Cellular Network Components

Total Page:16

File Type:pdf, Size:1020Kb

Cellular Network Components Cellular Network Components Table of Contents Cellular Network Technologies -1 ................................................................................................... 2 Cellular Network Technologies -2 ................................................................................................... 6 Cellular Network Technologies -3 ................................................................................................... 9 Cellular Network Technologies -4 ................................................................................................. 11 Notices .......................................................................................................................................... 13 Page 1 of 13 Cellular Network Technologies -1 Cellular Network Technologies -1 Cellular Signal Considerations • Base station transmitter size and power • Antenna strength of low-powered mobile devices • Channel availability within cell • Wireless Network Standard — GSM ~ 20 miles — CDMA ~ 40 miles • Signal Attenuation — Contributing environmental factors 32 **032 Cellular Signal Considerations. So what is the size of the base station? How much power does it have? How big is it? How big are the antennas it's using? What's the antenna strength of the device connecting to the network? The signal strength to my laptop, the Wi-Fi in my laptop, is probably much stronger than the signal strength to my cellular phone. Because the computer allows for a bigger antenna to be placed inside of it. Whereas with a phone, you only have a certain area where the antenna can place- be placed. Page 2 of 13 In addition to that, we have stuff like Apple's Antennagate. When the iPhone 4 first came out, and they realized if you hold it a certain way you actually block the antenna. Well that's because the antenna was placed on one of the sides of the phone. So if you're holding the phone, the antenna is covered. And the original thing they came out with was don't hold the phone that way. How else am I supposed to hold the phone? So eventually they came out with yes, we'll give you a free case to use with your phone to prevent you from blocking the cellular signal by holding it there. There's a lot of thought that comes into these devices; and where antennas are placed in it, and how many antennas are placed in it. And the FCC actually does tests to make sure the antenna isn't transmitting on frequencies it shouldn't be transmitting on. It can get very indepth. Channel Availability. So how many people are already on the network? Is there enough space to add another person to it? If not, what can we do to get more people on this- or more people on our network? We might have to add a cell tower. We might have to add something like a picocell or a femtocell; which I'll discuss in a second. Wireless Network Standards. GSM in perfect conditions-- flat area, nothing blocking the signal-- can reach Page 3 of 13 approximately 20 miles. CDMA actually has no upper limitation; but in the real world you're probably only going to be able to see one tower get up to 40 miles away. Again, if you're in New York, if you're in San Francisco, you might have a tower every quarter mile, every half mile. It just depends on how many users are there and how much the signal is blocked by other buildings; or hills for that matter. Signal Attenuation. Again, environmental factors determine how far the signal can reach. Now picocells and femtocells are actually very interesting devices. So a cellular tower is considered a macrocell. It provides a signal to a very wide range or wide area. A picocell is a step down where it might provide a signal to one building. A former company I worked at actually had a picocell for that building because the walls were so thick the nearby cellular tower couldn't reach inside the building. So they had to get a localized cellular antenna to cover just the building. My house is the perfect place to do cell phone investigations because it acts like a Faraday cage almost; where I swear I go outside, I have five bars. As soon as I walk in the house, it's zero to two bars. Something to do with the material used in the house; line of sight, something, prevents the cell signal from getting in the house. Page 4 of 13 I'm a Sprint customer. I called Sprint and said, "I have no service in my house. I don't want to switch from you but what can I do in order to get a signal?" And they actually recommended I buy a femtocell; which is a small little box-- it almost looks like a router-- that I connected to my wired network, and within my house I now have full connectivity. So I connect to it. It connects over the LAN to Sprint's network, and I now have five bars in the house. So I can actually send and receive phone calls. I think they charge like five dollars a month. They add like a phone line charge in order for me to use it. But for me it was worth it because I didn't want to necessarily switch from Sprint service. I would expect going forward these type of devices will become more and more ubiquitous. I would not be surprised to see office buildings and malls be designed with those devices to remove some of the issues we see with saturated towers. So now we have them on a localized tower. So you now have more bandwidth available for the full tower. Page 5 of 13 Cellular Network Technologies -2 Cellular Network Technologies -2 Cell towers and mobile devices use low-power transmitters to contain signals within cell area. • No signal overlap - same frequencies can be used in other cells • Calls are “handed off” to adjacent cell towers as user moves in and