Wireless Networks for Enterprises

Significance of Wireless Network to Enterprises

Technological advancement has resulted in the creation of numerous modes of communication. One most significant medium of communication is a wireless network. Agrawal, Chari, and Sankar (2003) claim, “A wireless network refers to a system of communication that uses radio waves to connect devices such as laptops to the internet and the business network and its applications” (p. 169). Communication is paramount to enterprises. It enables them to connect with customers, understand their needs and exploit them. The wireless network facilitates communication between businesspeople and clients. Agrawal et al. (2003) hold that wireless network has numerous qualities that can benefit enterprises. They include location flexibility, accessibility, and mobile connectivity. This essay will discuss these conditions and how they help businesses.

According to Harrison, Mykytyn, and Riemenschneider (2008), a wireless network can operate at any location. A wireless gadget can “connect at any location as long as it is within the range of a network” (Harrison et al., 2008, p. 177). In other words, it is convenient for businesses. As a firm grows, the management may be forced to reorganize the offices or workstations. In such a case, the company would not be compelled to make adjustments to the wireless network. Physical reorganization of the workplace would not interfere with connectivity. Employees would like to access information regarding an enterprise. The wireless network enables customers to use their gadgets to access information about the business at any location within its premises. For instance, they can connect to the enterprise’s network while waiting at reception.

Lu, Yu, Liu, and Yao (2009) claim that wireless network works in areas that are not apposite or hard to wire. In an industrial environment, it may be difficult to use a wired network to connect all the offices. Additionally, a wired network may be prone to damage. In such a case, an industry may opt to use a wireless network. The system is not prone to damage as it does not use wires. On the other hand, some businesses require changing their configuration frequently. For instance, the arrangements of entertainment venues and workshops are regularly altered. Such places would need wireless networks. They would not have to change the systems whenever there are adjustments in their configurations.

At times, employees may receive or share information as they move around the business premises. Lu et al. (2009) claim that wireless network supports mobile connectivity. As a result, “employees can easily access, change and send information regarding the orders being received or dispatched as they move about delivery vehicles” (Varshney, 2008, p. 159). They do not require going back to the office to make the necessary changes. Indeed, the wireless network enables businesses to maximize the available time. A wireless network can facilitate communication between employees and customers as they travel. For instance, an employee can receive a critical mail on his/her way to a meeting and act on it immediately without having to delay or postpone the summit.

In conclusion, the wireless network has proved to be an important instrument to modern businesses. Without the network, it would be difficult for enterprises to liaise not only with customers but also suppliers. The flexibility of the wireless network enables clients and employees to access information regarding a business at any location within its premises. The wireless network works well in places that require regular adjustments of their physical arrangement. A change in the configuration of an enterprise would not interfere with the system. The wireless network facilitates mobile connectivity. Thus, employees can communicate with their colleagues or customers while traveling.

References

Agrawal, M., Chari, K., & Sankar, R. (2003). Demystifying wireless technologies: Navigating through the wireless technology maze. Communications of the AIS, 12(1), 166-182.

Harrison, D., Mykytyn, P., & Riemenschneider, C. (2008). Executive decisions about adoption of information technology in small business: Theory and empirical tests. Information Systems Research, 8(2), 171-195.

Lu, J., Yu, C., Liu, C., & Yao, J. (2009). Technology acceptance model for wireless internet. Internet Research: Electronic Networking Applications and Policy, 13(3), 206-222.

Varshney, U. (2008). Mobile and wireless information systems: Applications, networks, and research problems. Communications of the AIS, 12(2), 155-166.

The Effects of Wireless Frequency on Health

Introduction

There is an intense competition in the telecommunication industry in UAE (Bhattu, 2009). The taxes from this market make a huge income generator for the country. Similarly, the auction of the airwaves is a million dollar industry for the nation and international promotion firms. Wireless infrastructures have become very familiar in today’s environment. Wireless dependent hotspots are very popular in public spaces, schools, and homesteads. The devices use low- power-driven RF transmitters to interconnect with other communication devices. In spite of the very low power utilized by these technologies, several people are weary of the possibility that RF could have an impact on their health. The article below seeks to shed more light on the effects of wireless frequency on health.

Exposure to wireless frequencies has been related to many argumentative health consequences, which may result in vital public health concerns. The most severe health problems that have been linked to the use of RF are leukemia complications, juvenile and adult brain tumors, amyotrophic lateral sclerosis, and an augmented threat of the neurodegenerative ailments. It is also alleged that exposure to RF leads to increased possibility of developing breast cancer, a risk of contracting hemotoxic effects, and increased allergic and inflammatory reactions. Persons living in areas with high exposure to RF such as cell towers have a greater danger of developing insomnia. Some works of literature link developments of temporary effects on reasoning, recollection, learning, performance, reaction time, and responsiveness to wireless frequency.

The consequences of exposure to wireless frequencies are worth studying because there has been a public concern about their associated health risks. Previous studies have done little to document comprehensive effects of using the technologies. It is worrying to note that the media and the relevant authorities have been silent on health problems related to the topic. Presumably, the advertising revenues generated from this market segment have compromised media autonomy.

Through this, the media and the relevant government authorities have avoided discussing on health issues associated with the use of these technologies. Through this study, possible health problems related to the utilization of wireless devices will be identified. Similarly, the research will determine what the government and relevant authorities need to do to limit exposure to these emissions. The findings obtained from this study will be used in formulating and implementing better safety regulations with respect to the use of wireless technology in the future.

The research paper will attempt to identify the impacts of wireless frequency on the public health. In a bid to pinpoint the effects, the research paper attempts to answer several sub-questions, which explores the causes and impacts of RF Emissions from a contracted perspective. They narrow the broad question to determine the potential of impacts of these technologies. Below are the research questions:

  1. What are the sources of wireless emissions?
  2. What are the effects of wireless technologies on health?
  3. What are the problems with existing public health standards?
  4. What are the possible solutions to address the effects of the use of wireless technologies on health?

Literature review

What are sources of wireless radiation?

Lin asserts that there are numerous overlapping causes of wireless frequency in our environment (Lin, 2002). Sources of these frequencies are from either industrial bases or private gadgets such as mobile phones. Cell phones are considered the leading cause of wireless frequencies to which humans are exposed to daily. Mobile phones generate two forms of emissions. The first is the radio frequency radiation. Similarly, the second form is made when battery packs are substituted. The above form of emission results in the generation of augmented levels of the low-frequency electromagnetic field.

According to Lin, the public health concerns of developing RF infrastructure are enormous since there has been an increase in the national installation of wireless dependent devices in the last few decades (Lin, 2002). In the United Arab Emirates, commissioning of wireless technologies has hastened in the past few years. Currently, the country has thousands of cell sites last. More than 80% of the population in the EAU has mobile phones. Annual revenue for wireless was estimated at $144 billion during the year 2013 (Clements, 2013). In regards to the current 10% yearly development rate recorded by the wireless industry, it is expected that the sector will become a bigger segment of the UAE economy in the next few years.

