Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

The following Learning outcomes will be addressed in this assignment:

Be able to describe, explain critically and analyse wireless data communication technology along with associated security issues.

Be able to analyse and model wireless behaviour using appropriate mathematics

Critically analyse enterprise requirements for wireless systems

Critically analyse 802.11 protocol information

Make critical decisions about designing secure wireless networks

Theoretical Model:

Now a days, in a world most of the peoples are using internet. The internet networks are mainly classified into two types. One is wired network and another one wireless networks. The wired networks are connected by LAN cable. The Wireless networks are connected by WIFI. In the wireless there no cables are connected with your device. In the wireless networks and security, Theoretical throughput development will be studied. In the theoretical throughput development, Impact of MAC overhead will be described. Impact of security overhead will be studied. Experimental method will be analyzed. In the Experimental method, comparison of wireless networks like 802.11a, 802.11b, and 802.11g will be studied. The design of wired network will be analyzed. The design of wireless network will also be described.

IEEE 802.11(WLAN) contains IEEE 802.11g, IEEE 802.11a and IEEE 802.11b.High data rates and maximum throughput can be produced by IEEE 802.11ac, IEEE 802.11ad and IEEE 802.11n with improvements in MAC and physical layers. Reduction of MAC layer overhead can be done by technologies like block acknowledgement and frame aggregation.

Overhead in multiple access system is due to facts like uncoordinated communication of user and performance losses. For classic MAC, comparison can be done by comparing performance of similar system that are coordinated totally. In control systems, the region for capacity in accurate channel has two inputs X2 and X1 is given by (Huang, 2010) (Thalore, Jha and Bhattacharya, 2018),   

The above equation shows the region of capacity for feedback correlated users for a memory less accurate channel the capacity remains constant with feedback. The region for capacity is the sum rate taken over joint distribution of X2 x X1, so that input of the user is correlated arbitrarily (Jayram, and Ashoka, 2014).

The unrelated user has region for capacity which is given by,

  • introducing individual restrict rate on R2 and R1.
  • Restricting distributions over which the union is computed.
  • Finally restricting the sum rate.

In the data networks security for the shared data is most important. The main solution for this is IPsec VPN (Guichard, Pepelnjak and Apcar, 2014). The impact of other traffic is produced by IPsec in the domain of network resource. This can be done by OPNET software. The main OPNET tool sets are process model, package format, simulation window and project window. For displaying and capturing the result simulation window is used. Behavior of network devices can be done by process model. Project window is used to define network topology and link connectivity. Interface for network devices can be done by nodal modal. For organization of collage network diagram is used. For reducing the network traffic the selected organization is used. For the design of whole network start topology is used. At last investigations are made to analyze network performance which are affected by link performance. OPNET can be used to secure traffic flow from distant sites that are connected with the tunnels of IPsec. The important secured technology is IPsec, which provides protected access over internet with the help of coding and authentication (Hong, 2014) (Firewall and VPN Technology, 2017).

Throughput models:

 In internet data are sent in secured manner. In data transmission from starting point to end, the network of intermediate is shared, the access of data flow can be done by unwanted customer. The solution for this problem is provided by VPN (Ring, 2013) (Hong, 2014).

The simulation of two scenarios are shown below, 

In the first simulation server is approached by client from three sites which are connected with the help of DS1 channel through router HQ in network configuration without the help of tunneling the VPN. In second one tunneling of VPN are changed between the router HQ and three sites. The servers DB, HTTP, and FTP server act as client in three sites (Lin and Lu, 2015).

The physical layer is connected the network with the help of LAN. The physical layer protocol for 801.11a is connected only with 802.11a. The 802.11a can't connect with 802.11b and 802.11g. Because the password syntax for 802.11a is numbers only but both the password syntax for 802.11b and 802.11g is mixture of words and numbers. That's why the 802.11a is not physically connected with 802.11b and 802.11g.The physical layer protocol 802.11b can be connected with 802.11b and 802.11g. But the 802.11b can't connect with 802.11a. Because the password syntax is same for both 802.11b and 802.11g. The password syntax is different for 802.11a and 802.11b. So the physical layer is not connected between 802.11a and 802.11b. The communication between 802.11g is connected with 802.11b and 802.11g only. It can't connect with the 802.11a. The reason for 802.11a is not connected with 802.11g is the password syntax. In the 802.11a password is only numbers. For 802.11g the password is mixture of letters and numbers. So that is the reason for 802.11a is not connected with 802.11g. The explained comparison is given in the below figure (Xiao, Shen and Du, 2011) (Gast, 2017).

The standard confirmation for 802.11a is September 99, 802.11b is also September 99 and 802.11g is May 2003. The standard confirmation is also known as publish. The Raw Data Rates for 802.11a and 802.11g is 54Mbps and raw data rate for 802.11b is 11Mbps. The raw data rate is defined as transferring data speed. But the average actual throughput for 802.11a is 4 to 5 Mbps. The average actual throughput for 802.11b is 27 Mbps and 802.11g is 20 to 25 Mbps. The average actual throughput is average internet speed. The frequency for 802.11a is 5 GHz. The frequency of 802.11b is 2.4 GHz. 802.11g frequency is 2.4 GHz. The Available spectrum for 802.11a is 300 MHz 802.11b's available spectrum is 83.5 MHz and the Available spectrum for 802.11g is 83.5 MHz Modulation encoding for 802.11a is OFDM. For 802.11b, DSSS/CCK modulation is used. The modulation encoding for 802.11g is DSSS/PBCC. The encoding is encryption i.e. production for the data or information. The channels/non-overlapping for 802.11a is 12/8. And the channels/non-overlapping for 802.11b is 11/3. 802.11g’s channels/                non-overlapping is 11/3. The channels/overlapping for 802.11b and 802.11g both are same. The above explained comparison datum are explained in below diagram (Ganesh and Pahlavan, 2011) (hanfi , and rai, 2016) (Prasad and Zaheeruddin, 2011)

Impact of MAC layer overhead:

In site survey Wi-Fi signal is covered by Wituner which is done by floor plan. Wituners used to get automated green field and user guided deployment. By launching virtuoso, it makes the user to attach a photo copy to the floor plan. It enable to attach the file format which is in the form PDF or JPEG and it gets XML file that elaborate attenuation and structure values.

Wituners is used to perform deployment of WLAN. The main uses of Wituner is to catch strength of a signal from the Access point. To prove the design optimization and auditing will be done. For creating high capacity signal WLAN is planning (Randhawa and Hardy, 2011) (hanfi , and rai, 2016) (Shinde, 2009).

The above figure display the structure and arrangement for Access point for all basement in Sydney campus.

The above figure is the Wi-Fi site survey.

Structure of basement, APs and 3 dimensional blocks.

To design the wired network with three sun category networks. Engineering, Research and E –commerce customer subparts are checked (Randhawa and Hardy, 2011).

In the above diagram, object palette tree is defined with simple network design. It include logical subnet, satellite subnet and mobile subnets.

To choose the node-0 in order to set the application configuration and select creation source as object palette. 

To set node 1 attributes chose model as profile configuration and creation source as object palette

In engineer departments set profile name as engineer, number of client has 50 and traffic type as all discrete.

The variables which stated earlier engineering, E-commerce, customer and research is shown in the above screenshot.

Once click the engineer sector it will move the next window for creating a LAN. The LAN is connected to pass in this window

In research departments set profile name as researcher, number of client has 50 and traffic type as all discrete

In E-commerce customer departments set profile name as E-commerce custome, number of client has 50 and traffic type as all discrete.

In the above screenshot, the server is introduced.

Now connect all the attributes engineering, research, E-commerce customer to the server by clicking the project tool war.

In the below diagram, the applications such as web, file transfer and database are connected to the Ethernet switch

In web attributes select application: supported services, a new window is shown

In the below figure, application: supported service table is shown with web browsing (heavy http 1.1) as supported.

Impact of security overhead:

In the below figure, application: supported service table is shown with file transfer (heavy) as supported.

In the below figure, application: supported service table is shown with database access (heavy) as supported.

Once done all the above processes,then the links are automatically generated. The below screenshot shows the Engineering deparment.

The below screenshot shows the links for Research deparment.

The below screenshot shows the links for e-commerce customer deparment.

The below screenshot shows the links for server with switch.

Once Right click the workspace then open the choose results window to set the corresponding fields.

To choose the scenario for the project and enter the duration for simulation.

