Professional Documents
Culture Documents
Picture: http://www.scom.hud.ac.uk
1G Cellular Networks
1stgeneration cellular networks are purely
analog cellular systems.
The transmission of data is sent via a
continuously variable signal
2G Cellular Networks
2nd generation cellular networks refer to
digital cellular and PC wireless systems.
voice and low speed data services.
They consist of digital traffic channels,
perform encryption, error detection &
correction
Users share channels dynamically
3G Cellular Networks
3rd generation refers to the next generation of
wireless systems.
This is digital with high speed data transfer
It is voice quality comparable with a switched
telephone network.
Data transmission rates can be asymmetric or
symmetrical
It provides support for circuit switched and
packet switched data services
Cellular Operation
Three basic devices
A mobile station
A base transceiver
A Mobile Telecommunications Switching Office
(MTSO)
Cellular Operation
Picture: www.Xanthippi.ceid.upatras.gr
Cellular Network Organization
Base Station (BS)
includes an antenna, a controller, and a number of receivers
• Traffic channels
• carry voice or data connection between users
Cellular Operation
Public Land Mobile Network (PLMN) refers to a
cellular network that has land and radio based
sections.
Each
colour/letter
uses the same
frequency band
Amplitude Modulation
Frequency Modulation
Phase Modulation
are the three different methods of encoding
binary information on a regular wave.
Encoding:
Modulation(2)
When using digital signals the methods are
known as Amplitude Shift Keying (ASK),
Frequency Shift Keying (FSK), and Phase
Shift Keying (PSK).
Encoding:
Multiplexing(1)
Flexible
Cost is less (long term)
Mobile user choice
Accesses areas that wired networks
cannot reach
Disadvantages of wireless
networks
Compared to wired networks the data
rates are slower
User location determines performance
Devices such as microwaves, cordless
phones, etc may cause interference
Can be accessed by hackers from the
outside
Wired Equivalent Privacy
Algorithm (WEP) (1)
Wireless networks may include additional
security elements, which are not
supported in wired networks.
For eg. The use of security algorithms such
as WEP (Wired Equivalent Privacy
Algorithm), that uses an encryption
algorithm which deals with unauthorized
access to the network (eavesdropping).
WEP (2)
WEP is a implemented such that a block of
plaintext (input text) is bitwise XORed with an
equal length random key sequence. A
random number generator is used on the
initialization vector and the secret key and
outputs a key sequence of random of octets.
An integrity check value is produced to protect
against data modification.
The key sequence combined with plaintext
combined with the integrity check value gives
the enciphered message. The integrity check
value and the ciphertext is the combination of
the output.
Block Ciphers
Picture: http://www.alphaorg.com/cellular/
Mobile Station
Mobile equipment or terminal
3 types: fixed, portable, handheld