Antenna Types and Their Strengths and Weaknesses
Name of the antenna |
Strength |
Weakness |
Yagi |
These antennas are completely directional by nature and its beam bandwidth range between 60 degree and 70 degree (Luong et al., 2016) Lower rate strength signals can be received by this antenna About all different types of nose can be filtered through this antenna The application of this specific antenna is simpler than the others (Granelli et al., 2015) |
Loner antenna will be needed for gaining higher signaling values It allows a limited obtain from the system application These are all based upon resonant components. Apart from this, off resonant operations can introduce a reasonable increment in the SWR |
Horn |
In the process of constriction this specific antenna is very simple in nature Adequate directivity can be delivers from this system About 10 percent of bandwidth is offered by this antenna High gain is offered by the horn antenna with the help of the parabolic reflector disc |
Within the spherical front shaped wave, theses antennas can radiate energy Usually from the horn a signal of 20 dB can be obtained accordingly. For increasing the gain the over system is estimated as to be much expensive which is a major disadvantage for the system (Chen et al., 2015) |
Cellular |
During the roaming also it gives data services and voice services to the consumers Both the fixed as well as wireless telephones can be connected through this network For maintenance of the system this is very much beneficial For upgrading different equipments this network type is beneficial (Bernardos et al., 2014) Both the mobile and fixed subscribers immediate connections are possible |
Les amount of data can be compared in the application of this network system For the multipath signal loss the macro cells associated to this system can be highly affected The application of this specific network system is very costly Security vulnerability is a serious weakness for this network application Either space or foundation towers are needed for successfully operating this network over the communication channel The physical obstacles can either positively or negatively impact the communication system of the wireless application (Fontes et al., 2015) |
Yagi Uda antenna is used by the users in those cases where a frequency of 10 Hz will be required by the users or the consumers. In the satellite communication systems this type of applications are being used by the network engineers. Basically, in the communication system this is used for installation of some of the satellites. This network is comprises of three to two different elements (Liang & Yu, 2015). This balanced antenna can be fed along with a coaxial cable and device as well. In the dipole antennas also this specific network system can be used. This network system has one reflectors and directors whose number can be even one or more than one also.
The horn antennas are used on different application fields and not mandatorily these are convenient in nature but also it can process huge features. Due to this reason this application always stands successful. Over a wider range if frequency this network system can perform successfully (Thompson et al., 2014). For short term radar system also this application is beneficial. For the speed enforcement cameras also this network system is very much beneficial. Though, in different field this specific antenna cannot be applied by the developers.
GSM, CDM etc are the example of the cellular network system and in order to connect al the mobile subscribers a specific area is divided into smaller segments with the help of a Radio Frequency for delivering possible voice or data services to the receiver. On specific base stations such as BTS, eNodeB these cells are dependent (Bernardos et al., 2014). These types of network system are used to operate over 1 km location. Multiple subscribers are allowed to interface a single base station for successfully reaching the aim of the system.
After analyzing the different application capabilities of three of these network system it has been found that, cellular network is the most valuable, reliable, flexible and beneficial network system in the field of real life application (Akhtar, Wang & Hanzo, 2016). It is mandatory for the network managers and the other network heads to make sure that the network systems they are applying has pure operational abilities. From the business and users perspectives, it is always beneficial to utilize the cellular antenna for obtaining high signal wavelength.
There are different wireless network protocols available such as TCP/IP (transmission control protocol/internet protocol), OSI (open system protocol), User datagram Protocol (UDP) are there that are widely used by the designers for the successful implementation of any system (Fontes et al., 2015). This is the role of the network designer to design the system in such a way so that it can efficiently perform in the required field.
This is one of the most widely used internet protocols in the current field of applications, this model is consists of 5 different layers such as physical layer, network layer, transmission, data link and application layer (Rangisetti & Tamma, 2017). Most of the major operations are done in the data link layer and the application layer. The presentation layer offers functions such encryption, decryption etc. It has the ability to transfer file from one part to another.
