Remote and Cell Interchanges.

Uploaded on:
Category: Music / Dance
Portable Wireless Devices and Applications. The Difference Between Cellular and PCS Services ... The SMSC goes the message through the system to the destination cell phone ...
Slide 1

Remote and Cellular Communications Marin Thomas IONA COLLEGE Feb/16/2006

Slide 2

Recap Mobile Wireless Devices and Applications The Difference Between Cellular and PCS Services Mobile E-Commerce Applications The Use and Functions of Frequency Bands The Foundation of the Cellular System Architecture The Mobile Telephone Switching Office Wireless Multiplexing Methods

Slide 3

Topics The Design of the Global Wireless Internet The Elements of the Wireless Access Protocol (WAP) I-Mode Secure Wireless Communication Wireless Application of Satellite Phones and Portable Satellite Terminals

Slide 4

Global Wireless Internet Wireless Access Service Providers (WASPs) in ASIA, Europe and US bolster a fast association with the Internet. Transporter An in the US and Europe associates with its closest POP and can transmit and get signals utilizing the POPs association with the Internet Short message administration (SMS), the versatile rendition of text is utilized to transmit short instant messages to and from a cellular telephone. Once a message is sent, it is gotten by a Short Message Service Center (SMSC). The SMSC goes the message through the system to the goal cell phone The SMSC sends a SMS solicitation to the Home Location Register (HLR) to discover the meandering client. The HLR reacts to the SMSC with the supporters status. The SMSC moves the message in a Short Message Delivery Point to point design

Slide 5

Wireless Mobile Internet and WAP It is unrealistic to convey all the web substance to a telephone as it is to a PC. For remote versatile Internet to be productive, the web substance such a design and hyperlinks should be customized to suite cell telephones capacities Wireless Application Protocol (WAP) is an industry standard that permits programming engineers to make substance reasonable for showing on advanced mobile phone screens. Engineers compose their administration as per the WAP detail and it can then be conveyed over any versatile system WAP is driven by the enormous remote portable business sector. The quantity of remote hand-held gadgets getting to the web increments generously every year contrasted with wired gadgets WAP is an Open no-restrictive gadget autonomous conveyor free convention stack

Slide 6

Wireless Standards and Protocols In 1996 Nokia, Unwired Planet and Ericsson got together to discover a way increase the value of their administrations and make WEB more appropriate for the constrained transmission capacity competent gadgets began the WAP outline 350 different organizations have joined from that point forward and it turned into the Open Mobile Alliance Open Mobile Alliance is constantly taking a shot at particulars for the remote standard to guarantee that it advances legitimately WAP ELEMENTS

Slide 7

WAP: Protocol Elements Wireless Application Environment (WAE) Holds the instruments that remote Internet Content engineers use Which incorporates: WML: Wireless Markup Language WLMScript: Lightweight scripting dialect The Wireless Session Protocol ( WSP) figures out if a session between the gadget and the system will be association situated or connectionless . In the event that a gadget needs to argue and forward with the system amid a session, then information is passed both courses between the gadget and the system; WSP then sends the parcel to the Wireless Transaction Protocol layer. (Like TCP) If the session is connectionless, generally utilized when data is being communicate or spilled from the system to the gadget, then WSP diverts the bundle to the Wireless Datagram Protocol layer. (Like UDP)

Slide 8

WAP: Protocol Elements Wireless Transaction Protocol (WTP) Provides administrations to fulfill exchanges with changing level of unwavering quality Acts like an activity cop, keeping the information streaming in a consistent and smooth way. It additionally decides how to characterize every exchange demand: Reliable two-way Reliable one-way Unreliable one-way Wireless Transport Layer (WTLS) WTLS gives a number of the same security highlights found in the Transport Layer security a portion of TCP/IP. It checks information trustworthiness, gives encryption and performs customer and server verification. Remote Datagram Protocol (WDP) Works in conjunction with the system bearer layer. WDP makes it simple to adjust WAP to an assortment of bearers since every one of that requirements to change is the data kept up at this level.

