MIS Assignment
MIS Assignment
MIS Assignment
Group Members :
Nirvana Shrestha
Vinay Jain
Adnan Ahmed Shah
Sandesh Acharya
Rashmi Shrestha
Bardhan Singh Karki
1. Draw a picture for each of the above mentioned types of networks and compare them
with regard to the structure and layout.
1) LAN
A LAN is a network of connected devices that exist within a specific location. LANs may
be found in homes, offices, educational institutions, or other areas.
A LAN may be wired, wireless, or a combination of the two. A standard wired LAN uses
Ethernet to connect devices together. Wireless LANs are typically created using a Wi-Fi
signal. If a router supports both Ethernet and Wi-Fi connections, it can be used to create
a LAN with both wired and wireless devices.
2) WAN
A wide area network (also known as WAN), is a large network of information that is not
tied to a single location. WANs can facilitate communication, the sharing of information
and much more between devices from around the world through a WAN provider.
WANs can be vital for international businesses, but they are also essential for everyday
use, as the internet is considered the largest WAN in the world. Keep reading for more
information on WANs, their use, how they differ from other networks and their overall
purpose for businesses and people alike.
3) MAN
A wireless local area network (WLAN) is a wireless distribution method for two or more
devices. WLANs use high-frequency radio waves and often include an access point to
the Internet. A WLAN allows users to move around the coverage area, often a home or
small office, while maintaining a network connection.
Comparison
1. In terms of Definition
- A local area network, or LAN, is a network of computers and network
devices connected together, usually confined to a single room, building,
residence, office building, or university campus. A LAN is a link that
connects a network of computers and it can be either wired or wireless or
a combination of both. A wide area network, or WAN, is a
telecommunication network or a computer network that interconnect
multiple LANs and spans a wide geographical area. A metropolitan area
network, or MAN, is a much larger network that connects a network of
computers spanning a geographical area larger than a LAN but smaller
than the area covered by a WAN. WLAN stands for wireless local area
network. It is a wireless connection that connects two or more devices in
LAN.
2. In terms of Transmission .
- A LAN acts as a stand-alone network that connects computers and
workstations through standard Ethernet cables. Some wireless networks
are often established using Wi-Fi. While Ethernet is the most commonly
used LAN that controls how data is transmitted over a LAN, Wi-Fi uses
radio waves to connect computers to a network. A WAN connects several
LANs to establish a network that allows users in one location to
communicate with users in another location. It is limited to an enterprise or
an organization. A MAN interconnects several LANs into a single large
network by bridging them with backbone lines.A WLAN, or wireless LAN,
is a network that allows devices to connect and communicate wirelessly.
... In a LAN, data is transmitted over physical cables in a series of
Ethernet packets. In a WLAN, packets are transmitted over the air.
3. In terms of speed.
- A LAN is a high-speed connection network with higher data transfer
speeds. Most connections are Ethernet with speed up to 10 Mbps or Fast
Ethernet with speed up to 100 Mbps. To achieve even higher transmission
speeds Gigabit Ethernet is used which can go all the way up to 1000
Mbps. WANs are mostly telephone systems which suffer from low
transmission speeds due to network congestion and can be somewhere
between 10 to 20 Mbps. It covers a relatively larger geographical area
which accounts for a moderate data transfer rate which can go up to 100
Mbps.The speed of WLAN is standard.
5. In terms of Components.
- Apart from computers, there are essentially some basic components
required to establish a local area network such as network adapter cards,
network cables, hubs, repeaters, switches, bridges, routers, network
server, and LAN software. The three basic components of WAN include
customer premises equipment (CPE) such as routers, access links which
can be wired as well as wireless and network core which connects CPEs
using access links. The primary components of MAN are bridges, access
points, directional antennae (semi-directional and highly directional
antenna), workgroup bridges, etc.
WLAN consists of components similar to traditional Ethernet-wired LANs.
In fact, wireless LAN protocols are similar to Ethernet and comply with the
same form factors. The big difference, however, is that wireless LANs
don't require wires.
6. In terms of structure.
- LAN connects a group of computers within a limited geographical
area,WAN covers a large geographical area such as a state, countries or
continent,MAN is confined to a city or town distance covered is larger than
LAN but smaller than WAN, WLAN is confined to short distance with
100meters.
LAN has high data transfers speed with 10 ,100 and 1000 mbps high
speed ethernet, WAN low data transfer rates between 10 and 20 mbps,
MAN speed can go up to 100mbps, WLAN its speed is standard from
5.5mbps to 10gbps. LAN has low setup cost, WAN has high setup cost
than LAN and MAN, MAN has moderate setup cost, WLAN has lower setup
cost.
2. List down and mention 10 different encryption methods related to the computer and
network security. Explain them as well.
Encryption is the method by which information is converted into secret code that hides
the information's true meaning. It is commonly used to protect the data in transit and alo
data at rest. Encryption plays an important role in securing many different types of
information technology assets. It provides confidentiality, authentication, nonrepudiation
and integrity.The primary purpose of encryption is to protect the confidentiality of digital
data stored on computer systems or transmitted over the internet or any other computer
network. The different types of encryption are:
1. Blowfish
2. Rivest-Shamir-Adleman (RSA)
3. Advanced Encryption Standard (AES)
4. Format Preserving Encryption (FPE)
5. Twofish
6. Triple DES
7. Format Preserving Encryption (FPE)
8. Hashed based Message Authentication Code (HMAC) Encryptions
9. International Data Encryptions Algorithm (IDEA)
10. Elliptic Curve Cryptography (ECC) Encryptions
1. Blowfish: Blowfish is a symmetric block cipher, which works on a variable key
length from 32 bits to 448 bits. It was intended to work quickly and is accessible
as free open encryption programming for any client. It is neither protected nor
authorized. Being a public encryption stage, it has been tried on different
occasions for its speed, productivity and security. Numerous associations
guarantee that nobody has effectively hacked it. Thus, Blowfish has gotten a
decision for sellers and web based business primarily encouraging them secure
installments, passwords and other secret data.
2. Rivest-Shamir-Adleman(RSA): RSA is widely used for the data sent online and
relies on a public key to encrypt the data. It's demonstrated to be a safe method
to send data between individuals who may not have the foggiest idea about one
another and need to convey without trading off their own or delicate
information.Some people use this method to verify a digital signature and ensure
that the person they are communicating with is really who they say they are.
4. Format Preserving Encryption (FPE): FPE is a method which allows the basic
formatting of a message to stay in a similar format, and where the value itself is
encrypted. It can be used to hide credit card details. It refers to encrypting in
such a way that the output is in the same format as the input. For example: To
encrypt an English word so that the ciphertext is another English word. By using
FPE we can see that the ciphertext and plaintext are the same length and only
use numerical values for encryption.
5. Twofish: Twofish is an advanced version of Blowfish encryption. It has a block
size of 128-bits and can extend to the 256-bit key length. It breaks data into
fixed-length blocks. It allows you to choose the encryption process to be quick
while the key setup to be slow and vice versa. Twofish is considered to be
flexible. Twofish has some distinctive features that set it apart from most other
cryptographic protocols which is the use of pre-computed key-dependent
S-boxes, and a relatively complex key schedule.
6. Triple DES: Triple DES does is to protect against brute force attacks. The original
DES symmetric encryption algorithm specified the use of 56-bit keys -- not
enough, by 1999, to protect against practical brute force attacks. Triple DES
specifies the use of three distinct DES keys, for a total key length of 168 bits.it
works in three phases:
● Encrypt
● Decrypt
● Re-encrypt
7. Format Preserving Encryption (FPE) :In cryptography, format-preserving
encryption refers to encrypting data in such a way that the output is in the same
format as the input (the plain text). Format-preserving encryption is mostly used
in on-premise encryption and tokenization solutions. It is used to protect
sensitive data sets such as payment card data, Social Security numbers, and
country identifiers that are commonly used and stored in retail, healthcare, and
financial databases and applications. . It is widely used in financial database
systems, banking systems, retail, etc.
Looking at the tables above we can see that the main difference between the above
mentioned services
Area Difference