX security there are many other attacks
related to it like rogue based station, Dos attacks, man in the middle attacks and manipulation
made in the network by hacker (Glisic & Leppänen, 2013).
Answer to Question 4
Time division multiple Access (TDMA)
Time division multiple access (TDMA) is nothing but a digital cellular technology for
telephonic communication. It provides a platform where user can easily use the same frequency
without any kind of inference (Dunlop, Girma & Irvine, 2013). In this particular technology a
given signal in divided into different time slots which ultimately improves the data carrying
capacity of the given signal.
TDMA is considered to be a complex technology as it needs a proper synchronization
between transmitter and receiver. TDMA is generally uses in digital mobiles for communication
(Jiang & Che, 2012). There are certain advantages of TDMA that is allow flexible rate, number
of slot can be easily changed, no requirement of guard band for wideband system, there is no
requirement of narrowband filter for any given wideband system.
8Wireless Sensor Network
TDMA has certain disadvantage like high data rate for broadband system generally
depends on complex equalization, because of burst mode a very large amount of bits are
required for proper synchronization (Jiang & Che, 2012). Various electronics devices operating
at a high bit rate results in increasing the rate of energy consumption. Complex processing of
signal is generally required for proper synchronization with small time slots.
Code division multiple access (CDMA)
Code division multiple access technology is a type of multiplexing technology which
allow different signal to adjust in single transmission channel and it generally make use of the
available bandwidth. This technology is generally used in high frequency telephone system
where the range of band is between 800 Mhz to 1.9 Ghz.
CDMA is largely different from TDMA and FDMA and in this technology the user has to
access the total bandwidth for the provided time span (Bloessl et al., 2013). There are certain
advantages of using CDMA that is CDMA has a near and far effect and so proper power control
is required for it (Dunlop, Girma & Irvine, 2013). It offers flexible transfer of signal in which
base station of mobile can easily change without changing the operator.
CDMA has certain disadvantages like proper selection of length of code as a very large
length of code may result in delay and interference, Proper synchronization of time is required,
as there is need of tight control on transmitted and received power this will ultimately result in
various handovers.
Global system for mobile communications (GSM)
GSM stands for global system for mobile communication is nothing but a digital system
for communication which is used all around the globe. GSM make use of change of time division
TDMA has certain disadvantage like high data rate for broadband system generally
depends on complex equalization, because of burst mode a very large amount of bits are
required for proper synchronization (Jiang & Che, 2012). Various electronics devices operating
at a high bit rate results in increasing the rate of energy consumption. Complex processing of
signal is generally required for proper synchronization with small time slots.
Code division multiple access (CDMA)
Code division multiple access technology is a type of multiplexing technology which
allow different signal to adjust in single transmission channel and it generally make use of the
available bandwidth. This technology is generally used in high frequency telephone system
where the range of band is between 800 Mhz to 1.9 Ghz.
CDMA is largely different from TDMA and FDMA and in this technology the user has to
access the total bandwidth for the provided time span (Bloessl et al., 2013). There are certain
advantages of using CDMA that is CDMA has a near and far effect and so proper power control
is required for it (Dunlop, Girma & Irvine, 2013). It offers flexible transfer of signal in which
base station of mobile can easily change without changing the operator.
CDMA has certain disadvantages like proper selection of length of code as a very large
length of code may result in delay and interference, Proper synchronization of time is required,
as there is need of tight control on transmitted and received power this will ultimately result in
various handovers.
Global system for mobile communications (GSM)
GSM stands for global system for mobile communication is nothing but a digital system
for communication which is used all around the globe. GSM make use of change of time division
9Wireless Sensor Network
of multiple access (Duarte et al.,2012). GSM operates in three bands namely 900 Mhz used by
original GSM system and later on 1800 Mhz for supporting the added number of subscriber and
1900 Mhz which is used in America.
GSM has resulted in providing a large number of services like General packet radio
services (GPRS), Enhanced data rates for GSM evolution (EDGE) and lastly Short Message
System (SMS) (Dunlop, Girma & Irvine, 2013). GSM mobile phones can be easily identified by
the help of SIM (Subscriber Identity Module) which contains the subscriber information of user
along with some entries on contact (Bloessl et al., 2013). The biggest advantage of using a SIM
is that is allows user to roam and switch between different carriers with the help of individual
units of mobile.
