You are on page 1of 43

MOBILE AND WIRELESS

TECHNOLOGY
CT090-3-2-MWT
PRESENTED BY:
AADITYA JHA (NP000290)
DRISHTI RANA MAGAR (NP000306)
MANISHA REGMI (NP000313)
PRANESH MAHARJAN (NP000323)
INTRODUCTION

• Wireless Network enables multiple devices to connect on the same network remotely, as well
as share resources and files

• Wired Networks are unable to provide remote access or mobile access to devices. Since,
most of the devices are getting smart and requires a wireless access, having a wireless
network system is most essential for any businesses or homes

• We have been assigned to deploy the WLAN in Genese Software Solutions.


SITE SURVEY

• As stated in the scenario of the project, the project is about the proposal of changing the
network architecture of Genese Software Solutions from wired LAN to wireless LAN (WLAN).

• By recognizing the flaws of wired network connection this deployement of Wireless LAN was
essesntial.
REQUIREMENT GATHERING

• We have prepared some questions to be asked to the company stakeholders, managers and
employees. They are:
• What are the problems that you are facing in current network system?
• Do you agree that the wireless network will bring an effective change in the working of
this office? Will you be benefited personally with the proposed network system?
• What are the estimated nodes and users in this office?
SIZE OF AREA

• The office has one floor of about 200 square


feet. It has four rooms and one reception.
The employee room has about 10-15
computers and about 10 employees require
a wireless connection to their computers,
laptops and smartphones. 
NUMBER OF
User Group Minimum Maximum USERS
Boss 1 1 • The total estimated user in the
Employee 1 15 Genese office is about 20 to
30. There are 10 employees
Receptionist 1 1
working in this office, 1
Visitors 0 10 receptionist, 1 boss and office
might have about maximum of
Total 3 27
10 visitors at a time.
• Access Point:
 We have deployed UBIQUITI UNIFI UAP-AC-PRO-US access point in
Genese Software Solution.
HARDWARE  It has 802.11ac long range access point integrated with latest Wi-Fi

COMPONENT  802.11 ac technology and UniFi controller that is easy to mount and
configure and has omnidirectional antennas that support better Wi-
Fi coverage. 
• Network Interface Card (NIC):
 Smart  plugin port integrated that TRENDnet 10/100/1000Mbps
supporting 32-bit and built-in FIFO buffer
HARDWARE  Supports  IEEE 802.1Q VLAN tagging along with full-duplex mode

COMPONENT
that doubles data rate to 20/200/2000Mbp
• Router
 The 802.11ac RT-AC88U offers a definite range along with 8 Gigabit
LAN port and has dual-band AC3100 connection.
 has integrated backhaul to provide ultrafast connection
SOFTWARE COMPONENT

• Intrusion Detection Software


 It is a software application that checks for suspicious activity from the traffic of network flowing
through it.
• Antivirus
• It checks for attacking behavior attached while file sharing, or using any host resources and It
ensures network security, data corruption, system crash and permission change of any
user/device and upgrades virus signature database to eradicate/eliminate virus.
SOFTWARE COMPONENT

• Firewall

• It defines granularity and scalability that speed and simplify deployment. It protects from
malicious files and applications before they interrupt to our system. 
MONITORING

• It is a process where all the networking components are monitored for fault and performance
such as failing routers, crashed serves and so on.
• Performance Monitoring
 Performance monitoring is a process that measures, evaluate and analyze the
performance of network
• Fault Monitoring
 Fault monitoring refers to analyzing the network problems. It monitors the fault with the
various layers of network
• Account Monitoring
 It monitors and keep tracks of devices that are often used on a network by the users.
MAINTENANCE

• Maintenance includes troubleshooting network problems, monitoring performance,


hardware software installation and many more.
• Preventive Maintenance
 Preventive maintenance is the process done before a failure that includes checking
backups, security and protection. It helps in identifying the weak lines in system and
correct it before it causes damage to the system.
• Corrective Maintenance
 Corrective maintenance is a process of maintenance task that is done to identify fault
and restore the fault in time before any other significant breakdown occurs
CONSIDERATIONS

• To plan future network usage.


• Updating technology and troubleshooting problems.
• To provide and transmit signal efficiently.
• To maintain network strength and secure from unwanted threats.
• Creating reviews of network and keeping up-to-date documentation
CONCLUSION

• The main objective of this project was to prepare us for deploying the WLAN in any given
scenario

• We did site survey, research on different hardware and software requirements, security
implementation requirements and Monitoring and maintenance plan which are the basis for
setup of WLAN
INTERNET OF
THINGS
Presented By:
Aaditya Jha
NP000290
Bsc. IT 3rd , Sec B

This Photo by Unknown author is licensed under CC BY-NC-ND.


Introduction

■ It is defined as a collection of interrelated computing devices, machines, humans,


animals or objects which could be uniquely identified and capable of transferring
information over a network excluding human-human interaction or human-machine
interaction. 
History of IOT

■ The term "Internet of things" was first used by Kevin Ashton during a presentation on
supply-chain management with radio frequency identification (RFID) in 1999.

■ The computers at that time were completely dependent on humans for information and
about 50 petabytes of data on the Internet at that time were stored by humans by typing
or pressing a record button.

■ Due to this reason the thought of developing computers or devices in such a way that
they may capture data about things of real world by their own. 
Scope

■ The IOT will build a huge network of billions and trillions of "things". The latest studies
says that there is around 50 billion IOT devices across the globe.
■ People have shifted more towards the automation. IOT is now being used in every field
of science like health, research, engineering, etc.
Anaysis

■ The major feature of IOT is the integration of different types of collaborative and
communication technologies for collecting comprehensive data.
■ The major applications of IOT are:
– Automotive and transportation industry
– Smart Cities
– Health Care industry
– Assistive and wearable devices
– Agriculture
– Supply chain industry
Limitations

■ Insecure wireless communications

■ Privacy

■ Complexity

■ Data Management
Recommendation

■ Users should be concern on what data to be provided and how the data is being handled
by the device and they should protect their usernames and passwords and avoiding the
use of default username and passwords.

■ Checking out what security mechanisms and protocols is being followed by the devices
and the company that operates it.
LIFI(Light Fidelity)
PRESENTED BY: DRISHTI
RANA(NP000306)
Introduction
•It is Visible Light Communication (VLC) that transfers data in high speed through illumination.
•It uses fiber optics to send data at high intensity speed via light emitting diodes (LED) to fully
networked wireless system.
•Transceiver is used for sending or receiving data, and it makes LED to carry the data using light.
•In 2011, Professor Harold Hass from University of Edinburgh in UK introduced wireless network
technology Li-Fi as “Data through illumination”.
Analysis
•Li-Fi system consists a light emitter i.e. LED transmitter on one end
and a photo detector (light sensor) on the other end.
•When current is passed to the LED bulbs photons are emitted which
is a visible light which are passed in extremely high speed.
•The data passed is detected by the photo detector in binary form and
it converts back to the electrical current.
• The receiver (photo detector) receives the information in form of
light signal and decodes it back into original form to display on the
device.
Advantages of Li-Fi
Speed and bandwidth:. The data transfer rate of Li-Fi is hundred times faster than Wi-Fi and provides
unprecedent bandwidth expansion.
Efficiency: Li-Fi works with the LED bulbs to communicate which makes it more efficient for the cost and
power consumption.
Availability: The Li-Fi will be available everywhere where there is a Light source so there will not be any
problems in data transmission.
Security: The data transmission security is high in Li-Fi as light cannot penetrate opaque object which
makes the chances of unauthorized access low.
Low latency: Li-Fi can process or transfer huge amount of data with less delay. It provides three times low
latency than Wi-Fi that enables automation, innovation and application to AR and VR.
Interference free: The interference is vulnerable to radio frequency (RF) in many devices like microwaves,
Wi-Fi networks. In this case, Li-Fi can be used in RF hostile zones like airplane, power plants, hospitals.
Scopes of Li-Fi
Health Care Application: Wi-Fi cannot be used due to radiation concerns in operation theaters
because interfere the medical equipment’s. As Li-Fi uses light, it can be used for accessing internet
and also control the medical equipment’s.
Education Systems: Using Li-Fi the internet speed will be faster that makes the users to work easier.
Aircrafts: Inside the airplanes use of Wi-Fi is banned as it interferes with the navigational system of
plane. Li-Fi can be used as safe alternative with faster internet access.
Underwater: Li-Fi can be used like a high-power submerged lamp that allows to receive and send
data faster and autonomously.
Powerplants: Li-Fi can be used as it depends on light waves and does not produce any
electromagnetic and radio signal interference.
Drawbacks of Li-Fi
•It is expensive as it Large amount of money is invested for the research and development and also it
requires specialized new infrastructure which is costly.
•Li-Fi cannot be implemented in existing light, it needs new LED bulb containing VLC modulation
controller.
•Li-Fi provides shorter range of internet services. As the opaque object cannot pass light it will be
limited to only that room.
•The Li-Fi connection will be disturbed by the sunlight and other optical sources like household
lightening.
•In Li-Fi providing uplink service is hard it has only high downlink speeds. Which can interfere the
downloading signal.
•The Li-Fi only works when the transmitter and receiver have direct line of sight.
Recommendation
•Instead of replacing the existing light source it would be better to integrate Li-Fi to existing light
sources.
•Some changes should be made to the system so that the natural light sources like sunlight
shouldn’t interfere with the data transmission.
•Li-Fi should be developed which is affordable to normal users.
Conclusion
Li-Fi evolving and growing technology in near future and acting as medium to develop other new
technologies. Using this technology in future will help the environment to be cleaner, greener
and safer for the mankind by reducing the use of radio frequency. It solves the problems like low
internet connection, lack of radio spectrum which makes it safer to use Although it has also many
limitations in due course of time certain improvements and redefinition will be made in the field
of data transmission with extended platforms to make human life comfortable.
Individual Part
Manisha Regmi |NP000313
(WiMAX Technology)
Introduction
 WiMAX is a Wireless broadband solution which enables mobile and fixed broadband
network to converge with broadband radio access technology and scalable network
architecture, based on the IEEE 802. 16-2004 Air interface standard.

 With the orthogonal frequency division Multiple Access (OFDMA), WIMAX Air Interface
supports the 1,25 to 20 MHz scalable band width channel that enhances multi-path
performance in a non-line-of-sight environment.

 Mobile WiMAX systems provide both radio connectivity and network architecture
scalability, offering great versatility in the use of networks and services.
Scope of WiMAX
 Holographic Massive-MIMO
 Surplus capacity for vertical industries
 As a backhaul solution
 Nomadic Broadband
Analysis and Impact of WiMAX
Analysis
 WiMAX has important feature of point to multipoint architecture that has
various subscriber stations connected to one main station.
 Diffie Hellmann protocol allows certification to authenticate exchange of any
management information.
Impact
 It is a great solution for internet connectivity and information provision but
offer effective mechanism of communication while you are out of range with a
specified network and offers low speed connectivity in workplace.
Limitations
 Low bit rate over Long distance
 Speed of connectivity
 Sharing of bandwidth
 WiMAX over Wi-Fi and its different architecture
Recommendations
 Authorization
 Access control
 OFDM
Individual Part
Pranesh Maharjan |NP000323
(Long Term Evolution-LTE)
Introduction

 Long Term Evolution is a project of 3GPP (3rd Generation Partnership Project, the group
responsible for standardizing and improving UMTS (3G) designated as the new network
technology.

 LTE is the successor of Global System for Mobile Communication (GSM/2G) and
Universal Mobile Telecommunication Service (UMTS/3G).

 It aims to provide seamless Internet Protocol (IP) connectivity between the user equipment
(UE) and the packet data network (PDN) during mobility, without any interruption to the
applications of end-users.
Scope of LTE
 Telemedicine
 Virtual Reality
 HD Video Streaming
Analysis and Impact of LTE
Analysis
LTE uses different types of radio links/ air interface one downlink from base station to user
equipment and other uplink form user equipment to base station. The LTE has 3 Sub-
system and they are
1. User Equipment
2. E-UTRAN
3. Enhanced Packet Core (EPC)
Impact
Engine of growth
Low cost
Limitations
 Low throughput at edge area
 Low quality of service
 Skilled manpower
 Expensive hardware
Recommendations
 The antenna should be properly planned and installed so it covers the
maximum area.
 The protocol should be properly defined and parameters should be set
to achieve the Key Parameter Indicators. So, it will not reduce the QoS.
 The operator and government should organize the training to produce
the skilled manpower. As the technology is developed in other
countries engineers should be provided the opportunity to learn about
LTE.
THANK YOU

You might also like