Analysis of Wireless Networking: Antennas, Protocols, and SDN Review

Verified

Added on  2023/06/07

|9
|2389
|168
Report
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CONCEPTS OF WIRELESS NETWORKING
Concepts of Wireless Networking
Name of the Student
Name of the University
Author’s note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CONCEPTS OF WIRELESS NETWORKING
1. Antenna Technologies
Yagi Antenna – This antenna is defined as a unidirectional based antenna. This type of
antenna comprises of many driven elements, which would be folded dipole and would also
comprise of many added elements. The Yagi antenna comprises of a single reflector provided
with some additional directors, which would be able to radiate the energy in a unidirectional
manner. The Yagi antennas are mainly used for implementation of point-to-point form of
communications (Sun et al., 2013).
Strengths – The width of the beam of the signal ranges from 50 – 70 degrees. Hence, this
antenna is useful as they are able to receive even much lower strength of signals. The higher
amount of gain within the yagi antennas have the capability to provide a good coverage of signal
to the communicating devices. The cost of these antennas are comparatively low than the log
periodic antennas (Wu et al., 2014).
Weakness – One of the major form of weakness in these antennas is the limited range of
bandwidth or frequency. The strength of the signals within these antennas would get degraded
when these antennas get moved to some limited form of frequencies.
Horn Antenna – This antenna is mainly used during the processes of response and the
broadcast of information or microwave based signals. The flared portion within these kinds of
antennas could be conical, square or rectangular in shape. The concentrated amount of response
and radiation of signals from this antenna could be corresponded from the horn axis. Pyramidal
Horn, Sectoral Horn and Conical Horn are the various kinds of horn antenna (Hur et al., 2014).
Document Page
2CONCEPTS OF WIRELESS NETWORKING
Strengths – These antennas serve as an active element. The horn antenna helps in the
directing the signal and thus help in gaining higher amount of signals. This would be made
possible with the use of higher gains within the reflective dish (Pan et al., 2013).
Weakness – The amount of gain present within the horn antenna is within the range
capacity of 20 dB. The length of the horn antenna should be lengthy such that it would be able to
capture the maximum amount of gain.
Cellular Antennas – These antennas are widely used in the recent times. They are
mainly used for capturing signals based on mobile devices. The prime form of connectivity
within the mobile devices would be mainly dependent on the strength of the signal (Rappaport et
al., 2013).
Strengths – The cellular antennas are widely used in order to cover a vast network. The
devices are widely covered and hence receive better signals. The security within these cellular
networks is also provided in a highly secure form.
Weakness – The implementation cost of these devices is high as compared to the yagi
and horn antennas. The problem of interfaces also poses a major problem within the connectivity
of these devices.
Based on the above discussion, it could be said that the cellular antennas could prove to
be a dominant player within the market. They have the capability of transforming the cellular
market and help in an efficient communication mode.
2. Wireless Network Protocols
LTE – The Long Term Evolution (LTE) is a wireless form of broadband technology,
which mainly provides support to access to internet within cellular devices and other computing
Document Page
3CONCEPTS OF WIRELESS NETWORKING
systems. The LTE technology is often referred to as 4G technology. They help in offering severe
improvements among other standard modes of communication. The LTE networks are one of the
fastest network standards (Duan, Shah-Mansouri & Wong, 2013).
Strengths – This network makes use of IP network architecture. They help in the
improvement of cellular networks as compared to the other older networks (Araniti et al., 2013).
Weakness – The older devices do not have the accessibility to these networks. Hence
these devices would need to be improved and the latest technologies should be installed within
the devices.
As the networks offered by LTE are open based, hence they have they face the major
number of vulnerabilities within the system, devices and connected applications.
Wi-Fi – This form of networking protocol helps in the network connection without the
need of physical wires. The technology of Wi-Fi mainly represent the protocol of LAN within
the IEEE network standards. This form of networking standard help in the easy mode of
communication that is bounded within a precise location (Duarte et al., 2014).
Strengths – They help in the convenience of connection between devices based on
wireless mode. The installation process, management of costs and the expanse of the network
could be easily performed without much difficulties (Kim et al., 2014).
Weakness – The security within the networks is a major challenge as these networks
could be easily hacked. The network ranges are also not as high as compared to the other modes
of communication.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4CONCEPTS OF WIRELESS NETWORKING
The major form of challenges to the security aspects are mainly faced due to
eavesdropping, Man-in-the-Middle (MITM) Attacks, Denial of Service (DOS) and
eavesdropping.
Bluetooth – The Bluetooth technology is mainly based on radio based communication.
This networking standard helps in communication between devices that are connected within a
smaller distance. The communication standard based on Bluetooth are mainly supported by
cellular devices, computing systems and other devices. This technological standard was mainly
designed to support those kind of devices that would be supported by batteries. The technology
offered by Bluetooth is mainly supported by wireless keyboards, computers, laptops, and
smartphones and wireless speakers (Faragher & Harle, 2014).
Strengths – The technology of Bluetooth has lower costs and have an easy installation
process. The convenience of connection within the devices is easy. The Bluetooth also offers an
efficient communication mode.
Weakness – the short modes of communication of these devices are also prone to get
hacked. Viruses may be injected within the system, which would lead to damaging the inbuilt
