Analysis of Current Trends in Networking Technologies and Applications
VerifiedAdded on 2021/01/02
|20
|5496
|164
Report
AI Summary
This report provides a comprehensive overview of current trends in networking, comparing wired and wireless broadband technologies across performance, deployment, challenges, and speed. It delves into emerging technologies like Cognitive Radio (CR) and Unlicensed Mobile Access (UMA), analyzing their functional architecture, relative benefits, and current deployment status. The report also examines the role of cryptography in securing networks and explores next-generation applications, specifically IPTV, including their specific protocols and applications. The analysis covers the benefits of wired technology like speed, cloud access, reliability, signal strength, and bandwidth. For wireless technology, it discusses network security and mobility. The comparison of wired and wireless technologies includes their performance, speed, and deployment challenges, alongside discussions on specific examples of each technology type. The report also provides recommendations for internet service providers based on the different applications of mobile access and cognitive radio.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Current trends in networking
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Table of Contents
INTRODUCTION...........................................................................................................................3
TASKS.............................................................................................................................................3
1) Comparison between the wired broad technology and wireless broadband with respect to
performance, deployment, challenges and speed. .................................................................3
2) Evaluate the emerging technology such as the Cognitive Radio (CR) and Unlicensed
Mobile Access (UMA) / functional architecture and their relative benefits and current
deployment status. .................................................................................................................7
3) Cryptography in securing Networks................................................................................12
4) Next Generation network Application.............................................................................14
CONCLUSION..............................................................................................................................16
REFERENCES..............................................................................................................................17
INTRODUCTION...........................................................................................................................3
TASKS.............................................................................................................................................3
1) Comparison between the wired broad technology and wireless broadband with respect to
performance, deployment, challenges and speed. .................................................................3
2) Evaluate the emerging technology such as the Cognitive Radio (CR) and Unlicensed
Mobile Access (UMA) / functional architecture and their relative benefits and current
deployment status. .................................................................................................................7
3) Cryptography in securing Networks................................................................................12
4) Next Generation network Application.............................................................................14
CONCLUSION..............................................................................................................................16
REFERENCES..............................................................................................................................17

INTRODUCTION
Wireless and wired broadband technology are the important techniques that help for
allowing for used to communicate with the help of cables and electromagnetic waves. This report
will discuss about the technologies with respects to their speed, challenges, performance and
deployment etc. there are benefits that help for managing the enterprises operations and function
in proper manner. This assignment will describe the emerging technology such as unlicensed
mobile access and cognitive radio that help for maintain their architecture and relative
advantages related to the deployment status. It will recommend to the internet service provider
on the different applications of mobile access and cognitive radio. Furthermore, This report will
discuss about the role that played through cryptography method for securing the network for
future development. At last, This assignment will describe the next generation application IPTV
and also should describe their specific protocols and application.
TASKS
1) Comparison between the wired broad technology and wireless broadband with respect to
performance, deployment, challenges and speed.
Wired Broadband technology is based on the physical connection to establish the
connection with the help of cables at workplace, homes etc. this technique will use the traditional
method to transfer the signals from one device to another by using cables. This technology is
mainly used the Direct subscriber line and their speed depend on the distance from business to
the broad band equipment. DSL is used the tradition telephone copper wires for signal
transmissions (Aldana, Maag and Zaïdi, 2018).
Wireless broadband technology allows for transmitting the signals without using any
wires. Many entities are used this technology for the purpose of communication over the long
distance. This technology is applicable the electromagnetic waves that help for providing the
messages to their destination.
Wireless and wired broadband technology are the important techniques that help for
allowing for used to communicate with the help of cables and electromagnetic waves. This report
will discuss about the technologies with respects to their speed, challenges, performance and
deployment etc. there are benefits that help for managing the enterprises operations and function
in proper manner. This assignment will describe the emerging technology such as unlicensed
mobile access and cognitive radio that help for maintain their architecture and relative
advantages related to the deployment status. It will recommend to the internet service provider
on the different applications of mobile access and cognitive radio. Furthermore, This report will
discuss about the role that played through cryptography method for securing the network for
future development. At last, This assignment will describe the next generation application IPTV
and also should describe their specific protocols and application.
TASKS
1) Comparison between the wired broad technology and wireless broadband with respect to
performance, deployment, challenges and speed.
Wired Broadband technology is based on the physical connection to establish the
connection with the help of cables at workplace, homes etc. this technique will use the traditional
method to transfer the signals from one device to another by using cables. This technology is
mainly used the Direct subscriber line and their speed depend on the distance from business to
the broad band equipment. DSL is used the tradition telephone copper wires for signal
transmissions (Aldana, Maag and Zaïdi, 2018).
Wireless broadband technology allows for transmitting the signals without using any
wires. Many entities are used this technology for the purpose of communication over the long
distance. This technology is applicable the electromagnetic waves that help for providing the
messages to their destination.

Wired Broadband technology-
Broadband over
cable
Digital
subscriber line
Broadband over
power cable
Fibre to home
Performance Broadband cable
is a technique that
help for improve
the performance
of DSL and their
cable
connections.
Digital subscriber
line the
technology that
used for
transmitting
digital data
through telephone
lines. DSL filter
on each outlet
block has high
performance
interference to the
simultaneous of
voice services.
This method is
the power line
communication
technology for the
data
transmissions
over through
electric power.
This technology
is higher
frequency in wide
range.
Fibre to home is
basically unique
technology that
help for data
transmission. This
technology is
provided the
unlimited
bandwidth and
also provide the
access to deliver
the signals.
Speed This technique is
delivered the
existing medium
and low voltage
electric
distribution
network. The
speed of
Broadband power
lines is higher
than other cables.
The bit rate of
services typically
range from 256
kbit/s to 100bit/s.
There speed is
depended on the
DSL technology.
BPL technology
is higher rate for
communication
over the long
distance. There is
high speed for the
transmitting data
from one place to
another.
This technology
is high speed
broadband from
256 to 200 mbps.
It is also
provided the
comprehensive
solution to the IP
leased line, video
conferencing and
video calls etc.
Deployment This technology
is based on the
DSL is complex
processor because
This technology
is implemented
It is expensive
and higher
Broadband over
cable
Digital
subscriber line
Broadband over
power cable
Fibre to home
Performance Broadband cable
is a technique that
help for improve
the performance
of DSL and their
cable
connections.
Digital subscriber
line the
technology that
used for
transmitting
digital data
through telephone
lines. DSL filter
on each outlet
block has high
performance
interference to the
simultaneous of
voice services.
This method is
the power line
communication
technology for the
data
transmissions
over through
electric power.
This technology
is higher
frequency in wide
range.
Fibre to home is
basically unique
technology that
help for data
transmission. This
technology is
provided the
unlimited
bandwidth and
also provide the
access to deliver
the signals.
Speed This technique is
delivered the
existing medium
and low voltage
electric
distribution
network. The
speed of
Broadband power
lines is higher
than other cables.
The bit rate of
services typically
range from 256
kbit/s to 100bit/s.
There speed is
depended on the
DSL technology.
BPL technology
is higher rate for
communication
over the long
distance. There is
high speed for the
transmitting data
from one place to
another.
This technology
is high speed
broadband from
256 to 200 mbps.
It is also
provided the
comprehensive
solution to the IP
leased line, video
conferencing and
video calls etc.
Deployment This technology
is based on the
DSL is complex
processor because
This technology
is implemented
It is expensive
and higher
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

wired to transmit
signals from one
device to another
but it also
reduced the low
voltage due to
low frequency.
it is based on the
digital signals
processing
algorithm. The
cost of hardware
and equipment
associated with
the lower. It is
cheaper of
installing new.
the various
attempt for
providing the
internet services
but this technique
is not viable.
There are some
problems arises
such as low
bandwidth and
limited reach etc.
demand but the
profit margin is
very low.
Examples- Coaxial, optical
fiber and other
twisted pair.
ADSL, RADSL
and HDSL.
Public electric
wiring.
Gigabit Ethernet .
signals from one
device to another
but it also
reduced the low
voltage due to
low frequency.
it is based on the
digital signals
processing
algorithm. The
cost of hardware
and equipment
associated with
the lower. It is
cheaper of
installing new.
the various
attempt for
providing the
internet services
but this technique
is not viable.
There are some
problems arises
such as low
bandwidth and
limited reach etc.
demand but the
profit margin is
very low.
Examples- Coaxial, optical
fiber and other
twisted pair.
ADSL, RADSL
and HDSL.
Public electric
wiring.
Gigabit Ethernet .

Wireless Broadband technology-
Wireless Fidelity Mobile Wireless
(4G, 3G)
Long Term
Evolution
Satellite
Performance It is based on the
short range
technology that
use in the
combination with
the modem
services connect
with the business
purpose. It
provides the high
performance
because it uses
the radio waves
and other
communication
signals.
This type of
wireless broad
connection is
provided the
services at any
location.
This technique is
high performance
and capacity to
transmit the data
from destination.
It is provided the
higher rate data
and reduce the
latency and
capacity of
bandwidth.
This technology
always maintain
the performance
of data in the term
of voice and
message.
Satellite
broadband is the
main technology
that provided the
many options to
user in different
areas. The
performance of
satellite is a type
of strength in the
radio signals that
used in between
the satellite and
vessel. It is highly
reliable and low
powered.
Speed This technology
allows for
maximum data
transferred and
higher speed of
11 mbps at the
range of indoor
100m and
outdoor 200m. It
is provided the
high speed
Mobile wireless is
high speed
broadband
connection that
access the
information at
any location. The
location is
depended on the
cellular tower and
monthly plans. It
Long term
evolution
technology is
managed the
entire broadcast
streams and
quickly moving
towards the
mobile phones.
This technology
is higher speed to
The speed of
satellite is
504mbps. It uses
for providing the
two ways access
through the
services.
Wireless Fidelity Mobile Wireless
(4G, 3G)
Long Term
Evolution
Satellite
Performance It is based on the
short range
technology that
use in the
combination with
the modem
services connect
with the business
purpose. It
provides the high
performance
because it uses
the radio waves
and other
communication
signals.
This type of
wireless broad
connection is
provided the
services at any
location.
This technique is
high performance
and capacity to
transmit the data
from destination.
It is provided the
higher rate data
and reduce the
latency and
capacity of
bandwidth.
This technology
always maintain
the performance
of data in the term
of voice and
message.
Satellite
broadband is the
main technology
that provided the
many options to
user in different
areas. The
performance of
satellite is a type
of strength in the
radio signals that
used in between
the satellite and
vessel. It is highly
reliable and low
powered.
Speed This technology
allows for
maximum data
transferred and
higher speed of
11 mbps at the
range of indoor
100m and
outdoor 200m. It
is provided the
high speed
Mobile wireless is
high speed
broadband
connection that
access the
information at
any location. The
location is
depended on the
cellular tower and
monthly plans. It
Long term
evolution
technology is
managed the
entire broadcast
streams and
quickly moving
towards the
mobile phones.
This technology
is higher speed to
The speed of
satellite is
504mbps. It uses
for providing the
two ways access
through the
services.

internet services. provided the
average speed in
between 5 to 12
mbps. It easily
connected with
the different
devices to share
the data.
handle the
communication.
Deployment The initial set up
of broadband
cable required
single access
point. It also
additional
complexity and
cost in the
different physical
cables.
This technology
is faced many
challenges. A
mobile sensor
cannot be
identified the
location. In this
way, it failure in
processing.
This technology
is provided the
long term
evolution to
manage and
control the signals
but sometimes,
there are lot of
traffic generated
in the network. In
this way, it
reduces the
capacity.
This technology is
sponsored by the
government. It is
applicable for
high rate data
transmission but
sometimes, the
connection has
been lost that
impact on the
entire network.
Example The public
outdoor WiFi
technology used
in London.
South African
city of Cape
Town uses Wi-Fi
network.
Laptop with the
wireless modem,
smartphones,
cloud computing.
E-UTRA cell
support up to four
times the data and
voice frequency
and capacity.
Low Earth orbit
(LEO) satellite is
less than the
broadband at
64kbit/s per
channel.
average speed in
between 5 to 12
mbps. It easily
connected with
the different
devices to share
the data.
handle the
communication.
Deployment The initial set up
of broadband
cable required
single access
point. It also
additional
complexity and
cost in the
different physical
cables.
This technology
is faced many
challenges. A
mobile sensor
cannot be
identified the
location. In this
way, it failure in
processing.
This technology
is provided the
long term
evolution to
manage and
control the signals
but sometimes,
there are lot of
traffic generated
in the network. In
this way, it
reduces the
capacity.
This technology is
sponsored by the
government. It is
applicable for
high rate data
transmission but
sometimes, the
connection has
been lost that
impact on the
entire network.
Example The public
outdoor WiFi
technology used
in London.
South African
city of Cape
Town uses Wi-Fi
network.
Laptop with the
wireless modem,
smartphones,
cloud computing.
E-UTRA cell
support up to four
times the data and
voice frequency
and capacity.
Low Earth orbit
(LEO) satellite is
less than the
broadband at
64kbit/s per
channel.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Benefits of wired technology-
Benefits Wireless broadband technology
Speed- Fiber optics internet service is the faster than the other copper
wire internet service because there are common problems arise
in the organization regarding the slower internet. There are
highly demand in the user to want high speed that's why, fiber
optics is beneficial for internet connectivity. In the
organization, This tool is support the over all connectivity
between the employee those who are communicated with each
other.
Cloud Access- It can be used the customer relationship management platform
that help for store the data in proper manner. Cloud is an
effective business tool for hosting and app for increasing the
productivity and profitability in marketplace. It is support the
business benefits for accessing cloud hosted information with
the help of SaaS tool. In this way, the customer and sales team
are communicated with each other. It is becoming critical for
business process to move from one internet service to another.
Fiber optic is highly demand in the organization as internet
services because it is secure and provide the protection in cloud
data storage.
Reliability- Fiber optics is reliable technology that offers advantages over
the copper internet connectivity because it is much stronger
than the other wires. Sometimes, it cannot be susceptible in the
weather conditions and also damage the data transmission
through the copper wire. Fiber optics is resistant to electrical
interference and humans (Liaskos and et.al., 2018). The
organization is needed for internet connectivity to make call
and easily access the application in proper manner.
Signal Strength- The strength of fiber optics doesn't degrade as quickly. The
Benefits Wireless broadband technology
Speed- Fiber optics internet service is the faster than the other copper
wire internet service because there are common problems arise
in the organization regarding the slower internet. There are
highly demand in the user to want high speed that's why, fiber
optics is beneficial for internet connectivity. In the
organization, This tool is support the over all connectivity
between the employee those who are communicated with each
other.
Cloud Access- It can be used the customer relationship management platform
that help for store the data in proper manner. Cloud is an
effective business tool for hosting and app for increasing the
productivity and profitability in marketplace. It is support the
business benefits for accessing cloud hosted information with
the help of SaaS tool. In this way, the customer and sales team
are communicated with each other. It is becoming critical for
business process to move from one internet service to another.
Fiber optic is highly demand in the organization as internet
services because it is secure and provide the protection in cloud
data storage.
Reliability- Fiber optics is reliable technology that offers advantages over
the copper internet connectivity because it is much stronger
than the other wires. Sometimes, it cannot be susceptible in the
weather conditions and also damage the data transmission
through the copper wire. Fiber optics is resistant to electrical
interference and humans (Liaskos and et.al., 2018). The
organization is needed for internet connectivity to make call
and easily access the application in proper manner.
Signal Strength- The strength of fiber optics doesn't degrade as quickly. The

organization has large spaces that could help for maintain the
strength of signals. It is beneficial for employee at their
workplace that located the proper distance for the
communication. But sometimes, the large distance is negative
impact towards the broadband connectivity on copper wires
and cables.
Bandwidth- The bandwidth of fiber optic is significantly higher that other
and the demand of user activities also increased in the
organization such as cloud applications, web conferencing,
Steaming high definition and file sharing etc.
Benefits Wireless Broadband technology-
Network security- Wi-Fi technology is the most important for business process
that used the latest encryption algorithm for providing the
security. In this way, it provides the safety and privacy to
maintain the services in proper manner.
Mobility- It is helpful for increasing the mobility that considered to be the
most suitable technique. It provides the internet services to
easily access the information in effective manner. The
accessibility of device will help for sharing the document file
from one device to another. It is also making the better
experience in the terms of internet.
Productivity - It is beneficial for increasing the productivity as well as their
mobility. This technology will help for providing the free
access to their employee whereas they connected to each other.
Wi-Fi technology allows for employee to carry their work in
finish on deadline.
Efficiency- Wi-Fi enables the smart devices that used in the homes, offices
strength of signals. It is beneficial for employee at their
workplace that located the proper distance for the
communication. But sometimes, the large distance is negative
impact towards the broadband connectivity on copper wires
and cables.
Bandwidth- The bandwidth of fiber optic is significantly higher that other
and the demand of user activities also increased in the
organization such as cloud applications, web conferencing,
Steaming high definition and file sharing etc.
Benefits Wireless Broadband technology-
Network security- Wi-Fi technology is the most important for business process
that used the latest encryption algorithm for providing the
security. In this way, it provides the safety and privacy to
maintain the services in proper manner.
Mobility- It is helpful for increasing the mobility that considered to be the
most suitable technique. It provides the internet services to
easily access the information in effective manner. The
accessibility of device will help for sharing the document file
from one device to another. It is also making the better
experience in the terms of internet.
Productivity - It is beneficial for increasing the productivity as well as their
mobility. This technology will help for providing the free
access to their employee whereas they connected to each other.
Wi-Fi technology allows for employee to carry their work in
finish on deadline.
Efficiency- Wi-Fi enables the smart devices that used in the homes, offices

