Discuss about the Wireless Network and Security for Communications Magazine.
The wireless network is the type of network that enables various devices to stay connected with the network [8]. The access points eventually intensify the signals of the wireless fidelity so that the device could be kept significantly far from the router and still lined with the network. There are numerous benefits of this wireless network like convenience, high productivity, and easy collaboration [1]. Due to these benefits, wireless networks are used in various organizations or even used by individuals. Several technologies are used in this wireless communication network.
The following report will outline a brief view on wireless network and all its technologies and applications, a detailed comparison among them. Finally, it will declare the best network out there.
The comparison among satellite communication technology, wireless fidelity, and Worldwide Interoperability for Microwave Access is as follows:
Main Factors |
Satellite communication Technology |
Wireless Fidelity (Wi-Fi) |
Worldwide Interoperability for Microwave Access |
i) Communication Spectrum |
Communication spectrum refers to the bandwidth spectrum. There are various communication spectra in several networking devices [13]. The six bands of satellite communication are Ka band, X band, Ku band, L band, C band, and S band. The respective spectra are 26 to 40 GHz, 12 to 18 GHz, 8 to 12 GHz, 4 to 8 GHz, 2 to 4 GHz and 1 to 2 GHz. The most used band amongst these is Ku band. |
The communication spectrum of Wi-Fi is separate in various locations in all over the world. There are several protocols present in the wide domain of IEEE 802.11. Each and every protocol has its respective frequency band. The frequency band for IEEE 802.11a is 5 GHz, the frequency band for IEEE 802.11b is 2.4 GHz, the frequency band for IEEE 802.11g is 2.4 GHz, the frequency band for IEEE 802.11n is 5 GHz, the frequency band for IEEE 802.11ac is 6 GHz, the frequency band for IEEE 802.11ad is up to 60 GHz, the frequency band for IEEE 802.11af is below 1 GHz and the frequency band for IEEE 802.11ah is 700 MHz. |
The communication spectrum of WiMax is different in various locations in all over the world. Two protocols are utilized. They are IEEE 802.16d and IEEE 802.16e. For IEEE 802.16d, the most utilized frequencies are 3.5 GHZ and 5.8 GHz. For IEEE 802.16e, the most utilized frequencies are 2.3 GHz, 2.5 GHz and 3.5 GHz [1]. |
ii) Modulation Techniques |
Three techniques for modulation are available- Orthogonal Quadrature Phase Shift Keying (OQPSK), Quadrature Phase Shift Keying (QPSK) and Binary Phase Shift Keying (BPSK) [3]. |
Two distinct techniques for modulation in Wi-Fi- QPSK and Complementary Coded Keying (CCK). |
Four distinct techniques for modulation in WiMax- 64 QAM or 64 Quadrature Amplitude Modulation, 16 QAM or 16 QPSK and BPSK [11]. |
iii) Medium Access Control Mechanism |
The MAC protocols of satellite technology are Frequency Division Multiple Access (FDMA) and Time Division Multiple Access (TDMA). |
The MAC of Wi-Fi is completely is based on IEEE 802.11 specifications. |
The MAC protocols of WiMax are utilized for fulfilling all the connections of point-to-multipoint orientation [6]. |
There are various types of wireless communication standards that are widely accepted by the users and also provide necessary range of balance, throughput of network and mobility to devices [9]. The enhancement of these standards is extremely important for the network. The wireless sensors that are connected by IoT are centralized for the designing of CPS. Thus, the security is extremely high with this integration.
The significant evaluations are given below:
UHF RFID and NFC: The newest form for RFID is ultra-high frequency RFID where the frequency is extremely high [12]. In the IoT, the data acquisition is checked to meet every requirement. The perception layer of the IoT needs practical requirements to be fulfilled and having the property of very low power consumption; UHF RFID is capable of doing so. The computational entities are easily combined with the physical system for cyber physical systems [5]. The RFID of ultra-high frequency is a basic form of cyber physical systems since the storage functions and controlling elements are present within it.
The Near Field Communication (NFC) is a collection of protocols that are utilized for communication and hence enabling a secured connection between the two. The restriction is that presence of smart phone is required here. The integration of NFC and IoTs mainly involve energy saving, higher security, and convenience. The medical field gets a huge benefit from this integration [3]. In case of CPS, NFC is responsible for stopping the eavesdropping and relay attacks on the computer devices.
ZigBee and Z-Wave: Personal area network is accessed with the ZigBee protocol of IEEE 802.15. The expenses are very less in comparison to others. For the IoTs, the protocol of ZigBee is integrated via ZigBee gateways [4]. It provides security and safety with proper stability to the protocol. In case of cyber physical systems, ZigBee provides highest possible level of security to the systems. Moreover, the lowest power microcontroller CC2530 is used here which ensures low power consumption.
Mesh network is present within the Z-Wave network. The radio waves that are utilized here are of extremely lower energy, which ensures low energy consumption. Z-Wave powers the IoTs [10]. The devices that provide smart lighting of the IoTs, are the type of mesh network, allowing communication even from 100 feet distance. For the CPS, Z-Wave is utilized in automated vehicles and robotics domains.
Bluetooth and Bluetooth Low Energy: Bluetooth is the easiest way to transfer any type of data. However, the data transfer is restricted to short distances [2]. This technology can be linked with all the systems for providing various easy modes of communication.
Bluetooth Low Energy or Bluetooth 4.0 is the next standard of wireless communication which is responsible for alerting the systems of house and hence the crimes get reduced [7]. In case of CPS, the Bluetooth low energy communicates amongst the master computer systems and slave microcontrollers.
After evaluating all the nine wireless networking standards for CPS and IoTs, the suitable network is UHF RFID. Having the maximum bandwidth, it is extremely effective and the range area is also high for this RFID, ranging from 300 MHZ to 3 GHz.
Conclusion
From the above discussion, it can be concluded that the above report has highlighted the best network which is the wireless network. This type of network can be set up by utilizing the radio signal frequencies. This network is extremely popular and acceptable worldwide due to its easy and simple setting up feature. Moreover, the overall expenses are reduced largely as no cables are involved in this network and thus all the problems and complexities with the wires are removed. Moreover, the computers and the systems are easily connected with the wireless networking in a cost effective way. The security of this type of network is also high and no security protections are required here.
References
[1] Burg, Andreas, Anupam Chattopadhyay, and Kwok-Yan Lam. “Wireless Communication and Security Issues for Cyber–Physical Systems and the Internet-of-Things.” Proceedings of the IEEE 106, no. 1 (2018): 38-60.
[2] Andrews, Jeffrey G., Xinchen Zhang, Gregory D. Durgin, and Abhishek K. Gupta. “Are we approaching the fundamental limits of wireless network densification?.” IEEE Communications Magazine 54, no. 10 (2016): 184-190.
[3] Dey, Kakan Chandra, Anjan Rayamajhi, Mashrur Chowdhury, Parth Bhavsar, and James Martin. “Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network–Performance evaluation.” Transportation Research Part C: Emerging Technologies 68 (2016): 168-184.
[4] Xiao, Yang, ed. Security in sensor networks. CRC Press, 2016.
[5] Pathan, Al-Sakib Khan, ed. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press, 2016.
[6] Zhou, Xiangyun, Yan Zhang, and Lingyang Song. Physical layer security in wireless communications. Crc Press, 2016.
[7] Zhao, Nan, F. Richard Yu, Ming Li, Qiao Yan, and Victor CM Leung. “Physical layer security issues in interference-alignment-based wireless networks.” IEEE Communications Magazine 54, no. 8 (2016): 162-168.
[8] Chen, Yuang, and Thomas Kunz. “Performance evaluation of IoT protocols under a constrained wireless access network.” In Selected Topics in Mobile & Wireless Networking (MoWNeT), 2016 International Conference on, pp. 1-7. IEEE, 2016.
[9] Shin, Seungwon, Lei Xu, Sungmin Hong, and Guofei Gu. “Enhancing network security through software defined networking (SDN).” In Computer Communication and Networks (ICCCN), 2016 25th International Conference on, pp. 1-9. IEEE, 2016.
[10] Liyanage, Madhusanka, Ahmed Bux Abro, Mika Ylianttila, and Andrei Gurtov. “Opportunities and challenges of software-defined mobile networks in network security.” IEEE Security & Privacy 14, no. 4 (2016): 34-44.
[11] Mahgoub, Imad, and Mohammad Ilyas. Sensor network protocols. CRC press, 2016.
[12] Sarkar, Subir Kumar, T. G. Basavaraju, and C. Puttamadappa. Ad hoc mobile wireless networks: principles, protocols, and applications. CRC Press, 2016. He, Debiao, Sherali Zeadally, Neeraj Kumar, and Jong-Hyouk Lee. “Anonymous authentication for wireless body area networks with provable security.” IEEE Systems Journal 11, no. 4 (2017): 2590-2601.
[13] He, Debiao, Sherali Zeadally, Neeraj Kumar, and Jong-Hyouk Lee. “Anonymous authentication for wireless body area networks with provable security.” IEEE Systems Journal 11, no. 4 (2017): 2590-2601.
[14] Makimoto, Mitsuo, and Sadahiko Yamashita. Microwave resonators and filters for wireless communication: theory, design and application. Vol. 4. Springer Science & Business Media, 2013.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.