Wireless Network Technologies: Comparison and Evaluation Report
VerifiedAdded on 2021/06/15
|9
|2205
|22
Report
AI Summary
This report comprehensively analyzes various wireless network technologies, including satellite communication, Wi-Fi, and WiMax, comparing their communication spectrum, modulation techniques, and medium access control mechanisms. It then evaluates several wireless communication standards such as UHF RFID, NFC, ZigBee, Z-Wave, Bluetooth, cellular systems, IEEE 802.11p, and LPWAN, focusing on their application in Cyber Physical Systems (CPS) and the Internet of Things (IoT). The report assesses the performance of these standards, concluding that UHF RFID offers the most effective solution due to its high bandwidth and range. The report highlights the benefits of wireless networks, such as convenience, high productivity, and cost-effectiveness, emphasizing their importance in modern communication and providing a detailed comparison of different technologies and their respective applications.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: WIRELESS NETWORK AND SECURITY
Wireless Network and Security
Name of the Student:
Name of the University:
Author’s Note:
Wireless Network and Security
Name of the Student:
Name of the University:
Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
WIRELESS NETWORK AND SECURITY
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
1. Comparison of Three Wireless Communication Technologies..........................................2
2. Evaluation of Wireless Communication Standards for Cyber Physical Systems and IoT. 4
3. Performance of Wireless Network.....................................................................................7
Conclusion..................................................................................................................................7
References..................................................................................................................................8
WIRELESS NETWORK AND SECURITY
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
1. Comparison of Three Wireless Communication Technologies..........................................2
2. Evaluation of Wireless Communication Standards for Cyber Physical Systems and IoT. 4
3. Performance of Wireless Network.....................................................................................7
Conclusion..................................................................................................................................7
References..................................................................................................................................8

2
WIRELESS NETWORK AND SECURITY
Introduction
The wireless network is the type of network that enables various devices to stay
connected with the network [8]. The access points eventually intensify the signals of the
wireless fidelity so that the device could be kept significantly far from the router and still
lined with the network. There are numerous benefits of this wireless network like
convenience, high productivity, and easy collaboration [1]. Due to these benefits, wireless
networks are used in various organizations or even used by individuals. Several technologies
are used in this wireless communication network.
The following report will outline a brief view on wireless network and all its
technologies and applications, a detailed comparison among them. Finally, it will declare the
best network out there.
Discussion
1. Comparison of Three Wireless Communication Technologies
The comparison among satellite communication technology, wireless fidelity, and
Worldwide Interoperability for Microwave Access is as follows:
Main
Factors
Satellite communication
Technology
Wireless Fidelity (Wi-
Fi)
Worldwide
Interoperability for
Microwave Access
i)
Communicat
ion
Communication
spectrum refers to the
bandwidth spectrum.
The communication
spectrum of Wi-Fi is
separate in various
The communication
spectrum of WiMax is
different in various
WIRELESS NETWORK AND SECURITY
Introduction
The wireless network is the type of network that enables various devices to stay
connected with the network [8]. The access points eventually intensify the signals of the
wireless fidelity so that the device could be kept significantly far from the router and still
lined with the network. There are numerous benefits of this wireless network like
convenience, high productivity, and easy collaboration [1]. Due to these benefits, wireless
networks are used in various organizations or even used by individuals. Several technologies
are used in this wireless communication network.
The following report will outline a brief view on wireless network and all its
technologies and applications, a detailed comparison among them. Finally, it will declare the
best network out there.
Discussion
1. Comparison of Three Wireless Communication Technologies
The comparison among satellite communication technology, wireless fidelity, and
Worldwide Interoperability for Microwave Access is as follows:
Main
Factors
Satellite communication
Technology
Wireless Fidelity (Wi-
Fi)
Worldwide
Interoperability for
Microwave Access
i)
Communicat
ion
Communication
spectrum refers to the
bandwidth spectrum.
The communication
spectrum of Wi-Fi is
separate in various
The communication
spectrum of WiMax is
different in various

3
WIRELESS NETWORK AND SECURITY
Spectrum There are various
communication spectra in
several networking
devices [13]. The six
bands of satellite
communication are Ka
band, X band, Ku band,
L band, C band, and S
band. The respective
spectra are 26 to 40 GHz,
12 to 18 GHz, 8 to 12
GHz, 4 to 8 GHz, 2 to 4
GHz and 1 to 2 GHz. The
most used band amongst
these is Ku band.
locations in all over the
world. There are several
protocols present in the
wide domain of IEEE
802.11. Each and every
protocol has its
respective frequency
band. The frequency
band for IEEE 802.11a
is 5 GHz, the frequency
band for IEEE 802.11b
is 2.4 GHz, the
frequency band for
IEEE 802.11g is 2.4
GHz, the frequency
band for IEEE 802.11n
is 5 GHz, the frequency
band for IEEE 802.11ac
is 6 GHz, the frequency
band for IEEE 802.11ad
is up to 60 GHz, the
frequency band for
IEEE 802.11af is below
1 GHz and the
frequency band for
locations in all over the
world. Two protocols
are utilized. They are
IEEE 802.16d and
IEEE 802.16e. For
IEEE 802.16d, the
most utilized
frequencies are 3.5
GHZ and 5.8 GHz. For
IEEE 802.16e, the
most utilized
frequencies are 2.3
GHz, 2.5 GHz and 3.5
GHz [1].
WIRELESS NETWORK AND SECURITY
Spectrum There are various
communication spectra in
several networking
devices [13]. The six
bands of satellite
communication are Ka
band, X band, Ku band,
L band, C band, and S
band. The respective
spectra are 26 to 40 GHz,
12 to 18 GHz, 8 to 12
GHz, 4 to 8 GHz, 2 to 4
GHz and 1 to 2 GHz. The
most used band amongst
these is Ku band.
locations in all over the
world. There are several
protocols present in the
wide domain of IEEE
802.11. Each and every
protocol has its
respective frequency
band. The frequency
band for IEEE 802.11a
is 5 GHz, the frequency
band for IEEE 802.11b
is 2.4 GHz, the
frequency band for
IEEE 802.11g is 2.4
GHz, the frequency
band for IEEE 802.11n
is 5 GHz, the frequency
band for IEEE 802.11ac
is 6 GHz, the frequency
band for IEEE 802.11ad
is up to 60 GHz, the
frequency band for
IEEE 802.11af is below
1 GHz and the
frequency band for
locations in all over the
world. Two protocols
are utilized. They are
IEEE 802.16d and
IEEE 802.16e. For
IEEE 802.16d, the
most utilized
frequencies are 3.5
GHZ and 5.8 GHz. For
IEEE 802.16e, the
most utilized
frequencies are 2.3
GHz, 2.5 GHz and 3.5
GHz [1].
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
WIRELESS NETWORK AND SECURITY
IEEE 802.11ah is 700
MHz.
ii)
Modulation
Techniques
Three techniques for
modulation are available-
Orthogonal Quadrature
Phase Shift Keying
(OQPSK), Quadrature
Phase Shift Keying
(QPSK) and Binary
Phase Shift Keying
(BPSK) [3].
Two distinct techniques
for modulation in Wi-
Fi- QPSK and
Complementary Coded
Keying (CCK).
Four distinct
techniques for
modulation in WiMax-
64 QAM or 64
Quadrature Amplitude
Modulation, 16 QAM
or 16 QPSK and BPSK
[11].
iii) Medium
Access
Control
Mechanism
The MAC protocols of
satellite technology are
Frequency Division
Multiple Access (FDMA)
and Time Division
Multiple Access
(TDMA).
The MAC of Wi-Fi is
completely is based on
IEEE 802.11
specifications.
The MAC protocols of
WiMax are utilized for
fulfilling all the
connections of point-
to-multipoint
orientation [6].
2. Evaluation of Wireless Communication Standards for Cyber Physical Systems
and IoT
There are various types of wireless communication standards that are widely accepted
by the users and also provide necessary range of balance, throughput of network and mobility
to devices [9]. The enhancement of these standards is extremely important for the network.
WIRELESS NETWORK AND SECURITY
IEEE 802.11ah is 700
MHz.
ii)
Modulation
Techniques
Three techniques for
modulation are available-
Orthogonal Quadrature
Phase Shift Keying
(OQPSK), Quadrature
Phase Shift Keying
(QPSK) and Binary
Phase Shift Keying
(BPSK) [3].
