Development of Communication Software for Mobile Computing

Size: px
Start display at page:

Download "Development of Communication Software for Mobile Computing"

Transcription

1 Development of Communication Software for Mobile Computing 246 Development of Communication Software for Mobile Computing Susumu Matsui Yasuhiro Takahashi Takeshi Kondo OVERVIEW: The mobile computing market is expected to take off soon as a number of factors come into play. These factors include the rapid growth in the cellular subscriber base, standardization of a next-generation mobile communications network (IMT-2000) capable of high-speed multimedia communications, and escalated use of notebook and handheld personal computers and personal digital assistants. One objective of mobile computing is to provide the mobile environment with a means of information processing on a par with that of the office environment. Compared with the latter, however, the former suffers from low data speeds, poor communications quality, high connection costs, and low security. These problems must be addressed to make mobile computing successful, and to this end, Hitachi has developed four key technologies: Secure Socket, which compresses and encrypts data; Mobile Message Queue; DB Partner Mobile; and Web Access Agent, which accesses s on behalf of a portable terminal. This paper overviews these technologies and describes their role in mobile computing. INTRODUCTION THE explosive growth of the Internet and the expanding use of groupware like parallel an increasing need for rapid communications and access to various types of information in business activities. What this means is that mobile computing, which professes to provide communications anytime and anywhere, is fast becoming an indispensable information platform for business. To achieve viable mobile computing, however, a variety of technical issues must be dealt with. These include means for achieving compact and light terminals, high-speed and high-reliability wireless communications networks, and mobile middle software to deal with the low speed and low reliability inherent in mobile communications. Among these issues, we focus here on mobile middle software, and how Hitachi is solving the problems in this area. RECENT TRENDS IN MOBILE COMPUTING To examine the current environment surrounding mobile computing, we first look at the number of portable terminals shipped domestically. In 1998, this came out to 3,400,000 notebook PCs, 1) 1,300,000 portable information terminals, 2) and 200,000 smartphones. 2) Next, while the communication environment for mobile computing consists of both the fixed-wire communication network and the wireless communication network, recent years have seen a remarkable growth in the subscriber base for the wireless network. As of the end of February 1999, the numbers of cellular subscribers and personal handy phone system (PHS) subscribers were 40,500,000 and 5,780,000, respectively, giving a total of 46,280,000 subscribers. 3) These numbers reflect an annual growth of at least 30%, which means that the number of subscribers to the wireless network should surpass that of the fixed network (60,000,000 subscribers) in the year Table 1 lists typical data speeds of wireless and fixed communication networks. At present ISDN features the highest data speed, 128 kbit/s, but this is about two orders of magnitude slower than the 10-Mbit/s standard speed of an office TABLE 1. Data Speeds of Wireless and Fixed Networks Network type PDC Cellular cdmaone PHS PSTN (modem) ISDN Transmission scheme Packet switching PDC: personal digital cellular PSTN: public switched telephone network ISDN: integrated services digital network Data speed 9.6 kbit/s 28.8 kbit/s 14.4 kbit/s kbit/s 56 kbit/s kbit/s

2 Hitachi Review Vol. 48 (1999), No environment. In the future, however, communications speeds from 384 kbit/s to 2 Mbit/s can be expected in conjunction with the IMT-2000 (International Mobile Telecommunications-2000) standard under which services are scheduled to begin in 2001 in Japan. is driving the demand for mobile computing. At the same time, handsets with built-in browsers are beginning to appear, and the number of mobile computing users may exceed 20,000,000 in ) Meanwhile, a survey targeting the corporate world has revealed that about one-fourth of the surveyed companies have already introduced mobile computing in one form or another; and of those companies that have not yet done so, about one-half intend to. This survey also predicted large growth in the mobile computing market. EXISTING PROBLEMS WITH MOBILE COMPUTING As mentioned in the previous section, the demand for mobile computing is high. However, a number of issues concerned with providing the mobile environment with means of information processing on a par with that of the office environment still remain. These issues include hardware ones like how to produce compact and light terminals, but here we focus on the following issues related to mobile software. Low data speeds Communication speeds in the mobile environment are about two orders of magnitude slower than that in the office environment. Most existing applications are prepared with the office environment in mind, and they are extremely cumbersome to use as such in the mobile environment. Poor communications quality Stable communications can generally be achieved in the office environment. On the other hand, communications quality may significantly deteriorate according to the location in the mobile environment, especially in the wireless communication environment. High connections costs Communication in the office environment is generally free. In the mobile environment using circuit switching, however, communication cost depends on connection time. In contrast, in the case of packet switching, communication cost depends on the volume of data transferred, but even here the cost is high at present. PPP: point-to-point protocol Browser Mobile computing Web access proxy DB partner mobile client Web access agent DB partner mobile base platform Mobile message queue client base platform Mobile message queue client DB Web Enterprise TCP/IP / PPP TCP/IP Mobile phone Network Remote access Fig. 1 Configuration of a Mobile Computing System. Using mobile computing, it is possible to access efficiently to the enterprise from the terminal.

