Assignment wireless...

Question 1

There are three main multiple access technique which are the FDMA, TDMA and CDMA. List out and describe the advantages and disadvantages of the 3 multiple access techniques.

Advantages TDMA
• Permits flexible bit rates by assigning more slots per frame to a certain user.
• Can support bursts or variable bit rate traffic.
• No guard bands required for wideband system.
• No narrowband filters required for wideband system.

Disadvantages of TDMA
• Each user has a predefined time slot. However, user roaming from one cell to another are not allotted time slot. Thus, if all the time slot on the next cell is already occupied, a call might disconnect and user will not receive a dial tone.
• Subjected to multi-path distortion. However, a time limit can be used on the system to solve the problem. Once the time limit is expired the signal is ignored.
• Higher synchronization overhead because of burst mode operation.
• Complexity equalization necessary for high data rates of wideband systems.
• Frequency/slot allocation complexity
• Pulsating power envelop: interference with other devices
• Electronics operating at high bit rate increase poser consumption.


Advantages CDMA
• CDMA can support many users in the same channel, example: high capacity.
• Lower mobile transmit power, example: longer battery life and better power control.
• Improved performance in multipart environments, RAKE receivers can be used to improve signal reception by exploiting diversity.
• Soft handoffs can be used. Mobile can switch base station without switching carries. Two base stations receive the mobile signal and the mobile is receiving from two base stations.
• High peak data rates can be accommodated.

Disadvantages of CDMA
• One major problem in CDMA technology is channel pollution, where signals from too many cell sites are present in the subscriber’s phone but none of them is dominant. When this situation arises the quality of the audio degrades.
• Another disadvantage in this technology when compared to GSM is the lack of international roaming capabilities. The ability to upgrade or change to another handset is not easy with this technology because the network service information for the phone is put in the actual phone unlike GSM which uses SIM card for this.
• One another disadvantage is the limited variety of the handset, because at present the major mobile companies use GSM technology.
• The code length has to be careful selected because a large code length can induce delay or even cause interference.
• CDMA also requires tight power control as it suffers for far-near effect.
• Soft handoff increases use of radio resources and hence can reduce capacity.



Advantages FDMA
• Reducing the information bit rate and using efficient digital codes can increase the capacity.
• As FDMA systems use low bit rates (large symbol time) compared to average delay spread, they reduce the cost, and there is low Inter Symbol Interference (ISI).
• There is hardly any equalization required.
• Technological advances required for implementation are simple. A system can be configured so that improvements in terms of speec coder bit-rate reduction could be readily incorporated.
• Since the transmission is continuous, less number of bits are needed for synchronization and framing.

Disadvantages of FDMA
• It does not differ significantly from analog systems, capacity improvement depends on reducing signal to interference ratio, or signal to noise ratio (SNR).
• The maximum bit rate per channel is fixed and small.
• The guard band between each two users results in wastage of capacity.
• Hardware involves narrow band filters, which cannot be realized in VLSI and thus increase the cost.
• Law call capacity
• Lack of security where a call could be overhead with considerable ease and one could steal a phone’s serial code and make illegal calls on the systems.




Question 2

In 3G cellular network, the two popular standards are WCDMA and CDMA-2000. List out of all the similarities and differences of the two technology.


Similarities WCDMA and CDMA-2000





Differences WCDMA and CDMA-2000





CDMA is a complete cellular system which was employed for 2G and now for 3G networks. CDMA-2000 is the version of CDMA system for 3G. WCDMA is the physical layer technology adopted for 3G UMTS system. The difference between CDMA and WCDMA in term of physical layer spreading is that in CDMA system signal is spread up to 1.25 MHz while in WCDMA signal is spread up to 5MHz band. Hence extra "W" meaning "wide" is used and hence called as WCDMA.

The biggest difference between WCDMA and CDMA-2000 is the origin. WCDMA is an evolution of GSM, while CDMA-2000 is an evolution of CDMA. WCDMA uses a broader spectrum and the signalling is based on GSM. CDMA's signalling is somewhat related to TDMA signalling. Both use Code Division to get the packets in sequence and both offer similar data speed and voice capabilities.

Assignment..

Minggu nie dh start kuliah..and of course la..dh ade assignment yg dh kene wat pon...=).Untuk minggu ini assignment first kene wat dlm kumpulan..(naseb baek!)..Assignment yg akan kami siapkan adelah mengenai wireless regulatory bodies kat seluruh dunia..Berikut adalah beberapa contoh wireless regulatory bodies yg terlibat dlm assignment kami..

1-Federal Communication Commission-United States
2-European Telecommunications Standard Institute - Europe
3-Department of Communications - Canada
4-Australian Communications and Media Authority - Australia
5-Commission Federal de Telecomunicaciones - Mexico

Kumpulan kami telah memilih Department of Communication in Canada sebagai salah satu wireless regulatory bodies yg akan dikaji..

Untuk menyiapkan assignment ini..kami perlu menjawab beberapa soalan yg telah diberi oleh pensyarah..Berikut adalah soalan2 nye..

1- Give brief summary about the regulatory agency
2- What a future trend of the agency in the 2.4-GHz RF spectrum and purpose of frequency 2.4-GHz
3- What is the future trend of the agency in the 5-GHz RF spectrum and hte purpose of frequency 5-GHZ
4- Differentiate this body from others
5- What official comprise the regulatory bodies
6- How do companies comply with the regulation
7- How does the regulatory agency monitor the airwaves
8- What action do they take for violation
9- What penalties are imposed for violation








LECTURE 10: LEGAL AND CRITICAL ISSUES IN COMPUTER SECURITY

INTRODUCTION

To know what protection the provides for computer and data to appropriate laws that protect the right of other with respect to computer, program and data, and to understand how existing laws provide a basis for recommending new laws to protect computers, data and computer.

Law is not always the appropriate way to deal with issues of human behavior.

Differences between LAWS and ETHICS

Laws
  • Described by formal, written laws
  • Interpreted by court
  • Established by legislature representing everyone
  • Applicable to everyone
  • Priority determined by courts if two laws conflict
  • Court is final arbiter of right
  • Enforceable by police and court

Ethics
  • Described by unwritten principles
  • Interpreted by individuals
  • Presented by philosophers, religions, professionals group
  • Personal choice
  • Priority determined by individuals if two principles conflict
  • Limited enforcement
Protecting Programs and Data


Copyrights


- Are design to protect the expression and data.
- Applied to creative work such as story
- Intended to allow regular and free exchange of ideas.
- Must be apply to any original work and it must be in some tangible medium of expression.
- Grant to the original of the expression.
- Can also be granted for work which contains some public domain material as long as there is some originally, without the need for the author to identify what is public and what is original.

Patents

- Different from copyrights in that it applies to the results of science, technology and engineering.
- Can protect a new and useful process, machine, manufacture or composition of matter.
-Designed to protect the device or process for carrying out an idea
- Can valid only for something that is truly novel or uniques
-Granted to who invented it first, regardless who filed the invention first.
- The patents applicant has to reveal what is novel about the invention
- The patents owner then will use the patented invention by producing or by licensing others to produce them.

Trade Secret

A trade secret is information that gives one company a competitive edge over others. For example, the formula for a soft drink is a trade secret, as is a mailing list of customers, or information about a product due to be announced in a few months.

The distinguishing characteristic of a trade secret is that it must always be kept secret. The owner must take precautions to protect the secret, such as storing it in a safe, encrypting it in a computer file, or making employees sign a statement that they will not disclose the secret.
Trade secret protection applies very well to computer software.

The underlying algorithm of a computer program is novel, but its novelty depends on nobody else’s knowing it.

Trade secret protection allows distribution of the result of a secret (the executable program) while still keeping the program design hidden.
Trade secret protection does not cover copying a product (specifically a computer program), so that it cannot protect against a pirate who sells copies of someone else’s program without permission.

However, trade secret protection makes it illegal to steal a secret algorithm and use it in another product.


Why Computer Crime is Hard to Define?
Understanding
*Neither courts, lawyers, police agents, nor jurors necessarily understand computers.

Fingerprints
*Polices and courts for years depended on tangible evidence, such as fingerprints. But with many computer crimes there simply are no fingerprints, no physical clues.
Form of Assets
*We know what cash is, or diamonds, or even negotiable securities. But are 20 invisible magnetic spots really equivalent to a million dollars?

Juveniles
*Many computer crimes involve juveniles. Society understands immaturity and can treat even very serious crimes by juveniles as being done with less understanding than when the same crime is committed by an adult.

Type of Crimes Committed

Telecommunications Fraud
*It is defined as avoiding paying telephone charges by misrepresentation as a legitimate user.

Embezzlement
*It involves using the computer to steal or divert funds illegally.

Hacking
*It denotes a compulsive programmer or user who explores, tests, and pushes computers and communications system to their limits - often illegal activities.

Automatic Teller Machine Fraud
*It involves using an ATM machine for a fraudulent activity - faking deposits, erasing withdrawals, diverting funds from another person’s account through stolen PIN numbers.

Records Tampering
*It involves the alteration, loss, or destruction of computerised records.

Acts of Disgruntled Employees
*They often use a computer for revenge against their employer.

Child Pornography and Abuse
*They are illegal or inappropriate arts of a sexual nature committed with a minor or child, such as photographing or videotaping.

Drug Crimes
*Drug dealers use computers to communicate anonymously with each other and to keep records of drug deals.

Organised Crime
*For all kinds of crime, the computer system may be used as their tools.


Summary


Firstly, the legal mechanisms of copyright, patent, and trade secret were presented as means to protect the secrecy of computer hardware, software and data.

However, these mechanisms were designed before the invention of computer, so their applicability to computing needs is somewhat limited.

Meanwhile, program protection is especially desired, and software companies are pressing the courts to extend the interpretation of these means of protection to include computers.

Secondly, relationship between employers and employees, in the context of writers of software. Well-established laws and precedents control the acceptable access an employee has to software written for a company

Thirdly, some difficulties of in prosecuting computer crime. In general, the courts have not yet granted computers, software, and data appropriate status considering value of assets and seriousness of crime. The legal system is moving cautiously in its acceptance of computers.

What are Ethics?

Society relies on ethics or morals to prescribe generally accepted standards of proper behaviour.

An ethic is an objectively defined standard of right and wrong within a group of individuals.

These ethics may influence by religious believe. Therefore, through choices, each person defines a personal set of ethical practices.

A set of ethical principles is called and ethical system.

Differences of The Law and Ethics

Firstly, laws apply to every one, even you do not agree with the laws. However, you are forced to respect and obey the laws.

Secondly, there is a regular process through the courts for determining which law supersedes which if two laws conflict.

Thirdly, the laws and the courts identify certain actions as right and others as wrong. From a legal standpoint, anything that is not illegal is right.

Finally, laws can be enforced, and there are ways to rectify wrongs done by unlawful behaviour.

Contrast of Law Versus Ethics










 

©2009 W0rLD of CoMputer ScieNce | by TNB