Network And security Assignment PDF
VerifiedAdded on  2021/06/18
|23
|1376
|18
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: NETWORK AND SECURITY
Network and Security
Name of the Student
Name of the University
Author Note
Network and Security
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
NETWORK AND SECURITY
Table of Contents
Answer 1..............................................................................................................................2
Answer 2..............................................................................................................................4
Answer 3..............................................................................................................................5
Answer 4..............................................................................................................................6
References..........................................................................................................................24
NETWORK AND SECURITY
Table of Contents
Answer 1..............................................................................................................................2
Answer 2..............................................................................................................................4
Answer 3..............................................................................................................................5
Answer 4..............................................................................................................................6
References..........................................................................................................................24
2
NETWORK AND SECURITY
Answer 1
WIMAX is one kind of wireless network. It dedicates to the advancement of IEEE 802.16
standards. WIMAX works on the basis of wide area network. The network offers relatively faster
comparison to Wi-Fi. WIMAX is commonly termed as 4G and the network is immensely
popular in the world. The WIMAX technology is known to offer long range wireless networking
for both fixed connection as well as the mobile. The technology has been taken up by several
people all over the world and for this reason, appropriate security measures must be taken for
ensuring security of WIMAX. The three most common encryption standards that are used in the
WIMAX technology is the RSA, 3DES or tripe data encryption standard and AES or Advanced
Encryption Method. There are dissimilarities among the three. The encryption keys used for all
the three encryption algorithms are all different from each other. RSA uses public keys as well as
private keys for both encryption and decryption. In case of AES, 256 bit, 128 bit and 192 bit
encryption keys are used. In case of 3DES, each three keys of 56 bits are used for the encryption
purpose. These are the encryption standards which come up with some contrasting features
which are elaborated below-
Characteristic
Features
Triple Data
Encryption standard
Advanced
Encryption
Standard
RSA
Definition of the
standard
3DES is the modified
version of the
prevalent data
encryption algorithm.
It is one sort of
AES is one sort of
symmetric block
cipher and it allows
block range of 18 bits.
It allows key bits of
RSA encryption
standard is one kind
of public key
encryption technology
that uses the prime
NETWORK AND SECURITY
Answer 1
WIMAX is one kind of wireless network. It dedicates to the advancement of IEEE 802.16
standards. WIMAX works on the basis of wide area network. The network offers relatively faster
comparison to Wi-Fi. WIMAX is commonly termed as 4G and the network is immensely
popular in the world. The WIMAX technology is known to offer long range wireless networking
for both fixed connection as well as the mobile. The technology has been taken up by several
people all over the world and for this reason, appropriate security measures must be taken for
ensuring security of WIMAX. The three most common encryption standards that are used in the
WIMAX technology is the RSA, 3DES or tripe data encryption standard and AES or Advanced
Encryption Method. There are dissimilarities among the three. The encryption keys used for all
the three encryption algorithms are all different from each other. RSA uses public keys as well as
private keys for both encryption and decryption. In case of AES, 256 bit, 128 bit and 192 bit
encryption keys are used. In case of 3DES, each three keys of 56 bits are used for the encryption
purpose. These are the encryption standards which come up with some contrasting features
which are elaborated below-
Characteristic
Features
Triple Data
Encryption standard
Advanced
Encryption
Standard
RSA
Definition of the
standard
3DES is the modified
version of the
prevalent data
encryption algorithm.
It is one sort of
AES is one sort of
symmetric block
cipher and it allows
block range of 18 bits.
