Task 1

Figure 1: Wireless Network Diagram

(Source: Microsoft Visio)

 1.0 Wireless Sensor Network and Its Application

The wireless sensor network is an advanced technology in the wireless networking industry. A wireless network consists of several units of sensor nodes connected with proper direction. Each of the units is called nodes which are nothing but small computer devices which are connected with each other to form a network of communication. This Network of communication performs collecting of data, data processing and transferring the data to the appropriate destiny. Nodes are energy efficient multi-functional wireless devices in this Network. There are several hundreds, even thousands, of nodes can be there.

  • Architecture of WSN

The architecture model is inspired by the OSI model, which is the most common in Wireless networks. There are five layers of architecture in WSN which are application layer, transport, data link, and the last one is the physical layer.

  • Characteristics of WSN
  1. Nodes are limited by the consumption of power.
  2. Easy to use
  3. Can able to scale large levels of distribution.
  4. It is able to manage if there is any failure in the node.
  5. Provide a secure environment of communication
  • Advantages of WSN
  1. This can avoid a huge number of wiring.
  2. Centralized monitoring can be possible.
  3. Accommodation of new devices can be made at any time.
  4. No necessarily need of immovable infrastructure to carry out the arrangement.
  • Applications of WSN

There are a huge number of applications of Wireless Sensor Network in health sectors, commercial, military, home, pollution monitoring, water treatments, fire detection, industrial monitoring and many other areas.

Wireless sensor network architecture based on IPv6

The wireless sensor network and its dramatic growth in the communication technology lead to find an incredible application range. In order to achieve point-to-point communication with the computer network there is a need to introduce Wireless communication network based on IPv6. The wireless sensor network based on IPv6 complies with 6LoWPAN “low power Wireless area Network” and it is the standard procedure for the implementation and designing prospective of wireless communication network. With the IPv6 architected scheme of wireless communication the network provides abundant address resources and “steady” communication performance. There are lots of advantages of IPv6 based WSN over other traditional scheme.

There is lot of important technical features will introduce with the IPv6 wireless sensor networking as it provides consistent with the design and architecture. Although there are still some technical difficulties in the implantation of IPv6 auto configuration but also there are advantages like control of massages, “stateless address configuration” required to operater “duplicate address detection”. There it can be finding that it is essential to propose an IPv6 “auto configuration algorithm” in every IP- wireless sensor network. IPv6 auto configuration based “wireless sensor network” provides the better performance than any trndition communicationor sensor network.

In a computer networking system addressing mode is the process of hosting an address on a network. For example IPv6 offers a variety of modes through which a host can be addressed multiple hosts can be addressed at once or the nearest host can be addressed.

  • Unicast mode of addressing

There is a unique way to identify the host in uncast mode of addressing for an IPV6 interface. The source IP address and destination address both are consist within the IPv6 Packet. A unique host is equipped in the network segment with the IP address. Whenever there is any network switch or router receives an Uncast IP Packet, specified for a host, it transmits one of its outgoing interfaces that connect to that specific host.

Figure2: Unicast Mode of addressing


  • Multicast mode of addressing

The multicast addressing mode of IPv6 is similar kind of as IPv4. The specified packet for multiple hosts is sent to a specific multicast address. All hosts interested in that multicast information need to join that multicast group at first. While all the interfaces join the group accept the multicast packet and process it, many other hosts are not interested in the multicast packet and ignore the multicast information.

Figure2: Multicast mode of addressing

  • Any cast mode of addressing

It is the new type of addressing mode that introducing to the IPv6. Here in this addressing mode “multiple hosts are assigned the same Anycast IP address”. If there is a situation occurs that any host wants to communicate with “ a host equipped with an Anycast IP address” therefore it is need to send a unicast massage.

