Difference between pages "Upcoming events" and "TDMA"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Conferences)
 
(How it works)
 
Line 1: Line 1:
Here is a BY DATE listing of '''upcoming conferences and training events''' that pertain to [[digital forensics]]. Some of these duplicate the generic [[conferences]], but have specific dates/locations for the upcoming conference/training event.
+
{{Wikify}}
  
<b> The Conference and Training List is provided by the American Academy of Forensic Sciences (AAFS) Digital and Multi-media Listserv</b>
+
'''TDMA - Time Division Multiple Access'''
<i> (Subscribe by sending an email to listserv@lists.mitre.org with message body containing SUBSCRIBE AAFS-DIGITAL-MULTIMEDIA-LIST)</i>
+
<b> Any requests for additions, deletions or corrections to this list should be sent by email to David Baker <i>(bakerd AT mitre.org)</i>. </b>
+
  
== Calls For Papers ==
 
{| border="0" cellpadding="2" cellspacing="2" align="top"
 
|- style="background:#bfbfbf; font-weight: bold"
 
! Title
 
! Due Date
 
! Website
 
|-
 
|DFRWS 2007 File Carving Challenge
 
|Jul 09, 2007
 
|http://www.dfrws.org/2007/challenge/submission.html
 
|-
 
|PacSec Applied Security Conference
 
|Jul 27, 2007
 
|http://www.pacsec.jp/speakers.html
 
|-
 
|Journal of Digital Forensic Practice
 
|Jul 31, 2007
 
|http://www.tandf.co.uk/journals/titles/15567281.asp
 
|-
 
|American Academy of Forensic Sciences 2008 Annual Meeting
 
|Aug 01, 2007
 
|http://www.aafs.org/abstracts/your_online_presentation_submiss.htm
 
|-
 
|Digital Forensic Forum Prague 2007
 
|Aug 31, 2007
 
|http://www.dff-prague.com/News/article/sid=17.html
 
|-
 
|}
 
  
== Conferences ==
+
== Why use TDMA?==
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
TDMA (Time Division Multiple Access), is used in the largest available networks in the world. It is a digital communication method allowing many users to access a single communication channel. TDMA is aimed at dealing with multiple access to the same communication medium. Each individual user is given a unique time slot within the defined communication channel. This methodology increases the efficiency of transmission by allowing multiple users simultaneous access to a time slot. A
|- style="background:#bfbfbf; font-weight: bold"
+
significant benefit is TDMA can be easily adapted to transmission of data as well as voice communication.  
! Title
+
! Date/Location
+
! Website
+
|-
+
|Third Government Forum of Incident Response and Security Teams Conference
+
|Jun 25-29, Orlando, FL
+
|http://www.us-cert.gov/GFIRST/index.html
+
|-
+
|First International Workshop on Cyber-Fraud
+
|Jul 01-06, San Jose, CA
+
|http://www.iaria.org/conferences2007/CYBERFRAUD.html
+
|-
+
|Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) 2007
+
|Jul 12-13, Lucerne, Switzerland
+
|http://www.gi-ev.de/fachbereiche/sicherheit/fg/sidar/dimva/
+
|-
+
|SANSFire 2007
+
|Jul 25-Aug 03, Washington, DC
+
|http://www.sans.org/sansfire07/index.php?portal=e1bc55a0898bf3774408826c9368ae40
+
|-
+
|BlackHat Briefings
+
|Jul 28-Aug 02, Las Vegas, NV
+
|http://www.blackhat.com/html/bh-link/briefings.html
+
|-
+
|DefCon
+
|Aug 03-05, Las Vegas, NV
+
|http://www.defcon.org/
+
|-
+
|16th USENIX Security Symposium
+
|Aug 06-10, Boston, MA
+
|http://www.usenix.org/events/
+
|-
+
|GMU 2007 Symposium
+
|Aug 06-10, George Mason University, Fairfax, VA
+
|http://www.rcfg.org
+
|-
+
|[[Digital Forensic Research Workshop|Digital Forensic Research Workshop 2007]]
+
|Aug 13-15, Pittsburgh, PA
+
|http://www.dfrws.org/2007/index.html
+
|-
+
|HTCIA 2007 International Training Conference & Exposition
+
|Aug 27-29, San Diego, CA
+
|http://www.htcia-sd.org/htcia2007.html
+
|-
+
|Recent Advances in Intrusion Detection (RAID) 2007
+
|Sep 05-07, Gold Coast, Queensland, Australia
+
|http://www.isi.qut.edu.au/events/conferences/raid07
+
|-
+
|14th International Conference on Image Analysis and Processing (ICIAP 2007)
+
|Sep 10-14, Modena, Italy
+
|http://www.iciap2007.org
+
|-
+
|3rd International Conference on IT-Incident Management & IT-Forensics
+
|Sep 11-12, Stuttgart, Germany
+
|http://www.imf-conference.org/
+
|-
+
|SANS Network Security
+
|Sep 22-30, Las Vegas, NV
+
|http://www.sans.org/ns2007/?portal=69456f95660ade45be29c00b0c14aea1
+
|-
+
|Black and White Ball
+
|Sep 25-28, London, UK
+
|http://www.theblackandwhiteball.co.uk/
+
|-
+
|Wisconsin Association of Computer Crimes Investigators/Forensic Association of Computer Technologists
+
|Sep 26-28, Milwaukee, WI
+
|http://www.byteoutofcrime.org
+
|-
+
|BlackHat Japan - Briefings
+
|Oct 23-26, Tokyo, Japan
+
|http://www.blackhat.com/html/bh-japan-07/bh-jp-07-main.html
+
|-
+
|Global Conference on Economic and High-Tech Crime (NW3C Membership Required)
+
|Oct 24-26, Crystal City, VA
+
|https://conference.nw3c.org/index.cfm
+
|-
+
|Techno-Forensics Conference
+
|Oct 29 - 31, Rockville, MD
+
|http://www.techsec.com/html/TechnoForensics2007.html
+
|-
+
|DeepSec IDSC
+
|Nov 22-24, Vienna, Austria
+
|http://deepsec.net/
+
|-
+
|Digital Forensic Forum Prague 2007
+
|Nov 26-27, Prague, Czech Republic
+
|http://www.dff-prague.com/
+
|-
+
|PacSec Applied Security Conference
+
|Nov 29-30, Tokyo, Japan
+
|http://www.pacsec.jp/index.html
+
|-
+
|DoD Cyber Crime Conference 2008
+
|Jan 13-18, St. Louis, MO
+
|http://www.dodcybercrime.com/
+
|-
+
|AAFS Annual Meeting 2008
+
|Feb 18-23, Washington, DC
+
|http://aafs.org/default.asp?section_id=meetings&page_id=aafs_annual_meeting
+
|-
+
|CanSecWest Security Conference 2008
+
|Mar 19-21, Vanouver, BC, Canada
+
|http://cansecwest.com/
+
|-
+
|EuSecWest Security Conference 2008
+
|May 21-22, London, England
+
|http://eusecwest.com/
+
|-
+
|}
+
  
== On-going / Continuous Training ==
+
TDMA offers the ability to carry date rates of 64 kbps to 120 MBPS, which enables options of communication such as fax, voiceband data, sms, as well as bandwidth intensive apps. TDMA allows the mobile device to have extended battery life, since the cellular device is only transmitting a portion of the time during conversations. In addition, TDMA is the most cost effective technology for upgrading an analog system to digital (http://www.iec.org/online/tutorials/tdma/topic04.html).
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
|- style="background:#bfbfbf; font-weight: bold"
+
! Title
+
! Date/Location or Venue
+
! Website
+
|-
+
|Basic Computer Examiner Course
+
|Computer Forensic Training Online
+
|http://www.cftco.com
+
|-
+
|MaresWare Suite Training
+
|First full week every month, Atlanta, GA
+
|http://www.maresware.com/maresware/training/maresware.htm
+
|-
+
|Linux Data Forensics Training
+
|Distance Learning Format
+
|http://www.crazytrain.com/training.html
+
|-
+
|Evidence Recovery for Windows Vista&trade;
+
|First full week every month, Brunswick, GA
+
|http://www.internetcrimes.net
+
|-
+
|Evidence Recovery for Windows Server&reg; 2003 R2
+
|Second full week every month, Brunswick, GA
+
|http://www.internetcrimes.net
+
|-
+
|Evidence Recovery for the Windows XP&trade; operating system
+
|Third full week every month, Brunswick, GA
+
|http://www.internetcrimes.net
+
|-
+
|}
+
  
