Development of Communication Software for Mobile Computing
|
|
- Doris Lambert
- 6 years ago
- Views:
Transcription
1 Development of Communication Software for Mobile Computing 246 Development of Communication Software for Mobile Computing Susumu Matsui Yasuhiro Takahashi Takeshi Kondo OVERVIEW: The mobile computing market is expected to take off soon as a number of factors come into play. These factors include the rapid growth in the cellular subscriber base, standardization of a next-generation mobile communications network (IMT-2000) capable of high-speed multimedia communications, and escalated use of notebook and handheld personal computers and personal digital assistants. One objective of mobile computing is to provide the mobile environment with a means of information processing on a par with that of the office environment. Compared with the latter, however, the former suffers from low data speeds, poor communications quality, high connection costs, and low security. These problems must be addressed to make mobile computing successful, and to this end, Hitachi has developed four key technologies: Secure Socket, which compresses and encrypts data; Mobile Message Queue; DB Partner Mobile; and Web Access Agent, which accesses s on behalf of a portable terminal. This paper overviews these technologies and describes their role in mobile computing. INTRODUCTION THE explosive growth of the Internet and the expanding use of groupware like parallel an increasing need for rapid communications and access to various types of information in business activities. What this means is that mobile computing, which professes to provide communications anytime and anywhere, is fast becoming an indispensable information platform for business. To achieve viable mobile computing, however, a variety of technical issues must be dealt with. These include means for achieving compact and light terminals, high-speed and high-reliability wireless communications networks, and mobile middle software to deal with the low speed and low reliability inherent in mobile communications. Among these issues, we focus here on mobile middle software, and how Hitachi is solving the problems in this area. RECENT TRENDS IN MOBILE COMPUTING To examine the current environment surrounding mobile computing, we first look at the number of portable terminals shipped domestically. In 1998, this came out to 3,400,000 notebook PCs, 1) 1,300,000 portable information terminals, 2) and 200,000 smartphones. 2) Next, while the communication environment for mobile computing consists of both the fixed-wire communication network and the wireless communication network, recent years have seen a remarkable growth in the subscriber base for the wireless network. As of the end of February 1999, the numbers of cellular subscribers and personal handy phone system (PHS) subscribers were 40,500,000 and 5,780,000, respectively, giving a total of 46,280,000 subscribers. 3) These numbers reflect an annual growth of at least 30%, which means that the number of subscribers to the wireless network should surpass that of the fixed network (60,000,000 subscribers) in the year Table 1 lists typical data speeds of wireless and fixed communication networks. At present ISDN features the highest data speed, 128 kbit/s, but this is about two orders of magnitude slower than the 10-Mbit/s standard speed of an office TABLE 1. Data Speeds of Wireless and Fixed Networks Network type PDC Cellular cdmaone PHS PSTN (modem) ISDN Transmission scheme Packet switching PDC: personal digital cellular PSTN: public switched telephone network ISDN: integrated services digital network Data speed 9.6 kbit/s 28.8 kbit/s 14.4 kbit/s kbit/s 56 kbit/s kbit/s
2 Hitachi Review Vol. 48 (1999), No environment. In the future, however, communications speeds from 384 kbit/s to 2 Mbit/s can be expected in conjunction with the IMT-2000 (International Mobile Telecommunications-2000) standard under which services are scheduled to begin in 2001 in Japan. is driving the demand for mobile computing. At the same time, handsets with built-in browsers are beginning to appear, and the number of mobile computing users may exceed 20,000,000 in ) Meanwhile, a survey targeting the corporate world has revealed that about one-fourth of the surveyed companies have already introduced mobile computing in one form or another; and of those companies that have not yet done so, about one-half intend to. This survey also predicted large growth in the mobile computing market. EXISTING PROBLEMS WITH MOBILE COMPUTING As mentioned in the previous section, the demand for mobile computing is high. However, a number of issues concerned with providing the mobile environment with means of information processing on a par with that of the office environment still remain. These issues include hardware ones like how to produce compact and light terminals, but here we focus on the following issues related to mobile software. Low data speeds Communication speeds in the mobile environment are about two orders of magnitude slower than that in the office environment. Most existing applications are prepared with the office environment in mind, and they are extremely cumbersome to use as such in the mobile environment. Poor communications quality Stable communications can generally be achieved in the office environment. On the other hand, communications quality may significantly deteriorate according to the location in the mobile environment, especially in the wireless communication environment. High connections costs Communication in the office environment is generally free. In the mobile environment using circuit switching, however, communication cost depends on connection time. In contrast, in the case of packet switching, communication cost depends on the volume of data transferred, but even here the cost is high at present. PPP: point-to-point protocol Browser Mobile computing Web access proxy DB partner mobile client Web access agent DB partner mobile base platform Mobile message queue client base platform Mobile message queue client DB Web Enterprise TCP/IP / PPP TCP/IP Mobile phone Network Remote access Fig. 1 Configuration of a Mobile Computing System. Using mobile computing, it is possible to access efficiently to the enterprise from the terminal.
