The document provides a close assessment and analysis of public WiFi networks. It examines WiFi technology and compares it to other wireless technologies such as 3G, 4G, and LTE. The analysis looks at factors such as total cost, availability, number of supported nodes, end user cost, range, vendor cost, reliability, and security. Tables are presented comparing aspects of different wireless technologies like bandwidth, cost, and performance. The objective is to match WiFi with these other technologies to help companies make informed business decisions when entering the wireless market.
This paper reviews 5G network technologies and security challenges. 5G will provide nearly unlimited wireless access and high data rates. It will face reliability, security, efficiency and energy challenges. 5G networks will use a variety of technologies like small cells and mobile edge computing. Security services like authentication, confidentiality, availability and integrity will be important for 5G. Ongoing standardization is addressing issues like spectrum allocation and receiver design challenges at high frequencies.
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyaravindhawan
This document analyzes access to high-speed wireless connections. It discusses various wireless technologies including Wi-Fi, Bluetooth, Zigbee, RFID, NFC, and Wi-Fi Direct. It examines factors that impact wireless network performance such as throughput, offered load, and maximum throughput. The document also explores wireless local area networks, mobile TCP, and the challenges random wireless losses pose for TCP. Finally, it concludes that advancements in network design and various layers can help improve wireless network performance and efficiency.
This document discusses mobile ad hoc networks (MANETs), which are autonomous wireless networks formed by mobile devices without a fixed infrastructure. It provides an overview of potential MANET applications for emergency situations, enterprise, education, and more. The document also outlines several challenges for MANETs, including routing, service discovery, security, and dealing with the network's dynamic topology without a centralized administration.
This document reviews protocols for mobile ad hoc networks (MANETs). It discusses how MANETs are self-configuring, decentralized wireless networks that allow nodes to communicate through wireless links. Routing in MANETs is challenging due to the frequent changes in network topology as nodes move. The document classifies MANET routing protocols as proactive, reactive, or hybrid and discusses examples of each type. It also reviews the evolution of MANET research from early packet radio networks to today's standards and ongoing work. Key challenges for MANET implementations include dynamic topologies, device discovery, and limited bandwidth and power.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Cellular networks are overloaded by mobile data traffic because of fast growth of mobile broadband services and the widespread use of smart phones. Application of smartphone, laptops internet etc. are increasing day by day. All this is causing congestion problem. Data revenue problem is a major problem for the network operators. One of the solutions to alleviate this problem is the offloading of mobile data traffic from the cellular access technology to the Wi-Fi access network. Wi-Fi access point is widely deployed by customers or by the operators so can be easily used for offloading technique. This paper reviews the models and architecture of offloading in between LTE network and Wi-Fi access network. Limitations of using Wi-Fi as alternative access network is also discussed in this paper and brief of ANDSF is provided in the paper.
5G Technology stands for the 5th Generation Mobile technology. 5G is a next major phase of mobile telecommunications standards beyond the 4G standards. 5G is expected to provide speed upto 10Gbit/s, wider frequency band,
high increased peak bit rate, high system spectral efficiency, ubiquitous connectivity and a significant increase in QoS as
compared to current 4G technology. Evolution of mobile communication technology to 5G is discussed in this review, followed by protocol stack and 5G architecture. A wide comparison is given between the various generations so as to compare why 5G technology is better and needed.
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...EdisonAndresZapataOc
The document summarizes a proposed 5G wireless communication network architecture with an indoor/outdoor segregated design using cloud-based radio access networks (C-RAN). It aims to address challenges of 4G like higher data rates and network capacity by leveraging emerging technologies like massive MIMO, device-to-device communication, visible light communication, ultra-dense networks, and millimeter wave technology, which would be managed by software defined networking/network function virtualization through the C-RAN. The new 5G architecture separates indoor and outdoor networks to avoid penetration losses associated with current designs and allow indoor users to connect to dedicated indoor access points for improved quality of experience.
This paper reviews 5G network technologies and security challenges. 5G will provide nearly unlimited wireless access and high data rates. It will face reliability, security, efficiency and energy challenges. 5G networks will use a variety of technologies like small cells and mobile edge computing. Security services like authentication, confidentiality, availability and integrity will be important for 5G. Ongoing standardization is addressing issues like spectrum allocation and receiver design challenges at high frequencies.
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyaravindhawan
This document analyzes access to high-speed wireless connections. It discusses various wireless technologies including Wi-Fi, Bluetooth, Zigbee, RFID, NFC, and Wi-Fi Direct. It examines factors that impact wireless network performance such as throughput, offered load, and maximum throughput. The document also explores wireless local area networks, mobile TCP, and the challenges random wireless losses pose for TCP. Finally, it concludes that advancements in network design and various layers can help improve wireless network performance and efficiency.
This document discusses mobile ad hoc networks (MANETs), which are autonomous wireless networks formed by mobile devices without a fixed infrastructure. It provides an overview of potential MANET applications for emergency situations, enterprise, education, and more. The document also outlines several challenges for MANETs, including routing, service discovery, security, and dealing with the network's dynamic topology without a centralized administration.
This document reviews protocols for mobile ad hoc networks (MANETs). It discusses how MANETs are self-configuring, decentralized wireless networks that allow nodes to communicate through wireless links. Routing in MANETs is challenging due to the frequent changes in network topology as nodes move. The document classifies MANET routing protocols as proactive, reactive, or hybrid and discusses examples of each type. It also reviews the evolution of MANET research from early packet radio networks to today's standards and ongoing work. Key challenges for MANET implementations include dynamic topologies, device discovery, and limited bandwidth and power.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Cellular networks are overloaded by mobile data traffic because of fast growth of mobile broadband services and the widespread use of smart phones. Application of smartphone, laptops internet etc. are increasing day by day. All this is causing congestion problem. Data revenue problem is a major problem for the network operators. One of the solutions to alleviate this problem is the offloading of mobile data traffic from the cellular access technology to the Wi-Fi access network. Wi-Fi access point is widely deployed by customers or by the operators so can be easily used for offloading technique. This paper reviews the models and architecture of offloading in between LTE network and Wi-Fi access network. Limitations of using Wi-Fi as alternative access network is also discussed in this paper and brief of ANDSF is provided in the paper.
5G Technology stands for the 5th Generation Mobile technology. 5G is a next major phase of mobile telecommunications standards beyond the 4G standards. 5G is expected to provide speed upto 10Gbit/s, wider frequency band,
high increased peak bit rate, high system spectral efficiency, ubiquitous connectivity and a significant increase in QoS as
compared to current 4G technology. Evolution of mobile communication technology to 5G is discussed in this review, followed by protocol stack and 5G architecture. A wide comparison is given between the various generations so as to compare why 5G technology is better and needed.
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...EdisonAndresZapataOc
The document summarizes a proposed 5G wireless communication network architecture with an indoor/outdoor segregated design using cloud-based radio access networks (C-RAN). It aims to address challenges of 4G like higher data rates and network capacity by leveraging emerging technologies like massive MIMO, device-to-device communication, visible light communication, ultra-dense networks, and millimeter wave technology, which would be managed by software defined networking/network function virtualization through the C-RAN. The new 5G architecture separates indoor and outdoor networks to avoid penetration losses associated with current designs and allow indoor users to connect to dedicated indoor access points for improved quality of experience.
A novel password based mutual authentication technique for 4 g mobile communi...eSAT Publishing House
The document describes a proposed password-based mutual authentication technique for 4G mobile communications. The technique aims to authenticate both the subscriber and network using the subscriber's password. It involves four phases: subscriber enrollment where the subscriber chooses an ID and password which are stored on their SIM card; subscriber authentication which occurs during each connection attempt where the subscriber provides their ID and password for verification; network authentication where the network also verifies itself to the subscriber; and a password change phase where the subscriber can update their password without server involvement. The proposed technique is claimed to provide advantages such as minimizing computation, preventing multiple SIMs with the same ID, and not requiring storage of ID/password on the server.
A novel password based authentication technique for 4 g mobile communicationseSAT Journals
Abstract Subscriber and network mutual authentication in mobile systems is a process by which mobile network gains confidence about the identity of the communicating subscriber and subscriber verified that he is communicating with correct network. Authentication in mobile systems is a challenge issue due to swift growth of wireless traffic with increasing security threats and attacks in mobile systems. 4G mobile communications system has brought for the high speedy data communications network by packet switching technology for networking transmission through SGSN servers. In this paper, we propose a mutual authentication technique that verifies the authenticity of the subscriber as well as the network by subscriber password in 4G mobile system. We focus on the advantages of our proposed technique, termed as password based mutual authentication technique. Keywords: Identifier, Mutual Authentication, Packet Switching, Password, SIM.
