SIMULATION MODEL OF CELLULAR NETWORK BANDWIDTH CONGESTION DUE TO MMS ATTACKS ON MOBILE PHONES

Size: px
Start display at page:

Download "SIMULATION MODEL OF CELLULAR NETWORK BANDWIDTH CONGESTION DUE TO MMS ATTACKS ON MOBILE PHONES"

Transcription

1 SIMULATION MODEL OF CELLULAR NETWORK BANDWIDTH CONGESTION DUE TO MMS ATTACKS ON MOBILE PHONES Julius O. Paler Journal of Science, Engineering and Technology Abstract This paper attempts to develop a simulation model that would predict the bandwidth congestion of mobile networks due to multimedia message service (MMS) attacks on mobile phones. The study used an experimental design using simulation modeling. Assumptions were formulated to measure different variables. Findings revealed that the MMS attacks on mobile phones do not cause congestion on the cellular network due to the relatively small data size of the UDP packet. Keywords: simulation model, bandwidth congestion, mobile network, MMS attacks 1.0 Introduction An MMS attack is a form of an attack wherein an attacker sends user datagram protocol (UDP) packets to a mobile phone primarily to drain the phone s battery. This paper intends to develop a simulation model of its effect on the bandwidth of cellular networks. Cellular networks are very important information infrastructure. As mobile devices become more dominant, cellular companies are quickly installing broadband data services, like the High-Speed Downlink Packet Access (HSDPA) and Evolution-Data Optimized (EVDO). New applications, like Multimedia Messaging Service (MMS) are also being deployed. Whereas these new services and applications improve mobile computing knowledge, they also bring in severe security concerns (Racic et al.). Multimedia messaging is becoming more and more popular among users of mobile phone. Most mobile phones nowadays carry multimedia messaging, excluding some low-cost phones. Mobile phone service providers also greatly support multimedia messagingenabled phones, since service fees represent an extra source of income. Sadly, the Multimedia Messaging Service (MMS) is prone to abuse, A study on the vulnerability of MMS has already been conducted (Mulliner et al.). But it s effect on cellular network s bandwidth has not been fully explored; hence this study. The simulation model intends to provide analysis of the severity of the impact on cellular network congestion. Analyzing mobile phone applications is

2 18 difficult for several reasons. First of all, these applications lack decent documentation. Also, operating systems of mobile phone often do not present refined improvement kits or support for repair. Additionally, investigating MMS needs access to an infrastructure, namely the phone service network. As a result, testing is quiet costly. 2.0 Conceptual Framework MMS is a normal way to send messages. It expands the foundation of SMS (Short Message Service) ability that allowed trade of text messages only up to 160 characters long. The most accepted use is to send pictures from handsets that are equipped with cameras. It is also used on a profitable basis by media companies as a way of bringing news and entertainment content. Also by retail brands as an instrument for sending scannable voucher codes, merchandise images, videos and other information. Commercial MMS can carry a range of media such as video, image, various images via slideshow or audio and infinite characters. The objective of MMS is to sustain the switch of messages between User Agent applications, which typically exist in mobile phones and controlled by the users. The MMS architecture is nearly IPbased. It depends in cooperation with the hypertext transfer protocol (HTTP) and the protocols clearly stated by the wireless application protocol (WAP) architecture. These set of rules rely on the transfer mechanisms given by the phone network to interrelate with the User Agent on the mobile phone. HTTP is the basis of data exchange for the World Wide Web (WWW). A WAP is a technical standard for accessing information over a mobile wireless network. Message delivery between User Agents is performed by four components: the MMS Server, the MMS Relay, the WAP Gateway/ Push Proxy, and the Short Message Service Center (SMSC). The MMS Server and MMS Relay are usually referred to as the Multimedia Message Service Center (MMSC). Figures 1 and 2 show the mechanism and their interactions and discussed hereinafter.

3 19 Figure 2. The MMS architecture and the message retrieval process (Source: Vulnerability Analysis of MMS User Agent) MMS Server. The MMS Server is in charge for keeping the messages sent from the users and for deciding when the messages should be transported to the recipients. MMS Relay. The MMS Relay takes care of transporting the actual message using a variety of methods, depending on the characteristics of the recipient. Specifically, it will utilize the WAP Gateway/Push Proxy if the message is for a mobile phone user in the same network. Otherwise SMTP server will be used if the message is for an account. MMS Relay will also be used of another provider if the message is for a user from a different network. WAP Gateway/Push Proxy. The WAP Gateway/Push-Proxy serves two purposes. Firstly, it acts as a doorway between the user s mobile phone and the HTTP-based communication. Secondly, it acts as a WAP Push Proxy and transports alerts (via WAP Push messages) that are used to inform the user that an MMS is set to be retrieved. SMSC. The WAP Push Pr oxy altogether with the MMS Relay transport WAP Push alerts to the user phones through the SMSC (Short Message Service Center) (Mulliner et al). An analysis on MMS security discovered several vulnerabilities that an attacker could exploit. These includes unencrypted and unauthenticated MMS messages, unauthenticated MMS receiver/ sender and critical phone information disclosure.

4 20 The probable MMS attack could be implemented by building a target hit-list, then bombard them with UDP packets in order to drain its batteries (Racic et al.). When these packets flow into the network, these have the tendency to congest the channels with unwanted data traffic. Figure 3. MMS Attack Architecture (Source: Attacking SMS) To attack a phone effectively, an attacker must send a UDP packet 256 bits in size every 3.75 seconds for GSM-based network and every 5 seconds for CDMA-based network. Using an ADSL line with an average uplink speed of 384Kbps, an attacker can attack 5625 phones for GSM-based networks and 7000 for CDMA-based network (Racic et al.). A GSM-based network fall under 2G with bandwidth capacity ranging from 9.6Kbps to 14.4Kbps, while CDMA is 3G (Howie et al.). Existing 2G networks are integrated into the 3G network s. With this kind of attack, most cellphones will be totally drained between 2 to 7 hours. According to Globe Telecom, a leading cellular network in the Philippines, it has already established 100% 3G network coverage nationwide. With about 6,500 cell sites serving about 43 million subscribers. So that s about 6615 subscribers per cell or base

5 21 transceiver station. On a global scale, there are about 700 million 3G+ data subscriptions and 7.6 million base stations worldwide in 2014 (Feshke et al. 2011). A BTS is a piece of equipment that facilitates wireless communication between user equipment be(ue) and a network. UEs are devices like mobile phones, wireless local loop (WLL) phones and computers with wireless internet connectivity. A network can be of any wireless communication technologies like GSM, CDMA, WLL, Wi-Fi, WiMAX or other wide area network (WAN). The cellular network has a bandwidth ranging from 2.4Kbps to 5Mbps, that is from 1G to 3G networks, with 3G alone ranging from 2Mbps to 5Mbps (Sauvola et al. 2001). If 4G network is to be considered, it has a theoretical bandwidth up to 80Mbps (Zahariadis 2003). Figure 3. Conceptual framework 3.0 Research Design and Methods The study made use of an experimental design using simulation modeling. The experimental criterion measure is the bandwidth congestion of a cellular network. At the start of the simulation, it is assumed that an attacker attacks mobile phones from a single network, Globe Telecom. According to their data, it is assumed that there are 6,615 active mobile phones in a BTS, all of which have internet connectivity. Then, the state of the mobile phone is a random number assuming only two values, 0 and 1. A 1 indicate s a mobile phone experiencing an MMS attack while a 0 indicate s not experiencing an MMS attack. The consumed bandwidth is the product of the state of the mobile phone and 256. That is where 256 represents the size of the UDP packet, in bit, sent through the network by the attacker on the average per seconds. The usable bandwidth Bu is the difference between the

6 22 bandwidth of the cellular network BW and the consumed bandwidth Where BW is a random number between 9.6 to 5000 Kbps. Assumptions The simulation model is based on the following assumptions: 1. An MMS attack will come only from one attacker; 2. Mobile phones will come from a single network, Globe Telecom; 3. All mobile phones that will be attacked will come from a single BTS; 4. The bandwidth of the cellular network is a random number between 9.6 to 5000Kbps; 5. The state of the mobile phone is a random number either 0 or 1; 6. Each simulation corresponds to 6615 mobile phones being attacked with a probability of success equal to 4.0 Results and Discussion The data in Table 1 reveal that during the first simulation, which represents a single-bts with 6615 active mobile phones, the mean usable bandwidth of the BTS is Kbps with the MMS attack already occurring. The standard deviation of refers to the deviation of the usable bandwidth which is dependent on the random values assigned to the bandwidth of the network which is from 9.6Kbps to 5000Kbps. The mean usable bandwidth of Kbps of the single BTS indicate s that the MMS attack on the mobile phones does not have a severe impact on the network bandwidth. This is due to the fact that the size of the UDP packet sent from the attacker to the mobile phones is so small to cause data congestion on a relatively wide network bandwidth. Even if this simulation model will consider multiple MMS attackers, it will be unlikely that the MMS attacks will occur at the same time. It should be noted that once the MMS message has already been received by the mobile phone, it is no longer in the network. The simulation was repeated 1000 times. The 1000 repetitions would imitate 1000 BTS of the cellular network. Table 2 revealed that the mean usable bandwidth of the 1000 BTS is Kbps. The standard deviation of the mean usable bandwidth is Table 1 shows the first simulation.

7 23 Table 1. A Single BTS simulation. Table 2. A Multiple BTS Simulation. The mean usable bandwidth of the 1000 BTS which is Kbps provide s the same indication as of the single-bts simulation. The MMS attacks on the mobile phones do not cause congestion on the network bandwidth of the cellular network. The standard deviation of is very small compared to the single- BTS simulation. This is because the standard deviation refers to the mean usable bandwidth of the 1000 BTS which is not directly dependent on the random values of the bandwidth per simulation. 5.0 Conclusion MMS attacks primarily target mobile phones specifically by draining its battery. It shows vulnerability issues of the network when it comes to security. However, it does not really pose any threat as to its effect on the cellular network bandwidth. The size of the multimedia message is so small compared to the rapidly increasing bandwidth of the cellular network. Even if multiple attackers are to be considered in this simulation, the likelihood of the MMS messages to be in the network at the same time is very slim. MMS messages will be out of the network in a very short period of time because its final destination is in the designated receiver phones. Also, such MMS messages do not have any replicating ability like worms or virus wherein the receiver phone, in turn, will send the same MMS messages to other phones. 6.0 References Cited Feshke A, Fettweis G, Malmodin J, Biczok G The global footprint of global communications: the ecological and economic perspective. IEEE Communications Magazine. [accessed2014 Jun].

