Wireless Technology Report: Antennas, Protocols, and SDN Analysis
VerifiedAdded on 2023/06/09
|9
|2126
|468
Report
AI Summary
This report provides a comprehensive analysis of wireless technology, focusing on different types of antennas (Yagi, Horn, and Cellular) and network protocols (Internet Protocol, File Transfer Protocol, and OSI Protocol). It details their uses, strengths, weaknesses, and security challenges. Furthermore, the report includes a critical reflection on software-defined wireless networks based on two research papers, discussing the need for SDN in wireless networks and its potential impact on 5G evolution. The analysis covers the implementation of SDN, its benefits for data centers, and its ability to improve network flexibility and support dynamic traffic flow. This document is available on Desklib, a platform offering a wide range of study resources including past papers and solved assignments.

Running head: WIRELESS TECHNOLOGY
Wireless Technology
Name of the Student
Name of the University
Author note
Wireless Technology
Name of the Student
Name of the University
Author note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1WIRELESS NETWORK
1. Research on the different type of Antennas:
An antenna is a specific type of device which converts the electrical signal into
electromagnetic waves and vice-versa. The conversion of the signals is dependent on either
the antenna is in receiving mode or in the transmitting mode. In this article research will be
conducted on the Cellular antennas, Horn antennas and Yagi antennas. The uses of these
antennas will be discussed. Also, the weaknesses and strengths of these antennas will be
discussed.
1.a Yagi Antenna:
The Yagi antenna is a type of directional antenna which consists of multiple elements
paralleled in a line. The Yagi antenna was invented in Japan. The Yagi antenna consists of a
reflector element which is longer than the driven dipole (Sun et al., 2013). The waves outing
from the multiple elements interferes and superpose to maximize the radiation in a particular
direction which help to increase the gain range of the antenna.
Uses of Yagi antenna: The Yagi antenna is mainly used for the lower frequency
communication. The average frequency of the Yagi antenna is above 10 MHz
(Nguyen, Abbosh & Crozier, 2013). This type of lower frequency antenna used for
amateur radio communications and for some rare cases it is used for satellite
communication system.
Strengths and Weaknesses of the Yagi antenna: The Yagi antennas are the
directional antennas. Maximum of the Yagi antennas have a beam width of 50 to 70
degree as their main focus is on a single direction which makes Yagi antennas ideal
for receiving the weak signals. The main disadvantage of the Yagi antenna is that the
range of this antenna is very low. To increase the range, the antenna needed to be very
long which is practically impossible.
1. Research on the different type of Antennas:
An antenna is a specific type of device which converts the electrical signal into
electromagnetic waves and vice-versa. The conversion of the signals is dependent on either
the antenna is in receiving mode or in the transmitting mode. In this article research will be
conducted on the Cellular antennas, Horn antennas and Yagi antennas. The uses of these
antennas will be discussed. Also, the weaknesses and strengths of these antennas will be
discussed.
1.a Yagi Antenna:
The Yagi antenna is a type of directional antenna which consists of multiple elements
paralleled in a line. The Yagi antenna was invented in Japan. The Yagi antenna consists of a
reflector element which is longer than the driven dipole (Sun et al., 2013). The waves outing
from the multiple elements interferes and superpose to maximize the radiation in a particular
direction which help to increase the gain range of the antenna.
Uses of Yagi antenna: The Yagi antenna is mainly used for the lower frequency
communication. The average frequency of the Yagi antenna is above 10 MHz
(Nguyen, Abbosh & Crozier, 2013). This type of lower frequency antenna used for
amateur radio communications and for some rare cases it is used for satellite
communication system.
Strengths and Weaknesses of the Yagi antenna: The Yagi antennas are the
directional antennas. Maximum of the Yagi antennas have a beam width of 50 to 70
degree as their main focus is on a single direction which makes Yagi antennas ideal
for receiving the weak signals. The main disadvantage of the Yagi antenna is that the
range of this antenna is very low. To increase the range, the antenna needed to be very
long which is practically impossible.