4.5G: Integration of LTE and Wi-Fi networksPraveen Kumar
This document discusses the integration of LTE and Wi-Fi networks. It describes how 3GPP and Wi-Fi standards have become more interoperable, allowing cellular devices to take advantage of Wi-Fi networks. The Access Network Discovery and Selection Function (ANDSF) plays a key role in allowing user equipment to discover and select Wi-Fi networks based on network policies. Seamless integration of Wi-Fi and LTE is important for offloading data traffic from cellular networks to Wi-Fi networks, which can help improve network capacity and performance.
4.5G: Integration of LTE and Wi-Fi networkseXplanoTech
With LTE-A getting ready to meet the IMT-Advanced requirements and fulfilling the role of promised "4G", we believe the next phase of evolution before 5G will be successful interworking of LTE and Wi-Fi networks. This whitepaper explores this feature, we call 4.5G, in detail.
5th generation mobile networks or 5th generation wireless systems, abbreviated 5G, are the proposed next telecommunications standards beyond the current 4G/IMT-Advanced standards.
An initial chip design by Qualcomm in October 2016, the Snapdragon X50 5G modem, supports operations in the 28 GHz band, also known as millimetre wave (mmW) spectrum. With 800 MHz bandwidth support, it is designed to support peak download speeds of up to 35.46 gigabits per second.
5G planning aims at higher capacity than current 4G, allowing a higher density of mobile broadband users, and supporting device-to-device, ultra reliable, and massive machine communications.
5G research and development also aims at lower latency than 4G equipment and lower battery consumption, for better implementation of the Internet of things
INTERNET OF THINGS
. The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
Nowadays Mobile Ad Hoc Network MANET is an emerging area of research to provide various communication services to the end users. Recently the fields of MANET have yielded more and more popularity and thus MANET have become a subject of great interest for the researchers to enforce research activities. One of the main challenges in Mobile ad hoc network is of searching and maintaining an effective route for transporting data information securely. Security and privacy are indispensable in various communications for successful acceptance and deployment of such a technology. Mobile Ad Hoc Network MANET is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt mobile ad hoc networking for commercial uses however, their main applications lie in military, tactical and other security sensitive operations. In these and other applications of mobile ad hoc networking, secure routing is an important issue. Thinking of this, I proposed an efficient secure ad hoc routing protocol for optimize the performance of MANET which will more efficient in terms of time delay, packet drop and packet delivery fraction in mobile ad hoc network. The proposed protocol can employ an integrated approach of digital signature and encryption techniques to achieve the security goals like message integrity, data confidentiality and end to end authentication at IP layer. Together with existing approaches for securing the physical and MAC layer within the network protocol stack, the proposed secure routing protocol can provide a foundation for the secure operation of an ad hoc network. Md. Torikur Rahman ""An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of Mobile Ad Hoc Network (MANET)"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23727.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/23727/an-efficient-secure-ad-hoc-routing-protocol-for-optimize-the-performance-of-mobile-ad-hoc-network-manet/md-torikur-rahman
WiMAX is a wireless technology that provides broadband internet access over long distances at high speeds. The document discusses a market survey conducted in Mumbai by MSG to identify potential areas for Tata Communications to set up WiMAX towers. MSG divided Mumbai into grids and polygons and collected data on building rentals, roads, and infrastructure to identify economically viable areas. The survey found that MTNL is a major competitor in Mumbai. The objectives of the study were to measure the market potential, identify competitors, specify suitable locations, and help develop strategies for Tata Communications' WiMAX services.
This document summarizes a research paper on 5G technology for mobile communication. It discusses how 5G will integrate various wireless technologies to provide high bandwidth connectivity. 5G networks will use an all-IP architecture and allow seamless handovers between different wireless technologies. Key aspects of 5G include advanced features like virtual/augmented reality and download speeds of up to 25Mbps. It is expected that 5G standards will be developed around 2020.
Wimax is a wireless technology standard that provides broadband connectivity without direct line-of-sight. It can deliver broadband access to homes and businesses at distances of up to 31 miles, compared to WiFi's 300 feet range. Wimax aims to provide widespread internet access, especially in rural areas that lack wired connections. It has the potential to enable economic growth through better access to education, healthcare, and entertainment. The technology is growing rapidly and may become the dominant mobile standard after 2010.
This document analyzes the performance of routing algorithms for an integrated Wi-Fi/WiMAX heterogeneous network. It begins with an introduction describing the need for such integrated networks to provide uninterrupted wireless service. It then provides overviews of the Wi-Fi (IEEE 802.11n) and WiMAX (IEEE 802.16e) technologies that would be integrated. Several routing algorithms are described, including Bellman-Ford, AODV, DYMO, OLSRv2, RIP, and OSPFv2. The document then discusses how to statistically analyze the performance of the integrated network using these various routing algorithms, focusing on metrics like throughput, packet loss probability, and distortion. The analysis will
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...CSCJournals
Future communication networks will integrate `SSS\' concepts such as social networking, social networking device, and social desktop. In this paper, we focus on applications over social networking sites (SNS). Due to emerging bandwidth-hungry applications over SNS, hybrid fiber-wireless (FiWi) access networks are a promising solution to mitigate the last mile bandwidth bottleneck. SNS are particularly vulnerable to Automated Social Engineering (ASE) attacks due to their powerful information gathering functionalities. We discuss how integrated FiWi access networks supporting SNS systems perform, and how they can deal with threats related to ASE. In addition, we explain how an ASE attack may be launched from different networking platforms and propose a security architecture for ASE attacks over FiWi access networks.
A Literature Survey on Security Management Policies used in Wireless Domainijtsrd
Wireless is a term used to describe telecommunications in which electromagnetic waves rather than some form of wire carry the signal over part or the entire communication path. Some monitoring devices, such as intrusion alarms, employ acoustic waves at frequencies above the range of human hearing these are also sometimes classified as wireless. Wireless network security is the process of designing, implementing and ensuring security on a wireless computer network. Nowadays wireless networks are the most popular way of communication. For example, internet services in companies, cafes, e markets and in homes. This paper will highlight the drawbacks and their proposed system to give continuous growth of new technologies in wireless domain, both for application and basic research. Papers should emphasize original results relating to the theory and or applications of wireless communications and networking. K. Senthil Kumar | P. Supraja | V. Sridharshini ""A Literature Survey on Security Management Policies used in Wireless Domain"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22854.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/22854/a-literature-survey-on-security-management-policies-used-in-wireless-domain/k-senthil-kumar
The document summarizes research on 5G mobile technologies that are expected to be operational by 2020. It discusses the key goals of 5G including high throughput, low latency, high reliability, increased scalability and energy efficiency. Several research groups working on 5G standards are mentioned, including METIS which published a final report outlining 5G architectures and technologies. The document also discusses developments toward 5G technologies, including network architectures using wireless backbone connectivity and base stations with high-bandwidth wired connections to accommodate many connected devices.
This seminar report compares 3G and Wi-Fi technologies. Both provide wireless connectivity but 3G uses licensed spectrum from mobile carriers while Wi-Fi uses unlicensed spectrum. 3G offers broader coverage but slower speeds than Wi-Fi. While 3G provides more secure communication, Wi-Fi is more widespread and less expensive. The report discusses the similarities and differences between the technologies and their advantages over each other to evaluate their future interactions and success in wireless access.
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
This document discusses recent developments in wireless networking and wireless security. It describes enhancements to wireless standards including 802.11ac which provides speeds up to 1 Gbps, 802.11n which provides speeds up to 600 Mbps, and research achieving speeds of 40 Gbps over 1 km. It also discusses DARPA's efforts to develop more resilient military wireless networks and Google's plans to expand wireless networks in developing areas. The document outlines various methods for securing wireless networks including using WPA2 encryption, changing default passwords, hiding the SSID, limiting DHCP assignments, and disabling remote administration.
1. Computer networks allow devices to exchange data through connections between nodes using cable or wireless media. The Internet is the best-known computer network.
2. Mobile computing involves mobile devices, communication, and software that allows transmission of data, voice, and video without a fixed connection. Specifications of the ZTE Obsidian phone and mobile computing services and frequencies were discussed.
3. Internet technologies like VoIP and blogs were explained. VoIP allows voice communication over IP networks. Blogs are websites with discrete blog entries displayed in reverse chronological order.