Wireless frequency technologies used in radios and televisions play a significant function in access to information and communication. Police services, fire rescue services, and ambulance services rely on wireless frequency technologies. Public benefits of using wireless frequency are many. They include speedy communications in emergency circumstances, a capability to maintain contact with loved ones, and improved access to knowledge throughout all communal and financial lines. It is worth noting that many radio frequencies, RF, examinations done at frequencies beyond 1 MHz considered the consequences of severe exposure to increased levels of wireless frequencies. The uses of technology are continuously being identified.

Ziaran suggests that even if an insignificant threat to health from long-lasting exposure to RF technologies exists, there is a possibility for a weighty public health effect (Ziaran, 2013). He asserts that RF emissions have saturated the airspaces making the users and non-users defenseless against their exposure. According to Ziaran, the impacts are both short-term and long-term (Ziaran, 2013). He believes that there is reliable scientific proof that exposure to wireless technologies triggers variations in cell membrane functioning, absorption, and intercellular signal communication (Ziaran, 2013). Similarly, he indicates that exposure to these technologies may lead to the trigger of protooncogenes and stress proteins. The above proteins are triggered even at levels way below the standardized limits. He also suggests that reactive oxygen species are generated after a long period of exposure to RF (Ziaran, 2013). The above type of oxygen is harmful to DNA and chromosomes.

Malignant glioma

Li and Wang argue that current evidence suggests that exposure to RF causes malignant glioma cancer (Li & Wang, 2012). The most considerable proof for this cancer is that there are increased chances of developing malignant glioma in persons who have had contact with cell phones for more than ten years. The threat is high on the part of the skull on which the device is used frequently. They state that adults who have used the device for more than a decade have double chances of developing the disease (Li & Wang, 2012). Despite this, they illustrate that new studies have indicated that the risk is even higher when the user begins to use the device at a tender age. Similar studies show that the risk of developing parotid gland tumors is enhanced among persons who have been exposed to mobile phones for a long time.

The same investigations point out that the danger of developing acoustic neuroma is higher among individuals who have been exposed to mobile phone use for more than a decade (Li & Wang, 2012). Wang states that the above correlations have also been acknowledged in particular reports published by the World Health Organization.

Sleep, cognitive function, and performance

Wyld and Zizka assert that the relation of decent sleep to cognition and performance to health is well documented (Wyld & Zizka, 2012). They assert that sleep is an imperative part of proper healing, anti-inflammatory assistances, and reduction in physical signs. Imperfect or slowed biological recovery is expected when sleep is compromised. Circadian rhythms, which regularize the generation of stress hormones like cortisol, rely on harmonized sleep patterns. They indicate that persons who are severely exposed to low-level wireless antenna emissions exhibit insomnia, fatigue, headache, and lack of attentiveness. Other complications associated with exposure to RF are fatigue, memory hitches, tinnitus, and strain in multi-tasking. In youngsters, prolonged use of mobile phones leading to radiation exposure causes variations in oscillatory brain action when undertaking memory tasks.

Problems with existing public health standards (safety limits)

Wyld and Zizka believe that if the current public health regulations were sufficient not a single issue noted above could have been experienced (Wyld & Zizka, 2012). They suggest that because the effects are perceived from existing ambient intensities of exposure implies that our contemporary public safety standards are outdated (Wyld & Zizka, 2012). The above also imply that new and biologically founded civic exposure regulations for wireless based technologies are urgently required. Whether it is likely to attain low and sufficient levels, which are still applicable and safeguard the public health against impacts of severe RF exposure is indeterminate. They argue that the possibility of guarding the civilians and still permit the forms of contemporary wireless technology applications are unidentified.

Our research will utilize the above literature reviews to understand the challenges that have been associated with the use of wireless technologies. The reports will offer valuable insight about the current safety regulations aimed at lessening the exposure to RF technologies.

Research design and methodology

The study will be a mixed methods research employing both qualitative and quantitative approaches to data collection and data analysis. Besides, the research will use a case approach to determine the study population. The purpose of using a mixed-method methodology is to ensure that the proposed study will benefit from the advantages of using both qualitative and quantitative techniques. The approach will also reduce the effect of the disadvantage associated with using only one of the two forms.

Survey

  • Have you been affected by the use of RF related technologies?
    • Yes
    • No
  • Do you reside near a cell station?
    • Yes
    • No
  • Are you concerned that long-term use of cell phone might affect your health?
    • Yes
    • No
  • Are the government authorities doing enough to counteract increased exposure to wireless frequencies?
    • Yes
    • No
  • Should the laws required to safeguard the public against increased wireless frequency emission be enhanced?

Study population

The study seeks to examine the effects of wireless frequencies on public health. As such, government authorities, public health institutions, telecommunication firms, and the public will be our target populations. Samples will be taken from these populations. In this case, the researchers will have to obtain data from many telecommunication firms in the UAE. Similarly, reports on the health effects of wireless frequency will be received from a several governmental and international institutions. Such organizations include IEEE, ICNIRP, and WHO. The members of the public will also offer valuable insights into the effects of these technologies.

Specifics of the methods

Both interviews and surveys will be used in this study. Members of the public will be interviewed because they are the participants in the study. Surveys will be used to examine their concerns towards the effects of RF technologies. On the other hand, interviews will be done through questionnaires to investigate their attitudes and perspectives these concerns.

For this study, the data will be collected through field research. The method entails acquiring public data from secure and reliable governmental institutions, international agencies, face-to-face interviews, and questionnaires. Public health systems will provide the researchers with crucial information such as the present and the past health records. The sources are very efficient since they are bias free.

The face-to-face interview will require a participant to question participants in person to collect their personal views. During the meeting, the contributors will be asked to detail their penalties perspectives. The queries used during the interviews are open ended. Equally, questionnaires will be used to collect private information from the participants. Thus, this study will use a mixed method approach. For statistical data, SPSS will be used to develop statistical analysis techniques such as regressions and correlations.

Findings and analysis

There are two parts of the result. The first one is about analyzing the reports from the institution sampled. The second one entailed an assessment of the interview and questionnaire.

