Mod Overlay Design

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 33

MOBILE COMMUNICATION

Presentation done by
Yesar(21U251)
Shreya(22U241)
Sivarekha K (22U243)
Mithunraj SV (23U432)
Praneeth(23U433)

1
HISTORY AND EVOLUTION OF MOBILE COMMUNICATION:

2
FIRST GENERATION (1G) - ANALOG VOICE (1980S):
• Key Milestones: The first-generation (1G) of mobile communication introduced analog voice calls,
enabling wireless communication for the first time.

• Technological Advancements: Systems like Advanced Mobile Phone System (AMPS) in the US and
Nordic Mobile Telephone (NMT) in Europe laid the groundwork for cellular networks. However, 1G
systems had limited capacity, poor voice quality, and lacked support for digital services.

3
SECOND GENERATION (2G) - DIGITAL VOICE AND SMS (1990S):

• Key Milestones: The introduction of second-generation (2G) networks marked the transition to digital
technology, offering improved voice quality, increased capacity, and support for data services like SMS.

• Technological Advancements: Systems like GSM (Global System for Mobile Communications) and
CDMA (Code Division Multiple Access) became the dominant standards for 2G networks, enabling the
widespread adoption of mobile phones and paving the way for the mobile data revolution.

4
THIRD GENERATION (3G) - MOBILE DATA AND INTERNET (2000S):

• Key Milestones: The third generation (3G) of mobile networks brought significant improvements in
data speeds, enabling mobile internet access, multimedia messaging, and video calling.

• Technological Advancements: Technologies like UMTS (Universal Mobile Telecommunications System)


and CDMA2000 expanded the capabilities of mobile networks, offering higher data rates and paving
the way for the emergence of smartphones and mobile broadband services.

5
Fourth Generation (4G) - LTE and Mobile Broadband (2010s):

• Key Milestones: The fourth generation (4G) of mobile networks represented a leap forward in speed
and efficiency, enabling faster data rates, lower latency, and support for bandwidth-intensive
applications like streaming video and online gaming.

• Technological Advancements: LTE (Long-Term Evolution) became the dominant standard for 4G
networks, delivering peak data rates of hundreds of Mbps and laying the foundation for the mobile
data-driven economy.

6
FIFTH GENERATION (5G) - ULTRA-FAST CONNECTIVITY AND IOT (2010S -
PRESENT):

• Key Milestones: The latest fifth-generation (5G) technology promises ultra-fast connectivity, extremely
low latency, and massive IoT (Internet of Things) connectivity, unlocking new possibilities for
applications like autonomous vehicles, remote surgery, and immersive experiences.

• Technological Advancements: 5G networks leverage technologies like millimeter-wave spectrum,


massive MIMO (Multiple Input Multiple Output), and network slicing to achieve speeds of several
Gbps, support for millions of connected devices per square kilometer, and latency as low as a few
milliseconds.

7
:
MOBILE COMMUNICATION SYSTEM

8
FEATURES OF MOBILE
COMMUNICATION
• A high capacity load balancer is essential for all wired and wireless infrastructures. When one access point
is overloaded, the system will automatically choose a different access point based on the available capacity.
• SCALABILITY: Wireless devices continue to grow in popularity every day. As long as coverage and
capacity are not overextended, the wireless networks can expand as requirements change - without having
to rework or re-create the entire network.
• NETWORK MANAGEMENT SYSTEM: There are now a great many different components in wireless
networks, such as access points, firewalls, switches, and managed power. Wireless networks offer a better
way to manage the entire network.
• ROLE BASED ACCESS CONTROL: Using role-based access control (RBAC), you are able to assign
roles based on what, who, where, when and how a user or device is trying to access your network. Access
control rules or policies can then be enforced based on the ends or roles of the device.

9
• PROVIDE OUTDOOR AND INDOOR COVERAGE OPTIONS: Your wireless system
should provide outdoor and indoor coverage. It is important that a secure registration process
be used for network access control, also known as mobile device registration. In addition to
controlling the role of each user and enforcing policies, network access control can be
configured to allow users to register themselves with your network.
• MANAGE MOBILE DEVICES: Imagine a scenario in which thousands of mobile
devices access your wireless network and run thousands of applications.
• ROAMING: As you move throughout your office or even from one building to another, you
won't experience dropped connections, slower speeds or any interruptions in service.
• REDUNDANCY: Depending on your specific needs and environment, your wireless system
may require varying levels of redundancy.

