Wireless Networking Essay

Great Essays
1.1 Introduction
This chapter will briefly discuss the background of Software Defined Networking (SDN) and its use in Wireless Sensor Networks (WSN). It will also state the Problem Definition, the Aims & Objectives of this project, and the Methodology used to achieve those objectives. In the end, it will present an overview of the dissertation’s layout.

1.2 Background
The Internet has made an enormous impact on the world of communications. It has interconnected billions of networking devices all over the world. These devices share information with each other in the form of digital data packets. The networking protocols are responsible for the safe delivery of these packets to their respective destinations. Despite their significance, these protocols have not evolved over the years. They are complex and they restrict innovation. In the current networking environment, network administrators have to configure each device manually by using proprietary commands. Newer policies or protocols cannot be introduced in the network on the fly, while automatic reconfiguration and response mechanisms are almost non-existent. The still
…show more content…
It only has a single, one-way communication link. An example of its use is in the pressure measuring systems. The advancement in technology lead to the need of more efficient topologies. The developers started making cost-effective protocols for these designs. For example a Star topology finds its use in easily scaling the number of lights in a room or a router in a house can use the Mesh topology to overcome shadowing and ensure uniform signal strength throughout the house. The major area of concern is the security of these devices. WSN are generally set-up for gathering records from insecure environments. The sensitive nature of the information carried by the nodes poses a great challenge for the developers to implement a secure framework for these devices so that the data cannot be

Related Documents

  • Improved Essays

    In the paper, [1], the author introduced two kinds of topology attacks focus on the architecture of SDN and emphasized the weakness of the host tracking service and the link discovery service. And then, the paper provides the security extension, called Topoguard, for the Floodlight v0.9 controller. A. Two topology attacks The first attack as we mentioned, Host Location Hijacking Attack, is to send a fake request that the target host migrates to a new location trying to intercept packets and connections to the target host. This attack uses the weakness of the host tracking service that the controller simply follows the latest Packet-in message and does not check the identity of the request.…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    North Bound Interface Northbound APIs must support a wide variety of applications because SDN is bound to the innovative applications it can potentially support and enable. The northbound API is not standardized and often allows fine-grained control of switches. Applications should and do not need to process details of the southbound interface, such as details about the network topology [14]. OpenFlow protocol provides an interface that allows a control software to program switches in the network.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    SYSTEM IMPLEMENTATION: At some fixed interval the PC Master sends request to the Wireless sensor node through the sub master for Data collection. The request send by the PC Master is in the form of frames. The frame which is transmitted by PC master will contain both the sub master id & the wireless sensor node id from where the data should be retrieved. The sub master receives the frame is then check for the wireless sensor node id…

    • 358 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    NS-2 offers a poor graphical support, no Graphical User Interface (GUI), the subscribers have to directly face to text commands of the electronic devices. Because of the continuing modifying the code base, the result may not be consistent and consist bugs. NS-2 cannot simulate issues of the power consumption, bandwidth or energy saving in WSN. NS-2 has a scalability issue no. of nodes cannot be greater than 100.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Use of multiple routers in interconnected networks: Exchanging information about destination addresses using a dynamic routing protocol. A router has different physical ways to operate network connections, such as: • Fibre optic • Copper cables • Wireless A router also contains several firmware for different networks’ protocol standards.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 1 Assignment

    • 1292 Words
    • 6 Pages

    TCP/IP Transmission control Protocol/Internet protocol used to connect host computers on internet. First internet ARPANET was developed when US Department of research projects agency (ARPA) in the end of 1970s needed a system to share the resources of their big mainframe systems. In start ARPANET used Network Control Protocol but in 1974 TCP protocol was introduced and all pervious protocols were replaced with TCP Protocol. TCP/IP was the leader in protocols used as a communication protocol on the internet. TCP/IP is still being used as a communication protocol in network operating systems (Abbate, 1994).…

    • 1292 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Assignment

    • 867 Words
    • 4 Pages

    The web pages, the content and the web servers, this is the technology that helps the World Wide Web and helps store and manage the internet and the web content. D1: Role of TCP/IP protocol, linking with Application Layer protocol: TCP/IP stands for (Transmission Control Protocol/Internet Protocol); this is part of the Internet Protocol Suite. The role of TCP/IP is to make sure the data that it is receiving is been delivered to the right address, they are a combination of instructions that outline packages of information sent to the user. The TCP/IP contains different protocols HTTP , FTP , SMTP , DNS , RIP and SNMP .…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Abstract: With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1] Introduction: With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Nt1310 Final Exam Paper

    • 1307 Words
    • 6 Pages

    2.3 What is Protocol? Protocol is defined as a set of Rules which governs the communication to a network Between the Layers. In Order to establish a communication in a network Successfully, These are the Following Example: File Transfer Protocol, Simple Mail Transfer Protocol. 2.4…

    • 1307 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    During the 1980’s the Internet grew exponentially, one reason included the various technical innovations such as more powerful and affordable computers and hardware that made the Internet more accessible to organizations, educational institutions and individuals. In the last 10 years, there has been a spike in the number of mobile devices and personal computers within a household, which aided with the widespread use of the Internet…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    CHAPTER 1 1. INTRODUCTION 1.1 WIRELESS SENSOR NETWORK (WSN): Wi-Fi sensor networks (WSN), once in a while called wireless tool and actuator networks (WSAN), are spatially disbursed autonomous sensors to monitor bodily or environmental situations, which include temperature, sound, pressure, and so forth. and to cooperatively pass their expertise through the network to a major location. The extra brand new networks are bi-directional, additionally sanctioning control of device activity. The improvement of wireless sensor networks became impelled by navy applications like area surveillance; in recent times such networks vicinity unit utilized in numerous industrial and shopper applications, along with manner tracking and management, system…

    • 835 Words
    • 4 Pages
    Improved Essays