out of range 832 radio frequencies provide 395 full-duplex voice channels. • Allows two users to talk at the same time by using one channel for each participant in the conversation 33 **033 They use low- cell towers and mobile devices use low power transmitters to contain the signal within the cell area. There's not supposed to be any signal overlap between cellularareas. The calls are handed off to adjacent towers as users move from or in and out of range of a specific tower.They don't want it to be where you're on the border of two towers and your phone keeps swapping between the two towers. Because then you're going to start draining your battery as it switches between one and the other. It wants it to pick one, and itwaits until your signal attenuation becomes a certain level before it switches over to the other one. Page 6 of 13 There's 832 radio frequencies that provide 395 full-duplex voice channels. So again, the precursor to the cellular technology was really the walkie- talkie technology where you might have one antenna in an area, and that antenna could cover somewhere between 10 and 20 miles, with mobile device units connecting to that tower. That tower did not connect normally to any other towers in the area. So you could only talk to other people on your walkie-talkie that were on the very same tower. And it was half-duplex. So one person got to talk and then the other person got to talk; and back and forth, until your conversation was concluded. Well with cellular technology, they have many more frequencies, and each conversation uses two of the frequencies. That's where we come up with the 395 full-duplex. So each phone conversation is actually using a send frequency and a receive frequency. It allows two users to talk at the same time. Well I was going to draw something but the thing is blanked out and I don't see anything. So I'll draw it later. The way this works is the cells are normally shaped like a hexagon-- so six sides-- with a tower in the middle; it covers that area. And each tower only uses one-seventh of the available frequencies. Page 7 of 13 And then there's six more cells surrounding it. Each of those use a different one-seventh of the frequencies. That way, as I'm moving between cells, my phone actually- my phone conversation actually switches to a new frequency as it gets to the new tower. It's how they prevent bleed over. That's how they allow as many users as possible to talk using only these 395 frequencies. But during the handoff process, that's when you're more than likely dropping conversations. So as you're driving down I-10 let's say-- which is the freeway that goes from Los Angeles to Georgia, I believe-- you're going between different cellular regions. If you're on a phone call, the weakest point of your phone conversation is going to be right at the point where you're handing off from one tower to the other. And that's normally when you're going to drop a phone call. Page 8 of 13 Cellular Network Technologies -3 Cellular Network Technologies -3 The BSC (Base Station Controller) manages hand-offs between cell towers. • Mobile user can move from cell to cell without session loss. • Cell tower automatically selects a frequency for mobile device in adjacent cells. • Switch to new frequency is done upon entering cell without interruption in service. • Mobile devices use low power to prevent overlap into adjacent cells. 34 **034 So what are the technologies that actually make up this hand off process? The first piece you have is the base station controller. It actually manages the handoff between cell towers. Mobile users can move from one cell to another, and they're not supposed to lose the session.
Recommended publications
  • NEXT GENERATION MOBILE WIRELESS NETWORKS: 5G CELLULAR INFRASTRUCTURE JULY-SEPT 2020 the Journal of Technology, Management, and Applied Engineering
    VOLUME 36, NUMBER 3 July-September 2020 Article Page 2 References Page 17 Next Generation Mobile Wireless Networks: Authors Dr. Rendong Bai 5G Cellular Infrastructure Associate Professor Dept. of Applied Engineering & Technology Eastern Kentucky University Dr. Vigs Chandra Professor and Coordinator Cyber Systems Technology Programs Dept. of Applied Engineering & Technology Eastern Kentucky University Dr. Ray Richardson Professor Dept. of Applied Engineering & Technology Eastern Kentucky University Dr. Peter Ping Liu Professor and Interim Chair School of Technology Eastern Illinois University Keywords: The Journal of Technology, Management, and Applied Engineering© is an official Mobile Networks; 5G Wireless; Internet of Things; publication of the Association of Technology, Management, and Applied Millimeter Waves; Beamforming; Small Cells; Wi-Fi 6 Engineering, Copyright 2020 ATMAE 701 Exposition Place Suite 206 SUBMITTED FOR PEER – REFEREED Raleigh, NC 27615 www. atmae.org JULY-SEPT 2020 The Journal of Technology, Management, and Applied Engineering Next Generation Mobile Wireless Networks: Dr. Rendong Bai is an Associate 5G Cellular Infrastructure Professor in the Department of Applied Engineering and Technology at Eastern Kentucky University. From 2008 to 2018, ABSTRACT he served as an Assistant/ The requirement for wireless network speed and capacity is growing dramatically. A significant amount Associate Professor at Eastern of data will be mobile and transmitted among phones and Internet of things (IoT) devices. The current Illinois University. He received 4G wireless technology provides reasonably high data rates and video streaming capabilities. However, his B.S. degree in aircraft the incremental improvements on current 4G networks will not satisfy the ever-growing demands of manufacturing engineering users and applications.
