StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

4G Security or Application Security on the Web - Research Proposal Example

Cite this document
Summary
The telecommunication industry has received enhanced development in past few decades with numerous mobile communication systems and technological improvements. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.8% of users find it useful
4G Security or Application Security on the Web
Read Text Preview

Extract of sample "4G Security or Application Security on the Web"

? 4G Security or Application Security on the Web Introduction The telecommunication industry has received enhanced development in past few decades with numerous mobile communication systems and technological improvements. The mobile communication technology had evolved from second generation technology (2G) to third generation technology (3G). The 3G had also been developed to 3GPP and 3GPP2. The significant improvement in mobile communication technology has occurred due to the introduction of fourth generation technology (4G) with high tech tools and enhanced data transmission. 4G technology is aimed in order to simplify wireless abilities, network speeds, and enhanced pictorial expertise. The characteristics of these telecommunication technologies have increased the concern about network security. As wireless system has diverse copyrighted technologies and security etiquettes, it is hard to make a universal security plan for the devices which apply multiple etiquettes such as 4G system (Akyildiz, Gutierrez-Estevez, & Reyes, 2010). Background of Study 4G requires an exclusive approach in telecommunication technology for developing operative models to accomplish its strategic objectives. The requirement of 4G networks is associated with the increased utilization of websites (such as Facebook) and improvement in download speed from internet portals which entail remarkable bandwidth (such as YouTube videos). As these websites are gaining much admiration within people nowadays, therefore it is a great prospect for telecommunication service providers to accommodate the desires of people. However, there are a few security concerns that telecommunication provides need to address and resolve for better service (Ahmed, Garrison, Gruen, Kelly, & Pankey, 2003). Literature Review The first 4G network was developed in the year 2009 through joint venture between two organizations, Intel and Clearwire. Gradually, this technology has expanded throughout cities, states and nations all over the world. 3G networks were initially developed with the intention of forming a standard in the world for telecommunication, and the motive behind developing 4G network is to allow people to access internet independently from devices such as mobile phones. But in order to provide the enhanced facilities, there is need for high security patterns and reliability of system to ensure safe surfing. The security measures should be established in such a way so that it can enable data transmission with minimum risk (Gobjuka, 2009). Security in 4G networks generally consist of verification, privacy, reliability and authorization in order to gain network connectivity. The 4G technology is incorporated with ‘quality of service’ (QoS) and flexibility. Besides, it is also considered that the network terminal of 4G always chooses the best access point available. In the wireless network there are several security breaches that occur such as channel congestion, denial of service (DOS), illegal access, session hijacking and snooping among others. Though the issue of security had been solved mostly through utilizing manifold layers of encryption etiquette, but there are other drawbacks in this system such as unexploited power, wasted energy and greater transmission interruption. In 4G systems the model of interlayer safety network had been developed, where only a single layer is constructed for data encryption (Gardezi, 2006). But 4G needs more development with respect to mobile node (MN) flow while users roam into new telecommunication provider’s network (Fu, Hogrefe, Narayanan, & Soltwisch, 2004). Problem Statement The research is planned to concentrate on the security issues of 4G on the web. It is quite difficult to quantify the security risks of 4G network and what difficulties it can face from several fronts. There is need to search a definable method to establish a balance between practical application of 4G network and necessary security levels in order to ensure safety of users’ data and resources. Therefore, this research will aim at generating an in-depth view about possible security aspects of using 4G. Besides, the research will also provide a general understanding of 4G networks and its components. Research Objectives The objectives of the research are as follows: To understand how 4G network works To apprehend the contribution of 4G network in the telecommunication industry, and To know the possible security issues of 4G on the web Research Methodology Research methodology is the application of several processes, tools and techniques during research in order to gather required information for the subject. The research will be conducted by mixed approach where both qualitative as well as quantitative method will be used for analysis. The qualitative approach will be suitable for understanding the broad aspects of the research as numerous security issues are linked with the topic. The quantitative approach will