SlideShare une entreprise Scribd logo
1  sur  14
A
Report
on
SEMINAR
4th Generation Wireless systems
Submitted for the partial fulfillment of
Bachelor of technology
In
E .C . E
Submitted By :TALVINDER SINGH (04013202810)
3rd year , E.C.E-1

Guru TeghBahadur Institute of Technology,
Guru Gobind Singh Indraprastha University
Sector-16 Dwarka , New delhi
ABSTRACT:-

The approaching 4G (fourth generation) mobile communication systems are projected
to solve still-remaining problems of 3G (third generation) systems and to provide a wide
variety of new services, from high-quality voice to high-definition video to high-data-rate
wireless channels. The term 4G is used broadly to include several types of broadband
wireless access communication systems, not only cellular telephone systems. One of the
terms used to describe 4G is MAGIC—Mobile multimedia, anytime anywhere, Global
mobility support, integrated wireless solution, and customized personal service. As a promise
for the future, 4G systems, that is, cellular broadband wireless access systems have been
attracting much interest in the mobile communication arena. The 4G systems not only will
support the next generation of mobile service, but also will support the fixed wireless
networks. This paper presents an overall vision of the 4G features, framework, and
integration of mobile communication. The features of 4G systems might be summarized with
one word—integration. The 4G systems are about seamlessly integrating terminals, networks,
and applications to satisfy increasing user demands. The continuous expansion of mobile
communication and wireless networks shows evidence of exceptional growth in the areas of
mobile subscriber, wireless network access, mobile services, and applications.
Introduction:Consumers demand more from their technology. Whether it be a television, cellular
phone,or refrigerator, the latest technology purchase must have new features. With the
adventof the Internet, the most-wanted feature is better, faster access to information.
Cellularsubscribers pay extra on top of their basic bills for such features as instant messaging,
stockquotes, and even Internet access right on their phones. But that is far from the limit
offeatures; manufacturers entice customers to buy new phones with photo and even
videocapability. It is no longer a quantum leap to envision a time when access to all
necessary information the power of a personal computer, sits in the palm of one’s hand.
Tosupport such a powerful system, we need pervasive, high-speed wireless connectivity.
A number of technologies currently exist to provide users with high-speed digital
wirelessconnectivity; Bluetooth and 802.11 are examples. These two standards providevery
highspeednetwork connections over short distances, typically in the tens of meters..
Meanwhile cellular providers seek to increase speed on their long-range wireless networks.
The goalis the same: long-range, high-speed wireless, which for the purposes of this report
will becalled 4G, for fourth-generation wireless system. Such a system does not yet exist, nor
willit exist in today’s market without standardization. Fourth-generation wireless needs to
bestandardized throughout the world due to its enticing advantages to both users
andproviders.

Advantages of 4G:In a fourth-generation wireless system, cellular providers have the opportunity to offer
dataaccess to a wide variety of devices. The cellular network would become a data network
onwhich cellular phones could operate-as well as any other data device. Sending data overthe
cell phone network is a lucrative business. In the information age, access to data is the“killer
app” that drives the market. The most telling example is growth of the Internet overthe last 10
years. Wireless networks provide a unique twist to this product: mobility. Thisconcept is
already beginning a revolution in wireless networking, with instant access to theInternet from
anywhere.
Problems with the Current System
One may then wonder why ubiquitous, high-speed wireless is not already available.
Afterall, wireless providers are already moving in the direction of expanding the bandwidth
of their cellular networks. Almost all of the major cell phonenetworks already provide
dataservices beyond that offered in standard cell phones, as illustrated in Table 1.
Unfortunately, the current cellular network does not have the available bandwidth
necessaryto handle data services well. Not only is data transfer slowly - at the speed of
analogmodems - but the bandwidth that is available is not allocated efficiently for data.
Datatransfer tends to come in bursts rather than in the constant stream of voice data.
Cellularproviders are continuing to upgrade their networks in order to meet this higher
demand byswitching todifferent protocols that allow for fasteraccess speeds and more
efficient transfers.These arecollectively referred to as third generation, or 3G,
services.However, theway in which the companies are developing their networks is
problematic — all are currentlypreceding in different directions with their technology
improvements. Figure 1 illustratesthe different technologies that are currently in use, and
which technologies the providers planto use.
Although most technologies are similar, they are not all using the same
protocol. Inaddition, 3G systems still have inherent flaws. They are not well-designed for
data; they areimprovements on a protocol that was originally designed for voice. Thus, they
are inefficientwith their use of the available spectrum bandwidth. A data-centered protocol is
needed.If one were to create two identical marketplaces in which cellular providers used 3G
and4G respectively, the improvements in 4G would be easy to see. Speaking on the topic of
3G,one of the worlds leading authorities on mobile communications, William C.Y. Lee,
statesthat 3G would be “a patched up system that could be inefficient”, and it would be best
ifthe industry would leapfrog over 3G wireless technologies, and prepare for 4G
(Christian).4G protocols use spectrum up to 3 times as efficiently as 3G systems, have better
ways ofhandling dynamic load changes (such as additional cellular users entering a particular
cell),and create more bandwidth than 3G systems. Most importantly, fourth-generation
systemswill draw more users by using standard network protocols, which will be discussed
later, toconnect to the Internet. This will allow simple and transparent connectivity.
Barriers to Progress:Why are cellular providers not moving to 4G instead of 3G? Amarketplace like the
cellular industry can be modeled as a game, as in Table 2.
There are three basic paths the game can take:
Nobody makes the conversion to 4GAll end up upgrading to 2.5G and 3G services. The
upgrades are incremental, and don’t require a complete reworking of the system, so they are
fairly cheap — the equipment required is already developed and in massproduction in other
places in the world.
Everyone makes the conversion to 4GThe equipment and technology needed for 4Gwill be
cheap, because of all of the cellular manufacturers investing in it. Cellularproviders will
market additional services to its customers.
Some of the players make the conversion to 4GBecause not all of the players havechosen
4G, the equipment will be more expensive than the second scenario. Eventhough converters
will be able to sell more services to their customers, it will not beenough to cover the higher
costs of converting to 4G.
Therefore, if a player chooses the 4G strategy, but nobody else follows suit, that
playerwill be at a significant disadvantage. No cellular provider has incentive to move to 4G
unlessall providers move to 4G. An outside agent — the national government — must stand
for the communication. Of course, legitimate concerns can be posed to the idea of
implementing 4G nationwide. A common concern is the similarity of this proposal to the
forced

