You are on page 1of 34

Index

Sr. Topic Introduction mobile computing environment and to study the mobile computing environment To study the various modern wireless communication technologies available To Study The Different Types Of Technologies, Type Of Services, Commercial Names Of Service Providers nd !"uipment #anufacturers Of #obile Services$ to study how a call flow se"uence ta%es place in a mobile phone To study the mobile database system in wireless networ%s To study cache management in mobile networ%$ To study the components of cell phone$ Remarks

To &S# architecture in cellular system

EXPERIMENT N!. 1 AIM: Introduction mobile computing environment and to study the mobile computing environment INTR!"#$TI!N #obile Computing: A technology that allows transmission of data, via a computer, without having to be connected to a fixed physical link. Mobile voice communication is widely established throughout the world and has had a very rapid increase in the number of subscribers to the various cellular networks over the last few years. An extension of this technology is the ability to send and receive data across these cellular networks. This is the principle of mobile computing. Mobile data communication has become a very important and rapidly evolving technology as it allows users to transmit data from remote locations to other remote or fixed locations. This proves to be the solution to the biggest problem of business people on the move - mobility. EXISTIN% $E&&#&'R NET(!R) 'R$*ITE$T#RE Mobile telephony took off with the introduction of cellular technology, which allowed the efficient utili ation of fre!uencies enabling the connection of a large number of users. A cellular network consists of mobile units linked together to switching e!uipment, which interconnect the different parts of the network and allow access to the fixed "ublic #witched Telephone $etwork %"#T$&. The technology is hidden from view' it(s incorporated in a number of transceivers called )ase #tations %)#&. *very )# is located at a strategically selected place and covers a given area or cell - hence the name cellular communications. A number of ad+acent cells grouped together form an area and the corresponding )#s communicate through a so-called Mobile #witching ,entre %M#,&. The M#, is the heart of a cellular radio system. -t is responsible for routing, or switching, calls from the originator to the destinator. -t can be thought of as managing the cell, being responsible for set-up, routing control and termination of the call, for management of inter-M#, hand over and supplementary services, and for collecting charging and accounting information. The M#, may be connected to other M#,s on the same network or to the "#T$.

"#T$

;ther M#,s

M#, M#,

M#,

;ther M#,s

)ase station

'ig$ #obile Switching Centre

The fre!uencies used vary according to the cellular network technology implemented. .or /#M, 012 - 134 M5 range is used for transmission and 164 -172 M5 for reception. The 8,# technology uses fre!uencies in the 3022M5 range while ",# in the 3122M5 range. *ach cell has a number of channels associated with it. These are assigned to subscribers on demand. 9hen a Mobile #tation %M#& becomes (active( it registers with the nearest )#. The corresponding M#, stores the information about that M# and its position. This information is used to direct incoming calls to the M#. -f during a call the M# moves to an ad+acent cell then a change of fre!uency will necessarily occur - since ad+acent cells never use the same channels. This procedure is called hand over and is the key to Mobile communications. As the M# is approaching the edge of a cell, the )# monitors the decrease in signal power. The strength of the signal is compared with ad+acent cells and the call is handed over to the cell with the strongest signal. 8uring the switch, the line is lost for about :22ms. 9hen the M# is going from one area to another it registers itself to the new M#,. -ts location information is updated, thus allowing M#s to be used outside their (home( areas.

"a+a comm,nica+ion8ata ,ommunications is the exchange of data using existing communication networks. The term data covers a wide range of applications including .ile Transfer %.T&, interconnection between 9ide-Area-$etworks %9A$&, facsimile %fax&, electronic mail, access to the internet and the 9orld 9ide 9eb %999&.

'ig$ Data communication overview

M!.I&IT/ EN0IR!NMENT 'R$*ITE$T#RE To overcome restrictions in mobile computing the above architecture was designed' the architecture consists of the following parts: The network environment consists of mobile hosts fixed hosts and certain access points. The fixed hosts are all connected to a backbone %i.e. the -nternet&. Mobile hosts usually do not contact them directly, but use physically closer located hosts as access points to the backbone for means of minimi ing the distance that has to be bridged by a mobile connection line. -n addition to the users carrying a portable computer with them, also mobile users traveling between fixed hosts are considered in our system.

'ig$ #obility environment

To distinguish from conventional client-server and network tunneling systems we chose the notions frontend for a mobile host, backend for a fixed host that is servicing mobile nodes and relay for an access point to the backbone. The system can be modeled using the familiar client-server notion when full connectivity is guaranteed. 5owever, when dealing with weak and sometimes fully broken lines, traditional client-server terms are not sufficient any more to model the system. *.g. in the case of full disconnection the frontend will simulate the connection to the server using cached data. #imilarly, a relay in our system provides more functionality than a convenient gateway does. -t offers important services for mobile hosts, especially an elaborate authentication and authori ation service which is of special importance for a secure mobile system. 'PP&I$'TI!NS !1 M!.I&E $!MP#TIN%9e identify categories of applications a mobile user is most likely to execute on his mobile device. 8ue to the existing limitations of portable devices %limited computational power, disk space, screen si e, etc.&, we claim that portable devices should not be considered general-purpose computers. .or example, we do not expect a user to run complex simulations or compile and link huge software systems on these devices. *ven though portable devices will become increasingly powerful, they will never match the computational power and facilities available on typical desktop machines. #imilarly, while the wireless technology will improve, providing more and more bandwidth to the end user, wired network technology will advance as well, with the result that wireless networks will remain, in the near to medium future, orders of magnitudes slower. Therefore, mobile computing will always be characteri ed by a scarcity of resources, relatively speaking. -n our opinion, an end-user will

execute applications in one of the following five categories in such an environment: #tandalone applications such as games or utilities' "ersonal productivity software %word processors, presentation software, calendars&' -nternet applications such as e-mail, 999 browsers, multi-user calendars, or telnet' $ew <location-aware< applications: tour planners, interactive guides' Ad-hoc network and groupware applications.

