Performance Analysis of Wireless Network Throughput and Security Protocol Integration

Author(s):  
Paschal A. Ochang ◽  
Phil Irving
2019 ◽  
Vol 01 (02) ◽  
pp. 103-115
Author(s):  
Durai Pandian M

The spread out of wireless mesh network has made possible the extended range of communication network that are impractical due to environmental changes in a wired access point, these wireless mesh network does not require much competence to set it up as it can be set very fast at a cheap rate, and the conveyancing of messages in it happens by selecting the shortest path, these wireless mesh built-in with irrepressible and invulnerable identities come with an endurance to temporary congestion and individual node failure. This results in an architecture providing a better coverage, flaw indulgent with higher bandwidth compared to other wireless distributed systems. But faces the limitation on power conservation. The battery activated mesh nodes loses their resources on perception, processing and transmission of the data’s, though these batteries or accumulators comes with energy regaining capability still draw backs show up as their nature of energy regaining are unexposed. So the performance analysis of fly wireless network which proposes a uninterrupted wireless mesh networks aims at providing a best measure of performance that is the best quality of service on the meshwork by providing an improved energy gleaning using potency segregation (IGPS) which empowers each node to have self- contained accumulation of energy achieving heightened adaption with energy consumption kept at a minimum. The gross functioning of the proposed is examined on the bases of delay and packet loss to prove the quality of service acquired.


2019 ◽  
pp. 1213-1240
Author(s):  
Abhinav Prakash ◽  
Dharma Prakash Agarwal

The issues related to network data security were identified shortly after the inception of the first wired network. Initial protocols relied heavily on obscurity as the main tool for security provisions. Hacking into a wired network requires physically tapping into the wire link on which the data is being transferred. Both these factors seemed to work hand in hand and made secured communication somewhat possible using simple protocols. Then came the wireless network which radically changed the field and associated environment. How do you secure something that freely travels through the air as a medium? Furthermore, wireless technology empowered devices to be mobile, making it harder for security protocols to identify and locate a malicious device in the network while making it easier for hackers to access different parts of the network while moving around. Quite often, the discussion centered on the question: Is it even possible to provide complete security in a wireless network? It can be debated that wireless networks and perfect data security are mutually exclusive. Availability of latest wideband wireless technologies have diminished predominantly large gap between the network capacities of a wireless network versus a wired one. Regardless, the physical medium limitation still exists for a wired network. Hence, security is a way more complicated and harder goal to achieve for a wireless network (Imai, Rahman, & Kobara, 2006). So, it can be safely assumed that a security protocol that is robust for a wireless network will provide at least equal if not better level of security in a similar wired network. Henceforth, we will talk about security essentially in a wireless network and readers should assume it to be equally applicable to a wired network.


Sign in / Sign up

Export Citation Format

Share Document