A Practical Training Submitted in Partial Fulfillment of Award of The Degree of
A Practical Training Submitted in Partial Fulfillment of Award of The Degree of
A Practical Training Submitted in Partial Fulfillment of Award of The Degree of
Practical Training
Report
B. TECH.
In
At
Branch: ECE
TOWERS OF MANGALORE
Mobile Number Portability (MNP)
BSNL has been efficient in providing safety to its user and their
privacy. There has been cases where other peoples number has
been used by some else. To avoid these circumstances BSNL
has certain norms and regulations. TRAI announced the rules
and regulations to be followed for the Mobile Number
Portability in their draft release on 23 September 2009. Mobile
Number Portability (MNP) allows users to retain their numbers,
while shifting to a different service provider provided they
follow the guidelines set by TRAI. Users are expected to
holding the mobile number with a given provider for at least 90
days, before they decide to move to the other provider.
Telephony Subscribers (Wireless and Landline): 300.51 million
(January 2008)
BSNL Subscribers
Cell phones: 267.23 million (April 2008)
Land Lines: 39.42 million (March 2008)
Basic principles
WIRELESS SYSTEM
Consumers demand more from their technology. Whether it is a
television, cellular phone, or refrigerator, the latest technology
purchase must have new features. With the advent of the
Internet, the most-wanted feature is better, faster access to
information. Cellular subscribers pay extra on top of their basic
bills for such features as instant messaging, stock quotes, and
even Internet access right on their phones. But that is far from
the limit of features; manufacturers entice customers to buy new
phones with photo and even video capability. It is no longer a
quantum leap to envision a time when access to all necessary
Information — the power of a personal computer — sits in the
palm of one’s hand. To support such a powerful system, we
need pervasive, high-speed wireless connectivity. A number of
technologies currently exist to provide users with high-speed
digital wireless connectivity; Bluetooth and 802.11 are
examples. These two standards provide very high speed network
connections over short distances, typically in the tens of meters.
Meanwhile, cellular providers seek to increase speed on their
long-range wireless networks. The goal is the same: long-range,
high-speed wireless. Such a system does not yet exist, nor will it
exist in today’s market without standardization. Fourth-
generation wireless needs to be standardized throughout the
United States due to its enticing advantages to both users and
providers.
Cellular Technology
The mobile service has seen phenomenal growth since 2000. In
September 2004, the number of mobile phone connections has
crossed fixed-line connections. Currently there are an estimated
201.29 million mobile phone users in India compared to 39.73
million fixed line subscribers. India primarily follows the GSM
mobile system, in the 900 MHz band. Recent operators also
operate in the 1800 MHz band. The dominant players are Airtel,
Reliance Infocomm, Vodafone, Idea cellular and BSNL/MTNL.
There are many smaller players, with operations in only a few
states. International roaming agreements exist between most
operators and many foreign carriers.
Circuit-switching
Circuit switching has been the dominant technology for both
voice and data communications. Communication via circuit
itching implies that there is a dedicated communication path
between two stations. That path is a connected sequence of links
between the network nodes. On each physical link, a channel is
dedicated to the connection. The most common example of
circuit switching is the telephone network.
Packet switching
In comparison to circuit switching packet switching has greater
efficiency. A packet switching network can carry out data rte
conversion. Two stations o different data rates can exchange
packets, since each connects to its node at its proper data rate.
When traffic becomes heavy on a circuit switching network,
some calls are blocked. On a packet switching network packets
are still accepted.
BTS System
BTS in Mobile Communication
A GSM network is made up of three subsystems:
The Network and Switching Subsystem (NSS) –
comprising an MSC and associated registers.
The Base Station subsystem (BSS) – comprising a BSC and
several BTS.
The Operations support system (OSS) - for maintenance of
the network.
CDMA
CDMA, or Code Division Multiple Access, allows every device
in a cell to transmit over the entire bandwidth at all times. Each
mobile device has a unique and orthogonal code that is used to
encode and recover the signal .The mobile phone digitizes the
voice data as it is received, and encodes the data with the unique
code for that phone. This is accomplished by taking each bit of
the signal and multiplying it by all bits in the unique code for the
phone. Thus, one data bit is transformed into a sequence of bits
of the same length as the code for the mobile phone. Once
encoded, the data is modulated for transmission over the
bandwidth allocated for that transmission.