3 Development of Communication Software for Mobile Computing 248 Low Security The office environment uses firewalls to block out the outside wired world. In the mobile environment, however, one enters the office environment from the outside. Extra security, such as authentication, must therefore be considered. Encrypting of transferred data is also necessary. RAS Server Environment changes according to location It is common in the office environment to work at one location and on one terminal. In the mobile environment, however, it is not rare for the user to move from one location to another and to even use a variety of terminals. This makes it necessary to change various terminal settings. HITACHI S CURRENT MOBILE COMPUTING SOFTWARE As already mentioned, a number of problems must be solved to make mobile computing a reality. Hitachi has developed several approaches for solving these problems; that is Secure Socket, Mobile Message Queue, and DB Partner Mobile, which have already reached the product stage, and Web Access Agent, which is currently under development. Fig. 1 shows the mobile computing system that contains these technologies. Secure Socket Secure Socket can be installed in terminals and s. It consists of software that authenticates a terminal at the and compresses and encrypts data transferred between the terminal and the. Secure Socket may also be installed on a firewall instead of on s. In this case, it becomes possible to authenticate a terminal at the firewall and compress/ encrypt data transferred between the firewall and the terminal. Fig. 2 shows the configuration of a system using Secure Socket, which has the following features and functions: (1) Applicable to existing communication applications Existing communication applications often use TCP/IP as a communication protocol and many of them have been developed on a socket application program interface (API). Secure Socket is logically placed between the application and the socket library. Secure Socket itself supports socket API (Fig. 3) and provides authentication and data compression/ encryption without having to modify the existing communication application. (2) Authentication conforming to international Internet FW Server : : client RAS: remote access FW: firewall Fig. 2 Configuration of a System Using Secure Socket. Using Secure Socket, it is possible to perform compression/ encryption of data transferred between the terminal and / firewall. standards Secure Socket adopts a mutual authentication scheme in which a certificate issued from the side is used as a basis for challenge and response actions. This scheme is specified by ISO/IEC9798. It provides a level of authentication that is safer and more powerful than the general scheme based on user IDs and passwords. (3) Data compression and encryption Communication devices like modems normally support data-compression functions. However, as redundancy is lost if data is encrypted, the efficiency of data compression is poor if performed at a communication device for encrypted data. For this reason, a function for compressing transfer data is also supported by Secure Socket. Moreover, by focusing on similar points between data compression processing and encryption processing, Secure Socket can both compress and encrypt data by linked processing. Hitachi s data compression function compresses text data by 50% and its MULTI2 encryption technology provides strong encryption. Mobile Message Queue Mobile Message Queue (MMQ) operates on a terminal and a mobile computing installed in offices and is progressing with the aim of compensating for the low speed and high connection cost of the mobile environment. A client software that
4 Hitachi Review Vol. 48 (1999), No matches the MMQ is installed in a terminal, and an agent software that matches the MMQ is installed in the mobile computing corresponding to an application. The client software in the terminal issues processing instructions to the agent software in the mobile computing, and on the basis of these instructions, the agent software accesses the and returns only results to the client software. In short, the process for accessing the becomes asynchronous. The traffic generated by issuing process instructions and returning results is smaller than that would normally be required to access the sever directly. Adopting asynchronous processing in this way makes it possible to decrease the volume of transferred data in the mobile environment. In addition, as the terminal and the mobile computing need only communicate in order to issue process instructions