Maximizing Security – CDMA and Its Contribution to Homeland Security

Total Page:16

File Type:pdf, Size:1020Kb

Maximizing Security – CDMA and Its Contribution to Homeland Security Maximizing Security – CDMA and its Contribution to Homeland Security Michael Iandolo Vice President, CDMA Product Management Lucent Technologies Who thinks Wireless is Critical for Homeland Security? “Commercial services offer public safety flexible, convenient “There is growing demand for wireless communications for both daily and disaster operations” technology…drivers for this trend come from several McKinsey 9/11 report different directions…in DOD, it’s the need to support “GPS and “We operate the fourth largest database in the first responders and develop a more mobile geolocation via military.” GSA world, but it doesn’t do our folks in the field “There are several efforts underway wireless phones much good if they can’t get access to it…As to address secure access to critical may allow more wireless systems are implemented, data to protect the lives of first vehicles as probes Customs wrestles with critical issues like responders. For example, first to supplement bandwidth, signal strength, coverage and responders could receive information critical security.” Woody Hall, CIO Customs about where emergency exits are infrastructure located through a PDA when lost in a data. ITS “Crucial to DHS mission are building.” Steve Dawson, CTO, NJ technology geospatial software, knowledge combined with “Wireless modem terminals equipped with management, infrastructure, wireless and CAD GPS provide a more efficient way to respond wireless, collaboration, modeling can provide EMS to a health threat. A gift by the Marcus and simulation, middleware and the capability to foundation enables the CDC to make broad database technology.” Steve receive timely use of location- based wireless services for Cooper, CIO DHS notice of an mobile field operations.” CDC “long term goal of Operation Safe incident, be “Not only must information be secure, it must City is to integrate the system with efficiently routed be part of the enterprise in such a way that the handheld devices that police and to the scene and wireless infrastructure is connected to it. firemen can use in the field in order hospital” DOT 10 We’re looking to try to expand some of to send data about buildings in their year plan for ITS information services to cell phones, PDAs,…” areas of responsibility to a central FEMA data warehouse.” City of Boston Lucent Technologies 2 CDMA2000 Benefits for Homeland Security • Supports the bandwidth needed for wireless data applications to be viable • CDMA2000 1X offers unparalleled voice capacity: 1xEV- DO delivers unmatched data capacity • Allows selective deployment where/when it is most needed: Backwards compatibility of CDMA2000 provides advantage of seamless co-existence of 2nd and 3rd Generation systems. • Provides high levels of security • Offers broad terminal availability Lucent Technologies 3 Why CDMA for Homeland Security? 3G Wireless is necessary to supplement current Land Mobile Radio (LMR) voice networks First Responders’ use • LMR is Costly • Expensive equipment • Dominance by very few vendors • As 9/11 demonstrated, lack of interoperability is a serious problem • Proprietary protocols • Very fragmented spectrum • With the low data speeds of P25 systems there are limited applications – Narrow band technology good for voice but only enables low-speed data – Encryption requires higher air-interface capability for quality Lucent Technologies 4 Why CDMA for Homeland Security? Limited use of mobile data now and limited speeds • Lack of access to Mobile Data for First Responders – 2.5 Million First Responders and only 150K using wireless data now • Most First Responders that have access to mobile data are limited to very low speed networks with average speeds of 9.2 kbps to 19.2 kbps • Large number of public safety agencies utilizing CDPD, which is being discontinued over the next two years • Only 3G can support the additional security and speed required for Homeland Security Lucent Technologies 5 Why is CDMA a Better Choice than GPRS? • Better Security – In contrast to GSM/GPRS networks, neither CDMA2000 1X nor the earlier cdmaOne have fallen victim to attacks – CDMA2000 1X has very strong authentication mechanisms through the use of multiple keys and 128-bit radio link encryption – Spread-spectrum technology makes use of pseudo-random codes • CDMA Provides Better Coverage • Faster Speed and Better Capacity – CDMA2000 1X (peak rates) • 1x rel.0: 153.6 Kbps DL & RL • 1x rel.A: 307 Kbps DL/ 153.6 Kbps RL • 1x rel.D: 3.1 Mbps DL/ 1.5 Mbps RL (in the near future) – GSM/GPRS/EDGE (peak rates) • GPRS: 9.6 to 22 Kbps per time slot in packet mode • EDGE: up to 59 Kbps per time slot in packet mode Lucent Technologies 6 Spread Spectrum Provides Inherent Privacy of All Information (Voice, Data, Signaling) • Code Division (CDMA) signals are more difficult to tap than Time Division (GSM/TDMA) or Analog signals via: – Signal Spreading – Soft hand-off – Long Code Mask • Enhanced Subscriber Authentication (ESA) and Enhanced Subscriber Privacy (ESP) provide key security enhancements • Security is further enhanced at device level • To date, there are no known or commercially available CDMA2000 interception devices Lucent Technologies 7 Packet Data Security Architecture User Credit Authentication VPN - End-to-End Protection Bank Centralized Authentication, Authorization, Policy enforcement, Accounting (AAA) accounting billing Network-layer authentication and authorization Over the air coding and encryption Wireless Core Network Wireless Radio Network MSC & PDSN HLR/VLR/AAA Internet Wireless servers Routers application servers Lucent Technologies 8 CDMA2000 Meets Federal Security Source: Federal Wireless Requirements Policy Committee Federal Security Requirements 3G CDMA Wireless Goals Confidentiality – the protection of Protect session information and user data, signaling, identification prevent unauthorized access to and location user traffic Integrity – the protection from Protect session from hijacking insertion, deletion, modification which provides integrity protection or replay of data (prevents tampering with user traffic) Authentication – the assured Protect system resources through identification of the user, terminal authentication of users and carrier Availability – Obtain access to Mutual authentication of mobile service and prevent denial of and network to each other service attacks prevents network attacks Lucent Technologies 9 Beyond Security- Why is CDMA Necessary for Homeland Security? • Enables First Responders to utilize critical applications that are not possible on slower speed LMR, Mobitex and CDPD networks – Mapping/Location Based Services – critical infrastructure protection – Video Streaming – incident scenes, security – Digital Image transfer – disaster scene – Large files transfer – records, on-line manuals, emergency protocol – Biometrics – facial recognition – Bioterrorism detection and response – sample analysis, plume tracking • Enables First Responders to communicate and respond in real-time • Enables First Responders to better utilize the technology they already have Lucent Technologies 10 Public Safety / Homeland Security Applications Police and EMS Video Applications PROTECT • Provides Chem/bio alarms, video, and facial recognition • 1.2 Mbps throughput required ! Medical Consult, “virtual” backup, and incident pre-assessment are all critical ! 240 kbps per user (bi-directional) for full motion, medium resolution video CapWIN ! Messaging, incident command, and database access across jurisdictions and functional disciplines ! High quantities of medium speed (80 kbps) users for rapid image distribution Source: DC Office of Technology Lucent Technologies 11 GPS/GIS/Location Based Services Route Navigation First Responder Tracking Traffic Conditions Critical Infrastructure Health Threats Crime Mapping Container Tracking MultipleMultiple UsesUses forfor LocationLocation Lucent Technologies 12 Try Downloading this GIS Image Over 19.2 kbps (Event Management Application) Lucent Technologies 13 Biometrics Fingerprints Facial Recognition Retina Scanners Mobile Fingerprint Scanners Smart Cards IncreaseIncrease effectiveness effectiveness of of Biometrics Biometrics withwith 3G3G MobileMobile HighHigh SpeedSpeed DataData Lucent Technologies 14 Video Real-time Patrol Car Video Disaster Communication Dispatch Centers Image Transmission from Crime Databases 3G3G Mobile Mobile High High Speed Speed Accident Scene Data-Data- a a goodgood fitfit forfor Mobile Mobile to Trauma Center VideoVideo Lucent Technologies 15 Large File Transfer – Incident Management System: Many types of information that need to be shared and stored •Incident type •Traffic Flow/Transportation •Driver history requests •Incident location Network status •Intelligence •Who is on scene by agency and •Equipment deployed Information unit •Universal health precautions •Crime •Whose jurisdiction •Weather patterns/mapping •Notification of Other Agencies •Land Property •Location injured •Available routes to scene •Media Interaction •Hospital capability and •Danger areas at scene (Hazmat, •Lookouts status Weapons) •Officer in distress Notification •Wanted vehicle •Chem/Bio threat •Premise history notification •Number and type of vehicles •Concealed weapon permits •Sensory Capabilities involved •Escapees •CAD data •Road closures and lane •Condition of Release and •Records management blockages Repeat Offender files information •Number and description of •Domestic/Protection orders •Accident scene photos person involved •Recovered stolen auto •Number and type of injuries
Recommended publications
  • Reservation - Time Division Multiple Access Protocols for Wireless Personal Communications
    tv '2s.\--qq T! Reservation - Time Division Multiple Access Protocols for Wireless Personal Communications Theodore V. Buot B.S.Eng (Electro&Comm), M.Eng (Telecomm) Thesis submitted for the degree of Doctor of Philosophy 1n The University of Adelaide Faculty of Engineering Department of Electrical and Electronic Engineering August 1997 Contents Abstract IY Declaration Y Acknowledgments YI List of Publications Yrt List of Abbreviations Ylu Symbols and Notations xi Preface xtv L.Introduction 1 Background, Problems and Trends in Personal Communications and description of this work 2. Literature Review t2 2.1 ALOHA and Random Access Protocols I4 2.1.1 Improvements of the ALOHA Protocol 15 2.1.2 Other RMA Algorithms t6 2.1.3 Random Access Protocols with Channel Sensing 16 2.1.4 Spread Spectrum Multiple Access I7 2.2Fixed Assignment and DAMA Protocols 18 2.3 Protocols for Future Wireless Communications I9 2.3.1 Packet Voice Communications t9 2.3.2Reservation based Protocols for Packet Switching 20 2.3.3 Voice and Data Integration in TDMA Systems 23 3. Teletraffic Source Models for R-TDMA 25 3.1 Arrival Process 26 3.2 Message Length Distribution 29 3.3 Smoothing Effect of Buffered Users 30 3.4 Speech Packet Generation 32 3.4.1 Model for Fast SAD with Hangover 35 3.4.2Bffect of Hangover to the Speech Quality 38 3.5 Video Traffic Models 40 3.5.1 Infinite State Markovian Video Source Model 41 3.5.2 AutoRegressive Video Source Model 43 3.5.3 VBR Source with Channel Load Feedback 43 3.6 Summary 46 4.
    [Show full text]
  • A DSP GMSK Modem for Mobitex and Other Wireless Infrastructures
    A DSP GMSK Modem for Mobitex and Other Wireless Infrastructures Appliation Report Etienne J. Resweber Synetcom Digital Incorporated SPRA139 October 1994 Printed on Recycled Paper IMPORTANT NOTICE Texas Instruments (TI) reserves the right to make changes to its products or to discontinue any semiconductor product or service without notice, and advises its customers to obtain the latest version of relevant information to verify, before placing orders, that the information being relied on is current. TI warrants performance of its semiconductor products and related software to the specifications applicable at the time of sale in accordance with TI’s standard warranty. Testing and other quality control techniques are utilized to the extent TI deems necessary to support this warranty. Specific testing of all parameters of each device is not necessarily performed, except those mandated by government requirements. Certain applications using semiconductor products may involve potential risks of death, personal injury, or severe property or environmental damage (“Critical Applications”). TI SEMICONDUCTOR PRODUCTS ARE NOT DESIGNED, INTENDED, AUTHORIZED, OR WARRANTED TO BE SUITABLE FOR USE IN LIFE-SUPPORT APPLICATIONS, DEVICES OR SYSTEMS OR OTHER CRITICAL APPLICATIONS. Inclusion of TI products in such applications is understood to be fully at the risk of the customer. Use of TI products in such applications requires the written approval of an appropriate TI officer. Questions concerning potential risk applications should be directed to TI through a local SC sales office. In order to minimize risks associated with the customer’s applications, adequate design and operating safeguards should be provided by the customer to minimize inherent or procedural hazards.
