Wireless Networking Concepts
VerifiedAdded on  2020/04/07
|13
|1247
|83
AI Summary
This assignment delves into the fundamentals of wireless networking concepts. It examines WiMAX technology, its applications, and encryption standards like DES, 2DES, and 3DES. The document also explores WPAN technologies, focusing on Bluetooth and its role in mobile devices. Furthermore, it analyzes energy harvesting techniques in wireless sensor networks (WSNs), highlighting their importance for sustainable operation. Finally, the assignment addresses security challenges associated with wireless networking.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: WIRELESS NETWORKING CONCEPTS
Wireless Networking Concepts
Name of the student
Name of the University
Author Note
Wireless Networking Concepts
Name of the student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1WIRELESS NETWORKING CONCEPTS
Table of Contents
Answer to Question 1..........................................................................................................2
Answer to Question 2..........................................................................................................3
Answer to Question 3..........................................................................................................4
Answer to Question 4:.........................................................................................................6
References..........................................................................................................................13
Table of Contents
Answer to Question 1..........................................................................................................2
Answer to Question 2..........................................................................................................3
Answer to Question 3..........................................................................................................4
Answer to Question 4:.........................................................................................................6
References..........................................................................................................................13
2WIRELESS NETWORKING CONCEPTS
Answer to Question 1
WiMAX stands for Worldwide Interoperability for Microwave access is considered as
standard of technology which is used to provide wireless broadband access to various cables and
DSL. WiMAX many provides services like point to multipoint and point to point application.
Application of these technology is considered to be cost effective and it also provides a much
larger surface area than Wi-Fi that is IEEE 802.11(Amiri et al., 2013).
The three data encryption standard used for WiMAX are DES, 2DES and 3DES. DES
data encryption is an improvisation of older system that is LUCIFER. DES was designed to
improve performance in hardware system as compared to software system. It has certain
algorithms which encrypts various text in 64 bit blocks using 56-bit key (Gomez, Oller &
Paradells, 2012).
2DES was developed as DES was proved to be highly insecure and undependable. 2DES
has some new methods which can be stronger and more secure which uses the old algorithm. The
improvement ultimately resulted in the formation of 3DES (Kim et al., 2013). Double DES has
the work which does the work using particular encryption technique. 256 is the attempt that can be
used to solve the problem, then the ways to solve problem using different keys of n bits is 22n.
3DES resulted from the thinking that Double DES cannot be strong enough to tackle the mid-
level attacks. 3DES has mainly three encryption key that is the first key mainly uses k1, the
second key mainly focuses on k2 and the last encryption mainly focuses on the uses of k3 key
(Gomez, Oller & Paradells, 2012)
.
Answer to Question 1
WiMAX stands for Worldwide Interoperability for Microwave access is considered as
standard of technology which is used to provide wireless broadband access to various cables and
DSL. WiMAX many provides services like point to multipoint and point to point application.
Application of these technology is considered to be cost effective and it also provides a much
larger surface area than Wi-Fi that is IEEE 802.11(Amiri et al., 2013).
The three data encryption standard used for WiMAX are DES, 2DES and 3DES. DES
data encryption is an improvisation of older system that is LUCIFER. DES was designed to
improve performance in hardware system as compared to software system. It has certain
algorithms which encrypts various text in 64 bit blocks using 56-bit key (Gomez, Oller &
Paradells, 2012).
2DES was developed as DES was proved to be highly insecure and undependable. 2DES
has some new methods which can be stronger and more secure which uses the old algorithm. The
improvement ultimately resulted in the formation of 3DES (Kim et al., 2013). Double DES has
the work which does the work using particular encryption technique. 256 is the attempt that can be
used to solve the problem, then the ways to solve problem using different keys of n bits is 22n.
3DES resulted from the thinking that Double DES cannot be strong enough to tackle the mid-
level attacks. 3DES has mainly three encryption key that is the first key mainly uses k1, the
second key mainly focuses on k2 and the last encryption mainly focuses on the uses of k3 key
(Gomez, Oller & Paradells, 2012)
.
3WIRELESS NETWORKING CONCEPTS
Answer to Question 2
WPAN mainly stands for wireless personal area network which is nothing but a network
which mainly uses interconnection of devices in a particular workspace where the connection is
considered to be wireless. Within the range 10 meters WPAN work properly for establishing
communication among various devices. Security challenges of two popular WPAN technology
that is Bluetooth and INSTEON has been discussed below (Friedman, Kogan & Krivolapov,
2013).
Bluetooth is a wireless technology that is mainly used for communication with in a range
of 100 meters. This technology mainly has low power consumption and it is a low cost
technology. It mainly uses on Time-Division duplex technology which is used for full duplex
technology. Bluetooth can be considered as a wireless technology which allow connection of one
electronic device with other device without the need of a physical cable for data exchange (Lee,
Zhang & Huang, 2013). Data contained important information can be easily withdrawn from
improperly configured devices. Proper launching of attacks is possible by using various
malwares (Amiri et al., 2013).
INSTEON is a latest technology which based on home automation that is used for
controlling light, switches and other home based devices by using power line links and properties
of radio frequency. Devices using INSTEON technology mainly uses simulcast method of
routing which removes the burden of storing data. Whenever there is unavailability of common
device the data can be easily accessed through different paths (Friedman, Kogan & Krivolapov,
2013).
Answer to Question 2
WPAN mainly stands for wireless personal area network which is nothing but a network
which mainly uses interconnection of devices in a particular workspace where the connection is
considered to be wireless. Within the range 10 meters WPAN work properly for establishing
communication among various devices. Security challenges of two popular WPAN technology
that is Bluetooth and INSTEON has been discussed below (Friedman, Kogan & Krivolapov,
2013).
Bluetooth is a wireless technology that is mainly used for communication with in a range
of 100 meters. This technology mainly has low power consumption and it is a low cost
technology. It mainly uses on Time-Division duplex technology which is used for full duplex
technology. Bluetooth can be considered as a wireless technology which allow connection of one
electronic device with other device without the need of a physical cable for data exchange (Lee,
Zhang & Huang, 2013). Data contained important information can be easily withdrawn from
improperly configured devices. Proper launching of attacks is possible by using various
malwares (Amiri et al., 2013).
INSTEON is a latest technology which based on home automation that is used for
controlling light, switches and other home based devices by using power line links and properties
of radio frequency. Devices using INSTEON technology mainly uses simulcast method of
routing which removes the burden of storing data. Whenever there is unavailability of common
device the data can be easily accessed through different paths (Friedman, Kogan & Krivolapov,
2013).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4WIRELESS NETWORKING CONCEPTS
Answer to Question 3
After going through Energy harvesting through wireless communication written by Ulkus
and Sennur it can be concluded that the topic mainly emphasizes on energy harvesting
communication, simultaneous energy transfers of energy, energy co-operation and wireless
information. Self-sufficiency and operation can be easily achieved by emphasizing several
changes in wireless networking (Mehta & Gupta, 2012). Medium Access Control for various
energy harvesting technology can be easily used for keeping an eye medium access control
technique which mainly depends on the use of single loop network for collecting data. The
collected data can be used for energy harvesting devices used in the surroundings. Improvisation
of performance and network changes can be easily achieved by using energy and information
transfer. From the above discussion it can be stated that the future problems related to energy
harvesting cannot be achieved by using only various steps of network design which is form the
processing of signal to its communication (Amiri et al., 2013).
After going through Energy harvesting in wireless sensor and networks Written by
Shaikh, Faisal Karim and Sherali Zeadally it can be stated that the topic mainly emphasizes on
increasing motivation for energy harvesting in WSNs. WSNs mainly stands for wireless sensor
network and various methods of harvesting like flow based technology, radio frequency, solar
and thermal technology has been discussed. Radio frequency energy harvesting mainly converts
radio waves into DC power. Conversion of RF signal to DC power can be easily achieved using
various techniques like gain of antenna and gap between destination and source, source of power
(Gomez, Oller & Paradells, 2012).
Solar based harvesting system mainly focuses on the use of solar energy as the solar
harvesting system is limited during the night; it is the duty of developer to look for various
Answer to Question 3
After going through Energy harvesting through wireless communication written by Ulkus
and Sennur it can be concluded that the topic mainly emphasizes on energy harvesting
communication, simultaneous energy transfers of energy, energy co-operation and wireless
information. Self-sufficiency and operation can be easily achieved by emphasizing several
changes in wireless networking (Mehta & Gupta, 2012). Medium Access Control for various
energy harvesting technology can be easily used for keeping an eye medium access control
technique which mainly depends on the use of single loop network for collecting data. The
collected data can be used for energy harvesting devices used in the surroundings. Improvisation
of performance and network changes can be easily achieved by using energy and information
transfer. From the above discussion it can be stated that the future problems related to energy
harvesting cannot be achieved by using only various steps of network design which is form the
processing of signal to its communication (Amiri et al., 2013).
