Professional Documents
Culture Documents
Cell phone working fundamentals - Cell phone frequencies & channels - Digital cell phone
components - Generations of cellular networks - Cell phone network technologies /
architecture -Voice calls & SMS
1
FREQUENCY REUSE
Use of radio channels on same carrier frequency to cover different areas that are Separated from
one another by different stations. The users in different cells use the same frequency. This
technique maximizes number of mobile phones served in a Geographical area and spectrum
efficiency
ADVANTAGES
1. A large subscriber capacity
2. Efficient use of spectrum resources
3. Nationwide coverage
CELL
The cell provided by a cell site can be from one mile to twenty miles in diameter, depending on
terrain and transmission power. Several coordinated cell sites are called a cell system.
Cellular network is an underlying technology for mobile phones, personal communication systems,
wireless networking etc. The technology is developed for mobile radio telephone to replace high
power transmitter/receiver systems. Cellular networks use lower power, shorter range and more
transmitters for data transmission.
TYPES OF CELL
Microcell, less than 2 kilometres
A microcell is a cell in a mobile phone network served by a low power cellular base station (tower),
covering a limited area such as a mall, a hotel, or a transportation hub.
Picocell, less than 200 metres
2
A picocell is a small cellular base station typically covering a small area, such as in-building (offices,
shopping malls, train stations, stock exchanges, etc.), or more recently in-aircraft.
Femtocell, around 10 metres
In telecommunications, a femtocell is a small, low-power cellular base station, typically designed
for use in a home or small business.
CELL SHAPES
HEXAGON SHAPE OF CELLS
• provides best approximation to circular omni directional radio pattern
• economical to use since hexagon requires fewer cells
• practical realization of overlapping circles
• hexagon has largest area, approximates circular radiation pattern
HANDOFF
Mobile users are mobile they can be mobile while using the phone
Network should be able to access as they move
If user moves from one cell to another a handoff is required
The user can move around while using mobile phone which is the advantage of handoff
If the user moves within a cell,but moving from cell to another cell handoff is required
Process of transferring active cell from first cell to another without disconnecting a call
when a mobile moves into different cell while the call is in progress MSC TRANSFERS
automatically transfers to new BS
1. Handoff involves identifying a new base station along with transfer of voice and control
signals
2. A user is transmitting and receiving from a given base station
3
3. Assume the user moves from coverage area of one base station BS1 to another base
station BS2
4. BS1 notices the signal is degrading
5. BS2 notices the signal is improving
6. The users signal is weak in bs1 the communication is transferred from BS1 to BS2
hard handoff
4
Break before make
Connection to the old bs is broken before new connection is made
Hard handoff occurs between different radio systems,differnt frequency assignments and
different technologies
soft handoff
make before break
connection is not broken until a connection is made
normally connected to another base station
when sectors of same bs within msc is involved
CO CHANNEL INTERFERENCE
Channels that use same set of frequency is called co channel and interference caused by channels
is called co channel interference
Occurs mainly reusing an identical frequency channel
To reduce cci minimum frequency distance reuse is used
INCREASING USER CAPACITY
1. Add new channels
New channels are added between bs and ms
2. Frequency borrowing
frequencies are taken from adjacent cells to congested cells
3. Cell splitting
cells in areas of high usage can be split in to smaller cells
4. Cell sectoring
cells are divided into a number of wedge shaped sectors each of their own set of channels
5. Microcells
bs antennas move to lamp post and building
5
CELL SPLITTING
1. process of dividing radio coverage of a cell site into two or more cell sites
2. performed by increasing capacity within original cell by increasing number of BS
3. splitting provides more number of cells
4. reduction in cell size
5. reduction in height and transmission power
6. cell radius(r) reduction by a factor f reduces the coverage area and increases number of bs
by a factor of f2
FREQUENCY CARRIES/CHANNELS
– The information from sender to receiver is carrier over a well defined frequency band.
• This is called a channel
6
– Each channel has a fixed frequency bandwidth (in KHz) and Capacity (bit-rate)
– Different frequency bands (channels) can be used to transmit information in parallel and
independently.
Example
– Assume a spectrum of 90KHz is allocated over a base frequency b for communication
between stations A and B
– Assume each channel occupies 30KHz.
– There are 3 channels
– Each channel is simplex (Transmission occurs in one way)
– For full duplex communication:
» Use two different channels (front and reverse channels)
» Use time division in a channel
1. Channels: it is a range of frequency allotted to particular service or systems.
2. Control Channel: Radio channel used for transmission of call setup, call request, call
initiation and other beacon or control purposes.
3. Forward Control Channel(FCC): Radio channel used for transmission of information from
the base station to the mobile
4. Reverse Channel(RC): Radio channel used for transmission of information from the mobile
to base station.
5. Voice Channel(VC): Radio channel used for voice or data transmission.
6. control channels
setup and paging channels
paging in downlink and setup in uplink
7. traffic channels
active during voice conversations
Channel 1 (b - b+30)
Station A Channel 2 (b+30 - b+60) Station B
Channel 3 (b+60 - b+90)
7
SIMPLEX COMMUNICATION
normally, on a channel, a station can transmit only in one way.
communication is possible in one direction
DUPLEX COMMUNICATION
simultaneous two way reception between between subscriber and bas station
FREQUENCY DIVISION DUPLEX
fdd requires two separate communications channels.two seperate frequencies for uplink and
downlink
TDD
uses single frequency to transmit signals in both uplink and downlink
8
mobile station (MS) comprises all user equipment and software needed for communication with a
mobile network.
ANTENNA CONVERTS RF SIGNAL TO EM WAVE
BASE STATION
PROVIDES DIRECT COMMUNICATION WITH MOBILE PHONES AND IT DEFINES
A CELL
when cells are grouped together cluster is formed two frequencies are required to establish
communication between bs and ms a group of bs are connected to form bsc
first part of bs is electronics section located in a container tower at the base of the antenna
tower.the various electronic devices for communcating with mobile handsets include rf
amplifiers,transceivers,combiners,control, communication links,power with backup
second part of the bs is the antenna and feeder to connect the base tranceiver station
if the antenna is too low or in a poor location there will be insufficient coverage leaving of
coverage.