introduction

of

HDTVin

the

US,

which

has

(thus

far)

failed miserably. There are two key differences, however,between 4G and HDTV. The first is
the nature of the service providers. There are manysmall television broadcasters in rural areas
whose cost of conversion would be as much as 15years of revenue. The cellular industry,
however, does not have this problem. The players aremulti-billion dollar companies, who
already have enough capital; continual network upgradesare part of their business plan. Our
proposal is simply choosing a direction for their growth.
An often overlooked area of financial liability for cellular providers is in the area
ofinformation security. Providers could lose money through fraudulent use of the
cellularsystem or unauthorized disclosure of user information over the airwaves. Both of
these casescould be caused by an insecure wireless system.
Current Technology:Most modern cellular phones are based on one of two transmission technologies:
time-division multiple access (TDMA) or code-division multiple access (CDMA) (Prizeman
2000, 40).These two technologies are collectively referred to as second-generation, or 2G.
Bothsystemsmake eavesdropping more difficult by digitally encoding the voice data and
compressing it,then splitting up the resulting data into chunks upon transmission.

.TDMA:TDMA, or Time Division Multiple Access, is a technique for dividing the time
domain up intosub channels for use by multiple devices. Each device gets a single time slot in
a processionof devices on the network, as seen in Figure 3. During that particular time slot,
one deviceis allowed to utilize the entire bandwidth of the spectrum, and every other device is
in thequiescent state.
The time is divided into frames in which each device on the network gets one
timeslot. There are n timeslots in each frame, one each for n devices on the network. In
practice,every device gets a timeslot in every frame. This makes the frame setup simpler and
moreefficient because there is no time wasted on setting up the order of transmission. This
hasthe negative side effect of wasting bandwidth and capacity on devices that have nothing
tosend (Leon-Garcia and Widjaja 2000).
One optimization that makes TDMA much more efficient is the addition of a
registrationperiod at the beginning of the frame. During this period, each device indicates
how muchdata it has to send. Through this registration period, devices with nothing to send
wasteno time by having a timeslot allocated to them, and devices with lots of pending data
canhave extra time with which to send it. This is called ETDMA (Extended TDMA) and
canincrease the efficiency of TDMA to ten times the capacity of the original analog
cellularphone network.
The benefit of using TDMA with this optimization for network access comes when
data is“bur sty.” That means, at an arbitrary time, it is not possible to predict the rate or
amountof pending data from a particular host. This type of data is seen often in voice
transmission,where the rate of speech, the volume of speech, and the amount of background
noise areconstantly varying. Thus, for this type of data, very little capacity is wasted by
excessiveallocation.
Figure 3: Time Division Multiple Access

CDMA:CDMA, or Code Division Multiple Access, allows every device in a cell to transmit
overtheentire bandwidth at all times. Each mobile device has a unique and orthogonal code
that isused to encode and recover the signal (Leon-Garcia and Widjaja 2000). The mobile
phonedigitizes the voice data as it is received, and encodes the data with the unique code for
thatphone. This is accomplished by taking each bit of the signal and multiplying it by all
bitsin the unique code for the phone. Thus, one data bit is transformed into a sequence of
bitsof the same length as the code for the mobile phone. This makes it possible to
combinewith other signals on the same frequency range and still recover the original signal
from anarbitrary mobile phone as long as the code for that phone is known. Once encoded,
the datais modulated for transmission over the bandwidth allocated for that transmission. A
blockdiagram of the process is shown in Figure 4.

Figure 4: Sending Data using Code Division Multiple Access
Figure 5: Receiving Data using Code Division Multiple Access

Figure 6: UWB Spectrum Usage

The process for receiving a signal is shown in Figure 5. Once the signal is demodulated,
acorrelator and integrator pair recovers the signal based on the unique code from the cellular
phone. The correlator recovers the original encoded signal for the device, and the
integratortransforms the recovered signal into the actual data stream.
CDMA has been patented in the United States by Qualcomm, making it more
expensiveto implement due to royalty fees. This has been a factor for cellular phone
providers whenchoosing which system to implement.
By keeping security in mind while designing the new system, the creators of 2G
wirelesswere able to produce a usable system that is still in use today. Unfortunately, 2G
technologyis beginning to feel its age. Consumers now demand more features, which in turn
requirehigher data rates than 2G can handle. A new system is needed that merges voice and
datainto the same digital stream, conserving bandwidth to enable fast data access. By
usingadvanced hardware and software at both ends of the transmission, 4G is the answer to
thisproblem.

4G Hardware:Ultra Wide Band Networks
Ultra Wideband technology, or UWB, is an advanced transmission technology that
can beused in the implementation of a 4G network. The secret to UWB is that it is
typicallydetected as noise. This highly specific kind of noise does not cause interference with
currentradio frequency devices, but can be decoded by another device that recognizes UWB
and can
Since the signal is disguised as noise, it can use anypart of the frequency spectrum, which
means that it can use frequencies that are currentlyin use by other radio frequency devices
(Cravotta ).
An Ultra Wideband device works by emitting a series of short, low powered
electricalpulses that are not directed at one particular frequency but rather are spread across
the entirespectrum (Butcher ). As seen in Figure 6, Ultra Wideband uses a frequency of
between 3.1to 10.6 GHz.
The pulse can be called “shaped noise” because it is not flat, but curves across
thespectrum. On the other hand, actual noise would look the same across a range of
frequenciesit has no shape. For this reason, regular noise that may have the same frequency
as thepulse itself does not cancel out the pulse. Interference would have to spread across
thespectrum uniformly to obscure the pulse.
UWB provides greater bandwidth — as much as 60 megabits per second, which is 6
timesfaster than today’s wireless networks. It also uses significantly less power, since it
transmitspulses instead of a continuous signal. UWB uses all frequencies from high to
low,therebypassing through objects like the sea or layers of rock. Nevertheless, because of
the weaknessof the UWB signal, special antennas are needed to tune and aim the signal.

Smart Antennas:
Multiple “smart antennas” can be employed to help find, tune, and turn up signal
information.Since the antennas can both “listen” and “talk,” a smart antenna can send signals
backin the same direction that they came from. This means that the antenna system cannot
onlyhear many times louder, but can also respond more loudly and directly as well
(ArrayComm2003).
There are two types of smart antennas:
Switched Beam Antennas (as seen in Figure 7) have fixed beams of transmission, andcan
switch from one predefined beam to another when the user with the phone movesthroughout
the sector

Encryption:Two encryption/decryption techniques are commonly used: asymmetric and
symmetric encryption.Symmetric encryption is the more traditional form, where both sides
agree on asystem of encrypting and decrypting messages — the reverse of the encryption
algorithmis the decryption algorithm. Modern symmetric encryption algorithms are generic
and usea key to vary the algorithm. Thus, two sides can settle on a specific key to use for
theircommunications. The problem then is the key transportation problem: How do both
sidesget the key without a third party intercepting it? If an unauthorized user receives msg.

Flexibility
In reality, however, the usage of different encryption schemes depends on many factors,
including network data flow design. Thus, it is important that the encryption methodbe able
to change when other determining factors change. Al-Muhtadi, Mickunas, andCampbell of
University of Illinois at Urbana-Champaign showed great foresight in admittingthat “existing
security schemes in 2G and 3G systems are inadequate, since there is greaterdemand to
provide a more flexible, reconfigurable, and scalable security mechanism as fastas mobile
hosts are evolving into full-fledged IP-enabled devices” (Al-Muhtadi, Mickunas,and
Campbell 2002, 60).
Unfortunately, IPv6 can only protect data in transmission. Individual applications
maycontain flaws in the processing of data, thereby opening security holes. These holes
maybe remotely exploited, allowing the security of the entire mobile device to be
compromised.Thus, any wireless device should provide a process for updating the application
software assecurity holes are discovered and fixed.
APPLICATIONS
1, 4G Car
With the hype of 3G wireless in the rear view mirror, but the reality of
truly mobile broadband data seemingly too far in the future to be visible yet on the information
super highway, it may seem premature to offer a test drive 4G.

2.4G and public safety
There are sweeping changes taking place in transportation and intelligent highways, generally
referred to as “Intelligent Transportation Systems” (ITS). ITS is comprised of a number of
technologies, including information processing, communications, control, and electronics. Using
these technologies with our transportation systems, and allowing first responders access to them,
will help prevent ‐or certainly mitigate ‐future disasters. Communications, and the
cooperation
and collaboration it affords, is a key element of any effective disaster response. Historically, this
has been done with bulky handheld radios that provide only voice to a team in a common sector.
And this architecture is still cellular, with a singular point of failure, because all transmissions to
a given cell must pass through that one cell. If the cell tower is destroyed in the disaster,
traditional wireless service is eliminated. 4G wireless eliminates this spoke‐and‐hub
weakness of
cellular architectures because the destruction of a single node does not disable the network.
Instead of a user being dependent on a cell tower, that user can hop through other users in
dynamic, self roaming, self‐healing rings. This is reason enough to make this technology
available to first responders. But there is more: mobility, streaming audio and video,
high‐speed
Internet, real‐time asset awareness, geo‐location, and in‐building rescue support. All this at
speeds that rival cable modems and DSL. Combining 4G with ITS infrastructure makes both
more robust. In 4G architectures, the network improves as the number of users
increases.
ITS offers the network lots of users, and therefore more robustness.
Think of every light pole on a highway as a network element, a “user” that is acting as a
router/repeater for first responders traveling on those highways. Think of every traffic light as a
network element, ideally situated in the center of intersections with a 360‐degree view of

traffic.
3. 4G Wireless System
4. Sensors in public vehicle
Putting a chemical‐biological‐nuclear (CBN) warning sensor on every
government‐owned vehicle instantly creates a mobile fleet. As these vehicles go about their
daily duties of law enforcement, garbage collection, sewage and water maintenance, etc.,
municipalities get the added benefit of early detection of CBN agents. The sensors on the
vehicles can talk to fixed devices mounted on light poles throughout the area, so positive
detection can be reported in real time. And since 4G networks can include inherent
geo‐location
without GPS, first responders will know where the vehicle is when it detects a CBN agent.

5.Cameras in traffic light
Some major cities have deployed cameras on traffic lights and send
those images back to a central command center. This is generally done using fiber, which limits
where the cameras can be hung, i.e., no fiber, no camera. 4G networks allow cities to deploy
cameras and backhaul them wirelessly. And instead of having to backhaul every camera, cities
can backhaul every third or fifth or tenth camera, using the other cameras as router/repeaters.
These cameras can also serve as fixed infrastructure devices to support the mobile sensor.

