DDC Ch5
DDC Ch5
In the figure, the transmitting Earth station which establishes the uplink path, a
simplified satellite and its microwave repeater, the downlink path, and a receiving
Earth station.
Transmitting station
What is an orbit?
An orbit is the curved path that an object in space (such as a star, planet, moon,
asteroid or spacecraft) takes around another object due to gravity.
Types of orbit
1) Geostationary orbit (GEO)
Satellites in geostationary orbit (GEO) circle Earth above the equator from west to
east following Earth’s rotation – taking 23 hours 56 minutes and 4 seconds – by
travelling at exactly the same rate as Earth. This makes satellites in GEO appear to be
‘stationary’ over a fixed position. In order to perfectly match Earth’s rotation, the
speed of GEO satellites should be about 3 km per second at an altitude of 35 786 km.
Satellites in GEO cover a large range of Earth so as few as three equally-spaced
satellites can provide near global coverage.
Navigation: Satellites help in navigation and location tracking, such as air and sea
transportation, surveying, military operations, etc.
Internet access: Satellites provide internet access in remote or rural areas where
other forms of connectivity are unavailable or unreliable.
Broadcasting: Satellites distribute TV and radio signals, allowing broadcasters to
reach a wider audience beyond terrestrial transmission capabilities.
Military and defence: Satellites are used for various military and defence applications,
such as communication, surveillance, intelligence gathering, etc.
Telecommunications: This type of communication allows long-distance voice and
data communication in remote or isolated regions where another communication
infrastructure is unavailable.
Remote sensing: Satellites equipped with sensors can collect data about the Earth’s
surface, atmosphere, oceans, etc. And this information is used for various purposes,
such as weather forecasting, natural disaster monitoring, agricultural monitoring, etc.
What is 5G Technology?
The 5G technology is expected to provide a new (much wider than the previous one)
frequency bands along with the wider spectral bandwidth per frequency channel. As
of now, the predecessors (generations) mobile technologies have evidenced
substantial increase in peak bitrate.
Applications of 5G:
Healthcare: Imagine having a doctor's appointment over a crystal-clear video call
or surgeons operating remotely with robotic precision – 5G makes it possible with its
fast and stable connections.
Smart Cities: City life will become more efficient as 5G helps manage traffic
flows,public transport, and energy use, making cities cleaner and less congested.
Driverless Cars: These vehicles will be able to communicate with each other to
avoid accidents and ease traffic, thanks to the quick and reliable data 5G can send.
Manufacturing: Factories will become more automated and efficient. With 5G,
machines can talk to each other instantly, reducing errors and speeding up
production.
Farming: Sensors can tell farmers exactly when crops need water or care, helping
save resources and boost harvests.
Entertainment: Streaming movies without buffering and playing online games
with no lag will be the norm, as 5G delivers content much faster than before.
Education: Students could take virtual field trips or get hands-on with complex
subjects through augmented reality, all facilitated by 5 G's speedy connection.
Emergency Services: Faster communication can help emergency responders
coordinate better and save more lives.
Retail: Shopping experiences will be transformed with virtual fitting rooms and
personalized recommendations, thanks to 5 G's ability to handle large amounts of
data.
Energy: Managing power grids will become more efficient, helping to reduce
waste and keep our homes powered without interruption.
Working of 5G:
The 5G system uses the same elements as the previous generations: a User
Equipment (UE), itself composed of a Mobile Station and a USIM, the Radio Access
Network (NG-RAN) and the Core Network (5GC), as shown in the figure.
The main entity of the NG-RAN is the gNB, where "g" stands for "5G" and "NB" for
"Node B", which is the name inherited from 3G onwards to refer to the radio
transmitter. The radio interface is named "NR-Uu" for similar reasons, although with
divergences: here, "5G" is indicated by "NR" (for "New Radio") and Uu is also a name
inherited from previous generation.
The 5GC is here schematically represented by the AMF/UPF entity: the User Plane
Function (UPF), handling the user data and, in the signalling plane, the Access and
Mobility management Function (AMF) that accesses the UE and the (R)AN.
The reference point between the access and the core networks is called "NG” The
5GC architecture relies on a "Service-Based Architecture" (SBA) framework, where
the architecture elements are defined in terms of "Network Functions" (NFs),via
interfaces of a common framework, any given NF offers its services to all the other
authorized NFs and/or to any "consumers" that are permitted to make use of these
provided services.
The User Plane, i.e. the Network Functions (NFs) and elements involved in the
transport of user data, is shown at the bottom level, whereas the upper part of the
figure shows all the essential NFs within the signalling plane.
The Application Function (AF)- controlling the application(s) (with possible
involvement also in the user plane)
The Session Management Function (SMF)- that handles the calls and sessions,
and contacts the UPF accordingly.
