Professional Documents
Culture Documents
Assignment #: Shaheed Zulfikar Ali Bhutto Institute of Science &
Assignment #: Shaheed Zulfikar Ali Bhutto Institute of Science &
COMPUTER SCIENCE
TotalMark 5
ObtainedMark
DCC
Assignment #
Last date of Submission: h
M
20
Reg Number:
COMPUTER SCIENCE
Instructi
Copied or shown assignments will be marked
Late submissions will result in
Assignment will be graded after a thorough
If you have any questions, you can e-mail it mailto:mehr.nisa@szabist-
Question
Encrypti
Encryption is a process which transforms the original information into an unrecognizable form.
new form of the message is entirely different from the original message. That's why a hacker is
able to read the data as senders use an encryption algorithm. Encryption is usually done using
algorithms. Data is encrypted to make it safe from stealing. However, many known companies
encrypt data to keep their trade secret from their
Decrypti
Types of
DES
This study source was downloaded by 100000843448487 from CourseHero.com on 05-25-2022 03:27:41 GMT -
AES
One of the most secure encryption types, Advanced Encryption Standard (AES) is used
governments and security organizations as well as everyday businesses for
communications. AES uses “symmetric” key encryption. Someone on the receiving end of the data
will need a key to
AES differs from other encryption types in that it encrypts data in a single block, instead of
individual bits of data. The block sizes determine the name for each kind of AES encrypted
AES-128 encrypts blocks of a 128-bit
AES-192 encrypts blocks of a 192-bit
AES-256 encrypts blocks of a 256-bit
In addition to having different block sizes, each encryption method has a different number of
rounds. These rounds are the processes of changing a plaintext piece of data into encrypted data
ciphered text. AES-128, for example, uses 10 rounds, and AES-256 uses 14
RSA
A b C D E F G J K L M O P Q R S T U V
0 1 2 3 4 5 6 7 8 9 1 1 1 1 1 1 1 1 1 1 2 2
W Y Z
2 2 2 2
This study source was downloaded by 100000843448487 from CourseHero.com on 05-25-2022 03:27:41 GMT -
1
Decrypti
C Q T B S V G
n 1 1 1 1 2 6
k X M T A N O
n 2 1 1 0 1 1
s 1 7 8 1 8 1
t T H I S I S
C L X F K I N Z
N 1 2 5 1 8 1 2
K Y T M O U W P
N 2 1 1 1 2 2 1
S 1 4 1 2 1 1 1
T N E T W O R K
C G Y R R P B O O
N 6 2 1 1 1 1 1 1
K O U P X Y T V Q
N 1 2 1 2 2 1 2 1
s 1 4 2 2 1 8 1 2
T S E C U R I T Y
This study source was downloaded by 100000843448487 from CourseHero.com on 05-25-2022 03:27:41 GMT -
Question
ANSW
2 Mobile
ANSW
Mobile IP is a communication protocol (created by extending Internet Protocol, IP) that allows
the users to move from one network to another with the same IP address. It ensures that the
communication will continue without user’s sessions or connections being dropped.
Terminolog
Mobile Node
This study source was downloaded by 100000843448487 from CourseHero.com on 05-25-2022 03:27:41 GMT -
It is the hand-held communication device that the user caries e.g. Cell
Home
It is a network to which the mobile node originally belongs to as per its assigned IP
(home
Home Agent
It is a router in home network to which the mobile node was originally
Home
It is the permanent IP address assigned to the mobile node (within its home
Foreign
It is the current network to which the mobile node is visiting (away from its home
Foreign Agent
It is a router in foreign network to which mobile node is currently connected. The packets
the home agent are sent to the foreign agent which delivers it to the mobile
Correspondent Node
It is a device on the internet communicating to the mobile
Care of Address
It is the temporary address used by a mobile node while it is moving away from its
netw
ANSW
IEEE 802.15.4 or Zigbee is a wireless personal area network (PAN) which can be used in several
areas. Some basic areas where it can be utilize are building automation, control devices,
healthcare, PC peripherals and consumer electronics. The main technology used to develop
wireless network for IEEE 802.15.4 and Zigbee is based on the same layers which are
(PHY) and medium access control (MAC). The huge different between IEEE 802.15.4 and
the ability of which kind of topology can be provided by the network. More over the security
in Zigbee is higher compare to IEEE 802.15.4. The IEEE 802.15.4 can provide point-to-point
point-to-multipoint topology, called star topology, while Zigbee can be used for the one’s
above plus cluster tree and mesh topology. To achieve the functionalities which Zigbee can
two more layers from the Open System Interconnection (OSI) is added and those are Network
Application layers. The main focus of IEEE 802.15.4 protocol is it ability to deliver low
consumption and low-rate wireless communication devices. The following numbers of channels
be used in IEEE 802.15.4, which is 16 channels for ISM 2.4GHz, 10 channels for ISM 900 MHz
1 channel for 868 MHz. The PHY layer used in IEEE 802.15.4 provides Link Quality
(LQI) for the communication that occur between transmitter and receiver in order to maintain
quality of signals transmitted between nodes. The MAC layer which is utilized in IEEE 802.15.4
communication is based on Carrier Sense Multiple Access with Collision Avoidance
mechanism to get admission of the channels. Devices that are supported by IEEE 802.15.4 are
Function Device (FFD) and Reduced Function Device (RFD). A device which is constructed as
can be used for both FFD and RFD in communication. FFD can also be set as PAN
Router or End Device, while RFD is only suitable as End Device. Communication for RFD can
occur with FFD. An overview of how the protocol stack is defined for IEEE
4 Wireless IEEE
This study source was downloaded by 100000843448487 from CourseHero.com on 05-25-2022 03:27:41 GMT -
The IEEE 802.15.6 standard is the latest international standard for Wireless Body
Network
WBAN supports a variety of real-time health monitoring and consumer electronics applications.
latest international standard for WBAN is the IEEE 802.15.6 standard which aims to provide
international standard for low power, short range, and extremely reliable wireless
within the surrounding area of the human body, supporting a vast range of data rates for
applications. Short-range, wireless communications in the vicinity of, or inside, a human body
not limited to humans) are specified in this standard. It uses existing industrial scientific
(ISM) bands as well as frequency bands approved by national medical and/or regulatory
Support for quality of service (QoS), extremely low power, and data rates up to 10 Mbps is
while simultaneously complying with strict non-interference guidelines where needed. This
considers effects on portable antennas due to the presence of a person (varying with male,
skinny, heavy, etc.), radiation pattern shaping to minimize the specific absorption rate (SAR)
the body, and changes in characteristics as a result of the user
Question
Err
While sending the data from the sender to the receiver
a high possibility that the data may get lost or corrupted. Error is
situation when the sender's data does not match the data at
receiver's end. When an error is detected then we need to
the data. So, there are various techniques of error control in
networ
Error
Error Control in the data link layer is a process of detecting and retransmitting the data which
been lost or corrupted during the transmission of data. Any reliable system must
mechanism for detecting and correcting such errors. Error detection and correction occur at
the transport layer and the data link layer. Here we will talk about the data link layer and check
by bit that if there is any error or
Types of
Single bit Error: When there is a change in only one bit of the sender's data then it is
single bit
Example: If the sender sends 101(5) to the receiver but the receiver receives 100(4) then it
single bit
This study source was downloaded by 100000843448487 from CourseHero.com on 05-25-2022 03:27:41 GMT -
burst
Example: If the sender sends 1011(11) to the sender but the receiver receives 1000(8) then it
burst
Phases in Error
Error Detection: Firstly, we need to detect at the receiver end that the data received
error or
Acknowledgement: If any error is detected the receiver sends a
acknowledgement(NACK) to the
Retransmission: When the sender receives a negative acknowledgement or if
acknowledgement is not received from the receiver sender retransmits the data
Error
1 Vertical Redundancy
2 Longitudinal Redundancy
3 Circular Redundancy
4 CheckS
Po
This study source was downloaded by 100000843448487 from CourseHero.com on 05-25-2022 03:27:41 GMT -