802.11b and 802.11a Standards
The operation for the 802.11b standards includes the ISM frequency bands. The operational range of frequency in the United States is 2.4-2.4835 GHz. It consists of 14 channels partially overlapping each other with a width of 22 MHz. The requirement for this connectivity is the use of same channels in the devices across the network (Yuan et al., 2014). The chip rate associated with the standard is 11 MHz and the transmission data rate is 1, 2, 5.5 and 11 Mbps. The various techniques adopted by this standard are the direct sequence spread spectrum (DSSS) and complementary code keying modulation (CCK). The frame structure includes the data, header and the preamble.
The standard operates using the radio frequency spectrum at 2.4 GHz frequency band. The transmission rate of this standard is 54 Mbps which is the most important benefit of it (Chakraborty et al., 2014). The frame structure includes the data, header and the preamble. It is said to include 48 data carriers, 64 point FFT, 4 pilot carriers and 1 DC carrier. The remaining carriers are termed as guard carriers. The operational technique adopted by the 802.11a band is the use of OFDM technology.
802.11a standard |
802.11b standard |
Data rate extends up to 54 Mbps |
Data rate extends up to 11 Mbps |
OFDM is used for operations |
DSSS and CCK techniques for operation |
It has more than 100 carrier channels |
It has 14 carrier channels |
Frame structure consists of preamble, data and header |
Frame structure consists of preamble, data and header |
The PLCP frame includes the reserved, length, parity, tail, service, PSDU and Pad bits. |
The PLCP frame includes Sync, frame delimiter, signal, service, length, frame check sequence and PSDU bits. |
a) The robust security network (RSN) is the purpose for authentication by the 802.11i standard. Two types of protocols are used to reference the authentication purposes. These are the 4-way handshake and the group key handshake. The requirement for an authenticated server is addressed by this standard of authentications. The standard of IEEE 802.1X is followed by this standard which involves the development and verification of cryptographic keys. The process utilizes the use of pre-shared key or EAP exchange (Baldini et al., 2014). The authentication is done between a client and the server without the need of disclosing the private key.
b) The virtual private network (VPN) is used to facilitate connection between two points by utilizing a public network. This helps in the security of data transfer as the connection is deemed private. The methods undertaken for encrypting the private network is done by the adoption of certain protocols like the L2TP (Layer 2 Tunneling Protocol), IPSec (IP security), Point-to-Point Tunneling Protocol (PPTP), Secure Socket Layer (SSL) or Transport Layer Security (TLS) and Secure Shell (SSH).
This report discusses about the various wireless metropolitan area network (WMAN) technologies. The main advantage of this technology is the connectivity among various locations in the network. Moreover, the need for higher cost installations is also removed by the presence of such technologies.
Authentication Standards: RSN and VPN
ZeeTech is the chosen multinational company operating in the export and import aspects. The company is supposed to have 5 offices with 40 employees in each of them. The company is considering the use of tablets and mobile phones for addressing their business operations.
The wireless metropolitan area network (WMAN) technologies which is used to facilitate connectivity among various locations in the network. Moreover, the need for higher cost installations is also removed by the presence of such technologies. In case of unstable connections among the infrastructures, the WMAN technology is used to serve as backups to provide support. The main frequency ranges used in this technology lies between the radio frequency and the infrared transmission ranges. In addition, the WMAN technology uses three standards to be applied in operations. These are the HiperMan, HiperACCESS and the 802.16.
The High Performance Radio Metropolitan Area Network (HiperMan) is mainly used to provide broadband connections by utilizing the wireless media. The range of frequencies used is the radio frequencies. Their range of operations lies between 2-11 GHz.
This technology is also used to provide broadband connections over a wireless media. This technology is mainly used for the small to medium infrastructures. In addition, it can also be used to facilitate mobile connectivity. Their range of operations includes the high frequency bands with 40-43 GHz frequencies. 100 Mbit/s is considered the bit rate of this technology.
This technology is also used to provide broadband connections over a wireless media. The range of frequencies used in this technique lies between the ranges of 10-66 GHz (Lu & Huang, 2013). The main operations of this technology use the MAC layer (medium access layer) to support various physical layers.