of multiple access (Duarte et al.,2012). GSM operates in three bands namely 900 Mhz used by
original GSM system and later on 1800 Mhz for supporting the added number of subscriber and
1900 Mhz which is used in America.
GSM has resulted in providing a large number of services like General packet radio
services (GPRS), Enhanced data rates for GSM evolution (EDGE) and lastly Short Message
System (SMS) (Dunlop, Girma & Irvine, 2013). GSM mobile phones can be easily identified by
the help of SIM (Subscriber Identity Module) which contains the subscriber information of user
along with some entries on contact (Bloessl et al., 2013). The biggest advantage of using a SIM
is that is allows user to roam and switch between different carriers with the help of individual
units of mobile.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10Wireless Sensor Network
References
Bloessl, B., Segata, M., Sommer, C., & Dressler, F. (2013, August). An IEEE 802.11 a/g/p
OFDM Receiver for GNU Radio. In Proceedings of the second workshop on
Software radio implementation forum (pp. 9-16). ACM.
Duarte, P. B., Fadlullah, Z. M., Vasilakos, A. V., & Kato, N. (2012). On the partially
overlapped channel assignment on wireless mesh network backbone: A game
theoretic approach. IEEE Journal on Selected Areas in Communications, 30(1), 119-
127.
Dunlop, J., Girma, D., & Irvine, J. (2013). Digital mobile communications and the TETRA
system. John Wiley & Sons.
Ghafouri-Shiraz, H., & Karbassian, M. M. (2012). Optical CDMA networks: principles,
analysis and applications (Vol. 38). John Wiley & Sons.
Ghosh, A., Mangalvedhe, N., Ratasuk, R., Mondal, B., Cudak, M., Visotsky, E., ... &
Dhillon, H. S. (2012). Heterogeneous cellular networks: From theory to
practice. IEEE communications magazine, 50(6).
Glisic, S. G., & Leppänen, P. A. (2013). Wireless communications: TDMA versus CDMA.
Springer Science & Business Media.
Jiang, W., & Che, W. (2012). A novel UWB antenna with dual notched bands for WiMAX
and WLAN applications. IEEE Antennas and Wireless Propagation Letters, 11, 293-
296.
References
Bloessl, B., Segata, M., Sommer, C., & Dressler, F. (2013, August). An IEEE 802.11 a/g/p
OFDM Receiver for GNU Radio. In Proceedings of the second workshop on
Software radio implementation forum (pp. 9-16). ACM.
Duarte, P. B., Fadlullah, Z. M., Vasilakos, A. V., & Kato, N. (2012). On the partially
overlapped channel assignment on wireless mesh network backbone: A game
theoretic approach. IEEE Journal on Selected Areas in Communications, 30(1), 119-
127.
Dunlop, J., Girma, D., & Irvine, J. (2013). Digital mobile communications and the TETRA
system. John Wiley & Sons.
Ghafouri-Shiraz, H., & Karbassian, M. M. (2012). Optical CDMA networks: principles,
analysis and applications (Vol. 38). John Wiley & Sons.
Ghosh, A., Mangalvedhe, N., Ratasuk, R., Mondal, B., Cudak, M., Visotsky, E., ... &
Dhillon, H. S. (2012). Heterogeneous cellular networks: From theory to
practice. IEEE communications magazine, 50(6).
Glisic, S. G., & Leppänen, P. A. (2013). Wireless communications: TDMA versus CDMA.
Springer Science & Business Media.
Jiang, W., & Che, W. (2012). A novel UWB antenna with dual notched bands for WiMAX
and WLAN applications. IEEE Antennas and Wireless Propagation Letters, 11, 293-
296.
11Wireless Sensor Network
Liu, P., Zou, Y., Xie, B., Liu, X., & Sun, B. (2012). Compact CPW-fed tri-band printed
antenna with meandering split-ring slot for WLAN/WiMAX applications. IEEE
Antennas and Wireless Propagation Letters, 11, 1242-1244.
