Yagi-Uda antenna
An antenna is a device that is used for converting the electric energy into radio waves and vice versa. It is used along with the radio transmitter-receiver. It is used for sending to receiving electromagnetic waves from one location to another. Thus, it can be seen as a device that is used to convert all the sound, light or electrical signal into a microwave signal (Hsu, Huang, Lin, & Lin, 2017).
Different type of antenna that is will be discussed in this pat is yagi-uda antenna, horn antenna and cellular antenna (Chu, Li, & Ye, 2017).
It is a unidirectional antenna that has a frequency range from 300MHz to 3Ghz. It consists of three elements that are a reflector, director and driven. The directors that are placed in the yagi-uda are used to increase the directivity of the antenna (Zhai, Cheng, Yin, Zhu, & Gao, 2014). The reflectors are situated at the end of the entire structure. It is basically used for TV reception and is used in eth application where a single frequency is needed.
(Source: https://www.quora.com/How-does-a-yagi-uda-antenna-work)
- The bandwidth at which it operates is narrow
- It works on a fixed range of frequency
- The directivity is proper due to the use of director and reflector
- The front to back ratio us high
- It is difficult to operate in atmospheric changes
- It is prone to noise
The advantage of using a horn antenna is to improve the efficiency and directivity of the signal (Mantash, Kesavan, & Denidni, 2018). It makes sure that signal does not face the discontinuity. They use the concept of flaring that makes sure that the direction of the signal is radiated in the forward direction. This antenna is termed as horn antenna due to its shape. The operational frequency is around 300Mhz to 30Ghz. The horn antenna works at a flared out waveguide so that directivity of the signal is improved. It also makes sure that diffraction is reduced. The three type of antenna that is mostly used is pyramidal, conical and e-plane. It requires minimum signal loss like satellite antennas and the radio telescope.
(Source: https://searchmobilecomputing.techtarget.com/definition/horn-antenna)
- Small lobes are required
- The directivity is quite high
- It has reduced standing waves
- The beam width is quite narrow
- It also minimized the response of the unwanted signal
- It has the large flare angle
- It is complex to design
It is used to boost the overall signal strength of mobile phones, Tv and satellite communication. It is a popular form of antenna that enhances the signal strength while transmitting the signal (Jaiswal, Pandit, & Pathak, 2018). It requires very less power transmission and has comparatively low interference of other signals. It requires handing over the signal from the one network to other while changing the site.
- The capacity is high
- Robustness is high
- Low transmission power
- High capacity
- The handover needed to be carried
- It is a complex process
- It requires a mapped infrastructure
Cellular antenna is chosen for transmitting signal from receiver to transmitter end. It is used for working at a microwave frequency range so that long-distance communication takes place. It is beneficial as it transfers the data to a long distance. The gain of the cellular network is higher and it helps in reaching to a larger distance. As they directly translate the power to reach the destination. Cellular antenna is a present antenna and the main benefit of this antenna is that it can be cast-off long-distance communication. It supports microwave frequency range therefore in future it can be used a wireless network that transfer data or signal for long distance Thus, it is recommended to use the cellular network in comparison to another network as it can transmit signal of higher capacity in a single go. The coverage area is also high as compared to other signals. The signal capacity is the reason it is popularly used. It boosts up the connectivity in mobile phones by making sure that calls are not dropped due to change in the network.
Advantages
Wireless networking allows establishing a strong communication by using network protocols that make use of radio frequency to communicate without the use of cables. The wireless network has made access to many technologies that are wireless fidelity and home radio frequency. The wireless network can be built for peer to peer communications that allow access to computers so that they can share files easily and effectively (Liang, Yu, & Zhang, 2015). It operates on IEEE 802.11 standards. These networks do face some security issues, thus to make sure security breaches are not faced. Some network security is undertaken like data encryption, defining a port-based access control and using a media access control address filtering so that only authorized user access the information. Thus it can be stated that it is a wireless medium that includes technologies like Bluetooth, infrared lasers, radio signals and microwave technology (Hu, & Qian, 2014).