2WIRELESS NETWORK
1.b Horn Antenna:
The Horn antenna consists of spreading metal waveguide shape same as a horn to
through the radio waves in a particular beam (Coupland & Serban, 2014). The Horn antennas
are popular for transmitting the microwave frequencies. The first Horn antenna was invented
in India in the year of 1897. Later the more advanced Horn antenna was invented in the year
of 1938.
Uses of Horn Antenna: The Horn antenna is used for transmitting microwaves to the
space using a waveguide and also it can receives signals in the waveguide for the
reception purpose. The Horn antenna is used in such cases where the required
frequency is above than 300 MHz.
Weaknesses and Strengths of Horn Antenna: The Horn antenna is able to deliver
adequate directivity and offer bandwidth about 10%. Also, by using the parabolic
reflector disc, it can produce high gain.
1.c Cellular Antenna:
The cellular antenna consists of a communication network which totally wireless. In
this type of communication antennas, the transceivers are distributed in the land areas in a
certain gap (Malicki & Johnson, 2017). This type of network can transmit data and voice over
the air.
Uses of Cellular Antenna: The main use of the cellular antenna is in mobile
communication sector where the cellular network is used for exchanging voice
between two individuals and data between sender and receivers (Heath et al., 2013).
Weaknesses and Strengths of Cellular Antenna: The main advantages of the
Cellular antenna is that it can handle a large number of users at the same time. Also,
the range of this type of cellular antennas is very widespread. The main weakness of
1.b Horn Antenna:
The Horn antenna consists of spreading metal waveguide shape same as a horn to
through the radio waves in a particular beam (Coupland & Serban, 2014). The Horn antennas
are popular for transmitting the microwave frequencies. The first Horn antenna was invented
in India in the year of 1897. Later the more advanced Horn antenna was invented in the year
of 1938.
Uses of Horn Antenna: The Horn antenna is used for transmitting microwaves to the
space using a waveguide and also it can receives signals in the waveguide for the
reception purpose. The Horn antenna is used in such cases where the required
frequency is above than 300 MHz.
Weaknesses and Strengths of Horn Antenna: The Horn antenna is able to deliver
adequate directivity and offer bandwidth about 10%. Also, by using the parabolic
reflector disc, it can produce high gain.
1.c Cellular Antenna:
The cellular antenna consists of a communication network which totally wireless. In
this type of communication antennas, the transceivers are distributed in the land areas in a
certain gap (Malicki & Johnson, 2017). This type of network can transmit data and voice over
the air.
Uses of Cellular Antenna: The main use of the cellular antenna is in mobile
communication sector where the cellular network is used for exchanging voice
between two individuals and data between sender and receivers (Heath et al., 2013).
Weaknesses and Strengths of Cellular Antenna: The main advantages of the
Cellular antenna is that it can handle a large number of users at the same time. Also,
the range of this type of cellular antennas is very widespread. The main weakness of
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3WIRELESS NETWORK
the cellular network is that is very tough to implement, and an intermediate platform
is also required to receive and transmit the data and voice.
All the above discussed antennas are having their own use in the various type of
fields, but when these three antennas are compared in the aspect of the future dominant
player, the Cellular antenna is the clear winner. Also, the Cellular antenna has a clear
advantage because the area coverage of the Cellular network is very high compared to the
other two ones.
2. Different types of Network Protocols:
In the aspect of a network model, there are various types of network protocols such as
File Transfer Protocol, Internet Protocol, Bluetooth Protocols, Electronic Trading Protocols,
OSI Protocols and many more. In this discussion, three types of protocols will be discussed
which are Internet Protocol, File Transfer Protocol and OSI Protocol.
2.a Internet Protocol:
The Internet Protocol is used for delivering the data packets from the source to a host.
The destination of the host can be determined by the IP addresses defined in the packet
headers (Deering & Hinden, 2017). The Internet Protocols encapsulate the data which is
needed to be delivered to the receiver. The Internet Protocol is also defined as TCP/IP which
was introduced by Bob Khan and Vint Cerf in the year of 1974.
