WAP/ WML : Wireless Protocol wireless protocol
|
|
- Clifton Turner
- 5 years ago
- Views:
Transcription
1 Device Connectivity
2 Device Connectivity Pervasive computing devices do not develop their full potential unless they are connected to applications and services through the Internet. Device connectivity covers protocols for device-to-device and device to server interactions that are relevant in the pervasive computing domain, including wireless protocols, mobile phone technologies, Bluetooth, the Mobile IP, synchronization protocols such as SyncML, and transaction protocols and protocols enabling distributes services such as Jini.
3 Wireless Protocols Used for normal communication choice for hand held devices like PDAs and mobile phones. Following gives an overview of wireless protocols. 1. WAP/ WML : Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices such as mobile phones that uses the protocol. It is similar to HTTP. Wireless equivalent of HTML is WML. There is no end to end security provided in WAP. There are listed some of the key features offered by WAP: A programming model similar to the Internet's Wireless Markup Language (WML) WMLScript Wireless Telephony Application Interface (WTAI)
4 Wireless Protocols OBEX : OBJECT EXCHANGE PROTOCOL 1. Also termed IrOBEX is a communications protocol that facilitates the exchange of binary objects between devices 2. HTTP has only pull command while it has pull and push command for bidirectional communication. 3. It is maintained by the Infrared Data Association (IrDA) but has also been adopted by the Bluetooth Special Interest Group and the SyncML wing of the Open Mobile Alliance (OMA). 4. It consists of two models: 1. The session model structures the dialog between two decides and uses a binary packet based client/server request and response model. 2. The object model carries information about the objects being sent as well as containing the objects themselves. Object consists of a sequence of headers which describes the name, length, descriptive text of the object.
5 Wireless Protocols Bluetooth: Bluetooth is a wireless technology standard for exchanging data over short distances. Bluetooth is managed by the Bluetooth Special Interest Group (SIG), which has more than 25,000 member companies in the areas of telecommunication, computing, networking, and consumer electronics Characteristics of Bluetooth are : Frequency band: 2.4 GHz ISM(industrial-scientific-medical) band that is 83 MHz-wide. Security: authentication based on private keys and encryption Transmitting capabilities : omnidirectional and has range of 10m Bandwidth : data transfer rate up to 1 Mbps. Cost : relatively expensive with an expected price of $ 5 to 10 per Bluetooth module.
6 Wireless Protocols IrDA : specifies several infrared communication standards. Important standard for pervasive computing devices afe IrDA-Data nd IrMC (infrared mobile communications). IrDA is perfectly suited for high speed data connections like connecting a device to a wired network Characteristics of IrDA: Frequency band: infrared light is used as the physical trqansport medium Security: IrDA has no security concept Transmitting capabilities : point to point connection between sender and receiver. Designed for short distance communication (0-30 cm); Bandwidth : data transfer rate upto 4 Mbps. Cost : very cheap as senders and receivers are mass-produced ($1to2)
7 Mobile Phone Technologies Type 1G 2G 2+G 3G Protocol AMPS, C-Net GSM, TDMA, CDMA Technology Analog, Circuits- Switched Digital, Circuit Switched GPRS, HSCSD, EDGE Digital, Circuit or Packet Switched Speech Quality Poor High High High Bandwidth Low Low Medium High UTMS,W- CDMA Digital, Packet Switched Security None Depending on Protocol, Low to high Suitable Applications Data transmission and Fax Send short alphanumeric messages High GPRS Applications High Video conferencing and full motion video
8 Mobile Internet Protocol IP Protocol (IPv4, IPv6): IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses in the packet headers. For this purpose, IP defines packet structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram with source and destination information.
9 Mobile IP : Mobile IP is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address. Mobile IP is an enhancement of the Internet Protocol (IP) that adds mechanisms for forwarding Internet traffic to mobile devices (known as mobile nodes) when they are connecting through other than their home network.