be used to describe and analyze numerical data through charts or graphs and mathematical methods which are appropriate for conducting the analysis. In this research both primary as well as secondary data will be used for analysis. The combination of both approaches will help to generate strong and effective results for the research subject (New York University, n.d.). Collecting the preliminary data is a technique to increase the knowledge and understanding of the subject. As both kinds of data will be used for this research, multiple methods are going to be applied for data collection. The primary data will be collected via questionnaire survey method where a questionnaire will be given to telecommunication companies’ networking & communication managers in order to know their opinions and the secondary data will be collected through web published materials, internet databases and corporate websites (Deakin University, n.d; University of Connecticut Libraries, 2003). Analysis is the major part of research and data will be analyzed by qualitative as well as quantitative way. The collected information from both sources will be segmented and accumulated to translate into productive conclusion. Data will be studied in relation to literature review and standing concepts in the respected area which will arise during the research. All information from literature review as well as preliminary data will be assembled so that the research problem is explained and accordingly are assessed critically. Limitations The major limitation of this research is availability of information. Though the research will use both primary as well as secondary data in the form of questionnaire and web resources, there is no guarantee that respondents will provide appropriate responses to the questions. On the other hand, collecting information through secondary data also has its own limitation such as the validity, consistency and accuracy. In order to mitigate the problem, appropriate number of questionnaires will be developed so that low response rates cannot harm the research, and those data will be related with secondary data to ensure consistency and accuracy. The other limitation of the research is complexity. As this research will apply mixed approach, it might be difficult to efficiently present the research findings. Therefore, appropriate research design will be planned and applied so that the findings are presented in effective manner. Conclusion 4G technology has gained much popularity in the telecommunication industry and it provides users several advantages of using web. As technology improves, the security measures also become significant to be identified properly to protect the users from impending threats. The research will provide an extensive view of technical aspects and security issues of 4G in the telecommunication industry and therefore will offer valuable insights about improving the efficiency of the system. References Ahmed, J., Garrison, B., Gruen, J., Kelly, C., & Pankey, H. (2003). 4G wireless systems. Retrieved from https://docs.google.com/viewer?a=v&q=cache:Im9dYl1umccJ:ckdake.com/system/files/4gwireless.pdf+&hl=en&pid=bl&srcid=ADGEESh2M9x4HZDB8IYLwGyyhxwNbvLZJNDH2VQGoDTPuyHcaJOOUMrAaOleULMkvgyers8NJlqGSVHuldxGSmbRwT_VS0AmF-aTNCDhUvV-e9PWmvr6anS_AE0M2AoOhpbeklx6OKYD&sig=AHIEtbS5CUZcSnZCpHm467DNfNallJh1nQ Akyildiz, I. F., Gutierrez-Estevez, D. M., & Reyes, E.C. (2010). The evolution to 4G cellular systems: LTE-Advanced. Physical Communication 3, pp. 217 – 244. Deakin University. (n.d.). Research Design. Retrieved from http://www.deakin.edu.au/buslaw/infosys/research/students/docs/research-design.pdf Fu, X., Hogrefe, D., Narayanan, S., & Soltwisch, R. (2004). QoS and security in 4G networks. Retrieved from http://www.net.informatik.uni-goettingen.de/publications/613/GMC2004.pdf Gardezi, A. I. (2006). Security in wireless cellular networks. Retrieved from http://www.cs.wustl.edu/~jain/cse574-06/ftp/cellular_security/index.html Gobjuka, H. (2009). 4G wireless networks: opportunities and challenges. Retrieved from http://arxiv.org/ftp/arxiv/papers/0907/0907.2929.pdf New York University. (n.d.). What is research design? Retrieved from http://www.nyu.edu/classes/bkg/methods/005847ch1.pdf University of Connecticut Libraries. (2003). Research design. Retrieved from http://spirit.lib.uconn.edu/~punj/m3505.pdf Bibliography Dooley, L. S. (2011). 4G security. Retrieved from http://www.cs.uku.fi/~kilpelai/18issnc/course-MC2-abstract.pdf Zheng, Y., He, D., Yu, W., & Tang, X. (2005). Trusted computing-based security architecture for 4G mobile networks. Retrieved from http://research.microsoft.com/en-us/people/yuzheng/trusted_computing-based_security_architecture_for_4g_mobile_netw.pdf Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“4G Security or Application Security on the Web Research Proposal”, n.d.)
4G Security or Application Security on the Web Research Proposal. Retrieved from https://studentshare.org/information-technology/1440543-4g-security-or-application-security-on-the-web
(4G Security or Application Security on the Web Research Proposal)
4G Security or Application Security on the Web Research Proposal. https://studentshare.org/information-technology/1440543-4g-security-or-application-security-on-the-web.
“4G Security or Application Security on the Web Research Proposal”, n.d. https://studentshare.org/information-technology/1440543-4g-security-or-application-security-on-the-web.
  • Cited: 0 times

CHECK THESE SAMPLES OF 4G Security or Application Security on the Web

The Importance of Proper Asset Allocation

Article Summaries Munnell, Orlova and Webb (2012) conducted a study on narrow topic of importance of asset allocation to financial security after retirement with the use of analytical frameworks, theories relating to financial studies.... The Importance of Proper Asset Allocation Introduction Asset allocation is one of the most important investment strategies and it is a popular financial strategy in current financial market....
5 Pages (1250 words) Admission/Application Essay

Business Strategic Planning

Tripoli town has good security, banking institutions and IT based companies to ease the college establishment.... This paper “Business Strategic Planning” is about a business strategic plan to start a computer college in Tripoli, Libya.... The business vision is the general image created once the computer school is established....
9 Pages (2250 words) Admission/Application Essay

Knowledge Management System for Manufacturing

If we analyze then we come to know that you make parallel your KM policy with your business plan and that part of this alignment procedure is deciding on whether to emphasize a codification or personalization execution of KM. They advocate that you pick one and devote 80% of your attempt to that one approach, while keeping the previous side causative at concerning 20%....
20 Pages (5000 words) Admission/Application Essay

Business Strategy

The document provides detailed information on the business strategy plan, which is an important tool in the beginning or expansion of any business.... This includes comparing various business alternatives followed by appropriate or economical business solutions.... hellip; From this article, it is clear that the three main elements of any strategic business plan: exact business, target demand, and how to initiate and benefit from such a business....
9 Pages (2250 words) Admission/Application Essay

What Job Choice Is Better - the Teacher or Software Engineer

The essay "What Job Choice Is Better - the Teacher or Software Engineer?... compares the named occupations in terms of working hours, pay scale, job duties and responsibilities, satisfaction level, lifestyle, advancement opportunities, plans and perspectives regarding the career.... hellip; I have a desire to become a professional computer science teacher....
5 Pages (1250 words) Admission/Application Essay

A Request to Rebuild the Company Website

Specific measures are also required for ensuring the security of the new website.... At a next level, the following issues will be analytically addressed: the new website's structure and content, its security and its expected effectiveness – in accordance with its technical characteristics but also of the relevant experiences of firms that operate in the same industry....
11 Pages (2750 words) Admission/Application Essay

Accountant Internship Report

This study “Accountant Internship Report” unites experiences and observations incorporated by the author during his internship in Amana group of companies (Dubai, UAE).... The author presents assigned to him weekly duties and responsibilities, the company's organizational chart, products, and services....
30 Pages (7500 words) Admission/Application Essay

Crime Victim Services Program Bullhead City

This will, in turn, reduce violence and crime rate and ensure security in the whole city (Walp, 96).... onclusionCitizens of Bullhead City must take upon themselves to champion for their own security and safety through community policing and working with the set policing units such as COPPS.... Safety is provided by ensuring security is top-notch through the use of surveillance Systems and community policing by both citizens and government officials....
3 Pages (750 words) Admission/Application Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us