Wireless Network Technologies And Standards For Cyber Physical Systems And Internet Of Things

Comparison Between Technologies

Discuss about the Wireless Network and Security for Satellite Communication.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The wireless network is the type of network that enables various devices in staying connected with the network; however roam un tethered with other wires [8]. The access points eventually amplify the signals of wireless fidelity for the reason that the device could be kept extremely far from the router and still lined with the network. The benefit of this wireless network mainly includes being absolutely convenient, i.e. it can access the resources of the network from all locations within the coverage area of the wireless network or even from any Wi-Fi connected region. Moreover, this type of network provides high productivity and easy collaboration [1]. Due to these above mentioned advantages or benefits, wireless networks are taken by various organizations or individuals. There are several technologies of this wireless communication network.

The following report will be outlining a brief discussion on wireless network and all its technologies or applications. This report will be substantially focusing on the three important types of wireless communication technologies and thus providing a detailed comparison between them. Moreover, there are various standards of wireless communication and they would be evaluated on the basis of Internet of Things and CPS or cyber physical systems. Furthermore, the best network would be selected on the basis of its performance.

The comparison between satellite communication technology, wireless fidelity and Worldwide Interoperability for Microwave Access is as follows:

Main Factors

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Satellite communication Technology

Wireless Fidelity

Worldwide Interoperability for Microwave Access

i) Communication Spectrum

Communication spectrum refers to the bandwidth spectrum. There are various communication spectra in several networking devices [13]. The six bands of satellite communication are Ka band, Ku band, X band, C band, S band and L band. The respective spectra are 26 to 40 GHz, 12 to 18 GHz, 8 to 12 GHz, 4 to 8 GHz, 2 to 4 GHz and 1 to 2 GHz. The most used band amongst these is Ku band.

The communication spectrum of Wi-Fi or wireless fidelity is separate in various locations in all over the world. There are several protocols present in the wide domain of IEEE 802.11. Each and every protocol has its respective frequency band. The frequency band for IEEE 802.11a is 5 GHz, the frequency band for IEEE 802.11b is 2.4 GHz, the frequency band for IEEE 802.11g is 2.4 GHz, the frequency band for IEEE 802.11n is 5 GHz, the frequency band for IEEE 802.11ac is 6 GHz, the frequency band for IEEE 802.11ad is up to 60 GHz, the frequency band for IEEE 802.11af is below 1 GHz and the frequency band for IEEE 802.11ah is 700 MHz.

The communication spectrum of WiMax is separate in various locations in all over the world. Two protocols are utilized. They are IEEE 802.16d and IEEE 802.16e. For IEEE 802.16d, the most utilized frequencies are 3.5 GHZ and 5.8 GHz. For IEEE 802.16e, the most utilized frequencies are 2.3 GHz, 2.5 GHz and 3.5 GHz [1].

ii) Modulation Techniques

There are three techniques for modulation in satellite. They are orthogonal quadrature phase shift keying or OQPSK, quadrature phase shift keying or QPSK and binary phase shift keying or BPSK [3].

There are two distinct techniques for modulation in wireless fidelity. They are Quadrature Phase Shift Keying or QPSK and complementary coded keying or CCK.

There are four distinct techniques for modulation in WiMax. They are 64 QAM or 64 quadrature amplitude modulation, 16 QAM or 16 quadrature amplitude modulation, QPSK or quadrature phase shift keying and BPSK or binary phase shift keying [11].

iii) Medium Access Control Mechanism

The MAC protocols of satellite technology are frequency division multiple access or FDMA and time division multiple access or TDMA

The MAC of Wi-Fi is completely on the basis of IEEE 802.11 specifications.

The MAC protocols of WiMax are utilized for fulfilling all the connections of point-to-multipoint orientation [6].

iv) Network Technologies

Switched topology, point to point topology and hybrid topology.

Black-haul topology and mesh topology.

AP based topology, point-to-multipoint bridge topology.

The wireless communication standards refer to those types of standards that support the varying levels for communication and thus helping the user. There are various types of wireless communication standards that are widely accepted by the users and also provide necessary range of balance, throughput of network and mobility to devices [9]. The enhancement of these standards is extremely important for the network. The wireless sensors that are connected by IoT are centralized for the designing of CPS. Thus, the security is extremely high with this integration.

