Ask a question from expert

Ask now

Concept of Wireless Network : Assignment

30 Pages2291 Words108 Views
   

Added on  2020-03-23

Concept of Wireless Network : Assignment

   Added on 2020-03-23

BookmarkShareRelated Documents
Running head: WIRELESS NETWORKING CONCEPTSWireless Networking ConceptsName of the StudentName of the UniversityAuthor NoteStudent ID:____________Family name: ____________________________________Given names: __________________________________________________________Subject name: ________________________________Subject code: _____________Lecturer: _____________________________________ Assignment No: ___________
Concept of Wireless Network : Assignment_1
1WIRELESS NETWORKING CONCEPTSTable of ContentsAnswer 1..............................................................................................................................2Answer 2..............................................................................................................................4Answer 3..............................................................................................................................5Answer 4..............................................................................................................................8References..........................................................................................................................28
Concept of Wireless Network : Assignment_2
2WIRELESS NETWORKING CONCEPTSAnswer 1Encryption is a process of converting a particular information or data into a code in orderto prevent unauthorized access to the data. Encryption helps in limiting the access to a particulardata only to the registered users (Pathan, 2016). There is different encryption standards used inorder to protect privacy as well as confidentiality of the data. General Interoperability forMicrowave Access (WiMax) is implied as the transport of the organizations to the long remotebroadband access. It offers point-to-point and furthermore multipoint application. Of course, it isenabled for updating security of the framework at the period of transmission to the last mile.Additionally, WiMax utilizes three sorts of data encryption standards remembering the trueobjective to guarantee data and furthermore information (Tan & Wu, 2013). The three dataencryption standards for WiMAX networks are 3DES or triple data encryption standard, AESand EAS. These encryption standards are elaborated in the following table.3DESAESRSA•3DES or triple informationencryption strategy utilizesthree diverse keys of 56-bitlength for an abnormal stateencryption. In this encryptionstandard, a symmetric keypiece figure utilizes theconventional DES figurecalculation three times forevery datum square. •The key size of the triple DESis vast to guarantee extrameasure of security whileencryption of an information. •These three keys are otherwisecalled package keys andcomprises of 56 bits each. •The significant preferredstandpoint of triple DES is that,•AES or propelled encryptionstandard gives the help and asuperior encryption strategywith the utilization of 128-piece, 192-piece or 256-pieceencryption keys (Stallings &Tahiliani, 2014). •This encryption standard is asymmetric square figure. •This is the most utilizedcalculation utilized forencryption of information. •This calculation has beenproduced as a successor forDES or information encryptionstandard calculation •AES encryption standard is atechnique for changing over•RSA or Rivest ShamirAdleman is an open keyencryption standard used toencode a message utilizingan open key, while themessage is decoded utilizinga private key. •This is a asymmetric keyalgorithm as both the keysare utilized for encryptionand decoding •This is a powerful standardof encryption as twoextensive prime numbers areutilized for creating theencryption and decoding keyof this encryption calculationand along these lines it turnsout to be extremely hard to
Concept of Wireless Network : Assignment_3
3WIRELESS NETWORKING CONCEPTSthe span of the key length issettled. Triple DES helps inencoding the information threetimes. The diverse keys oftriple DES is known as k1, k2and k3. •This innovation depends onANSIX9.52 standard. •3DES is a bit slower inexecution as it utilizes the 3distinct stages for scramblingspecific information. •It is one of the Vitalencryption standards forWiMax arrange. •3DES is in any case, very littlebeing used because of theadvancement of AES.crude data intoindistinguishable data. •AES was worked fromCCMP. •IT is substantially quickerthan 3DES and can beeffectively actualized utilizingless memory. •However, not at all like3DES, it requires a committedprocessor and in this manner3DES stays