MIS Assignment

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

MIS Assignment

Group Members :

Nirvana Shrestha
Vinay Jain
Adnan Ahmed Shah
Sandesh Acharya
Rashmi Shrestha
Bardhan Singh Karki

1. Draw a picture for each of the above mentioned types of networks and compare them
with regard to the structure and layout.

1) LAN
A LAN is a network of connected devices that exist within a specific location. LANs may
be found in homes, offices, educational institutions, or other areas.

A LAN may be wired, wireless, or a combination of the two. A standard wired LAN uses
Ethernet to connect devices together. Wireless LANs are typically created using a Wi-Fi
signal. If a router supports both Ethernet and Wi-Fi connections, it can be used to create
a LAN with both wired and wireless devices.
2) WAN

A wide area network (also known as WAN), is a large network of information that is not
tied to a single location. WANs can facilitate communication, the sharing of information
and much more between devices from around the world through a WAN provider.
WANs can be vital for international businesses, but they are also essential for everyday
use, as the internet is considered the largest WAN in the world. Keep reading for more
information on WANs, their use, how they differ from other networks and their overall
purpose for businesses and people alike.

3) MAN

A Metropolitan Area Network or MAN is consisting of a computer network across an


entire city, college campus, or a small region. A MAN often acts as a high speed
network to allow sharing of regional resources. It is also frequently used to provide a
shared connection to other networks using a link to a WAN.
4) WLAN

A wireless local area network (WLAN) is a wireless distribution method for two or more
devices. WLANs use high-frequency radio waves and often include an access point to
the Internet. A WLAN allows users to move around the coverage area, often a home or
small office, while maintaining a network connection.
Comparison

1. In terms of Definition
- A local area network, or LAN, is a network of computers and network
devices connected together, usually confined to a single room, building,
residence, office building, or university campus. A LAN is a link that
connects a network of computers and it can be either wired or wireless or
a combination of both. A wide area network, or WAN, is a
telecommunication network or a computer network that interconnect
multiple LANs and spans a wide geographical area. A metropolitan area
network, or MAN, is a much larger network that connects a network of
computers spanning a geographical area larger than a LAN but smaller
than the area covered by a WAN. WLAN stands for wireless local area
network. It is a wireless connection that connects two or more devices in
LAN.
2. In terms of Transmission .
- A LAN acts as a stand-alone network that connects computers and
workstations through standard Ethernet cables. Some wireless networks
are often established using Wi-Fi. While Ethernet is the most commonly
used LAN that controls how data is transmitted over a LAN, Wi-Fi uses
radio waves to connect computers to a network. A WAN connects several
LANs to establish a network that allows users in one location to
communicate with users in another location. It is limited to an enterprise or
an organization. A MAN interconnects several LANs into a single large
network by bridging them with backbone lines.A WLAN, or wireless LAN,
is a network that allows devices to connect and communicate wirelessly.
... In a LAN, data is transmitted over physical cables in a series of
Ethernet packets. In a WLAN, packets are transmitted over the air.
3. In terms of speed.
- A LAN is a high-speed connection network with higher data transfer
speeds. Most connections are Ethernet with speed up to 10 Mbps or Fast
Ethernet with speed up to 100 Mbps. To achieve even higher transmission
speeds Gigabit Ethernet is used which can go all the way up to 1000
Mbps. WANs are mostly telephone systems which suffer from low
transmission speeds due to network congestion and can be somewhere
between 10 to 20 Mbps. It covers a relatively larger geographical area
which accounts for a moderate data transfer rate which can go up to 100
Mbps.The speed of WLAN is standard.

4. In terms of Distance Coverage.


- A LAN is usually limited to a building and the area it covered based on its
physical architecture. As they are not particularly designed for long
distances they have a limited coverage in terms of distance covered which
can be in the range of a few hundred meters. WANs typically span a large
geographical area which is virtually limitless, usually in 1000 kilometers
and the range can be extended using repeaters. MANs connect multiple
LANs in a common geographical area which can be in the range of up to
100 kilometers or sometimes more. WLAN operates on 2.4GHz band can
reach up to 150 feet indoors and 300 feet outdoors

5. In terms of Components.
- Apart from computers, there are essentially some basic components
required to establish a local area network such as network adapter cards,
network cables, hubs, repeaters, switches, bridges, routers, network
server, and LAN software. The three basic components of WAN include
customer premises equipment (CPE) such as routers, access links which
can be wired as well as wireless and network core which connects CPEs
using access links. The primary components of MAN are bridges, access
points, directional antennae (semi-directional and highly directional
antenna), workgroup bridges, etc.
WLAN consists of components similar to traditional Ethernet-wired LANs.
In fact, wireless LAN protocols are similar to Ethernet and comply with the
same form factors. The big difference, however, is that wireless LANs
don't require wires.

6. In terms of structure.
- LAN connects a group of computers within a limited geographical
area,WAN covers a large geographical area such as a state, countries or
continent,MAN is confined to a city or town distance covered is larger than
LAN but smaller than WAN, WLAN is confined to short distance with
100meters.
LAN has high data transfers speed with 10 ,100 and 1000 mbps high
speed ethernet, WAN low data transfer rates between 10 and 20 mbps,
MAN speed can go up to 100mbps, WLAN its speed is standard from
5.5mbps to 10gbps. LAN has low setup cost, WAN has high setup cost
than LAN and MAN, MAN has moderate setup cost, WLAN has lower setup
cost.
2. List down and mention 10 different encryption methods related to the computer and
network security. Explain them as well.

Encryption is the method by which information is converted into secret code that hides
the information's true meaning. It is commonly used to protect the data in transit and alo
data at rest. Encryption plays an important role in securing many different types of
information technology assets. It provides confidentiality, authentication, nonrepudiation
and integrity.The primary purpose of encryption is to protect the confidentiality of digital
data stored on computer systems or transmitted over the internet or any other computer
network. The different types of encryption are:

1. Blowfish
2. Rivest-Shamir-Adleman (RSA)
3. Advanced Encryption Standard (AES)
4. Format Preserving Encryption (FPE)
5. Twofish
6. Triple DES
7. Format Preserving Encryption (FPE)
8. Hashed based Message Authentication Code (HMAC) Encryptions
9. International Data Encryptions Algorithm (IDEA)
10. Elliptic Curve Cryptography (ECC) Encryptions
1. Blowfish: Blowfish is a symmetric block cipher, which works on a variable key
length from 32 bits to 448 bits. It was intended to work quickly and is accessible
as free open encryption programming for any client. It is neither protected nor
authorized. Being a public encryption stage, it has been tried on different
occasions for its speed, productivity and security. Numerous associations
guarantee that nobody has effectively hacked it. Thus, Blowfish has gotten a
decision for sellers and web based business primarily encouraging them secure
installments, passwords and other secret data.

2. Rivest-Shamir-Adleman(RSA): RSA is widely used for the data sent online and
relies on a public key to encrypt the data. It's demonstrated to be a safe method
to send data between individuals who may not have the foggiest idea about one
another and need to convey without trading off their own or delicate
information.Some people use this method to verify a digital signature and ensure
that the person they are communicating with is really who they say they are.

3. Advanced Encryption Standard (AES): AES is considered as one of the best


algorithms because it was developed by the US National institute of Standards
and Technology. It is a symmetric encryption based on the Rijndael algorithm. It
uses block-cipher and encrypts one fixed-size block at a time. It works in 128-bit
or 192-bit but can be extended up to the 256-bit key length. AES is said to be
one of the most secure encryption types.