Mathew, S., kumar Prasad, A., Benoy, T., Rakesh, P. P., Hari, M., Libish, T. M., ... &
Vallabhan, C. P. G. (2012). UV-visible photoluminescence of TiO2 nanoparticles
prepared by hydrothermal method. Journal of fluorescence, 22(6), 1563-1569.
Naraei, P., Amiri, I. S., & Saberi, I. (2014). Optimizing IEEE 802.11 i Resource and Security
Essentials: For Mobile and Stationary Devices. Syngress.
Ngo, D. T., Le, L. B., Le-Ngoc, T., Hossain, E., & Kim, D. I. (2012). Distributed interference
management in two-tier CDMA femtocell networks. IEEE Transactions on Wireless
Communications, 11(3), 979
Nziko, V. D. P. N., & Scheiner, S. (2014). Chalcogen bonding between tetravalent SF4 and
amines. The Journal of Physical Chemistry A, 118(45), 10849-10856.
Omar, H. A., Zhuang, W., & Li, L. (2013). VeMAC: A TDMA-based MAC protocol for
reliable broadcast in VANETs. IEEE Transactions on Mobile Computing, 12(9),
1724-1736.
Saberi, I., Shojaie, B., Salleh, M., Niknafskermani, M., & Alavi, S. M. (2012, May).
Improving confidentiality of AES-CCMP in IEEE 802.11 i. In Computer Science and
Software Engineering (JCSSE), 2012 International Joint Conference on (pp. 82-86).
IEEE.
Liu, P., Zou, Y., Xie, B., Liu, X., & Sun, B. (2012). Compact CPW-fed tri-band printed
antenna with meandering split-ring slot for WLAN/WiMAX applications. IEEE
Antennas and Wireless Propagation Letters, 11, 1242-1244.
Mathew, S., kumar Prasad, A., Benoy, T., Rakesh, P. P., Hari, M., Libish, T. M., ... &
Vallabhan, C. P. G. (2012). UV-visible photoluminescence of TiO2 nanoparticles
prepared by hydrothermal method. Journal of fluorescence, 22(6), 1563-1569.
Naraei, P., Amiri, I. S., & Saberi, I. (2014). Optimizing IEEE 802.11 i Resource and Security
Essentials: For Mobile and Stationary Devices. Syngress.
Ngo, D. T., Le, L. B., Le-Ngoc, T., Hossain, E., & Kim, D. I. (2012). Distributed interference
management in two-tier CDMA femtocell networks. IEEE Transactions on Wireless
Communications, 11(3), 979
Nziko, V. D. P. N., & Scheiner, S. (2014). Chalcogen bonding between tetravalent SF4 and
amines. The Journal of Physical Chemistry A, 118(45), 10849-10856.
Omar, H. A., Zhuang, W., & Li, L. (2013). VeMAC: A TDMA-based MAC protocol for
reliable broadcast in VANETs. IEEE Transactions on Mobile Computing, 12(9),
1724-1736.
Saberi, I., Shojaie, B., Salleh, M., Niknafskermani, M., & Alavi, S. M. (2012, May).
Improving confidentiality of AES-CCMP in IEEE 802.11 i. In Computer Science and
Software Engineering (JCSSE), 2012 International Joint Conference on (pp. 82-86).
IEEE.
12Wireless Sensor Network
Wang, J., Zhu, H., & Gomes, N. J. (2012). Distributed antenna systems for mobile
communications in high speed trains. IEEE Journal on Selected Areas in
Communications, 30(4), 675-683.
Zhai, H., Ma, Z., Han, Y., & Liang, C. (2013). A compact printed antenna for triple-band
WLAN/WiMAX applications. IEEE Antennas and Wireless Propagation Letters, 12,
65-68.
Wang, J., Zhu, H., & Gomes, N. J. (2012). Distributed antenna systems for mobile
communications in high speed trains. IEEE Journal on Selected Areas in
Communications, 30(4), 675-683.
Zhai, H., Ma, Z., Han, Y., & Liang, C. (2013). A compact printed antenna for triple-band
WLAN/WiMAX applications. IEEE Antennas and Wireless Propagation Letters, 12,
65-68.
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.