Mobile Computing Unit-4
Mobile Computing Unit-4
UNIT-IV
ULEMU MPONELA
DMI ST JOHN THE BAPTIST UNIVERSITY
Contents
Unit IV .................................................................................................................................................... 4
CDMA & 3G NETWORKS ................................................................................................................... 5
A Simple Analogy.......................................................................................................................... 5
Salient Features of CDMA ............................................................................................................ 5
CDMA - SPREAD SPECTRUM ............................................................................................................. 6
a) Direct Sequence (DS) ................................................................................................................ 7
Demodulating DS Signals - 1 ........................................................................................................ 7
Demodulating DS Signals − 2 ..................................................................................................... 8
b) Frequency Hopping Technology ............................................................................................ 9
IS 95 ........................................................................................................................................................ 9
CDMA VS GSM ................................................................................................................................... 11
Differences Between GSM and CDMA ......................................................................................... 11
1. Technology Used ................................................................................................................ 11
2. SIM Cards ............................................................................................................................. 11
3. Flexibility .............................................................................................................................. 12
4. Spectrum frequencies .......................................................................................................... 12
5. Radiation Exposure ............................................................................................................. 12
6. Global Reach ....................................................................................................................... 12
7. Security ................................................................................................................................. 12
8. Data Transfer Rate .............................................................................................................. 12
Comparison Chart between CDMA and GSM ............................................................................ 13
3G NETWORKS & APPLICATIONS .............................................................................................. 13
Features ............................................................................................................................................ 13
Specifications for 3G ....................................................................................................................... 14
Areas of Application ....................................................................................................................... 14
WIRELESS LAN .................................................................................................................................... 15
Advantages of WLANs ................................................................................................................... 15
Disadvantages of WLANs ............................................................................................................... 16
IEEE 802.11 WIRELESS LAN STANDARDS ........................................................................................ 16
a) IEEE 802.11 ............................................................................................................................... 17
b) IEEE 802.11a ............................................................................................................................. 17
c) IEEE 802.11b............................................................................................................................. 17
d) IEEE 802.11g ............................................................................................................................. 18
e) IEEE 802.11n............................................................................................................................. 18
P a g e 1 | 34
f) IEEE 802.11p ............................................................................................................................ 18
IEEE 802.11 ARCHITECTURE ............................................................................................................ 18
Important Terminologies of IEEE 802.11 Architecture.............................................................. 18
IEEE 802.11 Architecture and Services ......................................................................................... 19
1. Basic Service Set .................................................................................................................. 19
2. Independent Basic Service Set........................................................................................... 20
3. Extended Service Set .......................................................................................................... 20
Frame Format of IEEE 802.11 ....................................................................................................... 21
Frame Control............................................................................................................................. 22
Duration / ID............................................................................................................................... 22
Address 1 to 4 ............................................................................................................................. 22
SC (Sequence Control) ............................................................................................................... 23
Data .............................................................................................................................................. 23
CRC (Cyclic Redundancy Check) ............................................................................................. 23
MOBILE ADHOC NETWORK (MANET) ......................................................................................... 23
Characteristics of MANET .............................................................................................................. 24
Applications of MANET ................................................................................................................. 24
WIRELESS LAN SECURITY ................................................................................................................. 25
DIFFERENCE BETWEEN WIFI AND 3G TECHNOLOGY .............................................................. 27
Features of WiFi .......................................................................................................................... 27
Features of 3G Technology ....................................................................................................... 28
Difference Between Wifi & 3G Technology ................................................................................ 28
INTERNETWORKING IN COMPUTER NETWORK ...................................................................... 29
Fundamentals of Call Processing ....................................................................................................... 29
i. Call Signaling ....................................................................................................................... 29
ii. Call Routing ......................................................................................................................... 30
iii. Call Setup ......................................................................................................................... 30
iv. Call Management ............................................................................................................ 30
v. Call Termination ................................................................................................................. 30
vi. Interworking .................................................................................................................... 30
vii. Media Handling .............................................................................................................. 31
viii. Security ............................................................................................................................. 31
ix. Billing and Charging ....................................................................................................... 31
INTELLIGENT NETWORKS ....................................................................................................... 31
SIGNALLING SYSTEM #7 (SS7) ................................................................................................. 31
P a g e 2 | 34
Interfaces ...................................................................................................................................... 33
Technologies Supporting IN ...................................................................................................... 33
P a g e 3 | 34
Unit IV
CDMA and 3G: Introduction – Spread - Spectrum Technology – IS-95 – CDMA
Vs GSM – Wireless Data – 3GNetworks & Applications. Wireless LAN: Introduction –
Advantages – IEEE 802.11 Standards – Architecture –Mobility – Deploying – Mobile
AdHoc Networks and Sensor Networks – Wireless LAN Security – WiFi Vs 3G. Internet
Networks and Interworking: Introduction – Fundamentals of Call Processing –
Intelligence in the Networks – SS#7 Signaling – IN Conceptual Model –Softswitch –
Programmable Networks – Technologies and Interfaces for IN.
P a g e 4 | 34
CDMA & 3G NETWORKS
Code Division Multiple Access (CDMA) is a digital cellular technology used for mobile
communication. CDMA is the base on which access methods such as cdmaOne,
CDMA2000, and WCDMA are built. CDMA cellular systems are deemed superior to
FDMA and TDMA, which is why CDMA plays a critical role in building efficient, robust,
and secure radio communication systems.
A Simple Analogy
Let’s take a simple analogy to understand the concept of CDMA. Assume we have a
few students gathered in a classroom who would like to talk to each other
simultaneously. Nothing would be audible if everyone starts speaking at the same time.
Either they must take turns to speak or use different languages to communicate.
The second option is quite similar to CDMA — students speaking the same language
can understand each other, while other languages are perceived as noise and rejected.
Similarly, in radio CDMA, each group of users is given a shared code. Many codes
occupy the same channel, but only those users associated with a particular code can
communicate.
CDMA, which is based on the spread spectrum technique has following salient features
P a g e 5 | 34
CDMA - SPREAD SPECTRUM
All technical modulation and demodulation strive for greater power and/or efficiency
of bandwidth in a white Gaussian additive stationary noise channel. Since bandwidth is
a limited resource, one of the primary design goals of all the modulation schemes is to
minimize the bandwidth required for transmission. On the other hand, spread spectrum
techniques use a transmission bandwidth that is order of the magnitude greater than
the bandwidth required the minimum signal.
The advantage of spread spectrum technique is that — many users can simultaneously
use the same bandwidth without interfering with each other. Therefore, spread
spectrum is not economic when the number of users is less.
Orthogonal codes are assigned to the users, the output of the correlator in the receiver
will be zero except the desired sequence. In synchronous direct sequence, the receiver
receives the same code sequence which was transmitted so that there is no time shift
between the users.
Demodulating DS Signals - 1
In order to demodulate DS signals, you need to know the code that was used at the
time of transmission. In this example, by multiplying the code used in the transmission
to the reception signal, we can get the transmitted signal.
P a g e 7 | 34
In this example, multiple codes were used at the time of transmission (10,110,100) to
the received signal. Here, we have calculated by using the law of two additives (Modulo
2 Addition). It is further demodulated by multiplying the code that was used at the time
of this transmission, called the reverse diffusion (de-spreading). In the diagram given
below, it can be seen that during the transmission of the data to the narrow band
(Narrow Band) spectrum, the spectrum of the signal is dispread.
Demodulating DS Signals − 2
On the other hand, if you do not know the code that was used at the time of
transmission, you will not be able to demodulate. Here, you are trying to demodulation
in the code of different (10101010) and the time of transmission, but it has failed.
Even looking at the spectrum, it is spreading during the time of transmission. When it
is passed through a band-pass filter (Band Path Filter), only this small signal remains and
these are not demodulated.
P a g e 8 | 34
b) Frequency Hopping Technology
Hopping rate is a function of the speed information. The order of frequencies is selected
by the receiver and is dictated by the pseudo-random noise sequence. Although the
transmission of a frequency hopping signal spectrum is quite different from that of a
direct sequence signal, it suffices to note that the data is distributed over a signal band
is larger than necessary to carry. In both the cases, the resulting signal will appear as
noise and the receiver uses a similar technique, which is used in the transmission to
recover the original signal.
IS 95
IS-95 stands for Interim Standard 95 and is also known as CDMAOne. It was the first
ever CDMA-based digital cellular technology and was developed by Qualcomm. It is
an 2G cellular system based on DS-CDMA. To understand IS-95 we need to understand
DS and CDMA separately.
DSSS is Direct Sequence Spread Spectrum Technique which is a spread spectrum
technique in which the data to be transmitted is encoded using spreading code and
received and then decoded using the same code. It is used to avoid interference, spying
and jamming. The spreading code used is known to transmitter and receiver only.
P a g e 9 | 34
Narrow bandwidth signals are multiplied with a very large bandwidth signals called
Pseudo Noise Code Sequence (PN code). Each user has its own PN code which is
orthogonal to each other. Auto-correlation is maximum and cross-correlation is zero of
these PN codes. They normally repeat themselves after a very large time period and
hence, appears to be random. PN Sequence is generated by Linear Feedback Shift
Register.
P a g e 10 | 34
Open loop power control:
Transmitter senses the power of the received signal at the base station and then adjusts
its transmitting power accordingly in subsequent transmissions.
CDMA VS GSM
Cellular mobile services have been used all over the world for a long time and still
evolving day by day. With these services, various communication services also evolved,
and CDMA and GSM are two of them. CDMA and GSM are the two most important
technology standards that are known for mobile communication. Both the GSM and
CDMA converts the data from the mobile phone into radio waves. But these
technologies are differentiated in the way in which the calls & data transfer takes place
over a network. One of the key differences between CDMA and GSM is that GSM uses
SIM cards to connect a mobile phone with its network, whereas CDMA does not need
any SIM card and operates on ESNs (Electronic Serial Number). In this topic, we will
understand what GSM and CDMA technologies are and how they differentiate from
each other in detail.
GSM and CDMA are the two most popular networking standards for mobile
connectivity. While CDMA is older and now entering a legacy stage, it remains a staple
for specific device variants and geographic regions. GSM is the bedrock of advanced
cellular networks, fuelling the rise of 4G and 5G. This article explains the difference
between CDMA and GSM and their relevance in the IoT era.
1. Technology Used
The GSM is based on the wedge spectrum technology, also known as a carrier. This
carrier is split into various time slots on the basis of TDMA technology, and each time
slots are assigned to each user. Due to this, until one outgoing call is finished, no other
user can access that slot. It uses FDMA to provide multiuser access by dividing the user
frequencies.
On the other hand, CDMA uses the spread spectrum technology and hence it makes
optimal use of the available bandwidth. It enables each user to transfer the data over
the entire frequency spectrum at any time.
2. SIM Cards
SIM (Subscriber Identity Module) is a smart card that contains the user identification
information to identify the subscriber on a telephony device. In a GSM-based phone, a
P a g e 11 | 34
SIM card is required to make the data or call transmission. These cards can be easily
replaced from one mobile phone to another with saved information.
On the other hand, CDMA based devices do not require a SIM card; instead, it uses
ESN (Electronic Serial Number). Since it does not use a SIM card, hence changing a
device from another is difficult and required a proper procedure.
3. Flexibility
The GSM standard is more flexible as compared to CDMA. It is because, in GSM, the
SIM card can be inserted into any device and can be used. Whereas, CDMA mobile
phone can only be used if ESN is registered in its database.
If a CDMA stops working on a phone, we need to buy the new phone, whereas if a
SIM stops working, we can use another SIM rather than changing the phone.
4. Spectrum frequencies
The GSM works on the frequency spectrum ranging from 850 MHz to 1900 MHz,
whereas CDMA also operates in the frequency range of 850MHz and 1900MHz.
5. Radiation Exposure
In GSM phones, there is 28 times more radiation exposure takes place as compared to
CDMA phones.
GSM phone continuously transmits wave pulses, whereas CDMA phones do not
continuously produce such pulses.
6. Global Reach
GSM is more used globally as compared to CDMA technology. Approx. 80% of the
mobile networks across 210 countries use GSM compared to CDMA. The CDMA-based
mobile phones are mostly used in the US, Canada, and Japan.
7. Security
The CDMA provides more security as compared to GSM technology because it has
inbuilt encryption and uses the spread spectrum for data transmission.
In CDMA, the signal detection is much difficult than in GSM. Hence it is more secure.
The data transfer rate is high in CDMA compared to GSM technology. In CDMA, EVDO
data transfer technology is used, which provides a maximum download speed of 2
Mbps.
On the other hand, GSM uses EDGE data transfer technology that provides a maximum
download speed of 384 Kbps, which is much slower than CDMA.
P a g e 12 | 34
Comparison Chart between CDMA and GSM
CDMA GSM
It stands for Code Division Multiple Access It stands for Global System for Mobile
Communication
It uses a CDMA mechanism for data & call It uses TDMA and FDMA mechanism for
transmission data & voice transmission
The transmission rate is fast compared to The transmission rate is slow compared to
GSM CDMA
It uses EVDO data transfer technology It uses EVDO data transfer technology
It is handset specific and does not require It is SIM specific, hence requires a SIM card
any SIM for communication for communication
The signal detection is difficult in CDMA The signal detection is easy in GSM
It provides built-in encryption It requires additional encryption as no built-
in encryption is available
P a g e 13 | 34
It offers advanced multimedia access like playing music, viewing videos,
television services etc.