The document provides an overview of 4G technology, its key features, challenges, and applications. It discusses that 4G aims to provide high speed wireless connectivity for mobile users. It allows seamless switching between networks for continuity of service. Technologies like LTE and WiMAX are part of 4G. Challenges include ensuring security of information and reducing handoff delay during network switching. Applications discussed include using multimode software to access different networks simultaneously and using network coding techniques to efficiently transmit video content over 4G networks. The document also proposes a design for an efficient battery charger to address the short battery life issue in 4G devices.
WIMAX is a revolutionary technology that provides wireless broadband connectivity as an alternative to DSL and cable connections. It allows for fixed and mobile broadband access using different IEEE standards. The document discusses how WIMAX can be integrated with broadband networks and IP networks to provide benefits such as improved quality of service, mobility, and flexibility. It also explores applications of WIMAX such as providing connectivity for telemedicine, surveillance, and emergency response in remote locations.
This document provides an overview of 5G mobile technology presented by Basil John, a 3rd year B.Tech student in Electronics and Communication Engineering. It discusses the generations of mobile networks from 1G to 5G, highlighting the improvements and new capabilities at each stage. Key features of 5G networks described include high bandwidth, high resolution for multimedia, fast upload/download speeds, and creating a "World Wide Wireless Web".
The Election Process Of US President -. Online assignment writing service.Jose Katab
The document provides instructions for requesting writing assistance on the HelpWriting.net website. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and select one based on qualifications. 4) Review the completed paper and authorize payment. 5) Request revisions to ensure satisfaction, with the option of a full refund for plagiarized work.
Writing A Descriptive Essay Help Essay Online WritersJose Katab
The document provides instructions for getting writing assistance from the website HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete an order form with instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the paper and authorize payment if satisfied. 5) Request revisions until fully satisfied, with a refund option for plagiarized work.
Más contenido relacionado
Similar a A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFI
A novel password based mutual authentication technique for 4 g mobile communi...eSAT Publishing House
The document describes a proposed password-based mutual authentication technique for 4G mobile communications. The technique aims to authenticate both the subscriber and network using the subscriber's password. It involves four phases: subscriber enrollment where the subscriber chooses an ID and password which are stored on their SIM card; subscriber authentication which occurs during each connection attempt where the subscriber provides their ID and password for verification; network authentication where the network also verifies itself to the subscriber; and a password change phase where the subscriber can update their password without server involvement. The proposed technique is claimed to provide advantages such as minimizing computation, preventing multiple SIMs with the same ID, and not requiring storage of ID/password on the server.
A novel password based authentication technique for 4 g mobile communicationseSAT Journals
Abstract Subscriber and network mutual authentication in mobile systems is a process by which mobile network gains confidence about the identity of the communicating subscriber and subscriber verified that he is communicating with correct network. Authentication in mobile systems is a challenge issue due to swift growth of wireless traffic with increasing security threats and attacks in mobile systems. 4G mobile communications system has brought for the high speedy data communications network by packet switching technology for networking transmission through SGSN servers. In this paper, we propose a mutual authentication technique that verifies the authenticity of the subscriber as well as the network by subscriber password in 4G mobile system. We focus on the advantages of our proposed technique, termed as password based mutual authentication technique. Keywords: Identifier, Mutual Authentication, Packet Switching, Password, SIM.
4.5G: Integration of LTE and Wi-Fi networksPraveen Kumar
This document discusses the integration of LTE and Wi-Fi networks. It describes how 3GPP and Wi-Fi standards have become more interoperable, allowing cellular devices to take advantage of Wi-Fi networks. The Access Network Discovery and Selection Function (ANDSF) plays a key role in allowing user equipment to discover and select Wi-Fi networks based on network policies. Seamless integration of Wi-Fi and LTE is important for offloading data traffic from cellular networks to Wi-Fi networks, which can help improve network capacity and performance.
4.5G: Integration of LTE and Wi-Fi networkseXplanoTech
With LTE-A getting ready to meet the IMT-Advanced requirements and fulfilling the role of promised "4G", we believe the next phase of evolution before 5G will be successful interworking of LTE and Wi-Fi networks. This whitepaper explores this feature, we call 4.5G, in detail.
5th generation mobile networks or 5th generation wireless systems, abbreviated 5G, are the proposed next telecommunications standards beyond the current 4G/IMT-Advanced standards.
An initial chip design by Qualcomm in October 2016, the Snapdragon X50 5G modem, supports operations in the 28 GHz band, also known as millimetre wave (mmW) spectrum. With 800 MHz bandwidth support, it is designed to support peak download speeds of up to 35.46 gigabits per second.
5G planning aims at higher capacity than current 4G, allowing a higher density of mobile broadband users, and supporting device-to-device, ultra reliable, and massive machine communications.
5G research and development also aims at lower latency than 4G equipment and lower battery consumption, for better implementation of the Internet of things
INTERNET OF THINGS
. The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
Nowadays Mobile Ad Hoc Network MANET is an emerging area of research to provide various communication services to the end users. Recently the fields of MANET have yielded more and more popularity and thus MANET have become a subject of great interest for the researchers to enforce research activities. One of the main challenges in Mobile ad hoc network is of searching and maintaining an effective route for transporting data information securely. Security and privacy are indispensable in various communications for successful acceptance and deployment of such a technology. Mobile Ad Hoc Network MANET is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt mobile ad hoc networking for commercial uses however, their main applications lie in military, tactical and other security sensitive operations. In these and other applications of mobile ad hoc networking, secure routing is an important issue. Thinking of this, I proposed an efficient secure ad hoc routing protocol for optimize the performance of MANET which will more efficient in terms of time delay, packet drop and packet delivery fraction in mobile ad hoc network. The proposed protocol can employ an integrated approach of digital signature and encryption techniques to achieve the security goals like message integrity, data confidentiality and end to end authentication at IP layer. Together with existing approaches for securing the physical and MAC layer within the network protocol stack, the proposed secure routing protocol can provide a foundation for the secure operation of an ad hoc network. Md. Torikur Rahman ""An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of Mobile Ad Hoc Network (MANET)"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23727.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/23727/an-efficient-secure-ad-hoc-routing-protocol-for-optimize-the-performance-of-mobile-ad-hoc-network-manet/md-torikur-rahman
WiMAX is a wireless technology that provides broadband internet access over long distances at high speeds. The document discusses a market survey conducted in Mumbai by MSG to identify potential areas for Tata Communications to set up WiMAX towers. MSG divided Mumbai into grids and polygons and collected data on building rentals, roads, and infrastructure to identify economically viable areas. The survey found that MTNL is a major competitor in Mumbai. The objectives of the study were to measure the market potential, identify competitors, specify suitable locations, and help develop strategies for Tata Communications' WiMAX services.
This document summarizes a research paper on 5G technology for mobile communication. It discusses how 5G will integrate various wireless technologies to provide high bandwidth connectivity. 5G networks will use an all-IP architecture and allow seamless handovers between different wireless technologies. Key aspects of 5G include advanced features like virtual/augmented reality and download speeds of up to 25Mbps. It is expected that 5G standards will be developed around 2020.
Wimax is a wireless technology standard that provides broadband connectivity without direct line-of-sight. It can deliver broadband access to homes and businesses at distances of up to 31 miles, compared to WiFi's 300 feet range. Wimax aims to provide widespread internet access, especially in rural areas that lack wired connections. It has the potential to enable economic growth through better access to education, healthcare, and entertainment. The technology is growing rapidly and may become the dominant mobile standard after 2010.
This document analyzes the performance of routing algorithms for an integrated Wi-Fi/WiMAX heterogeneous network. It begins with an introduction describing the need for such integrated networks to provide uninterrupted wireless service. It then provides overviews of the Wi-Fi (IEEE 802.11n) and WiMAX (IEEE 802.16e) technologies that would be integrated. Several routing algorithms are described, including Bellman-Ford, AODV, DYMO, OLSRv2, RIP, and OSPFv2. The document then discusses how to statistically analyze the performance of the integrated network using these various routing algorithms, focusing on metrics like throughput, packet loss probability, and distortion. The analysis will
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...CSCJournals
Future communication networks will integrate `SSS\' concepts such as social networking, social networking device, and social desktop. In this paper, we focus on applications over social networking sites (SNS). Due to emerging bandwidth-hungry applications over SNS, hybrid fiber-wireless (FiWi) access networks are a promising solution to mitigate the last mile bandwidth bottleneck. SNS are particularly vulnerable to Automated Social Engineering (ASE) attacks due to their powerful information gathering functionalities. We discuss how integrated FiWi access networks supporting SNS systems perform, and how they can deal with threats related to ASE. In addition, we explain how an ASE attack may be launched from different networking platforms and propose a security architecture for ASE attacks over FiWi access networks.
