Discuss About The International Technical Meeting Of The Satellite Division Of The Institute Of Navigation.
Yagi Antenna – This antenna is defined as a unidirectional based antenna. This type of antenna comprises of many driven elements, which would be folded dipole and would also comprise of many added elements. The Yagi antenna comprises of a single reflector provided with some additional directors, which would be able to radiate the energy in a unidirectional manner. The Yagi antennas are mainly used for implementation of point-to-point form of communications (Sun et al., 2013).
Strengths – The width of the beam of the signal ranges from 50 – 70 degrees. Hence, this antenna is useful as they are able to receive even much lower strength of signals. The higher amount of gain within the yagi antennas have the capability to provide a good coverage of signal to the communicating devices. The cost of these antennas are comparatively low than the log periodic antennas (Wu et al., 2014).
Weakness – One of the major form of weakness in these antennas is the limited range of bandwidth or frequency. The strength of the signals within these antennas would get degraded when these antennas get moved to some limited form of frequencies.
Horn Antenna – This antenna is mainly used during the processes of response and the broadcast of information or microwave based signals. The flared portion within these kinds of antennas could be conical, square or rectangular in shape. The concentrated amount of response and radiation of signals from this antenna could be corresponded from the horn axis. Pyramidal Horn, Sectoral Horn and Conical Horn are the various kinds of horn antenna (Hur et al., 2014).
Strengths – These antennas serve as an active element. The horn antenna helps in the directing the signal and thus help in gaining higher amount of signals. This would be made possible with the use of higher gains within the reflective dish (Pan et al., 2013).
Weakness – The amount of gain present within the horn antenna is within the range capacity of 20 dB. The length of the horn antenna should be lengthy such that it would be able to capture the maximum amount of gain.
Cellular Antennas – These antennas are widely used in the recent times. They are mainly used for capturing signals based on mobile devices. The prime form of connectivity within the mobile devices would be mainly dependent on the strength of the signal (Rappaport et al., 2013).
Strengths – The cellular antennas are widely used in order to cover a vast network. The devices are widely covered and hence receive better signals. The security within these cellular networks is also provided in a highly secure form.
Horn Antenna
Weakness – The implementation cost of these devices is high as compared to the yagi and horn antennas. The problem of interfaces also poses a major problem within the connectivity of these devices.
Based on the above discussion, it could be said that the cellular antennas could prove to be a dominant player within the market. They have the capability of transforming the cellular market and help in an efficient communication mode.
LTE – The Long Term Evolution (LTE) is a wireless form of broadband technology, which mainly provides support to access to internet within cellular devices and other computing systems. The LTE technology is often referred to as 4G technology. They help in offering severe improvements among other standard modes of communication. The LTE networks are one of the fastest network standards (Duan, Shah-Mansouri & Wong, 2013).
Strengths – This network makes use of IP network architecture. They help in the improvement of cellular networks as compared to the other older networks (Araniti et al., 2013).
Weakness – The older devices do not have the accessibility to these networks. Hence these devices would need to be improved and the latest technologies should be installed within the devices.
As the networks offered by LTE are open based, hence they have they face the major number of vulnerabilities within the system, devices and connected applications.
Wi-Fi – This form of networking protocol helps in the network connection without the need of physical wires. The technology of Wi-Fi mainly represent the protocol of LAN within the IEEE network standards. This form of networking standard help in the easy mode of communication that is bounded within a precise location (Duarte et al., 2014).
Strengths – They help in the convenience of connection between devices based on wireless mode. The installation process, management of costs and the expanse of the network could be easily performed without much difficulties (Kim et al., 2014).
Weakness – The security within the networks is a major challenge as these networks could be easily hacked. The network ranges are also not as high as compared to the other modes of communication.
The major form of challenges to the security aspects are mainly faced due to eavesdropping, Man-in-the-Middle (MITM) Attacks, Denial of Service (DOS) and eavesdropping.
Bluetooth – The Bluetooth technology is mainly based on radio based communication. This networking standard helps in communication between devices that are connected within a smaller distance. The communication standard based on Bluetooth are mainly supported by cellular devices, computing systems and other devices. This technological standard was mainly designed to support those kind of devices that would be supported by batteries. The technology offered by Bluetooth is mainly supported by wireless keyboards, computers, laptops, and smartphones and wireless speakers (Faragher & Harle, 2014).
Cellular Antennas
Strengths – The technology of Bluetooth has lower costs and have an easy installation process. The convenience of connection within the devices is easy. The Bluetooth also offers an efficient communication mode.
Weakness – the short modes of communication of these devices are also prone to get hacked. Viruses may be injected within the system, which would lead to damaging the inbuilt applications of the mobile and communicating devices.
The major form of security challenges that are faced by Bluetooth technologies are mainly based on authentication. Authorization and confidentiality of the information of the users based within the devices are also susceptible to different forms of attacks. Privacy breaches are also a major matter of concern within the computing systems.
Reflection based on Paper 1 “An Architecture for Software Defined Networking” p
The case study focusses on the aspect of Software Defined Networking (SDN). This form of networking is majorly discussed as the separation between the planes of control and the data planes. Based on the understanding from the study, I have come to know that SDN would be helpful in providing major help to different operators within the networks. These operators would be able to get major help for enabling major features within the systems that might also include the features of virtualization (Bernardos et al., 2014). The increasing capacity within the networks would also be increased with the improvement within the standards of networking. From the insights from the research case study, I have understood that the underlying architecture of SDN would also be helpful for improving the traditional network standards and thus help in efficiency modes of communication based on the networks. Based on the future research within this aspect, I have come to understand that the functionalities within the current processes of SDN would help in the easy connectivity processes based on the SDN wireless networks.
