free counter

Wednesday, February 4, 2009

Video share

Video share
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Video Share is an IP Multimedia System (IMS) enabled service for mobile networks that allows users engaged in a circuit switch voice call to add a unidirectional video streaming session over the packet network during the voice call. Any of the parties on the voice call can initiate a video streaming session. There can be multiple video streaming sessions during a voice call, and each of these streaming sessions can be initiated by any of the parties on the voice call. The video source can either be the camera on the phone or a pre-recorded video clip.

Video share is initiated from within a voice call. After a voice call is established, either party (calling or called) can start a Video Share (VS) session. The sending User is then able to stream one-way live or recorded video. The default behavior is that the receiving handset will automatically go to speakerphone mode when video is received, unless the headset is in place. The sender will be able to see what is being streamed on their handset, along with the receiving User. In this scenario, the sender can “narrate” over the CS audio connection while both parties view the video. Both users will have the ability initiate a video share session, and either the sender or recipient in a video share session can terminate the session at any time. As part of the VS invitation, the recipient can choose to reject the streamed video. It is intended that both sender and receiver will receive feedback when the other party terminates a session or the link drops due to lack of coverage.
The Video Share service is defined by the GSM Association (GSMA). It is often referred to as a Combinational Service, meaning that the service combines a circuit switch voice call with a packet switch multimedia session. This concept is described in the 3rd Generation Partnership Project (3GPP) specification documents 3GPP TS 22.279, 3GPP TS 23.279 and 3GPP TS 24.279. The Video Share service requires a 3GPP compliant IMS core system.
GSM Association has split the Video Share service definition [1] into 2 distinct phases. The first phase (also called Phase 1) involves sharing a simple peer-to-peer, one-way video stream in conjunction with, but not synchronized to a circuit switch voice call. The second phase (also called Phase 2) introduces the Video Share Application Server in the solution and supports more complex features and capabilities, such as point-to-multipoint video share calls, video streaming to a web portal, and integration of video share with instant messaging.
In the industry, Video Share is also referred to by other names such as See What I See and Rich Voice Call.

MVPN

MVPN
From Wikipedia, the free encyclopedia
Jump to: navigation, search
A mobile Virtual Private Network (VPN) is telecommunication solution that integrates all offices and employees in a common network that includes all mobile and desk phones. Simultaneously mVPN makes internal communication more efficient, by providing additional services and guarantees high quality for best value. Through a connection between a leased line (E1/T1) and an enterprise PABX (Private Automatic Branch Exchange) system, it connects remote and mobile users with the company.[1]
Using mVPNs the company has the following advantages [2]:
Direct connectivity - the corporate network becomes part of mobile operator's network through direct connection
Private numbering plan - the communication is tailored to company organisation
Corporate Business Group - all offices and employees are part of one common group, that includes all mobile and desk phones
Short dialling - a short number to access each employee, no meter on his mobile or desk phone
Smart Divert - easy divert within company group
Groups and subgroups - Several sub-groups could be defined within the group with different changing as well as with separate numbering plan
Calls control - certain destinations could be allowed or barred both on mobile and desk phones.
MVPN also stands for Multicast-VPN, which is an IETF draft which describes the implementation of customer multicast traffic over a service provider enabled MPLS backbone.
Retrieved from "http://en.wikipedia.org/wiki/MVPN"

Supporting software

Supporting software

A BlackBerry 8800 with custom theme and wallpaper.

BlackBerry handhelds are integrated into an organization's e-mail system through a software package called "BlackBerry Enterprise Server" (BES). Versions of BES are available for Microsoft Exchange, Lotus Domino and Novell GroupWise. While individual users may be able to use a wireless provider's e-mail services without having to install BES themselves, organizations with multiple users usually run BES on their own network. Some third-party companies provide hosted BES solutions. Every BlackBerry has an id called BlackBerry PIN, which is used to identify the device to the BES.

CPU

CPU

Early BlackBerry devices used Intel-80386-based processors.[6] The latest Blackberry 9000 series is equipped with Intel XScale 624MHz CPU,which makes it the fastest Blackberry to date. Earlier BlackBerry 8000 series smartphones, such as the 8700 and the Pearl, are based on the 312MHz ARM XScale ARMv5TE PXA900. An exception to this is the BlackBerry 8707 which is based on the 80MHz Qualcomm 3250 chipset, this was due to the ARM XScale ARMv5TE PXA900 chipset not supporting 3G networks. The 80MHz Processor in the BlackBerry 8707 actually meant the device was often slower to download and render web pages over 3G than the 8700 was over EDGE networks.

