Nt1310 Unit 1 Assignment 1 Essay

Great Essays
Data Communication and Net-Centric Computing (COSC 2061)
Assignment 2
Student Name: Weibin Zhong
Number: s3503887

Introduction
This report is identifying what are FDMA, TDMA and CDMA and how to maintain the communication seamlessly and the roaming service as well as the cost of roaming service. Furthermore, the 1G, 2G, 3G and 4G generations will be discussed. Finally, the potential issues or risks while using the mobile wireless will be discussed.

1. the technical details of FDMA, TDMA and CDMA

(1) FDMA

Frequency Division Multiple Access (FDMA) bandwidth is divided into narrow frequency slots and is use to allocate a unique frequency band or channel that a user is free to transmit or receive all the time over the shared
…show more content…
The issues and possible risks in using wireless communication.
There are few security risks occurring in mobile and wireless user:

A. Intrusion - networks are more open to intruder access unless protective measures (such as passwords, encryption and identifier disabling) are adopted and this may result in a greater susceptibility to theft or misuse of information contained on networks, unauthorized destruction or modification of data, and abuse of network capacity
B. Leeching - bandwidth can be used by intruders at the expense of legitimate businesses and users
C. Exploitation - network access can be misused to launch denial of service (DoS) attacks against third parties, transmit illicit material such as child pornography, or engage in other criminal activities. [10]

5. Conclusion:
The report introduced three wireless generations which have been using for the last few decades. The wireless technologies have developed rapidly. In addition, I presented information about FDMA, CDMA and TDMA. However, I known that we need to keep our personal security information privacy when we are using

Related Documents

  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    FDM divides the channel into different frequencies and assigns each frequency to a node. FDM thus creates smaller channels of out of the single, larger channel. FDM shares both the advantages and disadvantages of TDM. While TDM and FDM assign time slots and frequencies, to the nodes, CDMA assigns a different code to each node. Each node, then uses its unique code to encode the data bits it sends.…

    • 944 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Natural Driving Quiz

    • 462 Words
    • 2 Pages

    DIGITAL FORENSIC AND INCIDENT REPORTING QUIZ 1. Destroying data, on a hard drive, is relatively easy and can be done one of two ways: a. Destroying the platters b. Wiping the entire hard drive c. Placing magnets on a hard drive d.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Assignment 2 Data Communication- Net Centric Question 1 CDMA is what that have a several protocols that was used in the 2G and 3G wireless communication. CDMA is a service that provide all the communication overall and it also provide in major service in network capacity. CDMA service is mostly used in Cell phone and it can be easily be used for communicating terminal with two base stations. CDMA is a form of multiplexing, which allow a number of signals to work on a single transmission channel and also boost the use of available bandwidth.…

    • 1704 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Swot Analysis Of Verizon

    • 863 Words
    • 4 Pages

    This offer is good for people who are traveling to other states, since it is offered in airports. Verizon is different from their competitors by providing the highest network quality, improving their data transmission and they continue to expand the wireless data (Nelson, 2004). Finally, the firm focuses on efficiency and satisfaction rates in customer service, distribution or product development…

    • 863 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Gigamon Security Survey

    • 531 Words
    • 3 Pages

    Survey Landing Page State of Security Survey Gigamon wants to hear from you. Gigamon is changing how networks become more resilient, responsive, and secure. We invite you to participate in a short 5- question survey so that we can better serve the market. For your feedback, we will send you a $10 Amazon gift card. 1.…

    • 531 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Internet Security/Cyber criminal 1. Explain how Internet security measures can actually create opportunities for criminals to steal, rather than prevent them. The onslaught of security breaches on the internet make the threats to e-commerce very real for business, consumers, and government, and politician. There are individuals that hack into computers as well as the networks of businesses and government agencies.…

    • 606 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Initiation The launch of the project will inspect the elements of the process of cybersecurity and the application of security measures to ensure discretion, reliability, and accessibility of data. The project will attempt to assure the protection of cybersecurity and its properties, which includes people, buildings, desktops, servers, and data. The main objective of cybersecurity is to safeguard data together with transit and at rest. There are countermeasures that can be put into place in order to escalate the safety of data.…

    • 839 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Faculty Mentor's Research

    • 285 Words
    • 2 Pages

    Sara Young 10/16/15 Faculty mentor’s name: Dr. Mainak Chatterjee Department: Department of Computer Science with a secondary appointment in the Department of Electrical Engineering and Computer Science Office Location: HEC 305 Lab Location (if different than office location): Hec 314 Email: mainak @ eecs.ucf.edu Received Ph.D. from: University of Texas at Arlington Cite one recent publication by your faculty mentor in APA format: Sengupta, S., & Chatterjee, M. (2009). An economic framework for dynamic spectrum access and service pricing.…

    • 285 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Technical System

    • 589 Words
    • 3 Pages

    Organization B has a formal system and a technical system, but no informal system. 1. What problems would arise in the organization? Why do you think so?…

    • 589 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Every day, we have seen technology advanced dramatically in the past years. Many of those advances include smart phones, smart TVs, computers, tables, watches, and so much more. We even have faster internet and network access. Many companies and civilians take advantages of such advancements by providing and selling “access” to several applications to watch movies and TV shows, listening and access music, and using a faster way to network with many people (both near and far) in social media. However, such advancements can be affected and misused.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Security Countermeasures

    • 1615 Words
    • 7 Pages

    Modern power systems are made up of several interacting national systems. These systems interact providing essential support and monitoring in various power grids or sectors. While the advantages of systems interacting are bountiful in information gathering and sharing, it is not without certain drawbacks. Our society is dependent upon the availability of power and is quickly incapacitated by its loss. Simply observe the moderate disruption that is caused during severe weather.…

    • 1615 Words
    • 7 Pages
    Great Essays
  • Great Essays

    However, the development of mobile technology has also a negative effect. As an example, people can do mobile banking, checking balance, transferring money, purchasing online and the like. These are positive effects. But there are a lot of problems related to it like loss of money, unknown withdrawals, over debits and many other incidents. These incidents can be brought about by bugs in applications, data security issues,…

    • 1344 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Also, supposing if someone tries to make two transactions with the same transaction number, the chain automatically forks, like: Courtesy: http://www.michaelnielsen.org/ddi/how-the-bitcoin-protocol-actually-works/ Now we have a fork in which some miners receive block A first, and some miners receive block B first. The miners who receive block A first will continue mining along that fork, while the others will mine along fork B. Let’s suppose that the miners working on fork B are successful in mining the block, then as soon as the others receive the news everyone one in fork A jumps ship to fork B, hence the abandoned fork A is discarded and the remaining transactions in block A will be added to B, hence ensuring only the longest chain…

    • 1594 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Network Security

    • 782 Words
    • 4 Pages

    In today’s ever changing technological world, network security is a necessity. According to The SANS Institute, a research and educational organization dedicated to “information security training and security certification”, network security is “the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment.” ( HYPERLINK "http://www.sans.org" www.sans.org) There are several ways to physically secure a network, some of which include storing the more vulnerable network devices in a locked room with security access restrictions, installing surveillance cameras, removing unused or unsecured computers from workspaces, and securing printers that may retain sensitive document data in memory. ( HYPERLINK "http://www.techrepublic.com" www.techrepublic.com)…

    • 782 Words
    • 4 Pages
    Improved Essays