The three protocols that would be considered in this report are:
- Bluetooth and BLE
- Wi-fi
- Zigbee
It stands for wireless fidelity. It is one of the networks that provide connectivity to various devices without any need of wire or cables. It is used to connect devices like computers and mobile phones as it works on IEEE 802.11. The frequency at which it operates is 2.4Ghz. Apart from that, it operates at a frequency band like 5Ghz. There are various issues that are faced in a wireless network like security is one of the concerns (Chen, Zhang, Hu, Taleb, & Sheng, 2015).
- It has higher mobility
- It has high productivity
- Low cost
- It is more convenient
- The security is less due to increasing cyber crimes
- It has slow speed as compared to a wired network
It is basically used for transmission of a signal from one device to another but in a short range. It is used for sharing images, videos from one mobile phone to another without any wired connection. The power consumption is quite low. The other device is BLE that uses low power and operates at hardware. It uses IEEE 802.15.1 (Kreutz, Ramos, Verissimo, Rothenberg, Azodolmolky, & Uhlig, 2015).
- Low power consumption
- It has the high range for communication
- Can pass over walls
- Can be used for data communication
- It has less bandwidth
- It can be used in the lower range
- Has less bandwidth
It is used for communication in local networks. It works in the frequency range of 2.4GHz. It controls all the operations and makes sure that the task is completed automatically. The data transmission rate is quite low and uses Z-wave that worked at 0.01Mbps data rate. It uses m2m data communication (Nunes, Mendonca, Nguyen, Obraczka, & Turletti, 2014).
- The construction is quite simple
- The power consumption is quite less
- It is easy to monitor as compared to another network
- To use such a network it requires knowledge about the network
- The implementation cost is high
- It is less secure as compared to another network
There are numerous difficulties looked by the wireless system like it has less security, low nature of administrations, transmission misfortune, and vitality productivity. The primary test that needs to be looked at by the wireless network is security. It is a major issue that can be reduced by using the correspondence information encryption method can be utilized. Through this strategy, the security of data can be expanded. We can utilize programming characterized systems to enhance the nature of administration, and adaptability. It assumes an essential part of enhancing the security of our information and enhances center system administrations.
The title of this paper is Software Defined Wireless Networks: A Survey of Issues and Solutions that was written by Rangisetti, A. K., and Tamma, B. R. As indicated by the author, wireless systems occurs many security risks and threats. I concurred that point there are different difficulties faced by wireless systems, for example, security, nature of associations, and low capacity (Yan, Yu, Gong, & Li, 2016). I observed that the fundamental issue in a wireless network structure is security. The explanation for this issue is that there are different movements produce a hacking system by which we lost our information. According to the author, we can be settled this type of problem by utilizing an information encryption system. This technique gives a security of our standard and gives a true blue yield at expert. Software-defined networking is one of the best ways in which we can avoid the problem of energy loss (Arslan, Sundaresan, & Rangarajan, 2015).
Disadvantages
In this paper, we have detected that software-defined technology plays an important role in the field of the wireless network system. We explained the fundamental concept of the software-defined network and the importance of mobile edge computing in mobile communication. Therefore we adopt security systems and technique like SDN, encryption, and virtualization than we can avoid the problem of hacking and can reduce many security risks.
The title of this research paper is architecture for software-defined wireless networking that was engraved via Carlos J. Bernardos, Antonio de la Oliva, Pablo Serrano, Albert Banchs, Luis M. Contreras, Hao Jin, and Juan Carlos Zuniga. According to this paper, the wireless network system is a very popular technology many organization are using this technology for communication purpose. We are surrounded by many technologies and for data transfer, we use many wireless networks but the main point is that we reduce our privacy by using wireless sensor networks. Software-defined network is modern technology which can be used for communication purpose. It provides an algorithm process through which we can secure our privacy and security (Cui, Yu, & Yan, 2016).
Virtualization technology provides a path where we can increase our data speed and privacy. This technology improved the overall performance of communication system and we can overcome threats and risks of a wireless system by adopting virtualization process (Yan, & Yu, 2015). According to this journal paper, the main objective of software-defined networking is to increase the flexibility of the mobile network system. We can improve the network security of our system by enabling enterprises and security systems. SDN was associated with the open flow architecture and many organization added an open flow protocol to enhance the privacy of their personal data files (Yan, & Yu, 2015). SD-WAN is a type of wireless area network through which we can transfer data from one source to another and it is also similar to the WAN system. The SDN architecture is a directly programmable process which is decoupled from forwarding function and we can control traffic system through this technology. Software-defined networking, described by a reasonable detachment of the control and information planes, which can be embraced as a novel worldview for wired systems administration (Yan, & Yu, 2015). With SDN, arrange administrators can run their foundation all the more productively, supporting quicker organization of new administrations while empowering key highlights, for example, virtualization. In this article, we embrace an SDN-like approach connected to remote portable systems that won’t just profit by indistinguishable highlights from in the wired case, however, will likewise use on the particular highlights of versatile arrangements to push upgrades considerably further. We outline with various delegate utilize cases the advantages of the reception of the proposed design, which is definite regarding modules, interfaces, and abnormal state flagging (Yan, & Yu, 2015). We additionally survey the progressing institutionalization endeavours and talk about the potential favorable circumstances and shortcomings, and the requirement for an organized approach.
In this paper, we discussed SDN and wireless network system and we also describe the fundamental concept of virtualization technology. According to the above paper, we can adopt SDN technology because this is the best way through which we can enhance the security and flexibility of our servers and network systems (Yan, & Yu, 2015). In this paper, the author explained the role of software-defined networking in wireless technology and how this technology reduced various threats of wireless sensor networks. Therefore we can use various security systems like firewall software, pattern recognition, encryption process, SDN, and the virtualization process to resolve the problem of security (Yan, & Yu, 2015).
Reference
Arslan, M. Y., Sundaresan, K., & Rangarajan, S. (2015). Software-defined networking in cellular radio access networks: potential and challenges. IEEE Communications Magazine, 53(1), 150-156.
Chen, M., Zhang, Y., Hu, L., Taleb, T., & Sheng, Z. (2015). Cloud-based wireless network: Virtualized, reconfigurable, smart wireless network to enable 5G technologies. Mobile Networks and Applications, 20(6), 704-712.
The Chu, Q. X., Li, X. R., & Ye, M. (2017). High-Gain Printed Log-Periodic Dipole Array Antenna With Parasitic Cell for 5G Communication. IEEE Transactions on Antennas and Propagation, 65(12), 6338-6344.
Cui, L., Yu, F. R., & Yan, Q. (2016). When big data meets software-defined networking: SDN for big data and big data for SDN. IEEE Network, 30(1), 58-65.
Hsu, Y. W., Huang, T. C., Lin, H. S., & Lin, Y. C. (2017). Dual-polarized Quasi Yagi–Uda antennas with EndFire radiation for millimeter-wave MIMO terminals. IEEE Transactions on Antennas and Propagation, 65(12), 6282-6289.
Hu, R. Q., & Qian, Y. (2014). An energy efficient and spectrum efficient wireless heterogeneous network framework for 5G systems. IEEE Communications Magazine, 52(5), 94-101.
Jaiswal, R. K., Pandit, N., & Pathak, N. P. (2018). Design, Analysis, and Characterization of Designer Surface Plasmon Polariton-Based Dual-Band Antenna. Plasmonics, 13(4), 1209-1218.
Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2015). Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), 14-76.
Liang, C., Yu, F. R., & Zhang, X. (2015). Information-centric network function virtualization over 5G mobile wireless networks. IEEE Network, 29(3), 68-74.
Mantash, M., Kesavan, A., & Denidni, T. A. (2018). Beam-Tilting Endfire Antenna Using a Single-Layer FSS for 5G Communication Networks. IEEE Antennas and Wireless Propagation Letters, 17(1), 29-33.
Nunes, B. A. A., Mendonca, M., Nguyen, X. N., Obraczka, K., & Turletti, T. (2014). A survey of software-defined networking: Past, present, and future of programmable networks. IEEE Communications Surveys & Tutorials, 16(3), 1617-1634.
Yan, Q., & Yu, F. R. (2015). Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Communications Magazine, 53(4), 52-59.
Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602-622.
Zhai, G., Cheng, Y., Yin, Q., Zhu, S., & Gao, J. (2014). Gain enhancement of printed log-periodic dipole array antenna using director cell. IEEE Transactions on Antennas and Propagation, 62(11), 5915-5919.