Reflection based on Paper 2 “Software Defined Wireless Networks: A Survey of Issues and Solutions”
This article has made to understand about the various kinds of aspects related to the standards of security within the SDN networks. From the understanding of the case study, I have understood that the recent form of wireless networks are able to face different forms of challenges against several form of vulnerable attacks. These attacks are mainly planned to penetrate and crack the infrastructure of the SDN network. The mobile operators and the people who are responsible for designing the security strategy of the underlying network standards should be extremely careful regarding the basic form of standards of security aspects within the network. I would recommend that these security experts should be able to design higher form of security strategies that would be able to plan the vulnerability within the network before the attacks would be able to break into the systems. The case study also depicts the aspect of SDN that it has the major form of capability to deploy different kinds of services within the mobile networks that are primarily based on the infrastructure of Network Function Virtualization (NFV). These forms of infrastructural standards are mainly helpful for deploying faster form of applications within the systems and the core networks. From the discussion based on the case study, I have also understood that the Mobile Edge Computing (MEC) would implement the technology of cloud computing and various other services of IT within SDN. The case study also depicts the different kinds of challenges within the networks and the major impacts on the user during cases of vulnerabilities. The case study also has helped to understand that the SDN is an extremely important tool for the higher form of design within the networks that would lead towards improvement of security aspects towards the network.
References
Araniti, G., Campolo, C., Condoluci, M., Iera, A., & Molinaro, A. (2013). LTE for vehicular networking: a survey. IEEE communications magazine, 51(5), 148-157.
Bernardos, C. J., De La Oliva, A., Serrano, P., Banchs, A., Contreras, L. M., Jin, H., & Zúñiga, J. C. (2014). An architecture for software defined wireless networking. IEEE wireless communications, 21(3), 52-61.
Duan, S., Shah-Mansouri, V., & Wong, V. W. (2013, December). Dynamic access class barring for M2M communications in LTE networks. In Globecom Workshops (GC Wkshps), 2013 IEEE (pp. 4747-4752). IEEE.
Duarte, M., Sabharwal, A., Aggarwal, V., Jana, R., Ramakrishnan, K. K., Rice, C. W., & Shankaranarayanan, N. K. (2014). Design and characterization of a full-duplex multiantenna system for WiFi networks. IEEE Transactions on Vehicular Technology, 63(3), 1160-1177.
Faragher, R., & Harle, R. (2014, September). An analysis of the accuracy of bluetooth low energy for indoor positioning applications. In Proceedings of the 27th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+’14) (pp. 201-210).
Hur, S., Cho, Y. J., Lee, J., Kang, N. G., Park, J., & Benn, H. (2014, May). Synchronous channel sounder using horn antenna and indoor measurements on 28 GHz. In Communications and Networking (BlackSeaCom), 2014 IEEE International Black Sea Conference on (pp. 83-87). IEEE.
Kim, B., Kwak, M., Lee, J., & Kwon, T. T. (2014, October). A multi-pronged approach for indoor positioning with WiFi, magnetic and cellular signals. In Indoor Positioning and Indoor Navigation (IPIN), 2014 International Conference on (pp. 723-726). IEEE.
Pan, W., Huang, C., Chen, P., Pu, M., Ma, X., & Luo, X. (2013). A beam steering horn antenna using active frequency selective surface. IEEE Transactions on Antennas and Propagation, 61(12), 6218-6223.
Rangisetti, A. K., & Tamma, B. R. (2017). Software Defined Wireless Networks: A Survey of Issues and Solutions. Wireless Personal Communications, 97(4), 6019-6053.
Rappaport, T. S., Gutierrez, F., Ben-Dor, E., Murdock, J. N., Qiao, Y., & Tamir, J. I. (2013). Broadband millimeter-wave propagation measurements and models using adaptive-beam antennas for outdoor urban cellular communications. IEEE transactions on antennas and propagation, 61(4), 1850-1859.
Sun, H., Guo, Y. X., He, M., & Zhong, Z. (2013). A dual-band rectenna using broadband Yagi antenna array for ambient RF power harvesting. IEEE Antennas and Wireless Propagation Letters, 12, 918-921.
Wu, J., Zhao, Z., Nie, Z., & Liu, Q. H. (2014). Bandwidth enhancement of a planar printed quasi-Yagi antenna with size reduction. IEEE Transactions on Antennas and Propagation, 62(1), 463-467.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2019). Essay: Discuss The International Technical Meeting Of The Satellite Division Of The Institute Of Navigation.. Retrieved from https://myassignmenthelp.com/free-samples/technical-meeting-of-the-satellite-division.
"Essay: Discuss The International Technical Meeting Of The Satellite Division Of The Institute Of Navigation.." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/technical-meeting-of-the-satellite-division.
My Assignment Help (2019) Essay: Discuss The International Technical Meeting Of The Satellite Division Of The Institute Of Navigation. [Online]. Available from: https://myassignmenthelp.com/free-samples/technical-meeting-of-the-satellite-division
[Accessed 23 December 2024].
My Assignment Help. 'Essay: Discuss The International Technical Meeting Of The Satellite Division Of The Institute Of Navigation.' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/technical-meeting-of-the-satellite-division> accessed 23 December 2024.
My Assignment Help. Essay: Discuss The International Technical Meeting Of The Satellite Division Of The Institute Of Navigation. [Internet]. My Assignment Help. 2019 [cited 23 December 2024]. Available from: https://myassignmenthelp.com/free-samples/technical-meeting-of-the-satellite-division.