It allows key bits of
RSA encryption
standard is one kind
of public key
encryption technology
that uses the prime
3
NETWORK AND SECURITY
symmetric block
cipher that executes
the prevalent data
encryption algorithm
on a certain block of
data. For this reason,
it can be considered
more secure in
comparison to the
prevalent algorithm
256, 128 and 192 key
bits of encryption
factorization for
encrypting particular
data
The Required Key
Size For Encryption
The algorithm is
known to apply the
prevalent DES
algorithm three time
on a data, it utilizes
three keys each
having 56 bits
In case of AES, the
key sizes ranges
among 256 bits, 128
and 192 bits
RSA is one kind of
public key encryption
standard and it utilizes
2048 bit keys
Table 1: Showing the differences among 3DES, AES and RSA
Answer 2
Shared wireless medium offers a channel through which information can be shared a
shared medium. The data flow rate is relatively slower in a shared medium mainly for the
NETWORK AND SECURITY
symmetric block
cipher that executes
the prevalent data
encryption algorithm
on a certain block of
data. For this reason,
it can be considered
more secure in
comparison to the
prevalent algorithm
256, 128 and 192 key
bits of encryption
factorization for
encrypting particular
data
The Required Key
Size For Encryption
The algorithm is
known to apply the
prevalent DES
algorithm three time
on a data, it utilizes
three keys each
having 56 bits
In case of AES, the
key sizes ranges
among 256 bits, 128
and 192 bits
RSA is one kind of
public key encryption
standard and it utilizes
2048 bit keys
Table 1: Showing the differences among 3DES, AES and RSA
Answer 2
Shared wireless medium offers a channel through which information can be shared a
shared medium. The data flow rate is relatively slower in a shared medium mainly for the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
NETWORK AND SECURITY
possible collisions. For this reason, traffic coordination is utmost necessity as it is capable to
eliminate the possibility of collisions. All these collisions are responsible for delays that the
wireless network.
In case of shared wireless medium, the traffic gets coordinated with the Carrier Sensed
Multiple Access. The technology is basically utilized to the shared network topologies like the
Ethernet. The Ethernet aids in controlling the particular wireless network. The WIMAX
technology can only to detect any collision. The technology is used in controlling the traffic in
shared wireless media.
Answer 3
In recent times the field of wireless networking has shown significant growth. ZigBee is
has been the result of both low data and low power networking programs. The technology was
mainly developed keeping in mind the military purpose and the personal area network. The
devices having ZigBee Technology operates in the frequency bands of 2.4 GHz, 868 MHz and
915 Khz. One can gain the maximum data rate of 250K bits using ZigBee technology. The
technology can be specified for conducting high level communication by using low cost, small
and low power radios.
Answer 4
NETWORK AND SECURITY
possible collisions. For this reason, traffic coordination is utmost necessity as it is capable to
eliminate the possibility of collisions. All these collisions are responsible for delays that the
wireless network.
In case of shared wireless medium, the traffic gets coordinated with the Carrier Sensed
Multiple Access. The technology is basically utilized to the shared network topologies like the
Ethernet. The Ethernet aids in controlling the particular wireless network. The WIMAX
technology can only to detect any collision. The technology is used in controlling the traffic in
shared wireless media.
Answer 3
In recent times the field of wireless networking has shown significant growth. ZigBee is
has been the result of both low data and low power networking programs. The technology was
mainly developed keeping in mind the military purpose and the personal area network. The
devices having ZigBee Technology operates in the frequency bands of 2.4 GHz, 868 MHz and
915 Khz. One can gain the maximum data rate of 250K bits using ZigBee technology. The
technology can be specified for conducting high level communication by using low cost, small
and low power radios.