    [Show full text]
  • A Survey of Mobile Data Networks
    A SURVEY OF MOBILE DATA NETWORKS APOSTOLIS K. SALKINTZIS THE UNIVERSITY OF BRITISH COLUMBIA ABSTRACT The proliferation and development of cellular voice systems over the past several years has exposed the capabilities and the effectiveness of wireless communications and, thus, has paved the way for wide-area wireless data applications as well. The demand for such applications is currently experiencing a significant increase and, therefore, there is a strong call for advanced and efficient mobile data technologies. This article deals with these mobile data technologies and aims to exhibit their potential. It provides a thorough survey of the most important mobile packet data services and technologies, including MOBITEX, CDPD, ARDIS, and the emerging GPRS. For each technology, the article outlines its main technical characteristics, discusses its architectural aspects, and explains the medium access protocol, the services provided, and the mobile routing scheme. istorically, wireless data communications was princi- and have access to external data, wireless data technology pally the domain of large companies with special- plays a significant part because it can offer ubiquitous con- ized needs; for example, large organizations that nectivity, that is, connectivity at any place, any time. For this needed to stay in touch with their mobile sales reason, wireless data technology can be of real value to the Hforce, or delivery services that needed to keep track of their business world since computer users become more productive vehicles and packages. However, this situation is steadily when they exploit the benefits of connectivity. The explosive changing and wireless data communications is becoming as growth of local area network (LAN) installations over the commonplace as its wired counterpart.
    [Show full text]
  • Communications Technology Assessment for the Unmanned Aircraft System (UAS) Control and Non-Payload Communications (CNPC) Link
    NASA/CR—2014-216675 Communications Technology Assessment for the Unmanned Aircraft System (UAS) Control and Non-Payload Communications (CNPC) Link Steven C. Bretmersky MTI Systems, Inc., Cleveland, Ohio William D. Bishop Verizon Federal Network Systems, LLC., Arlington, Virginia Justin E. Dailey MTI Systems, Inc., Cleveland, Ohio Christine T. Chevalier Vantage Partners, LLC, Brook Park, Ohio June 2014 NASA STI Program . in Profi le Since its founding, NASA has been dedicated to the • CONFERENCE PUBLICATION. Collected advancement of aeronautics and space science. The papers from scientifi c and technical NASA Scientifi c and Technical Information (STI) conferences, symposia, seminars, or other program plays a key part in helping NASA maintain meetings sponsored or cosponsored by NASA. this important role. • SPECIAL PUBLICATION. Scientifi c, The NASA STI Program operates under the auspices technical, or historical information from of the Agency Chief Information Offi cer. It collects, NASA programs, projects, and missions, often organizes, provides for archiving, and disseminates concerned with subjects having substantial NASA’s STI. The NASA STI program provides access public interest. to the NASA Aeronautics and Space Database and its public interface, the NASA Technical Reports • TECHNICAL TRANSLATION. English- Server, thus providing one of the largest collections language translations of foreign scientifi c and of aeronautical and space science STI in the world. technical material pertinent to NASA’s mission. Results are published in both non-NASA channels and by NASA in the NASA STI Report Series, which Specialized services also include creating custom includes the following report types: thesauri, building customized databases, organizing and publishing research results. • TECHNICAL PUBLICATION.
