SlideShare a Scribd company logo
Contemporary Telecommunication
Technologies
Contemporary Telecommunication Technologies
•5.1. WCDMA
•5.2. GSM
•5.3. ISDN
•5.4. VPN
Rick Graziani graziani@cabrillo.edu 2
GSM
Global System for Mobile communication
It all started like this
• First telephone (photophone) – Alexander Bell,
1880
• The first car mounted radio
telephone – 1921
Going further
• 1946 – First commercial mobile radio-telephone
service by Bell and AT&T in Saint Louis, USA. Half
duplex(PTT)
• 1973 – First handheld cellular phone – Motorola.
• First cellular net
Bahrein 1978
What’s cellular Phone Network?
HLR,
VLR, AC,
MSC
PSTN
BS
Cellular principles
• Frequency reuse – same frequency in
many cell sites
• Cellular expansion – easy to add new cells
• Handover – moving between cells
• Roaming between networks
GSM Overview
Into the architecture
• Mobile phone is identified by SIM card.
• Key feature of the GSM
• Has the “secret” for authentication
Into the architecture(2)
• BTS – houses the radiotransceivers of the
cell and handles the radio-link protocols with
the mobile
• BSC – manages radio resources (channel
setup, handover) for one or more BTSs
Into the architecture(3)
• MSC – Mobile Switching Center
• The central component of the network
• Like a telephony switch plus everything for a
mobile subscriber: registration,
authentication, handovers, call routing,
connection to fixed networks.
• Each switch handles dozens of cells
Channels
• The physical channel in GSM is the timeslot.
• The logical channel is the information which
goes through the physical ch.
• Both user data and signaling are logical
channels.
TDMA
• Time Division Multiple Access
• Each channel is divided into timeslots, each
conversation uses one timeslot.
• Many conversations are multiplexed into a
single channel.
• Used in GSM
CDMA
• Code Division Multiple Access
• All users share the same frequency all the time!
• To pick out the signal of specific user, this signal is
modulated with a unique code sequence.
ISDN
Digital Telephone Network
Rick Graziani graziani@cabrillo.edu 16
Introducing ISDN
• Telephone companies developed ISDN (Integrated Services Digital
Network) as part of an effort to standardize subscriber services.
• This included the User-Network Interface (UNI), better known as the
local loop.
• The ISDN standards define the hardware and call setup schemes for
end-to-end digital connectivity.
• These standards help achieve the goal of worldwide connectivity by
ensuring that ISDN networks easily communicate with one another.
• In an ISDN network, the digitizing function is done at the user site
rather than the telephone company.
Rick Graziani graziani@cabrillo.edu 17
Cisco Interfaces
• In the United States, the
customer is required to
provide the NT1.
• In Europe and various
other countries, the
telephone company
provides the NT1 function
and presents an S/T
interface to the customer.
S/T interface requires an
NT1 connection.
Rick Graziani graziani@cabrillo.edu 18
BRI S/T Interface – Cisco 2503
VIRTUAL PRIVATE NETWORKS
(VPN)
Traditional Connectivity
What is VPN?
Virtual Private Network is a type of private network
that uses public telecommunication, such as the
Internet, instead of leased lines to communicate.
Became popular as more employees worked in
remote locations.
Terminologies to understand how VPNs work.
Private Networks vs. Virtual Private Networks
Employees can access the network (Intranet)
from remote locations.
Secured networks.
The Internet is used as the backbone for VPNs
Saves cost tremendously from reduction of
equipment and maintenance costs.
Scalability
Remote Access Virtual Private Network
Brief Overview of How it Works
Two connections – one is made to the Internet and the
second is made to the VPN.
Datagrams – contains data, destination and source
information.
Firewalls – VPNs allow authorized users to pass through
the firewalls.
Protocols – protocols create the VPN tunnels.
Four Critical Functions
Authentication – validates that the data was sent
from the sender.
Access control – limiting unauthorized users from
accessing the network.
Confidentiality – preventing the data to be read or
copied as the data is being transported.
Data Integrity – ensuring that the data has not been
altered
Encryption
Encryption -- is a method of “scrambling”
data before transmitting it onto the Internet.
Public Key Encryption Technique
Digital signature – for authentication
Advantages
VS.
Disadvantages
• Eliminating the need for expensive long-distance
leased lines
• Reducing the long-distance telephone charges for
remote access.
• Transferring the support burden to the service
providers
• Operational costs
Advantages: Cost Savings
Flexibility of growth
Efficiency with broadband technology
Advantages: Scalability
VPNs require an in-depth understanding of public
network security issues and proper deployment of
precautions
Availability and performance depends on factors
largely outside of their control
Immature standards
VPNs need to accommodate protocols other than IP
and existing internal network technology
Disadvantages
Industries That May Use a VPN
Healthcare: enables the transferring of confidential patient
information within the medical facilities & health care provider
Manufacturing: allow suppliers to view inventory & allow
clients to purchase online safely
Retail: able to securely transfer sales data or customer info
between stores & the headquarters
Banking/Financial: enables account information to be
transferred safely within departments & branches
General Business: communication between remote
employees can be securely exchanged
Statistics From Gartner-Consulting*
50%
63%
79%
90%
0% 20% 40% 60% 80% 100%
Access to network for
business
partners/customers
Site-to-site connectivity
between offices
Remote access for
employees while
traveling
Remote access for
employees working out
of homes
% of Respondents
Percentages
*Source: www.cisco.com

More Related Content

What's hot

Lec 1 introduction to wireless communication(1)
Lec 1   introduction to wireless communication(1)Lec 1   introduction to wireless communication(1)
Lec 1 introduction to wireless communication(1)
Ravi Patel
 
01 introduction to wireless communications
01   introduction to wireless communications01   introduction to wireless communications
01 introduction to wireless communications
Hussein Khaleel
 
Final Wireless communication PPT
Final Wireless communication PPTFinal Wireless communication PPT
Final Wireless communication PPT
Melkamu Deressa
 
BSNL TRAINING PPT
BSNL TRAINING PPTBSNL TRAINING PPT
BSNL TRAINING PPT
Manideep Srirangam
 
Telecommunication
TelecommunicationTelecommunication
Telecommunication
hamza javed
 
Introduction wireless communication network
Introduction wireless communication networkIntroduction wireless communication network
Introduction wireless communication network
Riazul Islam
 
Telecommunication basics
Telecommunication basicsTelecommunication basics
Telecommunication basics
KUNTAL BANERJEE
 
telecommunication basic 1
telecommunication basic 1telecommunication basic 1
telecommunication basic 1
kasup uditha
 
Chapter 1 - Digital Telecommunication
Chapter 1 - Digital TelecommunicationChapter 1 - Digital Telecommunication
Chapter 1 - Digital Telecommunication
Anang Aris Widodo
 
Wireless networking_ASRao
Wireless networking_ASRaoWireless networking_ASRao
Introduction to-telecommunication-rf
Introduction to-telecommunication-rfIntroduction to-telecommunication-rf
Introduction to-telecommunication-rf
Terra Sacrifice
 
What is Telecom Engineering?
What is Telecom Engineering?What is Telecom Engineering?
What is Telecom Engineering?
Najma Alam
 
Telecommunications and computer networks
Telecommunications and computer networksTelecommunications and computer networks
Telecommunications and computer networks
ichiswa
 
Wireless communication systems-classifications
Wireless communication systems-classificationsWireless communication systems-classifications
Wireless communication systems-classifications
pulugurtha venkatesh
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
M Sabir Saeed
 
Wireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU studentsWireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU students
SURESHA V
 
Wireless communication ppt by dinesh
Wireless communication ppt by dineshWireless communication ppt by dinesh
Wireless communication ppt by dinesh
DINESH TAMBE
 
MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION
Jay Nagar
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
Darshan Maru
 
Modern cellular communication
Modern cellular communicationModern cellular communication
Modern cellular communication
Zaahir Salam
 

What's hot (20)

Lec 1 introduction to wireless communication(1)
Lec 1   introduction to wireless communication(1)Lec 1   introduction to wireless communication(1)
Lec 1 introduction to wireless communication(1)
 
01 introduction to wireless communications
01   introduction to wireless communications01   introduction to wireless communications
01 introduction to wireless communications
 
Final Wireless communication PPT
Final Wireless communication PPTFinal Wireless communication PPT
Final Wireless communication PPT
 
BSNL TRAINING PPT
BSNL TRAINING PPTBSNL TRAINING PPT
BSNL TRAINING PPT
 
Telecommunication
TelecommunicationTelecommunication
Telecommunication
 
Introduction wireless communication network
Introduction wireless communication networkIntroduction wireless communication network
Introduction wireless communication network
 
Telecommunication basics
Telecommunication basicsTelecommunication basics
Telecommunication basics
 
telecommunication basic 1
telecommunication basic 1telecommunication basic 1
telecommunication basic 1
 
Chapter 1 - Digital Telecommunication
Chapter 1 - Digital TelecommunicationChapter 1 - Digital Telecommunication
Chapter 1 - Digital Telecommunication
 
Wireless networking_ASRao
Wireless networking_ASRaoWireless networking_ASRao
Wireless networking_ASRao
 
Introduction to-telecommunication-rf
Introduction to-telecommunication-rfIntroduction to-telecommunication-rf
Introduction to-telecommunication-rf
 
What is Telecom Engineering?
What is Telecom Engineering?What is Telecom Engineering?
What is Telecom Engineering?
 
Telecommunications and computer networks
Telecommunications and computer networksTelecommunications and computer networks
Telecommunications and computer networks
 
Wireless communication systems-classifications
Wireless communication systems-classificationsWireless communication systems-classifications
Wireless communication systems-classifications
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
Wireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU studentsWireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU students
 
Wireless communication ppt by dinesh
Wireless communication ppt by dineshWireless communication ppt by dinesh
Wireless communication ppt by dinesh
 
MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Modern cellular communication
Modern cellular communicationModern cellular communication
Modern cellular communication
 

Similar to Chapter 6 contemporary telecommunication technologies

Mobile computing
Mobile computing Mobile computing
Wireless commmunication ad mobile computing
Wireless commmunication ad mobile computingWireless commmunication ad mobile computing
Wireless commmunication ad mobile computing
danieltilay38
 
5 g
5 g5 g
5 g
aksh07
 
4 g networks
4 g networks4 g networks
4 g networks
Intissar Ahsissen
 
WIRELESS NETWORKS - 4G & BEYOND
WIRELESS NETWORKS - 4G & BEYONDWIRELESS NETWORKS - 4G & BEYOND
WIRELESS NETWORKS - 4G & BEYOND
SATHYARAJ P ECE
 
1 2 3 4 5 g
1 2 3 4 5 g1 2 3 4 5 g
1 2 3 4 5 g
Rishikese MR
 
10700119013_abir.pptx
10700119013_abir.pptx10700119013_abir.pptx
10700119013_abir.pptx
Abir337561
 
Unit1_4G-5G_Part1.pptx
Unit1_4G-5G_Part1.pptxUnit1_4G-5G_Part1.pptx
Unit1_4G-5G_Part1.pptx
devicaf983
 
5g
5g5g
GSM
GSM GSM
ITE7_Chp5.pptx
ITE7_Chp5.pptxITE7_Chp5.pptx
3g
3g3g
3g
3g3g
wireless communication update for the engineer
wireless communication update for the engineerwireless communication update for the engineer
wireless communication update for the engineer
jeevarajan1302
 
Digital Cellular Network Technology
Digital Cellular Network TechnologyDigital Cellular Network Technology
Digital Cellular Network Technology
Dawood Aqlan
 
Lanvisn™ Clouds
Lanvisn™ Clouds Lanvisn™ Clouds
Lanvisn™ Clouds
Mestizo Enterprises
 
GPON Primer
GPON PrimerGPON Primer
GPON Primer
Mestizo Enterprises
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
Online
 
Gsm & mnp(1)
Gsm & mnp(1)Gsm & mnp(1)
Gsm & mnp(1)
Unique003
 
Ntc internship report
Ntc internship reportNtc internship report
Ntc internship report
Federal Urdu University
 

Similar to Chapter 6 contemporary telecommunication technologies (20)

Mobile computing
Mobile computing Mobile computing
Mobile computing
 
Wireless commmunication ad mobile computing
Wireless commmunication ad mobile computingWireless commmunication ad mobile computing
Wireless commmunication ad mobile computing
 
5 g
5 g5 g
5 g
 
4 g networks
4 g networks4 g networks
4 g networks
 
WIRELESS NETWORKS - 4G & BEYOND
WIRELESS NETWORKS - 4G & BEYONDWIRELESS NETWORKS - 4G & BEYOND
WIRELESS NETWORKS - 4G & BEYOND
 
1 2 3 4 5 g
1 2 3 4 5 g1 2 3 4 5 g
1 2 3 4 5 g
 
10700119013_abir.pptx
10700119013_abir.pptx10700119013_abir.pptx
10700119013_abir.pptx
 
Unit1_4G-5G_Part1.pptx
Unit1_4G-5G_Part1.pptxUnit1_4G-5G_Part1.pptx
Unit1_4G-5G_Part1.pptx
 
5g
5g5g
5g
 
GSM
GSM GSM
GSM
 
ITE7_Chp5.pptx
ITE7_Chp5.pptxITE7_Chp5.pptx
ITE7_Chp5.pptx
 
3g
3g3g
3g
 
3g
3g3g
3g
 
wireless communication update for the engineer
wireless communication update for the engineerwireless communication update for the engineer
wireless communication update for the engineer
 
Digital Cellular Network Technology
Digital Cellular Network TechnologyDigital Cellular Network Technology
Digital Cellular Network Technology
 
Lanvisn™ Clouds
Lanvisn™ Clouds Lanvisn™ Clouds
Lanvisn™ Clouds
 
GPON Primer
GPON PrimerGPON Primer
GPON Primer
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
 
Gsm & mnp(1)
Gsm & mnp(1)Gsm & mnp(1)
Gsm & mnp(1)
 
Ntc internship report
Ntc internship reportNtc internship report
Ntc internship report
 

Recently uploaded

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 

Recently uploaded (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 

Chapter 6 contemporary telecommunication technologies

  • 2. Contemporary Telecommunication Technologies •5.1. WCDMA •5.2. GSM •5.3. ISDN •5.4. VPN Rick Graziani graziani@cabrillo.edu 2
  • 3. GSM Global System for Mobile communication
  • 4. It all started like this • First telephone (photophone) – Alexander Bell, 1880 • The first car mounted radio telephone – 1921
  • 5. Going further • 1946 – First commercial mobile radio-telephone service by Bell and AT&T in Saint Louis, USA. Half duplex(PTT) • 1973 – First handheld cellular phone – Motorola. • First cellular net Bahrein 1978
  • 6. What’s cellular Phone Network? HLR, VLR, AC, MSC PSTN BS
  • 7. Cellular principles • Frequency reuse – same frequency in many cell sites • Cellular expansion – easy to add new cells • Handover – moving between cells • Roaming between networks
  • 9. Into the architecture • Mobile phone is identified by SIM card. • Key feature of the GSM • Has the “secret” for authentication
  • 10. Into the architecture(2) • BTS – houses the radiotransceivers of the cell and handles the radio-link protocols with the mobile • BSC – manages radio resources (channel setup, handover) for one or more BTSs
  • 11. Into the architecture(3) • MSC – Mobile Switching Center • The central component of the network • Like a telephony switch plus everything for a mobile subscriber: registration, authentication, handovers, call routing, connection to fixed networks. • Each switch handles dozens of cells
  • 12. Channels • The physical channel in GSM is the timeslot. • The logical channel is the information which goes through the physical ch. • Both user data and signaling are logical channels.
  • 13. TDMA • Time Division Multiple Access • Each channel is divided into timeslots, each conversation uses one timeslot. • Many conversations are multiplexed into a single channel. • Used in GSM
  • 14. CDMA • Code Division Multiple Access • All users share the same frequency all the time! • To pick out the signal of specific user, this signal is modulated with a unique code sequence.
  • 16. Rick Graziani graziani@cabrillo.edu 16 Introducing ISDN • Telephone companies developed ISDN (Integrated Services Digital Network) as part of an effort to standardize subscriber services. • This included the User-Network Interface (UNI), better known as the local loop. • The ISDN standards define the hardware and call setup schemes for end-to-end digital connectivity. • These standards help achieve the goal of worldwide connectivity by ensuring that ISDN networks easily communicate with one another. • In an ISDN network, the digitizing function is done at the user site rather than the telephone company.
  • 17. Rick Graziani graziani@cabrillo.edu 17 Cisco Interfaces • In the United States, the customer is required to provide the NT1. • In Europe and various other countries, the telephone company provides the NT1 function and presents an S/T interface to the customer. S/T interface requires an NT1 connection.
  • 18. Rick Graziani graziani@cabrillo.edu 18 BRI S/T Interface – Cisco 2503
  • 21. What is VPN? Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate. Became popular as more employees worked in remote locations. Terminologies to understand how VPNs work.
  • 22. Private Networks vs. Virtual Private Networks Employees can access the network (Intranet) from remote locations. Secured networks. The Internet is used as the backbone for VPNs Saves cost tremendously from reduction of equipment and maintenance costs. Scalability
  • 23. Remote Access Virtual Private Network
  • 24. Brief Overview of How it Works Two connections – one is made to the Internet and the second is made to the VPN. Datagrams – contains data, destination and source information. Firewalls – VPNs allow authorized users to pass through the firewalls. Protocols – protocols create the VPN tunnels.
  • 25. Four Critical Functions Authentication – validates that the data was sent from the sender. Access control – limiting unauthorized users from accessing the network. Confidentiality – preventing the data to be read or copied as the data is being transported. Data Integrity – ensuring that the data has not been altered
  • 26. Encryption Encryption -- is a method of “scrambling” data before transmitting it onto the Internet. Public Key Encryption Technique Digital signature – for authentication
  • 28. • Eliminating the need for expensive long-distance leased lines • Reducing the long-distance telephone charges for remote access. • Transferring the support burden to the service providers • Operational costs Advantages: Cost Savings
  • 29. Flexibility of growth Efficiency with broadband technology Advantages: Scalability
  • 30. VPNs require an in-depth understanding of public network security issues and proper deployment of precautions Availability and performance depends on factors largely outside of their control Immature standards VPNs need to accommodate protocols other than IP and existing internal network technology Disadvantages
  • 31. Industries That May Use a VPN Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely Retail: able to securely transfer sales data or customer info between stores & the headquarters Banking/Financial: enables account information to be transferred safely within departments & branches General Business: communication between remote employees can be securely exchanged
  • 32. Statistics From Gartner-Consulting* 50% 63% 79% 90% 0% 20% 40% 60% 80% 100% Access to network for business partners/customers Site-to-site connectivity between offices Remote access for employees while traveling Remote access for employees working out of homes % of Respondents Percentages *Source: www.cisco.com