An Analysis of Emerging Security Threats in 3G/4G Cellular Network Deployment in Pakistan

Total Page:16

File Type:pdf, Size:1020Kb

An Analysis of Emerging Security Threats in 3G/4G Cellular Network Deployment in Pakistan International Journal of Computer and Information Technology (ISSN: 2279 – 0764) Volume 04 – Issue 02, March 2015 An Analysis of Emerging Security Threats in 3G/4G Cellular Network Deployment in Pakistan Muhammad Ahmad*, Munam Ali Shah, Manzoor Ilahi Tamimy Department of Computer Science COMSATS Institute of Information Technology Islamabad, Pakistan *Email: mahmad.comsats [AT] gmail.com Abstract—The advancements in wireless communication are where different wireless technologies are merged to form an increasing tremendously. The transition from legacy cellular IP based core network. This technology also provides networks to 3rd Generation (3G) cellular networks and 4th continuous services to their consumer with improved quality Generation (4G) cellular networks has globally taken of service (QoS) fast Internet and mobile TV [4][5]. Other place.The Government of Pakistan has announced the applications of 3G/4G technology are video conferencing, deployment of 3G/4G technology in the country. In this paper, online examination and consultancy by a doctor, and banking we investigate the emerging security threats to 3G/4G cellular industry [6]. Online tutoring, online lecture and quickly network in Pakistan. Our contribution is twofold. Firstly, we tracking student and teachers performance are some of the highlight modern security attacks that can hinder the smooth other exciting features of 3G/4G networks[7][8]. In addition delivery of mobile phone services and secondly, we conduct a to the technical reasons, the service providers must make survey questionnaire about the emerging security threats to mobile users in Pakistan. The results obtained from the survey sure that their infrastructure and services are resilient against reveals some interesting facts which will help the stake holders all kinds of security threats and vulnerabilities. It is very of 3G/4G networks in Pakistan to take appropriate security important for service providers to protect their network measures in time. communication not only for successful commercialization of their services but also for improved users’ experience. Keywords—3G/4G cellular network; security threats; attacks. Before we further explore the modern security threats to 3G/4G networks we briefly review some key features of this technology. I. INTRODUCTION Currently, cellular companies are providing second A. Seamless Verified Handover generation (2G) and 2.5G cellular services in Pakistan. The 3G/4G offers intra-and-inter technology handover. This telecommunication industry has shown a mixed behavior rd th is the characteristic of a base station in 3G network which towards 3 Generation (3G)/4 Generation (4G). Though, ensures service connection with zero or minimum 2G and 2.5G have well-served the end-users and have shown disturbance, and with no notable failure in service quality. efficient results of cellular network performance in Pakistan, This function provides nonstop visible protection of active the 3G/4G network deployment is still showing a nervous service instances and addition of various types of access behavior towards its evolution in Pakistan. Due to major technologies, from Wi-Fi to Orthogonal Frequency-Division security weaknesses in 2G and 2.5G networks [1] and to Multiple (OFDMA)[8][9]. enable data, voice and video transmission at higher rates, the 3G/4G networks are successfully deployed in the country. B. Selection and Detection of Network There is no doubt that 3G will boom the telecom industry The characteristics of mobile terminal with multiple and mobile market of Pakistan because of its salient features radio technologies allow access to multiple networks such as quality of service (QoS), better coverage and higher simultaneously [10]. It improves call quality within cellular data rates. networks[9]. It is also believed that when something new is introduced C. Key Management then society adopts it in both positive and negative aspects. 3G can also negatively impact the market by abusing the best The main security vulnerability in 2G networks has features of 3G networks such as video calling which may been addressed in 3G networks. For improved security badly impact our social lives. As far as services are measure, authentication and key agreement (AKA) [1] compared, 3G offers Universal Mobile Telecommunication method has been developed. The main advantages of AKA System (UTMS) [2]. This is a new locality dependent service are: long authentication keys; stronger hash function; support which promises faster voice and video calling services, fax of mutual authentication[11];support for signaling message and non-stop Internet, mobile applications and multimedia data; massage encryption and user data encryption[12]. content [3]. 4G networks provide a unique environment www.ijcit.com 435 International Journal of Computer and Information Technology (ISSN: 2279 – 0764) Volume 04 – Issue 02, March 2015 D. Quality of Service and Support for Multiple Applications improvements in recent. However, the new security threats [16][17]are still a challenge for researchers and developers. 