Thursday, June 17, 2010

Wednesday, March 17, 2010

QR Code

QR Code:
The two dimensional barcode (matrix code) is named as Quick Response (QR) code. The decoding response of the QR code is comparatively very fast.
The QR code is first created by Japanese organization Denso-wave in 1994 for tracking purpose. The main aim was to decode it by scanning equipment easily. Now a day’s it’s widely used to store address and URL in magazines, for monitoring the product ID or price values, tracing the admin work and showing the images on screen. Most of the mobile devices have inbuilt QR code Reader application.



QR code contains the information in both (vertical and horizontal) directions. QR code can hold comparatively more information that one direction Barcode.
Date Type:
User can encode Numeric, Alphanumeric, symbol, Kanji, Kana, Hiragana, binary and control codes in QR code. QR code can contain up to 7,089 characters in one symbol. The information stored in QR code depends upon the mixing of numbers, Alphanumeric and other characters.
Data Capacity:

Error Correction Level:
The error correction algorithm can recover the data from the QR symbol even when the symbol is very damage.
The ECC levels are:
L Level: Approx 7% code can restored
M Level: Approx 15% code can restored
Q Level: Approx 25% code can restored
H Level: Approx 30% code can restored
Recognition rates:
The recognition algorithm can overcome multiform defects as scratch, damage, fuzzy image etc. The recognition rate depends upon the QR symbol image quality and number of pixels.
QR Symbol Version:
The QR symbol version range is 1 to 40.Each version has different module configuration and the range of encoded characters. The version 1 module 21x21 version2 module 25x25 and so on. Every version has different encoding data capacity.
QR code Reader:
The QR code Reader is the application which can decode the QR code. Now a days so many mobile applications are there where application uses the camera fetch the image from either paper or wall or from other medium and decode the QR code and display the result on the Screen.
I have also developed an application “QR Reader” for Symbian devices where application reads the image through camera and process the image in decoding library and send the QR data as a SMS to some distant receiver or open the link as webpage.

Thursday, April 30, 2009

An overview of 3G-UMTS Network


The network architecture describes all the network elements and the existing physical link between the network elements. The architecture defines the functionality of each network elements and their interaction with other network elements.

The UMTS (Universal mobile telecommunication system) is a 3G (Third generation) wireless system. The UMTS uses a wideband CDMA technology for transmission, and a more efficient modulation than the GSM (2nd Generation). This allows UMTS to reach higher utilization, and offer higher bandwidth to end user. UMTS offers bit rates up to 2Mbps for users.

UMTS consists of three domains:
1. Core network (CN)
2. UMTS terrestrial Radio access network (UTRAN)
3. User Equipment (UE)



A 3G network includes two main sections: a packet switched core network (PS-CN), which is based on IP, and one or more Radio access network (RAN). Each RAN is divided into subsystems, each consisting of one controller, called Base station controller (BSC) in GPRS and Radio network controller (RNC) in UMTS, connected to several Base Transceiver station (BTSs).

The interfaces involved in 3G network are: Iu, Iub, and Iur. The Iu interface is an interface between RNC and Core network elements. The Iub interfaces exist between the Node B and RNC. The Iur interfaces exist between the two RNCs. Additionally Uu represents Air interface between user equipment (UE) and Node B.
WCDMA is used in UTRAN air interface. WCDMA has two mode of operation: Frequency division duplex (FDD) and Time division duplex (TDD).

The functionalities of Node B:
1.Air interface transmission/reception
2.Modulation/Demodulation
3.CDMA physical channel coding
4.Micro diversity
5.Error Handling
6.Closed loop power control

The functionalities of RNC are:
1.Radio Resource control
2.Admission control
3.Channel allocation
4.Power control settings
5.Handover control
6.Macro diversity
7.Ciphering
8.Broadcast signaling
9.Open loop power control

User equipment (UE) has the same identity pattern as GSM.
1.International mobile subscriber identity (IMSI)
2.Temporary mobile subscriber identity ( TMSI)
3.Mobile station ISDN (MSISDN)
4.International mobile station equipment identity (IMEI)
5.Other patterns.