9
10
BS OR CELL SITE ANTENNA
omni directional or directional antenna are used
In radio communication, an omnidirectional antenna is a class of antenna which radiates radio
wave power uniformly in all directions in one plane, with the radiated power decreasing with
elevation angle above or below the plane, dropping to zero on the antenna's axis.
has three faces with several frequency each face covers 120 degree of the cell
A base station controller (BSC) is a critical mobile network component that controls one or more
base transceiver stations (BTS), also known as base stations or cell sites. Key BSC functions
include radio network management (such as radio frequency control), BTS handover management
and call setup.
MOBILE SWITCHING CENTER
The MSC is the heart of the GSM network.
It handles call routing, call setup, and basic switching functions.
An MSC handles multiple BSCs and also interfaces with other MSC’s and registers. It also
handles inter-BSC handoffs as well as coordinates with other MSC’s for inter-MSC handoffs.
The Mobile Switching Centre Server, or MSC Server abbreviated MSS, is a 3G core network
element which controls the network switching subsystem elements.
GENERATION OF MOBILE SYSTEMS
Transmitting voice and data using electromagnetic waves in open space
11
• Electromagnetic waves
8
• Travel at speed of light (c = 3x10 m/s)
• Has afrequency(f) andwavelength
» c=fx
• The higher the energy photon the more penetrating is the radiation
Origin of em waves can be ttraced back in year 1857 where behaivour of em waves
were explained by maxwell
Maxwell found that Electric and magnetic fields arising from varying field of electric
and magnetic fields arising from varying fi]elds of electric charges and current
Twenty years later hertz came to conclusionn that an oscillatory electric charge q=q 0
sin t radiates em waves and these waves carry energy and was able to produce em
waves of frequency 3*10^10 hertz
• When the transmitter generated a spark a small spark was seen to jump in the
gap in receiving coil. This is the basis of antenna theory
1. Marconi demonstrated the first radio based wireless systems successfully using
electromagnetic waves in 1901 for a distance of 1 mile
12
The modulation of a radio or other wave by variation of its frequency,
especially to carry an audio signal.
• Single cell systems is restricted by mobility ,limited service and poor speech quality
In 1964 AT&T introduced the improved mobile telephone service (IMTS). This provided full
duplex operation, automatic dialing, and automatic channel searching. Initially 11 channels were
provided, but in 1969 an additional 12 channels were made available. Since only 11 (or 12)
channels were available for all users of the system within a given geographic area (such as the
metropolitan area around a large city), the IMTS system faced a high demand for a very limited
channel resource. Moreover, each base-station antenna had to be located on a tall structure and
had to transmit at high power in order to provide coverage throughout the entire service area
13
14
PARTS OF DIGITAL PHONE
Antenna Switch: It is found in the Network Section of a mobile phone Cell Phone Antenna Switch
Cell Phone Antenna Switch and is made up of metal and non-metal. In GSM sets it is found in
white color and in CDMA sets it is found in golden metal.
Faults: If the Antenna Switch is faulty then there will be no network in the mobile phone.
P.F.O: It is found near the Antenna Switch in the Network Section of the Cell Phone PFO
PCB of Mobile Phone. It is also called P.A (Power Amplifier) and Band Pass Filter.
Work: It filters and amplifies network frequency and selects the home network.
Faults: If the PFO is faulty then there will be no network in the mobile phone. If it gets short then
the mobile phone will get dead.
RF IC / Hagar / Network IC: This electronic component found near Cell Phone Network IC / RF
IC
15
Cell Phone Network IC / RF IC
the PFO in the Network Section of a Mobile Phone. It is also called RF signal processor.
Work: It works as transmitter and receiver of audio and radio waves according to the instruction
from the CPU.
Faults: If the RF IC is faulty then there will be problem with network in the mobile phone.
Sometimes the mobile phone can even get dead.
26 MHz Crystal Oscillator: It is found near the PFO in the Network Mobile Phone 26 MHz
Crystal Oscillator
Faults: If this crystal is faulty then there will be no outgoing call and no network in the mobile
phone.
VCO: It is found near the Network IC in the Network Section of a Mobile Mobile Phone VCO
Phone.
Work: It sends time, date and voltage to the RF IC / Hager and the CPU. It also creates frequency
after taking command from the CPU.
Faults: If it is faulty then there will be no network in the mobile phone and it will display “Call
End” or “Call Failed”.
RX Filter: It is found in the Network Section of a Mobile Phone. Mobile Phone RX Filter
Faults: If it is faulty then there will network problem during incoming calls.
TX Filter: It is found in the Network Section of a Mobile Phone. Mobile Phone TX Filter
16
Mobile Phone TX Filter
Faults: If it is faulty then there will network problem during outgoing calls.
ROM: It is found in the Power Section of a Mobile Phone. Mobile Phone ROM
Faults: If ROM is faulty then there will software problem in the mobile phone and the set will get
dead.
RAM: It is found in the Power Section of a Mobile Phone. Mobile Phone RAM
Work: It sends and receives commands of the operating program in a mobile phone.
Faults: If RAM is faulty then there will be software problem in the mobile phone and it will get
frequently get hanged and the set can even get dead.
Flash IC: It is found in the Power Section of a Mobile Phone. It is also Cell Phone Flash IC
Faults: If Flash IC is faulty then the mobile phone will not work properly and it can even get dead.
Power IC: It is found in the Power Section of a Mobile Phone. There are Cell Phone Power IC
many small components mainly capacitor around this IC. RTC is near the Power IC.
Work: It takes power from the battery and supplies to all other parts of a mobile phone.
Charging IC: It is found in the Power Section near R22. Cell Phone Charging IC
17
Cell Phone Charging IC
Work: It takes current from the charger and charges the battery.
Faults: If Charging IC is faulty then the set will not get charged. If the Charging IC is short then the
set will get dead.
RTC (Simple Silicon Crystal): It is Real Time Clock and is found in Mobile Phone RTC (Real
Time Clock)
the Power Section near Power IC. It is made up of either metal or non-metal. It is of long shape.
Faults: If RTC is faulty then there will be no date or time in the mobile phone and the set can even
get dead.
CPU: It is found in the Power Section. It is also called MAD IC, RAP IC Cell Phone CPU
It is the largest IC on the PCB of a Mobile Phone and it looks different from all other ICs.
Faults: If CPU is faulty then the mobile phone will get dead.
Logic IC / UI IC: It is found in any section of a mobile phone. It has 20 Cell Phone Logic IC
18
CHANNELS IN GSM
The channel used in the air interface is divided into two types: Physical channel and
Logical channel.
Physical Channel
19
Logical channels
Logical channels
The control channels are intended to carry signalling and Synchronization data
between the base station and the Mobile station. Logical are used by the system and
the MS for different purposes
Traffic Channel
Traffic channel (TCH) : Traffic channels are intended to carry encoded speech and
user data.
-Full rate traffic channels at a net bit rate of 22.8 Kb/s (TCH/F)
-Half rate traffic channels at a net bit rate of 11.4 Kb/s (TCH/H)
Speech Channels : Speech channels are defined for both full rate and half rate traffic
channels.
Data Channels :
Data channels support a variety of data rates (2.4, 4.8 and 9.6 Kb/s) on both half and
full rate traffic channels. The 9.6 Kb/s data rate is only for full rate application
20
Control channel
Control channels carry signalling information between an MS and a BTS. There are
several forms of control channels in GSM, and they can generally be divided into
three categories according to the manner in which they are supported on the radio
interface and the type of signalling information they carry.
Broadcast control channels are transmitted in downlink direction only i.e. only
transmitted by BTS.
The broadcast channels are used to broadcast synchronization and general network
information to all the MSs within a cell.
Broadcast Channel
1. Allows the mobile station to synchronize time wise with the BTS.
21
2. Repeated broadcast (every 10 frames) of Synchronization
Bursts is called (SCH)
3. SCH is transmitted on the downlink, point to multipoint.
4. Broadcast Channel
The common control channels are used by an MS during the paging and access
procedures.
CCCH
Paging Channel :-
22
Access Grant Control Channel :-
CCCH
This channel is used to transmit messages to be broadcast to all mobiles within a cell
e.g. traffic info.
DCH
The MS is on the SDCCH informed about which physical channel (frequency and
time slot) to use for traffic (TCH).
It also carries information for call forwarding and Transmission of short message.
They are used for carrying out information associated with the process being carried
out on either SDCCH or TCH.
23
They are of two type
1. Fast ACCH
2. Slow ACCH
DCH
GENERATIONS OF MOBILE
FIRST GENERATION
DRAWBACKS
24
SECOND GENERATION
FEATURES INCLUDES:
25
6. 2.5G is a technology between the second (2G) and third (3G)
generation of mobile telephony.
7. 2.5G is sometimes described as 2G Cellular Technology combined with
GPRS.
FEATURES INCLUDES:
1. Phone Calls
2. Send/Receive E-mail Messages
3. Web Browsing
4. Speed : 64-144 kbps
5. Camera Phones
6. Take a time of 6-9 mins. to download a 3 mins. Mp3 song
THIRD GENERATION
DRAWBACKS
26
FOURTH GENERATION
FEATURES INCLUDE:
1.More Security
2.High Speed
3.High Capacity
4.Low Cost Per-bit etc
5.Battery uses is more
6.Hard to implement
7.Need complicated hardware Expensive equipment required
to implement next generation network.
FIFTH GENERATION
28
System for Mobile (GSM) and US Time Division Multiple Access (US-
TDMA)
ESN
MIN
The MIN is a number that uniquely identifies a mobile phone working under
TIA standards for cellular and PCS technologies.
SIM
29
mobile phones and computers). It is also possible to store contact information
on many SIM cards. SIM cards are always used on GSM phones; for CDMA
phones, they are only needed for newer LTE-capable handsets. SIM cards can
also be used in satellite phones, computers, or cameras.
The SIM circuit is part of the function of a universal integrated circuit card
(UICC) physical smart card, which is usually made of PVC with embedded
contacts and semiconductors. "SIM cards" are transferable between different
mobile device
ADC
An ADC inputs an analog electrical signal such as voltage or current and
outputs a binary number. In block diagram form, it can be represented as
such:
VOICE CALL
Voice Call Continuity (VCC) specifications in order to describe how a voice call can be persisted,
as a mobile phone moves between circuit switched and packet switched radio domains (3GPP TS
23.206).
30
Many mobile phones are becoming available that support both cellular and other broadband radio
technologies.
Voice over Internet Protocol (VoIP) is one of the most popular standards for voice and video
calling over the web.
Voice over Internet Protocol (VoIP) is a technology that enables one to make and receive phone
calls through the Internet instead of using the traditional analogy
With VoIP, analog voice calls are converted into packets of data. The packets travel like any other
type of data, such as e-mail, over the public Internet and/or any private Internet Protocol (IP)
network.
Using a VoIP service, you can call landline or cell phones. You can also call computer-to-
computer, with both parties speaking into a computer microphone and listening through computer
speakers or headsets.
When evaluating, it's worth noting that you can make or receive calls using landline telephones. All
you need is an analog telephone adapter connected to your network. Also, to ensure the best voice
quality and security, consider using your VoIP or other communications system on a private IP
network.
1. Compression – voice is compressed typically with one of the following codecs, G7.11
64k, G7.29AB 8k, G723.1 6.3k
}
2. Encapsulation – the digitized voice is wrapped in an IP packet
}
3. Routing – the voice packet is routed thru the network to its final destination
31
Voip network model
SIP
VoIP SIP
32
SMS
SMS (Short Message Service), commonly referred to as "text messaging," is a service for sending
short messages of up to 160 characters (224 characters if using a 5-bit mode) to mobile devices,
including cellular phones, smartphones and PDAs.
SMS is similar to paging. However, SMS messages do not require the mobile phone to be active
and within range and will be held for a number of days until the phone is active and within range.
SMS messages are transmitted within the same cell or to anyone with roaming service capability.
They can also be sent to digital phones in a number of other ways, including:
Enhanced messaging service (EMS), an adaptation of SMS that allows users to send and receive
ringtones and operator logos, as well as combinations of simple media to and from EMS-
compliant handsets.
Many of these uses depend upon short telephone numbers called common short codes (CSCs),
usually consisting of five digits, that are used to address SMS and MMS messages from cellular
telephones.
Definition: The routing algorithm is that part of the network layer software responsible for
deciding which output line an incoming packet should be transmitted on.
33
Category of algorithm:
Nonadaptive algorithms do not base their routing decisions on measurements or estimates of the
current traffic and topology.
Adaptive algorithms, in contrast, change their routing decisions to reflect changes in the topology,
and usually the traffic as well.
Dijkstra algorithm:
Each node is labeled (in parentheses) with its distance from the source node along the best
known path. Initially, no paths are known, so all nodes are labeled with infinity. As the algorithm
proceeds and paths are found, the labels may change, reflecting better paths. A label may be either
tentative or permanent.
Initially, all labels are tentative. When it is discovered that a label represents the shortest possible
path from the source to that node, it is made permanent and never changed thereafter.
34
The shortest path from A to D ABEFHD
Flooding
a) Flooding algorithm:every incoming packet is sent out on every outgoing line except the
one it arrived on.
b) Flooding obviously generates vast numbers of duplicate packets, in fact, an infinite number
unless some measures are taken to damp the process.
c) One such measure is to have a hop counter contained in the header of each packet, which
is decremented at each hop, with the packet being discarded when the counter reaches
zero.
d) An alternative technique for damming the flood is to keep track of which packets have
been flooded, to avoid sending them out a second time.
e) A dynamic routing algorithm
Operate by having each router maintain a table (i.e, a vector) giving the best known distance to
each destination and which line to use to get there. These tables are updated by exchanging
information with the neighbors. (also named the distributed Bellman-Ford routing algorithm and
the Ford- Fulkerson algorithm )
Table content: In distance vector routing, each router maintains a routing table indexed by, and
containing one entry for, each router in the subnet. This entry contains two parts: the preferred
outgoing line to use for that destination and an estimate of the time or distance to that destination.
Table updating method:Assume that the router knows the delay to each of its neighbors. Once
every T msec each router sends to each neighbor a list of its estimated delays to each destination.
It also receives a similar list from each neighbor.
The idea behind link state routing can be stated as five parts. Each
router must do the following:
35
IT8201 INFORMATION TECHNOLOGY ESSENTIALS
ER DIAGRAM EXAMPLE
<iframe width="400" height="280" src="https://www.youtube.com/embed/I_rxqSJAj6U" frameborder="0"
allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
5.1.2 Multimedia applications
Multi-Media
The great strides made recently in delivering multimedia, which is the coordination of text, video and audio
media capabilities, it is one of the most significant developments in communications today. Multimedia can
provide salient opportunities for service providers to attract new customers and increase the loyalty of current
ones, while increasing Average Revenue Per User (ARPU). Businesses can use multimedia to increase the
employee communication and significantly upgrade the effectiveness of critical functions such as the contact
center.
Basic Concepts of data compression
In general, data compression is the process of reducing the amount of data needed to represent a given
quantity of information.
Data Redundancy
Data is the one by which the information is conveyed. For a given information, various types of representations
may be used and each representation will have different amounts of data.
Some representations may have data which do not convey any useful information. Therefore, these
representations are said to contain data redundancy. If this redundancy is removed, compression can be
achieved.
Relative Data Redundancy
Let there be two data sets that represent the same information and m, n 2are the number of information -
carrying units (i.e. bits) in the data sets.
Now, the relative data redundancy Rd of the first data set is given by,
----------(1)
Where, Cr - compression ratio defined as,
-----------(2)
Based on n1 and n2 values there can be three different cases as below.
(i)n2 = n1 → CR = 1 and RD = 0 - First set has no redundant data.
(ii)n2 << n1 → CR → ∞ and RD = 1 - First set contains highly redundant data.
(iii)n2 >> n1 ⇒ Cr → 0 and Rd = ∞ - Second set has more data than the original (1st) set. This case is undesirable.
Thus, a redundancy of 0.9 means that 90% of data in the first set is redundant and so on.
Types of Redundancy
Three types of data redundancies can be found in image compression. They are,
(i)Coding Redundancy
(ii)Interpixel Redundancy
(iii)Psychovisual Redundancy
Reducing these redundancies provides data compression.
(i) Coding Redundancy
A code is a system of symbols used for representing an information. A code word is a sequence of symbols
representing a piece of information. Thus, the code length is defined as the number of symbols in each code
word.
A resulting image is said to have coding redundancy if its gray levels are coded using more code symbols than
actually needed to represent each gray level.
Average Length of Code Words
The gray - level histogram of an image is used to construct codes to reduce data redundancy.
Multiplying the number of bits used to represent each gray level with the probability of occurance of that gray
level and adding all such products gives the average length of code words assigned to different gray levels.
----------(3)
Where, l(rk) - Number of bits used to represent each gray level
Pr(rk) - Probability of occurrence of gray level rk.
This is the average number of bits needed to represent each pixel.
The probability of occurance of a gray level rk which is in the interval [0, 1] in a histogram is,
-------------(4)
Where, L - Number of gray levels
nk - Number of times the kth gray level appear in the image
n - Total number of pixels.
Total Number of Bits
Now, the total number of bits required to code an M x N image is given by,
L M x N = M.N.Lavg -------------(5)
To Avoid Redundancy
Coding redundancy can be avoided and thus data compression can be achieved by assigning fewer bits to more
probable gray levels and more bits to less probable gray levels. This process is known as variable-length coding.
Natural (or) Binary Coding
This type of coding assigns same number of bits to both the most and least probable gray levels. Therefore, it
cannot help to minimize coding redundancy.
(iii) Inter pixel Redundancy
It is caused by the Inter pixel correlations within an image. Inter pixel correlations are the structural and
geometric relationships between objects in the image.
Other Names:
Inter-pixel redundancy is also known as,
• Spatial Redundancy
• Geometric Redundancy
• Inter frame Redundancy
Autocorrelation Coefficient
The autocorrelation coefficients can be computed by using,
---------(6)
Where A(∆n) - scaling factor given by,
--------(7)
n - Number of pixels
To Reduce:
Inter-pixel redundancies in an image can be reduced by transforming the 2-D pixel array into a more efficient
format. Transformations used for this purpose are known as mappings. If the original image elements can be
reconstructed from the transformed data set, the mappings are called reversible mappings.
Example for mapping: Representing an image using the difference between adjacent pixels.
(iii)Psycho visual Redundancy
The human eye does not respond to all information with equal sensitivity. As, some information may be given
less importance when compared to other information in normal visual processing. Such information is said to
be psycho-visually redundant.
Properties:
Psycho visual redundancy has the following properties:
• It is basically different from other redundancies.
• It is related with real or quantifiable visual information.
• Removal of this redundancy will not affect the perceived image quality, since the data is not essential for
normal visual processing.
Perception Process:
Human perception does not involve quantitative analysis of every pixel in an image. It does only qualitative
analysis which contains the following steps:
(i) Differentiating features in an image such as edges-are searched by the observer.
(ii) The features are combined into recognizable groups by the observer.
(iii) The brain of the observer relates these groupings with its prior knowledge and completes the image
perception process.
Drawback:
When psycho visual redundancy is removed, there may be a loss in real or quantitative information. This is
known as ‘quantization’. Therefore, this is a type of lossy data compression.
Fidelity Criteria
Fidelity criteria is used to evaluate the information loss during data compression.
Need:
There is a loss of real or quantitative visual information when psycho-visual redundancy is removed. Thus, there
is a chance for losing the information of interest. Therefore, there is a need to quantify the nature and extent of
the information loss using a repeatable and reproducible criteria.
Types:
Two types of fidelity criteria are used for the assessment Of information loss. They are
(i)Objective Fidelity Criteria
(ii)Subjective Fidelity Criteria
(i) Objective Fidelity Criteria
The objective of fidelity criteria expresses the level of information loss as a function of two parameters. They
are
• The original or input image
• The compressed and successively decompressed output image.
Example - rms Error
The root-mean-square (rms) error between the input and output image is a very good example for objective
fidelity criteria.
The error between two images f(x, y) and (x,y) is given by,
-----------(9)
Now, the root-mean-square error erms between (x, y) and (x, y) is obtained by taking the square root of
the squared error, which is averaged over the M × N array.
-----(10)
Advantage:
Objective fidelity criteria is a simple and convenient technique to evaluate information loss.
(ii) Subjective Fidelity Criteria
Since human perception is based on subjective quality, it is more suitable to use subjective fidelity criteria to
evaluate the information loss.
Concept:
• This method is implemented by showing a “typical” decompressed image to a number of viewers.
• Then, their evaluations are averaged to take a decision.
• These evaluations may be done using a rating scale or side-by-side comparisons.
Continuous Tone Still Image Compression Standards - JPEG
Many continuous tone i.e. color image compression standards are defined by the CCITT and ISO.
Unlike binary compression standards, continuous tone standards are based on the lossy transform coding
techniques. These standards address monochrome image compression also.
Three important such standards which define good image quality and compression performance are:
(1)The original DCT based JPEG standard
(2)Wavelet - based JPEG 2000 standard → recently proposed.
(3)JPEG - LS standard → a loss less to near loss less adaptive prediction scheme.
JPEG Standard
JPEG stands for Joint Photographic Experts Group. It is very popular continuous tone, still frame compression
standard.
No particular file format, spatial resolution or color space model is specified for this standard. It defines three
different coding systems:
(1) A lossy baseline coding system
- It is used in almost all compression applications
(2) An extended coding system
- It is used for greater compression, higher precision or progressive reconstruction applications.
(3)A loss less independent coding system
- It is used for reversible compression.
Baseline Coding System
• It is also known as sequential baseline system.
• This system is based on the discrete cosine transform (DCT).
• Its input and output data precision is limited to 8 bits and the quantized DCT values are limited to 11 bits.
• If a system needs to be compatible with JPEG, it should have support for the baseline system.
Compression Procedure
The general block diagram of JPEG Encoder is shown in figure.
JPEG Encoder
The baseline system performs compression in three steps as below
Step 1: DCT Computation
- First, the image is subdivided into images of size 8 x 8.
- All the sub images are processed from left to right and top to bottom
- Each sub image will have 8x8 = 64 pixels. Now, 2n-1 is subtracted from all the pixels to level shift them,
2n maximum number of gray levels.
- Then, the 2-D DCT of the pixel blocks i.e. Sub images is computed.
Step 2: Quantization
- The pixels are quantized using,
- The quantized coefficients are reordered in the zigzag pattern to form a 1-D sequence of quantized
coefficients.
Step 3: Variable - Length Code Assignment
- The reordered array will have been arranged according to increasing spatial frequency.
- Now, the nonzero AC coefficients are coded using a variable - length code.
- The DC coefficient is difference coded with respect to the DC coefficient of the previous sub image.
Decoding
The JPEG Decoder which performs the opposite function of encoder explained above is shown in figure.
JPEG Decoder
Advantages:
The JPEG coding procedure has the following advantages:
(1) The reordering of quantized coefficients may result in long runs of zeros. This makes the computation
easier.
(2) Instead of default coding tables and quantization arrays, the user is allowed to construct custom tables
and/or arrays according to the image characteristics.
JPEG 2000 Standard
• JPEG 2000 is an extension of the initial JPEG standard
• The standard is based on wavelet coding techniques
• It is developed to provide flexibility in
(i) Compression of continuous tone still images and
(ii)Access to the compressed data.
•Therefore, the portions of the JPEG 2000 compressed image can be extracted and hence for re-transmitted,
stored, displayed and edited.
JPEG 2000 Algorithm
The JPEG 2000 encoding and decoding processes are together called the JPEG 2000 algorithm. Based on the
methods used it can be,
• Reversible JPEG 2000 algorithm (or)
• Irreversible JPEG 2000 algorithm
JPEG 2000 encoding
The encoding process of the JPEG 2000 standard has the following steps
(1)Level Shifting
First, the samples of the n-bit image to be coded are DC level shifted by subtracting 2n-1. Here each color
component is shifted individually.
(2) Optional De-correlation (or) Component Transformation
If only three color components are present in the image, they are de-correlated using a reversible or
nonreversible linear combination of the components. This step is optional. It is used to improve the
compression efficiency.
(3) Tiling
‘Tiles’ are rectangular arrays of pixels which contain the same relative portion of all components. Here, the
components of the image are divided into tiles. These tile components can be extracted and reconstructed
independently, so that accessing and manipulating a limited region of the coded image is possible.
(4) Transformation
It computes 1-D discrete wavelet transform of the rows and columns of each tile component. This is performed
by a lifting-based approach which consists of six sequential “lifting’ and “scaling” operations.
For example, a lifting operation is:
Y(2n +1) = X(2n +1) + α [X(2n) + X(2n + 2)], i0-3≤2n + l < i1 + 3
Where, X - Tile component being transformed
Y - Resulting transform
i0, i1 - Position of tile component
α - Lifting parameter
The end of this process produces a wavelet transformed image in which Total number of transform coefficients
= Total number of samples in the original image.
(5)Quantization
Quantization is needed because the important visual information is present only in a few transformed
coefficients. Therefore, the number of bits representing the transform should be reduced. This process called
“coefficient quantization” is implemented to individual scales and sub bands.
A coefficient ab(u,v) of sub-band b is quantized to value qb(u,v) by,
Here, the coded coefficients are denoted as b(u,v) and the non coded coefficients are set to zero.
Now, the de-quantized transform coefficients Rqb (u,v) are obtained as:
(3)Inverse Transformation
The inverse transform of the de-quantized coefficients is now computed by row and by column using the
inverse fast Walsh transform (FWT-1). This can also be performed by lifting based operations. For example, the
inverse lifting operation of equation is
X(2n + l) = X(2n+l)-α[X(2n) + X(2n + 2)], i0≤2n + l<i
(4)Reconstruction of Tiles
As one of the final decoding steps, the tile components are assembled to reconstruct the tiles.
(5)Inverse Component Transformation
This is performed only if component transformation was done during the encoding process. Based on the
technique used in encoding, either reversible or irreversible method can be followed.
(6)DC Level Shifting
Finally, the transformed pixels are level shifted by adding 2n-1 . Thus, the reconstructed image is obtained.
Video Compression Standard - MPEG
•Video compression standards are developed by extending the transform-based still image compression
techniques
• These standards provide methods for reducing temporal or frame-to-frame redundancies.
Types:
Based on the applications, two broad categories of video compression standards are available. They are:
(1) Video Teleconferencing Standards
(2) Multimedia Standards
Video Teleconferencing Standards
The video teleconferencing standards are defined by the International Telecommunication Union (ITU) which is
the successor of CCITT.
Some of the important such standards are given below.
(1)H . 261
• This standard is developed for operations at affordable telecom bit rates.
• It supports full motion video transmission over T1 lines with delays less than 150ms. T1 lines are the
transmission lines introduced by Bell system for digital voice communications over short distances.
(2) H. 263
During the development of H.263, the target bit-rate was determined by the maximum bit rate achievable at
the general switched telephone network (GSTN), which was 28.8 Kbits/sec at that time. At these bit-rates, it
was necessary to keep the overhead information at a minimum.
• It is designed for very low bit rate video.
• The range of bit rate supported is: 10 - 30 kbit/s
(3) H . 320
• This standard is a superset of H.261 standard
• It is constructed for Integrated Services Digital Network (ISDN) bandwidths
Coding Scheme:
All the above three standards are based on a Motion Compensated, DCT - Based coding scheme.
First, a motion compensated prediction error is computed by comparing the neighboring ‘macro-blocks’ of
adjacent frames. Macro-blocks are just blocks of pixels. This prediction error is then discrete cosine
transformed in 8 x 8 blocks, quantized and coded for transmission or storage.
Multimedia Standards
Multimedia video compression standards are developed by the Motion Picture Experts Group (MPEG) of the
CCITT and ISO.
The main standards are given below:
(1)MPEG-1
• It is an “entertainment quality” coding standard
• It is developed for storage and retrieval of video on digital media.
Example: Compact Disk Read - Only Memories (CD - ROMs)
• The bit rates supported are in the order of 1.5 M bit/s
(2)MPEG-2
• This standard addresses applications involving video quality in the range between NTSC/PAL
and CCIR 601 standards [NTSC - National Television System Committee; PAL - Phase Alternate Line; CCIR -
International Radio Consultive Committee].
• It supports bit rates from 2-10 M bit/s.
•The bit rates of cable TV distribution and narrow-channel satellite broadcasting are also supported by this.
The aim of MPEG - 1 and MPEG -2 standards is to provide an efficient storage and transmission of digital audio
and video (AV) material.
(3) MPEG-4
• The range of bit rates supported by this standard are:
- 5 - 64 kbit/s for mobile and Public Switched Telephone Network (PSTN) applications.
- Upto 4 M bits/s for TV and film applications.
• It can support constant bit rate coding as well as variable bit rate coding.
MPEG-4 is still an evolving standard and is divided into a number of parts. Companies promoting MPEG-4
compatibility do not always clearly state which "part" level compatibility they are referring to.
The key parts to be aware of are MPEG-4 Part 2 (including Advanced Simple Profile, used by codecs such as
DivX, Xvid, Nero Digital and 3ivx and by QuickTime 6) and MPEG-4 part 10 (MPEG-4 AVC/H.264 or Advanced
Video Coding, used by the x264 encoder, Nero Digital AVC, QuickTime 7, and high-definition video media like
Blu-ray Disc).
Most of the features included in MPEG-4 are left to individual developers to decide whether or not to
implement. This means that there are probably no complete implementations of the entire MPEG-4 set of
standards.
• This standard provides:
(i) Improved video compression efficiency
(ii) Content - based interactivity; e.g: AV object - based access
(iii) Increased robustness in error - prone environments
(iv) Ability to add or drop AV (Audio & Video) objects
(v) Object resolution scalability
(vi) A great amount of video content which is readily available in the form of video objects.
Coding Scheme:
Similar to teleconferencing standards, multimedia standards also use motion estimation and coding techniques
for applications such as,
• Video on demand
• Digital HDTV broadcasting and
• Image/video database services.
MPEG Encoder (or) DPCM / DCT Coder
The MPEG standards are based on a DPCM/DCT coding scheme. It is a hybrid block - based coding scheme
which uses the following properties:
• Redundancies within and between adjacent video frames
• Motion uniformity between frames
• Psycho-visual properties of the human visual system.
Block Diagram:
A basic DPCM/DCT encoder for motion compensated video compression is shown in figure.
DPCM/DCT Encoder
Input:
The input to the encoder is an image block which consists of an 8x8 array of pixels
Other standard inputs are,
• Macro-block - A 2 x 2 array of image blocks i.e. a 16 x 16 array of pixels
• Slice - A row of non-overlapping macro-blocks.
Operation:
The path having the DCT quantizer and variable length coding block in figure is known as the primary input-to-
output path. The encoder performs simultaneous transformation, quantization and variable - length coding
operations on the input with the use of these blocks .
Encoded Output Frames
The input given to the encoder can be of two types. It will be either a conventional image block or the
difference between a conventional image block and its prediction based on previous or future video frames.
Therefore, based on the input, three types of encoded output frames are produced. They are:
(1)Intra-frame or Independent Frame (I - frame)
As the name states, this frame is compressed independently i.e. it does not depend on any previous or future
video frames.
- Among the three encoded output frames I - frame has high resemblance with a JPEG encoded image.
- It is used as the reference point for the generation of future P and B frames.
- I - frames provide
(i)Highest degree of random access
(ii)Ease of editing and
(iii)High resistance to the propagation of transmission error.
(2)Predictive Frame (P - frame)
P - frame is the compressed difference between the current frame and its prediction is based
on the previous I or P-frame. A P-frame (Predicted picture) holds only the changes in the image from the
previous frame. For example, in a scene where a car moves across a stationary background, only the car's
movements need to be encoded. The encoder does not need to store the unchanging background pixels in the
P-frame, thus saving space. P-frames are also known as delta-frames. The motion estimation here is done in
the macro-block level.
The motion compensated prediction is performed by the following steps
(i) Compute the correlation between pixels using the decoded block in figure.
(ii) Do variable - length coding of the computed motion vector
(iii) Transmits the result with the encoded data stream as its completing part.
(3) Bi-directional Frame (B - frame)
B - frame is the compressed difference between the current frame and its prediction based on the previous I -
or P - frame and next P - frame. A bi-directional predictive frame (B-Frame) is part of an MPEG video
compression standard.
In this method, groups of sequential pictures are aggregated to form a group of pictures (GOP), which are
displayed in sequence to provide video. A single bi-directional predictive frame relates to other frames directly
preceding or following it.
Therefore, the corresponding decoder should be able to access both the past and future reference frames.
Rate Controller:
To adjust the quantization parameters in order to match the generated bit stream and video channel capacity, a
rate controller is used. This rate controller works based on the content of the output buffer.
Decoding:
The encoder frames are reordered before transmission, so that the decoder will be able to reconstruct and
display them in the proper sequence.
5.2 Design and development of information systems, Personal Information System, Information retrieval
system
IS is a set of interrelated components that collect, manipulate, store and disseminate data and information and
provide feedback mechanism to meet an objective. There are so many ways that information systems are
changing our lives both in our personal lives and in the businesses and corporations that are around us.
Examples: Supple Chain Management, Customer Relationship Management, Enterprise Resource Planning (ERP)
Parts of IS
There are four components for all information systems:Inputs – activity of gathering and capturing raw
data.Processing Mechanisms – Converting or transforming data into useful outputs.Outputs – Production of
useful information, usually in form of documents and reports.Feedback – Output that is used to make changes
to input or processing activities.
Characteristics of IS
• Accurate
• Complete
• Relevant
• Reliable
• Secure
• Simple
Components of IS
An information system is essentially made up of five components hardware, software, database, network and
people. These five components integrate to perform input, process, output, feedback and control.
Hardware consists of input/output device, processor, operating system and media devices. Software consists of
various programs and procedures. Database consists of data organized in the required structure. Network
consists of hubs, communication media and network devices. People consist of device operators, network
administrators and system specialist.
Information processing consists of input; data process, data storage, output and control. During input stage,
data instructions are fed to the systems which during process stage are worked upon by software programs and
other queries. During output stage, data is presented in structured format and reports.
Types of IS
The planning phase is the process of preliminary investigation to understand why a new information system
should be created for the organization. The deliverable of the planning phase includes a report of the feasibility
study and the work plan for the new information system development project. Once the organization decides
to create a new information system, a full-scale project of information system development is then started.
The analysis phase is the first stage of the full-scale information system development project to investigate
what the new information system will do. In this phase, the project team fully investigates the current
information system (or the as-is system) of the organization and the specific business needs (or the system
requirements) for the new information system. The new information system that meets the system
requirements is called the to-be system.
The deliverable of the analysis phase reports on the following major system analysis results:
• The differences between the as-is system and to-be system.
• The system requirements for the to-be system.
• The strategy of system development for the design phase.
The design phase determines how the the system will be created and how it will operate in terms of hardware,
software, networking, system personnel, and operational procedures. The deliverable of the design phase are
the detailed system specifications of system infrastructure, hardware, software and networking for the
implementation phase. The design phase actually provides the solution to the system.
The implementation phase builds the new information system based on the system specifications provided by
the design phase. The methods applied to the system implementation phase vary depending on the strategies
of systems development.
By the end of the implementation phase, the new information system replaces the old information system. The
business environment changes constantly and also the newly built information system needs improvement.
The maintenance phase improves the new information system and because of the innovation of information
technology and significant changes of the business environment, the cost of system maintenance eventually
becomes unjustified at a certain point.
The next generation of information system in the organization will be inevitable. The information system
development starts a new cycle.
5.2.1 Personal Information System, Information retrieval system
Personal Information system
The Personnel Information system is a Computer based system for maintenance of the Service registers of
individuals in an organization. The details pertaining to personnel, postings, qualifications, departmental tests
passed, training attended, family details etc are stored in this system. Retrieval of information is possible based
on any individuals or on collective information grouped by certain categories namely designation, retirement,
length of service, place of working etc.
Set of activities in which people perform in order to acquire, organize, maintain, retrieve and use personal
information such as documents, web pages, email messages to accomplish assigned task. Maintains
information about employees in qualification, postings, promotions, leave and incentives.
Examples: Personal Notes, E-mail Notifications, Reminders and Alert systems
Information retrieval system
Information retrieval is the activity of obtaining information resources relevant to an information need from a
collection of information resources. Searches can be based on full-text or other content-based indexing. The
primary goal is to “Retrieve all the documents which are relevant to a user query, while retrieving as few non-
relevant documents as possible.”
Automated information retrieval systems are used to reduce what has been called information overload. An IR
systems is a software that provide access to books, journals and other documents, which stores them and
manages the document. Web search engines are the most visible IR applications.
An information retrieval process begins, when a user enters a query into the system. Queries are formal
statements of information needs, for example search strings in web search engines. In information retrieval, a
query does not uniquely identify a single object in the collection. Instead, several objects may match the query,
perhaps with different degrees of relevancy.
An object is an entity that is represented by information in a content collection or database. User queries are
matched against the database information. However, as opposed to a classical SQL queries of a database, in
information retrieval the results returned may or may not match the query, so results are typically ranked. This
ranking of results is a key difference of information retrieval searching compared to database searching. The
top ranking objects are then shown to the user. The process may then be iterated, if the user wishes to refine
the query.
Depending on the application, the data objects may be text documents, images, audio, mind maps or videos.