Type of Study Exposure Results
Population cohort was conducted in Dubai adult and childhood cancer incidences. Residential: 2 km and ten bands of increasing distance to 10 km around Dubai TV and FM radio transmitters. Adult: O/E leukemia in 2 km = 1.82 (23 cases observed) (CI = 1.22-2.75). Skin melanoma and bladder noteworthy trend but not significantly different O/E all other cancers not statistically significant. Child: O/E malignancy within 10 km = 0.92 (97 cases observed) O/E leukemia within 10 km 1.14; not significantly diverse
Population cohort was conducted in Abu Dhabi childhood cancer incidences. Residential; distance to microwave tower No extremes seen in leukemia, brain cancer, lymphoma incidence
Hospital case-control was conducted on military staff adult testicular cancer rates. Job title and self-reported occupational exposure to wireless frequencies. O.R for radar exposure =1.1 (CI=0.7-1.8). O.R for microwave =3.1 (CI=1.4-6.8).

Based on the above discoveries, it is apparent that the purported effects on discomfort, amyotrophic lateral sclerosis, neurodegenerative ailments, and the endocrine systems, were mostly negative. Though some participants reported trivial effects, they were not perceived as harmful to health. However, our investigations could not analyze the impact of long-term exposure to wireless technologies because more time is required. Reports obtained from W.H.O and other governmental institutions indicated that there was no noteworthy reheating instigated by mobile phone exposure in the skull.

With respect to the survey, it was noted that many individuals noted that they had not been affected by wireless frequency emissions. However, they were concerned with the increase in the deployment of wireless infrastructure. Particularly, they are worried about the possibility that long-term exposure to RF could have an impact on their health. They are also worried that the media and the relevant authorities have been silent on health problems related to the topic. They pointed out that the advertising revenues generated from this market segment might have compromised the media autonomy. Through this, the media and the relevant government authorities have avoided discussing on health issues associated with the use of these technologies.

Summary of contributions and recommendations

In conclusion, it should be noted that Wireless infrastructures have become very familiar in today’s environment. The article above focused on the effects of wireless frequency on health. Wireless dependent hotspots are very popular in public spaces, schools, and homesteads. The infrastructure uses low- power-driven RF transmitters to interconnect with other communication devices. In spite of the very low power utilized by these technologies, several people are weary of the possibility that RF could have an impact on their health. People living in areas with high exposure to RF such as cell towers have a greater risk of developing insomnia. Some pieces of the literature indicated above link developments of temporary effects on reasoning, recollection, learning, performance, reaction time, and responsiveness to wireless frequency.

The above study utilized mixed methods of research employing both qualitative and quantitative approaches to data collection and data analysis. Besides, the research used a case approach to determine the study population. Both interviews and surveys were employed in the study. Members of the public were interviewed because they were the participants in the study. Surveys were also used to examine their concerns towards the effects of RF technologies.

Based on the above studies, it is apparent that the purported effects on discomfort, amyotrophic lateral sclerosis, neurodegenerative ailments, and the endocrine systems, were mostly negative. Though some participants reported trivial effects, they were not perceived as harmful to health. However, our investigations could not analyze the impact of long-term exposure to wireless technologies because more time is required.

Based on our findings, we notice that the current public health regulations were not sufficient. We noted that our contemporary public safety standards are outdated. Therefore, we recommend that new and biologically founded civic exposure rules for wireless based technologies are urgently required. Similarly, more researchers should be undertaken to confirm the effects of long term expose to wireless frequencies. For instance, our study noted that more time and investigations were needed to proof the claim that RF technologies had an effect on comfort, amyotrophic lateral sclerosis, neurodegenerative ailments, and the endocrine systems.

References

Bhattu, S. (2009). Health effects of cell phone radiation. Dordrecht: Springer. Web.

Clements, F. (2013). United Arab Emirates. Santa Barbara, Calif.: Clio Press. Web.

Li, Q., & Wang, T. (2012). Low-Frequency Wireless Accelerometer to Bridge Health Monitoring. AMM, 241-244, 858-862. Web.

Lin, J. (2002). Health aspects of wireless communication. SIGMOBILE Mob. Comput. Commun. Rev., 6(4), 11-13. Web.

Wyld, D., & Zizka, J. (2012). Advances in computer science, engineering & applications. Berlin: Springer. Web.

Ziaran, S. (2013). Potential health effects of standing waves generated by low frequency noise. Noise Health, 15(65), 237-256. Web.

Reasons why developing software for wireless devices is challenging

Developing software for wireless devices is challenging for a number of reasons. One of the reasons arises from the fact that the various components of the wireless mobile devices are relatively small (Mahmoud, 2002, para. 7).

This means that developing the software requires the developers to constraint themselves in accordance with the device. For example, mobile devices memory is small. This requires the software developer to critically consider the concept of memory management when designing the various applications (B’Far, 2005, p. 33).

Wireless devices have got limited processing power. As a result, elaborate tasks may take more time to accomplish. In addition, the devices’ input capability is also limited. Due to the size of the screen, the size of the information displayed is also limited.

According to Mahmoud (2002, para. 7), the devices’ bandwidth is low and the networks are expensive and cannot be relied upon. As a result, wireless software developers experience numerous network errors.

The second source of challenge arises from the fact that wireless device software developers are faced with various competing standards with regard to the applications necessary for the development of various devices. In order to overcome the challenge, wireless device software developers are required to customize each device for it to operate (Turban et al, 2008).

Major components of wireless device software

There are a number of software components associated with mobile computing. Some of these are explained below.

Programs – There are a number of programs incorporated in the mobile device software. Some of these include word processors, graphic programs, entertainment software such as games and music and word processors.

User interface – This component allows an individual to interact with the devices’ software. Through the user interface, an individual is able to issue a command to a mobile device. There are three main types of user interfaces in mobile computing. These include the command language, menu and the graphical user interface.

Through the menu, the user is able to give commands by selecting commands as displayed from the list. On the other hand, graphical user interface enables an individual to give commands by selecting specific icons on the screen.

System utilities – According to Golding (p.360), mobile devices are considered to be personal devices. As a result, there are a number of personal utilities which are incorporated. Examples of such utilities include the diary and contacts. Due to technological advancement, there has been an expansion in the number of system utilities integrated in mobile devices.

Command shell – This is a specific software program which enhances direct communication between the devices’ operating system and the user. One of its roles entails execution of the commands entered and displaying the output. The command shell is developed through use of scripts.

Graphic Engine – This include the various components of the operating systems. The graphic engine ensures that the mobile device displays all the information on the screen. As a result a high level of graphic routines is ensured.

Conclusion

Development of wireless devices software is challenging due to the size of the devices and the presence of competing standards. To ensure that, the software operates effectively, a number of components have to be incorporated. Some of these include programs, user interface, system utilities, command shell and graphic engine.

Reference List

B’Far, R. (2005). Mobile computing principles: designing and developing mobile applications with UML and XML. Cambridge: Cambridge University Press.

Golding, P. (2002). Next generation wireless application: creating mobile applications in a web 2.0 and mobile 2.0 worlds. New York: John Wiley and Sons.

Mahmoud, Q. (2002). Wireless software design techniques. Web.

Turban, E., King, D., McKay, J., Marshall, P., Lee, J., Viehland, D., et al. (2008). Electronic commerce: A managerial perspective. Upper Saddle River, NJ: Prentice Hall.

Wireless Local Area Network and Channel Fading

Today we can observe the rapid rise of technologies and their interference in multiple spheres of human activity to improve results and achieve higher efficiency levels. Another important domain for their application is the enhancement of communication between agents in different locations. The evolution of the Internet became one of the key factors that fostered this process and preconditioned the further development of technologies. In the modern world, the Internet is closely connected with wireless LAN (WLAN) protocols that are used to transfer data without traditional ways presupposing cables. However, it can suffer from channel fading or external interference, which means the need for an efficient tool to avoid these problems.

Background

WLAN becomes an advantageous way to use modern technologies and preserve access to the Internet not being limited by the cable and demonstrating high mobility. It emerged in 1971 as the first wireless computer network at the University of Hawaii. Since that time, it had passed a long way and became a popular means of transferring data. However, there are also several problems associated with the protocol that can be taken as its disadvantages. First of all, the issue of channel fading becomes topical. It can be determined as the variation of the attenuation of a signal that emerges under the impact of multipath propagation or wave propagation. It can significantly corrupt the quality of data transfer and prevent individuals from using the Internet and LAN. Another problem peculiar to wireless networks is the high risk of external interference. The opportunity for the breach appears because of the nature of this technology as malefactors can use it to enter the private network and analyze information presented there.

Purpose and Research Question

Under these conditions, the pivotal aim of the project is to investigate Wireless LAN, the problem of channel fading, and external interference to find an appropriate solution that can be used to minimize risks and align an efficient functioning of the system. It means that the existing tools to prevent fading such as diversity schemes and rake receivers along with the shielding and improved security measures to minimize security risks will be discussed. Regarding the central topic of the research, the following research question can be formulated:

What are the specific technologies and software that can solve the problem of channel fading and external interference and improve the functioning of WLAN?

Methodology

The given research question presupposes the use of a particular methodology to conduct an in-depth analysis of the issue and acquire credible data. Investigation of the efficiency of specific technologies and their impact on the work and stability of WLAN presupposes an analysis of research papers and articles to understand how these approaches might help to solve the problem and how they impact the discussed aspects. For this reason, the literature review becomes one of the central methods utilized in the project. At the same time, internet sources should also be investigated to collect data about the problem and discuss it.

Relevance

Altogether, the given project is focused on the in-depth investigation of WLAN as one of the modern technologies that guarantee increased convenience and provide users with high mobility. The work will contribute to the improved comprehension of the basic characteristics of this protocol and how such problems as channel fading and external interferences might impact its usability and reliability. The topicality of the selected area is evidenced by the growing number of devices using WLAN and its utilization in all spheres of human activity.

Risks and Security in the Wireless Networks

Introduction

Wireless networks have helped telecommunication organizations and other enterprises avoid the costly installation of cables into buildings to provide the computer network. This has made the network available to many homes in the United States, as well as saving people’s time for physical connection of printers and other devices that can be linked to the home wireless network.

However, this has also made accessing the World Wide Web possible from any point within the router’s ranger and therefore risking having the network used by neighbors. Though much has been done to control such users, such as protecting these networks with passwords, a lot of people find it easy to hack into them and enjoy the free internet while most homes do not even try to protect them.

Discussion

It is very unethical to enjoy free internet by using your neighbor’s wireless network. This amounts to stealing. It is just like taping their electricity lines or water pipes secretly. Though most wireless connections are priced periodically, meaning that there will be no extra cost incurred due to a stealing neighbor, this does not justify using the network without the owner’s consent (SANS Institute, 2003). Ethically, one should inform the owner of their network’s range and then request to use it.

This way, the owner will be aware of the users and will protect any confidential information on their personal computers from being shared in the network. It will also be fair to strike a deal to cost share the internet charges. This is because it is very selfish for anybody to wait for their neighbor to pay for their internet connection so that they can enjoy it for free.

It is worse when the owner of the connection has to pay extra charges for the other unknown users. Though this is rear, we should have a culture of respecting everything that does not belong to us. We may think that it does not cost the owner any extra penny for us to use their network, but the truth is it affects their internet speed. Having several users on the same network slows its’ speed and this is not fair to the owner.

It makes the owner unable to download all the data he/she may have wanted or spend a lot of time downloading it. This may cause dissatisfaction by the owner in the service provide yet the mistake is the provider. The owner may even seek alternatives and this will force him or her to spend unnecessary to install new wireless network but so long as the network is not secure, the same problem will arise.

Ethics will prevent us from using other people’s properties even when it does not cost them. It is not a big deal to have their consent first and even if they deny us we should respect that. Unfortunately, most people do not just use the wireless network; they hack into it. According to Zelinsky, Reams & Houston (2010), hacking on the other hand is beyond ethics, it is a criminal offence. Such people end up in jail if caught.

Though nobody will sue us for breaking the code of ethics, we should always do unto others what we want them to do unto us. It is not fair for us to use our neighbors’ wireless networks if we do not expect the same from them. An ethical person will first think of the others before doing anything affecting them.

One should also not be fond of free things. We should learn to be independent and if we need anything that belongs to our neighbors’, we can always get their consent first. Consent changes what could have been unethical or wrong to right.

References

SANS Institute. (2003). . Web.

Zelinsky, N., Reams, D. & Houston, N. (2010). The ethical issues surrounding Wi-Fi. Web.

Infrared Wireless Local Area Networks

Introduction

WLAN, Wireless Local Area Network, can generally be defined as a computer network architecture that allows communication between various localized (i.e. located over a short distance) computing devices making use of radio or infrared technology and hence eliminating the need to wire all the networked computers together. Today wireless LANs are widely deployed in places such as corporate office conference rooms, industrial warehouses, Internet-ready classrooms, and even coffeehouses.

Main text

“Wireless communication involves transmitting signals via radio waves through air and space. Signals are measured in frequency and amplitudes” (Harris, n.d.). The frequency determines the amount of data that can be carried. However higher frequencies are also prone to greater interference from the atmosphere as the distance from the source increases.

“A wide range of broadband wireless data transmission technologies are used in various frequency ranges. Broadband wireless signals occupy frequency bands that may be shared with microwave, satellite and radar, for example.” (Harris, n.d.) These technologies are used for television transmissions, cellular phones, satellite transmissions, spying, surveillance, and garage door openers etc.

WLAN uses a transceiver, called an access point (AP), which connects to an Ethernet cable; this cable links the wireless devices to the wired network.

The APs are in fixed locations throughout a network and work as communication beacons.

