You are on page 1of 9

Shaheed Zulfikar Ali Bhutto Institute of Science &

COMPUTER SCIENCE

TotalMark 5

ObtainedMark

DCC
Assignment #
Last date of Submission: h
M
20

Submitted To: Ms. Mehr un

Student Name: SAMIULLAH

Reg Number:

DCwas downloaded by 100000843448487 from CourseHero.com


This study source BSon 05-25-2022 03:27:41 GMT - SZABIST-
DCwas downloaded by 100000843448487 from CourseHero.com
This study source BSon 05-25-2022 03:27:41 GMT - SZABIST-
Shaheed Zulfikar Ali Bhutto Institute of Science &

COMPUTER SCIENCE
Instructi
 Copied or shown assignments will be marked
 Late submissions will result in
 Assignment will be graded after a thorough
 If you have any questions, you can e-mail it mailto:mehr.nisa@szabist-

Question

What is Encryption/Decryption? Name different types of Encryption. Perform OTP


Encrypt and Decrypt the following text. (2
Message: This is Network
The Pad: Not allowed copy and

Encrypti

Encryption is a process which transforms the original information into an unrecognizable form.
new form of the message is entirely different from the original message. That's why a hacker is
able to read the data as senders use an encryption algorithm. Encryption is usually done using
algorithms. Data is encrypted to make it safe from stealing. However, many known companies
encrypt data to keep their trade secret from their

Decrypti

Decryption is a process of converting encoded/encrypted data in a form that is readable


understood by a human or a computer. This method is performed by un-encrypting the text
or by using keys used to encrypt the original

Types of

The three major encryption types are DES, AES, and

DES

Accepted as a standard of encryption in the 1970s, DES encryption is no longer considered to


safe on its own. It encrypts just 56-bits of data at a time and it was found to be easily hacked
long after its introduction. It has, however, served as the standard upon which future, more-
encryption tools were

This study source was downloaded by 100000843448487 from CourseHero.com on 05-25-2022 03:27:41 GMT -
AES

One of the most secure encryption types, Advanced Encryption Standard (AES) is used
governments and security organizations as well as everyday businesses for

communications. AES uses “symmetric” key encryption. Someone on the receiving end of the data
will need a key to
AES differs from other encryption types in that it encrypts data in a single block, instead of
individual bits of data. The block sizes determine the name for each kind of AES encrypted
 AES-128 encrypts blocks of a 128-bit
 AES-192 encrypts blocks of a 192-bit
 AES-256 encrypts blocks of a 256-bit
In addition to having different block sizes, each encryption method has a different number of
rounds. These rounds are the processes of changing a plaintext piece of data into encrypted data
ciphered text. AES-128, for example, uses 10 rounds, and AES-256 uses 14

RSA

Another popular encryption standard is “Rivest-Shamir-Adleman” or RSA. It is widely used for


sent online and relies on a public key to encrypt the data. Those on the receiving end of the data
have their own private key to decode the messages. It’s proven to be a secure way to
information between people who may not know each other and want to communicate
compromising their personal or sensitive

Perform OTP to Encrypt and Decrypt the following


Message: This is Network
The Pad: Not allowed copy and

A b C D E F G J K L M O P Q R S T U V
0 1 2 3 4 5 6 7 8 9 1 1 1 1 1 1 1 1 1 1 2 2
W Y Z
2 2 2 2

Text = i netwo secu


Key= n ytmou oupxy

We will add text no with key text


We will subtract from 26 if addition is greater then

This study source was downloaded by 100000843448487 from CourseHero.com on 05-25-2022 03:27:41 GMT -
1

Decrypti

In decryption we will subtract cipher text no from


In subtraction is less than 0 we will add

C Q T B S V G
n 1 1 1 1 2 6
k X M T A N O
n 2 1 1 0 1 1
s 1 7 8 1 8 1
t T H I S I S

C L X F K I N Z
N 1 2 5 1 8 1 2
K Y T M O U W P
N 2 1 1 1 2 2 1
S 1 4 1 2 1 1 1
T N E T W O R K

C G Y R R P B O O
N 6 2 1 1 1 1 1 1
K O U P X Y T V Q
N 1 2 1 2 2 1 2 1
s 1 4 2 2 1 8 1 2
T S E C U R I T Y

Text= this is network

This study source was downloaded by 100000843448487 from CourseHero.com on 05-25-2022 03:27:41 GMT -
Question

Write a detailed note on the following: (0.5 x 4 = 2


1 Cellular

ANSW

Cellular network is an underlying technology for mobile phones, personal communication


wireless networking etc. The technology is developed for mobile radio telephone to replace
power transmitter/receiver systems. Cellular networks use lower power, shorter range and
transmitters for data
Features of Cellular
Wireless Cellular Systems solves the problem of spectral congestion and increases user
The features of cellular systems are as
 Offer very high capacity in a limited
 Reuse of radio channel in different
 Enable a fixed number of channels to serve an arbitrarily large number of users by
the channel throughout the coverage
 Communication is always between mobile and base station (not directly between
 Each cellular base station is allocated a group of radio channels within a small
area called a
 Neighboring cells are assigned different channel
 By limiting the coverage area to within the boundary of the cell, the channel groups
reused to cover different
 Keep interference levels within tolerable
 Frequency reuse or frequency
 Organization of Wireless Cellular
Cellular network is organized into multiple low power transmitters each 100w or

2 Mobile

ANSW

Mobile IP is a communication protocol (created by extending Internet Protocol, IP) that allows
the users to move from one network to another with the same IP address. It ensures that the
communication will continue without user’s sessions or connections being dropped.
Terminolog
 Mobile Node

This study source was downloaded by 100000843448487 from CourseHero.com on 05-25-2022 03:27:41 GMT -
It is the hand-held communication device that the user caries e.g. Cell
 Home
It is a network to which the mobile node originally belongs to as per its assigned IP
(home
 Home Agent
It is a router in home network to which the mobile node was originally
 Home
It is the permanent IP address assigned to the mobile node (within its home
 Foreign
It is the current network to which the mobile node is visiting (away from its home
 Foreign Agent
It is a router in foreign network to which mobile node is currently connected. The packets
the home agent are sent to the foreign agent which delivers it to the mobile
 Correspondent Node
It is a device on the internet communicating to the mobile
 Care of Address
It is the temporary address used by a mobile node while it is moving away from its
netw

3 Wireless IEEE 802.15.4

ANSW

IEEE 802.15.4 or Zigbee is a wireless personal area network (PAN) which can be used in several
areas. Some basic areas where it can be utilize are building automation, control devices,
healthcare, PC peripherals and consumer electronics. The main technology used to develop
wireless network for IEEE 802.15.4 and Zigbee is based on the same layers which are
(PHY) and medium access control (MAC). The huge different between IEEE 802.15.4 and
the ability of which kind of topology can be provided by the network. More over the security
in Zigbee is higher compare to IEEE 802.15.4. The IEEE 802.15.4 can provide point-to-point
point-to-multipoint topology, called star topology, while Zigbee can be used for the one’s
above plus cluster tree and mesh topology. To achieve the functionalities which Zigbee can
two more layers from the Open System Interconnection (OSI) is added and those are Network
Application layers. The main focus of IEEE 802.15.4 protocol is it ability to deliver low
consumption and low-rate wireless communication devices. The following numbers of channels
be used in IEEE 802.15.4, which is 16 channels for ISM 2.4GHz, 10 channels for ISM 900 MHz
1 channel for 868 MHz. The PHY layer used in IEEE 802.15.4 provides Link Quality
(LQI) for the communication that occur between transmitter and receiver in order to maintain
quality of signals transmitted between nodes. The MAC layer which is utilized in IEEE 802.15.4
communication is based on Carrier Sense Multiple Access with Collision Avoidance
mechanism to get admission of the channels. Devices that are supported by IEEE 802.15.4 are
Function Device (FFD) and Reduced Function Device (RFD). A device which is constructed as
can be used for both FFD and RFD in communication. FFD can also be set as PAN
Router or End Device, while RFD is only suitable as End Device. Communication for RFD can
occur with FFD. An overview of how the protocol stack is defined for IEEE

4 Wireless IEEE

This study source was downloaded by 100000843448487 from CourseHero.com on 05-25-2022 03:27:41 GMT -
The IEEE 802.15.6 standard is the latest international standard for Wireless Body
Network
WBAN supports a variety of real-time health monitoring and consumer electronics applications.
latest international standard for WBAN is the IEEE 802.15.6 standard which aims to provide
international standard for low power, short range, and extremely reliable wireless
within the surrounding area of the human body, supporting a vast range of data rates for
applications. Short-range, wireless communications in the vicinity of, or inside, a human body
not limited to humans) are specified in this standard. It uses existing industrial scientific
(ISM) bands as well as frequency bands approved by national medical and/or regulatory
Support for quality of service (QoS), extremely low power, and data rates up to 10 Mbps is
while simultaneously complying with strict non-interference guidelines where needed. This
considers effects on portable antennas due to the presence of a person (varying with male,
skinny, heavy, etc.), radiation pattern shaping to minimize the specific absorption rate (SAR)
the body, and changes in characteristics as a result of the user

Question

What is an error? Explain the types of errors?(1

Err
While sending the data from the sender to the receiver
a high possibility that the data may get lost or corrupted. Error is
situation when the sender's data does not match the data at
receiver's end. When an error is detected then we need to
the data. So, there are various techniques of error control in
networ

Error
Error Control in the data link layer is a process of detecting and retransmitting the data which
been lost or corrupted during the transmission of data. Any reliable system must
mechanism for detecting and correcting such errors. Error detection and correction occur at
the transport layer and the data link layer. Here we will talk about the data link layer and check
by bit that if there is any error or

Types of
Single bit Error: When there is a change in only one bit of the sender's data then it is
single bit

Example: If the sender sends 101(5) to the receiver but the receiver receives 100(4) then it
single bit

101(sent bits) → 100(received


Burst Error: When there is a change in two or more bits of the sender’s data then it is

This study source was downloaded by 100000843448487 from CourseHero.com on 05-25-2022 03:27:41 GMT -
burst

Example: If the sender sends 1011(11) to the sender but the receiver receives 1000(8) then it
burst

1011(sent bits) → 1000(received

Phases in Error

 Error Detection: Firstly, we need to detect at the receiver end that the data received
error or
 Acknowledgement: If any error is detected the receiver sends a
acknowledgement(NACK) to the
 Retransmission: When the sender receives a negative acknowledgement or if
acknowledgement is not received from the receiver sender retransmits the data

Error

1 Vertical Redundancy
2 Longitudinal Redundancy
3 Circular Redundancy
4 CheckS

Po
This study source was downloaded by 100000843448487 from CourseHero.com on 05-25-2022 03:27:41 GMT -

You might also like