and return results, the connection can be released while the is being accessed by the agent software; therefore, connection costs are lowered. DB Partner Mobile DB Partner Mobile is a database access application software and processes on top of the MMQ. It consists of DB Partner Mobile Client (the client software described in the previous section Mobile Message Queue and DB Partner Mobile Server (the agent software described in the previous section). In DB Partner Mobile Server, processing scripts that describe the DB access conditions, access time, etc. are registered in advance. DB Partner Mobile Server receives processing instructions, accesses DB according to the instructions and returns the results to DB Partner Mobile Client. The registration tool of procession scripts and operation interfaces are prepared, so it is possible to be customized for fitting to business. Web Access Agent When using MMQ, we must develop terminal-side software as well as agent software for each application. Moreover, although a message communication by MMQ is highly reliable and functional communication that have message tracking or canceling function, it is necessary to develop MMQ software for each kind of terminals. Enterprise systems are becoming increasingly linked to Web s, thus allowing users to access company s via Web pages. We are therefore developing Web access agent technology that does not constrain this function. Linking the enterprise systems and the Web is accomplished by a common gateway interface (CGI). Through this interface, a terminal can access various s through a CGI program within the Web. A Web Access Agent makes use of this mechanism in asynchronously initiating a CGI program. The following two points give a more detailed description of this process. (1) The terminal possesses a replica of the Web page used for accessing the, and with this replica, the terminal can set parameters for running a CGI program via offline processing. (2) Communications between the terminal and the mobile computing (issuing process instructions including the CGI parameters and receiving results from the mobile computing ) take place through MMQ and . This means that even if the MMQ software is not installed in the user's terminal, and even if the user is in an environment in which communications between the terminal and the mobile HTML & browser FTP HTTP News HTML: hypertext markup language HTTP: hypertext transfer protocol FTP: file transfer protocol TCP: transmission control protocol IP: Internet Protocol PPP: point-to-point protocol Socket I/F Socket I/F TCP IP PPP Fig. 3 Software Configuration of Secure Socket System. Secure Socket itself supports socket I/F and provides authentication and data compression/encryption without having to modify the existing communication application.
5 Development of Communication Software for Mobile Computing 250 Request Mobile agent access CGI Via Mobile agent Web Replica of Web page (change initiate CGI) Condition Search Product original CGI initiation information Original CGI initiation information Access to Web and initiate original CGI Condition Search CGI Result Access Save result to Web page Via Receive result Web page Result Web page <Search result> Enterprise Fig. 4 Flow of Asynchronous CGI Access. Mobile agents make use of the mechanism in a function that asynchronouly initiates CGI program. computing cannot take place, instructions for asynchronous processing can still be delivered as long as the environment allows to be used. The process flow of CGI asynchronous access is shown in Fig. 4. CONCLUSIONS This report has described Hitachi's current work on mobile middle software for mobile computing. The use of mobile computing is expected to become widespread in the coming years, and to support this growth, more technologies than just the ones described here will be required. Research and development work in this area will therefore continue with the goal of achieving a thorough product system. REFERENCES (1) Japan Electronic Industry Development Association ( (2) Mobile Computing Promotion Consortium ( club.pep.ne.jp/mcpchp/). (3) Statistical Data of the Ministry of Posts and Telecommunications ( index.html). ABOUT THE AUTHORS Susumu Matsui Joined Hitachi, Ltd. in 1980, and now works at the communication and computing system. Mr. Matsui is a member of the IEEE, the Information Processing Society of Japan, and the Institute of Electronics, Information and Communication Engineers of Japan, and can be reached by at matsui@sdl.hitachi.co.jp Yasuhiro Takahashi Joined Hitachi, Ltd. in 1981, and now works at the computing system. Mr. Takahashi is a member of the Information Processing Society of Japan and the Institute of Electronics, Information and Communication Engineers of Japan, and can be reached by at y-takaha@sdl.hitachi.co.jp Takeshi Kondo Joined Hitachi, Ltd. in 1988, and now works at the computing system. Mr. Kondo is a member of the Information Processing Society of Japan, and can be reached by at t-kondo@sdl.hitachi.co.jp
