You are on page 1of 6

Assignment 1

Wireless Networks ITC 254

Lecturer: Linh Pham

Submitted by Khandaker Islam

Khandaker Islam(11427188) Page 1


Question Answer 1:

I assume that the system use 1 signal frequency. So the system speed is 64000 bits
per second, 64,000 bits equal to 64 kb. The speed of the current system is 64 kbps.

To achieve the communication speed 128 kbps the system have to use 4 different
signal frequencies. 2^2 = 4, so, 64 * 2 = 128 kbps

To achieve communication speed 386 kbps the system need to use 64 different
signal frequencies. The calculation to achieve it is, 2^6 = 64, so 64 * 6 = 384 kbps

To achieve communication speed 512 the system need to use 512 different signal
frequencies. The calculation to achieve 512 kbps using 64kbps system is: 2^8 =
512(Different signal frequencies), so 64kbps (current system speed) * 8 = 512 kbps.

Question Answer 2:

Amplitude Modulation (AM)


Amplitude Modulation (AM) used for transmitting information as a way of electronic
communication. Fundamentally amplitude modulation system is less efficient comparing other
modulation system, the modulation power is the half of the carrier power. Amplitude Modulation
can bounces of the atmosphere and when conditions are right can be received worldwide. But
noise comes through because AM broadcasts are lower bandwidth. The amplitude module bank
on radios from 550 Khz to 1500 Khz. AM circuit is cheaper and non complex than other
modulation system. (Boston & Olenewa, p 113)

Amplitude modulation devices: AM Radio, 40 Channel AM CB Radio, TV. Radio transmission


broadcasting is the main use of it.

Frequency Modulation (FM)


Frequency Modulation system is another type analog modulation system which impresses data
into AC (alternating-current) wave by varying the instantaneous frequency of the wave.

FM use higher frequency which brings low noise. Higher frequency waves can carry more data
than lower frequency. Fm use less radiated power. Frequency modulation use small geographic
area between neighbor stations.

The disadvantage of frequency modulation is the range is limit by line of sight for an example
the range could be a tall tower to the horizon. So if there is a hill between receiver and
transmitter, the receiver will not receive any signal. FM use much more bandwidth almost 20

Khandaker Islam(11427188) Page 2


times than AM. FM has more complicated transmitter and receiver system. (Boston & Olenewa,
p118)

Frequency modulation devices: VHF Wireless Microphone System, Adjustable Angle 206
Channel Car MP3 FM Modulator, FM Radio. FM technology use for VHM FM broadcasting.

PM (Phase Modulation)
Phase modulation is another type of modulation which carries information as variation of phase
and carrier waves. Phase modulation is not generally doesn’t represent analog signals. The
signals composed a sign wave has a phase associated with it. Phase modulation covers 360
degree circle. PM always use the previous wave circle as a reference of signal. (Boston &
Olenewa, p122)

Phase modulation has more resistance against noise and it also consumes less bandwidth than
FM and it is harder to encode and harder to decode too.

Phase modulation devices: Large Capacitance Type Magnetizer/Demagnetizer, MXR CSP026


'74 Vintage Phase 90 Guitar Effects Pedal. Phase modulation technology use color television at
this moment.

Question Answer 3

Wireless technology became the essential part of the modern society. Mobile phones are using
large number of population with high frequency. So technology became a big health concern for
last few year especially mobile phone, wireless LAN, EMR (electromagnetic radiations). Few
years before a group of scientist warn about the dangerous effect of radiation in human body.

Mobile phone transmits electromagnetic radiation (EMR) or radiofrequency electromagnetic


energy RFE. Research shows that 97-99% of RFE emitted by mobile phone is absorbed by
human brain while people talk holding the phone near the head. Most researched and published
potential health effect of RFE has pointed the brain cancer or brain tumor issue.[Cancer Council
New South Wales, 2010]. Study shows long term use of mobile phone can risk health. Highest
level of mobile use such as excess of 1640 hours or people who spoke 30 minutes or more on the
mobile phone for 10 years or more has more chance to get trauma. As the link between brain
cancer and mobile phone has not proven but this is the warning for heavy mobile user. The heavy
use of radio frequency increased heart attack in young people, extreme fluctuation of blood
pressure, diseases such as epilepsy, leukaemia, Alzheimer and brain tumor. The raise of
headache or sleeplessness is the result of radio frequency. (Cancer Council New South Walse,
2010)

The Federal Communication Council (FCC) has fixed radiation level which is absorbed by had
should not exceed 1.6 watts. This level of radiation called SAR(Specific Absorption Rate). SAR
specified the level of radiation based on the fact that if human tissue heated up more than this
level it may damage tissue and dangerous for health.(Shahwar & Ahmed, 2000)
Khandaker Islam(11427188) Page 3
Australian Communications and Media Authority (ACMA) regulate devices such as mobile
phone handsets before come to Australian market. ACMA has mandatory standard and the
device have to pass the requirements to get the ACMA's radio communications apparatus license.
To protect the public from the effect of radio frequency ACMA first made their mandatory
standard in 1999 and the standard revised in 2001 which says that radio communication
transmitter frequency between 3Khz and 300Ghz. (ACMA mobile phone, nd)

