Sunteți pe pagina 1din 3

In this case the hackers or the intruders will not need any physical access to

the workstation or the building which consist of the network but he attacks
wireless transmissions. But this also depends on the way the wireless LAN is
arranged or is being configured. Consider the example in which local area
network is used for 1 building and its access is also limited to that particular
office area so LAN should be designed correctly to protect it from intruders.
And if there is network that is built for making communication between
buildings possible is more susceptible to being attacked by the intruders that
are very potential and this is due to the reason that the range of interception
is very wide. Although in this case its not as easy for intruders to attack the
system. The intruders should be able to make difference in the data that is
target of them and the one that is being transmitted at the same time or
simultaneously. And the attacker should be able to decipher the signal. This
process is very expensive as this requires hard effort although we know that
computers can be used to sort out the signal. We should be able to
understand that in wireless LAN the coverage area is not the distance alone
but also by the signal levels and interference of co channel also. The
wireless network may also be used to extend the existing LAN that is hard
wired instead of replacing it, this thing will add complexity to the
architecture. (Amin Leiman, n.d.).
Types of Transmission
There are different types of transmissions. Like the infrared transmission
requires the transmission that is line of sight but the bandwidth is limited. For
example, the Infrared uses the wavelength of 790 nm; the range between its
nodes is about 80 feet. So there is a risk that intruder might be in building
within the specified range and is in a line-of-sight path, these factors can only
be achieved by the person who are working there.

Radio Frequency
As we know that the radio frequency rays can easily pass through patricians
or walls so these are usually placed on the place or same floor. Because in
this case unlike infrared line of sight is not required, here the data that is
transmitted can be intercepted more easily. So products have been
developed to overcome and solve this problem and these products have
encryption capabilities.
The availability of service
To understand completely the security concerns of LAN that are effecting it
because of being used as wireless LAN this concept is very important to be
understood. It can be considered as dial tone one receives while picking up
his or her phone. And the absence of this dial tone is the result of busy circuit
or may be due to poo signal.
The availability of signals

I case of RDS ( radio frequency signal) the availability of signals is use to see
that whether there is sufficient energy of radio is reaching the receiver that
is used to cause bit error rate that is acceptable in the signal. While in case of
infrared system the unit that is receiving signal should be in line of sight of
beam, the availability of signal relates to the distance directly, but when the
node is not with in the specified range the availability of signal diminishes
The availability of circuits
The availability of circuit depends on the interference of the adjacent
channels and its co channels. Whenever there is simultaneous mapping of
two transmitted signals or the carrier frequency on the on the single receiver
is called as co channel. (This ratio is known as the carrier to-interference
ratio.) When the energy from the modulated carrier fits or passes onto the
channels that are adjacent this is called as adjacent channels interference.
One of the management center called as The Motorola Frequency
Management Center has the database that is used to track or keep record of
the frequency and location of Altair module in the US that is used to reduce
the interference possibility. One of the trick of attackers is that they locate
the carrier frequency and they freeze the receiver that will avoid any other
signals or transmission from reaching the receiver. So the LANs that are
Wireless as compared to wired LANs are at the risk or are particularly
susceptible to these attacks. (Amin Leiman, n.d.)

Network security reliability and performance can be achieved via


To get rid of hubs
The old workstations or several companies including the Fair Lease Lanka
uses hubs and these hubs are present throughout the network. As compared
to these hubs network switches are very advantageous to be used. The
performance of switches is far better than hubs as they are very efficient and
they dont allow the collisions to enter so they helps us to achieve high
performance. So there performance ratio is much better than the existing
hubs. That doesnt mean that throw switches and buy the switches which are
also very cheap but to buy good switches that help us to perform operations
that are error free and reliable.
Use of firewall
There are assumptions that to have the simple router with enabled NAT is
better against threats and viruses. This is useful no doubt but it provides
ability to block only limited number of attacks the best way to protect
network from threats and viruses that are very potential in nature is to use
firewall. There are many routers that have the firewall but the functionality of
that firewall is disabled due to several reasons that includes the configuration
needed b this and the extra management it demands. And it might be painful

to configure it as there will occur connectivity problems but a router firewall is


very good way to protect you data from vulnerable attacks.
To think in a Reliable way
If we want to create any software application this will require to see that how
the application will be used and to think in careful way through all the failure
points. The reliable applications requires the operations that are reliable and
also reliable deployment processes. You should also focus on how the service
is being delivered and consider all the possible circumstances and problems
where the failure points will be minimized by the design and other
alternatives.
Invest in People
The applications that are highly reliable are usually the result of investment
on people. The developers who are developing the application and the staff
that is conducting the operation son the system, they should be given proper
education in the lifecycle management practices in order to prevent the
failures that might occur in your application.

S-ar putea să vă placă și