3 Development of Communication Software for Mobile Computing 248 Low Security The office environment uses firewalls to block out the outside wired world. In the mobile environment, however, one enters the office environment from the outside. Extra security, such as authentication, must therefore be considered. Encrypting of transferred data is also necessary. RAS Server Environment changes according to location It is common in the office environment to work at one location and on one terminal. In the mobile environment, however, it is not rare for the user to move from one location to another and to even use a variety of terminals. This makes it necessary to change various terminal settings. HITACHI S CURRENT MOBILE COMPUTING SOFTWARE As already mentioned, a number of problems must be solved to make mobile computing a reality. Hitachi has developed several approaches for solving these problems; that is Secure Socket, Mobile Message Queue, and DB Partner Mobile, which have already reached the product stage, and Web Access Agent, which is currently under development. Fig. 1 shows the mobile computing system that contains these technologies. Secure Socket Secure Socket can be installed in terminals and s. It consists of software that authenticates a terminal at the and compresses and encrypts data transferred between the terminal and the. Secure Socket may also be installed on a firewall instead of on s. In this case, it becomes possible to authenticate a terminal at the firewall and compress/ encrypt data transferred between the firewall and the terminal. Fig. 2 shows the configuration of a system using Secure Socket, which has the following features and functions: (1) Applicable to existing communication applications Existing communication applications often use TCP/IP as a communication protocol and many of them have been developed on a socket application program interface (API). Secure Socket is logically placed between the application and the socket library. Secure Socket itself supports socket API (Fig. 3) and provides authentication and data compression/ encryption without having to modify the existing communication application. (2) Authentication conforming to international Internet FW Server : : client RAS: remote access FW: firewall Fig. 2 Configuration of a System Using Secure Socket. Using Secure Socket, it is possible to perform compression/ encryption of data transferred between the terminal and / firewall. standards Secure Socket adopts a mutual authentication scheme in which a certificate issued from the side is used as a basis for challenge and response actions. This scheme is specified by ISO/IEC9798. It provides a level of authentication that is safer and more powerful than the general scheme based on user IDs and passwords. (3) Data compression and encryption Communication devices like modems normally support data-compression functions. However, as redundancy is lost if data is encrypted, the efficiency of data compression is poor if performed at a communication device for encrypted data. For this reason, a function for compressing transfer data is also supported by Secure Socket. Moreover, by focusing on similar points between data compression processing and encryption processing, Secure Socket can both compress and encrypt data by linked processing. Hitachi s data compression function compresses text data by 50% and its MULTI2 encryption technology provides strong encryption. Mobile Message Queue Mobile Message Queue (MMQ) operates on a terminal and a mobile computing installed in offices and is progressing with the aim of compensating for the low speed and high connection cost of the mobile environment. A client software that

4 Hitachi Review Vol. 48 (1999), No matches the MMQ is installed in a terminal, and an agent software that matches the MMQ is installed in the mobile computing corresponding to an application. The client software in the terminal issues processing instructions to the agent software in the mobile computing, and on the basis of these instructions, the agent software accesses the and returns only results to the client software. In short, the process for accessing the becomes asynchronous. The traffic generated by issuing process instructions and returning results is smaller than that would normally be required to access the sever directly. Adopting asynchronous processing in this way makes it possible to decrease the volume of transferred data in the mobile environment. In addition, as the terminal and the mobile computing need only communicate in order to issue process instructions and return results, the connection can be released while the is being accessed by the agent software; therefore, connection costs are lowered. DB Partner Mobile DB Partner Mobile is a database access application software and processes on top of the MMQ. It consists of DB Partner Mobile Client (the client software described in the previous section Mobile Message Queue and DB Partner Mobile Server (the agent software described in the previous section). In DB Partner Mobile Server, processing scripts that describe the DB access conditions, access time, etc. are registered in advance. DB Partner Mobile Server receives processing instructions, accesses DB according to the instructions and returns the results to DB Partner Mobile Client. The registration tool of procession scripts and operation interfaces are prepared, so it is possible to be customized for fitting to business. Web Access Agent When using MMQ, we must develop terminal-side software as well as agent software for each application. Moreover, although a message communication by MMQ is highly reliable and functional communication that have message tracking or canceling function, it is necessary to develop MMQ software for each kind of terminals. Enterprise systems are becoming increasingly linked to Web s, thus allowing users to access company s via Web pages. We are therefore developing Web access agent technology that does not constrain this function. Linking the enterprise systems and the Web is accomplished by a common gateway interface (CGI). Through this interface, a terminal can access various s through a CGI program within the Web. A Web Access Agent makes use of this mechanism in asynchronously initiating a CGI program. The following two points give a more detailed description of this process. (1) The terminal possesses a replica of the Web page used for accessing the, and with this replica, the terminal can set parameters for running a CGI program via offline processing. (2) Communications between the terminal and the mobile computing (issuing process instructions including the CGI parameters and receiving results from the mobile computing ) take place through MMQ and . This means that even if the MMQ software is not installed in the user's terminal, and even if the user is in an environment in which communications between the terminal and the mobile HTML & browser FTP HTTP News HTML: hypertext markup language HTTP: hypertext transfer protocol FTP: file transfer protocol TCP: transmission control protocol IP: Internet Protocol PPP: point-to-point protocol Socket I/F Socket I/F TCP IP PPP Fig. 3 Software Configuration of Secure Socket System. Secure Socket itself supports socket I/F and provides authentication and data compression/encryption without having to modify the existing communication application.

