Wireless Networking Concepts Assignment - University Name

Verified

Added on  2021/05/30

|5
|1174
|22
Homework Assignment
AI Summary
This document presents a comprehensive solution to a wireless networking assignment, addressing key concepts in the field. The solution begins by comparing and contrasting three data encryption standards used in WiMax: Advanced Encryption Standard (AES), Triple Data Encryption Standard (3DES), and Rivest, Shamir and Adleman (RSA), analyzing their definitions, key sizes, computational times, memory usage, and performance. The assignment then delves into the Carrier Sense Multiple Access (CSMA) technique, explaining its role in coordinating traffic in shared wireless mediums and the use of Request to Send (RTS) and Clear to Send (CTS) techniques to mitigate collisions. Finally, the solution explores ZigBee technology, its role in low-power networking, its application in the Internet of Things (IoT), and the challenges associated with IoT, highlighting the technology's architecture and error detection mechanisms, and emphasizing the role of ZigBee in securing data. The assignment is supported by relevant references.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: WIRELESS NETWORKING CONCEPTS
Wireless Networking Concepts
Name of the Student
Name of the University
Author’s Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
WIRELESS NETWORKING CONCEPTS
Question 1
The three data encryption standards for the Worldwide Interoperability for Microwave
Access or WiMax are as follows:
i) Advanced Encryption Standard
ii) Triple Data Encryption Standard
iii) Rivest, Shamir and Adleman Standard
The proper comparison and contrast between the three above mentioned standards are
as follows:
Key Factors AES 3DES RSA
1. Definition AES is the symmetric
block cipher, which
makes utilization of a
specific 128 bits block
length with the three
lengths of key of 128 bits,
192 bits and 256 bits
(Makimoto & Yamashita,
2013).
3DES is the symmetric
block cipher, which
eventually applies the
algorithm of data
encryption thrice in one
data block.
The third encryption
standard is RSA
standard. It was
developed by the data
security of RSA. This
algorithm makes
utilization of the prime
factorization of two large
numbers (Rappaport et
al., 2015).
2. Size of Key The key sizes are 128
bits, 192 bits and 256 bits.
The size of each key is 56
bits.
The key size is 2048 bits
and it is the most popular
amongst the rest.
3. Time for
Computation
AES is responsible for
providing the highest ratio
The time for computation
is minimum in the
The highest time
consuming method is the
Document Page
2
WIRELESS NETWORKING CONCEPTS
of speed for encryption,
although, this speed
decreases with the
increasing size in input
file.
algorithm of 3DES,
although the difference is
negligible between AES
and 3DES (Ho, Gao &
Le-Ngoc, 2013).
RSA encryption
algorithm and hence is
often avoided by various
users.
4. Usage of
Memory
AES comprises of the
lowest usage of memory.
3DES uses less memory
than RSA; however,
higher memory than AES.
RSA algorithm
consumes the highest
memory.
5. Performance AES has better
performance than RSA
and 3DES.
3DES has better
performance than DES.
RSA has lower
performance than AES
and 3DES (Ren, Baptista
& Grebogi, 2013).
Question 2
The traffic is coordinated in the shared wireless medium with the help of CSMA
technique. Carrier sense multiple access or CSMA is the significant technique or MAC
protocol, where each eventually verifies the absenteeism of any other traffic before the
transmission over a shared transmission medium. This helps to coordinate the traffic properly
(Makimoto & Yamashita, 2013). The transmitter attempts in determining the fact that
whether any other transmission is in the progress before even starting the transmission by
utilizing the mechanism of carrier sense. It is utilized in detecting the carrier signal presence
from any other node before even attempting to transmit it. As it helps in collision avoidance,
detection and also resolution, CSMA is utilized by various users.
The methods for reducing the collisions within the shared wireless medium are RTS
technique and CTS technique. Within the shared wireless medium, the two techniques are
Document Page
3
WIRELESS NETWORKING CONCEPTS
Request to Send and Clear to Send (Ho, Gao & Le-Ngoc, 2013). Often collision occurs
within the medium and thus these two techniques are utilized for avoiding the collision in the
shared wireless medium.
Question 3
Due to the high rise of wireless networks, there is always a constant increment in the
adoption of longer range of applications and higher speed. The total demand of all these
technologies has incremented over years. ZigBee technology is developed for the higher
increase of lower power networking and lower data consumption. The utilization of internet
of internet of things is also increased over years and there are various challenges or problems
with it. These challenges could be easily mitigated or reduced with proper measures.
One of the most significant technologies of wireless communication is ZigBee
technology. This ZigBee technology is the specification of the high level communication that
could be easily achieved in the lowest power consumption and lower costs. The ZigBee
technology is one the basis of IEEE 802.15.4 standard for PAN. This particular technology is
being maintained by the ZigBee alliance (Elarabi, Deep & Rai, 2015). The specific
transmitter within the technology of ZigBee mainly consists of four distinct blocks. These
blocks are symbol to chip, bit to symbol, OQPSK modulator and CRC. The technique of error
detection within CRC is solely related to ZigBee for the purpose of evaluation of codes error.
The security of data can be increased with the help of ZigBee technology.
The most significant technology of IoT is the connection of smart things for providing
a chance to enable the rich set of evolutionary with various applications of revolutionary as
well as services. IoT can easily interact with environment and thus receiving the important
information within the status (Zorzi et al., 2010). Internet of things is the newest technology
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
WIRELESS NETWORKING CONCEPTS
and there are studies related to the utilization of the technology. This has become successful
as it has the ability for integration of various types of services, technologies and devices.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]