Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

DEPARTMENT OF COMPUTER SCIENCE

Group assignment WIRELESS COMMUNICATION AND MOVAIL COMPUTING

Prepared by:
1. Abenezer Yilma………………………………
2. Abenezer Demoze………………………………
3. Besufekad Tabor……………………………….
4. Bisrat Zemenu…………………………………

SUBMITD DAY 12/09/2014

1=write down the different types of handovers in mobile construction briefs with example
Answer:
In cellular telecommunications, handover, or handoff, is the process of transferring an ongoing call or data
session from one channel connected to the core network to another channel. In satellite communications it is
the process of transferring satellite control responsibility from one earth station to another without loss or
interruption of service
There are two types of hand offs, soft handoff and hard handoff. Soft handoff occurs when the connection
with previous bts is not lost while connecting to the new bts and hard handoff occurs when the connection to
previous bts is lost while the call is transferred to the new bts
Handover in mobile communication refers to the process of transferring a call from one network cell to
another network without breaking the call. There are two types of handover which are as follows :

Hard Handoff : hard handoff is the process in which the cell connection is disconnected from the
previous cell before it is made with the new one.

Soft Handoff : It is the process in which a new connection is established first before disconnecting the
old one. It is thus more efficient and smart.

Hard handover
Is one in which the channel in the source cell is released and only then the channel in the target cell is
engaged. Thus the connection to the source is broken before or 'as' the connection to the target is made—
for this reason such handovers are also known as break-before-make.
Hard handovers are intended to be instantaneous in order to minimize the disruption to the call.
A hard handover is perceived by network engineers as an event during the call. It requires the least
processing by the network providing service. When the mobile is between base stations, then the mobile
can switch with any of the base stations, so the base stations bounce the link with the mobile back and
forth. This is called 'ping-ponging'.
Soft handover
Is one in which the channel in the source cell is retained and used for a while in parallel with the channel in
the target cell. In this case the connection to the target is established before the connection to the source is
broken, hence this handover is called make-before-break. The interval, during which the two connections
are used in parallel, may be brief or substantial. For this reason the soft handover is perceived by network
engineers as a state of the call, rather than a brief event. Soft handovers may involve using connections to
more than two cells: connections to three, four or more cells can be maintained by one phone at the same
time. When a call is in a state of soft handover, the signal of the best of all used channels can be used for
the call at a given moment or all the signals can be combined to produce a clearer copy of the signal. The
latter is more advantageous, and when such combining is performed both in the downlink (forward link)
and the uplink (reverse link) the handover is termed as softer. Softer handovers are possible when the cells
involved in the handovers have a single cell site.
Handover can also be classified on the basis of handover techniques used. Broadly they can be classified
into three types:

1. Network controlled handover


2. Mobile phone assisted handover
3. Mobile controlled handove

2=Explain the Physical and Logical Architecture of wireless communication


When computers are connected, we must choose a network architecture, which is the combination of all the
physical and logical components. The components are arranged (we hope) in such a way that they provide us
with an efficient transport and storage system for our data. The network architecture we choose dictates the
physical topology and the logical arrangements of the system. For example, if I say, “I’m building a Switched
Ethernet network,” this statement implies the overall architecture of my future network. Let’s now examine
these physical and logical components.
The Physical Network
The physical network is easy to understand because it’s usually visible. Mainly, it consists of hardware: the
wiring, plugs such as computer ports, printers, mail servers, and other devices that process and store our data.
The physical network also includes the important (read: vital) signals that represent the user data. Examples are
voltage levels and light pulses to represent binary images of 1s and 0s—strung together in many combinations
to describe our data.

I say “usually visible” because we can’t see wireless connections. Although more ethereal than copper wire
connections, wireless connections are nonetheless physical, taking the form of electromagnetic radio waves.

Quite rare only a few years ago, wireless networks such as Wi-Fi are now common. If you have a broadband
connection in your home, chances are good your computer is connected to your broadband hardware device
with a wireless arrangement. How we explain the layout (also called a topology) of a wireless network is no
different from that of a wire-based network.

Physical Layout—Network Topologies

As mentioned, the physical aspect of the network consists of the components that support the
physical connection between computers. In today’s networks, four topologies are employed:

The Logical Network


The previous section explained the physical layout of networks, such as the star topology. In explaining how
packets of user traffic are moved across these topologies, we have also explained the logical aspects of a
network. Again, the logical parts of computer networks entail the invocation of software to “propel” the
packets across the physical media and to receive them at the other end.

Unlike the physical network, the logical network is not visible. It uses the physical network for transport of
data. We defer describing the details of the logical network here, as it is described extensively in almost every
subsequent hour

3=what is piconet and scatternet ? explain them properly how many maximum numbers of devices can
communicate with in one piconet ?

PICONET: Bluetooth is a WPAn (Wireless Personal Area Network) open standard that provides an adhoc
way of connecting devices in the 10m range.
It is a short range, low cost and power efficient radio technology that supports point-to-point and point-to-
multipoint connections.
It connects handheld devices like printers, laptops, mobile phones and other accessories in the 10m radius. It
operates in the ISM band. Bluetooth operates in the 2.4GHz band and uses a frequency hopping TDD method
for each radio channel
The bluetooth enabled devices can locate each other, but user action is essential in order to make connections
with other devices and from networks.
Upto eight devices can be connected in a Bluetooth network called, PICONET.
One of them acts as a master and remaining act as slaves. Hence, a maximum of 7 slaves can be supported
inside a piconet.
When ever two or more devices detect each other and communicate through Bluetooth, a PICONET is formed

A piconet is the type of connection that is formed between two or more Bluetooth-enabled devices such as
modern cell phones. Bluetooth enabled devices are "peer units" in that they are able to act as
either master or slave. However, when a piconet is formed between two or more devices, one device takes the
role of the 'master', and all other devices assume a 'slave' role for synchronization reasons. Piconets have a 7
member address space (3 bits, with zero reserved for broadcast), which limits the maximum size of a piconet to
8 devices, i.e. 1 master and 7 slaves.

SCATTERNET:
Eight devices can be considered in a Bluetooth network called Piconet. One of them acts as a master and other
acts a slaves.
A scatter-net is formed when two or more piconets connect through a bridge node.
In addition to seven active slaves, there can be up to 255 parked nodes in the net that can only respond to a
beacon signal from the master.
The slaves are dumb devices that do the task that the master tells them to do.
All the communication is between the master and slave and not between the slaves.
A scatternet is a type of ad hoc computer network consisting of two or more piconets. The terms "scatternet"
and "piconet" are typically applied to Bluetooth wireless technology.

A scatternet is a number of interconnected piconets that supports communication between more than 8
devices. Scatternets can be formed when a member of one piconet (either the master or one of the slaves)
elects to participate as a slave in a second, separate piconet. The device participating in both piconets can relay
data between members of both ad hoc networks. However, the basic Bluetooth protocol does not support this
relaying - the host software of each device would need to manage it. Using this approach, it is possible to join
together numerous piconets into a large scatternet, and to expand the physical size of the network beyond
Bluetooth's limited range.

4=What Is Cloud Computing? And write down its disadvantage

Cloud computing is the delivery of different services through the Internet. These resources include tools and
applications like data storage, servers, databases, networking, and software.

Rather than keeping files on a proprietary hard drive or local storage device, cloud-based storage makes it
possible to save them to a remote database. As long as an electronic device has access to the web, it has
access to the data and the software programs to run it.

Cloud computing is a popular option for people and businesses for a number of reasons including cost
savings, increased productivity, speed and efficiency, performance, and security.

Understanding Cloud Computing

Cloud computing is named as such because the information being accessed is found remotely in the cloud or
a virtual space. Companies that provide cloud services enable users to store files and applications on remote
servers and then access all the data via the Internet. This means the user is not required to be in a specific
place to gain access to it, allowing the user to work remotely.
Cloud computing takes all the heavy lifting involved in crunching and processing data away from the device
you carry around or sit and work at. It also moves all of that work to huge computer clusters far away in
cyberspace. The Internet becomes the cloud, and voilà—your data, work, and applications are available from
any device with which you can connect to the Internet, anywhere in the world.

Cloud computing can be both public and private. Public cloud services provide their services over the Internet
for a fee. Private cloud services, on the other hand, only provide services to a certain number of people. These
services are a system of networks that supply hosted services. There is also a hybrid option, which combines
elements of both the public and private services.

 Cloud computing is the delivery of different services through the Internet, including data storage,
servers, databases, networking, and software.
 Cloud-based storage makes it possible to save files to a remote database and retrieve them on
demand.
 Services can be both public and private—public services are provided online for a fee while private
services are hosted on a network to specific clients.

Disadvantages of Cloud Computing


Here, are significant challenges of using Cloud Computing:

Performance Can Vary


When you are working in a cloud environment, your application is running on the server which simultaneously
provides resources to other businesses. Any greedy behavior or DDOS attack on your tenant could affect the
performance of your shared resource.

Technical Issues
Cloud technology is always prone to an outage and other technical issues. Even, the best cloud service provider
companies may face this type of trouble despite maintaining high standards of maintenance.

Security Threat in the Cloud


Another drawback while working with cloud computing services is security risk. Before adopting cloud
technology, you should be well aware of the fact that you will be sharing all your company’s sensitive
information to a third-party cloud computing service provider. Hackers might access this information.

Downtime

Downtime should also be considered while working with cloud computing.

That’s because your cloud provider may face power loss, low internet connectivity, service maintenance,
etc.

Internet Connectivity
Good Internet connectivity is a must in cloud computing. You can’t access cloud without an internet
connection. Moreover, you don’t have any other way to gather data from the cloud.
Lower Bandwidth
Many cloud storage service providers limit bandwidth usage of their users. So, in case if your organization
surpasses the given allowance, the additional charges could be significantly costly

Lacks of Support
Cloud Computing companies fail to provide proper support to the customers. Moreover, they want their user to
depend on FAQs or online help, which can be a tedious job for non-technical persons.

You might also like