A proposal for a payment system for public transport based on the ubiquitous paradigm
|
|
|
- Nicholas Oliver
- 10 years ago
- Views:
Transcription
1 A proposal for a payment system for public transport based on the ubiquitous paradigm Carmelo R. García, Ricardo Pérez, Joaquín Caraballo, Francisco Alayón, and Gabino Padrón Dpto. Informática y Sistemas, Universidad de Las Palmas de Gran Canaria, Edificio de Informática y Matemáticas, Campus Universitario de Tafira, Las Palmas, Spain (rgarcia, rperez, falayon, gpadron)@dis.ulpgc.es Abstract. Automatic payment systems (APS) play an important role in the productive activity of the passengers transport companies. The companies using APSs profit from an improved security and commercial speed and their clients from a reduction in the trip cost. We describe how to apply the ubiquitous paradigm in order to improve APSs and present an APS model that allow clients to use different mobile devices such as contactless smart cards, cellular phones or PDAs as means of payment. The system has the necessary mechanisms to be used in a combined way in different services contexts (public transport, parking, museums, etc). Suitable aspects of the system are the flexibility to implement different payment schemes, and the scalability to incorporate new mobile devices as means of payment. These characteristics are consequences of the system architecture, based on two main generic elements: the mobile device model and the user application model. 1 Introduction The spread of mobile communication and information support devices is motivating the enterprises interest in incorporating them as automatic payment systems. The use of those devices in the payment systems has some advantages: speed and comfort when accessing services, improved simplicity for tackling optimization of outstanding aspects of the management of services such as: security, access delays, availability, demand variation, and exploitation costs reduction because of the fact that expenses are shared with the clients, as they provide the devices to support payment. The development of those new payment systems poses some technological challenges, mainly due to the lack of standardization. A careful system design will allow the enterprises to adapt themselves in a non-traumatic manner to the wide variety of communication devices and models, and to face comfortably technological advances that will make possible new services. In this article, we describe an automatic payment system based on a variety of mobile communication
2 and information support devices that are currently increasing both their use and their technological development. 2 Aims and requirements Payment automation provides service-oriented enterprises with many benefits: simplifies the interaction of users with payment systems, allows the enterprise to customize the types of payment media and adapt them for the different client characteristics, improves fare system by optimizing information flows, increases security and fraud control, and decreases exploitation costs, by using resources provided by the clients themselves. Also, mobile devices versatility makes possible a greater services offer flexibility and their combination (transport with tickets for cultural and leisure activities, parking, etc). The development of this automation has some requirements that we can summarize as: availability of versatile payment devices, supporting a variety of modes and customization parameters, development of processing and communication mechanisms permitting us to reduce interaction to the minimum, and development of mechanisms guaranteeing data and transactions security. Nowadays, contactless smart cards fulfil rather well those requirements. They are being incorporated in the latest years into enterprises payment systems. Next qualitative step is being carried out by mobile communication and data support systems, as they make possible the progress towards more evolved payment systems. We believe that a payment system based on those devices can offer the following properties. Scalability; it is the ability to incorporate new payment functionalities means of payment, communication systems, and clients. Security; it is the ability to detect wrong transactions, both fraudulent and caused by technical or accidental failures. Maintenance easiness; it is the ability to detect and respond to operation failures of its elements. Also, it is the ability of its physical and logical elements to be easily updated. Robustness; it is the ability to work in adverse physical conditions, both due to environmental reasons and to a massive and continued use. Speed.; ability to carry out every transaction that is required in order to provide services access to the users at speeds that do not interfere with productive organization activity. Plain interactivity; it is the ability to permit the users to easily employ the means of access to the services. In the next section, we will describe the most outstanding aspects of an automatic payment system based on mobile devices. This payment system is being developed to be used in a passengers public transport context. Passengers transport, in special in the public sector, is the economic activity where we can notice the most important advances in this field. Our payment system combines the acquired experience in the development of mobile information systems with ubiquitous computing ideas and concepts.
3 3 Description of the system Before we describe our system, we explain some general aspects about classic automatic payment systems that will help to understand the design principles of the system. In the first place, we can identify in a payment system the following three elements. One, Users: the company that uses the payment system to provide a service and its clients. When several companies share the payment system, there is a third user: the system management authority. Two, applications; programs needed by the different kind of system users. We can classify the applications in three types: applications of the service provider company, client applications, and if the system is used by several companies, the multi-service management applications. And three, the platforms; these are the stations that host the applications. We can classify them in two types: non-mobile and mobile. From a point of view of the management information systems theory, an automatic payment system is a transactional information system [1]. In our system the ubiquitous paradigm [2] was applied in order to use several types of mobile devices (contactless smart cards, cellular telephones and PDAs) as means of payment used by the clients. Also, this paradigm was applied to develop a general model of client applications; this model is independent of the mobile device used by the clients as means of payment. Figure 1 represents a general vision of our system. In this model the non-mobile stations are associated with the platforms used by the transport company. If there are several services providers companies integrated into the payment system, one of them is associated to the system management authority. The mobile devices are used by transport clients to obtain information about the service and to pay if. There are two kinds of models supporting payment transactions: a centralized model where the payment devices interact with a central host by means of a long distance mobile communication infrastructure, and alternatively, a noncentralised model where the payment devices interact directly with the mobile platforms installed on the vehicles using local communications infrastructures such as IEEE , Bluetooth, infrared, etc. Currently, we can find an example of payment system based on the centralised model in the public transport company EMT, that operates in the metropolitan area of Malaga (Spain), in this case the clients can buy the trips tickets and to charge smart cards using a cellular telephones by the SMS service. In our opinion, this scheme has the following objections. First, the client must support the cost of the SMS service (about 0.1 ), and second, the response time of the SMS service that forces to the client to realise an advance payment before to take bus. Our model is oriented to support a non-centralised model in order to resolve these problems. Another interesting example of payment system working in the public transport is the Calypso System, this system is working in Paris, Lisbon, Constance, and Venice, it is based on the intelligent contacless smart card as payment media, a consortium of 26 partners participate in this system [3]. Finally, to mention the HONG Kong Octopus card [4] used in Hong Kong as multi-service payment media to access to public transport, restaurant, supermarkets, pay phones, soft drink vending machines, etc. Over 7 millions of transactions are recorded on a daily basis, for a value over US$ 6.5 millions. In this kind of payment system which covers different companies and service is important to consider the cost of the recovery management; in general it is about 1% of the recovery.
4 WIRELESS IP Radio Trunking Firewall Wireless IP PDA Wireless IP INTERNET PC VPN PDA Phone PDA Phone GPRS GSM... PC PDA Fig. 1. General Vision of ubiquitous payment system for passengers public transport From the point of view of the state of the art, the second model, a non-centralized scheme, has a greater interest, for this reason in this paper we concentrate on how we have designed this non-centralized model of payment system. In this design the ubiquitous paradigm has played an important role permitting us to achieve an integral, scalable and flexible payment system architecture. Fig. 2. Wireless local network supporting a non-centralized payment system. The ubiquitous software is characterized by its high capacity of integration of the physical environment. As a consequence of this integration, the ubiquitous software is able to work in an autonomous and spontaneous way at different environments. For this reason, the ubiquitous software development must fulfil the following principles [5]. Border principle: The environments must be defined by information and not physical or technical limitations. Thus, the environment detection depends on
5 information context borders instead of physical borders. These borders must not limit the interoperability between systems. Volatility principle: In ubiquitous systems we must assume that the number of users, devices and applications in a ubiquitous environment is unforeseeable. Therefore, it is necessary to specify a set of invariant functional principles which manages system execution. To apply these properties, our system is structured in two ambits. Common services ambit formed by all the elements that permit all the applications users to access to the different client services provided by the companies. In this ambit, we define the invariant functional principles of our system. User ambit formed by the user tools allowing the system interaction. Specifically, in our system these tools are the mobile devices used as means of payment by service clients. Next, we explain the most important aspects of these invariant functional principles that are: the model of client applications and context applications and the concept of virtual payment device. 3.1 Client applications and contexts applications In our system, a client application is defined as a set of structured data and a set of commands for its manipulation. Basically, these commands permit us to perform: communications with other remote applications, simple arithmetic and logical operations and storage operations. The sets of structured data are composed of data units characterized by two properties: identification and type of access permitted. By means of these data unit we represent the different and relevant aspect of the client applications such as: client identifications, device identifications, general parameters of the payment system, specific parameters of the payment system oriented to the clients and payments accounting. A context application is associated to a specific service such as transport, parking, etc. A client application that permits the user to access to a specific service is associated to the corresponding context. In a multiservice payment system we can find different contexts. In each context, the associated application permits the client to pay the service in different ways depending on the parameters stored in the application data. The extreme case will be a payment based on personal characteristics of the client. The client application commands are executed following a common scheme: 1. Context identification: The local infrastructure sends context identification packets. 2. Context information request: When a client application identifies a context, it sends an information context request, producing an information interchange between the client application and the local infrastructure. 3. Data transformation: A subset of the client application data is modified and generated by the client application or by an application running on the local infrastructure. 4. Transaction confirmation: The client application confirms to the infrastructure the complete execution of the client application commands. We can emphasize the data transformation step, which can run both on the client payment device, and on a specific station of the local infrastructure. Thus, the client application commands can be executed in a distributed way. This capability is motivated by several reasons: First, with this execution scheme the client applications
6 are independent of the client devices capabilities. Second, in order to improve the security, we can ban the execution of certain operations on client devices. Third it allows us to support the dynamic nature of certain aspects of the payment systems. Level of client application Application 1 Application 2. Application N Level of common services Commands support: Communication primitives, Data management, Basic data operations Level of logical device File system Security services: Cryptograph, digital certificate Communications services: Local network, telephony, etc Level of physical device Microprocessor Memory (RAM, ROM,FLASH) Specific security services: Cryptographic key management, User identification user and devices management Software installation utilities Radiofrequency communications APS Services Client device Fig. 3. Model of virtual payment device 3.2 Virtual payment device We have defined a virtual payment device in order to establish a common client applications execution support that isolates the specific characteristics of real client devices. It integrates the variety of technologies and functionalities used nowadays as means of payment such as contacless smart cards, cellular telephones, PDAs, etc. To define this model of generic payment device we have taken into account aspects and working principles of devices and products of the market, specially JavaCard [6] and Symbian operating system [7]. The virtual payment device is a virtual machine composed of four layers: Physical device layer: It is composed of the physical elements of the device. Its minimum requirements are: about 16 Kb of storage capacity and radiofrequency communications capability. Logical device layer: It consists of the software support provided by device s manufacturers. At this layer, some common services are provided: communications, cryptography, file system, etc. Common services layer: It is the first level supplied by our system. Basically it provides the client applications execution support and the specific mechanisms for security. Client application layer: It is composed of the different applications installed on the payment device.
7 3.3 Security In general, the security is a critical aspect of any payment system. Thus, there are international specifications on the payment systems [8], specially we have considered the CAO recommendations about passwords security in contactless smart cards [9]. Considering that in our system the means of payment are supported by nonproprietary technology devices such us PDAs and cellular telephones, security is a key issue. We have distinguished three main security matters. First, authentication of client application; a client application can not be replicated, for this reason any client application has to be associated to a unique user and a unique payment device. In our system, every client application verifies that it is running on the device where it was installed. Thus, a basic requirement of the payment device consists of providing a service to get the unique identification key associated to the device at run-time. Second, access control to the applications; any access to data structures and application commands have to be done by authorized users. If an unauthorized access is detected, the transaction has to be rejected. And finally, transactions control; unauthorized client applications must be detected and rejected by the infrastructure. Another transactions control aspect consists of the detection of incomplete transactions. When it happens the system have to complete the transaction by itself. Finally, the system has to permit auditory processes that allow the company to verify the fulfilment of the security principles. To achieve this requirement it is necessary the traceability of clients operations. 4 An example for public transport In this section, we illustrate how the system has been applied to the public transport context. Specifically we explain how to implement two kind of electronic tickets. Ticket of fixed travels: It consists of finite number of trips with departure point and arrival point that can not vary. Every time the client uses this ticket, one trip is decremented. Transport electronic money: It consists of an amount of money that can be spent to pay an arbitrary trip. The use of the electronic tickets follows these steps: 1. Context detection: The application is waiting for the context detection state. Before it is reached, the application can request some information. For example to use the transport electronic money, the application must request the destination point. 2. Authentication of the application: This step consists of sending a context authentication packed in an element of the infrastructure. This permits the client application to leave the waiting state. 3. Context information request: In this step the client application requests some context information in case it is needed to run any command. 4. Validation: The client application sends a data packet and commands packet to an element of the infrastructure to validate the application. 5. Confirmation: The validation element of the infrastructure sends to the client application the updated data.