Figure2: Any cast mode of addressing

2.0 Personal and Transferable Skills

  1. Appraise the technologies that are used to develop wireless based networks. 500

The term internet of things begins with connections, but the internet of things is hugely diverse and multi oriented space where it helps to be fit in the communication system. This solution has its own strength and weakness in various wireless network criteria, and it is perfect; ly suited for the internet of things users. Lower Power Wide Area Network is the new occurrence in the internet of things which provide a long range of Network using small batteries that will last for several years. This kind of technology is generally supported by a huge margin of the internet of things network. This technology is mostly applied in various industries and commercial organizations. This can be connected with several types of Network and used by asset monitoring, environmental and ecological tracking, management of facilities etc. this is operated by small blocks of data allowing it to travel at low rates which need high bandwidth and moreover it is not time-sensitive. Both types of networks are created in LPWAN like non-IoT and LTE-M are licensed and MYTHINGS, Lora and Sigfox which are not licensed. There are a few problems in licensed LPWAN like it consumes a high amount of batteries in cellular adaptations.  In non-licensed technologies the concern only occurs where quality services are offered that can ensure security and interoperability in longer usage of the technology. Cellular technology has brief history chapters like 3G, 4G and 5G. This is well established on the market where cellular networks are designed to offer reliable communication via voice connecting and video streaming options. The demerits of the system are that it mostly has huge installation cost as well as operational costs. Huge amounts of power consumption are needed to make in operations. Cellular operations are executed by battery oriented sensor networks. This is applied in connected cards or floor management and logistics. The next generation of cellular technology is 5G which supports high speed of mobility and low latency. This is specially designed to connect with automatic vehicles and visual reality prospects. This has usage of real time video surveillance for population safety measures, medical data analysis for better health care systems, industrial automation. Another technology which is used in today’s technology is Zhen and other Mesh Protocols. This is a shorter range, lower power consumption wireless technology commonly used in mesh to increase the technology by using sensitive data on sensor nodes. Zigbee is able to provide higher data rate as well as power efficiency with respect to LPWAN. Generally it has a range of less than 100 m and it allows use of similar mesh protocols like Z Wave Thread. This is termed as a medium ranged internet of things application which enables even source distribution with close proximity. Zigbee is used as a complement device like Wi-Fi for purposes of home automation like using smart automation. Until the usage of LPWAN meshed technology has several brief industrial applications on this like monitoring censoring data but due to demographic dispersion and complex setup this become obsolete.

  1. Evaluate and compare the various mechanisms that are used to ensure effective communication between mobile devices and the real-world. 500

Meeting overall interface criteria will help to get required advance in technical areas. Some of the involvement of technology are in basic display visualization and interphone oriented technologies. Like high resolution displays, 3D displays, original voice recognition, tactile displays etc. this kind of displays has the orientation to connect the mobile fidelity with the real world by applying sensory and motor nerves and cognitive abilities to be matched on different environment handling and carrying out various tasks simultaneously (Ali et al. 2018). To react to the vision the interfaces might have the ability to provide assistance in bringing the collaboration with the user to accomplish the task. This type of technology is used to make design as best as possible by evolving the human and mobile communication technologies to veneer the interphone like system intelligence and partner shipping the activities (Kuo et al. 2018). This answer does real time analysis of the advanced technologies that are related to system software to the system. The decision includes speech input and output technologies and natural language processing, gesture recognition audio and machine vision etc. The citizen interphone has challenges in evolving the information structure where it works as a standalone chapter to get interfaces in larger scale networks.

3.0 Research, Knowledge and Cognitive Skills

3.1 Demonstrate a comprehensive and critical understanding of the security risks that are associated with a range of mobile devices and formulate suitable strategies for protection of the data held by them.

With the advancement of the technology and increase in the usage of mobile devices leads to increase in the mobile security risks (Cui et al. 2018). The security risk for mobile devices can be several types such as physical threats, networking threats, application related risk, web based security risk.

  • Physical threats:

When someone lost his/her mobile device or if mobile device is stolen by theft this could be very dangerous for that person as the data or information’s stored in that device also lost or may be reach to the wrong hand and sue to this any personal or organizational information leaks and any third party can miss use those data against that person or organization.

