Application of Instrumentation in Petroleum Exploration & Refining

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 34

APPLICATION OF

INSTRUMENTATION IN
PETROLEUM EXPLORATION
& REFINING

Name: DHIRAJ KUMAR


BRANCH:- ELECTRONICS &
INSTRUMENTATION
REG.NO:-07EI013
UMTS

UMTS stands for Universal Mobile


Telecommunications System (UMTS)
which provides high bandwidth packet
data services to mobile users.
To support mobility management, an MM
context is established for every mobile
station in its corresponding Serving GPRS
Support Node (SGSN).
AIM
This project describes a broadcast
approach that allows the MS to detect lost
MM context in SGSN and therefore
speeds up the process for SGSN
recovery.
Here we provide high bandwidth packet
data services to mobile users.
ABSTRACT
The Universal Mobile Telecommunications System
(UMTS) provides high bandwidth packet data services to
mobile users.
We compare the performance of our scheme with lazy,
pessimistic, and frequency-based schemes through
simulation and show that compared to these schemes,
our scheme reduces overall recovery time by efficiently
managing resources and handoffs.
To support mobility management, an MM context is
established for every mobile station in its corresponding
Serving GPRS Support Node (SGSN).
ABSTRACT Contd…
When the SGSN fails, all MM contexts in the
SGSN are corrupted.
These Mobility Management (MM) contexts
must be recovered or data delivery to the mobile
stations will fail.
This project describes a broadcast approach
that allows the MS to detect lost MM context in
SGSN and therefore speeds up the process for
SGSN recovery.
ABSTRACT Contd…
MM context
The MM context consists of the following
information
 Mobile Stations (MS) identity information
 International Mobile Subscriber Identity (IMSI)
 Packet Temporary Mobile Subscriber Identity (P-
TMSI),
 Mobile Subscriber ISDN Number (MSISDN)
 The location information including Routing Area (RA)
and service area code
 Security information
 radio resource information
ABSTRACT Contd…
Our proposed system is to zip the file when it is
in transaction. If the user requests a file from
server, then the server will zip the file, send it to
the user with high bandwidth and also proxy
SGSN can maintains the operation of failure
time for main SGSN. If the normal SGSN can
works then the proxy SGSN is in sleep state, if
the main SGSN has deactivated the proxy
SGSN can activate. If main SGSN has only
deactivated but proxy SGSN can retrieve the
information to main SGSN.
Serving GPRS Support Node
•A Serving GPRS Support Node (SGSN) is
responsible for the delivery of data
packets from and to the mobile stations
within its geographical service area. Its
tasks include packet routing and transfer.
• Mobility management (attach/detach and
location management), logical link
management, and authentication and
charging functions.
• The location register of the SGSN stores
location information (e.g., current cell,
current VLR) and user profiles (e.g., IMSI,
address used in the packet data network)
of all GPRS users registered with this
SGSN.
EXISTING ARCHITECTURE

• Now a days broadcasting the message from one place to another is very
difficult to send without data loss.
• Some one trying to access the GPRS message from database, at that time
some problem occurs to get back the efficient connection, messages are in
queue format, in this mean time data loss occurs because message which
is in the queue are deleted at the time of requesting.
• Congestion will occur.
• Time consuming is very high.
PROPOSED ARCHITECTURE

•The network signaling traffic reduced is 40 percent. Furthermore, our


approach allows the MS to detect lost MM context in SGSN, which
speeds up the process for SGSN recovery.

•In this system efficient bandwidth and MM context used to pass the
message very quick. So user no needs to try the connection again and
again. The message which is in the queue are not deleted.

•Data loss is avoided when the user requesting the information.


SYSTEM REQUIREMENTS
3.1 HARDWARE REQUIREMENTS
# Processor : Pentium IV
# Clock speed : 550MHz
# Hard Disk : 20GB
# RAM : 128MB
# Cache Memory : 512KB
# Operating System : windows 2000 professional
# Monitor : Color Monitor
# Keyboard : 104Keys
# Mouse : 3Buttons
3.2 SOFTWARE REQUIREMENTS
# Front End : Java 1.6
# Back End : MS-ACCESS.
Programming language status
Java is a high-level Java process
programming language that
is all of the following:
Simple- Architecture-
neutral
Object-oriented- Portable
Distributed- High-
performance
Interpreted -Multithreaded
Robust- Dynamic
Secure -Network
Compiler Process JAVA PLATFORM
MS-Access
Microsoft Access is a relational Database Management
system (DBMS). At the most basic level, a DBMS is a
program that facilitates the storage and retrieval of
structured information on a computer’s hard drive. Examples
of well-know industrial-strength relational DBMS include:
Oracle
Microsoft SQL Server
IBM DB2
Informix
Well-know PC-based (“desktop”) relational DBMS include:
Microsoft Access
Microsoft FoxPro
Borland dBase
DESIGN AND MODULES
PROJECT MODULES
The project is classified in to the following six
modules. They are given below.
1. Registration Module.
2. Client/Server Module.
3. Bandwidth calculation
4. Route discovery
5. Bandwidth consumption
6. Database recovery
OVERALL BLOCK DIAGRAM
MODULES DESCRIPTION
Registration Module
Client / Server Module
Bandwidth calculation
Bandwidth consumption
•When sending a data from
the source node to
destination node the data
size is first calculated.
•Then the bandwidth between
the nodes to transmit the
data is calculated.
•Here the base station will
send the data’s to the user
with high bandwidth.
• The size of the bandwidth
between the source and
destination and the data size
is checked.
Database recovery

•After the bandwidth is


calculated the data’s are
transmitted without
congestion.
• In this module, if any
data packet will lose we can
easily retrieve the data’s with
high bandwidth.
• Here our enhancement is
to retrieve the document in zip
format.
•By using this server will
compress the file and send it to
the user in a secured manner.
DATA FLOW DIAGRAM
FLOW CHART
TECHNIQUES AND ALGORITHMS USED
UMTS Services
The UMTS provides support for both voice and data services. The following
data rates are targets for UMTS:
• 144 kbps—Satellite and rural outdoor
• 384 kbps—Urban outdoor
• 2048 kbp—Indoor and low range outdoor
Data services provide different quality-of-service (QoS) parameters for data
transfer. UMTS network services accommodate QoS classes for four types
of traffic:
• Conversational class—Voice, video telephony, video gaming
• Streaming class—Multimedia, video on demand, web cast
• Interactive class—Web browsing, network gaming, database access
• Background class—E-mail, short message service (SMS), file
downloading
The UMTS supports the following service categories and applications:
• Internet access—Messaging, video/music download, voice/video over IP,
mobile commerce (e.g., banking, trading), travel and information services
TECHNIQUES AND ALGORITHMS USED
UMTS Services -CONT
Intranet/extranet access—Enterprise application such
as e-mail/messaging, travel assistance, mobile sales,
technical services, corporate database access,
fleet/warehouse management, conferencing and video
telephony
Customized information/entertainment—Information
(photo/video/music download), travel assistance,
distance education, mobile messaging, gaming, voice
portal services
Multimedia messaging—SMS extensions for images,
video, and music; unified messaging; document transfer
Location-based services—Yellow pages, mobile
commerce, navigational service, trading
Disadvantage Of Previous Technique:

•Channel rate is low


•Failure of connection in networks
•Crosstalk about communications

Advantages:

•Channel rate is high


•The failure rate is low
•There is no crosstalk in communication
TESTING AND
IMPLEMENTATION
TESTING:
Testing objectives
# Testing is a process of executing a program with the
intent of finding an error.
# A good test has a high probability of finding an as yet
undiscovered error.
# A successful test is one that uncovers an as yet
undiscovered error
The objective is to design tests that systematically
uncover different classes of errors and do so with a
minimum amount of time and effort. Testing cannot show
the absence of defects, it can only show that software
defects are present.
TESTING Techniques
Unit Testing
Integration Testing
Validation Testing
Alpha and Beta Testing
System Testing
Recovery Testing
Security Testing
Performance Testing
IMPLEMENTATION
Implementation includes all those activities that take
place to convert from the old system to the new.
The new system may be totally new; replacing an
existing manual or automated system, or it may be a
major modification to an existing system.
Proper implementation is essential to provide
reliable system to meet the organizational
requirements.
Successful implementation may not guarantee
improvement in the organizational using the new
system, as well as, improper installation will prevent
any improvement.
IMPLEMENTATION cont..
The implementation phase involves the following tasks:
 Careful Planning.

 Investigation of system and constraints.

 Design of methods to achieve the changeover.

 Training of staff in the changeover phase.

 Evaluation of changeover.
Fig 4.9 Mobile User Connected with Base Station
Subscriber Requested for GPRS Activation
Data requested forward to server
Thanking you

You might also like