to easily access the files at any place or locations. It provides
more productivity for the organization.
2) Evaluate the emerging technology such as the Cognitive Radio (CR) and Unlicensed Mobile
Access (UMA) / functional architecture and their relative benefits and current deployment
status.
Cognitive Radio (CR)
It is a network technology or an intelligent radio that can be configured or programmed
dynamically that can automatically detect all the available channels in a wireless spectrum in its
vicinity to avoid users congestion and interface. It provides standardize interface to access
network. It uses OSI protocol stack so that its capabilities can be allocated to its particular layer:
Cognitive Radio consists of SDR components and also the related cognitive components of idea
CR. The cognition component of Cognitive Radio describes the SDR in RXML so that the (self)
will be able to know that it is a radio and its goal is to achieve high quality of information to its
users.
Architecture is expressed in Radio eXtensible Markup Language. RXML intelligence that
includes radio back ground and also the user stereotypes and also the knowledge of RF and also
consists of space time scenes that are perceived and experienced. It consists of both structures
reasoning of iCR peers and Cognitive wireless networks and also the adhoc reasoning with the
users. It is being used in various other technologies such as in wireless medical networks,
authentication application where it can easily identify its users and prevent unauthorized access
to the application.
It uses OSI protocol stack so that its capabilities can be allocated to its particular layer:
Application layer has personal digital assistant with simple communication capability.
Network layer allows easy interaction with heterogeneous networks that a simple radio
can achieve.
Physical and data link layer provide better performance in terms of transmission capacity,
connectivity, spectrum, bandwidth and all the other aspect of communication.
Benefits:
Cognitive radio operates purely autonomously, by using the Cognitive Radio networks it
provides the significant advantage in terms of spectrum using.
more productivity for the organization.
2) Evaluate the emerging technology such as the Cognitive Radio (CR) and Unlicensed Mobile
Access (UMA) / functional architecture and their relative benefits and current deployment
status.
Cognitive Radio (CR)
It is a network technology or an intelligent radio that can be configured or programmed
dynamically that can automatically detect all the available channels in a wireless spectrum in its
vicinity to avoid users congestion and interface. It provides standardize interface to access
network. It uses OSI protocol stack so that its capabilities can be allocated to its particular layer:
Cognitive Radio consists of SDR components and also the related cognitive components of idea
CR. The cognition component of Cognitive Radio describes the SDR in RXML so that the (self)
will be able to know that it is a radio and its goal is to achieve high quality of information to its
users.
Architecture is expressed in Radio eXtensible Markup Language. RXML intelligence that
includes radio back ground and also the user stereotypes and also the knowledge of RF and also
consists of space time scenes that are perceived and experienced. It consists of both structures
reasoning of iCR peers and Cognitive wireless networks and also the adhoc reasoning with the
users. It is being used in various other technologies such as in wireless medical networks,
authentication application where it can easily identify its users and prevent unauthorized access
to the application.
It uses OSI protocol stack so that its capabilities can be allocated to its particular layer:
Application layer has personal digital assistant with simple communication capability.
Network layer allows easy interaction with heterogeneous networks that a simple radio
can achieve.
Physical and data link layer provide better performance in terms of transmission capacity,
connectivity, spectrum, bandwidth and all the other aspect of communication.
Benefits:
Cognitive radio operates purely autonomously, by using the Cognitive Radio networks it
provides the significant advantage in terms of spectrum using.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

It is lower in cost, it improves the link reliability, it less complex, Cognitive Radio uses
advanced network topologies and has simple network architecture and it can be upgraded
easily.
Cognitive Radio are more feasible as compared to the single cognitive radio. Its is a
miraculous helping technology and its users are increasing in the number.
Network layer allows easy interaction with heterogeneous networks that a simple radio
can achieve (Molina, and Jacob 2018).
Physical and data link layer provide better performance in terms of transmission capacity,
connectivity, spectrum, bandwidth and all the other aspect of communication.
Application layer has personal digital assistant with simple communication capability.
Functional architecture and benefits-
(Source : Cognitive radio, 2018)
A cognitive radio is a type of node in the structure that including other CR nodes without any
intelligence. This structure will help for learning, adapting with sharing the information across
the entire nodes in the network system. It is important for the evolution in the wireless
Illustration 1: Architecture of Cognitive radio
advanced network topologies and has simple network architecture and it can be upgraded
easily.
Cognitive Radio are more feasible as compared to the single cognitive radio. Its is a
miraculous helping technology and its users are increasing in the number.
Network layer allows easy interaction with heterogeneous networks that a simple radio
can achieve (Molina, and Jacob 2018).
Physical and data link layer provide better performance in terms of transmission capacity,
connectivity, spectrum, bandwidth and all the other aspect of communication.
Application layer has personal digital assistant with simple communication capability.
Functional architecture and benefits-
(Source : Cognitive radio, 2018)
A cognitive radio is a type of node in the structure that including other CR nodes without any
intelligence. This structure will help for learning, adapting with sharing the information across
the entire nodes in the network system. It is important for the evolution in the wireless
Illustration 1: Architecture of Cognitive radio

communication from the devices to their cognitive units. It has more capabilities and flexibilities
that support the network system according to the requirement of services. CR node is mainly
distributed the information in the form of processing chain and implemented across the entire
network system. Cognitive radio design is the highly multi disciplinary that combining with the
artificial intelligence, spectrum regulations, wireless communication for performing different
task in effective ways. Network based implementation is provided more comprehensive or
reliable information for the optimizing the performance. It always includes a group of nodes that
interactive behaviour and also distributed database for the purpose of information sharing.
Unlicensed Mobile Access(UMA)
UMA technology provide various alternative access to GPRS and GSM core network
issues through IP based broadband connections. To provide a seamless experience to users,
specifications define all the new network elements, associated protocols that provide secure
transport of GPRS/GSM signaling and user traffic over IP. It interfaces into core network
through existing 3GPP'S specified GB interfaces.
Benefits of UMA:
It has advanced the wireless devices section without worrying about the connectivity of
their own home network.
There is no need to input setting or operations in devices to avoid interference.
Certification procedure of user centric wireless home network is triggered by network
and has been made easy or simplified.
Better coverage area and relatively better quality and low cost service for subscriber.
It is used in home telephone internet which are available for free, also used in mobile terminals
that support both voice and data applications and at lat it is also used in various famous
applications such as Skype.
that support the network system according to the requirement of services. CR node is mainly
distributed the information in the form of processing chain and implemented across the entire
network system. Cognitive radio design is the highly multi disciplinary that combining with the
artificial intelligence, spectrum regulations, wireless communication for performing different
task in effective ways. Network based implementation is provided more comprehensive or
reliable information for the optimizing the performance. It always includes a group of nodes that
interactive behaviour and also distributed database for the purpose of information sharing.
Unlicensed Mobile Access(UMA)
UMA technology provide various alternative access to GPRS and GSM core network
issues through IP based broadband connections. To provide a seamless experience to users,
specifications define all the new network elements, associated protocols that provide secure
transport of GPRS/GSM signaling and user traffic over IP. It interfaces into core network
through existing 3GPP'S specified GB interfaces.
Benefits of UMA:
It has advanced the wireless devices section without worrying about the connectivity of
their own home network.
There is no need to input setting or operations in devices to avoid interference.
Certification procedure of user centric wireless home network is triggered by network
and has been made easy or simplified.
Better coverage area and relatively better quality and low cost service for subscriber.
It is used in home telephone internet which are available for free, also used in mobile terminals
that support both voice and data applications and at lat it is also used in various famous
applications such as Skype.

Functional architecture of Unlicensed Mobile access-
This architecture is offering the network elements that providing helps for mobile operators to
secure and optimize their unlicensed mobile access networks. It enhanced the security gateway
solution which based on the wide range of routers platform implemented, layered defensed in the
depth approach to the protection. This technology is providing the key security aspects related to
the malicious and non-malicious threats that directly impact on the wireless network system.
This architecture is also included the different security components such as security gateways
and AAA. It is typically fixed inside the unlicensed network zone or carries the licensed mobile
network. In this system. UMS always knows about the route call and go through their access
point and also connect with the wireless access points. Internet protocol is the responsible for
monitoring all the activities of user authentication in proper manner. It can be designed in perfect
ways to complete their transparent between the networks.
Illustration 2: Functional architecture of Unlicensed Mobile Access
(Source : Unlicensed Mobile Access, 2018)
This architecture is offering the network elements that providing helps for mobile operators to
secure and optimize their unlicensed mobile access networks. It enhanced the security gateway
solution which based on the wide range of routers platform implemented, layered defensed in the
depth approach to the protection. This technology is providing the key security aspects related to
the malicious and non-malicious threats that directly impact on the wireless network system.
This architecture is also included the different security components such as security gateways
and AAA. It is typically fixed inside the unlicensed network zone or carries the licensed mobile
network. In this system. UMS always knows about the route call and go through their access
point and also connect with the wireless access points. Internet protocol is the responsible for
monitoring all the activities of user authentication in proper manner. It can be designed in perfect
ways to complete their transparent between the networks.
Illustration 2: Functional architecture of Unlicensed Mobile Access
(Source : Unlicensed Mobile Access, 2018)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

It is recommended that the internet service provider will use the Cognitive Radio
technology that help for proving the fastest internet services because it is based on the different
type of electromagnetic radiations of feasible wave length in the term of wireless
communication. In other countries, it can be used electromagnetic spectrum that reserve the right
and use unlimited ways. It is beneficial for business process because the set up of hardware is
compatible, interference free communication and standardization etc. This technology is the
most common advantages in the wireless communication that optimize different resources for
next generation network. CR is adopting the appropriate frequency, interfaces and protocols and
also changing the environment with the help for cognitive cycle.
3) Cryptography in securing Networks
Cryptography is also known as secret writing, it is the science of analysing and
constructing protocols which is used to block conflicts. It is normally used so that only a specific
reader can understand the content. Cryptography is the main base of e-commerce, without it e-
commerce would be impossible ( Daras and Rassias, 2015 ). In other words it can be said that
technique used for security of data is cryptography. It is one of the most important emerging
technology, which is important for network technology. There are various applications of
Cryptography such as ATM Cards, computer password, electronic commerce etc.
Main primary functions of cryptography are:-
Confidentiality/ privacy: it ensures that no one is able to read messages except receiver
and sender.
Authentication: process of providing senders identification
Integrity: it assures receivers that their messages has not been altered.
Non repudiation: it provides a mechanism to prove that the sender had really sent the
message.
Key exchange: it also provides a method by which crypto keys are shared between
receiver and sender.
Cryptographic methods
There are four types of cryptography methods such as:
Substitution Methods: It is also called Caesar's Alphabet. As the name suggest alphabet
letters are either substituted for a number and any other symbol(For example ABC
encrypted as 123 or #$%) or they are slid over certain number of spaces (for example:
technology that help for proving the fastest internet services because it is based on the different
type of electromagnetic radiations of feasible wave length in the term of wireless
communication. In other countries, it can be used electromagnetic spectrum that reserve the right
and use unlimited ways. It is beneficial for business process because the set up of hardware is
compatible, interference free communication and standardization etc. This technology is the
most common advantages in the wireless communication that optimize different resources for
next generation network. CR is adopting the appropriate frequency, interfaces and protocols and
also changing the environment with the help for cognitive cycle.
3) Cryptography in securing Networks
Cryptography is also known as secret writing, it is the science of analysing and
constructing protocols which is used to block conflicts. It is normally used so that only a specific
reader can understand the content. Cryptography is the main base of e-commerce, without it e-
commerce would be impossible ( Daras and Rassias, 2015 ). In other words it can be said that
technique used for security of data is cryptography. It is one of the most important emerging
technology, which is important for network technology. There are various applications of
Cryptography such as ATM Cards, computer password, electronic commerce etc.
Main primary functions of cryptography are:-
Confidentiality/ privacy: it ensures that no one is able to read messages except receiver
and sender.
Authentication: process of providing senders identification
Integrity: it assures receivers that their messages has not been altered.
Non repudiation: it provides a mechanism to prove that the sender had really sent the
message.
Key exchange: it also provides a method by which crypto keys are shared between
receiver and sender.
Cryptographic methods
There are four types of cryptography methods such as:
Substitution Methods: It is also called Caesar's Alphabet. As the name suggest alphabet
letters are either substituted for a number and any other symbol(For example ABC
encrypted as 123 or #$%) or they are slid over certain number of spaces (for example:

ABC encrypted as DEF). But this method has one big problem i.e. cipher can be easily
cracked. This type of methods are normally used in puzzle section of newspaper but is
not used for secure connections.
Reciprocal Methods: This method works in a simple format like the plaintext is in-
putted into a machine which creates crypto-graph. This machine flips the letters for
example if plain text 'C' is substituted with 'N' then plain text 'N' will be substituted with
'C' in the cypher. This is a much more secure connection than substitution method. If the
receiver wants to read the text then he need to enter the cypher in the same type of
machine which gives the plain text output without any extra work and the receiver can
read it easily ( Perlman, Kaufman and Speciner, 2016 ).
Symmetric methods: It is also called Single key ciphers. It consists of one key only that
is used for both encryption and decryption of the plain text. This key is passed to the
receiver. This key can be broken into two different key which directly relate to each
other. It has two variations which are stream cypher and block cypher. Stream cypher is
one bit of plain text at a single time whereas block cypher is many numbers of bits at
once. One of the most common example of single key cipher is Data Encryption
Standards (DES).
Asymmetric Method: it is also called public key method. The main key holder has two
keys i.e. a public key that is uploaded and given to people they want to correspond with
and another is private key which is only known by the main key holder. If the sender
wants to encrypt a message or a text then they use public key for the receiver to encrypt it
and if the sender wants to guarantee that they were the sender, then they use private key
to sign the message after the the receiver uses the public key to verify that it was send by
the original user only. Most common example of asymmetric method are PGP and its
open source variation GPG.
Cryptography applied in network security
Cryptography in network security is much more complex to use then in other
applications. It uses public key infrastructure (PKI) for network security. PKI is not a specific
hardware or a software in-fact it is a framework that is used for integrity, authentication,
confidentiality and access to control the information or a message that is sent over the internet
through a network. These are mostly done through digital or SSL certification that are mostly
cracked. This type of methods are normally used in puzzle section of newspaper but is
not used for secure connections.
Reciprocal Methods: This method works in a simple format like the plaintext is in-
putted into a machine which creates crypto-graph. This machine flips the letters for
example if plain text 'C' is substituted with 'N' then plain text 'N' will be substituted with
'C' in the cypher. This is a much more secure connection than substitution method. If the
receiver wants to read the text then he need to enter the cypher in the same type of
machine which gives the plain text output without any extra work and the receiver can
read it easily ( Perlman, Kaufman and Speciner, 2016 ).
Symmetric methods: It is also called Single key ciphers. It consists of one key only that
is used for both encryption and decryption of the plain text. This key is passed to the
receiver. This key can be broken into two different key which directly relate to each
other. It has two variations which are stream cypher and block cypher. Stream cypher is
one bit of plain text at a single time whereas block cypher is many numbers of bits at
once. One of the most common example of single key cipher is Data Encryption
Standards (DES).
Asymmetric Method: it is also called public key method. The main key holder has two
keys i.e. a public key that is uploaded and given to people they want to correspond with
and another is private key which is only known by the main key holder. If the sender
wants to encrypt a message or a text then they use public key for the receiver to encrypt it
and if the sender wants to guarantee that they were the sender, then they use private key
to sign the message after the the receiver uses the public key to verify that it was send by
the original user only. Most common example of asymmetric method are PGP and its
open source variation GPG.
Cryptography applied in network security
Cryptography in network security is much more complex to use then in other
applications. It uses public key infrastructure (PKI) for network security. PKI is not a specific
hardware or a software in-fact it is a framework that is used for integrity, authentication,
confidentiality and access to control the information or a message that is sent over the internet
through a network. These are mostly done through digital or SSL certification that are mostly

