You are on page 1of 6

Communication Networks

Abstract
Specialization in wireless communication became 2.2. Second-generation wireless
inherently mandatory for the further progress in the communication
civilization. As the saying ‘ Necessity is the mother of
invention’, its indeed our time to be needy for us to Second generation 2G cellular telecom networks
become wireless. In this paper, various advancements, were commercially launched on the GSM standard in
limitations, challenges in wireless communication and 1991. Three primary benefits of 2G networks over their
their possible solutions are discussed. The special predecessors were that phone conversations were
feature of the telecom services is that the advancement digitally encrypted, 2G systems were significantly more
is continuous, that is to say one newly advanced device efficient on the spectrum allowing for far greater mobile
over takes the other. Imagine you enter into a room phone penetration levels; and 2G introduced data
connected with WLAN, and you need to get a printout of services for mobile, starting with SMS text messages.
your mms clip, which is in your mobile without a After 2G was launched, the previous mobile
bluetooth, 4G wireless communications will solve it! telephone systems were retrospectively dubbed 1G.
While radio signals on 1G networks are analog, and on
1. Introduction 2G networks are digital, both systems use digital
signaling to connect the radio towers (which listen to the
The wireless communications can be regarded as an handsets) to the rest of the telephone system
adjunct with the wired systems. As the progress of 2G technologies can be divided into TDMA-based
telecom industry is exponential, the evolution of and CDMA-based standards depending on the type of
telecom products is also exponential. As far as wireless multiplexing used. The main 2G standards are:
communication is concerned, mobile radio propagation 1. GSM (TDMA-based), originally from
is regarded as the predecessor. As far as today’s telecom Europe but used in almost all countries on all six
service is concerned 3G systems have impregnated and inhabited continents (Time Division Multiple Access).
in the near future or so we would witness 4G and UWB Today accounts for over 80% of all subscribers around
systems in the race. the world.
2. IS-95 (CDMA-based)
2. Evolution of wireless communication 3. PDC (TDMA-based)
4. iDEN (TDMA-based)
The various advancements of wireless 5. IS-136aka D-AMPS (TDMA-based)
communications are listed below. 2G services are frequently referred as Personal
Communications Service, or PCS.
2.1. First generation wireless communication

1G (or 1-G) refers to the first-generation of wireless 2.3. Generation 2.5 (2.5G)
telephone technology, mobile telecommunications.
These are the analog telecommunications standards that 2.5G services enable high-speed data transfer over
were introduced in the 1980s and continued until being upgraded existing 2G networks. Beyond 2G, there's 3G,
replaced by 2G digital telecommunications. The main with higher data speeds, and even evolutions beyond
difference between two succeeding mobile telephone 3G, such as 4G, which is now available.
systems, 1G and 2G, is that the radio signals that 1G
networks use are analog, while 2G networks are digital. 2.4. Third generation wireless wireless
Although both systems use digital signaling to communication
connect the radio towers (which listen to the handsets)
to the rest of the telephone system, the voice itself
during a call is encoded to digital signals in 2G whereas
1G is only modulated to higher frequency, typically
150MHz and up.
Examples of 1G are NMT, AMPS, TACS, RTMI.
International Mobile Telecommunications-2000 Piconet
(IMT-2000), better known as 3G or 3rd Generation, is a
family of standards for wireless communications A piconet is a small Ad hoc network of 8 stations.
defined by the International Telecommunication Union, One is called Master and the other seven are called the
which includes GSM EDGE, UMTS, and CDMA2000 slaves. All slave stations synchronize their clocks with
as well as DECT and WiMAX. the Master. There may be one station in the parked state
(stand by). All the communication is done through the
3. Advancements in digital communications master.

