Wireless Networking Concepts: Assignment (Doc)
VerifiedAdded on  2021/06/17
|7
|1115
|120
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: WIRELESS NETWORKING CONCEPTS
Wireless Networking Concepts
Name of the Student
Name of the University
Author Note
Wireless Networking Concepts
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
WIRELESS NETWORKING CONCEPTS
Table of Contents
Answer 1..............................................................................................................................2
Answer 3..............................................................................................................................4
References............................................................................................................................6
WIRELESS NETWORKING CONCEPTS
Table of Contents
Answer 1..............................................................................................................................2
Answer 3..............................................................................................................................4
References............................................................................................................................6
2
WIRELESS NETWORKING CONCEPTS
Answer 1
WiMAX or Worldwide Interoperability for Microwave Access is an IEEE 802.16 set of
standards based standard of wireless communication. It provides options for controlling multiple
physical layer and media access. The three encryption standards that is used by WiMax
technology is triple DES or 3DES, AES and RSA. The triple data encryption standard makes use
of three different encryption keys, each of 56 bits for encryption. In AES or Advanced
Encryption standard the keys of 128-bit, 192-bit or 256-bit encryption keys are used for
encryption. RSA or public key encryption technique that makes use of both public and private
key decrypting and encrypting a particular input, is used in WiMax as well. The comparison
among the different WiMax technologies is as follows (Singh, 2013)-
Characteristics 3DES AES RSA
Definition 3DES is asymmetric
block cipher that applies
DES algorithm 3 times
in an input in order to
encrypt a data (Adhie et
al., 2018).
Advanced encryption
standard is a symmetric
block cipher that makes
use of 128bits block
length and key lengths
of 128 bits, 192 bits and
256 bits.
RSA is also known as a
public key technology
of encryption that is
developed by RSA data
security. It makes use of
prime factorization as
the base of data
encryption
Key size Three keys of 56 bits AES make use of keys
of 128, 192 and 256 bit
keys (Aleisa, 2015).
2048 bit keys are more
popular for use with
RSA
Computation time Computation time is
least in 3DES; however,
AES provides the
highest speed ratio of
RSA is the most time
consuming methods of
WIRELESS NETWORKING CONCEPTS
Answer 1
WiMAX or Worldwide Interoperability for Microwave Access is an IEEE 802.16 set of
standards based standard of wireless communication. It provides options for controlling multiple
physical layer and media access. The three encryption standards that is used by WiMax
technology is triple DES or 3DES, AES and RSA. The triple data encryption standard makes use
of three different encryption keys, each of 56 bits for encryption. In AES or Advanced
Encryption standard the keys of 128-bit, 192-bit or 256-bit encryption keys are used for
encryption. RSA or public key encryption technique that makes use of both public and private
key decrypting and encrypting a particular input, is used in WiMax as well. The comparison
among the different WiMax technologies is as follows (Singh, 2013)-
Characteristics 3DES AES RSA
Definition 3DES is asymmetric
block cipher that applies
DES algorithm 3 times
in an input in order to
encrypt a data (Adhie et
al., 2018).
Advanced encryption
standard is a symmetric
block cipher that makes
use of 128bits block
length and key lengths
of 128 bits, 192 bits and
256 bits.
RSA is also known as a
public key technology
of encryption that is
developed by RSA data
security. It makes use of
prime factorization as
the base of data
encryption
Key size Three keys of 56 bits AES make use of keys
of 128, 192 and 256 bit
keys (Aleisa, 2015).
2048 bit keys are more
popular for use with
RSA
Computation time Computation time is
least in 3DES; however,
AES provides the
highest speed ratio of
RSA is the most time
consuming methods of
3
WIRELESS NETWORKING CONCEPTS
there is very minor
difference between
3DES and AES.
encryption, however,
the speed decreases with
the increase in the input
size file
encryption (Thambiraja,
Ramesh & Umarani,
2012).
Memory Usage Has lesser memory
usage in comparison to
RSA but consumes
higher memory in
comparison to AES.
AES has least memory
usage
High memory usage
Performance Performance of 3DES is
comparatively much
better than DES
AES performs better in
comparison to 3DES
and RSA
Performance level of
RSA is lower in
comparison to 3DES
and AES.
Table 1: Showing the comparison among 3Des, AES and RSA
WIRELESS NETWORKING CONCEPTS
there is very minor
difference between
3DES and AES.
encryption, however,
the speed decreases with
the increase in the input
size file
encryption (Thambiraja,
Ramesh & Umarani,
2012).
Memory Usage Has lesser memory
usage in comparison to
RSA but consumes
higher memory in
comparison to AES.
AES has least memory
usage
High memory usage
Performance Performance of 3DES is
comparatively much
better than DES
AES performs better in
comparison to 3DES
and RSA
Performance level of
RSA is lower in
comparison to 3DES
and AES.
Table 1: Showing the comparison among 3Des, AES and RSA
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
WIRELESS NETWORKING CONCEPTS
Answer 3
With the emergence of wireless networking, there has been a constant increase in
adoption of long range applications that have high speed. The demand of these technologies has
considerably increased over the years. The popular demand to develop networking of low power
and low data has resulted in the formation of Zigbee technology. Not only the wireless networks,
but also the use of internet of things has considerably increased. However, there are certain
challenges associated with the use of Internet of things (IOT) and wireless. The challenges
associated with the IOT and wireless technology can be mitigated by taking proper measures.
Zigbee is one of the most widely adopted wireless communication technology. It is an
application specification for high level of communication, which can be achieved in a very low
power and low cost. The technology of Zigbee is based on IEEE 802.15.4 standard for the
Personal Area Network (Elarabi, Deep & Rai, 2015). Zigbee alliance maintains the Zigbee
technology. A transmitter in Zigbee mainly consists of four blocks, which are CRC, Bit-to-
symbol, Symbol,-to-chip and O-QPSK modulator. The error detection technique of cyclic
redundancy check is associated with the Zigbee technology in order to evaluate the error in the
codes. Addressing the error in the codes is essential for reducing the data security risks
associated with the use of Zigbee.
The main aim of IOT technology is to connect the smart things together in order to
provide a chance for enabling a rich set of evolutionary along with the revolutionary applications
and the services (Zorzi et al., 2010). Further researches in the field of IOT can make it possible
to interact or communicate with the environment, in order to receive the information in its status.
IOT is a new and emergent technology as the term was coined more 10 years ago. From that
WIRELESS NETWORKING CONCEPTS
Answer 3
With the emergence of wireless networking, there has been a constant increase in
adoption of long range applications that have high speed. The demand of these technologies has
considerably increased over the years. The popular demand to develop networking of low power
and low data has resulted in the formation of Zigbee technology. Not only the wireless networks,
but also the use of internet of things has considerably increased. However, there are certain
challenges associated with the use of Internet of things (IOT) and wireless. The challenges
associated with the IOT and wireless technology can be mitigated by taking proper measures.
Zigbee is one of the most widely adopted wireless communication technology. It is an
application specification for high level of communication, which can be achieved in a very low
power and low cost. The technology of Zigbee is based on IEEE 802.15.4 standard for the
Personal Area Network (Elarabi, Deep & Rai, 2015). Zigbee alliance maintains the Zigbee
technology. A transmitter in Zigbee mainly consists of four blocks, which are CRC, Bit-to-
symbol, Symbol,-to-chip and O-QPSK modulator. The error detection technique of cyclic
redundancy check is associated with the Zigbee technology in order to evaluate the error in the
codes. Addressing the error in the codes is essential for reducing the data security risks
associated with the use of Zigbee.
The main aim of IOT technology is to connect the smart things together in order to
provide a chance for enabling a rich set of evolutionary along with the revolutionary applications
and the services (Zorzi et al., 2010). Further researches in the field of IOT can make it possible
to interact or communicate with the environment, in order to receive the information in its status.
IOT is a new and emergent technology as the term was coined more 10 years ago. From that
5
WIRELESS NETWORKING CONCEPTS
time, there has been a considerably research and studies associated with the use of internet of
things. However, one of the key elements that can possibly make the IOT paradigm successful is
its ability of integration of different types of devices, technologies and services.
WIRELESS NETWORKING CONCEPTS
time, there has been a considerably research and studies associated with the use of internet of
things. However, one of the key elements that can possibly make the IOT paradigm successful is
its ability of integration of different types of devices, technologies and services.
6
WIRELESS NETWORKING CONCEPTS
References
Adhie, R. P., Hutama, Y., Ahmar, A. S., & Setiawan, M. I. (2018, January). Implementation
Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard
(3DES) Method in Communication System Based Near Field Communication (NFC).
In Journal of Physics: Conference Series (Vol. 954, No. 1, p. 012009). IOP Publishing.
Aleisa, N. (2015). A Comparison of the 3DES and AES Encryption Standards. International
Journal of Security and Its Applications, 9(7), 241-246.
Elarabi, T., Deep, V., & Rai, C. K. (2015, December). Design and simulation of state-of-art
ZigBee transmitter for IoT wireless devices. In Signal Processing and Information
Technology (ISSPIT), 2015 IEEE International Symposium on(pp. 297-300). IEEE.
Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information
security. International Journal of Computer Applications, 67(19).
Thambiraja, E., Ramesh, G., & Umarani, D. R. (2012). A survey on various most common
encryption techniques. International journal of advanced research in computer science
and software engineering, 2(7).
Zorzi, M., Gluhak, A., Lange, S., & Bassi, A. (2010). From today's intranet of things to a future
internet of things: a wireless-and mobility-related view. IEEE Wireless
Communications, 17(6).
WIRELESS NETWORKING CONCEPTS
References
Adhie, R. P., Hutama, Y., Ahmar, A. S., & Setiawan, M. I. (2018, January). Implementation
Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard
(3DES) Method in Communication System Based Near Field Communication (NFC).
In Journal of Physics: Conference Series (Vol. 954, No. 1, p. 012009). IOP Publishing.
Aleisa, N. (2015). A Comparison of the 3DES and AES Encryption Standards. International
Journal of Security and Its Applications, 9(7), 241-246.
Elarabi, T., Deep, V., & Rai, C. K. (2015, December). Design and simulation of state-of-art
ZigBee transmitter for IoT wireless devices. In Signal Processing and Information
Technology (ISSPIT), 2015 IEEE International Symposium on(pp. 297-300). IEEE.
Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information
security. International Journal of Computer Applications, 67(19).
Thambiraja, E., Ramesh, G., & Umarani, D. R. (2012). A survey on various most common
encryption techniques. International journal of advanced research in computer science
and software engineering, 2(7).
Zorzi, M., Gluhak, A., Lange, S., & Bassi, A. (2010). From today's intranet of things to a future
internet of things: a wireless-and mobility-related view. IEEE Wireless
Communications, 17(6).
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.