18
PART-A (2 MARKS) 1. Distinguish between 1G & 2G cellular network? In Ist Generation cellular network, all the communications are done by amplitude modulation technique and 2G under Frequency Modulation technique. 1 St generation technique doesn’t have any packet transmission whereas 2 nd generation has GPRS etc. 2. Define location management and handoff management? It is defined as management which includes the location of mobile station and how the call has been transferred from one base station to another base station which is nothing hand off technique. 3. What is link transfer? It is nothing but the link which is established from the BS to MS, due to some conditions this link will completely surrender to some other node point. That is from one Base station to another Base station. This is called as link transfer. 4. How mobile station gets authorized by AUC? Mobile station’s IMEI Number and MIN identification number will be sent the AUC. That is carried over by Home location register. After the verification IMEI and MIN, Mobile station gets authorized by AUC by sending an ACK to the near by base station. 5. State the different GSM mobility management GSM Mobility management is done purely by the Service provider. It is nothing but managing the mobility of GSM (Global system for Mobile). It offers SMS, internet etc. 6. What is Network signaling? Network signaling is nothing but signals which are associated with the network with the mobile station. So that MS can communicate with the MSC and BSC 7. What is WML? WML stands for wireless mark up language. It is majorly used in the Mobile internet. The purpose of WNL is using internet in the mobile phone itself. 8. State the salient features of Wireless application protocol? WAP allows the mobile phone to use internet It works under less memory, less CPU etc. Consumes low power Allow the user to download various multimedia files. 9. How many co channels interfere is present in the first tier for a cluster size of 7 Six no. of co channels can be used in the present in the first tier for a cluster size of 7.

CMC MODEL-1 ANS KEY

Embed Size (px)

Citation preview

Page 1: CMC MODEL-1 ANS KEY

PART-A (2 MARKS)

1. Distinguish between 1G & 2G cellular network?

In Ist Generation cellular network, all the communications are done by amplitude modulation

technique and 2G under Frequency Modulation technique. 1St

generation technique doesn’t have

any packet transmission whereas 2nd

generation has GPRS etc.

2. Define location management and handoff management?

It is defined as management which includes the location of mobile station and how the call has

been transferred from one base station to another base station which is nothing hand off

technique.

3. What is link transfer?

It is nothing but the link which is established from the BS to MS, due to some conditions this link

will completely surrender to some other node point. That is from one Base station to another Base

station. This is called as link transfer.

4. How mobile station gets authorized by AUC?

Mobile station’s IMEI Number and MIN identification number will be sent the AUC. That is

carried over by Home location register. After the verification IMEI and MIN, Mobile station gets

authorized by AUC by sending an ACK to the near by base station.

5. State the different GSM mobility management

GSM Mobility management is done purely by the Service provider. It is nothing but managing

the mobility of GSM (Global system for Mobile). It offers SMS, internet etc.

6. What is Network signaling?

Network signaling is nothing but signals which are associated with the network with the mobile

station. So that MS can communicate with the MSC and BSC

7. What is WML?

WML stands for wireless mark up language. It is majorly used in the Mobile internet. The

purpose of WNL is using internet in the mobile phone itself.

8. State the salient features of Wireless application protocol?

WAP allows the mobile phone to use internet

It works under less memory, less CPU etc.

Consumes low power

Allow the user to download various multimedia files.

9. How many co channels interfere is present in the first tier for a cluster size of 7

Six no. of co channels can be used in the present in the first tier for a cluster size of 7.

Page 2: CMC MODEL-1 ANS KEY

10. What is near-far effect in wireless network?

When used with FM or spread spectrum modulation, it is possible for the strongest user to

successfully capture the intended receiver, even when many users are also transmitting. If the

closest transmitter is able to capture a receiver because of small propagation path loss, it is called

as near -far effect in wireless network

PART-B (11 MARKS)

11. Draw the block diagram of a Trunking & GOS in detail?

Trunking techniques are used throughout the world and are particularly popular in the

U.S. South America, Australia, and China. The exact frequency allocations for AMPS differ

from country to country. Nevertheless, the air interface standard remains identical throughout the

world. Like all other first generation, analog, cellular systems, AMPS use frequency modulation

(FM) for radio transmission. In the United States, transmissions from mobiles to base stations

(reverse link) use frequencies between 824 MHz and 849 MHz, while base stations transmit to

mobiles (forward link) using frequencies between 869 MHz and 894 MHz.. For AMPS, the

maximum deviation of the FM modulator is 112 kHz .The control channel transmissions and

blank-and- burst data streams are transmitted at 10 kbps for AMPS.

AMPS cellular radio systems generally have tall towers which support several receiving

antennas and have transmitting antennas which typically radiate a few hundred watts of effective

radiated power. Each base station typically has one control channel transmitter (that broadcasts

on the forward control channel), one control channel receiver (that listens on the reverse control

channel for any cellular phone switching to set—up a call), and eight or more FM duplex voice

channels. Commercial base stations support as many as fifty-seven voice channels.

