MedVision ad

help with assignment please (1 Viewer)

nickitup

New Member
Joined
Nov 10, 2007
Messages
1
Gender
Male
HSC
2008
ok so i have this assignment due tomorrow and as usual i have been procrastinating. i originally thought it would be way easy but now that i read through it properly i realised its not as easy as i thought.

It has 2 sections, section A and B. Section A i'm fine with except one part

"Describe the techniques of Cryptography"

could someone help me out with a quick summary of that, i've tried googling but can't really find anything useful to my understanding.


Also with Section B i need to connect 2 schools that are 2km apart because they are being amalgamated into one. Anyway there is no direct line of site but there is a large communications tower within line of site of both schools.

I need to connect them via LAN but i'm not sure which type exactly i should use. Could use please help me out?

thanks in reguards. =]
 

Forbidden.

Banned
Joined
Feb 28, 2006
Messages
4,436
Location
Deep trenches of burning HELL
Gender
Male
HSC
2007
"there is a large communications tower within line of site (you mean sight ?) of both schools"

The most feasible hardware for long-range and line-of-sight communication is microwave dishes hence they cannot be placed on the ground and instead placed on a high area such as large communication towers.
Microwave communication however can be hindered by rain but this is more practical than connecting very long cables between the school which are affected by electrical resistance (as it gets longer) and it will be quite difficult to track down a damaged segment of the very long cables especially if they are underground.



"Describe the techniques of Cryptography"

Cryptography simply aims to hide your information from others and there are two parts to it.
Encryption completely scrambles the data/information so it appears to be gibberish to everyone who reads or intercepts it, the sender's cryptography software encrypts the data.
Decryption uses a key (such as a password) so the information is unscrambled so it turns back to data/information again, the receiver's cryptography software decrypts the data (same software as sender).
 

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

Top