4g wireless systems seminar
#16
pRESENTED By
ASHU SRIVASTAVA

[attachment=10123]
INTRODUCTION
Consumers demand more from their technology. Whether it be a television, cellular phone, refrigerator, the latest technology purchase must have new features. With the advent of the Internet, the most-wanted feature is better, faster access to information. Cellular subscribers pay extra on top of their basic bills for such features as instant messaging, stock quotes, and even Internet access right on their phones. But that is far from the limit of features; manufacturers entice customers to buy new phones with photo and even video capability. It is no longer a quantum leap to envision a time when access to all necessary information — the power of a personal computer — sits in the palm of one’s hand. To support such a powerful system, we need pervasive, high-speed wireless connectivity. A number of technologies currently exist to provide users with high-speed digital wireless connectivity; Bluetooth and 802.11 are examples. These two standards provide very highspeed network connections over short distances, typically in the tens of meters. Meanwhile, cellular providers seek to increase speed on their long-range wireless networks. The goal is the same: long-range, high-speed wireless, which for the purposes of this report will be called 4G, for fourth-generation wireless system. Such a system does not yet exist, nor will it exist in today’s market without standardization. Fourth-generation wireless needs to be standardized throughout the United States due to its enticing advantages to both users and providers.
ECONOMIC ADVANTAGE
1 - Advantages of 4G In a fourth-generation wireless system, cellular providers have the opportunity to offer data access to a wide variety of devices. The cellular network would become a data network on which cellular phones could operate — as well as any other data device. Sending data over the cell phone network is a lucrative business. In the information age, access to data is the “killer app” that drives the market. The most telling example is growth of the Internet over the last 10 years. Wireless networks provide a unique twist to this product: mobility. This concept is already beginning a revolution in wireless networking, with instant access to the
Internet from anywhere.
2 - Problems with the Current System One may then wonder why ubiquitous, high-speed wireless is not already available. After all, wireless providers are already moving in the direction of expanding the bandwidth of
their cellular networks. Almost all of the major cell phone networks already provide data services beyond that offered in standard cell phones, as illustrated in Table 1.
Unfortunately, the current cellular network does not have the available bandwidth necessary to handle data services well. Not only is data transfer slow — at the speed of analog modems — but the bandwidth that is available is not allocated efficiently for data. Data transfer tends to come in bursts rather than in the constant stream of voice data. Cellular providers are continuing to upgrade their networks in order to meet this higher demand by switching to different protocols that allow for faster access speeds and more efficient transfers.
WIRELESS SECURITY
History

The original cellular phone network in the United States was called the Analog Mobile Phone System (AMPS). It was developed by AT&T and launched in 1983. AMPS operated in the 800 MHz range, from 824-849 MHz and 869-894 MHz. The lower band was used for transmissions from the phone to the base station, and the upper band was for the reverse direction (Leon-Garcia and Widjaja 2000). This allows full duplex conversation, which is desirable for voice communications. The bands were divided into 832 sub channels, and each connection required a pair: one each for sending and receiving data. Each sub channel was 30 KHz wide, which yielded voice quality comparable to wired telephones. The sub channels were set up so that every sub channel pair was exactly 45 MHz apart (Leon-Garcia and Widjaja 2000). Several of the channels were reserved exclusively for connection setup and teardown. The base station in a particular cell kept a record of which voice sub channel pairs were in use.
Though usable, this system included a number of security flaws. Because each phone transmitted (like any radio transmitter) in the clear on its own frequency, the phones in this system “were almost comically vulnerable to security attacks” (Riezenman 2000, 40). The crime of service theft plagued cellular service providers, as individuals with radio scanners could “sniff” the cellular frequencies and obtain the phone identification numbers necessary to “clone” a phone (Riezenman 2000, 39). The abuser could then use this cloned phone to make free telephone calls that would be charged to the legitimate user’s account
Security Analysis
Objectives –

• To ensure that information generated by or relating to a user is adequately protected against misuse or misappropriation.
• To ensure that the resources and services provided to users are adequately protected against misuse or misappropriation.
• To ensure that the security features are compatible with world-wide availability.
• To ensure that the security features are adequately standardized to ensure world-wide interoperability and roaming between different providers.
• To ensure that the level of protection afforded to users and providers of services is considered to be better than that provided in contemporary fixed and mobile networks.
• To ensure that the implementation of security features and mechanisms can be extended and enhanced as required by new threats and services.
• To ensure that security features enable new ‘e-commerce’ services and other advanced applications (Howard, Walker, and Wright 2001, 22)
These goals will help to direct security efforts, especially when the system is faced with specific threats.
Threats
Because instances of 4G wireless systems currently only exist in a few laboratories, it is difficult to know exactly what security threats may be present in the future. However, one can still extrapolate based on past experience in wired network technology and wireless transmission. For instance, as mobile handheld devices become more complex, new layers of technological abstraction will be added. Thus, while lower layers may be fairly secure, software at a higher layer may introduce vulnerabilities, or vice-versa. Future cellular wireless devices will be known for their software applications, which will provide innovative new features to the user. Unfortunately, these applications will likely introduce new security holes, leading to more attacks on the application level (Howard, Walker, and Wright 2001, 22). Just as attacks over the Internet may currently take advantage of flaws in applications like Internet Explorer, so too may attacks in the future take advantage of popular applications on cellular phones. In addition, the aforementioned radio jammers may be adapted to use IP technology to masquerade as legitimate network devices. However, this would be an extremely complex endeavor. The greatest risk comes from the application layer, either from faulty applications themselves or viruses downloaded from the network.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: www 2332 2354 2346 2342 2369 2359 2339 2350 2352 2366 2336 2368 com, 2361 2366 2325 2350 2352 2366 2335 2368 2344 2367 2357 2369 2332 2346 2375 2346 2352, 5g wireless systems seminar full pdf, 5g wireless systems seminar report, fem ders, systems wireless, application on a 4g wireless systems seminar,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: 4g wireless systems seminar - by seminar class - 12-03-2011, 04:39 PM
RE: 4g wireless systems seminar - by brianbucknor - 18-04-2011, 08:41 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Vertical Handoff Decision Algorithm Providing Optimized Performance in Heterogeneous Wireless Networks computer science topics 2 31,695 07-10-2016, 09:02 AM
Last Post: ijasti
  Optical Computer Full Seminar Report Download computer science crazy 46 68,136 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curv project report helper 2 3,214 31-10-2015, 02:16 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,473 16-09-2015, 02:51 PM
Last Post: seminar report asees
  HOLOGRAPHIC VERSATILE DISC A SEMINAR REPORT Computer Science Clay 20 39,973 16-09-2015, 02:18 PM
Last Post: seminar report asees
  Computer Sci Seminar lists7 computer science crazy 4 11,883 17-07-2015, 10:29 AM
Last Post: dhanyasoubhagya
  Steganography In Images (Download Seminar Report) Computer Science Clay 16 26,403 08-06-2015, 03:26 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,450 01-05-2015, 03:36 PM
Last Post: seminar report asees
  A SEMINAR REPORT on GRID COMPUTING Computer Science Clay 5 16,333 09-03-2015, 04:48 PM
Last Post: iyjwtfxgj
  Heterogeneous Wireless Sensor Networks in a Tele-monitoring System for Homecare electronics seminars 2 2,622 26-02-2015, 08:03 PM
Last Post: Guest

Forum Jump: