Mobile Network Systems

Mobile communication systems were initially designed to carry voice traffic with limited support for packet and messaging services. The constant increase in demand for packet traffic evolved the mobile networks to ultimately become data pipes with support for mobility. While the mobile applications changed dramatically over time, the fundamental principles for mobile service delivery remain the same to a large extend in every network generation. These principles are important to form the investigative context and identify the sources of network evidence with the highest probative value. This chapter details the mobile service delivery fundamentals together with the key features implemented in each mobile network generation. In practice, the sources of mobile network evidence belong to network segments from different generations; therefore, the fundamentals are necessary to establish an effective forensics plan and maximize the investigative outcome.

2011 ◽  
pp. 251-272
Author(s):  
Hitha Alex ◽  
Mohan Kumar ◽  
Behrooz A. Shirazi

Service discovery is an important component of wireless and mobile network systems. An efficient service discovery mechanism would ensure high availability of services to users and applications, and high utilization of services. In this chapter, we discuss various issues and challenges facing the design and selection of a proper service discovery mechanism. This chapter also investigates service discovery mechanisms such as SLP, Jini, Salutation, and others, and assesses their suitability for applications in wireless and mobile environments.


2020 ◽  
Vol 57 (5) ◽  
pp. 30-38
Author(s):  
G. Ancans ◽  
E. Stankevicius ◽  
V. Bobrovs ◽  
G. Ivanovs

AbstractThe 694–790 MHz band (700 MHz) known also as the second digital dividend was allocated to the mobile radiocommunication service on a primary basis in Region 1 and identified to International Mobile Telecommunications by the World Radiocommunication Conference 2012 (WRC-12). The designation of mobile service in Europe and other countries of Region 1 in 700 MHz band was obtained after the World Radiocommunication Conference 2015 (WRC-15). Administrations of Region 1 will be able to plan and use these frequencies for mobile networks, including IMT. The goal of this study is to estimate the electromagnetic compatibility of Digital Video Broadcasting – Terrestrial (DVB-T/DVB-T2) and LTE (Long Term Evolution) technology operating both in 700 MHz band. The study assumes frequency division duplex (FDD) channel arrangement of 703–733 MHz (for uplink) and of 758–788 MHz (for downlink).The model contains two parts: a DVB-T/DVB-T2 system and LTE mobile broadband network. Co-channel scenario is considered in this paper, and possible impact of DVB-T/DVB-T2 on LTE base stations (receivers) is also investigated. The Monte Carlo simulations within SEAMCAT software and the Minimum Coupling Loss (MCL) method are used for interference investigation. The coordination trigger field strength value predetermined by GE06 Agreement is also used in this study. The Monte Carlo method presents more relaxed electromagnetic compatibility scenario in comparison with the MCL method. For SEAMCAT simulations, ITU-R P.1546-5 radio propagation model is used.The obtained results present the required minimum separation distance between DVB-T/DVB-T2 and LTE networks in the 694–790 MHz in order to provide the necessary performance of LTE mobile network.


Author(s):  
G. Manohar ◽  
D. Kavitha ◽  
S. Sreedhar

Intermittently connected mobile Network systems represent a challenging environment for networking research, due to the problems of ensuring messages delivery in spite of frequent disconnections and random meeting patterns. These networks fall into general category of Delay Tolerant Networks. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks, etc. In this context, traditional routing schemes fail, because they try to establish complete end-to-end paths, before any packet is sent. To deal with such networks, researches introduced flooding based routing schemes which leads to high probability of delivery. But the flooding based routing schemes suffered with contention and large delays. Here the proposed protocol “Spraying with performed by a node upon reception of an Acknowledgment message”, sprays a few message copies into the network, neighbors receives a copy and by that relay nodes we are choosing the shortest route and then route that copy towards the destination, if packets reach its destination which that node diffuse Acknowledment with Autonomic behaviour and discard messages. Previous works assumption is that there is no contention and unreachable nodes. But we argue that contention and unreachable nodes must be considered for finding efficiency in routing. So we are including a network which has contention and unreachable nodes and we applied the proposed protocol. So, we introduce new routing mechanism for Diffusion Based Efficient Spray Routing in Intemittently Connected Mobile Networks with Multiple Copies.


2018 ◽  
Author(s):  
Phanidra Palagummi ◽  
Vedant Somani ◽  
Krishna M. Sivalingam ◽  
Balaji Venkat

Networking connectivity is increasingly based on wireless network technologies, especially in developing nations where the wired network infrastructure is not accessible to a large segment of the population. Wireless data network technologies based on 2G and 3G are quite common globally; 4G-based deployments are on the rise during the past few years. At the same time, the increasing high-bandwidth and low-latency requirements of mobile applications has propelled the Third Generation Partnership Project (3GPP) standards organization to develop standards for the next generation of mobile networks, based on recent advances in wireless communication technologies. This standard is called the Fifth Generation (5G) wireless network standard. This paper presents a high-level overview of the important architectural components, of the advanced communication technologies, of the advanced networking technologies such as Network Function Virtualization and other important aspects that are part of the 5G network standards. The paper also describes some of the common future generation applications that require low-latency and high-bandwidth communications.


Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


Electronics ◽  
2021 ◽  
Vol 10 (6) ◽  
pp. 732
Author(s):  
Avner Elgam ◽  
Yael Balal ◽  
Yosef Pinhasi

Many communication systems are based on the Multiple Input, Multiple Output (MIMO) scheme, and Orthogonal Space–time Block Transmit diversity Coding (OSTBC), combined with Maximal Ratio Receive Combining (MRRC), to create an optimal diversity system. A system with optimal diversity fixes and optimizes the channel’s effects under multi-path and Rayleigh fading with maximum energy efficiency; however, the challenge does not end with dealing with the channel destruction of the multi-path impacts. Susceptibility to interference is a significant vulnerability in future wireless mobile networks. The 5th Generation New Radio (5G-NR) technologies bring hundreds of small cells and pieces of User Equipment (UE) per indoor or outdoor local area scenario under a specific Long Term Evolution (LTE)-based station (e-NodeB), or under 5G-NR base-station (g-NodeB). It is necessary to study issues that deal with many interference signals, and smart jammers from advanced communication equipment cause deterioration in the links between the UE, the small cells, and the NodeB. In this paper, we study and present the significant impact and performances of 2×2 Alamouti Phase-Shift Keying (PSK) modulation techniques in the presence of an interferer and a smart jammer. The destructive effects affecting the MIMO array and the advanced diversity technique without closed-loop MIMO are analyzed. The performance is evaluated in terms of Bit Error Rate (BER) vs. Signal to Interference Ratio (SIR). In addition, we proved the impairment of the orthogonal spectrum assumption mathematically.


Author(s):  
Elarbi Abderraouf ◽  
Abdesselam Bassou ◽  
Mohamed Rida Lahcene Rida Lahcene

<p>Thanks to the success of smart phones and mobile-ready laptops, data traffic has recently grown exponentially, and the demand for mobile data has risen very dramatically. These requests in large capacity can only be satisfied by a high efficiency and a very good optimization of the infrastructures of the mobile networks, while taking into account the constraints which are the power, bandwidth and a limited complexity. The task of developing mobile technologies has also evolved from a national or regional focus to a complex and growing mission, supported by global standards development organizations such as 3GPP (3rd Group Partnership Project). Through this research, we present everything related to the simulation of the 4G mobile network system (LTE), which can provide high data flow with good quality, through three model channels known as (EPA, EVA, ETU). In this work we focus on the block ‘iterative decoding channel encoder’ in the LTE system, where the iterative channel coding called ‘Turbo-code’ (TC) is substituted by the iterative coding channel called ‘Unpunctured Turbo Trellis-coded Modulation’ (UTTCM). The simulation results showed that with less decoding complexities, UTTCM's LTE system gives good performance (in terms of BER).</p>


Author(s):  
Marzook Khatri

Abstract: The deployment of 5G mobile communication networks is just getting started right now. There are numerous technologies available today, each capable of fulfilling activities such as enabling voice traffic via voice over IP (VoIP), providing broadband data access in mobile environments, and so on. However, there is a pressing need to implement technology that can bring all of these systems together into a single unified system. Because it is all about smoothly integrating terminals, networks, and applications, 8G presents a solution to this dilemma. In this work, an attempt is made to provide a study of various cellular technologies, such as 4G, 5G, 6G, 7G, and FG, as well as a detailed comparison between them. With the introduction of network virtualization and the implementation of 5G/IoT, mobile networks will become more complicated and offer more diverse services. This raises concerns about a considerable increase in the workload of network operations. Meanwhile, artificial intelligence (AI) is advancing rapidly and is projected to alleviate human resource shortages in a variety of industries. Similarly, the mobile industry is gaining traction in the application of artificial intelligence (AI) to network operations in order to improve the efficiency of mobile network operations. This paper will address the idea of using AI technology to network operations and will give various use examples to demonstrate that AI-driven network operations have a bright future. Keywords: 5G & 6G networks, Artificial Intelligence, Next generation network, Future Advancement.


Sign in / Sign up

Export Citation Format

Share Document