Module 1 WT
Module 1 WT
Wireless Definition
Satellite Communication
Satellite communication is one type of self contained
wireless communication technology, it is widely spread
all over the world to allow users to stay connected
almost anywhere on the earth. When the signal (a beam
of modulated microwave) is sent near the satellite then,
satellite amplifies the signal and sent it back to the
antenna receiver which is located on the surface of the
earth. Satellite communication contains two main
components like the space segment and the ground
segment. The ground segment consists of fixed or
mobile transmission, reception and ancillary equipment
and the space segment, which mainly is the satellite itself.
Infrared Communication
Infrared wireless communication communicates information in a device or
systems through IR radiation. IR is electromagnetic energy at a wavelength that
is longer than that of red light. It is used for security control, TV remote
control and short range communications. In the electromagnetic spectrum, IR
radiation lies between microwaves and visible light. So, they can be used as a
source of communication
The main disadvantage of microwave signals is, they can be affected by bad
weather, especially rain.
Wi-Fi
Wi-Fi is a low power wireless communication, that is
used by various electronic devices like smart phones,
laptops, etc.In this setup, a router works as a
communication hub wirelessly. These networks allow
users to connect only within close proximity to a router.
WiFi is very common in networking applications which
affords portability wirelessly. These networks need to be
protected with passwords for the purpose of security,
otherwise it will access by others
6
Bluetooth Technology
The main function of the Bluetooth
technology is that permits you to connect a
various electronic devices wirelessly to a
system for the transferring of data. Cell
phones are connected to hands free
earphones, mouse, wireless keyboard. By
using Bluetooth device the information
from one device to another device. This
technology has various functions and it is
used commonly in the wireless
communication market.
o An unauthorized person can easily capture the wireless signals which spread
through the air. o It is very important to secure the wireless network so that the
information cannot be misused by unauthorized users
11
--------------------------------------------------------------------------------------------------------------
--
For individuals with mobility impairments, the use of infrared or other wireless
technology can facilitate the operation of information kiosks, environmental
control systems, personal computers and associated peripheral devices. For
individuals with visual impairments, infrared or other wireless communication
technology can enable users to locate and access talking building directories,
street signs, or other assistive navigation devices. For individuals using
augmentative and alternative communication (AAC) devices, infrared or other
wireless technology can provide an alternate, more portable, more independent
means of accessing computers and other electronic information systems.
In this presentation/paper, an introduction to wireless communication in
general is first presented. A discussion specific to infrared technology then
follows, with advantages and disadvantages of the technology presented along
with security, health and safety issues. The importance of establishing a
standard is also discussed with relevance to the disability field, and future uses
of infrared technology are presented.
Wireless Communication
1. the number of cycles a wave completes (or the number of times a wave
repeats itself) in one second
2. expressed as Hertz (Hz), which equals once cycle per second
3. commonly indicated by prefixes such as
a. Kilo (KHz) one thousand b. Mega (MHz) one million c. Giga (GHz)
one billion
4. directly related to the amount of information that can be transmitted on the wave
Figure 3 illustrates energy waves completing one cycle, two cycles and three
cycles per second. Generally, the higher the range of frequencies (or
bandwidth), the more information can be carried per unit of time.
1. the shortest distance at which the wave pattern fully repeats itself
2. expressed as meters
3. commonly indicated by prefixes such as
a. Kilo (km) 10exp3 b. Milli (mm) 10exp-3 c. Nano (nm) 10exp-9
Figure 4 depicts an infrared energy wave and a radio energy wave, and
illustrates the two different energy wavelengths. As is expected based on the
electromagnetic spectrum, the infrared wave is higher frequency and therefore
shorter wavelength than the radio wave. Conversely, the radio wave is lower
frequency and therefore longer wavelength than the infrared wave. Anyone
who has listened to the radio while driving long distances can appreciate that
longer wavelength AM radio waves carry further than the shorter wavelength
FM radio waves.
Infrared Technology
IR Advantages:
IR Disadvantages:
RF Advantages:
1. Not line of sight
2. Not blocked by common materials: can penetrate most solids and pass
through walls
3. Longer range
4. Not light sensitive
5. Not as sensitive to weather/environmental conditions
RF Disadvantages:
Health Risks
Imagine for a moment going about your daily routine without electricity. You
probably awoke to an electric clock radio/alarm, showered under warm water
supplied via an electric hot water heater, drank a couple of cups of coffee from
your automatic electric coffee maker, listened to the weather on the electric
powered TV or radio - and the list goes on and on. We live in an electrical
environment!