Uses of Internet Protocol: The Internet Protocol is used for transmitting data
between two devices consisting of one sender and one receiver and the devices may or
may not be in the same network. Also, the Internet Protocol is used for transmitting
the data safely as this uses the encapsulation technique for data hiding (Altberg et al.,
2013).
the cellular network is that is very tough to implement, and an intermediate platform
is also required to receive and transmit the data and voice.
All the above discussed antennas are having their own use in the various type of
fields, but when these three antennas are compared in the aspect of the future dominant
player, the Cellular antenna is the clear winner. Also, the Cellular antenna has a clear
advantage because the area coverage of the Cellular network is very high compared to the
other two ones.
2. Different types of Network Protocols:
In the aspect of a network model, there are various types of network protocols such as
File Transfer Protocol, Internet Protocol, Bluetooth Protocols, Electronic Trading Protocols,
OSI Protocols and many more. In this discussion, three types of protocols will be discussed
which are Internet Protocol, File Transfer Protocol and OSI Protocol.
2.a Internet Protocol:
The Internet Protocol is used for delivering the data packets from the source to a host.
The destination of the host can be determined by the IP addresses defined in the packet
headers (Deering & Hinden, 2017). The Internet Protocols encapsulate the data which is
needed to be delivered to the receiver. The Internet Protocol is also defined as TCP/IP which
was introduced by Bob Khan and Vint Cerf in the year of 1974.
Uses of Internet Protocol: The Internet Protocol is used for transmitting data
between two devices consisting of one sender and one receiver and the devices may or
may not be in the same network. Also, the Internet Protocol is used for transmitting
the data safely as this uses the encapsulation technique for data hiding (Altberg et al.,
2013).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4WIRELESS NETWORK
Strengths and Weaknesses of the Internet Protocol: The main strength of the
Internet Protocol is that it is very easy to implement as it supports every modern
operating system in present situation. Also, the IP is very much stable as it is running
for a long time. The weakness of the Internet Protocol is that it is vulnerable to many
types of attacks such as SYN attacks and DNS flaws which is the main security
challenge for the IP.
2.b File Transfer Protocol:
The File Transfer Protocol is a client-server based protocol which consists of a
communication channel between the server and the client. In this protocol, a command
channel is used for controlling the data transfer (Hall, 2013).
Uses of File Transfer Protocol: The File Transfer Protocol is used for transferring
the files and data between two servers over a secure network.
Strengths and Weakness of File Transfer Protocol: The main strengths of the FTP
is that it can send multiple files at the same time and the FTP has the ability of pause
and resume the file transfer progress. The FTP is vulnerable to FTP bounce attack and
FTP Brute force attack which is major security challenges in the FTP.
2.c OSI Protocol:
The OSI protocol is the standards for exchanging the information (Liang, Kaki &
Chen, 2014). The OSI protocol was developed and designed by the International
Organization of Standardization.
Uses of OSI Protocol: The OSI protocol is used for communication purpose between
two devices which is internally divided into seven group, and each of the group is
connected to each other with related functions.
Strengths and Weaknesses of the Internet Protocol: The main strength of the
Internet Protocol is that it is very easy to implement as it supports every modern
operating system in present situation. Also, the IP is very much stable as it is running
for a long time. The weakness of the Internet Protocol is that it is vulnerable to many
types of attacks such as SYN attacks and DNS flaws which is the main security
challenge for the IP.
2.b File Transfer Protocol:
The File Transfer Protocol is a client-server based protocol which consists of a
communication channel between the server and the client. In this protocol, a command
channel is used for controlling the data transfer (Hall, 2013).
Uses of File Transfer Protocol: The File Transfer Protocol is used for transferring
the files and data between two servers over a secure network.
Strengths and Weakness of File Transfer Protocol: The main strengths of the FTP
is that it can send multiple files at the same time and the FTP has the ability of pause
and resume the file transfer progress. The FTP is vulnerable to FTP bounce attack and
FTP Brute force attack which is major security challenges in the FTP.
2.c OSI Protocol:
The OSI protocol is the standards for exchanging the information (Liang, Kaki &
Chen, 2014). The OSI protocol was developed and designed by the International
Organization of Standardization.
Uses of OSI Protocol: The OSI protocol is used for communication purpose between
two devices which is internally divided into seven group, and each of the group is
connected to each other with related functions.

5WIRELESS NETWORK
Strengths and Weakness of OSI Protocol: The main strength of the OSI protocol is
that it can provide the defined services to the one layer above or one layer down from
the present layer. The main disadvantage of the OSI protocol is that the layers of the
protocol cannot work in parallel. Each of the layers has to wait to receive data from its
previous layer. The main security issues that the OSI protocol is facing is the Denial
of service attack.
From the above report it can be stated that the network protocols may have many
major security issues, but without the network protocols, it is impossible to communicate
with the other devices. It has become a necessary thing for the communication purpose, and
with the time these protocols are improving to serve the community better.
3. Critical Reflection on Software based wireless network:
In the article of “An architecture for software-defined wireless networking. IEEE
Wireless Communications” the author have proposed a high level architecture for the
advantage of Software defined network. The author also reviewed ongoing SDN topics and
had identified some future need for the SDN mechanism for the wireless network field
(Bernardos et al., 2014).
The other article of “Software Defined Wireless Networks: A Survey of Issues and
Solutions” defines various SDN based 4G solutions. Beside that, the authors have also
compared this 4G solution with various parameters. The author also stated how the 5G
evolution will handle ultra-low latency, increased traffic demands and higher data demands
(Rangisetti & Tamma, 2017). At the end of the article, the author summarized how SDN
would address the 5G requirements.
Both of the two paper have stated the implementation of SDN in the wireless network
segment. From the critical analysis of the above two articles, it can be concluded that the
Strengths and Weakness of OSI Protocol: The main strength of the OSI protocol is
that it can provide the defined services to the one layer above or one layer down from
the present layer. The main disadvantage of the OSI protocol is that the layers of the
protocol cannot work in parallel. Each of the layers has to wait to receive data from its
previous layer. The main security issues that the OSI protocol is facing is the Denial
of service attack.
From the above report it can be stated that the network protocols may have many
major security issues, but without the network protocols, it is impossible to communicate
with the other devices. It has become a necessary thing for the communication purpose, and
with the time these protocols are improving to serve the community better.
3. Critical Reflection on Software based wireless network:
In the article of “An architecture for software-defined wireless networking. IEEE
Wireless Communications” the author have proposed a high level architecture for the
advantage of Software defined network. The author also reviewed ongoing SDN topics and
had identified some future need for the SDN mechanism for the wireless network field
(Bernardos et al., 2014).
The other article of “Software Defined Wireless Networks: A Survey of Issues and
Solutions” defines various SDN based 4G solutions. Beside that, the authors have also
compared this 4G solution with various parameters. The author also stated how the 5G
evolution will handle ultra-low latency, increased traffic demands and higher data demands
(Rangisetti & Tamma, 2017). At the end of the article, the author summarized how SDN
would address the 5G requirements.
Both of the two paper have stated the implementation of SDN in the wireless network
segment. From the critical analysis of the above two articles, it can be concluded that the
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6WIRELESS NETWORK
large data centres do not support the dynamic requirement of the server virtualization for
which the SDN is needed. Also, apart from the data centres SDN can change the wireless
networks, branch networks and campus network with the open API structure and can improve
network flexibility to support the dynamic traffic flow to ensure the quality service.
large data centres do not support the dynamic requirement of the server virtualization for
which the SDN is needed. Also, apart from the data centres SDN can change the wireless
networks, branch networks and campus network with the open API structure and can improve
network flexibility to support the dynamic traffic flow to ensure the quality service.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7WIRELESS NETWORK
References:
Altberg, E., Faber, S., Hirson, R., Van der Linden, S., Agarwal, A., Ahuja, N., & Mehul, J. A.
I. N. (2013). U.S. Patent No. 8,599,832. Washington, DC: U.S. Patent and Trademark
Office.
Bernardos, C. J., Oliva, A. d. l., Serrano, P., Banchs, A., Contreras, L. M., Jin, H., & Zuniga,
J. C. (2014). An architecture for software-defined wireless networking. IEEE
Wireless Communications, 21(3), 52-61.doi: 10.1109/MWC.2014.6845049.
Coupland, T., & Serban, G. (2014). U.S. Patent No. 8,878,740. Washington, DC: U.S. Patent
and Trademark Office.
Deering, S., & Hinden, R. (2017). Internet protocol, version 6 (IPv6) specification (No. RFC
8200).
Hall, R. J. (2013). A Geocast Based File Transfer Protocol. In MILCOM (pp. 150-156).
Heath, R., Peters, S., Wang, Y., & Zhang, J. (2013). A current perspective on distributed
antenna systems for the downlink of cellular systems. IEEE Communications
Magazine, 51(4), 161-167.
Liang, Y. C., Kaki, S., & Chen, Y. F. (2014). U.S. Patent No. 8,656,488. Washington, DC:
U.S. Patent and Trademark Office.
Malicki, J. J., & Johnson, C. A. (2017). The cilium: cellular antenna and central processing
unit. Trends in cell biology, 27(2), 126-140.
Nguyen, P. T., Abbosh, A., & Crozier, S. (2013). Wideband and compact quasi-Yagi antenna
integrated with balun of microstrip to slotline transitions. Electronics Letters, 49(2),
88-89.
References:
Altberg, E., Faber, S., Hirson, R., Van der Linden, S., Agarwal, A., Ahuja, N., & Mehul, J. A.
I. N. (2013). U.S. Patent No. 8,599,832. Washington, DC: U.S. Patent and Trademark
Office.
Bernardos, C. J., Oliva, A. d. l., Serrano, P., Banchs, A., Contreras, L. M., Jin, H., & Zuniga,
J. C. (2014). An architecture for software-defined wireless networking. IEEE
Wireless Communications, 21(3), 52-61.doi: 10.1109/MWC.2014.6845049.
Coupland, T., & Serban, G. (2014). U.S. Patent No. 8,878,740. Washington, DC: U.S. Patent
and Trademark Office.
Deering, S., & Hinden, R. (2017). Internet protocol, version 6 (IPv6) specification (No. RFC
8200).
Hall, R. J. (2013). A Geocast Based File Transfer Protocol. In MILCOM (pp. 150-156).
Heath, R., Peters, S., Wang, Y., & Zhang, J. (2013). A current perspective on distributed
antenna systems for the downlink of cellular systems. IEEE Communications
Magazine, 51(4), 161-167.
Liang, Y. C., Kaki, S., & Chen, Y. F. (2014). U.S. Patent No. 8,656,488. Washington, DC:
U.S. Patent and Trademark Office.
Malicki, J. J., & Johnson, C. A. (2017). The cilium: cellular antenna and central processing
unit. Trends in cell biology, 27(2), 126-140.
Nguyen, P. T., Abbosh, A., & Crozier, S. (2013). Wideband and compact quasi-Yagi antenna
integrated with balun of microstrip to slotline transitions. Electronics Letters, 49(2),
88-89.

8WIRELESS NETWORK
Rangisetti, A. K., & Tamma, B. R. (2017). Software Defined Wireless Networks: A Survey
of Issues and Solutions. Wireless Personal Communications, 97(4), 6019-
6053. doi: 10.1007/s11277-017-4825-8.
Sun, H., Guo, Y. X., He, M., & Zhong, Z. (2013). A dual-band rectenna using broadband
Yagi antenna array for ambient RF power harvesting. IEEE Antennas and Wireless
Propagation Letters, 12, 918-921.
Rangisetti, A. K., & Tamma, B. R. (2017). Software Defined Wireless Networks: A Survey
of Issues and Solutions. Wireless Personal Communications, 97(4), 6019-
6053. doi: 10.1007/s11277-017-4825-8.
Sun, H., Guo, Y. X., He, M., & Zhong, Z. (2013). A dual-band rectenna using broadband
Yagi antenna array for ambient RF power harvesting. IEEE Antennas and Wireless
Propagation Letters, 12, 918-921.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.