You are on page 1of 11

4/18/2021

Electromagnetic Spectrum for Telecommunications

Wireless Media
• Transmission of waves take place in the
electromagnetic (EM) spectrum.
• The electromagnetic spectrum is a collective term;
• Referring to the entire range and scope of frequencies
of electromagnetic radiation and their respective,
associated photon wavelengths

1 2 2

• The EM extends from below the low frequencies


used for modern radio communication to
gamma radiation at the short-wavelength (high-
frequency) end,
• It covers wavelengths from thousands of
kilometers down to a fraction of the size of an
atom.
• Visible light lies toward the shorter end, with
wavelengths from 400 to 700 nanometres
3 4
4/18/2021

• The carrier frequency of the data is expressed in


cycles per second called hertz(Hz). • Note: The more the frequency the more is the speed
• Low frequency signals can travel for long distances but less is the range
through many obstacles -but can not carry a high
bandwidth of data because high frequencies possess high power which
results in more losses to occur which further inhibits
• High frequency signals can travel for shorter distances them to cover a large range
through few obstacles and carry a narrow bandwidth

6
5

Frequencies for unregulated use:


Broad categories of wireless media
1.Radio frequency- • There are a number of unlicensed spectrum bands in a
• This ranges from10 Khz to 1 Ghz. variety of areas of the radio spectrum.
• It is broken into many bands including AM, FM, and • These are referred to as ISM bands - Industrial,
VHF bands. Scientific and Medical,
• The Federal communications Commission (FCC) • They carry everything from microwave ovens to radio
regulates the assignment of these frequencies. communications.
• Many of these bands, including the two used for Wi-Fi
are global allocations, although local restrictions may
7 apply for some aspects of their use 8
4/18/2021

2. Microwave

• Terrestrial - Used to link networks over long distances


• 902-928Mhz - Cordless phones, remote controls. but the two microwave towers must have a line of
• 2.4 or 5 GHz WLAN operating on the same channel sight between them.
• Frequencies in the range of about 1 GHz to 40 GHz are
referred to as microwave frequencies
• The most common bands for long-haul
telecommunications are the 4-GHz to 6-GHz bands

10
9

• Higher frequency microwave is being used for short


point-to-point links between buildings; typically, the • where d is the distance and λ is the wavelength, in the
22-GHz-23-GHz band is used. same units.
• The higher microwave frequencies are less useful for • Thus, loss varies as the square of the distance. So,
longer distances because of increased attenuation repeaters or amplifiers may be placed farther apart
BUT are quite adequate for shorter distances.. for microwave systems—10 to 100 km is typical.
• Loss L can be expressed as follows: • Attenuation is also increased with rainfall.
• The effects of rainfall become especially noticeable
above 10GHz. Another source of impairment is
interference.
11 12
4/18/2021

3. Satellite
• A satellite orbits at about 22,300 miles or 35,863 km
• Speed is often 1-10Mbps. above the earth which is an altitude that will cause it
• Microwave is also used for satellite communications. to stay in a fixed position relative to the rotation of
• The signal is normally encrypted for privacy. Two the earth.
nodes may exist. • A communication satellite is, in effect, a microwave
relay station.
• It is used to link two or more ground-based
microwave transmitters/receivers, known as earth
stations, or ground stations.
• The satellite receives transmissions on one frequency
band (uplink), amplifies or repeats the signal, and
13 transmits it on another frequency (downlink). 14

• A single orbiting satellite will operate on a number of


frequency bands, called transponder channels, or
simply transponders.
• A station on the ground will send and receive signals
from the satellite.
• The signal can have propagation delays between 0.5
to 5 seconds due to the distances involved.
• The transmission frequency is normally 11-14GHz with
a transmission speed in the range of 1-10Mbps.

15 16
4/18/2021

Applications for satellites: 4. Infrared


• Infrared is just below the visible range of light
• Televisiondistribution between 100Ghz and 1000Thz.
• A light emitting diode (LED) or Laser is used to
• Long-distance telephone transmission emitransmit the signal.
• Private business networks such as VSAT • The signal cannot travel through objects. It is normally
• Global positioning a Point to point communication
• Transmission is between two points and is limited to
line of sight range.
• It is difficult to eavesdrop on the transmission. The
speed is 100Kbps to 16Mbps
17 18

Uses of Infrared Advantages of Using Infrared

The greatest advantages of infrared/devices are:


Infrared emitters and detectors are used in various • No regulations relating to their use
aspects basically in:
• Optical fiber transmission • lower energy consumption
• Various remote control applications such as the TVs, • longer lifetime, improved robustness
CD players, • smaller size and faster switching
• security lights • They also present less risk of injury.
• burglar alarms • Compared with the wireless communication with a
maximum speed of about 100 Mbps, the infrared
19 communication has a potential of 1 Gbps. 20
4/18/2021

Disadvantages of Using Infrared


• Infrared systems are secure systems because the • It requires both transmitter and receiver to be in line
signal will not leave the room. of sight.
• Thus, it is the system of choice for deliberations and • Devices can not move around while transmission is in
business meetings that need to protect discussions progress.
• Because light does not transmit through walls, • Used for very short distance application
multiple systems can be used within a building. • They have low electrical to optical power conversion
• With the exception of high frequency lights and bright efficiency, so this can lead to a high power demand on
sunlight, there are few sources of interference with the side of the battery source
infrared systems.
21 22