== Scheduled Training Courses ==
+
==How it works==
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
 
|- style="background:#bfbfbf; font-weight: bold"
+
It’s necessary for TDMA to rely upon that fact that the audio signal has been digitized. These signals are divided into a number of milliseconds and distributed into time slots. TDMA is also the access technique used in the European digital cellular standard, GSM, and the Japanese digital standard, personal digital cellular (PDC). The reason for choosing TDMA for all these standards was that it enables some vital features for system operation in an advanced cellular or PCS environment. Today, TDMA is an available, well-proven technique in commercial operation in many systems.
! Title
+
A single channel can carry all four conversations if each conversation is divided into relatively short fragments, is assigned a time slot, and is transmitted in synchronized timed.
! Date/Location
+
 
! Website
+
==Pros & Downfaults==
! Limitation
+
 
|-
+
TDMA can be wasteful of bandwidth because time slots are allocated to specific conversations whether or not anyone was speaking at the given moment. There is an enhanced version however, EDTMA, which attempts to correct this problem. Unlike TDMA which waits to determine whether a subscriber is transmitting, ETDMA assigns subscribers using a dynamic method. The data is sent through pauses which normal speech contains. If the subscriber has something they would like to transmit, it is placed as one bit in the buffer queue. The system then scans the buffer and notices the user has something to transmit, allocating the bandwidth accordingly. However, if there is nothing to transmit, it goes to the next subscriber. This technique can be 10 times more efficient as analog transmission of TDMA.
|Paraben Handheld Forensic Course
+
 
|Jun 18-21, Potomac Falls, VA
+
==Cell Phone Providers==
|http://www.paraben-training.com/
+
 
|-
+
There are several cell phone companies competing to sell their phones and advertise their network coverage area. They will primarily be competing within two categories: TDMA and [[CDMA]]. The pros and cons of TDMA have been mentioned, and the companies that offer TDMA are the following: AT&T, Cingular, Nextel, T-Mobile. The companies that support [[CDMA]] are: ALLTEL, Amp'd Mobile, Cricket Wireless, ESPN, Quest, Sprint, Verizon, Virgin Mobile. As we can see, more companies are supporting [[CDMA]]. The question that arises is, what makes the two so different? 
|AccessData Windows Forensics
+
 
|Jun 19-21, Dallas, TX
+
 
|http://www.accessdata.com/training
+
==TDMA Vs. [[CDMA]]==
|-
+
 
|SMART for Linux
+
TDMA is better for international plans and debately has better battery life. [[CDMA]] claims it has better battery life and coverage, however, Cingular is supposed to have the best coverage area and that is TDMA. All of this started however ever since [[CDMA]] was introduced in 1989, and the wireless world has been in debate over merits of TDMA and [[CDMA]]. Those who are for [[CDMA]] have claimed that its technology has bandwidth efficiency of up to 13 times that of TDMA and between 20 to 40 times that of analog transmission. Furthermore, [[CDMA]] lovers say its spread spectrum technology is more secure and offers higher transmission quality than TDMA because of TDMA's increased resistance to multipath distortion.  
|Jul 09-12, Austin, TX
+
 
|http://asrdata.com/training/training2.html
+
Those who favor TDMA point out that there has been no successful major trial of [[CDMA]] technology that supports the capacities it claims. Not to mention, theoretical improvements in bandwidth efficiency claimed [[CDMA]] is now being approached by enhancements to TDMA technology. TDMA's evolution allows capacity increases of 20 to 40 fold over analog in the near future. [[CDMA]] is a very expensive technology that needs $300,000 per base station, compared to $80,000 for TDMA. Lastly, TDMA is the proven leader as the most economical digital migration path for existing AMPS networks. No one has the final word in this debate, however, it is evident that TDMA will remain the dominant technology in the wireless market.
|-
+
 
|Cyber Counterterrorism Investigations Training Program (CCITP)
+
== External Links ==
|Jul 09-13, FLETC, Glynco, GA
+
 
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
http://en.wikipedia.org/wiki/Time_division_multiple_access <br>
|Limited to Law Enforcement
+
http://www.iec.org/online/tutorials/tdma/topic04.html <br>
|-
+
http://www.cellphoneinfo.com/index.html
|SMART Windows Data Forensics
+
|Jul 16-18, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|Seized Computer Evidence Recovery Specialist (SCERS)
+
|Jul 16-27, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|AccessData BootCamp
+
|Jul 17-19, Boise, ID
+
|http://www.accessdata.com/training
+
|-
+
|Paraben Handheld Forensic Course
+
|Jul 23-26, Potomac Falls, VA
+
|http://www.paraben-training.com/
+
|-
+
|AccessData Windows Forensics
+
|Jul 24-26, Albuquerque, NM
+
|http://www.accessdata.com/training
+
|-
+
|Network Forensics and Investigations Workshop
+
|Jul 25-27, Washington, DC
+
|http://www.strozllc.com/trainingcenter/
+
|-
+
|First Responder to Digital Evidence Program (FRDE)
+
|Jul 31-Aug 02, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|Paraben Wireless Forensics
+
|Aug 01-03, Potomac Falls, VA
+
|http://www.paraben-training.com/
+
|-
+
|SARC Steganography Examiner Training
+
|Aug 04-05, Fairfax, VA (RCFG/GMU Conference 2007)
+
|http://www.sarc-wv.com/training.aspx
+
|-
+
|SMART for Linux
+
|Aug 06-09, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|Introduction to Cyber Crime
+
|Aug 06-08, Mississippi State University
+
|http://www.security.cse.msstate.edu/ftc/schedule.php
+
|Limited to Law Enforcement
+
|-
+
|X-Ways Forensics
+
|Aug 06-08, Seattle, WA
+
|http://www.x-ways.net/training/seattle.html
+
|-
+
|Forensics Tools and Techniques
+
|Aug 08-10, Mississippi State University
+
|http://www.security.cse.msstate.edu/ftc/schedule.php
+
|Limited to Law Enforcement
+
|-
+
|File Systems Revealed
+
|Aug 09-10, Seattle, WA
+
|http://www.x-ways.net/training/seattle.html
+
|-
+
|Search and Seizure of Computers and Electronic Evidence
+
|Aug 09-10, Oxford, MS
+
|http://www.security.cse.msstate.edu/ftc/schedule.php
+
|Limited to Law Enforcement
+
|-
+
|X-Ways Forensics
+
|Aug 13-15, Long Beach, CA
+
|http://www.x-ways.net/training/long_beach.html
+
|-
+
|Paraben Cellular/GPS Signal Analysis
+
|Aug 13-14, Potomac Falls, VA
+
|http://www.paraben-training.com/
+
|-
+
|Computer Network Investigations Training Program (CNITP)
+
|Aug 14-24, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|SMART Linux Data Forensics
+
|Aug 13-15, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|Network Forensics and Investigations Workshop
+
|Aug 13-15, Los Angeles, CA
+
|http://www.strozllc.com/trainingcenter/
+
|-
+
|Macintosh Forensic Survival Course
+
|Aug 13-17, Fredricksburg, VA
+
|http://www.phoenixdatagroup.com/cart/index.php
+
|-
+
|AccessData Internet Forensics
+
|Aug 14-16, Austin, TX
+
|http://www.accessdata.com/training
+
|-
+
|File Systems Revealed
+
|Aug 16-17, Long Beach, CA
+
|http://www.x-ways.net/training/long_beach.html
+
|-
+
|SARC Steganography Examiner Training
+
|Aug 24-25, San Diego, CA (HTCIA Conference 2007)
+
|http://www.sarc-wv.com/training.aspx
+
|-
+
|Helix Live Forensics and Incident Response Course
+
|Aug 28-30, Tennessee Bureau of Investigations - Nashville, TN
+
|https://www.e-fense.com/register.php
+
|-
+
|Paraben Cellular/GPS Signal Analysis
+
|Aug 30-31, Potomac Falls, VA
+
|http://www.paraben-training.com/
+
|-
+
|SMART for Linux
+
|Sep 03-06, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|Paraben Handheld Forensic Course
+
|Sep 04-07, Mississauga, Ontario, Canada
+
|http://www.paraben-training.com/
+
|-
+
|AccessData BootCamp
+
|Sep 04-06, Mississippi State University
+
|http://www.security.cse.msstate.edu/ftc/schedule.php
+
|Limited to Law Enforcement
+
|-
+
|Paraben Advanced Cell Phone Forensics
+
|Sep 10-12, San Diego, CA
+
|http://www.paraben-training.com/
+
|-
+
|Paraben E-Discovery: E-mail & Mobile E-mail Devices
+
|Sep 10-14, Potomac Falls, VA
+
|http://www.paraben-training.com/
+
|-
+
|First Responder to Digital Evidence Program (FRDE)
+
|Sep 11-13, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|AccessData Applied Decryption
+
|Sep 11-13, Dallas, TX
+
|http://www.accessdata.com/training
+
|-
+
|Paraben Advanced SIM Card Forensics
+
|Sep 13-14, San Diego, CA
+
|http://www.paraben-training.com/
+
|-
+
|Enterprise Data Forensics
+
|Sep 17-19, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|Paraben Network Incident Response
+
|Sep 17-21, Potomac Falls, VA
+
|http://www.paraben-training.com/
+
|-
+
|Paraben Cellular/GPS Signal Analysis
+
|Sep 20-21, San Diego, CA
+
|http://www.paraben-training.com/
+
|-
+
|Paraben Advanced Cell Phone Forensics
+
|Sep 24-26, Potomac Falls, VA
+
|http://www.paraben-training.com/
+
|-
+
|Introduction to Cyber Crime
+
|Sep 24-26, Jackson, Mississippi
+
|http://www.security.cse.msstate.edu/ftc/schedule.php
+
|Limited to Law Enforcement
+
|-
+
|Macintosh Forensic Survival Course
+
|Sep 24-28, Santa Ana, CA
+
|http://www.phoenixdatagroup.com/cart/index.php
+
|-
+
|BlackBag Introductory MacIntosh Forensics
+
|Sep 24-28, Richmond, VA
+
|http://www.blackbagtech.com/products/training.htm
+
|Limited to Law Enforcement
+
|-
+
|AccessData Applied Decryption
+
|Sep 25-27, Chicago, IL
+
|http://www.accessdata.com/training
+
|-
+
|AccessData BootCamp
+
|Sep 25-27, Solna, SE
+
|http://www.accessdata.com/training
+
|-
+
|Forensics Tools and Techniques
+
|Sep 26-28, Jackson, Mississippi
+
|http://www.security.cse.msstate.edu/ftc/schedule.php
+
|Limited to Law Enforcement
+
|-
+
|Paraben Advanced SIM Card Forensics
+
|Sep 27-28, Potomac Falls, VA
+
|http://www.paraben-training.com/
+
|-
+
|Paraben Wireless Forensics
+
|Oct 01-03, San Diego, CA
+
|http://www.paraben-training.com/
+
|-
+
|SMART for Linux
+
|Oct 01-04, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|Paraben Cellular/GPS Signal Analysis
+
|Oct 04-05, Potomac Falls, VA
+
|http://www.paraben-training.com/
+
|-
+
|SMART Windows Data Forensics
+
|Oct 08-10, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|Paraben Handheld Forensic Course
+
|Oct 8-11, San Diego, CA
+
|http://www.paraben-training.com/
+
|-
+
|Paraben Handheld Forensic Course
+
|Oct 8-11, Potomac Falls, VA
+
|http://www.paraben-training.com/
+
|-
+
|Paraben Advanced Cell Phone Forensics
+
|Oct 15-17, Mississauga, Ontario, Canada
+
|http://www.paraben-training.com/
+
|-
+
|BlackBag Introductory MacIntosh Forensics
+
|Oct 15-19, Tacoma, WA
+
|http://www.blackbagtech.com/products/training.htm
+
|-
+
|Digital Evidence Acquisition Specialist Training Program (DEASTP)
+
|Oct 15-26, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|Paraben Advanced SIM Card Forensics
+
|Oct 18-19, Mississauga, Ontario, Canada
+
|http://www.paraben-training.com/
+
|-
+
|Paraben E-Discovery: E-mail & Mobile E-mail Devices
+
|Oct 15-19, Mississauga, Ontario, Canada
+
|http://www.paraben-training.com/
+
|-
+
|X-Ways Forensics
+
|Oct 22-24, Hong Kong
+
|http://www.x-ways.net/training/hong_kong.html
+
|-
+
|File Systems Revealed
+
|Oct 25-26, Hong Kong
+
|http://www.x-ways.net/training/hong_kong.html
+
|-
+
|SARC Steganography Examiner Training
+
|Oct 26 - 27, Gaithersburg, MD (Techno Forensics Conference 2007)
+
|http://www.sarc-wv.com/training.aspx
+
|-
+
|Seized Computer Evidence Recovery Specialist (SCERS)
+
|Oct 29-Nov 9, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|Search and Seizure of Computers and Electronic Evidence
+
|Oct 29-30, Oxford, MS
+
|http://www.security.cse.msstate.edu/ftc/schedule.php
+
|Limited to Law Enforcement
+
|-
+
|Paraben Handheld Forensic Course
+
|Nov 05-08, Mississauga, Ontario, Canada
+
|http://www.paraben-training.com/
+
|-
+
|SMART for Linux
+
|Nov 05-08, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|Introduction to Cyber Crime
+
|Nov 05-07, Jackson, Mississippi
+
|http://www.security.cse.msstate.edu/ftc/schedule.php
+
|Limited to Law Enforcement
+
|-
+
|AccessData BootCamp
+
|Nov 06-08, Austin, TX
+
|http://www.accessdata.com/training
+
|-
+
|AccessData Windows Forensics
+
|Nov 06-08, Solna, Sweden
+
|http://www.accessdata.com/training
+
|-
+
|Forensics Tools and Techniques
+
|Nov 07-09, Jackson, Mississippi
+
|http://www.security.cse.msstate.edu/ftc/schedule.php
+
|Limited to Law Enforcement
+
|-
+
|SMART Linux Data Forensics
+
|Nov 12-14, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|AccessData BootCamp
+
|Nov 13-15, Mississippi State University
+
|http://www.security.cse.msstate.edu/ftc/schedule.php
+
|Limited to Law Enforcement
+
|-
+
|SMART for Linux
+
|Dec 03-06, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|Introduction to Cyber Crime
+
|Dec 03-05, Mississippi State University
+
|http://www.security.cse.msstate.edu/ftc/schedule.php
+
|Limited to Law Enforcement
+
|-
+
|AccessData Internet Forensics
+
|Dec 04-06 , Solna, Sweden
+
|http://www.accessdata.com/training
+
|-
+
|Forensics Tools and Techniques
+
|Dec 05-07, Mississippi State University
+
|http://www.security.cse.msstate.edu/ftc/schedule.php
+
|Limited to Law Enforcement
+
|-
+
|Enterprise Data Forensics
+
|Dec 10-12, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|Paraben Advanced Cell Phone Forensics
+
|Dec 17-19, Mississauga, Ontario, Canada
+
|http://www.paraben-training.com/
+
|-
+
|Paraben Advanced SIM Card Forensics
+
|Dec 20-21, Mississauga, Ontario, Canada
+
|http://www.paraben-training.com/
+
|-
+
|}
+

