Académique Documents
Professionnel Documents
Culture Documents
OF
Mobile and ADHOC Networks
SUBMITTED TO-
Miss. GURLINE KAUR
SUBMITTED BY-
RAJESH RANA
REG.NO. 7010070005
BCA (Hons.)-MCA
Sec. D37D2
PART – A
Theoretically, the available speed of the fast link should at least be equal
to the total of all of the slow speeds coming into the multiplexor so that
its maximum capacity is not exceeded.
Synchronous TDM
Asynchronous TDM
SYNCHRONOUS TDM
FDM gives a total bandwidth greater than the combined bandwidth of the
signals to be transmitted. In order to prevent signal overlap there are
strips of frequency that separate the signals. These are called guard bands.
ANS.
SPREAD-SPECTRUM
ANS.
Ans.
UMTS (Universal Mobile Telecommunications Service) is a third-
generation (3G) broadband, packet-based transmission of text, digitized
voice, video, and multimedia at data rates up to 2 megabits per second
(Mbps). UMTS offers a consistent set of services to mobile computer and
phone users, no matter where they are located in the world. UMTS is
based on the Global System for Mobile (GSM) communication standard.
It is also endorsed by major standards bodies and manufacturers as the
planned standard for mobile users around the world. Once UMTS is fully
available, computer and phone users can be constantly attached to the
Internet wherever they travel and, as they roam, will have the same set of
capabilities. Users will have access through a combination of
terrestrial wireless and satellite transmissions. Until UMTS is fully
implemented, users can use multi-mode devices that switch to the
currently available technology (such as GSM 900 and 1800) where
UMTS is not yet available.
Previous cellular telephone systems were mainly circuit-switched,
meaning connections were always dependent on circuit availability.
A packet-switched connection uses the Internet Protocol (IP), meaning
that a virtual connection is always available to any other end point in the
network.
UMTS is helpful-
UMTS makes it possible to provide new services like
alternative billing methods or calling plans. For instance, users can
choose to pay-per-bit, pay-per-session, flat rate, or asymmetric bandwidth
options. The higher bandwidth of UMTS also enables other new services
like video conferencing or IPTV. UMTS may allow the Virtual Home
Environment (VHE) to fully develop, where a roaming user can have the
same services to either at home, in the office or in the field through a
combination of transparent terrestrial and satellite connections.
Ans.
LIMITATIONS OF CDMA
1) With WCDMA based 3G, as the data speed increases the coverage
area of the cell become smaller and smaller. For data rates of 2 Mbps and
above, a WCDMA cell can cover only an area of 10 meter radius ie.
about 300 sq. meters.
There has been some improvement with HSPDA, but still it is impossible
to connect these by wireless links in cellular technology and therefore,
will have to use Optical Fiber cable connectivity / PON up to the Cell
terminal. In this situation the wireless portion of the network is only at
the end link of 10 meter that can be better managed with alternate
technology terminals and higher reach by WiMax / WiFi wireless system.
3) The success of any business comes from the volume its products can
generate. Volume can be built only when the product is available,
accessible and affordable to community who are interested in such
products.
ANS.
Authentication and Encryption in CDMA system
The security protocols with CDMA-IS-41 networks are among the best in
the industry. By design, CDMA technology makes eavesdropping very
difficult, whether intentional or accidental. Unique to CDMA systems, is
the 42-bit PN (Pseudo-Random Noise) Sequence called “Long Code” to
scramble voice and data. On the forward link (network to mobile), data is
scrambled at a rate of 19.2 Kilo symbols per second (Ksps) and on the
reverse link, data is scrambled at a rate of 1.2288 Mega chips per second
(Mcps). CDMA network security protocols rely on a 64-bit authentication
key (A-Key) and the Electronic Serial Number (ESN) of the mobile.
The cellular authentication and voice Encryption (CAVE)
The cellular authentication and voice encryption (CAVE) security system
used in ANSI-41 net words supporting analog, TDMA and CDMA
systems is much more compels. The wireless device's private key is
shared only by the wireless device and the home system, but the serving
system is sent SSD, a secondary key (i.e. one that is derived from the
primary key), rather than just a list of challenge response pairs. This
enables the serving system to securely authenticate the wireless device
any number of times without the overhead of further communication with
the home system. This flexibility and efficiency does, however, require
the same algorithm (CAVE) be used by all system. If a major loss of keys
occurred it would be possible to update the valid wireless devices with a
new SSD over the radio interface, but a serious breach of the CAVE
algorithm would not be easily rectified
CAVE id use
1. To generate A-Key Checksum.
2. To generate the SSD
3. To generate the CMEA Key an VPM
the authentication by CAVE
Basic of authentication
o key (authentication Key)
o ESN:
A- key (authentication Key):
the A-key or authentication key is a 64 bit permanent number stored in
the permanent memory of the mobile. Pre-programmed and stored
security on the mobile phone during factory settings. Known only to the
mobile and its associated HLR/AC. Is used to generate the SSD (share
secret data)- the intermediate keys.
ESN:
ESN (electronic serial number)
The ESN is the 32 bit electronic serial number of the mobile phone. The
ESN is pre-programmed by the phone manufacturer during factory
setting. The ESN is unique to each mobile on the network and is used in
conjunction with the mobile number to identity the mobile on the
network . MIN (mobile identification number)
The MIN is the 10 digit number which is assigned by the service
providers to a mobile phone in the network . the MIN is unique each
mobile on the network and is used in conjunction with the ESN to
identify the mobile on the network.
MDN (mobile directory number) The MDN is the 10 digit dilatable
number assigned by the service provider to a mobile phone on its network
. the MDN may be the same as the MIN (it depend on how the service
provider provisions this pair on its network)