An antenna is a transducer that converts the electrical signal to the electromagnetic waves during the transmitting mode and vice versa in receiving mode (Potapov, 2013, September). This paper would research about the Yagi antenna, Cellular antenna and Horn antenna. It would discuss the uses of these antennas along with their strengths and weakness.
The horn antenna is known as a Microwave antenna, and it uses a microwave frequency above 300 MHz It consists of a flaring metal waveguide with a horn like structure. The first horn antenna was introduced in 1897 in India (Pan et al., 2013).
It is used for the transmission of the microwaves to space with the help of a waveguide and reception of the signal in the waveguide. They are also used in the applications which require high performance such as radio telescope and feed horn for satellites.
The strength of horn antenna includes an absence of the resonant element and can operate over a wide bandwidth and range of frequency. The weakness is that due to spherical shape it fails to provide a directive beam.
It is appropriately known as the Yagi- Uda antenna. The Yagi antenna is directional in nature, and it consists of all the elements parallel in a line. The director element of Yagi antenna is shorter, and reflector element is longer than the driven pole. They have an average frequency above 10 MHz (Kim et al., 2014).
It is used for communication of low frequency. The application of the Yagi antenna is in amateur radio communication and rarely for satellite communication.
Yagi antenna is used in reception of weak signals as they have beam width between 50 and 70 degrees and single direction focus. The weakness of the Yagi antenna is that the range of antenna is low.
This type of antenna consists of the wireless communication network. The transceivers are distributed in the land areas a specific gap (Zhang et al., 2015). It can transmit voice and data.
It is used in the mobile communication for the exchange of data and voice signals between the transmitter and receiver.
The strength of cellular antenna is that it is capable of handling number of users at the same instant of time and the range of this antenna is wide (Zhang et al., 2015). The weakness is that it requires an immediate platform for reception and transmission of data and the implementation cost is high.
Comparing these antennas in the context of future dominant player, the cellular antenna can be considered as efficient. The coverage area of the cellular network is large than the other two antenna. Therefore the cellular antenna is recommended as the future of distance wireless links.
The network model consist of various network protocols such as Internet Protocol, File transfer protocol, Internet Protocol, Electronic trading protocol and Bluetooth protocol. This paper would consider the Internet Protocol,
It is used for transmitting datagram and enabling internetworking. It delivers the data packets from the source to the host. The IP address is used for determining the destination of the host in the packet headers. It is defined as the transmission control protocol which is introduced in 1974 (Demmer, Ott & Perreault, 2014).
This type of protocol is used for the transmission of data between the devices of sender and receiver considering that both the devices may or may not be in the same network (Demmer, Ott & Perreault, 2014). It uses encapsulation method which is used for hiding the data and thus can be implemented for transferring data safely.
The Internet protocol is considered to be stable. The strength is that the implementation of IP is easy and it supports modern OS. The weakness of IP can face security challenges such as DNS attack and SYN attack.
It is a client server protocol where the browser is a client, and the application running is the server (Fielding & Reschke, 2014). It is used to provide intermediate network elements for the communication between the server and the client.
It is used for transmitting data and files on the World Wide Web since 1990 (Fielding & Reschke, 2014). It is used for defining the method for formatting and transmitting the data and actions of browser and server for various commands.
The strength of HTTP protocol is that a single IP address can host the multiple numbers of websites. The disadvantage is that it is not encrypted and thus there is an issue of privacy of data.
It is a protocol based on the client server architecture which provides a communication channel between the client and server (Khan, Rehmani & Reisslein, 2016). The data transfer is controlled with the help of a command channel.
It is used for transferring of data and files securely between the two servers over a network.
The strength is that file transfer protocol can be used for sending numbers of files at the same time. It provides the facility of resuming and pausing the transfer of file (Khan, Rehmani & Reisslein, 2016). The disadvantage is that it faces security challenges such as Brute force attack and bounce attack.
The above discussion can be used to conclude that there are specific issues of network security in using these protocol, but network protocols are important for the communication between different devices.
This article "An architecture for software-defined wireless networking", the author has defined Software-defined networking as ideal for implementing wired networking. The author illustrates the SDN approach and reviews the standardization for the need of coordinated approach (Bernardos et al., 2014).
The reviewed article “Software Defined Wireless Network: A Survey of Issues and Solutions” provides the definition of different 4G solution based on SDN. The authors also provide a comparative study parameters of 4G solutions (Rangisetti & Tamma, 2017). The author states how the evolution of 5G will affect traffic demand increase, low latency and high data demands. The article ends by summarizing the implications of SDN in addressing the 5G requirements.
The critical analysis of this two articles concludes that the dynamic requirement of server virtualization is not supported by the data centers. It also summarizes that open API structure can be used for improving network flexibility and ensuring quality service.
Bernardos, C. J., Oliva, A. d. l., Serrano, P., Banchs, A., Contreras, L. M., Jin, H., & Zuniga, J. C. (2014). An architecture for software-defined wireless networking. IEEE Wireless Communications, 21(3), 52-61.doi: 10.1109/MWC.2014.6845049.