Scatternet
3.1 Ad hoc Networks
By making one of the slaves as a master of another
Ad hoc networks are designed to dynamically piconet, a scatternet is formed by combining several
connect remote devices such as cell phones, laptops and piconets.
PDAs. These networks are termed as “Ad hoc” because
of their shifting topology. Whereas WLANs use a fixed 3.3. Sensor networks
network infrastructure, Ad hoc networks maintain
random network configurations, relying on a system of
mobile routers connected by wireless links to enable Sensor networks are the subsets of Ad hoc networks
devices. As devices move about in an unpredictable with some special intelligence for a very specialized
fashion, these networks must be reconfigured to handle purpose. Major features:
the dynamic topology. It offers peer-to-peer • Energy is the major driving constraint.
communication. No backbone infrastructure is needed. • Nodes are powered by non
Routing can be multihop. The topology is dynamic. rechargeable batteries
They are fully connected with different link SINRs. • Data flows to a centralized location
They provide a flexible network infrastructure for many • Data is highly correlated in time and
emerging applications. The capacity of the Ad hoc space
network is generally unknown, which is due to the fact • Nodes can cooperate in transmission,
that number of user nodes in an Ad hoc network is reception and signal processing
always a variable. Each node of the Ad hoc network is a
router. Energy constraints impose interesting design 3.4. Ultra Wide Band (UWB)
tradeoffs for communication and networking.
UWB forms the future wireless communication
3.1.1. Mobile router. The mobile router is commonly network. The UWB has the following advantages over
integrated in a device such as a PDA, the above-discussed networks.
notebook or mobile phone. This mobile
router, when configured, ensures that a • Data rate up to 1000 Mbps
remote, mobile device, such as a mobile • Ultra low power is used with very narrow
phone, stays connected to the network. pulses
The router maintains the connection and
• Very hard to detect, because of low power
controls the flow of communication.
• Exceptional multi-path immunity
• No need of license
3.2. Bluetooth
• Low interference
Bluetooth, a cable replacement RF technology, is of low • Very large band-width of 7.5 GHz
cost and covers short range of about 10m and all of its •
74 channels use the same crowded 2.4 GHz band as the Thus UWB forms the next generation wireless
WLANs. This network uses TDMA\TDD scheme of communication. One more advantage is that because of
multiplexing.The Bluetooth network forms a PAN low power, transmission is economical. The only one
(Personal Area Network), which connects computers, serious challenge posed by UWB is that converters must
cameras, speakers, cellular phones, headsets etc., for the be designed to sample sub-nano-levels, hence
devices to be within a person’s reach. processing is costlier.

3.2.1. Bluetooth topology. The two famous bluetooth 4. Electronic mail


topologies are Piconet and Scatternet:
Electronic mail (e-mail), may be the most heavily • The signed document cannot be altered; any
used feature of the Internet or LANs in an organization. alteration to the document (whether or not it has been
At the most basic level, the e-mail process can be encrypted) renders the signature invalid.
divided into two principal components:
• Mail servers, which are hosts that deliver, 5. Logical access exposures
forward and store mail.
• Clients, which interface with users and allow Technical exposures are one type of exposure that
users to read, compose, send and store e-mail messages. exists from accidental or intentional exploitation of
logical access control weakness. International
4.1. Security issues of e-mail exploitation of technical exposures might lead to cyber
crime. However, all computer crimes do not exploit
Some of the security issues involved in e-mails are technical exposures.
as follows: Technical exposures include:
• Flaws in the configuration of mail server • Data leakage – Involves siphoning or leaking
through maintenance and administration standards. information out of the computer.
• Denial of service (DoS) attacks may be
directed to the mail server denying or hindering valid • Trojan horses – involve malicious, fraudulent
users. code in an authorized computer program.
• Sensitive information transmitted unencrypted • Wire trapping – involves eavesdropping on
between mail server and e-mail client may be information being transmitted over telecommunication
intercepted. lines.
• Information within the e-mail may be altered • Viruses – involve the insertion of malicious
at some point between the sender and the recepient. code into the other executable codes.
• Viruses and other types of malicious code may • Worms - destructive programs that may
be distributed throughout an organization via e-mail. destroy data.
• Users may send inappropriate, proprietary or • Spyware – transmits potentially sensitive
other sensitive information via e-mail leading to legal information from the host to the originator.
exposure.
• Logic bombs- involves programming the
4.1.1. Solutions for threats……… destruction or modification of data at a specific time in
To improve e-mail security, organizations should: the future.
• Address the security aspects of the • Denial of service attacks-disrupts or
development of a mail server through maintenance and completely denies the legitimate users.
administration.
• Ensure that the mail server application is 5.1 Solutions for threats………
deployed, configured and managed to meet the security
policy. To protect organizational information resources,
• Consider the implementation of encryption access control software has become even more critical
technologies to protect user authentication and mail in assuring the confidentiality, integrity and availability
data. of information resources.

In email security, a digital signature authenticates a 6. Wireless Security Threats