Question Answer 4

The Australian mobile market holds by six network operators but the market rules by three giant
companies Vodafone, Telstra, Optus. In 2005 Vodafone, Optus, Telstra lunched respective 3G
network. Few years ago mobile operators introduced 3G network in Australia. Hutchison
Telecom Australia lunched 3G networks first in Australia at 15th of April 2003 and they only
covered major cities such as Sydney, Melbourne, Perth, Brisbane, and Adelaide. Telstra gave
birth of new generation network which is called Next-G few years ago and their three years
master plan is replacement of their current CDMA and GSM network. Telstra renamed their
name to Telstra Next G from Telstra G and Telstra claims their network is the fastest in
Australia. Telstra build their Next G network between Nov 2005 to Sep 2006 and the launched
at Oct 2006. Telstra using 850 MHz band for Next G. Telstra's Next G is the largest mobile
network in Australia at this moment which is larger than 3G and twitch larger then 2G network.
Another major company Optus was not much behind them. Optus moved their 60% of their
populace to 3G HSPA by the end of 2008. By the December of 2008, Vodafone finished their
makeover on 3G in most of the major cities. By the mean time, they also declared 3G HSPA
(High Speed Packet Access)(national), high speed mobile broadband service which covers 95%
of the country by the late 2009.(3g.com.au, nd)

Optus has achieved major position in the mobile operator industry because they expand their 3G
network all over the Australia. At this moment Optus is offering 3G server in Sydney, Brisbane
etc. Optus has designed their network coverage so excellent that users can download and upload
their data faster than any other 3G operator. (3g.com.au, nd)

Question Answer 5

Bluetooth (IEEE 802.15.1), Ultra-wideband (IEEE 802.15.3), ZigBee(IEEE 802.15.4) are three
most used wireless networking standard now a days. These standards are serving people to
mobilize their life but they are covering different ranges, different power consumptions and
different encryption system. The following paragraphs will discuss security mechanism among
Bluetooth, ZigBee and UWB.

Bluetooth:
Bluetooth is a wireless technology standard which use unlicensed 2.4GHz spectrum and latest

Khandaker Islam(11427188) Page 4


version four Bluetooth data rate 25Mbps from10 to 100 meters. Bluetooth use various types of
correction and security mechanisms. Bluetooth use 128 bit authentication algorithm to ensure
trusted relationship. Bluetooth protect transferred data(payload) by encryption mechanism and
the key size vary between 8 to 128 bit. FEC and CRC used to ensure transferred data will not
corrupt. (Bluetooth.com,nd)

IEEE 802.15.3:
IEEE 802.15.3 gives high data throughput up to 480 Mbps in low power consumption such
as~1mW/Mbps. It can carry signals and transfer data approximately 110 Mbps upto 10 Metes
through obstacles. IEEE 802.15.3 or Ultra-wideband use much secure system compared to
Bluetooth. IEEE 802.15.3 use AES(Advance encryption system) a 128 bit block size and key
size varies 128 to 256 bits. AES is a symmetric encryption system based on Rijndael. The IEEE
802.15.3 encrypt and authenticate all data in the network using secure beacon frame, which only
use an integrity code. Integrity code generated for all non becon messages then appended to
plaintext, which is the payload and these two are encrypted together after that. The integrity code
generated using nonce and CBC-MAC key for authentication. To decrypt and authenticate the
message the receiver needs to generate integrity code by CBC-MAC key only which should be
eight byte in length then compare with the received code, if they match authentication successful.
( ieeexplore.ieee.org, nd)

ZigBee:
ZigBee is a wireless personal area network(WPAN) based on a IEEE 802.15.4 standard which is
using many places personally and commercially. ZigBee became a facinating solution because of
its low cost and low power consumption. ZiBee uses 128 bit key to implement more security on
the network. They are using three levels of security though security was not considered at the
initial level. ZigBee use advance encryption system (AES) which is a symmetric encryption
system. The capacity of ZigBee varies on frequency and distance such as 250 kbits at 2.4 GHz,
40 Kpbs at 915 Mhz and 20 kbs at 868 Mhz within the area of 10-100 Meter. (Bluetooth.com,nd)

IEEE 802.15.3 or Ultra-wideband has the strongest security among Bluetooth, ZigBee and IEEE
802.15.3.

References:

Khandaker Islam(11427188) Page 5


1. Wireless# Guide to Wireless Communications (2/e). Boston, MA. Course Technology,
Olenewa, J., & Ciampa, M, 2007 Page 113-122

2. Health Risks Caused By Wireless Technologies, (Durre Shahwar Zafar Ahmed, Qurrat-
ul-Ain Zafar Ahmed, Rakesh Kawatra), 2000, 2010-08-20

<http://grad.mnsu.edu/research/urc/journal/URC2003journal/ZafarAhmed.pdf>
3. ACMA - Mobile phones, your health & regulation of electromagnetic energy, nd, viewed
2010-08-20
<http://www.acma.gov.au/WEB/STANDARD/pc=PC_1786>

4. Cancer Council New South Walse, (May, 2010), viewed 2010-08-20


< http://www.cancercouncil.com.au/editorial.asp?pageid=231 >

5. WHO, Electromagnetic field and public health, nd, 2006-05, viewed 2010-08-20
< http://www.who.int/mediacentre/factsheets/fs304/en/index.html >

6. 3G in Australia, nd, viewed 2010-08-20


<http://www.3g.com.au/3g-in-australia/ >

7. 3G networks of Australia, 3G Phones, nd, viewed 2010-08-20


<http://www.3gmobilephoneshop.com.au/3g/3g-networks-of-australia/ >

8. Security Mechanisms and Vulnerabilities in the IEEE 802.15.3 wireless personal area
networks, William Stewart, Yang Xiao, 2007, vol.2, No.1

9. Zigbee Wireless Vehicular Identification and Authentication System, nd, viewed 2010-
08-20
<http://www.ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F
%2Fieeexplore.ieee.org%2Fiel5%2F4770248%2F4783905%2F04783998.pdf
%3Farnumber%3D4783998&authDecision=-203>

10. Compare Technologies, viewed 2010-08-20


<http://www.bluetooth.com/English/Technology/Works/Pages/Compare.aspx#14>

Khandaker Islam(11427188) Page 6

You might also like