5 Development of Communication Software for Mobile Computing 250 Request Mobile agent access CGI Via Mobile agent Web Replica of Web page (change initiate CGI) Condition Search Product original CGI initiation information Original CGI initiation information Access to Web and initiate original CGI Condition Search CGI Result Access Save result to Web page Via Receive result Web page Result Web page <Search result> Enterprise Fig. 4 Flow of Asynchronous CGI Access. Mobile agents make use of the mechanism in a function that asynchronouly initiates CGI program. computing cannot take place, instructions for asynchronous processing can still be delivered as long as the environment allows to be used. The process flow of CGI asynchronous access is shown in Fig. 4. CONCLUSIONS This report has described Hitachi's current work on mobile middle software for mobile computing. The use of mobile computing is expected to become widespread in the coming years, and to support this growth, more technologies than just the ones described here will be required. Research and development work in this area will therefore continue with the goal of achieving a thorough product system. REFERENCES (1) Japan Electronic Industry Development Association ( (2) Mobile Computing Promotion Consortium ( club.pep.ne.jp/mcpchp/). (3) Statistical Data of the Ministry of Posts and Telecommunications ( index.html). ABOUT THE AUTHORS Susumu Matsui Joined Hitachi, Ltd. in 1980, and now works at the communication and computing system. Mr. Matsui is a member of the IEEE, the Information Processing Society of Japan, and the Institute of Electronics, Information and Communication Engineers of Japan, and can be reached by at matsui@sdl.hitachi.co.jp Yasuhiro Takahashi Joined Hitachi, Ltd. in 1981, and now works at the computing system. Mr. Takahashi is a member of the Information Processing Society of Japan and the Institute of Electronics, Information and Communication Engineers of Japan, and can be reached by at y-takaha@sdl.hitachi.co.jp Takeshi Kondo Joined Hitachi, Ltd. in 1988, and now works at the computing system. Mr. Kondo is a member of the Information Processing Society of Japan, and can be reached by at t-kondo@sdl.hitachi.co.jp

Enabling the Wireless Internet

Enabling the Wireless Internet Enabling the Wireless Internet Presented to IEEE CVT-Dallas February 15, 2000 Barry Herbert barry.herbert herbert@nortelnetworks.com Operator Market Dynamics Price/Min in U.S. Cents 16 14 12 10 8 6 4 2

More information

Personal Handyphone Systems in Urban Infrastructure

Personal Handyphone Systems in Urban Infrastructure Personal Handyphone Systems in Urban Infrastructure Yukio Iino Mitsunobu Ootsuka Isao Shimbo ABSTRACT: The personal handyphone system (PHS) service began in Japan in 1995. As this new communication service

More information

Network Systems for Emerging WAN Applications

Network Systems for Emerging WAN Applications Network Systems for Emerging WAN Applications Hitachi Review Vol. 48 (1999), No. 4 169 Akihiko Takase, D.Sc. OVERVIEW: This paper describes wide-area-network architecture from the viewpoints of networking

More information

Glossary. xii. Marina Yue Zhang and Mark Dodgson Downloaded from Elgar Online at 02/04/ :16:01PM via free access

Glossary. xii. Marina Yue Zhang and Mark Dodgson Downloaded from Elgar Online at 02/04/ :16:01PM via free access Glossary 2.5G Second-and-a-half Generation mobile communications system 3G Third Generation mobile communications system 3GPP The Third Generation Partnership Project ADSL Asymmetric Digital Subscriber

More information

Digital terrestrial television broadcasting Interactive channel

Digital terrestrial television broadcasting Interactive channel Digital terrestrial television broadcasting Interactive channel Televisão digital terrestre Canal de Inteeravidade Parte 1: Protocolos, interfaces fíisicas e interfaces de software Televisión digital terrestre