8 6. Registered: The client application registers the updated data in its data structures stored in the payment device memory. 7. Transaction notification: The client application sends a packet of complete transaction notification to the infrastructure. The data used by these client application examples are the following. Client personal data; this set of data consists of at least a unique identification key associated to the clients and a unique identification key associated to the application. Electronic ticket configuration data; they specify the type of electronic ticket and other specific parameters needed by the electronic ticket. And finally, movements history registering all use of the ticket. 6 Conclusions In this paper we have described the main aspects of an automatic payment system for public transport. This system can use as means of payment different types of mobile devices: smart cards, PDAs and cellular telephone. This outstanding capacity improves the traditional payment systems used in the public transport context. Another outstanding property consists of the reduction of the operation costs thanks to two factors: the use of local communication infrastructures and the use of general purpose devices, avoiding devices based on proprietary technology. Finally, we have based our model on the ubiquitous paradigm, in order to achieve the initial objectives of the system; specifically regarding flexibility and scalability. As a final consequence we can affirm that this paradigm provides techniques and ideas which can improve the traditional payment systems. References 1. Caddy, I.: Will the real MIS please stand up? WIT Transactions on Information and Communication Technologies, Vol. 32. WIT Press (2004) [69-78]. 2. Weiser, M.: The computer for the 21 st century. IEEE Pervasive computing, mobile and ubiquitous systems, Vol. 1, num. 1 (reprinted with permission Copyright 1991 by Scientific American Inc). IEEE Computer Society (2002) [18-25]. 3. Community Research & Development Information System: 4. Smart Card Alliance, Hong Kong Octopus card: 5. Kindberg, T, Fox,, A.: System Software for Ubiquitous Computing, IEEE Pervasive Computing. Mobile and Ubiquitous Systems, Vol. 1, nº 1, IEEE Computer Society (2002) [70-8]. 6. SUN Microsystem. Java Card Technology Stichbury, Jo. Symbian OS explained. Symbian Press (2004). 8. ISO/IEC Proximity cards. International Standard Organization (2001). 9. ICAO Recommendations. Report of the 33rd meeting of ISO/IEC JTC1/SC17/WG8 (rev. 1),(2004).
Loyalty Systems over Near Field Communication (NFC)
Loyalty Systems over Near Field Communication (NFC) Diogo Simões IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.
Your Mobile Phone as a Ticket (NFC)
Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.
Performance monitoring and analysis of wireless communication protocols for mobile devices
Performance monitoring and analysis of wireless communication protocols for mobile devices Almudena Díaz, Pedro Merino, F. Javier Rivas Departamento de Lenguajes y Ciencias de la Computación, University
Distributed Systems. Security concepts; Cryptographic algorithms; Digital signatures; Authentication; Secure Sockets
I. Introduction II. Fundamental Concepts of Architecture models; network architectures: OSI, Internet and LANs; interprocess communication III. Time and Global States Clocks and concepts of time; Event
THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR PAYMENT 4
CONTACTLESS THE APPEAL FOR CONTACTLESS 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR 4 DESIGNING AN EMV LIKE CONTACTLESS SYSTEM 5 INGENICO, LEADER IN CONTACTLESS TECHNOLOGY
Mobile and Sensor Systems
Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous
Gautrain s s Approach for an Integrated Ticketing System
Gautrain s s Approach for an Integrated Ticketing System Importance of an Integrated Ticketing System Facilitate customers modal transfer Maintain our customers base Attract new customers Advantage of
Technology offer: Machine-to-Cloud Management System of Distributed Heterogeneous Devices
Technology offer: Machine-to-Cloud Management System of Distributed Heterogeneous Devices Technology offer: Machine-to-Cloud Management System of Distributed Heterogeneous Devices SUMMARY The Specialized
The Future is Contactless
Contactless Implementation and Benefits The Future is Contactless One of the most exciting new applications to be launched in the payment world is contactless payment. The technology is already available
HMS Industrial Networks. Putting industrial applications on the cloud
HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks Inc 35 E Wacker Drive,
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Electronic ticketing the key to linking different means of transportation
Electronic ticketing the key to linking different means of transportation Pre-press conference InnoTrans 2012 Nils Schmidt Head of City IT Siemens Mobility and Logistics Division Vienna, June 28, 2012
CHAPTER 1 1 INTRODUCTION
CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful
What you don t know about industrial GSM/GPRS modem communications
What you don t know about industrial GSM/GPRS modem communications A White Paper presented by: Ira Sharp Product Marketing Lead Specialist Phoenix Contact P.O. Box 4100 Harrisburg, PA 17111-0100 Phone:
ETSI TR 102 071 V1.2.1 (2002-10)
