You are on page 1of 5

[ SPRING 2015 ] SCHEME OF EVALUATION

PROGRAM BSc IT
SEMESTER FIFTH
SUBJECT CODE & BT0086, MOBILE COMPUTING
NAME
CREDIT 4
BK ID B2067
MAX. MARKS 60

Answer all questions


Q. No. Question and scheme of evaluation Unit. Marks Total
Marks

1 Write short notes on: 3 5+5 10


(a) Frequency modulation (FM)
(b) Phase modulation (PM).
A (a) Amplitude Modulation (AM) 5 10
In amplitude modulation, the message or information signal
m(t) varies the amplitude of the carrier sine wave. Here,
Information signal is the modulating signal. The instantaneous
value of the amplitude of the carrier signal changes in
accordance with the amplitude and frequency variations of the
Information signal. The carrier frequency remains constant
during the modulation process, but its amplitude varies in
accordance with the modulating signal. An increase or a
decrease in the amplitude of the modulating signal causes a
corresponding increase or decrease in both the positive and
the negative peaks of the carrier amplitude.
The AM wave is the product of the carrier and modulating
signals. The circuit used for producing AM signal is called a
modulator. At the receiver side, a circuit used to recover the
original signal from an AM wave is known as a detector or
demodulator.
(b) Frequency Modulation (FM)
5
In frequency modulation, the message signal m(t), varies the
frequency of a carrier wave. The basic principle behind FM is
that the amplitude of an analog baseband signal can be
represented by a slightly different frequency of the carrier. FM
is a variation of angle modulation where the frequency of the
carrier signal is varied in response to the message signal. The
variation in frequency of the modulated wave form from the
carrier frequency is called the frequency deviation.

2 What is near and far effect problem in wireless 4 10 10


communication? Explain in brief.
A Near and far terminals in the wireless networks suffer from the 10 10
problem of near/far effect due to different level of signal power
received by them. As shown in figure 1, terminal A and B both
transmit the signal with the same transmission power. Since
the signal strength decreases proportionally to the square of
the distance, B’s signal is much stronger than A’s signal for the
terminal C. As a result, C will not receive A’s transmitted signal
as its signal power would be lesser than that of B.
Now if terminal C wants to act as a base station to coordinate
media access for sending rights for the medium access, then
terminal B would overcome the signal strength of terminal A on
the physical layer. Here terminal C would not be able to apply a
fair scheme of receiving signal from terminal B and terminal A.
This type of problem in wireless network is called near/far
effect problem.

Figure 1: Near and far terminal


For the wireless network using Code division multiplexing
scheme, the effect of near/far creates a severe problem. It is so
because receiver wants to receive the signals with more or less
the same strength. And to enable the receiver to receive the
signal strength equally, the transmitter in the farther distance
should transmit signal with more power than the one which is
nearer to the receiver.

3 Explain about the Operation Sub System (OSS) of GSM 5 10 10


system.
A Operation Sub System (OSS) 10
1
The operation subsystem (OSS) contains the necessary
functions for network operation and maintenance. The OSS
possesses network entities of its own and accesses other
entities via SS7 signaling.
OSS consists of the following entities:
 Operation and maintenance centre (OMC): The OMC 3
monitors and controls all other network entities via the O
interface. Typical OMC management functions are traffic
monitoring, status reports of network entities, subscriber
and security management, or accounting and billing.
 Authentication center (AuC): AuC protects user identity
and data transmission. The AuC contains the algorithms for 3
authentication as well as the keys for encryption and
generates the values needed for user authentication in the
HLR.
 Equipment identity register (EIR): The EIR is a database
for all IMEIs. It stores all device identifications registered for
3
this network. The EIR stores a blacklist of stolen (or locked)
devices. The EIR also contains a list of valid IMEIs (white
list), and a list of malfunctioning devices (gray list).

