Professional Documents
Culture Documents
In this method, the station that has frames to send, only that station senses
for the channel. In case of an idle channel, it will send frame immediately to
that channel. In case when the channel is found busy, it will wait for the
random time and again sense for the state of the station whether idle or
busy. In this method, the station does not immediately sense for the
channel for only the purpose of capturing it when it detects the end of the
previous transmission. The main advantage of using this method is that it
reduces the chances of collision. The problem with this is that it reduces
the efficiency of the network.
This is the method that is used when channel has time-slots and that
time-slot duration is equal to or greater than the maximum propagation
delay time. When the station is ready to send the frames, it will sense the
channel. If the channel found to be busy, the channel will wait for the next
slot. If the channel found to be idle, it transmits the frame with probability p,
thus for the left probability i.e. q which is equal to 1-p the station will wait
for the beginning of the next time slot. In case, when the next slot is also
found idle it will transmit or wait again with the probabilities p and q. This
process is repeated until either the frame gets transmitted or another
station has started transmitting.
There are two types of handover. Soft handover and hard handover.
Hard handover: hard handover is one in which the channel source cell is
released before the channel in the target is engaged. In this type of
handover, the connection to the source is broken just before or along with
when the connection to the target is made. It is also called break before
making handover.
Soft handover: soft handover is one in which the source cell is retained
and works in parallel with the target cell for a while. In this case,
connection to the target cell is established before connection to the source
is broken. Soft handover allows a parallel connection between several
channels to provide better service. It is very effective in areas with poor
coverage.
1. Teleservices
The abilities of a Bearer Service are used by a Teleservice to transport data.
These services are further transited in the following ways −
2. Voice Calls
The most basic Teleservice supported by GSM is telephony. This includes
full-rate speech at 13 kbps and emergency calls, where the nearest
emergency-service provider is notified by dialing three digits.
3. Videotext and Facsimile
Another group of teleservices includes Videotext access, Teletext transmission,
Facsimile alternate speech and Facsimile Group 3, Automatic Facsimile Group,
3 etc.
5. Bearer Services
Data services or Bearer Services are used through a GSM phone. to receive
and send data is the essential building block leading to widespread mobile
Internet access and mobile data transfer. GSM currently has a data transfer rate
of 9.6k. New developments that will push up data transfer rates for GSM users
are HSCSD (high speed circuit switched data) and GPRS (general packet radio
service) are now available.
This GSM burst is used for the standard communications between the
base station and the mobile, and typically transfers the digitized voice data.
The MAC layer functions as an adaptation layer between the physical layer
and the upper protocol layers. Its main task is to receive MAC service data
units (MSDUs) from the layer above, encapsulate them into MAC protocol
data units (MPDUs) and pass them down to the physical layer for
transmission.
10. WHAT IS MEANT BY GEO? WHAT ARE THE ADVANTAGES OF GEO? WHAT
ARE THE REGISTERS MAINTAINED BY THE GATEWAY OF SATELLITE?
Geolocation commonly uses Global Positioning System (GPS) and other related
technologies to assess and specify geographical locations.
The primary goal of the standard was the specification of a simple, robust,
WLAN which offers time-bounded and asynchronous services. Also, it
should be able to operate with multiple physical layers.
14. WHAT ARE THE ADVANTAGES OF WIRELESS LAN? WHAT ARE THE
DESIGN GOALS OF WIRELESS LAN?
Mobile Routing :
Mobile IP :
address
The GSM system always knows where a user is currently located, and the
same phone number is valid worldwide. To have this ability the GSM
system performs periodic location updates, even if the user does not use
the MS, provided that the MS is still logged on to the GSM network and is
not completely switched off. The HLR contains information about the
current location, and the VLR that is currently responsible for the MS
informs the HLR about the location of the MS when it changes. Changing
VLRs with uninterrupted availability of all services is also called roaming.
Roaming can take place within the context of one GSM service provider or
between two providers in one country, however this does not normally
happen but also between different service providers in different countries,
known as international roaming.
To locate an MS and to address the MS, several numbers are needed:
MSISDN (Mobile Station International ISDN Number)16. The only
important number for the user of GSM is the phone number, due to the fact
that the phone number is only associated with the SIM, rather than a
certain MS. The MSISDN follows the E.164, this standard is also used in
fixed ISDN networks.
IMSI (International Mobile Subscriber Identity). GSM uses the IMSI for
internal unique identification of a subscriber.
TMSI (Temporary Mobile Subscriber Identity). To disguise the IMSI that
would give the exact identity of the user which is signaling over the radio
air interface, GSM uses the 4 byte TMSI for local subscriber identification.
The TMSI is selected by the VLR and only has temporary validity within the
location area of the VLR. In addition to that the VLR will change the TMSI
periodically.
