USE OF MOBILE NETWORKS FOR THE PURPOSE OF PROTECTING PERSONS AND PROPERTY
Abstract
Mobile networks have been around us for decades, and life without them is difficult to reconstruct. Their gradual evolution has varied over time, depending on the requirements of their users. Originally, they were used only for the transmission of telephony, but transmission in the speech band today is mainly used for data transmission and telephony is in moderate attenuation. Various types of data can be transmitted via mobile networks due to their size or importance.
In the area of security, mobile networks are used from two basic points of view. The first aspect is the use for communication between the components of the electrical security system and the second is the transmission of information from the monitored object to the monitoring and alarm receiving center.
The aim of the paper will be to point out the composition of mobile networks focusing on the functioning of cellular systems and the course of communication between individual parts of the system. The main view will be to the base station of the system without which the functionality of the system would not be possible. In addition to the principle of functionality, we will also focus on utilizing the possibilities of information transmission via mobile networks in terms of property protection and we will focus on the possibility of their use in the future.
Copyright information
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (Creative Commons Attribution License 3.0 - CC BY 3.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
info@iseic.cz, www.iseic.cz, ojs.journals.cz