Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: 4G- A NEW ERA IN WIRELESS TELECOMMUNICATION
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
4G- A NEW ERA IN WIRELESS TELECOMMUNICATION



[attachment=65171]


ABSTRACT


4G – “connect anytime, anywhere, anyhow” promising ubiquitous network access at high speed to the end users, has been a topic of great interest especially for the wireless telecom industry. 4G seems to be the solution for the growing user requirements of wireless broadband access and the limitations of the existing wireless communication system. The purpose of this paper is to provide an overview of the different aspects of 4G which includes its features, its proposed architecture and key technological enablers. It also elaborates on the roadblocks in its implementations. A special consideration has been given to the security concerns of 4G by discussing a security threat analysis model proposed by International Telecommunication Union (ITU). By applying this model, a detailed analysis of threats to 4G and the corresponding measures to counter them can be performed.


INTRODUCTION


Wireless telecommunication history can be classified into different generations of network. Each generation has been a giant stride which revolutionized the field of mobile communication. As discussed in paper , era of telecommunication started with 1G in 1980 where all the systems where based on analog radio signal technology. Voice was considered to be the main traffic. Various 1G standards defined were Advance Mobile Phone System (AMPS), Nordic Mobile Telephone (NMT), Time Division Multiple Access (TDMA) and Frequency Division Multiple Access (FDMA). In 1990, 1G was replaced by 2G which provided rich set of services such as high voice quality and global mobility based on the digital radio signal technology. Here also voice was considered to be the main traffic. 2G includes standards such as Global System For Mobile Communications (GSM), General Packet Radio System (GPRS). Both 1G and 2G are based on circuit- switched technology for data communication at low speed.
2G was a huge success.
2G was followed by 2.5G which is an intermitent between 2G and 3G. It is based on both circuit switched and packet switched technologies providing high data rate with low power consumption. It uses the infrastructure of Global System for Mobile communications (GSM) and Code division multiple access (CDMA


WHY THE LEAP TOWARDS 4G

The vision which considers 4G as an extension to 3G cellular services is called as the linear 4G vision . But the extent of 4G capabilities goes beyond the cellular services. Envisioning 4G as high speed delivery of services via the most efficient network available from the pool of wireless networks is called as the concurrent 4G vision . One of the major reasons of 3G being unable to repeat the success story of 2G was the provision of only few additional services over 2G. It was not encouraging enough for the customer’s to change their equipments. Paper suggests a user-centric approach for the design of 4G to avoid mismatch between the user’s expectations and the services provided by 4G. Using the discussion in paper , features of 4G which cater to the end-user’s expectations and the problems of the current generation networks can be listed as follows:


4G NETWORK ARCHITECTURE


This architecture fulfills the basic requirement of servicing the standalone and mobile subscribers on an “anytime, anywhere, anyhow” basis in dynamic network conditions. The architecture is based on Internet Protocol version 6 (IPV6) which operates at the transport layer enabling seamless communication across various heterogeneous networks and based on the key factors such as mobility, Quality of Service (QoS) and efficient resource management schemes. The functionalities provided by each layer and module can be described as follows


4G SECURITY THREAT ANALYSIS


Amidst the concerns of technology, devices, architecture for 4G; security has not received much attention although being an important parameter for its marketing among the end users. Paper discusses the security aspect of 4G in detail. A region may be connected by multiple Radio Access Network (RAN). One of the governing factors for selecting an appropriate RAN will be the security features provided by the network


WHEN WILL 4G HAPPEN?

Air of uncertainty is looming large over the development and deployment of 4G networks. Telecom experts predict 2010-2011 time frame. Vodafone and Verizon Wireless have developed a common platform for supporting mobiles in 4G networks using LTE technology and they are currently in the field trial phase. NTT- Docomo has managed to achieve a speed of about 100MBPS for the moving terminal and 1 GBPS for the stationary terminal. They are scheduling to deploy the first commercial network by 2010. Spring Nextel is planning to deploy 4G network mobile services using WiMAX technology in US. Ericssion will deploy first commercial 4G network based on LTE to provide mobile broadband services for the TeliaSonera customers in stockholm


CONCLUSION


The advent of 4G is sure to revolutionize the field of telecommunication domain bringing the wireless experience to a completely new level. It would provide wealth of features and services making the world a smaller place to live. Thus, 4G seems to have the capability to realize the scenario discussed in Section 2. But 4G should also take lesson from the 3G’s failure to capture the imagination of the end-users. Technology should not be developed for technology’s sake rather it should target the end user. Thus, user-centric approach towards 4G’s development is the key to its success. Common consensus on the standards and the technologies for 4G needs to be reached to fasten 4G’s deployment which would be a gradual process. Lot of research work is required to investigate the open issues like design for SDR, QoS parameters and so forth. The threat analysis model provided by ITU is very apt for the complete analysis and planning for security of 4G. It can be used as a reference framework for future research. But still comprehensive research work is required in the field of network security to tackle potential security threats because a ubiquitous “secured” heterogeneous network will appeal more to the today’s consumers.