Enabling the Wireless Internet
Enabling the Wireless Internet Presented to IEEE CVT-Dallas February 15, 2000 Barry Herbert barry.herbert herbert@nortelnetworks.com Operator Market Dynamics Price/Min in U.S. Cents 16 14 12 10 8 6 4 2
More informationPersonal Handyphone Systems in Urban Infrastructure
Personal Handyphone Systems in Urban Infrastructure Yukio Iino Mitsunobu Ootsuka Isao Shimbo ABSTRACT: The personal handyphone system (PHS) service began in Japan in 1995. As this new communication service
More informationNetwork Systems for Emerging WAN Applications
Network Systems for Emerging WAN Applications Hitachi Review Vol. 48 (1999), No. 4 169 Akihiko Takase, D.Sc. OVERVIEW: This paper describes wide-area-network architecture from the viewpoints of networking
More informationGlossary. xii. Marina Yue Zhang and Mark Dodgson Downloaded from Elgar Online at 02/04/ :16:01PM via free access
Glossary 2.5G Second-and-a-half Generation mobile communications system 3G Third Generation mobile communications system 3GPP The Third Generation Partnership Project ADSL Asymmetric Digital Subscriber
More informationDigital terrestrial television broadcasting Interactive channel
Digital terrestrial television broadcasting Interactive channel Televisão digital terrestre Canal de Inteeravidade Parte 1: Protocolos, interfaces fíisicas e interfaces de software Televisión digital terrestre
More informationWireless Access Protocol(WAP) architecture
Wireless Access Protocol(WAP) architecture While the evolution of cellular networks has resulted in many mobile services, such services are primarily for voice. Mobile phone users do have the desire to
More informationVirtual private networks
Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible
More informationSmall-cell-based Solution to Make Diverse Services Possible
Small-cell-based Solution to Make Diverse Services Possible Masanori Hashimoto Hideo Iwamoto The of Things (IoT) has brought the age of connection where everything is linked to a network, but it is also
More informationM2-R4: INTERNET TECHNOLOGY AND WEB DESIGN
M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the
More informationNext-Generation Switching Systems
Next-Generation Switching Systems Atsuo Kawai Shin ichi Iwaki Haruyoshi Kiyoku Keizo Kusaba ABSTRACT: Today, the telecommunications industry is encountering a new wave of multimedia communications for
More information1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks
Topic1: Common Network Protocols 1. What is a network protocol and why are protocols needed when two machines communicate? 2. Describe the function of each of the following protocols: a. SMTP b. HTTP c.
More informationAccessing Mainframe Applications with Wireless Devices
L I G H T Y E A R Accessing Mainframe Applications with Wireless Devices Brian Lee Software Development Manager Tel: 403-208-2455 brianlee@lightyr.com Tony Skinner Senior CICS Consultant tskinner@lightyr.com
More informationAQU Information Systems Fundamentals Spring 2012 Pg. 9.1
AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 c h a p t e r 9 THE INTERNET & THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE 9.1 LEARNING OBJECTIVES Describe features of infrastructure & connectivity
More informationON-LINE EXPERT SUPPORT THROUGH VPN ACCESS
ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS P. Fidry, V. Rakotomanana, C. Ausanneau Pierre.fidry@alcatel-lucent.fr Alcatel-Lucent, Centre de Villarceaux, 91620, Nozay, France Abstract: As a consequence of
More informationThe Internet and the World Wide Web
Technology Briefing The Internet and the World Wide Web TB5-1 Learning Objectives TB5-2 Learning Objectives TB5-3 How Did the Internet Get Started? Internet derived from internetworking 1960s U.S. Defense
More informationMemory Technologies for the Multimedia Market
Memory Technologies for the Multimedia Market Hitachi Review Vol. 50 (), No. 2 33 Katsuyuki Sato, Ph.D. Yoshikazu Saito Hitoshi Miwa Yasuhiro Kasama OVERVIEW: Different mobile multimedia-oriented products
More informationCommunications and Networks The McGraw-Hill Companies, Inc. All rights reserved.
Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,
More informationFujitsu s Approach toward the Broadband Internet Era
Fujitsu s Approach toward the Broadband Internet Era v Kiichi Matsuda v Takashi Itoh (Manuscript received November 18, 2003) Technological progress is enabling businesses and individual users to communicate
More informationHow the Web Works. Chapter 1. Modified by Marissa Schmidt Pearson
How the Web Works Chapter 1 Modified by Marissa Schmidt 2015 Pearson Fundamentals ofhttp://www.funwebdev.com Web Development Objectives 1 Definitions and History 2 Internet Protocols 3 Client-Server Model
More informationMetasys System Extended Architecture Glossary
Technical Bulletin Issue Date March 31, 2003 Metasys System Extended Architecture Glossary Key Concepts... 2 Metasys System Extended Architecture Component Acronyms... 2 Metasys System Extended Architecture
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationFeatured Articles II Security Research and Development Research and Development of Advanced Security Technology
364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by
More informationIPv6 Network Construction Support Solution: Application to the IPv6 Experimental System of IPv6 Promotion Council
Network Construction Support Solution: Application to the Experimental System of Promotion Council 36 Network Construction Support Solution: Application to the Experimental System of Promotion Council
More informationUser Guide IP Connect CSD
The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Wireless Maingate AB shall have no liability for any error or damages
More informationSolutions for Optical Access Systems as Platform for Comfortable Communication
Solutions for Optical Access Systems as Platform for Comfortable Communication 266 Solutions for Optical Access Systems as Platform for Comfortable Communication Toru Kazawa Masakazu Kitazawa Nobuaki Tajimi
More informationChildren s Health System. Remote User Policy
Children s Health System Remote User Policy July 28, 2008 Reason for this Policy This policy defines standards for connecting to the Children s Health System (CHS) network from any remote host. These standards
More informationDistributed telecommunications network access using the TMOS IntraWeb Gateway
Distributed telecommunications access using the IntraWeb Gateway Magnus Ekhed, Peter Gundersen and Olav Queseth In an increasingly competitive marketplace, operator success depends more and more on usage.
More informationFeatures of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy
Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from
More information1. Web Technology... 6
TABLE OF CONTENTS 1. Web Technology... 6 1.1. Introduction (Hypertext, URL, Domain Name)...6 1.2. Web Browser and ISP...8 1.3. Upload and download files...10 1.4. Control of Internet...10 2. E-mail components
More informationInternet Architecture
Internet Architecture Lecture 3: How TCP/IP Works & Understanding the Internet's Software Structure Assistant Teacher Samraa Adnan Al-Asadi 1 How TCP/IP Works Packet: A piece of data broken down into pieces
More informationFirewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003
Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA
More informationO&M Service for Sustainable Social Infrastructure
O&M Service for Sustainable Social Infrastructure Hitachi Review Vol. 62 (2013), No. 7 370 Toshiyuki Moritsu, Ph. D. Takahiro Fujishiro, Ph. D. Katsuya Koda Tatsuya Kutsuna OVERVIEW: Hitachi is developing
More informationSDR Forum Meeting Report
SDR Forum Meeting Report Tokyo Institute of Technology May 15, 2001 Edgar Carlos carlos@mobile.ss.titech.ac.jp What is the SDR Forum? It is a non-profit organization comprised of 100 corporations from
More informationProtection and Control System Using Open Network Architecture for Power Systems
Protection and Control System Using Open Network rchitecture for Power Systems 106 Protection and Control System Using Open Network rchitecture for Power Systems Takashi Kobayashi Takahiro Oomori Eiji
More informationand Networks Data Communications Second Edition Tata McGraw Hill Education Private Limited Managing Director SoftExcel Services Limited, Mumbai
Data Communications and Networks Second Edition ACHYUT S GODBOLE Managing Director SoftExcel Services Limited, Mumbai ATUL KAHATE Senior Consultant Oracle Financial Services Software Limited, Pune Tata
More information2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.
