REROUTING VOICE OVER IP CALLS BASED IN QOS

Size: px
Start display at page:

Download "REROUTING VOICE OVER IP CALLS BASED IN QOS"

Transcription

1 1 REROUTING VOICE OVER IP CALLS BASED IN QOS DESCRIPTION BACKGROUND OF THE INVENTION 1.- Field of the invention The present invention relates to telecommunications field. More specifically, in the contextaware applications, which are able to provide custom information to each user in function of his profile, obtained from an statistical process. 2.- Description of the Related Art 1 2 The accurate localization of objects and people has long been considered an important building block for ubiquitous computing applications. The most commonly available location technology today is the Global Positioning System (GPS). Unfortunately, GPS does not work well indoors, in urban canyons, or in similar areas with most research on indoor localization systems has been based limited view of the sky. Instead, on the use of short-range signals, such as [P. Bahl, V.N. Padmanabhan, RADAR: An in-building RF-based user location and tracking system, in:proceedings of INFOCOM, 00.], Bluetooth [L. Aalto, N. Gothlin, J. Korhonen, T. Ojala, Bluetooth and WAP push based location-aware mobile advertising system, in: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, ACM Press, 04]0, ultra sound [N.B. Priyantha, A. Chakraborty, H. Balakrishnan, The cricket location-support system, in: Proceedings of the Sixth Annual ACM International Conference on Mobile Computing and Networking, 00], or infrared [A. Ward, A. Jones, A. Hopper, A new location technique for the active office, IEEE Personal Communications 4 () (1997)]. One first approach was proposed in [Lionel M., LANDMARC: Indoor Location Sensing Using Active RFID, Wireless Network, Volume, Number 6], which uses Radio Frequency Identification (RFID) for locating objects inside buildings. The LANDMARC approach proposed is cheaper, the environmental dynamics can be easily accommodated and have high accuracy and reliability. However, this approach can locate objects, but is not able to provide object

2 2 1 2 information. Another inconvenient is that is needed to install RDF readers in the selected place and the needed to add an RDF tag to cell phones. Infrared approaches are not considered because the lie-of-sight requirement and short-range signal transmission are two major limitations that suggest it to be less than effective in practice for indoor location sensing approaches need cell phones which supports this protocol, which is impractical because not all cell phones would be located. Ultrasonic approaches requires a great deal of infrastructure in order to be highly effective and accurate, yet the cost is so exorbitant that it is inaccessible to most users. A new approach is to use the GSM Indoor location proposed in [Varshavsky, A, GSM indoor localization. Pervasive and mobile computing. Volume 3, Issue 6]. This approach leverages the phone s existing hardware and removes the need for additional radio interfaces. Therefore, is not needed to deal with any new infrastructure, because makes use of the existing GSM infrastructure, obviating the need for infrastructure investment and greatly increasing the possible area in which the system will work. To carry out the application we want, it is considered that this latter approach is the most optimal, and therefore will be used. The key idea that makes accurate GSM-based indoor localization possible is the use of wide signal-strength fingerprints. The wide fingerprint includes the 6-strongest GSM cells and readings of up to 29 additional GSM channels, most of which are strong enough to be detected, but too weak to be used for efficient communication. The higher dimensionality introduced by the additional channels dramatically increases localization accuracy. Two factors lead to the good performance of radio fingerprinting in the wireless band used by GSM and networks. The first is that the signal strengths observed by mobile devices exhibit considerable spatial variability at the 1 m level. That is to say, a given radio source may be heard stronger or not at all a few meters away. The second factor is that these same signal strengths are consistent with time; the signal strength from a given source at a given location is likely to be similar tomorrow and next week. In combination, this means that there is a radio profile that is feature rich in space and reasonably consistent with time. Fingerprinting-based location techniques take advantage of this by capturing this radio profile for later reference. Fingerprinting relies on a training phase in which a mobile device moves through the environment recording the strength of signals emanating from a group of GSM base stations.

3 3 Once the training phase is complete, a client can estimate its location by performing a radio scan (or equivalently collecting a testing point) and feeding it to a localization algorithm, which estimates the client s location based on the similarity of the signal strength signatures between the testing and the training points. This system will be used to locate users, basic part of the application. Once the users can be located into certain area, The next step is to create different user profiles in order to publish and generate the different auctions. This process will be explained in the next section. SUMMARY OF THE INVENTION 1 2 Terms context aware and ubiquitous computing have been in recent years important fields of research. Devices are smaller and more powerful each day and interactivity with them is being improved continuously. By improving the computer s access to context [], we increase the richness of communication in human-computer interaction and make it possible to produce more useful computational services. This document presents a new application oriented to sending personalized advertising to specific users in a certain place. System detects the different cell phones placed in a certain place and process this information to obtain the different cell phone s owner profiles. After that, this information is shown to several companies interested in send advertisements to these users. Then is organized an auction in which companies bid on the basis of user profiles located on the site. The system not only has the information obtained from user profiles, but also may provide information on other contextual conditions that may be relevant for companies such as temperature or weather In this way, companies know the user profile and bid with more interest if the average profile of the users match the user profile that does business focus. Users also are favored by the use of this application to organize the publicity they are sent because they receive more personalized and that better fits their personal interests. The detection of users is done using the algorithm proposed in [], based in GSM location, which provides some benefits: 1) GSM coverage far exceeds the coverage of networks 2) The wide acceptance of cellular phones makes them ideal conduits for the delivery of

4 4 1 ubiquitous computing applications. A localization system based on cellular signals, such as GSM, leverages the phone s existing hardware and removes the need for additional radio interfaces 3) Because cellular towers are dispersed across the covered area, a cellular-based localization system would still work in situations where a building s electrical infrastructure has failed. Once users are identified, these data are sent to the operator, who processes this data to create different user profiles. These user profiles are obtained from a data mining process which are based in the algorithm proposed in []. Results of this process are published in a web page and companies can consult the different user profiles collected and bid in order to send advertising messages to the intended users. This auction will be available during a certain period of time that the end will tell the winning company to send advertising their services to users and automatically send a short message or an multimedia message about company s services. BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 shows a diagram of the lifecycle of the proponed application. Firstly Users located identifications and details from companies are delivered to the control system, which provides info to companies and manages the auction. Once the auction is finished, winner company send information to users. 2 DETAILED DESCRIPTION OF THE INVENTION Detecting users The recent growth of interest in pervasive computing and location-aware systems and services provides a strong motivation to develop techniques for estimating the location of devices and hence users in both outdoor and indoor environments. Indoor location estimation is particularly challenging due to the poor indoor coverage of Global Positioning System (GPS). One approach to indoor location estimation is to deploy a dedicated sensor network (e.g. using infra-red or ultra-sound technology), but this has obvious cost and maintenance ramifications. Finally, chosen option was based in GSM location aware. The key idea that makes

5 1 2 accurate GSM-based indoor localization possible is the use of wide signal-strength fingerprints. The wide fingerprint includes the 6-strongest GSM cells and readings of up to 29 additional GSM channels, most of which are strong enough to be detected, but too weak to be used for efficient communication. The higher dimensionality introduced by the additional channels dramatically increases localization accuracy. GSM-based indoor localization has several benefits: (i) GSM coverage far exceeds the coverage of networks; (ii) the wide acceptance of cellular phones makes them ideal conduits for the delivery of ubiquitous computing applications. A localization system based on cellular signals, such as GSM, leverages the phone s existing hardware and removes the need for additional radio interfaces; (iii) because cellular towers are dispersed across the covered area, a cellular-based localization system would still work in situations where a building s electrical infrastructure has failed. Moreover, cellular systems are designed to tolerate power failures. For example, the cellular network kept working during the massive power outage that left most of the Northeastern United States and Canada in the dark in the Summer of 03; (iv) GSM, unlike networks, operates in a licensed band, and therefore does not suffer from interference from nearby devices transmitting on the same frequency (e.g., microwaves, cordless phones); and (v) the significant expense and complexity of cellular base stations1 result in a network that evolves slowly and is only reconfigured infrequently. While this lack of flexibility (and high configuration cost) is certainly a drawback for the cellular system operator, it results in a stable environment that allows the localization system to operate for a long period before having to be recalibrated. Processing the data Data about users can be obtained from some different sources, like registry in system form, data obtained from client purchases or different loyalty cards. This is an easy way to solve the knowledge bottleneck problem. Once the problem of source of data is solved, the system have to be able to process these data. There are several approaches to obtain a good user modeling without an intrusive way of obtain data from users before modeling them. Some of these approaches are based in Artificial Intelligence, but these systems are complex and expensive. The approach selected to model the users is proposed in, is a simple but effective system in which users rate some items and algorithm later is able to predict the users true rating about other items. We assume a set of N users {1,.,N}, a set of M items {1,.,M}, and a set of V discrete rating values {1,,V}. In the natural case where each user has at most one rating for each item y, the ratings for each user form a vector with one component per item. Of course, the

6 values of some components are not known. We refer to user u's rating vector as their rating profile denoted. Rating prediction is the elementary task performed with rating-based data. Given a particular item and user, the goal is to predict the user's true rating for the item in question. Building the auction application Once users are located and user profile generated, it s time to build an application which provides an auction service to companies interested in send advertisements to cell phone users. The application will be web based because companies should be able to connect with the system in real time to bid. The interface will be intuitive and should provide in an easy and simple way all the statistical data. Companies must have all available information to make their bids knowing all the possibilities. Time to time, depending on each situation, the system looks for users located within the area and generate statistical study with different user profiles. Then, the system will notify via to all the companies registered in the system that a new auction is available. Companies review statistical study results and in light of that, consider whether it is interest then send their advertising to users located in the area. By notifications via companies follow the course of the auction and the end of the auction process is notified to the winning company that can send his advertising. At that time it displays a form to the winning company in which introducing the parameters of the message to send to users. This system provides a new way to send personalized advertising to users, in which firms choose when they send their advertising in terms of people located in a particular precinct. This system also provides added value to users, receiving information relating to their own tastes.