Typically, computers on a wireless LAN have a radio modem, MAC (Media Access Controller) controller, a host interface and the driver. The radio modem transmits data onto and receives data from the frequency band. The MAC controller mainly controls the data packet format, channel access mechanism etc. The driver is actually software that acts as an interpreter between the operating system and the hardware. Each device over the WLAN shares an allotted finite radio frequency spectrum with all other wireless devices within the same network. In order to avoid collision of data packets over this shared spectrum, one wireless device sends out a broadcast indicating that it is going to transmit data. This is received by other devices causing them to hold their transmissions off.

Standards are developed so that different vendors can create products that are capable of working seamlessly with other vendors’ products. The first WLAN standard was 802.11 developed in 1997. It outlines how wireless clients and APs communicate, lays out interface specifications, “dictates how signal transfer should take place and describes how authentication, association and security should be implemented.” (Harris, n.d.)

In order for a host to participate within a particular WLAN, it must be configured with the proper Service Set ID (SSID). “The SSID is a construct that allows logical separation of wireless LANs. In general, a client must be configured with the appropriate SSID to gain access to the wireless LAN. The SSID does not provide any data-privacy functions”; it does not truly authenticate the client to the access point either.

In order to be authenticated, a client broadcasts a ‘probe request frame’ on every channel. (A channel is a certain frequency within a given frequency band). All APs within the range responds to this with a ‘probe response frame’. The client decides the best AP for access and sends an authentication request to it. The access point sends an authentication response. If authentication is successful, the client sends an association request frame to the AP which then replies with an association response. After this response is received by the client, it can participate in the traffic through the AP.

To authenticate a device on the WLAN, the wireless standard 802.11 provides two methods i.e. Open System Authentication (OSA) and Shared Key Authentication (SKA). In OSA, the wireless device does not have a specific cryptographic key to allow for authentication with the AP. As such OSA is a “null-authentication algorithm” that allows any device network access. SKA on the other hand requires that the client configure a static key that is used to send an encrypted message to the AP. If the AP can decrypt this message, it responds with an authentication response that grants the client access.

Summary

Wireless LAN deployments should be made as secure as possible. Standard 802.11 security is weak and vulnerable to numerous network attacks which include sniffing data packets, collecting particular frames or coercing information from a WLAN to derive the key to gain authentication etc. A number of vendors offer solutions to prevent exploitation of these vulnerabilities, for example Cisco Wireless Security Suite which can augment 802.11 security to create secure wireless LANs.

References

  1. Harris, S. (n.d.) All In One CISSP Exam Guide. McGraw Hill/
  2. Tourrilhes, J. (2000). Web.
  3. Wireless LAN Security White Paper. Web.
  4. . Web.
  5. . Web.
  6. What is Infrared Wireless LAN. Web.

Wireless Technologies

There are various wireless technologies that are beneficial to the Party Plates Organization. The wireless network devices are important because of their extensive application.

These devices can be integrated into the various departments to improve the daily organizational activities. Some of the applications of wireless technology include wireless energy transfer, mobile telephones, computer interface devices, security systems, and wireless data communications.

The devices proposed in this paper major on the security systems and the wireless data communications. In a bid to improve technology in the building, it is important to implement the wireless security devices. The organization should also integrate the computing devices to easily access the internet. This can be achieved through the installation of Wi-Fi in the organization (Caputo, 2010).

Security will be enhanced in the organization if it implements wireless technology. The current security system is made up of cameras that are linked to the other components through long cables. Implementing the wireless security system will do away with these cables while increasing the level of efficiency. Wireless security cameras are easy to install and convenient.

The process of data transfer between these security cameras and other components of the security system is fast. This is important in the overall efficiency of the security system (Caputo, 2010). The system will be able to get accurate footage faster. Security personnel will also enjoy improved communications as the new system will be able to relay information through the different links quickly. The wireless security cameras also come with a user friendly manual.

Unlike the old fashion cable cameras, the advanced wireless security systems are easy to use and contain a lot of options. The disadvantages of these cameras are mainly manifested in the price and durability. The cameras are expensive to obtain and they do not last long. The cameras are also easy to hack into since the level of their security system is low. Wireless security cameras have a high cost of maintenance (Mueller, 2005).

In the event the company should install Wi-Fi, there are a number of advantages it will enjoy. Wi-Fi will do away with the multiple cables that connect the different computers in the organization. Individual deployers also enjoy the unlicensed radio spectrum which usually requires no regulatory approval.

This installation will also improve connects by reducing costs and creating room for expansion. Wi-Fi is also important with regards to roaming. Through the installation of Wi-Fi, people with portable computer devices will be able to access the network anywhere within the organization’s premises. People will be able to move from a given access point to another and continue working. The price of Wi-Fi is considerably low with regards to installation and maintenance (Mueller, 2005).

The operation limitations of Wi-Fi and the spectrum assignments are not consistent all over the world. The power consumption of the devices that come with Wi-Fi installations is fairly high. Performance may be affected by Wi-Fi due to the crowding caused by the different devices connected to the system. It is very easy to hack into a Wi-Fi system. This reduces the security of the system and places the entire organization at risk of unauthorized access of information.

In conclusion, the benefits of implementing the security system outweigh the disadvantages. In the contemporary world, such new technologies should be incorporated in organizations to cut down on the expenses incurred by hiring many security guards.

References

Caputo, T. C. (2010). Digital video surveillance and security. Amsterdam: Butterworth-Heinemann/Elsevier.

Mueller, J. (2005). The savvy guide to home security. INDIANAPOLIS: Indy-Tech Publishing.

Deep Learning Enhanced Wireless Sensing

Due to their benefits over traditional wired networks, wireless sensor networks (WSNs) have enormous application opportunities for industrial applications as Industry 4.0 develops. Industrial wireless sensor networks (IWSNs) have higher requirements for high security and low latency due to completely automated mechanized activities and wireless communication environments. The response delay in IWSNs should be measured in milliseconds. Furthermore, because there are no redundant computation and transmission resources in IWSNs’ edge computing (EC) system, some sensor nodes are in entirely secure environments. As a result, lightweight authentication is critical for improving the security of IWSNs while maintaining low latency.

Due to complicated computing, the encrypted approaches are too heavy to sustain the nodes. Liao et al. performed some lightweight password processing, although their solution fails to meet several specific requirements. Other researchers suggested a rapid cross-authentication system that solves the security and latency challenges by combining non-cryptographic and cryptographic algorithms (Zhou et al., 2021). Furthermore, because of the heterogeneous nature of IWSNs, typical encryption-based authentication approaches are more difficult to establish and manage. Physical (PHY) layer solutions, on the other hand, offer some novel ways to safeguard lightweight IWSNs. For such applications, the high authentication rate and cheap cost are very important.

Background of the study

Wireless networks are recently undergoing a significant transformation. The increasing number and diversity of wireless devices, as well as increased spectrum consumption, are some of the trends that have been noted. Regrettably, radio frequency spectrum is a limited resource. As a result, certain regions of the spectrum are widely utilized, while others are neglected. Unlicensed bands, for example, are excessively overused and suffer from cross-technology interference (Zhou et al., 2021). In monitoring and tracking environments, wireless sensors are deployed at random. The sensor’s position may or may not be known. The research team must precisely determine the location of each node in the network in order to obtain the essential information about the target environment.

Aim and objective of the research

The goal of this study is to provide an overview of WSN applications and challenges, with a focus on the topic of localization. In addition, the research proposes taxonomy for classifying alternative localization algorithms. Furthermore, the paper examines many standard methods as well as their improvements using soft computing techniques. Furthermore, the study outlines the challenges of localization and identifies areas for future research.

Research question

  1. What kind of technology is used in the deep learning and wireless sensor networks?
  2. How the deep leaning-enhanced wireless sensing has been used in the past and how it will be used in the future?
  3. Will the deep learning-enhanced wireless sensing improve compared to how it is right now?

Literature review

Many scientists have recently focused their own research on topics such as smart buildings, sensor devices, virtual sensing, building management, Internet of Things (IoT), artificial intelligence in the smart buildings sector, improving life quality within smart homes, assessing occupancy status information, detecting human behavior with the goal of assisted living, environmental health, and natural resource preservation. The research review’s major goal is to assess the present state of the art in terms of recent breakthroughs in combining supervised and unsupervised machine learning models with sensor devices in the smart building sector, with the goal of improving sensing, energy efficiency, and property management companies. The research approach was developed with the goal of locating, filtering, categorizing, and assessing the most important and relevant scholarly papers on the subject (Andiappan, & Ponnusamy, 2021).

In order to measure the interest in the above-mentioned topic within the scientific literature, the research team employed credible sources of scientific information, namely the Elsevier Scopus and Clarivate Analytics Web of Science international databases. After analyzing the papers, researchers were able to create a reliable, expressive, and representative pool of 146 scientific papers that the research team could utilize in developing surveys by means of the approach that was created. For academics from various domains, the research technique provides a valuable up-to-date overview, which can be useful when submitting project proposals or exploring complex problems like those discussed in this paper. Meanwhile, the new study allows scientists to identify future research areas that have yet to be addressed in the scientific literature, as well as to improve existing methodologies based on the body of information (Zhou et al., 2021). Furthermore, the performed review establishes the foundation for identifying the major purposes for integrating Machine Learning techniques with sensing devices in smart environments in the scientific literature, as well as purposes that have yet to be investigated.

Research Methodology

In the research methodology, this study uses a diagnostic research design and a deductive technique, both of which can establish a favorable relationship between an idea and factors. Secondary data sources include a number of worldwide journals and magazines, increasing the study’s useful breadth. Within the research study, which will be conducted using a secondary qualitative technique, thematic analysis will be used as a method. The primary motivation for employing these research techniques is to reduce the danger of COVID 19 exposure. Apart from the risk of contracting COVID 19, the secondary qualitative research approach saves a lot of time and is less expensive than the primary quantitative research method, thus it is suitable for this research study in the current situation.

Using a diagnostic research technique and a deductive research strategy, secondary data on deep learning on sensor networks data will be acquired from worldwide publications. The collected data will then be evaluated using a variety of literary resources. Finally, the collected data will be compared to the research objective to establish whether or not the research’s actual intent was met.

While fostering the survey system, the research team will consider the details relating to the “Writing Review” type given by Zhou et al. to be specific: the enlightening part describes “distributed materials that give assessment of later or ebb and flow writing; can cover wide scope of subjects at different degrees of fulfillment and exhaustiveness; may incorporate examination discoveries”; the quest part of the SALSA system for this kind of audit might possibly incorporate complete looking; the evaluation part “could conceivably incorporate quality appraisal”; the combination part is “ordinarily account”; the investigation part “might be sequential, theoretical, topical, and so on”. To this end, the team will utilize dependable wellsprings of logical data, to be specific the Elsevier Scopus and Clarivate Analytics Web of Science worldwide data sets, to evaluate the interest in this theme inside the logical writing and to acquire a beginning stage for building a solid, expressive and delegate information base of logical works that would be helpful for fostering our study. The picked these two information bases as there needed to ensure that the team were utilizing all around the world acknowledged wellsprings of data that unmistakably select and record their substance in a consistently steady way, upheld by many years of dependable, exact and exhaustive ordering. Besides, the team took into account the way that renowned distributing bunches order and advance their diaries by featuring the quality measurements of their diaries as given by the Web of Science Core Collection or on the other hand the Elsevier Scopus data sets. Thusly, there was contrived, in light of the scientific classification of managed and solo AI procedures, custom hunt inquiries to survey the expansive execution and to recognize which of the AI techniques from the scientific categorization addressed are generally appropriate for execution with sensor gadgets in shrewd structures with the end goal of accomplishing improved detecting, energy productivity and ideal structure the board.

The custom search queries were acquired after trying several search patterns as well as criteria, with the terms smart, sensor, and at least one of the terms machine learning, artificial intelligence, supervised learning, and unsupervised learning, as well as their associated subcategories from the taxonomy, appearing in the title, abstract, or keywords. As a result, the first two steps of our methodology are to search the two international databases using the above-mentioned search queries, yielding two initial pools of scientific works useful for conducting the survey, consisting of 1255 papers retrieved from the Elsevier Scopus database and 381 papers retrieved from the Clarivate Analytics Web of Science database, for a total of 1636 papers (with some papers being included in both databases).

Gantt chart schedule
Gantt chart schedule

References

Andiappan, V., & Ponnusamy, V. (2021). . Wireless Personal Communications, 1-39.

Liao, R. F., Wen, H., Wu, J., Pan, F., Xu, A., Jiang, Y., & Cao, M. (2019). Sensors, 19(11), 2440.

Zhou, H., Liu, Q., Yan, K., & Du, Y. (2021). Wireless Communications and Mobile Computing, 2021.

Radio Over Fibre or Fibre Wireless Systems

Introduction

Technology has undergone and continues to undergo dynamic revolution every day. The world has moved from analogous technological equipments to digital equipments, and this has revolutionized the communication sector, as well. The Internet is the other feature of today’s communication systems, which has made globalization a reality. The world has become one big village connected from every corner via the Internet and this scenario enhances communication. With the increasing rate of urbanization and general modernization, more and more people are finding themselves in need of the Internet, which translates to rampant demand for the Internet distribution systems. The existing systems of transmission are no longer sufficient to meet these demands efficiently, which is why this paper is proposing Radio over Fibre, (ROF) technology as the most prudent approach in satisfying these demands. It does this by discussing several articles on this subject and then making recommendations for future research projects on the matter in question.