  • Networking Risk:

While using an unsecured wireless network there could be a possibility of stolen data by hackers or cyber criminals and they can easily access those information and if Data is not encrypted.

  • Web related risk:

This kind of risk is basically when people visit unauthorized or malicious sites and some time some malicious content automatically downloads on that device which might be risky for the security of that device.

  • Application related Threats:

Sometimes people download apps which are spyware or malware and can steal all the important information from that device on which it is installed even without realizing the people about this activity.

There are a few risks which are based on the above threats individually or combined.

  1. Harmful mobile applications

People often download or install apps from app stores such as play store or any other source. Every Time asks for some permission before allowing downloading the apps. This permission basically wants the access of some files or folders on that device, and most of the Time people grant the permissions without reviewing those in detail (Deng et al. 2018). This can be dangerous as if it is a malicious app and can steal sensitive information and be directed to the third party.

  1. Spyware or malware

Even apple or IOS devices can easily be targets for threats regarding leaking some private or corporate data (Elhoseny et al. 2017). Apple devices are open for spyware attacks as the company realizes that they had three zero-day vulnerability risks. Recently software named Pegasus was discovered to hack any apple device third party use. In case of android devices, Google play protect developed for preventing the cyber-attack or data stool by any spyware or fake apps.

  1. Unsecured wireless Network (public Wi-Fi)

Nowadays there are lots of places having wide availability of Wi-Fi networks such as in coffee shops, public transport, parlors, stadiums and many others, however it can be unsecured. And there may be fake Wi-Fi also as it is not that hard to make a fake Wi-Fi and sometimes this asks the user to create an account using username and password in order to access the Wi-Fi network (Lombardo et al.2017). And this can lead to hacking the device and stolen t\sensitive information.

  1. un encryption of Data

Stolen data can be easily accessed by the hacker or any other third party if the Data is not end-to-end encrypted (Mahmoudzadeh et al. 2018). But an encrypted data cant is accessible easily by the hacker, or no other third party can miss using the Data which can be recovered from a lost device or a stolen.

  1. Inactive software

Often there are certain apps which are removed by Google or apple app stores they find that those apps can cause any security threats or privacy breaches.

  1. Lack of password protection

It has been found that around 32 to 345 people don’t use any password protection in their devices and many of other uses don’t give that much effort while creating a password and ends with a very simple pin, pattern or key as a password which can easily be cracked by thieves or hackers if the device will steal or lost.

  1. Phishing attacks

Phishing attacks are most likely encountered by the mobile devices as this kind of activities can occur through emailing and in this cashew mobile phones are more vulnerable as the user check notification or mails often, and due to the small screen size this display only the sender name unless expanding the notification bar and without informing about it is genuine or not user might some times click on the link of that emails, and this will be the reasons behind the mobile device threat.

  1. Damage Cryptography

Therefore this cannot be difficult for any professional hacker to gain access to the information by performing modification in the encryption algorithm.


  1. Lost device or device is stolen.

When the device is lost unfortunately or stolen by theft and if it reaches the wrong hand like a hacker or cyber criminals they can gain access to that device with their techniques (Minakov et al. 2016). Hackers can access the data such as what are the sites the user often visits, their contact details, sensitive emails and information, apps linked with corporate information.

  1.  Bonnets

Sometimes malware downloaded from some malicious sites user visits and if the device is not protected with antivirus or other security software’s (Henriques and Malekian 2016). Through the malware, hackers can gain access to the devices (Moh’d Alia and Al-Ajouri 2016). The bonnet is basically a network of all these affected devices which allows the hacker to spread spam emails and fraud campaigns.