transmission from a user in an untrustworthy network
environment. A digital signature is a sequence of bits • Errors and omissions
appended to a digital document. Like a handwritten • Frauds and theft committed by authorized
signature, it is unique to the document being signed. or unauthorized users of the system.
Digital signatures are another application of public key • Employee sabotage
cryptography. Digital signatures are a good method of
• Loss of physical and infrastructure support
securing e-mail transmissions in that:
• Malicious hackers
• The signature cannot be forged.
• Industrial espionage
• The signature is authentic and encrypted.
• Malicious code
• The signature cannot be reused (a signature on
one document cannot be transferred to another • Threats to personal privacy
document).
6.1. Solutions for threats……… memory constraints of handheld devices and the low-
bandwidth of the wireless network.
Ensuring confidentiality, integrity, authenticity and
availability are prime objective in wireless networks. 6.3.1. Issues and exposures
• Interception of sensitive information
Security requirements include the following: • The loss or theft of devices
• Authenticity – A third party must be able to • The misuse of devices
verify that the content of a message has not been • The loss of data contained in the devices
changed in transit. • Distractions caused by the devices
• Nonrepudiation – The origin or receipt of a • Possible heath effects of device usage
specific message must be verifiable by a third party.
• Accountability - The actions of an entity must 6.3.2. Solutions to mitigate the threats
be uniquely traceable to the entity.
• Network availability – The IT resource must be Wireless user authentication
available on a timely basics to meet mission There is a need for stronger wireless user
requirements to avoid substantial losses. Availability authentication and authorization tools at the device
also includes ensuring that resources are used only for level. The current technology is just emerging.
intended purposes.
File security
6.2. Internet threats and security Wireless phones and PDAs do not use the type of
file access security that other computer platforms can
The Internet protocol is designed solely for the provide.
addressing and routing of data packets across a network.
The nature of Internet makes it vulnerable to attack. For Wired Equivalent Privacy security encryption
example, hackers and virus writers try to attack the WEP security depends particularly on the length of
Internet and computers connected to Internet. Some the encryption key and on the usage of static WEP or
want to invade others’ privacy and attempt to crack into dynamic WEP. The drawback in WEP is that an attacker
databases of sensitive information or sniff information possessing the WEP key could also sniff packets being
as it travels across Internet routes. transmitted and decrypt them.

6.2.1. Challenges in Internet…. 6.4. LAN security


It does not guarantee or provide evidence on the
delivery of messages; there is no verification of an Local Area Networks facilitates the storage and
address; the sender will not know if the message reaches retrieval of programs and data used by a group of
its destination at the time it is required; the receiver does people. LAN software and practices need to provide for
not know if the message came from the address the security of these programs and data. Unfortunately,
specified as the return address in the packet. Other most LAN software provides a low level of security.
protocols may correct some of these drawbacks. The emphasis has been on providing capability and
functionality rather than security. As a result, risks
6.3. Wireless application protocol associated with the use of LANs include:
• Loss of data and program integrity through
Wireless Application Protocol (WAP) is a general unauthorized changes.
term used to describe the multi-layered protocol and • Lack of current data protection through
related technologies that bring Internet content to inability to maintain version control
wireless mobile devices such as PDAs and cell phones. • Exposure to external activity through limited
WAP protocols are largely based on Internet user verification and potential public network access.
technologies. The motivation for developing WAP was • Virus and worm infection
to extend Internet technologies to wireless networks, • Improper disclosure of data because of general
bearers and devices.WAP supports most wireless access rather than need-to-know access provisions
networks and is supported by all operating systems • Violating software licenses by using
specifically engineered for handheld devices. Micro- unlicensed or excessive numbers of software copies.
browsers use displays and access the Internet run and • Illegal access by impersonating or
have small file sizes that can accommodate the low- masquerading as a legitimate LAN user
• Internal user’s sniffing
• Destruction of logging and auditing data necessary control and security measures are taken. Audit
trails are considered only after a problem occurs.
6.4.1. Security measures
Following measures are suggested for the LAN 6.6. Risk in Client –Server environment
security
• Declaration of ownership of programs, files • Access controls may be weak in a client-
and storage server environment.
• Limiting access to a read-only basis • Change control and change management
• Implementation of record and file locking to may be weak.
prevent simultaneous update • The lose of network availability
• Enforcing user ID/password sign-on • Obsolescence of network components.
procedures, including the rules relating to password
length and format. 7. Wireless data communications
The use of these security procedures requires
administrative time to implement and maintain. Network From the second generation of wireless
administration is often inadequate, providing global communications, data transmission is promoted. One
access because of the limited administrative support among the data transmission techniques is Electronic
available when limited access is appropriate. Data Interchange (EDI).
6.5. WLAN risks and issues 7.1. Electronic data interchange
The administrative and control functions In use of more than 20 years, EDI is one of the first
available with network might be limited. Software e-commerce applications used among business partners
vendors and network users have recognized the need to for transmitting business transactions between
provide diagnostic capabilities to identify the cause of organizations with dissimilar computer systems. EDI
problems when the network goes down or functions in involves the exchange and transmittal of business
an unusual manner. The use of logon Ids and passwords document in a standard, machine-processable format.
with associated administration facilities is only The transmissions use standard formats such as specific
becoming standard now. Read, write and execute record types and field definitions. The process works by
permission capabilities for files and programs are translating data from a business application into a
options available with some network operating system standard format, transmitting the data over
versions, but detailed automated logs of activity are communication channels to a trading partner, and then
seldom found on WLANs. Fortunately, newer versions retranslating using the trading partner’s application.
of network software have significantly more control and
administration capabilities. LANs can represent a form 7.1.1. Benefits of EDI
of decentralized computing. Decentralized local • Less paper work
processing provides the potential for a more responsive
• Fewer errors during the exchange of
computing environment; however, organizations do not
information
always give the opportunity to efficiently develop staff
• Improved information flow, database-to-
to address the technical, operational and control issues
database and company-to-company
that the complex LAN technology represents. As a
result, local LAN administrators frequently lack the • No unnecessary rekeying of data
experience and time to effectively manage the • Fewer delays in communication
computing environment. The various alternatives of • Improved invoicing and payment process
media, protocol, hardware, transmission techniques,
topology and network software ensure that each LAN is Since EDI replaces the traditional paper document
unique. This mix of vendors and unique environment exchange – such as purchase orders, invoices or material
makes it difficult to implement standard management, release schedules- the proper controls and edits need to
operating and auditing practices. As a result, the costs of be built within each company’s application system to
resolving problems can be substantial. Normal LAN allow this communication to take place.
users recognize only one attribute of the LAN-it works.
In a well-structured LAN, the unsophisticated user is not 7.1.2. General requirements
able to judge whether the technology is appropriate, the An EDI system requires communication software,
software is installed and documented properly, or the translation software and access to standards.
Communications software moves data from one point to
anther, flags the start and end of an EDI transmission, interaction and materials such as paper documents,
and determines how acknowledgements are transmitted meetings, faxes, etc. Even when paper documents are
and reconciled. Trading partners are free to use any maintained in parallel with EDI exchange, e.g. printed
method for the transmission of documents. In the past shipping manifests, electronic exchange and the use of
one of the more popular methods was the usage of a data from that exchange reduces the handling costs of
bisync modem to communicate through a value added sorting, distributing, organizing, and searching paper
network (VAN). Some organizations have used direct documents. EDI and similar technologies allow a
modem to modem connections and bulletin board company to take advantage of the benefits of storing and
systems (BBS), and recently there has been a move manipulating data electronically without the cost of
towards using some of the many Internet protocols for manual entry. Another advantage of EDI is reduced
transmission, but most EDI is still transmitted using a errors, such as shipping and billing errors, because EDI
VAN. In the healthcare industry, a VAN is referred to as eliminates the need to rekey documents on the
a "clearinghouse". destination side. One very important advantage of EDI
over paper documents is the speed in which the trading
7.1.4. EDI via the Internet (Web EDI) partner receives and incorporates the information into
The Internet, as with VAN providers, uses its own their system thus greatly reducing cycle times. For this
communications protocols to ensure that EDI documents reason, EDI can be an important component of just-in-
are transmitted securely. The most popular protocols are time production systems.
File Transfer Protocol Secure (FTPS), Hyper Text
Transport Protocol Secure (HTTPS), and AS2.
Many companies around the world have shifted
8. Conclusion
production of labour intensive parts to low-cost,
emerging regions such as China and Eastern Europe. The wireless communication advancements like
Web-based EDI, or webEDI, allows a company to UWB systems ensure not only a broad coverage, but
interact with its suppliers in these regions without the also a safer communication withot a liscence which
worrying of implementing a complex EDI infrastructure. enables secured, faster, more reliable and an integrated
In its simplest form, webEDI enables small to communication.
medium-sized businesses to receive, turn around, create
and manage electronic documents using just a web 9. References
browser. This service seamlessly transforms your data
into EDI format and transmits it to your trading partner. [1] “Wireless communications”, CISA Review
Simple pre-populated forms enable businesses to Manual, ISACA, U.S., 2009
communicate and comply with their trading partners'
requirements using built-in business rules. Using a
friendly web-based interface, EDI transactions can be [2] “ Information Sytems Control”, ISACA,U.S.,
received, edited and sent as easily as an email. You will 2005
also be able to receive EDI documents and send EDI
invoices and shipping documents with no software to
install. All you require is an Internet connection.
WebEDI has the added advantages that it is accessible
anywhere in the world and you do not need a dedicated
IT person to manage any software installation.
Even though VANs offer a very secure and reliable
service to companies wishing to trade electronically, the
Internet is making EDI more available to all. This is
especially important in the emerging markets where IT
awareness and infrastructure are very limited. WebEDI
is traditionally based around the "hub and spoke'"model,
with major trading partners or Application Service
Providers (ASPs) being the hubs and smaller partners
being the spokes.

7.1.5. Advantages of EDI over paper


EDI and other similar technologies save a company
money by providing an alternative to, or replacing
information flows that require a great deal of human

You might also like