Antenna Types
The antenna is the interface amid radio waves propagating over space and electric currents stirring in metal electrodes, used with receivers and radios. In broadcast, a radio transmitter deliveries an electric current to the projection’s terminals, and the antenna emits the verve from the current as magnetic surfs (transistor waves). In reaction, the antenna captures bit control of an EM wave to enhance production of current (electric) at its terminals utilized to a receiver to be amplified. Antennas are vital components of all radio apparatus and are used in broadcasting of television and radio, two-way radio, infrastructures receivers, radar, cell phones, satellite television transport network and other strategies (Bazin et al. 2006).
The horn antenna is viewed as a wide waveguide as it can exert more professionally besides with an indicator (parabolic) as initiated in plate antenna. The usual Trans wave is used for the broadcast of the Electromagnetic wave will not firmly be attached with unrestricted cosmos impedance and outcomes in replicated power and standup waves. The disparities are evaded by broadening the end of the waveguide which forms the antenna (horn).
Its power is that it is simple in construction and on other weakness is does not produce a sharp/directive beam.
Parabolic reflector antennas are used for the combination with a horn antenna. The antennas are made of metal or screen lattice, and during broadcasting, the waves grounds on to the great dish and get emitted into the atmosphere, while throughout responding to electromagnetic waves fall on to the bowl and get absorbed at the antenna (horn) (Blanch, Romeu & Corbella 2013, p706).
This antenna can function both as transmitting antenna and receiving antenna due to reciprocity code. Its fault is, its design and structure is a composite aspect of achieving.
The dipole antenna is the archetypal antenna where a great class of antennas is grounded. A rudimentary dipole antenna entails of binary conductors which are usually metallic rods or cables proportional arranged, with one flank of a well-adjusted feedline from the receiver fondled to each other. Dipole antenna that is common is the half-wave dipole consisting of doubled reverberating rudiments just under a protracted quarter wavelength.
They offer a balanced and structured receiving signals while its fault, the extreme version are bulk hence becoming hard to manage them.
My opinion on the future dominating antennas are the mobile antennas which are designed in usage while in motion. Their uses comprise pedestrian mobile procedure while walking, riding when using a bicycle, automobile-mounted antennas for applying while driving. Mobile antennas tend no confusion with portable antennas, which are intended to be accessible to conveyance and set up but are not utilized while in motion. Mobile antennas tend enhancement to long-distance capabilities hence them becoming more preferable in the application (Agiwal, Roy & Saxena 2016, p98).
Strengths and Weaknesses of Antennas
Wireless protocols describe the standards that permit networking strategies to exchange information through the frequencies, plainly without any connection using cables/wires. A contract is an algorithm or agreed upon communication rules. When collaborating it is important to settle on how efficiently transmit data/information. Wireless schmoozing/networking is a method by which households, telecommunications systems, and business connections avoid the costly procedure of introducing wires into a building, or as an assembly between various equipment localities. Wireless broadcasting’s networks are generally executed and administered using radio/receiver communication (Bernardos et al. 2014).
Bluetooth is a comprehensive 2.4 GHz subjective area system for short-range wireless communiqué. Device-to-device file handovers, wireless speakers, and wireless earpieces are often permitted with Bluetooth. According to (Holland 2015, p765) Bluetooth expertise is managed by Bluetooth Special Interest Group (SIG) that has more than thirty thousand member companies in the parts of telecommunication, figuring, networking, and consumer microchip technology. Hence can state that Bluetooth is a technology (wireless) standard for transferring information over small detachments from stable and mobile devices, and building area networks (PANs) that are personal.
Bluetooth is advantageous in the sense that they consume less power in their application while they got weaknesses. Their bandwidth is not much high to transmit more data over less time.
ZigBee is a based design to the high-level group communication behavior code used in creating individual area networks having small, less powered digital receivers, such as for household computerization and other low-bandwidth powered desires, aimed for minor gage ventures that require wireless relation. The proficiency as defined by the description is envisioned to be more straightforward and fewer exclusive than other wireless private area systems (WPANs), such as universal wireless interacting strategies such as Wi-Fi networks.
ZigBee is a simple and easy network to configure and on the other hand is weak that it is not much secure in security measures as compared to WIFI.
Wi-Fi is expertise for the receiver’s WLAN of expedient based on the set canons. Wi-Fi is a symbol of the Wi-Fi Alliance, limiting the use of the term Wi-Fi proficient to products that efficaciously comprehensive interoperability certification analysis. Components using Wi-Fi technologies comprise smartphones, desktops and laptops and tablets, digital televisions and modern copiers (Krishnamurthy et al. 2013). Hotspot analysis can be as small as a single chamber with fortifications that lump radio waves, or as significant as many square kilometers attained by application of overlying access topics (multiple).
Wireless Protocols
It has mobility structure where users can use even on the outdoor basis and at any time. Its weakness is, their speed is much lower as compared to wired networks.
The first challenge is the evil twin access points. A rogue admittance point can easily publicise the same SSID (network name) as that of a suitable address protocol. Which can easily trick neighboring Wi-Fi users to associate to them because they cannot distinguish between authentic and rogue APs at an instant’s notice.
Configuration issues is another issue faced by wireless network protocols. Configuration issues often affect vulnerabilities and stance significant refuge threat on one’s business Wi-Fi on the whole entity. Such subjects usually cropped up when individuals accomplished separate APs in specific, but presently, the problem is lessened down to a particular gradation of control (Pathan 2016, p43).
Regarding the two articles under consideration, I feel that Software-defined networking discussion enhanced is appropriate. After review, I got SDN definition as a networking pattern separating the control and information progressing planes. Such leave-taking allows for faster provisioning and network connections alignment (Mauri & Ortiz 2016, p67). I feel that the article explains how with SDN, network proprietors tend to program both the traffic and the network behavior in a general way, without wanting independently retrieving and configuring each of the network’s hardware expedients available in the network. I tend to agree with the discussion made from the article articulating that the tactic decouples the scheme that decides where traffic is conveyed from the underlying system permitted to forward traffic to the selected terminus. In the in-depth analysis, I viewed that the articles bring virtualization of system defined wireless network into aspect where it is effectively discussed, and important information is given on how to virtualize any defined wireless network.
After effectively analysis through the article I examined the virtualization aspect where it denotes that current organizations support virtualization to a specified range, but current network components and mechanisms tend not designed in supporting the vibrant reconfiguration obligated for timely and efficient resources sharing. I conquer with the article where they precisely discuss that, although servers tend virtualized and allocated to different physical assets in almost real-time aspect, the pathways communicating these virtual applications with the rest of universe still require manual connection or protocols interaction which not designed for replies that are dynamic or fast enabled. The article discusses that the current reworking mechanisms in network expertise are viewed as bottlenecks for the general positioning of virtualized substructures. According to (Lewis 2004, p37) previous approaches for essential network virtualization have executed different overlap networks so that investigators can run their tries by time-sharing access to assets. Nevertheless, the article goes ahead and state those approaches are implemented on a timeline base, requiring manual planning and dimensioning, and lack the essential timeliness to operate in networks fabrications. I feel that those styles discussed differ from real virtualization trends for the access network, more attentive on sharing and imposing the radio and transport network assets among different operatives in general thus becoming more intuitive to have dispersed controllers through the wireless network protocol.
I believe that software-defined wireless network is an important strategy in information conveyance, and according to the article, privacy tends to be a vital aspect in its consideration to enhance the safety of the entire network topology (Yu 2015, p943).
From my critical analysis, I conducted from the articles I found that they have well explained the aspects and issues affecting the proper integration of SDN thus giving actual methods to enhance security in the networks.
References
Agiwal, M., Roy, A., & Saxena, N. (2016). Next generation 5G wireless networks: A comprehensive survey. IEEE Communications Surveys & Tutorials, 18(3), 1617-1655.
Bazin, V., Molinie, J. P., Munoz, J., Dorey, P., Saillant, S., Auffray, G., … & Lesturgie, M. (2006). Nostradamus: an OTH radar. IEEE Aerospace and Electronic Systems Magazine, 21(10).
Bernardos, C. J., De La Oliva, A., Serrano, P., Banchs, A., Contreras, L. M., Jin, H., & Zúñiga, J. C. (2014). An architecture for software defined wireless networking. IEEE wireless communications, 21(3), 52-61.
Blanch, S., Romeu, J., & Corbella, I. (2013). Exact representation of antenna system diversity performance from input parameter description. Electronics letters, 39(9), 705-707.
Holland, G. D., & El Defrawy, K. M. (2015). U.S. Patent No. 9,119,077. Washington, DC: U.S. Patent and Trademark Office.
Lewis, F. L. (2004). Wireless sensor networks. Smart environments: technologies, protocols, and applications, 11-46.
Mauri, J. L., & Ortiz, J. H. (Eds.). (2016). Mobile ad hoc networks: current status and future trends. CRC Press.
Mailloux, R. J. (2005). Phased array antenna handbook (Vol. 2). Boston: Artech House.
Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press.
Wang, X., Krishnamurthy, P., & Tipper, D. (2013, January). Wireless network virtualization. In Computing, Networking and Communications (ICNC), 2013 International Conference on (pp. 818-822). IEEE.
Yang, M., Li, Y., Jin, D., Zeng, L., Wu, X., & Vasilakos, A. V. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications, 20(1), 4-18.
Yu, F. R. (2015). Wireless network virtualization: A survey, some research issues and challenges. IEEE Communications Surveys & Tutorials, 17(1), 358-380.