A Literature Survey on Security Management Policies used in Wireless Domainijtsrd
Wireless is a term used to describe telecommunications in which electromagnetic waves rather than some form of wire carry the signal over part or the entire communication path. Some monitoring devices, such as intrusion alarms, employ acoustic waves at frequencies above the range of human hearing these are also sometimes classified as wireless. Wireless network security is the process of designing, implementing and ensuring security on a wireless computer network. Nowadays wireless networks are the most popular way of communication. For example, internet services in companies, cafes, e markets and in homes. This paper will highlight the drawbacks and their proposed system to give continuous growth of new technologies in wireless domain, both for application and basic research. Papers should emphasize original results relating to the theory and or applications of wireless communications and networking. K. Senthil Kumar | P. Supraja | V. Sridharshini ""A Literature Survey on Security Management Policies used in Wireless Domain"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22854.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/22854/a-literature-survey-on-security-management-policies-used-in-wireless-domain/k-senthil-kumar
The document summarizes research on 5G mobile technologies that are expected to be operational by 2020. It discusses the key goals of 5G including high throughput, low latency, high reliability, increased scalability and energy efficiency. Several research groups working on 5G standards are mentioned, including METIS which published a final report outlining 5G architectures and technologies. The document also discusses developments toward 5G technologies, including network architectures using wireless backbone connectivity and base stations with high-bandwidth wired connections to accommodate many connected devices.
This seminar report compares 3G and Wi-Fi technologies. Both provide wireless connectivity but 3G uses licensed spectrum from mobile carriers while Wi-Fi uses unlicensed spectrum. 3G offers broader coverage but slower speeds than Wi-Fi. While 3G provides more secure communication, Wi-Fi is more widespread and less expensive. The report discusses the similarities and differences between the technologies and their advantages over each other to evaluate their future interactions and success in wireless access.
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
This document discusses recent developments in wireless networking and wireless security. It describes enhancements to wireless standards including 802.11ac which provides speeds up to 1 Gbps, 802.11n which provides speeds up to 600 Mbps, and research achieving speeds of 40 Gbps over 1 km. It also discusses DARPA's efforts to develop more resilient military wireless networks and Google's plans to expand wireless networks in developing areas. The document outlines various methods for securing wireless networks including using WPA2 encryption, changing default passwords, hiding the SSID, limiting DHCP assignments, and disabling remote administration.
1. Computer networks allow devices to exchange data through connections between nodes using cable or wireless media. The Internet is the best-known computer network.
2. Mobile computing involves mobile devices, communication, and software that allows transmission of data, voice, and video without a fixed connection. Specifications of the ZTE Obsidian phone and mobile computing services and frequencies were discussed.
3. Internet technologies like VoIP and blogs were explained. VoIP allows voice communication over IP networks. Blogs are websites with discrete blog entries displayed in reverse chronological order.
The document provides an overview of 4G technology, its key features, challenges, and applications. It discusses that 4G aims to provide high speed wireless connectivity for mobile users. It allows seamless switching between networks for continuity of service. Technologies like LTE and WiMAX are part of 4G. Challenges include ensuring security of information and reducing handoff delay during network switching. Applications discussed include using multimode software to access different networks simultaneously and using network coding techniques to efficiently transmit video content over 4G networks. The document also proposes a design for an efficient battery charger to address the short battery life issue in 4G devices.
WIMAX is a revolutionary technology that provides wireless broadband connectivity as an alternative to DSL and cable connections. It allows for fixed and mobile broadband access using different IEEE standards. The document discusses how WIMAX can be integrated with broadband networks and IP networks to provide benefits such as improved quality of service, mobility, and flexibility. It also explores applications of WIMAX such as providing connectivity for telemedicine, surveillance, and emergency response in remote locations.
This document provides an overview of 5G mobile technology presented by Basil John, a 3rd year B.Tech student in Electronics and Communication Engineering. It discusses the generations of mobile networks from 1G to 5G, highlighting the improvements and new capabilities at each stage. Key features of 5G networks described include high bandwidth, high resolution for multimedia, fast upload/download speeds, and creating a "World Wide Wireless Web".
Similar a A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFI (20)
The Election Process Of US President -. Online assignment writing service.Jose Katab
The document provides instructions for requesting writing assistance on the HelpWriting.net website. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and select one based on qualifications. 4) Review the completed paper and authorize payment. 5) Request revisions to ensure satisfaction, with the option of a full refund for plagiarized work.
Writing A Descriptive Essay Help Essay Online WritersJose Katab
The document provides instructions for getting writing assistance from the website HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete an order form with instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the paper and authorize payment if satisfied. 5) Request revisions until fully satisfied, with a refund option for plagiarized work.
Research Paper Summer Vacations Essay For KidsJose Katab
Guillermo Navallez owns a specialty furniture store in Mexico. He has been exploring factors to keep his business profitable, including budgets, financial statements, sales forecasts, and cost relationships. It is important for Guillermo to implement a management control system, such as a balanced scorecard, to monitor key performance indicators and control costs. This will help align employee performance with goals and identify skills gaps to strengthen performance.
Essay On Money Can T B. Online assignment writing service.Jose Katab
The document discusses how to request writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account, 2) Complete an order form providing instructions, sources, and deadline, 3) Review bids from writers and select one, 4) Review the completed paper and authorize payment, 5) Request revisions to ensure satisfaction. It emphasizes that original, high-quality content is guaranteed, with refunds offered for plagiarized work. Customers can choose HelpWriting.net confidently knowing their needs will be fully met.
Compare And Contrast Essay Tips On How ToJose Katab
Global funding institutions like the World Bank and IMF provide funds to support development projects and programs in developing countries. While this funding can help support important initiatives, there are also disadvantages. Receiving funds can come with requirements that negatively impact sovereignty. It can also increase debt burdens. However, these institutions also promote global cooperation and provide emergency relief during economic crises. An analysis of both the advantages and disadvantages is needed to understand their complex roles.
Free End Of The Year Memory Book - Te. Online assignment writing service.Jose Katab
This document discusses three types of managers - a good manager, a people person, and a pride builder. A good manager focuses on equality, efficiency, and developing individuals. A people person explains decisions well and creates opportunities for favorites. A pride builder empowers staff and strives to get the best from every team member. Insights from these categories can help motivate performance in oneself and others. The document then discusses how Christianity is portrayed in the movie Lars and the Real Girl in a subtle, non-preachy way through the community's loving support of Lars.
Essay Writing How To Tips Teaching ResourcesJose Katab
The document provides instructions for requesting essay writing help from the HelpWriting.net website. It outlines a 5-step process: 1) Create an account with a password and email; 2) Complete a 10-minute order form with instructions, sources, and deadline; 3) Review bids from writers and choose one based on qualifications; 4) Receive the paper and authorize payment if pleased; 5) Request revisions until satisfied. The document emphasizes original, high-quality content and refunds for plagiarized work.
College Articles & Resources - College Admissions & EJose Katab
This document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied, with the option of a full refund for plagiarized work. The service utilizes a bidding system and promises original, high-quality content.
Dissertation Abstract Help - Example Of AJose Katab
The document provides information about public transportation options in Orlando city. It discusses that the city has a bus system called LYNX that provides transportation throughout Orlando and connects to neighboring cities. It also mentions SunRail, a commuter rail service that runs north-south along a 61-mile corridor. The document notes that while public transportation options exist, Orlando still relies heavily on personal vehicles for transportation due to the low density and sprawl of the city. It concludes that improving public transportation could help with traffic and environmental issues.
School Health Handwriting Without Tears Pre-K KitJose Katab
This document provides instructions for requesting an assignment writing service from HelpWriting.net. There are 5 steps: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Review the completed paper and authorize payment or request revisions. 5) Request revisions until satisfied with the original, high-quality content or receive a full refund.
Buy Essay Online - Get 100 Original Essay - WritJose Katab
This document provides instructions for purchasing an essay online from the website HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email; 2) Complete a 10-minute order form with instructions, sources, and deadline; 3) Review bids from writers and select one; 4) Review the paper and authorize payment if satisfied; 5) Request revisions until satisfied, with a refund option for plagiarism. The purpose is to obtain a 100% original essay through this online writing service.