provided by certificate authority ( Ramos, Crowcroft and White, 2016 ). For network security
cryptography also used two keys i.e. public and private. Private key never shared with anyone
and is store either at the server or at clients email. Both the keys are mathematical related to each
other but are not identical. In this way cryptography is used as a solution to increase network
security ( Cimato and Yang, 2017 ).
4) Next Generation network Application
IPTV and protocols
Internet protocol television or IPTV is a service which is used to deliver television
content over internet protocol networks. It is distributed by a service provider and deliver TV
programs or on-demand video content over a private network. This network offers the ability to
stream media sources continuously which results in immediate playing of media content. It is
mostly used in subscriber based television network with high speed channels to users devices or
equipment's. It can also be used for private or corporate media delivery. Its content is mostly
delivered over some dedicated network. IPTV services sends one program at a time. All the
contents remain at service providers network only and the program that is selected by the
customers is only send to them. If the customer changes the channel then transmission of new
stream is done to viewers network from providers network ( Buchanan, Li and Asif, 2017 ).
Advantages:
Video streaming requires high bit rate for longer period and due to which expenditure to
support huge amount of video traffic is much greater and had increased the economies.
Interactivity of programs and viewers has also increased as today views can search for
any video or search any content by title name or actor name.
On-demand video is also brought to television because of IPTV through which customers
can watch or brows any film or online program on TV.
But is also has some limitations such as if the packet is delayed or lost then the streamed data
becomes unreliable. IPTV also has a minimum speed requirement in order to provide users
service which restricts the users to use broadband or good quality of service provider in order to
use all the services provided by IPTV providers.
There are various protocols that are used by IPTV such as:
cryptography also used two keys i.e. public and private. Private key never shared with anyone
and is store either at the server or at clients email. Both the keys are mathematical related to each
other but are not identical. In this way cryptography is used as a solution to increase network
security ( Cimato and Yang, 2017 ).
4) Next Generation network Application
IPTV and protocols
Internet protocol television or IPTV is a service which is used to deliver television
content over internet protocol networks. It is distributed by a service provider and deliver TV
programs or on-demand video content over a private network. This network offers the ability to
stream media sources continuously which results in immediate playing of media content. It is
mostly used in subscriber based television network with high speed channels to users devices or
equipment's. It can also be used for private or corporate media delivery. Its content is mostly
delivered over some dedicated network. IPTV services sends one program at a time. All the
contents remain at service providers network only and the program that is selected by the
customers is only send to them. If the customer changes the channel then transmission of new
stream is done to viewers network from providers network ( Buchanan, Li and Asif, 2017 ).
Advantages:
Video streaming requires high bit rate for longer period and due to which expenditure to
support huge amount of video traffic is much greater and had increased the economies.
Interactivity of programs and viewers has also increased as today views can search for
any video or search any content by title name or actor name.
On-demand video is also brought to television because of IPTV through which customers
can watch or brows any film or online program on TV.
But is also has some limitations such as if the packet is delayed or lost then the streamed data
becomes unreliable. IPTV also has a minimum speed requirement in order to provide users
service which restricts the users to use broadband or good quality of service provider in order to
use all the services provided by IPTV providers.
There are various protocols that are used by IPTV such as:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

IGMP or internet group management protocol) is a communication protocol is a common
protocol used by service providers for subscribing to live multi-stream. It is an integral
part of IP multi stream.
PIM or protocol independent multicast is a family of multicast routing protocols that are
mostly used for IP protocols.
RTP or real time transport protocol is a type of network protocols that is used for delivery
of videos over IP networks.
TCP or transmission control protocol is one of the main protocol which is mostly used for
encapsulation methods or by video flash players (Kanellopoulos, 2019 ).
RTMP or real-time messaging protocol is also one of the proprietary protocols used by
IPTV for video steaming over internet.
HTTP or hyper-text transfer protocol is an application protocol mostly used for
hypermedia information system.
RTSP or real-time streaming protocol is mostly used in streaming media servers ( Ramos,
Crowcroft and White, 2016 ).
Current development status
From past five to six years demand of video service on internet has increased. There are
many service providers that use IPTV for broadcasting. One of the main market where IPTV is
used is development of broadband whose use is growing rapidly and is recognized by everyone.
Many service providers are using IPTV to provide various foreign channels to the customers and
because of this even customers are starting to use IPTV technology such as subscription, MPEG
compatible players or broadband connection (Chakraborty, Misra and Prasad, 2019).
protocol used by service providers for subscribing to live multi-stream. It is an integral
part of IP multi stream.
PIM or protocol independent multicast is a family of multicast routing protocols that are
mostly used for IP protocols.
RTP or real time transport protocol is a type of network protocols that is used for delivery
of videos over IP networks.
TCP or transmission control protocol is one of the main protocol which is mostly used for
encapsulation methods or by video flash players (Kanellopoulos, 2019 ).
RTMP or real-time messaging protocol is also one of the proprietary protocols used by
IPTV for video steaming over internet.
HTTP or hyper-text transfer protocol is an application protocol mostly used for
hypermedia information system.
RTSP or real-time streaming protocol is mostly used in streaming media servers ( Ramos,
Crowcroft and White, 2016 ).
Current development status
From past five to six years demand of video service on internet has increased. There are
many service providers that use IPTV for broadcasting. One of the main market where IPTV is
used is development of broadband whose use is growing rapidly and is recognized by everyone.
Many service providers are using IPTV to provide various foreign channels to the customers and
because of this even customers are starting to use IPTV technology such as subscription, MPEG
compatible players or broadband connection (Chakraborty, Misra and Prasad, 2019).

Recommendations to ISP
One of the main issue faced by ISP is their network security that is faced by many
customers so, Internet service providers should ensure the security of their network through
different networking protocols so that customers can easily rely on then and can use their
services more often. ISP can use username and passwords for users so that they can increase
their network security.
CONCLUSION
As per discussion, it concluded that Wireless and wired broadband technology are the
fastest growing technique that help for business process for the used of internet access and also
beneficial for data transmission. This report can be described the various type of technologies
in the term of speed, challenges, performance and deployment etc. there are benefits that help for
managing the enterprises operations and function in proper manner. It summarized the internet
service provider on the different applications of mobile access and cognitive radio. Afterwards,
It also explains the cryptography method is playing important role for securing the network for
future development. This assignment describes the next generation application IPTV and also
should describe their specific protocols and application. It is also described the emerging
technology such as unlicensed mobile access and cognitive radio that help for maintain their
architecture and relative advantages related to the deployment status.
One of the main issue faced by ISP is their network security that is faced by many
customers so, Internet service providers should ensure the security of their network through
different networking protocols so that customers can easily rely on then and can use their
services more often. ISP can use username and passwords for users so that they can increase
their network security.
CONCLUSION
As per discussion, it concluded that Wireless and wired broadband technology are the
fastest growing technique that help for business process for the used of internet access and also
beneficial for data transmission. This report can be described the various type of technologies
in the term of speed, challenges, performance and deployment etc. there are benefits that help for
managing the enterprises operations and function in proper manner. It summarized the internet
service provider on the different applications of mobile access and cognitive radio. Afterwards,
It also explains the cryptography method is playing important role for securing the network for
future development. This assignment describes the next generation application IPTV and also
should describe their specific protocols and application. It is also described the emerging
technology such as unlicensed mobile access and cognitive radio that help for maintain their
architecture and relative advantages related to the deployment status.