3.2 Strategies for the prevention of mobile threats

  1. For the protection from malicious apps, it is important to check-in details all the permission that to be allowed before installing any apps (Mohamed et al. 2018). And skip the download if there found any sensitive risk.
  2. For the spyware protection, a user needs to install security apps that restrict malware activities and regularly update software.
  3. Avoid unnecessary access of unsecured public Wi-Fi.
  4. Must use communication apps which provide encryption of data.
  5. People should be aware that if any apps are pre-installed in their devices and which are removed from Google play store or any other official app store due to any malicious activities (Nayak and Vathasavai 2017). Immediately remove from the device.
  6. Always use strong password protection with the device, such as two-factor authentication.

4.0 Research, assess and evaluate the complex relationships which exist between these technologies in real-world mobile devices.

Modern smart phones are not built for only voice calls or text messaging as the earlier generation of mobile (Khasawneh et al. 2018). Modern-day technology brings revolutionary changes in smart phones such as including high-end processors, high-speed connectivity, and wireless connectivity.

The enhanced performance and better user experience can be achieved with these devices by using wireless technology (Kiani and Seyyedabbasi 2018). This makes the device future gadget and makes this technology as the primary source of communication in the modern era (Hammoudeh et al. 2017).. The technology associated with wireless technology in mobile devices is.

5.0 Integrate and synthesize diverse knowledge, evidence concepts, theory and practice in wireless communications, to solve problems.

Wireless communication is the process of transferring information from one place (sender) to the other place (receiver or destination) without using any wired connection or cable (Nguyen et al. 2019). The distance between the senders to the receiver may be short or long in the wireless communication system. Wireless communication is considered as the branch of telecommunication systems. There are several advantages of a wireless communication system over wired communication. In wired communication systems, there are some issues such as propagation and transmission improvements in wireless communication.

Most common examples of wireless communication can be found in mobile networking, GPS systems, television, radio, broadcasting, gaming, modernizing the communication industry.

Wireless communication carried out through radio singles, electromagnetic waves, infrared single or microwave.

  • Advantages
  1. This enables making a backup of the communication link in case of failure in a regular network.
  2. Cables are not used, and hence the cost of cable is saved, and this can be much more expensive for a long-distance communication channel in wired communication.
  3. This helps to establish a connection in work stations.
  4. This builds connections remotely in order to connect mobile users or networks.
  • Disadvantages
  1. If there are collisions in the channels, then there’s a chance of losing the data.
  2. One of the main disadvantages of wireless communication is the capturing effect.
  3. Inter and intra cell interference is the biggest issue in wireless communication.

5.1 Business applications of Wireless communication

The rapid growth in wireless technology influences business activities and helps to expand the business and is easy to operate. This technology impacts the customer, client and employee of the business sector. With the help of wireless communication, remote monitoring becomes possible by connecting computers using new applications. Although there are a number of advantages of wireless communication in business, there are few disadvantages such as overusing technology leads to overload in communication information may lose as there is a lot of communication.

6.0 Critically appraise the networking technologies that are currently used by mobile devices.

The network technology adopted by mobile devices can be wired or wireless network technology as per their capability of adopting.

6.1 Different types of mobile networking

  1. Network technologies offered by mobile networks such as a global system for mobile communication, GPRS general packet radio services, second-generation or 2G network, third-generation or 3G Network and fourth generations or 4G network.
  2. Wired network technology using cable connections such as Local Area Network or LANs the most commonly used LAN technology is Ethernet.
  3. WLAN or wireless LAN or Wireless Local Area Network in public sectors, offices, institutions, Hotspot and Wi-Fi technology. The most popular WLAN technology is Wireless fidelity or in short Wi-Fi.
  4. Network technology such as Bluetooth and infrared connectivity with the nearby devices.

6.2 Application of networking technology

In Smartphone or mobile device network connectivity is important to access the website and web applications, files downloading or uploading of files. File sharing, news update, communication and many others.

  1. In business, making presentations, gathering information, idea sharing, product information, and plan scheduling.
  2. One of the biggest applications of networking technology is to communication; this makes one to one interaction simpler than ever before. This gives the opportunity to build personality, doubt clearing, and question answering customer interaction. Relationship building. Learning, exploring and many more there are limitless advantages in networking technology.
  3. This technology makes it possible to interact with people even if they are not physically present in front of the others. This technology makes easier long distance communication.
  4. Development in the business by promotions and customer care, people awareness, are benefited more by this networking technology.