Operating system

Operating system
Main article: BlackBerry OS

BlackBerry 7250RIM provides a proprietary multi-tasking operating system (OS) for the BlackBerry, which makes heavy use of the device's specialized input devices, particularly the scroll wheel (1995–2006) or more recently the trackball (September 12th 2006–Present). The OS provides support for MIDP 1.0 and WAP 1.2. Previous versions allowed wireless synchronization with Microsoft Exchange Server's e-mail and calendar, as well as with Lotus Domino's e-mail. The current OS 4 provides a subset of MIDP 2.0, and allows complete wireless activation and synchronization with Exchange's e-mail, calendar, tasks, notes and contacts, and adds support for Novell GroupWise and Lotus Notes.

Third-party developers can write software using these APIs, proprietary BlackBerry APIs as well, but any application that makes use of certain restricted functionality must be digitally signed so that it can be associated to a developer account at RIM. This signing procedure guarantees the authorship of an application, but does not guarantee the quality or security of the code.

Similar hoaxes

Similar hoaxes

A similar hoax was attempted in July 2005. This hoax proposed a sexual practice called "greenlighting," in which men and women wore green shirts with the collars turned up, and had sexual relations with whoever turned the collars down. In truth, no such sexual practice has taken place on any notable scale. The hoax similarly involved posts to the blogosphere, and various sites that purported to coordinate and discuss among "greenlighters".

Toothing

Toothing

It appears that toothing started around March 2004, in the form of a fake forum designed by Ste Curran, then Editor at Large at games magazine Edge, and ex-journalist Simon Byron. On April 4, 2005, the creators of the forum admitted that the whole thing was a hoax.[1]

In toothing, a Bluetooth device is used to "discover" other enabled devices within about 30 feet (10 meters), then send the expression toothing? as an initial greeting. In addition, or when sending of text messages via Bluetooth is not possible, the Bluetooth name of the phone can be set to toothing? or something else to indicate interest. Since the hoax, there have been real Bluetooth dating devices to hit the market.

MoSoSo issues

MoSoSo issues

Being highly personalized and contextualized, privacy issues represent one of bigger obstacles to the wide adoption of MoSoSo

MoSoSo, a technical perspective

MoSoSo, a technical perspective

From a technical point of view, MoSoSo applications are very connected to the concept of Mobile Internet and the emphasis is more on data sharing than mere communication. Thus, only mobile phones with computational power, or Smartphones, can host this kind of applications. However, as there is not a universal definition of MoSoSo yet, many people consider as MoSoSo also phone calls and text messages, as they support social interaction on the move. In any case, the former perspective encounters wider consensus than the latter. The development of MoSoSo applications is rapid and already evolved from mobile extensions of Internet social networking sites to powerful software, providing novel opportunities for social interaction, especially when used for proximity interactions based on Bluetooth scanning and connectivity. The availability of GPS systems and the integration of maps in mobile devices offer great opportunities not only in the context of individual activities, such as "search", but especially in the social context. MoSoSo exploiting these possibilities is known as LBS-MoSoSo.

MoSoSo

MoSoSo, Social Software and Groupware (CSCL and CSCW)

The term itself has its roots in social software and Groupware, computer applications designed for the desktop environment and aiming at facilitating various forms of social interaction, with the former being oriented to Internet-based informal exchanges, daily tasks and entertainment and the latter focusing on collaborative work (CSCW) or learning (CSCL) within a well defined group. Two typical groups that would benefit from these applications are work colleagues or school classmates. While the term social software, introduced by Clay Shirky in recent years, has gained much popularity, Groupware is not anymore a trendy word, even if it has a strong tradition that goes back to the Eighties. Scientific research on Computer Supported Cooperative Work (CSCW) and Computer Supported Collaborative Learning (CSCL) provides results which are still valid in the mobile environment. However, three important differences between desktop and mobile environments should be taken into account when conducting research on MoSoSo: firstly, the physical context of use moves from static desktop setting, where the user is typically sitting in front of his computer, to the more dynamic mobile context, which presents higher constraints to human attention, but also provides an opportunity for information or communication at anytime and anywhere. Secondly, the social context becomes wider, shifting from the group to the network concept. Rather than relying on static and known membership criteria, where group members usually know each other, social network ties change often and are not as dense as in traditional groups. Therefore, network boundaries cannot be easily identified. A mobile social network is the social space determined by a MoSoSo application. Finally, an important distinction concerns the ultimate goal of MoSoSo applications, designed for usage in everyday life situations, including not only tools for communication, but also for coordination and knowledge sharing. From this perspective, MoSoSo is more similar to social software than Groupware applications, which aimed at increasing productivity and teamwork at work or at school.

BREW

BREW

In terms of use, Java ME is followed by BREW. BREW can provide complete control of the handset and access to all its functionality. However the power provided by native code with direct access to the handset APIs, has caused the BREW development process to be tailored largely towards recognized software vendors. While the BREW SDK (Software Development Kit) is freely available, running software on real mobile hardware (as opposed to the provided emulator) requires a digital signature which can only be generated with tools issued by a handful of parties, namely mobile content providers and Qualcomm themselves. Even then, the game will only work on test enabled devices. To be downloadable on regular phones the software must be checked, tested and given approval by Qualcomm via their TRUE BREW Testing program.

