ITC513 Wireless Networking Concepts : Solution Essays

Question:

1. Compare and contrast Channel reuse in WLAN with frequency reuse in Mobile Phone networks? Explain with the help of diagrams.
2. Research the security challenges for any two examples of WMAN technologies.
3. Read the two recent research papers on the topic of Internet of Things (IoT) as saved in the resources folder; please give your critical reflection on the topic of Energy Harvest.
4. Telestra is a company that is licensed to provide wired telecommunication services in Australia. The company has contracted Exetel to assist it with the selection and implementation of a new field service system. The goal is to provide service technicians with wireless access to the corporate network and a vast electronic library of technical manuals and schematic diagrams, which would reduce or eliminate the need for staff to carry a large number of books and drawings, especially while servicing equipment underground or when climbing on transmission towers. In addition, this means that the technicians would be able to immediately read and update the records for all the equipment, thereby avoiding massive amounts of paperwork as well as potential errors and omissions. However, the company is having trouble deciding on which technology to adopt- handheld cellular, tables with 3G/4G/5G access, or notebooks equipped with cellular cards. Exetel has asked you to help.
 
Create a presentation outlining the advantages for Telestra of using digital cellular handsets or cellular wireless cards. Determine the ability of the smaller cellular handsets (as opposed to notebook computers, which may be difficult to carry everywhere) to display standard PC documents such as Word, Excel, and PDF files, and evaluate how this could help the company. Because the group you will be presenting to is composed of nontechnical manager, be sure your presentation is understandable by both technical and non-technical personnel. Limit yourself to a maximum of 15 PowerPoint slides.
 
 

Answer:

Introduction:

CCI stands for Co-Channel Interference which is defined as a method of crosstalk from two or various kinds of radio transmitter by making use of same frequency (Bellalta, 2016). There may be various reason behind Co-Channel interference. In some of densely populated area it may be possible to have an idea regarding the AP with other AP making use of same kind of channel. This will ultimately result in creation of Co-Channel Interference and also reduces some of the over usage of a channel in a particular or given area.

Channel reuse property enables or provides dynamic control over the receiver side that is sensitivity to make an improvisation of spatial reuse in the channel. The feature of channel reuse is generally applied to non-DFS channel only. It is internally changed for various kinds of DFS channel and it does not affect the detection of radar signature. Channel reuse feature can be easily configured to make use of three proper modes namely static, dynamic and lastly disable.  

The static mode of operation is nothing but a coverage kind of operation which is generally based on Coverage Channel Assessment (CCA) methods (Bellalta et al., 2014). The CCA is maintained as per the needs of configured properly as per the level of AP so that AP can easily increase the transmit power with decrease in threshold of CCA.

In the dynamic mode CCA stands for threshold which is generally based on various kinds of channel loads and it also take into account the location of various kinds of clients which are generally associated with it (Bou-Harb et al., 2013). When the option or feature of channel reuse is changed into dynamic kind of mode this kind of mode generally enables the wireless medium to change into AP.

The disable mode does not give any time of support for proper tuning of CCA notification or detection of various kinds of threshold.

In the various kinds of cellular network, frequency is allocated or provided to various kinds of services which are provided in kind of regular pattern which is also known as cell. It is generally maintained by various kinds of base station (Florwick et al., 2013). In various kinds of mobile phone this kinds of cells are hexagonal in structure. In the case of radio broadcast some similar kind of structure must be developed which is generally based or dependent on various kinds of rhombic kinds of cell. It mainly ensures or checks the mutual kind or type of interference in various kinds of users which mainly remain under the harmful level. Adjacent kind or type of cell generally makes use of different kinds or types of frequencies. In many cases it is noticed that a group or set of C different kind or type of frequency makes use of cluster over the adjacent cells associated with it (Gamage et al., 2014). Various kinds of cluster patterns and corresponding frequencies are re-used in various types of regular pattern which available in regular pattern over the service area. Cluster pattern and various kinds of frequencies are generally reused in various kinds of regular pattern which is fully used in various kinds of service based networks. The summation of bandwidth of the whole system is taken to C times the total value of bandwidth which is given by a single type of cell.

WMAN on expanding stands for Wireless Metropolitan Network aims to give a place for implementation of various kinds of services based on wireless LAN. In this type of place connection is generally established by making use of structure of building in a particular area or zone which is taken to have a connection. It generally consists of various types of building in a zone or city which can easily make use of back up or fiber cabling. It mainly provides various kinds of cabling which are based on based on single data of various kinds of data points (Ghosh et al., 2012). WiMAX stands for Worldwide Interoperability of Microwave access is a well-known type of Wireless Networking. It is a well-known type of broadband service which makes use of high rate of connectivity over a large distance which is the main reason of popularity among various kinds of internet providers or suppliers (Jamil, Cariou & Helard, 2014). There are large number of problems which are encountered in WiMAX technology like attack from DOS, man in the middle type of attack.