6.3 Limitations of mobile networking

There can be a problem in maintaining the safety and security in the devices and the data stored in it as this information can be stolen and accessed by third parties easily through hacking skills.

As infrared light is not able to pass through obstacles, connectivity hampers and also in case of Bluetooth networking it cannot use effectively after a certain distance and loses the connection with the paired device after a certain distance and this leads in the communication to be interrupted.

There is also increased cyber security risk with the developing network technologies. Using these technology hackers can access sensitive information of any users even without realizing them. This is the biggest disadvantage of networking technology.

7.0 Professional Skills

7.1 Demonstrate a comprehensive knowledge of the hardware technologies that are currently used by mobile devices. 600

According to information communication technology mobile technologies are nothing but the computing of smart phones gadgets and other electronic devices such as laptops, tablets etc.  These are powerful tools in the communication technology world.

There is much similarity in the hardware technology in small devices such as mobile phones and smart phones with the hardware technology of desktop computers (Kocakulak and Butun 2017). However there are some factors for the comparison of the components of both smart phones and desktop computers.

The on screen keyboard of a Smartphone is much smaller in size than a regular keyboard of a computer. Smart phone screen is a touch screen feature and small in size as compared to the desktop screen.

Although standard computers give much better performance in terms of serious commuting tests, they are fast and effective (Kumar and Ilango 2018). But smart phones and Tablets are best suited for location based computing tasks and portability. These are the technologies which provide improved services with network connectivity and GPS support.

7.2 Hardware technology in mobile device and computing

Hardwires are the main components in the build of electronic devices. There are various hardwires and implementing technologies for mobile devices such as input devices, output devices, storage devices, processing devices and many other types of hardware.

  1. Input devices are responsible for making the interaction possible to the user with the smart devices. Most commonly used input devices are touch sensitive screens, microphones, card readers, keyboards etc.
  2. Output devices are used for providing the response of smart devices to the user and make the response understandable by the user. The response of the Smartphone or mobile devices are many in the form of images, documents, sounds, lights etc. the most commonly used output devices are display, speakers etc.
  3. Storage devices are used to store data. Depending upon the processing speed, capacity and portability there are different types of storage devices used. SD/memory card, pen drives used in mobile technology to store data, RAM and ROM are other types of storage elements in smart phones.
  4. Processing devices are such as processors or graphics processing units used for the performing the task and operations in the smart devices.
  5. Power supply elements such as batteries with different capacities are used to run the smart devices and mobiles.

Reference list


Ali, N.S., Alkaream Alyasseri, Z.A. and Abdulmohson, A., 2018. Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and Mobile Application. International Journal of Electrical & Computer Engineering (2088-8708)8.

Cui, L., Xu, C., Li, G., Ming, Z., Feng, Y. and Lu, N., 2018. A high accurate localization algorithm with DV-Hop and differential evolution for wireless sensor network. Applied Soft Computing68, pp.39-52.

Deng, F., Yue, X., Fan, X., Guan, S., Xu, Y. and Chen, J., 2018. Multisource energy harvesting system for a wireless sensor network node in the field environment. IEEE Internet of Things Journal6(1), pp.918-927.

Elhoseny, M., Farouk, A., Zhou, N., Wang, M.M., Abdalla, S. and Batle, J., 2017. Dynamic multi-hop clustering in a wireless sensor network: Performance improvement. Wireless Personal Communications95(4), pp.3733-3753.

Hammoudeh, M., Al-Fayez, F., Lloyd, H., Newman, R., Adebisi, B., Bounceur, A. and Abuarqoub, A., 2017. A wireless sensor network border monitoring system: Deployment issues and routing protocols. IEEE Sensors Journal17(8), pp.2572-2582.

Henriques, V. and Malekian, R., 2016. Mine safety system using wireless sensor network. IEEE Access4, pp.3511-3521.