10 Steps of connection establishment in mobile IP : 1) Discover care-of-address 2) register care of address 3) tunnel care of address
11 Synchronization and Replication Protocol Client Server Used For AvantGo from AvantGo Inc PalmOS, Windows CE AvantGo Server Retrieving Content Channels (E.g Web Pages) Mobile connect from IBM PalmOS, Windows CE EPOC Lotus Notes, MS Exchange,RDBS PIM Applications, Databases Intellisync from Puma Technologies PalmOS, Windows CE Lotus Notes, MS Outlook PIM Applications Truesync from Starfish Technologies Mobile Phones, PalmOS, Windows CE Lotus Notes, MS Outlook,Sidekick etc PIM Applications
12 Synchronization can be device to server and device to device (where one device acts as server) like one client and one server sync, multiple client and one server sync, multiple client and multiple server sync. To avoid out of sync situations, Synchronization Principles are used: Pre-synchronization : Authentication, Authorization and determination of device capabilities. Synchronization : synchronization data exchange of new, deleted and updated entries Post-Synchronization : clean up tasks like updating mapping tables and reporting unresolved conflicts Example - SyncML
13 SyncML SyncML (Synchronization Markup Language) is the former name for a platform-independent information synchronization standard. The project is currently referred to as Open Mobile Alliance Data Synchronization and Device Management. The purpose of SyncML is to offer an open standard as a replacement for existing data synchronization solutions, which have mostly been somewhat vendor-, application- or operating system specific. SyncML works by exchanging commands, which can be requests and responses. As an example: the mobile sends an Alert command for signaling the wish to begin a refreshonly synchronization the computer responds with a Status command for accepting the request the mobile sends one or more Sync command containing an Add subcommand for each item (e.g., phonebook entry); if the number of entries is large, it does not include the <Final/> tag; in the latter case, the computer requests to continue with an appropriate Alert message, and the mobile sends another chunk of items; otherwise, the computer confirms it received all data with a Status command
14 Distributed Services Sun s Jini : Uses Java RMI between the different Jini participants 5 Key Concepts : Discovery :finds other members in the jini community and joins them Look-up : a directory that understands the java type hierarchy Leasing : ensures that the jini network is stable and self healing. Remote Events :allow jini services to send notification to participants in a jini Community. Transactions : same as database transactions
15 Distributed Services Microsoft's Universal Plug and Play (UPnP) Build on XML standards such as Simple Service Description Protocol (SSDP) for Service Discovery, General Event Notification Architecture (GENA) for events, and SOAP (Simple Object Access Protocol) for remote procedure calls. Services provided by UPnP : IP Addressing : A device that will join an UPnP network must get an IP address, can be achieved using DHCP or Auto IP from reserved IP Discovery : allows devices to advertise their services to control points and to use new control points to search for devices of interest Description : tell the control point what kind of service it is offering Control : send request to the device for service Events : control points can subscribe to events on devices. When an event occurs, device will send a notification to all subscribed control points Presentation : presentation URL under which the device can be configured remotely via a browser.
16 Message and Transaction Based Protocols : It ensures the delivery and atomic operations in the pervasive computing space, where communication breakdowns or devices being switched on and off while attempting to transmit data. 1. Message and Transaction Technology is the technology available for Guaranteed Message Delivery and atomic operations 1. Messaging and queuing system to allow asynchronous delivery of messages. 2. One to one, one to many, many to one queue 2. Message and Transaction Products Message Queuing Systems (ExpressQ,MQE,MSMQ) Relational Databases for Pervasive Computing Devices (DB2e,Oracle Lite)
17 Security Security Concepts Identification Authentication Authorisation Digital Signatures endorsed by passwords Non-repudiation Device Security WAP Phones PDAs
18 Server Side Security Inner Firewall (Web Application Security) Outer Firewall (Authentication and access Control) Connected to Gateways through SSL (WAP,Voice,PDA,ISP)
19 Cryptographic Algorithms Symmetric Cryptographic Algorithms Data Encryption Standard (DES) Triple DES AES Encryption Standard Public Key Algorithms RSA (Rivest, Shamir,adleman) Digital Signature Elliptic Curve
20 Device Management Challenges of Device Management Tracking the device locations Device user relationship Version control of devices and software Software updates of existing devices Installations of new software devices on existing devices Provide Secure access to device information
21 Device Management Software Distribution Issues and approches in Device management Hardware Capabilities Hardware Version Management Software Version Management Library Management Devices are not always connected Insecure Connections Unstable Connections Operating system Updates
Distributed Systems 26. Mobile Ad Hoc Mesh Networks
Distributed Systems 26. Mobile Ad Hoc Mesh Networks Paul Krzyzanowski pxk@cs.rutgers.edu 12/16/2011 1 Mesh Networks Mobile Ad-hoc networks, sensor networks, Decentralized networking No need for routers
More informationETSI TS V5.0.0 ( )
Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Wide Area Network Synchronization () GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS
More informationWireless Internet: layers 3,4,5. Wireless Internet: Layers 3,4,5 Case Study: WAP. WAP: Wireless Application Protocol
W.int.3-2 Wireless Internet: layers 3,4,5 Wireless Internet: Layers 3,4,5 Case Study: WAP Module W.int.3.WAP Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico
More informationWireless Personal Area Networks & Wide Area Networks
Wireless Personal Area Networks & Wide Area Networks Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline In the lecture we will: Look at PAN s in more detail Look at example networks
More informationUNIVERSITY EXAMINATIONS: NOV/DEC 2011 REGULATION PERVASIVE COMPUTING PART A
UNIVERSITY EXAMINATIONS: NOV/DEC 2011 REGULATION 2008 080250049-PERVASIVE COMPUTING PART A 1. Mention the characteristics of pervasive computing. Minimal user distraction Collaborative interaction User
More informationGlossary. ADO.NET ActiveX Data Objects for.net. A set of data access technologies included in the.net Framework class libraries.
308 Glossary Glossary 1G Developed in the 70s and 80s, the first generation (1G) wireless communications technology refers to the analog cellular technology. Popular 1G technology includes AMPS. 2G The
More informationMOBILE IP AND WIRELESS APPLICATION PROTOCOL
MOBILE IP AND WIRELESS APPLICATION PROTOCOL In this chapter, we look at two standards that provide application-level support for wireless networking: Mobile IP and Wireless Application Protocol (WAP).
More informationOutline. CS5984 Mobile Computing HTTP. HTTP (especially 1.0) Problems 1/2. Dr. Ayman Abdel-Hamid, CS5984. Wireless Web.
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline HTTP HTTP 1.0 problems Approaches to help wireless access HTTP 1.1 enhancements System Architecture for Web
More informationIntegration of Wireless Sensor Network Services into other Home and Industrial networks
Integration of Wireless Sensor Network Services into other Home and Industrial networks using Device Profile for Web Services (DPWS) Ayman Sleman Automation and Process Control Engineering, University
More informationM.SARAVANA KARTHIKEYAN
PERVASIVE COMPUTING Unit II Part A 1. What is XML? XML stands for EXtensible Markup Language XML is a markup language much like HTML XML was designed to carry data, not to display data XML tags are not
More informationSynchronization. Kari Pihkala HUT, Telecommunications Software and Multimedia Laboratory. Abstract
Synchronization Kari Pihkala HUT, Telecommunications Software and Multimedia Laboratory Kari.Pihkala@hut.fi Abstract This paper discusses various synchronization methods for mobile devices. It gives an
More informationLocal area network (LAN) Wide area networks (WANs) Circuit. Circuit switching. Packets. Based on Chapter 2 of Gary Schneider.
Local area network (LAN) Network of computers located close together Wide area networks (WANs) Networks of computers connected over greater distances Based on Chapter 2 of Gary Schneider. (2009). E-Business.
More informationSyncML Overview. Noel Poore, Psion Computers PLC
SyncML Overview Noel Poore, Psion Computers PLC Data synchronization is a field of growing importance. As the number of mobile devices increases rapidly in the next few years, more and more data is going
More informationOverview. M-commerce vs. E-commerce
M-COMMERCE Overview What is M-Commerce? M-commerce vs. E-commerce Classes of M-Commerce Applications Benefits of M-commerce Advantages of M-Commerce Disadvantages of M-Commerce Mobile Computing: Content,
More informationupnp Device Architecture
upnp and DLNA upnp Device Architecture defines an architecture for pervasive peer-to-peer network connectivity of intelligent appliances, wireless devices, and PCs of all form factors easy-to-use, flexible,
More informationData Synchronization in Mobile Computing Systems Lesson 10 SyncML Protocols
Data Synchronization in Mobile Computing Systems Lesson 10 SyncML Protocols Oxford University Press 2007. All rights reserved. 1 SyncML provisions for an open standard Representation protocol Synchronization
More informationGlossary 1. ARPU or Average Revenue per User A method of measuring revenue associated with the delivery of mobile commerce services by MNOs.
Glossary 321 Glossary 1 2G or 2nd Generation The currently available digital communication networks for voice and data communication (e.g., GSM, CDMA, PDC). 2.5G or 2.5th Generation Represents an upgrade
More informationUSER S GUIDE FOR NOKIA PC SUITE 6.2. Copyright Nokia. All rights reserved. 1/20
USER S GUIDE FOR NOKIA PC SUITE 6.2 1/20 Copyright 2002-2004 Nokia. All rights reserved. Legal Notice Copyright 2002-2004 Nokia. All rights reserved. Reproduction, transfer, distribution or storage of
More informationLecture 11C Mobile Commerce
Lecture 11C Mobile Commerce Outline Introduction Characteristics of M-commerce Enabling Technologies Mobile Payment Conclusion Outline Introduction Characteristics of M-commerce Enabling Technologies Mobile
More informationVersion 1.0.1
1 of 19 Pages SyncML OBEX Binding Abstract This document describes how to use SyncML over OBEX. The document uses the primitives and methods defined in the OBEX specification V1.2 as defined in [1]. The
More informationChapter 17. Wireless Network Security
Chapter 17 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s, to develop a protocol & transmission specifications for wireless LANs (WLANs) Demand
More informationSession 4 Networks II
15.561 Information Technology Essentials Session 4 Networks II Copyright 2005 Thomas Malone, Chris Dellarocas Acknowledgments: Slides marked CD are adapted from Chris Dellarocas, U. Md.. Outline Network
More informationBlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide
BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry
More informationCONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements
CONTENTS Preface Acknowledgements xiii xvii Chapter 1 TCP/IP Overview 1 1.1 Some History 2 1.2 TCP/IP Protocol Architecture 4 1.2.1 Data-link Layer 4 1.2.2 Network Layer 5 1.2.2.1 Internet Protocol 5 IPv4
More informationInternet Services & Protocols. Mobile and Wireless Networks
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Mobile and Wireless Networks Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: stephan.gross@tu-dresden.de
More informationMobile Station Execution Environment (MExE( MExE) Developing web applications for PDAs and Cellphones. WAP (Wireless Application Protocol)
Developing web applications for PDAs and Cellphones Mobile Station Execution Environment (MExE( MExE) MExE is a standard for defining various levels of wireless communication These levels are called classmarks
More informationEnabling the Wireless Internet
Enabling the Wireless Internet Presented to IEEE CVT-Dallas February 15, 2000 Barry Herbert barry.herbert herbert@nortelnetworks.com Operator Market Dynamics Price/Min in U.S. Cents 16 14 12 10 8 6 4 2
More informationNetwork Communications Standards. Applied Information Technology
Network Communications Standards Applied Information Technology Network Standards Why do we need network standards? Defined guidelines for how computers or networked devices communicate Think of it as
More informationArea Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low
Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What
More informationJini and Universal Plug and Play (UPnP) Notes
Jini and Universal Plug and Play () Notes Abstract Jini and are overlapping technologies. They both address the area of device connectivity and the ability to dynamically make use of new devices on the
More informationWAP. Bringing the internet to you. Cynthia Luk Marianne Morris Harvey Wong. 4 April, 2002 CMPUT 499
WAP Bringing the internet to you Cynthia Luk Marianne Morris Harvey Wong 4 April, 2002 CMPUT 499 Table of Contents Summary 3 Introduction... 4 What is (WAP)? WAP 2.0 Motivation for WAP WAP Architecture..
More informationDesign and Implementation of a Service Discovery Architecture in Pervasive Systems
Design and Implementation of a Service Discovery Architecture in Pervasive Systems Vincenzo Suraci 1, Tiziano Inzerilli 2, Silvano Mignanti 3, University of Rome La Sapienza, D.I.S. 1 vincenzo.suraci@dis.uniroma1.it
More informationWireless Network Introduction
Wireless Network Introduction Module W.bas.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Wireless network introduction W.bas.1-2
More informationWireless Access Protocol(WAP) architecture
Wireless Access Protocol(WAP) architecture While the evolution of cellular networks has resulted in many mobile services, such services are primarily for voice. Mobile phone users do have the desire to
More informationCCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means
More informationITP 140 Mobile Applications Technologies. Networks
ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)
More informationUser Guide Supplement Measurement Systems International
MSI-9850 Ethernet Option User Guide Supplement Measurement Systems International Integrated System Solutions for Industrial Weighing and Process Control Table of Contents Introduction...4 Quick Start...4
More informationENRNG3076 : Oral presentation BEng Computer and Communications Engineering
Jean Parrend ENRNG3076 : Oral presentation BEng Computer and Communications Engineering 1 Origin 2 Purpose : Create a cable replacement standard for personal area network Handle simultaneously both data
More informationIrDA INTEROPERABILITY
Part F:2 IrDA INTEROPERABILITY The IrOBEX protocol is utilized by the Bluetooth technology. In Bluetooth, OBEX offers same features for applications as within the IrDA protocol hierarchy and enabling the
More information3.0. Manual and. Application note. USB Adapter
3.0 USB Adapter Manual and Application note Index INTRODUCTION 1 CHAPTER 1 Package 2 Features 2 Bluetooth profile support 2 Drivers support 3 CHAPTER 2 Setup for Windows 98SE/ME/2000/XP 4 CHAPTER 3 Application
More informationMOBILE COMPUTING (Common to Computer Science & Engineering and Information Technology)
Code No: R41054 R10 Set No. 1 1 a) Explain functional architecture of GSM. [8] b) Write and explain novel applications of Mobile Computing. [7] 2 a) Explain in detail about IEEE 802.11 MAC Data frames.
More informationBlackBerry 101: An Introduction to the BlackBerry Wireless Solution
BlackBerry 101: An Introduction to the BlackBerry Wireless Solution BlackBerry 101 Agenda What is the BlackBerry Enterprise Solution? Tracing a Message Security, Security, Security Enabling the User Extensibility:
More informationNew Age of IP Telephony. Ukrit Wongsarawit Network Technology Manager
New Age of IP Telephony Ukrit Wongsarawit Network Technology Manager ukrit.w@g-able.com Agenda Conventional telephone and data networking Voice data convergence IP telephony PBX based IP telephony Implementing
More informationBlackBerry Integration With IBM WebSphere Everyplace Access 4.3
BlackBerry Integration With IBM WebSphere Everyplace Access 4.3 Integration Note Research In Motion 2003 Research In Motion Limited. All Rights Reserved. Contents Integration overview... 3 Related resources...
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationChapter 7 LAN Configuration
Chapter 7 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Wireless ADSL Modem VPN Firewall Router. These features can be found by selecting Network Configuration
More informationWAP via ORBCOMM. Andrew R Cardoza, Sias Mostert.
SSC00-X-7 WAP via ORBCOMM Andrew R Cardoza, Sias Mostert E-mail: acardoza@ing.sun.ac.za, mostert@eng.sun.ac.za Electronic Systems Laboratory, Department of Electrical and Electronic Engineering, University
More informationFundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy
System Models and Networking Chapter 2,3 Bina Ramamurthy Fundamental Issues There is no global time. All communications are by means of messages. Message communication may be affected by network delays
More informationNetwork Architecture
Unit 7 Network Architecture Acknowledgments: These slides were originally developed by Prof. Jean Walrand for EE122. The past and current EE122 instructors including Kevin Fall, Abhay Parekh, Shyam Parekh,
More informationMobile Commerce. Electronic Commerce
Mobile Commerce Electronic Commerce Code: 008023-01+02 Course: Electronic Commerce Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic Commerce 1 00. Contents 01. Mobile
More informationCCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols
CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services
More informationWHITE PAPER. Good Mobile Intranet Technical Overview
WHITE PAPER Good Mobile Intranet CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management Introduction Good Mobile Intranet
More informationGLOSSARY. A syslog or SNMP message notifying an operator or administrator of a problem.
GLOSSARY A alert API audit log A syslog or SNMP message notifying an operator or administrator of a problem. Application programming interface. Specification of function-call conventions that defines an
More informationChapter 3. Technology Adopted. 3.1 Introduction
Chapter 3 Technology Adopted 3.1 Introduction The previous chapter described difference between the propose system and traditional methods and also about the existing similar systems. In this chapter,
More informationDEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK UNIT I PART A (2MARKS)
DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Subject Code : IT1402 Subject Name : Mobile Computing Year / Sem : IV / VII UNIT I PART A (2MARKS) 1.What are the 3 fundamental propagation behaviors
More informationGlossary. xii. Marina Yue Zhang and Mark Dodgson Downloaded from Elgar Online at 02/04/ :16:01PM via free access
Glossary 2.5G Second-and-a-half Generation mobile communications system 3G Third Generation mobile communications system 3GPP The Third Generation Partnership Project ADSL Asymmetric Digital Subscriber
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 10 Wireless Wide Area Networks Objectives Describe wireless wide area networks (WWANs) and how they are used Describe the applications that can be used
More informationTwelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1
Computers Are Your Future Twelfth Edition Chapter 8: Wired and Wireless Communication Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1 Wired and Wireless Communication Copyright 2012
More informationService Managed Gateway TM. Configuring IPSec VPN
Service Managed Gateway TM Configuring IPSec VPN Issue 1.2 Date 12 November 2010 1: Introduction 1 Introduction... 3 1.1 What is a VPN?... 3 1.2 The benefits of an Internet-based VPN... 3 1.3 Tunnelling
More informationDBT-120 Bluetooth USB Adapter
DBT-120 Bluetooth USB Adapter Rev.2.1 (09/25/2002) 2 Contents Introduction... 5 Package Contents... 6 Installing Bluetooth Software... 6 Hardware Installation... 8 Introduction to Bluetooth Software...
More informationNetwork Applications Principles of Network Applications
Network Applications Principles of Network Applications A Network application is an application running on one host and provides communication to another application running on a different host. At the
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through
More informationData Communication and Network. Introducing Networks
Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect
More informationMOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware
MOM MESSAGE ORIENTED MOM Message Oriented Middleware MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS Peter R. Egli 1/25 Contents 1. Synchronous versus asynchronous interaction
More informationCS610- Computer Network Solved Subjective From Midterm Papers
Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source
More informationOPC UA Configuration Manager PTC Inc. All Rights Reserved.
2017 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 4 Overview 4 5 Project Properties - OPC UA 5 Server Endpoints 7 Trusted Clients 9 Discovery Servers 10 Trusted Servers 11 Instance
More informationChapter 2: Technology Infrastructure: The Internet and the World Wide Web
Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Student: 1. Networks of computers and the Internet that connects them to each other form the basic technological structure that
More informationCustomer Network to Cisco WebEx Cloud IP Ranges for Firewall Settings
Cisco_Unified_MeetingPlace,_Release_7.1 Network_Requirements Main page: Cisco Unified MeetingPlace, Release 7.1 Previous page: System Requirements Contents 1 Customer Network to Cisco WebEx Cloud IP Ranges
More information31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers
31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network
More informationPotential Threats to Mobile Network Security
Potential Threats to Mobile Network Security (Can WAP virus infect the mobile phones?) BY K.NAGA MOHINI and P.RAMYA IV Btech (CSE) mohini.cse521@gmail.com IV Btech (CSE) ramya_pragada@yahoo.com COMPUTER
More informationBluetooth. Bluetooth Radio
Bluetooth Bluetooth is an open wireless protocol stack for low-power, short-range wireless data communications between fixed and mobile devices, and can be used to create Personal Area Networks (PANs).
More informationA Plexos International Network Operating Technology May 2006
A Plexos International Network Operating Technology May 2006 BY 4664 Jamestown Ave, Suite 325 Baton Rouge, LA 70808 225.218.8002 1.0 Introduction. is a software environment comprised of proven technologies
More informationSophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 1.1 Document date: July 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
More informationHow to Configure Authentication and Access Control (AAA)
How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual
More informationC exam. IBM C IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile. Version: 1.
C9510-319.exam Number: C9510-319 Passing Score: 800 Time Limit: 120 min File Version: 1.0 IBM C9510-319 IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile Version: 1.0 Exam A QUESTION
More informationFILE TRANSFER PROFILE
Part K:12 FILE TRANSFER PROFILE This application profile defines the application requirements for Bluetooth devices necessary for the support of the File Transfer usage model. The requirements are expressed
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 642-504 Title : Securing Networks with Cisco Routers and Switches Vendors
More informationLesson 1 Key-Terms Meanings: Web Connectivity of Devices and Devices Network
Lesson 1 Key-Terms Meanings: Web Connectivity of Devices and Devices Network 1 Application Application: A software (S/W) for an application, such as, creating and sending an SMS, measuring and sending
More informationIPsec NAT Transparency
The feature introduces support for IP Security (IPsec) traffic to travel through Network Address Translation (NAT) or Port Address Translation (PAT) points in the network by addressing many known incompatibilities
More informationUsing the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway
Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest
More informationData Synchronization in Mobile Computing Systems Lesson 08 SyncML Language Features
Data Synchronization in Mobile Computing Systems Lesson 08 SyncML Language Features Oxford University Press 2007. All rights reserved. 1 A mobile computing system Consists of (i) mobile device, (ii) personal
More informationMobile Application Support
Mobile Application Support 1 Problems and Requirements Problem fields: dynamic system and network configuration dynamic change of Quality-of-Service-properties decoupling/re-connection transparency of
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationCHAPTER -1. Introduction to Computer Networks
CHAPTER -1 Introduction to Computer Networks PRELIMINARY DEFINITIONS computer network :: [Tanenbaum] a collection of autonomous computers interconnected by a single technology. communications network ::a
More informationGuide to Wireless Communications, 3 rd Edition. Objectives
Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications
More informationCCNA R&S: Introduction to Networks. Chapter 10: The Application Layer
CCNA R&S: Introduction to Networks Chapter 10: The Application Layer Frank Schneemann 10.0.1.1 Introduction 10.0.1.2 Activity - Application Investigation 10.1.1.1 OSI and TCP/IP Models Revisited The application
More informationITEC 3800 Data Communication and Network. Introducing Networks
ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You
More informationMobile Application Ecosystems
Mobile Application Ecosystems Mika Mannermaa November 14, 2005 T-110.5120 Next Generation Wireless Networks Helsinki University of Technology Delivering Quality Content into the Hands of Mobile Consumers
More informationChapter 12 Network Protocols
Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)
More informationCOLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK UNIT-1 WIRELESS COMMUNICATION FUNDAMENTALS
KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK SUBJECT CODE& NAME: IT1403 MOBILE COMPUTING YEAR / SEM : IV / VIII UNIT-1 WIRELESS COMMUNICATION FUNDAMENTALS PART A (2MARKS)
More informationWireless Transmission and Mobility
Mobile and Ubiquitous Computing Wireless Transmission and Mobility Modulation, MAC and IPv6" George Roussos! g.roussos@dcs.bbk.ac.uk! Modulation" Digital modulation! digital data is translated into an
More informationGIGABYTE Remote Management Console User s Guide. Version: 1.0
GIGABYTE Remote Management Console User s Guide Version: 1.0 Table of Contents Using Your GIGABYTE Remote Management Console...2 Software Install...3 Prerequisites on remote management PC...3 Install Java
More informationROEVER COLLEGE OF ENGINEERING AND TECHNOLOGY Elambalur, Perambalur
ROEVER COLLEGE OF ENGINEERING AND TECHNOLOGY Elambalur, Perambalur - 621220 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year & Semester : IV/ VII Subject Code : CS2402 Subject Name : MOBILE AND PERVASIVE
More informationFull file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web
Chapter 2: Technology Infrastructure: The Internet and the World Wide Web TRUE/FALSE 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. T
More information12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking" George Roussos! Bluetooth Overview"
Mobile and Ubiquitous Computing Bluetooth Networking" George Roussos! g.roussos@dcs.bbk.ac.uk! Bluetooth Overview" A cable replacement technology! Operates in the unlicensed ISM band at 2.4 GHz! Frequency
More informationGovt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester Subject: Mobile Computing Contact Hrs / week: 4 Total hrs: 64 Table of Contents SN Topic Hours Marks 1 Introduction
More informationBiPAC BiPAC User Manual
BiPAC 2071 HomePlug AV 200 Ethernet Adapter BiPAC 2072 HomePlug AV 200 Ethernet Bridge with AC-Pass Through User Manual Table of Contents Chapter 1...1 Introduction...1 Specifications...2 Features...3
More informationWAP-Sync-Spec. Data Synchronisation Specification Version 30-May Wireless Application Protocol WAP-234-SYNC a
WAP-Sync-Spec Data Synchronisation Specification Version 30-May-2001 Wireless Application Protocol WAP-234-SYNC-20010530-a A list of errata and updates to this document is available from the WAP Forum
More informationGigabit SSL VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the
More informationOpen Message Queue mq.dev.java.net. Alexis Moussine-Pouchkine GlassFish Evangelist
Open Message Queue mq.dev.java.net Alexis Moussine-Pouchkine GlassFish Evangelist 1 Open Message Queue mq.dev.java.net Member of GlassFish project community Community version of Sun Java System Message
More information