Wireless Networking Essay

Great Essays
1.1 Introduction
This chapter will briefly discuss the background of Software Defined Networking (SDN) and its use in Wireless Sensor Networks (WSN). It will also state the Problem Definition, the Aims & Objectives of this project, and the Methodology used to achieve those objectives. In the end, it will present an overview of the dissertation’s layout.

1.2 Background
The Internet has made an enormous impact on the world of communications. It has interconnected billions of networking devices all over the world. These devices share information with each other in the form of digital data packets. The networking protocols are responsible for the safe delivery of these packets to their respective destinations. Despite their significance, these protocols have not evolved over the years. They are complex and they restrict innovation. In the current networking environment, network administrators have to configure each device manually by using proprietary commands. Newer policies or protocols cannot be introduced in the network on the fly, while automatic reconfiguration and response mechanisms are almost non-existent. The still
…show more content…
It only has a single, one-way communication link. An example of its use is in the pressure measuring systems. The advancement in technology lead to the need of more efficient topologies. The developers started making cost-effective protocols for these designs. For example a Star topology finds its use in easily scaling the number of lights in a room or a router in a house can use the Mesh topology to overcome shadowing and ensure uniform signal strength throughout the house. The major area of concern is the security of these devices. WSN are generally set-up for gathering records from insecure environments. The sensitive nature of the information carried by the nodes poses a great challenge for the developers to implement a secure framework for these devices so that the data cannot be

Related Documents

  • Improved Essays

    In addition there was another thing that William Yeager did that help us not only creating the router ,but also the multiprotocol system that made to create the IPV4 and IPV6 that most our routers use that connects to all other routing to the main server of each local area that can be useful for the router to communicate with websites on the internet and find a match for that site and code to recognize to store as memory for the next search for this specific one("History of the Router | EHow." Subscribe to Our RSS. N.p., n.d. Web. 15 Jan.).…

    • 1350 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    MSM Team Paper

    • 1460 Words
    • 6 Pages

    Another technical barrier is the lack of automation of some data transfer processes. For example, there is data that gets sent to our users that must be moved manually between networks of equal classification. The networks are connected to each other and there is no reason the process cannot be automated. This causes the customer to have to wait longer for data that could arrive…

    • 1460 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Ntc300 Unit 1

    • 1895 Words
    • 8 Pages

    To fully understand how servers and clients are able to exchange information across the Internet we must understand the workings of the most widely used protocol used in computing. That protocol is the TCP/IP protocol and associated common set of rules for addressing. IP addresses The TCP/IP protocol suite uses an Internet address, or IP address, to identify each network interface on the network. Devices can have more that one interface connected to the network. Each interface must have a unique IP address that identifies that interface.…

    • 1895 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    The key distribution techniques, like probabilistic key distribution, asymmetric cryptosystems, SPINS and LEAP were developed for distributing security keys in BANs. However such methods are not implemented easily in the body sensors because of restricted sensor resources or needing pre-deployment of secret keys that are difficult to be substituted and are susceptible to offline crack. Moreover, key management’s overheads and distributions in such methods are enormous whenever numerous sensor nodes are…

    • 949 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Internet Importance

    • 780 Words
    • 4 Pages

    TCP/IP is the primary communication language or also known as the protocol of the Internet. When you are permitted first hand access to the Internet, your computer is provided with a copy of the TCP/IP program .It can also be used as a communications procedure in a secure network like an Internet or Extranet. TCP sends data in a form that appears to be transferred in a character-by-character fashion, rather than as separate packets. Next, we will be discussing the Importance of Protocols in Internet Services. Simultaneously millions of people around the world use the Internet and the Internet protocols are used to send data from one computer to another.…

    • 780 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    How to create Yellow throw blanket at home? Description: Yellow throw blanket can now be created with ease at home. You just need to take a concrete preparation so that all the necessary steps can be abided without any fail. Yellow throw blanket as currently made a greater addition to the home decor; moreover it can be used for other valuable purposes. Chairs or couches are made more beautiful by means of using these kinds of decorative and customized blankets.…

    • 2577 Words
    • 11 Pages
    Improved Essays
  • Improved Essays

    • Custom implementation of authorization and authentication schemes should not be implemented unless they are tested properly [ ]. • Back up policies such as Continuous Data Protection (CDP) should be implemented in order to avoid issues with data recovery in case of a sudden attack [96]. • Additionally, they should be aware if the virtual network infrastructure used by the cloud provider is secured and the various security procedures implemented to ensure the same [25]. Paper [] discusses security challenges in IaaS and discusses identity/access management and multifactor authentication techniques in Amazon Web Service (AWS) cloud. In case of PaaS and SaaS model cloud provider has a responsibility to provide good level of security .Following aspects related to security must be considered.…

    • 745 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Firewall Vs Firewall

    • 1167 Words
    • 5 Pages

    The software firewall is an application installed so as to perform its task while a hardware firewall is a device connected to the computer. The best type of firewall for a home computer is the software as it is easy to install and use. It is important to always make sure that the firewall is on at all times, especially when using the internet to ensure no entry of unknown…

    • 1167 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Living room is the social hub of the house, a place to receive close friends and sometimes passing acquaintances as well. It is only natural for us to try and decorate the living room in the best possible fashion. Only by selecting the appropriate living room furniture can we expect to do so. In many modern dwellings, living rooms also double up as a media room, home office or dining parlour. So to design a comfortable as well as elegant space, beautiful living room furniture is highly coveted.…

    • 1561 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    Transmission Control Protocol/Internet Protocol (TCP/IP) are a suite of protocols designed for large-scale internetworks that span LAN and WAN environments. TCP/IP are communication protocols that are used to handle traffic on the internet and other networks. The two most important protocols are the Transmission Control Protocol (TCP) and the Internet Protocol (IP). These are today the standard networking protocols and were created from a synthesis of a number of earlier developments in the 1960’s and 1970’s. TCP/IP protocols were developed in the early 1970’s by scientists Vint Cerf and Bob Kahn.…

    • 1545 Words
    • 6 Pages
    Great Essays