4. Format Preserving Encryption (FPE): FPE is a method which allows the basic
formatting of a message to stay in a similar format, and where the value itself is
encrypted. It can be used to hide credit card details. It refers to encrypting in
such a way that the output is in the same format as the input. For example: To
encrypt an English word so that the ciphertext is another English word. By using
FPE we can see that the ciphertext and plaintext are the same length and only
use numerical values for encryption.
5. Twofish: Twofish is an advanced version of Blowfish encryption. It has a block
size of 128-bits and can extend to the 256-bit key length. It breaks data into
fixed-length blocks. It allows you to choose the encryption process to be quick
while the key setup to be slow and vice versa. Twofish is considered to be
flexible. Twofish has some distinctive features that set it apart from most other
cryptographic protocols which is the use of pre-computed key-dependent
S-boxes, and a relatively complex key schedule.
6. Triple DES: Triple DES does is to protect against brute force attacks. The original
DES symmetric encryption algorithm specified the use of 56-bit keys -- not
enough, by 1999, to protect against practical brute force attacks. Triple DES
specifies the use of three distinct DES keys, for a total key length of 168 bits.it
works in three phases:
● Encrypt
● Decrypt
● Re-encrypt
7. Format Preserving Encryption (FPE) :In cryptography, format-preserving
encryption refers to encrypting data in such a way that the output is in the same
format as the input (the plain text). Format-preserving encryption is mostly used
in on-premise ​encryption and tokenization solutions​.​ It is used to protect
sensitive data sets such as payment card data, Social Security numbers, and
country identifiers that are commonly used and stored in retail, healthcare, and
financial databases and applications. . It is widely used in financial database
systems, banking systems, retail, etc.

8. Hashed based Message Authentication Code (HMAC) Encryptions: A hashed


message authentication code is a message authentication code that makes use
of a cryptographic key along with a hash function. The actual algorithm behind a
hashed message authentication code is complicated, with hashing being
performed twice. This helps in resisting some forms of cryptographic analysis. A
hashed message authentication code is considered to be more secure than other
similar message authentication codes, as the data transmitted and key used in
the process are hashed separately.However, one drawback associated with
hashed message authentication code is the absence of any privacy, which can
also be obtained with full encryption.

9. International Data Encryptions Algorithm (IDEA): International Data Encryption


Algorithm (IDEA) is a once-proprietary free and open block cipher that was once
intended to replace Data Encryption Standard (DES). Once called Improved
Proposed Encryption Standard (IPES)I, DEA is a minor revision to the Proposed
Encryption Standard (PES). For example: Once brute-force techniques became
stronger, the US government and encryption community looked to a replacement
for the NIST-approved DES that was widely in use. IDEA was proposed as a
replacement algorithm for DES, but it failed to do so and today, in the era of AES
(Rijndael) which replaced DES, IDEA is obsolete.

10. Elliptic Curve Cryptography (ECC) Encryptions: Elliptic-curve Diffie–Hellman


(ECDH) is a ​key agreement​ protocol that allows two parties, each having an
elliptic-curve​ public–private key pair, to establish a ​shared secret​ over an
insecure channel​.This shared secret may be directly used as a key, or to ​derive
another key​. The key, or the derived key, can then be used to encrypt
subsequent communications using a ​symmetric-key cipher​. It is a variant of the
Diffie–Hellman​ protocol using ​elliptic-curve cryptography​.Elliptic curve
cryptography (ECC) is a public key encryption technique based on an elliptic
curve theory that can be used to create faster, smaller, and more efficient
cryptographic keys. ... The technology can be used in conjunction with most
public key encryption methods, such as RSA and Diffie-Hellman. An elliptic curve
for current ECC purposes is a plane curve over a finite field which is made up of
the points satisfying the equation:
y²=x³ + ax + b.
3. Have a look at the above tables carefully. What are the main differences that you can
see between the above mentioned services?

Looking at the tables above we can see that the main difference between the above
mentioned services

Area Difference

Downstream Ranges: 56 Kbps up to 13.21 Gbps; the slowest: Dial-up. The


Speed fastest: OC-255

Availability Ranges from Universal to Limited


Ø Universal: Dial-up
Ø Widespread: Cable, T1, T3, DSL, Satellite
Ø Limited, but spreading: Fixed wireless, Fiber
Ø Limited: BPL, OC-3, OC-12, OC-48, OC-128, OC-255

Price Ranges from $9-$11 to several hundred thousand dollars on the


basis of speed and availability. The Least Expensive Dial-up and
The Most Expensive OC-12, OC-48, OC-128 and OC-255

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy