Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
27 views21 pages

2

The document discusses an assignment submission for a mobile application development course. It includes questions about interactive voice response systems, how Bluetooth works, drawing and explaining the Bluetooth architecture, and explaining the Bluetooth protocol stack.

Uploaded by

aftab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views21 pages

2

The document discusses an assignment submission for a mobile application development course. It includes questions about interactive voice response systems, how Bluetooth works, drawing and explaining the Bluetooth architecture, and explaining the Bluetooth protocol stack.

Uploaded by

aftab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
You are on page 1/ 21

UNIT-1 ASSIGNMENT CUM ASSESSMENT Semester: VI

Subject: APPLICATION DEVELOPMENT IN MOBILE TECHNOLOGY (AIT


323)

Course Teacher: Dr. Digvijaysinh Parmar

Submitted by:- AFTAB MADHARA

reg no:-06-0257-2017

Roll no:-14

Q1 Write a brief note on Interactive voice response with applications.

Definition - What does Interactive Voice Response (IVR) mean?

Interactive voice response (IVR) is a technology that allows humans to


interact with computers using voice or a dual-tone multifrequency
(DTMF) signaling keypad. IVR allows customers to find answers to their
own inquiries by speaking (using the company’s speech recognition
software) or giving inputs via a telephone keypad.

IVR uses prerecorded and dynamically generated audio to interact with


customers. The key benefit to IVR systems is that they can handle large
volumes of calls, where only simple interactions are required.

IVR is also known as a telephone menu or voice response unit.

Thinking Outside the Box -- How to Dramatically Improve SQL


Performance

At the 1962 Seattle World’s Fair, Bell System introduced the first
telephone capable of dialing area codes using dual-tone modulation
frequency with dial tones in the range of human hearing. This was the
genesis of IVR. However, IVR technology was complex and expensive
through the 1970s.

In the 1980s, more companies entered the market. Competition led to


further development of speech recognition software, causing the move
from digital signal processors to a client/server architecture. Companies
began researching computer telephony integration for use with IVR
systems. Intelligent routing of calls to appropriate company personnel
or departments became common and vital for efficient business
answering operations. In the 2000s, speech recognition software was
further developed and eventually became less expensive. This was
made possible by faster processing speeds and the transfer of speech
recognition proprietary programming code to the VXML standard.

IVR prioritizes customer calls coming into a call center, moving some to
the front of the queue. Prioritization is based on the reason for the call
and on a dialed number identification service. The system can also log
caller detail information and collect it in a database for auditing, system
performance analysis and future system improvements.

Other typical uses for IVR are:

Voice-activated dialing to automate routine inquiries to switchboards


or private automatic branch exchange operators

Entertainment and information to handle television game shows or


televoting, which can generate huge call volumes

Anonymous access to sensitive data from hospitals and clinics using


pass codes

Mobile purchases and registrations

Obtaining personal banking data

Taking orders and credit card payments

Reporting utility meter readings

Confirming airline flight information

Chat and dating lines

Weather and road conditions

IVR technology has its critics. Callers may object to providing voice
responses to automated systems and prefer to talk to a human
respondent. Customers may feel frustrated when their ability to talk to
a human is restricted.

Q2 How Bluetooth works?

Bluetooth Network consists of a Personal Area Network or a piconet


which contains a minimum of 2 to maximum of 8 bluetooth peer
devices- Usually a single master and upto 7 slaves. A master is the
device which initiates communication with other devices. The master
device governs the communications link and traffic between itself and
the slave devices associated with it. A slave device is the device that
responds to the master device. Slave devices are required to
synchronize their transmit/receive timing with that of the masters. In
addition, transmissions by slave devices are governed by the master
device (i.e., the master device dictates when a slave device may
transmit). Specifically, a slave may only begin its transmissions in a time
slot immediately following the time slot in which it was addressed by
the master, or in a time slot explicitly reserved for use by the slave
device.

Bluetooth

The frequency hopping sequence is defined by the Bluetooth device


address (BD_ADDR) of the master device. The master device first sends
a radio signal asking for response from the particular slave devices
within the range of addresses. The slaves respond and synchronize their
hop frequency as well as clock with that of the master device.

