SlideShare a Scribd company logo
1. Early Mobile Telephone System Architecture
Traditional mobile service was structured in a fashion similar to television broadcasting: One
very powerful transmitter located at the highest spot in an area would broadcast in a radius of up
to 50 kilometers. The cellular concept structured the mobile telephone network in a different
way. Instead of using one powerful transmitter, many low-power transmitters were placed
throughout a coverage area. For example, by dividing a metropolitan region into one hundred
different areas (cells) with low-power transmitters using 12 conversations (channels) each,
Cellular system architecture
In modern cellular telephony, rural and urban regions are divided into areas according to specific
provisioning guidelines. Deployment parameters, such as amount of cell-splitting and cell sizes,
are determined by engineers experienced in cellular system architecture.
b) Cellular mobile Networks Use different techniques to implement Multiple Access. Describe the
three main technique
1. Frequency division multiple- fdma is the most straightforward of the multiple access schemes
that have been used. as a subscriber comes onto the system, or swaps from one cell to the next,
the network allocates a channel or frequency to each one. in this way the different subscribers are
allocated a different slot and access to the network. as different frequencies are used, the system
is naturally termed frequency division multiple access. this scheme was used by all analogue
systems.
2. Time division multiple-access(tdma) short for time division multiple access,a technology for
delivering digital wireless service using time- division multiplexing. Tdma works by dividing a
radio frequency into time slots and then allocating slots to multiple calls. in this way,a single
frequency can support multiple, simultaneous data channels. Tdma is used by the gsm digital
cellular system.
3. Code division multiple-access- each user is assigned a unique pin code. in cdma, the same
bandwidth is occupied by all the users,however they are all assigned separate codes,which
differentiates them from each other. Users are separated by code not by frequency or time.
Wireless LANS and Cable Ethernet LANS have several similarities and differences. Describe briefly
the key differences
WLAN Ethernet LAN
The WLAN devices are based on IEEE 802.11 family
of standards.
The Ethernet LAN devices are based on IEEE
802.3 standards.
WLAN devices use high energy radio frequency
waves to transmit the data.
Ethernet LAN devices use electric signals to
transmit the data.
Radio frequency waves travel in the space. Hence a
physical connection is not needed between the devices
which are connected to the WLANs.
Electric signals flow over the cables. Hence wired
connection is needed between devices which are
connected to the Ethernet LANs.
WLAN uses half duplex mechanism for
communication.
Ethernet supports full duplex mechanism for
communication when a switch connects using a
single device rather than hub.
WLANs suffer from interference of various types
during travel from source to the destination.
LANs suffer less interference as electric signals
travel using cables.
WLANs use CSMA/CA to avoid collisions in the
network.
Ethernet LANs use CSMA/CD to detect collisions
in the network.
Outline the different generations of Cellular Mobile Network with respect to Data rates
1.SECOND GENERATION (2G)
2G refers to the second generation of mobile networks based on GSM. The radio signals used by
the 1G network were analog, while 2G networks were digital. 2G capabilities were achieved by
allowing multiple users on a single channel via multiplexing. During 2G, cellular phones were
used for data along with voice. Some of the key features of 2G were:
1. Data speeds of up to 64 kbps
2. Use of digital signals instead of analog
3. Enabled services such as SMS and MMS (Multimedia Message)
4. Provided better quality voice calls
5. It used a bandwidth of 30 to 200 KHz
2. THIRD GENERATION (3G)
The 3G standard utilises Universal Mobile Telecommunications System as its core network
architecture. 3G network combines aspects of the 2G network with new technologies and
protocols to deliver a significantly faster data rate. By using packet switching, the original
technology was improved to allow speeds up to 14 Mbps. It used Wide Band Wireless Network
that increased clarity. It operates at a range of 2100 MHz and has a bandwidth of 15-20 MHz.
Some of the main features of 3G are:
1. Speed of up to 2 Mbps
2. Increased bandwidth and data transfer rates
3. Send/receive large email messages
4. Large capacities and broadband capabilities
3. FOURTH GENERATION (4G)
The main difference between 3G and 4G is the data rate. There is also a huge difference between
3G and 4G technology. The key technologies that have made 4G possible are MIMO (Multiple
Input Multiple Output) and OFDM (Orthogonal Frequency Division Multiplexing). The most
important 4G standards are WiMAX and LTE. While 4G LTE is a major improvement over 3G
speeds, it is technically not 4G.
1. Support interactive multimedia, voice, video.
2. High speed, high capacity and low cost per bit 20 mbps.
3. Global and scalable mobile networks.
4. Ad hoc and multi-hop networks.
Describe the at least four components of a Cellular Network
a) Mobile Station (MS)
A mobile station is basically a mobile/wireless device that contains a control unit, a transceiver
and an antenna system for data and voice transmission. For example, in GSM networks, the
mobile station will consist of the mobile equipment (ME) and the SIM card.
b) Air Interface Standard
There are three main air interface protocols or standards: frequency division multiple access
(FDMA), time division multiple access (TDMA) and code division multiple access (CDMA).
These standards are basically the medium access control (MAC) protocols that define the rules
for entities to access the communication medium. These air interface standards allow many
mobile user to share simultaneously the finite amount of radio channels.
c) Base Station (BS)
A base station is a fixed station in a mobile cellular system used for radio communications with
mobile units. They consist of radio channels and transmitter and receiver antenna mounted on a
tower.
d) Databases
Another integral component of a cellular system is the databases. Databases are used to keep
track of information like billing, caller location, subscriber data, etc. There are two main
databases called the Home Location Register (HLR) and Visitor Location Register (VLR). The
HLR contains the information of each subscriber who resides in the same city as the mobile
switching center (MSC). The VLR temporarily stores the information for each visiting subscriber
in the coverage area of a MSC. Thus, the VLR is the database that supports roaming capability.
A cellular communication network is one that uses a large number of low-power wireless
transmitters to create cells. Each cell is fixed only for its service area, and not for the service
users, ensuring mobility. The addition of new cells into the network is also a fairly simple
process, promoting modularity in expansion.

More Related Content

Similar to Early Mobile Telephone System Architecture.docx

Cellular concept
Cellular conceptCellular concept
Cellular conceptgetvibha
 
Telecommunications
TelecommunicationsTelecommunications
Telecommunications
Alisha Dash
 
0 lecture 6 wp wireless protocol
0 lecture 6 wp wireless protocol0 lecture 6 wp wireless protocol
0 lecture 6 wp wireless protocol
umardanjumamaiwada
 
Lecture 2 evolution of mobile cellular
Lecture 2  evolution of mobile cellular Lecture 2  evolution of mobile cellular
Lecture 2 evolution of mobile cellular Chandra Meena
 
438lecture1
438lecture1438lecture1
438lecture1
EssamKasem
 
Wireless Communications Presentati.ppt
Wireless Communications Presentati.pptWireless Communications Presentati.ppt
Wireless Communications Presentati.ppt
Ihtisham Saeed
 
Wc unit1
Wc unit1Wc unit1
Mobile computing unit-I-notes 07.01.2020
Mobile computing unit-I-notes 07.01.2020Mobile computing unit-I-notes 07.01.2020
Mobile computing unit-I-notes 07.01.2020
Ramco Institute of Technology, Rajapalayam, Tamilnadu, India
 
Intro to gsm
Intro to gsmIntro to gsm
Intro to gsmabhi12567
 
Intro To GSM
Intro To  GSMIntro To  GSM
Intro To GSM
Syed Azhar Hussain
 
doc_raj.docx
doc_raj.docxdoc_raj.docx
doc_raj.docx
VENKAT2430
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
Mateen Shahid
 
Mobile communication and computing presentation-161102173611.pdf
Mobile communication and computing presentation-161102173611.pdfMobile communication and computing presentation-161102173611.pdf
Mobile communication and computing presentation-161102173611.pdf
SomnathMule5
 
Basic of 3 g technologies (digi lab_project).pptx [repaired]
Basic of 3 g technologies (digi lab_project).pptx [repaired]Basic of 3 g technologies (digi lab_project).pptx [repaired]
Basic of 3 g technologies (digi lab_project).pptx [repaired]
Shahrin Ahammad
 
Basics of data communication and computer networking (262 kb)
Basics of data communication and computer networking (262 kb)Basics of data communication and computer networking (262 kb)
Basics of data communication and computer networking (262 kb)IMRAN KHAN
 
Mobile communication lectures
Mobile communication lecturesMobile communication lectures
Mobile communication lectures
marwaeng
 
Cellular
CellularCellular
Cellular
GokulRaghu1
 

Similar to Early Mobile Telephone System Architecture.docx (20)

Cellular concept
Cellular conceptCellular concept
Cellular concept
 
Telecommunications
TelecommunicationsTelecommunications
Telecommunications
 
0 lecture 6 wp wireless protocol
0 lecture 6 wp wireless protocol0 lecture 6 wp wireless protocol
0 lecture 6 wp wireless protocol
 
Lecture 2 evolution of mobile cellular
Lecture 2  evolution of mobile cellular Lecture 2  evolution of mobile cellular
Lecture 2 evolution of mobile cellular
 
438lecture1
438lecture1438lecture1
438lecture1
 
Wireless Communications Presentati.ppt
Wireless Communications Presentati.pptWireless Communications Presentati.ppt
Wireless Communications Presentati.ppt
 
Wide band cdma
Wide band cdmaWide band cdma
Wide band cdma
 
Wc unit1
Wc unit1Wc unit1
Wc unit1
 
Mobile computing unit-I-notes 07.01.2020
Mobile computing unit-I-notes 07.01.2020Mobile computing unit-I-notes 07.01.2020
Mobile computing unit-I-notes 07.01.2020
 
Intro to gsm
Intro to gsmIntro to gsm
Intro to gsm
 
Intro To GSM
Intro To  GSMIntro To  GSM
Intro To GSM
 
doc_raj.docx
doc_raj.docxdoc_raj.docx
doc_raj.docx
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Mobile communication and computing presentation-161102173611.pdf
Mobile communication and computing presentation-161102173611.pdfMobile communication and computing presentation-161102173611.pdf
Mobile communication and computing presentation-161102173611.pdf
 
WCDMA_new
WCDMA_newWCDMA_new
WCDMA_new
 
Cellular charles
Cellular charlesCellular charles
Cellular charles
 
Basic of 3 g technologies (digi lab_project).pptx [repaired]
Basic of 3 g technologies (digi lab_project).pptx [repaired]Basic of 3 g technologies (digi lab_project).pptx [repaired]
Basic of 3 g technologies (digi lab_project).pptx [repaired]
 
Basics of data communication and computer networking (262 kb)
Basics of data communication and computer networking (262 kb)Basics of data communication and computer networking (262 kb)
Basics of data communication and computer networking (262 kb)
 
Mobile communication lectures
Mobile communication lecturesMobile communication lectures
Mobile communication lectures
 
Cellular
CellularCellular
Cellular
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Early Mobile Telephone System Architecture.docx

  • 1. 1. Early Mobile Telephone System Architecture Traditional mobile service was structured in a fashion similar to television broadcasting: One very powerful transmitter located at the highest spot in an area would broadcast in a radius of up to 50 kilometers. The cellular concept structured the mobile telephone network in a different way. Instead of using one powerful transmitter, many low-power transmitters were placed throughout a coverage area. For example, by dividing a metropolitan region into one hundred different areas (cells) with low-power transmitters using 12 conversations (channels) each, Cellular system architecture In modern cellular telephony, rural and urban regions are divided into areas according to specific provisioning guidelines. Deployment parameters, such as amount of cell-splitting and cell sizes, are determined by engineers experienced in cellular system architecture. b) Cellular mobile Networks Use different techniques to implement Multiple Access. Describe the three main technique 1. Frequency division multiple- fdma is the most straightforward of the multiple access schemes that have been used. as a subscriber comes onto the system, or swaps from one cell to the next, the network allocates a channel or frequency to each one. in this way the different subscribers are allocated a different slot and access to the network. as different frequencies are used, the system is naturally termed frequency division multiple access. this scheme was used by all analogue systems. 2. Time division multiple-access(tdma) short for time division multiple access,a technology for delivering digital wireless service using time- division multiplexing. Tdma works by dividing a radio frequency into time slots and then allocating slots to multiple calls. in this way,a single frequency can support multiple, simultaneous data channels. Tdma is used by the gsm digital cellular system.
  • 2. 3. Code division multiple-access- each user is assigned a unique pin code. in cdma, the same bandwidth is occupied by all the users,however they are all assigned separate codes,which differentiates them from each other. Users are separated by code not by frequency or time. Wireless LANS and Cable Ethernet LANS have several similarities and differences. Describe briefly the key differences WLAN Ethernet LAN The WLAN devices are based on IEEE 802.11 family of standards. The Ethernet LAN devices are based on IEEE 802.3 standards. WLAN devices use high energy radio frequency waves to transmit the data. Ethernet LAN devices use electric signals to transmit the data. Radio frequency waves travel in the space. Hence a physical connection is not needed between the devices which are connected to the WLANs. Electric signals flow over the cables. Hence wired connection is needed between devices which are connected to the Ethernet LANs. WLAN uses half duplex mechanism for communication. Ethernet supports full duplex mechanism for communication when a switch connects using a single device rather than hub. WLANs suffer from interference of various types during travel from source to the destination. LANs suffer less interference as electric signals travel using cables. WLANs use CSMA/CA to avoid collisions in the network. Ethernet LANs use CSMA/CD to detect collisions in the network.
  • 3. Outline the different generations of Cellular Mobile Network with respect to Data rates 1.SECOND GENERATION (2G) 2G refers to the second generation of mobile networks based on GSM. The radio signals used by the 1G network were analog, while 2G networks were digital. 2G capabilities were achieved by allowing multiple users on a single channel via multiplexing. During 2G, cellular phones were used for data along with voice. Some of the key features of 2G were: 1. Data speeds of up to 64 kbps 2. Use of digital signals instead of analog 3. Enabled services such as SMS and MMS (Multimedia Message) 4. Provided better quality voice calls 5. It used a bandwidth of 30 to 200 KHz 2. THIRD GENERATION (3G) The 3G standard utilises Universal Mobile Telecommunications System as its core network architecture. 3G network combines aspects of the 2G network with new technologies and protocols to deliver a significantly faster data rate. By using packet switching, the original technology was improved to allow speeds up to 14 Mbps. It used Wide Band Wireless Network that increased clarity. It operates at a range of 2100 MHz and has a bandwidth of 15-20 MHz. Some of the main features of 3G are: 1. Speed of up to 2 Mbps 2. Increased bandwidth and data transfer rates 3. Send/receive large email messages 4. Large capacities and broadband capabilities 3. FOURTH GENERATION (4G)
  • 4. The main difference between 3G and 4G is the data rate. There is also a huge difference between 3G and 4G technology. The key technologies that have made 4G possible are MIMO (Multiple Input Multiple Output) and OFDM (Orthogonal Frequency Division Multiplexing). The most important 4G standards are WiMAX and LTE. While 4G LTE is a major improvement over 3G speeds, it is technically not 4G. 1. Support interactive multimedia, voice, video. 2. High speed, high capacity and low cost per bit 20 mbps. 3. Global and scalable mobile networks. 4. Ad hoc and multi-hop networks. Describe the at least four components of a Cellular Network a) Mobile Station (MS) A mobile station is basically a mobile/wireless device that contains a control unit, a transceiver and an antenna system for data and voice transmission. For example, in GSM networks, the mobile station will consist of the mobile equipment (ME) and the SIM card. b) Air Interface Standard There are three main air interface protocols or standards: frequency division multiple access (FDMA), time division multiple access (TDMA) and code division multiple access (CDMA). These standards are basically the medium access control (MAC) protocols that define the rules for entities to access the communication medium. These air interface standards allow many mobile user to share simultaneously the finite amount of radio channels. c) Base Station (BS)
  • 5. A base station is a fixed station in a mobile cellular system used for radio communications with mobile units. They consist of radio channels and transmitter and receiver antenna mounted on a tower. d) Databases Another integral component of a cellular system is the databases. Databases are used to keep track of information like billing, caller location, subscriber data, etc. There are two main databases called the Home Location Register (HLR) and Visitor Location Register (VLR). The HLR contains the information of each subscriber who resides in the same city as the mobile switching center (MSC). The VLR temporarily stores the information for each visiting subscriber in the coverage area of a MSC. Thus, the VLR is the database that supports roaming capability. A cellular communication network is one that uses a large number of low-power wireless transmitters to create cells. Each cell is fixed only for its service area, and not for the service users, ensuring mobility. The addition of new cells into the network is also a fairly simple process, promoting modularity in expansion.