Wednesday 27 May 2009
Interstate Highway System
Information Superhighway:
Tipper Gore:"When my husband Vice President Gore served in the House of Representatives, he coined the phrase "information superhighway" to describe how this exciting new medium would one day transport us all. Since then, we have seen the Internet and World Wide Web revolutionize the way people interact, learn, and communicate." |
Photo of Tipper and Al Gore wedding: 20-th year BW (Before Web) |
Gore has become the point man in the Clinton administration's effort to build a national information highway much as his father, former Senator Albert Gore, was a principal architect of the interstate highway system a generation or more earlier. Principal Figures in the Development of the Internet ... |
. | 24 Jun 1986: Albert Gore (D-TN) introduce S 2594 21 March 1994: Gore's Buenos Aires Speech "By means of electricity, the world of matter has become a great nerve, vibrating thousands of miles in a breathless point of time ... The round globe is a vast ... brain, instinct with intelligence!"
|
1972: First public demonstration of ARPANET
In late 1971, Larry Roberts at DARPA decided that people needed serious motivation to get things going. In October 1972 there was to be an International Conference on Computer Communications, so Larry asked Bob Kahn at BBN to organize a public demonstration of the ARPANET.
It took Bob about a year to get everybody far enough along to demonstrate a bunch of applications on the ARPANET. The idea was that we would install a packet switch and a Terminal Interface Processor or TIP in the basement of the Washington Hilton Hotel, and actually let the public come in and use the ARPANET, running applications all over the U.S ....
The demo was a roaring success, much to the surprise of the people at AT&T who were skeptical about whether it would work.
I remember hearing that there was an ARPANET "conference" on the Star Trek game every Friday night. Star Trek was a text based game where you used photon torpedos and phasers to blast Klingons.
I used to have a pretty cool logical map of the ARPANET at the time but my ex-wife got it. (She got everything but the debts.)
1969: The first LOGs: UCLA -- Stanford
The plan was unprecedented: Kleinrock, a pioneering computer science professor at UCLA, and his small group of graduate students hoped to log onto the Stanford computer and try to send it some data.They would start by typing "login," and seeing if the letters appeared on the far-off monitor
1957: Sputnik has launched ARPA
- 1957 - October 4th - the USSR launches Sputnik, the first artificial earth satellite.
1958 - February 7th - In response to the launch of Sputnik, the US Department of Defense issues directive 5105.15 establishing the Advanced Research Projects Agency (ARPA).
The organization united some of America's most brilliant people, who developed the United States' first successful satellite in 18 months. Several years later ARPA began to focus on computer networking and communications technology.
In 1962, Dr. J.C.R. Licklider was chosen to head ARPA's research in improving the military's use of computer technology. Licklider was a visionary who sought to make the government's use of computers more interactive. To quickly expand technology, Licklider saw the need to move ARPA's contracts from the private sector to universities and laid the foundations for what would become the ARPANET.
The Atlantic cable of 1858 and Sputnik of 1957 were two basic milestone of the Internet prehistory. You might want also to take a look on the Telecommunications and Computers preHistory
The Internet as a tool to create "critical mass" of intellectual resources
To appreciate the import ante the new computer-aided communication can have, one must consider the dynamics of "critical mass," as it applies to cooperation in creative endeavor. Take any problem worthy of the name, and you find only a few people who can contribute effectively to its solution. Those people must be brought into close intellectual partnership so that their ideas can come into contact with one another. But bring these people together physically in one place to form a team, and you have trouble, for the most creative people are often not the best team players, and there are not enough top positions in a single organization to keep them all happy. Let them go their separate ways, and each creates his own empire, large or small, and devotes more time to the role of emperor than to the role of problem solver. The principals still get together at meetings. They still visit one another. But the time scale of their communication stretches out, and the correlations among mental models degenerate between meetings so that it may take a year to do a week’s communicating. There has to be some way of facilitating communicantion among people wit bout bringing them together in one place.
Roads and Crossroads of Internet History
Information Age Milestones
1866:" In the beginning was the Cable..."
The Atlantic cable of 1858 was established to carry instantaneous communications across the ocean for the first time. Although the laying of this first cable was seen as a landmark event in society, it was a technical failure. It only remained in service a few days. | |
Subsequent cables laid in 1866 were completely successful and compare to events like the moon landing of a century later... the cable ... remained in use for almost 100 years. Smithsonian's National Museum of American History |
A brief look from 1997:
Annual percentage growth rate of data traffic on undersea telephone cables: 90
Monday 25 May 2009
Mobile phones and the Internet
To make better use of the small screen and tiny keypad and one-handed operation typical of mobile phones, a simpler programming environment was created for the mobile phone Internet, called WAP for Wireless Application protocol. Most mobile phone Internet services operate on WAP.
The growth of the mobile phone based internet was initially a primarily Asian phenomenon with Japan, South Korea and Taiwan all soon finding the majority of their Internet users accessing by phone rather than by PC. Developing World countries followed next, with India, South Africa, Kenya, Philippines and Pakistan all reporting that the majority of their domestic Internet users accessed on a mobile phone rather than on a PC.
The European and North American use of the Internet was influenced by a large installed base of personal computers, and the growth of mobile phone Internet use was more gradual, but had reached national penetration levels of 20%-30% in most Western countries. In 2008 the cross-over happened, when more Internet access devices were mobile phones than personal computers. In many parts of the developing world, the ratio is as much as 10 mobile phone users to one PC user on the Internet
CERN, the European Internet, the link to the Pacific and beyond
In 1988 Daniel Karrenberg, from CWI in Amsterdam, visited Ben Segal, CERN's TCP/IP Coordinator, looking for advice about the transition of the European side of the UUCP Usenet network (much of which ran over X.25 links) over to TCP/IP. In 1987, Ben Segal had met with Len Bosack from the then still small company Cisco about purchasing some TCP/IP routers for CERN, and was able to give Karrenberg advice and forward him on to Cisco for the appropriate hardware. This expanded the European portion of the Internet across the existing UUCP networks, and in 1989 CERN opened its first external TCP/IP connections.[16] This coincided with the creation of Réseaux IP Européens (RIPE), initially a group of IP network administrators who met regularly to carry out co-ordination work together. Later, in 1992, RIPE was formally registered as a cooperative in Amsterdam.
At the same time as the rise of internetworking in Europe, ad hoc networking to ARPA and in-between Australian universities formed, based on various technologies such as X.25 and UUCPNet. These were limited in their connection to the global networks, due to the cost of making individual international UUCP dial-up or X.25 connections. In 1989, Australian universities joined the push towards using IP protocols to unify their networking infrastructures. AARNet was formed in 1989 by the Australian Vice-Chancellors' Committee and provided a dedicated IP based network for Australia.
The Internet began to penetrate Asia in the late 1980s. Japan, which had built the UUCP-based network JUNET in 1984, connected to NSFNet in 1989. It hosted the annual meeting of the Internet Society, INET'92, in Kobe. Singapore developed TECHNET in 1990, and Thailand gained a global Internet connection between Chulalongkorn University and UUNET in 1992
TCP/IP becomes worldwide
Merging the networks and creating the Internet
Map of the TCP/IP test network in January 1982
Commemorative plaque listing some of the early Internet pioneers
With so many different network methods, something was needed to unify them. Robert E. Kahn of DARPA and ARPANET recruited Vinton Cerf of Stanford University to work with him on the problem. By 1973, they had soon worked out a fundamental reformulation, where the differences between network protocols were hidden by using a common internetwork protocol, and instead of the network being responsible for reliability, as in the ARPANET, the hosts became responsible. Cerf credits Hubert Zimmerman, Gerard LeLann and Louis Pouzin (designer of the CYCLADES network) with important work on this design.[9]
The specification of the resulting protocol, RFC 675 - Specification of Internet Transmission Control Program, by Vinton Cerf, Yogen Dalal and Carl Sunshine, Network Working Group, December, 1974, contains the first attested use of the term internet, as a shorthand for internetworking; later RFCs repeat this use, so the word started out as an adjective rather than the noun it is today.
With the role of the network reduced to the bare minimum, it became possible to join almost any networks together, no matter what their characteristics were, thereby solving Kahn's initial problem. DARPA agreed to fund development of prototype software, and after several years of work, the first somewhat crude demonstration of a gateway between the Packet Radio network in the SF Bay area and the ARPANET was conducted. On November 22, 1977[10] a three network demonstration was conducted including the ARPANET, the Packet Radio Network and the Atlantic Packet Satellite network—all sponsored by DARPA. Stemming from the first specifications of TCP in 1974, TCP/IP emerged in mid-late 1978 in nearly final form. By 1981, the associated standards were published as RFCs 791, 792 and 793 and adopted for use. DARPA sponsored or encouraged the development of TCP/IP implementations for many operating systems and then scheduled a migration of all hosts on all of its packet networks to TCP/IP. On January 1, 1983, TCP/IP protocols became the only approved protocol on the ARPANET, replacing the earlier NCP protocol.[11]
ARPANET to Several Federal Wide Area Networks: MILNET, NSI, and NSFNet
Main articles: ARPANET and NSFNet
After the ARPANET had been up and running for several years, ARPA looked for another agency to hand off the network to; ARPA's primary mission was funding cutting edge research and development, not running a communications utility. Eventually, in July 1975, the network had been turned over to the Defense Communications Agency, also part of the Department of Defense. In 1983, the U.S. military portion of the ARPANET was broken off as a separate network, the MILNET. MILNET subsequently became the unclassified but military-only NIPRNET, in parallel with the SECRET-level SIPRNET and JWICS for TOP SECRET and above. NIPRNET does have controlled security gateways to the public Internet.
The networks based around the ARPANET were government funded and therefore restricted to noncommercial uses such as research; unrelated commercial use was strictly forbidden. This initially restricted connections to military sites and universities. During the 1980s, the connections expanded to more educational institutions, and even to a growing number of companies such as Digital Equipment Corporation and Hewlett-Packard, which were participating in research projects or providing services to those who were.
Several other branches of the U.S. government, the National Aeronautics and Space Agency (NASA), the National Science Foundation (NSF), and the Department of Energy (DOE) became heavily involved in Internet research and started development of a successor to ARPANET. In the mid 1980s, all three of these branches developed the first Wide Area Networks based on TCP/IP. NASA developed the NASA Science Network, NSF developed CSNET and DOE evolved the Energy Sciences Network or ESNet.
More explicitly, NASA developed a TCP/IP based Wide Area Network, NASA Science Network (NSN), in the mid 1980s connecting space scientists to data and information stored anywhere in the world. In 1989, the DECnet-based Space Physics Analysis Network (SPAN) and the TCP/IP-based NASA Science Network (NSN) were brought together at NASA Ames Research Center creating the first multiprotocol wide area network called the NASA Science Internet, or NSI. NSI was established to provide a total integrated communications infrastructure to the NASA scientific community for the advancement of earth, space and life sciences. As a high-speed, multiprotocol, international network, NSI provided connectivity to over 20,000 scientists across all seven continents.
In 1984 NSF developed CSNET exclusively based on TCP/IP. CSNET connected with ARPANET using TCP/IP, and ran TCP/IP over X.25, but it also supported departments without sophisticated network connections, using automated dial-up mail exchange. This grew into the NSFNet backbone, established in 1986, and intended to connect and provide access to a number of supercomputing centers established by the NSF.[12]
Transition towards an Internet
The term "Internet" was adopted in the first RFC published on the TCP protocol (RFC 675[13]: Internet Transmission Control Program, December 1974). It was around the time when ARPANET was interlinked with NSFNet, that the term Internet came into more general use,[14] with "an internet" meaning any network using TCP/IP. "The Internet" came to mean a global and large network using TCP/IP. Previously "internet" and "internetwork" had been used interchangeably, and "internet protocol" had been used to refer to other networking systems such as Xerox Network Services.[15]
As interest in wide spread networking grew and new applications for it arrived, the Internet's technologies spread throughout the rest of the world. TCP/IP's network-agnostic approach meant that it was easy to use any existing network infrastructure, such as the IPSS X.25 network, to carry Internet traffic. In 1984, University College London replaced its transatlantic satellite links with TCP/IP over IPSS.
Many sites unable to link directly to the Internet started to create simple gateways to allow transfer of e-mail, at that time the most important application. Sites which only had intermittent connections used UUCP or FidoNet and relied on the gateways between these networks and the Internet. Some gateway services went beyond simple e-mail peering, such as allowing access to FTP sites via UUCP or e-mail.
Finally, the Internet was decentralized. BGP was created to replace the EGP routing protocol to allow fully decentralized routing in order to allow the removal of the NSFNet Internet backbone network. This allowed the Internet to become a truly decentralized system. Since 1994, version four of the protocol has been in use on the Internet. All previous versions are now obsolete. The major enhancement in version 4 was support of Classless Inter-Domain Routing and use of route aggregation to decrease the size of routing tables. Since January 2006, version 4 is codified in RFC 4271, which went through well over 20 drafts based on the earlier RFC 1771 version 4. The RFC 4271 version corrected a number of errors, clarified ambiguities, and also brought the RFC much closer to industry practices
Networks that led to the Internet
Main article: ARPANET
Promoted to the head of the information processing office at DARPA, Robert Taylor intended to realize Licklider's ideas of an interconnected networking system. Bringing in Larry Roberts from MIT, he initiated a project to build such a network. The first ARPANET link was established between the University of California, Los Angeles and the Stanford Research Institute on 22:30 hours on October 29, 1969. By December 5, 1969, a 4-node network was connected by adding the University of Utah and the University of California, Santa Barbara. Building on ideas developed in ALOHAnet, the ARPANET grew rapidly. By 1981, the number of hosts had grown to 213, with a new host being added approximately every twenty days.
ARPANET became the technical core of what would become the Internet, and a primary tool in developing the technologies used. ARPANET development was centered around the Request for Comments (RFC) process, still used today for proposing and distributing Internet Protocols and Systems. RFC 1, entitled "Host Software", was written by Steve Crocker from the University of California, Los Angeles, and published on April 7, 1969. These early years were documented in the 1972 film Computer Networks: The Heralds of Resource Sharing.
International collaborations on ARPANET were sparse. For various political reasons, European developers were concerned with developing the X.25 networks. Notable exceptions were the Norwegian Seismic Array (NORSAR) in 1972, followed in 1973 by Sweden with satellite links to the Tanum Earth Station and University College London.
X.25 and public access
Following on from ARPA's research, packet switching network standards were developed by the International Telecommunication Union (ITU) in the form of X.25 and related standards. In 1974, X.25 formed the basis for the SERCnet network between British academic and research sites, which later became JANET. The initial ITU Standard on X.25 was approved in March 1976. This standard was based on the concept of virtual circuits.
The British Post Office, Western Union International and Tymnet collaborated to create the first international packet switched network, referred to as the International Packet Switched Service (IPSS), in 1978. This network grew from Europe and the US to cover Canada, Hong Kong and Australia by 1981. By the 1990s it provided a worldwide networking infrastructure.
Unlike ARPAnet, X.25 was also commonly available for business use. Telenet offered its Telemail electronic mail service, but this was oriented to enterprise use rather than the general email of ARPANET.
The first dial-in public networks used asynchronous TTY terminal protocols to reach a concentrator operated by the public network. Some public networks, such as CompuServe used X.25 to multiplex the terminal sessions into their packet-switched backbones, while others, such as Tymnet, used proprietary protocols. In 1979, CompuServe became the first service to offer electronic mail capabilities and technical support to personal computer users. The company broke new ground again in 1980 as the first to offer real-time chat with its CB Simulator. There were also the America Online (AOL) and Prodigy dial in networks and many bulletin board system (BBS) networks such as FidoNet. FidoNet in particular was popular amongst hobbyist computer users, many of them hackers and amateur radio operators.
UUCP
Main articles: UUCP and Usenet
In 1979, two students at Duke University, Tom Truscott and Jim Ellis, came up with the idea of using simple Bourne shell scripts to transfer news and messages on a serial line with nearby University of North Carolina at Chapel Hill. Following public release of the software, the mesh of UUCP hosts forwarding on the Usenet news rapidly expanded. UUCPnet, as it would later be named, also created gateways and links between FidoNet and dial-up BBS hosts. UUCP networks spread quickly due to the lower costs involved, ability to use existing leased lines, X.25 links or even ARPANET connections, and the lack of strict use policies (commercial organizations who might provide bug fixes) compared to later networks like CSnet and Bitnet. All connects were local. By 1981 the number of UUCP hosts had grown to 550, nearly doubling to 940 in 1984. - Sublink Network, operating since 1987 and officially founded in Italy in 1989, based its interconnectivity upon UUCP to redistribute mail and news groups messages throughout its Italian nodes (about 100 at the time) owned both by private individuals and small companies. Sublink Network represented possibly one of the first examples of the internet technology becoming progress through popular diffusion
Packet switching
Three terminals and an ARPA
"A network of such [computers], connected to one another by wide-band communication lines [which provided] the functions of present-day libraries together with anticipated advances in information storage and retrieval and [other] symbiotic functions."
—J.C.R. Licklider, [2]
In October 1962, Licklider was appointed head of the United States Department of Defense's Advanced Research Projects Agency, now known as DARPA, within the information processing office. There he formed an informal group within DARPA to further computer research. As part of the information processing office's role, three network terminals had been installed: one for System Development Corporation in Santa Monica, one for Project Genie at the University of California, Berkeley and one for the Compatible Time-Sharing System project at the Massachusetts Institute of Technology (MIT). Licklider's identified need for inter-networking would be made obvious by the apparent waste of resources this caused.
"For each of these three terminals, I had three different sets of user commands. So if I was talking online with someone at S.D.C. and I wanted to talk to someone I knew at Berkeley or M.I.T. about this, I had to get up from the S.D.C. terminal, go over and log into the other terminal and get in touch with them. [...] I said, it's obvious what to do (But I don't want to do it): If you have these three terminals, there ought to be one terminal that goes anywhere you want to go where you have interactive computing. That idea is the ARPAnet."
Before the Internet
Wednesday 13 May 2009
INTERNET SECURITY
Security concerns are in some ways peripheral to normal business working, but serve to highlight just how important it is that business users feel confident when using IT systems. Security will probably always be high on the IT agenda simply because cyber criminals know that a successful attack is very profitable. This means they will always strive to find new ways to circumvent IT security, and users will consequently need to be continually vigilant. Whenever decisions need to be made about how to enhance a system, security will need to be held uppermost among its requirements.
Penetration testing
Intrusion Detection
Incidence Response
Legal / Audit Compliance
Trojan horses are programs which pretend to do one thing, but in reality snoop out your personal data or damage it. These types conceal their identity or true intentions and are usually quite hard to detect.
Worms are programs which are able to replicate themselves over a computer network and in turn perform malicious actions. As a result it has the ability to affect other programs on the computer.
Viruses are programs which are able to log into the personal files on a computer it has affected and as a result, can end up removing all of them. It can have serious side effects on a computers system.
Mal ware can be classified as Trojans with a limited payload and are often not detected by most antivirus software. They may require the use of other software designed to detect other classes of malware, including spy ware.
Software programs such as antivirus software are the most useful in protecting your computer from harmful viruses. These programs are used to detect and eliminate viruses. Anti-virus software can be purchased from any software vendor or downloaded off the Internet. Care should be taken in the selection of anti-virus software, as some programs are not very effective in finding and eliminating viruses or malware. Also, when downloading anti-virus software from the Internet, one should be cautioned that some websites say they are providing protection from viruses with their software, but they are really trying to install malware on your computer by disguising it as something else.
Spy ware collects and relays data from the compromised computer to a third-party.
Ad ware automatically plays, displays, or downloads advertisements. Some types of ad ware are also spy ware and can be classified as privacy-invasive software. Ad ware often are integrated with other software.
Monday 11 May 2009
Internet Security
The Internet represents a new market, a new market of currency, and a new way for businesses to conduct operations electronically. While new technologies often increase opportunities, they also spawn a new breed of criminal trying to undermine those opportunities. The ability to commit crime on the Internet extends across the eco
. . .ys every day due to the number of encryptions processed. Such issues as encryption pertain to many kinds of law, such as contract law, privacy law, and financial law. For example, the Electronic Signatures in Global and National Commerce Act 2000 (S.761) validates electronic signatures for interstate and international commerce, defines the circumstances under which an electronic record satisfies statutes and regulations, and other provisions. Various consumer protections are provided in the Act, such as consent being required before multiple transactions can be conducted with the signature and the provisions of a printed copy of any such transaction at the consumer’s request. Encryption Another common protection measure is the use of encryption. Encryption applications like Pretty Good Privacy (PGP) provide a level of security that access security measures cannot provide. There are two methods of encryption. One is known as symmetric key encryption and uses identical passwords to encrypt and decrypt data. The main flaw with this form of security is that it requires a secure channel to provide users with passwords. If there was a secure channel there would be no need to use encryption. Therefore, the second form was dev . . . Some common words found in the essay are:Pentagon Internet, Computer Policy, Commerce Committee, Abstract Internet, Firewalls Firewalls, Privacy PGP, STAT Scanner, Internet Intranets, Identity Theft, Introduction Internet, internet security, security measures, internet security measures, access security, vulnerability assessment tools, vulnerability assessment, assessment tools, increasingly sophisticated, identity theft, breed criminal, businesses government agencies, communications policy, intranet scanner, access security measures, outside inside company,
source;http://www.lotsofessays.com
Internet Banking: Risk and Security Issues
While the vast majority of analysts see Internet banking as having revolutionized the financial sector, Perumal (2005) suggests that despite the astronomical growth rate of this sector, there are certain risks attendant upon using the Internet for personal financ
. . .Some common words found in the essay are:Statement Purpose, United Kingdom, Nevertheless Cipparone, Limitations Despite, Methods Research, References Cipparone, Commission FDIC, Finally Internet, US-based Fargo, online banking, internet banking, Yahoo Google, 2005 internet, identity theft, 2005 internet banking, banking services, associated online banking, transaction speed, fdic 2005, proposed study, perumal 2005, fdic 2005 internet, federal deposit insurance, deposit insurance.
source; http://www.lotsofessays.com
Internet Banking
While the vast majority of analysts see Internet banking as having revolutionized the financial sector, Perumal (2005) suggests that despite the astronomical growth rate of this sector, there are certain risks attendant upon using the Internet for personal financial transactions. Among these risks are the potential for identity theft, concerns that Internet banking may be depersonalized, and fears that government and private sector actors may gain access to sensitive personal information (Stewart, 2005).
Nevertheless, as Cipparone (2005) has commented, Internet banking offers consumers any number of advantages. Ease of access, transaction speed, customization of services, and 24-hour-a-day availability are among these advantages. For bankers, the Internet offers an opportunity to reach out to a new generation of clients and to expand market p
. . .nking is prominent in a relatively small number of locales and the experiences in those locales may not necessarily reflect universal concerns. Finally, given that Internet banking requires access to a personal computer and an Internet connection, access to this service is not itself universal. This may result in information bias. Methods of Research The proposed report will consist of an exploratory, narrative, descriptive study employing secondary rather than primary research. A number of databases will be employed in identifying previously published materials suitable for inclusion in the study. The John F. Kennedy Memorial Library at California State University, Los Angeles, and online search engines such as Yahoo and Google will provide the bulk of the secondary research materials employed in the study. Results The research completed for this report reflected the interrelated nature of the three questions listed above in the statement of purpose. The risks and benefits of online banking are directly related to the degree of comfort that consumers feel about online banking and online banking has had an enormous impact on the banking industry. Elinor Mills (????), commenting on an online survey that was commiss . . . Some common words found in the essay are:Sovereign Bank, Statement Purpose, Los Angeles, United Kingdom, Nevertheless Cipparone, Summary Conclusion, Yahoo Google, Limitations Despite, Deena McCoy, Elinor Mills, online banking, identity theft, internet banking, banking services, banking industry, online banking services, 2005 internet, 2005 internet banking, banking banking, online bill, risks benefits, benefits online, online banking banking, banking banking industry, benefits online banking.
source; http://www.lotsofessays.com
Internet Use at Wells Fargo Bank
The Web site is used for dissemination of information both inside and outside the organization. External communication is emphasized on the site more than internal communication. At the site, customers·both corporate and individual·can access their accounts and receive information about their accounts via e-mail if they so choose. In addition, current customers can conduct business through the Internet and the Wells Fargo Web site to the point that companies can run their payroll on-site and customers can make payments to various loans or transfer money from one account to another online. The Web site can also be used for paying bills to third-parties; this reduces the level of complexity associated with bill paying and is perceived as a valuable customer benefit (Bodner
. . .for example, another menu is displayed listing various products and options, such as "Buy Now" and "Football" ("Nike," 2005). Under the "About Nike / Jobs" button, the user can locate information about the company·including investor relations and employment opportunities. This is also the location of the "Responsibility" section of the site. Nike has encountered several public relations difficulties, the most notable of which is its use of child labor in Asia. Not surprisingly, there is an entire section of the Web site devoted to "Workers and Factories" ("Responsibility," 2005). However, the "About Nike" of the Web site is organized differently than the entry page, and even has a different color scheme. Perhaps the site is being redone and the company chose to keep certain elements active during the reconstruction. Or the site may have had different developers working in isolation who were not aware of the standards used elsewhere on the site. Regardless of the reason, the site misses an opportunity to promote brand management since it is disjointed from the home page to the corporate information page. There is also confusion about the various features of the site. For example, Nike offers consumers the ability to cust . . . Some common words found in the essay are:Word Excel, Wall Street, Fargo Web, Nike Web, Fargo Bank, Niketown Web, Fargo Internet, Football Nike, FINANCIAL INSTITUTION, ANALYSIS NIKECOM, web site, wall street, 2005 nike, home page, wall street 2005, site nike, 7 nov, key customers, nov 2005, retrieved 7, retrieved 7 nov, 7 nov 2005, street 2005, internal communication site, nike 2005 nike
source;http://www.lotsofessays.com
Uses of Internet
enabling them to share information. The internet has brought a transformation in many aspects of life. It is one of the biggest contributors in making the world into a global village. Use of internet has grown tremendously since it was introduced. It is mostly because of its flexibility. Nowadays one can access the internet easily. Most people have computers in their homes but even the ones who don?t they can always go to cyber cafes where this service is provided.
The internet developed from software called the ARPANET which the U.S military had developed. It was only restrict to military personnel and the people who developed it. Only after it was privatized was it allowed to be used commercially.
The internet has developed to give many benefits to mankind. The access to information being one of the most important. Student can now have access to libraries around the world. Some charge a fee but most provide free services. Before students had to spend hours and hours in the libraries but now at the touch of a button students have a huge database in front of them
Online chatting also has its own hazards. When one is talking to strangers one does not really know who they are. They can be just anybody pretending to be someone else. Many cases have been reported of child abuse happening this way. There is no way of verifying who the other really is. Many industries have also suffered a loss, especially the music and movie industry. Movies and songs are available for free on the internet which has affected the sale levels of artists. People make their own cds and sell them. The phone industry has also suffered because more people are making calls through the internet.
There is also a certain loss of privacy because now most people store all their information on the computer and when you connect online, anybody can hack ones computer and get into it. This had already been done with many e-mail inboxes. Sites also have been hacked leading to major mishaps. Sending a virus on the Web has also been another way that people?s computers have been infected.
The internet has brought new opportunities to government, business and education. Governments use it for various processes such as distribution of information and internal communication. Businesses use it to sell and buy products online and also to interact with other businesses. New business opportunities have sprouted because of the internet. Auctions take place and sites like ?e-bay? provide the opportunity for everyone to put their things on auction. Companies use it for electronic comme
Some topics in this essay: , Wide Web, School Economics, online chatting, access internet, internet brought, internet developed, internet online, internet abused,
Join now to see the rest of the essay! Approximate Word count = 1010 Approximate Pages = 4 (250 words per page double spaced)
Sunday 10 May 2009
CDMA & GSM Cellular Technology
For more protocols related to cellular protocols see the following families: GPRS, UMTS, CDMA2000
See SS7 for a description of SS7 protocols.
For information on cellular and telecom protocol testing
GSM and CDMA protocols described here include:
BSMAP
Base Station Management Application Part
BSSAP
BSS Application Part
BSSLAP
BSSAPLE
BSSMAP
BSS Managment Application Part
BTSM
Base Transceiver Station Management
CC
Call Control
DTAP (CDMA)
Direct Transfer Application Part for CDMA
DTAP (GSM)
Direct Transfer Application Part for GSM
MM
Mobility Management
MMS
Mobile IP
Mobile Internet Protocol
RR
Radio Resource
SMS
Short Message Service
SMSTP
Short Message Transfer Layer Protocol
GSMIn 1989, GSM responsibility was transferred to the European Telecommunication Standards Institute (ETSI), and phase I of the GSM specifications were published in 1990. Commercial service was started in mid1991, and by 1993 there were 36 GSM networks in 22 countries, with 25 additional countries having already selected or considering GSM In addition to Europe, South Africa, Australia, and many Middle and Far East countries have chosen to adopt GSM. By the beginning of 1994, there were 1.3 million subscribers worldwide. The acronym GSM now (aptly) stands for Global System for Mobile telecommunications.
From the beginning, the planners of GSM wanted ISDN compatibility in services offered and control signaling used. The radio link imposed some limitations, however, since the standard ISDN bit rate of 64 Kbps could not be practically achieved.
The digital nature of GSM allows data, both synchronous and asynchronous data, to be transported as a bearer service to or from an ISDN terminal. The data rates supported by GSM are 300 bps, 600 bps, 1200 bps, 2400 bps, and 9600 bps.
The most basic teleservice supported by GSM is telephony. A unique feature of GSM compared to older analog systems is the Short Message Service (SMS). Supplementary services are provided on top of teleservices or bearer services, and include features such as international roaming, caller identification, call forwarding, call waiting, multiparty conversations, and barring of outgoing (international) calls, among others.
CDMACode Division Multiple Access (CDMA) is a digital air interface standard, claiming eight to fifteen times the capacity of traditional analog cellular systems. It employs a commercial adaptation of a military spread-spectrum technology. Based on spread spectrum theory, it gives essentially the same services and qualities as wireline service. The primary difference is that access to the local exchange carrier (LEC) is provided via a wireless phone.
Though CDMA’s application in cellular telephony is relatively new, it is not a new technology. CDMA has been used in many military applications, such as:
Anti-jamming (because of the spread signal, it is difficult to jam or interfere with a CDMA signal).
Ranging (measuring the distance of the transmission to know when it will be received).
Secure communications (the spread spectrum signal is very hard to detect).
CDMA is a spread spectrum technology, which means that it spreads the information contained in a particular signal of interest over a much greater bandwidth than the original signal. With CDMA, unique digital codes, rather than separate RF frequencies or channels, are used to differentiate subscribers. The codes are shared by both the mobile station (cellular phone) and the base station, and are called pseudo-random code sequences. Since each user is separated by a unique code, all users can share the same frequency band (range of radio spectrum). This gives many unique advantages to the CDMA technique over other RF techniques in cellular communication.
CDMA is a digital multiple access technique and this cellular aspect of the protocol is specified by the Telecommunications Industry Association (TIA) as IS-95. In CDMA, the BSSAP is divided into the DTAP and BSMAP (which corresponds to BSSMAP in GSM).
BSMAP
TIA/EIA/IS-634-A, revision A
The Base Station Management Application Part (BSMAP) supports all Radio Resource Management and Facility Management procedures between the MSC and the BS, or to a cell(s) within the BS. BSMAP messages are not passed to the MS, but are used only to perform functions at the MSC or the BS. A BSMAP message (complete layer 3 information) is also used together with a DTAP message to establish a connection for an MS between the BS and the MSC, in response to the first layer 3 interface message sent by the MS to the BS for each MS system request.
The format of the header is shown in the following illustration:
8
7
6
5
4
3
2
1
Octet
Message type
1
Parameter
2-n
BSMAP header structure
Message TypeA one octet field defining the message type. This mandatory field uniquely defines the function and format of each BSSMAP message.
Information ElementEach IE has an identifier which is coded as a single octet. The length of an IE may be fixed or variable and may or may not include a length indicator.
Interested in more details about testing this protocol?
BSSLAP
http://webapp.etsi.org/key/queryform.asp 3GPP TS 08.71
BSSLAP defines the SMLC-BSS layer 3 protocol .The following Location Services related messages are exchanged between the SMLC and the BSS, with the VMSC acting as a relay.
TA Request
TA Response
TOA Request
TOA Response
Reject
Reset
Abort
TA Layer3
MS Position Command
MS Position Response
On the A interface the messages are contained in the Location Information IE which is encapsulated in the BSSMAP-LE Connection Oriented Information message as specified in 3GPP TS 08.08. On the Ls interface the messages are contained in the Location Information IE which is encapsulated in the BSSMAP-LE Connection Oriented Information message as specified in 3GPP TS 09.31.
The protocol header appears as follows:
8
7
6
5
4
3
2
1
Octet
Message type
1
Information elements
2-n
Message TypeThe following messages types are available:
Reserved
00000000
TA EQUEST
00000001
TA Response
00000010
TOA Request
00000100
TOA Response
00000101
Reject
00001010
Reset
00001011
Abort
00001100
TA LAYER3
00001101
MS Position Command
00001111
MS Posiiton Response
00010000
Interested in more details about testing this protocol?
BSSAP
GSM 08.06 http://www.etsi.fr
The MTP and the SCCP are used to support signalling messages between the Mobile Services Switching Center (MSC) and the Base Station System (BSS). One user function of the SCCP, called BSS Application Part (BSSAP) is defined. In the case of point-to-point calls the BSSAP uses one signalling connection per active mobile station having one or more active transactions for the transfer of layer 3 messages. In the case of a voice group or broadcast call there is always one connection per cell involved in the call and one additional connection per BSS for the transmission of layer 3 messages. There is an additional connection for the speaker in a broadcast call or the first speaker in a voice group call up to the point at which the network decides to transfer them to a common channel. Additional connections may also be required for any mobile stations in the voice group or broadcast call which the network decides to place on a dedicated connection. The BSSAP user function is further subdivided into two separate functions:
The Direct Transfer Application sub-Part (DTAP), also called GSM L3, is used to transfer messages between the MSC and the MS (Mobile Station); the layer-3 information in these messages is not interpreted by the BSS. The descriptions of the layer 3 protocols for the MS-MSC information exchange are contained in the 04- series of GSM Technical Specifications.
The BSS Management Application sub-Part (BSSMAP) supports other procedures between the MSC and the BSS related to the MS (resource management, handover control), or to a cell within the BSS, or to the whole BSS. The description of the layer 3 protocol for the BSSMAP information exchange is contained in Recommendation GSM 08.08.
Both connectionless and connection-oriented procedures are used to support the BSSMAP. Rec. GSM 08.08 explains whether connection oriented or connectionless services should be used for each layer 3 procedure. Connection oriented procedures are used to support the DTAP. A distribution function located in BSSAP, which is reflected in the protocol specification by the layer 3 header, performs the discrimination between the data related to those two subparts.
BSSAP messages include the following fields:
1 byte
1byte
Discrimination
DLCI
Length
BSSAP header structure
DiscriminationDistribution between the two sub-protocols: BSSMAP and DTAP.
DLCIOnly for DTAP. Used in MSC to BSS messages to indicate the type of origination data link connection over the radio interface.
LengthSubsequent Layer3 message parameter length.
Interested in more details about testing this protocol?
BSSAPLE
http://webapp.etsi.org/key/queryform.asp. 3GPP TS 09.31 and 3GPP TS 04.71
BSSAP-LE is an extension to BSSAP that contains messages and parameters specific to the support of LCS. The BSSAP-LE is part of the LB interface. The following subsets of BSSAP-LE are defined: DTAP-LE and BSSMAP-LE. DTAP-LE messages are transfered between an SMLC and a Type A LMU. BSSMAP-LE messages are transferred between a BSC, MSC and SMLC.
The header appears as follows:
BSSMAP-LE Header
8
7
6
5
4
3
2
1
Octet
0
0
0
0
0
0
0
D=0
1
Length indicator = n
2
BSSMAP-LE Message Contents
3-n
DTAP-LE Header
8
7
6
5
4
3
2
1
Octet
0
0
0
0
0
0
0
D=0
1
DLCI
2
Length indicator = n
3
DTAP-LE Message Contents
4-n
Discrimination Indicator
BSSMAP-LE
0
DTAP-LE
1
DLCIThe DLCI in octet 2 is applicable only to DTAP-LE messages.For signaling to a type A LMU using an SDCCH and SAPI=0, the value of the DLCI is 10000000.
Length IndicatorThe length indicator is coded in one octet, and is the binary representation of the number of octets of the subsequent BSSMAP-LE or DTAP-LE message parameter. DTAP-LE MessagesThe following DTAP message types are available:
0X32
REGISTER
0X31
FACILITY
0X21
RELEASE COMPLETE
BSSMAP-LE MessagesThe following BSSMAP-LE message types are available:
0X2B
Perform Location Request
0X2D
Perform Location Response
0X2E
Perform Location Abort
0X1
LMU Connection Request
0X2
LMU Connection Accept
0X3
LMU Connection Reject
0X4
LMU Connection Release
0X2A
Connection Oriented Information
0X3A
Connectionless Information
0X30
Reset
0X31
Reset Acknowledge
Interested in more details about testing this protocol?
BSSMAP
GSM 08.08 http://www.etsi.fr
The BSS Management Application Part (BSSMAP) supports all of the procedures between the MSC and the BSS that require interpretation and processing of information related to single calls, and resource management. Some of the BSSMAP procedures result in, or are triggered by, Radio Resource (RR) management messages defined in GSM 04.08.The format of the BSSMAP protocol is as follows:
8
7
6
5
4
3
2
1
Octet
Message type
1
Information Element
2-n
BSSMAP header structure
Message TypeA one octet field defining the message type. This mandatory field uniquely defines the function and format of each BSSMAP message.
Information ElementEach IE has an identifier which is coded as a single octet. The length of an IE may be fixed or variable and may or may not include a length indicator.
Interested in more details about testing this protocol?
BTSM
GSM 08.58 http://www.etsi.fr
BTSM is the Base Station Controller to Base Transceiver Station (BSC - BTS) interface protocol (the A-bis interface). BTSM allows sending messages between the Base Station Controller and the Base Transceiver Station. Protocol messages consist of a series of information elements. For each message there are mandatory information elements and optional information elements. BTSM messages are transmitted on the A-bis interface using the I format of LAPD, except for the Measurement Result message which is sent in UI format.
The structure of BTSM messages is shown in the following diagram:
8
7
6
5
4
3
2
1
Octet
Message discriminator
1
Message type
2
Information elements
3-n
BTSM structure
Message discriminator1-octet field used in all messages to discriminate between Transparent and Non-Transparent messages and also between Radio Link Layer Management, Dedicated Channel Management, Common Channel Management and TRX Management messages.
Message typeUniquely identifies the function of the message being sent. It is a single octet field.
Interested in more details about testing this protocol?
CC
GSM 04.08 http://www.etsi.fr
The call control (CC) protocol is one of the protocols of the Connection Management (CM) sublayer. Every mobile station must support the call control protocol. If a mobile station does not support any bearer capability at all then it must respond to a SETUP message with a RELEASE COMPLETE message. In the call control protocol, more than one CC entity are defined. Each CC entity is independent from each other and communicates with the correspondent peer entity using its own MM connection. Different CC entities use different transaction identifiers.
Certain sequences of actions of the two peer entities compose elementary procedures. These elementary procedures may be grouped into the following classes:
Call establishment procedures.
Call clearing procedures.
Call information phase procedures.
Miscellaneous procedures.
The terms "mobile originating" or "mobile originated" (MO) are used to describe a call initiated by the mobile station. The terms "mobile terminating" or "mobile terminated" (MT) are used to describe a call initiated by the network.
The CC structure is shown here:
8
7
6
5
4
3
2
1
Octet
Protocol Distriminator
Transaction ID
1
Message type
2
Information elements
3-n
CC structure
Protocol discriminator0011 identifies the CC protocol.
Transaction IdentifierThe format of the transaction identifier is as follows:
8
7
6
5
4
3
2
1
Octet
TI flag
TI value
- - - -
1
Transaction Identifier
TI flagIdentifies who allocated the TI value for this transaction. The purpose of the TI flag is to resolve simultaneous attempts to allocate the same TI value.
TI valueTI values are assigned by the side of the interface initiating a transaction. At the beginning of a transaction, a free TI value is chosen and assigned to this transaction. It then remains fixed for the lifetime of the transaction. After a transaction ends, the associated TI value is free and may be reassigned to a later transaction. Two identical transaction identifier values may be used when each value pertains to a transaction originated at opposite ends of the interface.
Message typeCC message types may be as follows. Bit 8 is reserved for possible future use as an extension bit. Bit 7 is reserved for the send sequence number in messages sent from the mobile station.
0x000000
Escape to nationally specific message types
0x00- - - -
Call establishment messages:
0001
ALERTING
1000
CALL CONFIRMED
0010
CALL PROCEEDING
0111
CONNECT
1111
CONNECT ACKNOWLEDGE
1110
EMERGENCY SETUP
0011
PROGRESS
0101
SETUP
0x01- - - -
Call information phase messages:
0111
MODIFY
1111
MODIFY COMPLETE
0011
MODIFY REJECT
0000
USER INFORMATION
1000
HOLD
1001
HOLD ACKNOWLEDGE
1010
HOLD REJECT
1100
RETRIEVE
1101
RETRIEVE ACKNOWLEDGE
1110
RETRIEVE REJECT
0x10- - - -
Call clearing messages:
0101
DISCONNECT
1101
RELEASE
1010
RELEASE COMPLETE
0x11- - - -
Miscellaneous messages:
1001
CONGESTION CONTROL
1110
NOTIFY
1101
STATUS
0100
STATUS ENQUIRY
0101
START DTMF
0001
STOP DTMF
0010
STOP DTMF ACKNOWLEDGE
0110
START DTMF ACKNOWLEDGE
0111
START DTMF REJECT
1010
FACILITY
Interested in more details about testing this protocol?
DTAP (CDMA)TIA/EIA/IS-634-A, revision AThe Direct Transfer Application Part (DTAP) messages are used to transfer call processing and mobility management messages to and from the MS. The BS does not use DTAP messages, but must map messages going to and coming from the MSC into the appropriate air interface signaling protocol. Transaction IDs are used to associate the DTAP messages with a particular MS and the current call.The format of the header is shown in the following illustration:
8
7
6
5
4
3
2
1
Octet
Transaction identifier
Protocol discriminator
1
Message type
2
Information elements
3-n
DTAP header structure
Protocol discriminatorThe protocol discriminator specifies the message being transferred (CC, MM, RR).Transaction identifierDistinguishes multiple parallel activities (transactions) within one mobile station. The format of the transaction identifier is as follows:
8
7
6
5
TI flag
TI value
Transaction identifier
TI flagIdentifies who allocated the TI value for this transaction. The purpose of the TI flag is to resolve simultaneous attempts to allocate the same TI value.TI valueTI values are assigned by the side of the interface initiating a transaction. At the beginning of a transaction, a free TI value is chosen and assigned to this transaction. It then remains fixed for the lifetime of the transaction. After a transaction ends, the associated TI value is free and may be reassigned to a later transaction. Two identical transaction identifier values may be used when each value pertains to a transaction originated at opposite ends of the interface.Message TypeThe message type defines the function of each DTAP message. Information elementsEach information element has a name which is coded as a single octet. The length of an information element may be fixed or variable and a length indicator for each one may be included.Interested in more details about testing this protocol?
DTAP (GSM)
GSM 04.08, 08.06, 08.08 http://www.etsi.fr
The Direct Transfer Application Part (DTAP) is used to transfer call control and mobility management messages between the MSC and the MS. The DTAP information in these messages is not interpreted by the BSS. Messages received from the MS are identified as DTAP by the Protocol Discriminator Information Element. The majority of radio interface messages are transferred across the BSS MSC interface by DTAP, except for messages belonging to the Radio Resource (RR) management protocol.
The DTAP function is in charge of transferring layer 3 messages from the MS (or from the MSC) to the MSC (or to the MS) without any analysis of the message contents. The interworking between the layer 2 protocol on the radio side and signalling system 7 at the landside is based on the use of individual SCCP connections for each MS and on the distribution function.
The format of the DTAP header is shown in the following illustration:
8
7
6
5
4
3
2
1
Octet
Protocol Distriminator
Transaction / Skip
1
0
N(SD)
Message Type
2
Information Elements
3-n
GSM L3 structure
Protocol discriminatorIdentifies the L3 protocol to which the standard layer 3 message belongs. Values may be as follows:0000 Group call control0001 Broadcast call control0010 PDSS10011 Call control; call related SS messages0100 PDSS20101 Mobility Management Messages0110 Radio resources management messages1001 SMS messages1011 Non-call related SS messages1110 Extension of the PD to one octet length1111 Tests procedures described in TS GSM 11.10
Transaction ID / Skip identifierEither a transaction identifier, or a skip indictor depending on the level 3 protocol. The transaction identifier contains the transaction value and flag which identifies who allocated the TI.
N(SD)For MM and CM, N(SD) is set to the value of the send state variable. In other level 3 messages, bit 7 is set to 0 by the sending side. Messages received with bit 7 set to 1 are ignored.
Message typeUniquely defines the function and format of each GSM L3 message. The message type is mandatory for all messages. The meaning of the message type is therefore dependent on the protocol (the same value may have different meanings in different protocols) and direction (the same value may have different meanings in the same protocol, when sent from the Mobile Station to the network and when sent from the network to the Mobile Station).
Information elementsThe message type may be followed by various information elements depending on the protocol.
Interested in more details about testing this protocol?
MM
GSM 04.08 http://www.etsi.fr
The main function of the Mobility Management (MM) sub-layer is to support the mobility of user terminals, such as informing the network of its present location and providing user identity confidentiality. A further function of the MM sub-layer is to provide connection management services to the different entities of the upper Connection Management (CM) sub-layer
8
7
6
5
4
3
2
1
Octet
Protocol distriminator
Skip indicator
1
Message type
2
Information elements
3-n
MM header structure
Protocol discriminator0101 identifies the MM protocol.
Message typeMM message types may be as follows. Bit 8 is reserved for possible future use as an extension bit. Bit 7 is reserved for the send sequence number in messages sent from the mobile station.
0x00- - - -
Registration messages:
0001
IMSI DETACH INDICATION
0010
LOCATION UPDATING ACCEPT
0100
LOCATION UPDATING REJECT
1000
LOCATION UPDATING REQUEST
0x01- - - -
Security messages:
0001
AUTHENTICATION REJECT
0010
AUTHENTICATION REQUEST
0100
AUTHENTICATION RESPONSE
1000
IDENTITY REQUEST
1001
IDENTITY RESPONSE
1010
TMSI REALLOCATION COMMAND
1011
TMSI REALLOCATION COMPLETE
0x10- - - -
Connection management messages:
0001
CM SERVICE ACCEPT
0010
CM SERVICE REJECT
0011
CM SERVICE ABORT
0100
CM SERVICE REQUEST
1000
CM REESTABLISHMENT REQUEST
1001
ABORT
0x11- - - -
Miscellaneous messages:
0001
MM STATUS
Interested in more details about testing this protocol?
MMS
http://www.openmobilealliance.org/ OMA-MMS-ENC-v1_1-20021030-C.
The WAP Multimedia Messaging Service (MMS) uses WAP WSP/HTTP as underlying protocols to transfer MMS PDUs between the MMS Client, which resides on the terminal (MS) and the MMS Proxy -Relay.
This structure is based on the well-known message structure of Internet email binary encoding of MMS PDUs. Because of the limited bandwidth of the air interface of mobile networks MMS PDUs are transferred between an MMS Client and an MMS Proxy -Relay in binary encoded message format. This process is called encapsulation. WSP PDUs or HTTP messages, which contain MMS PDUs as their body, are used for this transport.
MMS PDUs, which are described in this specification, are included in WSP PDUs/HTTP messages of different types. The entire MMS information is contained in MMS PDUs, which are encapsulated in WSP PDUs/HTTP messages.
The content type of WSP PDUs/HTTP messages containing MMS PDUs is"application/vnd.wap.mms - message."
MMS has no header structure as it consists of messages. Field Reference Number:
0x81
Bcc
0x82
Cc
0x83
X-Mms-Content-Location
0x84
Content-Type
0x85
Date
0x86
X-Mms-Delivery-Report
0x87
X-Mms-Delivery-Time
0x88
X-Mms-Expiry
0x89
From
0x8A
X-mms-Message-Class
0x8B
Message-ID
0x8C
X-Mms-Message-Type
0x8D
X-Mms-MMS-Version
0x8E
X-Mms-Message-Size
0x8F
X-Mms-Priority
0x90
X-Mms-Read-Report
0x91
X-Mms-Report-Allowed
0x92
X-Mms-Response-Status
0x93
X-Mms-Response-Text
0x94
X-Mms-Sender-Visibility
0x95
X-Mms-Status
0x96
Subject
0x97
To
0x98
X-Mms-Transaction-Id
0x99
X-Mms-Retrieve-Status
0x9A
X-Mms-Retrieve-Text
0x9B
X-Mms-Read-Status
0x9C
X-Mms-Reply-Charging
0x9D
X-Mms-Reply-Charging-Deadline
0x9E
X-Mms-Reply-Charging-ID
0x9F
X-Mms-Reply-Charging-Size
0xA0
X-Mms-Previously-Sent-By
0xA1
X-Mms-Previously-Sent-DateMessage TypeThe following message types are contained in the PDU:
128
m-send-req
129
m-send-conf
130
m-notification-ind
131
m-notifyresp-ind
132
m-retrieve-conf
133
m-acknowledge-ind
134
m-delivery-ind
135
m-read-rec-ind
136
m-read-orig-ind
137
m-forward-req
138
m-forward-conf
Interested in more details about testing this protocol?
RR
GSM 04.08 http://www.etsi.fr
RR (Radio Resource) management procedures include the functions related to the management of the common transmission resources, e.g., the physical channels and the data link connections on control channels. The general purpose of Radio Resource procedures is to establish, maintain and release RR connections that allow a point-to-point dialogue between the network and a Mobile Station. This includes the cell selection/reselection and the handover procedures. Moreover, Radio Resource management procedures include the reception of the uni-directional BCCH and CCCH when no RR connection is established. This permits automatic cell selection/reselection.
8
7
6
5
4
3
2
1
Octet
Protocol distriminator
Skip indicator
1
Message type
2
Information elements
3-n
RR structure
Protocol discriminator0110 identifies the RR Management protocol.
Skip identifierValue of 0000.
Message typeUniquely defines the function and format of each RR message. The message type is mandatory for all messages. RR message types may be:
00111- - -
Channel establishment messages:
011
ADDITIONAL ASSIGNMENT
111
IMMEDIATE ASSIGNMENT
001
IMMEDIATE ASSIGNMENT EXTENDED
010
IMMEDIATE ASSIGNMENT REJECT
00110- - -
Ciphering messages:
101
CIPHERING MODE COMMAND
010
CIPHERING MODE COMPLETE
00101- - -
Handover messages:
110
ASSIGNMENT COMMAND
001
ASSIGNMENT COMPLETE
111
ASSIGNMENT FAILURE
011
HANDOVER COMMAND
100
HANDOVER COMPLETE
000
HANDOVER FAILURE
101
PHYSICAL INFORMATION
00001- - -
Channel release messages:
101
CHANNEL RELEASE
010
PARTIAL RELEASE
111
PARTIAL RELEASE COMPLETE
00100- - -
Paging messages:
001
PAGING REQUEST TYPE 1
010
PAGING REQUEST TYPE 2
100
PAGING REQUEST TYPE 3
111
PAGING RESPONSE
00011- - -
System information messages:
000
SYSTEM INFORMATION TYPE 8
001
SYSTEM INFORMATION TYPE 1
010
SYSTEM INFORMATION TYPE 2
011
SYSTEM INFORMATION TYPE 3
100
SYSTEM INFORMATION TYPE 4
101
SYSTEM INFORMATION TYPE 5
110
SYSTEM INFORMATION TYPE 6
111
SYSTEM INFORMATION TYPE 7
00000- - -
System information messages:
010
SYSTEM INFORMATION TYPE 2bis
011
SYSTEM IN FORMATION TYPE 2ter
101
SYSTEM INFORMATION TYPE 5bis
110
SYSTEM INFORMATION TYPE 5ter
00010- - -
Miscellaneous messages:
000
CHANNEL MODE MODIFY
010
RR STATUS
111
CHANNEL MODE MODIFY ACKNOWLEDGE
100
FREQUENCY REDEFINITION
101
MEASUREMENT REPORT
110
CLASSMARK CHANGE
011
CLASSMARK ENQUIRY
Interested in more details about testing this protocol?
SMS
GSM 04.11 http://www.etsi.fr
The purpose of the Short Message Service (SMS)is to provide the means to transfer messages between a GSM PLMN Mobile Station and a Short Message Entity via a Service Center, as described in TS GSM 03.40. The terms "MO" - Mobile Originating - and "MT" - Mobile Terminating - are used to indicate the direction in which the short message is sent.
The SMS structure is as follows for control messages:
8
7
6
5
4
3
2
1
Octet
Protocol distriminator
Skip indicator
1
Message type
2
Information elements
3-n
SMS CP structure
Protocol discriminator1001 identifies the SMS protocol.
Transaction IdentifierSee CC for the format of the Transaction ID.
Message typeThe message type, together with the protocol discriminator, identifies the function of the message being sent. Messages may be of the following:00000001 CP-DATA00000100 CP-ACK00010000 CP-ERROR
Information ElementEach IE has an identifier which is coded as a single octet. The length of an IE may be fixed or variable and may or may not include a length indicator.
The SMS struc
source;http://www.protocols.com
ISP,s LIST OF PAKISTAN
http://www.ak.net.pk
Apollo Online
http://www.apollo.net.pk
Asia Online
http://www.aol.net.pk
Aster Net
http://www.aster.com.pk
Best Net
http://www.best.net.pk
Brain Net
http://www.brain.net.pk
Breeze Net
http://www.breeze.net.pk
CompuNet Online
http://www.compol.com
COMSATS
http://www.comsats.net.pk
CubeXS
http://www.cubexs.net.pk
CyberAccess
http://www.cyberaccess.com.pk
CyberNet
http://www.cyber.net.pk
Digicom
http://www.digicom.net.pk
Fascom
http://www.fascom.com
Gerry's Net
http://www.gerrys.net
GlobalNet
http://www.global.net.pk
IBM
http://www.ibm.net
ICNS
http://www.icns.com.pk
Info Net
http://www.inet.com.pk
Infolink
http://www.infolink.net.pk
MegaNet
http://www.mega.net.pk
MS Net
http://www.ms.net.pk
Net 21
http://www.net21pk.com
NetAccess
http://www.netxs.com.pk
NetAsia
http://www.netasia.com.pk
Nexlinx
http://www.nexlinx.net.pk
Nigsun Online
http://www.compcare.com.pk
Pak Net
http://www.paknet.ptc.pk
Pakistan Online
http://www.pol.com.pk
Pienet Global
http://www.pienet.net
RoboNet Int'L
http://www.robonets.com
SAT COM
http://www.sat.com.pk
SHOA
http://www.shoa.net
Sky Net
http://www.netcard.net.pk
Space Net
http://www.space.net.pk
SPARCOM
http://www.sparcom.net.pk
Super Net
http://www.super.net.pk
The Flash Net
http://www.theflash.net
Top Net
http://www.top.net.pk
World Online
http://www.wol.net.pk
WorldTel Internet
http://www.wtmeca.net
Zoooom Net
http://www.zoooom.net
source; http://www.cybercity-online.net
Common uses of internet
For more details on this topic, see E-mail.
The concept of sending electronic text messages between parties in a way analogous to mailing letters or memos predates the creation of the Internet. Even today it can be important to distinguish between Internet and internal e-mail systems. Internet e-mail may travel and be stored unencrypted on many other networks and machines out of both the sender's and the recipient's control. During this time it is quite possible for the content to be read and even tampered with by third parties, if anyone considers it important enough. Purely internal or intranet mail systems, where the information never leaves the corporate or organization's network, are much more secure, although in any organization there will be IT and other personnel whose job may involve monitoring, and occasionally accessing, the e-mail of other employees not addressed to them. Today you can send pictures and attach files on e-mail. Most e-mail servers today also feature the ability to send e-mail to multiple e-mail addresses.
The World Wide Web
For more details on this topic, see World Wide Web.
Graphic representation of a minute fraction of the WWW, demonstrating hyperlinks
Many people use the terms Internet and World Wide Web (or just the Web) interchangeably, but, as discussed above, the two terms are not synonymous.
The World Wide Web is a huge set of interlinked documents, images and other resources, linked by hyperlinks and URLs. These hyperlinks and URLs allow the web servers and other machines that store originals, and cached copies of, these resources to deliver them as required using HTTP (Hypertext Transfer Protocol). HTTP is only one of the communication protocols used on the Internet.
Web services also use HTTP to allow software systems to communicate in order to share and exchange business logic and data.
Software products that can access the resources of the Web are correctly termed user agents. In normal use, web browsers, such as Internet Explorer, Firefox and Apple Safari, access web pages and allow users to navigate from one to another via hyperlinks. Web documents may contain almost any combination of computer data including graphics, sounds, text, video, multimedia and interactive content including games, office applications and scientific demonstrations.
Through keyword-driven Internet research using search engines like Yahoo! and Google, millions of people worldwide have easy, instant access to a vast and diverse amount of online information. Compared to encyclopedias and traditional libraries, the World Wide Web has enabled a sudden and extreme decentralization of information and data.
Using the Web, it is also easier than ever before for individuals and organisations to publish ideas and information to an extremely large audience. Anyone can find ways to publish a web page, a blog or build a website for very little initial cost. Publishing and maintaining large, professional websites full of attractive, diverse and up-to-date information is still a difficult and expensive proposition, however.
Many individuals and some companies and groups use "web logs" or blogs, which are largely used as easily updatable online diaries. Some commercial organisations encourage staff to fill them with advice on their areas of specialization in the hope that visitors will be impressed by the expert knowledge and free information, and be attracted to the corporation as a result. One example of this practice is Microsoft, whose product developers publish their personal blogs in order to pique the public's interest in their work.
Collections of personal web pages published by large service providers remain popular, and have become increasingly sophisticated. Whereas operations such as Angelfire and GeoCities have existed since the early days of the Web, newer offerings from, for example, Facebook and MySpace currently have large followings. These operations often brand themselves as social network services rather than simply as web page hosts.
Advertising on popular web pages can be lucrative, and e-commerce or the sale of products and services directly via the Web continues to grow.
In the early days, web pages were usually created as sets of complete and isolated HTML text files stored on a web server. More recently, websites are more often created using content management or wiki software with, initially, very little content. Contributors to these systems, who may be paid staff, members of a club or other organisation or members of the public, fill underlying databases with content using editing pages designed for that purpose, while casual visitors view and read this content in its final HTML form. There may or may not be editorial, approval and security systems built into the process of taking newly entered content and making it available to the target visitors.
Remote access
Further information: Remote access
The Internet allows computer users to connect to other computers and information stores easily, wherever they may be across the world. They may do this with or without the use of security, authentication and encryption technologies, depending on the requirements.
This is encouraging new ways of working from home, collaboration and information sharing in many industries. An accountant sitting at home can audit the books of a company based in another country, on a server situated in a third country that is remotely maintained by IT specialists in a fourth. These accounts could have been created by home-working bookkeepers, in other remote locations, based on information e-mailed to them from offices all over the world. Some of these things were possible before the widespread use of the Internet, but the cost of private leased lines would have made many of them infeasible in practice.
An office worker away from his desk, perhaps on the other side of the world on a business trip or a holiday, can open a remote desktop session into his normal office PC using a secure Virtual Private Network (VPN) connection via the Internet. This gives the worker complete access to all of his or her normal files and data, including e-mail and other applications, while away from the office.
This concept is also referred to by some network security people as the Virtual Private Nightmare, because it extends the secure perimeter of a corporate network into its employees' homes.
Collaboration
See also: Collaborative software
The low cost and nearly instantaneous sharing of ideas, knowledge, and skills has made collaborative work dramatically easier. Not only can a group cheaply communicate and share ideas, but the wide reach of the Internet allows such groups to easily form in the first place. An example of this is the free software movement, which has produced Linux, Mozilla Firefox, OpenOffice.org etc.
Internet "chat", whether in the form of IRC chat rooms or channels, or via instant messaging systems, allow colleagues to stay in touch in a very convenient way when working at their computers during the day. Messages can be exchanged even more quickly and conveniently than via e-mail. Extensions to these systems may allow files to be exchanged, "whiteboard" drawings to be shared or voice and video contact between team members.
Version control systems allow collaborating teams to work on shared sets of documents without either accidentally overwriting each other's work or having members wait until they get "sent" documents to be able to make their contributions.
Business and project teams can share calendars as well as documents and other information. Such collaboration occurs in a wide variety of areas including scientific research, software development, conference planning, political activism and creative writing.
File sharing
For more details on this topic, see File sharing.
A computer file can be e-mailed to customers, colleagues and friends as an attachment. It can be uploaded to a website or FTP server for easy download by others. It can be put into a "shared location" or onto a file server for instant use by colleagues. The load of bulk downloads to many users can be eased by the use of "mirror" servers or peer-to-peer networks.
In any of these cases, access to the file may be controlled by user authentication, the transit of the file over the Internet may be obscured by encryption, and money may change hands for access to the file. The price can be paid by the remote charging of funds from, for example, a credit card whose details are also passed—hopefully fully encrypted—across the Internet. The origin and authenticity of the file received may be checked by digital signatures or by MD5 or other message digests.
These simple features of the Internet, over a worldwide basis, are changing the production, sale, and distribution of anything that can be reduced to a computer file for transmission. This includes all manner of print publications, software products, news, music, film, video, photography, graphics and the other arts. This in turn has caused seismic shifts in each of the existing industries that previously controlled the production and distribution of these products.
Streaming media
Many existing radio and television broadcasters provide Internet "feeds" of their live audio and video streams (for example, the BBC). They may also allow time-shift viewing or listening such as Preview, Classic Clips and Listen Again features. These providers have been joined by a range of pure Internet "broadcasters" who never had on-air licenses. This means that an Internet-connected device, such as a computer or something more specific, can be used to access on-line media in much the same way as was previously possible only with a television or radio receiver. The range of material is much wider, from pornography to highly specialized, technical webcasts. Podcasting is a variation on this theme, where—usually audio—material is downloaded and played back on a computer or shifted to a portable media player to be listened to on the move. These techniques using simple equipment allow anybody, with little censorship or licensing control, to broadcast audio-visual material on a worldwide basis.
Webcams can be seen as an even lower-budget extension of this phenomenon. While some webcams can give full-frame-rate video, the picture is usually either small or updates slowly. Internet users can watch animals around an African waterhole, ships in the Panama Canal, traffic at a local roundabout or monitor their own premises, live and in real time. Video chat rooms and video conferencing are also popular with many uses being found for personal webcams, with and without two-way sound.
YouTube was founded on 15 February 2005 and is now the leading website for free streaming video with a vast number of users. It uses a flash-based web player to stream and show video files. Registered users may upload an unlimited amount of video and build their own personal profile. YouTube claims that its users watch hundreds of millions, and upload hundreds of thousands, of videos daily.[13]
Internet Telephony (VoIP)
For more details on this topic, see VoIP.
VoIP stands for Voice-over-Internet Protocol, referring to the protocol that underlies all Internet communication. The idea began in the early 1990s with walkie-talkie-like voice applications for personal computers. In recent years many VoIP systems have become as easy to use and as convenient as a normal telephone. The benefit is that, as the Internet carries the voice traffic, VoIP can be free or cost much less than a traditional telephone call, especially over long distances and especially for those with always-on Internet connections such as cable or ADSL.
VoIP is maturing into a competitive alternative to traditional telephone service. Interoperability between different providers has improved and the ability to call or receive a call from a traditional telephone is available. Simple, inexpensive VoIP network adapters are available that eliminate the need for a personal computer.
Voice quality can still vary from call to call but is often equal to and can even exceed that of traditional calls.
Remaining problems for VoIP include emergency telephone number dialling and reliability. Currently, a few VoIP providers provide an emergency service, but it is not universally available. Traditional phones are line-powered and operate during a power failure; VoIP does not do so without a backup power source for the phone equipment and the Internet access devices.
VoIP has also become increasingly popular for gaming applications, as a form of communication between players. Popular VoIP clients for gaming include Ventrilo and Teamspeak, and others. PlayStation 3 and Xbox 360 also offer VoIP chat features.
Internet by region
Main article: Internet access worldwide
Main article: List of countries by number of Internet users
Internet access
Main article: Internet access
Wikibooks has a book on the topic of
Online linux connect
Common methods of home access include dial-up, landline broadband (over coaxial cable, fiber optic or copper wires), Wi-Fi, satellite and 3G technology cell phones.
Public places to use the Internet include libraries and Internet cafes, where computers with Internet connections are available. There are also Internet access points in many public places such as airport halls and coffee shops, in some cases just for brief use while standing. Various terms are used, such as "public Internet kiosk", "public access terminal", and "Web payphone". Many hotels now also have public terminals, though these are usually fee-based. These terminals are widely accessed for various usage like ticket booking, bank deposit, online payment etc. Wi-Fi provides wireless access to computer networks, and therefore can do so to the Internet itself. Hotspots providing such access include Wi-Fi cafes, where would-be users need to bring their own wireless-enabled devices such as a laptop or PDA. These services may be free to all, free to customers only, or fee-based. A hotspot need not be limited to a confined location. A whole campus or park, or even an entire city can be enabled. Grassroots efforts have led to wireless community networks. Commercial Wi-Fi services covering large city areas are in place in London, Vienna, Toronto, San Francisco, Philadelphia, Chicago and Pittsburgh. The Internet can then be accessed from such places as a park bench.[14]
Apart from Wi-Fi, there have been experiments with proprietary mobile wireless networks like Ricochet, various high-speed data services over cellular phone networks, and fixed wireless services.
High-end mobile phones such as smartphones generally come with Internet access through the phone network. Web browsers such as Opera are available on these advanced handsets, which can also run a wide variety of other Internet software. More mobile phones have Internet access than PCs, though this is not as widely used. An Internet access provider and protocol matrix differentiates the methods used to get online.
source; http://en.wikipedia.org/