6.First responder route selection
Using fiber to backhaul cameras means that the intelligence collected
flows one way: from the camera to the command center. Using a 4G network, those images can
also be sent from the command center back out to the streets. Ambulances and fire trucks facing
congestion can query various cameras to choose an alternate route. Police, stuck in traffic on
major thoroughfares, can look ahead and make a decision as to whether it would be faster to stay
on the main roads or exit to the side roads.

7 Traffic control during disasters
4G networks can allow officials to access traffic control boxes to change
inland traffic lanes to green. Instead of having to send officers to every box on roads being
overwhelmed by civilians who are evacuating, it can all be done remotely, and dynamically.

CONCLUSION
• 4G provide with a very efficient and reliable wireless communication system for
seamless roaming over various network including internet which uses IP network.
• It will be implemented in the coming years which are a miracle in the field of
communication engineering technology.
• It will dominate the wireless communications, and its converged system will
replace most conventional wireless infrastructure.
REFERENCES
1) Communication Systems
2) www.comsoc.org
3) www.techonline.com
4) www.ieee.org

Contenu connexe

Tendances

4 g wireless technology11
4 g  wireless technology114 g  wireless technology11
4 g wireless technology11Safal Agrawal
 
4g technology Ganesh Deshmukh
4g technology Ganesh Deshmukh4g technology Ganesh Deshmukh
4g technology Ganesh DeshmukhGanesh Deshmukh
 
4 G mobile technology
4 G mobile technology4 G mobile technology
4 G mobile technologyAman Jain
 
4G convergent architecture
4G convergent architecture4G convergent architecture
4G convergent architecturevinitabhandiwad
 
4G wireless system-mj
4G wireless system-mj4G wireless system-mj
4G wireless system-mjmjleo
 
4G Mobile Network & Applications
4G Mobile Network & Applications4G Mobile Network & Applications
4G Mobile Network & ApplicationsKuncoro Wastuwibowo
 
مشروع التخرج LTE
مشروع التخرج LTEمشروع التخرج LTE
مشروع التخرج LTEAyah Mfarrej
 
4G Mobile communication Technology
4G  Mobile communication Technology4G  Mobile communication Technology
4G Mobile communication TechnologyC.Vamsi Krishna
 
generations of mobile communication.3G v/s 4G
generations of mobile communication.3G v/s 4Ggenerations of mobile communication.3G v/s 4G
generations of mobile communication.3G v/s 4GChetan Goyal
 
Report on 4g Wireless Communication
Report on 4g Wireless CommunicationReport on 4g Wireless Communication
Report on 4g Wireless CommunicationShubham Roy
 
4G Wireless Mobile Communication
4G Wireless Mobile Communication4G Wireless Mobile Communication
4G Wireless Mobile Communicationpragya ratan
 
4G WIRELESS TECHNOLOGY
4G WIRELESS TECHNOLOGY4G WIRELESS TECHNOLOGY
4G WIRELESS TECHNOLOGYTarun chandel
 
4 g wireless technology
4 g wireless technology4 g wireless technology
4 g wireless technologyAmmar Altaf
 

Tendances (20)

4 g wireless technology11
4 g  wireless technology114 g  wireless technology11
4 g wireless technology11
 
4g technology Ganesh Deshmukh
4g technology Ganesh Deshmukh4g technology Ganesh Deshmukh
4g technology Ganesh Deshmukh
 
4 G mobile technology
4 G mobile technology4 G mobile technology
4 G mobile technology
 
4g magic communication
4g magic communication4g magic communication
4g magic communication
 
4G TechnologY..
4G TechnologY..4G TechnologY..
4G TechnologY..
 
4G convergent architecture
4G convergent architecture4G convergent architecture
4G convergent architecture
 
4G wireless system-mj
4G wireless system-mj4G wireless system-mj
4G wireless system-mj
 
4G Mobile Network & Applications
4G Mobile Network & Applications4G Mobile Network & Applications
4G Mobile Network & Applications
 
مشروع التخرج LTE
مشروع التخرج LTEمشروع التخرج LTE
مشروع التخرج LTE
 
Cellular system
Cellular system Cellular system
Cellular system
 
4G Mobile communication Technology
4G  Mobile communication Technology4G  Mobile communication Technology
4G Mobile communication Technology
 
4G Mobile Communications
4G Mobile Communications4G Mobile Communications
4G Mobile Communications
 
generations of mobile communication.3G v/s 4G
generations of mobile communication.3G v/s 4Ggenerations of mobile communication.3G v/s 4G
generations of mobile communication.3G v/s 4G
 
Wireless 4 g presentation
Wireless 4 g presentationWireless 4 g presentation
Wireless 4 g presentation
 
Report on 4g Wireless Communication
Report on 4g Wireless CommunicationReport on 4g Wireless Communication
Report on 4g Wireless Communication
 
4G Wireless Mobile Communication
4G Wireless Mobile Communication4G Wireless Mobile Communication
4G Wireless Mobile Communication
 
4g intro
4g intro4g intro
4g intro
 
4G WIRELESS TECHNOLOGY
4G WIRELESS TECHNOLOGY4G WIRELESS TECHNOLOGY
4G WIRELESS TECHNOLOGY
 
4 g wireless technology
4 g wireless technology4 g wireless technology
4 g wireless technology
 
4G technology
4G technology4G technology
4G technology
 

Similaire à 4G Wireless Systems Seminar Report

5G System Trends and Development
5G System Trends and Development5G System Trends and Development
5G System Trends and Developmentijtsrd
 
4 g mobile communication system
4 g mobile communication system4 g mobile communication system
4 g mobile communication systemPalla Manikanta
 
5G Technology
5G Technology5G Technology
5G TechnologyBareWolf
 
Look future wireless_communications_beyond3_g
Look future wireless_communications_beyond3_gLook future wireless_communications_beyond3_g
Look future wireless_communications_beyond3_gArtechno7
 