Java ME

Java ME

The dominant mobile software platform is Java[citation needed] (in its incarnation as "Java Platform, Micro Edition", "Java ME", or formerly "J2ME" ). Java ME runs atop a Virtual Machine (called the KVM) which allows reasonable, but not complete, access to the functionality of the underlying phone. The JSR process serves to incrementally increase the functionality that can be made available to Java ME, while also providing Carriers and OEMs the ability to prevent access, or limit access to provisioned software.

This extra layer of software provides a solid barrier of protection which seeks to limit damage from erroneous or malicious software. It also allows Java software to move freely between different types of phone (and other mobile device) containing radically different electronic components, without modification. The price that is paid is a modest decrease in the potential speed of the game and the inability to utilise the entire functionality of a phone (as Java software can only do what this middle-man layer supports.)

Because of these extra security and compatibility, it is usually a quite simple process to write and distribute Java mobile applications (including games) to a wide range of phones. Usually all that is needed is a freely available JDK (Java Development Kit) for creating Java software itself, the accompanying Java ME tools (known as the Java Wireless Toolkit) for packaging and testing mobile software, and space on a web server (web site) to host the resulting application once it is ready for public release.from many sites you can download mobile softwares

Enterprise digital assistant

Enterprise digital assistant

From Wikipedia, the free encyclopedia

Jump to: navigation, search

An Enterprise digital assistant (EDA) is a handheld computer, born of the Personal digital assistant popularity which was adapted for extensive more robust usage within the Small and medium enterprises|SME (Small to Medium Enterprise) and Enterprise business Application software|Applications as a Data Capture mobile device.

Over the years, these business applications have grown from simple batched data collection using Barcode readers to include extensive usage of other expanding business technologies within the areas of WLANs (Wireless Local Area Networks), GPRS Edge Communications, Biometrics, Magnetic Stripe, Smart Card and RFID data capture technologies.

EDAs are also known as Data Capture Mobile Devices or Batch Terminals or Portables.

EDAs have many uses in many types of business: Warehouse management, Inventory control and Field Services to mentions a few.

EDAs, are to the business sector, what the Personal digital assistant where to the domestic sector, which allows business applications to combine a portable device with their data collection requirements.

As is the case with Personal digital assistant|PDAs, EDAs may include a Touch Screen, IrDA, Bluetooth, a Memory card slot, however EDAs may also include one or more data capture devices

Further reading

Further reading

Mobile ad hoc social network (Overview):

  • Rheingold, Howard (2002). "MAS 214, Macquarie University, Smart Mobs: The Next Social Revolution". The Power of the Mobile Many: 288.

Packet Radio Papers:

  • Burchfiel, J., Tomlinson, R., Beeler, M. (1975). "Functions and structure of a packet radio station". AFIPS: 245.
  • Kahn, R. E. (January 1977). "The Organization of Computer Resources into a Packet Radio Network". IEEE Transactions on Communications COM-25 (1): 169–178.
  • Kahn, R. E., Gronemeyer, S. A., Burchfiel, J., Kunzelman, R. C. (November 1978). "Advances in Packet Radio Technology". Proceedings of IEEE 66 (11): 1468–1496.
  • Jubin, J., and Tornow, J. D. (January 1987). "The DARPA Packet Radio Network Protocols". Proceedings of the IEEE 75 (1).
  • N. Schacham and J. Westcott (January 1987). "Future directions in packet radio architectures and protocols". Proceedings of the IEEE 75 (1): 83–99. doi:10.1109/PROC.1987.13707.

Ad Hoc Network Papers (Overview):

  • Royer, E., Toh, C. (April 1999). "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks". IEEE Personal Communications 6 (2): 46–55. doi:10.1109/98.760423

Practical use

Practical use
One Laptop per Child program has developed a laptop making use of an IEEE 802.11s based ad hoc wireless mesh networking chip to develop the box. It is the only such device sold to consumers.

In September 2007, the Swedish company TerraNet AB presented a mesh network of mobile phones allowing for the routing of calls and data between participating hand sets, without the need to involve cell sites

Types of MANET

Types of MANET
Vehicular Ad Hoc Networks (VANET) are a form of MANETs used for communication among vehicles and between vehicles and roadside equipment.

Intelligent vehicular ad hoc network (InVANET) is a kind of Intelligence in Vehicle(s) which provide multiple autonomic intelligent solutions to make automotive vehicles to behave in intelligent manner during vehicle-to-vehicle collisions, accidents

Mobile ad hoc networks (MANET)

Mobile ad hoc networks (MANET)

From Wikipedia, the free encyclopedia

(Redirected from Mobile ad-hoc network)
Jump to: navigation, search

A mobile ad hoc network (MANET) is a type of wireless ad hoc network, and is a self-configuring network of mobile devices connected by any number of wireless links. Every device in a MANET is also a router because it is required to forward traffic unrelated to its own use. Each MANET device is free to move independently, in any arbitrary direction, and thus each device will potentially change its links to other devices on a regular basis. The primary challenge for building a MANET is for each device to continuously maintain the information required to properly route traffic.

Such networks may operate in a standalone fashion, or may be connected to the larger Internet.

MANET are special cases of several other types of wireless and mesh networks, but have some key differences, at least in common usage, as listed below:

MANET are sometimes referred to as mobile mesh networks[1].

MANET have became a popular subject for research as laptops and 802.11/Wi-Fi wireless networking became widespread in the mid to late 1990s. Many of the academic papers evaluate protocols and abilities assuming varying degrees of mobility within a bounded space, usually with all nodes within a few hops of each other, and usually with nodes sending data at a constant rate. Different protocols are then evaluated

Mobile computing

Mobile computing: in-vehicle computing and fleet computing

Many commercial and government field forces deploy a ruggedized portable computer such as the Panasonic Toughbook or larger rack-mounted computers with their fleet of vehicles. This requires the units to be anchored to the vehicle for driver safety, device security, and user ergonomics. Ruggedized computers are rated for severe vibration associated with large service vehicles and off-road driving, and the harsh environmental conditions of constant professional use such as in EMS, fire and public safety.

Other elements that enables the unit to function in vehicle:

  • Operating Temperature: A vehicle cabin can often experience temperature swings from -20F to +140F. Computers typically must be able to withstand these temperatures while operating. Typical fan based cooling has stated limits of 95F-100F of ambient temperature, and temperature below freezing require localized heaters to bring components up to operating temperature(based on independent studies by the SRI Group and by Panasonic R&D).
  • Vibration: Vehicles typically have considerable vibration that can decrease life expectancy of computer components, notably rotational storage such as HDDs.
  • Daylight, or sunlight readability: Visibility of standard screens becomes an issue in bright sunlight.
  • Touchscreens: These enable users to easily interact with the units in the field without removing gloves.
  • High-Temperature Battery Settings:. Lithium Ion batteries are sensitive to high temperature conditions for charging. A computer designed for the mobile environment should be designed with a high-temperature charging function that limits the charge to 85% or less of capacity.
  • External wireless Connections, and External GPS Antenna Connections: Necessary to contend with the typical metal cabins of vehicles and their impact on wireless reception, and to take advantage of much more capable external tranception equipment.

Several specialized manufacturers such as National Products Inc (Ram Mounts), Gamber Johnson and LedCo build mounts for vehicle mounting of computer equipment for specific vehicles. The mounts are built to withstand the harsh conditions and maintain ergonomics.

Specialized installation companies, such as TouchStar Pacific, specialize in designing the mount design, assembling the proper parts, and installing them in a safe and consistent manner away from airbags, vehicle HVAC controls, and driver controls. Frequently installations will include a WWAN modem, power conditioning equipment, and WWAN/WLAN/GPS/etc… transceiver antennæ mounted external to the vehicle.

human interface

[edit] Technical and other limitations of mobile computing

  • Insufficient bandwidth

If the user needs access to a network such as the internet on the go, they must resort to slow wireless WAN systems primarily intended for telephone use. Higher speed wireless LANs are only available in specific sites

  • Security standards

When working mobile one is dependent on public networks, requiring careful use of VPNs.

  • Power consumption

Since the grid can not be used, mobile computers must rely entirely on battery power. Combined with compact size, this means unusually expensive batteries must be used

  • Transmission interferences

Weather and terrain problems as well as distance-limited connection exist with some technologies. Reception in tunnels and some buildings is poor.

  • Potential health hazards

Potential health damage from cellular radio frequency emission is not known yet. However, more car accidents are related to drivers who were talking through a mobile device. Also, cell phones may interfere with sensitive medical devices.

  • Human interface with device

As HMDs are still uncommon, screens are often too small. Keyboards are impractical, especially one-handed, and alternate methods such as speech or handwriting recognition require training.

  1. GH Forman, J Zahorjan - Computer, 1994 - doi.ieeecomputersociety.org
  2. David P. Helmbold, "A dynamic disk spin-down technique for mobile computing", citeseer.ist.psu.edu, 1996
  3. MH Repacholi, "health risks from the use of mobile phones", Toxicology Letters, 2001 - Elsevier
  4. Landay, J.A. Kaufmann, T.R., "user interface issues in mobile computing", Workstation Operating Systems, 1993.
  5. T Imielinski, BR Badrinath "mobile wireless computing, challenges in data management- Communications of the ACM, 1994 - portal.acm.org