Electricity is all around you and while you cannot see electricity, you can
certainly appreciate the results. However, any time electric current travels
through a wire, the air, or runs an appliance, it produces an electromagnetic
field. It is important to remember that electromagnetic fields are found
everywhere that electricity is in use. While researchers have not established an
ironclad link between the exposure to electromagnetic fields and ailments such
as leukemia, the circumstantial evidence concerns many people.
The evidence also suggests that we need to use some common sense when
dealing with electricity. In scientific terms, your body can act as an antenna, as
it has a higher conductivity for electricity than does air. Therefore, when
conditions are right you may have experienced a small "tingle" of electric
current from a poorly grounded electric appliance. As long as these currents
are very small there isn't much danger from electric fields, except for potential
shocks. Your body, however, also has a permeability almost equal to air, thus
allowing a magnetic field to easily enter the body. Unfortunately your body
cannot detect the presence of a strong magnetic field, which could potentially
do much more harm.
Safety
There are a few things you can do to make your home and work environment a
safer "electronic" place. The first thing to consider when possible is to buy
Federal Communications Commission (FCC) Class B rated equipment. The
FCC classifies computer equipment for its potential to generate radio
frequency pollution. Class B emits less radio frequency pollution than Class A,
and is more suitable for the residential environment. Unfortunately, while
Class B emits less radio frequency pollution, there is nothing in the FCC
classes regarding magnitude or level of the pollution.
Other potential risks exist in high voltage (e.g. power) components such as
display monitors, computer power supplies, etc. If possible select low power
units, shielded units, etc. and operate them at lower resolutions. For example,
VGA resolution has a lower refresh scan rate than SVGA, and thus lower
magnetic field pollution. If you are adding internal cards to your computers,
don't tamper with the computer by removing any internal shielding, covers,
etc. Any metal shielding inside your computer was probably put there for a
purpose, although to you it may look like a harmless spacer!
If you are really concerned, you can purchase formal safety testing tools or hire
a consultant to do formal testing for EMF. There are also cheap tools you can
utilize to test for the presence of strong radio or magnetic fields. For example,
the presence of a strong magnetic field will deflect a compass needle from
pointing north, or the presence of a strong radio frequency field will distort an
AM radio's ability to clearly tune in a station. Simple tools like these can be
used to screen for strong EMF.
Security
Electromagnetic frequencies currently have little legal status for protection and
as such, can be freely intercepted by motivated individuals. This doesn't mean
wireless transmission is easily breached, as security varies by the type of
wireless transmission method. As presented earlier in the advantages and
disadvantages of infrared versus radio frequency transmission, what might be
considered an advantage to one method for transmission could turn out to be a
disadvantage for security. For example, because infrared is line-of-sight it has
less transmission range but is also more difficult to intercept when compared
to radio frequency. Radio frequency can penetrate walls, making it much
easier to transmit a message, but also more susceptible to tapping.
Importance of Standards
1. ATMs
2. Information Kiosks
3. Building Directories
4. TV Set Top Boxes
5. Bus Stops (Electronic Interactive)
6. Fare Machines (ticket machines, etc.)
7. Home Appliances (especially touchscreens)
8. Informational Telephones, Screen Based Telephones
9. POS (point of sale) equipment
10. Home environmental controls
11. Home security systems
12. Whiteboards, for classroom / interactive office use
13. Games and entertainment
The time division multiple access (TDMA) channel access scheme is based on
the time division multiplexing (TDM) scheme, which provides different time-
slots to different data streams (in the TDMA case to different transmitters) in a
cyclically repetitive frame structure. For example, node 1 may use time slot 1,
node 2 time slot 2, etc. until the last transmitter. Then it starts all over again, in
a repetitive pattern, until a connection is ended and that slot becomes free or
assigned to another node. An advanced form is Dynamic TDMA (DTDMA),
where a scheduling may give different time sometimes but some times node 1
may use time slot 1 in first frame and use another time slot in next frame.
One form is direct sequence spread spectrum (DS-CDMA), used for example
in 3G cell phone systems. Each information bit (or each symbol) is represented
by a long code sequence of several pulses, called chips. The sequence is the
spreading code, and each message signal (for example each phone call) use
different spreading code.
This results in wasting power on transmissions when there are no mobile units
to reach, in addition to causing interference for adjacent cells using the same
frequency, so called co-channel cells. Likewise, in reception, the antenna
receives signals coming from all directions including noise and interference
signals. By using smart antenna technology and differing spatial locations of
mobile units within the cell, space-division multiple access techniques offer
attractive performance enhancements. The radiation pattern of the base station,
both in transmission and reception, is adapted to each user to obtain highest
gain in the direction of that user. This is often done using phased array
techniques.
In GSM cellular networks, the base station is aware of the distance (but not
direction) of a mobile phone by use of a technique called "timing advance"
(TA). The base transceiver station (BTS) can determine how distant the mobile
station (MS) is by interpreting the reported TA. This information, along with
other parameters, can then be used to power down the BTS or MS, if a power
control feature is implemented in the network. The power control in either
BTS or MS is implemented in most modern networks, especially on the MS, as
this ensures a better battery life for the MS. This is also why having a BTS
close to the user results in less exposure to electromagnetic radiation.
This is why one may actually be safer to have a BTS close to them as their MS
will be powered down as much as possible. For example, there is more power
being transmitted from the MS than what one would receive from the BTS
even if they were 6 meters away from a BTS mast. However, this estimation
might not consider all the Mobile stations that a particular BTS is supporting
with EM radiation at any given time.
----------------------------------------------------------------------------------------------
Short for Carrier Sense Multiple Access / Collision Detection, a set of rules
determining how network devices respond when two devices attempt to use a
data channel simultaneously (called a collision). Standard Ethernet networks
use CSMA/CD to physically monitor the traffic on the line at participating
stations. If no transmission is taking place at the time, the particular station can
transmit. If two stations attempt to transmit simultaneously, this causes a
collision, which is detected by all participating stations. After a random time
interval, the stations that collide attempt to transmit again. If another collision
occurs, the time intervals from which the random waiting time is selected are
increased step by step. This is known as exponential back off.
CSMA/CD is a type of contention protocol. Networks using the CSMA/CD
procedure are simple to implement but do not have deterministic transmission
characteristics. The CSMA/CD method is internationally standardized in IEEE
802.3 and ISO 8802.3.
Multiple access means that multiple stations send and receive on the medium.
Transmissions by one node are generally received by all other stations
connected to the medium
Protocol modifications
1-Persistent
1-Persistent CSMA is an aggressive transmission algorithm. When the sender (station) is ready to
transmit data, it senses the transmission medium for idle or busy. If idle, then it transmits
immediately. If busy, then it senses the transmission medium continuously until it becomes idle,
then transmits the message (a frame) unconditionally (i.e. with probability=1). In case of a collision,
the sender waits for a random period of time and attempts to transmit again unconditionally (i.e.
with probability=1). 1-persistent CSMA is used in CSMA/CD systems including Ethernet.
Non-persistent
Non persistent CSMA is a non aggressive transmission algorithm. When the sender
(station) is ready to transmit data, it senses the transmission medium for idle or busy.
If idle, then it transmits immediately. If busy, then it waits for a random period of
time (during which it does not sense the transmission medium) before repeating the
whole logic cycle (which started with sensing the transmission medium for idle or
busy) again. This approach reduces collision, results in overall higher medium
throughput but with a penalty of longer initial delay compared to 1–persistent .
P-persistent
This is an approach between 1-persistent and non-persistent CSMA access modes.
When the sender (station) is ready to transmit data, it senses the transmission medium
for idle or busy. If idle, then it transmits immediately. If busy, then it senses the
transmission medium continuously until it becomes idle, then transmits a frame with
probability p. If the sender chooses not to transmit (the probability of this event is 1-
p), the sender waits until the next available time slot. If the transmission medium is
still not busy, it transmits again with the same probability p. This probabilistic hold-
off repeats until the frame is finally transmitted or when the medium is found to
become busy again (i.e. some other sender has already started transmitting their data).
In the latter case the sender repeats the whole logic cycle (which started with sensing
the transmission medium for idle or busy) again. p-persistent CSMA is used in
CSMA/CA systems including Wi-Fi and other packet radio systems.
O-persistent
Each station is assigned a transmission order by a supervisor station. When medium
goes idle, stations wait for their time slot in accordance with their assigned
transmission order. The station assigned to transmit first transmits immediately. The
station assigned to transmit second waits one time slot (but by that time the first
station has already started transmitting). Stations monitor the medium for
transmissions from other stations and update their assigned order with each detected
transmission (i.e. they move one position closer to the front of the queue). O-
persistent CSMA is used by CobraNet, LonWorks and the controller area network.
