Download - Cellular technologies and security
![Page 1: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/1.jpg)
1
G.V. Nilanka080321GDepartment of Electrical Engineering
Cellular technologies and security
![Page 2: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/2.jpg)
2
Outline………Evolution of Mobile CommunicationWhat is Cellular technology ?What is a cell?What is a cell site?What is a channel?Basic operation in cellularWhat are new cellular features?What are security facts?Protecting your phone
![Page 3: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/3.jpg)
3
Evolution of Mobile CommunicationCellular mobile communicationsystem has gone through 3 stages: 1. First Generation -Analog Mobile Telephone
System 2. Second Generation-Digital Mobile
Communication System (1990)3. Third Generation -2000
![Page 4: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/4.jpg)
4
What is Cellular technology ?• network made up of a number of cells.
• type of two-way radio.
• original 2-way-radio cell towers were at the centers of the cells
• mobile phone network
![Page 5: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/5.jpg)
5
What is a cell?
• The geographical area covered by cellular radio antennas. These areas are called cells.
• we want to depict an area totally covered by radio, without any gaps.
![Page 6: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/6.jpg)
6
What is a cell ?Advantages of hexagon cell structures:
higher capacity, higher number of users
less transmission power needed
base station deals with interference, transmission area
Cell is a service area covered by some BTS.
![Page 7: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/7.jpg)
7
What is a cell site?•The middle circles represent cell sites.
Cell site
![Page 8: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/8.jpg)
8
Highway
TownSuburb
Rural
Cell Distribution in a Network
![Page 9: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/9.jpg)
9
What is a channel?cell phones and base stations transmit or
communicate with each other on dedicated paired frequencies called channels.
Use 4 antennas per one cell.There are main two channels.1. Control channel2. Voice channel
![Page 10: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/10.jpg)
10
Basic operationEach cell site has a base station with a
computerized 800 or 1900 MHz transceiver and an antenna.
1-10 km in radiusThe area size depends on1. Topography2. Population3. Traffic
![Page 11: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/11.jpg)
11
Basic operation
A
![Page 12: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/12.jpg)
12
Basic operationBTS -Base Transceiver Station It is the radio tranmission part of the base
station system. Controlled by BSCBSC -Base Station Controller the control part of BSC performs the
switching function in BSCMSC-Mobile Services Switching Center
obtains all the data for processing subscriber call requests from 3 types of databases (HLR, VLR and AUC).
![Page 13: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/13.jpg)
13
Basic operationVLR – Visitor Location Register
stores all related information of mobile subscribers having entering into its coverage area.
HLR -Home Location Register
stores the related data of all existing mobile subscribers controlled by the same HLR. One HLR can control several mobile switching areas
![Page 14: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/14.jpg)
14
New trends in cellular phones
Video callGPSWi-FiTV phoneOffice softwareSatellite phones
![Page 15: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/15.jpg)
15
What are security facts?
Phone lock
GPS
Bluetooth hacker
Cell phone viruses
![Page 16: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/16.jpg)
16
Cell phone virusesThe first known cell phone virus appeared in
2004.
How viruses spread1. Internet download2. Bluetooth wireless connection3. MMS
![Page 17: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/17.jpg)
17
Protecting your phoneTurn off Bluetooth discoverable mode.
Should know about virus name .
Install the some security software for your phone.
![Page 18: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/18.jpg)
18
THANK YOU
![Page 19: Cellular technologies and security](https://reader038.vdocuments.net/reader038/viewer/2022110307/55545621b4c905b2428b5442/html5/thumbnails/19.jpg)
19