Scatternets are created when a device becomes an active member of


more than one piconet. Essentially, the adjoining device shares its time
slots among the different piconets.

Bluetooth Specifications:

Core Specifications : It defines the Bluetooth protocol stack and the


requirements for testing and qualification of Bluetooth-based products.

The profiles specification: It defines usage models that provide


detailed information about how to use the Bluetooth protocol for
various types of applications.

The core specification consists of 5 layers:

Radio: Radio specifies the requirements for radio transmission –


including frequency, modulation, and power characteristics – for a
Bluetooth transceiver.

Baseband Layer: It defines physical and logical channels and link types
(voice or data); specifies various packet formats, transmit and receive
timing, channel control, and the mechanism for frequency hopping (hop
selection) and device addressing.It specifies point to point or point to
multipoint links. The length of a packet can range from 68 bits
(shortened access code) to a maximum of 3071 bits.

LMP- Link Manager Protocol (LMP): defines the procedures for link
set up and ongoing link management.

Logical Link Control and Adaptation Protocol (L2CAP): is responsible


for adapting upper-layer protocols to the baseband layer.
Service Discovery Protocol (SDP): – allows a Bluetooth device to
query other Bluetooth devices for device information, services
provided, and the characteristics of those services.

The 1st three layers comprise the Bluetooth module whereas the last
two layers make up the host. The interfacing between these two logical
groups is called Host Controller Interface.

Q3 Draw and explain the architecture of Bluetooth.

Bluetooth communication occurs between a master radio and a slave


radio. Bluetooth radios are symmetric in that the same device may
operate as a master and also the slave. Each radio has a 48-bit unique
device address (BD_ADDR) that is fixed.

Two or more radio devices together form ad-hoc networks called


piconets. All units within a piconet share the same channel. Each
piconet has one master device and one or more slaves. There may be
up to seven active slaves at a time within a piconet. Thus, each active
device within a piconet is identifiable by a 3-bit active device address.
Inactive slaves in unconnected modes may continue to reside within the
piconet.

A master is the only one that may initiate a Bluetooth communication


link. However, once a link is estBablished, the slave may request a
master/slave switch to become the master. Slaves are not allowed to
talk to each other directly. All communication occurs within the slave
and the master. Slaves within a piconet must also synchronize their
internal clocks and frequency hops with that of the master. Each piconet
uses a different frequency hopping sequence. Radio devices used Time
Division Multiplexing (TDM). A master device in a piconet transmits on
even numbered slots and the slaves may transmit on odd numbered
slots.

Multiple piconets with overlapping coverage areas form a scatternet.


Each piconet may have only one master, but slaves may participate in
different piconets on a time-division multiplex basis. A device may be a
master in one piconet and a slave in another or a slave in more than
one piconet.

It is a Wireless Personal Area Network (WPAN) technology and is used


for exchanging data over smaller distances. This technology was
invented by Ericson in 1994. It operates in the unlicensed, industrial,
scientific and medical (ISM) band at 2.4 GHz to 2.485 GHz. Maximum
devices that can be connected at the same time are 7. Bluetooth ranges
upto 10 meters. It provides data rates upto 1 Mbps or 3 Mbps
depending upon the version. The spreading technique which it uses is
FHSS (Frequency hopping spread spectrum). A bluetooth network is
called piconet and a collection of interconnected piconets is called
scatternet.

Bluetooth Architecture:
Q4
Explain every protocol in Bluetooth Protocol stack.

The protocol architecture of the bluetooth consists of following in a


bluetooth protocol stack:

• Core protocols consisting 5 layer protocol stack viz.


radio,baseband,link manager protocol,logical link control and
adaptation protocol, service discovery protocol.

• Cable replacement protocol,RFCOMM

• Telephony Control Protocols

• Adopted protocols viz. PPP,TCP/UDP/IP,OBEX and WAE/WAP

Core protocols

Radio: This protocol specification defines air interface, frequency bands,


frequency hopping specifications, modulation technique used and
transmit power classes.

Baseband: Addressing scheme, packet frame format , timing and power


control algorithms required for establishing connection between
bluetooth devices within piconet defined in this part of protocol
specification.

Link Manager protocol: It is responsible to establish link between


bluetooth devices and to maintain the link between them. This protocol
also includes authentication and encyption specifications. Negotiation
of packet sizes between devices can be taken care by this.

Logical link control and adaptation protocol: This L2CAP protocol adapts
upper layer frame to baseband layer frame format and vice versa.
L2CAP take care of both connection oriented and connectionless
services.

Service discovery protocol: Service related queries including device


information can be taken care at this protocol so that connection can be
established between bluetooth devices.
Bluetooth protocol stack

Cable replacement protocol

Serial ports are popular to provide serial communication between


devices. Bluetooth uses RFCOMM as cable replacement protocol.
RFCOMM functions as virtual serial port and does transport of binary
digital data bits. It basically emulates RS232 specifications over
bluetooth physical layer.

Telephony Control Protocols

TCS-BIN is the protocol used here which is a bit oriented one. It


specifies call control signals and mobility management procedures.
These signals take care of establishing speech and data calls.

Adopted protocols

These protocols are already defined by other standard bodies which are
incorporate without any change in the bluetooth protocol stack
architecture. The protocols are PPP,TCP/UDP/IP,OBEX and WAE/WAP.

PPP is a point to point protocol used to transfer IP datagrams.

TCP/UDP and IP are part of basic TCP/IP model, for more refer our
article on Basics of OSI and TCPIP layers.

OBEX is a object exchange protocol developed by IrDA and it is similar


to HTTP. It is a session level protocol.

WAE and WAP provides Wireless Application Environment and WAP


provides Wirelesss Application Protocol.
BLE (Bluetooth Low Energy) Links

Q. 5 Give a very short note on Bluetooth Security.

It is a wireless technology therefore susceptible to spying and remote


access.

Bluetooth offers several security modes.

Bluetooth users can establish "Trusted devices"that can exchange


data without asking permission.

When any other device tries to establish a connection to the users


gadget,the user has to decide to allow it.

"Service level security" and "Device level security" work together to


protect Bluetooth devices from unauthorized data transmission.

Security methods includes authorization and identification


procedures that limit the use of Bluetooth services to the registered
user and require that users make a conscious decision to open a file or
accept data transfer.

Services can have one of 3 security levels:-

Level 1: Open to all devices,the default level.

Level 2: Authentication only,fixed PIN

Level 3: Requires authentication and authorization PIN number must be


entered

Link level security:

This is implemented bye symmetric keys in a challenge response


system.

Critical Ingredients: PIN, BD_ADDR, RAND(), Link and encryption keys.

PIN: It is up to 128bit number,can be fixed.Can be entered in both the


devices.
BD_ADDR: Bluetooth device address-It is unique 48 bit sequence.Device
must know the address for communication.

Link key: 128 bit random number is used for authentication


purposes.Paired devices share a link key.

Private encryption key: 8-128 bits key regenerated for transmission


from link key.

RAND: Frequently changing 128 bit,Random number generated by the


device.

Q. 6 Provide essence of radio frequency identification

How does RFID work? A Radio-Frequency IDentification system has


three parts:

A scanning antenna

A transceiver with a decoder to interpret the data

A transponder - the RFID tag - that has been programmed with


information.

The scanning antenna puts out radio-frequency signals in a relatively


short range. The RF radiation does two things:

It provides a means of communicating with the transponder (the RFID


tag) AND

It provides the RFID tag with the energy to communicate (in the case
of passive RFID tags).

This is an absolutely key part of the technology; RFID tags do not need
to contain batteries, and can therefore remain usable for very long
periods of time (maybe decades).

The scanning antennas can be permanently affixed to a surface;


handheld antennas are also available. They can take whatever shape
you need; for example, you could build them into a door frame to
accept data from persons or objects passing through.

When an RFID tag passes through the field of the scanning antenna, it
detects the activation signal from the antenna. That "wakes up" the
RFID chip, and it transmits the information on its microchip to be picked
up by the scanning antenna.

In addition, the RFID tag may be of one of two types. Active RFID tags
have their own power source; the advantage of these tags is that the
reader can be much farther away and still get the signal. Even though
some of these devices are built to have up to a 10 year life span, they
have limited life spans. Passive RFID tags, however, do not require
batteries, and can be much smaller and have a virtually unlimited life
span.

RFID tags can be read in a wide variety of circumstances, where


barcodes or other optically read technologies are useless.

The tag need not be on the surface of the object (and is therefore not
subject to wear)

The read time is typically less than 100 milliseconds

Large numbers of tags can be read at once rather than item by item.

In essence, that's how RFID works.


Q. 7 Draw RFID System Components (block diagram).

Three Main Components of a RFID System

RFID tag:

RFID Reader:
Q. 8 differentiate active and passive tags.
The primary difference between active and passive tags is that active
tags have their own power source (typically an embedded battery) and
passive tags rely on the RFID reader's propagation signal to power the
tag. From this primary distinction stems a variety of considerations to
make when deciding between the two types of tags. This article aims to
help aid you in deciding which type of tag — active or passive — is best
for your business application by laying out some of the most pivotal
factors you should consider.
Q. 10 write a short note on mobile IP.
Mobile IP is a communication protocol (created by extending Internet
Protocol, IP) that allows the users to move from one network to
another with the same IP address. It ensures that the communication
will continue without user’s sessions or connections being dropped.
Terminologies:
Mobile Node (MN):
It is the hand-held communication device that the user caries e.g. Cell
phone.
Home Network:
It is a network to which the mobile node originally belongs to as per
its assigned IP address (home address).
Home Agent (HA):
It is a router in home network to which the mobile node was
originally connected
Home Address:
It is the permanent IP address assigned to the mobile node (within its
home network).
Foreign Network:
It is the current network to which the mobile node is visiting (away
from its home network).
Foreign Agent (FA):
It is a router in foreign network to which mobile node is currently
connected. The packets from the home agent are sent to the foreign
agent which delivers it to the mobile node.
Correspondent Node (CN):
It is a device on the internet communicating to the mobile node.
Care of Address (COA):
It is the temporary address used by a mobile node while it is moving
away from its home network.
Working:
Correspondent node sends the data to the mobile node. Data packets
contains correspondent node’s address (Source) and home address
(Destination). Packets reaches to the home agent. But now mobile node
is not in the home network, it has moved into the foreign network.
Foreign agent sends the care-of-address to the home agent to which all
the packets should be sent. Now, a tunnel will be established between
the home agent and the foreign agent by the process of tunneling.
Tunneling establishes a virtual pipe for the packets available between a
tunnel entry and an endpoint. It is the process of sending a packet via a
tunnel and it is achieved by a mechanism called encapsulation.
Now, home agent encapsulates the data packets into new packets in
which the source address is the home address and destination is the
care-of-address and sends it through the tunnel to the foreign agent.
Foreign agent, on other side of the tunnel receives the data packets,
decapsulates them and sends them to the mobile node. Mobile node in
response to the data packets received, sends a reply in response to
foreign agent. Foreign agent directly sends the reply to the
correspondent node.
Key Mechanisms in Mobile IP:
Agent Discovery:
Agents advertise their presence by periodically broadcasting their
agent advertisement messages. The mobile node receiving the agent
advertisement messages observes whether the message is from its own
home agent and determines whether it is in the home network or
foreign network.
Agent Registration:
Mobile node after discovering the foreign agent, sends registration
request (RREQ) to the foreign agent. Foreign agent in turn, sends the
registration request to the home agent with the care-of-address. Home
agent sends registration reply (RREP) to the foreign agent. Then it
forwards the registration reply to the mobile node and completes the
process of registration.
Tunneling:
It establishes a virtual pipe for the packets available between a tunnel
entry and an endpoint. It is the process of sending a packet via a tunnel
and it is achieved by a mechanism called encapsulation. It takes place to
forward an IP datagram from the home agent to the care-of-address.
Whenever home agent receives a packet from correspondent node, it
encapsulates the packet with source address as home address and
destination as care-of-address.
Route Optimization in Mobile IP:
The route optimization adds a conceptual data structure, the binding
cache, to the correspondent node. The binding cache contains bindings
for mobile node’s home address and its current care-of-address. Every
time the home agent receives a IP datagram that is destined to a mobile
node currently away from the home network, it sends a binding update
to the correspondent node to update the information in the
correspondent node’s binding cache. After this the correspondent node
can directly tunnel packets to the mobile node.

You might also like