3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 1 Introduction to IP Mobility Session 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 3 Agenda IP Mobility Overview Terminology
More informationSatellite-Based Cellular Backhaul in the Era of LTE
Satellite-Based Cellular Backhaul in the Era of LTE Introduction 3 Essential Technologies for 3G/LTE Backhauling over Satellite 6 Gilat s Solution SkyEdge II-c Capricorn 7 Why Ultra-fast TDMA is the Only
More informationInternet Telephony. Definition. Overview. Topics. 1. Introduction
Internet Telephony Definition Internet telephony refers to communications services voice, facsimile, and/or voice-messaging applications that are transported via the Internet, rather than the public switched
More informationMODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY
MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY Olli Ojanperä, Hannu Heikkinen and Hannu M. Heikkinen Vaisala Oyj, P.O.Box 26, FIN-00421 Helsinki,
More informationCanada Education Savings Program (CESP) Data Interface Operations and Connectivity
(CESP) Version Number: 7.0 Version Date: November 24, 2016 Version History Version Release Date Description R 1.0 September 30, 1998 Initial version for HRSDC internal reviews. D 2.0 March 15, 1999 Ongoing
More informationDigi Connect WAN / ConnectPort WAN Cellular Setup of Surelink
Digi Connect WAN / ConnectPort WAN Cellular Setup of Surelink 1. SureLink Settings The following options configure the SureLink settings for your Digi device. These settings ensure that your device is
More informationSECURE SMART GRID DEVICE for HOME AREA NETWORKS Using WIRELESS APPLICATION PROTOCOL
826 SECURE SMART GRID DEVICE for HOME AREA NETWORKS Using WIRELESS APPLICATION PROTOCOL S. RAM KANNAN B.E, CSE Chennai, TN India ramkannan1991@gmail.com R. SABARISH B.E, CSE Chennai, TN India sabarish.raghu@gmail.com
More informationMobile Station Execution Environment (MExE( MExE) Developing web applications for PDAs and Cellphones. WAP (Wireless Application Protocol)
Developing web applications for PDAs and Cellphones Mobile Station Execution Environment (MExE( MExE) MExE is a standard for defining various levels of wireless communication These levels are called classmarks
More informationChapter 3. Technology Adopted. 3.1 Introduction
Chapter 3 Technology Adopted 3.1 Introduction The previous chapter described difference between the propose system and traditional methods and also about the existing similar systems. In this chapter,
More informationThe Applications and Gaming Tab - Port Range Forward
The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized
More informationUsing the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway
Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest
More informationTypical Network Uses
Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,
More informationNetworks and Telecommunication
Networks and Telecommunication Assignment R. C. A. Wijeratne 07/AS/CI/032 EP594 WI-Fi Technology Introduction Wi-Fi is a mechanism for wirelessly connecting electronic devices. A device enabled with Wi-Fi,
More informationSpecial Provision No. 683S27 June 2017
GATEWAY ROUTERS - Item No. Special Provision No. 683S27 June 2017 1. SCOPE This Special Provision covers the requirements for the installation of Gateway Routers with integrated digital subscriber line
More informationTechnology in Action. Chapter 13 Behind the Scenes: The Internet: How It Works Prentice-Hall, Inc.
Technology in Action Chapter 13 Behind the Scenes: The Internet: How It Works 1 Chapter Topics Managing the Internet Interaction between Internet components Internet data transmission and protocols IP
More informationMBB Robot Crawler Data Report in 2014H1
MBB Robot Crawler Data Report in 2014H1 Contents Contents 1 Introduction... 1 2 Characteristics and Trends of Web Services... 3 2.1 Increasing Size of Web Pages... 3 2.2 Increasing Average Number of Access
More information16/06/56. Communications and Networks. Communications and Networks. Communications and Networks
Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,
More informationCOPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21.
Con t e n t s Introduction xix Chapter 1 Introduction to Networking 1 Comparing Logical and Physical Networks.... 1 Networking Home Computers........................................... 2 Networking Small
More informationAD SSO Technical White Paper
Issue V1.0 Date 2017-02-28 Huawei Technologies Co., Ltd. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationTechnology in Action. Chapter 13 Behind the Scenes: The Internet: How It Works. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall
Technology in Action Chapter 13 Behind the Scenes: The Internet: How It Works 1 Management of the Internet Who owns the Internet? No one Individuals Universities Government agencies Private companies Committees
More informationCPSC156a: The Internet Co-Evolution of Technology and Society. Lecture 4: September 16, 2003 Internet Layers and the Web
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 4: September 16, 2003 Internet Layers and the Web Layering in the IP Protocols HTTP (Web) Telnet Domain Name Service Simple Network
More informationCompTIA Network+ Course
CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency
More informationCh.16 - Wireless WAN System Architectures
Ch.16 - Wireless WAN System Architectures 1 Wireless WAN 2 GSM via PSTN 3 GSM via ISDN 4 GPRS 5 Mobitex 6 CDPD 7 PPDC 8 UMTS 9 Future Systems 10 Systems Summary 1 11 Systems Summary 2 1 This section will
More informationWAP/ WML : Wireless Protocol wireless protocol
Device Connectivity Device Connectivity Pervasive computing devices do not develop their full potential unless they are connected to applications and services through the Internet. Device connectivity
More informationChapter 7. Telecommunications, the Internet, and Wireless Technology
Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different
More informationThinAir Server Platform White Paper June 2000
ThinAir Server Platform White Paper June 2000 ThinAirApps, Inc. 1999, 2000. All Rights Reserved Copyright Copyright 1999, 2000 ThinAirApps, Inc. all rights reserved. Neither this publication nor any part
More informationChapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
More informationOutline. CS5984 Mobile Computing HTTP. HTTP (especially 1.0) Problems 1/2. Dr. Ayman Abdel-Hamid, CS5984. Wireless Web.