EXPERIMENT N!. 2 AIM: - To study the technologies available INT!"#$TI!N 9ireless communications is one of the most active areas of technology development of our time. This development is being driven primarily by the transformation of what has been largely a medium for supporting voice telephony into a medium for supporting other services, such as the transmission of video, images, text, and data. 9ireless communications today covers a very wide array of applications. The cellular telephony is very important driver of wireless technology development, and in recent years the push to develop new mobile data services, which go collectively under the name third(generation %6/& cellular, has played a key role in motivating research in new signal processing techni!ues for wireless. 5owever, cellular telephony is only one of a very wide array of wireless technologies that are being developed very rapidly at the present time. .ollowing are the five modern wireless communication technologies: 9i-.i, )luetooth, =.-8, 9>A$, 9MA$ 1. (i21i- (ire3ess 1ide3i+4 (i1i is the wireless way to handle networking. -t is also known as 852.11 ne+6orkin7 and 6ire3ess ne+6orkin7. The big advantage of 9i.i is its simplicity. ?ou can connect computers anywhere in your home or office without the need for wires. The computers connect to the network using radio signals, and computers can be up to 322 feet or so apart. 9i-.i networks use radio technologies called -***02@.33b, 02@.33a or 02@.33g to provide wireless connectivity in local area networks. A 9i-.i network can be used to connect computers to each other, to the -nternet, and to wire networks using -*** 02@.6 or *thernet. 9i-.i gets to connect to the -nternet in the office, airport, hotel, businesscenter, congress-hall, trade center, cafe, restaurant and other public places. )ased on this technology any employee or visitor gets mobile -nternet access without losing freedom of movement across the hotspot. A hotspot is a connection point for a 9i.i network. A small box is hardwired into the -nternet. The box contains an 02@.33 radio that can simultaneously talk to up to 322 or so 02@.33 cards. There are many 9i.i hotspots now available in public places like restaurants, hotels, libraries and airports. various modern wireless communication

'ig$ )ireless fidelity

T8e *o+ Spo+ The Access "oints are installed in the building in order to provide a highspeed 9i-.i technology based -nternet access. The 3-"oint coverage one <5ot-#pot< can achieve @22 m. in a radius, which in most cases is sufficient to evenly reach all parts of a building. 5owever, it should also be noted, that the feasible areas might vary depending on the number and nature of the obstacles %walls, metallic structures&. All Access "oints in the building are combined into a central router, which is connected to the -nternet.

2.

.3,e2+oo+8

)luetooth is an industrial specification for wireless personal area networks %"A$s&. )luetooth provides a way to connect and exchange information 8

between devices such as mobile phones, laptops, ",s, printers, digital cameras and video game consoles over a secure, globally unlicensed shortrange radio fre!uency. The )luetooth specifications are developed and licensed by the )luetooth #pecial -nterest /roup. A short-range radio technology aimed at simplifying communications among -nternet devices and between devices and the -nternet. -t also aims to simplify data synchroni ation between -nternet devices and other computers.

'ig* Typical +luetooth mobile phone ,ands(free

)luetooth is a radio standard and communications protocol primarily designed for low power consumption, with a short range %power-class-dependent: 3 meter, 32 meters, 322 meters& based on low-cost transceiver microchips in each device. )luetooth lets these devices communicate with each other when they are in range. The devices use a radio communications system, so they do not have to be in line of sight of each other, and can even be in other rooms, so long as the received transmission is powerful enough. -n order to use )luetooth, a device must be compatible with certain )luetooth profiles. These define the possible applications and uses. )riefly, )luetooth technology, uses radio waves in @.: /5 band - therefore, no line of sight is re!uired supports multipoint, not +ust point to point works in a small confined area - 32 to 34 meters apart is able to support speeds of 3-@ Mbps today but will offer higher speeds in future has significant industry support with over 3022 members in the industry consortium

&is+ o9 app3ica+ions

9ireless control of and communication between a cell phone and a hands-free headset or car kit. This was one of the earliest applications to become popular. 9ireless networking between ",s in a confined space and where little bandwidth is re!uired. 9ireless communications with ", input and output devices, the most common being the mouse, keyboard and printer. Transfer of files between devices with ;)*A. Transfer of contact details, calendar appointments, and reminders between devices with ;)*A. =eplacement of traditional wired serial communications in test e!uipment, /"# receivers, and medical e!uipment and traffic control devices. .or controls where infrared was traditionally used. #ending small advertisements from )luetooth enabled advertising hoardings to other, discoverable, )luetooth devices. 9ireless control of a games consoleB$intendo 9ii and #ony "lay#tation 6 both use )luetooth technology for their wireless controllers. R1I"- Radio 1re:,enc4 Iden+i9ica+ion

3.

#hort for radio fre!uency identification, a technology similar in theory to bar code identification. 9ith =.-8, the electromagnetic or electrostatic coupling in the =. portion of the electromagnetic spectrum is used to transmit signals. An =.-8 system consists of an antenna and a transceiver, which read the radio fre!uency and transfer the information to a processing device, and a transponder, or tag, which is an integrated circuit containing the =. circuitry and information to be transmitted. =.-8 systems can be used +ust about anywhere, from clothing tags to missiles to pet tags to food -- anywhere that a uni!ue identification system is needed. The tag can carry information as simple as a pet owners name and address or the cleaning instruction on a sweater to as complex as instructions on how to assemble a car. #ome auto manufacturers use =.-8 systems to move cars through an assembly line. At each successive stage of production, the =.-8 tag tells the computers what the next step of automated assembly is. ;ne of the key differences between =.-8 and bar code technology is =.-8 eliminates the need for line-of-sight reading that bar coding depends on. Also, =.-8 scanning can be done at greater distances than bar code scanning. 5igh fre!uency =.-8 systems %042 M5 to 142 M5 and @.: /5 to @.4 /5 & offer transmission ranges of more than 12 feet, although wavelengths in the @.: /5 range are absorbed by water %the human body& and therefore has limitations. =.-8 is also called dedicated short range communication %8#=,&. 10

4.

(&'N- (ire3ess &'N

9ireless >A$ is simply trying to imitate the structure of the wired >A$s, using another medium to transfer data rather than cables. This medium is electromagnetic waves, which are mainly either radio fre!uency %=.& or infrared fre!uency %-=&. 9ireless >A$s consist mainly of two entities: clients or end-user devices and Access "oints %A"&. ,lients( are e!uipped with devices that allow the user to use the =. medium to communicate with other wireless devices. A" functions like a regular switch or router in wired network for the wireless devices. Moreover, it represents a gateway between the wireless devices and a wired network.

'ig$ )ireless - N

The basic structure of a 9ireless >A$ is called )## %)asic #ervice #et&, in which the network consists of an A" and several wireless devices. 9hen these devices try to communicate among themselves they propagate their data through the A" device. -n order to form the network, A" keeps broadcasting its ##-8 %#ervice #et -dentifier& to allow others to +oin the network.

'ig$ )- N* +SS Structure

5.

(M'N - (ire3ess M'N

The idea behind using 9MA$ is to offer a broadband -nternet service using wireless infrastructure. The idea is very similar to a TC broadcast network %shown in .ig.32&. The theoretical speed of 9MA$ is D4Mbps extended to 11

several miles, which offer a replacement to cable and 8#> connections in the future. 9MA$ is also called )9A %)roadband 9ireless Access& as a formal title along with the industry icon acronym 9iMAA. The main target of implementing 9iMAA technology is to provide a convenient solution to the <last mile access<, where the fast data backbone traffic is to be distributed among consumers. This also helps expand the -nternet covered areas especially in rural areas.

'ig$ )ireless # N

9iMAA %9orldwide -nteroperability for Microwave Access& is a wireless industry coalition whose members organi ed to advance -*** 02@.37 standards for broadband wireless access %)9A& networks. 9iMAA 02@.37 technology is expected to enable multimedia applications with wireless connections. 9iMax also has a range of up to 62 miles, presenting provider networks with a viable wireless last mile solution.

12

EXPERIMENT2 3 AIM: To Study The Different Types Of Technologies Type Of Services !ommercial "ames Of Service #roviders And $%uipment Manufacturers Of Mobile Services& The first radiotelephone service was introduced in the E# at the end of the 31:2s, and was meant to connect mobile users in cars to the public fixed network. -n the 3172s, a new system launched by )ell #ystems, called -mproved Mobile Telephone #ervice< %-MT#&, brought many improvements like direct dialing and higher bandwidth. The first analog cellular systems were based on -MT# and developed in the late 3172s and early 31D2s. The systems were <cellular< because coverage areas were split into smaller areas or <cells<, each of which is served by a low power transmitter and receiver. 1irs+ 7enera+ion-2 3/ analog system for mobile communications saw two key improvements during the 31D2s: the invention of the microprocessor and the digiti ation of the control link between the mobile phone and the cell site. AM"# %Advance mobile phone system& was first launched by E# which is 3/ mobile system. -t is best on .8MA technology which allows users to make voice calls within one country. Second 7enera+ion-2 @/ digital cellular systems were first developed at the end of the 3102s. These systems digiti ed not only the control link but also the voice signal. The new system provided better !uality and higher capacity at lower cost to consumers. /#M %/lobal system for mobile communication& was the first commercially operated digital cellular system which is based on T8MA. T8ird 7enera+ion-2 6/ systems promise faster communications services, including voice, fax and -nternet, anytime and anywhere with seamless global roaming. -TEFs -MT@222 global standard for 6/ has opened the way to enabling innovative applications and services %e.g. multimedia entertainment, infotainment and location-based services, among others&. The first 6/ network was deployed in Gapan in @223. @.4/ networks, such as /"=# %/lobal "acket =adio #ervice& are already available in some parts of *urope. 6/ technology supports 3:: Hbps bandwidth, with high speed movement %e.g. vehicles&, 60: Hbps %e.g. on campus& I @ Mbps for stationary %e.g.inbuilding & 1o,r+8 7enera+ion-2 At present the download speed for mode data is limited to 1.7 kbitJsec which is about 7 times slower than an -#8$ %-ntegrated services digital network& fixed line connection. =ecently, with 42:i handsets the download data rate was increased 6-fold to @0.0kbps. 5owever, in actual use the data rates are usually slower, especially in crowded areas, or when the network is <congested<. .or third generation mobile %6/, .;MA& data rates are 60: kbps %download& maximum, typically around @22kbps, and 7:kbps upload since 13