4 Explain Hard handover and Soft handover in UMTS. 7 5+5 10

A UMTS performs two types of handovers. They are: Hard


handover and Soft handover.
Hard handover: When the User Equipment (UE) switches 10
between different antenna and different systems then there the 5
carrier frequency used for communication also changes. When
the carrier frequency changes for communication, we say this
type of handover as hard handover. This type of handover is
only in UTRA TDD. Switching between TDD cells is performed
between the slots of different frames. Typically, all inter system
handovers are hard handovers in UMTS. This includes
handovers to and from GSM or other IMT-2000 systems.
Different frequencies are used during the handover in a
satellite system (inter-segment handover) and hence it is also a
hard handover.
To enable a UE to listen into GSM or other frequency bands,
UMTS specifies a compressed mode transmission for UTRA
FDD. During this mode a UE stops all transmission. To avoid
data loss, either the spreading factor can be lowered before
and after the break in transmission (i.e., more data can be sent
in shorter time) or less data is sent using different coding
schemes.

Soft Handover: This type of handover is available only in the 5


FDD mode. Soft handover is performed by means of macro
diversity when several radio links are active at the same time.
Normally soft handover is performed when cells operated on
the same frequency are changed. As shown in Figure 7.9, a
UE can receive signals from up to three different antennas,
which may belong to different node Bs. In this case, the RNC
splits the data stream and forwards it to the different node Bs
to transfer it to UE. The UE combines the received data again.
The UE sends its data back to all the involved node Bs for
duplex communication. The RNC then combines the data
streams received from the node Bs. This mechanism when a
UE receives data from different antennas at the same time is
called a soft handover. This makes the communication smooth
when UE moves from one cell to another.

5 List the advantages and disadvantages of Infra-red technology. 8 5+5 10

A Advantages of Infra-red technology: 10


 It’s simple. 5
 No licenses are needed for infra-red technology
 Version 1.0 of this industry standard implements data rates
of up to 115 kbit/s, while IrDA 1.1 defines higher data rates
of 1.152 and 4 Mbit/s.
 Shielding is very simple if needed.
 Infra-red technology uses diffuse light reflected at walls,
furniture etc. or directed light if a line-of-sight (LOS) exists
between the sender and receiver.
 Electrical devices do not interfere with infra-red
transmission.

Disadvantages of Infra-red technology:


 It has a low bandwidth when compared to other LAN
technologies. 5
 Infra-red is quite easily shielded and invaders can do it
intentionally.
 For good transmission quality and high data rates a Line of
Sight (LOS) is needed.
 IrDA devices are internally connected to a serial port
limiting transfer rates to 115 kbit/s which is not a high data
rate.

6 Write short notes on: 12 5+5 10


(a) HiCoMo: High Commit Mobile Transaction Model
(b) Kangaroo mobile transaction model
A (a)HiCoMo: High Commit Mobile Transaction Model
HiCoMo is a mobile transaction execution model and mainly 5
processes aggregate data stored in a data warehouse in the
mobile units. Since the data warehouse resides in mobile units,
HiCoMo transactions are always initiated on mobile units
where they are processed in a disconnected mode. As a result,
transaction commitments are quite fast. The results of these
transactions are then installed in the database upon
reconnection.
The base database resides on the fixed network. It is
manipulated by transactions called base or source
transactions. These transactions are initiated at the fixed
network. Transactions which are initiated and processed at
mobile units are called HiCoMo.
(b) Kangaroo mobile transaction model
Kangaroo mobile transaction model captures both data and the 5
movement of mobile units and is based on a split transaction
model. It enforces majority of ACID properties. In Kangaroo
transaction model each time a mobile host connects to a
different base station, communication will take place with the
previous base stations in order to transfer transaction
information to the new base station. This model captures the
movement behaviour of transactions in a multi-database
environment where mobile transactions do not originate and
end at the same site. In this model the transaction manager
splits a kangaroo transaction into a set of Joey Transactions,
which are then executed on the underlying databases. A
transaction is split when the Mobile node moves, and the first
transaction of the split gets committed immediately. Thus this
releases some of the data items improving concurrency.

You might also like