Design of free text message communication system

Assignment Help Basic Computer Science
Reference no: EM13829829

Problem:

For this task you will have to design a system for text message communication after a major disaster, for example, after a major earthquake, tsunami, or hurricane. This system is motivated by the difficulties experienced in getting emergency help after a major disaster has rendered land-based communications useless in a large radius in the disaster area. For example, after Hurricane Katrina, most land-based communications systems failed immediately or shortly after the disaster [1]. This text message system would provide an alternative method for people to send short messages with the outside world (and perhaps receive replies), including with emergency personnel. As another example, after the March 2011 Japan earthquake and tsunami, twitter and email became important ways for people to find each other after transportation and cellular systems failed. This system could allow people to send messages announcing where they are, and if they need emergency assistance. This system would potentially allow emergency personnel to coordinate rescue operations.

Design Restrictions

One of the major problems with communications after a disaster is that everyone wants to communicate -- systems become overwhelmed with requested bandwidth and blocked by high traffic. You may, in your system design, restrict people to short text messages (like Twitter's 140 characters, for example), which forces them to communicate only the most critical information. You may restrict the number of messages per user (However, emergency personnel must not have a restriction on the number of messages they may send). In this manner, your system can limit the total bit rate of messages that are being generated.

Your system is allowed to use any ISM band (for example, the 83 MHz of bandwidth from 2400 to 2483 MHz). Assuming that this system will be used as an alternative communication system when all power is out, we can assume that 802.11 access points have all failed, cordless phones don't work, and thus the major sources of interference in these bands are gone. You don't necessarily need to meet FCC requirements for ISM band operation -- I assume that if your system is sufficiently beneficial to the public, the FCC would be willing to make an exception for your system during disaster situations.

You may not rely on electric power from the grid -- we can assume power has been lost, and will be out for days or weeks. You may not rely on cellular voice or data systems, or paging infrastructure, or telephone lines, or broadband internet services, anywhere within the disaster area. You may assume that these exist outside of the disaster area. Whatever (wireless device) equipment (which I term the user device) that you expect people to have in a major disaster, you must ask them to buy it today (not during the disaster). So a very low price for the user device is important, and it should be of a size that they can put in their emergency kit and forget about (until they need it). You might expect a small fraction of people (eg, hospitals, emergency personnel) to own more larger or more expensive equipment, which I refer to as infrastructure devices. To be specific, when needed in your system design, consider that a major earthquake strikes Salt Lake County, and no ground communications exist in the county, and ground communications are possible but significantly impaired in neighboring counties. This should include technical specifications of how the system will work:

1. Description of the user device(s), including components of the hardware

2. Description of the any communication link, including link budget, modulation, multiple access mechanism, transmit power and receiver sensitivity, etc.

3. Evaluation of the probability of blocking, or probability that a user's message will be lost by your system

4. Power source(s) for any user or infrastructure devices

5. An approximate cost for the devices

6. Robustness of the system: Why will this system be able to operate after a large-scale disaster?

Additional Information:

This question is from Computer Science and it is about designing text message communication system. The communication system must have specifications which can manage high surge of communication requests throughout the time of emergencies. So, the system has to have restrictions upon the number of messages being sent, or number of characters in the message, etc. The solution covers these and others in much detail.

Total Word Limit: 581 Words

Reference no: EM13829829

Questions Cloud

Determine the probability of an underweight sack : What is the probability that the door will actually open - Supply a probability tree and determine the probability of an underweight sack.
Discuss the physical issues associated with late adulthood : Discuss the physical issues associated with late adulthood. Include the major theorists who contributed to the area in your discussion. Discuss the social issues associated with middle adulthood. Include the major theorists who contributed to the ..
Ideal vacation spot based on a user name : Please find the sample program in the Solution, that uses Java's built in ArrayList to pick an ideal vacation spot based on a user's name. Update the code below to use the generic ArrayManipulator user-defined module that you implemented instead o..
What environmental factors could you change to live longer : Ferrini & Ferrini (2013) lists a number of factors that influence longevity. For each one, write a brief paragraph describing the impact of these genetic and environmental factors on your own longevity. What environmental factors could you change t..
Design of free text message communication system : For this task you will have to design a system for text message communication after a major disaster, for example, after a major earthquake, tsunami, or hurricane.
Evaluate the potential effects introducing : Evaluate the Potential Effects Introducing Environmental Legislation using Free-Market and Pro-Regulatory Approach
Explains about privacy and issue of nsa tapping phone calls : The problem is an article and it is explains about privacy and the issue of NSA tapping phone calls of American citizens and says that reason for this is to stop terrorist activities by listening to what people are saying.
Are genetically modified food products save for humans : Topic: Are Genetically Modified Food products save for humans consumption? List the possible ethical issues, such as consideration of characteristics of your sample, type of data collection, potential for bias, and so forth
Differencebetween grassroot lobbying and grassroot mellowing : difference between grassroots lobbying and grassroots mellowing

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the total cost for replacement

If you cannot find a good match for your current system, what might have to be purchased (processor, memory, etc.)? What is the total cost for replacement?

  Mechanism that one app uses

What is the mechanism that one app uses to signal to another app that its cooperation is requested to accomplish something.

  Why deployment of ipv6 has been slow to date

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  Thread problem

Implement what is kind of the inverse of our Producer - Consumer, where many Producers supply a limited capacity consumer.

  Create a list containing the union of the elements

Create a list containing the union of the elements of the two lists? Insert an element after the nth element of the list.?

  Wrtie a recursive boolean function named ismember

wrtie a recursive boolean function named isMember that accepts two arguments: an array and a value. Teh function shourld return true if the value is found in the array, or false if the value is not found in the array.

  Write a mobile app

Write a mobile app (using TouchDevelop) that calculates the sum (which computes e×) of n + 1 terms as

  Write the create index statements to create clustered index

Write the create index statements to create a clustered index on the groupid column and a nonclustered index on the individualid column of the groupmembership table.

  Finding slowest clock rate used and not lose any data

What is the slowest clock rate that could be used and not lose any data? Assume that the number of instructions to be processed for an interrupt is constant.

  Using sequential logic, counters and shift registers propose

using sequential logic, counters and shift registers propose a more complex system utilizing some of the more complex sub systems. example a motion acitavated light. Needs to be somthing other then a light example like motors or somthing

  Explain the difference between project-based and

prepare a list of it project-based tasks in an organization where you have worked. if you have not worked in any

  Explain your plan for implementing cobit for gardner novelty

Explain your plan for implementing COBIT for Gardner Novelties

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd