1/18
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cellular Networks
Mobile devices
“Cell” phones
Separate land into “cells”.
Antenna covers a cell with certain frequencies.
Enable or disable voice and/or data.
Airplane mode disables all cellular networks.
Could also disable data but keep voice.
3G Technology
3rd generation.
Introduced in 1998
Upgraded data connectivity.
Incremental 3G updates improved speeds.
Usually several megabits per second.
Bandwidth improvement allowed new functionality.
GPS
Mobile TV
Video on demand
Video conferencing
4G and LTE (Long Term Evolution)
A 4G technology.
Based on GSM and EDGE (Enhanced Data Rates for GSM Evolution).
Standard supports download rates of 150 Mbit/s
LTE Advanced (LTE-A)
Standard supports download rates of 300 Mbit/s
5G
Fifth generation cellular networking.
Launched worldwide in 2020
Significant performance improvements.
At higher frequencies.
Eventually 10 gigabits per second.
Slower speeds from 100-900 Mbit/s.
Significant IoT impact.
Bandwidth becomes less of a constraint.
Larger data transfers.
Faster monitoring and notification.
Additional cloud processing.
WiFi
Connect to a local 802.11 network.
Data access for email and Internet.
Higher speeds, no cellular bandwidth use.
Requires a local access point.
Limited distance coverage.
May also support voice communication.
WiFi calling.
Requires support from the voice carrier.
Very useful when cellular coverage may not be available.
Hotspot
Turn your phone into a personal wireless router, and extend the cellular data network to all your devices.
This is dependent on phone type and provider, and may require additional charges and data costs.
SIM (Subscriber Identity Module)
A unique identifier for cellular devices.
Often a tiny physical card. When you replace it, the phone gains a new number.
It contains information for both carrier and user.
SIM ID and phone number.
Cellular network information.
Storage space for contacts, messages, etc.
Many devices support multiple SIMs.
eSIM (Embedded SIM)
A SIM inside the device. It cannot be physically removed.
Bluetooth Pairing
Connect a Bluetooth device.
Built-in security - Use or verify a PIN.
Pair the devices one at a time.
Future connections should be automatic.
Check with the manufacturer.
Pairing Process
Enable Bluetooth on both devices.
Set devices to discoverable mode.
May require key sequence on Bluetooth device.
Select discovered device.
Many devices may appear.
Enter or confirm PIN.
PIN should be the same on both devices.
Test connectivity.
Devices should now communicate.
GPS (Global Positioning System)
Created by the US Department of Defense.
Over 30 satellites currently in orbit.
Precise navigation.
Need to see at least 4 satellites.
Determines location based on timing differences.
Longitude, latitude, altitude.
Mobile device location services and geotracking.
Maps, directions,
Determine physical location based on GPS, WiFi, and cellular towers.
MDM (Mobile Device Management)
Manage company-owned and user-owned mobile devices.
Central management of the mobile devices.
Specialized functionality.
Set policies on apps, data, camera, etc.
Control the remote device.
The entire device or a “partition”.
Manage access control
Force screen locks and PINs on these single use devices.
BYOD (Bring Your Own Device)
Employee owns the device
Needs to meet the company’s requirements.
Difficult to secure
It’s both a home device and a work device.
How is data protected?
What happens to the data when a device is sold or traded in?
COPE (Corporate Owned, Personally Enabled)
Company buys the device, and it is used as both a corporate and personal device.
Organization keeps full control of the device.
Similar to company-owned laptops and desktops.
Information is protected using corporate policies.
Information can be deleted at any time.
CYOD - Choose your own device.
Similar to COPE, but with the user’s choice of device.
MDM Policy Enforcement
Corporate Email configuration
User does not need to configure anything.
The MDM makes the changes on the device.
Account details, server address, communication method.
Multi-Factor Authentication
Corporate applications
Allow or restrict app installation.
Prevent unauthorized app usage.
Two-Factor Authentication
Require specific authentication types.
Biometrics, pseudo-random authentication app.
Mobile Device Synchronization
Many settings are preconfigured.
Telephone / Text messaging
Everyone handles email services differently.
Corporate email configurations can vary.
Data synchronization
Based on data rates and speeds.
Important for backup and recovery.
Synchronizing Data
Data types
Calendar and contacts
Data caps and transfer costs.
May have significant financial consequences.
Cellular/mobile vs 802.11
Verify data restrictions with wireless carrier.
Get it in writing.
Enable or disable network connections.
Control the use of cellular downloads.
Business Applications
Mail, cloud storage, etc.
Many different services available.
Authenticate
Username, password.
Select the items to synchronize.
Changes will appear on the mobile device.
Same process for other services.
Often built-in to the mobile device.