Wireless Networking Concepts: Channel Reuse, Security, IoT, Telstra

Verified

Added on  2020/05/28

|15
|1083
|28
Homework Assignment
AI Summary
This assignment solution addresses several key concepts in wireless networking. It begins by comparing and contrasting channel reuse in Wireless Local Area Networks (WLANs) with frequency reuse in mobile phone networks, supported by diagrams. The solution then delves into the security challenges of Wireless Metropolitan Area Network (WMAN) technologies, specifically Wi-Fi and WiMAX, identifying vulnerabilities like unauthorized data access, Denial of Service (DoS) attacks, lack of authentication, and lack of encryption. The assignment also includes a critical reflection on the topic of Energy Harvest within the context of the Internet of Things (IoT), based on two provided research papers, one focusing on ZigBee technology and the other on the evolution of the Intranet of Things. Finally, the solution encompasses a presentation on the Telstra case study, though the content of the presentation is not detailed in the provided text. The assignment demonstrates an understanding of various wireless technologies, their security implications, and emerging trends like IoT.
Document Page
Running head: WIRELESS NETWORKING CONCEPTS
Wireless Networking Concepts
Name of the Student
Name of the University
Author’s Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
WIRELESS NETWORKING CONCEPTS
Table of Contents
Question 1..................................................................................................................................3
Question 2..................................................................................................................................4
Question 3..................................................................................................................................5
Question 4..................................................................................................................................6
References................................................................................................................................14
Document Page
3
WIRELESS NETWORKING CONCEPTS
Question 1
Compare and contrast Channel reuse in WLAN with frequency reuse in Mobile Phone
networks? Explain with the help of diagrams.
Answer: Channel reuse in wireless local area of network in the mobile phone networks
usually allows control on the side of the receiver. The major characteristic of this channel
reuse is that it is always applied to the non-DFS or non distributed file system (Ghosh et al.,
2012). Channel reuse is altered internally for the several types of distributed file system and it
never affects radar signature. This is configured for the utilization of three distinct modes of
disable, dynamic and static.
Figure 1: Channel Reuse in WLAN
(Source: )
Frequency is generally allocated to several types of cellular networks in the form of
patterns. The base station is responsible for the maintenance of the cells (Hajli & Lin, 2016).
Document Page
4
WIRELESS NETWORKING CONCEPTS
For the mobile phones, the cells have the structure of hexagon. The cells ensure if there is any
similarity amongst the interference for several users (Gamage et al., 2014). Te contiguous
cells further make the utilization of all the various types of frequencies. Most of the time, the
frequency is clustered on the cells. These clustered frequencies are often reused in several
types of the regular pattern for the complete utilization of networks.
Figure 2: Frequency Reuse
(Source: )
Question 2
Research the security challenges for any two examples of WMAN technologies.
Answer: The two examples of WMAN technologies are the Wi-fi and WiMAX. The security
challenges of these two above mentioned WMAN technologies are as follows:
i) Wi-Fi: Wi-fi or wireless fiction is a wireless technology that provides fast
networking to a broad area with extremely less complexities (Duarte et al., 2014). The
security challenges of this technology are as follows:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
WIRELESS NETWORKING CONCEPTS
a) Unauthorized Access to Data: Wi-Fi has a major problem of authorized data access
(Leith et al., 2012).
b) DOS or Denial of Service: DoS attacks are extremely common for Wi-Fi.
c) Alteration of information: The information is often altered or theft in Wi-fi.
ii) WiMax: WiMAx or Worldwide Interoperability for Microwave Access is an
important technology of WMAN (Bellalta, 2016). The security challenges of WiMax are as
follows:
a) Lack of Authentication: WiMAX has a security issue because of the lack of
authentication.
b) Lack of encryption: The data is not encrypted in WiMAX.
c) DoS attacks: DoS attacks are very common for WiMAX.
Question 3
Read the two recent research papers on the topic of Internet of Things (IoT) as saved in the
resources folder; please give your critical reflection on the topic of Energy Harvest.
Answer: I have gone through the two research papers on IoT.
The first paper, i.e., “Design and Simulation of State-of-Art Zigbee Transmitter for
IoT Wireless Devices”, discusses about ZigBee technology. The extraordinary demands for
the low consumption of data and network have created ZigBee technology (Elarabi, Deep &
Rai, 2015). It is WPAN technology with extremely less cost and lower rate of data. ZigBee
can operate in the frequency bands of 868MHz, 915MHz and 2.4GHz. It has a potential
application in IoT.
Document Page
6
WIRELESS NETWORKING CONCEPTS
The second paper, i.e., “From Today’s Intranet of Things to a Future Internet of
Things: A Wireless-And Mobility-Related View” discusses about the recent situation of
various Intranets of Things must change into more heterogeneous system (Zorzi et al., 2010).
There are several technical challenges of wireless-and mobility-related view.
Question 4
Create a presentation on the Telestra Case Study.
Answer:
Document Page
7
WIRELESS NETWORKING CONCEPTS
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8
WIRELESS NETWORKING CONCEPTS
Document Page
9
WIRELESS NETWORKING CONCEPTS
Document Page
10
WIRELESS NETWORKING CONCEPTS
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
11
WIRELESS NETWORKING CONCEPTS
Document Page
12
WIRELESS NETWORKING CONCEPTS
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]