The actual number of control and voice channels used at a particular base station varies

widely in different system installations depending on traffiic, maturity of the system, and

locations of other base stations. The number of base stations in a service area varies widely, as

Page 3: CMC MODEL-1 ANS KEY

well,from as few as one cellular tower in a rural area to several hundred or more bases tations in

a large city

Each base station in the AMPS system continuously transmits digital FSK data on the

forward control channel (FCC) at all times so that idle cellular subscriber units can lock onto the

strongest FCC wherever they are. All subscribers must be locked, or ―camped" onto a FCC in

order to originate or receive calls. The base station reverse control channel (RCC) receiver

constantly monitors transmissions from cellular subscribers that are locked onto the matching

FCC. In the U.S. AMPS system, there are twenty-one control channels for each of the two

service providers in each market, and these control channels are standardized throughout the

country.

AMPS facts

Analog FM modulation

RF bandwidth 30 kHz. The band can accommodate 832 duplex channels, among which

21 are reserved for call setup, and the rest for voice communication.

Frequency allocated by FCC on 824-849 MHz for downlink and 869-894 MHz for uplink

traffic.

Uses the same system throughout the US

Available in U.S., Canada, Hong Kong, New Zealand, Thailand

A narrowband versus exists with a 10 kHz channel spacing, such that 2496 channels can

be assigned, in stead of 832 for the normal AMPS mode.

N-AMPS

To increase capacity in large AMPS markets, Motorola developed an AMPSlike system

called N-AMPS (narrowband AMPS) [EIA91]. N-AMPS provides three users in a 30 kHz

AMPS channel by using FDMA and 10 kHz channels, and provides three times the capacity of

AMPS. By replacing AMPS channels with three N-AMPS channels at one time, service

providers are able to provide more trunked radio channels (and thus a much better grade of

service) at base stations in heavily populated areas. N -AMPS uses the SAT and ST signaling

and blank-and-burst functions in exactly the same manner as AMPS, except the signaling is done

by using subaudible data streams. Since 10 kHz channels are used, the FM deviation is

decreased. This in turn, reduces the S / (N + I ) which degrades the audio quality with respect to

AMPS. To counteract this, N-AMPS uses voice companding to provide a ―synthetic‖ voice

channel quieting.

N-AMPS specifies a 300 Hz high pass audio filter for each voice channel so that

supervisory and signaling data may be sent without blanking the voice, The SAT and ST

signaling is sent using a continuous 200 bps NRZ data stream that is FSK modulated, SAT and

ST are called DSAT and DST in N-AMPS because they are sent digitally and repetitiously in

small, predefined code blocks. The voice channel signaling is done with 100 bps Manchester

encoded FSK data and is sent in place of DSAT when traffic must be passed on the voice

channel. As with AMPS wideband signaling, there are many messages that may be passed

between the base station and subscriber unit, and these are transmitted in N-AMPS using the

Page 4: CMC MODEL-1 ANS KEY

same BCH codes as in AMPS with a predefined format of 40 bit blocks on the FV C and 48 bit

blocks on the RVC.

Global System for Mobile (GSM)

Global System for Mobile (GSM) is the second generation cellular system standard that

was developed to solve the fragmentation problems of the first cellular systems in Europe. GSM

is the world`s First cellular system to specify digital modulation and network level architectures

and services. Before GSM,European countries used different cellular standards throughout the

continent,and it was not possible for a customer to use a single subscriber unit throughout

Europe. GSM was originally developed to serve as the pan-European cellular service and

promised a wide range of network services through the use of ISDN. GSM’s success has

exceeded the expectations of virtually everyone, and it is now the world’s most popular standard

for new cellular radio and personal communication systems.

12. Define and explain the importance of the Low tier PCS method?

PACS — Personal Access Communication Systems

PACS is a third generation Personal Communications System originally developed and

proposed by Bellcore in 1992. PACS able to support voice, data, and video images for indoor

and microcell use. PACS is designed to provide coverage within a 500 meter range. The main

objective of PACS is to integrate all forms of wireless local loop communications into one

system with full telephone features, in order to provide wireless connectivity for local exchange

carriers (LECS).

PACS System Architecture PACS was developed as a universal wireless access system for wide spread applications in

private and public telephone systems which operate in either licensed or unlicensed PCS bands.

PACS may be connected to a PBX or Centrex, and may be served by a Central Office in

residential applications The PACS architecture consists of four main components: the

subscriberunit (SU) which may be fixed or portable, the radio ports (RP) which are connected to

the radio port control unit (RPCU), and the access manager (AM), as shown in Figure .Interface

A, the air interface, provides a connection between the SU and RR Interface P provides the

protocols required to connect.

PACS Radio Interface

The PACS system is designed for operation in the U.S. PCS band. A large number of RF

channels may be frequency division multiplexed with 80 MHz separation, or time division

multiplexed. PACS and WACS channel bandwidth is 300 kHz . WACS originally used TDMA

with frequency division duplexing (FDD), with eight time slots provided in a 2.0 ms frame on

each radio channel. When used with FDD, the reverse link time slot is offset from its paired

forward link time slot by exactly one time slot plus 62.5 ps. The forward link covers 1850

MHzto 1910 MHz and the reverse covers 1930 MHz to 1990 MHz.

Modulation -— PACS uses rr/4—DQPSK modulation. The RF signal is shaped using a raised

cosine rolloff shaping filter (rolloff factor of 0.5) such that 99% of the transmitted signal power

is contained within a channel bandwidth of 288 kHz. Eight time slots, each containing 120 bits,

are sent in a 2.5 ms frame.

Page 5: CMC MODEL-1 ANS KEY

Personal Handyphone System (PHS)

The Personal Handyphone System (PHS) is a Japanese air interface standard developed by the

Research and Development Center for Radio Systems (RCR). The PHS network interface was

specified by the Telecommunications Technical Committee of Japan The PHS standard, like

DECT and PACS-UB, uses TDMA and TDD. Four duplex data channels are provided on each

radio channel. rc/4 DQPSK modulation at a channel rate of 384 kbps is used on both forward

and reverse links. Each TDMA frame is 5 ms in duration, and 32 kbps ADPCM is used in

conjunction with CRC error detection (without correction).PHS supports seventy-seven radio

channels, each 300 kHz wide, in the 1895 MHz to 1918.1 MHz band. Forty channels in the

1906.1 MHz to 1918.1 MHz are designated for public systems, and the other thirty-seven

channels are used for home or oiiice use in the 1895 MHz to 1906.1 MHz band.PHS uses

dynamic channel assignment, so base stations are able to allocate channels based on the RF

(interference) signal strength seen at both the base and portable. PHS uses dedicated control

channels (unlike DECT) which all subscribers lock to while idle. Handoffs are supported only at

walking speeds, as PHS is designed for microcell/indoor.

13. Write brief notes about PACS network signaling

PACS Network signaling is a third generation Personal Communications System

originally developed and proposed by Bellcore in 1992. PACS able to support voice, data, and

video images for indoor and microcell use. PACS is designed to provide coverage within a 500

meter range. The main objective of PACS is to integrate all forms of wireless local loop

communications into one system with full telephone features, in order to provide wireless

connectivity for local exchange carriers (LECS).

Page 6: CMC MODEL-1 ANS KEY

PACS was developed as a universal wireless access system for wide spread applications

in private and public telephone systems which operate in either licensed or unlicensed PCS

bands. PACS may be connected to a PBX or Centrex, and may be served by a Central Office in

residential applications The PACS architecture consists of four main components: the subscriber

unit (SU) which may be fixed or portable, the radio ports (RP) which are connected to the radio

port control unit (RPCU), and the access manager (AM), as shown in Figure .Interface A, the air

interface, provides a connection between the SU and RR Interface P provides the protocols

required to connect.

The PACS system is designed for operation in the U.S. PCS band. A large number of RF

channels may be frequency division multiplexed with 80 MHz separation, or time division

multiplexed. PACS and WACS channel bandwidth is 300 kHz . WACS originally used TDMA

with frequency division duplexing (FDD), with eight time slots provided in a 2.0 ms frame on

each radio channel. When used with FDD, the reverse link time slot is offset from its paired

forward link time slot by exactly one time slot plus 62.5 ps. The forward link covers 1850

MHzto 1910 MHz and the reverse covers 1930 MHz to 1990 MHz.

Modulation -— PACS uses rr/4—DQPSK modulation. The RF signal is shaped using a raised

cosine rolloff shaping filter (rolloff factor of 0.5) such that 99% of the transmitted signal power

is contained within a channel bandwidth of 288 kHz. Eight time slots, each containing 120 bits,

are sent in a 2.5 ms frame.

The Personal Handyphone System (PHS) is a Japanese air interface standard developed

by the Research and Development Center for Radio Systems (RCR). The PHS network interface

was specified by the Telecommunications Technical Committee of Japan The PHS standard,

like DECT and PACS-UB, uses TDMA and TDD. Four duplex data channels are provided on

each radio channel. rc/4 DQPSK modulation at a channel rate of 384 kbps is used on both

forward and reverse links. Each TDMA frame is 5 ms in duration, and 32 kbps ADPCM is used

in conjunction with CRC error detection (without correction).PHS supports seventy-seven radio

channels, each 300 kHz wide, in the 1895 MHz to 1918.1 MHz band. Forty channels in the

1906.1 MHz to 1918.1 MHz are designated for public systems, and the other thirty-seven

channels are used for home or oiiice use in the 1895 MHz to 1906.1 MHz band.PHS uses

dynamic channel assignment, so base stations are able to allocate channels based on the RF

(interference) signal strength seen at both the base and portable. PHS uses dedicated control

channels (unlike DECT) which all subscribers lock to while idle. Handoffs are supported only at

walking speeds, as PHS is designed for microcell/indoor.

14. Explain briefly about the IS-41 network signaling in detail?

IS-41 Network signaling contains the frequency reuse terminologies:

Frequency reuse was implemented by restructuring the mobile telephone system

architecture into the cellular concept. The concept of frequency reuse is based on assigning to

each cell a group of radio channels used within a small geographic area. Cells are assigned a

group of channels that is completely different from neighboring cells. The coverage area of cells

is called the footprint. This footprint is limited by a boundary so that the same group of channels

Page 7: CMC MODEL-1 ANS KEY

can be used in different cells that are far enough away from each other so that their frequencies

do not interfere.

Cells with the same number have the same set of frequencies. Here, because the number of

available frequencies is 7, the frequency reuse factor is 1/7. That is, each cell is using 1/7 of

available cellular channels.

Principles of cellular frequency reuse

In the cellular concept, frequencies allocated to the service are re-used in a regular pattern of

areas, called 'cells', each covered by one base station. In mobile-telephone nets these cells are

usually hexagonal. In radio broadcasting, a similar concept has been developed based on

rhombic cells.

To ensure that the mutual interference between users remains below a harmful level, adjacent

cells use different frequencies. In fact, a set of C different frequencies {f1, ..., fC} are used for

each cluster of C adjacent cells. Cluster patterns and the corresponding frequencies are re-used in

a regular pattern over the entire service area.

Frequency reuse plan for C = 3, with hexagonal cells.

(i=1, j =1) Frequency reuse plan for C = 7 (i=2, j

=1).

The total bandwidth for the system is C times the bandwidth occupied by a single cell.

Reuse Distance

Page 8: CMC MODEL-1 ANS KEY

The closest distance between the centres of two cells using the same

frequency (in different clusters) is determined by the choice of the

cluster size C and the lay-out of the cell cluster. This distance is

called the frequency 're-use' distance. It can be shown that the reuse

distance ru, normalised to the size of each hexagon, is

ru = SQRT{3 C}

For hexagonal cells, i.e., with 'honeycomb' cell lay-outs commonly used in mobile radio,

possible cluster sizes are C = i2 + ij + j

2, with integer i and j (C = 1, 3, 4, 7, 9, ...). Integers i and j

determine the relative location of co-channel cells.

7-cell reuse with i = 2 and j =1.

15. Explain the VOIP service for mobile networks?

Voice over Internet Protocol (VoIP)

VoIP is a technology that allows for the transmission of voice communications over the

internet. This technology has been implemented to transmit voice calls between fixed-line

telephones and the benefit for travelers is that VoIP enables communication from a computer to

VoIP land lines, other computers and VoIP enabled mobile phones.

A user accesses the internet and downloads a VoIP software program onto the computer. Some

VoIP software programs are free whilst some require a subscription fee. The user can then

initiate a conversation with particular users who have a compatible VoIP capability enabled on

their phone line, mobile or computer. Next, the user speaks into a microphone connected to the

computer. The VoIP program then converts the sound into a digital signal and transmits it via the

internet to the recipient’s device. The recipient’s VoIP device then converts the digital signal

back into sound and conveys the voice to the listener. The quality and speed of VoIP calls are

virtually the same and sometimes better than other voice services. Vodafone Australia’s

submission to the inquiry stated that many areas frequented by travelers such as airports, hotels

and cafes have wireless internet access and thus VoIP communication is a viable substitute.13

The submission to the inquiry by AMTA further supports the notion that a wide range of internet

resources are available to travelers and that VoIP provides an almost perfect alternative to

international mobile roaming.14

The AMTA submission further notes that a range of mobile devices are emerging which can

access the internet and run VoIP programs, thus increasing the applicability of VoIP

communication as a substitute to international roaming.15 However the Committee notes that

Page 9: CMC MODEL-1 ANS KEY

accessing the internet from these mobile devices whilst overseas would presumably incur

international data roaming charges which may in turn make the use of VoIP on mobile devices

significantly less cost effective.

The Committee notes that some of the limitation’s outlined in the ACCC’s review apply to the

use of VoIP. Namely, VoIP services (with exception of VoIP on mobile devices) do not provide

the mobility or ease of contact as do international mobile roaming voice services.16

16. Explain the operation of GSM SMS?

SMS (Short Message Service) is the transmission of short text messages to and from a

mobile phone, or any other device capable of generating the SMS. It is composed of a

maximum of 160 characters, each coded on 7 bits (GSM) or 140 bytes.

End to end SMS delivery completes in two parts, First SMS submission in SMSC (Short

Message Service Centre) by originating subscriber, second Delivery of SMS to recipient

subscriber. So SMS is a Stored and Forward Service.

Once a message is sent, it is received by a Short Message Service Centre (SMSC) of the

calling subscriber’s network, which then delivers it to the appropriate destination device.

In the GSM SMS delivery, SMS termination does not require the SMSC of the recipient

subscriber’s Operator. However In CDMA (Code Division Multiple Access) network or

GSM to CDMA SMS transfer, or in case of some services like Push SMS, the recipient

SMSC is also used for terminating the SMS to the recipient. In all these types of SMS

transfer, the air interface-signalling channel is extensively used for terminating the SMS

traffic.

SMS uses the signaling channel (not dedicated), so it can be sent/received simultaneously

with the voice/data/fax service over a network.

SMS Text Length:

The ―short‖ part refers to the maximum size of the text messages: 160 characters (letters,

numbers or symbols in the Latin alphabet). For other alphabets, such as Chinese, the maximum

SMS size is 70 characters.

Types of SMS :

With the growing convergence Technology of networks and services, SMS can be send from a

mobile phone, fixed phone, or even via the Internet. On the basis of originating and terminating

identities, SMS can be broadly classified into the following 4 categories : P2P, A2P, P2N & I2P.

P2P (Person to Person) : In Person to Person (P2P) mode, the SMS is between two

individual subscribers. The SMSC or originating operator stores the SMS & sends it to

the recipient, either directly or in case of GSM to CDMA or CDMA to CDMA network,

through the SMSC of the terminating operator.

A2P (Application/Advertiser to Person) : In Advertiser/Application to Person (A2P)

SMS mode, advertising agencies have a commercial agreement with one or more service

providers. Advertisers provide the messages and mobile numbers to an operator, who

then sends the messages in broadcast mode to the recipients. If the SMS transfer is on-

Page 10: CMC MODEL-1 ANS KEY

net, then SMS moves only within the network of one operator and hence there is no issue

of loading resources of other operators, but if the recipient subscriber is attached with

another operator, then the resources of the terminating operator are also used for

delivering of such SMSs. This type of SMS delivery is also termed as Push method.

P2N (Person to Network) or P2A (Person to Application) : The Person to Network

(P2N) SMSs are usually an on-net service. In this type mode, the content provider usually

has a revenue share agreement with the service provider. The operator gives the content

provider a 4-5 digit short SMS code. The content provider then uses the short codes to

provide different kinds of services like astrology information, ring tones, picture

downloads, tele-voting, games, etc. Operators charge premium rate for these SMS to the

short codes.

I2P (Internet to Person) : The Internet to Person (I2P) arrangement allowed by some

operators with the provision of a web interface enables a person to send an SMS from the

Internet to mobile subscribers. They also accept SMS originating from the Internet

messaging web sites.

Basic SMS Network Element :

SMSC

HLR

MSC

VLR

BSC

BTS

UE (User Equipment : Mobile/Laptop/Fixed Phone)

SMS is carried on a signaling channel of air interface from mobile handsets to the Base

Transceiver Station (BTS), and thereafter it is carried on the Signaling System 7 (SS7) signalling

channel throughout BSC, MSC/VLR, SMSC.

Basic SMS Call Flow :

End to end SMS transaction completes in 2 parts :

Message submission by originating subscriber to its SMSC (Mobile Originating Part)

Message delivery by SMSC to recipient Subscriber (Mobile terminating Part)

Basic end to end SMS call flow shown in following diagram :

Page 11: CMC MODEL-1 ANS KEY

SMS Originating Part – MO SM Submit :

The SM is sent from the originating Mobile Station (MS) to the serving Mobile

Switching Center (MSC). The address of the SMSC where the SM should be submitted to

is stored on the SIM card of the subscriber and forwarded to the MSC with the message.

The MSC forwards the SM to the SMSC. The SMSC returns a positive (ACK) or

negative (NACK) response indicating whether the message was successfully stored of

not.

SMS Terminating Part – MT SM Deliver :

To delivers a SM SMSC has to find out the location (serving MSC) and the International

Mobile Subscriber Identity (IMSI) of the recipient subscriber first. This information

(routing information) is retrieved from the Home Location Register (HLR) of the

recipient subscriber based on the recipient number (MSISDN).

HLR Provides routing Information to SMSC, which includes IMSI and serving MSC of

recipient number.

Based on routing information SMSC delivers SM to the serving MSC and MSC forwards

it to the recipient Mobile Station.

SMS Delivery Report :

Successful Delivery – On successful delivery SMSC sends delivery report to the originator if

requested.

Failed Delivery – If SMS is not delivered to the recipient number SMSC send failure reason to

the originator.

Permanent Error : For example – Unknown Subscriber

Temporary Error : For example – Absent Subscriber

SMSC Retry : In case of temporary errors the SMSC schedules a next delivery attempt, called

SMSC retry.

