Wireless Networking Assignment (Solution)

Added on - 31 May 2021

  • 6

    Pages

  • 1264

    Words

  • 9

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 3 of 6 pages
Running head: WIRELESS NETWORKING ASSIGNMENTWireless Networking Assignment:Name of the Student:Name of the University:Author Note:
1WIRELESS NETWORKING ASSIGNMENTQuestion 1: 3 Data Encryption Standards for WiMAXThe 3 data encryption standards required for the wireless data transmission are givenas follows:RSA:The first data encryption standard used in WiMAX network is RSA. It is anacronym for Ron Rivest, Adi Shamir and Leonard Adleman and the algorithm was developedby them in the year 1978 (Barker, 2017). This was the first public key cryptosystems that wasdeveloped by them. In this special type of cryptosystem, the decryption key is private (secret)and is different from the encryption key which is made public and this is the reason why thisis known as asymmetric encryption. The asymmetry of this RSA algorithm is based on thedifficulty of factorization of product of two prime numbers. A RSA algorithm user is able topublish the public key which is based on the two prime numbers that are large.DES:The next data encryption standard is known as triple data encryption standardor 3-DES. This encryption standard was first published in the year 1975 and this triple DESstandard is based on DES standard and it offers significant advantage over the other (Garg,Varshney & Bhardwaj, 2015). There was a slight modification over the Data EncryptionStandard. DES used block cipher but the key size was less and for triple data encryptionstandard, the block cipher size was tripled to provide more protection against brute forces.AES:The third standard is known by the name – AES (Advanced data encryptionstandard). It was developed by United States National Institute of standards and technology inthe year 2001 (Adhie et al., 2018). Its block size consists of three different key length(192,128 and 256) bits. In this algorithm, same key should be used for encryption anddecryption and that is why it is known as symmetric key algorithm.
2WIRELESS NETWORKING ASSIGNMENTQuestion 2: Traffic coordination and the methods to reduce collisionFor traffic coordination in a shared wireless medium, medium access layer orwhich is popularly known as media access layer is used (Djahel et al., 2015). It is a sub layerand along with the logical link control layer, it makes up the data link layer. These two sublayers makes up the OSI layer by corresponding to layer 2. The media access layer containsthe MAC block which has the function of encapsulating high level frames and then itconverts those into frames suitable for transmission (Abraham, 2017). Some of the mainfunctions provided by the MAC layer are frame recognition and delimiting. This layer hasone interesting protocol known as multiple access protocol. This enables multiple stations toconnect to the same physical layer for enhanced sharing. There are some protocols that helpin eliminating collision (Nellore & Hancke, 2016). One of them is known as MACAW(Multiple Access with Collision Avoidance for wireless systems). This is mainly used in AD-HOC networks.Question 3: Summary IoT research paperResearch Paper:Design and Simulation of State-of-Art ZigBee Transmitter for IoTWireless DevicesSummary:According to Zorzi et al. (2010), the development and improvement of thetechnology had resulted in forming the utilization of the activities for forming the implicationof the developed rapid development and operations. The technology of ZigBee Transmitterhad been helpful for the implication of the IoT technology and the implication of thedevelopment models for effective transmission model. The analysis of the operations hadresulted in forming the use of WPAN or wireless personal area network and using theactivities for forming the implication of the operations. The analysis had resulted indeveloping an understanding for the operations of ZigBee at the frequency bands of 868
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document