After going through Energy harvesting in wireless sensor and networks Written by
Shaikh, Faisal Karim and Sherali Zeadally it can be stated that the topic mainly emphasizes on
increasing motivation for energy harvesting in WSNs. WSNs mainly stands for wireless sensor
network and various methods of harvesting like flow based technology, radio frequency, solar
and thermal technology has been discussed. Radio frequency energy harvesting mainly converts
radio waves into DC power. Conversion of RF signal to DC power can be easily achieved using
various techniques like gain of antenna and gap between destination and source, source of power
(Gomez, Oller & Paradells, 2012).
Solar based harvesting system mainly focuses on the use of solar energy as the solar
harvesting system is limited during the night; it is the duty of developer to look for various
5WIRELESS NETWORKING CONCEPTS
methods for achieving high efficiency during the daytime (Friedman, Kogan & Krivolapov,
2013).
Answer to Question 4:
methods for achieving high efficiency during the daytime (Friedman, Kogan & Krivolapov,
2013).
Answer to Question 4:
6WIRELESS NETWORKING CONCEPTS
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7WIRELESS NETWORKING CONCEPTS
8WIRELESS NETWORKING CONCEPTS
9WIRELESS NETWORKING CONCEPTS
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10WIRELESS NETWORKING CONCEPTS
11WIRELESS NETWORKING CONCEPTS
12WIRELESS NETWORKING CONCEPTS
References
Amiri, I. S., Alavi, S. E., Idrus, S. M., Nikoukar, A., & Ali, J. (2013). IEEE 802.15. 3c WPAN
standard using millimeter optical soliton pulse generated by a panda ring resonator. IEEE
Photonics Journal, 5(5), 7901912-7901912.
Friedman, R., Kogan, A., & Krivolapov, Y. (2013). On power and throughput tradeoffs of wifi
and bluetooth in smartphones. IEEE Transactions on Mobile Computing, 12(7), 1363-
1376.
Gomez, C., Oller, J., & Paradells, J. (2012). Overview and evaluation of bluetooth low energy:
An emerging low-power wireless technology. Sensors, 12(9), 11734-11753.
Kim, J., Kim, S., Park, S., & Hong, J. (2013, October). Home appliances controlling through
Smart TV set-top box with screen-mirroring remote controller. In ICT Convergence
(ICTC), 2013 International Conference on (pp. 1009-1012). IEEE.
Lee, S., Zhang, R., & Huang, K. (2013). Opportunistic wireless energy harvesting in cognitive
radio networks. IEEE Transactions on Wireless Communications, 12(9), 4788-4799.
Mehta, V., & Gupta, D. N. (2012). Performance analysis of qos parameters for wimax
networks. International Journal of Engineering and Innovative Technology (IJEIT)
Volume, 1, 105-110.
References
Amiri, I. S., Alavi, S. E., Idrus, S. M., Nikoukar, A., & Ali, J. (2013). IEEE 802.15. 3c WPAN
standard using millimeter optical soliton pulse generated by a panda ring resonator. IEEE
Photonics Journal, 5(5), 7901912-7901912.
Friedman, R., Kogan, A., & Krivolapov, Y. (2013). On power and throughput tradeoffs of wifi
and bluetooth in smartphones. IEEE Transactions on Mobile Computing, 12(7), 1363-
1376.
Gomez, C., Oller, J., & Paradells, J. (2012). Overview and evaluation of bluetooth low energy:
An emerging low-power wireless technology. Sensors, 12(9), 11734-11753.
Kim, J., Kim, S., Park, S., & Hong, J. (2013, October). Home appliances controlling through
Smart TV set-top box with screen-mirroring remote controller. In ICT Convergence
(ICTC), 2013 International Conference on (pp. 1009-1012). IEEE.
Lee, S., Zhang, R., & Huang, K. (2013). Opportunistic wireless energy harvesting in cognitive
radio networks. IEEE Transactions on Wireless Communications, 12(9), 4788-4799.
Mehta, V., & Gupta, D. N. (2012). Performance analysis of qos parameters for wimax
networks. International Journal of Engineering and Innovative Technology (IJEIT)
Volume, 1, 105-110.
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.