Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  A Latest Review of 4G and 5G Mobile Wireless Networks Techniques in Wi-Fi Networks Architecture and Challenges  
  Authors : Umesh Seghal; Vimal Dev
  Cite as:

 

Wireless technologies have become increasingly popular every day in business as well as in personal lives. Wireless technology provides us many benefits like portability and flexibility, increased productivity, and lower installation costs. The IEEE 802.11 specification (ISO/IEC 8802-11) is an international standard describing the characteristics of a wireless local area network (WLAN). The name Wi-Fi (short for "Wireless Fidelity", sometimes incorrectly shortened to Wi-Fi) corresponds to the name of the certification given by the Wi-Fi Alliance, formerly WECA (Wireless Ethernet Compatibility Alliance), the group which ensures compatibility between hardware devices that use the 802.11 standard. Today, due to misuse of the terms (and for marketing purposes), the name of the standard is often confused with the name of the certification. In this paper we are discussing about the wireless network challenges and IEEE 802.11 Standards and WEP protocol. Currently the 4G’s concept is marching towards the standardization phase. So time has come to introduce a new technology in which we can connect to multiple wireless technologies, networks, terminals and applications, all simultaneously and can also switch between them. This latest technology is named as 5G.

 

Published In : IJCSN Journal Volume 4, Issue 5

Date of Publication : October 2015

Pages : 724 - 726

Figures :--

Tables : --

Publication Link : A Latest Review of 4G and 5G Mobile Wireless Networks Techniques in Wi-Fi Networks Architecture and Challenges

 

 

 

Umesh Sehgal : Assistant Professor in GNA University, Phagwara.He has completed M.Phil, MCA, M.Sc (CS).He had 14 years of Teaching Experience.

Vimal Dev : Assistant Professor in GNA University, Phagwara.He has completed M.Tech, B.Tech. He had 01year of teaching experience.

 

 

 

 

 

 

 

WI-FI

WEP

SSID

MAC

Wi MAX

DoS

Wi-Fi security is not an easy task. Wireless network security is more difficult than wired network security. The future is becoming more and more difficult to predict with each passing year. So we should always expect an increasing pace of technological change. In this paper, the main importance is on 5G mobile phone concept and its architecture which is going to be a new mobile revolution in mobile market. The 5G technologies incorporate all type of advanced features which makes 5G mobile technology most powerful and in huge demand in near future. There are many protocols or standards or we can say technologies for wireless network security but every protocol has its demerits, until now there is no protocol which can provide security 100% or near about it.

 

 

 

 

 

 

 

 

 

[1] Robert J.Boncella, Wireless security: an overview, Washburn University ZZbonc@washburn.bdu. [2] Prof. Anand Nayyar, " Security Issues on Converged Wi- Fi & WiMAX Networks ", Department of Computer Science, K. L. S. D College Ludhiana ,anand_nayyar@yahoo.co.in. [3] Paul Asadoorian, " Wireless network security ", GCIA, GCIH. Contributions by Larry Pesce, GCIA , GAWN PaulDotCom. [4] Paul Asadoorian, " Wireless network security? ", GCIA, GCIH, GAWN PaulDotCom. [5] Rakesh M Goyal and Ankur Goyal, " Securing Wi-Fi network (10 steps of diy security) ". [6] Sheila Frankel Bernard Eydt Les Owens Karen Scarfone, " Establishing wireless robust security networks: a guide to IEEE 802.11i ". [7] Sangram Gayal And Dr. S. A. Vetha Manickam, " Wireless LAN security today and tomorrow ". [8] Sangram Gayal And Dr. S. A. Vetha Manickam, " Wireless LAN security ". [9]http://compnetworking.about.com/od/wirelesssecurity/a/intro duction-to-wifi-network-security.htm [10]http://www.hsc.fr/ressources/articles/hakin9_wifi/index.htm l.enWireless network security 802.11, Bluetooth and handheld devices by Tom Karygiannis, Les Owens. [11] A. A. Name, "Conference Paper Title", in Conference Name, Year, Vol. x, pp. xxx-xxx. [12] http://www.dummies.com/how-to/content/wirelesssecurity- protocols-wep-wpa-and-wpa2.html.