4G Technology
The 4G technology will be able to support Interactive services
like Video Conferencing (with more than 2 sites
simultaneously), Wireless Internet, etc. The bandwidth would be
much wider (100 M2Hz) and data would be transferred at much
higher rates. The cost of the data transfer would be
comparatively very less and global mobility would be possible.
The networks will be all IP networks based on IPv6. The
antennas will be much smarter and improved access
technologies like OFDM and MC-CDMA (Multi Carrier
CDMA) will be used. Also the security features will be much
better.
The entire network would be packet switched (IP based). All
switches would be digital. Higher bandwidths would be
available which would make cheap data transfer possible. The
network security would be much tighter. Also QoS will
improve. More efficient algorithms at the Physical layer will
reduce the Inter-channel Interference and Co-channel
Interference. The Wi-Max lobby and the people who are
working with the Wi-Max technology are trying to push Wi-
Max as the 4G wireless technology. At present there is no
consensus among people to refer to this as the 4G wireless
technology. I do not think this is popular with the researching
community. Wi-Max can deliver up to 70 Mbps over a 50Km
radius. As mentioned above, with 4G wireless technology
people would like to achieve up to 1Gbps (indoors). Wi-Max
does not satisfy the criteria completely. Also Wi-Max
technology (802.16d) does not support mobility very well. To
overcome the mobility problem, 802.16e or Mobile Wi-Max is
being standardized. The important thing to remember here is that
all the researches for 4G technology are based around OFDM.
Wi-Max is also based on OFDM. This gives more credibility to
the Wi-Max lobby who would like to term Wi-Max as a 4G
technology. Since there is no consensus for the time being, we
have to wait and see who would be the winner.
Along the top edge of the cube is the three states information
while the rows on the left side of the cube are the information
characteristics that the security policy should provide. The
columns on the right side of the cube detail the three broad
categories of security measures that can be pursued to protect
the information. The cube is thus split into 27 smaller cubes,
each of which must be examined for risks and solutions in any
extensive security audit. This document, on the other hand, is
not meant to contain such an audit, but rather to present the
major issues of wireless security, the objectives of future
wireless technology, and the security measures needed to reach
those goals.
Wireless Security Issues
Wireless systems face a number of security challenges, one of
which comes from interference. As more wireless devices begin
to use the same section of electromagnetic spectrum, possibility
of interference increases. This can result in a loss of signal for
users. Moreover, an abuser can intentionally mount a denial-of-
service attack (lowering availability) by jamming the
frequencies used. Iowa State University professor Steve Russell
comments that “an RF engineer using $50 worth of readily-
available components can build a simple short-range jammer for
any of the common microwave frequencies” (Russell 2001,
174).Physical security can pose problems as well. Cellular
phones and other handheld devices were designed to be small
and mobile, but this also means that they are more likely than
other pieces of technology to get lost or stolen, and thieves can
easily conceal them. Because of their size, these devices often
have extremely limited computing power. This could manifest
lower levels in the encryption that protects the information
(NIST, U.S. Dept. of Commerce, 5-26). As encryption is
improved in the same device, speed is consequently lowered, as
is available bandwidth (Russell 2001, 174). Every new
technology must be analyzed for security issues before it is fully
implemented. Even then, one must keep a careful eye on any
new issues that may develop.
• To ensure that information generated by or relating to a user is
adequately protected against misuse or misappropriation.
• To ensure that the resources and services provided to users are
adequately protected against misuse or misappropriation.
• To ensure that the security features are compatible with world-
wide availability.
• To ensure that the security features are adequately standardized
to ensure world-wide interoperability and roaming between
providers.
• To ensure that the level of protection to users and providers of
services is considered to be better than that provided in
contemporary fixed and mobile networks.
• To ensure that the implementation of security features and
mechanisms can be extended and enhanced as required by new
threats and services.
• To ensure that security features enable new ‘e-commerce’
services and other advanced applications. These goals will help
to direct security efforts, especially when the system is faced
with specific threats.
The pulse can be called “shaped noise” because it is not flat, but
curves across the spectrum. On the other hand, actual noise
would look the same across a range of frequencies it has no
shape. For this reason, regular noise that may have the same
frequency as the pulse itself does not cancel out the pulse.
Interference would have to spread across the spectrum uniformly
to obscure the pulse.
UWB provides greater bandwidth — as much as 60 megabits
per second, which is 6 times faster than today’s wireless
networks. It also uses significantly less power, since it transmit
pulses instead of a continuous signal. UWB uses all frequencies
from high to low, thereby passing through objects like the sea or
layers of rock. Nevertheless, because of the weakness of the
UWB signal, special antennas are needed to tune and aim the
signal.
Smart Antennas
Multiple “smart antennas” can be employed to help find, tune,
and turn up signal information. Since the antennas can both
“listen” and “talk,” a smart antenna can send signals back in the
same direction that they came from. This means that the antenna
system cannot only hear many times louder, but can also
respond more loudly and directly as well. There are two types of
smart antennas:
Switched Beam Antennas (Figure 7) have fixed beams of
transmission, and can switch from one predefined beam to
another when the user with the phone moves throughout the
sector.
Adaptive Array Antennas (Figure 8) represent the most
advanced smart antenna approach to date using a variety of new
signal processing algorithms to locate and track the user,
minimize interference, and maximize intended signal reception.
Smart antennas can thereby:
• Optimize available power
• Increase base station range and coverage
• Reuse available spectrum
• Increase bandwidth
5G GENERATION
The gigantic array of innovative technology being built into new
cell phones is stunning. 5Gsystem which is on hand held phone
offering more power and features than at least 1000 lunar
modules. A user can also hook their 5G technology cell phone
with their Laptop to get broadband internet access. 5G
technology including camera, MP3 recording, video player,
large phone memory, dialing speed, audio player and much
more you never imagine. For children rocking fun Bluetooth
technology and Piconets has become in market.
This technology also strikes the china mobile market and a user
being proficient to get access to Germany phone as a local
phone. With the coming out of cell phone alike to PDA now
your whole office in your finger tips or in your phone. 5G
technology has extraordinary data capabilities and has ability to
tie together unrestricted call volumes and infinite data broadcast
within latest mobile operating system.
The Router and switch technology used in 5G network
providing high connectivity. The 5G technology distributes
internet access to nodes within the building and can be deployed
with union of wired or wireless network connections
5G Features
5G technology offer high resolution for crazy cell phone
user and bi-directional large bandwidth shaping.
advanced billing interfaces of 5G technology makes it
more attractive and effective.
5G technology is providing large broadcasting of data in
Gigabit which supporting almost 65,000 connections.
5G technology offer transporter class gateway with
unparalleled consistency.
Traffic statistics by 5G technology makes it more
accurate.
5G technology is providing up to 25 Mbps connectivity
speed.
5G technology also support virtual private network.
Mobility Management
Mobility Management includes location registration, paging and
handover. The MT should be able to access the services at any
place possible. The global roaming can be achieved by with the
help of multi-hop networks that can include the WLANs or the
satellite coverage in remote areas. A seamless service (Ex: soft
handover of the MT from one network to another or from one
kind of service to other) is also important.
Congestion-Control
Congestion control will be other critical issues in the
high performance 4G networks. Two basic approaches can be
taken towards the congestion control: avoidance or prevention of
the congestion and detection and recovery after congestion. The
avoidance scheme will require the network to suitably
implement the admission control (measurement based or pre-
computed model) and scheduling techniques. The detection and
recovery would require flow control and feedback traffic
management. A conservative approach might be proposed for
the 4G systems because of the wide variety of QoS
requirements.
Conclusion
Consumers demand that software and hardware be user-friendly
and perform well. Indeed, it seems part of our culture that
customers expect the highest quality and the greatest features for
what they buy. The cellular telephone industry, which now
includes a myriad of wireless devices, is no exception.
Combining these patents into one single license fee will be quite
challenging. Hardware-based codec’s will be preferred in mobile
phones as they consume a smaller amount of power and are
faster than software routines. Some hardware codec’s are
currently available in the market, but current products need to
evolve in order to reduce cost and power requirements.
However, significant increase in computational capacity is
needed for software-based encoders. Therefore, they will most
likely be used to record and play video (and audio) on PCs,
using the computer’s CPU for processing. One of the key issues
for the operator consists of the definition of an “ideal” service
roadmap. The mobile operator must take advantage of the
opening offered by mobile video services as a means to produce
traffic, revenue, and customer loyalty. Meanwhile, competition
in the industry is heating up. Providers are slashing prices while
scrambling for the needed infrastructure to provide the latest
features as incentives, often turning to various solutions.
Unfortunately, this will only serve to bewilder customers in an
already confusing market.
Customers want the features delivered to them, simple and
straightforward. Gadgets providers want to make money in a
cutthroat industry. If the government wants to help, the best way
to help all parties is to enforce new technologies which are both
beneficial to the company and the user and also eco-friendly.