The Digital Wireless Telephony comprise of two main working technologies:
GSM which stands for Global System for Mobile Communication.
CDMA which stands for Code Division Multiple Access.
Rest is explained in the slides
A wireless sensor network has important applications such as remote environmental monitoring and target tracking, particularly in recent years with the help of sensors that are smaller, cheaper, and intelligent. Sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. A WSN consists of a number of sensor nodes (few tens to thousands) working together to monitor a region to obtain data about the environment. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the applications design objectives, cost, hardware, and system constraints.
Current Activities in WSN: Developing test bed for target tracking Using Passive Infrared and Ultrasonic Sensors Improving the delivery rate in low power wireless networks .Guided Navigation of Friendly Vehicle towards tracked Object. Design and development of smart mines and explosive ordinance for intelligent activation and deactivation and safe recovery based on secure WSN. Design of a data mule for data collection from remotely placed sensor nodes
The course gives the thorough concepts of the wireless sensor networks, applications examples. It also gives detailed study of sensor node architecture and various protocols used in wireless sensor networks. It also covers issues related to topology, clustering ,synchronization and operating execution environment used for wireless sensor networks.
A high level introductory look at what is meant by Fixed Wireless Access or FWA that is being touted as one of the initial 5G use cases. This presentation (with embedded video) introduces FWA and looks at a practical deployment example.
A wireless sensor network has important applications such as remote environmental monitoring and target tracking, particularly in recent years with the help of sensors that are smaller, cheaper, and intelligent. Sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. A WSN consists of a number of sensor nodes (few tens to thousands) working together to monitor a region to obtain data about the environment. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the applications design objectives, cost, hardware, and system constraints.
Current Activities in WSN: Developing test bed for target tracking Using Passive Infrared and Ultrasonic Sensors Improving the delivery rate in low power wireless networks .Guided Navigation of Friendly Vehicle towards tracked Object. Design and development of smart mines and explosive ordinance for intelligent activation and deactivation and safe recovery based on secure WSN. Design of a data mule for data collection from remotely placed sensor nodes
The course gives the thorough concepts of the wireless sensor networks, applications examples. It also gives detailed study of sensor node architecture and various protocols used in wireless sensor networks. It also covers issues related to topology, clustering ,synchronization and operating execution environment used for wireless sensor networks.
A high level introductory look at what is meant by Fixed Wireless Access or FWA that is being touted as one of the initial 5G use cases. This presentation (with embedded video) introduces FWA and looks at a practical deployment example.
LTE Basic Parameters, Data Rates, Duplexing & Accessing, Modulation, Coding & MIMO, Explanation of different nodes and Advantage & Disadvantages of different nodes.
Visit www.seminarlinks.blogspot.com to Download
WiMAX is a digital wireless data communication system that can deliver high-speed broadband services up to a large distance of 50KMs.The name WiMAX was created by WiMAX forum, the consortium promoting this standard. The term WiMAX is derived from the phrase Worldwide Interoperability for Microwave Access.
Wireless communications is a type of data communication that is performed and delivered wirelessly. This is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
↓↓↓↓ Read More:
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Mobile Networks Architecture and Security (2G to 5G)
+ Mobile Networks History 2G/3G/4G/LTE/5G
+ CS/PS/EPC/5GC Core Network Elements Overview
+ Mobile Networks Basic Scenarios
+ Mobile Network Security
+ Authentication / Ciphering
LTE Basic Parameters, Data Rates, Duplexing & Accessing, Modulation, Coding & MIMO, Explanation of different nodes and Advantage & Disadvantages of different nodes.
Visit www.seminarlinks.blogspot.com to Download
WiMAX is a digital wireless data communication system that can deliver high-speed broadband services up to a large distance of 50KMs.The name WiMAX was created by WiMAX forum, the consortium promoting this standard. The term WiMAX is derived from the phrase Worldwide Interoperability for Microwave Access.
Wireless communications is a type of data communication that is performed and delivered wirelessly. This is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
↓↓↓↓ Read More:
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Mobile Networks Architecture and Security (2G to 5G)
+ Mobile Networks History 2G/3G/4G/LTE/5G
+ CS/PS/EPC/5GC Core Network Elements Overview
+ Mobile Networks Basic Scenarios
+ Mobile Network Security
+ Authentication / Ciphering
Rape in India - A study by Juxt in public interestJuxtConsult
A study to bring forward the real situation of rapes in India. We at Juxt decided to understand public perception and actual reported crime data better.
Reason: We believed that there is lot more which needs to be told to the people of this country…
GSM-architecture-Location tracking and call setup- Mobility management- Handover-
Security-GSM SMS –International roaming for GSM- call recording functions-subscriber and
service data mgt –-Mobile Number portability -VoIP service for Mobile Networks – GPRS –
Architecture-GPRS procedures-attach and detach procedures-PDP context procedure-
combined RA/LA update procedures-Billing
WAP- Wireless Application Protocol
by
Team 11 Presenters:
Suma Pramod Connie Barbosa
Niti Pandey Patrick Cunning
Olga Pavlenko
This ppt contains the topic like,,
WAP Introduction,
WAP architecture requirements,
Architecture overview,
World-wide web model,
WAP model,
Components of WAP architecture,
Sample Configuration of WAP technology,
Usage, Advantages & Disadvantages of WAP,
Wireless Application Protocol (WAP),
Wireless Markup Language (WML),
Generating WML with XSLT,
WAP Emulator.
INDIAN REGIONAL NAVIGATIONAL SATELLITE SYSTEM (IRNSS)Yelendher Reddy
1. THE BEGINNING
2. WHY?
3. SERVICES
4. ARCHITECTURE
5. SATELLITES
6. IRNSS COVERAGE
7. BENEFITS
Approved by Government of India in May 2006.
The total cost of the project is expected to be ₹1420 crore (US$209 million).
the full system comprises nine satellites.
3 satellites in GEO orbit.
4 satellites in GSO orbit.
2 on the ground as stand-by.
Third country in the world to have it’s own navigational system.
Indian military depending on American GPS during Wars.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Hybrid Compression Encryption Technique for Securing SMSCSCJournals
Mobile communication devices have become popular tools for gathering and disseminating information and data. When sensitive information is exchanged using SMS, it is crucial to protect the content from eavesdroppers as well as ensuring that the message is sent by a legitimate sender. Using an encryption technique to secure SMS data increases its length and accordingly the cost of sending it. This paper provides a hybrid compression encryption technique to secure the SMS data. The proposed technique compresses the SMS to reduce its length, then encrypts it using RSA algorithm. A signature is added to the encrypted SMS for signing it to differentiate it from other SMS messages in SMSINBOX. The experimental results which are based on Symbian OS show that the proposed technique guarantees SMS data security without increasing its size.
SMS(Short Message Service)plays vital role in
day to day life. SMS used in many real world application like
Transportation Information System, private health facilities
using SMS, mobile banking, participation in elections through
SMS, in Crime Scene Investigation and many more.The major
problem facing in SMS is security ,while transferring message
like account number or password from one user to another
user it just taken as a plain text so there some type of attacks
like man in the middle attack, disclosure, replay attack takes
place and causing a huge risk. The traditional SMS service
does not provide information security like confidentiality,
integrity, authenticity. The attacker can alter SMS Information
using weak encryption algorithm like A5/1 or A5/2.The existing
protocol used for providing security in SMS is based on
asymmetric and symmetric key. To provide secure end to end
communication Easy SMS protocol is used which is completely
based on symmetric key. On applying AES algorithm it may
provide effective encryption for password. The expecting result
on using Easy SMS protocol is to reduce bandwidth
consumption and increasing the password or pass code
strength through SMS.
The GSM standard was developed by the Groupe SpecialMobile, which was an initiative of the Conference of European Post and Telecommunications (CEPT) administrations.
The responsibility for GSM standardization now resides with the
Special Mobile Group (SMG) under the European Telecommunication Standard Institute (ETSI).
Fully digital system utilizing the 900MHz frequency band.
TDMA over radiocarriers(200 kHz carrier spacing)
8 full rate or 16 half rate TDMA channels per carrier
User/terminal authentication for fraud control
Encryption of speech and data transmissions over the radio path
Full international roaming capability
Low speed data services (upto 9.6kb/s)
Compatibility with ISDN for supplementary services
Support of short message services(SMS)
GSM supports a range of basic and supplementary services, and these services are defined analogous to those for ISDN(i.e.,bearer services, teleservices, and supplementary services).
The most important service supported by GSM is Telephony.
Other services derived from telephony included in the GSM specification are emergency calling and voice messaging.
Bearer services supported in GSM include various asynchronous and synchronous data services for information transfer.
Teleservices based on these bearer services include group 3 fax and short message service(SMS)
The data capabilities of GSM have now been enhanced to include high speed circiut-switched data(HSCSD) and general packet radio service (GPRS).
Call offering services call forwarding
Call resrtiction services call barring
Call waiting service
Call hold service
Multi party service tele conferencing
Calling line presentation restriction services
Advice of charge service
Closed user group service
The GSM System comprises of Base Transceiver Station (BTS), Base Station Controllers (BSC), Mobile Switching Centers (MSC), and set of registers (databases) to assist in mobility management and security functions.
All signaling between the MSC and the various registers (databases) as well as between the MSCs takes place using the Signaling System 7(SS7) network, with the application level messages using the Mobile Application Protocol (MAP) designed specifically for GSM.
The MAP protocol utilizes the lower layer functions from the SS7 protocol stack.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
2. Key Concepts
The Digital Wireless Telephony
comprise of two main working
technologies:
GSM which stands for Global System
for Mobile Communication.
CDMA which stands for Code Division
Multiple Access.
3. GSM Technology
More than 690 mobile networks provide GSM
services in more than 213 countries which
means in total 82.4% people globally uses
GSM mobile connections.
China being on the top followed by Russia,
India & USA.
GSM is a “ time division” system, thus
sometimes called as TDMA.
4. CDMA Technology
Both GSM and CDMA are multiple access
technologies.
CDMA employs spread-spectrum technology
and a special coding scheme (where each
transmitter is assigned a code).
Spread spectrum is a form of wireless
communications in which the frequency of the
transmitted signal is deliberately varied. This
results in a much greater bandwidth than the
signal would have if its frequency were not
varied.
5. Difference between the two
In CDMAs, there is one physical channel and a
special code for every device in the coverage
network. Using this code, the signal of the
device is multiplexed, and the same physical
channel is used to send the signal.
In GSMs, every cell has a corresponding
network tower, which serves the mobile
phones in that cellular area which in turn
makes GSMs more accessible as they work on
multiple frequency bands
(850/900/1800/1900MHz).
6. Network services in CDMAs are Handset-Specific
whereas in GSMs are SIM-Specific. User has option
to select handset of his choice.
Frequency-time comparison:
7. SMS, what is it ?
Short Message Service (SMS) is a text messaging
service component of phone, Web, or mobile
communication systems. It uses standardized
communication protocols to allow fixed-line or
mobile phone devices to exchange short text
messages.
Short message service is a mechanism of delivery
of short messages over the mobile networks. It is
a store and forward way of transmitting
messages to and from mobiles.
8. How Does It Works ?
The message (text only) from the sending mobile is stored in a
central short message center (SMC) which then forwards it to the
destination mobile. This means that in the case that the recipient is
not available, the short message is stored and can be sent later.
Each short message can be no longer than 160 characters. These
characters can be text (alphanumeric) or binary Non-Text Short
messages. An interesting feature of SMS is return receipts. This
means that the sender, if wishes, can get a small message notifying
if the short message was delivered to the intended recipient.
Since SMS used signaling channel as opposed to dedicated
channels, these messages can be sent/received simultaneously with
the voice/data/fax service over a GSM network.
SMS supports national and international roaming. This means that
you can send short messages to any other GSM mobile user around
the world. With the PCS networks based on all the three
technologies, GSM, CDMA and TDMA supporting SMS, SMS is more or
less a universal mobile data service.
9. SME - Short Message Entity
SMC – Short Message Center
GMSC – Gateway MSC
MSC – Message Switching Center
HLR – Home Location Register
VLR – Visitor Location Register
BSS – Base Station System
10. The SME (Short Message Entity) which can be located in the fixed
network or a mobile station, receives and sends short messages.
The SMC (Short Message Center) is the entity which does the job of
store and forward of messages to and from the mobile station.
The GWMS (SMS gateway MSC) is a gateway MSC that can also
receive short messages. The gateway MSC is a mobile network’s
point of contact with other networks. On receiving the short
message from the short message center, GMSC uses the SS7
network to interrogate the current position of the mobile station
form the HLR, the home location register.
HLR is the main database in a mobile network. It holds information
of the subscription profile of the mobile and also about the routing
information for the subscriber, i.e. the area (covered by a MSC)
where the mobile is currently situated. The GMSC is thus able to
pass on the message to the correct MSC.
MSC (Mobile Switching Center) is the entity in a GSM network
which does the job of switching connections between mobile
stations or between mobile stations and the fixed network.
11. A VLR (Visitor Location Register) corresponds to each MSC and
contains temporary information about the mobile, information
like mobile identification and the cell (or a group of cells) where
the mobile is currently situated.
Using information form the VLR the MSC is able to switch the
information (short message) to the corresponding BSS (Base
Station System), which transmits the short message to the
mobile.
The BSS consists of transceivers, which send and receive
information over the air interface, to and from the mobile
station.
This information is passed over the signaling
channels so the mobile can receive messages
even if a voice or data call is going on.
12. Advantages & Disadvantages
PROs :
1. You can send then any time – Day or Night.
2. Person you are sending it to do not have to have
their mobile phones switched on.
3. It can save time. Rather than interrupting them
with calls you can simply message them.
4. SMS are good for Informal messaging.
5. SMS is personal. It goes straight to the
recipient’s mobile phone. The message is
literally delivered directly into their hand.
13. CONs :
1. Messages are plain vanilla in nature. You can only
send simple text messages. There is no scope for
any graphics or audio.
2. The messages are limited by size. An SMS message
can’t exceed 160 characters (70 Characters if
Arabic, Chinese languages are used).
3. Could not be used for Formal Messaging.
4. SMS need Basic Typing Skills.
5. Delivery Failure - Unfortunately with bulk SMS
marketing, service interruption occasionally
occurs. Thus results in delivery failure. SMS is
simply not as reliable as email yet, regardless of
the provider.
14. Okay ! Now on to MMS
MMS Stands for Multimedia Messaging Service.
It is a communications technology developed by
3GPP (Third Generation Partnership Project)
that allows users to exchange multimedia
communications between capable mobile phones
and other devices.
To send or receive an MMS message, the phone
makes a GPRS connection (to a GPRS APN). It
then usually connects to the MMSC for
sending/receiving messages through a WAP
proxy/gateway.
15. An extension to the Short Message Service, MMS defines a
way to send and receive, almost instantaneously, wireless
messages that include images, audio, and video clips in
addition to text.
When the technology has been fully developed, it will
support the transmission of streaming video. A common
current application of MMS messaging is picture messaging
(the use of camera phones to take photos for immediate
delivery to a mobile recipient). Other possibilities include
animations and graphic presentations of stock quotes,
sports news, and weather reports.
There are two important standards that define MMS
technology, one published by the 3GPP (3GPP TS 23.140),
and the other a series of MMS specifications published by
the Open Mobile Alliance (OMA). These two standard
bodies cooperate to define the MMS protocols.
16. Protocols Defined
When MMS is discussed, We will often hear details of different MMS
related protocols, such as MM1, MM3, MM4, MM7.
MM1 is the protocol that is used between a mobile device and the
MMSC Messaging Server. It defines how mobile phones send and
receive messages through the MMSC.
MM3 is the protocol that is used between an MMSC and other
messaging systems. It is not so much a protocol, as much as a
definition of requirements for how an MMSC must be able to
interoperate with other messaging systems. In the real world, this
is primarily done via the SMTP e-mail protocol.
MM4 is the protocol that is used to interconnect MMSCs. It is an
SMTP-based protocol with additional headers defined.
MM7 is the protocol that is used to allow Value Added Service
Provider (VASP) applications to send and receive MMS messages via
an MMSC.
17. MMS is developed in two separate phases.
Based on General Packet Radio Services (GPRS),
the currently available MMS is similar to a brief
PowerPoint presentation.
The second phase of MMS will require a 3G network
to enable streaming video.
18. How does it works ?
The sending phone initiates a data connection that provides TCP/IP
network connectivity, usually over GPRS.
The sending phone performs an HTTP POST to an MMSC of the MMS
message encoding in the MMS Encapsulation Format, as defined by
the Open Mobile Alliance. The encoded MMS message includes all of the
content of the MMS message, as well as header information, including a
list of intended recipients for the message.
The MMSC receives the MMS message submission and validates the
message sender.
The MMSC stores the content of the MMS message and makes it available
as a dynamically generated URL link.
The MMSC generates an MMS notification message, which is sent via
WAP Push over SMS to the message recipient(s). This MMS notification
message contains a URL pointer to the dynamically generated MMS
content.
The recipient receives the MMS notification message. It then initiates a
data connection that provides TCP/IP network connectivity (usually over
GPRS).
The recipient phone performs an HTTP get to retrieve the MMS message
content URL from the MMSC.
19. Advantages & Disadvantages
PROs :
1. whereas MMS supports images, videos and audio in your
message. MMS messages can include photos and videos
recorded on your phone or media added to your phone
from your computer. On some phones you can use
emoticons via MMS. This higher level of personalization
allows you to deliver voice messages and add more context
to your message than using text alone.
2. SMS messaging limits your messages to 160 characters --
including spaces and punctuation. MMS messaging not only
allows you to embed more styles and format your text, but
also allows significantly longer messages between phones.
There is not a set character limit for MMS, though your
phone may apply one.
20. CONs :
1. MMS created by one brand phone may not be compatible
with another brand of phone’s capabilities.
2. Some phones may be configured poorly leading to the
failure of MMS delivery.
3. Because of the large amount of transferring of MMS to
different networks, sending to a large group of customers
can be slow.