PROGRAM BSc IT SEMESTER FIFTH SUBJECT CODE & BT0086, MOBILE COMPUTING NAME CREDIT 4 BK ID B2067 MAX. MARKS 60
Answer all questions
Q. No. Question and scheme of evaluation Unit. Marks Total Marks
1 Write short notes on: 3 5+5 10
(a) Frequency modulation (FM) (b) Phase modulation (PM). A (a) Amplitude Modulation (AM) 5 10 In amplitude modulation, the message or information signal m(t) varies the amplitude of the carrier sine wave. Here, Information signal is the modulating signal. The instantaneous value of the amplitude of the carrier signal changes in accordance with the amplitude and frequency variations of the Information signal. The carrier frequency remains constant during the modulation process, but its amplitude varies in accordance with the modulating signal. An increase or a decrease in the amplitude of the modulating signal causes a corresponding increase or decrease in both the positive and the negative peaks of the carrier amplitude. The AM wave is the product of the carrier and modulating signals. The circuit used for producing AM signal is called a modulator. At the receiver side, a circuit used to recover the original signal from an AM wave is known as a detector or demodulator. (b) Frequency Modulation (FM) 5 In frequency modulation, the message signal m(t), varies the frequency of a carrier wave. The basic principle behind FM is that the amplitude of an analog baseband signal can be represented by a slightly different frequency of the carrier. FM is a variation of angle modulation where the frequency of the carrier signal is varied in response to the message signal. The variation in frequency of the modulated wave form from the carrier frequency is called the frequency deviation.
2 What is near and far effect problem in wireless 4 10 10
communication? Explain in brief. A Near and far terminals in the wireless networks suffer from the 10 10 problem of near/far effect due to different level of signal power received by them. As shown in figure 1, terminal A and B both transmit the signal with the same transmission power. Since the signal strength decreases proportionally to the square of the distance, B’s signal is much stronger than A’s signal for the terminal C. As a result, C will not receive A’s transmitted signal as its signal power would be lesser than that of B. Now if terminal C wants to act as a base station to coordinate media access for sending rights for the medium access, then terminal B would overcome the signal strength of terminal A on the physical layer. Here terminal C would not be able to apply a fair scheme of receiving signal from terminal B and terminal A. This type of problem in wireless network is called near/far effect problem.
Figure 1: Near and far terminal
For the wireless network using Code division multiplexing scheme, the effect of near/far creates a severe problem. It is so because receiver wants to receive the signals with more or less the same strength. And to enable the receiver to receive the signal strength equally, the transmitter in the farther distance should transmit signal with more power than the one which is nearer to the receiver.
3 Explain about the Operation Sub System (OSS) of GSM 5 10 10
system. A Operation Sub System (OSS) 10 1 The operation subsystem (OSS) contains the necessary functions for network operation and maintenance. The OSS possesses network entities of its own and accesses other entities via SS7 signaling. OSS consists of the following entities: Operation and maintenance centre (OMC): The OMC 3 monitors and controls all other network entities via the O interface. Typical OMC management functions are traffic monitoring, status reports of network entities, subscriber and security management, or accounting and billing. Authentication center (AuC): AuC protects user identity and data transmission. The AuC contains the algorithms for 3 authentication as well as the keys for encryption and generates the values needed for user authentication in the HLR. Equipment identity register (EIR): The EIR is a database for all IMEIs. It stores all device identifications registered for 3 this network. The EIR stores a blacklist of stolen (or locked) devices. The EIR also contains a list of valid IMEIs (white list), and a list of malfunctioning devices (gray list).
4 Explain Hard handover and Soft handover in UMTS. 7 5+5 10
A UMTS performs two types of handovers. They are: Hard
handover and Soft handover. Hard handover: When the User Equipment (UE) switches 10 between different antenna and different systems then there the 5 carrier frequency used for communication also changes. When the carrier frequency changes for communication, we say this type of handover as hard handover. This type of handover is only in UTRA TDD. Switching between TDD cells is performed between the slots of different frames. Typically, all inter system handovers are hard handovers in UMTS. This includes handovers to and from GSM or other IMT-2000 systems. Different frequencies are used during the handover in a satellite system (inter-segment handover) and hence it is also a hard handover. To enable a UE to listen into GSM or other frequency bands, UMTS specifies a compressed mode transmission for UTRA FDD. During this mode a UE stops all transmission. To avoid data loss, either the spreading factor can be lowered before and after the break in transmission (i.e., more data can be sent in shorter time) or less data is sent using different coding schemes.
Soft Handover: This type of handover is available only in the 5
FDD mode. Soft handover is performed by means of macro diversity when several radio links are active at the same time. Normally soft handover is performed when cells operated on the same frequency are changed. As shown in Figure 7.9, a UE can receive signals from up to three different antennas, which may belong to different node Bs. In this case, the RNC splits the data stream and forwards it to the different node Bs to transfer it to UE. The UE combines the received data again. The UE sends its data back to all the involved node Bs for duplex communication. The RNC then combines the data streams received from the node Bs. This mechanism when a UE receives data from different antennas at the same time is called a soft handover. This makes the communication smooth when UE moves from one cell to another.
5 List the advantages and disadvantages of Infra-red technology. 8 5+5 10
A Advantages of Infra-red technology: 10
It’s simple. 5 No licenses are needed for infra-red technology Version 1.0 of this industry standard implements data rates of up to 115 kbit/s, while IrDA 1.1 defines higher data rates of 1.152 and 4 Mbit/s. Shielding is very simple if needed. Infra-red technology uses diffuse light reflected at walls, furniture etc. or directed light if a line-of-sight (LOS) exists between the sender and receiver. Electrical devices do not interfere with infra-red transmission.
Disadvantages of Infra-red technology:
It has a low bandwidth when compared to other LAN technologies. 5 Infra-red is quite easily shielded and invaders can do it intentionally. For good transmission quality and high data rates a Line of Sight (LOS) is needed. IrDA devices are internally connected to a serial port limiting transfer rates to 115 kbit/s which is not a high data rate.
6 Write short notes on: 12 5+5 10
(a) HiCoMo: High Commit Mobile Transaction Model (b) Kangaroo mobile transaction model A (a)HiCoMo: High Commit Mobile Transaction Model HiCoMo is a mobile transaction execution model and mainly 5 processes aggregate data stored in a data warehouse in the mobile units. Since the data warehouse resides in mobile units, HiCoMo transactions are always initiated on mobile units where they are processed in a disconnected mode. As a result, transaction commitments are quite fast. The results of these transactions are then installed in the database upon reconnection. The base database resides on the fixed network. It is manipulated by transactions called base or source transactions. These transactions are initiated at the fixed network. Transactions which are initiated and processed at mobile units are called HiCoMo. (b) Kangaroo mobile transaction model Kangaroo mobile transaction model captures both data and the 5 movement of mobile units and is based on a split transaction model. It enforces majority of ACID properties. In Kangaroo transaction model each time a mobile host connects to a different base station, communication will take place with the previous base stations in order to transfer transaction information to the new base station. This model captures the movement behaviour of transactions in a multi-database environment where mobile transactions do not originate and end at the same site. In this model the transaction manager splits a kangaroo transaction into a set of Joey Transactions, which are then executed on the underlying databases. A transaction is split when the Mobile node moves, and the first transaction of the split gets committed immediately. Thus this releases some of the data items improving concurrency.