Preview

Comparison Security at the Interoperation of 3g and 4g Mobile Data Networks

Satisfactory Essays
Open Document
Open Document
561 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Comparison Security at the Interoperation of 3g and 4g Mobile Data Networks
TK6384 – COMPUTER NETWORK

Short Paper - Comparison security at the Interoperation of 3G and 4G mobile data networks
Introduction
MOHAMMAD HAFIZI BIN JAINAL (GP01982) , MOHD ARIEFF ADAM B MAHMUD FAUZI (GP01993) 4/20/2013

[The rapid growth and development of mobile systems over the past years has exposed the capability and effective availability of mobile communication and thus paved the way for secure transmission and execution of data. Mobile communications also provide us too many type of connection to access to internet with their few security mechanisms build inside. ]

Comparison security at the Interoperation of 3G and 4G mobile data network

Introduction The rapid growth and development of mobile systems over the past years has exposed the capability and effective availability of mobile communication and thus paved the way for secure transmission and execution of data. Mobile communications also provide us too many type of connection to access to internet with their few security mechanisms build inside. Many of us do not know what some of the advantages and disadvantages using different type of mobile data networks. Don’t know how security they are? Don’t know our data or file will expose outside the route while transferring on the line? Inside all the questioner is it, we still being connected using all this mobile data because its offers us flexibility in our lifestyles, makes us more productive in our jobs, and makes us feel more secure. This is briefly to introduce the comparison security on interoperation between 3G and 4G mobile data networks. For the future issue, interoperation of 3G and 4G networks would be vital when the networks of the both spectrum need to work with each other. In general, wireless networks integrated vertically and homogeneous, i.e. wireless standard of channel access method such as GSM/ UMTS or CDMA were binds by the service provider and the networks from the core to the base station were implemented throughout

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2415 Words
    • 10 Pages

    A 4G system is expected to provide a communication technology based on Internet Protocol. Internet protocol or IP is generally used in the computer networks for data communication among computers. All the devices are identified by a number called IP number. In 4G network this concept is extended to telephony with an intention to make data and voice communication integrated in the same architecture. The 4G network is supposed to facilitate a Gigabit speed i.e. a speed of 100+ Mega Bytes per second with a mobile node speed of up to 200km/hr. It will enable Internet access, IP…

    • 2415 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    cis500 week1

    • 1738 Words
    • 6 Pages

    This paper will compare and contrast 3G wireless networks to 4G networks in terms of services and application, network architecture, data throughput and user perceptions, it will distinguish between the 4G LTE, 4G WiMax, and 4G WiBro networks based on upload and download speeds, user perceptions, backward compatibility, service availability. It will also identify why the competition between the 4G LTE carriers has been so fierce and will describe the benefits of this competition to the subscribers.…

    • 1738 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Starbucks/Itunes Partnership

    • 4719 Words
    • 19 Pages

    Mobile Technology is expanding daily. It seems to be one of the fastest growing kinds of technologies in the news today. With the advancements in Personal Area Networks (PAN) and Wireless Access Protocols (WPA) mobile devices of today can be developed that are more secure than ever. They can be more accessible than ever before and provide faster and more accurate data transfer. The uses for the mobile devices have begun to expand into more and more areas of daily life. The iPhone mobile phone developed by Apple, Inc. is one of the most popular and bestselling mobile phones on the market today. In order for the iPhone to be at the head of the industry several of the most important technological features are…

    • 4719 Words
    • 19 Pages
    Best Essays
  • Good Essays

    Las 432 Outline

    • 712 Words
    • 3 Pages

    Introduction: Mobile technology is the technology used for cellular communication. It has developed extensively in the past couple of years and the development hasn’t stopped. Mobile technology has had a great impact on the economy, political interests and personal lives of the people, however, it has some cultural and political restrictions and geographical limitations.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., & Moller, S. (2011). On the need for different security methods on mobile phones. Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, Stockholm, Sweden. 465-473. doi: 10.1145/2037373.2037442…

    • 781 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Online Experience

    • 657 Words
    • 3 Pages

    Automobile industry are starting to have many wireless benefits to its auto consumers. There are two main areas of telematics that are popular choices. CD ROM telematics is one and the second is the call center telematics. This is a great advantage for the automobile business enterprise, because millions of consumers spend several hours a day in their automobiles. Nevertheless, the greatest demands to the development of mobile transaction are the consumers assurance when it comes to the issues of privacy and internet security (Aloi,et.al., 2007).…