4G networks are specially designed to support multimedia applications. The developed scheduling C. WiMAX security algorithms for 4G networks provide improved QoS to the end-user[13].4G also provides support for unicast and WiMAX use bothPhysicallayer and Link layer, so multicast services and applications. Enforcement of service thesecurity attacks can be at variance depending on which level agreements (SLA) offer strong confidentiality for method is applied. Currently, WiMAX is using the IEEE multiple applications [8]. 802.16 standard composed of IEEE 802.16-2004 and Table 1: Salient Features of 1G to 4G Cellular Networks Emerging 1G 2G 2.5G 3G 4G Technology Higher Capacity, Completely IP Higher Capacity, Services Analog voice Digital Voice broadband data up to based, speed up to Packetized 2mbps hundreds of MBs NMT, AMPS, Hicap, WCDMA, CDMA Standard GSM, iDEN, D-MPS GPRS, EDGE etc. Single standard CDPD, TACS, ETACS 2000 Data Bandwidth 1.9 kbps 14.4 kbps 384 kbps 2 Mbps 200 Mbps Multiplexing FDMA TDMA, CDMA TDMA, CDMA CDMA CDMA PSTN, Packet Core Network PSTN PSTN Packet Network Internet Network 802.16e-2005 [16] for fixed and mobile architecture. IEEE We briefly reviewed some of the key features of 3G/4G 802.16-2004 defines confidentiality key managing protocol networks. Table 1 summarizes a comparison of different by which mobile station is authorized from the base station features of 1G, 2G, 2.5G, 3G and 4G cellular networks. In [18]. However, in IEEE 802.16-2004 a variety of this paper we investigate security threats and vulnerabilities weaknesses were to 3G/4G deployment in Pakistan and based on survey results, we present appropriate security measures that can be discovered such as access vulnerability, weak encryption set up for secure and efficient usage of 3G/4G cellular key and lastly denial of service (DoS) attacks. The WiMAX networks. The rest of the paper is organized as follow. IEEE 802.16-2005 addresses all the weakness of IEEE Section II reviews related studies. Section III analyzes 802.16-2004. However, it still suffers from few security emerging security threats in Pakistan. Section IV presents weaknesses. Similarly in case of Wi-Fi, it is important to summary and findings and the paper is concluded in Section deploy better security protocols to address all possible IV. known attacks and weakness. D. Possible Threats on 4G. II. RELATED STUDIES The security threats and vulnerabilities to 3G/4G Due to the open nature of 4G, a number of security cellular networks have been intensively investigated. In this risks have emerged. New end-user equipment can also section, we provide an overview of different security aspects become a cause of DoS[19]. One type of attack is VoIP in 3G/4G networks. spam. It is similar to spam in inbox email. Due to the unlocked nature of VoIP, it has become easy for an attacker A. User identity to transmit VoIP Spam over Internet Telephony (SPIT). The Maintaining user individuality during transmission is VoIP threats include the eavesdropping of confidential or very crucial. As sending user identity in plain text can allow private conversation, attacks on user names, password, an eavesdropper to intercept the communication and to track confidential key, credit card and social security number and the subscriber cell locality by means of user International compromise on bank accounts [20]. mobile subscriber identity (IMSI) impersonation and relay E. Social Aspects of 3G/4G. of user message [14]. The 3G/4G technology provides high speed Internet B. Wi-Fi security access to the end-user to use Internet services on cell phone The open environment and less secure behavior of and computer[21]. Fast Internet speed means a new concern wireless LAN has created many security threats. It is very for security threats. The capability of 3G mobile important to secure the Wi-Fi networks in public areas[15]. communications could make a criminal and terrorism Different solutions have been proposed, e.g., [16]. To activity convenient. The development of social networks has summarize, the security of Wi-Fi has made significant exploded over the last 4years [22].According to Facebook website pages, the site has over 200 million active users, of www.ijcit.com 436 International Journal of Computer and Information Technology (ISSN: 2279 – 0764) Volume 04 – Issue 02, March 2015 which over 100 million log on every day [23]. Majority of Our first question was about the awareness of people use Internet and Facebook in positive way but these respondents regarding 3G/4G deployment in Pakistan and are also used for destructive activities.In European their eagerness to use the new technology. The results countries, the high speed Internet connectivity has given obtained are plotted in Figure 2. It could be observed that birth to many dating websites [24] where people meet online 70% of the respondents know about the launch of this with each other. However, this feature should not be technology and are willing to use the services.