CASE STUDY 1
Railway reservation system
INDEX PAGE
<html>
<head>
<style>
div.container {
width: 100%;
height:100%;
}
header, footer {
padding: 1em;
color: white;
background-color: BLUE;
clear: left;
text-align: left;
}
nav {
width: 100%;
height:100%;
float: right;
max-width: 160px;
height: 134px;
}
article {
width: 100%;
height:100%;
padding: 1em;
background-color: PINK;
}
</style>
</head>
<body>
<div class="container">
<header>
<h1>ONLINE RAILWAY RESERVATION FORM
</h1>
</header>
<nav>
<h1>MENU</h1>
<ul>
<li><a href="#">ABOUT US</a></li>
<li><a href="#">CONTACT US</a></li>
<li><a href="http://localhost/rail.php">RESERVE</a></li>
<li><a href="#">FEEDBACK</a></li>
</ul>
</nav>
<article>
<h1>ARTICLE</h1>
<p>Now we will create a layout using the following: header, nav, section, article, aside, footer,
details, summary, style, also there can be an image:<img src="http://gifimage.net/wp-
content/uploads/2017/11/gif-info-9.gif" style="height: 50px;"></p>
</article>
<footer>RESERVATION WEBSITE</footer>
</div>
</body>
</html>
<html>
<style>
body
{
background-color:pink;
}
p
{
font-size:20px;
font-family:verdana;
color:#963;
}
</style>
<body>
<form method="post">
<h1>RESERVATION FORM</h1>
<p>NAME<input type="TEXT" name="fname" size="20" maxlength="99" /></p>
<p>AGE<input type="number" name="age" size="12" maxlength="99" /></p>
<p>ADDRESS<input type="TEXT" name="address" size="42" maxlength="99" /></p>
<p>EMAIL<input type="TEXT" size="30" name="email" maxlength="99" /></p>
<p>TELEPHONE<input type="number" size="10" name="tel" maxlength="99" /></p>
<p>SELECT YOUR BERTH </p>
<select name="choices" size="3">
<option>TATKAL</option>
<option>LADIES</option>
<option>GENRAL</option>
</select>
<p>SOURCE CITY</p>
<select name="source">
<option selected="selected">DELHI</option>
<option>MUMBAI</option>
<option>KOLKATA</option>
<option>CHENNAI</option>
<br/><br/>
</select>
<p>DESTINATION CITY</p>
<select name="dest">
<option selected="selected">DELHI</option>
<option>MUMBAI</option>
<option>KOLKATA</option>
<option>CHENNAI</option>
</select>
<br/><br/>
<input type="submit" value="click here to submit" />
<input type="reset" value="clear this form" />
</form>
<?php
if($_POST)
{
$name=$_POST['fname'];
$age=$_POST['age'];
$addr=$_POST['address'];
$email=$_POST['email'];
$telephone=$_POST['tel'];
$ch=$_POST['choices'];
$s=$_POST['source'];
$d=$_POST['dest'];
$servername = "localhost";
$username = "root";
$password = "";
$dbname = "test";
// Create connection
$conn = mysqli_connect($servername, $username, $password, $dbname);
// Check connection
if (!$conn) {
die("Connection failed: " . mysqli_connect_error());
}
if (mysqli_query($conn, $sql)) {
echo "New record created successfully";
} else {
echo "Error: " . $sql . "<br>" . mysqli_error($conn);
}
mysqli_close($conn);
}
?>
</body>
</html>
CASE STUDY 2
Library information system
//EnterBooks.php
<html>
<body bgcolor="pink">
<center><h2>Simple Library Management System</h2></center>
<!--Once the form is submitted, all the form data is forwarded to InsertBooks.php -->
<form action="InsertBooks.php" method="post">
<table border="2" align="center" cellpadding="5" cellspacing="5">
<tr>
<td> Enter ISBN :</td>
<td> <input type="text" name="isbn" size="48"> </td>
</tr>
<tr>
<td> Enter Title :</td>
<td> <input type="text" name="title" size="48"> </td>
</tr>
<tr>
<td> Enter Author :</td>
<td> <input type="text" name="author" size="48"> </td>
</tr>
<tr>
<td> Enter Edition :</td>
<td> <input type="text" name="edition" size="48"> </td>
</tr>
<tr>
<td> Enter Publication: </td>
<td> <input type="text" name="publication" size="48"> </td>
</tr>
<tr>
<td></td>
<td>
<input type="submit" value="submit">
<input type="reset" value="Reset">
</td>
</tr>
</table>
</form>
</body>
</html>
//InsertBooks.php
<html>
<body bgcolor="blue">
<center><h2>Simple Library Management System</h2></center>
<br>
<?php
include("DBConnection.php");
$isbn=$_POST["isbn"];
$title=$_POST["title"];
$author=$_POST["author"];
$edition=$_POST["edition"];
$publication=$_POST["publication"];
$query = "insert into book_info(isbn,title,author,edition,publication)
values('$isbn','$title','$author','$edition','$publication')"; //Insert query to add book details into the
book_info table
$result = mysqli_query($db,$query);
?>
<h3> Book information is inserted successfully </h3>
<a href="SearchBooks.php"> To search for the Book information click here </a>
</body>
</html>
//DisplayBooks.php
<html>
<body bgcolor="87ceeb">
<center><h2>Simple Library Management System</h2></center>
<br>
<?php
include("DBConnection.php");
$search = $_REQUEST["search"];
$query = "select ISBN,Title,Author,Edition,Publication from book_info where title like
'%$search%'"; //search with a book name in the table book_info
$result = mysqli_query($db,$query);
if(mysqli_num_rows($result)>0)if(mysqli_num_rows($result)>0)
{
?>
<table border="2" align="center" cellpadding="5" cellspacing="5">
<tr>
<th> ISBN </th>
<th> Title </th>
<th> Author </th>
<th> Edition </th>
<th> Publication </th>
</tr>
<?php while($row = mysqli_fetch_assoc($result))
{
?>
<tr>
<td><?php echo $row["ISBN"];?> </td>
<td><?php echo $row["Title"];?> </td>
<td><?php echo $row["Author"];?> </td>
<td><?php echo $row["Edition"];?> </td>
<td><?php echo $row["Publication"];?> </td>
</tr>
<?php
}
}
else
echo "<center>No books found in the library by the name $search </center>" ;
?>
</table>
</body>
</html>
//DBConnection.php
<?php
//Establishing connection with the database
define('DB_SERVER', 'localhost');
define('DB_USERNAME', 'root');
define('DB_PASSWORD', '');
define('DB_DATABASE', 'books'); //where books is the database name
$db = mysqli_connect(DB_SERVER,DB_USERNAME,DB_PASSWORD,DB_DATABASE);
?>