ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Assignment on Wireless Network

Verified

Added on  2021/05/31

|19
|1067
|22
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: WIRELESS NETWORK
WIRELESS NETWORK
Name of the Student:
Name of the University:
Author Note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1WIRELESS NETWORK
Answer to the question no 1:
The three encryption methods for the WiMax technology are –symmetric key encryption,
asymmetric key encryption and hashing
Comparison between three data encryption standards for WiMax:
Symmetric key encryption Asymmetric key encryption Hashing
Used for the encryption purpose Like symmetric key it is also
used for the encryption purpose
Hashing is a kind of
cryptographic process.
In this methods the keys are used
for the encryption
Here keys are used for the
encryption purpose.
The crypting of the message is
done by the hash value.
Contrast between symmetric asymmetric and hashing techniques:
Symmetric key encryption Asymmetric key encryption Hashing
It is known as the private key
encryption or shared key
encryption technique.
It is known as the public key
encryption.
Hashing is a kind of encrypting
which encrypts the message
under a hash value.
It is faster way of the encryption
compared to the asymmetric
encryption.
It imposes high computational
burden
Hashing is the most common and
effective way of encryption of
the data
Single key is used for both the
encryption and decryption
purpose. One of the example of
the symmetric key encryption is
Asymmetric key encryption uses
two different key namely public
key and private key for the
encryption and decryption
The hashing differs from
conventional cryptographic
technique, as it uses the hash
value to encrypt the data (Ahmad
Document Page
2WIRELESS NETWORK
DES purpose. One of the example of
the asymmetric key encryption is
RSA.
& Ismail,2016). One of the
example of the hashing technique
is MD5.
Answer of the question no 2:
The coordination of the traffic in the shared wireless medium:
The wireless medium is shared by the multiple users. There are various protocols for
controlling the traffics in the shred medium (Woo & Jeong, 2016). These protocols are known as
wireless media access control. There are three types of the categories of these protocols- Random
schemes( 802.11 MAC, ALOHA), coordinated schemes( TDMA,FDMA,CDMA), polling based
schemes( Bluetooth). Duplexing is the term associated with the sharing of the medium in the
wireless network. It defines the sharing of the media between two connecting devices (Wadday,
Wadi & Abdullah,2018). If the communication in the channel is one way, communication is
called simplex communication and in case of two way communication it is regarded as the
duplex communication. The duplex communication can be done through various ways like time
division multiplexing and the frequency division multiplexing.
In time division duplex refers to the duplex communication where the uplink is separated
from the downlink by the allocation of different time slots for different frequencies. It allows
asymmetric flow of data from uplink to downlink.
Frequency division duplex defines to the duplex communication where separate
frequency bands are responsible for transmission and receiving of the data (Díaz, Martín &
Rubio,2016). The use of different frequency bands for sending and receiving the data helps the
Document Page
3WIRELESS NETWORK
different signals not to interface with each other. It is a better choice than the time division
duplex as it allows the symmetric flow of the signals over the wireless communication medium.
The collision avoidance in the wireless medium:
There are various techniques for the collision avoidance in the wireless medium such as
CSMA/CA and RTS/CTS techniques. CSMA/CA is a collision avoidance technique which
allows the transmission of the signal only when the channel is idle (Sangwan & Singh, 2017). It
can be used as the alternative of CSMA/CD which is not an effective method for the collision
avoidance in the wireless network with the hidden nodes. CSMA/CA operates at the data link
layer.
RTS/CTS is used in 802.11 series of wireless networking protocol . It helps to reduce the
frame collision in case of hidden nodes.
Answer to the question no 3:
Energy harvesting refers to the saving of the energy by making the system to consume
low power. The energy harvesting can be achieved in the IOT also. Recently , the IoT
applications are made in this way that they can save up more energy to provide a sustainable
solutions. The implementation of the state –of art Zigbee transmitter for IoT wireless device is
the example of the system that supports the energy harvesting. Using the digital devices, the IoT
requires the low data rate and it also consumes less power.
The use of the advances power storage system in the IoT such as polymer battery cells
and the new energy management devices are supported by the low power consumption services
which helps in the energy harvesting.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4WIRELESS NETWORK
Answer to the question no 4:
Document Page
5WIRELESS NETWORK
Document Page
6WIRELESS NETWORK

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
7WIRELESS NETWORK
Document Page
8WIRELESS NETWORK
Document Page
9WIRELESS NETWORK

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10WIRELESS NETWORK
Document Page
11WIRELESS NETWORK
Document Page
12WIRELESS NETWORK

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
13WIRELESS NETWORK
Document Page
14WIRELESS NETWORK
Document Page
15WIRELESS NETWORK

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
16WIRELESS NETWORK
Document Page
17WIRELESS NETWORK
References
Ahmad, R., & Ismail, W. (2016). Performance comparison of advanced encryption standard-128
algorithms for wimax application with improved power-throughput. Journal of
Engineering Science and Technology, 11(12), 1-17.
Díaz, M., Martín, C., & Rubio, B. (2016). State-of-the-art, challenges, and open issues in the
integration of Internet of things and cloud computing. Journal of Network and Computer
Applications, 67, 99-117.
Document Page
18WIRELESS NETWORK
Sangwan, A., & Singh, V. R. (2017). A Secure Authentication Scheme for WiMax Network and
Verification using Scyther Tool. International Journal of Applied Engineering
Research, 12(11), 3002-3008.
Wadday, A. G., Wadi, S. M., & Abdullah, H. J. M. A. A. (2018). Study of WiMAX Based
Communication Channel Effects on the Ciphered Image Using MAES
Algorithm. International Journal of Applied Engineering Research, 13(8), 6009-6018.
Woo, S. M., & Jeong, G. (2016). A Study of WiMAX Security threats and Their
Solution. International Journal of Internet, Broadcasting and Communication, 8(2), 66-
74.
1 out of 19
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]