Slide 9

WAP: Protocol Elements Network transporters Also called bearers , these can be any of the current advancements that remote suppliers use. GPRS (General Packet Radio Service) is the world\'s most pervasive remote information administration, accessible now with practically every GSM system. GPRS is an availability arrangement taking into account Internet Protocols that backings an extensive variety of big business and buyer applications. GPRS clients appreciate propelled, highlight rich information administrations, for example, shading Internet skimming, email moving, effective visual correspondences, for example, video gushing, interactive media messages and area based administrations. USSD (Unstructured Supplementary Service Data) is a Global System for Mobile (GSM) correspondence innovation that is utilized to send content between a cell telephone and an application program in the system. Applications may incorporate paid ahead of time meandering or versatile talking. USSD is like Short Messaging Service (SMS), be that as it may, dissimilar to SMS, USSD exchanges happen amid the session as it were. With SMS, messages can be sent to a cellular telephone and put away for a few days if the telephone is not enacted or inside extent.

Slide 10

WAP Communication: WEB and Mobile telephones The client turns on the gadget and opens the minibrowser The gadget conveys a radio sign, scanning for administration An association is made with the clients administration supplier The client chooses the sought WEB website A solicitation is send to a WAP door server The passage server recovers the data by means of HTTP from the WEB webpage The portal server encodes the HTTP information as WML The WML-encoded information is send to the client\'s gadget The remote Internet adaptation of the WEB page chose shows up on the client\'s cell telephone

Slide 11

What is i-Mode First presented in Japan in 1999 by NTT DoCoMo, i-mode is a standout amongst the best administrations offering remote web skimming and email from cellular telephones in Japan. Taking into account bundle information transmission. Clients are charged in view of the volume of information transmitted not the length of time associated with the web Unlike WAP, which utilizes WML as its markup dialect, I-mode administrations are assembled utilizing Ii-mode perfect HTML

Slide 12

i-Mode Connection to locales, running projects, and exchanging messages are all done by the I-mode server

Slide 13

Secure Wireless Communication The way to planning remote system security is to have a strategy to keep information secret and private The correspondence between a remote customer and the base station must be secure Some Techniques for remote security incorporate the accompanying: WTLS SignText WIM WPKI

Slide 14

Wireless Transport Layer Security (WTLS) Provides solid security between a WAP customer and the door Encryption method (SSL) stretch out security the distance to the application server WTLS security utilizing RSA calculations gives encryption of client information After information goes through the WAP entryway, it is unscrambled from WTLS and afterward scrambled in SSL to present to the application server

Slide 15

SignTest SignText gives a computerized mark to WAP applications that require the capacity to give relentless confirmation that somebody has approved an exchange. The WAP program shows the precise content to be digitally marked, both the information and the mark are send over the system. At the point when the server gets it, it separates the mark and accepts it against a security database. It is utilized for the most part to validate the respectability of the information yet It doesn\'t give secrecy

Slide 16

WAP Identity Module (WIM) Used to store and process data required for client distinguishing proof and verification Encryption keys are prepared and put away inside the WIM. This system is utilized when performing WTLS and application level security capacity In a wireless, WIM is executed as a Subscriber Identification Module (SIM), which is a one of a kind number that recognizes the gadget. WIM is a protected strategy that empowers clients to do online exchanges

Slide 17

Wireless Public Key Infrastructure (WPKI) Certification Authorities (CAs) that is in charge of issuing and renouncing declarations Registration Authorities (RAs) that is in charge of authoritative between open keys and the characters of their holders. Authentication holders (or subjects), which is machines, programming specialists or individuals that have been issued with declarations and can utilize them to sign advanced reports WPKI characterizes a PKI Portal. Which is a security-entryway converter that makes an interpretation of remote PKI conventions to and from Internet-conventions using databases and catalogs to store and convey authentication and their status.

Slide 18

Server-Assisted Wireless Public Key Infrastructure (SAWPKI) SAWPKI is a more up to date form of programming arrangement gave by the E-Business Technology Institute and it capacities as takes after: A client uses the cell phone to set up a protected channel for executing information and installment guidelines. The cryptographic operations are offloaded to a SAWPKI server on the Internet. The Customer\'s cell phone imparts in its typical route pretty much as though it were an undeniable PKI-empowered PC. The E-vendors can acknowledge exchanges similarly they do from wired PC clients over the Internet

Slide 19

Wireless Security Challenges and Limitations Cellular/PCS gadgets are defenseless against capture/location on the grounds that the radio connection they utilize is presented to a few miles. Because of the constrained preparing force and memory, numerous encryption calculations utilized for PCs can\'t be utilized with PDAs. Security keys are for all time set before a client buys the telephone and the custom

View more...