---------------------------------------------------------------------------------------------------------------
Orthogonal Frequency Division Multiple Access (OFDMA)
(a) (b)
Think about what the advantage might be of one over the other? One
obvious one is that if I put my thumb over the faucet hole, I can stop the
water flow but I cannot do the same for the shower. So although both do the
same thing, they respond differently to interference.
Fig. All cargo on one truck vs. splitting the shipment into more than
one.
Another way to see this intuitively is to use the analogy of making a shipment via a
truck.
We have two options, one hire a big truck or a bunch of smaller ones.
Both methods carry the exact same amount of data. But in case of an
accident, only 1/4 of data on the OFDM trucking will suffer.
These four smaller trucks when seen as signals are called the sub-carriers in
an OFDM system and they must be orthogonal for this idea to work. The
independentsub-channels can be multiplexed by frequency division
multiplexing (FDM), called multi-carrier transmission or it can be based on a
code division multiplex (CDM), in this case it is called multi-code
transmission.
One of the methods of achieving this spreading of the message signal is provided by DSSS
modulation. In DSSS the message signal is used to modulate a bit sequence known as the
Pseudo Noise (PN) code; this PN code consists of pulses of a much shorter duration (larger
bandwidth) than the pulse duration of the message signal, therefore the modulation by the
message signal has the effect of chopping up the pulses of the message signal and thereby
resulting in a signal which has a bandwidth nearly as large as that of the PN sequence. [1] In
this context the duration of the pulse of the PN code is referred to as the chip duration and
the smaller this value, the larger the bandwidth of the resultant DSSS signal and the more
immune to interference the resultant signal becomes.[1]
Some of the uses of DSSS include the Code Division Multiple Access (CDMA) channel
access method and the IEEE 802.11b specification used in Wi-Fi networks
The resulting signal resembles white noise, like an audio recording of "static". However,
this noise-like signal is used to exactly reconstruct the original data at the receiving end, by
multiplying it by the same pseudorandom sequence (because 1 × 1 = 1, and −1 × −1 = 1).
This process, known as "de-spreading", mathematically constitutes a correlation of the
transmitted PN sequence with the PN sequence that the receiver already knows the
transmitter is using.
The resulting effect of enhancing signal to noise ratio on the channel is called process gain.
This effect can be made larger by employing a longer PN sequence and more chips per bit,
but physical devices used to generate the PN sequence impose practical limits on attainable
processing gain.
If an undesired transmitter transmits on the same channel but with a different PN sequence
(or no sequence at all), the de-spreading process has reduced processing gain for that
signal. This effect is the basis for the code division multiple access (CDMA) property of
DSSS, which allows multiple transmitters to share the same channel within the limits of
the cross-correlation properties of their PN sequences.
As this description suggests, a plot of the transmitted waveform has a roughly bell-shaped
envelope centered on the carrier frequency, just like a normal AM transmission, except
that the added noise causes the distribution to be much wider than that of an AM
transmission.
--------------------------------------------------------------------------------------------------------------
At the initial phase, mobile communication was restricted to certain official users and the
cellular concept was never even dreamt of being made commercially available. Moreover,
even the growth in the cellular networks was very slow. However, with the development of
newer and better technologies starting from the 1970s and with the mobile users now
connected to the PSTN, there has been a remarkable growth in the cellular radio. However,
the spread of mobile communication was very fast in the 1990s when the government
throughout the world provided radio spectrum licenses for Personal Communication
Service (PCS) in 1.8 - 2 GHz frequency band.
1G: First Generation Networks
The first mobile phone system in the market was AMPS. It was the first U.S. cellular
telephone system, deployed in Chicago in 1983. The main technology of this first
generation mobile system was FDMA/FDD and analog FM.
2G: Second Generation Networks
Digital modulation formats were introduced in this generation with the main technology as
TDMA/FDD and CDMA/FDD. The 2G systems introduced three popular TDMA
standards and one popular CDMA standard in the market. These are as 11 follows:
TDMA/FDD Standards
(a) Global System for Mobile (GSM): The GSM standard, introduced by Groupe Special
Mobile, was aimed at designing a uniform pan-European mobile system. It was the first
fully digital system utilizing the 900 MHz frequency band. The initial GSM had 200 KHz
radio channels, 8 full-rate or 16 half-rate TDMA channels per carrier, encryption of speech,
low speed data services and support for SMS for which it gained quick popularity. (b)
Interim Standard 136 (IS-136): It was popularly known as North American Digital Cellular
(NADC) system. In this system, there were 3 full-rate TDMA users over each 30 KHz
channel. The need of this system was mainly to increase the capacity over the earlier
analog (AMPS) system. (c) Pacific Digital Cellular (PDC): This standard was developed as
the counterpart of NADC in Japan. The main advantage of this standard was its low
transmission bit rate which led to its better spectrum utilization.
CDMA/FDD Standard
Interim Standard 95 (IS-95): The IS-95 standard, also popularly known as CDMAOne,
uses 64 orthogonally coded users and codewords are transmitted simultaneously on each of
1.25 MHz channels. Certain services that have been standardized as a part of IS-95
standard are: short messaging service, slotted paging, over-the-air activation (meaning the
mobile can be activated by the service provider without any third party intervention),
enhanced mobile station identities etc.
2.5G : Mobile Networks
In an effort to retrofit the 2G standards for compatibility with increased throughput rates to
support modern Internet application, the new data centric standards were developed to be
overlaid on 2G standards and this is known as 2.5G standard. Here, the main upgradation
techniques are:
• supporting higher data rate transmission for web browsing
• supporting e-mail traffic
• enabling location-based mobile service 2.5G networks also brought into the market some
popular application, a few of which are: Wireless Application Protocol (WAP), General
Packet Radio Service (GPRS), High Speed Circuit Switched Dada (HSCSD), Enhanced
Data rates for GSM Evolution (EDGE) etc.
3G: Third Generation Networks
3G is the third generation of mobile phone standards and technology, superseding 2.5G. It
is based on the International Telecommunication Union (ITU) family of standards under
the International Mobile Telecommunications-2000 (IMT-2000). ITU launched IMT-2000
program, which, together with the main industry and standardization bodies worldwide,
targets to implement a global frequency band that would support a single, ubiquitous
wireless communication standard for all countries,to provide the framework for the
definition of the 3G mobile systems.Several radio access technologies have been accepted
by ITU as part of the IMT-2000 framework. 3G networks enable network operators to
offer users a wider range of more advanced services while achieving greater network
capacity through improved spectral efficiency.
Services include wide-area wireless voice telephony, video calls, and broadband wireless
data, all in a mobile environment.
Additional features also include HSPA data transmission capabilities able to deliver speeds
up to 14.4Mbit/s on the down link and 5.8Mbit/s on the uplink. 3G networks are wide area
cellular telephone networks which evolved to incorporate high-speed internet access and
video telephony.
IMT-2000 defines a set of technical requirements for the realization of such targets, which
can be summarized as follows:
• high data rates: 144 kbps in all environments and 2 Mbps in low-mobility and indoor
environments
3G W-CDMA (UMTS)
WCDMA is based on DS-CDMA (direct sequencecode division multiple access)
technology in which user information bits are spread over a wide bandwidth (much larger
than the information signal bandwidth) by multiplying the user data with 14 the spreading
code. The chip (symbol rate) rate of the spreading sequence is 3.84 Mcps, which, in the
WCDMA system deployment is used together with the 5-MHz carrier spacing. The
processing gain term refers to the relationship between the signal bandwidth and the
information bandwidth. Thus, the name wideband is derived to differentiate it from the 2G
CDMA (IS-95), which has a chip rate of 1.2288 Mcps. In a CDMA system, all users are
active at the same time on the same frequency and are separated from each other with the
use of user specific spreading codes.
The wide carrier bandwidth of WCDMA allows supporting high user-data rates and also
has certain performance benefits, such as increased multipath diversity. The actual carrier
spacing to be used by the operator may vary on a 200-kHz grid between approximately 4.4
and 5 MHz, depending on spectrum arrangement and the interference situation. In
WCDMA each user is allocated frames of 10 ms duration, during which the user-data rate
is kept constant. However, the data rate among the users can change from frame to frame.
This fast radio capacity allocation (or the limits for variation in the uplink) is controlled and
coordinated by the radio resource management (RRM) functions in the network to achieve
optimum throughput for packet data services and to ensure sufficient quality of service
(QoS) for circuit-switched users.
WCDMA supports two basic modes of operation: FDD and TDD. In the FDD mode,
separate 5-MHz carrier frequencies with duplex spacing are used for the uplink and
downlink, respectively, whereas in TDD only one 5-MHz carrier is time shared between
the uplink and the downlink. WCDMA uses coherent detection based on the pilot symbols
and/or common pilot. WCDMA allows many performance- enhancement methods to be
used, such as transmit diversity or advanced CDMA receiver concepts. Table summaries
the main WCDMA parameters. The support for handovers (HO) between GSM and
WCDMA is part of the first standard version. This means that all multi-mode
WCDMA/GSM terminals will support measurements from the one system while camped
on the other one. This allows networks using both WCDMA and GSM to balance the load
between the networks and base the HO on actual measurements from the terminals for
different radio conditions in addition to other criteria available.
3G CDMA2000
Code division multiple access 2000 is the natural evolution of IS-95 (cdmaOne). It
includes additional functionality that increases its spectral efficiency and data rate
capability.(code division multiple access) is a mobile digital radio technology where
channels are defined with codes (PN sequences). CDMA permits many simultaneous
transmitters on the same frequency channel. Since more phones can be served by 16 fewer
cell sites, CDMA-based standards have a significant economic advantage over TDMA- or
FDMA based standards. This standard is being developed by Telecommunications Industry
Association (TIA) of US and is is standardized by 3GPP2.
3GPP standards also cover some aspects of machine type communications and IoT. Here,
the focus is to provide the devices with connectivity. Consequently, the 3GPP standards
cover efficient means to provide these devices with an IP point of presence. Any security
issues related to the actual application is considered out of scope and needs to be taken
care of over the top. For example, 3GPP's 5G system can provide a temperature
controller in a refrigerated goods wagon of a train with IP connectivity, but seen from
the general 5G view, the authentication of the management traffic to the controller must
be addressed over the top, since the IP address may be accessible via the Internet, so
anyone could send messages to the controller.
Apart from the security assurance specifications (see section 4.3 below), 3GPP does not
standardize how 5G system functions are implemented and realized. The main purpose of
the specifications is secure interoperability between the functions required to provide
network connectivity. Consequently, there is little about virtualization and cloud
deployments in the 3GPP specifications. Those aspects are handled by other standards
organizations, especially ETSI I5G NFV (European Telecommunications Standards
Institute, Industry Specification Group, Network Functions Virtualization) and ONAP
(Open Network Automation Platform).
Some details are not standardized at all and are left for implementations and deployments.
Further, aspects that are part of a digitized society and industrial IoT that are not related to
the radio access connectivity is mainly out of scope for 3GPP.
While 3GPP security mechanisms provide reliable links for non-malicious bad radio
conditions (see below) they do not protect against all possible threats, for instance
DDoS and radio jamming. Protecting against DDoS attacks and radio jamming is
something that is left for implementation and deployment, e.g. to re-route traffic via
other base stations if one is jammed, or scaling mechanisms and selective
dropping/throttling in case of DDoS.
Privacy: threats to end users are mitigated by mechanisms that protect user identifiers.
Note that, similarly to confidentiality, even though the 5G system protects the privacy
of the end- user using an Internet application over the 5G system, the 3GPP standards
do not intend to, and cannot, mitigate all privacy threats outside the 5G system even
though there may be privacy concerns for the application also in a more general 5G
setting. These threats require additional efforts by Internet application providers. The
5G system protects the messages sent by a social media user while they traverse
through the mobile RAN and 5G system core network. The social media service must
itself ensure that the message is protected end-to-end, since it will traverse the Internet
once it leaves the 5G system. It is of course also up to the social media service to
ensure the privacy of the user data once it has reached their servers and is being stored
and processed.
A false base station[lS]: in GSM could identify a subscriber via the IMSI (International
Mobile Subscriber Identity)[16]. The technique is called IMSI catching. In GSM an
attacker could even eavesdrop on users' data. Later generation mobile networks,
starting from 3G, prevent the eavesdropping attacks because the network is there
authenticated to the user. However, IMSI catching attacks are still possible in 3G and
4G. In 5G standards, even IMSI catching attacks are prevented. This is through a
technique where the user's long-term identifier is never transmitted over the radio
interface in clear text. Further, 5G increases the frequency with which temporary user
identifiers are updated, further improving privacy.
For example, whether certain functions are implemented in single physical servers
(physically isolated and separated) or implemented as virtual machines (VMs) in a cloud
or virtualized environment (shared hardware) is up to implementation and operator
deployment choices (economics). This means that there is no simple rule of thumb derived
from 3GPP standards regarding the separation of RAN and Core functions but rather
flexibility prevails, even in a single physical network different configuration for different
5G use cases are possible, resulting in several differently configured logical networks are
running over one physical network. For functions implemented in a traditional non-
virtualized fashion, 3GPP, in cooperation with GSMA, develops security assurance
specifications, which sets requirements for some implementation aspects[17].