Radio-over-fibre technologies have numerous advantages including their capacity to be multifaceted. They are usable for different purposes simultaneously including the provision of unregulated access to broadband wireless communications for different communication applications such as in the last mile solutions, for the extension of radio coverage and capacities, and back haul. With the imminent revolution of technology, the world needs systems that are much faster than the present technology. Moreover, the world population is on the rise, which means more users, hence, higher demand. Presently, Wireless LAN is capable of transmitting data of up to 54 Mbps at 2.4 GHz and 5GHz. WiMAX, on the other hand, is under modification to make it capable of transmitting from 2-66 GHz (Opatic 2011, p. 5). In creating efficient systems, innovators should take into account factors such as the losses that are incurred by high-operating systems in an indoor set up due to the loss to the building walls. With this in mind, they should come up with radio cells that are smaller in size and operating frequencies that are higher than existent ones. These optical fibres are used in the transmission of radiofrequency (RF) signals to remote areas. Recently, they have been modified to minimize the cost of installation in remote sites (RS), as well as their visual impact on the site of installation. They also ensure the least levels of loss in terms on energy and space required for installation. Moreover, they reduce the burden of searching for a site for installation, and by extension, the cost of leasing such a site. These fibres are also small in size, and exceptionally light. Their minimum weight makes them highly portable for mobility purposes. They have unregulated bandwidth characteristics, which mean that mobile terminals which are located indoors can utilize this technology if they require fast, multimedia services (Al-Raweshidy 2010, p. 13). Their cable is affordable making them even more attractive in terms of saving costs and increasing profitability. The fibres are not sensitive to electromagnetic radiation, and so they could be set up anywhere without adverse effects of the surrounding’ radiations. Another advantageous feature of these fibres is their immunity to fading and physical security.

The proposed radio over fibre optical link would replace the existing copper coaxial cables as the connection between a radio-based station (RBS) and the antenna, which is normally located in an extremely remote site. The optical fibre transmits the signals in different wavelengths within the fibre, and then at the antenna, there is equipment to re-engineer these signals back into radiofrequency signals through various processes. The radio over fibre technologies would reduce the processes necessary for the re-engineering of signals back into radiofrequency states to as few as two. These are amplification and optoelectronic conversion. The RoFs have wavelength diversity, which refers to their reusable capacity. It is possible to reapply them in different areas of the same building using the original communication equipment and similar wavelength. This is a cost-effective feature, which most organizations that are in need of indoor communication systems favour (Ng’oma 2005, p. 67). They satisfy user mobility, and finally, they can propagate large amounts of data depending on traffic demands. This feature demonstrates a landmark differentiation from existing communication systems that can only allocate tens of gigabits (Fibre Optic LANs) or several tens megabits (mobile users) at a go, thereby leading to slow internet, or other inconveniences for clients. In contrast, these systems are capable of transmitting terahertz of bandwidth.

They work by transmitting regulated microwave signals across the link or network from central office, or exchange (CO) to the remote site, (RS) or remote antenna units (RAU). These microwave signals need to be present at the input end of the RoF whereby they are transformed into electric signals for the transmission stage, and finally, at the remote terminus, there is equipment that can be used to reconvert the signals back to radiofrequency mode. The central office mentioned above is one of the modifications present in RoFs that make them cost effective and user friendly. It is possible to centralize them in a remote locality so that they are the main supplier for the local remote site. However, for this to happen, several measures need to be set in place. RoFs are multipurpose. Besides their use in transmission and in enhancing mobility, these systems are also usable in modulating data, processing signals, and converting frequencies (up and down). Some of the signals they process include base band data, modulated Ifs and actual modulated RF signals. To deal with the issue of remoteness, these systems are multiplex, which means that they can transmit several bundles of data in different directions in one fibre simultaneously. They are, therefore, better than simplex systems that transmit data in one fibre and one direction, or duplex systems, which can only transmit in two directions simultaneously in one fibre. They have de-multiplexing traits, which enable them to regulate and merge several wavelengths for transmission through one fibre, which ensures that they do not waste any of the available bandwidth. The process of transmitting radiofrequency signals over optical fibre is known as Intensity Modulation with Direct Detection (IMDD).

RoFs being a new technology inadvertently require a different architectural design. However, they comply with the generally accepted standard of transmission. They feature a central office, and an optic fibre link or network that connects the central office with the remote area units. However, specific wireless applications have customized architectural designs. For instance, GSM has as their central office a Mobile Switching Centre (MSC) and their RAU is a remote site, (RS). On the other hand, Wireless Local Area Networks have the head end as their central office and this links with a base station, (BS) using optical fibres.

Cost-effective nature

Transporting microwave signals through electric transmission is extraordinarily expensive. One has to consider losses that this form of the system is susceptible to, because of reflection or absorption, which escalates with an increase in frequency in free space. The answer to this issue would be to use commercial single mode fibres (SMFs), which are made from glass, silica, and have minimal attenuation losses. Another available option is Polymer Optical Fibres, POFs.

Unregulated (large) bandwidth

Optical fibres have the capacity of more than 45 THz of data in bandwidth yet the existing systems only use 1.6Hz. However, this should soon change because improvements are underway that will ensure that optical fibre phases out the existing systems. Some of the factors that are going to make this possible include the fact that low-dispersion fibre is now available in the form of Erbium Doped Fibre Amplifier (EDFA). It is also enhanced by using multiple techniques such as Optical Time Division Multiplexing (OTDM) and the Dense Wavelength Division Multiplex techniques among others (Rahman, Lee, Youngil, & Ki-Doo 2009, p. 426). The result of these improvements is the high capacity of transmission of microwave signals, and efficiency during the processing of signals as previous electronic processes such as up- and down- converting can be carried out optically. However, it is difficult to utilize the large capacities of bandwidth that are made available by optical systems because they cannot be sustained by the electric system, which happens to be the transmitter. This situation is known as “an electronic bottleneck” and to solve the same, it is necessary to multiplex.

Immunity to radiofrequency interference

Optical fibres do not get affected by surrounding electromagnetic waves. This implies that it can be implemented at any location without fear or doubt. During microwave transmissions, signals are transmitted in the form of light. This feature also prevents unauthorized access of data in transit and so it is more secure.

Easy installation and maintenance

Optical fibres are easier to install and maintain because, in Radio over Fibre systems, the complex equipment and hardware are located at the head-end or the centralized offices. Therefore, the Remote Area Units are easier to manage as they are only minimally equipped to carry out one or two transmission processes such as maybe amplification and optoelectronic conversion. The result is that, at the RAU, the only equipments necessary for processing received signals are a photo detector, a radiofrequency amplifier, and an antenna. It is necessary to cut costs because though cheap to maintain, RAUs are required in large numbers and so it is prudent to recover costs in the installation and maintenance sector, and then transfer these funds to the installation of more RAUs. Finally, the smaller the remote area unit, the less adverse effects on the environment, and so to be environmentally friendly, they should be built small.