Recommended publications
  • TETRA ,Shaahin Bahman85
    شاهين ارتباط تهران شركت مهندسين مشاور شاهين ارتباط تهران 1 شاهين ارتباط تهران اختراع تلفن و شکل گيری شبکه تلفن • 1876 هيﻻدی : هعرفی تلفن توسط گراهام بل • • 2 شاهين ارتباط تهران ظهور هراكس سوئيچ • هيﻻدی : • اختراع سيستن سوئيچينگ هکانيکی توسط براون استراگر 3 شاهين ارتباط تهران اختراع بی سين هوبايل )سيار( چرا سيستن های بی سين –در هر هكانی –در هر زهانی –توام سرويس های هورد نظر در اختيار هشترك قرار گيرد. 4 Mobile شاهين ارتباط تهران بايد به صورتی باشد كه: 5 شاهين ارتباط تهران نسل های سيستن های سيار (NMT , AMPS , TACS) • (GSM900 , DCS1900 , PDC) • TETRA (GPRS, EDGE 2.5 • (UMTS , IMT2000) • Wi-MAX , WLAN , • Board Band GSM 6 شاهين ارتباط تهران PMR • PMR is the oldest form of mobile communications – it has been in use for over 70 years. It is used by many taxi and courier firms, security guards and utility companies. Many rural businesses choose the PMR option, because they find that they simply do not have mobile phone coverage, or they are in an area where the network frequently goes down. 7 First generation شاهين ارتباط تهران هشكﻻت نسل اول • • • • • • • (Roaming) 8 شاهين ارتباط تهران نسل اول ) PMR ( • جهت بهبود در سيستم PMR يا Conventional سيستم ترانك ارائه گرديد. سيستم PMR به دو حالت بودند: • بيسيم های معمولی يا Conventional • بيسيم های ترانك يا سلولی هر دو آنالوگ بودند 9 شبکه های سلولی شاهين ارتباط تهران Cellular System • During the early 1980s – MPT1327 Analog cellular telephone systems were experiencing rapid growth in Europe (in Scandinavia, UK, France and Germany) • In 1983 – American (Advanced) Mobile Phone System (AMPS) developed in USA • In 1985 – Total Access Communication System (TACS) developed in UK • In 1986 – Nordic Mobile Telephony (NMT) 900 developed 10 مزیت شبکه های سلولی شاهين ارتباط تهران cellular network benefit • Group call • Roaming • Supports both semi-duplex and full duplex calls • Average call duration is much shorter • Calls can have multiple levels of priority • Support data applications like AVL 11 2 شاهين ارتباط تهران LIST of Analogue Cellular NMT900 Nordic Mobile Telephones/900.
    [Show full text]
  • Michael Steer
    Michael Steer eyond 3G is the official IEEE desig- classified as shown in Table 1. Few first generation (or nation for the next stage of wireless 1G) systems remain, except in the United States, where technology that some people call 4G AMPS (Advanced Mobile Phone System) remains a or fourth-generation radio. Over the background universal service. Most services are now years, every conceptual shift in wire- second generation (or 2G) dominated by Global System Bless technology has been characterized as a for Mobile Communications (GSM) but also with wide- generational change. With a good dose of spread development of code-division multiple access hindsight, the generations of radio and (CDMA). CDMA is a conceptual advance on the 2G major radio systems in each category are systems typified by GSM and so is commonly classified as 2.5G. Third generation (or 3G) offers a sig- nificant increase in capacity and is the opti- mum system for broadband data access. Third generation includes wideband mobile multimedia networks and broadband mixed wireless systems. The mobile systems support vari- able data rates depending on demand and the level of mobili- ty. Typically 144 kb/s is sup- ported for full vehicular mobil- ity and higher bandwidths for pedestrian levels of mobility. Switched packet radio tech- niques and wideband CDMA- like systems (as the physical channel is) rather than assigned physical channel schemes (referred to as circuit switched) are required to support this band- width-on-demand environment. There are two essential concepts beyond 3G. One of these is the provi- sion of data transmission at rates of 100 Mb/s while mobile and 1 Gb/s while station- ary.