Page 12: CMC MODEL-1 ANS KEY

Network Trigger : If the subscriber is not reachable (absent) the SMSC notifies the HLR that

there is a message waiting for the recipient number. When the HLR detects the presence of the

subscriber, it alerts the SMSC and SMSC forwards SM to the serving MSC.

Regular SMS Messages :

Send Routing Information for Short Message (SRI-SM):

Between Origin SMSC and Destination HLR, to retrieve the routing information needed for

routing the short message to the servicing MSC.

Mobile Originating Forward Short Message (MO Forward SM):

Between Origin MSC and Origin SMSC, to forward mobile originated short messages.

Mobile Terminating Forward Short Message (MT Forward SM):

Between Origin SMSC and Destination MSC, to forward mobile terminated short messages.

Send-Info-For-MO-SMS:

Between the Origin MSC and VLR, to request subscriber related information from the VLR.

Send-Info-For-MT-SMS:

Between the Destination MSC and VLR, to request subscriber related information from the

VLR.

Report Short Message Delivery Status:

Between Origin SMSC and Destination HLR, to set the Message Waiting Data into the HLR or

to inform the HLR of successful SM transfer after polling.

Alert Service Centre:

Between Destination HLR and Origin SMSC, to inform SMSC that a subscriber, whose

MSISDN is in the Message Waiting Data file, is active or the MS has memory available.

Inform Service Centre:

Between Destination HLR and Origin SMSC, to inform the SMSC which MSISDN number is

stored in the Message Waiting Data file, or to provide status on different messaging flags.

Page 13: CMC MODEL-1 ANS KEY

Ready For Short Message:

Between the Destination MSC and Destination VLR as well as between the Destination VLR

and the Destination HLR. The MSC initiates this service if a subscriber indicates memory

available situation. The VLR uses the service to indicate this to the HLR.

SMS Applications :

Text message exchange between Mobile subscriber.

Ring Tone

Logo

Stock Information

Tele-Voting (TV Show)

Vending machine Remote Management

17. Study the operation of UAProf and caching concepts of WAP

Existing markup languages and content written in those markup languages presume that

devices have similar display sizes, memory capacities, and software capabilities. Content is also

largely oblivious to the available network bandwidth and perceived network latency. As WAP-

enabled devices come of age, this homogeneity assumption is no longer universally valid. In

particular, mobile devices can be expected to have an an ever-divergent range of input and output

capabilities, network connectivity, and levels of scripting language support. Moreover, users may

have content presentation preferences that also cannot be transferred to the server for

consideration. As a result of this device heterogeneity and the limited ability of users to convey

their content presentation preferences to the server, clients may receive content that they cannot

store, that they cannot display, that violates the desires of the user, or that takes too long to

convey over the network to the client device. Recently, work has begun within the World-Wide

Web Consortium (W3C) to define mechanisms for describing and transmitting information about

the capabilities of Web clients and the display preferences of Web users. The Composite

Capabilities/Preferences Profile (CC/PP) defines a high-level structured framework for describing

this information using the Resource Description Framework (RDF) [RDF]. CC/PP profiles are

structured into named ―components,‖ each containing a collection of attribute-value pairs, or

properties. Each component may optionally provide a default description block containing either a

set of default values for attributes of that component or a URI that refers to a document containing

those default alues. Any attributes explicitly provided in the component description therefore

override the default values provided in the default description block or through that URI. The

CC/PP specification does not mandate a particular set of components or attributes, choosing

instead to defer that definition to other standards bodies. The CC/PP Exchange Protocol over

HTTP [CC/PPex] enables CC/PP profiles to be transported over the HTTP 1.1 protocol [HTTP]

with the HTTP Extension Framework [HTTPex]. This protocol enables effective profile caching

at Web servers and proxies.

The User Agent Profile (UAProf) specification extends WAP 1.1 to enable the end-to-end flow

of a User Agent Profile (UAProf), also referred to as Capability and Preference Information

(CPI), between the WAP client, the intermediate network points, and the origin server. It seeks to

Page 14: CMC MODEL-1 ANS KEY

interoperate seamlessly with the emerging standards for Composite Capability/Preference Profile

(CC/PP) [CCPP,CCPPex] distribution over the Internet. It uses the CC/PP model to define a

robust, extensible framework for describing and transmitting CPI about the client, user, and

network that will be processing the content contained in a WSP response. The specification

defines a set of components and attributes that WAP-enabled devices may convey within the

CPI.1 This CPI may include, but is not limited to, hardware characteristics (screen size, color

capabilities, image capabilities, manufacturer, etc.), software characteristics (operating system

vendor and version, support for MExE, list of audio and video encoders, etc.), application/user

preferences (browser manufacturer and version, markup languages and versions supported,

scripting languages supported, etc.), WAP characteristics (WML script libraries, WAP version,

WML deck size, etc.), and network characteristics (bearer characteristics such as latency and

reliability, etc.). This specification seeks to minimize wireless bandwidth consumption by using

a binary encoding for the CPI and by supporting efficient transmission and caching over WSP in

a manner that allows easy interoperability with the CC/PP Exchange Protocol over HTTP.

As a request travels over the network from the client device to the origin server, each network

element may optionally add additional profile information to the transmitted CPI. These

additions may provide information available solely to that particular network element.

Alternatively, this information may override the capabilities exposed by the client, particularly in

cases where that network element is capable of performing in-band content transformations to

meet the capability requirements of the requesting client device.

Origin servers, gateways, and proxies can use the CPI to ensure that the user receives content

that is particularly tailored for the environment in which it will be presented. Moreover, this

specification permits the origin server to select and deliver services that are appropriate to the

capabilities of the requesting client. Finally, it is expected that this specification will be used to

enhance content personalization based on user preferences, and other factors, as enabled by the

Platform for Privacy Preferences Project (P3P) [P3P].

The user agent profile is concerned with capturing classes of device preference information.

These classes include (but are not restricted to) the hardware and software characteristics of the

device as well as information about the network to which the device is connected. The user agent

profile contains information used for content formatting purposes.

A user agent profile is distinct from a user preference profile that would contain application-

specific information about the user for content selection purposes. For example, a user

preference profile might designate whether the user is interested in receiving sports scores and, if

so, the particular teams. The specification of user preference profiles is beyond the scope of this

document.

In accordance with the CC/PP note [CCPP], the user agent profile schema is defined using an

RDF schema and vocabulary [RDF]. This document defines the structure of this schema in terms

of the class definitions and semantics of attributes for devices adhering to the WAP standard.

Extensibilty guidelines are also offered to assist in extending the schema with new components.

Page 15: CMC MODEL-1 ANS KEY

The information contained within the profile is provided on behalf of the user who will

be receiving the content contained in the associated WSP response.

The CC/PP repository storing the profile is secure, meaning that it does not permit

unauthorized modification to stored profile information. The functionality associated with

this repository may be implemented in a WAP gateway or intermediate proxy or as a

separate standalone element in the network.

WSP/HTTP headers are generally not encrypted. Because this specification does not

define any security mechanisms, care will be taken when including user-confidential

information2 in the profile unless the profile is transmitted over an end-to-end secure

channel (e.g. WTLS to the origin server).

An implicit chain of trust exists between the client and origin server. The integrity of the

profile is maintained (in other words, not compromised) as it is transmitted through or

cached within the network. It is assumed that the network elements that contribute

property descriptions to the profile are trusted. Network elements will not assemble a

"history" about users by tracking the deltas in their profile over time.

To ensure the integritiy of the profile, lower-level mechanisms, such as WTLS, must be

used.

o Use of the profile by the origin server is intended to enhance the user’s

experience. Therefore, should the profile be discarded, be corrupted, or be

otherwise inaccessible, then the origin server will still provide and deliver content

to the client in a best-efforts fashion.

o This specification builds upon and coexists with numerous WAP and Internet

standards. These relationships are summarized below:

Composite Capability/Preferences Profiles (CC/PP) [CC/PP]: This specification defines

the CPI structure according to the structure mandated by the CC/PP specification note.

Resource Description Framework (RDF) [RDF]: The CC/PP specification uses the RDF

syntax to represent the CPI. In designing or extending the schema, a schema designer

must be familiar with the RDF concepts.

Wireless Session Protocol (WSP) [WSP]: CPI is transmitted over wireless networks

within WSP headers.

WAP Binary XML (WBXML) [WBXML]: When the CPI is transmitted over the WSP

protocol, this specification mandates that it be encoded according to the WBXML

specification.

CC/PP Exchange Protocol over HTTP [CC/PPex]: When transmitted over the Internet,

this specification requires that the CPI be transmitted using the CC/PP Exchange Protocol

over HTTP which, in turn, defines headers in HTTP 1.1 [HTTP] with the HTTP

Extension Framework [HTTPex].

WAP Push Access Protocol (PAP) [WAP-PAP]: This protocol is used by push origin

servers to retrieve the CPI from the WAP gateway or Push Protocol Proxy (PPG). The

request is issued over HTTP, and the response contains the profile, with MIME type

text/xml.

This section describes the end-to-end architecture within which this specification

operates. It is informative.

Page 16: CMC MODEL-1 ANS KEY

The end-to-end system consists of five logical components:

A client device capable of requesting and rendering WAP content.

A wireless network employing WAP 1.1 or later protocols.

A WAP-capable gateway capable of translating WAP protocol requests into

corresponding requests over the Internet and translating responses from the Internet

into corresponding responses over the WAP protocols.

The Internet or an intranet using TCP/IP-based protocols and possibly having one or

more protocol gateways and Web/HTTP proxies.