8 24 profile/gergely_biczok/ publication/ _the _Global_Carbon_Footprint_ of_mobile_communications The_Ecological_and_Eco nomic_perspective/ links/0912f50eaf3fb665ff Lackey Z,Miras L Attacking SMS.[accessed 2014 Jun]. historical/2009/blackhat usa-video/BHUSA09- Lackey-AttackingSMS- SLIDES.pdf Communications Conference; San Antonio, Texas.[accessed 2014 Jun]. /publications/pdf/86.p Zahariadis T Trends in the path to 4G.IEE Communications Engineer. [accessed 2014 Jun]. gr/professors/zahariad/ Journals-Magazines/IEE% 20Comm%20Eng%20% 20February% pdf Mulliner V Vulnerability analysis of MMS user agent.proceedings of the 23 rd Chaos Communications Congress; Berlin, Germany. nabilelkadhipublicationsover view/conferences/ PID pdf Racic R, Ma D, Chen H ExploitingMMS vulnerabilities to stealthily exhaust mobile phone s battery. [accessed 2014 Jun]. ftp://ool-ad02c0ce.dyn.opt online.net/mynetdocs_ Utilities_/BackTrack4/ mmaexploit.pdf Sun J, Sauvola J, Howie D Features in future: 4G visions from a technical perspective. Proceedings of the IEEE Global

Short Message Service (SMS)

Short Message Service (SMS) TECQUI Ayra M.-B. Short Message Service (SMS) Introduction Short message service is a mechanism of delivery of short messages over the mobile networks. It is a store and forward way of transmitting messages

More information

LTE : The Future of Mobile Broadband Technology

LTE : The Future of Mobile Broadband Technology LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

Technical description of international mobile roaming May 2010

Technical description of international mobile roaming May 2010 Technical description of international mobile roaming May 2010 Prepared by the Ministry of Economic Development of New Zealand and the Department of Broadband, Communications and the Digital Economy of

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

GSMA MOBILE WORLD CONGRESS 2013 CONTENT OR TECHNOLOGY: WHAT ARE THE TRENDS DRIVING DATA DEMAND MIKE WRIGHT, EXECUTIVE DIRECTOR NETWORKS

GSMA MOBILE WORLD CONGRESS 2013 CONTENT OR TECHNOLOGY: WHAT ARE THE TRENDS DRIVING DATA DEMAND MIKE WRIGHT, EXECUTIVE DIRECTOR NETWORKS GSMA MOBILE WORLD CONGRESS 2013 CONTENT OR TECHNOLOGY: WHAT ARE THE TRENDS DRIVING DATA DEMAND MIKE WRIGHT, EXECUTIVE DIRECTOR NETWORKS THE CHALLENGE The World s 6th largest land mass 9th lowest population

More information

GPRS and UMTS T

GPRS and UMTS T GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,

More information

Chapter 7. Telecommunications, the Internet, and Wireless Technology

Chapter 7. Telecommunications, the Internet, and Wireless Technology Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different

More information

Overview. M-commerce vs. E-commerce

Overview. M-commerce vs. E-commerce M-COMMERCE Overview What is M-Commerce? M-commerce vs. E-commerce Classes of M-Commerce Applications Benefits of M-commerce Advantages of M-Commerce Disadvantages of M-Commerce Mobile Computing: Content,

More information

Mobile Commerce. Electronic Commerce

Mobile Commerce. Electronic Commerce Mobile Commerce Electronic Commerce Code: 008023-01+02 Course: Electronic Commerce Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic Commerce 1 00. Contents 01. Mobile

More information

09. Mobile Commerce. Contents. Mobile Computing and Commerce

09. Mobile Commerce. Contents. Mobile Computing and Commerce 09. (Contents) Mobile Commerce Contents 09. Mobile Commerce Mobile Computing and Commerce Code: 166140-01+02 Course: Electronic Commerce Period: Autumn 2011 Professor: Sangwon Lee, Ph.D. 1 09. (Contents)

More information

The Project June 2006

The Project June 2006 The Project June 2006 Today s Telco - Broadband Downfall of Main Revenue Stream PSTN Business Leased-line Broadband take-up over first 10 years is faster than previous services across the OECD countries.

More information

> CDMA2000 Differentiators. Superior Voice & Data Technology. Stephane LeDreau, Vice President Business Development

> CDMA2000 Differentiators. Superior Voice & Data Technology. Stephane LeDreau, Vice President Business Development > CDMA2000 Differentiators Superior Voice & Data Technology Stephane LeDreau, Vice President Business Development CDMA2000 Technology Advantages > Improved spectrum utilization compared to UMTS > Unique

More information

The Cellular Interceptor CC2800 Series

The Cellular Interceptor CC2800 Series The Cellular Interceptor CC2800 Series Operational Parameters The Target Mode enables the user to direct cellular interception by variables such as the IMSI, TMSI, or cellular phone number of the suspect.

More information

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks Rev.Confirming Pages VISUAL SUMMARY Communications and Networks COMMUNICATIONS COMMUNICATION CHANNELS Communications is the process of sharing data, programs, and information between two or more computers.

More information

Local area network (LAN) Wide area networks (WANs) Circuit. Circuit switching. Packets. Based on Chapter 2 of Gary Schneider.

Local area network (LAN) Wide area networks (WANs) Circuit. Circuit switching. Packets. Based on Chapter 2 of Gary Schneider. Local area network (LAN) Network of computers located close together Wide area networks (WANs) Networks of computers connected over greater distances Based on Chapter 2 of Gary Schneider. (2009). E-Business.

More information

Wireless Communication

Wireless Communication Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications

More information

Mobile Telephony and Broadband services

Mobile Telephony and Broadband services Mobile Telephony and Broadband services A way to reduce the gap of digital divide in Mediterranean Marios Yiatzidis Regulatory Manager 02 05 2006 Table of Contents The growth of mobile communications Mobile

More information

Keys to the Success of Mobile Commerce

Keys to the Success of Mobile Commerce Keys to the Success of Mobile Commerce Security, Performance, Usability and Practical Business Applications Marty Andolino Introduction to Mobile Commerce Evaluation Security Performance Usability Practical

More information

5G Wireless Technology

5G Wireless Technology 5G Wireless Technology Contents Introduction to 5G Evolution from 1G to 5G Key concepts Architecture Hardware & Software of 5G Features Advantages Applications Conclusion Introduction to 5G What is 5G?

More information

QOS ANALYSIS OF 3G AND 4G. Khartoum, Sudan 2 unversity of science and Technology, Khartoum, Sudan

QOS ANALYSIS OF 3G AND 4G. Khartoum, Sudan 2 unversity of science and Technology, Khartoum, Sudan QOS ANALYSIS OF 3G AND 4G Doaa Hashim Osman 1, Amin Babiker 2 and Khalid hammed Bellal 1 Department of Communication, Faculty of Engineering, AL Neelain University, Khartoum, Sudan 2 unversity of science

More information

Satellite-Based Cellular Backhaul in the Era of LTE

Satellite-Based Cellular Backhaul in the Era of LTE Satellite-Based Cellular Backhaul in the Era of LTE Introduction 3 Essential Technologies for 3G/LTE Backhauling over Satellite 6 Gilat s Solution SkyEdge II-c Capricorn 7 Why Ultra-fast TDMA is the Only

More information

Network Services, Cloud Computing and Virtualization

Network Services, Cloud Computing and Virtualization Network Services, Cloud Computing and Virtualization Client Side Virtualization Purpose of virtual machines Resource requirements Emulator requirements Security requirements Network requirements Hypervisor

More information

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA in Third-Generation Systems

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA in Third-Generation Systems 1 Introduction Harri Holma and Antti Toskala 1.1 WCDMA in Third-Generation Systems Analog cellular systems are commonly referred to as first-generation systems. The digital systems, such as Global System

More information

Beyond 3G Wireless. K.Raghunandan (RAGHU) Construction Administrator (Wireless) Communication Engineering New York City Transit (MTA)

Beyond 3G Wireless. K.Raghunandan (RAGHU) Construction Administrator (Wireless) Communication Engineering New York City Transit (MTA) Beyond 3G Wireless K.Raghunandan (RAGHU) Construction Administrator (Wireless) Communication Engineering New York City Transit (MTA) 3G Deployments today Rev C? 3G -1X EVDO CDMA2000 Rev A 3G -1XRTT CDMA2000

More information

DELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS

DELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS Research Article DELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS S. Swarna Parvathi, Dr. K. S. Eswarakumar Address for Correspondence S. Swarna Parvathi, PhD Scholar Department

More information

Quality-of-Service Option for Proxy Mobile IPv6

Quality-of-Service Option for Proxy Mobile IPv6 Internet Engineering Task Force (IETF) Request for Comments: 7222 Category: Standards Track ISSN: 2070-1721 M. Liebsch NEC P. Seite Orange H. Yokota KDDI Lab J. Korhonen Broadcom Communications S. Gundavelli

More information

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic Virus Protection & Content Filtering TECHNOLOGY BRIEF Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server Enhanced virus protection for Web and SMTP traffic INSIDE The need

More information

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1 1 Outcome 1 A description of mobile device internet connectivity using two current Wi-Fi methods. A description of mobile device internet connectivity using two current GSM mobile telephony methods. A

More information

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH, Abstract In the future of Mobile networks it is important to implement a Femtocell at homes and to improve the domestic network. Even

More information

Chapter 2. Literature Survey. 2.1 Remote access technologies

Chapter 2. Literature Survey. 2.1 Remote access technologies Chapter 2 Literature Survey This chapter presents a brief report on literature reviewed in context to present work with an aim to identify current state of research in the domain. Literature review is

More information

Finnish mobile market. What is ahead for mobile operator Mika Sarén Technology Manager Radiolinja. Usage of networks - minutes (%) Oy Radiolinja Ab

Finnish mobile market. What is ahead for mobile operator Mika Sarén Technology Manager Radiolinja. Usage of networks - minutes (%) Oy Radiolinja Ab Finnish mobile market Radiolinja placed world s first GSM call in 1991 What is ahead for mobile operator Mika Sarén Technology Manager Radiolinja High penetration: more than 3 M subs out of 5 M inhabitants