one of theindispensable apparatuses forWiMax arrange.split the encryption(Manshaei et al. 2013). •RSA is once in a whileutilized as a part of WiMaxnot at all like 3DES andAES.Answer 2WPAN or remote individual area network is a system of interconnecting gadgets giving awireless connection with the gadgets. WPAN advances are fundamentally utilized for short rangecorrespondences, low power utilization, minimal effort and are extremely useful for setting uplittle individual systems. The two cases of WPAN innovation incorporate Bluetooth and ZigBee. Bluetooth is abroadly utilized WPAN innovation. Bluetooth is a standard for short-go remote interconnectionof versatile and electronic gadgets (Fragouli, 2015). Zigbee on other hand is morestraightforward and more affordable than Bluetooth. The essential preferred standpoint of Zigbeeis its simplicity of establishment, information exchange and minimal effort. In any case, there aresure security worries that are related with these WPAN advancements.
Concept of Wireless Network : Assignment_4
4WIRELESS NETWORKING CONCEPTSThe security difficulties of WPAN and Bluetooth are expounded in the accompanyingpassages Bluetooth Endorsement of the Bluetooth devices can't be proficient, which can cause unequivocaldirect of the related contraptions. In this perspective, it is fundamental to state that there is atremendous hazard for DoS ambushes on the Bluetooth devices at the period of transmission ofdata and also information (Loo, Mauri & Ortiz, 2016). It can be harmful area of the outsidesocial occasions at the period of transmission system of data. Regardless, sensitive data might behurt and moreover contaminated at the period of remote transmission.The security dangers related with Bluetooth innovation in WPAN are recordedunderneath 1) Bluebugging: In this security danger where a programmer breaks into a Bluetoothnetwork and can exploit the system without the learning of the proprietor. 2) Blue jacking: In this security threat, the aggressor sends hurtful messages to the senderthat could be opened up consequently and introduce the vindictive substance. 3) Bkuesnarfing: the aggressor gets access into the network and gets unapproved accessto the information introduce. Bluesnarfing is one of the threats drew in with the development thatcan empower the aggressors remembering the ultimate objective to fabricate the utilization of thecontraptions that are Bluetooth included (Liang & Yu, 2015). Besides, it searches for IMEInumber of the Bluetooth contraptions and furthermore getting related through the system. ZigBee
Concept of Wireless Network : Assignment_5
5WIRELESS NETWORKING CONCEPTSThe security concerns related with ZigBee are recorded underneath 1) A programmer may break into a ZigBee system and increase physical access to theinformation and the encryption key of the gadget along these lines uncovering the classified data.2) Another significant hazard related with this assault is impersonating a hub of a systemkeeping in mind the end goal to access the information. Answer 3 First article: Shaikh, Faisal Karim, and Sherali Zeadally. "Energy harvesting in wirelesssensor networks: A comprehensive review." Renewable and Sustainable Energy Reviews 55(2016): 1041-1054.The paper discusses with the path toward using of essentialness in Wireless SensorNetwork. The framework joins a broad number of static sensor center points, which helps thelow taking care of. Moreover, there are a couple of wellsprings of imperativeness consolidatinginto Wireless Sensor Network and radio repeat based essentialness drew in with the framework.Close by these, sun fueled based essentialness and furthermore warm based imperativeness andstream based essentialness harvesting is consolidated into the methodology (Yang et al., 2015).There are moreover a couple of philosophies depicted in the present paper with the ultimateobjective of using imperativeness satisfactorily.The way toward yielding or collecting the vitality from outer sources is known as vitalitygathering. The distinctive outer wellsprings of energy collecting incorporate sunlight basedenergy, wind energy, hydropower energy et cetera (Hu & Qian, 2014). Productive energygathering approaches are investigated with a specific end goal to take out the impediment of
Concept of Wireless Network : Assignment_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment On Wireless Networking Concepts (Doc)
|9
|1534
|47

Wireless Networking | Assignment
|9
|1836
|43

Wireless Networking Concepts: Assignment (Doc)
|7
|1115
|120

Network and Security Assignment PDF
|26
|2127
|51

Network And security Assignment PDF
|23
|1376
|18

Worldwide Interoperability for Microwave Access
|7
|1963
|202