An origin (Web) server that can generate requested content.

Though this specification refers to five end-to-end system components, actual

configurations may physically deploy those components in many forms. For example,

the latter three components (WAP gateway, Internet/intranet, and origin server) might

easily be merged into a single server-side system connected to the WAP network.

Moreover, the WAP gateway may itself be distributed, with different hosts serving as

endpoints for different layers of the WAP protocol stack.

19. Explain the Mobile station execution environment

Mobile Station Application Execution Environment is a framework to ensure a predictable

environment for third-party applications in GSM or UMTS handsets. MExE does this by

defining different technology requirements called "classmarks." MExE classmark 1 is based on

WAP, classmark 2 on PersonalJava and JavaPhone, and classmark 3 on J2ME CLDC and MIDP.

Other classmarks may be defined in the future. MExE specifies additional requirements for all

classmarks, for instance a security environment, capability and content negotiation, a user

profile, user interface personalization, management of services and virtual home environment. A

handset can support multiple classmarks.

The aim of Mobile Station Application Execution Environment (MExE) is to provide

a comprehensive and standardised environment on mobile phones for executing

operator or service provider specific applications. MExE is designed as a full

application execution environment on the mobile terminal. It builds a Java

Virtual Machine into the client mobile phone. MExE is designed to be used to provide

sophisticated intelligent customer menus and also facilitate Intelligent Network (and so-called

GSM CAMEL) services. MExE plans to integrate mobile phone location services and already

supports a wide range of man-machine interfaces such as voice recognition, icons and soft keys.

MExE shares several similarities with the Wireless Application Protocol, in that both protocols

have been designed to work with a range of GSM mobile network

services from SMS to GPRS and later with UMTS. Whereas WAP incorporates some

scripting, graphics, animation and text, MExE allows full application

programming. This necessitates the need for MExE to include a strict security

Page 17: CMC MODEL-1 ANS KEY

framework to prevent unauthorised remote access to the user's data.

Because programming and running Java applications requires significant

processing resources on the mobile client, MExE is primarily aimed at the next

generation of powerful smart phones. On the other hand, MExE terminals can also

include today?s regular phones, because MExE incorporates a capability

indication method called classmarks. MExE classmarks define the MExE-related

services that a particular terminal supports. There will be classmarks that

match and those that exceed WAP functionality.

The MExE mobile client can inform

the MExE server of its classmark and therefore its capabilities.

Development of the initial MExE protocols is being carried out in SMG4; the

European Telecoms Standards Institute (ETSI), the GSM standards setting body.

Supporters of this work include Motorola, Nokia, Lucent Technologies and Nortel

(with the concept Nortel Orbitor smart phone in line with the MExE concept).

MExE will be available further in the future than Wireless Application Protocol

(WAP) because the processing power to run the Java applications is not currently

available in mobile terminals. It is also worth noting that whilst MExE is a

only a GSM and Universal Mobile Telephone System (UMTS) standard, WAP is being

designed for all cellular standards including Code Division Multiple Access

(CDMA)."

20. What are the concepts of WLL?

Wireless Local Loop (WLL) is a technology that connects subscribers to the public switched

telephone network (PSTN) using radio signals to substitute the copper wires.

The WLL sustem includes cordless access systems, proprietary fixed radio access, and fixed

cellular systems. Sometimes WLL is called radio in the loop (RITL) or fixed-radio access (FRA).

The bandwidth using WLL is much higher than that possible in the copper loop. Wireless

local loop is a practical and economical last mile (or first mile) solution for connecting

subscribers in areas that do not have the wired infrastructure such as remote rural area and some

developing countries.

The WLL system is based on a full-duplex radio network that provides local telephone-like

service among a group of users. The WLL unit consists of a radio transceiver and the WLL

interface assembled in one metal box. Two cables and a telephone connector are the only outlets

from the box; one cable connects to a directional antenna and a phone receptacle to connect to a

common telephone set. A fax or modem could also be connected for fax or computer

communication. WLL systems incorporating various types of wireless technologies as

summarized as follows:

Page 18: CMC MODEL-1 ANS KEY

1. TDM/TDMA and P-MP communications equipment:

The system uses communications equipment based on time division multiplex/time division

access (TDM/TDMA) technology and a point-to-multipoint (P-MP) system provides service

coverage over a wide area encompassing the base station, relay stations and subscriber stations.

2. Fixed use of cellular systems:

This approach uses the wireless equipment of a cellular phone system, thereby curtailing the

mobile function. Using cellular phones as the subscriber terminals makes it possible to hold

down the system cost.

3. PHS-WLL system:

The system uses PHS terminal technology and wireless equipment. Since the voice encoding

system uses 32 kbps adaptive differential pulse code modulation (ADPCM), speech quality on a

par with that of fixed telephony is obtained.

WLL: Wireless Local Loop