Wireless Networking Concepts Assignment - Module Name - Semester 1
VerifiedAdded on  2020/04/07
|13
|1247
|83
Homework Assignment
AI Summary
This assignment delves into the core concepts of wireless networking, covering key technologies and standards. It begins with an overview of WiMAX, exploring its functionalities, applications, and data encryption standards like DES, 2DES, and 3DES. The assignment then transitions to Wireless Personal Area Networks (WPANs), examining the security challenges associated with Bluetooth and INSTEON technologies. The document also explores energy harvesting in wireless communication, discussing the work of Ulkus and Sennur, as well as the research by Shaikh, Faisal Karim, and Sherali Zeadally, with an emphasis on methods like radio frequency and solar energy harvesting. The assignment concludes with a comprehensive list of references supporting the discussed topics.

Running head: WIRELESS NETWORKING CONCEPTS
Wireless Networking Concepts
Name of the student
Name of the University
Author Note
Wireless Networking Concepts
Name of the student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1WIRELESS NETWORKING CONCEPTS
Table of Contents
Answer to Question 1..........................................................................................................2
Answer to Question 2..........................................................................................................3
Answer to Question 3..........................................................................................................4
Answer to Question 4:.........................................................................................................6
References..........................................................................................................................13
Table of Contents
Answer to Question 1..........................................................................................................2
Answer to Question 2..........................................................................................................3
Answer to Question 3..........................................................................................................4
Answer to Question 4:.........................................................................................................6
References..........................................................................................................................13

2WIRELESS NETWORKING CONCEPTS
Answer to Question 1
WiMAX stands for Worldwide Interoperability for Microwave access is considered as
standard of technology which is used to provide wireless broadband access to various cables and
DSL. WiMAX many provides services like point to multipoint and point to point application.
Application of these technology is considered to be cost effective and it also provides a much
larger surface area than Wi-Fi that is IEEE 802.11(Amiri et al., 2013).
The three data encryption standard used for WiMAX are DES, 2DES and 3DES. DES
data encryption is an improvisation of older system that is LUCIFER. DES was designed to
improve performance in hardware system as compared to software system. It has certain
algorithms which encrypts various text in 64 bit blocks using 56-bit key (Gomez, Oller &
Paradells, 2012).
2DES was developed as DES was proved to be highly insecure and undependable. 2DES
has some new methods which can be stronger and more secure which uses the old algorithm. The
improvement ultimately resulted in the formation of 3DES (Kim et al., 2013). Double DES has
the work which does the work using particular encryption technique. 256 is the attempt that can be
used to solve the problem, then the ways to solve problem using different keys of n bits is 22n.
3DES resulted from the thinking that Double DES cannot be strong enough to tackle the mid-
level attacks. 3DES has mainly three encryption key that is the first key mainly uses k1, the
second key mainly focuses on k2 and the last encryption mainly focuses on the uses of k3 key
(Gomez, Oller & Paradells, 2012)
.
Answer to Question 1
WiMAX stands for Worldwide Interoperability for Microwave access is considered as
standard of technology which is used to provide wireless broadband access to various cables and
DSL. WiMAX many provides services like point to multipoint and point to point application.
Application of these technology is considered to be cost effective and it also provides a much
larger surface area than Wi-Fi that is IEEE 802.11(Amiri et al., 2013).
The three data encryption standard used for WiMAX are DES, 2DES and 3DES. DES
data encryption is an improvisation of older system that is LUCIFER. DES was designed to
improve performance in hardware system as compared to software system. It has certain
algorithms which encrypts various text in 64 bit blocks using 56-bit key (Gomez, Oller &
Paradells, 2012).
2DES was developed as DES was proved to be highly insecure and undependable. 2DES
has some new methods which can be stronger and more secure which uses the old algorithm. The
improvement ultimately resulted in the formation of 3DES (Kim et al., 2013). Double DES has
the work which does the work using particular encryption technique. 256 is the attempt that can be
used to solve the problem, then the ways to solve problem using different keys of n bits is 22n.
3DES resulted from the thinking that Double DES cannot be strong enough to tackle the mid-
level attacks. 3DES has mainly three encryption key that is the first key mainly uses k1, the
second key mainly focuses on k2 and the last encryption mainly focuses on the uses of k3 key
(Gomez, Oller & Paradells, 2012)
.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3WIRELESS NETWORKING CONCEPTS
Answer to Question 2
WPAN mainly stands for wireless personal area network which is nothing but a network
which mainly uses interconnection of devices in a particular workspace where the connection is
considered to be wireless. Within the range 10 meters WPAN work properly for establishing
communication among various devices. Security challenges of two popular WPAN technology
that is Bluetooth and INSTEON has been discussed below (Friedman, Kogan & Krivolapov,
2013).
Bluetooth is a wireless technology that is mainly used for communication with in a range
of 100 meters. This technology mainly has low power consumption and it is a low cost
technology. It mainly uses on Time-Division duplex technology which is used for full duplex
technology. Bluetooth can be considered as a wireless technology which allow connection of one
electronic device with other device without the need of a physical cable for data exchange (Lee,
Zhang & Huang, 2013). Data contained important information can be easily withdrawn from
improperly configured devices. Proper launching of attacks is possible by using various
malwares (Amiri et al., 2013).
INSTEON is a latest technology which based on home automation that is used for
controlling light, switches and other home based devices by using power line links and properties
of radio frequency. Devices using INSTEON technology mainly uses simulcast method of
routing which removes the burden of storing data. Whenever there is unavailability of common
device the data can be easily accessed through different paths (Friedman, Kogan & Krivolapov,
2013).
Answer to Question 2
WPAN mainly stands for wireless personal area network which is nothing but a network
which mainly uses interconnection of devices in a particular workspace where the connection is
considered to be wireless. Within the range 10 meters WPAN work properly for establishing
communication among various devices. Security challenges of two popular WPAN technology
that is Bluetooth and INSTEON has been discussed below (Friedman, Kogan & Krivolapov,
2013).
Bluetooth is a wireless technology that is mainly used for communication with in a range
of 100 meters. This technology mainly has low power consumption and it is a low cost
technology. It mainly uses on Time-Division duplex technology which is used for full duplex
technology. Bluetooth can be considered as a wireless technology which allow connection of one
electronic device with other device without the need of a physical cable for data exchange (Lee,
Zhang & Huang, 2013). Data contained important information can be easily withdrawn from
improperly configured devices. Proper launching of attacks is possible by using various
malwares (Amiri et al., 2013).
INSTEON is a latest technology which based on home automation that is used for
controlling light, switches and other home based devices by using power line links and properties
of radio frequency. Devices using INSTEON technology mainly uses simulcast method of
routing which removes the burden of storing data. Whenever there is unavailability of common
device the data can be easily accessed through different paths (Friedman, Kogan & Krivolapov,
2013).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4WIRELESS NETWORKING CONCEPTS
Answer to Question 3
After going through Energy harvesting through wireless communication written by Ulkus
and Sennur it can be concluded that the topic mainly emphasizes on energy harvesting
communication, simultaneous energy transfers of energy, energy co-operation and wireless
information. Self-sufficiency and operation can be easily achieved by emphasizing several
changes in wireless networking (Mehta & Gupta, 2012). Medium Access Control for various
energy harvesting technology can be easily used for keeping an eye medium access control
technique which mainly depends on the use of single loop network for collecting data. The
collected data can be used for energy harvesting devices used in the surroundings. Improvisation
of performance and network changes can be easily achieved by using energy and information
transfer. From the above discussion it can be stated that the future problems related to energy
harvesting cannot be achieved by using only various steps of network design which is form the
processing of signal to its communication (Amiri et al., 2013).
After going through Energy harvesting in wireless sensor and networks Written by
Shaikh, Faisal Karim and Sherali Zeadally it can be stated that the topic mainly emphasizes on
increasing motivation for energy harvesting in WSNs. WSNs mainly stands for wireless sensor
network and various methods of harvesting like flow based technology, radio frequency, solar
and thermal technology has been discussed. Radio frequency energy harvesting mainly converts
radio waves into DC power. Conversion of RF signal to DC power can be easily achieved using
various techniques like gain of antenna and gap between destination and source, source of power
(Gomez, Oller & Paradells, 2012).
Solar based harvesting system mainly focuses on the use of solar energy as the solar
harvesting system is limited during the night; it is the duty of developer to look for various
Answer to Question 3
After going through Energy harvesting through wireless communication written by Ulkus
and Sennur it can be concluded that the topic mainly emphasizes on energy harvesting
communication, simultaneous energy transfers of energy, energy co-operation and wireless
information. Self-sufficiency and operation can be easily achieved by emphasizing several
changes in wireless networking (Mehta & Gupta, 2012). Medium Access Control for various
energy harvesting technology can be easily used for keeping an eye medium access control
technique which mainly depends on the use of single loop network for collecting data. The
collected data can be used for energy harvesting devices used in the surroundings. Improvisation
of performance and network changes can be easily achieved by using energy and information
transfer. From the above discussion it can be stated that the future problems related to energy
harvesting cannot be achieved by using only various steps of network design which is form the
processing of signal to its communication (Amiri et al., 2013).
After going through Energy harvesting in wireless sensor and networks Written by
Shaikh, Faisal Karim and Sherali Zeadally it can be stated that the topic mainly emphasizes on
increasing motivation for energy harvesting in WSNs. WSNs mainly stands for wireless sensor
network and various methods of harvesting like flow based technology, radio frequency, solar
and thermal technology has been discussed. Radio frequency energy harvesting mainly converts
radio waves into DC power. Conversion of RF signal to DC power can be easily achieved using
various techniques like gain of antenna and gap between destination and source, source of power
(Gomez, Oller & Paradells, 2012).
Solar based harvesting system mainly focuses on the use of solar energy as the solar
harvesting system is limited during the night; it is the duty of developer to look for various

5WIRELESS NETWORKING CONCEPTS
methods for achieving high efficiency during the daytime (Friedman, Kogan & Krivolapov,
2013).
Answer to Question 4:
methods for achieving high efficiency during the daytime (Friedman, Kogan & Krivolapov,
2013).
Answer to Question 4:
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6WIRELESS NETWORKING CONCEPTS
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7WIRELESS NETWORKING CONCEPTS

8WIRELESS NETWORKING CONCEPTS
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9WIRELESS NETWORKING CONCEPTS
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10WIRELESS NETWORKING CONCEPTS

11WIRELESS NETWORKING CONCEPTS
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





