19
G.V. Nilanka 080321G Department of Electrical Engineering Cellular technologies and security 1

Cellular technologies and security

Embed Size (px)

DESCRIPTION

Cellular technologies and security.

Citation preview

Page 1: Cellular technologies and security

1

G.V. Nilanka080321GDepartment of Electrical Engineering

Cellular technologies and security

Page 2: Cellular technologies and security

2

Outline………Evolution of Mobile CommunicationWhat is Cellular technology ?What is a cell?What is a cell site?What is a channel?Basic operation in cellularWhat are new cellular features?What are security facts?Protecting your phone

Page 3: Cellular technologies and security

3

Evolution of Mobile CommunicationCellular mobile communicationsystem has gone through 3 stages: 1. First Generation -Analog Mobile Telephone

System 2. Second Generation-Digital Mobile

Communication System (1990)3. Third Generation -2000

Page 4: Cellular technologies and security

4

What is Cellular technology ?• network made up of a number of cells.

• type of two-way radio.

• original 2-way-radio cell towers were at the centers of the cells

• mobile phone network

Page 5: Cellular technologies and security

5

What is a cell?

• The geographical area covered by cellular radio antennas. These areas are called cells.

• we want to depict an area totally covered by radio, without any gaps.

Page 6: Cellular technologies and security

6

What is a cell ?Advantages of hexagon cell structures:

higher capacity, higher number of users

less transmission power needed

base station deals with interference, transmission area

Cell is a service area covered by some BTS.

Page 7: Cellular technologies and security

7

What is a cell site?•The middle circles represent cell sites.

Cell site

Page 8: Cellular technologies and security

8

Highway

TownSuburb

Rural

Cell Distribution in a Network

Page 9: Cellular technologies and security

9

What is a channel?cell phones and base stations transmit or

communicate with each other on dedicated paired frequencies called channels.

Use 4 antennas per one cell.There are main two channels.1. Control channel2. Voice channel

Page 10: Cellular technologies and security

10

Basic operationEach cell site has a base station with a

computerized 800 or 1900 MHz transceiver and an antenna.

1-10 km in radiusThe area size depends on1. Topography2. Population3. Traffic

Page 11: Cellular technologies and security

11

Basic operation

A

Page 12: Cellular technologies and security

12

Basic operationBTS -Base Transceiver Station It is the radio tranmission part of the base

station system. Controlled by BSCBSC -Base Station Controller the control part of BSC performs the

switching function in BSCMSC-Mobile Services Switching Center

obtains all the data for processing subscriber call requests from 3 types of databases (HLR, VLR and AUC).

Page 13: Cellular technologies and security

13

Basic operationVLR – Visitor Location Register

stores all related information of mobile subscribers having entering into its coverage area.

HLR -Home Location Register

stores the related data of all existing mobile subscribers controlled by the same HLR. One HLR can control several mobile switching areas

Page 14: Cellular technologies and security

14

New trends in cellular phones

Video callGPSWi-FiTV phoneOffice softwareSatellite phones

Page 15: Cellular technologies and security

15

What are security facts?

Phone lock

GPS

Bluetooth hacker

Cell phone viruses

Page 16: Cellular technologies and security

16

Cell phone virusesThe first known cell phone virus appeared in

2004.

How viruses spread1. Internet download2. Bluetooth wireless connection3. MMS

Page 17: Cellular technologies and security

17

Protecting your phoneTurn off Bluetooth discoverable mode.

Should know about virus name .

Install the some security software for your phone.

Page 18: Cellular technologies and security

18

THANK YOU

Page 19: Cellular technologies and security

19