Who Is The Father Of Essay. The Father Essay. 2022-10-25Jose Katab
The document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete a 10-minute order form with instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions until fully satisfied, with the option of a full refund for plagiarized work.
Persuade Me Graphic Organizer WorksheetsJose Katab
The document discusses the four types of support that an end user may require: general support, functional support, technical support, and training support. General support handles general inquiries, functional support assists with specific applications or functions, technical support addresses technical issues, and training support provides instruction to users. The types of support cover a range of needs from general questions to technical problems to training.
HOW TO WRITE AN ESSAY IN 8 EASY STEPS - ESLJose Katab
The document provides instructions for writing an essay in 8 easy steps on the website HelpWriting.net. It outlines the steps which include creating an account, completing an order form with instructions and deadline, choosing a bid from writers, reviewing the paper and authorizing payment, and requesting revisions if needed. The website promises original, high-quality content and refunds for plagiarized work.
Essay On Help The Needy Make A Life Lend A Helping Hand To The Poor ...Jose Katab
The document summarizes how five articles examine how women living with fibromyalgia experience and perceive fatigue. Each article took a different approach, but they all found that fatigue disrupted women's lives and had negative impacts on daily functioning. The women viewed fatigue as a burden they had to learn to adapt to and manage. They developed coping mechanisms to minimize fatigue's effects and continue daily activities. The studies also showed fatigue affected women's relationships and caused feelings of anger, guilt and frustration as part of dealing with their condition.
Example Of Autobiography About Yourself New AutobiJose Katab
The document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and select one. 4) Review the completed paper and authorize payment. 5) Request revisions to ensure satisfaction, with a refund option for plagiarized work.
006 Essay Example Job Application Examples FirstJose Katab
The document discusses Andy Warhol's auction data from 1985 to 1996 and compares it to art market indexes to look for signs of a "Death Effect." Warhol's market showed a slight Death Effect compared to both the avant-garde art market and general art markets, with his prices rising modestly after his death. An appendix also analyzes Roy Lichtenstein's market data around the time of his death but found no clear Death Effect, as his prices diverged from general art market trends and continued declining after his death.
Imaginative Essay Writing. ImaginativeWritinJose Katab
The document provides instructions for using a writing service called HelpWriting.net. It outlines 5 steps: 1) Create an account with an email and password. 2) Complete a form with paper details, sources, and deadline. 3) Review writer bids and qualifications to select one. 4) Review the paper and authorize payment if satisfied. 5) Request revisions until fully satisfied, with a refund option for plagiarism.
Results For Dr Seuss Writing Paper TPT. Online assignment writing service.Jose Katab
The Canadian economy has a long history that began with hunting, farming and trading among early settlers. Farming in Ontario became increasingly commercialized over time, especially after 1896, as farmers shifted production to meet demand for goods like milk and eggs. Major changes have included a transition to high-tech industries and a shift towards producing information-based goods and services.
Free Paper Fortune Teller Printable Templates WelcomJose Katab
The document discusses the Palo Verde Historical Museum and Society located in Blythe, California. The museum houses artifacts that provide insight into Blythe's history from the late 1800s onward, including items related to agriculture, local tribes, and family photos dating back to the 1920s. Visitors can learn about how Blythe was established and developed over time from its early days as a hub for farming and trade along the Colorado River. The museum offers a glimpse into Blythe's past and what life was like before modern developments.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Diana Rendina
Librarians are leading the way in creating future-ready citizens – now we need to update our spaces to match. In this session, attendees will get inspiration for transforming their library spaces. You’ll learn how to survey students and patrons, create a focus group, and use design thinking to brainstorm ideas for your space. We’ll discuss budget friendly ways to change your space as well as how to find funding. No matter where you’re at, you’ll find ideas for reimagining your space in this session.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFI
1. A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFI
Abdul Rauf Khan1
, Aurang Zeb Khan2
, Imran Ahmad3
, Shahid Ullah4
, Najeeb Ullah5
, Sajid Ullah Khan6
1
University of Science & Technology, Bannu, Pakistan
2
University of Science & Technology, Bannu, Pakistan
Center of Excellence in Information Technology, Institute of Management Sciences, Peshawar, Pakistan
4
Sarhad University, KPK, Paksitan
5
CECOS University, Peshawar, Pakistan
6
Universiti Malaysia Sarawak, Malaysia
Correspondent email: khansajidmalik.com
ABSTRACT: Wireless technologies (Wi-Fi) permit all networking devices and computers to communicating over a
wireless signal. Wi-Fi becomes so prominent because of installation simplicity and the increased number of Wi-Fi
radio equipped laptops. Companies that like to enter this market needs intelligence in this area to make appropriate
business decisions based on the properties of present and future technologies. Knowledge of the technologies in
terms of security issues, performance and installation and maintenance cost are of interest. The goal of this paper is
to investigate and compare total cost, focus on availability, number of nodes, end user-cost, range, vendor cost,
reliability, and security among different wireless network. The aim is to match LAN Wi-Fi technology (IEEE 802.11
a/g) with mobile wireless technology e.g. 3G, 4G and LTE. The objective of this research work is to match different
technologies with WiFi in terms of bandwidth, cost factor and performance factor, and technology implementation
factor.
KEYWORDS: LAN Wi-Fi technology (IEEE 802.11 a/g), 3G, 4G, LTE.
1. INTRODUCTION
Wireless technologies (Wi-Fi) permit all networking
devices and computers to communicating over a
wireless signal [1]. A usual Wi-Fi network has three
parts: a computer connected by wired and wireless
connections, an access point, and a wired connection
to a broadband provider [2]. It offers different
broadband speeds and functions in Scientific and
Medical band [3]. The communication among
computers is done through Access Points (APs). The
access point also works as a wireless ethernet
adapter. Wi-Fi becomes so prominent because of
installation simplicity and the increased number of
Wi-Fi radio equipped laptops.
Now days numerous businesses like hotel, airports,
cafés, restaurants, and shopping areas offering
wireless internet-services to customers. Wireless
technology getting more significance in business and
everyday-life, as population is getting denser by
closely spaced buildings. Wireless networks have
easy placement in markets, offices, airports, and
other locations providing advantages like flexibility,
mobility, ease of use, and low cost.
Companies that like to enter this market needs
intelligence in this area to make appropriate business
decisions based on the properties of present and
future technologies. Knowledge of the technologies
in terms of security issues, performance and
installation and maintenance cost are of interest.
The study does not analyze or contain technologies
like Near Field Communication, Bluetooth and Radio
frequency identification (RFID). The rest of the paper
consists of the following sections. Section 2
represents the background study. Section 3 shows the
research approach. Section 4 depicts results and
section 5 and section 6 represents discussion and
conclusion.
2. BACKGROUND STUDY
2.1. The IEEE 802.11 Wireless LAN
Architecture Structure
IEEE 802.11 architecture/structure has nine services
are divided into two groups i.e. Station (STAs)
services and distribution services.
STAs services comprise of authentication, de-
authentication, delivery and privacy of the
information while distribution amenities consists of
distribution, integration, association, re-association
and disassociation.
2.2 802.11b High-rate WLAN Standard
The 802.11b emphases on the lowest two layers of
the open system Interconnect model. i.e. the physical
layer and data link layer. The 802.11b standard
permits for two forms of transmissions: FHSS and
DSSS. Both of spread spectrums use more bandwidth
than a usual narrowband transmission, but empower a
strong signal that is easier for the receiver to detect
than the narrowband signal [4].
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 9, September 2016
165 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
2. 2.3 802.11b Standard Operating Modes
802.11b expresses two kinds of apparatus’s: a
wireless station that is generally a personal computer
having Access point and WNIC (wireless network
interface card). The 802.11b standard expresses two
types: infrastructure type and adhoc type [4].
2.4 WiFi as Hotspots
A hotspot usually runs WiFi technology through
router, offering internet access. Free hotspot offer
free access to menu or purchase list also providing
payment systems like paypall, or via credit card, or
work public network in which authentication and
verification features are turned off [5].
2.5 IEEE 802.11
The wireless technologies nowadays are more
common that wired or fixed networks. The term “Wi-
Fi” is an abbreviation of wireless fidelity, which
means that handheld device having Wi-Fi can access
a WLAN (Wireless Local Area Network) [6]. WLAN
is understood as the technology that will empower
the utmost suitable connection between current wired
networks and portable computing and communication
equipment, e.g. notebook computers and others
personnel digital assistants (PDAs), at the school,
office, or organization level. The most vital
advantage of the WLAN is that it reduces the
requirement for wiring among various structures. In
broad, the uses of the WLAN schemes can be
basically between two PCs or between a computer
and a wired network, all the way up to the whole
network with various operators and a great numbers
of data paths [7].
2.6 Third Generation Technology (3G)
3G is an abbreviation of third generation mobile
communications and is a normally used mobile phone
standard for transferring voice and data. 3G was
developed by NTT DoCoMo, Japan based on the
Universal Mobile Telecommunications System
(UMTS) technology [8]. NTT DoCoMo launched the
first pre-commercial 3G network in Japan in 1998
followed by commercial launch October 2001 [9].
2.7 Fourth Generation Technology (4G)
Fourth Generation Mobile communication is a
advance of the voice and data transfer
communication technology approaches.
The Defense Advanced Research Projects Agency
(DARPA) originally projected it and it delivers
mobile ultra-broadband internet access for mobile
devices like Smartphone’s, laptops etc [10]. Two
categories of 4G network are currently commercially
installed; mobile WiMax and Long Term Evolution
(LTE).
2.8 Fifth Generation Technology (5G)
The fifth generation of mobile communications
technology is proposed as a standard for the next
stage of mobile telecommunication. The data rates in
5G are increased beyond 100 Mbps to facilitate for
quick downloads and streaming of data [11].
2.9 Long Term Evolution (LTE) Technology
Long-term evolution (LTE) is a wireless technology
designed to facilitate roaming internet access via
handheld devices like mobile, tablets, and laptops.
LTE is packet-based technology having flat network
architecture. LTE offers broadband access for fixed,
portable, and mobile devices [12]. The below figure
2.10 shows the block diagram of LTE technology.
2.10Worldwide Interoperability for
Microwave Access (Wi Max)
The team for Wi Max was shaped in 1998 to design
and develop this air interface standard for wireless
broadband. WiMax provides flexibility in terms of
deployment options and services. It is skillful of very
high data rates, scalable bandwidth functionality, and
data rate support. Wi Max also provides support for
advanced antenna techniques.
The overall network architecture of WiMax is
dividing in the following parts i.e. access service
network, mobile stations and connectivity service
network.
2.11Public Networks
Public Wi-Fi networks may be wired or wireless.
They offer Internet access at picnic spots, airports,
coffee shops, and hotels etc. There are diverse
approaches for public network, for example, in a hall
with an access point, access point with
authentication, and use of access points supporting
virtual LAN with SSID, access permission, and
security settings.
2.12Establishment of Extended WiFi
The extended/lengthy or long distance Wi-Fi
networks have five parts:
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 9, September 2016
166 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
3. • Network Planning: In this phase, a
longdistance Wi-Fi link needs line-of-sight
to get adequate signal strength for reception.
The network planning consists of cost and
performance, decision on tower height,
planning tower location selection, link type,
antenna type, power transmission, and the
channel of operation.
• The MAC protocol is established on
(CSMA/CA) contention resolution. This
technology has some disadvantages for
outside long distance operation like
inefficiency, timeouts, and limited quality of
service for audio/video applications [13].
• The Network management includes
performance, fault diagnosis, and repair
[13].
• The Power saving phase contain the power
conservation settings [13].
Table 2.1 illustrates how the cost increases when the
tower height increased. In the beginning, cost
increases gradually with tower height increase in first
two values, but the cost increases rapidly when the
height increases from 21 meters to 45 meters.
Table 2.1: Cost growth with height [13]
Tower
Height
(m)
10 15 21 24 27 30 45
Cost
PKR
10000 15000 80000 95000 110000
18500
0
50000
00
2.13Security
Security is one of the key factors in WiFi technology.
Wi-Fi devices only support security mechanism
recommended by IEEE 802.11 standards. The IEEE
802.11 standard
(802.11b/802.11i/WPA/WPA2)describes the
following factors.
1. basic access control
2. authentication of station
3. confidentiality and
4. integrity of data
The relationship among WLAN standard and their
strength are listed in table 2.2 below:
Table 2.2: List of WLAN standards [4]
Standard Scope
Wired Industry Forum
2.4 GHz frequency hopping
spread spectrum
IEEE 802.11b
Define inter-operability
Between infrared, and
DSSS
Home Radio Frequency
Working Group
SWAP for wireless
networking within a home
Bluetooth Consortium
Short-range radio links
using 2.4 GHz FHSS.
2.14IEEE 802.11 Family and Its Derivative
Standards
Here this paper just mentions the name and version of
IEEE 802.11 standards are following;
IEEE 802.11e, IEEE 802.11d, IEEE 802.11f, IEEE
802.11h, IEEE 802.11i, IEEE 802.11x, IEEE
802.11k, IEEE 802.11j, IEEE 802.11p, IEEE
802.11u, IEEE 802.11v, IEEE 802.11r, IEEE
802.11s, IEEE 802.11w, IEEE 802.11t, IEEE
802.11n,
The relationships of different 802.11 derivative
standards with frequency are explained in table 2.3 in
detail.
Table 2.3: 802.11 standards [15]
802.11
Task
group
Purpose Band Status Notes
802.11 Wireless
LAN
4 GHz Approved
1997
Updated
1999
Describe the
MAC and
PHY for
Wireless
LANs
802.11a Develop a
PHY in
the 5
GHZ band
5 GHz Approved
1999
Describes a
high speed
PHY using the
5GHZ band .
Uses OFDM
data rates up
to 54 MBPS
802.11 b Develop a
faster
PHY (that
802.11) in
the 2.4
GHZ band
2.4
GHz
Approved
1999
Defines a high
speed PHY
using the 2.4
GHZ band.
Uses CCK
with DSSS.
Data rates up
to 11 MBPS
802.11c Develop a
MAC
bridging
functional
ity for
802.11
N/A Folded
into 802.1
D standard
for MAC
bridging
802.11d Determine N/A Ongoing*
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 9, September 2016
167 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
4. the
requireme
nts
necessary
for 802.11
to operate
in other
regulatory
domains
(countries
)
802.11e Provide
Qos and
classes
and
services
N/A Ongoing* Uses
distributed
coordination
function
(DCF) and
point
coordination
function (PCF)
802.11f Multivend
or access
point
N/A Ongoing * This involves
recommended
inter-
operabilit
y by use
of an
IAPP
practices
above the
MAC layer
802.11g Develop a
faster
PHY
(than
802.11b)
in 2.4
GHZ band
2.4
GHz
Draft
standard
2001
22 MBPS is
possible by
using PCBB-
22
Alternatively
OFDM can be
used for upto
54 MBPS
802.11h Enhance
the MAC
and
802.11a
PHY with
spectrum
and power
managem
ent in the
5GHZ
band
5 GHz Ongoing* Objective is to
obtain
Europeon
regulatory
approval
802.11i Security
enhancem
ents to
WEP
N/A Ongoing* Uses TKIP
802.11j Make
802.11a
and
HyperLA
N
interopera
ble
5GHZ Discontinu
ed
IEEE 802.11n standard has highest data rate of 300
Mbps as compared with other standards.
3. RESEARCH APPROACH
In section 2, we have done a detail but specific
review on WiFi technology and its comparison with
other technologies. Related information from all
technology and standards have collected from online
websites, electronic books, conference papers,
conference proceedings, online articles and journals,
other internet sources and library books.
We encountered some hurdles during finding of
specific information, for example, frequency,
upstream and downstream speed because we have to
construct some particular tables and comparisons of
different technologies i.e. 3G, 4G, 5G, LTE, and
WiMax with WiFi. At the end of all information
collected from above stated sources, we present it in
form of tables.
The review study did not consider and analyze
technologies rather than wireless technology.
Technologies like Bluetooth, Radio frequency
identification and Near Field Communication are not
considered as the state of the art for this paper.
4. LITERATURE SURVEY
This paper discusses a survey regarding WiFi
technologies. Figure 2.1 illustrate the block diagram
of literature survey.
Figure 2.1: Block diagram of literature survey
In above figure 3.1, we used 25 internet sources, and
4 library books to search information as if we studied
IEEE 802.11 Family and standard and OSI model
information from library books. Others valuable
information, for example, security, merits and de-
merits, total coverage and comparison between
different technologies are gathered from internet
sources.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 9, September 2016
168 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
5. In this research work, first and for most, we did a
literature survey regarding WiFi and a detail
guidance of its usage. After that, we compared it with
other WiFi technologies. The detail studies regarding
different WiFi technologies already done by different
authors in a fruitful way.
The results of some of the frequent analysis (study)
were summarized. The study contains four divergent
regions as below:
• security,
• comparisons,
• cost,
• implementation,
All are discuss in detail.
At the end, just for remembrance, the different
comparisons between Wireless and others
technologies have presented in numerous aspects.
5. RESULTS
Before going to result directly, first, this section
discusses Wi-Fi, 3G and LTE technologies in detail
with respect to their technical stuffs. Section 4.1
explains the comparisons among WiFi and 3G, 4G
and LTE technologies.
5.1. Assessments among WiFi, 3G, 4G, and LTE
Technology
We will compare WiFi technology with each wireless
technology systematically.
5.1.1 A Close Assessments of Wi-Fi with 3G
Table 5.1 illustrates a close assessment or
comparison between Wi-Fi and 3G technologies with
respect to coverage, up-stream and down-stream
speeds, range, scalability, and spectral efficiency.
If we examine table 5.1, it clearly depicts that Wi-Fi
technology outperforms 3G technology in case of
down-stream speed. Furthermore, with respect to
speed, Wi-Fi also offers good results. It also examine
that WiFi is good enough with low cost indoor
coverage.
From the facts, it is concluded that Wi-Fi and 3G
technologies can be reflected as a corresponding
technologies. However, in many cases, we have to
choose one over the other for either budget aspects or
technological limitations. Below table, 5.1 is a close
assessment of those comparisons.
Table 4.1.1: A close assessment of Wi-Fi and 3G
technology
Technology/Factors WiFi 3G
Range Approx. 100m Approx. 80Km
Covered Area Just Indoor In different
cities
Down-stream speed 350 & 50 MHz
bandwidth
Or
700 & 50 MHz
bandwidth
1 Mbit/s
Up-stream speed 400kbit/s
Scalability Constant: 20 MHz Traffic growth
Signal traffic is
possible.
5.1.2 A Close Assessments of Wi-Fi with 4G
Wi-Fi and 4G technologies normally used in
handholds items as smart phones or tablets etc and
are somewhat different in terms what they offer
technically. In Wi-Fi technology, the signal emanates
to the cell from a wireless router or modem. This
signal has limited range usually up to 150 feet.
Contrary, in case of 4G, you can access the internet
from a cell phone tower somewhere in the locality
having a usual speed between 6 to 15 Megabytes per
second.
In below table 5.2, an illustration of a close
assessment/comparison between Wi-Fi and 4G
technologies in terms of coverage, range, up-stream
and down-stream speeds, and scalability are
presented. Information according to the table shows
that Wi-Fi technology outclasses 4G technology in
term of down-stream and up-stream speed. However,
it offers less speed in indoor deployment. WiFi
technology also delivers a higher tethering speed as
compared to 4G technology.
Table 5.2: A close assessment of Wi-Fi and 4G
technology
Technology/Factors WiFi 4G
Range Approx. 100m Approx. 100Km
Covered Area Just Indoor
In different
states around 50
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 9, September 2016
169 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
6. Down-stream speed
350 & 20 MHz
bandwidth
Or
600 & 40 MHz
bandwidth
Approx. 28
Mbit/s
Up-stream speed
Approx. 22
Mbit/s
Scalability
Constant 20
MHz channel
Climbable with
Internet,
constant voice
and other
services
5.1.3 A Close Assessment of Wi-Fi with LTE
Wi-Fi and LTE access points are worthy choices
accessible for users and customers when they are
considering data capacity expansion. LTE technology
needs fewer cells to attain meaningfully best output
than Wi-Fi access points regarding support, quality of
service, security, and self-organization [14]. In below
table 5.3, an illustration of a Wi-Fi technology down-
stream speed is approximately the same as compared
to LTE technology, however, the Wi-Fi technology is
limited to indoor use only. Furthermore, the result
shows that LTE has good up-stream speed and
spectral as compared with WiFi.
Table 5.3: A close assessment of Wi-Fi and LTE
technology
Technology/Factors WiFi LTE
Range 100m Cell range
100Km
Coverage Indoor Indoor, Outdoor
Down-stream speed 300 & 20 MHz
bandwidth
Or
600 & 40 MHz
bandwidth
Approx. 300
Mbps
Up-stream speed Approx. 75
Mbps
Scalability Constant 20
MHz channel
Facilitates career
bandwidth from
1.4 MHz to
20MHz
5.1.4. A Close Assessment of Wi-Fi with WiMax
The WiMax technology can assist the customer from
a distance of 50 Km from base station while Wi-Fi
technology has an Access Point range of around 100
meters. Secondly, WiMax technology is best for the
outdoor area while Wi-Fi technology best for indoor
position. Thirdly, WiMax technology is usually
design to deliver a metro area broadband wireless
access, however, Wi- Fi technology is a local
network technology structured to add mobility to
private LANs [15].
Figure 5.1: Close assessment of Wi-Fi and WiMax
technology
In the figure 5.1, we can clearly understand the
coverage of Wi-Fi technology with WiMax
technology. Here in the stated figure, it is noticeable
that the WiMax technology offers maximum
coverage as compared to Bluetooth.
Below table 5.4 is an illustration of a comparison
between Wi-Fi technology and WiMax technology
regarding coverage, range, up-stream and down-
stream speeds, and scalability. From table
information, we see that Wi-Fi technology is not
scalable as compared to WiMax technology and
provides less speed in indoor location.
Table 5.4: A close assessment of Wi-Fi andWiMax
technology
Technology/Factors WiFi WiMax
Range Approx. 100m Approx. 50KM
Coverage Just Indoor Just Indoor
Down-stream speed 300 & 20 MHz
bandwidth
or
600 & 40 MHz
bandwidth
Approx. 365
Mbps
Up-stream speed Approx. 376
Mbps
Scalability Constant 20
MHz channel
Network
expansion, cell
splitting,
polarization
modification, and
frequency reuse is
possible.
5.2. Costs analysis
The below points are the summary on prices, power,
and sensitivity;
• If the price of Access Point is lower, then
the receive sensitivity will usually be lower.
• Similarly, if the price of Access Point is
high, then the receive sensitivity will be high
and can reach up to 100 dBm level.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 9, September 2016
170 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
7. • If the Access Point is expensive then it
means that it has higher transmission and
better receiving sensitivity.
• If WiFi adopter is external, it means that it
has less capacity than their counterparts with
respect to power and sensitivity.
Consumer equipment in a commercial work will
result in greater cost as:
• It cannot cover large area that is why the
Access Point needs the installation of extra
units.
• It is not required to obey with different
specifications.
It is clearly noted that if we use commercial Wi-Fi
network using consumer equipment, it is high costly
as compared to commercial grade equipment [16].
The WiFi technology is adoptable and inexpensive as
compared to Ethernet wired networking as it is
simple and effective. Ethernet wired networking is
quite hard, expensive, time consuming and difficult
to drill in concrete walls for cable.
The approximate cost of consumer WiFi is about 1,
45,000 Pakistani Rupees only for one Access Point
excluding radio and installation units. Below table
5.5 shows the detail.
Table 5.5: Illustrates cost and installation details of
consumer and commercial units [16]
No. of
Access
Points
Cost
per
Access
Point
Total
Access
Point
cost
Installa
tion
cost
TOTAL
COST
Consumer
grade
equipment
3 Approx
. PRK-
9500
Approx
. PKR-
50000
Approx
. PKR-
500000
Approx.
PKR-
555000
Commerci
al grade
equipment
7 Approx
. PKR-
50000
Approx
. PKR-
150000
Approx
. PKR-
250000
Approx.
PRK-
500000
6. DISCUSSION
The state of the art Wi-Fi technology is commonly
used in Wi-Fi enabled handhold devices, for
example, smart phones, Notebooks, Desktop PCs,
Routers, Printers, and Cameras etc. The craze of
mobility i.e. access to internet makes electronics
manufacturers to equip their product with WiFi
technology. In the coming five to 10 years, we can
predict the increase in number of WiFi allowed
devices from over 500 million in 2009, to 1.9 billion
in 2020.
Now days smart phones, gaming players, smart
digital TVs and e-readers are implementing WiFi
technology. The WiFi standard 802.11n supported
devices have amplified WiFi capabilities,
undertaking many technical matters. We are
expecting the WiFi technology in video devices in
near future and in living rooms, which makes them
into digital rooms with all facilities of gaming
consoles and blueray player etc.
In 2016, the WiFi enabled devices will increase up to
300 million. WiFi supported smart phones are also
widely used and the WiFi enabled mobile phones
consignments are projected to exceed ½ of a billion
units while the WiFi involved e-readers will increase
from 3% in 2009 to 89% by 2014[18]. There are
many merits and demerits of the IEEE 802.11 Wi-Fi
technology. Below are the following merits of WiFi
technology.
• Compact costs of network connection and
expansion
• Support roaming and encryption that is
essential to protect traffic from third party
access.
•
Demerits of WiFi technology are:
• Inconsistent
• Un-licensed use of radio spectrum
• Power consumption
• Quality decreased if other devices like
Bluetooth radio or microwave etc present.
• Result in a lower transmission rate.
• WiFi networks are insecure even WEP
configured correctly.
• Create problem in crowed area when many
residents have WiFi Access Points.
In next coming years, the speed of Wi-Fi Access
Point will be up to 1Gbps. The multi-stream devices
will start with three-stream radios. The three streams
in Apple's base stations need 3X3, three-stream
adapters to reach higher speeds.
Moreover, all 3.5G, and 4G cellular wireless
standards are added with MIMO to covered wide area
and for best performance [17].
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 9, September 2016
171 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
8. Table 6.1: A close assessment of 5G WiFi and 802.11n
Technology/Factors 802.11n 5G
Data Rate 300 Mbps 3.6 Gbps
Coverage Normally in
Rooms
Full Home
Band 2.4 GHz
5.15-5.90 GHz
5.15-5.9
GHz
Works with current
infrastructure
Yes Yes
Use Case Data and
Compressed
Video
Video
6.1 Power management and Power Saving Modes
It is an IEEE 802.11 standard usually depends on the
infrastructure mode or ad-hoc mode. The role of this
mechanism is to switch off the transmitter and
receiver to reduce its power consumption. It has
mainly two modes for power saving as below:
• Standard power save mode
• Automatic power save delivery mode
The details explanations of these modes are as below:
6.1.1 Standard Power Saving Mode
The IEEE 802.11 standard power saving mode has
two types of operations:
• Access Point operation
• Station operation
In Access Point operation, first point is that the
power management is central and secondly the data
frames are buffered at that Access Point which is to
be transmitted to the associated stations and these
stations are already in the power save mode [18].
In station operation mode, a station in the power
save mode wakes up only when ‘n’ is an integer and
that is greater than 1.
6.1.2 Automatic Power Saving Supply
Automatic Power Saving Supply (APSS) or
Automatic Power Save Delivery (APSD) is
incorporated in the 802.11e as an optional extension
for the previously defined 802.11 Power Save Mode.
The difference between Automatic Power Save
Delivery and Standard Power Save Mode is that in
APSD, the station is awake during a Service Period.
7. CONCLUSION
This paper contains a closed assessment and
compared the performance of Wi-Fi standards (IEEE
802.11) for industrial environments and compared it
with mobile phone radio systems standards (3G, 4G
and LTE/5G). Furthermore, the basic principles of
IEEE 802.11 family and derivatives have been
discussed in detail in this report.
Wi-Fi technology is an inexpensive technology with
respect to others wired or wireless technology and it
covers the consumer requirement according to market
interest. For example, in commercial use like in
hotels, hotspots, and cyber cafes, 802.11n seems to
be a good option for the future because it specifies 5
GHz frequency at a theoretical maximum speed of
300 Mbps, gives Multiple input Multiple output
(MIMO), channel bonding, and payload optimization
technology.
WiFi technology also offers uniform bandwidth over
distances and covers roughly 1.5 times more distance
than the earlier standards. Our finding in this
dissertation also shows that IEEE 802.11 is an
inexpensive technology with respect to other
technologies in market [19]. However, the energy
consumption of in Wi-Fi technology is one of its
demerits and has a meaningful effect on the battery of
smart phones. The reason behind that is that both Wi-
Fi access points and Wi-Fi smartphones are
implemented with a variety of Wi-Fi power saving
approaches for saving power.
After all, we concluded that based on our analysis
and assumptions, all gathered information, analysis,
calculation, observations and results there is a
possibility to offer seamless Wi-Fi internet services
to the consumers in the hotels, buildings, public
places, cafes, hotspots and other public areas with
affordable, reasonable performance, reliability and
costs.
REFERENCES
[1] TechTerms.com, “WiFi”,
(2012).[Online].Available:
http://www.techterms.com/definition/wifi
[2] Wikipedia, the free encyclopedia.
“WiFi”,2012.[Online].Available:
http://en.wikipedia.org/wiki/Wi-Fi
[3] Bhaskaran, R. andKameswari, C.,“Experiences
with WiFi for Rural Internet in India”,
(2007).[Online]:Available:http://www.google.com/ur
l?sa=t&rct=j&q=&esrc=s&frm=1&source=web&cd=
4&sqi=2&ved=0CD4QFjAD&url=http%3A%2F%2F
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 9, September 2016
172 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
9. cse.iitk.ac.in%2Fusers%2Fbraman%2Fpapers%2F20
07-exp-dgp.pdf&ei=uHApT63WIozR4QSP-
oSnAw&usg=AFQjCNEijqz_uvrUGeNW0kfgT-
1CSgeY_A
[4] Vijay, K. G.,“Wireless network evolution 2G to
3G, Wireless network evolution 2G to 3G”, 2002.
[5] Wikipedia, the free encyclopedia, “Hotspot (Wi-
Fi),2012.[Online].Available:
http://en.wikipedia.org/wiki/Hotspot_%28Wi-Fi%29
[6] Ahmedur R., Ezeife, C. I., Aggarwal, A. K.,
Abdel-Majid, M., Brunel, L., Okazaki, A. and Salim,
U. “LTE Artichecture”, Mitsubishi Electric-
Information Technology Centre Europe, 2010.
[7] Qizheng, G.,“Wireless Local Area Network
(WLAN)”, RF System Design of Transceivers for
Wireless Communication.2004.
[8] Digital Consulting, Inc.,“3G History and
Background”,(2012).
[Online].Available:http://www.dciexpo.com/3g/3g-
history-and-background.php
[9] Wikipedia, the free encyclopedia.
3G.[Online].Available:(2012).http://en.wikipedia.org/
wiki/3g#History
[10] Wikipedia, the free encyclopedia, 4G.
2012.[Online].Available:
http://en.wikipedia.org/wiki/4G
[11] dBrn Associates, “A comparison of technologies,
market, and business plan”2004.[Online].Available:
ttp://media.techtarget.com/searchMobileComputing/d
ownloads/Finneran.pdf
[12] Nokia,“LTE - Delivering the optimal upgrade
path for 3G networks”,
2007.[Online].Available:http://www.nokia.com/NOK
IA_COM_1/Press/Press_Events/Nokia_Technology_
Media_Briefing/LTE_Press_Backgrounder.pdf
[13] Excitingip.com,“What is IEEE 802.11n, what
are the advantages and challenges for 802.11n in Wi-
Fi networks”, 2010.[Online].Available:
http://www.excitingip.com/186/what-is-ieee-80211n-
what-are-the-advantages-and-challenges-for-80211n-
in-wi-fi-networks/ 47
[14] QUALCOMM Incorporated,“A Comparison of
LTE Advanced HetNets and Wi-F”, 2011.
[Online].Available:
http://www.qualcomm.com/search?query=LTE+WiFi
+Comparison
[15] Hewlett-Packard Development Company, “Wi-
Fi and Bluetooth”, Interference Issues, 2002.
[Online].Available:
www.hp.com/rnd/library/pdf/WiFi_Bluetooth_coexis
tance.pdf
[16] Bradwell, J.,“WiFi Radio Characteristics and
Cost of WLAN Implementation”, 2005.
[Online].Available:
http://www.connect802.com/download/techpubs/200
5/commercial_radios_E0523-15.pdf
[17] Fleishman, G.,“The future of WiFi: gigabit
speeds and beyond”,
2009.[Online].Available:http://arstechnica.com/busin
ess/guides/2009/12/wifi-looks-to-1-gigabit-
horizon.ars
[18] Instat.,“Wi-Fi Market Overview: Connectivity
Becoming
Ubiquitous?”,2012.[Online].Available:http://www.in
stat.com/promos/10/IN1005038WHT.pdf
[19] Wexler, J.,“802.11n price wars already
underway”, 2009.
[Online].Available:
http://www.networkworld.com/newsletters/2009/101
209wireless2.html
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 9, September 2016
173 https://sites.google.com/site/ijcsis/
ISSN 1947-5500