7 7 1 CLAIMS 1.- A method to obtain a list of cell phones located in a certain place using a based on GSM implementation. 2.- An application in which different companies can be registered and publish their own interest fields. 3.- A system which processes the data obtained from claims 1 and two and obtain different statistical profiles from users detected in claim An application which notify to companies of claim 2that process of claim 3 is finished and the auction will start..- Application will provide a service to companies in which can bid to send advertisement messages to the different user profiles. 6.- System will notify about all the changes in the auction to all the companies interested in send information to certain group of users with a given profile. 7.- at the end of the auction process is notified to the winning company that can send his advertising. 8.- After, system displays a form to the winning company in which introducing the parameters of the message to send to users.

8 8 REROUTING VOICE OVER IP CALLS BASED IN QOS ABSTRACT Problems: Companies want to send information about their services to users interested in that services. Users are well disposed to get personalized information in their own mobile phone, but not any information. Solution: Combine information form users located in a certain place with information of context to obtain different user profiles. Companies will bid for send information to users. Users received information related to their own tastes. 1

9 9 DRAWINGS FIG 1

Accurate GSM Indoor Localization

Accurate GSM Indoor Localization 141 Accurate GSM Indoor Localization Veljo Otsason 1, Alex Varshavsky 2, Anthony LaMarca 3, and Eyal de Lara 2 1 Tartu University, veljo.otsason@utoronto.ca 2 University of Toronto, walex,delara@cs.toronto.edu

More information

This article was published in an Elsevier journal. The attached copy is furnished to the author for non-commercial research and education use, including for instruction at the author s institution, sharing

More information

Research on RFID Indoor Localization Algorithm

Research on RFID Indoor Localization Algorithm , pp.70-75 http://dx.doi.org/10.1457/astl.014.5.1 Research on RFID Indoor Localization Algorithm Yunhua Gu 1,, Junyong Zhang 1,, Jin Wang 1,, Bao Gao 1,, Jie Du 1, 1)Jiangsu Engineering Center of Network

More information

Positioning with Bluetooth

Positioning with Bluetooth Positioning with Bluetooth Josef Hallberg, Marcus Nilsson, Kåre Synnes Luleå University of Technology / Centre for Distance-spanning Technology Department of Computer Science and Electrical Engineering

More information

Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8

Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8 Guide to Wireless Communications Digital Cellular Telephony Chapter 2 Learning Objectives Digital Cellular Telephony 3 Describe the applications that can be used on a digital cellular telephone Explain

More information

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is

More information

iforward Solution Description Ahmed Abogendia An industry standard in lowering Infrastructure Cost through Intelligent Call Forwarding

iforward Solution Description Ahmed Abogendia An industry standard in lowering Infrastructure Cost through Intelligent Call Forwarding iforward An industry standard in lowering Infrastructure Cost through Intelligent Call Forwarding Solution Description Ahmed Abogendia 2 iforward Introduction... 3 Benefits to Network Operator:... 5 Benefits

More information

Environmental Monitoring: Guide to Selecting Wireless Communication Solutions

Environmental Monitoring: Guide to Selecting Wireless Communication Solutions Environmental Monitoring: Guide to Selecting Wireless Communication Solutions By: Scott South Published in WaterWorld, January 2005 (Page 48) Rapidly growing demands for information and increased productivity

More information

Deploying In-Building Wireless Solutions

Deploying In-Building Wireless Solutions Deploying In-Building Wireless Solutions How enterprise, wireless service providers and building owners can better serve their employees, customers and tenants by deploying a converged in-building wireless

More information

Mobile Commerce and Ubiquitous Computing. Chapter 6

Mobile Commerce and Ubiquitous Computing. Chapter 6 Mobile Commerce and Ubiquitous Computing Chapter 6 Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure

More information

Hybrid cargo-level tracking system for logistics. Proceedings of the IEEE Vehicular Technology Conference. Copyright IEEE.

Hybrid cargo-level tracking system for logistics. Proceedings of the IEEE Vehicular Technology Conference. Copyright IEEE. Title Hybrid cargo-level tracking system for logistics Author(s) Yang, GH; Xu, K; Li, VOK Citation The 71st IEEE Vehicular Technology Conference (VTC2010- Spring), Taipei, Taiwan, 16-19 May 2010. In Proceedings

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

CHAPTER 1 1 INTRODUCTION

CHAPTER 1 1 INTRODUCTION CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful

More information

Network Communications System. Redefining Intelligent Utility Communications

Network Communications System. Redefining Intelligent Utility Communications Network Communications System Redefining Intelligent Utility Communications Technology that takes you from today to tomorrow. FlexNet Technology you can trust FlexNet is a robust, high-powered solution

More information

Intelligent Home Automation and Security System

Intelligent Home Automation and Security System Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology

More information

Alcatel-Lucent In-building Wireless Continuity Solution for Healthcare

Alcatel-Lucent In-building Wireless Continuity Solution for Healthcare S T R A T E G I C W H I T E P A P E R Alcatel-Lucent In-building Wireless Continuity Solution for Healthcare Healthcare facilities are under pressure to provide high-quality wireless coverage using a range

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

Are GSM phones THE solution for localization?

Are GSM phones THE solution for localization? Are GSM phones THE solution for localization? Alex Varshavsky ½,MikeY.Chen,EyaldeLara ½, Jon Froehlich ¾, Dirk Haehnel, Jeffrey Hightower, Anthony LaMarca, Fred Potter ¾, Timothy Sohn, Karen Tang, and

More information

Early Warning Fire Detection and Integrated Security Solution. System Overview

Early Warning Fire Detection and Integrated Security Solution. System Overview Early Warning Fire Detection and Integrated Security Solution System Overview The FirePosse Early Warning Fire Detection and Integrated Security System from Firebreak Canada Corp. represents a major advance

More information

White paper Mobile duress alarm systems

White paper Mobile duress alarm systems White paper Mobile duress alarm systems Table of Contents Table of Contents...1 What is a Mobile Duress Alarm System?...2 Who Needs a Mobile Duress Alarm System?...2 Finance...3 Application Note: Bank

More information

Will you find me... Employee Safety Monitoring

Will you find me... Employee Safety Monitoring Will you find me... Employee Safety Monitoring i ii // BLACKLINE SAFETY // VALUE Comprehensive, Realtime Safety Monitoring Pin-point Emergency Response Blackline s Loner employee safety monitoring solutions

More information

Hyperbolic Location Fingerprinting: A Calibration-Free Solution for Handling Differences in Signal Strength

Hyperbolic Location Fingerprinting: A Calibration-Free Solution for Handling Differences in Signal Strength Hyperbolic Location Fingerprinting: A Calibration-Free Solution for Handling Differences in Signal Strength Mikkel Baun Kjærgaard and Carsten Valdemar Munk University of Aarhus, Department of Computer

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular

More information

Alcatel-Lucent Small Cell Solution. Where small is the next big thing

Alcatel-Lucent Small Cell Solution. Where small is the next big thing Alcatel-Lucent Small Cell Solution Where small is the next big thing The Alcatel-Lucent Small Cell solution costeffectively extends wireless network coverage and capacity while simultaneously offloading

More information

Miltel Communications Ltd. Data Acquisition and Transport Enabling the Smarter City

Miltel Communications Ltd. Data Acquisition and Transport Enabling the Smarter City Miltel Communications Ltd. Data Acquisition and Transport Enabling the Smarter City July 2013 Executive Summary Miltel has developed a generic wireless enabling technology we call Data Acquisition and

More information

Push To Talk over Cellular (PoC) and Professional Mobile Radio (PMR)

Push To Talk over Cellular (PoC) and Professional Mobile Radio (PMR) Push To Talk over Cellular (PoC) and Professional Mobile Radio (PMR) TETRA MoU Association Association House South Park Road Macclesfield SK11 6SH United Kingdom www.tetramou.com May 2004 PoC and PMR Page

More information

Cisco Context-Aware Mobility Solution: Put Your Assets in Motion

Cisco Context-Aware Mobility Solution: Put Your Assets in Motion Cisco Context-Aware Mobility Solution: Put Your Assets in Motion How Contextual Information Can Drastically Change Your Business Mobility and Allow You to Achieve Unprecedented Efficiency What You Will

More information

Raitoharju, Matti; Dashti, Marzieh; Ali-Löytty, Simo; Piché, Robert

Raitoharju, Matti; Dashti, Marzieh; Ali-Löytty, Simo; Piché, Robert Tampere University of Technology Author(s) Title Citation Raitoharju, Matti; Dashti, Marzieh; Ali-Löytty, Simo; Piché, Robert Positioning with multilevel coverage area models Raitoharju, Matti; Dashti,

More information

WLAN-Based Location-Aware Applications for Hospitals

WLAN-Based Location-Aware Applications for Hospitals WLAN-Based Location-Aware Applications for Hospitals PanGo Networks, Inc. January 2005 2005 PanGo Networks, Inc. All Rights Reserved Introduction Hospital environments inherently involve mobility. The

More information

Making the CarePoint Resident System right for you. Scaleable solutions for your senior living community

Making the CarePoint Resident System right for you. Scaleable solutions for your senior living community Making the CarePoint Resident System right for you Scaleable solutions for your senior living community Creating a safer CarePoint is a powerful, integrated, easy-to-use Resident Safety System that well

More information

Introductory Concepts

Introductory Concepts Chapter 1 Introductory Concepts 1.1 Introduction Communication is one of the integral parts of science that has always been a focus point for exchanging information among parties at locations physically

More information

ENGN4536 Mobile Communications

ENGN4536 Mobile Communications ENGN4536 Mobile Communications Dr Thushara Abhayapala Department of Engineering Faculty of Engineering & Information Technology Australian National University thushara@faceng.anu.edu.au http://www.webct.anu.edu.au

More information

House Committee on the Judiciary. Subcommittee on the Constitution, Civil Rights, and Civil Liberties

House Committee on the Judiciary. Subcommittee on the Constitution, Civil Rights, and Civil Liberties House Committee on the Judiciary Subcommittee on the Constitution, Civil Rights, and Civil Liberties Hearing on ECPA Reform and the Revolution in Location Based Technologies and Services Testimony of Professor

More information

A Hierarchical Architecture for Indoor Positioning Services

A Hierarchical Architecture for Indoor Positioning Services A Hierarchical Architecture for Indoor Positioning Services Li-Der CHOU and Chun-Yen CHANG Department of Computer Science and Information Engineering, National Central University Chungli, Taoyuan, Taiwan

More information

LANDMARC: Indoor Location Sensing Using Active RFID

LANDMARC: Indoor Location Sensing Using Active RFID Wireless Networks 10, 701 710, 2004 2004 Kluwer Academic Publishers. Manufactured in The Netherlands. LANDMARC: Indoor Location Sensing Using Active RFID LIONEL M. NI and YUNHAO LIU Department of Computer

More information

Telephony Solution for Local Multi-Point Distribution Service

Telephony Solution for Local Multi-Point Distribution Service Telephony Solution for Local Multi-Point Distribution Service Derek Lam Computer Systems Laboratory Aly F. Elrefaie, Lynn Plouse, Yee-Hsiang Chang Video Communications Division HPL-97-165 December, 1997

More information

WLAN Location Determination via Clustering and Probability Distributions

WLAN Location Determination via Clustering and Probability Distributions WLAN Location Determination via Clustering and Probability Distributions Moustafa A. Youssef, Ashok Agrawala, A. Udaya Shankar Department of Comupter Science and MIND Lab University of Maryland College

More information

LTE : The Future of Mobile Broadband Technology

LTE : The Future of Mobile Broadband Technology LTE : The Future of Mobile Broadband Technology Erick Setiawan Bina Nusantara University Jakarta Barat, DKI Jakarta, Indonesia tukangbajaksawah@gmail.com ABSTRACT Become a necessity today, where the wireless

More information

What is the Next Generation of Human-Computer Interaction? CHI 2006 WORKSHOP

What is the Next Generation of Human-Computer Interaction? CHI 2006 WORKSHOP What is the Next Generation of Human-Computer Interaction? CHI 2006 WORKSHOP George Fitzmaurice Autodesk 210 King Street East, Toronto, Ontario, Canada fitzmaurice@acm.org To answer what is the next generation

More information

Analysis of a Device-free Passive Tracking System in Typical Wireless Environments

Analysis of a Device-free Passive Tracking System in Typical Wireless Environments Analysis of a Device-free Passive Tracking System in Typical Wireless Environments Ahmed E. Kosba, Ahmed Abdelkader Department of Computer Engineering Faculty of Engineering, Alexandria University, Egypt

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous

More information

An Area Localization Algorithm Using RFID

An Area Localization Algorithm Using RFID Internet of Things and Cloud Computing 2015; 3(4): 82-87 Published online October 31, 2015 (http://www.sciencepublishinggroup.com/j/iotcc) doi: 10.11648/j.iotcc.20150304.11 ISSN: 2376-7715 (Print); ISSN:

More information

10/14/11. Big data in science Application to large scale physical systems

10/14/11. Big data in science Application to large scale physical systems Big data in science Application to large scale physical systems Large scale physical systems Large scale systems with spatio-temporal dynamics Propagation of pollutants in air, Water distribution networks,

More information

MISSING NEIGHBOR ANALYSIS

MISSING NEIGHBOR ANALYSIS MISSING NEIGHBOR ANALYSIS For WiMAX networks? WIMAX HANDOVER TYPES MISSING NEIGHBORS HOW TO IDENTIFY MISSING NEIGHBORS 1. WiMAX Handovers All mobile wireless technologies require handovers to allow the

More information

Cooperative Techniques in LTE- Advanced Networks. Md Shamsul Alam

Cooperative Techniques in LTE- Advanced Networks. Md Shamsul Alam Cooperative Techniques in LTE- Advanced Networks Md Shamsul Alam Person-to-person communications Rich voice Video telephony, video conferencing SMS/MMS Content delivery Mobile TV High quality video streaming

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

Discovering Computers

Discovering Computers Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet Chapter 10 Communications and Networks Objectives Overview Discuss the purpose of the components required for

More information

Possible Applications

Possible Applications FRAUNHOFER Institute for integrated circuits iis DECT Wireless Voice and Data Communications DECT stands for Digital Enhanced Cordless Telecommunication and is an accepted standard in more than 100 countries.