10
LAYER OF MOBILE COMMUNICATION

11
GSM(GLOBAL SYSTEM FOR MOBILE COMMUNICATION)

• GSM is based on digital modulation techniques and a combination of time division multiple access
(TDMA) and frequency division multiple access (FDMA). TDMA divides each channel into time slots,
allowing multiple users to share the same frequency without interference.
• A mobile phone uses GSM technology, which is an open and digital cellular protocol. There are four
different frequency bands used by this technology, including 850 MHz, 900 MHz, 1800 MHz, and 1900
MHz. It combines FDMA and TDMA. During the early 1970s, Bell Laboratories developed a cell-based
mobile radio system that formed the basis for GSM.

12
13
GSM SYSTEM ARCHITECTURE
• Four separate components make up GSM networks:
• • The mobile phone
• • The base station system (BSS)
• • The network switching system (NSS)
• • The operation and support system (OSS)

14
15
• The base station system (BSS) carries data between the cellphones and the network system
servers.
• It comprises two main components: the base transceiver station (BTS) and the base station
controller (BSC).
• In GSM networks, the NSS, also known as the core network, tracks the location of callers in
order to provide cellular services.
• It includes a mobile switching centre (MSC) and a home location register (HLR). A mobile
service switching centre is like a standard ISDN or PSTN switching node

16
ADVANTAGES OF GSM:
• 1. GSM provides worldwide roaming for its customers.
• 2. Due to its unique devices and facilities, GSM is extremely secure.
• 3. Spectrum efficiency and clear voice calls.
• 4. You can send short messages, view your caller's ID, place a call on hold, and forward your
calls.
• 5. AD is available on Integrated Services Digital Network (ISDN) and other telephone
company services.

17
DISADVANTAGES OF GSM:
• 1. As multiple users share the same bandwidth, bandwidth lag can occur.
• 2. Due to the interference that is caused by pulse transmission technology, some electronics,
such as hearing aids, cannot be used in certain places, such as hospitals, airports, and petrol
pumps.
• 3. Repeaters are needed to increase coverage.
• 4. The maximum call range of GSM is 35 km. 5. The data of users is not encrypted end-to-
end.

18
GPRS
• GPRS stands for General Packet Radio Service. It is the modified version of GSM
architecture. GPRS is a packet-oriented mobile data mechanism, that can carry data packets
as well. In GSM architecture, only voice signals can be transported, so being an enhanced
version GPRS is able to transmit voice as well as data packets. It uses the same physical
radio channel as GSM does, the only difference is it has a new logic defined for the radio
channel.

19
GPRS ARCHITECTURE

20
COMPONENTS OF GPRS ARCHITECTURE

• Mobile Station(MS)
• GPRC requires enhanced mobile stations, as existing mobile stations were designed according to the
GSM network, and they were unable in handling enhanced data packets. A variety of high-speed
mobile stations are available to support enhanced data packets. These mobile stations are also
capable of handling the GSM architecture to make voice calls.
• Base Station Controller (BSC)
• In GSM architecture there is one component called BSC. But in GPRS there is one component is
added to BSC called PCU. PCU stands for Packet Control Unit. If the signal comes to BSC and that
signal contains data, then PCU routes to the SGSN. The interface is used between BSC and PCU is
the FRI interface. After the signal comes to SGSN, it delivers the data packet to the GGSN. GGSN
routes the data packet to the data network (PDN- Predefined Data Network).

21
GPRS SUPPORT NODES

• GPRS support nodes are of two types:


• 1. Serving GPRS Support Node (SGSN)
• It is responsible for the following tasks:
• Packet Delivery
• Mobility management
• apply/ sign off of terminals
• localization

• LLC (Logical Link Control) management


• Authentication
• billing
22
• 2. Gateway GPRS Support Node (GGSN)
• It is responsible for the following tasks:
• Mediator between GPRS between backbone and external data networks.
• Saves current data for the SGSN address of the participant as well as their profile and data
for authentication and invoice.
• Internal Backbone Network
• It is an IP-based network that is used to support the working of GPRS and this is responsible
to carry new packets between different GSNs. The tunneling is used between SGNSs and
GGSNs to exchange information without informing the internal backbone.

23
SERVICES OFFERED BY GPRS
• 1. SMS messaging and broadcasting
• 2. Multimedia messaging service (MMS)
• 3. Push-to-talk over cellular (PoC)
• 4. Instant messaging and presence—wireless village
• 5. Point-to-point (P2P) service
• 6. Through wireless application protocol (WAP), smart devices can access the Internet 7. Point-to-
multipoint (P2M) service
• 8. If SMS over GPRS is used, an SMS transmission speed of about 30 SMS messages per minute
may be achieved. This is much faster than using the ordinary SMS over GSM, whose SMS
transmission speed is about 6 to 10 SMS messages per minute.

24
INTERNET OF THINGS (IOT)
• Internet of Things (IoT) is the networking of physical objects that contain electronics
embedded within their architecture in order to communicate and sense interactions amongst
each other or with respect to the external environment. In the upcoming years, IoT-based
technology will offer advanced levels of services and practically change the way people lead
their daily lives. Advancements in medicine, power, gene therapies, agriculture, smart cities,
and smart homes are just a few of the categorical examples where IoT is strongly
established.

25
HISTORY OF IOT
• 1982 – Vending machine: The first glimpse of IoT emerged as a vending machine at Carnegie Mellon University was connected to the internet to report
its inventory and status, paving the way for remote monitoring.
• 1990 – Toaster: Early IoT innovation saw a toaster connected to the internet, allowing users to control it remotely, foreshadowing the convenience of
smart home devices.
• 1999 – IoT Coined (Kevin Ashton): Kevin Ashton coined the term “Internet of Things” to describe the interconnected network of devices
communicating and sharing data, laying the foundation for a new era of connectivity.
• 2000 – LG Smart Fridge: The LG Smart Fridge marked a breakthrough, enabling users to check and manage refrigerator contents remotely, showcasing
the potential of IoT in daily life.
• 2004 – Smart Watch: The advent of smartwatches introduced IoT to the wearable tech realm, offering fitness tracking and notifications on-the-go.
• 2007 – Smart iPhone: Apple’s iPhone became a game-changer, integrating IoT capabilities with apps that connected users to a myriad of services and
devices, transforming smartphones into hubs.
• 2009 – Car Testing: IoT entered the automotive industry, enhancing vehicles with sensors for real-time diagnostics, performance monitoring, and
remote testing.
• 2011 – Smart TV: The introduction of Smart TVs brought IoT to the living room, enabling internet connectivity for streaming, app usage, and
interactive content.
• 2013 – Google Lens: Google Lens showcased IoT’s potential in image recognition, allowing smartphones to provide information about objects in the
physical world.
• 2014 – Echo: Amazon’s Echo, equipped with the virtual assistant Alexa, demonstrated the power of voice-activated IoT, making smart homes more
intuitive and responsive.
• 2015 – Tesla Autopilot: Tesla’s Autopilot system exemplified IoT in automobiles, introducing semi-autonomous driving capabilities through
interconnected sensors and software 26
27
4 LAYERS OF IoT

28
1. Sensing Layer

The sensing layer is the first layer of the IoT architecture and is responsible for collecting data from different
sources. This layer includes sensors and actuators that are placed in the environment to gather information
about temperature, humidity, light, sound, and other physical parameters. These devices are connected to the
network layer through wired or wireless communication protocols.

2.Network Layer

The network layer of an IoT architecture is responsible for providing communication and connectivity
between devices in the IoT system. It includes protocols and technologies that enable devices to connect and
communicate with each other and with the wider internet. Examples of network technologies that are
commonly used in IoT include WiFi, Bluetooth, Zigbee, and cellular networks such as 4G and 5G.
Additionally, the network layer may include gateways and routers that act as intermediaries between devices
and the wider internet, and may also include security features such as encryption and authentication to protect
against unauthorized access.

29
3. Data-processing Layer

The data processing layer of IoT architecture refers to the software and hardware components that are responsible for
collecting, analyzing, and interpreting data from IoT devices. This layer is responsible for receiving raw data from the
devices, processing it, and making it available for further analysis or action. The data processing layer includes a
variety of technologies and tools, such as data management systems, analytics platforms, and machine learning
algorithms. These tools are used to extract meaningful insights from the data and make decisions based on that data.
Example of a technology used in the data processing layer is a data lake, which is a centralized repository for storing
raw data from IoT devices.
4. Application Layer

The application layer of IoT architecture is the topmost layer that interacts directly with the end-user. It is responsible
for providing user-friendly interfaces and functionalities that enable users to access and control IoT devices. This layer
includes various software and applications such as mobile apps, web portals, and other user interfaces that are
designed to interact with the underlying IoT infrastructure. It also includes middleware services that allow different
IoT devices and systems to communicate and share data seamlessly. The application layer also includes analytics and
processing capabilities that allow data to be analyzed and transformed into meaningful insights. This can include
machine learning algorithms, data visualization tools, and other advanced analytics capabilities

30
Advantages of IoT

• Improved efficiency and automation of tasks.


• Increased convenience and accessibility of information.
• Better monitoring and control of devices and systems.
• Greater ability to gather and analyze data.
• Improved decision-making.
• Cost savings.

31
Disadvantages of IoT

• Security concerns and potential for hacking or data breaches.


• Privacy issues related to the collection and use of personal data.
• Dependence on technology and potential for system failures.
• Limited standardization and interoperability among devices.
• Complexity and increased maintenance requirements.
• High initial investment costs.
• Limited battery life on some devices.
• Concerns about job displacement due to automation.
• Limited regulation and legal framework for IoT, which can lead to confusion and uncertainty.

32
Thank you

You might also like