spring @223. .ourth generation %:/& mobile communications will have higher data transmission rates than 6/. :/ mobile data transmission rates are planned to be up to @2 megabits per second. )efore understanding :/, we must know what is 6/K 6/ initiative came from device manufactures, not from operators. -n 3117 the development was initiated by $ippon Telephone I Telegraph %$TT& and *ricsson' in 311D the Telecommunications -ndustry Association %T-A& in the E#A chose ,8MA as a technology for 6/' in 3110 the *uropean Telecommunications #tandards -nstitute %*T#-& did the same thing' and finally, in 3110 wideband ,8MA %9,8MA& and cdma@222 were adopted for the Eniversal Mobile Telecommunications #ystem %EMT#&. 9-,8MA and ,8MA @222 are two ma+or proposals for 6/. -n this ,8MA the information bearing signal is multiplied with another faster ate, wider bandwidth digital signal that may carry a uni!ue orthogonal code. 9-,8MA uses dedicated time division multiplexing %T8M& whereby channel estimation information is collected from another signal stream. ,8MA @222 uses common code division multiplexing %,8M& whereby channel estimation information can be collected with the signal stream. Access Technologies %.8MA, T8MA, ,8MA& .8MA: .re!uency 8ivision Multiple Access %.8MA& is the most common analog system. -t is a techni!ue whereby spectrum is divided up into fre!uencies and then assigned to users. 9ith .8MA, only one subscriber at any given time is assigned to a channel. The channel therefore is closed to other conversations until the initial call is finished, or until it is handed-off to a different channel. A <full-duplex< .8MA transmission re!uires two channels, one for transmitting and the other for receiving. .8MA has been used for first generation analog systems. T"M': Time 8ivision Multiple Access %T8MA& improves spectrum capacity by splitting each fre!uency into time slots. T8MA allows each user to access the entire radio fre!uency channel for the short period of a call. ;ther users share this same fre!uency channel at different time slots. The base station continually switches from user to user on the channel. T8MA is the dominant technology for the second generation mobile cellular networks. $"M': ,ode 8ivision Multiple Access is based on <spread< spectrum technology. #ince it is suitable for encrypted transmissions, it has long been used for military purposes. ,8MA increases spectrum capacity by allowing all users to occupy all channels at the same time. Transmissions are spread over the whole radio band, and each voice or data call are assigned a uni!ue code to differentiate from the other calls carried over the same spectrum. ,8MA allows for a Lsoft hand(offM, which means that terminals can communicate with several base stations at the same time. .e4ond 3%

14

-n the field of mobile communication services, the :/ mobile services are the advanced version of the 6/ mobile communication services. The :/ mobile communication services are expected to provide broadband, large capacity, high speed data transmission, providing users with high !uality color video images, 68 graphic animation games, audio services in 4.3 channels. 9e have been researching the vision of :/ mobile communication systems, services, and architectures. 9e also have been developing the terminal protocol technology for high capacity, high speed packet services, public software platform technology that enables downloading application programs, multimode radio access platform technology, and high !uality media coding technology over mobile networks. Reasons To *a;e 4% 2 3.#upport interactive multimedia services: teleconferencing, wireless -nternet, etc. @.9ider bandwidths, higher bit rates. 6./lobal mobility and service portability. :.>ow cost. 4.#calability of mobile networks. M!.I&E P*!NE !PER'T!RSRank 3 @ 6 : 4 7 D 0 1 32 33 !pera+or Airtel =-M )#$> 5utch O8*A TATA M;)->* Aircel )"> M;)->* .ascel #pice MT$> Tec8no3o74 /#M, *8/* /#M, ,8MA /#M /#M, *8/* /#M /#M, ,8MA /#M /#M, /"=# /#M /#M /#M !6ners8ip )harti Tele-Centures, #ingapore Telecommunications %62.0:N& and Codafone %32N& =eliance ,ommunications >imited #tate-owned 5utchison 9hampoa I *ssar /roup Aditya )irla /roup Tata /roup Maxis Telecom *ssar /roup 5utchison 9hampoa I *ssar /roup, 5.,> and Hotak Mahindra #picecorp and 8-#TA,;M #tate-owned

$e33 P8one Man,9ac+,rers-

Apple -nc. +oined the cellular phone world in @22D with the introduction of the i"hone.

15

;n ;ctober 3st @224, )enP ,orporation ac!uired #iemens( mobile phone business and created )enP Mobile.

=esearch -n Motion %=-M& is a world leader in the mobile communications market and has a history of developing breakthrough wireless solutions.

*ricsson in one of the largest supplier of mobile systems in the world and support all ma+or standards for wireless communication.

The cell phone manufacturer i-mate prides themselves on continuing to develop high-end wireless integrated pocket ",s and #martphones.

5ead!uartered in #an 8iego, ,alifornia, >/ is the $orth American wireless division of >/*, a business unit of >/ *lectronics %>/*&

Motorola is a global leader in wireless, automotive communications. Motorola(s -ntelligence *verywhere.

and

broadband

The roots of $okia go back to the year 3074 with the establishment of a forest industry enterprise in #outh-9estern .inland by mining engineer.

;@ is a EH mobile telephony company. -t was formerly )ritish 9ireless and then the )T /roup(s mobile telephony division.

"anasonic, a creator of numerous electronic devices including wireless handsets, have a corporate attitude that puts the consumer first.

#agem ,ommunication is a subsidiary of the #A.=A$ /roup. #agem brand name can be found on numerous devices which include mobile phones, modules

16

-n 3117, #amsung *lectronics( Telecommunication $etwork 8ivision became the first in the world to utili e commerciali ed ,8MA services.

