1 60 GHz - Denial of Service - 200112 60GHz POINT TO POINT NETWORKS – DENIAL OF SERVICE INTRODUCTION Sub10 Systems define the phrase ‘denial of service’ for circumstances when radio link traffic is disrupted or corrupted, temporarily or permanently, by physical or electronic means. We have looked at the issue from a practical viewpoint, taking into consideration link locations, probable RF propagation conditions and likely network topography. It will be shown later that the probability of accidental denial of service due to RF ‘pollution’ at 60GHz is very low, owing to propagation characteristics in the band and antenna design of the Sub10 Liberator. Deliberate denial of service does present a slightly higher risk, with physical damage or disruption of link equipment most likely. Attempting to use a 60GHz radio ‘jammer’ to interrupt link communication is seen as complex to do and unlikely to succeed. LINK LOCATIONS AND PHYSICAL SECURITY In order to achieve optimum performance in the network, all links should be mounted on rooftops or high points of buildings. Either on poles fixed to a high point on the roof, or on stand-off mountings fixed to an outside wall, just below a parapet. In most cases we expect that access to the roof of any building, used for an element of the network, will be strictly controlled, ensuring good physical security, requiring keys and or passes to get onto the roof at all. Sub10 Liberator Outdoor Units (ODU) on the roof top will be mounted in positions requiring equipment such as a ladder to reach them; alternatively, ODU fixed to the outside wall of a building, below the parapet, will be hard to reach without specialist equipment and the correct level of training in climbing techniques. Combine good physical security with relatively inaccessible mounting points and it can be seen someone with malicious intent would find it difficult to interfere with one or more of the Sub10 Liberator links. In this sense, “interfere” is used in the physical, rather than electronic sense. After discussion with our specialist RF team, the general consensus is that someone wanting to sabotage a network could do this very easily by simply cutting one or more of the power/data ‘drop’ cables feeding an ODU. The recommendation? If the access to a rooftop is not secure and strictly controlled, put procedures into place to make it so. Additionally, run power and data drop cables inside steel conduit in order to protect them from accidental or deliberate damage.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1 60 GHz - Denial of Service - 200112
60GHz POINT TO POINT NETWORKS – DENIAL OF SERVICE
INTRODUCTION
Sub10 Systems define the phrase ‘denial of service’ for circumstances when radio link traffic is
disrupted or corrupted, temporarily or permanently, by physical or electronic means.
We have looked at the issue from a practical viewpoint, taking into consideration link locations,
probable RF propagation conditions and likely network topography.
It will be shown later that the probability of accidental denial of service due to RF ‘pollution’ at
60GHz is very low, owing to propagation characteristics in the band and antenna design of the Sub10
Liberator.
Deliberate denial of service does present a slightly higher risk, with physical damage or disruption of
link equipment most likely. Attempting to use a 60GHz radio ‘jammer’ to interrupt link
communication is seen as complex to do and unlikely to succeed.
LINK LOCATIONS AND PHYSICAL SECURITY
In order to achieve optimum performance in the network, all links should be mounted on rooftops
or high points of buildings. Either on poles fixed to a high point on the roof, or on stand-off
mountings fixed to an outside wall, just below a parapet. In most cases we expect that access to the
roof of any building, used for an element of the network, will be strictly controlled, ensuring good
physical security, requiring keys and or passes to get onto the roof at all.
Sub10 Liberator Outdoor Units (ODU) on the roof top will be mounted in positions requiring
equipment such as a ladder to reach them; alternatively, ODU fixed to the outside wall of a building,
below the parapet, will be hard to reach without specialist equipment and the correct level of
training in climbing techniques.
Combine good physical security with relatively inaccessible mounting points and it can be seen
someone with malicious intent would find it difficult to interfere with one or more of the Sub10
Liberator links. In this sense, “interfere” is used in the physical, rather than electronic sense. After
discussion with our specialist RF team, the general consensus is that someone wanting to sabotage a
network could do this very easily by simply cutting one or more of the power/data ‘drop’ cables
feeding an ODU. The recommendation? If the access to a rooftop is not secure and strictly
controlled, put procedures into place to make it so. Additionally, run power and data drop cables
inside steel conduit in order to protect them from accidental or deliberate damage.
2 60 GHz - Denial of Service - 200112
ACCIDENTAL ‘DENIAL OF SERVICE’
Considering the accidental situation. The propagation of radio-waves at 60GHz is affected very
significantly by oxygen absorption. Figure 1 illustrates that the oxygen absorption peak, of 16dB/Km,
is coincident with virtually the whole 60GHz band.
Fig 1 –Oxygen Absorption Peak of 16dB/km over 60GHz Band
The principle effect of high levels of attenuation, due to oxygen absorption, is to restrict ranges of
60GHz radio systems to below 2km. Add the effects of this range limitation to the very narrow radio
beam produced by a Sub10 Liberator as shown in Figure 2 and it can be seen the 60GHz band is very
resistant to interference, regardless of how many 60GHz radios are deployed in a small geographic