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline HTTP HTTP 1.0 problems Approaches to help wireless access HTTP 1.1 enhancements System Architecture for Web
More informationApplication Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )
Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide
More informationSOHO 6 Wireless Installation Procedure Windows XP with Internet Explorer 5.x & 6.0
SOHO 6 Wireless Installation Procedure Windows XP with Internet Explorer 5.x & 6.0 Before you Begin Before you install the SOHO 6 Wireless, you must have: A computer with a 10/100BaseT Ethernet card installed
More informationLecture 11C Mobile Commerce
Lecture 11C Mobile Commerce Outline Introduction Characteristics of M-commerce Enabling Technologies Mobile Payment Conclusion Outline Introduction Characteristics of M-commerce Enabling Technologies Mobile
More informationLatest Mobile Radio Services and Associated R&D Activities
Latest Mobile Radio Services and Associated R&D Activities Hideyuki Shinonaga KDDI R&D Laboratories (shinonaga@kddilabs.jp) Ohara 2-1-15, Kamifukuoka, Saitama, 356-8502, Japan Sep.26, 2002 1 CDMA2000 1x
More informationOverview of the Session Initiation Protocol
CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction
More informationCompTIA Mobility+ Certification
CompTIA Mobility+ Certification Duration: 5 days Price: $4000 Certifications: CompTIA Mobility+ Exams: MB0-001 Course Overview The mobile age is upon us. More and more people are using tablets, smartphones,
More informationChapter 11: Wide-Area Networks and the Internet
Chapter 11: Wide-Area Networks and the Internet MULTIPLE CHOICE 1. MAN stands for: a. Manchester Access Network c. Metropolitan-Area Network b. Multiple-Area Network d. Multiple Access Network 2. Packet
More informationFunctions of PC Communicator: PC-to- FOMA IP Videophone Technology
Functions of PC Communicator: PC-to- IP Videophone Technology Hideaki Takeda, Dai Ando, Sumitaka Sakauchi, Shigehiko Onishi, and Hirohisa Jozawa Abstract This article describes the point-to-point communication
More informationMobile Commerce. Electronic Commerce
Mobile Commerce Electronic Commerce Code: 008023-01+02 Course: Electronic Commerce Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic Commerce 1 00. Contents 01. Mobile
More informationOperafone IP Professional installation guide
Operafone IP Professional installation guide 1 Specifications are subject to change without notice. Facilities described may or may not be supported by your network. Operafone is the registered trademark
More informationNGN: Carriers and Vendors Must Take Security Seriously
Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place
More informationE-Commerce. Infrastructure I: Computer Networks
E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.
