0% found this document useful (0 votes)
38 views

Mobile Computing Notes

Uploaded by

puriyuvraj10
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views

Mobile Computing Notes

Uploaded by

puriyuvraj10
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Mobile Computing Notes

Location management in GSM?


GSM (Global System for Mobile Communications) follows a hierarchical location management system
to track the location of mobile devices. This system consists of several components:

1. Home Location Register (HLR):


 Stores permanent data about a subscriber, including their phone number,
International Mobile Subscriber Identity (IMSI), subscription information, and service
area.
 Tracks the location of subscribers when they are not in their home network.

2. Visitor Location Register (VLR):


 Stores temporary data about a subscriber when they are roaming in a foreign
network.
 Contains information such as the subscriber's IMSI, location area code (LAC), cell
identification (CID), and service status.
 Communicates with the HLR to retrieve subscriber information and update
location records.

3. Location Area Code (LAC):


 Identifies a geographic area within a mobile network.
 Used to reduce the number of cells that need to be searched when locating a subscriber.

4. Cell Identification (CID):

 Uniquely identifies a cell within a base station.


 Used to pinpoint the exact location of a subscriber within a LAC.

Location Update Process:


1. When a subscriber powers on their device, it sends a location update message to the
network.
2. The network determines the LAC and CID of the subscriber's location.
3. The VLR in the visited network stores the subscriber's information and updates the HLR with
the new location.
4. The HLR updates its records to reflect the subscriber's current location.

Location Tracking:
1. When a call is placed to a subscriber, the network queries the HLR for their location.
2. The HLR checks if the subscriber is roaming and forwards the query to the appropriate VLR.
3. The VLR provides the subscriber's LAC and CID to the network.
4. The network routes the call to the base station that covers the subscriber's location.

Challenges and Considerations:


 Accuracy: Location accuracy in GSM can vary depending on factors such as the
number of base stations in the area, the density of the network, and the terrain.
 Privacy: Ensuring the privacy of subscriber location data is a major concern.
 Cost: Implementing and maintaining a location management system can be
expensive.
Overall, GSM's location management system provides a robust and efficient way to track the location
of mobile devices and enable a variety of location-based services.

GSM handoffs
GSM handoffs refer to the process of transferring a mobile phone call from one base station to
another as the user moves within the network. This ensures uninterrupted service and efficient
resource allocation.
Types of Handoffs:
Hard Handoff:
 The call is completely disconnected from the old base station before being connected to the
new one.
 This can cause a brief interruption in service, but it is generally more reliable and efficient.
Soft Handoff:
 The call is simultaneously connected to both the old and new base stations during the
transfer.
 This avoids any interruption in service, but it can be more complex to implement and may
require additional resources.
Triggers for Handoffs: (means when the handoff process will take place)
 Signal Strength: When the signal strength from the current base station drops below a
certain threshold, a handoff is triggered.
 Traffic Load: If the traffic load on the current base station is high, a handoff may be triggered
to distribute the load more evenly.
Handoff Process:
1. Detection: The mobile phone constantly monitors the signal strength from nearby base
stations. When it detects that the signal from a new base station is stronger, it initiates a
handoff request.
2. Authorization: The network evaluates the request and determines if a handoff is feasible
based on factors such as traffic load and resource availability.
3. Transfer: If the handoff is authorized, the network transfers the call from the old base station
to the new one.

Challenges and Considerations:


 Delay: Handoffs can introduce a slight delay in the call, especially during soft handoffs.
 Dropped Calls: If the handoff is not executed correctly, the call may be dropped.
 Resource Management: Efficiently managing resources during handoffs is crucial to avoid
congestion and ensure quality of service.
Overall, GSM handoffs are a critical component of mobile network operation, ensuring seamless
voice and data services as users move within the network.

CDMA: Code Division Multiple Access


CDMA (Code Division Multiple Access) is a multiple access technology used in wireless
communications.
It allows multiple users to share the same frequency band simultaneously by using unique
codes to separate their signals.
Key Concepts in CDMA:
 Spreading Code: Each user is assigned a unique spreading code, a sequence of binary digits
(1s and 0s). The signal is multiplied by the spreading code, spreading it across the entire
frequency band.
 Orthogonality: The spreading codes used in CDMA are designed to be orthogonal, meaning
they do not interfere with each other when multiplied. This allows multiple users' signals to
be transmitted simultaneously without significant interference.
 Despreading: At the receiver, the received signal is multiplied by the same spreading code
used by the transmitter. This process, known as despreading, reconstructs the original signal.
Advantages of CDMA:
 Increased Capacity: CDMA can accommodate more users per unit bandwidth compared to
TDMA and FDMA.
 Improved Power Control: CDMA uses power control to adjust the transmission power of
each user based on their distance from the base station, reducing interference and improving
overall system efficiency.
 Soft Handoffs: CDMA allows for smoother transitions between base stations, reducing the
likelihood of dropped calls.
 Enhanced Security: CDMA provides inherent security due to the use of spreading codes. It is
more difficult to intercept or jam a CDMA signal compared to other technologies.
Applications of CDMA:
 Cellular Networks: CDMA is widely used in 3G and some 4G cellular networks.
 Satellite Communications: CDMA is used in satellite communication systems to provide
reliable and efficient data transmission.
 Wireless Local Area Networks (WLANs): CDMA-based WLAN technologies, such as
CDMA2000, have been used in some wireless networks.

You might also like