- TCP/IP network cannot be used for local area network implementation
- Difficulties in managing multiple numbers of layers
- Complications with memory management
Specific Uses of Antennas – Yagi, Horn, and Cellular
This is a 7 layered network protocol which is comprises of physical layer, data link layer, network layer, internet protocol layer, session layer, presentation layer and application layer. The physical layer of the OSI model deals with the hardware systems associated to it in terms of cabling such as PON, IEEE 802. One of the major protocol hat is used by this layer are Bluetooth, TIA etc. This layer can accept information from the physical layer and compile them with necessary requirements. In the network layer the different devices those are widely being used like real time routers, switch etc (Granelli et al., 2015). The transmission layer performs between the session layer and the network layer. The session layer has the capability to operate its application between the presentation layers and the transport layer.
- It is unable to define particular problem due to the duplication in services (both data link layer and transport layer have the capacity to error control)
- There is wide dependency between the different layers of the OSI model
- Parallel work done is not possible for the OSI model
User Datagram Protocol is referred to as an alternative network protocol that is used primarily for successful establishment of loss tolerance and latency as well between the applications of the internet (Wei et al., 2016). Both the UDP and TCP network protocols are the most widely used protocol in this current field of application. The UDP network is used to enable a process to process communication details in the other hand the host to host communication is enabled through the TCP network application system. UDP also serves two different services that are not offered by a single Inter Protocol layer. Different users request can be used for distinguishing different request given for the users (Zhao, Wei & Chen, 2016). Again the rate of errors can also be detected with the help of the checksum. This is also referred to as a lossless transmission protocol and in order to manage specific lost packets this specific network protocol is used by the users. Through the help of this network system large file set can be compared. On other hand, it can connect large set of consumers at a time.
Challenges
- The packets are needed to be broken into parts manually which is a major challenge
- In UDP it may happen that, packets may not delivered directly or either delivered twice
3. Bernardos, C. J., Oliva, A. d. l., Serrano, P., Banchs, A., Contreras, L. M., Jin, H., & Zuniga, J. C. (2014). An architecture for software defined wireless networking. IEEE Wireless Communications, 21(3), 52-61. doi: 10.1109/MWC.2014.6845049
The first journal article under review has presented the idea of the technology of software defined wireless networking and its architecture. The latest implementation of the wireless technology has been an advancement made in the development of technological era. The authors have categorically pointed out that the implementation of wireless networks have worked as an added advantage (Lai et al., 2015). However, the wired network technology has some disadvantages from the perspective of the software defined networking control and data planes. The journal article suggests that the advantages that wired network technology possesses can be enhanced with the adoption of the SDN approaches in the wireless technology. These improvements will occur with the enhancements of the deployments for the mobile devices having a distinct feature and has an opportunity for further improvements as well. There are several measures adopted by the authors to pin point the advantages of the SDN approach in wireless networking (Granelli et al., 2015).
Wireless Network Protocols – TCP/IP, OSI, and UDP
The authors have adopted representative use cases to find out the advantages that the latest technology holds. The authors have also put forward the scenario that the telecommunications sector has been experiencing since networks and services have been evolving according to time. However, the data generated through the entire series of telecommunication networks has been humongous and to cope up with the handling of such huge amount of data, some network operators have been adapting to the cloud paradigm for better handling of the generated data. The authors point out that data virtualization through Software Defined Networks is advantageous since there is no physical existence of the storage systems, but the network operators must also adapt the evolved network infrastructures to implement wireless structures for the entire business process (Fontes et al., 2015). The mobile networks might also need revamping from the existing network to deploy the new technology. It could be easily pointed out from the journal article that there have been implementation of the latest technology for the betterment of the telecommunication world but it can also be seen that the journal article has only been measuring the perspective of the change of business process in the industry of telecommunications.