The significant evaluation of various wireless communication standards for the cyber physical systems ad Internet of Things are given below:

  1. i) UHF RFID and NFC: The ultra high frequency RFID is the newest form for RFID where the frequency is extremely high [12]. In the Internet of Things, the data acquisition is checked to meet each and every requirement. The perception layer of the Internet of Things requires practical requirements to be fulfilled and as consumption of power is very low in UHF RFID, it is capable of doing so. In case of cyber physical systems, the computational entities are easily combined with the physical systems [5]. The RFID of ultra high frequency is a basic form of cyber physical systems since the storage functions and controlling elements are present within it.

NFC or simply the Near Field Communication is a collection of protocols that are utilized for communication and hence enabling a secured connection between the two. The restriction is that presence of smart phone is required here. The most significant advantages of the i0ntegration of Near Field Communication and Internet of Things mainly involve energy saving, higher security, convenience and many other. The medical field gets a huge benefit from this integration [3]. In case of cyber physical systems, NFC is responsible for stopping the eavesdropping and relay attacks on the computer devices.

  1. ii) ZigBee and Z-Wave: Personal area network is accessed with the ZigBee protocol of IEEE 802.15. The expenses are very less in comparison to others. For the Internet of Things or IoT, the protocol of ZigBee is integrated via ZigBee gateways [4]. It provides security and safety with proper stability to the protocol. In case of cyber physical systems, ZigBee provides highest possible level of security to the systems. Moreover, the lowest power microcontroller is used here, which is CC2530. Thus, the power consumption will also be low.

Wireless Communication Standards

Z-Wave is the next type of standard in wireless communication. The network that is present within this network is mesh and thus connections are possible in all aspects. The radio waves that are utilized here are of extremely lower energy and thus the energy consumption is also low. Z-Wave powers the IoT or Internet of Things [10]. The devices that provide smart lighting of the Internet of Things is the type of mesh network that allows communicate even from 100 feet distance. For the CPS, Z-Wave is utilized in domains such automated vehicles and robotics.

Bluetooth and Bluetooth Low Energy: Bluetooth is the most easy way to transfer any type of data such as images, videos and audios. The only restriction in this type of technology is that it cannot cover huge distances [2]. The data transfer can only occur in short distances. In the IoT, the main strong point of this technology is the easy communication and for cyber physical devices, the technology of Bluetooth is linked with all the systems for providing various easy modes of communication.

Bluetooth Low Energy or Bluetooth 4.0 is the next standard of wireless communication. In the Internet of things, this type of connectivity is responsible for alerting the systems of house and hence the crimes are reduced [7]. Several other applications are also involved with this technology. In case of CPS, the Bluetooth low energy communicates amongst the master computer systems and slave microcontrollers.

  1. iv) Cellular Systems: Cellular systems refer to the cell phones or networks that the cell phone utilize for communication [14]. In the Internet of Things, the cellular systems are called CIoT or Cellular Internet of Things. Three important and significant technologies are present in the Cellular Internet of Things. They are EC GSM IoT, NB IoT and finally LTE M. Each and every technology is extremely effective and efficient and hence the radio access is easier. In case of cyber physical systems, the cellular systems are termed as cell phones or mobile cyber physical systems [1]. They are used for providing several communication radios, computational resources, intelligent applications and many more.
  2. v) IEEE 802.11p: It is the amendment of protocol of IEEE 802.11 [7]. This particular protocol is extremely effective the moment it is enabled with Internet of Things. This protocol is used for supporting the communication in vehicles. Smart transportation is the usability in the cyber physical systems.
  3. vi) LPWAN: LPWAN or low power wide area network with the Internet of Things comprises of several players such as Ingenu, Sigfox and Weightless SIG. They are extremely cost effective and efficient [13]. For the Cyber physical systems, LPWAN is responsible for network connection with low power consumption and high distance.

After evaluating all the nine wireless networking standards for CPS and IoT, the suitable network is UHF RFID. It is extremely effective as the bandwidth is maximum and the range area is also high for this RFID. The range varies from 300 MHZ to 3 GHz. Hence, it is termed as the best of all.

Conclusion

Therefore, from the above discussion, it can be concluded that wireless networks are the new advancements in the networking world. It is the type of network that is being set up by utilizing the radio signal frequencies in order to communicate within the network devices and computer systems. This type of network is also referred to as the WLAN or Wireless fidelity network. The feature of ease in setting up of the network makes the wireless network extremely popular and well acceptable by all. Moreover, since no cables are involved in this network, the overall expenses are reduced to a great extent and thus all the problems and complexities with the wires are removed with this type of network. Moreover, the computers and the systems are easily connected with the wireless networking and also in a cost effective way. The security of this type of network is also high and there is almost chance of security issues in wireless networking. The protections to this security are not required here; however, they do possess this type of security within the networks. The above report has highlighted the topic of wireless networking with relevant details. A comparison has been done on various technologies and standards have been evaluated. Finally the best network has been selected.

References

[1] Burg, Andreas, Anupam Chattopadhyay, and Kwok-Yan Lam. “Wireless Communication and Security Issues for Cyber–Physical Systems and the Internet-of-Things.” Proceedings of the IEEE 106, no. 1 (2018): 38-60.

[2] Andrews, Jeffrey G., Xinchen Zhang, Gregory D. Durgin, and Abhishek K. Gupta. “Are we approaching the fundamental limits of wireless network densification?.” IEEE Communications Magazine 54, no. 10 (2016): 184-190.

[3] Dey, Kakan Chandra, Anjan Rayamajhi, Mashrur Chowdhury, Parth Bhavsar, and James Martin. “Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network–Performance evaluation.” Transportation Research Part C: Emerging Technologies 68 (2016): 168-184.

[4] Xiao, Yang, ed. Security in sensor networks. CRC Press, 2016.

[5] Pathan, Al-Sakib Khan, ed. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press, 2016.

[6] Zhou, Xiangyun, Yan Zhang, and Lingyang Song. Physical layer security in wireless communications. Crc Press, 2016.

[7] Zhao, Nan, F. Richard Yu, Ming Li, Qiao Yan, and Victor CM Leung. “Physical layer security issues in interference-alignment-based wireless networks.” IEEE Communications Magazine 54, no. 8 (2016): 162-168.

[8] Chen, Yuang, and Thomas Kunz. “Performance evaluation of IoT protocols under a constrained wireless access network.” In Selected Topics in Mobile & Wireless Networking (MoWNeT), 2016 International Conference on, pp. 1-7. IEEE, 2016.

[9] Shin, Seungwon, Lei Xu, Sungmin Hong, and Guofei Gu. “Enhancing network security through software defined networking (SDN).” In Computer Communication and Networks (ICCCN), 2016 25th International Conference on, pp. 1-9. IEEE, 2016.

[10] Liyanage, Madhusanka, Ahmed Bux Abro, Mika Ylianttila, and Andrei Gurtov. “Opportunities and challenges of software-defined mobile networks in network security.” IEEE Security & Privacy 14, no. 4 (2016): 34-44.

[11] Mahgoub, Imad, and Mohammad Ilyas. Sensor network protocols. CRC press, 2016.

[12] Sarkar, Subir Kumar, T. G. Basavaraju, and C. Puttamadappa. Ad hoc mobile wireless networks: principles, protocols, and applications. CRC Press, 2016. He, Debiao, Sherali Zeadally, Neeraj Kumar, and Jong-Hyouk Lee. “Anonymous authentication for wireless body area networks with provable security.” IEEE Systems Journal 11, no. 4 (2017): 2590-2601.

[13] He, Debiao, Sherali Zeadally, Neeraj Kumar, and Jong-Hyouk Lee. “Anonymous authentication for wireless body area networks with provable security.” IEEE Systems Journal 11, no. 4 (2017): 2590-2601.

[14] Makimoto, Mitsuo, and Sadahiko Yamashita. Microwave resonators and filters for wireless communication: theory, design and application. Vol. 4. Springer Science & Business Media, 2013.