More information

How to Make Your Wireless LAN Work:

How to Make Your Wireless LAN Work: WHITE PAPER How to Make Your Wireless LAN Work: Design for Context, Coverage & Capacity February 2006 How to Make Your Wireless LAN Work: Design for Context, Coverage & Capacity 1 WLAN Design Challenges

More information

Results of IMES (Indoor Messaging System) Implementation for Seamless Indoor Navigation and Social Infrastructure Platform

Results of IMES (Indoor Messaging System) Implementation for Seamless Indoor Navigation and Social Infrastructure Platform Results of IMES (Indoor Messaging System) Implementation for Seamless Indoor Navigation and Social Infrastructure Platform Dinesh Manandhar, Seiya Kawaguchi, Hideyuki Torimoto GNSS Technologies Inc., Japan

More information

M.Eng. Thesis Proposal Node Position Estimation for the Grid Wireless Networking Protocol Benjamin Chambers Advisor: Robert Morris

M.Eng. Thesis Proposal Node Position Estimation for the Grid Wireless Networking Protocol Benjamin Chambers Advisor: Robert Morris M.Eng. Thesis Proposal Node Position Estimation for the Grid Wireless Networking Protocol Benjamin Chambers Advisor: Robert Morris Abstract This paper describes a thesis project to be carried out at the

More information

Hybrid positioning and CellLocate TM

Hybrid positioning and CellLocate TM Hybrid positioning and CellLocate TM Increased reliability and indoor positioning based on mobile network attributes Dr. Chris Marshall, Visionary Program Manager, u-blox Carl Fenger, Communications Manager,

More information

Telecommunications, the Internet, and Wireless Technology

Telecommunications, the Internet, and Wireless Technology Telecommunications, the Internet, and Wireless Technology Content Components of telecommunications networks and key networking technologies Telecommunications transmission media and types of networks Internet

More information

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers , pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang

More information

Enable Location-based Services with a Tracking Framework

Enable Location-based Services with a Tracking Framework Enable Location-based Services with a Tracking Framework Mareike Kritzler University of Muenster, Institute for Geoinformatics, Weseler Str. 253, 48151 Münster, Germany kritzler@uni-muenster.de Abstract.

More information

Wearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space

Wearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space Wearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space Michitaka Hirose Research Center for Advanced Science and Technology, The University of Tokyo 4-6-1 Komaba

More information

LTE-Advanced: Heterogeneous Networks

LTE-Advanced: Heterogeneous Networks 2010 European Wireless Conference LTE-Advanced: Heterogeneous Networks Aamod Khandekar Naga Bhushan Ji Tingfang Vieri Vanghi Qualcomm Inc., 5775 Morehouse Drive, San Diego, CA 92121 U.S.A. Abstract Long-Term

More information

Mobile Phone Terminology Simplifying telecoms management

Mobile Phone Terminology Simplifying telecoms management Mobile Phone Terminology Simplifying telecoms management _ 3G The next generation mobile network, launched in the UK in March 2003, pushed heavily by the company, Hutchison 3. The other major networks

More information

W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier

W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier W H I T E P A P E R Security & Defense Solutions Intelligent Convergence with EdgeFrontier Contents 1. Introduction... 2 2. The Need for Intelligent Convergence... 3 2.1 Security Convergence with EdgeFrontier...

More information

An ESRI White Paper May 2007 Mobile GIS for Homeland Security

An ESRI White Paper May 2007 Mobile GIS for Homeland Security An ESRI White Paper May 2007 Mobile GIS for Homeland Security ESRI 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB www.esri.com Copyright 2007 ESRI

More information

WLAN Positioning Technology White Paper

WLAN Positioning Technology White Paper WLAN Positioning Technology White Paper Issue 1.0 Date 2014-04-24 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,

More information

ProxNet: Secure Dynamic Wireless Connection by Proximity Sensing

ProxNet: Secure Dynamic Wireless Connection by Proximity Sensing ProxNet: Secure Dynamic Wireless Connection by Proximity Sensing Jun Rekimoto, Takashi Miyaki, and Michimune Kohno Interaction Laboratory, Sony Computer Science Laboratories, Inc. 3-14-13 Higashigotanda,

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 8 Wireless Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 8 Wireless Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 8 Wireless Network Security Objectives Describe the different types of wireless network attacks List the vulnerabilities in IEEE

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Objectives Describe the different types of wireless network attacks List the vulnerabilities in IEEE 802.11 security Explain the solutions for securing a wireless network 2 Introduction

More information

Guarded community solutions Easy Series for villa and apartment projects

Guarded community solutions Easy Series for villa and apartment projects Guarded community solutions Easy Series for villa and apartment projects 2 Easy Series Control Panel Making security easy and reliable Add value to your innovative real-estate projects Ambitious apartment

More information

UG4/MSc Computer Networking (CN) Wireless Communications & Networks An Overview

UG4/MSc Computer Networking (CN) Wireless Communications & Networks An Overview UG4/MSc Computer Networking (CN) Wireless Communications & Networks An Overview Mahesh K. Marina School of Informatics The University of Edinburgh mmarina@inf.ed.ac.uk http://homepages.inf.ed.ac.uk/mmarina/

More information

Rural Telecommunications (6) Access Technology II Cellular Systems

Rural Telecommunications (6) Access Technology II Cellular Systems Rural Telecommunications (6) Access Technology II Cellular Systems Jun-ichi TAKADA Department of International Development Engineering Tokyo Institute of Technology Evolution of Cellular Systems 3.9G 1G