    [Show full text]
  • Boomer-III Mobitex OEM Modem
    Boomer-III Mobitex OEM Modem BM3-900M – Mobitex 900MHz BM3-800M – Mobitex 800MHz BM3-400ME – Mobitex 400MHz BM3-400MU – Mobitex 400MHz Th e Wavenet family of Boomer-III Mobitex modems are high-performance wireless transceivers developed specifi cally for integration by original equipment manufacturers (OEM). Th is wireless module can be incorporated into various vertical solutions ranging from Business Benefi ts handheld terminals (HHT) for public safety, High Reliability Small Compact Design • Capable of operating 24-hours a day, 7-days a week (24/7). transport and logistics, to machine-to-machine • Rugged small form factor suitable for handheld devices or machines. (M2M) applications for meter reading, vending • Unique LED indicator window (TX, RX PWR) for visual diagnostic feedback. machines and point-of-sale. Connectivity Plus • High sensitivity receiver for connectivity in-building and fringe areas. Th e Boomer-III family off er integrators • High effi ciency transmitter. Effi cient Power Management superior performance in critical areas of • Advanced power management for long operating life. reliability, receiver sensitivity, noise immunity, • Compatibility with 3.6V lithium battery technology. power effi ciency and simplicity of integration. Flexible Architecture • On-board Application Software capable to allow product customisation. Th e On-Board Application (OBA) capability • Eliminate external componentry to reduce complexity and system cost. • Comprehensive Developer Support including SDK and test hardware. allows you to run your wireless application Future-Proof Your Design directly on the modem’s internal processor • Network fl exibility through family range of interchangeable modules. eliminating an external processor, memory • Th e BM3 family includes multi-band DataTAC, GPRS, CDMA and 3G networks.
    [Show full text]
  • The Transcomm Network
    Comparing Transcomm’s Network with TETRA THE TRANSCOMM NETWORK Transcomm has a proven, reliable and cost-efficient network specifically designed for business to business applications that require high levels of availability, integrity and security. Successfully used in the UK for over 10 years, the Transcomm Network is a data-only service built on Ericsson’s proven Mobitex® technology using packet switching for maximum efficiency. The network is instantly accessible with no call set-up time or contention with voice. Mobitex is an open standard with networks implemented in over 30 countries worldwide, making Mobitex the largest dedicated wireless data technology in the global market. In the UK, Transcomm continues to be the network of choice for organisations requiring business critical wireless data communications, including over 55% of UK Police Forces under a Home Office Framework Agreement. TETRA TETRA (Terrestrial Trunked Radio) is a standard for a wireless communication system that was designed by the European Telecommunications Standardisation Institute (ETSI) to meet the requirements of business and Emergency Service users for mobile voice and data services. There are currently two Public TETRA Networks in the UK, operated by Dolphin and mmO2 Airwave, primarily focussed on the provision of digital voice services including “push to talk”, group calling and other “PMR-like” voice services. Although packet data is part of the TETRA standard, it is not currently available1 on either UK TETRA network and is not expected to be generally available for at least two to three years. The TETRA standard continues to be developed: TETRA 2 services, which include faster packet data and compatibility with 3G services, are specified but not yet available.
    [Show full text]
  • 4G–Beyond 3G and Wireless Networks
    Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 89-96 © Research India Publications http://www.ripublication.com/aeee.htm 4G–Beyond 3G and Wireless Networks Kapil Singh Indira Gandhi national Open University (IGNOU), Delh, India E-mail: [email protected] Abstract The rapid growth in interactive multimedia applications, such as video telephonic, video games and T.V broadcasting have resulted in spectacular strides in the progress of wireless communication systems. The current third generation (3G) wireless systems and the next generation (4G) wireless systems in planning support higher bit rates. However the high error rates and stringent delay constraints in wireless systems are still significant obstacles for these applications and services. On the other hand, the development of more advanced wireless systems provides opportunities for proposing novel wireless multimedia protocols and new applications and services that can take the maximum advantage of the systems. The symposium aims at increasing the synergy between academics and industry professional working in the area. 1. Introduction Fifteen years ago mobile telephones were an exotic extravagance. Today, as cellular phones, they are often given away as freebies in support of marketing schemes and product promotions. Having become a mainstream voice communications medium, they are poised to take on new challenges, transmitting (fairly) high-speed data, video, and multimedia traffic, as well as voice signals to users on the move. The primary need is fueled by increasingly mobile workforces in every industry. According to the Strategies Group, an average of 15% of the U.S. workforce is classified as mobile (out of the office at least 20% of the time).
    [Show full text]
  • Guide to Emerging Device Acronyms ©2011 AT&T Inc
    March 14, 2011 Guide to Emerging Device Acronyms Definition of Abbreviations and Acronyms Acronym Term Description/Definition 2G Second Generation Wireless In mobile telephony, the use of digital encoding and technologies that include Global System for Mobile Communications (GSM), time division multiple access (TDMA), and code division multiple access (CDMA). Such networks are in use worldwide and support high bit rate voice and limited data communications. Most 2G protocols offer data, fax, and short message service (SMS), as well as different levels of encryption. 3G Third Generation Wireless 3G is an ITU specification for the third generation of mobile communications technology. (Analog cellular was the first generation; Digital PCS the second.) 3G uses the Universal Mobile Telecommunications System (UMTS) standard. Key features of 3G systems are a high degree of commonality of design worldwide, compatibility of services, use of small pocket devices with worldwide roaming capability, Internet and other multimedia applications, and a wide range of services and devices. 4G Fourth Generation Wireless 4G is the successor to 3G and 2G families of standards. Speed requirements for 4G service set the peak download speed at 100 Mbit/s for high mobility communication (such as from trains and cars) and 1 Gbit/s for low mobility communication (such as pedestrians and stationary users). ABS AT&T Business Solutions This team leads the business device sales efforts (stocked and non-stocked) and manages the B2B channels such as the VARs and Master Agents. AF Audio Frequency The specific range on the electromagnetic spectrum (approximately 20 Hz to 20 kHz) that, when transmitted as acoustic waves, can be heard by the normal human ear.
    [Show full text]
  • Analysis and Application of Carrier Aggregation Technology in Wireless Communications
    National Conference on Information Technology and Computer Science (CITCS 2012) Analysis and Application of Carrier Aggregation Technology in Wireless Communications Binglin Li Hao Zhang China Electric Power Research Institute China Electric Power Research Institute Nanjing Jiangsu, 211106, 13951022347 Nanjing Jiangsu, 211106 [email protected] Jiming Yao Hongbin Yao China Electric Power Research Institute North China Grid Company Limited, Nanjing Jiangsu, 211106 Beijing, 10053 Abstract—Carrier aggregation is a key technology in the LTE-A. 10 simplex frequency points and 15 duplex frequency points Carrier aggregation can be achieved within the same frequency for the power system in the 223-231Mhz. The interval is bands continuous carrier aggregate, non-continuous carrier 7MHz bandwidth between sending and receiving. But each aggregation and different frequency bands within the carrier working frequency bandwidth is small. It is only about tens of aggregation. It analyses the two implementations of carrier kHz. It can’t meet the high bandwidth communications needs aggregation: MAC layer aggregation and physical layer of the smart grid. aggregate. Combined with demand for power applications, the carrier aggregation HARQ hybrid scheduling control policy is In the field of mobile communications, mobile broadband applied, then proposes subcarrier allocation method of the users are growing quickly. The higher peak rate is required for 230MHz band. It can realize the 230MHz frequency band multimedia services and video on demand(VOD) services. In wireless communication system by using carrier aggregation and order to meet the challenges of broadband access and the spectrum-sensing technology. And then completed functional demand for new wireless services, LTE-Advanced (Long testing in laboratory.
    [Show full text]
  • Skytel Mobitex Network System Overview
    SkyTel Mobitex Network System Overview Edition 1.3 October 2008 SKYTEL SYSTEM OVERVIEW Edition 1.3 October 2008 Notice This manual is published by SkyTel, L.L.C. for informational purposes only and is without any warranty whatsoever. The manual and software described in it are copyrighted with all rights reserved. Your rights of ownership are subject to the limitations and restrictions imposed by copyright laws. No portion of this document may be copied, photocopied, reproduced, translated or reduced to any electronic medium or machine form without prior consent from SkyTel. Any physical defects, typographical errors, inaccuracies of current information, improvements to programs, and/or equipment in the manual may be made solely by SkyTel at any time without notice. Such changes will, however, be incorporated into future releases of the manual. Trademark Notice SkyTel is a service mark of SkyTel. Research In Motion, RIM and the RIM logo are registered, U.S. Patent and Trademark Offi ce. Mobitex is a registered trademark of Swedish Telecom. Windows is a trademark of the Microsoft Corporation. All other trade names used herein are trademarks of their respective companies. ©2005 SkyTel All Rights Reserved. 10 Woodbridge Center Drive Woodbridge, New Jersey 07095 Telephone: (732) 602-5500 Fax: (732) 602-5285 http://www.skytel.com Printed in the United States of America. Table of Contents 1. Introduction 1 Overview 1 SkyTel Mobitex Network 1 2. Introduction to Mobitex 4 The Origin of Mobitex 4 Packet Switching 4 Channel Access Mechanism 4 Mobitex System Components 5 Network Control Center 5 Backbone Network 6 Base Station 6 An Open System 7 3.
    [Show full text]
  • Wireless Data Demystified John R
    Wireless Data Demystified John R. Vacca McGraw-Hill New York • Chicago • San Francisco • Lisbon London • Madrid • Mexico City • Milan • New Delhi San Juan • Seoul • Singapore Sydney • Toronto To Dennis Pleticha, the network guy. Library of Congress Cataloging-in-Publication Data Vacca, John R. Wireless data demystified / John R. Vacca. p. cm. Includes bibliographical references and index. ISBN 0-07-139852-X (alk. paper) 1. Wire communication systems. I. Title. TK5103.2.V33 2002 621.382—dc21 2002038692 Copyright © 2003 by The McGraw-Hill Companies, Inc. All rights reserved. Printed in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a data base or retrieval system, without the prior written permission of the publisher. 1234567890 DOC/DOC 08765432 ISBN 0-07-139852-X The sponsoring editor for this book was Stephen S. Chapman, the editing supervisor was Stephen M. Smith, and the production supervisor was Sherri Souffrance. It was set in Century Schoolbook by Victoria Khavkina of McGraw-Hill Professional’s Hightstown, N.J., composition unit. Printed and bound by RR Donnelley. McGraw-Hill books are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. For more information, please write to the Director of Special Sales, McGraw-Hill Professional, Two Penn Plaza, New York, NY 10121-2298. Or contact your local bookstore. This book is printed on recycled, acid-free paper containing a mini- mum of 50% recycled, de-inked fiber.
    [Show full text]
  • 4G Technology
    International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 1 (2013), pp. 67-73 © International Research Publication House http://www.irphouse.com 4G Technology Komal Roll No. 211208, M.tech (ECE) E-mail: nit kurukshetra Abstract The ever increasing growth of user demand, the limitations of the third generation of wireless mobile communication systems and the emergence of new mobile broadband technologies on the market have brought researchers and industries to a thorough reflection on the fourth generation. A pragmatic definition of 4G derived from a new user-centric methodology that considers the user as the “cornerstone” of the design. In this way, the fundamental user scenarios that implicitly reveal the key features of 4G, which are then expressed explicitly in a new framework—the “user-centric” system that describes the various level of interdependency among them. This approach consequently contributes to the identification of the real technical step-up of 4G with respect to 3G. It is supposed to provide its customers with better speed and all IP based multimedia services. 4G is all about an integrated, global network that will be able to provide a comprehensive IP solution where voice, data and streamed multimedia can be given to users on an "Anytime, Anywhere" basis. Introduction With the deployment of 3G (3rd generation mobile communication systems) in process, the interest of many research bodies shifts towards future systems beyond 3G. Depending on the time such new systems are planned to be introduced and on the characteristic of improving or replacing existing systems they are called B3G (beyond 3G) or 4G (4th generation mobile communication system).
    [Show full text]