Two distinct techniques
for modulation in Wi-
Fi- QPSK and
Complementary Coded
Keying (CCK).
Four distinct
techniques for
modulation in WiMax-
64 QAM or 64
Quadrature Amplitude
Modulation, 16 QAM
or 16 QPSK and BPSK
[11].
iii) Medium
Access
Control
Mechanism
The MAC protocols of
satellite technology are
Frequency Division
Multiple Access (FDMA)
and Time Division
Multiple Access
(TDMA).
The MAC of Wi-Fi is
completely is based on
IEEE 802.11
specifications.
The MAC protocols of
WiMax are utilized for
fulfilling all the
connections of point-
to-multipoint
orientation [6].
2. Evaluation of Wireless Communication Standards for Cyber Physical Systems
and IoT
There are various types of wireless communication standards that are widely accepted
by the users and also provide necessary range of balance, throughput of network and mobility
to devices [9]. The enhancement of these standards is extremely important for the network.

5
WIRELESS NETWORK AND SECURITY
The wireless sensors that are connected by IoT are centralized for the designing of CPS.
Thus, the security is extremely high with this integration.
The significant evaluations are given below:
i) UHF RFID and NFC: The newest form for RFID is ultra-high frequency RFID
where the frequency is extremely high [12]. In the IoT, the data acquisition is checked to
meet every requirement. The perception layer of the IoT needs practical requirements to be
fulfilled and having the property of very low power consumption; UHF RFID is capable of
doing so. The computational entities are easily combined with the physical system for cyber
physical systems [5]. The RFID of ultra-high frequency is a basic form of cyber physical
systems since the storage functions and controlling elements are present within it.
The Near Field Communication (NFC) is a collection of protocols that are utilized for
communication and hence enabling a secured connection between the two. The restriction is
that presence of smart phone is required here. The integration of NFC and IoTs mainly
involve energy saving, higher security, and convenience. The medical field gets a huge
benefit from this integration [3]. In case of CPS, NFC is responsible for stopping the
eavesdropping and relay attacks on the computer devices.
ii) ZigBee and Z-Wave: Personal area network is accessed with the ZigBee protocol
of IEEE 802.15. The expenses are very less in comparison to others. For the IoTs, the
protocol of ZigBee is integrated via ZigBee gateways [4]. It provides security and safety with
proper stability to the protocol. In case of cyber physical systems, ZigBee provides highest
possible level of security to the systems. Moreover, the lowest power microcontroller
CC2530 is used here which ensures low power consumption.
WIRELESS NETWORK AND SECURITY
The wireless sensors that are connected by IoT are centralized for the designing of CPS.
Thus, the security is extremely high with this integration.
The significant evaluations are given below:
i) UHF RFID and NFC: The newest form for RFID is ultra-high frequency RFID
where the frequency is extremely high [12]. In the IoT, the data acquisition is checked to
meet every requirement. The perception layer of the IoT needs practical requirements to be
fulfilled and having the property of very low power consumption; UHF RFID is capable of
doing so. The computational entities are easily combined with the physical system for cyber
physical systems [5]. The RFID of ultra-high frequency is a basic form of cyber physical
systems since the storage functions and controlling elements are present within it.
The Near Field Communication (NFC) is a collection of protocols that are utilized for
communication and hence enabling a secured connection between the two. The restriction is
that presence of smart phone is required here. The integration of NFC and IoTs mainly
involve energy saving, higher security, and convenience. The medical field gets a huge
benefit from this integration [3]. In case of CPS, NFC is responsible for stopping the
eavesdropping and relay attacks on the computer devices.
ii) ZigBee and Z-Wave: Personal area network is accessed with the ZigBee protocol
of IEEE 802.15. The expenses are very less in comparison to others. For the IoTs, the
protocol of ZigBee is integrated via ZigBee gateways [4]. It provides security and safety with
proper stability to the protocol. In case of cyber physical systems, ZigBee provides highest
possible level of security to the systems. Moreover, the lowest power microcontroller
CC2530 is used here which ensures low power consumption.

6
WIRELESS NETWORK AND SECURITY
Mesh network is present within the Z-Wave network. The radio waves that are
utilized here are of extremely lower energy, which ensures low energy consumption. Z-Wave
powers the IoTs [10]. The devices that provide smart lighting of the IoTs, are the type of
mesh network, allowing communication even from 100 feet distance. For the CPS, Z-Wave is
utilized in automated vehicles and robotics domains.
iii) Bluetooth and Bluetooth Low Energy: Bluetooth is the easiest way to transfer any
type of data. However, the data transfer is restricted to short distances [2]. This technology
can be linked with all the systems for providing various easy modes of communication.
Bluetooth Low Energy or Bluetooth 4.0 is the next standard of wireless
communication which is responsible for alerting the systems of house and hence the crimes
get reduced [7]. In case of CPS, the Bluetooth low energy communicates amongst the master
computer systems and slave microcontrollers.
iv) Cellular Systems: Cellular systems are utilized in the cell phone for
communication [14]. Three significant technologies present in the Cellular Internet of Things
are EC GSM IoT, NB IoT, and LTE M. Each technology is extremely effective and efficient
and hence the radio access is easier. In case of CPS, the cellular systems are termed as cell
phones or mobile cyber physical systems [1]. They are used for providing several
communication radios, computational resources, intelligent applications and many more.
v) IEEE 802.11p: It is the amendment of protocol of IEEE 802.11 [7]. This particular
protocol is extremely effective the moment it is enabled with IoTs. This protocol is used for
supporting the communication in vehicles.
vi) LPWAN: LPWAN or Low Power Wide Area Network with the IoTs comprises of
several players such as Ingenu, Sigfox and Weightless SIG. They are extremely cost effective
WIRELESS NETWORK AND SECURITY
Mesh network is present within the Z-Wave network. The radio waves that are
utilized here are of extremely lower energy, which ensures low energy consumption. Z-Wave
powers the IoTs [10]. The devices that provide smart lighting of the IoTs, are the type of
mesh network, allowing communication even from 100 feet distance. For the CPS, Z-Wave is
utilized in automated vehicles and robotics domains.
iii) Bluetooth and Bluetooth Low Energy: Bluetooth is the easiest way to transfer any
type of data. However, the data transfer is restricted to short distances [2]. This technology
can be linked with all the systems for providing various easy modes of communication.
Bluetooth Low Energy or Bluetooth 4.0 is the next standard of wireless
communication which is responsible for alerting the systems of house and hence the crimes
get reduced [7]. In case of CPS, the Bluetooth low energy communicates amongst the master
computer systems and slave microcontrollers.
iv) Cellular Systems: Cellular systems are utilized in the cell phone for
communication [14]. Three significant technologies present in the Cellular Internet of Things
are EC GSM IoT, NB IoT, and LTE M. Each technology is extremely effective and efficient
and hence the radio access is easier. In case of CPS, the cellular systems are termed as cell
phones or mobile cyber physical systems [1]. They are used for providing several
communication radios, computational resources, intelligent applications and many more.
v) IEEE 802.11p: It is the amendment of protocol of IEEE 802.11 [7]. This particular
protocol is extremely effective the moment it is enabled with IoTs. This protocol is used for
supporting the communication in vehicles.
vi) LPWAN: LPWAN or Low Power Wide Area Network with the IoTs comprises of
several players such as Ingenu, Sigfox and Weightless SIG. They are extremely cost effective
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
WIRELESS NETWORK AND SECURITY
and efficient [13]. For the Cyber physical systems, LPWAN offers network connection with
low power consumption and high distance.
3. Performance of Wireless Network
After evaluating all the nine wireless networking standards for CPS and IoTs, the
suitable network is UHF RFID. Having the maximum bandwidth, it is extremely effective
and the range area is also high for this RFID, ranging from 300 MHZ to 3 GHz.
Conclusion
From the above discussion, it can be concluded that the above report has highlighted
the best network which is the wireless network. This type of network can be set up by
utilizing the radio signal frequencies. This network is extremely popular and acceptable
worldwide due to its easy and simple setting up feature. Moreover, the overall expenses are
reduced largely as no cables are involved in this network and thus all the problems and
complexities with the wires are removed. Moreover, the computers and the systems are easily
connected with the wireless networking in a cost effective way. The security of this type of
network is also high and no security protections are required here.
WIRELESS NETWORK AND SECURITY
and efficient [13]. For the Cyber physical systems, LPWAN offers network connection with
low power consumption and high distance.
3. Performance of Wireless Network
After evaluating all the nine wireless networking standards for CPS and IoTs, the
suitable network is UHF RFID. Having the maximum bandwidth, it is extremely effective
and the range area is also high for this RFID, ranging from 300 MHZ to 3 GHz.
Conclusion
From the above discussion, it can be concluded that the above report has highlighted
the best network which is the wireless network. This type of network can be set up by
utilizing the radio signal frequencies. This network is extremely popular and acceptable
worldwide due to its easy and simple setting up feature. Moreover, the overall expenses are
reduced largely as no cables are involved in this network and thus all the problems and
complexities with the wires are removed. Moreover, the computers and the systems are easily
connected with the wireless networking in a cost effective way. The security of this type of
network is also high and no security protections are required here.

8
WIRELESS NETWORK AND SECURITY
References
[1] Burg, Andreas, Anupam Chattopadhyay, and Kwok-Yan Lam. "Wireless Communication
and Security Issues for Cyber–Physical Systems and the Internet-of-Things." Proceedings of
the IEEE 106, no. 1 (2018): 38-60.
[2] Andrews, Jeffrey G., Xinchen Zhang, Gregory D. Durgin, and Abhishek K. Gupta. "Are
we approaching the fundamental limits of wireless network densification?." IEEE
Communications Magazine 54, no. 10 (2016): 184-190.
[3] Dey, Kakan Chandra, Anjan Rayamajhi, Mashrur Chowdhury, Parth Bhavsar, and James
Martin. "Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a
heterogeneous wireless network–Performance evaluation." Transportation Research Part C:
Emerging Technologies 68 (2016): 168-184.
[4] Xiao, Yang, ed. Security in sensor networks. CRC Press, 2016.
[5] Pathan, Al-Sakib Khan, ed. Security of self-organizing networks: MANET, WSN, WMN,
VANET. CRC press, 2016.
[6] Zhou, Xiangyun, Yan Zhang, and Lingyang Song. Physical layer security in wireless
communications. Crc Press, 2016.
[7] Zhao, Nan, F. Richard Yu, Ming Li, Qiao Yan, and Victor CM Leung. "Physical layer
security issues in interference-alignment-based wireless networks." IEEE Communications
Magazine 54, no. 8 (2016): 162-168.
WIRELESS NETWORK AND SECURITY
References
[1] Burg, Andreas, Anupam Chattopadhyay, and Kwok-Yan Lam. "Wireless Communication
and Security Issues for Cyber–Physical Systems and the Internet-of-Things." Proceedings of
the IEEE 106, no. 1 (2018): 38-60.
[2] Andrews, Jeffrey G., Xinchen Zhang, Gregory D. Durgin, and Abhishek K. Gupta. "Are
we approaching the fundamental limits of wireless network densification?." IEEE
Communications Magazine 54, no. 10 (2016): 184-190.
[3] Dey, Kakan Chandra, Anjan Rayamajhi, Mashrur Chowdhury, Parth Bhavsar, and James
Martin. "Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a
heterogeneous wireless network–Performance evaluation." Transportation Research Part C:
Emerging Technologies 68 (2016): 168-184.
[4] Xiao, Yang, ed. Security in sensor networks. CRC Press, 2016.
[5] Pathan, Al-Sakib Khan, ed. Security of self-organizing networks: MANET, WSN, WMN,
VANET. CRC press, 2016.
[6] Zhou, Xiangyun, Yan Zhang, and Lingyang Song. Physical layer security in wireless
communications. Crc Press, 2016.
[7] Zhao, Nan, F. Richard Yu, Ming Li, Qiao Yan, and Victor CM Leung. "Physical layer
security issues in interference-alignment-based wireless networks." IEEE Communications
Magazine 54, no. 8 (2016): 162-168.
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.