More information

Wireless Access Protocol(WAP) architecture

Wireless Access Protocol(WAP) architecture Wireless Access Protocol(WAP) architecture While the evolution of cellular networks has resulted in many mobile services, such services are primarily for voice. Mobile phone users do have the desire to

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

Small-cell-based Solution to Make Diverse Services Possible

Small-cell-based Solution to Make Diverse Services Possible Small-cell-based Solution to Make Diverse Services Possible Masanori Hashimoto Hideo Iwamoto The of Things (IoT) has brought the age of connection where everything is linked to a network, but it is also

More information

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the

More information

Next-Generation Switching Systems

Next-Generation Switching Systems Next-Generation Switching Systems Atsuo Kawai Shin ichi Iwaki Haruyoshi Kiyoku Keizo Kusaba ABSTRACT: Today, the telecommunications industry is encountering a new wave of multimedia communications for

More information

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks Topic1: Common Network Protocols 1. What is a network protocol and why are protocols needed when two machines communicate? 2. Describe the function of each of the following protocols: a. SMTP b. HTTP c.

More information

Accessing Mainframe Applications with Wireless Devices

Accessing Mainframe Applications with Wireless Devices L I G H T Y E A R Accessing Mainframe Applications with Wireless Devices Brian Lee Software Development Manager Tel: 403-208-2455 brianlee@lightyr.com Tony Skinner Senior CICS Consultant tskinner@lightyr.com

More information

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 c h a p t e r 9 THE INTERNET & THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE 9.1 LEARNING OBJECTIVES Describe features of infrastructure & connectivity

More information

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS P. Fidry, V. Rakotomanana, C. Ausanneau Pierre.fidry@alcatel-lucent.fr Alcatel-Lucent, Centre de Villarceaux, 91620, Nozay, France Abstract: As a consequence of

More information

The Internet and the World Wide Web

The Internet and the World Wide Web Technology Briefing The Internet and the World Wide Web TB5-1 Learning Objectives TB5-2 Learning Objectives TB5-3 How Did the Internet Get Started? Internet derived from internetworking 1960s U.S. Defense

More information

Memory Technologies for the Multimedia Market

Memory Technologies for the Multimedia Market Memory Technologies for the Multimedia Market Hitachi Review Vol. 50 (), No. 2 33 Katsuyuki Sato, Ph.D. Yoshikazu Saito Hitoshi Miwa Yasuhiro Kasama OVERVIEW: Different mobile multimedia-oriented products

More information

Communications and Networks The McGraw-Hill Companies, Inc. All rights reserved.

Communications and Networks The McGraw-Hill Companies, Inc. All rights reserved. Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,

More information

Fujitsu s Approach toward the Broadband Internet Era

Fujitsu s Approach toward the Broadband Internet Era Fujitsu s Approach toward the Broadband Internet Era v Kiichi Matsuda v Takashi Itoh (Manuscript received November 18, 2003) Technological progress is enabling businesses and individual users to communicate

More information

How the Web Works. Chapter 1. Modified by Marissa Schmidt Pearson

How the Web Works. Chapter 1. Modified by Marissa Schmidt Pearson How the Web Works Chapter 1 Modified by Marissa Schmidt 2015 Pearson Fundamentals ofhttp://www.funwebdev.com Web Development Objectives 1 Definitions and History 2 Internet Protocols 3 Client-Server Model

More information

Metasys System Extended Architecture Glossary

Metasys System Extended Architecture Glossary Technical Bulletin Issue Date March 31, 2003 Metasys System Extended Architecture Glossary Key Concepts... 2 Metasys System Extended Architecture Component Acronyms... 2 Metasys System Extended Architecture

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology 364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by

More information

IPv6 Network Construction Support Solution: Application to the IPv6 Experimental System of IPv6 Promotion Council

IPv6 Network Construction Support Solution: Application to the IPv6 Experimental System of IPv6 Promotion Council Network Construction Support Solution: Application to the Experimental System of Promotion Council 36 Network Construction Support Solution: Application to the Experimental System of Promotion Council

More information

User Guide IP Connect CSD

User Guide IP Connect CSD The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Wireless Maingate AB shall have no liability for any error or damages

More information

Solutions for Optical Access Systems as Platform for Comfortable Communication

Solutions for Optical Access Systems as Platform for Comfortable Communication Solutions for Optical Access Systems as Platform for Comfortable Communication 266 Solutions for Optical Access Systems as Platform for Comfortable Communication Toru Kazawa Masakazu Kitazawa Nobuaki Tajimi

More information

Children s Health System. Remote User Policy

Children s Health System. Remote User Policy Children s Health System Remote User Policy July 28, 2008 Reason for this Policy This policy defines standards for connecting to the Children s Health System (CHS) network from any remote host. These standards

More information

Distributed telecommunications network access using the TMOS IntraWeb Gateway

Distributed telecommunications network access using the TMOS IntraWeb Gateway Distributed telecommunications access using the IntraWeb Gateway Magnus Ekhed, Peter Gundersen and Olav Queseth In an increasingly competitive marketplace, operator success depends more and more on usage.

More information

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from

More information

1. Web Technology... 6

1. Web Technology... 6 TABLE OF CONTENTS 1. Web Technology... 6 1.1. Introduction (Hypertext, URL, Domain Name)...6 1.2. Web Browser and ISP...8 1.3. Upload and download files...10 1.4. Control of Internet...10 2. E-mail components

More information

Internet Architecture

Internet Architecture Internet Architecture Lecture 3: How TCP/IP Works & Understanding the Internet's Software Structure Assistant Teacher Samraa Adnan Al-Asadi 1 How TCP/IP Works Packet: A piece of data broken down into pieces

More information

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA

More information

O&M Service for Sustainable Social Infrastructure

O&M Service for Sustainable Social Infrastructure O&M Service for Sustainable Social Infrastructure Hitachi Review Vol. 62 (2013), No. 7 370 Toshiyuki Moritsu, Ph. D. Takahiro Fujishiro, Ph. D. Katsuya Koda Tatsuya Kutsuna OVERVIEW: Hitachi is developing

More information

SDR Forum Meeting Report

SDR Forum Meeting Report SDR Forum Meeting Report Tokyo Institute of Technology May 15, 2001 Edgar Carlos carlos@mobile.ss.titech.ac.jp What is the SDR Forum? It is a non-profit organization comprised of 100 corporations from

More information

Protection and Control System Using Open Network Architecture for Power Systems

Protection and Control System Using Open Network Architecture for Power Systems Protection and Control System Using Open Network rchitecture for Power Systems 106 Protection and Control System Using Open Network rchitecture for Power Systems Takashi Kobayashi Takahiro Oomori Eiji

More information

and Networks Data Communications Second Edition Tata McGraw Hill Education Private Limited Managing Director SoftExcel Services Limited, Mumbai

and Networks Data Communications Second Edition Tata McGraw Hill Education Private Limited Managing Director SoftExcel Services Limited, Mumbai Data Communications and Networks Second Edition ACHYUT S GODBOLE Managing Director SoftExcel Services Limited, Mumbai ATUL KAHATE Senior Consultant Oracle Financial Services Software Limited, Pune Tata

More information

2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.

2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID. 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 1 Introduction to IP Mobility Session 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 3 Agenda IP Mobility Overview Terminology

More information

Satellite-Based Cellular Backhaul in the Era of LTE

Satellite-Based Cellular Backhaul in the Era of LTE Satellite-Based Cellular Backhaul in the Era of LTE Introduction 3 Essential Technologies for 3G/LTE Backhauling over Satellite 6 Gilat s Solution SkyEdge II-c Capricorn 7 Why Ultra-fast TDMA is the Only

More information

Internet Telephony. Definition. Overview. Topics. 1. Introduction

Internet Telephony. Definition. Overview. Topics. 1. Introduction Internet Telephony Definition Internet telephony refers to communications services voice, facsimile, and/or voice-messaging applications that are transported via the Internet, rather than the public switched

More information

MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY

MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY Olli Ojanperä, Hannu Heikkinen and Hannu M. Heikkinen Vaisala Oyj, P.O.Box 26, FIN-00421 Helsinki,

More information

Canada Education Savings Program (CESP) Data Interface Operations and Connectivity

Canada Education Savings Program (CESP) Data Interface Operations and Connectivity (CESP) Version Number: 7.0 Version Date: November 24, 2016 Version History Version Release Date Description R 1.0 September 30, 1998 Initial version for HRSDC internal reviews. D 2.0 March 15, 1999 Ongoing

More information

Digi Connect WAN / ConnectPort WAN Cellular Setup of Surelink

Digi Connect WAN / ConnectPort WAN Cellular Setup of Surelink Digi Connect WAN / ConnectPort WAN Cellular Setup of Surelink 1. SureLink Settings The following options configure the SureLink settings for your Digi device. These settings ensure that your device is

More information

SECURE SMART GRID DEVICE for HOME AREA NETWORKS Using WIRELESS APPLICATION PROTOCOL

SECURE SMART GRID DEVICE for HOME AREA NETWORKS Using WIRELESS APPLICATION PROTOCOL 826 SECURE SMART GRID DEVICE for HOME AREA NETWORKS Using WIRELESS APPLICATION PROTOCOL S. RAM KANNAN B.E, CSE Chennai, TN India ramkannan1991@gmail.com R. SABARISH B.E, CSE Chennai, TN India sabarish.raghu@gmail.com

More information

Mobile Station Execution Environment (MExE( MExE) Developing web applications for PDAs and Cellphones. WAP (Wireless Application Protocol)

Mobile Station Execution Environment (MExE( MExE) Developing web applications for PDAs and Cellphones. WAP (Wireless Application Protocol) Developing web applications for PDAs and Cellphones Mobile Station Execution Environment (MExE( MExE) MExE is a standard for defining various levels of wireless communication These levels are called classmarks

More information

Chapter 3. Technology Adopted. 3.1 Introduction

Chapter 3. Technology Adopted. 3.1 Introduction Chapter 3 Technology Adopted 3.1 Introduction The previous chapter described difference between the propose system and traditional methods and also about the existing similar systems. In this chapter,

More information

The Applications and Gaming Tab - Port Range Forward

The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized

More information

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest

More information

Typical Network Uses

Typical Network Uses Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,

More information

Networks and Telecommunication

Networks and Telecommunication Networks and Telecommunication Assignment R. C. A. Wijeratne 07/AS/CI/032 EP594 WI-Fi Technology Introduction Wi-Fi is a mechanism for wirelessly connecting electronic devices. A device enabled with Wi-Fi,

More information

Special Provision No. 683S27 June 2017

Special Provision No. 683S27 June 2017 GATEWAY ROUTERS - Item No. Special Provision No. 683S27 June 2017 1. SCOPE This Special Provision covers the requirements for the installation of Gateway Routers with integrated digital subscriber line

More information

Technology in Action. Chapter 13 Behind the Scenes: The Internet: How It Works Prentice-Hall, Inc.

Technology in Action. Chapter 13 Behind the Scenes: The Internet: How It Works Prentice-Hall, Inc. Technology in Action Chapter 13 Behind the Scenes: The Internet: How It Works 1 Chapter Topics Managing the Internet Interaction between Internet components Internet data transmission and protocols IP

More information

MBB Robot Crawler Data Report in 2014H1

MBB Robot Crawler Data Report in 2014H1 MBB Robot Crawler Data Report in 2014H1 Contents Contents 1 Introduction... 1 2 Characteristics and Trends of Web Services... 3 2.1 Increasing Size of Web Pages... 3 2.2 Increasing Average Number of Access

More information

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,

More information

COPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21.

COPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21. Con t e n t s Introduction xix Chapter 1 Introduction to Networking 1 Comparing Logical and Physical Networks.... 1 Networking Home Computers........................................... 2 Networking Small

More information

AD SSO Technical White Paper

AD SSO Technical White Paper Issue V1.0 Date 2017-02-28 Huawei Technologies Co., Ltd. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Technology in Action. Chapter 13 Behind the Scenes: The Internet: How It Works. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

Technology in Action. Chapter 13 Behind the Scenes: The Internet: How It Works. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall Technology in Action Chapter 13 Behind the Scenes: The Internet: How It Works 1 Management of the Internet Who owns the Internet? No one Individuals Universities Government agencies Private companies Committees

More information

CPSC156a: The Internet Co-Evolution of Technology and Society. Lecture 4: September 16, 2003 Internet Layers and the Web

CPSC156a: The Internet Co-Evolution of Technology and Society. Lecture 4: September 16, 2003 Internet Layers and the Web CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 4: September 16, 2003 Internet Layers and the Web Layering in the IP Protocols HTTP (Web) Telnet Domain Name Service Simple Network

More information

CompTIA Network+ Course

CompTIA Network+ Course CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency

More information

Ch.16 - Wireless WAN System Architectures

Ch.16 - Wireless WAN System Architectures Ch.16 - Wireless WAN System Architectures 1 Wireless WAN 2 GSM via PSTN 3 GSM via ISDN 4 GPRS 5 Mobitex 6 CDPD 7 PPDC 8 UMTS 9 Future Systems 10 Systems Summary 1 11 Systems Summary 2 1 This section will

More information

WAP/ WML : Wireless Protocol wireless protocol

WAP/ WML : Wireless Protocol wireless protocol Device Connectivity Device Connectivity Pervasive computing devices do not develop their full potential unless they are connected to applications and services through the Internet. Device connectivity

More information

Chapter 7. Telecommunications, the Internet, and Wireless Technology

Chapter 7. Telecommunications, the Internet, and Wireless Technology Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different

More information

ThinAir Server Platform White Paper June 2000

ThinAir Server Platform White Paper June 2000 ThinAir Server Platform White Paper June 2000 ThinAirApps, Inc. 1999, 2000. All Rights Reserved Copyright Copyright 1999, 2000 ThinAirApps, Inc. all rights reserved. Neither this publication nor any part

More information

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued) Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

Outline. CS5984 Mobile Computing HTTP. HTTP (especially 1.0) Problems 1/2. Dr. Ayman Abdel-Hamid, CS5984. Wireless Web.

Outline. CS5984 Mobile Computing HTTP. HTTP (especially 1.0) Problems 1/2. Dr. Ayman Abdel-Hamid, CS5984. Wireless Web. CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline HTTP HTTP 1.0 problems Approaches to help wireless access HTTP 1.1 enhancements System Architecture for Web

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

SOHO 6 Wireless Installation Procedure Windows XP with Internet Explorer 5.x & 6.0

SOHO 6 Wireless Installation Procedure Windows XP with Internet Explorer 5.x & 6.0 SOHO 6 Wireless Installation Procedure Windows XP with Internet Explorer 5.x & 6.0 Before you Begin Before you install the SOHO 6 Wireless, you must have: A computer with a 10/100BaseT Ethernet card installed

More information

Lecture 11C Mobile Commerce

Lecture 11C Mobile Commerce Lecture 11C Mobile Commerce Outline Introduction Characteristics of M-commerce Enabling Technologies Mobile Payment Conclusion Outline Introduction Characteristics of M-commerce Enabling Technologies Mobile

More information

Latest Mobile Radio Services and Associated R&D Activities

Latest Mobile Radio Services and Associated R&D Activities Latest Mobile Radio Services and Associated R&D Activities Hideyuki Shinonaga KDDI R&D Laboratories (shinonaga@kddilabs.jp) Ohara 2-1-15, Kamifukuoka, Saitama, 356-8502, Japan Sep.26, 2002 1 CDMA2000 1x

More information

Overview of the Session Initiation Protocol

Overview of the Session Initiation Protocol CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction

More information

CompTIA Mobility+ Certification

CompTIA Mobility+ Certification CompTIA Mobility+ Certification Duration: 5 days Price: $4000 Certifications: CompTIA Mobility+ Exams: MB0-001 Course Overview The mobile age is upon us. More and more people are using tablets, smartphones,

More information

Chapter 11: Wide-Area Networks and the Internet

Chapter 11: Wide-Area Networks and the Internet Chapter 11: Wide-Area Networks and the Internet MULTIPLE CHOICE 1. MAN stands for: a. Manchester Access Network c. Metropolitan-Area Network b. Multiple-Area Network d. Multiple Access Network 2. Packet

More information

Functions of PC Communicator: PC-to- FOMA IP Videophone Technology

Functions of PC Communicator: PC-to- FOMA IP Videophone Technology Functions of PC Communicator: PC-to- IP Videophone Technology Hideaki Takeda, Dai Ando, Sumitaka Sakauchi, Shigehiko Onishi, and Hirohisa Jozawa Abstract This article describes the point-to-point communication

More information

Mobile Commerce. Electronic Commerce

Mobile Commerce. Electronic Commerce Mobile Commerce Electronic Commerce Code: 008023-01+02 Course: Electronic Commerce Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic Commerce 1 00. Contents 01. Mobile

More information

Operafone IP Professional installation guide

Operafone IP Professional installation guide Operafone IP Professional installation guide 1 Specifications are subject to change without notice. Facilities described may or may not be supported by your network. Operafone is the registered trademark

More information

NGN: Carriers and Vendors Must Take Security Seriously

NGN: Carriers and Vendors Must Take Security Seriously Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

4G Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India

4G Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India Abstract-Wireless services have the highest demand in internet

More information

CTS2134 Introduction to Networking. Module 08: Network Security

CTS2134 Introduction to Networking. Module 08: Network Security CTS2134 Introduction to Networking Module 08: Network Security Denial of Service (DoS) DoS (Denial of Service) attack impacts system availability by flooding the target system with traffic or by exploiting

More information

Remote Maintenance with WinCC flexible Communication via a Wide Area Network (WAN) Communication via an ISDN Modem Issue 12/04

Remote Maintenance with WinCC flexible Communication via a Wide Area Network (WAN) Communication via an ISDN Modem Issue 12/04 Remote Maintenance with WinCC flexible Communication via a Wide Area Network (WAN) Communication via an Issue 12/04 Foreword Foreword This document describes a possible means of connecting a PC to the

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

Chapter2. Current Status of Information and Communications

Chapter2. Current Status of Information and Communications Chapter2 Current Status of Information and Communications Section 1 Telecommunications Business 1. Telecommunications market Sales of Japan s telecommunication business reached 14.5910 trillion yen in