applications of the mobile and communicating devices.
The major form of security challenges that are faced by Bluetooth technologies are
mainly based on authentication. Authorization and confidentiality of the information of the users
based within the devices are also susceptible to different forms of attacks. Privacy breaches are
also a major matter of concern within the computing systems.
3. Critical Reflection on Software Defined Wireless Network
Reflection based on Paper 1 “An Architecture for Software Defined Networking” p
Document Page
5CONCEPTS OF WIRELESS NETWORKING
The case study focusses on the aspect of Software Defined Networking (SDN). This form
of networking is majorly discussed as the separation between the planes of control and the data
planes. Based on the understanding from the study, I have come to know that SDN would be
helpful in providing major help to different operators within the networks. These operators
would be able to get major help for enabling major features within the systems that might also
include the features of virtualization (Bernardos et al., 2014). The increasing capacity within the
networks would also be increased with the improvement within the standards of networking.
From the insights from the research case study, I have understood that the underlying
architecture of SDN would also be helpful for improving the traditional network standards and
thus help in efficiency modes of communication based on the networks. Based on the future
research within this aspect, I have come to understand that the functionalities within the current
processes of SDN would help in the easy connectivity processes based on the SDN wireless
networks.
Reflection based on Paper 2 “Software Defined Wireless Networks: A Survey of Issues and
Solutions”
This article has made to understand about the various kinds of aspects related to the
standards of security within the SDN networks. From the understanding of the case study, I have
understood that the recent form of wireless networks are able to face different forms of
challenges against several form of vulnerable attacks. These attacks are mainly planned to
penetrate and crack the infrastructure of the SDN network. The mobile operators and the people
who are responsible for designing the security strategy of the underlying network standards
should be extremely careful regarding the basic form of standards of security aspects within the
network. I would recommend that these security experts should be able to design higher form of
Document Page
6CONCEPTS OF WIRELESS NETWORKING
security strategies that would be able to plan the vulnerability within the network before the
attacks would be able to break into the systems. The case study also depicts the aspect of SDN
that it has the major form of capability to deploy different kinds of services within the mobile
networks that are primarily based on the infrastructure of Network Function Virtualization
(NFV). These forms of infrastructural standards are mainly helpful for deploying faster form of
applications within the systems and the core networks. From the discussion based on the case
study, I have also understood that the Mobile Edge Computing (MEC) would implement the
technology of cloud computing and various other services of IT within SDN. The case study also
depicts the different kinds of challenges within the networks and the major impacts on the user
during cases of vulnerabilities. The case study also has helped to understand that the SDN is an
extremely important tool for the higher form of design within the networks that would lead
towards improvement of security aspects towards the network.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CONCEPTS OF WIRELESS NETWORKING
4. References
Araniti, G., Campolo, C., Condoluci, M., Iera, A., & Molinaro, A. (2013). LTE for vehicular
networking: a survey. IEEE communications magazine, 51(5), 148-157.
Bernardos, C. J., De La Oliva, A., Serrano, P., Banchs, A., Contreras, L. M., Jin, H., & Zúñiga, J.
C. (2014). An architecture for software defined wireless networking. IEEE wireless
communications, 21(3), 52-61.
Duan, S., Shah-Mansouri, V., & Wong, V. W. (2013, December). Dynamic access class barring
for M2M communications in LTE networks. In Globecom Workshops (GC Wkshps),
2013 IEEE (pp. 4747-4752). IEEE.
Duarte, M., Sabharwal, A., Aggarwal, V., Jana, R., Ramakrishnan, K. K., Rice, C. W., &
Shankaranarayanan, N. K. (2014). Design and characterization of a full-duplex
multiantenna system for WiFi networks. IEEE Transactions on Vehicular
Technology, 63(3), 1160-1177.
Faragher, R., & Harle, R. (2014, September). An analysis of the accuracy of bluetooth low
energy for indoor positioning applications. In Proceedings of the 27th International
Technical Meeting of the Satellite Division of the Institute of Navigation (ION
GNSS+’14) (pp. 201-210).
Hur, S., Cho, Y. J., Lee, J., Kang, N. G., Park, J., & Benn, H. (2014, May). Synchronous channel
sounder using horn antenna and indoor measurements on 28 GHz. In Communications
and Networking (BlackSeaCom), 2014 IEEE International Black Sea Conference on (pp.
83-87). IEEE.
Document Page
8CONCEPTS OF WIRELESS NETWORKING
Kim, B., Kwak, M., Lee, J., & Kwon, T. T. (2014, October). A multi-pronged approach for
indoor positioning with WiFi, magnetic and cellular signals. In Indoor Positioning and
Indoor Navigation (IPIN), 2014 International Conference on (pp. 723-726). IEEE.
Pan, W., Huang, C., Chen, P., Pu, M., Ma, X., & Luo, X. (2013). A beam steering horn antenna
using active frequency selective surface. IEEE Transactions on Antennas and
Propagation, 61(12), 6218-6223.
Rangisetti, A. K., & Tamma, B. R. (2017). Software Defined Wireless Networks: A Survey of
Issues and Solutions. Wireless Personal Communications, 97(4), 6019-6053.
Rappaport, T. S., Gutierrez, F., Ben-Dor, E., Murdock, J. N., Qiao, Y., & Tamir, J. I. (2013).
Broadband millimeter-wave propagation measurements and models using adaptive-beam
antennas for outdoor urban cellular communications. IEEE transactions on antennas and
propagation, 61(4), 1850-1859.
Sun, H., Guo, Y. X., He, M., & Zhong, Z. (2013). A dual-band rectenna using broadband Yagi
antenna array for ambient RF power harvesting. IEEE Antennas and Wireless
Propagation Letters, 12, 918-921.
Wu, J., Zhao, Z., Nie, Z., & Liu, Q. H. (2014). Bandwidth enhancement of a planar printed
quasi-Yagi antenna with size reduction. IEEE Transactions on Antennas and
Propagation, 62(1), 463-467.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]