MSRN (Mobile Station [Subscriber] Roaming Number)17. This is another
temporary address that disguises the identity and location of the
subscriber. The VLR generates this address upon request from the MSC
and the address is also stored in the HLR. The MSRN is comprised of the
current VCC (Visitor Country Code), the VNDC (Visitor National
Destination Code) and the identification of the current MSC together with
the subscriber number, hence the MSRN is essential to help the HLR to
find a subscriber for an incoming call.
Data management technology that can support easy data access from and to
mobile devices is among the main concerns in mobile information systems.
Mobile computing may be considered a variation of distributed computing. The
two scenarios in which mobile databases is distributed are: Among the wired
components, the entire database is distributed, possibly with full or partial
replication. A base station or fixed host manages its own database with a DBMS
like functionality, with additional functionality for locating mobile units and
additional query and transaction management features to meet the requirements
of mobile environments.
Among the wired and wireless components, the database is distributed. Among
the base stations or fixed hosts and mobile units, the data management
responsibility is shared.
Here are some of the issues which arises in data management of the mobile
databases:
1. Mobile database design –
Because of the frequent shutdown and for handling the queries, the global name
resolution problem is compounded.
2. Security –
The data which is left at the fixed location is more secure as compared to mobile
data. That is mobile data is less secure. Data are also becoming more volatile
and techniques must be able to compensate for its loss. The most important
thing needed in this environment is the authorizing access to critical data and
proper techniques.
3. Data distribution and replication –
Uneven distribution of data among the mobile units and the base stations take
place here. Higher data availability and low cost of remote access is there in data
distribution and replication. The problem of Cache management is compounded
by the consistency constraints. The most updated data and frequently accessed
data is provided by the Caches to the mobile units. It process their own
transactions. There is most efficient access of data and higher security is
available.
4. Replication issues –
There is increase of costs for updates and signaling due to increase in number of
replicas. Mobile hosts can move anywhere and anytime.
5. Division of labor –
There is a certain change in the division of labor in query processing because of
certain characteristics of the mobile environment. There are some of the cases in
which the client must function independently of the server.
6. Transaction models –
In mobile environment, the issues of correctness of transactions and fault
tolerance are aggravated. All transactions must satisfy the ACID properties,
these are atomic, consistency, isolation, and durability.
Depending upon the movement of the mobile unit, possibly on multiple data sets
and through several base station, a mobile transaction is executed sequentially.
When the mobile computers are disconnected, ACID properties gets hard to
enforce. Because of the disconnection in mobile units, there is expectation that a
mobile transaction will be lived long.
7. Recovery and fault tolerance –
Fault tolerance is the ability of a system to perform its function correctly even in
the presence of internal faults. Faults can be classified in two types: transient and
permanent. Without any apparent intervention, a transient fault will be eventually
disappeared but a permanent fault will remain unless it is removed by some
external agency.
The mobile database environment must deal with site, transaction, media, and
communication failures. Due to limited battery power there is a site failure at MU.
If a voluntary shutdown occurs in MU, then it should not be treated as a failure.
Whenever Mu crosses the cells, most frequently there will be a transaction
failures during handoff. Due to failure of MU, there is a big cause of network
partitioning and affection of the routing algorithms. The characterization of mobile
computing is done by:
● Limiting resource availability
● Frequent disconnection
● High mobility
● Low bandwidth
Updation of the location dependent queries and then applying spatial queries to
refresh the cache causes a problem.
9. Query processing –
Because of the mobility and rapid resource changes of mobile units, Query
optimization becomes the most complicated. That is query processing is affected
when mobility is considered. There is a need to returned a query response to
mobile units that may be in transit.The cost that affects the most in centralized
environments is the input/output.
Communication cost is the most important in distributed environments. It is
possible to formulate location dependent queries. There is difficulty in estimating
the communication costs in distributed environments because the mobile host
may be situated in different locations. There is a requirement of dynamic
optimization strategies in the mobile distributed context.
Coda is a distributed file system with its origin in AFS2. It has many
features that are very desirable for network filesystems. Currently, Coda
has several features not found elsewhere. disconnected operation for
mobile computing. is freely available under a liberal license.
23. DEFINE VENUS PROCESS. WHAT ARE THE DIFFERENT STATES THAT A
VENUS PROCESS CAN BE IN.
Mobile Agent is an autonomous program that is capable of moving from host to host in
a network and interact with resources and other agents. In this process, the chance of
data loss is scarce because the state of the running program is saved and then
transported to the new host. It allows the program to continue execution from where it
left off before migration. The most significant advantage of mobile agents is the
possibility of moving complex processing functions to the location where you have
enormous amounts of data and that have to be processed.