More information

Making MMS successful in CDMA revenue-generating components of a wireless data ecosystem

Making MMS successful in CDMA revenue-generating components of a wireless data ecosystem Making MMS successful in CDMA revenue-generating components of a wireless data ecosystem 1 Agenda Introduction Market overview LogicaCMG MMSC roadmap LogicaCMG Features 2 Introduction 3 Understand your

More information

4G Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India

4G Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India Abstract-Wireless services have the highest demand in internet

More information

An Architecture. What the MEC? for 5G

An Architecture. What the MEC? for 5G An Architecture What the MEC? for 5G What the MEC? An architecture for 5G As we stated in the first e-book in this series, the evolution from LTE to 5G will be the most profound transformation on the wireless

More information

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal

More information

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS Pinki Tanwar * Shweta** ABSTRACT A mobile adhoc network is a collection of mobile nodes which form a network which is not fixed. The nodes in the network dynamically

More information

Naresh Soni CTO, InterDigital

Naresh Soni CTO, InterDigital March 5, 2012 WTC 2012 Challenges and Innovations in LTE Deployment Naresh Soni CTO, InterDigital Agenda InterDigital Overview Key Trends Key Challenges in LTE Innovative Solutions for LTE Deployment Summary

More information

Mobile Offloading for Maximum Utility at Minimum Cost

Mobile Offloading for Maximum Utility at Minimum Cost ISSN 2278 0211 (Online) Mobile Offloading for Maximum Utility at Minimum Cost Anjana Antony M. Tech 4th Sem, Department of Computer Science & Engineering Dr. B. R. Prasad Babu Professor & HOD, Department

More information

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology Review Questions for exam Preparation (22-07-2017) 1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology 2. What is the Internet? "network

More information

Evaluation of End-to-End TCP performance over WCDMA

Evaluation of End-to-End TCP performance over WCDMA Evaluation of End-to-End TCP performance over WCDMA Liang Hu Department of Communications, Optics & Materials Technical University of Denmark, Lyngby, Denmark Email:{lh}@com.dtu.dk Abstract this article

More information

Mobile forensics. SMS (Short Message Service) EMS, MMS, CBS

Mobile forensics. SMS (Short Message Service) EMS, MMS, CBS Mobile forensics SMS (Short Message Service) EMS, MMS, CBS How the Mobiles Work The Route of a Mobile Phone Telephone Call, (or SMS or user data traffic) SIM card Radio access network Core network MS/UE

More information

Energy consumption model on WiMAX subscriber station

Energy consumption model on WiMAX subscriber station IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Energy consumption model on WiMAX subscriber station To cite this article: N Mubarakah et al 2018 IOP Conf. Ser.: Mater. Sci.

More information

Mobile broadband wireless access. - Connecting all EU citizens against economic downturn

Mobile broadband wireless access. - Connecting all EU citizens against economic downturn Mobile broadband wireless access. - Connecting all EU citizens against economic downturn Mats Nilsson VP head of European Affairs 20 October 2009 Mobile broadband is serving the political agenda mobile

More information

KDDI s Future Plan Taking Advantage of CDMA Evolution Path

KDDI s Future Plan Taking Advantage of CDMA Evolution Path KDDI s Future Plan Taking Advantage of CDMA Evolution Path Dr. Hideo Okinaka VP & GM, Emerging Technologies and Spectrum KDDI Corporation 20th October 2010 CDG Webcast Table of Contents 1. Landscape has

More information

Mobile Security Fall 2013

Mobile Security Fall 2013 Mobile Security 14-829 Fall 2013 Patrick Tague Class #4 Telecom System Security General Vulnerabilities Service interruption vulnerabilities Due to increased capacity offered by high speed communication

More information

Effective Response of BT and SMS Hybrid Virus Propagation and Prevention in MANET Harsha Kubade, Deepali Khatwar, Dhananjay Sable

Effective Response of BT and SMS Hybrid Virus Propagation and Prevention in MANET Harsha Kubade, Deepali Khatwar, Dhananjay Sable Effective Response of BT and SMS Hybrid Virus Propagation and Prevention in MANET Harsha Kubade, Deepali Khatwar, Dhananjay Sable Abstract A rapidly increasing development of mobile network, mobile phones

More information

Internet. Class-In charge: S.Sasirekha

Internet. Class-In charge: S.Sasirekha Internet Class-In charge: S.Sasirekha COMPUTER NETWORK A computer network is a collection of two or more computers, which are connected together to share information and resources. Network Operating Systems

More information

CSC 4900 Computer Networks: Mobility

CSC 4900 Computer Networks: Mobility CSC 4900 Computer Networks: Mobility Professor Henry Carter Fall 2017 Last Time What is the hidden terminal problem? How do CDMA networks use spectrum differently than TDMA systems? What is a chipping

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Quarterly Market Indicators Q2 2016

Quarterly Market Indicators Q2 2016 Quarterly Market Indicators Disclaimer Page 3 Mobile services Broadband services Page 4 Page 5 CONTENT Fixed telephony services Page 7 Definitions Page 8 Disclaimer TRA does not make any representations

More information

WHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers)

WHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers) WHITE PAPER Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers) Table of Contents About This Document... 1 Chapter 1 Wireless Data Technologies... 2 Wireless Data Technology Overview...

More information

Securing emerging wireless networks and services

Securing emerging wireless networks and services Securing emerging wireless networks and services 4 th ESTI security workshop, 13-14 January 2009 - ETSI, Sophia Antipolis, France Ganesh Sundaram, Distinguished Member of Technical Staff Wireless Advanced

More information

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA technology and deployment status

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA technology and deployment status 1 Introduction Harri Holma and Antti Toskala 1.1 WCDMA technology and deployment status The first Third Generation Partnership Project (3GPP) Wideband Code Division Multiple Access (WCDMA) networks were

More information

Wireless systems overview

Wireless systems overview Wireless systems overview Evolution of systems from 1G to 4G 1G, 4G major features Specifications comparison 5G communication systems Summary Wireless Systems 2016 Evolution of cellular networks WiMAX

More information

Quarterly Market indicators. Data at the end of Q4 2013

Quarterly Market indicators. Data at the end of Q4 2013 Quarterly Market indicators Data at the end of Q4 2013 2014 Contents Disclaimer Page 3 Mobile services Page 4 Broadband services Page 5 Fixed telephony services Page 7 Definitions Page 8 2 Disclaimer TRA

More information

IS THE INTERNET MOBILE?

IS THE INTERNET MOBILE? International Telecommunications Society Asia-Australasian Regional Conference Perth, Australia 22-24 June 2003 IS THE INTERNET MOBILE? MEASUREMENTS FROM ASIA-PACIFIC Michael.Minges@itu.int Telecommunication

More information

RELIABLE CONNECTIONS FOR A CONNECTED WORLD

RELIABLE CONNECTIONS FOR A CONNECTED WORLD RELIABLE CONNECTIONS FOR A CONNECTED WORLD AlphaGateway The Enabling Technology AlphaGateway Family With over 40 years of broadband cable TV powering expertise and over 1 million hardened modems in operation

More information

Mobile telephones/international roaming frequently asked questions (see also IP/05/161)

Mobile telephones/international roaming frequently asked questions (see also IP/05/161) MEMO/05/44 Brussels, 10 th February 2005 Mobile telephones/international roaming frequently asked questions (see also IP/05/161) What is international roaming? International roaming provides subscribers

More information

Quarterly Market Indicators Q1 2018

Quarterly Market Indicators Q1 2018 Quarterly Market Indicators Q1 2018 1 Content Disclaimer Page 3 Mobile services Page 4 Fixed line telephony services Page 6 Broadband services Page 8 Definitions Page 10 2 Disclaimer TRA has relied on

More information

Backbones Sprintlink, CDMA & IDEN

Backbones Sprintlink, CDMA & IDEN Backbones Sprintlink, CDMA & IDEN Master Agent Training Series February 6, 2006 1 2005 Sprint Nextel. All rights reserved. SPRINT, the "Going Forward" logo, the NEXTEL name and logo and other trademarks

More information

Paper on Handling Menace of International Grey Traffic

Paper on Handling Menace of International Grey Traffic Paper on Handling Menace of International Grey Traffic White Paper 01 of 2012 PiRRC In this paper discussion is only about the conventional international voice telephony requiring a license to bring in

More information

Quarterly Market Indicators Q2 2017

Quarterly Market Indicators Q2 2017 Quarterly Market Indicators Disclaimer Page 3 Mobile services Page 4 Fixed line telephony services Page 6 CONTENT Broadband services Definitions Page 8 Page 10 Disclaimer TRA has relied on information

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK MOBILE COMMUNICATION AMOL RATAN VAIDKAR 1, PROF. G. D. GULHANE 2, DR. H. R. DESHMUKH

More information

Telephone. Basic Telephone. A telephone is an electronic device used for two- way talking with other people. EE1D01 Electrical Science for Everyone

Telephone. Basic Telephone. A telephone is an electronic device used for two- way talking with other people. EE1D01 Electrical Science for Everyone Telephone A telephone is an electronic device used for two- way talking with other people. 1 Basic Telephone Telephone Subscriber Line CO (Local Exchange) T dial switch cradle switch tip (+) ear R mouth

More information

UTM 5000 WannaCry Technote

UTM 5000 WannaCry Technote UTM 5000 WannaCry Technote The news is full of reports of the massive ransomware infection caused by WannaCry. Although these security threats are pervasive, and ransomware has been around for a decade,

More information

Chapter 2 The 3G Mobile Communications

Chapter 2 The 3G Mobile Communications Chapter 2 The 3G Mobile Communications 2.1 The Vision for Third Generation (3G) Mobile Communication Systems: The vision for the emerging mobile and personal communication services for the new century

More information

ENABLING MULTI-ACCESS SERVICES WITH THE ALWAYS BEST CONNECTED CONCEPT

ENABLING MULTI-ACCESS SERVICES WITH THE ALWAYS BEST CONNECTED CONCEPT ENABLING MULTI-ACCESS SERVICES WITH THE ALWAYS BEST CONNECTED CONCEPT Magnus Gunnarsson Director of Product Management Ericsson ALWAYS BEST CONNECTED OCTOBER 2003 1 Wireless Communications Evolution PAN

