logo

Question 1: Data Encryption Standards for WiMAX

6 Pages1264 Words236 Views
   

Added on  2021-05-31

About This Document

WIRELESS NETWORKING ASSIGNMENT WIRELESS NETWORKING ASSIGNMENT 5 Wireless Networking Assignment: Author Note: Question 1: 3 Data Encryption Standards for WiMAX The 3 data encryption standards required for the wireless data transmission are given as follows: RSA: The first data encryption standard used in WiMAX network is RSA. DES: The next data encryption standard is known as triple data encryption standard or 3-DES. Question 2: Traffic coordination and the methods to reduce collision For traffic coordination in a shared wireless medium

Question 1: Data Encryption Standards for WiMAX

   Added on 2021-05-31

ShareRelated Documents
Running head: WIRELESS NETWORKING ASSIGNMENTWireless Networking Assignment: Name of the Student:Name of the University:Author Note:
Question 1: Data Encryption Standards for WiMAX_1
1WIRELESS NETWORKING ASSIGNMENTQuestion 1: 3 Data Encryption Standards for WiMAXThe 3 data encryption standards required for the wireless data transmission are givenas follows:RSA: The first data encryption standard used in WiMAX network is RSA. It is anacronym for Ron Rivest, Adi Shamir and Leonard Adleman and the algorithm was developedby them in the year 1978 (Barker, 2017). This was the first public key cryptosystems that wasdeveloped by them. In this special type of cryptosystem, the decryption key is private (secret)and is different from the encryption key which is made public and this is the reason why thisis known as asymmetric encryption. The asymmetry of this RSA algorithm is based on thedifficulty of factorization of product of two prime numbers. A RSA algorithm user is able topublish the public key which is based on the two prime numbers that are large. DES: The next data encryption standard is known as triple data encryption standardor 3-DES. This encryption standard was first published in the year 1975 and this triple DESstandard is based on DES standard and it offers significant advantage over the other (Garg,Varshney & Bhardwaj, 2015). There was a slight modification over the Data EncryptionStandard. DES used block cipher but the key size was less and for triple data encryptionstandard, the block cipher size was tripled to provide more protection against brute forces.AES: The third standard is known by the name – AES (Advanced data encryptionstandard). It was developed by United States National Institute of standards and technology inthe year 2001 (Adhie et al., 2018). Its block size consists of three different key length(192,128 and 256) bits. In this algorithm, same key should be used for encryption anddecryption and that is why it is known as symmetric key algorithm.
Question 1: Data Encryption Standards for WiMAX_2
2WIRELESS NETWORKING ASSIGNMENTQuestion 2: Traffic coordination and the methods to reduce collision For traffic coordination in a shared wireless medium, medium access layer orwhich is popularly known as media access layer is used (Djahel et al., 2015). It is a sub layerand along with the logical link control layer, it makes up the data link layer. These two sublayers makes up the OSI layer by corresponding to layer 2. The media access layer containsthe MAC block which has the function of encapsulating high level frames and then itconverts those into frames suitable for transmission (Abraham, 2017). Some of the mainfunctions provided by the MAC layer are frame recognition and delimiting. This layer hasone interesting protocol known as multiple access protocol. This enables multiple stations toconnect to the same physical layer for enhanced sharing. There are some protocols that helpin eliminating collision (Nellore & Hancke, 2016). One of them is known as MACAW(Multiple Access with Collision Avoidance for wireless systems). This is mainly used in AD-HOC networks. Question 3: Summary IoT research paperResearch Paper: Design and Simulation of State-of-Art ZigBee Transmitter for IoTWireless Devices Summary: According to Zorzi et al. (2010), the development and improvement of thetechnology had resulted in forming the utilization of the activities for forming the implicationof the developed rapid development and operations. The technology of ZigBee Transmitterhad been helpful for the implication of the IoT technology and the implication of thedevelopment models for effective transmission model. The analysis of the operations hadresulted in forming the use of WPAN or wireless personal area network and using theactivities for forming the implication of the operations. The analysis had resulted indeveloping an understanding for the operations of ZigBee at the frequency bands of 868
Question 1: Data Encryption Standards for WiMAX_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireless Networking Concepts
|5
|897
|471

Wireless network Concepts Assignment
|11
|2890
|43

Wireless Networking Concepts Assignment PDF
|8
|1687
|19

Signal Processing and Wireless Networks (pdf)
|5
|1174
|22

Assignment On Wireless Networking Concepts (Doc)
|9
|1534
|47

Introduction to the Concept on Wireless Networking
|7
|1309
|50