    • 657 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Understanding the risk of using wireless or mobile technology makes it easier to come up with a plan is place to try preventing further actions. Maintaining secure wireless network is an ongoing process that requires greater effort that the required for other networks and systems. By assessing the risks, testing and evaluating system security controls for wireless networks more frequent can help prevent problems. There are many ways to improve the management of wireless or mobile technology like the following:…

    • 610 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Abstract - The rapid adoption and highly distributed nature of wireless networks has made it vulnerable to attacks and calls for innovative strategies of defense for network security. The lack of cables and transfer of information over airwaves makes data exchange more susceptible to interception. Furthermore, it is difficult to implement effective methods of security without sacrificing the quality and speed of network operations. For the previous reasons, wireless security has become a common topic of interest in research projects and will be the basis of discussion for this paper.…

    • 7348 Words
    • 30 Pages
    Better Essays
  • Powerful Essays

    Overview on Ipsec

    • 2720 Words
    • 11 Pages

    * In this paper, i will introduce a overview about this security protocol: what is it? What are its core components? And how this protocol was implemented in the practical?…

    • 2720 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Over the past two decades, we have witnessed significant technology advances in mobile devices, from the personal data assistants (PDAs) of the late 1990s and early 2000s to the ubiquitous and multifunctional smartphones of today. These advances have extended the virtual boundaries of the enterprise, blurring the lines between home and office and coworker and competitor by providing constant access to email, enabling new mobile business applications and allowing the access to, and storing of, sensitive company data.…

    • 1193 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Mobile devices are convenient and are quickly catching up with personal computers as the choice to access the Internet. Unfortunately this convenience comes with a cost. Security for mobile devices has not kept up with the market growth and consumer use. In this paper I will discuss; 1) emerging cyber security issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report, 2) vulnerabilities of mobile devices in regard to usability and scale, and methods to mitigate the vulnerabilities of mobile devices, 3) the value of cryptography and encryption in regard to Equifax’s approach to implementing stronger security policies around mobile devices, 4) discuss Gunter Ollmann’s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches, 5) the greatest challenge in regard to controlling information online, and 6) Justify Dan Kuykendall’s statement about the biggest issue with mobile browsers and give two (2) examples illustrating his point.…

    • 2094 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    The term mobile devices are not limited to cellphones; they include iPads, iPods, Laptops, PDAs and e-Readers. These devices act as a lifeline to the outdoor world, and are frequently used for navigating, social networking, shopping, banking and business purposes. What is often forgotten about these devices is that they are gateways to hackers. “Mobile devices can be used by a hacker as an access point into many other aspects of your digital life as well the lives of others in your network, making mobile security about more than just protecting your phone,” (Certic, 2013). Mobile Technology became widely accepted by most of the world in the early 1980’s and since then, the evolution of technology has shown substantial growth. “Worldwide smartphone sales reached 144.4 million units in the first quarter, a 45% increase year over year, research firm Gartner reported. Tablet shipments jumped 120%, to 17.4 million units worldwide, according to a report from research company IDC,” (Drew, 2012). In 2013, over 80% of the world’s population uses a mobile phone and to date there are more than 6 billion mobile devices in the world. Concerns regarding cancer in relation to frequent use and security risks associated with the ability to protect the user’s information are controversial.…

    • 1441 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    purpose statement

    • 162 Words
    • 1 Page

    The main purpose of this experiment will be to explore the security issues involved within the mobile device, to the end user. At this stage the study will be to test theory that explore the concepts involved in mobile device and cloud computing security where the users try to store their information. Security in mobile, user authentication and cloud computing security are independent variables that relates to dependent variables i.e. mobile devices, mediating the mobile computing for individuals. The independent variables can be defined as, security issues in mobile device, user’s information which are stored in mobile device and their problems and the cloud issues. The mediating variables is mobile computing which causes effect on dependent variables i.e. They can be defined which produce the outcome depending on the security, authentication and mobile cloud computing security.…

    • 162 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Secure side channel - Short distance - Line of sight required - Integrity should be there - Confidentiality not required…

    • 701 Words
    • 3 Pages
    Good Essays