Cellular technologies and security

  • View
    3.428

  • Download
    1

  • Category

    Business

Preview:

DESCRIPTION

Cellular technologies and security.

Citation preview

1

G.V. Nilanka080321GDepartment of Electrical Engineering

Cellular technologies and security

2

Outline………Evolution of Mobile CommunicationWhat is Cellular technology ?What is a cell?What is a cell site?What is a channel?Basic operation in cellularWhat are new cellular features?What are security facts?Protecting your phone

3

Evolution of Mobile CommunicationCellular mobile communicationsystem has gone through 3 stages: 1. First Generation -Analog Mobile Telephone

System 2. Second Generation-Digital Mobile

Communication System (1990)3. Third Generation -2000

4

What is Cellular technology ?• network made up of a number of cells.

• type of two-way radio.

• original 2-way-radio cell towers were at the centers of the cells

• mobile phone network

5

What is a cell?

• The geographical area covered by cellular radio antennas. These areas are called cells.

• we want to depict an area totally covered by radio, without any gaps.

6

What is a cell ?Advantages of hexagon cell structures:

higher capacity, higher number of users

less transmission power needed

base station deals with interference, transmission area

Cell is a service area covered by some BTS.

7

What is a cell site?•The middle circles represent cell sites.

Cell site

8

Highway

TownSuburb

Rural

Cell Distribution in a Network

9

What is a channel?cell phones and base stations transmit or

communicate with each other on dedicated paired frequencies called channels.

Use 4 antennas per one cell.There are main two channels.1. Control channel2. Voice channel

10

Basic operationEach cell site has a base station with a

computerized 800 or 1900 MHz transceiver and an antenna.

1-10 km in radiusThe area size depends on1. Topography2. Population3. Traffic

11

Basic operation

A

12

Basic operationBTS -Base Transceiver Station It is the radio tranmission part of the base

station system. Controlled by BSCBSC -Base Station Controller the control part of BSC performs the

switching function in BSCMSC-Mobile Services Switching Center

obtains all the data for processing subscriber call requests from 3 types of databases (HLR, VLR and AUC).

13

Basic operationVLR – Visitor Location Register

stores all related information of mobile subscribers having entering into its coverage area.

HLR -Home Location Register

stores the related data of all existing mobile subscribers controlled by the same HLR. One HLR can control several mobile switching areas

14

New trends in cellular phones

Video callGPSWi-FiTV phoneOffice softwareSatellite phones

15

What are security facts?

Phone lock

GPS

Bluetooth hacker

Cell phone viruses

16

Cell phone virusesThe first known cell phone virus appeared in

2004.

How viruses spread1. Internet download2. Bluetooth wireless connection3. MMS

17

Protecting your phoneTurn off Bluetooth discoverable mode.

Should know about virus name .

Install the some security software for your phone.

18

THANK YOU

19

Recommended