PRIVATE TEXTUAL NETWORK USING GSM ARCHITECTURE



Similar documents
Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Vehicle Tracking System,

Web Services for Environmental Informatics

A Novel Solution for Remote Monitoring of Electrical and Electronic Gadgets

Introduction. Mobile GIS emerged in the mid-1990s to meet the needs of field work such as surveying and utility maintenance.

Vehicle Tracking System using GPRS

Nokia Call Connect v1.1 for Cisco User s Guide. Part Number: N Rev 003 Issue 1

INFORMATION SCIENCE. INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. INFSCI 0015 DATA STRUCTURES AND PROGRAMMING TECHNIQUES 3 cr.

Features and Benefits

Mobility and cellular networks

Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant

International Journal of Scientific & Engineering Research Volume 3, Issue 12, December ISSN

A Smart Telephone Answering Machine with Voice Message Forwarding Capability

Getting Started with iphone SDK, Android and others: Mobile Application Development Create your Mobile Applications Best Practices Guide

DoorKing IM Server TM

WorkPlace Buyer's Guide: Creating Virtual Offices

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT

Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards

A NOVEL ARCHITECTURE FOR DYNAMIC LEAST COST ROUTING

Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations

AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries.

COMPREHENSIVE PERFORMANCE ANALYSIS OF UNIFIED COMMUNICATIONS TECHNOLOGY

White Paper. Telenor VPN

D.N.A. 5.6 MANAGEMENT APPLICATIONS

Hello viewers, welcome to today s lecture on cellular telephone systems.

Cellular Data Communications Made Easy

WISE-4000 Series. WISE IoT Wireless I/O Modules

Web Browsers And Mailing Tools

Discovering Computers Chapter 9 Communications and Networks

Updated: April Copyright DBA Software Inc. All rights reserved. 2 Getting Started Guide

Standardizing Information and Communication Systems

Internet Telephony PBX System. IPX-300 Series. Quick Installation Guide

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

Mobile Operating Systems Lesson 07 Symbian OS

A framework for web-based product data management using J2EE

Introduction Chapter 1. Uses of Computer Networks

Over the PSTN... 2 Over Wireless Networks Network Architecture... 3

Samsung OfficeServ Messaging Solutions. Transform your business through greater professionalism and efficiency. Messaging Solutions

Measuring AJAX Performance on a GPRS Mobile Platform

Voice Call Addon for Ozeki NG SMS Gateway

Heterogeneous network establishment assisted by cellular operators

Security and Risk Analysis of VoIP Networks

Volume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.

Mobile System Technologies Certification Program

Warehouse R x Inventory Management Software. Technical Overview

Middleware and Applications for Mobile Computers

A Middleware-Based Approach to Mobile Web Services

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

Mobile RFID solutions

Software Registration and the DoorKing IM Server Internet Modem (IM) Server Program Summary

Software Engineering 4C03 VoIP: The Next Telecommunication Frontier

Integration of GSM Module with PC Mother Board (GSM Trunking) WHITE/Technical PAPER. Author: Srinivasa Rao Bommana

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

Developing Wireless GPIB Test Systems Using the GPIB-ENET/100

Alcatel-Lucent OmniTouch Contact Center Standard Edition The scalable and reliable contact center to support your business

Cisco Unified CallConnector for Microsoft Dynamics CRM

Introduction to SunOne Development Tools by Mr. Mickey Fan, Java Architect, Sun Microsystems. Good morning. Ladies and Gentlemen.

Mobile Phone Terminology Simplifying telecoms management

Real Time Remote Monitoring over Cellular Networks. Wayne Chen Marketing Specialist

Contents. Specialty Answering Service. All rights reserved.

Mobile Field Service Engineer Application

Management Summary for Unified Communications IP PBX

City of Dublin Education & Training Board. Programme Module for. Mobile Technologies. leading to. Level 6 FETAC. Mobile Technologies 6N0734

Cisco Unified CallConnector for Microsoft Windows

VIA CONNECT PRO Deployment Guide

Mobile Software Telecommunications

Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality,

Performance of Various Codecs Related to Jitter Buffer Variation in VoIP Using SIP

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

2) Upon Alarm condition: facilitate the compilation and printing of alarm information to local & networked printers.

FacetPhone IP-PBX. IP From the Ground Up

White Paper. D-Link International Tel: (65) , Fax: (65) Web:

Wireless Local Area Network

Voice over IP is Transforming Business Communications

Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum

Designing Ubiquitous Personalized TV-Anytime Services

Prevention of Spam over IP Telephony (SPIT)

A Protocol Based Packet Sniffer

Short-range Low Power Wireless Devices and Internet of Things (IoT)

White Paper. SIP Trunking. Abstract

Maintain Fleet Management Solutions Using Wide Area Wireless Technology

GenericServ, a Generic Server for Web Application Development

Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations

A Real Time, Object Oriented Fieldbus Management System

Resource Management and Containment for Active Services

LDK STEP INTO THE FUTURE

Kaseya 2. User Guide. Version 1.0

Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser

Receptionist Small Business

SIP Protocol as a Communication Bus to Control Embedded Devices

CanMobile. CanMobile is mobile banking service provided by Canara Bank. It helps you to do following banking transactions:

Using Mobiles for On Campus Location Tracking

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

Technical Glossary from Frontier

Ad-Hoc Networking For Personal Weight Management

inet Enterprise Features Fact Sheet

Fast remote data access for control of TCP/IP network using android Mobile device

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

Transcription:

PRIVATE TEXTUAL NETWORK USING GSM ARCHITECTURE * Qurban A. Memon, **Zubair Shaikh and ***Ghulam Muhammad * Associate Professor; **Associate Professor, ***Senior Year Student Karachi Institute of Information Technology, ST-2, Sector-X/VII Gulshan-e-Maymar, Karachi-75340, Pakistan qurban@kiit.edu.pk Abstract Generally, there are two ways to communicate from a mobile phone. 1) SMS 2) Place a call. Furthermore, communication between mobile phone and normal land phone is quite expensive. The first aim of this research is to target this problem i.e. whenever you want to send a message to your home phone, you can use the proposed solution without adding some valuable coins to your mobile phone bill. The second aim of this work is to develop a solution, which can help the clients to reduce their mobile phones bills in addition to providing security on the communicating link. We explore different Internet access technologies under wireless domain to use for the objective under study and compare them in terms of ease of implementation. We present results and show that the proposed architectural approach leads to an easy, cost effective and secured private network using existing wireless technologies. Keywords: Textual Telephony, Mobile Computing, Private Networks, Secured Communications, Personal Area Network 1. Background Study Mobile, wireless access and networking has emerged in the last few years as one of the most important directions of Internet growth. After many years of research, wireless networks industry has reached to the maturity, where standards for wireless networks can be defined. Without standards, the world of wireless networks will become a collection of distant islands i.e. the subscribers of one wireless network, if moved to the island of another network operator won t be able to use the mobile phone service in that island. Mobile technology has faced many kinds of problems. Two such problems are lack of communication options and high communication rates. These problems may hinder the use of this just born technology. To elaborate the problem: The popularity of mobile, and, more generally, nomadic Internet access is due to many enabling factors including: (a) emergence of meaningful applications tailored to the individual on the move; (b) small form factor and long battery life; (c) efficient middleware designed to support mobility; and, (d) efficient wireless networking technologies. A key player in the mobile Internet access is the nomad, i.e. the individual equipped with various computing and I/O gadgets (cellular phone, earphones, GPS navigator, palm pilot, beeper, portable scanner, digital camera, etc.). These devices form his/her Personal Area Network or PAN or personal bubble. The connectivity within the bubble is wireless (using for example a low cost, low power wireless LAN such as Bluetooth). The bubble can expand and contract dynamically depending on needs. It may temporarily include sensors and actuators as the nomad walks into a new environment. The user may require wireless access to databases anytime anywhere, such as medical and inventory records etc., can simplify workflow management in a business, and reduce or even eliminate the cost of moving paper documents. Moreover, continual progress in wireless access technology promises to provide per-user bandwidths of the order of a few Mbps [1]. The current Internet systems provide mobile phone call, SMS and Internet access as major services of wireless world. With a decent merger of wireless infrastructure to that of existing land phones, a lot of other opportunities do exist that supplement these three major services [2]. One such avenue is textual telephony. What actually happens is that the user

writes text on his/her mobile phone and then sends that text to the Telephony Server by using Internet. Once the text reaches the server, it is converted into voice by text to speech server and then sent to the dialing server. The dialing server dials the desired number and plays the sound and/or sends the text to a compatible device. In this way message is sent to a land phone/device without actually calling the phone. There exist a large number of such service provider(s), which provide text-to-speech transfer to land phone(s) through a web site. Since Internet is prone to security hazards, hence a dependent network cannot be trusted for security. For a defense related organization, a highly secured mobile system is very important for a mobile computing environment. We explore security issues in a mobile system, like: protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the use of some of these existing techniques. Some new approaches to solve malicious network problem and agent tampering problem are addressed using public key encryption system and steganographic concepts. In this paper, we identify the need for the interconnection of the PAN with other wireless and wired networks in order to achieve cost effective mobile access, and be part of a secured private network. We will overview some key networking and service technologies required to support the proposed network. Introduction to Our Approach: The objective of our work has been multifold: To explore a system, which is capable of creating independent networks within itself; To provide independence and security within its umbrella; To provide an independent network with a different set of services; To reduce cost due to increased security and services. The first aim is directly achieved by picking up a mobile system e.g., GSM, and develop a system architecture that is created from within GSM architecture. The services architecture such embedded within GSM radio interface enables to implement various security techniques for offline applications such as textual telephony. The textual telephony service covers our desired objective to offer it in addition to voice and SMS services. Since SMS service is an open protocol, hence it is thus prone to security hazards. Therefore, different system architecture is suggested to overcome existing limitations and is based upon its own specific design layout. Since the use of such messaging does not require to place a call, hence cost factor on the caller is minimal. This whole setup enables to develop SMS sort of service for land phones. The research under this work takes care of many components of implementation client interface, server design, a network architecture, a website development, and a services plan under the same network banner. Furthermore, various layers of encryption scheme are proposed to add security to this domain of communications. 2. Private Textual Network Proposed Scheme Architecture: In this work, we propose and develop an architecture, which uses current GSM technology (as a client and a networking platform). The architecture includes current GSM or compatible client machines along with a separate group of servers. Such architecture is shown in Figure 1. The Figure 1 shows a possible implementation of a textual telephony system. The message from a mobile to a land phone can be sent through a set of servers without making a phone call. The set of servers can be placed at one place with connectivity to GSM system and group of landlines. On experimental basis, the client/server side implementations have been carried out using JAVA. The server architecture

includes a Java SERVLET a server side component of the Telephony Server. It will act as the connection point between the mobile client and the server. The Servlet will simply receive the text from the mobile phone and will pass it for further processing. The other component is a Java MIDlet - a piece of software, which will be installed or downloaded to the mobile phone. This MIDlet will act as an interface to the service. It will allow the client to send a text message to the Telephony Server, which will be later on converted into a voice message. It will also allow the client to view the log of the calls, he has made so far. It will also allow the client to record telephone numbers in the address book maintained by the MIDlet. The second server is TTS Server a Text to Speech Server is the point where a text message is made suitable for a land-phone i.e. the message from the mobile phone is converted into a male/female voice which will be sent to the phone number provided by the user. TTS Server saves the voice output into a.wav file. The third server required in this architecture is the Dialing Server a dialing software that communicates with the modem installed on the dialing server and instructs the modem to dial a specified phone number. The Dialing Software tries the specified number for a certain number of times. If it gets the number then it picks the.wav file and play it on the phone. If it cannot connect the number after certain number of tries, then it adds this particular dialing task in a queue and then dials the number later. The Queuing server is a support server depending upon the size of user database and architecture. The proposed architecture has a website with a necessary database, which will allow the administrator to create accounts of clients. Once the account is created, only then the user will be allowed to download the Java MIDlet to his computer. Then, from the computer the MIDlet will be transferred to the mobile phone. So without creating an account nobody can use this service. Exploring Flexibilities and Corresponding Strategies: By comparing the proposed architecture Record Phone No. Mobile Phone Send Text Send Confirmation Log Database Textual Telephony Web Server Filtering Component Send Text Queying Server Add.wav file and phone number to the queue Text to Speech Server Figure 1. The textual telephony system architecture with our objectives discussed in previous section, there seems a number of ways the system can be formulated to provide solution to stated objectives. First and foremost is the radio interface between GSM station and Textual Telephony Web server. This link can be operated using WAP or i-mode etc. As compared to other interfaces, i-mode has been picked because of its cost effectiveness, its userfriendly language used for developing applications, and lesser overhead at the gateway. Furthermore, as the link is common for all other services of GSM, a suitable encryption can be applied at the client interface before sending the data to the server. This will be in addition to client authentication, logging, content provider authentication and client lookup being performed by the web server. The second flexibility in the network is the link between text-tospeech server and web server. Here, normally the filtering of content will be applied to extract text to be finally sent to the dialing server. In this link, a private key can be generated for that specific dialed user. That key could be a time related stamp number based upon last successful download of JavaMIDlet to his/her client machine. This adds another security shield for transfer of text/data to the destination. The next process is conversion of text to speech at a specific server. If desired by the design objective, the Retrieve Next Element in queue Dialing Server Place Call

same text without conversion to speech can also be sent to the (wireless) destination device directly along with key for secured view. This service is different and more secured than using SMS. Another flexibility present in the architecture is the link between dialing server and the destination. The destination device primarily is landline phone. Alternatively, the text message can be sent over wireless destination device, the device here being the part of a secured group. Benefits: Having discussed the flexibilities in the architecture, we are ready to summarize the benefits and services. Figure 2 shows such listing in tabular format. It also compares the services under proposed architecture with those of current systems. Since our proposed system is an overlay network onto a GSM network, hence overhead is very small except those of downloading of client software and registration procedure. It should also be noted that since sending of either text or speech (converted from text) involves additional set of servers, hence extra services can also be devised for such a system. Development Strategies: Based on our objectives, development tools were selected to experimentally judge the functions of the architecture. As next generation phones are widely expected to work over TCP/IP, the next generation of technologies for such applications will introduce a new level of security and compatibility to wireless world. Since we adopted i-mode as an interface, hence we used J2ME (Java 2 Micro Edition) for application development, as it is protocol independent, inherits Java security features, suited for small devices, and flexible. The web server development was carried out using Java Servlets, where as text-to-speech conversion was carried out using Microsoft engine with Java API. The dialing server used Microsoft TAPI with wrapper of Java. Technology versus Impairments: As there are not much cross-platform interfaces, hence problems to be faced for such an architectural solution are minimal. The only problem highlighted is the preference of i- mode interface. Since i-mode interface is only used in Japan, hence benefits forecasted because of its use may not be available until its global acceptance or a similar global solution. Similar statements can also be made about WAP (Wireless Application Protocol), as it is also a new technology. System Proposed Current Approaches Service Degree of Security Flexibilty Overhead Text High High Nominal Text-to-Speech High High Nominal Text/SMS Low Moderate Zero Text-to-Speech Low Moderate Small Figure 2: Comparison of services (Proposed versus Current Systems) Access Server Access Points Bluetooth Enabled Device Bluetooth Network Figure 3. Bluetooth Platform for Textual Telephony Textual Telephony Network 3. Domain Analyses and Discussions The work reported here does not consider distance as a metric for evaluation since GSM has been the main platform for connectivity. If such a scenario develops, where short range service is to be needed, Bluetooth technology can be used to access textual telephony system network, as shown in Figure 3. The Figure 3 clearly shows the difference with Figure 1. Obviously, the client now is more versatile in the sense that it can now connect to textual telephony network with added security with low cost in addition

to connecting its own directory-listed devices (of various known compatible destinations). The added security will be there in a sense that the message does not have to pass through GSM service providers. The obvious result is more flexibility in terms of destination clients and security level, and in turn more closer to our first objective of having independence of creating networks within itself. 4. Conclusions We have described an implementable textual telephony network using different possible platforms with added security, less cost, low overhead, and high degree of flexibility. The development strategies used are common and available globally. It was shown that desired objectives of the system can be achieved with state of the art current technologies with no impairments. References: [1]R. Pandya, IMT-2000 Standards in ITU-T Current Progress and Future Directions, IEEE Broadband Wireless Summit, Las Vegas, May 09-10, 2001 [2]P. Streilein and J. John, Enabling Revenue Generating Services The Evolution of Next- Generation Networks, Bell Lab Tech Vol. 6, No. 1, Jan.-Jun., 2001. [3]http://www.iec.org/online/tutorials/winternet/ [4]http://www.ipservices.att.com/techviews/whitepap ers/wirelessinternet.pdf [5]http://www.cisco.com/warp/public/cc/so/neso/gprs /gprs_wp.htm [6]http://www.iec.org/online/tutorials/gsm/ [7]http://www.mobilecomms_technology.com/projec ts/pdc/ [8]http://www.qualcomm.com/brew/about/whitepape r. html