While critically evaluating the journal article, it can be said that there are several points that I have witnessed, which might be beneficial in adding to the true status of the article. I have found the authors of the journal article have failed to recognize few important points that added up to the minor failure of the article as well (Akhtar, Wang & Hanzo, 2016). If I had to talk about the SDN approaches of the wireless networks, there is not just the industry of the telecommunications that would require enhancement of working procedure and so far, most of the key use cases used to present the benefits of the SDN paradigm have been limited to wired environments. Thus, I feel that it could have been a better approach to evaluate the advantages of the SDN in wireless networking if the procedure had been performed with respect to the other industries as well. However, I feel that the approach by which the journal points out that the SDN technology for the wireless networks can work as a replacement of the wired variety altogether is well justified as per the research methodology conducted (Chen et al., 2015). For the wired variety, the approaches have been utilized to justify the effects using mobile devices and the same has been used to evaluate the working procedure of the wireless approach. In some cases, there have been mechanisms considered for the approach of the evaluation that the network operators have been using traditionally. This brings out the fact that the problems regarding the generated data can be mitigated with the application of the latest wireless variety. I believe that this has been found to be effective since; wireless SDN approach reduces the cost by turning physical data into virtual data and supporting the dynamic energy policies.
Challenges and Security Concerns of Wireless Network Protocols
Rangisetti, A. K., & Tamma, B. R. (2017). Software Defined Wireless Networks: A Survey of Issues and Solutions. Wireless Personal Communications, 97(4), 6019-6053. doi: 10.1007/s11277-017-4825-8
This journal article under critical review states that there have been various challenges regarding the expensive nature of the infrastructure that the wireless mobile networks hold and this is why the mobile network operators are looking for simplified and economical ways to handle the infrastructure. As per Rangisetti and Tamma (2017), it has been also pointed out that the major disadvantage of this system is due to the exponential amount of the users of mobile networking services, which often creates network traffic. Therefore, the mobile network operators or the MNOs are keener on finding out a simplified way by which the existing problems regarding the mobile networks can be mitigated and it should also be an economic process. Thus, the authors of the journal article researches about the Software Defined Networking or the SDN approach in wireless communications that is presented as a revolutionary technology which specifically separates out the data plane and the control plane making the technology much more flexible and agile.
The article points out that due to this technology that the core network services are much easier to handle since SDN approach deploys the characteristics of virtual networks. It is done through network function virtualization of NFV (Chin, Fan & Haines, 2014). The authors point out that data virtualization through Software Defined Networks is advantageous since there is no physical existence of the storage systems, but the network operators must also adapt the evolved network infrastructures to implement wireless structures for the entire business process. The mobile networks might also need revamping from the existing network to deploy the new technology (Trivisonno et al., 2015). It could be easily pointed out from the journal article that there have been implementation of the latest technology for the betterment of the telecommunication world but it can also be seen that the journal article has only been measuring the perspective of the change of business process in the industry of telecommunications.
Critically evaluating the journal article, I have found that that there are several points which have been focused on adding to the true status of the article, but there are also several points that the journal article fails to focus on which marks minor failure of the article as well (Bernardos et al., 2014). I believe that it is not justified that just the industry of the telecommunications that would require enhancement of working procedure and so far, most of the key use cases used to present the benefits of the SDN paradigm have been limited to wired environments. To critically evaluate the journal article, I have found that the sole focus on the implementation of LTE networking could have been shifted to the other wireless networking as well. The article falls short of the Mobile Edge Computing or MEC wireless aspect, in which my assessment of the article have found that the wireless connections have also been implemented but the authors have not acknowledged the positive effects of the SDN network in this regard.
Software-Defined Wireless Networks – Reflection on Research Papers
In addition to that, it could also be seen that the 4G/5G network are mostly kept under research for finding out the advantages of the SDN approach, which I believe should have been dealt with for the cloud based storage and other network generations as well where SDN approach is applicable (Cai et al., 2016). Thus, my critical assessment clarifies that the article under review found the issues and solutions of the Software Defined Wireless Networks through survey point out the major factors due to which the networking frameworks become difficult to handle, but also misses out on some points which would have made the article fulfilling enough as per the subject of the article.
References
Akhtar, A. M., Wang, X., & Hanzo, L. (2016). Synergistic spectrum sharing in 5G HetNets: A harmonized SDN-enabled approach. IEEE Communications Magazine, 54(1), 40-47.