#iemens supplies mobile infrastructure for 302 customers in more than 12 countries, making them one of the top three providers worldwide.

#ony *ricsson Mobile ,ommunications offers mobile multimedia consumer products for people who appreciate the possibilities of powerful technology.

17

EXPERIMENT N!. 4 AIM: - to study how a call flow se%uence ta'es place in a mobile phone 'ccessin7 a %SM ne+6ork -n order to gain access to /#M services, a user needs three things: A subscription with a mobile phone operator. This is usually either a "ay As ?ou /o arrangement, where all /#M services are paid for in advance, or a "ay Monthly option where a bill is issued each month for line rental, normally paid for a month in advance, and for services used in the previous month. A mobile phone which is /#M compliant and operates at the same fre!uency as the operator. A #-M card which is issued by the operator once the subscription is granted. The card comes pre-programmed with the subscriber(s phone <identity< and will be used to store personal.

After subscribers sign up, information about their phone(s identity and what services they are allowed to access are stored in a <#-M record< in the 5ome >ocation =egister %5>=&. The 5ome >ocation =egister is a database maintained by the <home< phone company for all of its subscribers. -t is used to answer !ueries like, <9here on the mobile phone network is the device associated with this phone numberK< and <9hat services is this subscriber paying forKM ;nce the #-M card is loaded into the phone and it is powered on, it will search for the nearest mobile phone mast, also called a )ase Transceiver #tation or )T#. -f a mast can be successfully contacted, then there is said to be coverage in the area. As the #-M card is loaded into the phone and it is powered on, it will search for the nearest mobile phone mast, also called a )ase Transceiver #tation or )T#. -f a mast can be successfully contacted, then there is said to be coverage in the =egister. The Cisitors >= will tell the 5ome >= where the phone is connected to the network %which C>=&, and will ask it for a copy of the #-M record %which includes, for example, what services the phone is allowed to access&. The current cellular location of the phone %i.e. which )T# it is at& is entered into the C>= record and will be used during a process called paging when the /#M network wishes to locate the mobile phone.

*o6 o,+7oin7 ca33s are made 9rom a mo<i3e

18

;nce a mobile phone has successfully attached to a /#M network as described above, calls may be made from the phone to any other phone on the global "ublic #witched Telephone $etwork assuming the subscriber has an arrangement with their <home< phone company to allow the call. The user dials the telephone number, presses the send or talk key, and the mobile phone sends a call setup re!uest message to the mobile phone network via the mobile phone mast %)T#& it is in contact with. The element in the mobile phone network that handles the call re!uest is the Cisited Mobile #witching ,enter %Cisited M#,&. The M#, will check against the subscriber(s temporary record held in the Cisitor >ocation =egister to see if the outgoing call is allowed. -f so, the M#, then routes the call in the same way that a telephone exchange does in a fixed network. -f the subscriber is on a "ay As ?ou /o tariff, then an additional check is made to see if the subscriber has enough credit to proceed. -f not, the call is re+ected. -f the call is allowed to continue, then it is continually monitored and the appropriate amount is decremented from the subscriber(s account. 9hen the credit reaches ero, the call is cut off by the network. The systems that monitor and provide the prepaid services are not part of the /#M standard services, but instead an example of intelligent network services that a mobile phone operator may decide to implement in addition to the standard /#M ones. *o6 incomin7 ca33s are made +o a mo<i3e As soon as the owner switches on his mobile phone, it registers with the network provider via the nearest base station. At the network provider, data on the identity of the user, the serial number of the mobile phone and the identity of the base station over which registration has occurred is logged and stored. This is done even if no conversation takes place. Moreover, every time a number is dialed, this event is stored, irrespective of whether a connection is established or not. This takes place in three steps. I. $'&& !RI%IN'TI!N !PER'TI!N II. $'&& "E&I0ER/ !PER'TI!N III. $'&& TERMIN'TI!N !PER'TI!N I. $'&& !RI%IN'TI!N !PER'TI!N

3. Mobile station sends the call origination re!uest to M#, @. M#, forwards the re!uest to C>= to check the user information. 19

6. :.

C>= checks the users profile and ask M#, to grant call re!uest. M#, sets up trunk access to std. "#T$ call setup.

II. $'&& "E&I0ER/ !PER'TI!N 3. ,all from the source reaches to the "#T$ @. "#T$ forwards the call to the home M#, of the target mobile. 6. M#, gets the routing information about the target mobile from 5>= :. 5>= in turn passes re!uest to C>= 4. C>= sends the routing information to 5>= 7. 5>= passes this information to M#, D. M#, when have got this routing information routes the call to the M#,3 0. M#, which is the present location of the target mobile passes the call to the destination mobile. III. $'&& TERMIN'TI!N !PER'TI!N 3. The calling subscriber dials the mobile subscriber. @. The mobile network prefix digits cause the call to be routed to the mobile network gateway M#,. 6. The gateway M#, uses information in the called address digits to locate the mobile subscribers 5>=. :. The 5>= has already been informed of the location %C>= address& for the mobile subscriber and re!uests a temporary routing number to allow the call to be routed to the correct M#,. 4. The M#,JC>= responds with a temporary routing number that will be valid only for the duration of this call. 7. The routing number is returned to the /M#, %gateway M#,&. D. The call is made using standard -#E" %or similar& signaling between the /M#, and the visited M#,.
'ig$ #obile terminated call

20

EXPERIMENT N!. 5 AIM: To study the mobile database system in wireless networ's The data for the mobile networks is stored on the servers. The data items are aggregated to form pages and these pages are then aggregated to form disks and these disks are stored at the servers. The operations performed on the server to maintain the consistency and the ease of access of data are indexing and caching. .igure 3 below presents a general architecture of the mobile database system.

