Wireless Networking Essay

Great Essays
1.1 Introduction
This chapter will briefly discuss the background of Software Defined Networking (SDN) and its use in Wireless Sensor Networks (WSN). It will also state the Problem Definition, the Aims & Objectives of this project, and the Methodology used to achieve those objectives. In the end, it will present an overview of the dissertation’s layout.

1.2 Background
The Internet has made an enormous impact on the world of communications. It has interconnected billions of networking devices all over the world. These devices share information with each other in the form of digital data packets. The networking protocols are responsible for the safe delivery of these packets to their respective destinations. Despite their significance, these protocols have not evolved over the years. They are complex and they restrict innovation. In the current networking environment, network administrators have to configure each device manually by using proprietary commands. Newer policies or protocols cannot be introduced in the network on the fly, while automatic reconfiguration and response mechanisms are almost non-existent. The still
…show more content…
It only has a single, one-way communication link. An example of its use is in the pressure measuring systems. The advancement in technology lead to the need of more efficient topologies. The developers started making cost-effective protocols for these designs. For example a Star topology finds its use in easily scaling the number of lights in a room or a router in a house can use the Mesh topology to overcome shadowing and ensure uniform signal strength throughout the house. The major area of concern is the security of these devices. WSN are generally set-up for gathering records from insecure environments. The sensitive nature of the information carried by the nodes poses a great challenge for the developers to implement a secure framework for these devices so that the data cannot be

Related Documents

  • Improved Essays

    In the paper, [1], the author introduced two kinds of topology attacks focus on the architecture of SDN and emphasized the weakness of the host tracking service and the link discovery service. And then, the paper provides the security extension, called Topoguard, for the Floodlight v0.9 controller. A. Two topology attacks The first attack as we mentioned, Host Location Hijacking Attack, is to send a fake request that the target host migrates to a new location trying to intercept packets and connections to the target host. This attack uses the weakness of the host tracking service that the controller simply follows the latest Packet-in message and does not check the identity of the request.…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    It is composed of software controllers that communicate with the forwarding network fundamentals through standard interfaces, referred also as the South Bound Interface. The last layer is called Application Layer which takes care of…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Lab 1

    • 618 Words
    • 3 Pages

    Lab 2: OSI Model Introduction: This lab expanded upon the first, by outlining in greater depth, the Open Systems Interconnect (OSI) Reference Model. In particular, we covered how this model shapes and forms the key structure of all computer network communication. Covered in the first lab, the layers involved are physical, data link, network, transport, session, presentation and application. The lab portrayed the flow information traffic as movement through a series of ports, similar to entering doors of houses owned by other people.…

    • 618 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    NS-2 offers a poor graphical support, no Graphical User Interface (GUI), the subscribers have to directly face to text commands of the electronic devices. Because of the continuing modifying the code base, the result may not be consistent and consist bugs. NS-2 cannot simulate issues of the power consumption, bandwidth or energy saving in WSN. NS-2 has a scalability issue no. of nodes cannot be greater than 100.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Task 2 Describe in detail the OSI model and its each layers responsibility in detail for networking. Application – The application layer is used to enable the user to access the network. This is the only layer in the OSI model that directly interacts with the end user. This layer enables the user to surf the web or transfer files.…

    • 546 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The purpose of the internet layer is to organise or handle the movement of data on network. The meaning of movement of data is routing of data over the network. The main protocol used in the internet layer is IP (internet protocol), however ICMP (Internet control message protocol) and IGMP (Internet group management protocol) are also used in the internet…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Use of multiple routers in interconnected networks: Exchanging information about destination addresses using a dynamic routing protocol. A router has different physical ways to operate network connections, such as: • Fibre optic • Copper cables • Wireless A router also contains several firmware for different networks’ protocol standards.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 1 Assignment

    • 1292 Words
    • 6 Pages

    TCP/IP Transmission control Protocol/Internet protocol used to connect host computers on internet. First internet ARPANET was developed when US Department of research projects agency (ARPA) in the end of 1970s needed a system to share the resources of their big mainframe systems. In start ARPANET used Network Control Protocol but in 1974 TCP protocol was introduced and all pervious protocols were replaced with TCP Protocol. TCP/IP was the leader in protocols used as a communication protocol on the internet. TCP/IP is still being used as a communication protocol in network operating systems (Abbate, 1994).…

    • 1292 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Assignment

    • 867 Words
    • 4 Pages

    The web pages, the content and the web servers, this is the technology that helps the World Wide Web and helps store and manage the internet and the web content. D1: Role of TCP/IP protocol, linking with Application Layer protocol: TCP/IP stands for (Transmission Control Protocol/Internet Protocol); this is part of the Internet Protocol Suite. The role of TCP/IP is to make sure the data that it is receiving is been delivered to the right address, they are a combination of instructions that outline packages of information sent to the user. The TCP/IP contains different protocols HTTP , FTP , SMTP , DNS , RIP and SNMP .…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    With this, a compromised node running malicious code disguised as a legitimate node continuously seeks to find ways to disrupt communication and paralyze the network. However, node compromise attack is severe when the base node is compromised. Therefore, different activities like stealing secrets from the encrypted data, reporting wrong and misleading information to the network, reporting other legitimate nodes as compromised nodes, launching different routing attacks takes place. The best way to counter node compromise is to utilize code testing schemes which employ an optimal program verification process to verify the memory of a sensor node by calculating the hash values of randomly selected memory regions.…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    During the 1980’s the Internet grew exponentially, one reason included the various technical innovations such as more powerful and affordable computers and hardware that made the Internet more accessible to organizations, educational institutions and individuals. In the last 10 years, there has been a spike in the number of mobile devices and personal computers within a household, which aided with the widespread use of the Internet…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    CHAPTER 1 1. INTRODUCTION 1.1 WIRELESS SENSOR NETWORK (WSN): Wi-Fi sensor networks (WSN), once in a while called wireless tool and actuator networks (WSAN), are spatially disbursed autonomous sensors to monitor bodily or environmental situations, which include temperature, sound, pressure, and so forth. and to cooperatively pass their expertise through the network to a major location. The extra brand new networks are bi-directional, additionally sanctioning control of device activity. The improvement of wireless sensor networks became impelled by navy applications like area surveillance; in recent times such networks vicinity unit utilized in numerous industrial and shopper applications, along with manner tracking and management, system…

    • 835 Words
    • 4 Pages
    Improved Essays