Wireless Assignment Final
Wireless Assignment Final
Assignment
Your name
Many telecom companies are trying to find new ways to optimize their investment in
communication networks while ensuring efficient and safe transmission of information. There is
a range of communication media solutions, with wireless technology and wired solutions, such
as copper and fiber optic cable, being the two most common in use.
The wired network has shown its value in the past but wireless networking has emerged as a
reliable, most effective and favored networking technique presently. Both of these types of
telecommunication media have their pros and cons depending on the technical features. The
wired network has connected the region of the internetwork area and it needs several wires to
Wireless networking, on the other hand, is an open platform allowing all to access the Internet.
Wired and wireless networking have specific specifications including equipment, mobility,
ranges, reliability, and benefits. This paper aims to discuss some basic concepts and theories
(Wired and Wireless). The advancement of technology and the everyday use of digital
technologies to easily send and receive information and messages are very important to both the
sender and the receiver of every enterprise or community and are now separate from almost
every sector. In Communications Engineering and Computer Terminology, the term "Wired
destination. It is secure communication, but when an issue arises, especially about wire failure,
microwave, or other forms of acoustic or electromagnetic waves to relay signals or data over a
short or long distance instead of wires, cables, fiber optics or wires. (Ibrahim, Danladi, & Sani,
H., 2016).
Literature Review:
Network:
A network is a system that connects through a communication channel or link. The device it is
linked to is also called Node that can be a scanner, printer, and computer. It can be any form of
device that has the power of sending and receiving the data generated on the network by the
other devices. (Akyildiz, Sankarasubramaniam, & Cayirci,2002) All the network operates on the
protocols (that are the standards set for the network). All the networks should have a
Importance of a Network:
The importance of using a network is that it provides service, reduction in the cost of equipment,
file sharing between different mediums, sharing of devices such as printers, supporting the
Reliability:
The network has reliability as the network can recover the data if the data is lost due to
the malfunction. It offers precision and can be calculated by the frequency of the network
Security
It provides the recuperation facility for the lost data. It helps secure the data against harm
and defends it against external resources. It implies the specific policies to protect the
data and is difficult to get hacked by the other. (Yan, Jian-Wen, & Lin, 2015)
Types of Connections:
Point to Point
The path between two devices is provided by a point to point connection. The data is
reserved for transmission between those two points. The length of the cable is used.
Multipoint
Using a multipoint connection, two or more devices are connected via one single link.
Network Topologies:
The term physical topology applies to the method the network is physically operated, when two
or more devices communicate with each other with the aid of some path, then a topology is
formed. This is a geometric representation of the devices respectively. The types of network
topologies are bus, ring, star, and mesh. (Zhang, J., & Zhou, 2010).
Network Categories:
LAN:
LAN stands for Local Area Network. It possesses a high bandwidth but covers a limited
WAN:
WAN stands for Wide Area Network. It is a combination of various LANs, having low
MAN:
MAN stands for Metropolitan Area Network and has a size intermediate between LAN
The term wired corresponds to any form of a physical medium composed of the cable. The
cables made up of a pair of copper, fiber optics and twisted. Wired network is often used to carry
different types of signals from one medium to another in electricity form. Just one Internet
connection is used in a wired network inside the cable. Only one computer is connected to one
internet cable, and data is exchanged between the various devices using such a same wire
Origin:
The first Ethernet (wired) system is built by Robert Metcalfe at Xerox PARC [11]. It linked more
than a hundred workstations using the length of one kilometer of cable at a speed of 2.94Mbits
per sec.
Protocols:
1. Ethernet:
utilizes the form of access which is called CSMA / CD (Carrier sense multiple
access/collision detection).
This is essentially a system where every computer must pay attention to the cable
before sending some information/data through the network. Only one by one
relation is built in this. If in a single line there are multiple networks then the
computer must wait until the line is clear after it sends the data to the receiver. If
two devices transmit the data via the cable, they can do this function one at a time.
First, one device receives the sender's data, and the other device has to wait until
the first data transfer is complete and wait for its turn and then try again later. The
second will start after the first receiver receives the data. Because of this collision
often happens and the machine has to wait and it takes a lot of time. But this
collision takes place for a very short time, and it does not affect network
transmission. The Ethernet protocol uses star, bus and tree topology
through the coaxial wire, optical fiber wire. (Gohil, Modi, & Patel, 2013)
2. Fast Ethernet:
It is another form of the protocol used to improve communication speed and it
introduces the latest standards that have the 100Mbps limit. This is called fast
Ethernet. It includes the network interface tokens, hub and category 5(CAT5),
twisted pair cable and fiber optics Today this Ethernet is commonly used in
3. Local talk:
Local talk is a wired network protocol built for Macintosh computer by Apple.
The data is transferred through the special pair twisted cable. Using twisted pair
cable it makes a star, tree topologies or linear bus. The transmission speed of
4. Token ring:
The token ring protocol was developing by IBM in 1980 middle. The data is
meted out in the variety of token and move spherical within the circle/ring. 2 pc
cannot hook up with every other till the need end the task. After that, it connects
with the opposite system and its application on two,23 computers system and
barely used as a result of its performance is incredibly low and lots of time is
consumed and uncountable bother is there .its speed is 4Mbps 0r 16Mbps. (Pitt,
1987).