 

In WiMAX technology there are mainly two type of problems are found or encountered in the physical layer.  

  • Jamming mainly starts by implementing strong amount of noise so it can minimize the capacity of channel which is taken to be suspicious or dangerous in nature or value which is taken to be dangerous. The jamming value can be improvised by improving the bandwidth or amount of power which is provided to a signal.
  • Scrambling is also a type or kind of jamming which is used for short value or value of time and it has some kinds of specification which are based on frame of WiMAX. Scrambles can be easily used for reducing the bandwidth of various kinds of victims which will improvise the processing of various kinds of data which mainly works by making use of some kind of methods of scrambling.

Denial of Service (DOS): DOS attack can be considered to be a powerful type of attack which is based on various kinds of wireless networks. This can be only established by making use of two phased service models (Leith et al., 2012). In the beginning first it is admitted to have a service flow which has a service flow that it is activated or turned off only after a certain limit of value. Attackers can easily launch various kinds of attacks based on signaling of various kinds of attacks which are based on overload with various kinds of state transmission which ultimately result in various kinds of denial of service attacks.

The first article that is intranet of things future to a future internet of things relates us to present status of various kinds of Internet of things. It merely focusses on the fact that how much of the value should be integrated into the homogeneous system. It also focusses on various kinds of key technical problems like heterogeneity, connectivity and lastly various kinds of scales, privacy and security, capabilities based on self- management and energy management (Novlan et al., 2012). The paper merely focuses or addresses the present type of Internet of Things which has a special stress on various kinds of concept and idea related to mobility and various kinds of wireless technology. All the different kinds of issue present in article has been discussed in detail in this case study. Energy in various kinds of phases like harvesting, conservation and consumption is considered to be a problem not specific in the area of IOT but also in the area of various domains of society. Effective communication and networking can be defined as heterogeneous environment which can be used for diverse support of network. Various kinds of issues like medium access control, routing, error control and quality of service is generally need in such a domain.

The second paper that is Design and Simulation of State of Art ZigBee transmitter for IOT wireless devices discussed about the various kinds of rapid development in domain of wireless networking (Saquib, Hossain & Kim, 2013). The paper merely focusses on high speed and long range of application of various wireless networking. ZigBee technology is mainly developed due to increasing demand for various kinds of low power and low value of data. This particular technology was mainly developed due as a result of Wireless Personal Area Network (WPAN) which is mainly used in various kinds of control and military application. The reason for using it are low cost, minimum data rate and it requires more amount of battery life. ZigBee based device are mainly based on various kinds of frequency bands 868 MHz, 2.4 GHz. It has a largest value of data rate that is 250K bits of data per second. The development in the field of VLSI technology has led to more efficient, small and designing at a faster rate. The paper merely focusses two blocks namely CRC block and Bit to symbol block which is considered to be part of ZigBee transmitter which is based on 2.4 GHz band of frequency (Zhu & Wang, 2012). The binary data which is transmitted to CRC and codes related to CRC which is being generated. The ZigBee transmitter mainly consist of layers like Medium access control, physical layer. Medium access control or MAC layer consist of two parts namely MAC header and MAC footer. A ZigBee transmitter mainly consist of four blocks namely CRC, Bit-to-Symbol, Symbol-to-chip and O-QSPK modulator.

 

References

Bellalta, B. (2016). IEEE 802.11 ax: High-efficiency WLANs. IEEE Wireless Communications, 23(1), 38-46.

Bellalta, B., Faridi, A., Barcelo, J., Checco, A., & Chatzimisios, P. (2014, May). Channel bonding in short-range wlans. In European Wireless 2014; 20th European Wireless Conference; Proceedings of (pp. 1-7). VDE.

Bou-Harb, E., Fachkha, C., Pourzandi, M., Debbabi, M., & Assi, C. (2013). Communication security for smart grid distribution networks. IEEE Communications Magazine, 51(1), 42-49.

Florwick, J., Whiteaker, J., Amrod, A. C., & Woodhams, J. (2013). Wireless lan design guide for high density client environments in higher education. Design guide, Cisco.

Gamage, A. T., Liang, H., Zhang, R., & Shen, X. (2014). Device-to-device communication underlaying converged heterogeneous networks. IEEE Wireless Communications, 21(6), 98-107.

Ghosh, A., Mangalvedhe, N., Ratasuk, R., Mondal, B., Cudak, M., Visotsky, E., … & Dhillon, H. S. (2012). Heterogeneous cellular networks: From theory to practice. IEEE communications magazine, 50(6).

Hajli, N., & Lin, X. (2016). Exploring the security of information sharing on social networking sites: The role of perceived control of information. Journal of Business Ethics, 133(1), 111-123.

Place your order
(550 words)

Approximate price: $22

Homework help cost calculator

600 words
We'll send you the complete homework by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 customer support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • 4 hour deadline
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 300 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
× How can I help you?