More information

The research of key technologies in the fifth-generation mobile communication system Su Lina1, a, Chen Wen2,b, Chen Ping3,c, Lu Yanqian4,d

The research of key technologies in the fifth-generation mobile communication system Su Lina1, a, Chen Wen2,b, Chen Ping3,c, Lu Yanqian4,d International Industrial Informatics and Computer Engineering Conference (IIICEC 2015) The research of key technologies in the fifth-generation mobile communication system Su Lina1, a, Chen Wen2,b, Chen

More information

3G Technical Evolution as an evolving broadband solution

3G Technical Evolution as an evolving broadband solution ITU-D Regional Development Forum for the Asia Pacific Region NGN and Broadband, Opportunities and Challenges Yogyakarta, Indonesia, 27 29 July 2009 3G Technical Evolution as an evolving broadband solution

More information

Lecture 11C Mobile Commerce

Lecture 11C Mobile Commerce Lecture 11C Mobile Commerce Outline Introduction Characteristics of M-commerce Enabling Technologies Mobile Payment Conclusion Outline Introduction Characteristics of M-commerce Enabling Technologies Mobile

More information

Sustainable traffic growth in LTE network

Sustainable traffic growth in LTE network Sustainable traffic growth in LTE network Analysis of spectrum and carrier requirements Nokia white paper Sustainable traffic growth in LTE network Contents Executive summary 3 Introduction 4 Capacity

More information

This tutorial is designed for those who would like to understand the basics of i-mode in simple and easy steps.

This tutorial is designed for those who would like to understand the basics of i-mode in simple and easy steps. About the Tutorial NTT DoCoMo's i-mode is a mobile internet service popular in Japan. i-mode was invented by a team led by Mari Matsunaga in February 1999 at NTT DoCoMo. This tutorial explains the basic

More information

Smart Energy for Smart Cities Webinar 28 March Andy Wood, Director, Business Development, Smart Energy & Home Security and Automation, Qualcomm

Smart Energy for Smart Cities Webinar 28 March Andy Wood, Director, Business Development, Smart Energy & Home Security and Automation, Qualcomm Smart Energy for Smart Cities Webinar 28 March 2012 Andy Wood, Director, Business Development, Smart Energy & Home Security and Automation, Qualcomm GSM Association 2011 3G Cellular Technology for Smart

More information

Mobile Application Ecosystems

Mobile Application Ecosystems Mobile Application Ecosystems Mika Mannermaa November 14, 2005 T-110.5120 Next Generation Wireless Networks Helsinki University of Technology Delivering Quality Content into the Hands of Mobile Consumers

More information

Small Cells as a Service rethinking the mobile operator business

Small Cells as a Service rethinking the mobile operator business Small Cells as a Service rethinking the mobile operator business Mats Eriksson, CEO Arctos Labs Scandinavia AB -02-18 1 Executive summary Mobile operators (MNOs) face a huge challenge in meeting the data

More information

Operationalizing Seamless Mobility through Service Delivery Platforms

Operationalizing Seamless Mobility through Service Delivery Platforms Operationalizing Seamless Mobility through Service Delivery Platforms Chand Gundecha Motorola Networks Senior Marketing Manager, Seamless Mobility Mobile Telephone (312) 307-0677 E-mail: Chand.Gundecha@motorola.com

More information

INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL.

INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL. INTERNET OF THINGS FOR SMART CITIES BY ZANELLA ET AL. From IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014 Presented by: Abid Contents Objective Introduction Smart City Concept & Services

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 10 Wireless Wide Area Networks Objectives Describe wireless wide area networks (WWANs) and how they are used Describe the applications that can be used

More information

CDMA450 Devices Panel

CDMA450 Devices Panel CDMA450 Devices Panel Rio de Janeiro, BRAZIL 18 April 2005 Introduction to Axesstel Mission Statement Axesstel s Mission is to support the goal of universal connectivity. We are committed to meeting the

More information

Agenda MULTIMEDIA MESSAGING MESSAGING EVOLUTION. Beatriz Ballesteros. Who is Telefónica Móviles. Evolution of Messaging Applications

Agenda MULTIMEDIA MESSAGING MESSAGING EVOLUTION. Beatriz Ballesteros. Who is Telefónica Móviles. Evolution of Messaging Applications MESSAGING EVOLUTION MULTIMEDIA MESSAGING Beatriz Ballesteros Messaging Services Platforms Manager Agenda Who is Telefónica Móviles Evolution of Messaging Applications Multimedia Messaging MMS Architecture

More information

IP Paging Considered Unnecessary:

IP Paging Considered Unnecessary: IP Paging Considered Unnecessary: Mobile IPv6 and IP Paging for Dormant Mode Location Update in Macrocellular and Hotspot Networks James Kempf DoCoMo USA Communications Labs 181 Metro Drive, Suite 3 San

More information

Wireless Broadband: Does one size fit all? Asimakis Kokkos China Industry Environment

Wireless Broadband: Does one size fit all? Asimakis Kokkos China Industry Environment Wireless Broadband: Does one size fit all? Asimakis Kokkos China Industry Environment 1 Nokia Siemens Networks 3 rd IEEE Broadband Wireless Workshop 19-May-2008 A tale of two industries Mobile Broadband