Revision as of 16:57, 6 December 2006

40px-Ambox warning pn.png

This article, and others, needs to be wikified.
Please remove this template after wikifying.

TDMA - Time Division Multiple Access


Why use TDMA?

TDMA (Time Division Multiple Access), is used in the largest available networks in the world. It is a digital communication method allowing many users to access a single communication channel. TDMA is aimed at dealing with multiple access to the same communication medium. Each individual user is given a unique time slot within the defined communication channel. This methodology increases the efficiency of transmission by allowing multiple users simultaneous access to a time slot. A significant benefit is TDMA can be easily adapted to transmission of data as well as voice communication.

TDMA offers the ability to carry date rates of 64 kbps to 120 MBPS, which enables options of communication such as fax, voiceband data, sms, as well as bandwidth intensive apps. TDMA allows the mobile device to have extended battery life, since the cellular device is only transmitting a portion of the time during conversations. In addition, TDMA is the most cost effective technology for upgrading an analog system to digital (http://www.iec.org/online/tutorials/tdma/topic04.html).

How it works

It’s necessary for TDMA to rely upon that fact that the audio signal has been digitized. These signals are divided into a number of milliseconds and distributed into time slots. TDMA is also the access technique used in the European digital cellular standard, GSM, and the Japanese digital standard, personal digital cellular (PDC). The reason for choosing TDMA for all these standards was that it enables some vital features for system operation in an advanced cellular or PCS environment. Today, TDMA is an available, well-proven technique in commercial operation in many systems. A single channel can carry all four conversations if each conversation is divided into relatively short fragments, is assigned a time slot, and is transmitted in synchronized timed.

Pros & Downfaults

TDMA can be wasteful of bandwidth because time slots are allocated to specific conversations whether or not anyone was speaking at the given moment. There is an enhanced version however, EDTMA, which attempts to correct this problem. Unlike TDMA which waits to determine whether a subscriber is transmitting, ETDMA assigns subscribers using a dynamic method. The data is sent through pauses which normal speech contains. If the subscriber has something they would like to transmit, it is placed as one bit in the buffer queue. The system then scans the buffer and notices the user has something to transmit, allocating the bandwidth accordingly. However, if there is nothing to transmit, it goes to the next subscriber. This technique can be 10 times more efficient as analog transmission of TDMA.

Cell Phone Providers

There are several cell phone companies competing to sell their phones and advertise their network coverage area. They will primarily be competing within two categories: TDMA and CDMA. The pros and cons of TDMA have been mentioned, and the companies that offer TDMA are the following: AT&T, Cingular, Nextel, T-Mobile. The companies that support CDMA are: ALLTEL, Amp'd Mobile, Cricket Wireless, ESPN, Quest, Sprint, Verizon, Virgin Mobile. As we can see, more companies are supporting CDMA. The question that arises is, what makes the two so different?


TDMA Vs. CDMA

TDMA is better for international plans and debately has better battery life. CDMA claims it has better battery life and coverage, however, Cingular is supposed to have the best coverage area and that is TDMA. All of this started however ever since CDMA was introduced in 1989, and the wireless world has been in debate over merits of TDMA and CDMA. Those who are for CDMA have claimed that its technology has bandwidth efficiency of up to 13 times that of TDMA and between 20 to 40 times that of analog transmission. Furthermore, CDMA lovers say its spread spectrum technology is more secure and offers higher transmission quality than TDMA because of TDMA's increased resistance to multipath distortion.

Those who favor TDMA point out that there has been no successful major trial of CDMA technology that supports the capacities it claims. Not to mention, theoretical improvements in bandwidth efficiency claimed CDMA is now being approached by enhancements to TDMA technology. TDMA's evolution allows capacity increases of 20 to 40 fold over analog in the near future. CDMA is a very expensive technology that needs $300,000 per base station, compared to $80,000 for TDMA. Lastly, TDMA is the proven leader as the most economical digital migration path for existing AMPS networks. No one has the final word in this debate, however, it is evident that TDMA will remain the dominant technology in the wireless market.

External Links

http://en.wikipedia.org/wiki/Time_division_multiple_access
http://www.iec.org/online/tutorials/tdma/topic04.html
http://www.cellphoneinfo.com/index.html