More information

Chapter 11: Understanding the H.323 Standard

Chapter 11: Understanding the H.323 Standard Página 1 de 7 Chapter 11: Understanding the H.323 Standard This chapter contains information about the H.323 standard and its architecture, and discusses how Microsoft Windows NetMeeting supports H.323

More information

A Content Transformation Framework for Personalization Service

A Content Transformation Framework for Personalization Service A Content Transformation Framework for Personalization Service Dong-Hui Kim and Jae-Oh Lee Information Telecommunication Lab. Dept. of Electrical and Electronics KUT, Chonan Korea Email: {dhkim, jolee}@kut.ac.kr

More information

Session 4 Networks II

Session 4 Networks II 15.561 Information Technology Essentials Session 4 Networks II Copyright 2005 Thomas Malone, Chris Dellarocas Acknowledgments: Slides marked CD are adapted from Chris Dellarocas, U. Md.. Outline Network

More information

Wi-Fi: Strengthening the Subscriber Carrier Connection

Wi-Fi: Strengthening the Subscriber Carrier Connection Wi-Fi: Strengthening the Subscriber Carrier Connection FMCA Interoperability Week ETSI Sophia Antipolis June 26 2008 Wi-Fi CERTIFIED Makes it Wi-Fi Greg Ennis Technical Director Wi-Fi Alliance Agenda Wi-Fi

More information

Proactnes II: Visualization for Next Generation Networks

Proactnes II: Visualization for Next Generation Networks roactnes II: Visualization for Next Generation Networks Hideyuki Matsuda Noritaka Fujinaka Jun Ogawa Tomohiro Muramoto (Manuscript received April 2, 2009) The voice telephony, video distribution, and data

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

Performance Estimation Techniques for Browser-based Applications

Performance Estimation Techniques for Browser-based Applications : QoE Estimation Technologies Performance Estimation Techniques for Browser-based Applications Hiroshi Yamamoto, Sorami Nakamura, Hirotada Honda, and Akira Takahashi Abstract Corporate application services

More information

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks. Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area

More information

SAINT Integrated Signaling System with High Reliability and Safety

SAINT Integrated Signaling System with High Reliability and Safety Hitachi Review Vol. 57 (2008), No. 1 41 SAINT Signaling System with High Reliability and Safety Eiji Sasaki Shinji Hondo Tomohiro Ebuchi OVERVIEW: Trains could not run safely without signaling systems.

More information

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice

More information

Module 2 Overview of Computer Networks

Module 2 Overview of Computer Networks Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link:

More information

Module 2 Overview of. Computer Networks

Module 2 Overview of. Computer Networks Module Overview of Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link: CS454/654 - Issues How

More information

The development of wireless communication technology for smart gas meters in Japan

The development of wireless communication technology for smart gas meters in Japan International Gas Union Research Conference 2014 The development of wireless communication technology for smart gas meters in Japan Reina Nagayama, Takuya Kawata Tokyo Gas Co., Ltd. Masahiro Yasui, Ryo

More information

WAP via ORBCOMM. Andrew R Cardoza, Sias Mostert.

WAP via ORBCOMM. Andrew R Cardoza, Sias Mostert. SSC00-X-7 WAP via ORBCOMM Andrew R Cardoza, Sias Mostert E-mail: acardoza@ing.sun.ac.za, mostert@eng.sun.ac.za Electronic Systems Laboratory, Department of Electrical and Electronic Engineering, University

More information

Wireless Application Protocol (WAP) and. I-mode: An insight

Wireless Application Protocol (WAP) and. I-mode: An insight A Term Paper on Wireless Application Protocol (WAP) and I-mode: An insight Guided by: Prof. Kevin Ryan Date: 04 / 07 / 2001 Submitted by: Amit Lakhani SID# 157-06-6960 Stevens Institute of Technology Hoboken,

More information

Client Server System for e-services Providing in Mobile Communications Networks

Client Server System for e-services Providing in Mobile Communications Networks Client Server System for e-services Providing in Mobile Communications Networks Eugen POP, Mihai BARBOS, Razvan LUPU Abstract E-services providing is a good opportunity for business developing and financial

More information

MultiDSLA. Measuring Network Performance. Malden Electronics Ltd

MultiDSLA. Measuring Network Performance. Malden Electronics Ltd MultiDSLA Measuring Network Performance Malden Electronics Ltd The Business Case for Network Performance Measurement MultiDSLA is a highly scalable solution for the measurement of network speech transmission

More information

WHAT IS THE INTERNET?

WHAT IS THE INTERNET? The Internet WHAT IS THE INTERNET? A world-wide network of computers allows people to share information electronically It is a BIG book with many web-pages on different topics. It Can be accessed anywhere

More information

M3-R3: INTERNET AND WEB DESIGN

M3-R3: INTERNET AND WEB DESIGN M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER

More information