The wireless metropolitan area network technologies used for broadband connections via the wireless media includes various standards known as the Back Haul and the Last Mile.
The connections among various business enterprises and cellular connectivity are done by the adoption of the Back Haul technique. The main use of the Back haul technique is used to reference the cost requirements. When the cost of wiring a large infrastructure goes to a very high level, the use of the Back haul is addressed for such solutions. Moreover, the rate of transmission of data is also very high.
The use of broadband connections by using the wireless media for the residential zones is done by the Last Mile technique. The main advantage to this technique is the low cost of deployment. In addition, the fast rate of business setup is another factor which contributes to their use.
Thus, the recommendations from the report include the adoption of the Last Mile feature for wireless connectivity. In addition, the cost of deployment is also low. The security standards adopted by the techniques are also beneficial for referencing to the business operations. Moreover, as the rate of setup is very fast, the operations of the business will not be hampered due to the installations.
Wireless Metropolitan Area Network Technologies: HiperMan, HiperACCESS, and IEEE 802.16
Conclusion:
Thus, the conclusion that can be drawn from the report is that the company needs to reference the recommended solutions. This can help to tend to their needs of business operations.
The basic operations of the TDMA technology are the use of a shared channel for connectivity. The technology uses a single carrier channel that is divided into various time slots where each one of them is used for connectivity among the users (Glisic & Leppänen, 2013). The main advantage of this technique is the simpler handoff process. This in turn is used to facilitate high synchronization overhead.
The CDMA technology is used in second generation communications. They are also used for wireless connectivity. The CDMA technique also uses a single channel as a carrier channel. The main difference among the CDMA and the TDMA is that the CDMA has the presence of codes that helps in communications among the transmitter and the receiver (Glisic & Leppänen, 2013). These codes in both the transmitter and the receiver side need to match for efficient transmission.
The GSM is universally developed by European Telecommunications Standards Institute (ETSI). The basic idea of the GSM technology is to replace the analog mode of communications that were available in the first generation networks (Sharma, 2013). In addition, the use of duplex nature of communications is also referenced by the GSM technologies.
References:
Baldini, G., Karanasios, S., Allen, D., & Vergari, F. (2014). Survey of wireless communication technologies for public safety. IEEE Communications Surveys & Tutorials, 16(2), 619-641.
Chakraborty, U., Kundu, A., Chowdhury, S. K., & Bhattacharjee, A. K. (2014). Compact dual-band microstrip antenna for IEEE 802.11 a WLAN application. IEEE Antennas and Wireless Propagation Letters, 13, 407-410.
Dhillon, H. S., Huang, H., & Viswanathan, H. (2017). Wide-area wireless communication challenges for the Internet of Things. IEEE Communications Magazine, 55(2), 168-174.
Glisic, S. G., & Leppänen, P. A. (2013). Wireless communications: TDMA versus CDMA. Springer Science & Business Media.
Kang, S., Kim, H., & Kang, S. (2015). Virtual private network for wellness sports information. Multimedia Tools and Applications, 74(16), 6497-6507.
Liyanage, M., Ylianttila, M., & Gurtov, A. (2014). IP-based virtual private network implementations in future cellular networks. Handbook of Research on Progressive Trends in Wireless Communications and Networking, 1(44), 18.
Lu, J. H., & Huang, B. J. (2013). Planar compact slot antenna with multi-band operation for IEEE 802.16 m application. IEEE Transactions on Antennas and Propagation, 61(3), 1411-1414.
Qu, L. D., Cui, X. Y., & Liu, X. N. (2014). A Route Handoff Method Based on Virtual Private Network in Vehicle Information Network. In Applied Mechanics and Materials (Vol. 475, pp. 699-702). Trans Tech Publications.
Sharma, P. (2013). Evolution of mobile wireless communication networks-1G to 5G as well as future prospective of next generation communication network. International Journal of Computer Science and Mobile Computing, 2(8), 47-53.
Yuan, W., Wang, X., Linnartz, J. P. M., & Niemegeers, I. G. (2013). Coexistence performance of IEEE 802.15. 4 wireless sensor networks under IEEE 802.11 b/g interference. Wireless Personal Communications, 1-22.