TR 102 071 V1.2.1 (2002-10) Technical Report Mobile Commerce (M-COMM); Requirements for Payment Methods for Mobile Commerce 2 TR 102 071 V1.2.1 (2002-10) Reference RTR/M-COMM-007 Keywords commerce, mobile,
Passenger Requirements of a Public Transport Ticketing System
Passenger Requirements of a Public Transport Ticketing System Brian Caulfield Centre for Transport Research Department of Civil, Structural and Environmental Engineering Trinity College Dublin Dublin 2
HMS Industrial Networks
HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks AB Stationsgatan 37 30245
MOBILE TECHNOLOGIES AND DISTANCE EDUCATION
MOBILE TECHNOLOGIES AND DISTANCE EDUCATION Rostislav Fojtik, Hashim Habiballa Abstract: Rapid advancement of information and communication technologies enables to produce more mobile devices. Most of distance
Cisco Mobile Network Solutions for Commercial Transit Agencies
Cisco Mobile Network Solutions for Commercial Transit Agencies Overview Commercial transit agencies provide a vital service to our communities. Their goal is to provide safe, affordable, and convenient
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
Building a Scalable Numbering Plan
Building a Scalable Numbering Plan Scalable Numbering Plan This topic describes the need for a scalable numbering plan in a VoIP network. Dial Plans Dial plans contain specific dialing patterns for a user
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
Secure Automatic Ticketing System
Secure Automatic Ticketing System MARIUS POPA, CRISTIAN TOMA Department of Computer Science in Economics Academy of Economic Studies Bucharest Romana Square, No. 6, Bucharest ROMANIA [email protected]
Andrew Hulatt Vix Technology Electronic Ticketing interoperability, standards & future
Andrew Hulatt Vix Technology Electronic Ticketing interoperability, standards & future Vix Technology Overview Over 25 years of experience 17 offices in 13 countries 120 MEUR revenue 80M smartcards in
EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT
EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT 1 R.Sivaraman, 2 RM.Chandrasekaran 1 Dy.Director, Center for Convergence of Technologies (CCT), Anna University Tiruchirappalli, Tiruchirappalli,
Mobile System Technologies Certification Program
Mobile System Technologies Certification Program This is the Mobile Computing Promotion Consortium s (MCPC) official certification program for engineers who wish to obtain deeper knowledge of and experience
15 May 2013 Version 5. for Mac OS X. Public version. Gemfor s.r.o. Tyršovo nám. 600 252 63 Roztoky Czech Republic
Mobile Connection Explorer for Mac OS X 15 May 2013 Version 5 Introduction and Feature s Public version Gemfor s.r.o. Contents Contents... 2 History... 2 1. Scope... 3 2. Abbreviations... 3 3. Introduction...
ToothAgent: A Multi-Agent System for Virtual Communities Support
ToothAgent: A Multi-Agent System for Virtual Communities Support Volha Bryl Department of Information and Communication Technology University of Trento, Italy [email protected] Paolo Giorgini Department
Transport System. Telematics. Advanced fleet management systems for public transport
Archives of Volume 1 Transport System Issue 1 Telematics November 2008 Advanced fleet management systems for public transport C. HERNANDEZ MEDEL a, M. A. MARTINEZ OLAGÜE a, A. MARTÍN OLALLA b, M. Á. GARCÍA
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
Using Mobiles for On Campus Location Tracking
Using Mobiles for On Campus Location Tracking F. Aloul A. Sagahyroon A. Al-Shami I. Al-Midfa R. Moutassem American University of Sharjah P.O. Box 26666, Sharjah, UAE {faloul, asagahyroon, b00020906, b00020142,
Propsim enabled Mobile Ad-hoc Network Testing
www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile
Mobile Operating Systems. Week I
Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone
FREE VOICE CALLING IN WIFI CAMPUS NETWORK USING ANDROID
FREE VOICE CALLING IN WIFI CAMPUS NETWORK ABSTRACT: USING ANDROID The purpose of this research is to design and implement a telephony program that uses WIFI in p2p (Peer-to-Peer) or WLAN (Wireless Local
How To Create A Virtual Network With A Router And Network Operating System (Ip) For A Network (Ipv) (Ip V2) (Netv) And A Virtualization) (Network) (Wired) (Virtual) (Wire)
Post-IP technologies virtualization and security Guy Pujolle 1 Virtualization for a post-ip network 2 Geni Intel would like to propose a generic router Intel proposes to have a generic hardware with virtual
2.1. The Notion of Customer Relationship Management (CRM)
Int. J. Innovative Ideas (IJII) www.publishtopublic.com A Review on CRM and CIS: A Service Oriented Approach A Review on CRM and CIS: A Service Oriented Approach Shadi Hajibagheri 1, *, Babak Shirazi 2,
Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8
Guide to Wireless Communications Digital Cellular Telephony Chapter 2 Learning Objectives Digital Cellular Telephony 3 Describe the applications that can be used on a digital cellular telephone Explain
ISO/IEC 24727 for secure mobile web applications
ISO/IEC 24727 for secure mobile web applications Jan Eichholz 1 Detlef Houdeau 2 Detlef Hühnlein 3 Manuel Bach 4 1 Giesecke & Devrient GmbH, [email protected] 2 Infineon Technologies AG, [email protected]
ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; [email protected] +32/3/240.7830; Guy.Reyniers@alcatel.
