logo

Network and Security Assignment PDF

26 Pages2127 Words51 Views
   

Added on  2021-06-18

Network and Security Assignment PDF

   Added on 2021-06-18

ShareRelated Documents
Running head: NETWORK AND SECURITYNetwork and SecurityName of the StudentName of the UniversityAuthor Note
Network and Security Assignment PDF_1
1 NETWORK AND SECURITYTable of ContentsAnswer 1..............................................................................................................................2Answer 2..............................................................................................................................4Answer 3..............................................................................................................................5Answer 4..............................................................................................................................6References..........................................................................................................................24
Network and Security Assignment PDF_2
2 NETWORK AND SECURITYAnswer 1Worldwide Interoperability for Microwave Access is a wireless network that is dedicatedto the advancement of IEEE 802.16 standards. Wimax is based on wide area network and offersa faster speed in comparison to WiFI. The common term for Wimax is 4G and is quite popularacross the world. It is a technology that offers a long range wireless networking for mobile andfixed connection as well. This technology is adopted by many people across the world andtherefore, proper security of this network is a must need. The most common encryption standardsthat are used in WiMax technology is 3DES or triple data encryption standard, AES or Advancedencryption standard and RSA (Thambiraja, Ramesh & Umarani, 2012). There are certaindifferences between these three encryption algorithms the basic one being the difference in theencryption keys that are used in the encryption algorithm. In 3DES, three keys of 56 bits each areused in encryption; in AES, 128 bit, 192 bit and 256 bit encryption keys are used. RSA on theother hand make use of both public and private keys for encryption and decryption. These threeencryption standards has certain contrasting characteristics, which are discussed below- CharacteristicFeaturesTriple DataEncryption standardAdvancedEncryptionStandardRSADefinition of thestandard 3DES is the advancedversion of traditionaldata encryptionalgorithm. It is a typeof symmetric blockcipher that runs thetraditional dataencryption algorithmthree times on aparticular block ofdata and thus it ismore secure that thetraditional algorithm. Advanced encryptionalgorithm is asymmetric blockcipher that allowsblock length of only128 bits and keylengths of 128, 192and 256 bits forencryption.The RSA encryptionstandard is a publickey encryptiontechnology that makesuse of primefactorization forencryption of aparticular data (Singh,2013). The Required KeySince this algorithmThe key sizes in AESRSA is a public key
Network and Security Assignment PDF_3
3 NETWORK AND SECURITYSize For Encryptionapplies the traditionalDES algorithm, threetimes on a particulardata, it makes use ofthree keys, of 56 bitseach. are 128 bits, 192 bitsand 256 bits (Aleisa,2015). encryption standardand therefore makeuse of 2048 bit keysThe RequiredComputation Timefor EncryptionThe speed ofencryption is highestin 3DES incomparison to theother two algorithmsand therefore thecomputation time isleast in the same(Adhie et al., 2018).However, the speed ofcomputation of AESis quite similar to3DES. The computationspeed is higher incomparison to RSA The speed ofencryption in least inRSA as it is the mosttime consumingmethod of encryptionPerformance Level3DES is an advancedform of DES withimprovedperformance AES is the bestencryption algorithmin comparison to RSAand 3DESThere are certainperformance lagsassociated with RSA. Memory Usage Memory usage is lessin comparison to RSAencryption standardbut is higher thanAESAES makes use ofconsiderably lessermemory incomparison to 3DESand RSA. Memory usage isquite high in RSA. Table 1: Showing the differences among 3DES, AES and RSAAnswer 2Shared wireless medium provides a channel for information transfer in a shared medium.The rate of data flow is slower in a shared medium mainly because of the possible collisions. Thecoordination of traffic is therefore essential in order to reduce or eliminate the possibility ofcollisions in shared wireless medium (Younus, Fazlul & Islam, 2015). Since the collision is themain reason for the delays that are faced in the wireless networks, it is needed to be addressed.
Network and Security Assignment PDF_4
4 NETWORK AND SECURITYIn shared wireless medium, the traffic is coordinated with the help of Carrier SensedMultiple Access or CSMA technology (Laufer & Kleinrock, 2016). This technology is mainlyused to the shared network topologies such as Ethernet in order to control the access to theparticular wireless network. This technology is mainly used for collision detection and is notablyused on wireless technology. This technology is used in controlling the traffic in shared wirelessmedium as it make use of carrier sensing for deferring the active transmissions in wirelessmedium until no other stations are transmitting and the channel is free. It further helps indetection of the collision in the channel, which in turn helps in coordinating the traffic of ashared wireless medium. Prevention of collision or reducing the number of collision in a networkis a must need. CSMA controls the traffic by stopping the transmission of the frame and in turntransmitting a jam signal (Sen, Choudhury & Nelakuditi, 2012). The channel then waits for aparticular or a random time interval before resending the frame. Apart from CSMA, there are certain additional methods that can reduce the collisions inshared wireless medium. These are RTS and CTS techniques that are capable of implementing avirtual carrier sensing for collision avoidance in shared wireless medium (Sahoo, Rath & Puthal,2012). Request to Send and clear to send is optionally used in mediating the access in sharedmedium in order to detect or avoid collision. In this method, a node can send only if it receives aCTS signal. The node can receive a CTS signal only if it has generated a RTS or request to sendsignal. On sending the request to send signal, to the receiver, the sender waits for the CTS signalbefore transmitting the packet in the wireless medium. This reduces the chances of collisionthereby helping in traffic control in shared wireless medium. This method can however, result insubsequent delays in transmission of data and therefore, CSMA is supplemented by RTS/CTSonly when required.
Network and Security Assignment PDF_5
5 NETWORK AND SECURITYAnswer 3In the past several years, there has been a rapid development in the field of wirelessnetworking. The development of ZigBee technology is one of the results of the increasingdemand for low data and low power networking applications. The ZigBee technology wasmainly developed for the wireless personal area networks and is mainly used in the militaryapplications. The devices with the backbone of ZigBee technology mainly operates in thefrequency scale of 868 MHz, 915 Mhz and 2.4 GHz frequency bands (Elarabi, Deep & Rai,2015).. The maximum data rate that can be achieved with the ZigBee technology is 250K bits persecond. ZigBee can be further discussed as a specification for high level communication bymaking use of small, low power and low cost radios. The use of internet of things has considerably increased over the years. The Internet ofthings is a technology that remained unexplored for many years. According to Zorzi et al., (2010)the current situation of the many intranet of things should evolve in a much more integrated andheterogeneous system. Although the term internet of things was coined more than 10 years ago,the technology could be explored only in recent years. With the increase in adoption and use ofIOT devices, it is expected that there will be certain improvements even in the unexploredterritory of Internet of things. The theme of internet of things can be seen as the concept that hasoriginated from the different converging topics. For example, the radio frequency identifierswere originally introduced in order to overcome the limitations of the barcode technology. Therehas been a considerable development in the field of RFID technology. The researches associatedwith the RFID are slowly growing together as the sensor and the sensor nodes in RFID arebecoming smaller and highly integrated. The recent RFID tags are equipped with more
Network and Security Assignment PDF_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireless Networking Concepts: Assignment (Doc)
|7
|1115
|120

Network And security Assignment PDF
|23
|1376
|18

Assignment On Wireless Networking Concepts (Doc)
|9
|1534
|47

Wireless Networking | Assignment
|9
|1836
|43

Signal Processing and Wireless Networks (pdf)
|5
|1174
|22

Wireless Networking Concepts (Doc) : Assignment
|9
|1506
|40