Answer 4
5
NETWORK AND SECURITY
NETWORK AND SECURITY
6
NETWORK AND SECURITY
NETWORK AND SECURITY
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7
NETWORK AND SECURITY
NETWORK AND SECURITY
8
NETWORK AND SECURITY
NETWORK AND SECURITY
9
NETWORK AND SECURITY
NETWORK AND SECURITY
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10
NETWORK AND SECURITY
NETWORK AND SECURITY
11
NETWORK AND SECURITY
NETWORK AND SECURITY
12
NETWORK AND SECURITY
NETWORK AND SECURITY
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13
NETWORK AND SECURITY
NETWORK AND SECURITY
14
NETWORK AND SECURITY
NETWORK AND SECURITY
15
NETWORK AND SECURITY
NETWORK AND SECURITY
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
16
NETWORK AND SECURITY
NETWORK AND SECURITY
17
NETWORK AND SECURITY
NETWORK AND SECURITY
18
NETWORK AND SECURITY
NETWORK AND SECURITY
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
19
NETWORK AND SECURITY
NETWORK AND SECURITY
20
NETWORK AND SECURITY
NETWORK AND SECURITY
21
NETWORK AND SECURITY
NETWORK AND SECURITY
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
22
NETWORK AND SECURITY
References
Adhie, R. P., Hutama, Y., Ahmar, A. S., & Setiawan, M. I. (2018, January). Implementation
Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard
(3DES) Method in Communication System Based Near Field Communication (NFC).
In Journal of Physics: Conference Series (Vol. 954, No. 1, p. 012009). IOP Publishing.
Aleisa, N. (2015). A Comparison of the 3DES and AES Encryption Standards. International
Journal of Security and Its Applications, 9(7), 241-246.
Bhattacharyya, B., & Bhattacharya, S. (2013). Emerging Fields in 4G Technology, its
Applications & Beyond-An Overview. International Journal of Information and
Computation Technology, 3(4), 251-260.
Elarabi, T., Deep, V., & Rai, C. K. (2015, December). Design and simulation of state-of-art
ZigBee transmitter for IoT wireless devices. In Signal Processing and Information
Technology (ISSPIT), 2015 IEEE International Symposium on(pp. 297-300). IEEE.
Gohil, A., Modi, H., & Patel, S. K. (2013, March). 5G technology of mobile communication: A
survey. In Intelligent Systems and Signal Processing (ISSP), 2013 International
Conference on (pp. 288-292). IEEE.
Kumar, U., Kim, J., & Helmy, A. (2013, September). Comparing wireless network usage: laptop
vs smart-phones. In Proceedings of the 19th annual international conference on Mobile
computing & networking (pp. 243-246). ACM.
Laufer, R., & Kleinrock, L. (2016). The capacity of wireless CSMA/CA networks. IEEE/ACM
Transactions on Networking (TON), 24(3), 1518-1532.
NETWORK AND SECURITY
References
Adhie, R. P., Hutama, Y., Ahmar, A. S., & Setiawan, M. I. (2018, January). Implementation
Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard
(3DES) Method in Communication System Based Near Field Communication (NFC).
In Journal of Physics: Conference Series (Vol. 954, No. 1, p. 012009). IOP Publishing.
Aleisa, N. (2015). A Comparison of the 3DES and AES Encryption Standards. International
Journal of Security and Its Applications, 9(7), 241-246.
Bhattacharyya, B., & Bhattacharya, S. (2013). Emerging Fields in 4G Technology, its
Applications & Beyond-An Overview. International Journal of Information and
Computation Technology, 3(4), 251-260.
Elarabi, T., Deep, V., & Rai, C. K. (2015, December). Design and simulation of state-of-art
ZigBee transmitter for IoT wireless devices. In Signal Processing and Information
Technology (ISSPIT), 2015 IEEE International Symposium on(pp. 297-300). IEEE.
Gohil, A., Modi, H., & Patel, S. K. (2013, March). 5G technology of mobile communication: A
survey. In Intelligent Systems and Signal Processing (ISSP), 2013 International
Conference on (pp. 288-292). IEEE.
Kumar, U., Kim, J., & Helmy, A. (2013, September). Comparing wireless network usage: laptop
vs smart-phones. In Proceedings of the 19th annual international conference on Mobile
computing & networking (pp. 243-246). ACM.
Laufer, R., & Kleinrock, L. (2016). The capacity of wireless CSMA/CA networks. IEEE/ACM
Transactions on Networking (TON), 24(3), 1518-1532.
1 out of 23
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.