Contact: ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; [email protected] +32/3/240.7830; [email protected] Voice over (Vo) was developed at some universities to diminish
Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging
Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Aravind. P, Kalaiarasan.A 2, D. Rajini Girinath 3 PG Student, Dept. of CSE, Anand Institute of Higher Technology,
Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements
, pp.144-148 http://dx.doi.org/10.14257/astl.2015.95.27 Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements Hongseok Chae 1, AAmir Shahzad 1, Muhammad Irfan 2, HyangRan
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
A Symptom Extraction and Classification Method for Self-Management
LANOMS 2005-4th Latin American Network Operations and Management Symposium 201 A Symptom Extraction and Classification Method for Self-Management Marcelo Perazolo Autonomic Computing Architecture IBM Corporation
Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education
Cisco A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
Industrial Networks & Databases
Industrial Networks & Databases LONWORKS KNX 1 HVAC and BEMS HVAC - Heating, Ventilation & Air Conditioning BEMS - Building & Energy Management Systems 2 3 4 LONWORKS (Local Operating Networks) Open solution
Remote Monitoring and Controlling System Based on ZigBee Networks
Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr
1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, [email protected]
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile
Networking Systems (10102)
Networking Systems (10102) Rationale Statement: The goal of this course is to help students understand and participate in the significant impact of computer networking in their lives. Virtually any career
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Mobile Device Management
Vodafone Global Enterprise Mobile Device Management Technical paper Vodafone Global Enterprise Introduction Managing for the future Secure control over your mobile data, devices and applications. The multi-national
Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN
Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Copyright 2005, Meru Networks, Inc. This document is an unpublished work protected by the United States copyright laws and
WHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers)
WHITE PAPER Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers) Table of Contents About This Document... 1 Chapter 1 Wireless Data Technologies... 2 Wireless Data Technology Overview...
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Deploying QoS sensitive services in OSGi enabled home networks based on UPnP
Deploying QoS sensitive services in OSGi enabled home networks based on UPnP Nico Goeminne, Kristof Cauwel, Filip De Turck, Bart Dhoedt Ghent University - IBBT - IMEC Department of Information Technology
Reasons Enterprises. Prefer Juniper Wireless
Reasons Enterprises Prefer Juniper Wireless Juniper s WLAN solution meets the mobility needs of today s enterprises by delivering the highest levels of reliability, scalability, management, and security.