The Unified Data Management (UDM), functionally similar to 3G and 4G's
HSS (and 2G's HLR)
The Policy Control Function (PCF)- that controls that the user data traffic does
not exceed the negotiated bearer(s) capacities
The Network Repository Function (NRF), which "controls" the other NFs by
providing support for NF register, deregister and update service to NF and
their services.
The security-related NFs: Network Exposure Function (NEF), Authentication
Server Function (AUSF), Security Anchor Functionality (SEAF)
1. High Data Rates:5G networks promise significantly higher data speeds compared
to 4G LTE, with peak data rates reaching multiple gigabits per second. This enables
faster downloads, smoother streaming, and improved overall network performance.
2. Low Latency: One of the most notable features of 5G is its ultra-low latency, with
latency as low as 1 millisecond in ideal conditions. This near-instantaneous response
time is critical for real-time applications such as virtual reality (VR), augmented
reality (AR), and autonomous vehicles.
5G technology advantages :
Most likely, will provide a huge broadcasting data (in Gigabit), which will support
more than 60,000 connections.
Parallel multiple services, such as you can know weather and location while
talking with other person.
Education will become easier − A student sitting in any part of world can
attend the class.
Medical Treatment will become easier & frugal − A doctor can treat the
patient located in remote part of the world.
5G Technology Disadvantages
Many of the old devices would not be competent to 5G, hence, all of them need to
be replaced with new one — expensive deal.
The increasing demand for wireless communications has problems due to limited
spectrum efficiency and multipath propagation. The use of spread spectrum
communication has simplified these problems. In the spread spectrum, signals
from different sources are combined to fit into larger bandwidth.
Most stations use air as the medium for communication, stations must be able to
share the medium without an interception and without being subject to jamming
from a malicious intruder. To achieve this, spread-spectrum techniques add
redundancy means it uses extended bandwidth to accommodate signals in a
protective envelope so that more secure transmission is possible. The spread code
is a series of numbers that looks random but are actually a pattern. The original
bandwidth of the signal gets enlarged (spread) through the spread code as shown
in the figure.
Principles of Spread Spectrum process:
In wireless LAN, the sequence with n = 11 is used. The original data is multiplied
by chips (spreading code) to get the spread signal. The required bandwidth of the
spread signal is 11 times larger than the bandwidth of the original signal.
Advantages of DSSS:
The DSSS System combats the jamming most effectively.
The performance of DSSS in presence of noise is superior to FHSS.
Interference is minimized against the signals.
Disadvantages of DSSS:
Processing Gain is lower than DSSS.
Channel Bandwidth is less than FHSS.
Synchronization is affected by the variable distance between the
transmitter and receiver.
Application:t is well-suited for particular applications where the signal must travel
over long distances like GPS, and WIFI.
Edge computing is a form of computing that is done on site or near a particular data
source, minimizing the need for data to be processed in a remote data centre.
Working:
Benefits:
In many ways, edge computing is the next evolution of cloud computing, with the
rise of 5G networks across the country and around the world. Now more companies
than ever before can harness comprehensive data analysis without the IT
infrastructure needed in
previous generations. Likewise, edge computing has many possible applications,
including security and medical monitoring, self-driving vehicles, video conferencing,
and enhanced customer experiences.
If you want to change the data, you have to change every block’s data that took lot
of time for your information. And somehow you manage to change one block’s data
its changes the next hash values and previous hash value that causes the data
incorrection. That’s why blockchain is most secure technology.
Let’s start with the blocks. Each block contains stored data, as well as its own unique
alphanumeric code, called a hash. These cryptographically generated codes can be
thought of as a digital fingerprint. They play a role in linking blocks together, as new
blocks are generated from the previous block’s hash code, thus creating a
chronological sequence, as well as tamper proofing. Any manipulation to these codes
outputs an entirely different string of gibberish, making it easy for participants to spot
and reject misfit blocks.
Some key points of blockchain:
Decentralization
Cryptographic Hashing
Consensus Mechanisms
Immutability
Transparency and Security
4.Smart Contracts: Smart contracts are self-executing contracts with the terms of the
agreement directly written into code. They can automate and enforce the rules of
communication transactions, ensuring that parties involved adhere to predefined
conditions without the need for intermediaries, thus reducing the risk of fraud or
manipulation.
Data privacy, security, and ethics are intertwined in the context of handling personal
information responsibly. Ethics provides the guiding principles and moral framework
to ensure that data privacy and security are respected and upheld.
Ethical considerations are essential in defining the boundaries and responsibilities of
data handling.
Here are some key ethical principles underlying data privacy and security: