Professional Documents
Culture Documents
examples.
The user of mobile computing environment will be able to access data, information or logical objet from
any device in any network while on a move.
2) Location Flexibility - Use of portable device allowed many employees to continue their work,
regardless of the lo cation.
3) Increased Productivity - As MC allows to be available all time, there are higher rates of engagement
and productivity. (Fr eg - Application developed in Android) - Connectivity using Phone.
4) Cost Effective - As employee can work from their home, --> Overhead cost is low. For E.g. -> No need
of an equipment for an employee- (computer, desk etc.)
2 Relate the security concerns of mobile users with needs of 2 Analyze CO2
mobile user
1) User Authentication - It is a process which confirms user's identity, to ensure that user really is who
he claims to be. Authentication Factors
– 1.1) Knowledge Factors - (Something user knows) - Password, Passphrase, Personal Identification
number (PIN), Secruity Question.
1.2) Ownership Factors - (Something user has) - ID Card, Security Token, Implanted Device.
1.3) Inherence Factors - (Something user is or does) - DNA sequence, Fingerprint, Voice, Face, Signature,
Retinal Pattern.
Types of Authentication –
1) Single Factor Authentication- User provide only username and password to get authenticate to use
any website.
2) Two factor Authentication - Combination of login credentials + something (Could be a PIN), later use
to authenticate yourself.
4) One Time Password (OTP) - automatic generated alphanumeric character, active for few minutes to
use, to authenticate yourself. Once that OTP is used it is going to be expire and never work.
Security Attacks –
1) BruteForce Attack.
2) Dictionary Attack.
2) User Access Control (Authorization) - allows only those user to connect to network, who are
authenticated or per mitted access via network admin.
3) Data Privacy - Ensure the data transmitted over network is completely encrypted and not eavesdrop
by unauthorised person. HTTPS, SSH, RSA(Anonymous Network) --> Fingerprinting -> Grabbing
information from the activity doing over the internet. Cookie, Session, Social Engineering(trick your
mind), man in the middle attack, User String (Browser Version, Operating System, Encoding Styles) -->
"Enumeration Techniques".
4) Data Integrity - Check the message /data from sender to receiver in between it is not
altered/modified by the intruder.
5) key Management - Creation, protection and distribution of keys used for encrypting data.
3 Propogation mode
1) Ground Wave (Below 2Mhz)- Radio wave travel through the lowest portion of the
atmosphere.
- Low Frequency signal emnate in all direction from the transmitting antenna and follow the
curvature of the planet.
—
- Distance depends upon the power of the signal (higher the power, larger the signal).
2) Skywave Propogation (2-30Mhz) — Higher frequencies radiates upwards into the ionosphere.
(DTH - Direct to Home).
3) Line of Sight (Above 30Mhz) - Very high frequencies , transmit in straight line, directly from
antenna to antenna
Antenna must be directional, facing each other, or either tall enough to not to be affected by the
curvature of the earth
------------------------------
3) handoff assignment
Following aspects -
-Any new call attempts in a cell, after all the channels of that cell become occupied. ---> New user is
going to be blocked.
- Cell in this channel is allowed to borrow channel from adjacent cell, if their channels are fully occupied,
while adjacent cell have free channels.
---> Borrowing Process --> can be handle by --> MSC -> Mobile Switching Centre. Big office (main office
of BSNL).
MSC -->
a) monitor the process and give permission to borrowing cells, to borrow channel on following aspects -
2) No interference will occur by moving the channel from one cell to another.
------------------------------------
- Any channel can be allocated to any desired cell during the operation of the system, or if any cell is
asking for the channel.
Following aspects -
2) Each time a cell request made, a MSC assings a channels to Base station(BS).
4) MSC assigns a channel only if it is not used, and if it will not cause co-channel interference with any
cell.
7) MSC collects real time data of channel occupancy, traffic distribution, RSSI(Radio signal strength
indicator).
--------------------------------------------------------
---------------
process of transferring and active call from one cell to another cell as the mobile unit moves from first
cell to other cell, without disconnecting the call.
The amount of received power by mobile phone or the amount of received power by tower(acces
point), or both are usually need to determine, whether a handoff is necessary or not.
---------------------------- ***-------------------------------
5 Derive the equation for distance to frequency reuse ratio 2 Understand CO1
Let T = total number of duplex channels K cells = size of cell cluster (typically 4, 7,12, 21)N = T/K =
number of channels per cell
For a specific geographic area, if clusters are replicated M times, then total number of channels
– system capacity = M xT
– Choice of K determines distance between cells using the same frequencies – termed co-channel cells
– K depends on how much interference can be tolerated by mobile stations and path loss
N = 70 channels/cellClusters are replicated M=3 times System capacity = 3x490 = 1470 total channels
GSM Architecture
----------------
-----------------------------
- It mainly consist of MS (Mobile Station) - this MS consist of Mobile equipment (ME)(your device)
and SIM (Subscriber Identity Module).
ME --> IMEI
-----------------------------
- It is a radio transceiver system (transmit + receive), within the coverage area of cell.
- Transmission and Reception at the BTS with the MS is done via - omnidirectional and directional
antenna.
- Major function is to transmit the signal of desired function with a proper format.
- More than one BTS are connected and controlled by one BSC.
- Handles the switchover of a mobile user from one BTS to another BTS during roaming and handoff.
--------------------------------------------------
---------------------------------------------
It is a logical part of BSC, but resides very close to MSC, to reduce the significant transmission cost.
The most important role of TRAU is to convert the speech from 16Kbps to 64 Kbps over the PSTN or
ISDN network.
================================================================
Consist of MSC (Mobile Switching Centre) - has many database HLR(home location register) VLR (visiting
location register),
- It controls both switching and management together by controlling the number of BSC to it.
- it also does the registration and authentication of a user and its equipment
- When a request comes, MSC sends the request to the authentication center for the user information
and performs authentication.
- Once authentication done, only then the MSC registers the MS with its associated VLR.
- This information is updated with the HLR, that may reside in the same network.
- It does the formatiing, if one end is using PSTN and the other end is using ISDN.
- It maintained all the information related to the mobile subscriber in its database.
- The database in HLR remains intact and unchanged until the termination of the subscription.
- HLR is a huge database, located with this home network, which stores the administrative information
of the mobile subscriber - Subscriber current location (give by VLR), type of subscription, IMSI.
- it is dynamic in nature, and interacts with HLR when recording the data of particular mobile subscriber.
============================================================
Consist of AuC (Authentication Center) + EIR (Equipment Identity Register) + OMC (Operating and
Management Center)
- It is a database that stores a copy of secret key that user's SIM card to enable the authentication and
encryption over the radio link.
Centrally monitors and contrls the network element, for smooth running of the network and guarantee
the best possible "QoS" in the network.
Perform
a) Network Monitoring
b) Network Measurement
c) Fault Management
d) Network Development.
7 Explain Call Routing of GSM with MTC and MOC 2 Analyze CO2
Call routing:
- Human voice is analog in nature, so we need to convert to digital signal for convienent transferring of
information.
3) GMSC identifies the HLR of the subscriber(included in the phone number itself) and signals the
particular HLR, The HLR now checks whether the number exist and whether the user has subscribed the
requested service.
5,6) VLR will feedback the HLR after getting the MSRN, here HLR will get to know (determine) the MSC
responsible for the MSC and forwars this information to the GMSC.
7) The GMS can now forwrds the call setup request to the MSC indicated by HLR.
9) VLR will send the current status(location) of the MS, and it the MS is available the MSC intiaites and
forward that call to all BSC+BTS.
10 - end step.) After BSS sends probe to that particular MS, the MS is going to respond to the BSS, and
from BSS to MSC.
8 Define all GSM Addresses and identifiers and write 2 Understand CO1
significance of each.
----------------------------
GSM distinguishes explicitly between users and equipments, it also distinguishes between subscriber
identity and telephone. To deal with these many address GSM had created their own set of address
rules.
- when you register with GSM network, each subscriber get a unique identity.
- This number is the public information, whereas the IMSI number is the private to the world.
National Destination Code (NDC) - 2-3 decimal digit - BSNL- 94 and other 98.
When a user is roaming to another network, a temporary ISDN number is assigned to the user, it is
assigned by the VLR of the mobile station.
h) Cell Identifier
Within the Location Area, cell has a unique identity - know as Cell Identifier. (LAI+ CI)
Handoff/Handover strategy
---------------
process of transferring and active call from one cell to another cell as the mobile unit moves from first
cell to other cell, without disconnecting the call.
The amount of received power by mobile phone or the amount of received power by tower (acces
point), or both are usually need to determine, whether a handoff is necessary or not.
---------------------------- ***-------------------------------