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS Karen Scarfone, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Many people
IMPLEMENTING VEHICLE LOCATION SYSTEM FOR PUBLIC BUSES IN SINGAPORE
IMPLEMENTING VEHICLE LOCATION SYSTEM FOR PUBLIC BUSES IN SINGAPORE Silvester Prakasam 1 and Adeline Wang 1 ABSTRACT A Vehicle Location System will be implemented in Singapore in conjunction with the contactless
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
A Secure and Open Solution for Seamless Transit Systems
A Secure and Open Solution for Seamless Transit Systems Today s Proprietary Fare Collection Systems Transit operators must combat growing security threats while identifying new revenue sources and enhancing
White Paper: Managing Security on Mobile Phones
White Paper: Managing Security on Mobile Phones April 2006 Managing Security on Mobile Phones April 2006 Table of Contents Abstract...2 Executive Summary...2 The Importance Of Managing Security On Mobile
Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战
Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: [email protected]
T-BOXN12R. First steps with T-BOXN12R. You can make it wireless. Date: 2004-07-16 Version 1.0
T-BOXN12R You can make it wireless First steps with T-BOXN12R Date: 2004-07-16 Version 1.0 Content 1. Purpose of this document... 3 2. T-BoxN12R overview... 4 3. First step... 5 3.1. Preparing your workshop
Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad
Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer
Mobile Device Management A Functional Overview
Mobile Device Management A Functional Overview Gopal Tatte #1, Dr. G. R. Bamnote #2 1# ME 1 st Yr. Department of Computer Science and Engineering, Sant Gadge Baba Amravati University Prof Ram Meghe Institute
Open Voice over IP according to Aastra SIP. Your connection to the World
Open Voice over IP according to Aastra SIP Your connection to the World Innovation, Openness, Convergence Over the past few years, Aastra has invested heavily in research and development with a view to
Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?
FactoryCast Gateway TSX ETG 3021 / 3022 modules How to Setup a GPRS Connection? 1 2 Table of Contents 1- GPRS Overview... 4 Introduction... 4 GPRS overview... 4 GPRS communications... 4 GPRS connections...
Boosting Business Mobility and Responsiveness with the Cisco Unified Wireless Network
Solution Overivew Boosting Business Mobility and Responsiveness with the Cisco Unified Wireless Network EXECUTIVE SUMMARY Today s businesses are turning to wireless networking to give employees immediate
A Novel Solution for Remote Monitoring of Electrical and Electronic Gadgets
A Novel Solution for Remote Monitoring of Electrical and Electronic Gadgets Pradipta Biswas University of Kalyani, India 1 Introduction Remote control of electrical and electronic gadgets in domestic and
ARIB STD-T63-27.103 V3.1.0. Wide area network synchronisation standard
ARIB STD-T63-27.103 V3.1.0 Wide area network synchronisation standard Refer to "Industrial Property Rights (IPR)" in the preface of ARIB STD-T63 for Related Industrial Property Rights. Refer to "Notice"
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant
International Journal of Computational Engineering Research Vol, 03 Issue, 4 Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant 1, Mr.S.Vimalraj, 2, Gausalya.R.B, 3, Samyuktha.V,
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications
M2M 3GPP Standardization Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends Core Network Infrastructure and Congestion Control Technology for M2M Communications The number
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
A standards-based approach to application integration
A standards-based approach to application integration An introduction to IBM s WebSphere ESB product Jim MacNair Senior Consulting IT Specialist [email protected] Copyright IBM Corporation 2005. All rights
SECURITY AND EMERGENCY VEHICLE MANAGEMENT
SECURITY AND EMERGENCY VEHICLE MANAGEMENT Index Purpose Description Relevance for Large Scale Events Options Technologies Impacts Integration potential Implementation Best Cases and Examples 1 of 10 Purpose
Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City
Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City A. Lavric 1, V. Popa 2 PhD.,Computers, Department of Electronics and Automation,
NFC in Public Transport
January 2011 This document is copyright 2005 2011 by the NFC Forum. All rights, including the right to copy and further distribute, are reserved. NFC Forum, Inc. 401 Edgewater Place, Suite 600 Contents
REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES
REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES Miss.Monali K.Narse 1,Chaitali S.Suratkar 2, Isha M.Shirbhate 3 1 B.E, I.T, JDIET, Yavatmal, Maharashtra, India, [email protected] 2 Assistant
White Paper. Telenor VPN
White Paper Telenor VPN Versjon 2.2 September 2006 Side 1 av 5 Table of contents 1 Short introduction... 3 2 Product information... 3 2.1 Mobile Data Access... 3 2.2 SMS Acess and SMS Bedrift... 4 2.3
BPM and SOA require robust and scalable information systems
BPM and SOA require robust and scalable information systems Smart work in the smart enterprise Authors: Claus Torp Jensen, STSM and Chief Architect for SOA-BPM-EA Technical Strategy Rob High, Jr., IBM
Sensor network infrastructure for intelligent building monitoring and management system
Sensor network infrastructure for intelligent building monitoring and management system 1 R.VENKATESH, 2 K.RADHA, 3 M.GANTHIMATHI 1.B.E-CSE, Muthayammal Engineering College, Rasipuram. 2. Assistant Professor
