Escolar Documentos
Profissional Documentos
Cultura Documentos
Radio frequency communication, Microwave communication, for example long-range line-of-sight via highly directional antennas, or short-range communication,
3.
Infrared (IR) short-range communication, for example from consumer IR devices such as remote controls or via Infrared Data Association (IrDA).
1.
Cordless computer peripherals: the cordless mouse is a common example; keyboards and printers can also be linked to a computer via wireless using technology such as Wireless USB or Bluetooth
3.
Cellular telephones and pagers: provide connectivity for portable and mobile applications, both personal and business.
cellphones.These are the analog cellphone standards that were introduced in the 1980s.For Example-Advanced Mobile Phone System(AMPS), Total Access
Communication System (TACS) is the European version of AMPS. 1.4.2) 2G (or 2-G) is the second-generation wireless telephone, which is based on digital technologies. 2G networks is basically for voice communications only, except SMS
2
messaging is also available as a form of data transmission for some standards. For Example-Code Division Multiple Access(CDMA), Time Division Multiple
Access(TDMA), 2.5G is a group of bridging technologies between 2G and 3G wireless communication. It is a digital communication allowing e-mail and simple Web browsing, in addition to voice, General Packet Radio Service(GPRS).Enhanced Data rates for GSM Evolution(EDGE).
1.4.3) 3G stand for the third generation of wireless communication technologies, which support broadband voice, data and multi-media communications over wireless networks. The GSM standard is more improved after the development of third generation (3G) UMTS standard developed by the 3GPP.For Example- Wideband Code Division Multiple Access(WCDMA).
1.4.4) 4G is the name of technologies for high-speed mobile wireless communications designed for new data services and interactive TV through mobile network. WiMAX is another technology verging on or marketed as 4G. GSM networks will evolve further as they begin to incorporate fourth generation (4G) LTE Advanced standards.
CHAPTER 2
each direction of communication. W-CDMA systems are widely criticized for their large spectrum usage, which has delayed deployment in countries that acted relatively slowly in allocating new frequencies specifically for 3G services (such as the United States).
10ms frames containing fifteen time slots (1500 per second). The time slots (TS) are allocated in fixed percentage for downlink and uplink.
2.2.1.c) TD-SCDMA
TD-SCDMA uses the TDMA channel access method combined with an adaptive synchronous CDMA component on 1.6 MHz slices of spectrum, allowing deployment in even tighter frequency bands than TD-CDMA.
Home Location Register (HLR) Visitor Location Register (VLR) Equipment Identity Register (EIR) Mobile Switching Center (MSC) (vendor dependent) Authentication Center (AUC) Serving GPRS Support Node (SGSN) (vendor dependent) Gateway GPRS Support Node (GGSN)
From Global Service for Mobile (GSM) communication radio network, the following elements cannot be reused
A. B.
The UMTS network introduces new network elements that function as specified by :
A. B. C.
Node B (base transceiver station) Radio Network Controller (RNC) Media Gateway (MGW)
The functionality of MSC and SGSN changes when going to UMTS. In a GSM system the MSC handles all the circuit switched operations like connecting A- and B-subscriber through the network. SGSN handles all the packet switched operations and transfers all the data in the network. In UMTS the Media gateway (MGW) take care of all data transfer in both circuit and packet switched networks. MSC and SGSN control MGW operations. The nodes are renamed to MSC-server and GSN-server.
2.4) Applications
1) 2) 3) 4) 5)
CHAPTER 3
10
3.2.3) Flexibility
In reality, however, the usage of different encryption schemes depends on many factors, including network data flow design. Thus, it is important that the encryption method be able to change when other determining factors change. Unfortunately, IPv6 can only protect data in transmission. Individual applications may contain flaws in the processing of data, thereby opening security holes. These holes may be remotely exploited, allowing the security of the
11
entire mobile device to be compromised. Thus, any wireless device should provide a process for updating the application software as security holes are discovered and fixed.
3.2.4) Anti-Virus
As wireless devices become more powerful, they will begin to exhibit the same security weaknesses as any other computer. For example, wireless devices may fall victim to trojans or become corrupt with viruses. Therefore, any new wireless handheld device should incorporate antivirus software. This software should scan all e-mail and files entering through any port (e.g. Internet, beaming, or synchronizing), prompting the user to remove suspicious software in the process.
12
pulse itself does not cancel out the pulse. Interference would have to spread across the spectrum uniformly to obscure the pulse. UWB provides greater bandwidth as much as 60 megabits per second, which is 6 times faster than todays wireless networks. It also uses significantly less power, since it transmits pulses instead of a continuous signal. UWB uses all frequencies from high to low, thereby passing through objects like the sea or layers of rock. Nevertheless, because of the weakness of the UWB signal, special antennas are needed to tune and aim the signal.
predefined beam to another when the user with the phone moves throughout the sector.
13
Adaptive Array Antennas represent the most advanced smart antenna approach to date using a variety of new signal processing algorithms to locate and track the user, minimize interference, and maximize intended signal reception.
Smart antennas can thereby: Optimize available power Increase base station range and coverage Reuse available spectrum Increase bandwidth Lengthen battery life of wireless devices.
3.4) Features
1)
2) 3) 4) 5) 6) 7) 8) 9) 10)
Very low latency Support of variable bandwidth Simple protocol architecture Simple Architecture Compatibility and inter-working with earlier 3GPP Releases Inter-working with other systems, e.g. cdma2000 FDD and TDD within a single radio access technology Efficient Multicast/Broadcast Support of Self-Organising Network (SON) operation
3.5) Applications
1) Mobile IPTV 2) Social Networking Services/User-generated Content 3) Mobile Marketing and Advertising 4) E-reader Apps/Phones 5) Wireless VoIP Apps 6) M2M Apps 7) Telematics
3G Speed Transfer Rate Battery Life Switching Technology Less 2 megabits/second More Circuit and Packet Switching Technology Bandwidth Low
15
Reliability Security
Less Less
More More
16
References
1) 2) 3) 4)
17