Tuesday, May 5, 2020

Wireless Networking Concepts for Mobile Phone- myassignmenthelp

Question: Discuss about theWireless Networking Concepts for Mobile Phone. Answer: Compare and contrast channel reuse in WLAN with frequency reuse in mobile phone networks? Explain with the help of diagrams. Contrast Frequency reuse is a technique of reusing frequencies and the channel within the communication system especially the mobile phone networks. The frequency reuse has been a fundamental concept on which the commercial wireless system is involved in the partitioning of the RF radiating region into the cells (Buddhikot, Kolodzy Miller, 2015). The enhanced in the capacity to the wireless network, when compared with the network with the single transmitter, which originates from the point that the same radio frequency might be reused in various area for a complete distinct transmission. On the difference to the reuse in the mobile phone network implies that the frequencies allocated to the service are reused in the typical patterns covered by among the base station. When it comes to the reuse in the WLAN, the reuse enables the dynamic manage over receive sensitivity to be able to build up on the spatial reuse of the channel (Buddhikot, Kolodzy Miller, 2015). The reuse is applicable to the Non-DFS channels solely. On the contrast when it comes to frequency reuse in mobile phone networks, each and every cell has been allocated the part of the overall frequency spectrum. The clients usually transfer to the given cell, they are then allowed in utilizing the channel that has been allotted to that given cell (Buddhikot, Kolodzy Miller, 2015). The virtue to the cellular system is that the numerous cells might use the same channel so long as the cells are separated by the range that is minimal based on propagation features. When it comes to frequency reuse in Mobile phone networks, it cover a large geographical areas with limited amount of the spectrum which leads to the reuse of the same frequency in various location which leads to the co- channel interference considerations (Elarabi, Deep Rai, 2015). On the contrast, the large covering area with a number of WLAN cells spectrum allows only three non-overlapping radio channels, which result to small three cells re-use factor hence limiting on the aggregate throughputs. Figure: The Diagram shows the aggregate output. Similarities In both they use the use with the same frequencies for the purpose of communication referred to as the co-channel cells. In both the co-channel interferences could be reduced through increase in the reuse distance. Research the security challenges for any two examples of WMAN technologies. Examples of the WMAN technologies are WiMax and SMDS. These are discussed as follows on their security challenges they encounter. WiMax WiMax is envisioned broadband wireless access mechanism for the delivering the high speed connection over the long distances. Nevertheless, this technology experiences certain security issues they are; rogue base stations, the DoS attacks, man in the middle attacks in addition to the coverage manipulation with the spoofed management support frames (Elarabi, Deep Rai, 2015). SMDS This is a public packet switched service which is aimed at the enterprise which needs to exchange a large amount of the data that the organization over the extensive area network on the non-constant (Elarabi, Deep Rai, 2015). It provides the architecture to this type of data exchange and a set of the services. The SMDS could extend the performance as well as conveniences of organization LAN over wide area. Security challenges There is unmanaged use of the wireless network outside the enterprise. There has been security issue of the hackers (Elarabi, Deep Rai, 2015). There has been growing problem of active attacks from the hackers since the wireless computing has offered attractive targets to the hackers. Read the two recent research papers on the topic of internet of Things (IOT) as saved in the resources folder; please give your critical reflection on the topic of Energy Harvest. The concept of energy harvesting presents straight forwarding solution to easy powering the remote devices through use of clean energy (Loo, Mauri Ortiz, 2016). The wireless terminals which are designed with the sensors feature among the things and devices on the IOT. The internet of things continues to be an emerging computing concept which emphasizes a structure in every day physical objects and each has provided a distinctive identifier (Loo, Mauri Ortiz, 2016) .The long term as well as the self sustainable operation are the major components when it comes to the realization to the complex network and this entail a energy aware device which are capable of harvesting the required energy from various sources (Loo, Mauri Ortiz, 2016). The research papers have considered various energy sources and the criteria for harvesting entails determining whether or not it might provide the required power level to the sensor node (Zorzi, Gluhak, Lange Bassi, 2010). Additionally, you should no tice that the dissipates of the power throughout the conversion of the voltage, dissipation boosts as the input as well as the output ratio in the voltage increase. Advantages for Telestra of using digital cellular handsets or cellular wireless cards. Advantages of Cellular handsets Flexibility: using the cellular handset allows increase in the flexibility while working. The more an individual is the more flexible they are, and the greater and the chances you could show the clients on the way the business is going (Loo, Mauri Ortiz, 2016). Telestra technicians will they are away from the office they are able to carry and access electronic library of the technical manual and the schematic drawing will they are in field as opposed to carrying large number of books and drawing. Technology: many of the cellular handsets they have the capability to perform many tasks which the computer could. One can access the internet, send document whenever they are. In the case of Telestra technicians they will be able to immediately read and update the records for all the equipment in the field and avoid massive amount of paperwork with the handset. Additionally, they would still have access to the corporate network while in the field. Easy monitoring while away: the cellular handsets are equipped with the GPS so that the user could be tracked. This feature enables the head personnel in the Telestra Company to monitor their technician while they are in the field work (Loo, Mauri Ortiz, 2016). Advantages of Cellular wireless cards The wireless network cards are comparatively cheaper compared to the wired networks because they necessitate no cables between the computer or the notebooks equipped with the wireless cellular cards (Loo, Mauri Ortiz, 2016). The decrease of the cables also decreases on the trip hazard that is due to the cables that are running along the floor. The wireless cellular cards are mobile and versatile. It is much adaptable to most situations and requirements. As much as the cellular wireless cards are advantageous to be used in the notebooks, they are much bulky than the cellular handset (Loo, Mauri Ortiz, 2016). I believe the cellular handset are more convenient and can be used efficiently to carry duties by the technicians of Telestra Company as opposed to the notebooks computers equipped with the cellular wireless cards. References Buddhikot, M. M., Kolodzy, P., Miller, S. C. (2015). U.S. Patent No. 9,161,231. Washington, DC: U.S. Patent and Trademark Office. Elarabi, T., Deep, V., Rai, C. K. (2015, December). Design and simulation of state-of-artZigBee transmitter for IoT wireless devices. In Signal Processing and Information Technology (ISSPIT), 2015 IEEE International Symposium on (pp. 297-300). IEEE. Loo, J., Mauri, J. L., Ortiz, J. H. (Eds.). (2016). Mobile ad hoc networks: current status and future trends. CRC Press. Zorzi, M., Gluhak, A., Lange, S., Bassi, A. (2010). From today's intranet of things to a future internet of things: a wireless-and mobility-related view. IEEE Wireless Communications, 17(6).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.