Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Problem:

For this task you will have to design a system for text message communication after a major disaster, for example, after a major earthquake, tsunami, or hurricane. This system is motivated by the difficulties experienced in getting emergency help after a major disaster has rendered land-based communications useless in a large radius in the disaster area. For example, after Hurricane Katrina, most land-based communications systems failed immediately or shortly after the disaster [1]. This text message system would provide an alternative method for people to send short messages with the outside world (and perhaps receive replies), including with emergency personnel. As another example, after the March 2011 Japan earthquake and tsunami, twitter and email became important ways for people to find each other after transportation and cellular systems failed. This system could allow people to send messages announcing where they are, and if they need emergency assistance. This system would potentially allow emergency personnel to coordinate rescue operations.

Design Restrictions

One of the major problems with communications after a disaster is that everyone wants to communicate -- systems become overwhelmed with requested bandwidth and blocked by high traffic. You may, in your system design, restrict people to short text messages (like Twitter's 140 characters, for example), which forces them to communicate only the most critical information. You may restrict the number of messages per user (However, emergency personnel must not have a restriction on the number of messages they may send). In this manner, your system can limit the total bit rate of messages that are being generated.

Your system is allowed to use any ISM band (for example, the 83 MHz of bandwidth from 2400 to 2483 MHz). Assuming that this system will be used as an alternative communication system when all power is out, we can assume that 802.11 access points have all failed, cordless phones don't work, and thus the major sources of interference in these bands are gone. You don't necessarily need to meet FCC requirements for ISM band operation -- I assume that if your system is sufficiently beneficial to the public, the FCC would be willing to make an exception for your system during disaster situations.

You may not rely on electric power from the grid -- we can assume power has been lost, and will be out for days or weeks. You may not rely on cellular voice or data systems, or paging infrastructure, or telephone lines, or broadband internet services, anywhere within the disaster area. You may assume that these exist outside of the disaster area. Whatever (wireless device) equipment (which I term the user device) that you expect people to have in a major disaster, you must ask them to buy it today (not during the disaster). So a very low price for the user device is important, and it should be of a size that they can put in their emergency kit and forget about (until they need it). You might expect a small fraction of people (eg, hospitals, emergency personnel) to own more larger or more expensive equipment, which I refer to as infrastructure devices. To be specific, when needed in your system design, consider that a major earthquake strikes Salt Lake County, and no ground communications exist in the county, and ground communications are possible but significantly impaired in neighboring counties. This should include technical specifications of how the system will work:

1. Description of the user device(s), including components of the hardware

2. Description of the any communication link, including link budget, modulation, multiple access mechanism, transmit power and receiver sensitivity, etc.

3. Evaluation of the probability of blocking, or probability that a user's message will be lost by your system

4. Power source(s) for any user or infrastructure devices

5. An approximate cost for the devices

6. Robustness of the system: Why will this system be able to operate after a large-scale disaster?

Additional Information:

This question is from Computer Science and it is about designing text message communication system. The communication system must have specifications which can manage high surge of communication requests throughout the time of emergencies. So, the system has to have restrictions upon the number of messages being sent, or number of characters in the message, etc. The solution covers these and others in much detail.

Total Word Limit: 581 Words

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91399691
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Computer Engineering

You get hired as a machine learning expert at moviescom

You get hired as a Machine learning expert at movies.com. Your task on day one is to improve the performance of a classifier. You divide the data into 2 parts training, and testing. You learn a model from the training da ...

With more persons working from home how does one separate

With more persons working from home, how does one separate data intended for the employer form what might be considered personal property? What policies could be put in place to ensure employees adhere to safe guidelines ...

Question answer both question with minimum 150 words each

Question: Answer both question with minimum 150 words each. Provide examples and references. 1. Data Anomalies - Explain in your own words using tables from your lab project. Also describe how such anomalies could be pre ...

Question 1 suppose i need 10 bits to specify the offset

Question 1 : Suppose I need 10 bits to specify the offset within a page and 22 bits to specify the virtual page number and 18 bits to specify the physical page number. How big is a page in bytes? How big is the virtual m ...

Question recall the optimal page replacement algorithmthe

Question : Recall the optimal page replacement algorithm. The victim page chosen by the algorithm is the one that will not be used the longest period of time. Can this algorithm exhibit Belady's anomaly? Justify your ans ...

Question what would be the impact of predictive modeling on

Question: What would be the impact of predictive modeling on healthcare and medicine? Can predictive modeling replace managerial or medical personnel? 500 word The response must be typed, single spaced, must be in times ...

Question why are the error terms in cross-sectional data

Question: Why are the error terms in cross-sectional data unlikely to be serially correlated? Can you give an example in which serial correlation could be present in a cross-sectional dataset? The response must be typed, ...

In unix programming ordinarily the exec system call follows

In UNIX programming, ordinarily the exec() system call follows the fork() call. Explain what would happen if a programmer were to inadvertently place the call to exec() before the call to fork().

Introduction to software developmentmenu-driven

Introduction to Software Development Menu-Driven Programs TASKS: Language translator. Design a program that display the following menu: Select a language and I will say Good Morning English Italian Spanish German End the ...

Discuss how a successful organization should have the

Discuss how a successful organization should have the following multiple layers of security in place for the protection of its operations: Information security management. Data security Network security

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As