Bernardos, C. J., De La Oliva, A., Serrano, P., Banchs, A., Contreras, L. M., Jin, H., & Zúñiga, J. C. (2014). An architecture for software defined wireless networking. IEEE wireless communications, 21(3), 52-61.
Bi, S., Zeng, Y., & Zhang, R. (2016). Wireless powered communication networks: An overview. IEEE Wireless Communications, 23(2), 10-18.
Cai, Y., Yu, F. R., Liang, C., Sun, B., & Yan, Q. (2016). Software-defined device-to-device (D2D) communications in virtual wireless networks with imperfect network state information (NSI). IEEE Transactions on Vehicular Technology, 65(9), 7349-7360.
Chen, T., Matinmikko, M., Chen, X., Zhou, X., & Ahokangas, P. (2015). Software defined mobile networks: concept, survey, and research directions. IEEE Communications Magazine, 53(11), 126-133.
Chin, W. H., Fan, Z., & Haines, R. (2014). Emerging technologies and research challenges for 5G wireless networks. IEEE Wireless Communications, 21(2), 106-112.
Fontes, R. R., Afzal, S., Brito, S. H., Santos, M. A., & Rothenberg, C. E. (2015, November). Mininet-WiFi: Emulating software-defined wireless networks. In Network and Service Management (CNSM), 2015 11th International Conference on(pp. 384-389). IEEE.
Granelli, F., Gebremariam, A. A., Usman, M., Cugini, F., Stamati, V., Alitska, M., & Chatzimisios, P. (2015). Software defined and virtualized wireless access in future wireless networks: scenarios and standards. IEEE Communications Magazine, 53(6), 26-34.
Lai, C. F., Hwang, R. H., Chao, H. C., Hassan, M. M., & Alamri, A. (2015). A buffer-aware HTTP live streaming approach for SDN-enabled 5G wireless networks. IEEE network, 29(1), 49-55.
Liang, C., & Yu, F. R. (2015). Wireless network virtualization: A survey, some research issues and challenges. IEEE Communications Surveys & Tutorials, 17(1), 358-380.
Luong, N. C., Hoang, D. T., Wang, P., Niyato, D., Kim, D. I., & Han, Z. (2016). Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: A survey. IEEE Communications Surveys & Tutorials, 18(4), 2546-2590.
Rangisetti, A. K., & Tamma, B. R. (2017). Software Defined Wireless Networks: A Survey of Issues and Solutions. Wireless Personal Communications, 97(4), 6019-6053. doi: 10.1007/s11277-017-4825-8
Thompson, J., Ge, X., Wu, H. C., Irmer, R., Jiang, H., Fettweis, G., & Alamouti, S. (2014). 5G wireless communication systems: Prospects and challenges. IEEE Commun. Mag, 52(2), 62-64.
Trivisonno, R., Guerzoni, R., Vaishnavi, I., & Soldani, D. (2015). SDN?based 5G mobile networks: architecture, functions, procedures and backward compatibility. Transactions on Emerging Telecommunications Technologies, 26(1), 82-92.
Wang, C. X., Haider, F., Gao, X., You, X. H., Yang, Y., Yuan, D., … & Hepsaydir, E. (2014). Cellular architecture and key technologies for 5G wireless communication networks. IEEE Communications Magazine, 52(2), 122-130.
Wei, Z., Yuan, J., Ng, D. W. K., Elkashlan, M., & Ding, Z. (2016). A survey of downlink non-orthogonal multiple access for 5G wireless communication networks. arXiv preprint arXiv:1609.01856.
Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., & Di Renzo, M. (2015). Safeguarding 5G wireless communication networks using physical layer security. IEEE Communications Magazine, 53(4), 20-27.
Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., & Di Renzo, M. (2015). Safeguarding 5G wireless communication networks using physical layer security. IEEE Communications Magazine, 53(4), 20-27.
Zhao, F., Wei, L., & Chen, H. (2016). Optimal Time Allocation for Wireless Information and Power Transfer in Wireless Powered Communication Systems. IEEE Trans. Vehicular Technology, 65(3), 1830-1835.