To Click the run option then shows the below window

The below screenshots shows the result browser window

To select all the link connected to the server and set the traffic information in engineering department.

The below screenshot shows the traffic intensity attribute profile, which is corresponds to engineer department.

To set the traffic load for the engineer department set profile name as 1.

Now change the profile name as 3.

To click the manage scenario to run the application.

After that to execute the DES execution manager

In traffic intensity attribute profile, select profile library as local profile and profile as 3.

Now run the DES execution manager.

Now the traffic intensity attribute profile is shown with local profile as 3.

In the below screenshot shows the log viewer.

In traffic intensity attribute profile select profile library as demand profile and select profile as T3_1hr_bps

Conclusion

In the wireless networks and security, Theoretical throughput development is studied. In the theoretical throughput development, Impact of MAC overhead is described. Transfer of data is secured with the help of Virtual Private Network. Impact of security overhead is studied with the help of IPsec Virtual private network. After studying the Impact of security overhead, Experimental method is analyzed. In the Experimental method, comparison of wireless networks like 802.11a, 802.11b, and 802.11g is studied. The design of wired network is analyzed. The design of wireless network is also described. When compare to MAC overhead, IPsec has more productive. Compare to wired network, wireless local area network has more authentication, Quality of service, accessibility and high availability.

References

Firewall and VPN Technology. (2017). International Journal of Science and Research (IJSR), 6(12), pp.1762-1765.

Ganesh, R. and Pahlavan, K. (2011). Wireless network deployments. New York: Springer.

Gast, M. (2017). 802.11 wireless networks. [Place of publication not identified]: O'Reilly Media.

Guichard, J., Pepelnjak, I. and Apcar, J. (2014). MPLS and VPN architectures. Indianapolis: Cisco Press.

hanfi ,, R. and rai, Y. (2016). Wireless Sensor Network. International Journal Of Engineering And Computer Science.

hanfi ,, R. and rai, Y. (2016). Wireless Sensor Network. International Journal Of Engineering And Computer Science.

Hong, S. (2014). Issues and Security on IPSec: Survey. Journal of Digital Convergence, 12(8), pp.243-248.

Huang, G. (2010). MAC protocol adaptation in cognitive radio networks.

Jayram,, B. and Ashoka, D. (2014). MAC Layer Protocols for WSN - Comparison and Performance Improvement Strategy. International Journal of Engineering Research, 3(4), pp.217-220.

Lin, X. and Lu, R. (2015). Vehicular Ad Hoc Network Security and Privacy. Hoboken: Wiley.

Prasad, S. and Zaheeruddin (2011). A Review and Comparison of Quality of Service Routing in Wireless Ad Hoc Networks. International Journal of Wireless & Mobile Networks, 3(1), pp.172-184.

Randhawa, T. and Hardy, S. (2011). Network management in wired and wireless networks. New York: Springer.

Ring, T. (2013). IT's megatrends: the security impact. Network Security, 2013(7), pp.5-8.

Shinde, S. (2009). Computer network. New Delhi: New Age International Ltd.

Thalore, R., Jha, M. and Bhattacharya, P. (2018). Multi-Layer MAC (ML-MAC) Protocol for WSN in Irregular Terrains. International Journal of Sensors, Wireless Communications and Control, 7(2).

Xiao, Y., Shen, X. and Du, D. (2011). Wireless network security. New York: Springer.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). Wireless Data Communication Technology And Security Issues Are Discussed In The Essay.. Retrieved from https://myassignmenthelp.com/free-samples/kf7031-wireless-networks-and-security.

"Wireless Data Communication Technology And Security Issues Are Discussed In The Essay.." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/kf7031-wireless-networks-and-security.

My Assignment Help (2020) Wireless Data Communication Technology And Security Issues Are Discussed In The Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/kf7031-wireless-networks-and-security
[Accessed 09 November 2024].

My Assignment Help. 'Wireless Data Communication Technology And Security Issues Are Discussed In The Essay.' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/kf7031-wireless-networks-and-security> accessed 09 November 2024.

My Assignment Help. Wireless Data Communication Technology And Security Issues Are Discussed In The Essay. [Internet]. My Assignment Help. 2020 [cited 09 November 2024]. Available from: https://myassignmenthelp.com/free-samples/kf7031-wireless-networks-and-security.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
close