5. FDDI:
that's used to connect 2 or additional LAN. This can be far-flung over a protracted
distance. It's used because of the token ring method. However, it uses the 2 rings
for the transfer of the information. If one system is busy then the other systems
square measure mechanically activated and transmit the information. Its benefits
square measure high speed and it works on the fiber optic cable at 100Mbps.
(Ross, 1990)
Wireless communications is an increasingly growing technology that offers the versatility and
mobility of our world today. Observably, that the cable limitation is one of the benefits for
cabled devices that Wireless has. Other benefits include the formation of dynamic networks, low
costs, and easy deployment. Wireless systems are designed to reduce the time and the different
types of obstacles that the cables make. Wireless technology is the type of computer networking
in which computers are linked wirelessly to various telecommunication devices. This is used for
various purposes such as communication or data transfer etc. The wireless network was also
developed by IEEE in 1947 with a standard 802. Its first communication was of 2 Megabytes and
that time it was not so much advanced and common to all but later with time and creating the
modern version of wireless, it became world popular. The wireless term refers to a system
consisting of infrared waves or electromagnetic waves. All the devices that have antennas or
television, wireless sensor, laptop, etc. This does not use the wire for the communication or
transfer of the data between two devices. Uses the waves of radiofrequency. Broadband ADSL
Long-range protocols are used to transmit the data over a longer distance with ease. This
can be used as a back-haul between two locations such as smartphones etc. GSM (Global
Mobile Communication System) is the most significant cellular network protocol that is
used globally and its communications are between cell phones and mobile phones.
o LTE:
The older generation utilized EV-DO and GPRS for connectivity before the new
smartphone.
Despite that, industry and companies have to invest a lot of money to enhance it
and make it acceptable for 4G. LTE (long-term assessment) to boost the poor data
o 60 GHz Protocol:
Most of the video running on the device would need 60GHz and use it as well.
This calls for plenty of bandwidth. There are two separate models called WiGig
and HD wireless. This offers video sharing the highest high-quality definition.
WLAN is typically used for the medium-range protocol that is used to improve or replace
wired LAN communication between the computers. These are all components of IEEE
o Wi-Fi:
Due to its range and connection to another computer, Wi-Fi is often used
hardware uses. The Wi-Fi can be regulated according to the range in the setting.
Similar to other wireless network protocols, its speed is lower, but mobile devices
support Wi-Fi and LTE easily and give the user versatility.
o WAP:
protocol. It's used to offer network protection and privacy. There are other types
of protocols that are WEP and WPA. Both used for safety.
Wireless Personal Area or WPAN network is also known as a short wireless protocol.
What works on the lower frequencies between devices that are just a few feet away from
one another?
Bluetooth is one example of a protocol with a short-range. Its common use is that the
wireless headset can communicate with a cell phone. Infrared data association or IRDA is
o Bluetooth:
The oldest wireless network protocol still widely used a day. It moves the data from
one computer to the next. To function than Wi-Fi and from most other wireless
Zigbee are two basic protocols for home automation. They have low data levels and
o UWB:
Ultra-Wide Band is also called a wireless optical pulse. It used for a short distance
and has a lower-powered high-frequency band. And take that kind of data that was
Client:
Server:
A server is a computer program or system providing a service to another computer program and
its user, often known as the client. The actual machine on which a server system runs is often
generally known as a server in a data center. That computer can be a dedicated server, or could
also be used for other purposes. A server program accepts and fulfills requests from client
programs under the client/server programming model, which can often run on the same or other
computers. A provided application in a computer will act as a client with requests from other
programs for services and also as a request server from other programs.
Conclusion:
Wired and wireless technologies are very popular in all day-to-day activities and are available in
the office, in the business, and the home. The technologies were developed for processing,
transmitting and receiving information across networks at very high-speed levels. Networks
Technology has become important for the fulfillment of everyday business tasks and most
companies will be overwhelmed without their networks if they rely heavily on information
technology. High prices, demanding infrastructure, copper theft and more push operators to seek
alternatives to wired approaches. These technologies provide solutions that are long-range,
A wireless network can potentially save millions of dollars in setup fees for a client. Companies
can now store customer details at a very low cost. Networks ' speeds will increase in the future,
as they have in past years. Network costs will continue to decrease and the use of a network will
Network Diagrams:
Ibrahim, J., Danladi, T.A., & Sani, H. (2016). Comparative Analysis between Wired and
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor
Obeidat, I. M., & Berkovich, S. Y. (2008, August). Reliability of network connectivity. In 2008
First International Conference on the Applications of Digital Information and Web Technologies
Yan, F., Jian-Wen, Y., & Lin, C. (2015, June). Computer network security and technology
Zhang, J., & Zhou, L. (2010, December). Research and Design on the Network Topology
Patel, A., Ghaghda, S., & Nagecha, P. (2014, March). Model for security in the wired and
wireless network for education. In 2014 International Conference on Computing for Sustainable
Gohil, A., Modi, H., & Patel, S. K. (2013, March). 5G technology of mobile communication: A
survey. In 2013 international conference on intelligent systems and signal processing (ISSP) (pp.
288-292). IEEE.
Crayford, I. (1995, November). "Fast Ethernet" gets plug-and-play. In Proceedings of
Khan, R. A., & Tariq, M. A. A Survey on Wired and Wireless Network. Aftab Ahmad Malik,
Eklund, C., Marks, R. B., Stanwood, K. L., & Wang, S. (2002). IEEE standard 802.16: a