5 g mobile wireless technology
5 g mobile wireless technology5 g mobile wireless technology
5 g mobile wireless technologyIJARIIT
 
4G Wireless Technology
4G Wireless Technology4G Wireless Technology
4G Wireless Technologyijtsrd
 
5 g communication
5 g communication5 g communication
5 g communicationBasil John
 
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...josephjonse
 
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...josephjonse
 
5 g technology bdma
5 g technology bdma5 g technology bdma
5 g technology bdmaSrihari
 
Mobility management issues in 3 g & 4g network1
Mobility management issues in 3 g & 4g network1Mobility management issues in 3 g & 4g network1
Mobility management issues in 3 g & 4g network1Editor Jacotech
 
5G wireless technology
5G wireless technology5G wireless technology
5G wireless technologyNripesh Gupta
 
3g Wireless Technology Paper Presentation
3g Wireless Technology Paper Presentation3g Wireless Technology Paper Presentation
3g Wireless Technology Paper Presentationguestac67362
 
98008900-5g-Mobile-Technology.pdf
98008900-5g-Mobile-Technology.pdf98008900-5g-Mobile-Technology.pdf
98008900-5g-Mobile-Technology.pdfBenciKhode
 
5g cellular communication
5g cellular communication5g cellular communication
5g cellular communicationshubham patil
 

Similaire à 4G Wireless Systems Seminar Report (20)

5G System Trends and Development
5G System Trends and Development5G System Trends and Development
5G System Trends and Development
 
Report on 4 g
Report on 4 gReport on 4 g
Report on 4 g
 
4 g mobile communication system
4 g mobile communication system4 g mobile communication system
4 g mobile communication system
 
5G Technology
5G Technology5G Technology
5G Technology
 
ETRASCT-2014
ETRASCT-2014ETRASCT-2014
ETRASCT-2014
 
Look future wireless_communications_beyond3_g
Look future wireless_communications_beyond3_gLook future wireless_communications_beyond3_g
Look future wireless_communications_beyond3_g
 
5 g mobile wireless technology
5 g mobile wireless technology5 g mobile wireless technology
5 g mobile wireless technology
 
4G Wireless Technology
4G Wireless Technology4G Wireless Technology
4G Wireless Technology
 
5 g communication
5 g communication5 g communication
5 g communication
 
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
 
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
 
1.5g tech
1.5g tech1.5g tech
1.5g tech
 
5 g technology bdma
5 g technology bdma5 g technology bdma
5 g technology bdma
 
Ccn
CcnCcn
Ccn
 
Mobility management issues in 3 g & 4g network1
Mobility management issues in 3 g & 4g network1Mobility management issues in 3 g & 4g network1
Mobility management issues in 3 g & 4g network1
 
5G wireless technology
5G wireless technology5G wireless technology
5G wireless technology
 
3g Wireless Technology Paper Presentation
3g Wireless Technology Paper Presentation3g Wireless Technology Paper Presentation
3g Wireless Technology Paper Presentation
 
98008900-5g-Mobile-Technology.pdf
98008900-5g-Mobile-Technology.pdf98008900-5g-Mobile-Technology.pdf
98008900-5g-Mobile-Technology.pdf
 
5g cellular communication
5g cellular communication5g cellular communication
5g cellular communication
 
5G
5G5G
5G
 

Plus de Talvinder Singh

FOREST FIRE DETECTION SYSTEM USING XBEE
FOREST FIRE DETECTION SYSTEM USING XBEEFOREST FIRE DETECTION SYSTEM USING XBEE
FOREST FIRE DETECTION SYSTEM USING XBEETalvinder Singh
 
Automatic RFID Voting System with user authentication
Automatic RFID Voting System with user authenticationAutomatic RFID Voting System with user authentication
Automatic RFID Voting System with user authenticationTalvinder Singh
 
CCNA Industrial Training Presentation
CCNA Industrial Training PresentationCCNA Industrial Training Presentation
CCNA Industrial Training PresentationTalvinder Singh
 
Wireless charging of mobile phone using microwaves
Wireless charging of mobile phone using microwavesWireless charging of mobile phone using microwaves
Wireless charging of mobile phone using microwavesTalvinder Singh
 

Plus de Talvinder Singh (7)

FOREST FIRE DETECTION SYSTEM USING XBEE
FOREST FIRE DETECTION SYSTEM USING XBEEFOREST FIRE DETECTION SYSTEM USING XBEE
FOREST FIRE DETECTION SYSTEM USING XBEE
 
Automatic RFID Voting System with user authentication
Automatic RFID Voting System with user authenticationAutomatic RFID Voting System with user authentication
Automatic RFID Voting System with user authentication
 
Ccna training report
Ccna training reportCcna training report
Ccna training report
 
CCNA Industrial Training Presentation
CCNA Industrial Training PresentationCCNA Industrial Training Presentation
CCNA Industrial Training Presentation
 
Cochlear Implant
Cochlear ImplantCochlear Implant
Cochlear Implant
 
Wireless charging of mobile phone using microwaves
Wireless charging of mobile phone using microwavesWireless charging of mobile phone using microwaves
Wireless charging of mobile phone using microwaves
 
4G wireless system
4G wireless system4G wireless system
4G wireless system
 

Dernier

Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCRashishs7044
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 

Dernier (20)

Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 

4G Wireless Systems Seminar Report

  • 1. A Report on SEMINAR 4th Generation Wireless systems Submitted for the partial fulfillment of Bachelor of technology In E .C . E Submitted By :TALVINDER SINGH (04013202810) 3rd year , E.C.E-1 Guru TeghBahadur Institute of Technology, Guru Gobind Singh Indraprastha University Sector-16 Dwarka , New delhi
  • 2. ABSTRACT:- The approaching 4G (fourth generation) mobile communication systems are projected to solve still-remaining problems of 3G (third generation) systems and to provide a wide variety of new services, from high-quality voice to high-definition video to high-data-rate wireless channels. The term 4G is used broadly to include several types of broadband wireless access communication systems, not only cellular telephone systems. One of the terms used to describe 4G is MAGIC—Mobile multimedia, anytime anywhere, Global mobility support, integrated wireless solution, and customized personal service. As a promise for the future, 4G systems, that is, cellular broadband wireless access systems have been attracting much interest in the mobile communication arena. The 4G systems not only will support the next generation of mobile service, but also will support the fixed wireless networks. This paper presents an overall vision of the 4G features, framework, and integration of mobile communication. The features of 4G systems might be summarized with one word—integration. The 4G systems are about seamlessly integrating terminals, networks, and applications to satisfy increasing user demands. The continuous expansion of mobile communication and wireless networks shows evidence of exceptional growth in the areas of mobile subscriber, wireless network access, mobile services, and applications.
  • 3. Introduction:Consumers demand more from their technology. Whether it be a television, cellular phone,or refrigerator, the latest technology purchase must have new features. With the adventof the Internet, the most-wanted feature is better, faster access to information. Cellularsubscribers pay extra on top of their basic bills for such features as instant messaging, stockquotes, and even Internet access right on their phones. But that is far from the limit offeatures; manufacturers entice customers to buy new phones with photo and even videocapability. It is no longer a quantum leap to envision a time when access to all necessary information the power of a personal computer, sits in the palm of one’s hand. Tosupport such a powerful system, we need pervasive, high-speed wireless connectivity. A number of technologies currently exist to provide users with high-speed digital wirelessconnectivity; Bluetooth and 802.11 are examples. These two standards providevery highspeednetwork connections over short distances, typically in the tens of meters.. Meanwhile cellular providers seek to increase speed on their long-range wireless networks. The goalis the same: long-range, high-speed wireless, which for the purposes of this report will becalled 4G, for fourth-generation wireless system. Such a system does not yet exist, nor willit exist in today’s market without standardization. Fourth-generation wireless needs to bestandardized throughout the world due to its enticing advantages to both users andproviders. Advantages of 4G:In a fourth-generation wireless system, cellular providers have the opportunity to offer dataaccess to a wide variety of devices. The cellular network would become a data network onwhich cellular phones could operate-as well as any other data device. Sending data overthe cell phone network is a lucrative business. In the information age, access to data is the“killer app” that drives the market. The most telling example is growth of the Internet overthe last 10 years. Wireless networks provide a unique twist to this product: mobility. Thisconcept is already beginning a revolution in wireless networking, with instant access to theInternet from anywhere.
  • 4. Problems with the Current System One may then wonder why ubiquitous, high-speed wireless is not already available. Afterall, wireless providers are already moving in the direction of expanding the bandwidth of their cellular networks. Almost all of the major cell phonenetworks already provide dataservices beyond that offered in standard cell phones, as illustrated in Table 1. Unfortunately, the current cellular network does not have the available bandwidth necessaryto handle data services well. Not only is data transfer slowly - at the speed of analogmodems - but the bandwidth that is available is not allocated efficiently for data. Datatransfer tends to come in bursts rather than in the constant stream of voice data. Cellularproviders are continuing to upgrade their networks in order to meet this higher demand byswitching todifferent protocols that allow for fasteraccess speeds and more efficient transfers.These arecollectively referred to as third generation, or 3G, services.However, theway in which the companies are developing their networks is problematic — all are currentlypreceding in different directions with their technology improvements. Figure 1 illustratesthe different technologies that are currently in use, and which technologies the providers planto use. Although most technologies are similar, they are not all using the same protocol. Inaddition, 3G systems still have inherent flaws. They are not well-designed for data; they areimprovements on a protocol that was originally designed for voice. Thus, they are inefficientwith their use of the available spectrum bandwidth. A data-centered protocol is needed.If one were to create two identical marketplaces in which cellular providers used 3G and4G respectively, the improvements in 4G would be easy to see. Speaking on the topic of 3G,one of the worlds leading authorities on mobile communications, William C.Y. Lee, statesthat 3G would be “a patched up system that could be inefficient”, and it would be best ifthe industry would leapfrog over 3G wireless technologies, and prepare for 4G (Christian).4G protocols use spectrum up to 3 times as efficiently as 3G systems, have better ways ofhandling dynamic load changes (such as additional cellular users entering a particular cell),and create more bandwidth than 3G systems. Most importantly, fourth-generation systemswill draw more users by using standard network protocols, which will be discussed later, toconnect to the Internet. This will allow simple and transparent connectivity.