REFERENCES
Books and journals:
Aldana, J.A.A., Maag, S. and Zaïdi, F., 2018, May. MANETs Interoperability: Current Trends
and Open Research. In 2018 32nd International Conference on Advanced Information
Networking and Applications Workshops (WAINA) (pp. 481-487). IEEE.
Buchanan, W.J., Li, S. and Asif, R., 2017. Lightweight cryptography methods. Journal of Cyber
Security Technology, 1(3-4), pp.187-201.
Burg, A., Chattopadhyay, A. and Lam, K.Y., 2018. Wireless Communication and Security Issues
for Cyber–Physical Systems and the Internet-of-Things. Proceedings of the IEEE.106(1).
pp.38-60.
Chakraborty, T., Misra, I.S. and Prasad, R., 2019. Quality of Service Management—Design
Issues. In VoIP Technology: Applications and Challenges (pp. 49-69). Springer, Cham.
Cimato, S. and Yang, C.N. eds., 2017. Visual cryptography and secret image sharing. CRC
press.
Da Costa, D.B and et.al., 2018. IEEE Access Special Section Editorial: Security in Wireless
Communications and Networking. IEEE Access. 6. pp.8959-8963.
Daras, N.J. and Rassias, M.T. eds., 2015. Computation, cryptography, and network security (pp.
253-287). Springer.
Kanellopoulos, D.N., 2019. Group Synchronization for Multimedia Systems. In Advanced
Methodologies and Technologies in Media and Communications (pp. 229-241). IGI
Global.
Liaskos, C. and et.al., 2018. A New Wireless Communication Paradigm through Software-
controlled Metasurfaces. arXiv preprint arXiv:1806.01792.
Molina, E. and Jacob, E., 2018. Software-defined networking in cyber-physical systems: A
survey. Computers & Electrical Engineering. 66. pp.407-419.
Perlman, R., Kaufman, C. and Speciner, M., 2016. Network security: private communication in
a public world. Pearson Education India.
Ramos, F.M., Crowcroft, J. and White, I.H., 2016, May. Blending photons with electrons to
reduce the energy footprint of IPTV networks. In IFIP Networking Conference (IFIP
Networking) and Workshops, 2016 (pp. 288-296). IEEE.
Books and journals:
Aldana, J.A.A., Maag, S. and Zaïdi, F., 2018, May. MANETs Interoperability: Current Trends
and Open Research. In 2018 32nd International Conference on Advanced Information
Networking and Applications Workshops (WAINA) (pp. 481-487). IEEE.
Buchanan, W.J., Li, S. and Asif, R., 2017. Lightweight cryptography methods. Journal of Cyber
Security Technology, 1(3-4), pp.187-201.
Burg, A., Chattopadhyay, A. and Lam, K.Y., 2018. Wireless Communication and Security Issues
for Cyber–Physical Systems and the Internet-of-Things. Proceedings of the IEEE.106(1).
pp.38-60.
Chakraborty, T., Misra, I.S. and Prasad, R., 2019. Quality of Service Management—Design
Issues. In VoIP Technology: Applications and Challenges (pp. 49-69). Springer, Cham.
Cimato, S. and Yang, C.N. eds., 2017. Visual cryptography and secret image sharing. CRC
press.
Da Costa, D.B and et.al., 2018. IEEE Access Special Section Editorial: Security in Wireless
Communications and Networking. IEEE Access. 6. pp.8959-8963.
Daras, N.J. and Rassias, M.T. eds., 2015. Computation, cryptography, and network security (pp.
253-287). Springer.
Kanellopoulos, D.N., 2019. Group Synchronization for Multimedia Systems. In Advanced
Methodologies and Technologies in Media and Communications (pp. 229-241). IGI
Global.
Liaskos, C. and et.al., 2018. A New Wireless Communication Paradigm through Software-
controlled Metasurfaces. arXiv preprint arXiv:1806.01792.
Molina, E. and Jacob, E., 2018. Software-defined networking in cyber-physical systems: A
survey. Computers & Electrical Engineering. 66. pp.407-419.
Perlman, R., Kaufman, C. and Speciner, M., 2016. Network security: private communication in
a public world. Pearson Education India.
Ramos, F.M., Crowcroft, J. and White, I.H., 2016, May. Blending photons with electrons to
reduce the energy footprint of IPTV networks. In IFIP Networking Conference (IFIP
Networking) and Workshops, 2016 (pp. 288-296). IEEE.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Online:
Cognitive radio. 2018. Available
through:<https://pdfs.semanticscholar.org/196b/7d94fd6ce33f773d7692d304064b65c6967
6.pdf>
Unlicensed Mobile Access. 2018. Available Through
:<https://www.cisco.com/cdc_content_elements/flash/mobile_sols/partners_site/pdfs/
partners/kineto/CTIA_Tear_Sheet.pdf>
Cognitive radio. 2018. Available
through:<https://pdfs.semanticscholar.org/196b/7d94fd6ce33f773d7692d304064b65c6967
6.pdf>
Unlicensed Mobile Access. 2018. Available Through
:<https://www.cisco.com/cdc_content_elements/flash/mobile_sols/partners_site/pdfs/
partners/kineto/CTIA_Tear_Sheet.pdf>
1 out of 20
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.