More information

3G Wireless. from an Operator s Perspective. David T. Shimozawa Technology Development. Page 1. June 2001

3G Wireless. from an Operator s Perspective. David T. Shimozawa Technology Development. Page 1. June 2001 3G Wireless from an Operator s Perspective David T. Shimozawa Technology Development Page 1 Introduction Background CDMA Evolution Services and Market Issues Technology Issues Spectrum Issues Network Evolution

More information

Business Drivers for Selecting LTE Technology. HSPA+ & LTE Executive Briefing, Jan 27, 2009 Hank Kafka, Vice President, Network Architecture, AT&T

Business Drivers for Selecting LTE Technology. HSPA+ & LTE Executive Briefing, Jan 27, 2009 Hank Kafka, Vice President, Network Architecture, AT&T Business Drivers for Selecting LTE Technology HSPA+ & LTE Executive Briefing, Jan 27, 2009 Hank Kafka, Vice President, Network Architecture, AT&T Why LTE? HSPA, HSPA+ provides great data speeds with impressive

More information

Development of CDMA2000 1x EV-DO in Rural Area in Indonesia

Development of CDMA2000 1x EV-DO in Rural Area in Indonesia Development of 1x EV-DO in Rural Area in Indonesia R. Haryo Wisanggeni, Azhardiaz Budiman, A. Awaludin, Adhi Yuniarto, Riri Fitri Sari UI-Huawei Research and Training Center Universitas Indonesia Gedung

More information

Wireless Network Introduction

Wireless Network Introduction Wireless Network Introduction Module W.bas.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Wireless network introduction W.bas.1-2

More information

Digital terrestrial television broadcasting Interactive channel

Digital terrestrial television broadcasting Interactive channel Digital terrestrial television broadcasting Interactive channel Televisão digital terrestre Canal de Inteeravidade Parte 1: Protocolos, interfaces fíisicas e interfaces de software Televisión digital terrestre

More information

CDMA2000 1x Deployment and Associated Multimedia Services Launched in Japan. KDDI Corporation

CDMA2000 1x Deployment and Associated Multimedia Services Launched in Japan. KDDI Corporation CDMA2000 1x Deployment and Associated Multimedia Services Launched in Japan KDDI Corporation Cellular Market Outlook in Japan : Shifting to Multimedia Gateway Page 2 Cellular Subscriber Growth in Japan

More information

Introduction to Mobile Broadband (imb)

Introduction to Mobile Broadband (imb) Introduction to Mobile Broadband (imb) Teaching By Asst.Prof.Dr. Suwat Pattaramalai suwat.pat@kmutt.ac.th Tel. 02-470-9079 Material: http://webstaff.kmutt.ac.th/~suwat.pat/ 3GPP WiMAX FORUM Introduction

More information

Competing with OTT Services: RCS e without IMS. November 15, 2011

Competing with OTT Services: RCS e without IMS. November 15, 2011 Competing with OTT Services: RCS e without IMS November 15, 2011 An Introduction to Interop All Gen Short Message Service Center (SMSC) 4 Series Message Personalization & Control (MPAC) Multimedia Message

More information

Load Balance Mechanism

Load Balance Mechanism Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router

More information

Input ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking

Input ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking Last time Router internals Input ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking Mobility Home, visited s Home, foreign agents Permanent, care-of

More information

The Internet and the World Wide Web

The Internet and the World Wide Web Technology Briefing The Internet and the World Wide Web TB5-1 Learning Objectives TB5-2 Learning Objectives TB5-3 How Did the Internet Get Started? Internet derived from internetworking 1960s U.S. Defense

More information

FRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES

FRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES FRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES Consistent with FCC 1 regulations, Frankfort Plant Board (FPB) provides this information about our broadband Internet access

More information

Emerging Trends and Opportunities

Emerging Trends and Opportunities Emerging Trends and Opportunities Smart Homes & End User Engagement track_ TEF. Digital 06.11.2014 Emilio Martinez Head of Utilities & Building Energy Efficiency Telefonica M2M Global Unit 1 Wireless Connectivity

More information

Lucent Technologies CDMA450 Applications. Amer El-Nahi CDMA450 Workshop Hong Kong-November, 2004

Lucent Technologies CDMA450 Applications. Amer El-Nahi CDMA450 Workshop Hong Kong-November, 2004 Lucent Technologies CDMA450 Applications Amer El-Nahi CDMA450 Workshop Hong Kong-November, 2004 The Digital Divide In General many Asian & Developing countries the population is typically split 50/50 between

More information

Evolution from GSM to UMTS

Evolution from GSM to UMTS 2 Evolution from GSM to UMTS Evolution is one of the most common terms used in the context of UMTS. Generally it is understood to mean the technical evolution, i.e. how and what kind of equipment and in

More information

Cost of Ownership: CDMA 2000 Competitive Advantage. Paul Edwards Chairman Starcomms, Nigeria

Cost of Ownership: CDMA 2000 Competitive Advantage. Paul Edwards Chairman Starcomms, Nigeria Cost of Ownership: CDMA 2000 Competitive Advantage Paul Edwards Chairman Starcomms, Nigeria Teledensity Facts & Figures > Teledensity & Internet Penetration has a direct positive impact on levels of economic

More information