fb
$20 Bonus + 25% OFF
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
Add File

Error goes here

MN603 Wireless Networks And Security

tag 0 Download10 Pages / 2,391 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Assignment Description

The medium access control (MAC) protocol is a key element for underwater acoustic networks (UWANs). However, due to peculiar features of underwater acoustic channels such as long propagation delay, very small channel capacity, low channel reliability and high dynamics of channel quality, not only MAC protocols but also MAC design strategies originally developed for radio-frequency (RF) based wireless networks (RWNs) cannot work well in UWANs.

Human underwater activities in oceans are growing fast in recent years and a huge number of sensors, actuators and various types of vehicles have been deployed underwater. Underwater things equipped with communication functions are able to construct the Internet of Underwater Thing (IoUT). Thus, underwater wireless networking has been becoming a hot research topic for more than one decade. Similar to radio-frequency based wireless networks (RWNs) used in terrestrial environments, the medium access control (MAC) protocol is one of the most important parts for underwater wireless networks. Since radio signal cannot propagate well in underwater environments, currently acoustic communication is widely used. However, due to peculiar features of underwater acoustic channels such as slow signal propagation speed (about 1.5 km/s in seawater), very small channel capacity, low channel quality and high dynamics of channel quality, MAC protocol design for underwater acoustic networks (UWANs) faces many new challenges. Especially, the long propagation delay is a key factor that makes the MAC design strategy widely adopted by RWNs unsuitable for UWANs.

For further reading could refer to the article “State-of-The-Art Medium Access Control (MAC) Protocols for Underwater Acoustic Networks: A Survey Based on A MAC Reference Model”. The link for the article is:

http://ieeexplore.ieee.org/document/8093608/

The assessment requires the students to compare the existing radio-frequency (RF) based wireless networks (RWNs) with the Underwater Acoustic Networks and evaluate the Medium Access Control (MAC) Protocols for Underwater Acoustic Networks. The students are required to submit a report which addresses the following issues:

  1. Comparison of (RWNs) with (UWANs)
  1. Evaluate Medium Access Control (MAC) Protocols for Underwater Acoustic Networks (UWANs) considering proposed strategies based on:
    1. Long Propagation Delays
    2. Signal-based reservation
  1. Scheduling based MAC
  2. Receiver initiated protocols
Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

Upload
Unique Document

Document
Under Evaluation

Get Money
into Your Wallet

Total 10 pages, 1 USD Per Page

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). Wireless Networks And Security. Retrieved from https://myassignmenthelp.com/free-samples/mn603-wireless-networks-and-security/mac-protocol.html.

My Assignment Help (2021) Wireless Networks And Security [Online]. Available from: https://myassignmenthelp.com/free-samples/mn603-wireless-networks-and-security/mac-protocol.html
[Accessed 21 October 2021].

My Assignment Help. 'Wireless Networks And Security' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/mn603-wireless-networks-and-security/mac-protocol.html> accessed 21 October 2021.

My Assignment Help. Wireless Networks And Security [Internet]. My Assignment Help. 2021 [cited 21 October 2021]. Available from: https://myassignmenthelp.com/free-samples/mn603-wireless-networks-and-security/mac-protocol.html.


Do not let your busy schedule affect the overall quality of your assignment. Hire qualified experts from MyAssignmenthelp.com and avail the necessary online assignment help as per your need. The experts conduct in-depth research to find the most relevant information for the assigned essay topic. Even if you assign the task with a tighter deadline, the experts will still be able to offer an insightful assignment help within the promised deadline.

Latest Networking Samples

MN603 Wireless Networks And Security

Download : 0 | Pages : 6

Answers: 1. WLAN technologies There are different types of WLAN technologies. Four technologies are discussed in the following paragraph. They are 802.11a, 802.11b, 802.11g and 802.11n. 802.11a is the first type of standard in 802.11. 802.11a operate in 5GHz Industrial, Scientific and Medical (ISM) band which means that it gives much higher speed and data transfer rate. However, the chips are expensive. It produces high level of performance ...

Read More arrow

FMCS3110 Social Media And Network Culture

Download : 0 | Pages : 8

Answers: Introduction The age of fast paced technology and communication is blessed by the rightful invention and implementation of social networking. Social networking has become an important factor in the present day communication and technology of the business world (Jussila, Kärkkäinen & Aramo-Immonen, 2014). The research proposal and literature review about the advantages and disadvantages of social networking has been frui...

Read More arrow

BN203 Network Security

Download : 0 | Pages : 6

Answer: Introduction The report contains the information about the network design for the B2B solutions. I am the Network Security Architect and I have been handed the role of Network Administrator and I am responsible for designing the network for the company. The company is looking to implement a subnet solution for the network within the organization that would be dividing the network into six sub divisions and would also improve the secur...

Read More arrow

MN502 Overview Of Network Security

Download : 0 | Pages : 10

Answers: Software Defined Network SDN or Software Defined Network is an approach of computer networking and it allows the network manager to manage the entire network and network services, on centralized basis. These network services are well managed with the abstraction of high level functionality and are performed through decoupling of the system that has the primary function of decision making, regarding the ways of managing the traffic, t...

Read More arrow

ITC542 Internetworking With TCP IP

Download : 0 | Pages : 8

Answers 1a. Design of the Network using Simple Addressing Solution The design of the network is created is proposed for the M2M solution and the requirement of the organization is studied for the preparation of the network diagram. There is a need of connecting 1200 nodes and workstation in the network and the private address 10.1.1.1 is used for the whole network. The number of workstation required to be installed in each of the office is give...

Read More arrow Tags: Australia Roselands Engineering Internetworking Devices University of Queensland 
Next

5% Cashback

On APP - grab it while it lasts!

Download app now

*Offer eligible for first 3 orders ordered through app!

ribbon
callback request mobile
Have any Query?