Less energy consumption

Because the head-end is centralized, remote area units have few processes to run, and so utilize minimal power or energy because there are also few types of equipment at the RAU. Moreover, since they are mostly located in far-removed areas, this element is a merit because, probably such a location does not benefit from the power grid.

Multipurpose

Radio over Fibre systems is highly flexible, and they offer various options to any user. They are tolerant to chromatic dispersion as another trait that fosters flexibility, and it is necessary to acknowledge this as innovators. It is also possible to be dynamic about allocating resources. For instance, a shopping mall would require more power and allocation during off peak hours, and ensure that we satisfy this need.

However, these systems have several shortcomings that would require correction before they can attain optimal effectiveness. These limitations include amplified spontaneous emissions (ASE), noise, distortion, non-linearity, multipath propagation, pulse dispersion, and inter-symbol interference. It is necessary to note that RoFs are analogous and so anything that affects analogue systems is relevant to them. It is not surprising; therefore, that noise should be an issue (Al-Raweshidy 2010, p. 6). The causes of this noise are plenty, and they may include the laser’s Relative intensity noise (RIN), phase noise, the shot noise that photodiode causes, thermal noise from the amplifier, and dispersion in the fibre. This scenario is not a particularly promising condition as is evidenced by Single Mode Fibres (SMF). Here, chromatic dispersion adversely affects fibre length and causes de-correlation of phases. This phenomenon is another source of noise. Noise should be at minimum, especially in mobile communication devices.

Dispersion

This refers to the widening of the pulse duration as it is propagated through a fibre. The problem arises when it extends so much as to interfere with adjacent bits or pulses, causing inter-symbol interference. This sets limits on the amount of spacing allocated to each bit while maximizing the transmission rate of the channel. Inter-mode dispersion refers to the scenario whereby numerous modes transmitting the same signal travel at a different speed in the same fibre. The disruption caused by this state can lead to distortion of data in transition. Material or chromatic dispersion’s basis is the dispersive medium. It is affected by the refractive index (differs according to the medium through which transition is occurring, e.g. from water to air, through water or air, or ice or rocks.) in the event of the occurrence of multiple wavelengths in a single signal, it is obvious that some will travel at higher velocities than others will. (Ng’oma 2005, p. 45). This is because the lasers in existence cannot regulate wavelengths before propagation to ensure that they are equal in magnitude and velocity. Wavelength dispersion results from propagation of different wavelengths. This is because different factors affect this transmission through the fibre, for instance, indices, shape, core, and cladding of the fibre. Consequently, it is difficult to regulate the outcome of any individual propagation. The dispersion solution could take the form of dispersion shifting and the utilization of fibre that has zero dispersion at 1300-1700 nm.

Non-linearity

If the wavelength division multiplexing, (WDM) of an optical communication system is non-linear, it could lead to distortion and cross channel interference. This is due to the effect on spacing between adjacent wavelength channels, which limits the maximum output of any such channel at an individual level. The maximum bit rate also diminishes.

Cross talk

This can either be heterodyne, meaning that it is occurring between signals that are at different wavelengths, or homodyne, which occurs between signals which are in the same nominal wavelength. Homodyne cross talk is again stratified into phase correlated and non-correlated signals. If not managed at the appropriate time, this can result in the compounding of an entire system’s error rate to the bit error rate (BER) floor.

Numerous societal institutions, including large buildings owned by different corporations and organizations, residential houses, and shopping centres use these systems (Opatic 2011, p. 6). Examples of optical systems include technology that has been invented to enable transmission through the air and water, through rocks, and walls, as well as through reinforced concrete among others.

Conclusion

The architectural designs of RoF systems can operate numerous radio services and standards. They are flexible, reliable, and cost-effective. They simplify any system’s communication channels and are located near clients. They eradicate the complications that are part of the existing electrical systems such as noise production, complexity, expensive nature, low capacity, and space consumption among others. The advantages of these systems outweigh any shortcoming they may have in the meantime. This phenomena is because most of these shortcomings are already being worked upon by innovators and other interested parties. In the meantime, it would be prudent to look into the advantages of optical systems, especially RoFs, in a more specific setting to establish their worth. Though they will still be analogous, they will be advantageous because the complexity of the equipment close to the antennae will be minimal, the equipment shall, therefore, have minimal visual impact on those around it, and the necessary operational costs will be manageable. Installation costs will reduce the loss of data that occur when it is transmitted via electric cables will reduce, and climate will be a null issue.

Reference List

Al-Raweshidy, H. A., 2010. Optical Fibre Technologies and Radio over Fibre Strategic Research for Future Networks. eMobility: White Papers, 1-19.

Ng’oma, A. S., 2005. Radio-over-Fibre Technology for Broadband Wireless Communication Systems. Eindhoven: Technische Universiteit Eindhoven.

Opatic, D., (2011). Radio over Fibre Technology for Wireless Access. Web.

Rahman, K. M., Lee, H. J., Youngil, L. P., & Ki-Doo, K. N., 2009. Radio over Fibre as a Cost Effective Technology for Transmission of WiMAX Signals. World Academy of Science, Engineering and Technology, 56, pp. 424-428.

Risks of Wireless Network Transmission

The use of wireless networks, or Wi-Fi as many people call it, provides a wide range of benefits to a workplace. However, due to the various drawbacks, organizations cannot rely entirely on wireless transmission as a source in the workplace. There is a wide range of problems with wireless connections.

The most significant risk of using a wireless network is security. Since these connections are cordless, controlling network access at any specified time is difficult. A wireless connection is more exposed to attacks by unauthorized users. To help combat issues with security, organizations should use preventative measures such as authentication through MAC address filtering and encrypted passwords (Kobayashi et al., 2019). Transmission speed is also another issue affecting the wireless network. The connection can be slower and less efficient in some areas. The signal transmission is less reliable and can be blocked by objects like walls and hills. Adverse weather also affects the signal strength of wireless connections. Wireless network connections are difficult to set up and install. The process typically requires technicians with knowledge of electromagnetic signal transfer.

The Israeli hacker scandal is an example of complete operation disruptions due to wireless network failure. In 2016, an Israel-based internet hacker took over an entire city’s Wi-Fi Amihai Neiderman spotted an internet hotspot and wanted to test its security strength. He performed various disconnections on the router through access points and interfered with the IP addresses of the network. He disconnected the internet and scanned for open ports realizing that the router was serving a web-based login interface port 433 (HTTPS). This shows how insecure a wireless connection can be.

Reference

Kobayashi, S., Otomo, K., & Fukuda, K. (2019). . 15th International Conference on Network and Service Management (CNSM), 1-9. Web.