'igure .* rchitecture of #obile Database System

S4s+em arc8i+ec+,re mode3 Architecture model consists of stationary and mobile components. Mobile component is the mobile client, which can connect fixed network via a wireless link. #tationary components could be fixed host or base stations. .ixed 5ost in a fixed network does not have capable of connecting to a mobile unit. )ase stations are augmented with wireless interface to communicate with mobile computers, called Mobile #upport #tation %M##&. -n the above architecture model, database servers residing on fixed host and M## compose a distributed database system. As a part of the distributed database system, each M## can also function as a mobile transaction coordinator, which receives transaction operations from mobile clients and coordinates their execution. A mobile client can move arbitrarily at any moment within a wireless cell or among different cells. 9hen it is connected with the fixed network, it always communicates with the M## supporting the cell where it is currently located. -n addition, it can disconnect from the fixed network at any 21

time. 9hen it reconnects with the fixed network, it fetches back the results of previous operations and sends subse!uent operations. An important property of the data items in a mobile computing system is that their values can be highly dynamic and sensitive as they are used to maintain the useful information such as weather, highway conditions, traffic directions, news, stock !uotes and the location of a moving ob+ect. To maintain the freshness and validity of the data items, data items should be updated often by the generation of update transactions. -t is assumed that the updates are generated by means of some external environment such as capture devices, and sensors. The broadcast server disseminates all the data items periodically in each broadcast cycle. The duration of a broadcast cycle may be fixed or variable depending on the adopted broadcast scheduling algorithm, which is also used for selecting data items to broadcast. Epdate transactions consist of one to several write operations and its arrival rate can be very high. -t is assumed that a well-formed concurrency control protocol, such as two phase-locking, is used for concurrency control amongst the update transactions at the database server. Mobile clients issue mobile transactions to access data items at the database. -t is assumed that each mobile transaction consists of a se!uence of read operations and defined with a deadline. -n the model, the broadcast process is modeled as a long read-only transaction, called broadcast transaction. The length of a broadcast transaction is defined based on the life span of a mobile transaction that is e!ual to the time re!uired to broadcast its data items. Thus, the data item set of a broadcast transaction includes all the data items, which are broadcast during the period from %current time - life-span of a mobile transaction& to current time. ,orrectness of transactions in broadcast environments 8issemination of data items to mobile transactions may be performed concurrently with the execution of update transactions. #o it is possible that mobile transactions may read inconsistent data values due to uncontrolled interleaving of update and mobile transactions. Moreover, Mobile transaction should access updated value of data items. Thus, there are two fundamental re!uirements for disseminating data items to mobile transactions: Mutual consistency and ,urrency. Mutual consistency ensures that %a& the server maintains mutually consistent data and %b& clients can read mutually consistent data. ,urrency ensures that clients can access data that is current.

22

EXPERIMENT N!. 7 AIM: To study the components of cell phone&

$omponen+ P,rpose Microp8one-2 ,aptures your voice for conversion from analogue to digital mode Speaker-2 Allows monitoring of remote phone &$" "isp3a4-2 #hows ,all, "hone, #ignal I $etwork -nfo )e4pad-2 Allows access to specific remote phones .a++er4 = Me+er-2 9hile battery housings on cellphones are standard input deigns, some cellphones also have some <battery processing< intelligence built in. .or example, they will check the charge level to start or stop the charge when the phone is connected to a desktop, car or !uick charger and even automatically discharge the battery for you when necessary. This is usually linked to the >,8 display and to an audible beep to warn you of the battery charge status.Q

&E" &i78+s-2 #tatus -nformation, usually /reen, white I =ed. "i7i+a3 Si7na3 Processor-2 The 8#" chipset is a critical component. -t co-ordinates the voice, #M# and dataJfax features of a cell phone. -t processes speech, handles voice activity detection, as well as discontinuous /#M transmission and reception. Another section amplifies the input signal received from the microphone, while another converts this microphone voice signal from <analogue< to <digital<. The digital conversion is necessary because the /#M cellular standard is a completely digital system.

$!"E$-2 This 8#"(s voice processing is done in tandem with highly sophisticated compression techni!ue mediated by the <,;8*,< %compressorJdecompression& portion of the cell phone.

TR1 #ni+-2 The ,;8*, chipset instantly transfers this <compressed< information to the cell phoneFs =adio .re!uency %=.& unit. This =. unit, which is essentially the transmit and receive section of the cell phone, then sends out the voice or data information via the cell 23

phone antenna, over the air and on to the nearest cellular base station - and ultimately to your call destination. The incoming voice also travels much the same route, although it is first uncompressed from itFs incoming digital form into an audible analogue form which is then piped out as sound through the cell phoneFs speaker. This analogue-to-digital and digital-to-analogue voice conversion via the ,;8*, is done at very high speeds, so that you never really experience any delay between talking and the other person hearing you %and visa versa&.

SIM $ard Reader-2 9hen you switch on your phone with a <live< #-M card inside, the subscriber information on the chip inside the #-M card is read by the #-M card reader and then transmitted digitally to the network via the =. unit. The same route is followed when you hit the ,all button %and itFs variants& on the cell phone: the number youFve inputted is instantly and digitally transferred to the network for processing.