Demmer, M., Ott, J., & Perreault, S. (2014). Delay-tolerant networking TCP convergence-layer protocol (No. RFC 7242).
Fielding, R., & Reschke, J. (2014). Hypertext transfer protocol (HTTP/1.1): Semantics and content (No. RFC 7231).
Khan, A. A., Rehmani, M. H., & Reisslein, M. (2016). Cognitive radio for smart grids: Survey of architectures, spectrum sensing mechanisms, and networking protocols. IEEE Communications Surveys & Tutorials, 18(1), 860-898.
Kim, J., Roh, Y. G., Cheon, S., Choe, J. H., Lee, J., Lee, J., ... & Park, Q. H. (2014). Babinet-inverted optical Yagi–Uda antenna for unidirectional radiation to free space. Nano letters, 14(6), 3072-3078.
Pan, W., Huang, C., Chen, P., Pu, M., Ma, X., & Luo, X. (2013). A beam steering horn antenna using active frequency selective surface. IEEE Transactions on Antennas and Propagation, 61(12), 6218-6223.
Potapov, A. A. (2013, September). The base of fractal antenna theory and applications: Utilizing in electronic devices. In Antenna Theory and Techniques (ICATT), 2013 IX International Conference on (pp. 62-67). IEEE.
Rangisetti, A. K., & Tamma, B. R. (2017). Software Defined Wireless Networks: A Survey of Issues and Solutions. Wireless Personal Communications, 97(4), 6019-6053. doi: 10.1007/s11277-017-4825-8.
Zhang, J. A., Huang, X., Dyadyuk, V., & Guo, Y. J. (2015). Massive hybrid antenna array for millimeter-wave cellular communications. IEEE Wireless Communications, 22(1), 79-87.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Wireless Networking Concepts. Retrieved from https://myassignmenthelp.com/free-samples/itc513-wireless-networking-concepts/long-distance-wireless-links.html.
"Wireless Networking Concepts." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/itc513-wireless-networking-concepts/long-distance-wireless-links.html.
My Assignment Help (2021) Wireless Networking Concepts [Online]. Available from: https://myassignmenthelp.com/free-samples/itc513-wireless-networking-concepts/long-distance-wireless-links.html
[Accessed 16 April 2021].
My Assignment Help. 'Wireless Networking Concepts' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/itc513-wireless-networking-concepts/long-distance-wireless-links.html> accessed 16 April 2021.
My Assignment Help. Wireless Networking Concepts [Internet]. My Assignment Help. 2021 [cited 16 April 2021]. Available from: https://myassignmenthelp.com/free-samples/itc513-wireless-networking-concepts/long-distance-wireless-links.html.
Accounting requires a lot of calculation in the balance sheets, chart of accounts, tax accounting, etc. But, you can calculate the complex questions using our scientific calculators and algebra calculators. Thus, you get optimum accounting assignment help, and at the same time, you can save valuable time while acing your task. If you stumble across any problem, you can avail our assignment help.
Answer: This particle paper is all about reviewing literature on Internet of things. The paper highlights the importance of Internet of Things along with focusing on protocol, issues of application and technologies. IOT has encountered development in various fields like RFID, communication technologies and smart sensors. The main notion of technology is all about smart sensor t...
Read MoreAnswer: A problem addressed The author is addressing the challenge of estimation of video QoE by use of QoS metrics by focusing on the understanding of ABR (adaptive bitrate) streaming. This is through evaluation of several metrics of QoE (Zhang, Wen, Chen & Khisti, 2013) by examining the rate of abandoning videos in YouTube, which happens whenever one closes the video when playing back either because of lack of importan...
Read MoreAnswer: Introduction Most of the companies are gradually shifting to newer technologies as well as information systems that greatly reduce the complexity of the tasks. The newer technologies will help in automating tasks and help managers take better and faster business decisions. In this report a company called Magellan Health, which is a healthcare company in the United States, will be studied in details and how they can come up with improv...
Read MoreAnswer: Introduction Block chain technology can be described as a distributed database which is encrypted and is used for recording data. It can also be referred to as a digital ledger which is accessible across hundreds or thousands of computers. It is not necessary that block chains are to be kept in a specific place. Block chains have stated to disrupt the sector of financial services and this technology underpins digital currency with the...
Read MoreAnswer: Introduction This report aims to emphasize on the utilisation of information system in organisations. The analysis of different cases of using information system are briefly discussed in this report. This report provides a detailed discussion on the utilisation of information by companies in the department of human resource. The impact of the emerging and the existing technology such as artificial intelligence and cloud computing in t...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
i was very satisfied with the responses provided to me for my assignment. It helped me to achieve high marks on my assignment. Thank you experts
Australia
Thanks. I love the fast solutions. I am sure that I will receive an excellent grade, as I usually do
Australia
Thanks for the fast solution. This is a reliable source that is sure to get you a good grade
Australia
Amazing! delivered on time was very patient and thank you so much for your efforts. I really appreciate :)
Australia