This transmission technique makes use of two methods; frequency hopping as well as direct sequence modulation
The Frequency hopping method uses signals that jumps from a given frequency to the other within a specific bandwidth. The transmission unit then "listens" to a give channel and if successfully detects any idle time (a time when no signal is transmitted),then transmits the packet via the full channel bandwidth .In case a channel is deemed "full," the transmitter then "hops" to the next channel and then the process is repeated. Both the transmitter and the receiver have the same "jumping" behavior.
In the case of Direct Sequence Modulation, a wide frequency band as well as Code Division Multiple Access (CDMA) is utilized. The signals from various units (multiple) are then transmitted at a certain range of frequencies at relatively lower power. With each signal transmitted, there is a code to be used by the receiver in the identification of the appropriate signal from the sending unit. This frequency falls within the industrial, scientific and medical (ISM) band.
The Narrow and Microwave Local Area Networks (LANs)
This type of LAN is implemented using narrow bandwidth microwaves frequencies in the transmission of signals. Most of the equipment using this bandwidth range needs licensing from FCC. They employ 18.82-19.205GHz of frequency spectrum (radio).
There are;
The Licensed narrow radio frequencies which involves the use of narrowband frequency schemes that employ cell configuration whereby the cells that are adjacent employ nonoverlapping bandwidths that lie within the 18 Ghz band. An advantage of this scheme is that it allows foir a guaranteed communication that has no form of interference. The communication channels are also highly encrypted in order to eliminate threats of unauthorized data interception (eavesdropping).
The unlicensed Narrow RF also operates within the ISM spectrum and can be employed for transmissions of power less than 0.5 watts.
A comparison of the techniques of Wireless transmission
Source: Burrell (2002)
The Wireless LAN Topologies
The WLAN makes use of three main topologies;
These are
1. Basic Service Set (BSS)
2. Independent Basic Service Set (IBSS)
3. Extended Service Set (ESS)
A further classification involves two modes. Namely, the ad hoc and infrastructure modes.
Wireless topologies. Source- Burell (2002).
WLAN Security threats and vulnerabilities
A close examination of the WLAN systems reveals a system that is not entirely safe from threats. The WLAN attacks are aimed at interfering with the confidentiality, integrity and availability of the system and the data within it. These security attacks can come in the form of active or passive attacks.
The passive attacks;
These attacks are made up of unauthorized data WLA system access for the purpose of either traffic analysis or eavesdropping. It can also be for the purpose of modifying the content of the data traffic and therefore interfering with its integrity. The passive network attacks are hard to detect as the data is often unaffected. This therefore calls for prevetion efforts such as encryption other than detection.
Active attacks
These forms of network attacks involves the unauthorized access of WLAN resources for the purpose of malicious data modification or the interruption of the given network service (Jeopardizing the availability of the system).
Classification of WLAN attacks
Source: Sunday (2008).
The security risks include;
1. WLAN Network Detection
2. Disruption
3. Radio Frequency Signal Limiting
4. Interference
5. Data Interception
6. Denial of Service
7. Compromised Devices
8. Illegal Access Point deployment
9. Insider Threat
10. Unauthorized Network Access.
Wireless LAN security risks and mitigation techniques
Security Vulnerability
The relative level of risk
Low High
Mitigation technique
WLANs detection
Propagation of RF signals
Interference as well as Disruption of RF
Unauthorized system access
Interception of data
Denial of service (DoS)
Compromised network devices
Deployment of illegal access points
Threats...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now