Ex+erna3 $onnec+ors At the bottom of most cellphones there is an external connector system. ?ou can usually plug in a dataJfax adapter, or a battery charger, or a personal hands free device, or a car-kit with external antenna connections. ?ouFll also find many with separate <speaker< and >*8 lights that are activated when the phone rings andJor when the battery is low. Many phones also have tiny >*8 lights under the keypad that light up when you press a key andJor when the phone rings.

!n2.oard Memor4-2 Many cellphones also have a certain amount of on-board memory chip capacity available for storing outgoing telephone numbers, your own telephone number, as well as incoming and outgoing #M# messages. #ome allow copying between the %limited& memory on the #-M card and the phoneFs own nternal memory.

'n+enna S4s+em- ,ellphone manufacturers are implementing many weird and wonderful permutations of antenna system designs. 9hile some are stubby, fixed types, the most predominant designs though 24

are those with thin, pull-out steel rods all of whom usually fit snugly into a special antenna shaft. These antenna designs, be they the stubby or pull-out types, all conform to the same circa 122 M5 fre!uency transmit and receive range re!uired by the /#M specification.

25

Se3ec+ an area inside +8is demo ce33p8one desi7nSIM Reader RF Unit CODEC DSP Memor !CD and "e #ad

S#ea"er "e #ad mi$ antenna %atter $onne$tor SIN%&E .!'R" "#'&2.'N" *'N"SET RE1EREN$E "ESI%N 1!R %SM>55 ? %SM1855

26

#ser In+er9ace.oreign language fonts, incl. ,hinese R .lexible "hone book - #tore numbers in phone %M*& - #-M Abbreviated $umber "hone )ook - #-M .ixed $umber 8ialing R #tores last 32 numbers called I received R /enerate 8TM. tones during call

27

R #peakerJsidetoneJmic amplification control R Cisual indication of remaining battery life R -ntegrated data and fax adapters

So9+6are ? Ser;ices: R .ull =ateJ*nhanced .ull =ate #peech with 8TA R #hort Message #ervices %#M#& R A4J3 and A4J@ encryption R /roup 6 fax I "h. @ #upplemental services R /#M data service -.ull rate 1.7, :.0, @.: Hbps -5alf rate :.0, @.: Hbps R 5ardware support for "hase @S data service: -3:.: Hbps data service R >ayers @J6 I MM- software supplied -Type Approved /#M "hase @ protocol stack

T8e MTI21455 : =eference 8esign is a breakthrough in design compactness, performance and !uantity of features. This single-board design shows Mobilink(s capability to provide the total solution for low-power /#M multi-band handset applications. )y using the circuitry and software employed by the MT--3:22 design, customers can !uickly and easily create a uni!ue product to their own specifications. 8esigned to ensure low-cost production goals, Mobilink employs a six-layer and five-mil ",) design rule process. The drill hole diameter is no smaller than 32mil to avoid the extra cost of optical drilling. )lind-via technology is applied instead of expensive micro-via design. The result is approximately 3@22mm@ of baseband circuit area and @022mm@ of =. circuit area. All baseband and =. circuitry fits onto a single board. #ince it is a single board design, manufacturing costs are reduced relative to conventional multi-board designs. ,onnectors exist for the >,8 28

panel, #-M card, battery charger, antenna and system accessories and one side of the board has keypad patterns. #oftware components for the >,8 and keypad are easily altered for specific changes and the memory system can be changed from the 3@0H x 0 #=AM and 43@H x 37 .>A#5 provided. The flexible architecture of the baseband codec hardware allows customers to choose from a wide variety of microphones and speakers. The Mobilink MT--3:22 =eference 8esign above is a dual-band /#M handset on a single ",). This solution demonstrates how a Mobilink M>@222-family chip can be used to create dramatically smaller dualband handsets, at lower costs than current multi-board solutions. The single-board design greatly simplifies the manufacturing processes and enhances product reliability. Coice !uality can be either .ull =ate or *nhanced .ull =ate. 5igher rate wireless e-mail and data transfers are possible via "hase @S 3:.: Hbps data service. The long talk and standby times of the MT--3:22 5andset =eference 8esign results from the use of a low, @.0C supply voltage and intelligent power management, including power-down scheduling for on-chip functions and external components during inactive intervals. The very long standby time is achieved via smart microprocessor scheduling and power-efficient sleep-mode design. To accelerate our customer(s product development cycle, we also offer total system solutions including the evaluation board, complete system software, and extensive hardware and software support through .ull Type Approval %.TA&. #tarting with this compact design, Mobilink(s engineering teams work with customers in );M optimi ation, and feature and form factor customi ation, in order to match every detail of the re!uirements. Mobilink(s in-house expertise allows customers to add or alter 29

software and mechanical features or hardware interfaces, and !uickly get a product design through Type Approval and field trials. This industry-leading design demonstrates Mobilink(s commitment to lowcost, low-power, high-performance =. design.