Types of infrared emitting devices


Light emitting diodes(LEDs)
Laser diodes • LEDs are based on the semiconductor diode.
• Light Amplification by Stimulation of the Emitted • When the diode is forward biased (switched on),
Radiation. Or electrons are able to recombine with holes and energy
Light Amplification by Stimulated Emission of Radiation is released in the form of light.
• Used in Optical fiber transmission systems and are • This effect is called electroluminescence and the color
confined in small area of the light is determined by the energy gap of the
• video recording, optical reading, high-speed laser printing, semiconductor
atmospheric pollution monitoring.
• Used illumination and indication.
23 24
4/18/2021

5. WiMAX • WiMAX can provide broadband wireless access (BWA) up


• WiMAX technology is a broadband wireless data to about 50 km for fixed stations
communications technology based around the IEEE 802.16
standard providing high speed data over a wide area. • WiMAX technology is able to meet the needs of a large
variety of users from those (may be)in rural areas needing
• The letters of WiMAX stand for Worldwide Interoperability fast access where wired solutions may not be viable
for Microwave Access (AXess) because of the distances and costs involved.
• It is a technology for point to multipoint wireless • Additionally it is being used for mobile applications,
networking. providing high speed data to users on the move.

25 26

6. BLUETOOTH
• With WiMAX, Wi-Fi like data rates are easily • Bluetooth is a radio (2.4Ghz) data technology that allows a
supported, but the issue of interference is lessened. user to wirelessly connect numerous personal devices to
allow communication between them all.
• WiMAX operates on both licensed and non-licensed
frequencies, providing a regulated environment and • Bluetooth achieves what is sometimes referred to as a
viable economic model for wireless carriers. Personal Area Network (PAN)
• WiMAX can be used for wireless networking in much • Allowing you to, for example, have your mobile phone,
the same way as the more common Wi-Fi protocol. hands-free kit and laptop computer all communicating
wirelessly.
• Bluetooth is an industry specification defined by the
27 Bluetooth Special Interest Group (SIG) 28
4/18/2021

Bluetooth-enabled products Common uses of Bluetooth:


Products containing Bluetooth technology include:
• computers, include:
• headsets, • Use a wireless mouse and keyboard with your PC.
• keyboards and mice, • Use a wireless mobile phone headset while leaving
• printers, handheld computers, your phone in your pocket.
• mobile phones, • Synchronize personal data between your palm
• digital cameras and GPS units computer, your laptop and your mobile phone.
• Etc.. • Copy pictures off your digital camera to your desktop
computer
29 30

Bluetooth built-in security mechanisms: Basic security services:


The Bluetooth system provides for three:
• Shared key between devices 1) Confidentiality – addresses information
• Encryption of data compromise issues from eavesdropping,
• Ability to remain hidden while searching 2) Authentication –addresses the issue of being able
to confirm the authenticity of the identity of devices
with whom we are communicating with, and
3) Authorization – addresses the issue of whether the
device in question is allowed to access the specific
information requested
31 32
4/18/2021

SECURITY VULNERABILITIES WITH BLUETOOTH

1)Lack of authentication in Object Exchange (OBEX) Unfortunately, this also allows an attacker to easily gain
• Many mobile phone manufacturers have decided that access to other files and personal information stored
on the phone, such as:
Bluetooth authentication is not necessary in OBEX to
aid easy exchange of business cards from phone to • entire phonebook
phone. • calendar
• (Object exchange (OBEX) is a protocol for the wireless • real-time clock
exchange of data between devices.) • business card
• etc
33 34

2) Deleted paired device still having full access


An attacker may also then: • Some devices leave all credentials after deleting a pairing
• Initiate a phone call which allows the deleted paired device to still connect as
normal.
• Write a phone book entry
• To the user, the device does not appear as “trusted” in a list
• Send an SMS (Short Message Service)/text message of devices, however the attacker may still have full access
via other methods. via Bluetooth.

35
36
4/18/2021

• An attacker may quickly take the device from the


owner 3) Discovery of undiscoverable devices
• Pair the attacking device, delete the pairing so it is no • Tools are available, which allow discovery of hidden or
longer visible to the owner, undiscoverable devices.
• Return the device and still have full ability to connect • “Hidden” or “undiscoverable” mode may stop your
to the owner’s device without their knowledge. device from broadcasting its presence,however
• This is commonly referred to as the backdoor attack. • It will still respond to a number of requests, allowing
• The attacker is then free to continue using your device brute-force discovery of it.
as if s/he has full access to it. • Note however it may take an unreasonable amount of
time (eg, 11 hours). But still…….
37 38

SUGGESTED ACTIONS TO SECURE BLUETOOTH


4) Turn on authentication
1)Turn it off or disable the Bluetooth adapter.
• Once Bluetooth authentication is on, devices generally
• If you’re not actively using the Bluetooth connection on need to then use a common password to pair with
your device or computer. another device.
• It will also considerably reduce battery consumption on 5)Turn on encryption if available
devices such as a phone
• Turning on Bluetooth encryption means that the majority
2)Ensure you have the latest Bluetooth firmware and of data transmitted between the two Bluetooth devices
device drivers on all devices is encrypted with a common key.
3) Put the device in hidden/invisible mode only to
reduce…….
39 40
4/18/2021

6)Do not allow auto-acceptance of files


• It is best to always be asked by your device when
accepting a file so that you don’t unwittingly allow a 8)Permanently remove pairings
dangerous file or Trojan to be automatically uploaded. • To ensure there are no “hidden” pairings in your
7)Disable file shares device, it is best to do a factory reset of it.
• If you do not actively share files from the Bluetooth Unfortunately, this may not be convenient.
device to your other devices,
• disable all sharing (read-only and read/write) of files.

41 42

9)Do not pair with unknown devices or give up physical


access to your device
• To alleviate the chances of an attacker pairing with your
device (and then potentially hiding the pairing by
“deleting” it),
10)Do not ever assume you’re “out-of-range”

43

You might also like