    [Show full text]
  • Manual Connect.Pdf
    Wireless computer access at K-State Information Technology Services provides wireless access across campus for both the K-State community and for campus visitors. Instructions for connecting to KSU Wireless Windows XP configuration Windows Vista configuration Windows 7 configuration Macintosh OS 10.5x/6 configuration Android configuration iPhone, iPad, or iPod Touch configuration HP Touch Pad configuration Chromebook configuration Ubuntu configuration Who can use K-State’s wireless network? 1. K-State faculty/staff and students should use “KSU Wireless”. 2. Residents in K-State residence halls and Jardine Apartments should use “KSU Housing”. 3. Campus visitors should use “KSU Guest”. What’s needed to connect to KSU Wireless? A computer with wireless network card A valid K-State eID/password How do I get help? Contact your departmental IT support staff or the K-State IT Help Desk (785-532-7722, helpdesk@k- state.edu). Windows XP configuration: KSU Wireless These instructions assume you are using the Windows management of the wireless network adapter. 1. Click the Start button in the bottom left corner of the desktop. (If you’re using the classic Windows start menu, click Settings.) Click Network Connections. Right-click Wireless Connections and select View Available Wireless Networks from the menu. OR: An alternative approach is to right-click the wireless networking icon in the bottom right corner of the Windows desktop. Select View Available Wireless Networks from the menu. 2. The Wireless Network Connection window will appear. 3. Click Change the order of preferred networks in the left-hand menu. The following window will appear.
    [Show full text]
  • Cellular Wireless Networks
    CHAPTER10 CELLULAR WIRELESS NETwORKS 10.1 Principles of Cellular Networks Cellular Network Organization Operation of Cellular Systems Mobile Radio Propagation Effects Fading in the Mobile Environment 10.2 Cellular Network Generations First Generation Second Generation Third Generation Fourth Generation 10.3 LTE-Advanced LTE-Advanced Architecture LTE-Advanced Transission Characteristics 10.4 Recommended Reading 10.5 Key Terms, Review Questions, and Problems 302 10.1 / PRINCIPLES OF CELLULAR NETWORKS 303 LEARNING OBJECTIVES After reading this chapter, you should be able to: ◆ Provide an overview of cellular network organization. ◆ Distinguish among four generations of mobile telephony. ◆ Understand the relative merits of time-division multiple access (TDMA) and code division multiple access (CDMA) approaches to mobile telephony. ◆ Present an overview of LTE-Advanced. Of all the tremendous advances in data communications and telecommunica- tions, perhaps the most revolutionary is the development of cellular networks. Cellular technology is the foundation of mobile wireless communications and supports users in locations that are not easily served by wired networks. Cellular technology is the underlying technology for mobile telephones, personal communications systems, wireless Internet and wireless Web appli- cations, and much more. We begin this chapter with a look at the basic principles used in all cellular networks. Then we look at specific cellular technologies and stan- dards, which are conveniently grouped into four generations. Finally, we examine LTE-Advanced, which is the standard for the fourth generation, in more detail. 10.1 PRINCIPLES OF CELLULAR NETWORKS Cellular radio is a technique that was developed to increase the capacity available for mobile radio telephone service. Prior to the introduction of cellular radio, mobile radio telephone service was only provided by a high-power transmitter/ receiver.
    [Show full text]
  • Guidelines on Mobile Device Forensics
    NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Sam Brothers Wayne Jansen http://dx.doi.org/10.6028/NIST.SP.800-101r1 NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Software and Systems Division Information Technology Laboratory Sam Brothers U.S. Customs and Border Protection Department of Homeland Security Springfield, VA Wayne Jansen Booz-Allen-Hamilton McLean, VA http://dx.doi.org/10.6028/NIST.SP. 800-101r1 May 2014 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A- 130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A- 130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority.
    [Show full text]
  • A Survey on Mobile Wireless Networks Nirmal Lourdh Rayan, Chaitanya Krishna
    International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014 685 ISSN 2229-5518 A Survey on Mobile Wireless Networks Nirmal Lourdh Rayan, Chaitanya Krishna Abstract— Wireless communication is a transfer of data without using wired environment. The distance may be short (Television) or long (radio transmission). The term wireless will be used by cellular telephones, PDA’s etc. In this paper we will concentrate on the evolution of various generations of wireless network. Index Terms— Wireless, Radio Transmission, Mobile Network, Generations, Communication. —————————— —————————— 1 INTRODUCTION (TECHNOLOGY) er frequency of about 160MHz and up as it is transmitted be- tween radio antennas. The technique used for this is FDMA. In IRELESS telephone started with what you might call W terms of overall connection quality, 1G has low capacity, poor 0G if you can remember back that far. Just after the World War voice links, unreliable handoff, and no security since voice 2 mobile telephone service became available. In those days, calls were played back in radio antennas, making these calls you had a mobile operator to set up the calls and there were persuadable to unwanted monitoring by 3rd parties. First Gen- only a Few channels were available. 0G refers to radio tele- eration did maintain a few benefits over second generation. In phones that some had in cars before the advent of mobiles. comparison to 1G's AS (analog signals), 2G’s DS (digital sig- Mobile radio telephone systems preceded modern cellular nals) are very Similar on proximity and location. If a second mobile telephone technology. So they were the foregoer of the generation handset made a call far away from a cell tower, the first generation of cellular telephones, these systems are called DS (digital signal) may not be strong enough to reach the tow- 0G (zero generation) itself, and other basic ancillary data such er.
    [Show full text]
  • Cellular Network Sunsetting
    Cellular Network Sunsetting By Dave Anderson, Senior IoCP Program Manager The use of acronyms by the cellular industry is extensive. 3GPP, 2G, 3G, 4G, 5G, LTE, CDMA, 1xRTT, HSPA, GPRS, EV-DO, GSM, NB-IoT, and many others are examples of the plethora of technologies and descriptions used to ultimately describe the actual hardware and service used by a device to connect to various networks to communicate information. This complexity pales in comparison to the FCC spectrum allocation chart shown in Fig 1. The chart depicts the frequency spectrums where toys, TV, radio, military, medical, marine radios, satellites, space telescopes and all the other frequency uses in the United States. Other countries have their own versions of this chart. Cellular technology utilizes a very small portion of this chart, yet occupies a large portion of everyday life in today’s connected society. Figure 1 Close examination of this chart will show that there are no open or available blocks of spectrum, so as new technologies are developed they must either layer on top of existing technologies, or aging technologies must be turned off or ‘sunset’ to free up spectrum for newer technologies. The cell phone industry has diligently worked to define a consumer market where the expectation is to replace this communication device with contract renewal type regularity. From a consumer point of view, the older technologies are usually long passed before a sunset event would force a phone upgrade. In parallel to the explosive cell phone market growth is the industrial usage of the cellular communication networks. The presence of a cellular network removes the necessity for wired connections and makes mobile monitoring possible for a number of industries.
    [Show full text]
  • Cdma2000 1X Capacity Decrease by Power Control Error in High Speed Train Environment
    CDMA2000 1X CAPACITY DECREASE BY POWER CONTROL ERROR IN HIGH SPEED TRAIN ENVIRONMENT Simon Shin, Tae-Kyun Park, Byeung-Cheol Kim, and Yong-Ha Jeon Network R&D Center, SK Telecom, 9-1, Sunae-dong, Bundang-gu, Sungnam City, Gyunggi-do, South Korea Dongwoo Kim School of Electrical Engineering & Computer Science, Hanyang Univ. 1271 Sa-dong, Ansan, Kyungki-do 425-791, South Korea Keywords: CDMA2000 1X, Doppler shift, capacity, power control, Korea Train Express Abstract: CDMA2000 1X capacity was analysed in the high speed train environment. We calculated the power control error by Doppler shift and simulated bit error rate (BER) at the base station. We made the interference model and calculated the BER from lower bound of power control error variance. The reverse link BER was increased by high velocity although there was no coverage reduction. Capacity decrease was negligible in the pedestrian (5 km/h), urban vehicular(40 km/h), highway and railroad(100 km/h) environment. However, capacity was severely reduced in high speed train condition(300 km/h and 350 km/h). Cell-planning considering capacity as well as coverage is essential for successful cellular service in high speed train. 1 INTRODUCTION train with 300 km/h velocity. Received power, transmitted power, and pilot chip energy to Cellular mobile telephone and data communication interference ratio (Ec/Io) of mobile station were not correlated with the mobile velocity. We could serve services are very popular. Cellular service is usable in anywhere, even though tunnel, sea, and successfully the CDMA2000 1X in the KTX by underground places. Railroads and highways are existing cellular network.
    [Show full text]
  • 4G LTE Standards
    Standard of 4G LTE Jia SHEN CAICT 1 Course Objectives: Evolution of LTE-Advanced LTE-Advanced pro 2 2 Evolution of LTE/LTE-A technology standard Peak rate LTE-Advanced 3Gbps R10 R11 R12 LTE • Distributed • D2D R9 antenna • TDD Flexible 300Mbps R8 • dual layer CoMP slot beamformi • Enhanced allocation ng • CA MIMO • 3D MIMO • Terminal • Enhanced • OFDM • Enhanced CA • … location MIMO • MIMO • … technology • Relay • … • HetNet 2008 2009 • … 2011 2012 2014 Terminal location technology dual layer3 beamforming CA Enhanced antenna Relay Course Objectives: Evolution of LTE-Advanced CA Enhanced MIMO CoMP eICIC Relay LTE-Advanced pro 4 4 Principle of carrier aggregation (CA) Carrier aggregation • In order to satisfy the design of LTE-A system with the maximum bandwidth of 100MHz, and to maintain the backward compatibility,3GPP proposed carrier aggregation. In the LTE-A system, the maximum bandwidth of a single carrier is 20MHz Participate in the aggregati on of the various LTE carrier is known as the LTE-A mem ber carrier (Component Car rier, CC) Standard Considering the backward compatibility of LTE system, the maximum bandwidth of a single carrier unit is 20M Hz in the LTE-A system. All carrier units will be designed to be compatible with LTE, but at this stage it does not exclude the considerati on of non - backward compatible carriers. In the LTE-A FDD system, the terminal can be configured to aggregate different bandwidth, different number o f carriers. For TDD LTE-A systems, the number of uplink and downlink carriers is the same in a typical scence. In the LTE-A system, CA supports up to 5 DL carriers.
    [Show full text]
  • Wireless Evolution •..••••.•.•...•....•.•..•.•••••••...••••••.•••.••••••.••.•.••.••••••• 4
    Department of Justice ,"'''''''''<11 Bureau of Investigation ,Operational Technology Division WIRELESS EVDLUTIDN IN THIS Iselil-it:: .. WIRELESS EVOLUTIDN I!I TECH BYTES • LONG TERM EVOLUTIQN ill CLDUD SERVICES • 4G TECHNOLOGY ill GESTURE-RECOGNITION • FCC ON BROADBAND • ACTIVITY-BASED NAVIGATION 'aw PUIi! I' -. q f. 8tH'-.1 Waa 8RI,. (!.EIi/RiW81 R.d-nl)) - 11 - I! .el " Ij MESSAGE FROM MANAGEMENT b7E he bou~~aries of technology are constantly expanding. develop technical tools to combat threats along the Southwest Recognizing the pathway of emerging technology is Border. a key element to maintaining relevance in a rapidly changing technological environment. While this The customer-centric approach calls for a high degree of T collaboration among engineers, subject matter experts (SMEs), proficiency is fundamentally important in developing strategies that preserve long-term capabilities in the face of emerging and the investigator to determine needs and requirements. technologies, equally important is delivering technical solutions To encourage innovation, the technologists gain a better to meet the operational needs of the law enforcement understanding of the operational and investigative needs customer in a dynamic 'threat' environment. How can technical and tailor the technology to fit the end user's challenges. law enforcement organizations maintain the steady-state Rather than developing solutions from scratch, the customer­ production of tools and expertise for technical collection, while centric approach leverages and modifies the technoloe:v to infusing ideas and agility into our organizations to improve our fit the customer's nFlFlrt~.1 ability to deliver timely, relevant, and cutting edge tools to law enforcement customers? Balancing these two fundamentals through an effective business strategy is both a challenge and an opportunity for the Federal Bureau of Investigation (FBI) and other Federal, state, and local law enforcement agencies.
    [Show full text]
  • 18-452/18-750 Wireless Networks and Applications Overview Cellular
    Overview 18-452/18-750 Surveys Wireless Networks and Applications Cellular principles Lecture 17: » Cellular design Cellular - Principles » Elements of a cellular network » How does a mobile phone take place? Peter Steenkiste » Handoff » Frequency Allocation, Traffic Engineering Early cellular generations: 1G, 2G, 3G Spring Semester 2017 Today’s cellular: LTE http://www.cs.cmu.edu/~prs/wirelessS17/ Some slides based on material from “Wireless Communication Networks and Systems” © 2016 Pearson Higher Education, Inc. Peter A. Steenkiste, CMU 1 Peter A. Steenkiste, CMU 2 The Advent of Cellular versus WiFi Cellular Networks Cellular WiFi Mobile radio telephone system was based on: Licensed Unlicensed » Predecessor of today’s cellular systems Spectrum » High power transmitter/receivers Provisioned Unprovisioned » Could support about 25 channels Service model » in a radius of 80 Km “for pay” “free” – no SLA To increase network capacity: » Multiple lower power transmitters (100W or less) MAC services Fixed bandwidth Best effort » Smaller transmission radius -> area split in cells SLAs no SLAs » Each cell with its own frequencies and base station » Adjacent cells use different frequencies Implications for level of service (SLAs), cost, » The same frequency can be reused at sufficient distance nature of protocols, …? These trends are continuing … Peter A. Steenkiste, CMU 3 Peter A. Steenkiste, CMU 4 Page 1 The Cellular Idea The MTS network http://www.privateline.com/PCS/images/SaintLouis2.gif In December 1947 Donald H. Ring outlined the idea in a Bell labs memo Split an area into cells, each with their own low power towers Each cell would use its own frequency Did not take off due to “extreme-at-the-time” processing needs » Handoff for thousands of users » Rapid switching infeasible – maintain call while changing frequency » Technology not ready Peter A.
    [Show full text]
  • Wireless Standards and Guidelines
    Wireless Standards and Guidelines A Mandatory Reference for ADS Chapter 545 Full Revision Date: 02/11/2019 Responsible Office: M/CIO/IA File Name: 545mbg_021119 TABLE OF CONTENTS 1. Introduction 3 2. Purpose 3 3. Audience 3 4. Scope 3 4.1 Definitions 3 4.2 Individuals 4 4.3 Technologies, Networks, and Communications 4 4.4 Wireless Technology Locations 4 4.5 Classifications of Information 5 5. Exceptions 5 6. Wireless Spectrum Standard 5 6.1 Wireless Network Standards (Wi-Fi) 6 6.2 Access Agreements (Wi-Fi) 7 7. Security and Privacy 7 7.1 Cybersecurity 7 7.1.1 Implementation of Wi-Fi 7 7.1.2 Access and Usage Controls for Wi-Fi 8 7.1.3 Technology Controls for Other Wireless Technologies 9 7.2 Encryption 9 7.3 Continuous Monitoring 10 7.4 Installation of, Relocation of, or Changes to Wi-Fi 10 8. National Security Information Usage and Restrictions 11 8.1. Classified Systems and Workspaces 12 8.2. Sensitive Compartmented Information Facilities (SCIF) 12 9. List of Acronyms 13 2 1. Introduction Wireless networks, technologies, and communications must comply with the minimum specifications outlined in the provisions of federal policy, laws, and standards. The National Institute for Standards and Technology (NIST) is responsible for developing information security standards and guidelines including minimum requirements for federal information systems. For wireless networks, technologies, and communications, the specific NIST Special Publications (SPs) that constitute the mandatory framework for implementation are SP 800-48, SP 800-97, and SP 800-153. NIST guidelines are consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Managing Information as a Strategic Resource.
    [Show full text]
  • Survey on Multi- Channel Access Methods for Wireless Lans
    International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 12, December-2014 Survey on Multi- Channel Access Methods for Wireless LANs Mahamat Habib Senoussi Hissein, Adrien Van Den Bossche, Thierry Val Université de Toulouse, UT2J, CNRS-IRIT IUT Blagnac, 1 place Georges Brassens BP60073, 31703 Blagnac, France Abstract— The last decade has seen great progress in the unpredictable nature of the network topology is essential field of wireless LANs. Their deployment is manifested in and complex. One of the major roles of an efficient access several areas of applications. However, these applications face method is to manage access to the medium, and therefore, many obstacles due to the complexity of managing the to solve the inherent problem of wireless hidden node medium access. This shortcoming usually leads to some where a transmitter node may not hear the transmission problems such as numerous collisions, throughput from another node that is not in its radio range. degradation and increased delays. To overcome these challenges, research works have focused on new multi- The multi-channel access methods allow different channel access methods that reduce contention as well as nodes to transmit simultaneously in the same coverage area collision probability. Several transmissions can occur on distinct frequency channels generally. This parallelism simultaneously in the same transmission area, thus increases the throughput and can potentially reduce the considerably improving throughput and reducing delays to transmission delay and contention. However, the use of access the medium. However, the idea of using multiple multiple channels does not go without problems. The channels arouses various problems such as the multi-channel majority of wireless communication interface is operating hidden terminal, deafness and the logical partition.
    [Show full text]