30

EXPERIMENT NO. 8 AIM: To GSM architecture in cellular system Introduction /#M, the /lobal #ystem for Mobile communications, is a digital cellular communications system which has rapidly gained acceptance and market share worldwide, although it was initially developed in a *uropean context. -n addition to digital transmission, /#M incorporates many advanced services and features, including -#8$ compatibility and worldwide roaming in other /#M networks. The advanced services and architecture of /#M have made it a model for future third-generation cellular systems, such as EMT#. This paper will give an overview of the services offered by /#M, the system architecture, the radio transmission structure, and the signaling functional architecture. (istory /#M, the most successful digital cellular network, is the *uropean digital cellular standard published by *T#- %the *uropean Telecommunications #tandards -nstitute&. There are three phases for /#M technology creation. 3. -ntroduction of commercial /#M services, including telephony, short message, fax and data services in 311@. @. -n 3117, phase @ completed the original /#M design task and established a framework for ongoing technology enhancement. 6. /#M standardi ation is now in phase @S, in this phase. -t includes improved voice coding and advanced data transmission services. Two data services are high-speed circuit-switched data service %5#,#8& and the /eneral "acket =adio #ervice %/"=#&. S4s+em 'rc8i+ec+,re The functional architecture of a /#M system can be broadly divided into the mobile station, the base station subsystem, and the network subsystem. *ach subsystem is comprised of functional entities which communicate through the various interfaces using specified protocols.

31

The /#M system architecture includes following subsystems %.igure 3&: Mobile #tation %M#&, )ase #tation #ubsystem %)##&, $etwork and #witching #ubsystem %$##&. 1. Mo<i3e S+a+ionThe M# subsystem involves a radio part, an interface, and a #ubscriber -dentity Module %#-M&. The radio part carries out all the functions related to the radio interface %Em&, e.g. receiving and transmitting radio signals, signal processing, fre!uency hopping, and channel management. The interface to terminal e!uipment acts as a gateway between the terminal and the radio part. The #-M contains all the subscriber-related information on the M# side of Em to identify a subscriber and take care of the security. The #-M is implemented as a smart card. The )## forms cell structure of /#M network. -t includes two types of network elements: the )ase Transceiver #tation %)T#&, and the )ase #tation ,ontroller %)#,&. The )T# is a transmission component. -t carries out radio signal transmission and reception' signal processing, speech encoding and decoding, and transmission rate adaptation. The )#, is a managing component. -t is responsible for all the management of the Em, e.g. channel allocation and deallocation, handover, and timing of radio signals. ;ne )T# implements one cell in /#M. A )#, can manage several )T#s. 32

2. .ase S+a+ion S,<s4s+emThe )ase #tation #ubsystem is composed of two parts, the )ase Transceiver #tation %)T#& and the )ase #tation ,ontroller %),#&. The )T# houses the radio transceivers that define a cell and handles the radio %Em& interface protocols with the mobile station. 8ue to the potentially large number of )T#s, the re!uirements for a )T# are ruggedness, reliability, portability, and minimum cost. The )ase #tation ,ontroller %)#,& manages the radio resources for one or more )T#s, across the Abis interface. -t manages the radio interface channels %setup, teardown, fre!uency hopping, etc.& as well as handovers. 3. Ne+6ork and S6i+c8in7 S,<s4s+emThe central component of the $etwork #ubsystem is the Mobile services #witching ,enter %M#,&. -t acts like a normal switching node of the "#T$ or -#8$, and in addition provides all the functionality needed to handle a mobile subscriber, including registration, authentication, location updating, inter-M#, handovers, and call routing to a roaming subscriber. These services are provided in con+unction with four intelligent databases, which together with the M#, form the $etwork #ubsystem. The M#, also provides the connection to the public fixed networks. The 5ome >ocation =egister %5>=& contains all the administrative information of each subscriber registered in the corresponding /#M network, along with the current location of the subscriber. The location assists in routing incoming calls to the mobile, and is typically the ##D address of the visited M#,. There is logically one 5>= per /#M network, although it may be implemented as a distributed database. The Cisitor >ocation =egister contains selected administrative information from the 5>=, necessary for call control and provision of the subscribed services, for each mobile currently located in the geographical area controlled by the C>=. Although the C>= can be implemented as an independent unit, to date all manufacturers of switching e!uipment implement the C>= together with the M#,, so that the geographical area controlled by the M#, corresponds to that controlled by the C>=. The proximity of the C>= information to the M#, speeds up access to information that the M#, re!uires during a call. The other two registers are used for authentication and security purposes. The *!uipment -dentity =egister %*-=& is a database that contains a list to fall valid mobile e!uipment on The network, where each mobile e!uipment is identified by its -nternational Mobile *!uipment -dentity %-M*-&. An -M*- is marked as invalid if it has been reported stolen or is not type approved. The Authentication ,enter %Au,& is a protected database that stores a copy of the secret key stored in each subscriberFs #-M card, used for authentication and ciphering on the radio channel. %SM ser;ices /#M has three types of services: teleservices, bearer services, and supplementary services. Teleservices include telephony, fax, emergency 33

calls, teletex, short Message services, fax mail, and voice mail. #upplementary services include call forwarding, call barring, etc. )earer services are used for transporting user data. #ome of the bearer services are listed below: 3. Asynchronous and synchronous data, 622-1722 bps. @. Alternate speech and data, 622-1722 bps. 6. Asynchronous "A8 %packet-switched, packet assemblerJdisassembler& access, 622-1722 bps. :. #ynchronous dedicated packet data access, @:22-1722 bps. ,onventional /#M has limitations in data services: 3. -t does not provide direct connection to the -nternet. -n order to access to the -nternet, /#M needs to call -nternet #ervice "rovider %-#"&. @. Eplink and downlink channels allocated for a user are for entire call period. 6. -t has time-oriented charging, that is, payment is based on connection time, not on data volumes. :. ,onnection setup takes about @2-@4 seconds. 4. >imited capacity %1722 bps&. 7. /#M was designed for speech, not for data, hence 42N radio capacity is wasted, and also there is no optimal channel coding for data.

34

You might also like