  • 5. Barriers to Progress:Why are cellular providers not moving to 4G instead of 3G? Amarketplace like the cellular industry can be modeled as a game, as in Table 2. There are three basic paths the game can take: Nobody makes the conversion to 4GAll end up upgrading to 2.5G and 3G services. The upgrades are incremental, and don’t require a complete reworking of the system, so they are fairly cheap — the equipment required is already developed and in massproduction in other places in the world. Everyone makes the conversion to 4GThe equipment and technology needed for 4Gwill be cheap, because of all of the cellular manufacturers investing in it. Cellularproviders will market additional services to its customers. Some of the players make the conversion to 4GBecause not all of the players havechosen 4G, the equipment will be more expensive than the second scenario. Eventhough converters will be able to sell more services to their customers, it will not beenough to cover the higher costs of converting to 4G. Therefore, if a player chooses the 4G strategy, but nobody else follows suit, that playerwill be at a significant disadvantage. No cellular provider has incentive to move to 4G unlessall providers move to 4G. An outside agent — the national government — must stand for the communication. Of course, legitimate concerns can be posed to the idea of implementing 4G nationwide. A common concern is the similarity of this proposal to the forced introduction of HDTVin the US, which has (thus far) failed miserably. There are two key differences, however,between 4G and HDTV. The first is the nature of the service providers. There are manysmall television broadcasters in rural areas whose cost of conversion would be as much as 15years of revenue. The cellular industry, however, does not have this problem. The players aremulti-billion dollar companies, who already have enough capital; continual network upgradesare part of their business plan. Our proposal is simply choosing a direction for their growth. An often overlooked area of financial liability for cellular providers is in the area ofinformation security. Providers could lose money through fraudulent use of the cellularsystem or unauthorized disclosure of user information over the airwaves. Both of these casescould be caused by an insecure wireless system.
  • 6. Current Technology:Most modern cellular phones are based on one of two transmission technologies: time-division multiple access (TDMA) or code-division multiple access (CDMA) (Prizeman 2000, 40).These two technologies are collectively referred to as second-generation, or 2G. Bothsystemsmake eavesdropping more difficult by digitally encoding the voice data and compressing it,then splitting up the resulting data into chunks upon transmission. .TDMA:TDMA, or Time Division Multiple Access, is a technique for dividing the time domain up intosub channels for use by multiple devices. Each device gets a single time slot in a processionof devices on the network, as seen in Figure 3. During that particular time slot, one deviceis allowed to utilize the entire bandwidth of the spectrum, and every other device is in thequiescent state. The time is divided into frames in which each device on the network gets one timeslot. There are n timeslots in each frame, one each for n devices on the network. In practice,every device gets a timeslot in every frame. This makes the frame setup simpler and moreefficient because there is no time wasted on setting up the order of transmission. This hasthe negative side effect of wasting bandwidth and capacity on devices that have nothing tosend (Leon-Garcia and Widjaja 2000). One optimization that makes TDMA much more efficient is the addition of a registrationperiod at the beginning of the frame. During this period, each device indicates how muchdata it has to send. Through this registration period, devices with nothing to send wasteno time by having a timeslot allocated to them, and devices with lots of pending data canhave extra time with which to send it. This is called ETDMA (Extended TDMA) and canincrease the efficiency of TDMA to ten times the capacity of the original analog cellularphone network. The benefit of using TDMA with this optimization for network access comes when data is“bur sty.” That means, at an arbitrary time, it is not possible to predict the rate or amountof pending data from a particular host. This type of data is seen often in voice transmission,where the rate of speech, the volume of speech, and the amount of background noise areconstantly varying. Thus, for this type of data, very little capacity is wasted by excessiveallocation.
  • 7. Figure 3: Time Division Multiple Access CDMA:CDMA, or Code Division Multiple Access, allows every device in a cell to transmit overtheentire bandwidth at all times. Each mobile device has a unique and orthogonal code that isused to encode and recover the signal (Leon-Garcia and Widjaja 2000). The mobile phonedigitizes the voice data as it is received, and encodes the data with the unique code for thatphone. This is accomplished by taking each bit of the signal and multiplying it by all bitsin the unique code for the phone. Thus, one data bit is transformed into a sequence of bitsof the same length as the code for the mobile phone. This makes it possible to combinewith other signals on the same frequency range and still recover the original signal from anarbitrary mobile phone as long as the code for that phone is known. Once encoded, the datais modulated for transmission over the bandwidth allocated for that transmission. A blockdiagram of the process is shown in Figure 4. Figure 4: Sending Data using Code Division Multiple Access
  • 8. Figure 5: Receiving Data using Code Division Multiple Access Figure 6: UWB Spectrum Usage The process for receiving a signal is shown in Figure 5. Once the signal is demodulated, acorrelator and integrator pair recovers the signal based on the unique code from the cellular phone. The correlator recovers the original encoded signal for the device, and the integratortransforms the recovered signal into the actual data stream. CDMA has been patented in the United States by Qualcomm, making it more expensiveto implement due to royalty fees. This has been a factor for cellular phone providers whenchoosing which system to implement. By keeping security in mind while designing the new system, the creators of 2G wirelesswere able to produce a usable system that is still in use today. Unfortunately, 2G technologyis beginning to feel its age. Consumers now demand more features, which in turn requirehigher data rates than 2G can handle. A new system is needed that merges voice and datainto the same digital stream, conserving bandwidth to enable fast data access. By
  • 9. usingadvanced hardware and software at both ends of the transmission, 4G is the answer to thisproblem. 4G Hardware:Ultra Wide Band Networks Ultra Wideband technology, or UWB, is an advanced transmission technology that can beused in the implementation of a 4G network. The secret to UWB is that it is typicallydetected as noise. This highly specific kind of noise does not cause interference with currentradio frequency devices, but can be decoded by another device that recognizes UWB and can Since the signal is disguised as noise, it can use anypart of the frequency spectrum, which means that it can use frequencies that are currentlyin use by other radio frequency devices (Cravotta ). An Ultra Wideband device works by emitting a series of short, low powered electricalpulses that are not directed at one particular frequency but rather are spread across the entirespectrum (Butcher ). As seen in Figure 6, Ultra Wideband uses a frequency of between 3.1to 10.6 GHz. The pulse can be called “shaped noise” because it is not flat, but curves across thespectrum. On the other hand, actual noise would look the same across a range of frequenciesit has no shape. For this reason, regular noise that may have the same frequency as thepulse itself does not cancel out the pulse. Interference would have to spread across thespectrum uniformly to obscure the pulse. UWB provides greater bandwidth — as much as 60 megabits per second, which is 6 timesfaster than today’s wireless networks. It also uses significantly less power, since it transmitspulses instead of a continuous signal. UWB uses all frequencies from high to low,therebypassing through objects like the sea or layers of rock. Nevertheless, because of the weaknessof the UWB signal, special antennas are needed to tune and aim the signal. Smart Antennas: Multiple “smart antennas” can be employed to help find, tune, and turn up signal information.Since the antennas can both “listen” and “talk,” a smart antenna can send signals backin the same direction that they came from. This means that the antenna system cannot onlyhear many times louder, but can also respond more loudly and directly as well (ArrayComm2003).
  • 10. There are two types of smart antennas: Switched Beam Antennas (as seen in Figure 7) have fixed beams of transmission, andcan switch from one predefined beam to another when the user with the phone movesthroughout the sector Encryption:Two encryption/decryption techniques are commonly used: asymmetric and symmetric encryption.Symmetric encryption is the more traditional form, where both sides agree on asystem of encrypting and decrypting messages — the reverse of the encryption algorithmis the decryption algorithm. Modern symmetric encryption algorithms are generic and usea key to vary the algorithm. Thus, two sides can settle on a specific key to use for theircommunications. The problem then is the key transportation problem: How do both sidesget the key without a third party intercepting it? If an unauthorized user receives msg. Flexibility In reality, however, the usage of different encryption schemes depends on many factors, including network data flow design. Thus, it is important that the encryption methodbe able to change when other determining factors change. Al-Muhtadi, Mickunas, andCampbell of University of Illinois at Urbana-Champaign showed great foresight in admittingthat “existing security schemes in 2G and 3G systems are inadequate, since there is greaterdemand to provide a more flexible, reconfigurable, and scalable security mechanism as fastas mobile hosts are evolving into full-fledged IP-enabled devices” (Al-Muhtadi, Mickunas,and Campbell 2002, 60). Unfortunately, IPv6 can only protect data in transmission. Individual applications maycontain flaws in the processing of data, thereby opening security holes. These holes maybe remotely exploited, allowing the security of the entire mobile device to be compromised.Thus, any wireless device should provide a process for updating the application software assecurity holes are discovered and fixed.
  • 11.
  • 12. APPLICATIONS 1, 4G Car With the hype of 3G wireless in the rear view mirror, but the reality of truly mobile broadband data seemingly too far in the future to be visible yet on the information super highway, it may seem premature to offer a test drive 4G. 2.4G and public safety There are sweeping changes taking place in transportation and intelligent highways, generally referred to as “Intelligent Transportation Systems” (ITS). ITS is comprised of a number of technologies, including information processing, communications, control, and electronics. Using these technologies with our transportation systems, and allowing first responders access to them, will help prevent ‐or certainly mitigate ‐future disasters. Communications, and the cooperation and collaboration it affords, is a key element of any effective disaster response. Historically, this has been done with bulky handheld radios that provide only voice to a team in a common sector. And this architecture is still cellular, with a singular point of failure, because all transmissions to a given cell must pass through that one cell. If the cell tower is destroyed in the disaster, traditional wireless service is eliminated. 4G wireless eliminates this spoke‐and‐hub weakness of cellular architectures because the destruction of a single node does not disable the network. Instead of a user being dependent on a cell tower, that user can hop through other users in dynamic, self roaming, self‐healing rings. This is reason enough to make this technology available to first responders. But there is more: mobility, streaming audio and video, high‐speed Internet, real‐time asset awareness, geo‐location, and in‐building rescue support. All this at speeds that rival cable modems and DSL. Combining 4G with ITS infrastructure makes both more robust. In 4G architectures, the network improves as the number of users increases. ITS offers the network lots of users, and therefore more robustness. Think of every light pole on a highway as a network element, a “user” that is acting as a router/repeater for first responders traveling on those highways. Think of every traffic light as a network element, ideally situated in the center of intersections with a 360‐degree view of traffic. 3. 4G Wireless System 4. Sensors in public vehicle Putting a chemical‐biological‐nuclear (CBN) warning sensor on every government‐owned vehicle instantly creates a mobile fleet. As these vehicles go about their daily duties of law enforcement, garbage collection, sewage and water maintenance, etc., municipalities get the added benefit of early detection of CBN agents. The sensors on the
  • 13. vehicles can talk to fixed devices mounted on light poles throughout the area, so positive detection can be reported in real time. And since 4G networks can include inherent geo‐location without GPS, first responders will know where the vehicle is when it detects a CBN agent. 5.Cameras in traffic light Some major cities have deployed cameras on traffic lights and send those images back to a central command center. This is generally done using fiber, which limits where the cameras can be hung, i.e., no fiber, no camera. 4G networks allow cities to deploy cameras and backhaul them wirelessly. And instead of having to backhaul every camera, cities can backhaul every third or fifth or tenth camera, using the other cameras as router/repeaters. These cameras can also serve as fixed infrastructure devices to support the mobile sensor. 6.First responder route selection Using fiber to backhaul cameras means that the intelligence collected flows one way: from the camera to the command center. Using a 4G network, those images can also be sent from the command center back out to the streets. Ambulances and fire trucks facing congestion can query various cameras to choose an alternate route. Police, stuck in traffic on major thoroughfares, can look ahead and make a decision as to whether it would be faster to stay on the main roads or exit to the side roads. 7 Traffic control during disasters 4G networks can allow officials to access traffic control boxes to change inland traffic lanes to green. Instead of having to send officers to every box on roads being overwhelmed by civilians who are evacuating, it can all be done remotely, and dynamically. CONCLUSION • 4G provide with a very efficient and reliable wireless communication system for seamless roaming over various network including internet which uses IP network. • It will be implemented in the coming years which are a miracle in the field of communication engineering technology. • It will dominate the wireless communications, and its converged system will replace most conventional wireless infrastructure.
  • 14. REFERENCES 1) Communication Systems 2) www.comsoc.org 3) www.techonline.com 4) www.ieee.org