More information4G Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India
Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India Abstract-Wireless services have the highest demand in internet
More informationCTS2134 Introduction to Networking. Module 08: Network Security
CTS2134 Introduction to Networking Module 08: Network Security Denial of Service (DoS) DoS (Denial of Service) attack impacts system availability by flooding the target system with traffic or by exploiting
More informationRemote Maintenance with WinCC flexible Communication via a Wide Area Network (WAN) Communication via an ISDN Modem Issue 12/04
Remote Maintenance with WinCC flexible Communication via a Wide Area Network (WAN) Communication via an Issue 12/04 Foreword Foreword This document describes a possible means of connecting a PC to the
More information06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322
1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet
More informationChapter2. Current Status of Information and Communications
Chapter2 Current Status of Information and Communications Section 1 Telecommunications Business 1. Telecommunications market Sales of Japan s telecommunication business reached 14.5910 trillion yen in
More informationChapter 11: Understanding the H.323 Standard
Página 1 de 7 Chapter 11: Understanding the H.323 Standard This chapter contains information about the H.323 standard and its architecture, and discusses how Microsoft Windows NetMeeting supports H.323
More informationA Content Transformation Framework for Personalization Service
A Content Transformation Framework for Personalization Service Dong-Hui Kim and Jae-Oh Lee Information Telecommunication Lab. Dept. of Electrical and Electronics KUT, Chonan Korea Email: {dhkim, jolee}@kut.ac.kr
More informationSession 4 Networks II
15.561 Information Technology Essentials Session 4 Networks II Copyright 2005 Thomas Malone, Chris Dellarocas Acknowledgments: Slides marked CD are adapted from Chris Dellarocas, U. Md.. Outline Network
More informationWi-Fi: Strengthening the Subscriber Carrier Connection
Wi-Fi: Strengthening the Subscriber Carrier Connection FMCA Interoperability Week ETSI Sophia Antipolis June 26 2008 Wi-Fi CERTIFIED Makes it Wi-Fi Greg Ennis Technical Director Wi-Fi Alliance Agenda Wi-Fi
More informationProactnes II: Visualization for Next Generation Networks
roactnes II: Visualization for Next Generation Networks Hideyuki Matsuda Noritaka Fujinaka Jun Ogawa Tomohiro Muramoto (Manuscript received April 2, 2009) The voice telephony, video distribution, and data
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationPerformance Estimation Techniques for Browser-based Applications
: QoE Estimation Technologies Performance Estimation Techniques for Browser-based Applications Hiroshi Yamamoto, Sorami Nakamura, Hirotada Honda, and Akira Takahashi Abstract Corporate application services
More informationChapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.
Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area
More informationSAINT Integrated Signaling System with High Reliability and Safety
Hitachi Review Vol. 57 (2008), No. 1 41 SAINT Signaling System with High Reliability and Safety Eiji Sasaki Shinji Hondo Tomohiro Ebuchi OVERVIEW: Trains could not run safely without signaling systems.
More informationFirewall-Friendly VoIP Secure Gateway and VoIP Security Issues
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice
More informationModule 2 Overview of Computer Networks
Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link:
More informationModule 2 Overview of. Computer Networks
Module Overview of Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link: CS454/654 - Issues How
More informationThe development of wireless communication technology for smart gas meters in Japan
International Gas Union Research Conference 2014 The development of wireless communication technology for smart gas meters in Japan Reina Nagayama, Takuya Kawata Tokyo Gas Co., Ltd. Masahiro Yasui, Ryo
More informationWAP via ORBCOMM. Andrew R Cardoza, Sias Mostert.
SSC00-X-7 WAP via ORBCOMM Andrew R Cardoza, Sias Mostert E-mail: acardoza@ing.sun.ac.za, mostert@eng.sun.ac.za Electronic Systems Laboratory, Department of Electrical and Electronic Engineering, University
More informationWireless Application Protocol (WAP) and. I-mode: An insight
A Term Paper on Wireless Application Protocol (WAP) and I-mode: An insight Guided by: Prof. Kevin Ryan Date: 04 / 07 / 2001 Submitted by: Amit Lakhani SID# 157-06-6960 Stevens Institute of Technology Hoboken,
More informationClient Server System for e-services Providing in Mobile Communications Networks
Client Server System for e-services Providing in Mobile Communications Networks Eugen POP, Mihai BARBOS, Razvan LUPU Abstract E-services providing is a good opportunity for business developing and financial
More informationMultiDSLA. Measuring Network Performance. Malden Electronics Ltd
MultiDSLA Measuring Network Performance Malden Electronics Ltd The Business Case for Network Performance Measurement MultiDSLA is a highly scalable solution for the measurement of network speech transmission
More informationWHAT IS THE INTERNET?
The Internet WHAT IS THE INTERNET? A world-wide network of computers allows people to share information electronically It is a BIG book with many web-pages on different topics. It Can be accessed anywhere
More informationM3-R3: INTERNET AND WEB DESIGN
M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER
More information