Network And security Assignment PDF

Verified

Added on  2021/06/18

|23
|1376
|18
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: NETWORK AND SECURITY
Network and Security
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
NETWORK AND SECURITY
Table of Contents
Answer 1..............................................................................................................................2
Answer 2..............................................................................................................................4
Answer 3..............................................................................................................................5
Answer 4..............................................................................................................................6
References..........................................................................................................................24
Document Page
2
NETWORK AND SECURITY
Answer 1
WIMAX is one kind of wireless network. It dedicates to the advancement of IEEE 802.16
standards. WIMAX works on the basis of wide area network. The network offers relatively faster
comparison to Wi-Fi. WIMAX is commonly termed as 4G and the network is immensely
popular in the world. The WIMAX technology is known to offer long range wireless networking
for both fixed connection as well as the mobile. The technology has been taken up by several
people all over the world and for this reason, appropriate security measures must be taken for
ensuring security of WIMAX. The three most common encryption standards that are used in the
WIMAX technology is the RSA, 3DES or tripe data encryption standard and AES or Advanced
Encryption Method. There are dissimilarities among the three. The encryption keys used for all
the three encryption algorithms are all different from each other. RSA uses public keys as well as
private keys for both encryption and decryption. In case of AES, 256 bit, 128 bit and 192 bit
encryption keys are used. In case of 3DES, each three keys of 56 bits are used for the encryption
purpose. These are the encryption standards which come up with some contrasting features
which are elaborated below-
Characteristic
Features
Triple Data
Encryption standard
Advanced
Encryption
Standard
RSA
Definition of the
standard
3DES is the modified
version of the
prevalent data
encryption algorithm.
It is one sort of
AES is one sort of
symmetric block
cipher and it allows
block range of 18 bits.
It allows key bits of
RSA encryption
standard is one kind
of public key
encryption technology
that uses the prime
Document Page
3
NETWORK AND SECURITY
symmetric block
cipher that executes
the prevalent data
encryption algorithm
on a certain block of
data. For this reason,
it can be considered
more secure in
comparison to the
prevalent algorithm
256, 128 and 192 key
bits of encryption
factorization for
encrypting particular
data
The Required Key
Size For Encryption
The algorithm is
known to apply the
prevalent DES
algorithm three time
on a data, it utilizes
three keys each
having 56 bits
In case of AES, the
key sizes ranges
among 256 bits, 128
and 192 bits
RSA is one kind of
public key encryption
standard and it utilizes
2048 bit keys
Table 1: Showing the differences among 3DES, AES and RSA
Answer 2
Shared wireless medium offers a channel through which information can be shared a
shared medium. The data flow rate is relatively slower in a shared medium mainly for the

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
NETWORK AND SECURITY
possible collisions. For this reason, traffic coordination is utmost necessity as it is capable to
eliminate the possibility of collisions. All these collisions are responsible for delays that the
wireless network.
In case of shared wireless medium, the traffic gets coordinated with the Carrier Sensed
Multiple Access. The technology is basically utilized to the shared network topologies like the
Ethernet. The Ethernet aids in controlling the particular wireless network. The WIMAX
technology can only to detect any collision. The technology is used in controlling the traffic in
shared wireless media.
Answer 3
In recent times the field of wireless networking has shown significant growth. ZigBee is
has been the result of both low data and low power networking programs. The technology was
mainly developed keeping in mind the military purpose and the personal area network. The
devices having ZigBee Technology operates in the frequency bands of 2.4 GHz, 868 MHz and
915 Khz. One can gain the maximum data rate of 250K bits using ZigBee technology. The
technology can be specified for conducting high level communication by using low cost, small
and low power radios.
Answer 4
Document Page
5
NETWORK AND SECURITY
Document Page
6
NETWORK AND SECURITY

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
NETWORK AND SECURITY
Document Page
8
NETWORK AND SECURITY
Document Page
9
NETWORK AND SECURITY

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
NETWORK AND SECURITY
Document Page
11
NETWORK AND SECURITY
Document Page
12
NETWORK AND SECURITY

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13
NETWORK AND SECURITY
Document Page
14
NETWORK AND SECURITY
Document Page
15
NETWORK AND SECURITY

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16
NETWORK AND SECURITY
Document Page
17
NETWORK AND SECURITY
Document Page
18
NETWORK AND SECURITY

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
19
NETWORK AND SECURITY
Document Page
20
NETWORK AND SECURITY
Document Page
21
NETWORK AND SECURITY

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
22
NETWORK AND SECURITY
References
Adhie, R. P., Hutama, Y., Ahmar, A. S., & Setiawan, M. I. (2018, January). Implementation
Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard
(3DES) Method in Communication System Based Near Field Communication (NFC).
In Journal of Physics: Conference Series (Vol. 954, No. 1, p. 012009). IOP Publishing.
Aleisa, N. (2015). A Comparison of the 3DES and AES Encryption Standards. International
Journal of Security and Its Applications, 9(7), 241-246.
Bhattacharyya, B., & Bhattacharya, S. (2013). Emerging Fields in 4G Technology, its
Applications & Beyond-An Overview. International Journal of Information and
Computation Technology, 3(4), 251-260.
Elarabi, T., Deep, V., & Rai, C. K. (2015, December). Design and simulation of state-of-art
ZigBee transmitter for IoT wireless devices. In Signal Processing and Information
Technology (ISSPIT), 2015 IEEE International Symposium on(pp. 297-300). IEEE.
Gohil, A., Modi, H., & Patel, S. K. (2013, March). 5G technology of mobile communication: A
survey. In Intelligent Systems and Signal Processing (ISSP), 2013 International
Conference on (pp. 288-292). IEEE.
Kumar, U., Kim, J., & Helmy, A. (2013, September). Comparing wireless network usage: laptop
vs smart-phones. In Proceedings of the 19th annual international conference on Mobile
computing & networking (pp. 243-246). ACM.
Laufer, R., & Kleinrock, L. (2016). The capacity of wireless CSMA/CA networks. IEEE/ACM
Transactions on Networking (TON), 24(3), 1518-1532.
1 out of 23
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]