Documente Academic
Documente Profesional
Documente Cultură
the workstation or the building which consist of the network but he attacks
wireless transmissions. But this also depends on the way the wireless LAN is
arranged or is being configured. Consider the example in which local area
network is used for 1 building and its access is also limited to that particular
office area so LAN should be designed correctly to protect it from intruders.
And if there is network that is built for making communication between
buildings possible is more susceptible to being attacked by the intruders that
are very potential and this is due to the reason that the range of interception
is very wide. Although in this case its not as easy for intruders to attack the
system. The intruders should be able to make difference in the data that is
target of them and the one that is being transmitted at the same time or
simultaneously. And the attacker should be able to decipher the signal. This
process is very expensive as this requires hard effort although we know that
computers can be used to sort out the signal. We should be able to
understand that in wireless LAN the coverage area is not the distance alone
but also by the signal levels and interference of co channel also. The
wireless network may also be used to extend the existing LAN that is hard
wired instead of replacing it, this thing will add complexity to the
architecture. (Amin Leiman, n.d.).
Types of Transmission
There are different types of transmissions. Like the infrared transmission
requires the transmission that is line of sight but the bandwidth is limited. For
example, the Infrared uses the wavelength of 790 nm; the range between its
nodes is about 80 feet. So there is a risk that intruder might be in building
within the specified range and is in a line-of-sight path, these factors can only
be achieved by the person who are working there.
Radio Frequency
As we know that the radio frequency rays can easily pass through patricians
or walls so these are usually placed on the place or same floor. Because in
this case unlike infrared line of sight is not required, here the data that is
transmitted can be intercepted more easily. So products have been
developed to overcome and solve this problem and these products have
encryption capabilities.
The availability of service
To understand completely the security concerns of LAN that are effecting it
because of being used as wireless LAN this concept is very important to be
understood. It can be considered as dial tone one receives while picking up
his or her phone. And the absence of this dial tone is the result of busy circuit
or may be due to poo signal.
The availability of signals
I case of RDS ( radio frequency signal) the availability of signals is use to see
that whether there is sufficient energy of radio is reaching the receiver that
is used to cause bit error rate that is acceptable in the signal. While in case of
infrared system the unit that is receiving signal should be in line of sight of
beam, the availability of signal relates to the distance directly, but when the
node is not with in the specified range the availability of signal diminishes
The availability of circuits
The availability of circuit depends on the interference of the adjacent
channels and its co channels. Whenever there is simultaneous mapping of
two transmitted signals or the carrier frequency on the on the single receiver
is called as co channel. (This ratio is known as the carrier to-interference
ratio.) When the energy from the modulated carrier fits or passes onto the
channels that are adjacent this is called as adjacent channels interference.
One of the management center called as The Motorola Frequency
Management Center has the database that is used to track or keep record of
the frequency and location of Altair module in the US that is used to reduce
the interference possibility. One of the trick of attackers is that they locate
the carrier frequency and they freeze the receiver that will avoid any other
signals or transmission from reaching the receiver. So the LANs that are
Wireless as compared to wired LANs are at the risk or are particularly
susceptible to these attacks. (Amin Leiman, n.d.)