Khasawneh, A., Abd Latiff, M.S.B., Kaiwartya, O. and Chizari, H., 2018. A reliable energy-efficient pressure-based routing protocol for underwater wireless sensor network. Wireless Networks24(6), pp.2061-2075.

Kiani, F. and Seyyedabbasi, A., 2018. Wireless sensor network and internet of things in precision agriculture. International Journal of Advanced Computer Science and Applications (ijacsa)9(6).

Kocakulak, M. and Butun, I., 2017, January. An overview of Wireless Sensor Networks towards internet of things. In 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 1-6). IEEE.

Kumar, S.A. and Ilango, P., 2018. The impact of wireless sensor network in the field of precision agriculture: A review. Wireless Personal Communications98(1), pp.685-698.

Kuo, Y.W., Li, C.L., Jhang, J.H. and Lin, S., 2018. Design of a wireless sensor network-based IoT platform for wide area and heterogeneous applications. IEEE Sensors Journal18(12), pp.5187-5197.

Lombardo, L., Corbellini, S., Parvis, M., Elsayed, A., Angelini, E. and Grassini, S., 2017. Wireless sensor network for distributed environmental monitoring. IEEE Transactions on Instrumentation and Measurement67(5), pp.1214-1222.

Mahmoudzadeh, S., Powers, D.M. and Atyabi, A., 2018. UUV’s hierarchical DE-based motion planning in a semi dynamic underwater wireless sensor network. IEEE transactions on cybernetics49(8), pp.2992-3005.

Minakov, I., Passerone, R., Rizzardi, A. and Sicari, S., 2016. A comparative study of recent wireless sensor network simulators. ACM Transactions on Sensor Networks (TOSN)12(3), pp.1-39.

Moh’d Alia, O. and Al-Ajouri, A., 2016. Maximizing wireless sensor network coverage with minimum cost using harmony search algorithm. IEEE Sensors Journal17(3), pp.882-896.

Mohamed, R.E., Saleh, A.I., Abdelrazzak, M. and Samra, A.S., 2018. Survey on wireless sensor network applications and energy efficient routing protocols. Wireless Personal Communications101(2), pp.1019-1055.

Nayak, P. and Vathasavai, B., 2017. Energy efficient clustering algorithm for multi-hop wireless sensor network using type-2 fuzzy logic. IEEE Sensors Journal17(14), pp.4492-4499.

Nguyen, T.T., Pan, J.S. and Dao, T.K., 2019. An improved flower pollination algorithm for optimizing layouts of nodes in wireless sensor network. Ieee Access7, pp.75985-75998.

Pan, J.S., Kong, L., Sung, T.W., Tsai, P.W. and Snášel, V., 2018. α-Fraction first strategy for hierarchical model in wireless sensor networks. Journal of Internet Technology19(6), pp.1717-1726.

Saeed, N., Al-Naffouri, T.Y. and Alouini, M.S., 2018. Outlier detection and optimal anchor placement for 3-D underwater optical wireless sensor network localization. IEEE Transactions on Communications67(1), pp.611-622.

Salman, A.D., Khalaf, O.I. and Abdulsahib, G.M., 2019. An adaptive intelligent alarm system for wireless sensor network. Indonesian Journal of Electrical Engineering and Computer Science15(1), pp.142-147.

Saranya, V., Shankar, S. and Kanagachidambaresan, G.R., 2018. Energy efficient clustering scheme (EECS) for wireless sensor network with mobile sink. Wireless Personal Communications100(4), pp.1553-1567.

Sharma, H., Haque, A. and Jaffery, Z.A., 2018. Solar energy harvesting wireless sensor network nodes: A survey. Journal of Renewable and Sustainable Energy10(2), p.023704.

Zhan, C., Zeng, Y. and Zhang, R., 2017. Energy-efficient data collection in UAV enabled wireless sensor network. IEEE Wireless Communications Letters7(3), pp.328-331.

Leave a Comment