Skinpress Rss

Monday 27 August 2012

4G- A NEW ERA IN WIRELESS TELECOMMUNICATION

0

4G- A NEW ERA IN WIRELESS TELECOMMUNICATION
                                                           

ABSTRACT
4G connect anytime, anywhere, anyhowpromising ubiquitous network access at high speed to the end users, has been a topic of great interest especially for the wireless telecom industry. 4G seems to be the solution for the growing user requirements of wireless broadband access and the limitations of the existing wireless communication system. The purpose of this paper is to provide an overview of the different aspects of 4G which includes its features, its proposed architecture and key technological enablers. It also elaborates on the roadblocks in its implementations. A special consideration has been given to the security concerns of 4G by discussing a security threat analysis model   proposed   by   International   Telecommunication Union (ITU). By applying this model, a detailed analysis of threats to 4G and the corresponding measures to counter them can be performed.


.   
 INTRODUCTION

Wireless telecommunication history can be classified into different generations of network. Each generation has been a giant stride which revolutionized the field of mobile communication. As discussed in paper , era of telecommunication started with 1G in 1980 where all the systems where based on analog radio signal technology. Voice was considered to be the main traffic. Various 1G standards defined were Advance Mobile Phone System (AMPS), Nordic Mobile Telephone (NMT), Time Division Multiple Access (TDMA) and Frequency Division Multiple Access (FDMA). In 1990, 1G was replaced by 2G which provided rich set of services such as high voice quality and global   mobility   based   on   the   digital   radio   signal technology.  Here also voice was considered to be the main traffic. 2G includes standards such as Global System For Mobile Communications (GSM), General Packet Radio System (GPRS). Both 1G and  2G are  based  on  circuit- switched technology for data communication at low speed.
2G was a huge success.
2G was followed by 2.5G which is an intermitent between 2G and 3G. It is based on both circuit switched and packet switched technologies providing high data rate with low power consumption. It uses the infrastructure of Global  System  for  Mobile  communications  (GSM)  and Code division multiple access (CDMA) to provide its services.
In the present generation, 2.5G is replaced by 3G which includes standards from 2.5G and also some other technologies such as Wi-MAX (Worldwide Interoperability for Microwave Access). It is totally based on the packet switching technology providing broad range of high quality services to the end user to meet the demand of high data rate  and  increasing  rate  of  network  users.  But  3G  was unable to repeat the success story of 2G as it provided only few new features over 2G.
Before 3G was deployed all over the world, the idea of technology beyond 3G started evolving. This idea was beyond the imagination of ordinary mobile user promising connect anytime, anyhow, anywhere. This ubiquitous network access will be achieved by seamlessly integrating the available and new networks using a core IP based network layer. This vision is called as the 4th generation of Communication (4G).
The   paper   introduces   the   idea   behind   4G providing a brief overview about its features, architecture and challenges faced in its implementation. Security being a primary concern in any implementation; it motivates the discussion about threat analysis model. Section 2 cites an example of how an ideal wireless communication network should provide service to the end user. Motivation behind 4G and  its  features  are  covered  in  Section  3.   Proposed  architecture for 4G and key technologies enabling 4G are discussed in Section 4 and 5 respectively. Section 6 covers the challenges in the migration to 4G while section 7 elucidates the threat analysis model which can be used as a base for the future research work in 4G security. Current developments and future work to be done in 4G are covered in Section 8.   Section 9 briefs up the conclusion of the paper and Section 10 enlist all the references of the research papers.
     

IF U NEED FULL PAPER SEND A REQUEST TO


CREANOVA [CREATIVE & INNOVATIVE ENGINEERS]

E-mail: creanovaengineerz@gmail.com


CONCLUSION

The advent of 4G is sure to revolutionize the field of telecommunication domain bringing the wireless experience to a  completely new level. It  would provide wealth of features and services making the world a smaller place to live. Thus, 4G seems to have the capability to realize the scenario discussed in Section 2. But 4G should also take lesson from the 3Gs failure to capture the imagination of the end-users. Technology should not be developed for technology’s sake rather it should target the end user. Thus, user-centric approach towards 4Gs development is the key to its success. Common consensus on the standards and the technologies for 4G needs to be reached to fasten 4G’s deployment which would be a gradual process. Lot of research work is required to investigate the open issues like design for SDR, QoS parameters   and   so   forth.   The   threat   analysis   model provided by ITU is very apt for the complete analysis and planning for security of 4G. It can be used as a reference framework for future research. But still comprehensive research work is required in the field of network security to tackle potential security threats because a ubiquitous secured heterogeneous network will appeal more to the today’s consumers.







0 comments:

Post a Comment

Links

Comments

Featured Post 6

Sponsors

Text

A Bit About Me

My Photo
In this site we are introducing creating new products and updating the current status about the engineers. We are trying to make new universe…

Follow this Blog