You are on page 1of 5

MIDlet is the basic execution unit in J2ME and it is in different states in different

point of its execution. When you launch an application, operating system loads it
up. There are three basic states of a MIDlet:
1. PAUSED
2. DESTOYED
3. ACTIVE
The names are self explanatory. When the application initially loads, its in the
PAUSED state. When application starts execution, it transitions from PAUSED to
ACTIVE state but before going to active state, startApp() method of the MIDlet is
called which you must implement in your MIDlet class.
There are several instances where you yourself or the operating system will
request your MIDlet to be paused for example in an event of an incoming call.
When your application is requested to be paused, it goes from ACTIVE to PAUSED
state and before it gets pasued, pauseApp() method is executed. If you want to
stop or pause any running threads in your app while it is in paused state, you
should write your code in pauseApp() method.
And whenever you exit your application, it will transition from the ACTIVE or
PAUSED state to a DESTROYED state. In destroyed state, all resources are deallocated and the application process is killed. If you want to run some code at
the exit time of your applicatin, like closing network connections and storage
devices, you should write your code in destroyApp() method of your MIDlet class.
Following diagram gives a clear picture of the MIDlet lifecycle in J2ME
applications.

TAPI (Telephony Application Program Interface): is a standard program interface that lets
you and your computer "talk" over telephones or video phones to people or phone-connected

resources elsewhere in the world. Assuming your computer is equipped with TAPI and your
setup includes the right application and hardware, you may be able:

Call someone by clicking on their picture or other image

Use a similar graphical user interface (GUI) to set up a conference call and then
attend the call at the scheduled time

See who you're talking to individually or at a conference call

Add a voice note to an e-mail note you send or listen to a voice note attached to an email note you receive

Program your computer to automatically receive phone calls from certain numbers
(but not from others)

Send and receive faxes

Do these things from a portable wireless cellular telephone/computer as well as from


a desktop computer

Developed jointly by Intel and Microsoft, TAPI is included with the Windows 95/98
andWindows NT operating system. Using TAPI, programmers can take advantage of different
telephone systems without understanding all their details. Each phone system hardware
provider provides a specific software driver that interfaces directly with the hardware.
TAPI provides a high-level interface for dialling and disconnecting. Instead of having to
encode an ATDT dial string and the ATH disconnect string, the programmer codes a much
simpler "function call."

1. Frequency reuse is the practice of using the same frequencies within a network more than
once to increase volume and efficiency.
2. To avoid any interference, wireless systems will isolate identical frequencies from each
other.
3. Each cellular base station is allocated a group of radio channels to be used within a small
geographic area called a cell.
3. Base stations in adjacent cells are assigned channel groups which contain completely
different channels than neighbouring cells.
4. Base station antennas are designed to achieve the desired coverage within a particular
cell.
5. By limiting the coverage area within the boundaries of a cell, the same group of channels
may be used to cover different cells that are separated from one another by geographic
distances large enough to keep interference levels within tolerable limits.
6. The design process of selecting and allocating channel groups for all cellular base stations
within a system is called frequency reuse or frequency planning.
7. Frequency reuse allows increase in the number of customers that can be served within a
geographic area on a limited number of radio channels.

Architecture of CDMA system:

MS:Mobile Station,BSC:Base Station Controller,BTS:Base Transceiver


Station,MSC:Mobile Switching Center,VLR:Visitor Location Register,HLR:Home
Location Register, AUC:Authentication Center,MC:Message Center

1. Base Station Sub-systems Function: It provides stem between wireless part and
fixed part of PLMN network.
BSC:It performs the controlling function and management.
BTS:It is in charge of wireless transmission.
2. Mobile Switching Sub-systems Function:

CDMA switching function

Manage mobile subscriber data


Manage database for mobile service
Interface between CDMA network and other network (such as PSTN, other PLMN

etc.).

It includes 4 function units:


---MSC

---VLR

---HLR

---AUC

1)Mobile Switching Center(MSC)


It is responsible for setting up, managing and clearing connections as well as routing
the calls to the proper user. It provides the network interfaces.MSC get data for call
handling from 3 databases: VLR/HLR/AUC

2)Visitor Location Register(VLR)

VLR is a dynamic database used by MSC for information index. It stores all related
information of mobile subscribers that enter its coverage area, which enables MSC to
set up incoming and outgoing calls.

Subscriber parameters include: subscriber number, location area identity(LAI), users


status, services which subscriber can use and so on.

When the subscriber leaves this area, it should register in another VLR, and the
previous VLR will delete all the data about this subscriber.

VLR can be built together with the MSC or separately.

3) Home Location Register (HLR)

HLR: It is a static database. When a user apply for mobile service, all data about this
subscriber will be stored in HLR.

Information:
----Subscriber information , service information and valid term.
----The mobile subscriber location), so as to set up the call route to the MS.
HLR can be built together with the MSC or set separately.

4) Authentication Center
It is an entity to prevent illegal subscribers from accessing CDMA network. It can
generate the parameter to confirm the subscribers identity. At the same time it can encrypt
users data according to users request.

You might also like