    [Show full text]
  • Tuning Dynamic Power Management for Mobile Devices
    UNIVERSITY OF SOUTHAMPTON Tuning Dynamic Power Management for Mobile Devices by James R.B. Bantock Thesis for the degree of Doctor of Philosophy in the Faculty of Engineering and Physical Sciences School of Electronics and Computer Science January 2021 UNIVERSITY OF SOUTHAMPTON ABSTRACT FACULTY OF ENGINEERING AND PHYSICAL SCIENCES SCHOOL OF ELECTRONICS AND COMPUTER SCIENCE Doctor of Philosophy by James R.B. Bantock Mobile devices have rapidly reached almost ubiquitous adoption amongst the global population. Smartphones have been the catalyst for introduction of high-performance System-on-Chips to mobile devices bringing with them the capability to execute ever more demanding applications but also widespread power management challenges. Tra- ditionally, the foremost power management challenge was extension of battery lifetime. The emergence of sustained performance applications including mobile gaming, Virtual and Augmented Reality has presented a new challenge in constraining performance to within a sustainable thermal envelope. Cooling techniques, limited to passive technolo- gies in mobile devices, have proved insufficient to maintain device skin temperatures below thresholds the human skin can tolerate. Dynamic Power Management policies have been developed to reduce mobile device power consumption to meet both energy and thermal constraints. This thesis proposes and then explores a new area of research in systematic tuning of Dynamic Power Management policies for mobile devices. Static and dynamic configuration of Dynamic Power Management policy parameters are compared to quantify the potential energy and performance improvements. Experi- mental results from a modern mobile device across four applications suggest up to 10% reduction in dropped frames and a 25% reduction in CPU energy consumption.
    [Show full text]
  • Analysis and Survey on Past, Present and Future Generation in Mobile Communication
    IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727 PP 30-36 www.iosrjournals.org Analysis and Survey on Past, Present and Future Generation in Mobile communication Shrikant R Tripathi1 and Sushil Khaparde2 1G.H.Raisoni Institute of Technology Nagpur (M.S.) India 2Bhavbhuti Mahavidyalaya Amgaon Gondia, Dist-Gondia (M.S.) India Abstract: From past year wireless technology makes enormous growth. Evolution of wireless technology is reached at 7.5G. Wireless technology FG (Future generation) mobile communications will have higher data transmission rates in 6G and. 7G. Wireless technology is continuously one of the hottest areas that are developing at a high speed, with advanced techniques emerging in all the fields of mobile and wireless communications. Current times are just the beginning for deploying 5G mobile communication systems. At present we have many technologies each capable of performing functions like supporting voice traffic using voice over IP (VoIP), broadband data access in mobile environment etc., but there is a great need of deploying such technologies that can integrate all these systems into a single unified system. 8G presents a solution of this problem as it is all about seamlessly integrating the terminals, networks and applications. Our aim is to empower the community with world class broadband capabilities, establishing a future-proof groundwork for new ideas and opportunities to build on. The Communications Revolution starts here. Keywords-OFDMA,WiMAX,SDR,MIMO,STBC,0G,1G, 2G, 3G, 4G,5G,6G,7G,CDMA,TDMA,FDMA,GSM I. INTRODUCTION The mobile communication systems and the wireless communication technologies have been proving very fast day by day.
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 9.420.475 B2 Parron Et Al
    USOO9420475B2 (12) United States Patent (10) Patent No.: US 9.420.475 B2 Parron et al. (45) Date of Patent: Aug. 16, 2016 (54) RADIO COMMUNICATION DEVICES AND 6,735,192 B1* 5/2004 Fried ................. HO4L 29,06027 METHODS FOR CONTROLLING ARADO 370,352 6,862.298 B1* 3/2005 Smith et al. ................... 370,516 COMMUNICATION DEVICE 7,103,063 B2 * 9/2006 Fang ........... 370/452 (71) Applicant: Intel Mobile Communications GmbH, 7.961,755 B2* 6/2011 Harel et al. ... 370/466 8,503,414 B2 * 8/2013 Ho et al. ....................... 370,338 Neubiberg (DE) 8,750,849 B1* 6/2014 Adib ....................... HO4L 47.10 (72) Inventors: Jerome Parron, Fuerth (DE); Peter 455,412.2 9,154,569 B1 * 10/2015 Dropps ................... HO4L 67/28 Kroon, Green Brook, NJ (US) 2004/0047331 A1 3/2004 Jang (73) Assignee: INTEL DEUTSCHLAND GMBH, 2004/0170186 A1* 9, 2004 Shao ................... HO4L 12,5693 Neubiberg (DE) 370,412 2005. O152280 A1* 7, 2005 Pollin ..................... HO4L 41.00 (*) Notice: Subject to any disclaimer, the term of this 370,252 patent is extended or adjusted under 35 2006, OO77994 A1 4/2006 Spindola et al. 2006/0251130 A1* 11/2006 Greer ...................... G1 OL 21/04 U.S.C. 154(b) by 0 days. 370,508 (21) Appl. No.: 13/762,408 (Continued) (22) Filed: Feb. 8, 2013 FOREIGN PATENT DOCUMENTS (65) Prior Publication Data CN 1496.157 A 5, 2004 US 2014/022656O A1 Aug. 14, 2014 OTHER PUBLICATIONS (51) Int. Cl. 3GPP TS 26.114 V12.0.0 (Dec. 2012); Technical Specification H0474/00 (2009.01) Group Services and System Aspects; IP Multimedia Subsystem H04/24/02 (2009.01) (IMS); Multimedia Telephony; Media handling and interaction H04L L/20 (2006.01) (Release 12); pp.
    [Show full text]
  • Handbook Land Mobile — Volume 5 Deployment of Broadband Wireless Access Systems
    Land Mobile (including Wireless Access) – Volume 5 Edition 2011 Handbook Land Mobile — Volume 5 Deployment of Broadband Wireless Access Systems *36541* English Edition 2011 Printed in Switzerland Radiocommunication Bureau Geneva, 2011 ISBN 92-61-13691-5 Deployment of Broadband Wireless Access Systems THE RADIOCOMMUNICATION SECTOR OF ITU The role of the Radiocommunication Sector is to ensure the rational, equitable, efficient and economical use of the radio-frequency spectrum by all radiocommunication services, including satellite services, and carry out studies without limit of frequency range on the basis of which Recommendations are adopted. The regulatory and policy functions of the Radiocommunication Sector are performed by World and Regional Radiocommunication Conferences and Radiocommunication Assemblies supported by Study Groups. Inquiries about radiocommunication matters Please contact: ITU Radiocommunication Bureau Place des Nations CH -1211 Geneva 20 Switzerland Telephone: +41 22 730 5800 Fax: +41 22 730 5785 E-mail: [email protected] Web: www.itu.int/itu-r Placing orders for ITU publications Please note that orders cannot be taken over the telephone. They should be sent by fax or e-mail. ITU Sales and Marketing Division Place des Nations CH -1211 Geneva 20 Switzerland Fax: +41 22 730 5194 E-mail: [email protected] The Electronic Bookshop of ITU: www.itu.int/publications ¤ ITU 2011 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. HHaannddbbooookk Land Mobile – Volume 5 Deployment of Broadband Wireless Access Systems English Edition 2011 Radicommunication Bureau - i - DISCLAIMERS, COPYRIGHTS AND TRADEMARKS Disclaimers The information included in this Handbook, such as common names of technical specifications, figures, diagrams, charts, texts, logos or pictures (collectively, “materials”), was compiled by the ITU from a variety of sources.
    [Show full text]
  • 4G Technology
    International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 1 (2013), pp. 67-73 © International Research Publication House http://www.irphouse.com 4G Technology Komal Roll No. 211208, M.tech (ECE) E-mail: nit kurukshetra Abstract The ever increasing growth of user demand, the limitations of the third generation of wireless mobile communication systems and the emergence of new mobile broadband technologies on the market have brought researchers and industries to a thorough reflection on the fourth generation. A pragmatic definition of 4G derived from a new user-centric methodology that considers the user as the “cornerstone” of the design. In this way, the fundamental user scenarios that implicitly reveal the key features of 4G, which are then expressed explicitly in a new framework—the “user-centric” system that describes the various level of interdependency among them. This approach consequently contributes to the identification of the real technical step-up of 4G with respect to 3G. It is supposed to provide its customers with better speed and all IP based multimedia services. 4G is all about an integrated, global network that will be able to provide a comprehensive IP solution where voice, data and streamed multimedia can be given to users on an "Anytime, Anywhere" basis. Introduction With the deployment of 3G (3rd generation mobile communication systems) in process, the interest of many research bodies shifts towards future systems beyond 3G. Depending on the time such new systems are planned to be introduced and on the characteristic of improving or replacing existing systems they are called B3G (beyond 3G) or 4G (4th generation mobile communication system).
    [Show full text]
  • Commonwealth of Virginia Enterprise Technical Architecture (ETA)
    Commonwealth of Virginia Enterprise Technical Architecture (ETA) Networking and Telecommunications Domain Report Version 3.0, October 1, 2008 Prepared by: Virginia Information Technologies Agency (VITA) ETA Networking and Telecommunications Domain Team Networking and Telecommunications Domain Report Version 3.0 10-1-2008 (This Page Intentionally Left Blank) Page 2 of 8 Networking and Telecommunications Domain Report Version 3.0 10-1-2008 2006-08 Networking and Telecommunications Domain Team Members Ric Anderson ........................................................................................ Northrop Grumman Henry Coalter.....................................................................Department of General Services Tim Deely ..........................................................................Department of General Services Leslie Fuentes ............................................................................................City of Hampton Paul Hoppes ................................................................................................................ VITA John Sharp............................................................................................. Northrop Grumman Frank Stott............................................................................................. Northrop Grumman David Williams ........................................................................................................... VITA Mark Willis ................................................................. Virginia
    [Show full text]
  • Moxa Industrial Wireless Guidebook
    Copyright © 2007 by Moxa Technologies Co., Ltd. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without permission from Moxa Technologies Co., Ltd. Trademark Credits The Moxa Technologies logo is a registered trademark of Moxa Technologies Co., Ltd. All other trademarks mentioned in this document are the property of their respective owners. 1st Printing November 2007 Preface The latest development in industrial device networking is the adoption of wireless technology for industrial applications. This is a very exciting development with potentially enormous benefits for system integrators and end users. However, many users may have questions about the different technologies that are available and how best to adapt them to specific applications. Other users may wish to gain a basic understanding of wireless technologies and applications but not know where to begin. The Industrial Wireless Guidebook was conceived as a helpful introduction to the wireless technologies now being used for industrial applications. Readers can learn basic terminology, the strengths and weaknesses of various wireless technologies, and how to decide on a wireless solution for a specific application. Detailed examples are provided to show how wireless technology is being used in different industries, and can serve as a starting point in developing your own project. Having been in the business for over twenty years, Moxa has been both a witness and participant to many developments in device networking technology. As new standards, interfaces, and protocols appear, we have kept pace and developed products that help integrate different technologies into one system.
    [Show full text]
  • 0G (Zero Generation) Basically, 0G Known As a Mobile Radio
    0G (Zero Generation) Basically, 0G known as a mobile radio transmission that allows two way communications using analog signal. This technologies was been develop in year 1945 where when it been introduce, Mobile Telephone Service were not officially categorized as mobile phones yet, since they did not support the automatic change of channel frequency during calls, which allows the user to move from one cell to another cell, a feature called "handover". These early mobile telephone systems can be distinguished from earlier closed radiotelephone systems in that they were available as a commercial service that was part of the public switched telephone network, with their own telephone numbers, rather than part of a closed network such as a police radio or taxi dispatch system. These mobile telephones were usually mounted in cars or trucks, though briefcase models were also made. Typically, the transceiver (transmitter-receiver) was mounted in the vehicle trunk and attached to the "head" (dial, display, and handset) mounted near the driver seat. They were sold through WCCs known as Wire line Common Carriers, or telephone companies, RCCs known as Radio Common Carriers and two-way radio dealers. There are some examples for these technologies such as: - For what that Motorola and Bell System used to operate the first commercial mobile telephone service MTS in United State of America as the service of the wireline telephone company - A-Netz has launched in 1952 in West Germany as their first public commercial mobile phone network - First automatic system from Bell System͛s IMTS that was available in 1962. 1G (First Generation) Also know as first-generation of wireless telephone technology is base on analog signal which is a radio signal that transmit data with wave-like form.
    [Show full text]
  • 1Xev-DO Revision a System to Realize Wireless Broadband Communications
    Hitachi Review Vol. 56 (Dec. 2007) 145 1xEV-DO Revision A System to Realize Wireless Broadband Communications Yoshitaka Iida OVERVIEW: 1xEV-DO Revision A is a cell phone system that achieves high- Kiyoshi Kawamoto speed data transmission of up to 3.1 Mbit/s on the downlink, and up to 1.8 Mbit/s on the uplink using the same frequency band as existing 1xEV-DO Yusuke Takemichi (1.25 MHz). It is worthy of being called a pioneering wireless broadband Katsuhiko Tsunehara technology. To realize advanced services such as the video telephony, the Toshiyuki Saito Hitachi Group has applied that technology to build a commercial system. To cope with diversification in wireless broadband services, standardization organizations have been studying various next-generation wireless access systems, and Hitachi, too, is harnessing the strength of the Group to aggressively take up the challenge of mobile communication development. INTRODUCTION communication delay control. Since December 2006, AS the use of cell phones spreads, there is a rising call KDDI has been deploying EV-DO Rev. A as the for the use of cellular mobile terminals for services infrastructure of a broadband mobile network that can such as mail, Internet access, music and video provide all-IP services such as video telephony that distribution from anywhere within an area. In response uses VoIP (Voice over IP, a technology for sending to that demand, the 3GPP2 (3rd Generation Partnership and receiving voice data over the Internet or other IP Project 2) international specification organization has network). set the standard called 1xEV-DO (1x evolution-data Here, we describe Hitachi’s configuration of the only) Release 0 (referred to as EV-DO Rel.
    [Show full text]
  • Studies on Interference Compensation Techniques and Performance Evaluation for Digital Radio Systems
    Studies on Interference Compensation Techniques and Performance Evaluation for Digital Radio Systems 著者 上野 衆太 year 2015 その他のタイトル デジタル無線システムにおける干渉補償技術とその 性能評価に関する研究 学位授与大学 筑波大学 (University of Tsukuba) 学位授与年度 2014 報告番号 12102甲第7307号 URL http://hdl.handle.net/2241/00129358 Studies on Interference Compensation Techniques and Performance Evaluation for Digital Radio Systems Graduate School of Systems and Information Engineering University of Tsukuba March 2015 Shuta Uwano Abstract This dissertation presented research results regarding techniques that improve interference compensation and performance evaluation in digital radio systems. As mobile Internet access becomes more widely used and the ubiquity of radio communication devices increases, interference issues will becomes more serious in light of the lack of unused frequency bands. Interference compensation techniques must be established in order to avoid interference in the same system and the interference between different systems, or to expand the coverage area. Interference compensation techniques should be provided without the need to change standard specifications, because interference may not always occur. However, conventional interference compensation schemes have four main problems that must be addressed to achieve high performance in digital radio systems. (1) The problem of adjacent channel interference (ACI) in the wireless local area network (LAN) system is caused by nonlinear distortion characteristics of high power amplifiers at the transmitter. (2) The problem of co-channel interference (CCI) occurs between base stations (BSs) in Personal Handy-phone System (PHS) when there is mutual overlapping in a zone in a mixed cell architecture. (3) The problem of the same path interference (SPI) between two routes in a fixed microwave communication system occurs when the desired signal level is degraded by fading.
    [Show full text]