1
G.V. Nilanka080321GDepartment of Electrical Engineering
Cellular technologies and security
2
Outline………Evolution of Mobile CommunicationWhat is Cellular technology ?What is a cell?What is a cell site?What is a channel?Basic operation in cellularWhat are new cellular features?What are security facts?Protecting your phone
3
Evolution of Mobile CommunicationCellular mobile communicationsystem has gone through 3 stages: 1. First Generation -Analog Mobile Telephone
System 2. Second Generation-Digital Mobile
Communication System (1990)3. Third Generation -2000
4
What is Cellular technology ?• network made up of a number of cells.
• type of two-way radio.
• original 2-way-radio cell towers were at the centers of the cells
• mobile phone network
5
What is a cell?
• The geographical area covered by cellular radio antennas. These areas are called cells.
• we want to depict an area totally covered by radio, without any gaps.
6
What is a cell ?Advantages of hexagon cell structures:
higher capacity, higher number of users
less transmission power needed
base station deals with interference, transmission area
Cell is a service area covered by some BTS.
7
What is a cell site?•The middle circles represent cell sites.
Cell site
8
Highway
TownSuburb
Rural
Cell Distribution in a Network
9
What is a channel?cell phones and base stations transmit or
communicate with each other on dedicated paired frequencies called channels.
Use 4 antennas per one cell.There are main two channels.1. Control channel2. Voice channel
10
Basic operationEach cell site has a base station with a
computerized 800 or 1900 MHz transceiver and an antenna.
1-10 km in radiusThe area size depends on1. Topography2. Population3. Traffic
11
Basic operation
A
12
Basic operationBTS -Base Transceiver Station It is the radio tranmission part of the base
station system. Controlled by BSCBSC -Base Station Controller the control part of BSC performs the
switching function in BSCMSC-Mobile Services Switching Center
obtains all the data for processing subscriber call requests from 3 types of databases (HLR, VLR and AUC).
13
Basic operationVLR – Visitor Location Register
stores all related information of mobile subscribers having entering into its coverage area.
HLR -Home Location Register
stores the related data of all existing mobile subscribers controlled by the same HLR. One HLR can control several mobile switching areas
14
New trends in cellular phones
Video callGPSWi-FiTV phoneOffice softwareSatellite phones
15
What are security facts?
Phone lock
GPS
Bluetooth hacker
Cell phone viruses
16
Cell phone virusesThe first known cell phone virus appeared in
2004.
How viruses spread1. Internet download2. Bluetooth wireless connection3. MMS
17
Protecting your phoneTurn off Bluetooth discoverable mode.
Should know about virus name .
Install the some security software for your phone.
18
THANK YOU
19