More information

Major Risks and Recommended Solutions

Major Risks and Recommended Solutions Major Risks and Recommended Solutions www.icdsecurity.com OVERVIEW Are you familiar with the main security risks that threaten data centers? This paper provides an overview of the most common and major

More information

Interference and Metro-Scale Wi-Fi Mesh Networks. A Farpoint Group Technical Note

Interference and Metro-Scale Wi-Fi Mesh Networks. A Farpoint Group Technical Note Interference and Metro-Scale Wi-Fi Mesh Networks A Farpoint Group Technical Note Document FPG 2006-373.2 February 2007 F arpoint Group has been performing detailed studies of the effects of interference

More information

Wireless LANs vs. Wireless WANs

Wireless LANs vs. Wireless WANs White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,

More information

The Aulterra Neutralizer Reduces the Intensity of Cell Phone Radiation

The Aulterra Neutralizer Reduces the Intensity of Cell Phone Radiation Executive Summary The Aulterra Neutralizer Reduces the Intensity of Cell Phone Radiation Cell phone radiation is harmful to the body. Higher doses produce stronger damaging effects. To protect the brain

More information

Design and Development of NFC Smartphone Indoor Interactive Navigation System

Design and Development of NFC Smartphone Indoor Interactive Navigation System World Applied Sciences Journal 9 (6): 738-74, 014 ISSN 1818-495 IDOSI Publications, 014 DOI: 10.589/idosi.wasj.014.9.06.1553 Design and Development of NFC Smartphone Indoor Interactive Navigation System

More information

White Paper. Wireless Network Considerations for Mobile Collaboration

White Paper. Wireless Network Considerations for Mobile Collaboration White Paper Wireless Network Considerations for Mobile Collaboration Table of Contents I. Introduction... 3 II. Wireless Considerations... 4 Channel Selection... 4 Interference... 4 Coverage... 5 Covering

More information

DECT ULE A Technology Overview Robert Buczkiewicz, Director of Hardware Development, LS Research

DECT ULE A Technology Overview Robert Buczkiewicz, Director of Hardware Development, LS Research DECT ULE A Technology Overview Robert Buczkiewicz, Director of Hardware Development, LS Research What is DECT ULE? Digital Enhanced Cordless Telecommunications (DECT) was launched in 1987 and is the standard

More information

This KnowledgeShare document addresses the main types of wireless networking today based on the IEEE 802.11 standard.

This KnowledgeShare document addresses the main types of wireless networking today based on the IEEE 802.11 standard. Wireless Networking Q&A Increased use of laptop computers within the enterprise, and increase in worker mobility have fuelled the demand for wireless networks. Up until recently, wireless technology was

More information

CHAPTER 7. Wireless Technologies and the Modern Organization

CHAPTER 7. Wireless Technologies and the Modern Organization CHAPTER 7 Wireless Technologies and the Modern Organization CHAPTER OUTLINE 7.1 Wireless Technologies 7.2 Wireless Computer Networks and Internet Access 7.3 Mobile Computing and Mobile commerce 7.4 Pervasive

More information

GSM and Similar Architectures Lesson 11 Handover

GSM and Similar Architectures Lesson 11 Handover GSM and Similar Architectures Lesson 11 Handover 1 Handover (handoff) from one to another neighbouring cell Process of transferring a call (or data transfer) in progress from one channel to another The

More information

House Committee on the Judiciary. Subcommittee on Crime, Terrorism, and Homeland Security

House Committee on the Judiciary. Subcommittee on Crime, Terrorism, and Homeland Security House Committee on the Judiciary Subcommittee on Crime, Terrorism, and Homeland Security Hearing on ECPA, Part 2: Geolocation Privacy and Surveillance Written Testimony of Professor Matt Blaze April 25,

More information

Improving SCADA Operations Using Wireless Instrumentation

Improving SCADA Operations Using Wireless Instrumentation Improving SCADA Operations Using Wireless Instrumentation April 2010 / White paper by Hany Fouda Make the most of your energy Summary Executive Summary... p 2 Introduction... p 3 The Evolution of Wireless...

More information

A Study of Indoor Localization Techniques

A Study of Indoor Localization Techniques A Study of Indoor Localization Techniques Octavian - Modest MANU Ştefan cel Mare University octavianm@stud.usv.ro Abstract: This paper will present some of the actual indoor localization techniques. In

More information

Prospective View of Localization in Wireless Sensor Networks: A Survey

Prospective View of Localization in Wireless Sensor Networks: A Survey Automation, Control and Intelligent Systems 2016; 4(6-1): 1-5 http://www.sciencepublishinggroup.com/j/acis doi: 10.11648/j.acis.s.2016040601.11 ISSN: 2328-5583 (Print); ISSN: 2328-5591 (Online) Prospective

More information

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,

More information

White Paper. Is VoIP Without E9-1-1 Worth the Risk? Challenges, Approaches, and Recommendations for VoIP Service Providers

White Paper. Is VoIP Without E9-1-1 Worth the Risk? Challenges, Approaches, and Recommendations for VoIP Service Providers TeleCommunication Systems, Inc. www.telecomsys.com Is VoIP Without E9-1-1 Worth the Risk? Challenges, Approaches, and Recommendations for VoIP Service Providers Notices 2004 TeleCommunication Systems,

More information

Indian Journal of Advances in Computer & Information Engineering Volume.1 Number.1 January-June 2013, pp.1-5 @ Academic Research Journals.

Indian Journal of Advances in Computer & Information Engineering Volume.1 Number.1 January-June 2013, pp.1-5 @ Academic Research Journals. Cellular System Rajat Chugh, Parag Jasoria, Tushar Arora, Nitin Ginotra and Vivek Anand V Semester, Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas, Farukhnagar,

More information

The data can be transmitted through a variety of different communications platforms such as:

The data can be transmitted through a variety of different communications platforms such as: COMMUNICATION NETWORK General Overview of SCADA Communications Without a properly designed communication network system, a SCADA system cannot exist. All supervisory control and data acquisition aspects

More information

Context-Enhanced Service Provisioning in Wireless Networks

Context-Enhanced Service Provisioning in Wireless Networks TWELVE PROJECT 1 Context-Enhanced Service Provisioning in Wireless Networks Mauro Brunato Department of Computer Science and Telecommunications, Università di Trento Via Sommarive 14, I-38050 Trento Italy

More information

WHITE PAPER. Emerging IoT Wireless Communication

WHITE PAPER. Emerging IoT Wireless Communication WHITE PAPER Emerging IoT Wireless Communication ABSTRACT It is quite apparent by now that cellular technologies, built primarily for voice traffic, cannot currently provide a scalable solution for long-range

More information

Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA

Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA CASE STUDY Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA Stephen Yablonski and Steven Spreizer Globecomm Systems,

More information

Chapter 9 Communications and Networks

Chapter 9 Communications and Networks Chapter 9 Objectives Chapter 9 and Discuss the the components required for for successful Identify various sending and and receiving devices Describe uses of of computer List advantages of of using a network

More information

Wireless Networks. CS 6710 Spring 2010 Rajmohan Rajaraman

Wireless Networks. CS 6710 Spring 2010 Rajmohan Rajaraman Wireless Networks CS 6710 Spring 2010 Rajmohan Rajaraman Outline of the course: Basic topics Transmission Fundamentals o Analog and digital transmission o Channel capacity o Antennas, propagation modes,

More information

The range of RF spans 3 KHz (3000 Hz) to 300 GHz (300 million Hz)

The range of RF spans 3 KHz (3000 Hz) to 300 GHz (300 million Hz) 1 2 The range of RF spans 3 KHz (3000 Hz) to 300 GHz (300 million Hz) Frequencies of RF devices range from the low frequency AM broadcasts (80 MHz) to higher frequency mobile phones (1900 MHz) smart meters

More information

Mobile Computing. Wireless Technology

Mobile Computing. Wireless Technology Mobile Computing General Wireless Networking and Related Concepts Wireless Technology Wireless Communication Transfer of Information over a Distance (both long and short) without the Use of Wires/Cables

More information

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products

More information

Positioning with Independent Ultrasonic Beacons

Positioning with Independent Ultrasonic Beacons Positioning with Independent Ultrasonic Beacons Michael McCarthy and Henk Muller Department of Computer Science, University of Bristol, U.K. http://www.cs.bris.ac.uk/ Technical Report: CSTR-05-005 Abstract.

More information

Honeywell s OneWireless Network - The Building Blocks of Reliability Vibhor Tandon, Honeywell Process Solutions

Honeywell s OneWireless Network - The Building Blocks of Reliability Vibhor Tandon, Honeywell Process Solutions White Paper Honeywell s OneWireless Network - The Building Blocks of Reliability Vibhor Tandon, Honeywell Process Solutions Executive Summary User expectations for network availability and tolerance for

More information

Telecommunications and the Information Age ET108B LM#13. Wireless Broadband. Broadband Cellular Protocols Wi-Fi Wireless Fidelity WiMax Bluetooth

Telecommunications and the Information Age ET108B LM#13. Wireless Broadband. Broadband Cellular Protocols Wi-Fi Wireless Fidelity WiMax Bluetooth Telecommunications and the Information Age ET108B LM#13 Wireless Broadband Broadband Cellular Protocols Wi-Fi Wireless Fidelity WiMax Bluetooth Broadband Cellular Services Background First Cellular Broadband

More information

COMMUNICATIONS SYSTEMS USED FOR ITS

COMMUNICATIONS SYSTEMS USED FOR ITS COMMUNICATIONS SYSTEMS USED FOR ITS Index Purpose Description Technologies 1 of 5 Purpose The telecommunication system is the main element for the development of telematics in Transport field. It enables

More information

Automatic Mustering and Personnel Location System I Introduction Copyright Extronics Ltd 2008 Rev 2

Automatic Mustering and Personnel Location System I Introduction Copyright Extronics Ltd 2008 Rev 2 Automatic Mustering and Personnel Location System I Introduction Rev 2 1 Why Automatic Mustering? Conventional manual systems such as T Cards, Entry/Exit Logs and Card Reader Systems rely on personnel

More information