Preview

Unit 1 Assignment 1. What´s Rf Technology?

Good Essays
Open Document
Open Document
648 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 1 Assignment 1. What´s Rf Technology?
1. What is rf technology?
A. The technology in which the parameters such as amplitude, phase and frequency of radio frequency waves are changed so as to transmit and receive the information is known as RF technology or radio frequency technology. In this, the electromagnetic waves that lie in the range of 3 khz to 300 Ghz are used for the wireless communication between the two devices. The signal is modulated at the transmitter end and then the antenna converts this electrical signal into the radio waves and emits them. The medium in which they travel is space. The receiving antenna catches the waves at the receiving end and then the signal is demodulated and converted back to its original form. These waves are highly affected by the interference
…show more content…
Security issues can be categorized into three categories:
 Passive Monitoring – As the radio signal penetrate into buildings, they travel a long distance before reaching to the destination. So, by using a radio card with a computer anyone can hack the confidential information of a business. The solution to this problem is encryption. The messages are changed according to the encryption key, so it becomes difficult for the hacker to understand the message or passwords or emails.

 Unauthorized Access- When a person starts using a network without permission is known as unauthorized access. Some company’s devices are password protected but not every. So, one can access those networks that are not password protected and can gain the information sensitive to that particular organisation.
For example – man in the middle attack – during an arp request, some fake host can send its mac address to the host demanding for it and then that host will save this mac address for sending further messages. This way the messages would be sent to the unauthorized person with which the data regarding company’s passwords and all will be

You May Also Find These Documents Helpful

  • Satisfactory Essays

    * The hackers can gain access to a company’s payment processing network. The attackers then installed malicious code designed to gather sensitive information from the network, which allowed them to easily access the network at their convenience.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    A radio signal is an electromagnetic wave propagated by an antenna. Radio waves have different frequencies, and by tuning a receiver’s radio at a specific frequency, you can pick up a signal, because the starting point, or direction of the wave changes. An interesting aspect of radio waves is that each wireless technology has its “small band” available.…

    • 878 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Technology Gcse Unit 4

    • 4354 Words
    • 18 Pages

    Fig.1- I chose this product because I thought the ideas the clip, and flexible arm could allow a car cup holder to be clipped behind the drivers seat and positioned round for the driver with the flexible arm. The function of this product is to contain a firm hold on a drink holder to prevent dropping or spillages. The product clips on any edge of a surface, and then the middle part of the product is able to flex into the required position easily to allow the drinks container to accessed easier. The product looks friendly, but slightly childish because of the furry middle section. I believe this product was manufactured with acrylic (clip and ring for cup support) because or it’s good strength-toweight ratio, polyester…

    • 4354 Words
    • 18 Pages
    Better Essays
  • Satisfactory Essays

    Wireless WAN - A wireless wide area network, is a form of wireless network its a larger version of Wireless LAN.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The spectrum is considered scarce because of the limited number of frequencies for operation and two parties cannot broadcast on the same frequency in the spectrum. Interference not only can be caused by broadcasters but by natural phenomenons like thunderstorms. Another factor, which can attribute to interference is one known as Intermodulation. This happens when two or more frequencies affect each other’s transmission.…

    • 338 Words
    • 2 Pages
    Good Essays
  • Good Essays

    unit 8 assignement

    • 920 Words
    • 3 Pages

    Radio waves offer another benefit to the wireless system in addition to their range. With radio signals it is possible for multiple carriers to exist in the same space at the same time without interfering with each other. The key to making this possible is variation of frequencies. As long as concurrent frequencies are no…

    • 920 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It 242 Week 8 Assignment

    • 686 Words
    • 3 Pages

    Microwave signals transmit using electromagnetic energy. Microwave signals are used commonly in long distance telephone telecommunications, cellular phone networks, and television networks. Microwaves travel in a straight line the wave can be narrow beamed making it more effective for long distance transmissions.…

    • 686 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Processor Transistor count Date of introduction Manufacturer Process Area Intel 4004 2,300 1971 Intel 10 µm 12 mm² Intel 8008 3,500 1972 Intel 10 µm 14 mm² MOS Technology 6502 3,510[1] 1975 MOS Technology 8 μm 21 mm² Motorola 6800 4,100 1974 Motorola 6 μm 16 mm² Intel 8080 4,500 1974 Intel 6 μm 20 mm² RCA 1802 5,000 1974 RCA 5 μm 27 mm² Intel 8085 6,500 1976 Intel 3 μm 20 mm² Zilog Z80 8,500 1976 Zilog 4 μm 18 mm² Motorola 6809 9,000 1978 Motorola 5 μm 21 mm² Intel 8086 29,000 1978 Intel 3 μm 33 mm² Intel 8088 29,000 1979 Intel 3 μm 33 mm² Intel 80186 55,000 1982 Intel 3 μm Motorola 68000 68,000 1979…

    • 400 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Gaining access to resources is the whole point of a modern-day attack. The usual goal is to either extract information of value to the attacker or use the network as a launch site for attacks against other targets. In either situation, the attacker must gain some level of access to one or more network devices.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ET2530 Research Paper

    • 1184 Words
    • 4 Pages

    Recent current events, such as the World Trade Center tragedy and its aftermath, have demonstrated our need for and how reliant we have become on communication medium. As the World Trade Center lay in ruins, also destroyed were a vast array of communication equipment from transmission antennae for radio and TV stations to switching equipment for phone service. Though throughout all this people were still able to communicate, TV and radio stations were still transmitting their signal. Much of this was a result of wireless and satellite technology.…

    • 1184 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    This pack of NTC 362 Week 4 Learning Team Assignment Hardware and Software Paper comprises: Time Division Multiple Access, Frequency Division, Multiple Access, and Orthogonal Frequency Division Multiplexing…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Proper management of user accounts will ensure the information and access to devices on the network confidential.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    channeled and imparted by a sender to a receiver via some medium. The receiver then…

    • 3331 Words
    • 15 Pages
    Good Essays
  • Good Essays

    I read an article written by Michelle A. Mendes, PHD, RN, CPN, she is currently an assistant professor at the College of Nursing, East Carolina University, in Greenville, NC. The article titled “Parents’ Descriptions of Ideal Home Nursing Care for Their Technology-Dependent Children” (Mendes, 2013). The articles purpose was to explain the needs and expectations for a home nurse caring for a medical technology dependent child from the parents’ point of view. Technology dependant in this article means the child has some sort of medical device that they are dependent on to live. “Many of these children have extensive and continuous health care needs associated with developmental or physical disabilities,…

    • 1066 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    There are a couple of different communication models one of which is Shannon’s model. In 1948 Claude Shannon introduced his idea that one person can send a message with the use of a transmitter i.e. computer or phone, this can receive interference (Noise) on transfer; the other person is the receiver. The diagram below shows how communication happens and also shows what could go…

    • 2659 Words
    • 11 Pages
    Powerful Essays