It provides access to all advanced Internet services, for example surfing webpages
with audio and video.
It paved the way for the increased usage of smartphones with wide screens as
they provided better viewing of mobile webpages, videos and mobile
televisions.
Specifications for 3G
Areas of Application
P a g e 14 | 34
WIRELESS LAN
Wireless LAN stands for Wireless Local Area Network. It is also called LAWN (Local
Area Wireless Network). WLAN is one in which a mobile user can connect to a Local
Area Network (LAN) through a wireless connection.
The IEEE 802.11 group of standards defines the technologies for wireless LANs. For path
sharing, 802.11 standard uses the Ethernet protocol and CSMA/CA (carrier sense
multiple access with collision avoidance). It also uses an encryption method i.e. wired
equivalent privacy algorithm.
Wireless LANs provide high speed data communication in small areas such as building
or an office. WLANs allow users to move around in a confined area while they are still
connected to the network.
In some instance wireless LAN technology is used to save costs and avoid laying cable,
while in other cases, it is the only option for providing high-speed internet access to the
public. Whatever the reason, wireless solutions are popping up everywhere.
Examples of WLANs that are available today are NCR's waveLAN and Motorola's
ALTAIR.
Advantages of WLANs
o Flexibility: Within radio coverage, nodes can communicate without further
restriction. Radio waves can penetrate walls, senders and receivers can be placed
anywhere (also non-visible, e.g., within devices, in walls etc.).
o Planning: Only wireless ad-hoc networks allow for communication without
previous planning, any wired network needs wiring plans.
o Design: Wireless networks allow for the design of independent, small devices
which can for example be put into a pocket. Cables not only restrict users but
also designers of small notepads, PDAs, etc.
o Robustness: Wireless networks can handle disasters, e.g., earthquakes, flood etc.
whereas, networks requiring a wired infrastructure will usually break down
completely in disasters.
o Cost: The cost of installing and maintaining a wireless LAN is on average lower
than the cost of installing and maintaining a traditional wired LAN, for two
reasons. First, after providing wireless access to the wireless network via an access
point for the first user, adding additional users to a network will not increase the
cost. And second, wireless LAN eliminates the direct costs of cabling and the
labor associated with installing and repairing it.
o Ease of Use: Wireless LAN is easy to use and the users need very little new
information to take advantage of WLANs.
P a g e 15 | 34
Disadvantages of WLANs
o Quality of Services: Quality of wireless LAN is typically lower than wired
networks. The main reason for this is the lower bandwidth due to limitations is
radio transmission, higher error rates due to interference and higher delay/delay
variation due to extensive error correction and detection mechanisms.
o Proprietary Solutions: Due to slow standardization procedures, many companies
have come up with proprietary solutions offering standardization functionality
plus many enhanced features. Most components today adhere to the basic
standards IEEE 802.11a or 802.11b.
o Restrictions: Several govt. and non-govt. institutions world-wide regulate the
operation and restrict frequencies to minimize interference.
o Global operation: Wireless LAN products are sold in all countries so, national
and international frequency regulations have to be considered.
o Low Power: Devices communicating via a wireless LAN are typically power
consuming, also wireless devices running on battery power. Whereas the LAN
design should take this into account and implement special power saving modes
and power management functions.
o License free operation: LAN operators don't want to apply for a special license
to be able to use the product. The equipment must operate in a license free
band, such as the 2.4 GHz ISM band.
o Robust transmission technology: If wireless LAN uses radio transmission, many
other electrical devices can interfere with them (such as vacuum cleaner, train
engines, hair dryers, etc.). Wireless LAN transceivers cannot be adjusted for
perfect transmission is a standard office or production environment.
P a g e 16 | 34
a) IEEE 802.11
IEEE 802.11 was the original version released in 1997. It provided 1 Mbps or 2 Mbps
data rate in the 2.4 GHz band and used either frequency-hopping spread spectrum
(FHSS) or direct-sequence spread spectrum (DSSS). It is obsolete now.
b) IEEE 802.11a
802.11a was published in 1999 as a modification to 802.11, with orthogonal frequency
division multiplexing (OFDM) based air interface in physical layer instead of FHSS or
DSSS of 802.11. It provides a maximum data rate of 54 Mbps operating in the 5 GHz
band. Besides it provides error correcting code. As 2.4 GHz band is crowded, relatively
sparsely used 5 GHz imparts additional advantage to 802.11a.
Further amendments to 802.11a are 802.11ac, 802.11ad, 802.11af, 802.11ah, 802.11ai,
802.11aj etc.
c) IEEE 802.11b
802.11b is a direct extension of the original 802.11 standard that appeared in early
2000. It uses the same modulation technique as 802.11, i.e. DSSS and operates in the
2.4 GHz band. It has a higher data rate of 11 Mbps as compared to 2 Mbps of 802.11,
due to which it was rapidly adopted in wireless LANs. However, since 2.4 GHz band is
pretty crowded, 802.11b devices faces interference from other devices.
P a g e 17 | 34
Further amendments to 802.11b are 802.11ba, 802.11bb, 802.11bc, 802.11bd and
802.11be.
d) IEEE 802.11g
802.11g was indorsed in 2003. It operates in the 2.4 GHz band (as in 802.11b) and
provides a average throughput of 22 Mbps. It uses OFDM technique (as in 802.11a). It
is fully backward compatible with 802.11b. 802.11g devices also faces interference from
other devices operating in 2.4 GHz band.
e) IEEE 802.11n
802.11n was approved and published in 2009 that operates on both the 2.4 GHz and
the 5 GHz bands. It has variable data rate ranging from 54 Mbps to 600 Mbps. It
provides a marked improvement over previous standards 802.11 by incorporating
multiple-input multiple-output antennas (MIMO antennas).
f) IEEE 802.11p
802.11 is an amendment for including wireless access in vehicular environments (WAVE)
to support Intelligent Transportation Systems (ITS). They include network
communications between vehicles moving at high speed and the environment. They
have a data rate of 27 Mbps and operate in 5.9 GHz band.
Station: Stations (STA) comprise all devices and equipment that are connected to the
wireless LAN. It can be of two types:
Wireless Access Point (WAP): WAPs or simply access points (AP) are wireless
routers that bridge connections for base stations.
Client: Examples include computers, laptops, printers, and smartphones.
Access Point: It is a device that can be classified as a station because of its functionalities
and acts as a connection between wireless medium and distributed systems.
P a g e 18 | 34
Distribution System: A system used to interconnect a set of BSSs and integrated LANs to
create an ESS.
Frame: It is a MAC protocol data unit.
SSID (Service Set Identifier): It’s the network name for a particular WLAN. All-access
points and devices on a specific WLAN must use the same SSID to communicate.
SDU: It is a data unit that acts as an input to each layer. These can be fragmented or
aggregated to form a PDU.
PDU: It is a data unit projected as an output to communicate with the corresponding
layer at the other end. They contain a header specific to the layer.
Network Interface Controller: It is also known as network interface card. It is a
hardware component that connects devices to the network.
Portal: Serves as a gateway to other networks
In the year 1990, IEEE 802.11 Committee formed a new working group, the IEEE 802.11
standard which defines protocols for Wireless Local Area Networks (WLANs). Just like
how Ethernet provides services for wired media, IEEE 802.11 architecture is designed to
provide features for wireless networks.
An AP supports both wired and wireless connections. The 802.11 standard calls the
upstream wired network the distribution system (DS). The AP bridges the wireless and
wired L2 Ethernet frames, allowing traffic to flow from the wired to the wireless
network and vice versa. Each wireless network has a unique SSID.
The 802.11 architecture provides some basic services for WLANs whose implementation
is supported by MAC layer:
1. Basic Service Set
The Basic Service Set configuration consists of a group of stations and relies on an Access
Point (AP), which serves as a logical hub. Stations from different BSSs interact through
the AP, which functions as a bridge, linking multiple WLAN cells or channels.
Operating Modes
Depending upon the mode of operation, BSS can be categorized into the following
types:
P a g e 19 | 34
Independent BSS: Supports mutual communication between wireless clients.
An ad-hoc network is spontaneously created and does not support access to
wired networks.
ESS connects multiple BSSs and consists of several BSS cells, which can be interlinked
through wired or wireless backbones known as a distributed system. Multiple cells use
the same channel to boost aggregate throughput to network. The equipment outside
of the ESS, the ESS and all of its mobile stations comprise a single MAC layer network
P a g e 20 | 34
where all stations are virtually stationary. Thus, all stations within the ESS appear
stationary from an outsider’s perspective.
Other components include:
P a g e 21 | 34
Frame Control
It is 2 bytes long and defines type of frame and control information. The types of fields
present in FC are:
It contains the value indicating the period of time in which the medium is occupied (in
µs).
Address 1 to 4
These fields contain standard IEEE 802 MAC addresses (48 bit each). The meaning of
each address is defined by DS bits in the frame control field.
P a g e 22 | 34
SC (Sequence Control)
It consists of 2 sub-fields i.e. sequence number (12 bits) and fragment number (4 bits).
Sequence number is used to filter duplicate frames.
Data
It contains 32 bit CRC error detection sequence to ensure error free frame.
P a g e 23 | 34
As nodes move, the connectivity may change based on relative locations of other
nodes. The resulting change in the network topology known at the local level
must be passed on to other nodes so that old topology information can be
updated.
For example, as MS2 in the figure changes its point of attachment from MS3 to
MS4, other nodes that are part of the network should use this new route to
forward packets to MS2. In the figure, we assume that it is not possible to have
all nodes within each other's radio range. In case all nodes are closed by within
each other's radio range, there are no routing issues to be addressed.
In figures raise another issue, that of symmetric and asymmetric (bidirectional)
and asymmetric (unidirectional) links. Consider symmetric links with associative
radio range; for example, if MS1 is within radio range of MS3, then MS3 is also
within radio range of MS1. The communication links are symmetric. This
assumption is not always valid because of differences in transmitting power levels
and the terrain. Routing in asymmetric networks is relatively hard task. In certain
cases, it is possible to find routes that exclude asymmetric links, since it is
cumbersome to find the return path. The issue of efficient is one of the several
challenges encountered in a MANET.
The other issue is varying the mobility patterns of different nodes. Some other
nodes are highly mobile, while others are primarily stationary. It is difficult to
predict a node's movement and direction of movement and numerous studies
have been performed to evaluate their performance using different simulators.
Characteristics of MANET
Some characteristics of adhoc network are as follows:
Dynamic topologies: nodes are free to move arbitrarily; thus the network
topology may be changed randomly and unpredictably and primarily consists of
bidirectional links. In some cases where the transmission power of two nodes is
different, a unidirectional link may exist.
Bandwidth-constrained and variable capacity links: wireless links continue to
have significantly lower capacity than infrastructure networks.
Energy-constrained operation: some or all of the MSs in a MANET may rely on
batteries or other exhaustible means for their energy. For these nodes or devices,
the most important system design optimization criteria may be energy
conservation.
Limited physical security: MANETs are generally more prone to physical security
threats than wire line networks. The increased possibility of eavesdropping,
spoofing, and denial of services (DoS) attacks should be considered carefully. To
reduce security threats, many existing link security techniques are often applied
within wireless networks.
Applications of MANET
Some specific applications of ad hoc networks include industrial and commercial
applications involving cooperative mobile data exchange. There are many existing and
P a g e 24 | 34
future military networking requirements for robust, IP-compliant data services within
mobile wireless communication networks, with many of these networks consist of
highly dynamic autonomous topology segments. Advanced features of Mobile ad hoc
networks, including data rates compatible with multimedia applications global roaming
capability, and coordination with other network structures are enabling new
applications.
P a g e 25 | 34
We know that wireless clients form an association with Access Points (AP) and transmit
data back and forth over the air. As long as all wireless devices follow 802.11 standards,
they all coexist. But all wireless devices are not friendly and trustworthy, some rogue
devices may be a threat to wireless security. Rogue devices can steal our important data
or can cause the unavailability of the network.
Wireless security is ensured by following methods-
Authentication
Privacy and Integrity
There are broadly two types of Authentication process: Wired Equivalent Privacy
(WEP), and Extensible Authentication Protocol (802.1x/EAP).
These are explained as following below.
a) Wired Equivalent Privacy (WEP)
For wireless data transmitting over the air, open authentication provides no security.
WEP uses the RC4 cipher algorithm for making every frame encrypted. The RC4 cipher
also encrypts data at the sender side and decrypt data at the receiving site, using a string
of bits as key called WEP key.
WEP key can be used as an authentication method or encryption tool. A client can
associate with AP only if it has the correct WEP key. AP tests the knowledge of the WEP
key by using a challenge phrase. The client encrypts the phrase with his own key and
send back to AP. AP compares the received encrypted frame with his own encrypted
phrase. If both matches, access to the association is granted.
P a g e 26 | 34
b) Extensible Authentication Protocol (802.1x/EAP)
In WEP authentication, authentication of the wireless clients takes place locally at
AP. But Scenario gets changed with 802.1x. A dedicated authentication server is
added to the infrastructure. There is the participation of three devices;
Supplicant –
Device requesting access.
Authenticator –
Device that provides access to network usually a Wlan controller (WLC).
Authentication Server –
Device that takes client credentials and deny or grant access.
EAP is further of four types with some amendments over each other –
LEAP
EAP-FAST
PEAP
EAP-TLS
Features of WiFi
WiFi is used in Local Area Networks (LAN). Here are some of its important features −
WiFi transmits the 2.4 GHz and 5 GHz radio frequencies data, which is more
secure and bigger than the 3G networks.
WiFi technology is not so expensive.
You can easily install WiFi on any computer or any other electronic device by
introducing LAN on any computer with a wireless adapter.
WiFi can also be used to connect gaming consoles, printers, laptops, and other
such devices.
WiFi networks have signal reach for about 300+ feet; therefore, they are best
for indoor use.
P a g e 27 | 34
Features of 3G Technology
3G systems comply with the International Mobile Telecommunications-2000
(IMT-2000).
It provides high-speed transmission having data transfer rate more than 0.2
Mbps.
Global roaming services are available for both voice and data.
It offers advanced multimedia access like playing music, viewing videos,
television services, etc.
It provides access to all advanced Internet services, for example, surfing
webpages with audio and video.
3G technology paved the way for the increased usage of smartphones with wide
screens as they provided better viewing of mobile webpages, videos and mobile
televisions.
Difference Between Wifi & 3G Technology
The following table highlights the major differences between WiFi and 3G technology.
WIFI 3G TECHNOLOGY
The WiFi router supervises WiFi access. The service provider controls the 3G
network.
It delivers the speed from 11 Mbps to 3G delivers the speed from 40 kbps to
55 Mbps. 70 kbps.
It is less costly when it comes to 3G Technology is more expensive.
consumption than that of 3G
Technology.
It is for LAN-established applications. It is for WAN-established applications.
It transfers the data at 2.4 GHz and It transfers the data at low frequencies
5GHz radio frequencies. that are from 850 MHz to 1900 MHz.
WiFi frequencies are faster and secured.The frequencies of 3G networks are less
secured.
By fixing a wireless LAN on any The conveyor companies install the 3G
computer with a wireless clamp, WiFi is connection.
easily fixed.
It is less dependable than 3G. It is more dependable than WiFi.
Frequently you do not have to pay to You have to pay to enjoy the 3G
use the WiFi network. services.
The use of WiFi technology has been 4G networks have replaced the 3G
widely popular. networks at present.
P a g e 28 | 34
INTERNETWORKING IN COMPUTER NETWORK
In real world scenario, networks under same administration are generally scattered
geographically. There may exist requirement of connecting two different networks of
same kind as well as of different kinds. Routing between two networks is called
internetworking.
Networks can be considered different based on various parameters such as, Protocol,
topology, Layer-2 network and addressing scheme.
In internetworking, routers have knowledge of each other’s address and addresses
beyond them. They can be statically configured go on different network or they can
learn by using internetworking routing protocol.
Routing protocols which are used within an organization or administration are called
Interior Gateway Protocols or IGP. RIP, OSPF are examples of IGP. Routing between
different organizations or administrations may have Exterior Gateway Protocol, and
there is only one EGP i.e. Border Gateway Protocol.
P a g e 29 | 34
SS7 (Signaling System No. 7): A set of telephony signaling protocols used to set
up and tear down telephone calls, manage mobile services, and perform billing.
ii. Call Routing
Call routing determines the path that a call will take through the network. It involves:
Route selection: Based on criteria like the destination address, network policies,
and available resources.
Number translation: Converting phone numbers into a format that the network
can understand and use for routing.
iii. Call Setup
Call setup involves the following steps:
Call Initiation: The caller's device sends a call request to its network.
Signal Exchange: Signaling messages are exchanged between the caller’s network
and the receiver’s network.
Resource Allocation: Network resources (like bandwidth) are allocated to
handle the call.
Alerting: The receiver’s device is alerted to the incoming call.
iv. Call Management
Call management includes maintaining the call state and quality during the session. It
involves:
Quality of Service (QoS): Ensuring that the call meets certain quality parameters
like minimal delay, jitter, and packet loss.
Session Control: Monitoring and managing the call session to handle events like
hold, transfer, or conference calls.
v. Call Termination
Call termination involves the steps needed to end a call. This includes:
P a g e 30 | 34
vii. Media Handling
Media handling involves the transmission and reception of the actual voice, video, or
data content. Key aspects include:
Codec Selection: Choosing the appropriate codec for encoding and decoding
media streams.
Media Transport: Using protocols like RTP (Real-Time Protocol) for delivering
media streams over the network.
viii. Security
Security measures ensure that the call and its data are protected from unauthorized
access and attacks. This includes:
Call Detail Records (CDRs): Collecting and processing data about each call for
billing purposes.
Real-time Charging: Implementing real-time systems to handle prepaid services.
INTELLIGENT NETWORKS
The intelligent network (IN) is a networking standard (ITU-T Q.1200 series) developed
to attach with all types of mobile telecom systems. Several value-added services are
provisioned via the IN scheme in the end mobile devices by the mobile operators
around the world.
Main intelligence of the network lies on the mobile nodes located at the service layer.
Thus, is different than conventional network where mobile nodes are assigned at the
switching layer. The implied IN-based nodes are mainly owned and managed by the
mobile operators which is supported by the Signalling System #7 (SS7) protocol. SS&
protocol helps to integrated IN-based nodes to communicate with switching centers
that further talk with other mobile operator systems [255–258]. A number of services
may be provisioned with help from IN supported systems for example, call screening,
call queuing, mass calling, private number call facility, home area discount scheme, and
call distribution.
SS7 ARCHITECTURE
There are four major types of telecommunications nodes important to SS7:
i. Service Switching Point (SSP)
A telecommunications switch that contains the control logic (software) necessary to
send/receive SS7 messages to other nodes in the network. Telecommunications switches
that cannot send/receive SS7 messages are referred to as a Switching Point (SP). An SP
must interface directly to an SSP (on a one-to-one relationship) in order to access SS7-
based services.
ii. Signal Transfer Point (STP
This is the “heart” of the SS7 network. Think of the STP as an electronic “post office”.
While all that the STP does is route messages from point A to point B in the network,
the network would be lost without it. The routing of messages follows a scheme that
we will discuss later in this section. STPs are ALWAYS provided in mated pairs. STPs
operate in what is called “load sharing mode”. This means that, at any given time, each
STP should be processing 40% of the total signal-processing load. In the event of an
STP and/or link(s) failure, the network is designed to change over to the remaining STP
so that it can continue to operate at 80% load.
iii. Service Control Point (SCP)
This is the “brain” of the SS7 network. The SCP is nothing more than a database.
However, utilization of an SCP offers profound enhancements for service delivery and
network control. Service logic may be placed in the SCP (rather than the switch),
creating the impetus for many improvements such as rapid feature deployment, mass
customization of features, and improved utilization of switch resources. SCPs are almost
always deployed in a “mated pair” configuration. This designed redundancy makes
allowance for a back-up SCP should the other go out of service for some reason. Some
non-call affecting, or otherwise non-critical, functions may be served by a single SCP.
iv. Service Node (SN):
Includes database functionality of the SCP along with additional capabilities such as
voice interaction and control of voice resources. Generally speaking, SCPs work well
with requirements that call for voluminous data transactions. SNs, on the other hand,
are typically not designed for high volume data processing. Instead, SNs are best suited
for special circumstance call processing involving voice resources and/or interaction.
P a g e 32 | 34
TECHNOLOGIES AND INTERFACES OF IN
IN networks use various technologies and interfaces to offer services such as call
forwarding, toll-free numbers, prepaid calling, and more. Here are the key technologies
and interfaces involved in Intelligent Networks:
Interfaces
INAP (Intelligent Network Application Protocol)
INAP is the primary protocol used in Intelligent Networks to facilitate communication
between SSPs and SCPs. It defines the messages and procedures for service control and
interaction.
Technologies Supporting IN
Database Technologies
IN relies heavily on databases to store service logic, subscriber information, and call
records. Databases must be highly available and capable of handling large volumes of
transactions.
Virtualization
Virtualization technologies allow multiple virtual instances of network elements like
SCPs and SSPs to run on shared physical hardware, improving resource utilization and
scalability.
Cloud Computing
Cloud computing offers a flexible and scalable environment for deploying IN services.
It enables rapid service creation, deployment, and management while reducing
infrastructure costs.
P a g e 33 | 34
Artificial Intelligence (AI) and Machine Learning (ML)
AI and ML can be used to enhance IN services by providing advanced capabilities such
as predictive maintenance, customer behavior analysis, and automated service
personalization.
P a g e 34 | 34